1. 28 Nov, 2011 6 commits
  2. 21 Nov, 2011 4 commits
  3. 17 Nov, 2011 1 commit
    • Johannes Berg's avatar
      mac80211: remove crypto special case for auth frames · a7f23f0a
      Johannes Berg authored
      
      
      The shared key authentication frame that needs to be
      encrypted (the third one in the shared key handshake)
      is directly encrypted in ieee80211_send_auth and the
      IEEE80211_TX_INTFL_DONT_ENCRYPT is set. All others
      are not encrypted, so the only way to get to this is
      erroneously on no-monitor AP side.
      
      Remove the special case for authentication frames to
      fix the AP shared key side when operating without
      cooked monitor interfaces -- with cooked monitor the
      IEEE80211_TX_INTFL_DONT_ENCRYPT also gets set, so we
      never get here -- an AP never encrypts auth frames.
      
      Without this patch, an AP operating in WEP mode with
      my no-monitor patches would erroneously encrypt all
      authentication frames, instead of none.
      Signed-off-by: default avatarJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: default avatarJohn W. Linville <linville@tuxdriver.com>
      a7f23f0a
  4. 11 Nov, 2011 1 commit
  5. 09 Nov, 2011 1 commit
  6. 08 Nov, 2011 2 commits
  7. 31 Oct, 2011 1 commit
  8. 14 Oct, 2011 1 commit
  9. 11 Oct, 2011 6 commits
  10. 03 Oct, 2011 1 commit
  11. 30 Sep, 2011 8 commits
  12. 14 Sep, 2011 2 commits
  13. 13 Sep, 2011 2 commits
  14. 22 Aug, 2011 1 commit
  15. 09 Aug, 2011 1 commit
  16. 13 Jul, 2011 1 commit
    • Johannes Berg's avatar
      mac80211: allow driver to disconnect after resume · 95acac61
      Johannes Berg authored
      
      
      In WoWLAN, devices may use crypto keys for TX/RX
      and could also implement GTK rekeying. If the
      driver isn't able to retrieve replay counters and
      similar information from the device upon resume,
      or if the device isn't responsive due to platform
      issues, it isn't safe to keep the connection up
      as GTK rekey messages from during the sleep time
      could be replayed against it.
      
      The only protection against that is disconnecting
      from the AP. Modifying mac80211 to do that while
      it is resuming would be very complex and invasive
      in the case that the driver requires a reconfig,
      so do it after it has resumed completely. In that
      case, however, packets might be replayed since it
      can then only happen after TX/RX are up again, so
      mark keys for interfaces that need to disconnect
      as "tainted" and drop all packets that are sent
      or received with those keys.
      Signed-off-by: default avatarJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: default avatarJohn W. Linville <linville@tuxdriver.com>
      95acac61
  17. 05 Jul, 2011 1 commit