“9edff0f79f5b98e6abfabfa27b31d155e3c994e1”上不存在“arch/arm/mach-exynos/mach-origen.c”
  1. 18 6月, 2014 1 次提交
  2. 20 5月, 2014 1 次提交
  3. 04 3月, 2014 1 次提交
  4. 14 2月, 2014 1 次提交
  5. 24 1月, 2014 1 次提交
  6. 03 10月, 2013 1 次提交
  7. 14 11月, 2012 1 次提交
  8. 18 7月, 2012 1 次提交
  9. 14 4月, 2012 1 次提交
  10. 11 4月, 2012 1 次提交
  11. 20 12月, 2011 1 次提交
  12. 08 11月, 2011 2 次提交
  13. 03 11月, 2011 1 次提交
  14. 15 10月, 2011 2 次提交
  15. 12 10月, 2011 1 次提交
  16. 23 8月, 2011 5 次提交
  17. 08 7月, 2011 1 次提交
    • J
      mac80211: fix TKIP races, make API easier to use · 523b02ea
      Johannes Berg 提交于
      Our current TKIP code races against itself on TX
      since we can process multiple packets at the same
      time on different ACs, but they all share the TX
      context for TKIP. This can lead to bad IVs etc.
      
      Also, the crypto offload helper code just obtains
      the P1K/P2K from the cache, and can update it as
      well, but there's no guarantee that packets are
      really processed in order.
      
      To fix these issues, first introduce a spinlock
      that will protect the IV16/IV32 values in the TX
      context. This first step makes sure that we don't
      assign the same IV multiple times or get confused
      in other ways.
      
      Secondly, change the way the P1K cache works. I
      add a field "p1k_iv32" that stores the value of
      the IV32 when the P1K was last recomputed, and
      if different from the last time, then a new P1K
      is recomputed. This can cause the P1K computation
      to flip back and forth if packets are processed
      out of order. All this also happens under the new
      spinlock.
      
      Finally, because there are argument differences,
      split up the ieee80211_get_tkip_key() API into
      ieee80211_get_tkip_p1k() and ieee80211_get_tkip_p2k()
      and give them the correct arguments.
      Signed-off-by: NJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      523b02ea
  18. 07 7月, 2011 1 次提交
  19. 02 6月, 2011 1 次提交
  20. 17 5月, 2011 1 次提交
  21. 26 2月, 2011 1 次提交
  22. 24 2月, 2011 1 次提交
  23. 29 4月, 2010 1 次提交
  24. 07 11月, 2009 1 次提交
  25. 28 10月, 2009 2 次提交
  26. 13 10月, 2009 1 次提交
  27. 08 10月, 2009 1 次提交
  28. 23 9月, 2009 2 次提交
  29. 09 9月, 2009 1 次提交
    • M
      b43: Fix sparse warning in hw-tkip code · cde1b55b
      Michael Buesch 提交于
      This fixes a sparse warning in the hardware-TKIP code:
      
      drivers/net/wireless/b43/xmit.c:272:18: warning: incorrect type in assignment (different base types)
      drivers/net/wireless/b43/xmit.c:272:18:    expected unsigned short [unsigned] [short] <noident>
      drivers/net/wireless/b43/xmit.c:272:18:    got restricted unsigned short [usertype] <noident>
      
      The code should work correctly with and without this patch applied.
      Signed-off-by: NMichael Buesch <mb@bu3sch.de>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      cde1b55b
  30. 20 8月, 2009 2 次提交
  31. 14 8月, 2009 1 次提交