1. 15 9月, 2011 1 次提交
  2. 14 9月, 2011 5 次提交
  3. 26 8月, 2011 1 次提交
  4. 25 8月, 2011 3 次提交
  5. 23 8月, 2011 1 次提交
    • T
      mac80211: update mesh peering frame format · 8db09850
      Thomas Pedersen 提交于
      This patch updates the mesh peering frames to the format specified in
      the recently ratified 802.11s standard. Several changes took place to
      make this happen:
      
      	- Change RX path to handle new self-protected frames
      	- Add new Peering management IE
      	- Remove old Peer Link IE
      	- Remove old plink_action field in ieee80211_mgmt header
      
      These changes by themselves would either break peering, or work by
      coincidence, so squash them all into this patch.
      Signed-off-by: NThomas Pedersen <thomas@cozybit.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      8db09850
  6. 13 8月, 2011 4 次提交
  7. 12 8月, 2011 2 次提交
  8. 11 8月, 2011 2 次提交
  9. 10 8月, 2011 2 次提交
  10. 09 8月, 2011 2 次提交
  11. 02 8月, 2011 1 次提交
  12. 27 7月, 2011 2 次提交
    • M
      wireless: fix a typo in ignore_reg_update · 5bc91db8
      Mihai Moldovan 提交于
      Just a typo fix changing regulaotry to regulatory.
      Signed-off-by: NMihai Moldovan <ionic@ionic.de>
      CC: John W. Linville <linville@tuxdriver.com>
      CC: Mohammed Shafi <shafi.wireless@gmail.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      5bc91db8
    • S
      cfg80211: really ignore the regulatory request · a203c2aa
      Sven Neumann 提交于
      At the beginning of wiphy_update_regulatory() a check is performed
      whether the request is to be ignored. Then the request is sent to
      the driver nevertheless. This happens even if last_request points
      to NULL, leading to a crash in the driver:
      
       [<bf01d864>] (lbs_set_11d_domain_info+0x28/0x1e4 [libertas]) from [<c03b714c>] (wiphy_update_regulatory+0x4d0/0x4f4)
       [<c03b714c>] (wiphy_update_regulatory+0x4d0/0x4f4) from [<c03b4008>] (wiphy_register+0x354/0x420)
       [<c03b4008>] (wiphy_register+0x354/0x420) from [<bf01b17c>] (lbs_cfg_register+0x80/0x164 [libertas])
       [<bf01b17c>] (lbs_cfg_register+0x80/0x164 [libertas]) from [<bf020e64>] (lbs_start_card+0x20/0x88 [libertas])
       [<bf020e64>] (lbs_start_card+0x20/0x88 [libertas]) from [<bf02cbd8>] (if_sdio_probe+0x898/0x9c0 [libertas_sdio])
      
      Fix this by returning early. Also remove the out: label as it is
      not any longer needed.
      Signed-off-by: NSven Neumann <s.neumann@raumfeld.com>
      Cc: linux-wireless@vger.kernel.org
      Cc: Johannes Berg <johannes@sipsolutions.net>
      Cc: Daniel Mack <daniel@zonque.org>
      Cc: stable@kernel.org
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      a203c2aa
  13. 21 7月, 2011 2 次提交
  14. 20 7月, 2011 1 次提交
  15. 16 7月, 2011 3 次提交
  16. 08 7月, 2011 1 次提交
  17. 07 7月, 2011 1 次提交
    • J
      cfg80211/nl80211: support GTK rekey offload · e5497d76
      Johannes Berg 提交于
      In certain circumstances, like WoWLAN scenarios,
      devices may implement (partial) GTK rekeying on
      the device to avoid waking up the host for it.
      
      In order to successfully go through GTK rekeying,
      the KEK, KCK and the replay counter are required.
      
      Add API to let the supplicant hand the parameters
      to the driver which may store it for future GTK
      rekey operations.
      
      Note that, of course, if GTK rekeying is done by
      the device, the EAP frame must not be passed up
      to userspace, instead a rekey event needs to be
      sent to let userspace update its replay counter.
      Signed-off-by: NJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      e5497d76
  18. 06 7月, 2011 2 次提交
  19. 28 6月, 2011 1 次提交
  20. 23 6月, 2011 1 次提交
  21. 11 6月, 2011 1 次提交
  22. 08 6月, 2011 1 次提交