- 06 11月, 2005 1 次提交
-
-
由 Jeff Garzik 提交于
Unused, and causes the files to be needlessly rebuilt in some cases.
-
- 23 9月, 2005 1 次提交
-
-
由 James Ketrenos 提交于
Changed crypto method from requiring a struct ieee80211_device reference to the init handler. Instead we now have a get/set flags method for each crypto component. Setting of TKIP countermeasures can now be done via set_flags(IEEE80211_CRYPTO_TKIP_COUNTERMEASURES) Signed-off-by: NJames Ketrenos <jketreno@linux.intel.com> Signed-off-by: NJeff Garzik <jgarzik@pobox.com>
-
- 22 9月, 2005 3 次提交
-
-
由 James Ketrenos 提交于
tree 8428e9f510e6ad6c77baec89cb57374842abf733 parent d78bfd3ddae9c422dd350159110f9c4d7cfc50de author Liu Hong <hong.liu@intel.com> 1124446520 -0500 committer James Ketrenos <jketreno@linux.intel.com> 1127313183 -0500 Fix TKIP, repeated fragmentation problem, and payload_size reporting 1. TKIP encryption Originally, TKIP encryption issues msdu + mpdu encryption on every fragment. Change the behavior to msdu encryption on the whole packet, then mpdu encryption on every fragment. 2. Avoid repeated fragmentation when !host_encrypt. We only need do fragmentation when using host encryption. Otherwise we only need pass the whole packet to driver, letting driver do the fragmentation. 3. change the txb->payload_size to correct value FW will use this value to determine whether to do fragmentation. If we pass the wrong value, fw may cut on the wrong bound which will make decryption fail when we do host encryption. NOTE: This requires changing drivers (hostap) that have extra_prefix_len used within them (structure member name change). Signed-off-by: NHong Liu <liu.hong@intel.com> Signed-off-by: NJames Ketrenos <jketreno@linux.intel.com> Signed-off-by: NJeff Garzik <jgarzik@pobox.com>
-
由 James Ketrenos 提交于
tree b69e983266840983183a00f5ac02c66d5270ca47 parent cdd6372949b76694622ed74fe36e1dd17a92eb71 author Zhu Yi <jketreno@io.(none)> 1124435425 -0500 committer James Ketrenos <jketreno@linux.intel.com> 1127312421 -0500 Fix kernel Oops when module unload. Export a new function ieee80211_crypt_quiescing from ieee80211. Device drivers call it to make the host crypto stack enter the quiescence state, which means "process existing requests, but don't accept new ones". This is usually called during a driver's host crypto data structure free (module unload) path. Signed-off-by: NJames Ketrenos <jketreno@linux.intel.com> Signed-off-by: NJeff Garzik <jgarzik@pobox.com>
-
由 James Ketrenos 提交于
tree 367069f24fc38b4aa910e86ff40094d2078d8aa7 parent a33a1982 author James Ketrenos <jketreno@linux.intel.com> 1124430800 -0500 committer James Ketrenos <jketreno@linux.intel.com> 1127310571 -0500 Fixed a kernel oops on module unload by adding spin lock protection to ieee80211's crypt handlers (thanks to Zhu Yi) Modified scan result logic to report WPA and RSN IEs if set (vs.being based on wpa_enabled) Added ieee80211_device as the first parameter to the crypt init() method. TKIP modified to use that structure for determining whether to countermeasures are active. Signed-off-by: NJames Ketrenos <jketreno@linux.intel.com> Signed-off-by: NJeff Garzik <jgarzik@pobox.com>
-
- 16 9月, 2005 1 次提交
-
-
由 James Ketrenos 提交于
Added wireless spy support to Rx code path. Signed-off-by: NJames Ketrenos <jketreno@linux.intel.com> NOTE: Looks like scripts/Lindent generated output different than the Lindented version already in-kernel, hence all the whitespace deltas... *sigh* Signed-off-by: NJeff Garzik <jgarzik@pobox.com>
-
- 07 9月, 2005 1 次提交
-
-
由 Jeff Garzik 提交于
No code changes, just Lindent + manual fixups. This prepares us for updating to the latest Intel driver code, plus gives the source code a nice facelift.
-
- 13 5月, 2005 1 次提交
-
-
由 Jeff Garzik 提交于
Contributors: Host AP contributors James Ketrenos <jketreno@linux.intel.com> Francois Romieu <romieu@fr.zoreil.com> Adrian Bunk <bunk@stusta.de> Matthew Galgoci <mgalgoci@parcelfarce.linux.th eplanet.co.uk>
-