From owner-p4-projects@FreeBSD.ORG Tue Dec 14 23:22:25 2004 Return-Path: Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id 94D2216A4D0; Tue, 14 Dec 2004 23:22:25 +0000 (GMT) Delivered-To: perforce@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 6C5E316A4CE for ; Tue, 14 Dec 2004 23:22:25 +0000 (GMT) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id 5A94E43D39 for ; Tue, 14 Dec 2004 23:22:25 +0000 (GMT) (envelope-from sam@freebsd.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.1/8.13.1) with ESMTP id iBENMPwf082592 for ; Tue, 14 Dec 2004 23:22:25 GMT (envelope-from sam@freebsd.org) Received: (from perforce@localhost) by repoman.freebsd.org (8.13.1/8.13.1/Submit) id iBENMPVG082589 for perforce@freebsd.org; Tue, 14 Dec 2004 23:22:25 GMT (envelope-from sam@freebsd.org) Date: Tue, 14 Dec 2004 23:22:25 GMT Message-Id: <200412142322.iBENMPVG082589@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to sam@freebsd.org using -f From: Sam Leffler To: Perforce Change Reviews Subject: PERFORCE change 67096 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 14 Dec 2004 23:22:26 -0000 http://perforce.freebsd.org/chv.cgi?CH=67096 Change 67096 by sam@sam_ebb on 2004/12/14 23:21:44 add debug msgs for set+del crypto keys Affected files ... .. //depot/projects/wifi/sys/net80211/ieee80211_crypto.c#8 edit Differences ... ==== //depot/projects/wifi/sys/net80211/ieee80211_crypto.c#8 (text+ko) ==== @@ -366,6 +366,12 @@ KASSERT(key->wk_cipher != NULL, ("No cipher!")); + IEEE80211_DPRINTF(ic, IEEE80211_MSG_CRYPTO, + "%s: %s keyix %u flags 0x%x rsc %ju tsc %ju len %u\n", + __func__, key->wk_cipher->ic_name, + key->wk_keyix, key->wk_flags, + key->wk_keyrsc, key->wk_keytsc, key->wk_keylen); + keyix = key->wk_keyix; if (keyix != IEEE80211_KEYIX_NONE) { /* @@ -436,6 +442,12 @@ KASSERT(cip != NULL, ("No cipher!")); + IEEE80211_DPRINTF(ic, IEEE80211_MSG_CRYPTO, + "%s: %s keyix %u flags 0x%x mac %s rsc %ju tsc %ju len %u\n", + __func__, cip->ic_name, key->wk_keyix, + key->wk_flags, ether_sprintf(macaddr), + key->wk_keyrsc, key->wk_keytsc, key->wk_keylen); + /* * Give cipher a chance to validate key contents. * XXX should happen before modifying state.