1. 28 9月, 2011 3 次提交
    • R
      nl80211/cfg80211: Add support to disable CCK rate for management frame · e9f935e3
      Rajkumar Manoharan 提交于
      Add a new nl80211 attribute to specify whether to send the management
      frames in CCK rate or not. As of now the wpa_supplicant is disabling
      CCK rate at P2P init itself. So this patch helps to send P2P probe
      request/probe response/action frames being sent at non CCK rate in 2GHz
      without disabling 11b rates.
      
      This attribute is used with NL80211_CMD_TRIGGER_SCAN and
      NL80211_CMD_FRAME commands to disable CCK rate for management frame
      transmission.
      
      Cc: Jouni Malinen <jouni@qca.qualcomm.com>
      Signed-off-by: NRajkumar Manoharan <rmanohar@qca.qualcomm.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      e9f935e3
    • J
      cfg80211: Validate cipher suite against supported ciphers · 38ba3c57
      Jouni Malinen 提交于
      Instead of using a hardcoded list of cipher suites in nl80211.c, use a
      shared function in util.c to verify that the driver advertises support
      for the specified cipher. This provides more accurate validation of the
      values and allows vendor-specific cipher suites to be added in drivers.
      Signed-off-by: NJouni Malinen <jouni@qca.qualcomm.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      38ba3c57
    • J
      cfg80211: Remove strict validation of AKM suites · 6d30240e
      Jouni Malinen 提交于
      NL80211_ATTR_AKM_SUITES can be used to configure new AKMs, like FT or
      the SHA-256 -based AKMs or FT from 802.11r/802.11w. In addition, vendor
      specific AKMs could be used. The current validation code for the connect
      command prevents cfg80211-based drivers from using these mechanisms even
      if the driver would not actually use this AKM value (i.e., it uses
      WPA/RSN IE from user space). mac80211-based drivers allow any AKM to be
      used since this value is not used there.
      
      Remove the unnecessary validation step in cfg80211 to allow drivers to
      decide what AKMs are supported. In theory, we could handle this by
      advertising supported AKMs, but that would not be very effective unless
      we enforce all drivers (including mac80211) to advertise the set of
      supported AKMs. This would require additional changes in many places
      whenever a new AKM is introduced even though no actually functionality
      changes may be required in most drivers.
      Signed-off-by: NJouni Malinen <jouni@qca.qualcomm.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      6d30240e
  2. 20 9月, 2011 2 次提交
  3. 15 9月, 2011 1 次提交
  4. 14 9月, 2011 3 次提交
  5. 26 8月, 2011 1 次提交
  6. 25 8月, 2011 3 次提交
  7. 13 8月, 2011 3 次提交
  8. 12 8月, 2011 2 次提交
  9. 11 8月, 2011 2 次提交
  10. 02 8月, 2011 1 次提交
  11. 21 7月, 2011 1 次提交
  12. 20 7月, 2011 1 次提交
  13. 16 7月, 2011 3 次提交
  14. 07 7月, 2011 1 次提交
    • J
      cfg80211/nl80211: support GTK rekey offload · e5497d76
      Johannes Berg 提交于
      In certain circumstances, like WoWLAN scenarios,
      devices may implement (partial) GTK rekeying on
      the device to avoid waking up the host for it.
      
      In order to successfully go through GTK rekeying,
      the KEK, KCK and the replay counter are required.
      
      Add API to let the supplicant hand the parameters
      to the driver which may store it for future GTK
      rekey operations.
      
      Note that, of course, if GTK rekeying is done by
      the device, the EAP frame must not be passed up
      to userspace, instead a rekey event needs to be
      sent to let userspace update its replay counter.
      Signed-off-by: NJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      e5497d76
  15. 06 7月, 2011 1 次提交
    • L
      cfg80211: fix deadlock with rfkill/sched_scan by adding new mutex · c10841ca
      Luciano Coelho 提交于
      There was a deadlock when rfkill-blocking a wireless interface,
      because we were locking the rdev mutex on NETDEV_GOING_DOWN to stop
      sched_scans that were eventually running.  The rfkill block code was
      already holding a mutex under rdev:
      
      kernel: =======================================================
      kernel: [ INFO: possible circular locking dependency detected ]
      kernel: 3.0.0-rc1-00049-g1fa7b6a2 #57
      kernel: -------------------------------------------------------
      kernel: kworker/0:1/4525 is trying to acquire lock:
      kernel: (&rdev->mtx){+.+.+.}, at: [<ffffffff8164c831>] cfg80211_netdev_notifier_call+0x131/0x5b0
      kernel:
      kernel: but task is already holding lock:
      kernel: (&rdev->devlist_mtx){+.+.+.}, at: [<ffffffff8164dcef>] cfg80211_rfkill_set_block+0x4f/0xa0
      kernel:
      kernel: which lock already depends on the new lock.
      
      To fix this, add a new mutex specifically for sched_scan, to protect
      the sched_scan_req element in the rdev struct, instead of using the
      global rdev mutex.
      Reported-by: NDuane Griffin <duaneg@dghda.com>
      Signed-off-by: NLuciano Coelho <coelho@ti.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      c10841ca
  16. 28 6月, 2011 1 次提交
  17. 23 6月, 2011 1 次提交
  18. 08 6月, 2011 1 次提交
  19. 02 6月, 2011 2 次提交
  20. 27 5月, 2011 1 次提交
  21. 20 5月, 2011 1 次提交
  22. 17 5月, 2011 2 次提交
    • J
      nl80211: Move peer link state definition to nl80211 · 57cf8043
      Javier Cardona 提交于
      These definitions need to be exposed now that we can set the peer link
      states via NL80211_ATTR_STA_PLINK_STATE.  They were already being
      (opaquely) reported by NL80211_STA_INFO_PLINK_STATE.
      Signed-off-by: NJavier Cardona <javier@cozybit.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      57cf8043
    • J
      cfg80211: advertise possible interface combinations · 7527a782
      Johannes Berg 提交于
      Add the ability to advertise interface combinations in nl80211.
      This allows the driver to indicate what the combinations are
      that it supports. "Combinations" of just a single interface are
      implicit, as previously. Note that cfg80211 will enforce that
      the restrictions are met, but not for all drivers yet (once all
      drivers are updated, we can remove the flag and enforce for all).
      
      When no combinations are actually supported, an empty list will
      be exported so that userspace can know if the kernel exported
      this info or not (although it isn't clear to me what tools using
      the info should do if the kernel didn't export it).
      
      Since some interface types are purely virtual/software and don't
      fit the restrictions, those are exposed in a new list of pure SW
      types, not subject to restrictions. This mainly exists to handle
      AP-VLAN and monitor interfaces in mac80211.
      Signed-off-by: NJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      7527a782
  23. 13 5月, 2011 1 次提交
  24. 12 5月, 2011 2 次提交