1. 26 Aug, 2011 1 commit
  2. 24 Aug, 2011 3 commits
  3. 22 Aug, 2011 1 commit
    • Thomas Pedersen's avatar
      mac80211: update mesh peering frame format · 8db09850
      Thomas Pedersen authored
      This patch updates the mesh peering frames to the format specified in
      the recently ratified 802.11s standard. Several changes took place to
      make this happen:
      	- Change RX path to handle new self-protected frames
      	- Add new Peering management IE
      	- Remove old Peer Link IE
      	- Remove old plink_action field in ieee80211_mgmt header
      These changes by themselves would either break peering, or work by
      coincidence, so squash them all into this patch.
      Signed-off-by: default avatarThomas Pedersen <thomas@cozybit.com>
      Signed-off-by: default avatarJohn W. Linville <linville@tuxdriver.com>
  4. 12 Aug, 2011 4 commits
  5. 11 Aug, 2011 2 commits
  6. 10 Aug, 2011 2 commits
  7. 09 Aug, 2011 2 commits
  8. 08 Aug, 2011 2 commits
  9. 01 Aug, 2011 1 commit
  10. 26 Jul, 2011 2 commits
    • Mihai Moldovan's avatar
      wireless: fix a typo in ignore_reg_update · 5bc91db8
      Mihai Moldovan authored
      Just a typo fix changing regulaotry to regulatory.
      Signed-off-by: default avatarMihai Moldovan <ionic@ionic.de>
      CC: John W. Linville <linville@tuxdriver.com>
      CC: Mohammed Shafi <shafi.wireless@gmail.com>
      Signed-off-by: default avatarJohn W. Linville <linville@tuxdriver.com>
    • Sven Neumann's avatar
      cfg80211: really ignore the regulatory request · a203c2aa
      Sven Neumann authored
      At the beginning of wiphy_update_regulatory() a check is performed
      whether the request is to be ignored. Then the request is sent to
      the driver nevertheless. This happens even if last_request points
      to NULL, leading to a crash in the driver:
       [<bf01d864>] (lbs_set_11d_domain_info+0x28/0x1e4 [libertas]) from [<c03b714c>] (wiphy_update_regulatory+0x4d0/0x4f4)
       [<c03b714c>] (wiphy_update_regulatory+0x4d0/0x4f4) from [<c03b4008>] (wiphy_register+0x354/0x420)
       [<c03b4008>] (wiphy_register+0x354/0x420) from [<bf01b17c>] (lbs_cfg_register+0x80/0x164 [libertas])
       [<bf01b17c>] (lbs_cfg_register+0x80/0x164 [libertas]) from [<bf020e64>] (lbs_start_card+0x20/0x88 [libertas])
       [<bf020e64>] (lbs_start_card+0x20/0x88 [libertas]) from [<bf02cbd8>] (if_sdio_probe+0x898/0x9c0 [libertas_sdio])
      Fix this by returning early. Also remove the out: label as it is
      not any longer needed.
      Signed-off-by: default avatarSven Neumann <s.neumann@raumfeld.com>
      Cc: linux-wireless@vger.kernel.org
      Cc: Johannes Berg <johannes@sipsolutions.net>
      Cc: Daniel Mack <daniel@zonque.org>
      Cc: stable@kernel.org
      Signed-off-by: default avatarJohn W. Linville <linville@tuxdriver.com>
  11. 20 Jul, 2011 2 commits
  12. 19 Jul, 2011 1 commit
  13. 15 Jul, 2011 3 commits
  14. 08 Jul, 2011 1 commit
  15. 06 Jul, 2011 1 commit
    • Johannes Berg's avatar
      cfg80211/nl80211: support GTK rekey offload · e5497d76
      Johannes Berg authored
      In certain circumstances, like WoWLAN scenarios,
      devices may implement (partial) GTK rekeying on
      the device to avoid waking up the host for it.
      In order to successfully go through GTK rekeying,
      the KEK, KCK and the replay counter are required.
      Add API to let the supplicant hand the parameters
      to the driver which may store it for future GTK
      rekey operations.
      Note that, of course, if GTK rekeying is done by
      the device, the EAP frame must not be passed up
      to userspace, instead a rekey event needs to be
      sent to let userspace update its replay counter.
      Signed-off-by: default avatarJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: default avatarJohn W. Linville <linville@tuxdriver.com>
  16. 05 Jul, 2011 2 commits
  17. 27 Jun, 2011 1 commit
  18. 22 Jun, 2011 1 commit
  19. 10 Jun, 2011 1 commit
  20. 07 Jun, 2011 1 commit
  21. 01 Jun, 2011 3 commits
  22. 26 May, 2011 1 commit
  23. 19 May, 2011 2 commits