28 Apr, 2007

1 commit

  • After 13 years of use, it looks like my email address is finally going
    to disappear. While this is likely to drop the amount of incoming spam
    greatly ;-), it may also affect more appropriate messages, so let's
    update my email address in various places. In addition, Host AP mailing
    list is subscribers-only and linux-wireless can also be used for
    discussing issues related to this driver which is now shown in
    MAINTAINERS.

    Signed-off-by: Jouni Malinen
    Signed-off-by: John W. Linville

    Jouni Malinen
     

26 Apr, 2007

1 commit


11 Feb, 2007

1 commit


04 Dec, 2006

1 commit


23 Sep, 2006

2 commits


21 Sep, 2006

1 commit


30 Aug, 2006

1 commit

  • The IEEE80211 TKIP and WEP Tx and Rx paths use the same crypto_tfm to encrypt
    and decrypt data. During the encrypt and decrypt process, both of them will
    set a new key to crypto_tfm. If they happen on the same time, it will
    corrupt the crypto_tfm. Thus users will receive an ICV error or Michael MIC
    error. This only likely to happen on SMP box with heavy traffic both on Tx
    and Rx. The patch use two sets of crypto_tfms to avoid this problem.

    Signed-off-by: Hong Liu
    Signed-off-by: Zhu Yi
    Signed-off-by: John W. Linville

    Zhu Yi
     

22 Jul, 2006

1 commit


01 Jul, 2006

1 commit


28 Jan, 2006

1 commit

  • This patch adds ieee80211 TKIP build_iv() method to support hardwares
    that can do TKIP encryption but relies on ieee80211 layer to build
    the IV. It also changes the build_iv() interface to return the key
    if possible after the IV is built (this is required by TKIP).

    Signed-off-by: Zhu Yi
    Signed-off-by: John W. Linville

    Zhu Yi
     

09 Jan, 2006

1 commit

  • This patch fixes some of the ieee80211 crypto related code so that
    instead of having the host fully do crypto operations, the host_build_iv
    flag works properly (for WEP in this patch) which, if turned on,
    requires the hardware to do all crypto operations, but the ieee80211
    layer builds the IV. The hardware also has to build the ICV.

    Previously, the host_build_iv flag couldn't be used at all for WEP, and
    not alone (with both host_decrypt and host_encrypt disabled) because the
    crypto algorithm wasn't assigned. This is also fixed.

    I have tested this patch both in host crypto mode and in hw crypto mode
    (with the Broadcom chipset).

    [resent, signing digitally caused it to be MIME-junked, sorry]

    Signed-Off-By: Johannes Berg

    Signed-off-by: Jeff Garzik

    Johannes Berg
     

06 Nov, 2005

1 commit


23 Sep, 2005

1 commit


22 Sep, 2005

2 commits

  • tree 8428e9f510e6ad6c77baec89cb57374842abf733
    parent d78bfd3ddae9c422dd350159110f9c4d7cfc50de
    author Liu Hong 1124446520 -0500
    committer James Ketrenos 1127313183 -0500

    Fix TKIP, repeated fragmentation problem, and payload_size reporting

    1. TKIP encryption
    Originally, TKIP encryption issues msdu + mpdu encryption on every
    fragment. Change the behavior to msdu encryption on the whole
    packet, then mpdu encryption on every fragment.

    2. Avoid repeated fragmentation when !host_encrypt.
    We only need do fragmentation when using host encryption. Otherwise
    we only need pass the whole packet to driver, letting driver do the
    fragmentation.

    3. change the txb->payload_size to correct value
    FW will use this value to determine whether to do fragmentation. If
    we pass the wrong value, fw may cut on the wrong bound which will
    make decryption fail when we do host encryption.

    NOTE: This requires changing drivers (hostap) that have
    extra_prefix_len used within them (structure member name change).

    Signed-off-by: Hong Liu
    Signed-off-by: James Ketrenos
    Signed-off-by: Jeff Garzik

    James Ketrenos
     
  • tree 367069f24fc38b4aa910e86ff40094d2078d8aa7
    parent a33a1982012e9070736e3717231714dc9892303b
    author James Ketrenos 1124430800 -0500
    committer James Ketrenos 1127310571 -0500

    Fixed a kernel oops on module unload by adding spin lock protection to
    ieee80211's crypt handlers (thanks to Zhu Yi)

    Modified scan result logic to report WPA and RSN IEs if set (vs.being
    based on wpa_enabled)

    Added ieee80211_device as the first parameter to the crypt init()
    method. TKIP modified to use that structure for determining whether to
    countermeasures are active.

    Signed-off-by: James Ketrenos
    Signed-off-by: Jeff Garzik

    James Ketrenos
     

16 Sep, 2005

1 commit


07 Sep, 2005

1 commit


13 May, 2005

1 commit