1. 06 11月, 2005 1 次提交
  2. 23 9月, 2005 1 次提交
  3. 22 9月, 2005 3 次提交
    • J
      [PATCH] ieee80211: Fix TKIP, repeated fragmentation problem, and payload_size reporting · 1264fc04
      James Ketrenos 提交于
      tree 8428e9f510e6ad6c77baec89cb57374842abf733
      parent d78bfd3ddae9c422dd350159110f9c4d7cfc50de
      author Liu Hong <hong.liu@intel.com> 1124446520 -0500
      committer James Ketrenos <jketreno@linux.intel.com> 1127313183 -0500
      
      Fix TKIP, repeated fragmentation problem, and payload_size reporting
      
      1. TKIP encryption
          Originally, TKIP encryption issues msdu + mpdu encryption on every
          fragment. Change the behavior to msdu encryption on the whole
          packet, then mpdu encryption on every fragment.
      
      2. Avoid repeated fragmentation when !host_encrypt.
          We only need do fragmentation when using host encryption. Otherwise
          we only need pass the whole packet to driver, letting driver do the
          fragmentation.
      
      3. change the txb->payload_size to correct value
          FW will use this value to determine whether to do fragmentation. If
          we pass the wrong value, fw may cut on the wrong bound which will
          make decryption fail when we do host encryption.
      
      NOTE:  This requires changing drivers (hostap) that have
      extra_prefix_len used within them (structure member name change).
      Signed-off-by: NHong Liu <liu.hong@intel.com>
      Signed-off-by: NJames Ketrenos <jketreno@linux.intel.com>
      Signed-off-by: NJeff Garzik <jgarzik@pobox.com>
      1264fc04
    • J
      [PATCH] ieee80211: Fix kernel Oops when module unload · 0ad0c3c6
      James Ketrenos 提交于
      tree b69e983266840983183a00f5ac02c66d5270ca47
      parent cdd6372949b76694622ed74fe36e1dd17a92eb71
      author Zhu Yi <jketreno@io.(none)> 1124435425 -0500
      committer James Ketrenos <jketreno@linux.intel.com> 1127312421 -0500
      
      Fix kernel Oops when module unload.
      
      Export a new function ieee80211_crypt_quiescing from ieee80211. Device
      drivers call it to make the host crypto stack enter the quiescence
      state, which means "process existing requests, but don't accept new
      ones". This is usually called during a driver's host crypto data
      structure free (module unload) path.
      Signed-off-by: NJames Ketrenos <jketreno@linux.intel.com>
      Signed-off-by: NJeff Garzik <jgarzik@pobox.com>
      0ad0c3c6
    • J
      [PATCH] ieee80211: Fixed a kernel oops on module unload · 20d64713
      James Ketrenos 提交于
      tree 367069f24fc38b4aa910e86ff40094d2078d8aa7
      parent a33a1982
      author James Ketrenos <jketreno@linux.intel.com> 1124430800 -0500
      committer James Ketrenos <jketreno@linux.intel.com> 1127310571 -0500
      
      Fixed a kernel oops on module unload by adding spin lock protection to
      ieee80211's crypt handlers (thanks to Zhu Yi)
      
      Modified scan result logic to report WPA and RSN IEs if set (vs.being
      based on wpa_enabled)
      
      Added ieee80211_device as the first parameter to the crypt init()
      method.  TKIP modified to use that structure for determining whether to
      countermeasures are active.
      Signed-off-by: NJames Ketrenos <jketreno@linux.intel.com>
      Signed-off-by: NJeff Garzik <jgarzik@pobox.com>
      20d64713
  4. 16 9月, 2005 1 次提交
  5. 07 9月, 2005 1 次提交
  6. 13 5月, 2005 1 次提交
    • J
      [NET] ieee80211 subsystem · b453872c
      Jeff Garzik 提交于
      Contributors:
      Host AP contributors
      James Ketrenos <jketreno@linux.intel.com>
      Francois Romieu <romieu@fr.zoreil.com>
      Adrian Bunk <bunk@stusta.de>
      Matthew Galgoci <mgalgoci@parcelfarce.linux.th
      eplanet.co.uk>
      b453872c