1. 29 11月, 2011 4 次提交
  2. 22 11月, 2011 4 次提交
  3. 18 11月, 2011 1 次提交
    • J
      mac80211: remove crypto special case for auth frames · a7f23f0a
      Johannes Berg 提交于
      The shared key authentication frame that needs to be
      encrypted (the third one in the shared key handshake)
      is directly encrypted in ieee80211_send_auth and the
      IEEE80211_TX_INTFL_DONT_ENCRYPT is set. All others
      are not encrypted, so the only way to get to this is
      erroneously on no-monitor AP side.
      
      Remove the special case for authentication frames to
      fix the AP shared key side when operating without
      cooked monitor interfaces -- with cooked monitor the
      IEEE80211_TX_INTFL_DONT_ENCRYPT also gets set, so we
      never get here -- an AP never encrypts auth frames.
      
      Without this patch, an AP operating in WEP mode with
      my no-monitor patches would erroneously encrypt all
      authentication frames, instead of none.
      Signed-off-by: NJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      a7f23f0a
  4. 12 11月, 2011 1 次提交
  5. 10 11月, 2011 1 次提交
  6. 09 11月, 2011 2 次提交
  7. 01 11月, 2011 1 次提交
  8. 15 10月, 2011 1 次提交
  9. 12 10月, 2011 6 次提交
  10. 04 10月, 2011 1 次提交
  11. 01 10月, 2011 8 次提交
  12. 15 9月, 2011 2 次提交
  13. 14 9月, 2011 2 次提交
  14. 23 8月, 2011 1 次提交
  15. 10 8月, 2011 1 次提交
  16. 14 7月, 2011 1 次提交
    • J
      mac80211: allow driver to disconnect after resume · 95acac61
      Johannes Berg 提交于
      In WoWLAN, devices may use crypto keys for TX/RX
      and could also implement GTK rekeying. If the
      driver isn't able to retrieve replay counters and
      similar information from the device upon resume,
      or if the device isn't responsive due to platform
      issues, it isn't safe to keep the connection up
      as GTK rekey messages from during the sleep time
      could be replayed against it.
      
      The only protection against that is disconnecting
      from the AP. Modifying mac80211 to do that while
      it is resuming would be very complex and invasive
      in the case that the driver requires a reconfig,
      so do it after it has resumed completely. In that
      case, however, packets might be replayed since it
      can then only happen after TX/RX are up again, so
      mark keys for interfaces that need to disconnect
      as "tainted" and drop all packets that are sent
      or received with those keys.
      Signed-off-by: NJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      95acac61
  17. 06 7月, 2011 1 次提交
  18. 07 6月, 2011 1 次提交
  19. 17 5月, 2011 1 次提交
    • J
      mac80211: sparse RCU annotations · 40b275b6
      Johannes Berg 提交于
      This adds sparse RCU annotations to most of
      mac80211, only the mesh code remains to be
      done.
      
      Due the the previous patches, the annotations
      are pretty simple. The only thing that this
      actually changes is removing the RCU usage of
      key->sta in debugfs since this pointer isn't
      actually an RCU-managed pointer (it only has
      a single assignment done before the key even
      goes live). As that is otherwise harmless, I
      decided to make it part of this patch.
      Signed-off-by: NJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: NJohn W. Linville <linville@tuxdriver.com>
      40b275b6