28 Apr, 2007

1 commit

  • After 13 years of use, it looks like my email address is finally going
    to disappear. While this is likely to drop the amount of incoming spam
    greatly ;-), it may also affect more appropriate messages, so let's
    update my email address in various places. In addition, Host AP mailing
    list is subscribers-only and linux-wireless can also be used for
    discussing issues related to this driver which is now shown in
    MAINTAINERS.

    Signed-off-by: Jouni Malinen
    Signed-off-by: John W. Linville

    Jouni Malinen
     

28 Jan, 2006

1 commit

  • This patch adds ieee80211 TKIP build_iv() method to support hardwares
    that can do TKIP encryption but relies on ieee80211 layer to build
    the IV. It also changes the build_iv() interface to return the key
    if possible after the IV is built (this is required by TKIP).

    Signed-off-by: Zhu Yi
    Signed-off-by: John W. Linville

    Zhu Yi
     

17 Jan, 2006

1 commit


04 Jan, 2006

1 commit


09 Nov, 2005

1 commit


03 Oct, 2005

1 commit


23 Sep, 2005

2 commits


22 Sep, 2005

3 commits

  • tree 8428e9f510e6ad6c77baec89cb57374842abf733
    parent d78bfd3ddae9c422dd350159110f9c4d7cfc50de
    author Liu Hong 1124446520 -0500
    committer James Ketrenos 1127313183 -0500

    Fix TKIP, repeated fragmentation problem, and payload_size reporting

    1. TKIP encryption
    Originally, TKIP encryption issues msdu + mpdu encryption on every
    fragment. Change the behavior to msdu encryption on the whole
    packet, then mpdu encryption on every fragment.

    2. Avoid repeated fragmentation when !host_encrypt.
    We only need do fragmentation when using host encryption. Otherwise
    we only need pass the whole packet to driver, letting driver do the
    fragmentation.

    3. change the txb->payload_size to correct value
    FW will use this value to determine whether to do fragmentation. If
    we pass the wrong value, fw may cut on the wrong bound which will
    make decryption fail when we do host encryption.

    NOTE: This requires changing drivers (hostap) that have
    extra_prefix_len used within them (structure member name change).

    Signed-off-by: Hong Liu
    Signed-off-by: James Ketrenos
    Signed-off-by: Jeff Garzik

    James Ketrenos
     
  • tree b69e983266840983183a00f5ac02c66d5270ca47
    parent cdd6372949b76694622ed74fe36e1dd17a92eb71
    author Zhu Yi 1124435425 -0500
    committer James Ketrenos 1127312421 -0500

    Fix kernel Oops when module unload.

    Export a new function ieee80211_crypt_quiescing from ieee80211. Device
    drivers call it to make the host crypto stack enter the quiescence
    state, which means "process existing requests, but don't accept new
    ones". This is usually called during a driver's host crypto data
    structure free (module unload) path.

    Signed-off-by: James Ketrenos
    Signed-off-by: Jeff Garzik

    James Ketrenos
     
  • tree 367069f24fc38b4aa910e86ff40094d2078d8aa7
    parent a33a1982012e9070736e3717231714dc9892303b
    author James Ketrenos 1124430800 -0500
    committer James Ketrenos 1127310571 -0500

    Fixed a kernel oops on module unload by adding spin lock protection to
    ieee80211's crypt handlers (thanks to Zhu Yi)

    Modified scan result logic to report WPA and RSN IEs if set (vs.being
    based on wpa_enabled)

    Added ieee80211_device as the first parameter to the crypt init()
    method. TKIP modified to use that structure for determining whether to
    countermeasures are active.

    Signed-off-by: James Ketrenos
    Signed-off-by: Jeff Garzik

    James Ketrenos
     

16 Sep, 2005

1 commit


13 May, 2005

1 commit