<feed xmlns='http://www.w3.org/2005/Atom'>
<title>lwn.git/net/mac80211/wep.c, branch v4.11-rc3</title>
<subtitle>Linux kernel documentation tree maintained by Jonathan Corbet</subtitle>
<id>http://mirrors.hust.edu.cn/git/lwn.git/atom?h=v4.11-rc3</id>
<link rel='self' href='http://mirrors.hust.edu.cn/git/lwn.git/atom?h=v4.11-rc3'/>
<link rel='alternate' type='text/html' href='http://mirrors.hust.edu.cn/git/lwn.git/'/>
<updated>2017-01-12T09:15:18+00:00</updated>
<entry>
<title>mac80211: Add RX flag to indicate ICV stripped</title>
<updated>2017-01-12T09:15:18+00:00</updated>
<author>
<name>David Spinadel</name>
<email>david.spinadel@intel.com</email>
</author>
<published>2016-11-21T14:58:40+00:00</published>
<link rel='alternate' type='text/html' href='http://mirrors.hust.edu.cn/git/lwn.git/commit/?id=cef0acd4d7d4811d2d19cd0195031bf0dfe41249'/>
<id>urn:sha1:cef0acd4d7d4811d2d19cd0195031bf0dfe41249</id>
<content type='text'>
Add a flag that indicates that the WEP ICV was stripped from an
RX packet, allowing the device to not transfer that if it's
already checked.

Signed-off-by: David Spinadel &lt;david.spinadel@intel.com&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: move WEP tailroom size check</title>
<updated>2015-05-11T12:51:29+00:00</updated>
<author>
<name>Janusz Dziedzic</name>
<email>janusz.dziedzic@tieto.com</email>
</author>
<published>2015-05-11T09:31:15+00:00</published>
<link rel='alternate' type='text/html' href='http://mirrors.hust.edu.cn/git/lwn.git/commit/?id=47b4e1fc4972cc43a19121bc2608a60aef3bf216'/>
<id>urn:sha1:47b4e1fc4972cc43a19121bc2608a60aef3bf216</id>
<content type='text'>
Remove checking tailroom when adding IV as it uses only
headroom, and move the check to the ICV generation that
actually needs the tailroom.

In other case I hit such warning and datapath don't work,
when testing:
- IBSS + WEP
- ath9k with hw crypt enabled
- IPv6 data (ping6)

WARNING: CPU: 3 PID: 13301 at net/mac80211/wep.c:102 ieee80211_wep_add_iv+0x129/0x190 [mac80211]()
[...]
Call Trace:
[&lt;ffffffff817bf491&gt;] dump_stack+0x45/0x57
[&lt;ffffffff8107746a&gt;] warn_slowpath_common+0x8a/0xc0
[&lt;ffffffff8107755a&gt;] warn_slowpath_null+0x1a/0x20
[&lt;ffffffffc09ae109&gt;] ieee80211_wep_add_iv+0x129/0x190 [mac80211]
[&lt;ffffffffc09ae7ab&gt;] ieee80211_crypto_wep_encrypt+0x6b/0xd0 [mac80211]
[&lt;ffffffffc09d3fb1&gt;] invoke_tx_handlers+0xc51/0xf30 [mac80211]
[...]

Cc: stable@vger.kernel.org
Signed-off-by: Janusz Dziedzic &lt;janusz.dziedzic@tieto.com&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: fix network header breakage during encryption</title>
<updated>2014-10-23T18:40:01+00:00</updated>
<author>
<name>Arik Nemtsov</name>
<email>arik@wizery.com</email>
</author>
<published>2014-10-22T09:33:45+00:00</published>
<link rel='alternate' type='text/html' href='http://mirrors.hust.edu.cn/git/lwn.git/commit/?id=452218d9fd22505ed790e95b460b0f40cebb95a0'/>
<id>urn:sha1:452218d9fd22505ed790e95b460b0f40cebb95a0</id>
<content type='text'>
When an IV is generated, only the MAC header is moved back. The network
header location remains the same relative to the skb head, as the new IV
is using headroom space that was reserved in advance.

Signed-off-by: Arik Nemtsov &lt;arikx.nemtsov@intel.com&gt;
Signed-off-by: Emmanuel Grumbach &lt;emmanuel.grumbach@intel.com&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: remove weak WEP IV accounting</title>
<updated>2014-06-23T09:05:31+00:00</updated>
<author>
<name>Johannes Berg</name>
<email>johannes.berg@intel.com</email>
</author>
<published>2014-06-04T15:06:23+00:00</published>
<link rel='alternate' type='text/html' href='http://mirrors.hust.edu.cn/git/lwn.git/commit/?id=ba9030c20a2def223d9b993cb3dfdd3aab3d2b31'/>
<id>urn:sha1:ba9030c20a2def223d9b993cb3dfdd3aab3d2b31</id>
<content type='text'>
Since WEP is practically dead, there seems very little
point in keeping WEP weak IV accounting.

Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>wireless: move crypto constants to ieee80211.h</title>
<updated>2013-05-16T20:39:41+00:00</updated>
<author>
<name>Johannes Berg</name>
<email>johannes.berg@intel.com</email>
</author>
<published>2013-05-08T11:09:08+00:00</published>
<link rel='alternate' type='text/html' href='http://mirrors.hust.edu.cn/git/lwn.git/commit/?id=4325f6caad98c075b39f0eaaac6693a0dd43f646'/>
<id>urn:sha1:4325f6caad98c075b39f0eaaac6693a0dd43f646</id>
<content type='text'>
mac80211 and the Intel drivers all define crypto
constants, move them to ieee80211.h instead.

Reviewed-by: Emmanuel Grumbach &lt;emmanuel.grumbach@intel.com&gt;
Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
</content>
</entry>
<entry>
<title>mac80211: fix network header location when adding encryption headers</title>
<updated>2012-05-16T16:47:43+00:00</updated>
<author>
<name>Arik Nemtsov</name>
<email>arik@wizery.com</email>
</author>
<published>2012-05-10T10:21:09+00:00</published>
<link rel='alternate' type='text/html' href='http://mirrors.hust.edu.cn/git/lwn.git/commit/?id=7863157d83763a0f1b9ad96c94a1ed3d0372526a'/>
<id>urn:sha1:7863157d83763a0f1b9ad96c94a1ed3d0372526a</id>
<content type='text'>
Update the location of the network header when adding encryption
specific headers to a skb. This allows low-level drivers to use the
(now correct) location of the network header.

Signed-off-by: Arik Nemtsov &lt;arik@wizery.com&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
</content>
</entry>
<entry>
<title>mac80211: Add IV-room in the skb for TKIP and WEP</title>
<updated>2012-05-16T16:46:37+00:00</updated>
<author>
<name>Janusz.Dziedzic@tieto.com</name>
<email>Janusz.Dziedzic@tieto.com</email>
</author>
<published>2012-05-09T05:11:20+00:00</published>
<link rel='alternate' type='text/html' href='http://mirrors.hust.edu.cn/git/lwn.git/commit/?id=ee70108fa2a7688dc67bfedaeb0c8c46a221effb'/>
<id>urn:sha1:ee70108fa2a7688dc67bfedaeb0c8c46a221effb</id>
<content type='text'>
Add IV-room in skb also for TKIP and WEP.
Extend patch: "mac80211: support adding IV-room in the skb for CCMP keys"

Signed-off-by: Janusz Dziedzic &lt;janusz.dziedzic@tieto.com&gt;
Acked-by: Johannes Berg &lt;johannes@sipsolutions.net&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
</content>
</entry>
<entry>
<title>mac80211: linearize SKBs as needed for crypto</title>
<updated>2012-03-13T18:54:17+00:00</updated>
<author>
<name>Johannes Berg</name>
<email>johannes.berg@intel.com</email>
</author>
<published>2012-03-12T12:49:14+00:00</published>
<link rel='alternate' type='text/html' href='http://mirrors.hust.edu.cn/git/lwn.git/commit/?id=a8286911881948c7a2ecc63ee4224c258cce2da3'/>
<id>urn:sha1:a8286911881948c7a2ecc63ee4224c258cce2da3</id>
<content type='text'>
Not linearizing every SKB will help actually pass
non-linear SKBs all the way up when on an encrypted
connection. For now, linearize TKIP completely as
it is lower performance and I don't quite grok all
the details.

Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
</content>
</entry>
<entry>
<title>mac80211: move RX WEP weak IV counting</title>
<updated>2012-03-13T18:54:16+00:00</updated>
<author>
<name>Johannes Berg</name>
<email>johannes.berg@intel.com</email>
</author>
<published>2012-03-12T12:49:13+00:00</published>
<link rel='alternate' type='text/html' href='http://mirrors.hust.edu.cn/git/lwn.git/commit/?id=617bbde878604adfcd557fc2a8952f77ab4ebd95'/>
<id>urn:sha1:617bbde878604adfcd557fc2a8952f77ab4ebd95</id>
<content type='text'>
This is better done inside the WEP decrypt
function where it doesn't have to check all
the conditions any more since they've been
tested already.

Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
</content>
</entry>
<entry>
<title>mac80211: use skb list for fragments</title>
<updated>2011-11-21T21:20:42+00:00</updated>
<author>
<name>Johannes Berg</name>
<email>johannes.berg@intel.com</email>
</author>
<published>2011-11-16T14:28:55+00:00</published>
<link rel='alternate' type='text/html' href='http://mirrors.hust.edu.cn/git/lwn.git/commit/?id=252b86c43225d067468dd182e9ae616ad2532bc8'/>
<id>urn:sha1:252b86c43225d067468dd182e9ae616ad2532bc8</id>
<content type='text'>
We are currently linking the skbs by using skb-&gt;next
directly. This works, but the preferred way is to use
a struct sk_buff_head instead. That also prepares for
passing that to drivers directly.

While at it I noticed we calculate the duration for
fragments twice -- remove one of them.

Signed-off-by: Johannes Berg &lt;johannes.berg@intel.com&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
</content>
</entry>
</feed>
