On Sunday 19 November 2006 00:53, Johannes Berg wrote: > There's no point in trying to tell a driver globally whether sw or hw > crypto is used, if it's sw then we just don't give it keys... > > Besides, these weren't ever used! > Remove IEEE80211_CONF_SW_DECRYPT and IEEE80211_CONF_SW_ENCRYPT. > > Signed-off-by: Johannes Berg <[EMAIL PROTECTED]>
Acked-by: Michael Buesch <[EMAIL PROTECTED]> These two conf options are really useless. So yes, please remove them. > --- > Some more absolutely useless code in d80211.... > > Patch applies after the other ones, it's now number 13 in my series. > > include/net/d80211.h | 6 ++---- > net/d80211/ieee80211.c | 9 +++------ > net/d80211/ieee80211_ioctl.c | 4 +--- > net/d80211/wpa.c | 27 +++++++-------------------- > 4 files changed, 13 insertions(+), 33 deletions(-) > > --- wireless-dev.orig/include/net/d80211.h 2006-11-19 00:41:30.489520302 > +0100 > +++ wireless-dev/include/net/d80211.h 2006-11-19 00:41:46.509520302 +0100 > @@ -244,11 +244,9 @@ struct ieee80211_conf { > > int beacon_int; > > -#define IEEE80211_CONF_SW_ENCRYPT (1<<0) > -#define IEEE80211_CONF_SW_DECRYPT (1<<1) > -#define IEEE80211_CONF_SHORT_SLOT_TIME (1<<2) /* use IEEE 802.11g > Short Slot > +#define IEEE80211_CONF_SHORT_SLOT_TIME (1<<0) /* use IEEE 802.11g > Short Slot > * Time */ > -#define IEEE80211_CONF_SSID_HIDDEN (1<<3) /* do not broadcast the ssid */ > +#define IEEE80211_CONF_SSID_HIDDEN (1<<1) /* do not broadcast the ssid */ > u32 flags; /* configuration flags defined above */ > > u8 power_level; /* transmit power limit for > current > --- wireless-dev.orig/net/d80211/ieee80211.c 2006-11-19 00:12:10.719520302 > +0100 > +++ wireless-dev/net/d80211/ieee80211.c 2006-11-19 00:43:28.799520302 > +0100 > @@ -516,8 +516,7 @@ ieee80211_tx_h_fragment(struct ieee80211 > > static int wep_encrypt_skb(struct ieee80211_txrx_data *tx, struct sk_buff > *skb) > { > - if (tx->key->force_sw_encrypt || > - (tx->local->wiphy.conf.flags & IEEE80211_CONF_SW_ENCRYPT)) { > + if (tx->key->force_sw_encrypt) { > if (ieee80211_wep_encrypt(tx->local, skb, tx->key)) > return -1; > } else { > @@ -3268,8 +3267,7 @@ ieee80211_rx_h_wep_weak_iv_detection(str > > /* Check for weak IVs, if hwaccel did not remove IV from the frame */ > if ((rx->local->wiphy.flags & IEEE80211_HW_WEP_INCLUDE_IV) || > - rx->key->force_sw_encrypt || > - (rx->local->wiphy.conf.flags & IEEE80211_CONF_SW_ENCRYPT)) { > + rx->key->force_sw_encrypt) { > u8 *iv = ieee80211_wep_is_weak_iv(rx->skb, rx->key); > if (iv) { > rx->sta->wep_weak_iv_count++; > @@ -3301,8 +3299,7 @@ ieee80211_rx_h_wep_decrypt(struct ieee80 > } > > if (!(rx->u.rx.status->flag & RX_FLAG_DECRYPTED) || > - rx->key->force_sw_encrypt || > - (rx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT)) { > + rx->key->force_sw_encrypt) { > if (ieee80211_wep_decrypt(rx->local, rx->skb, rx->key)) { > printk(KERN_DEBUG "%s: RX WEP frame, decrypt " > "failed\n", rx->dev->name); > --- wireless-dev.orig/net/d80211/ieee80211_ioctl.c 2006-11-19 > 00:12:11.339520302 +0100 > +++ wireless-dev/net/d80211/ieee80211_ioctl.c 2006-11-19 00:42:58.779520302 > +0100 > @@ -492,9 +492,7 @@ int ieee80211_set_hw_encryption(struct n > key->force_sw_encrypt = 1; > > if (key && local->ops->set_key && > - (!(local->wiphy.conf.flags & IEEE80211_CONF_SW_ENCRYPT) || > - !(local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT)) && > - (keyconf = ieee80211_key_data2conf(local, key)) != NULL) { > + (keyconf = ieee80211_key_data2conf(local, key))) { > if (local->ops->set_key(local_to_wiphy(local), SET_KEY, addr, > keyconf, sta ? sta->aid : 0)) { > rc = HOSTAP_CRYPT_ERR_KEY_SET_FAILED; > --- wireless-dev.orig/net/d80211/wpa.c 2006-11-19 00:12:13.019520302 > +0100 > +++ wireless-dev/net/d80211/wpa.c 2006-11-19 00:45:16.999520302 +0100 > @@ -104,7 +104,6 @@ ieee80211_tx_h_michael_mic_add(struct ie > #endif /* CONFIG_HOSTAPD_WPA_TESTING */ > > if (!tx->key->force_sw_encrypt && > - !(tx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT) && > !tx->fragmented && > !(tx->local->wiphy.flags & IEEE80211_HW_TKIP_INCLUDE_MMIC) && > !wpa_test) { > @@ -186,8 +185,7 @@ ieee80211_rx_h_michael_mic_verify(struct > #endif /* CONFIG_HOSTAPD_WPA_TESTING */ > > if ((rx->u.rx.status->flag & RX_FLAG_DECRYPTED) && > - !rx->key->force_sw_encrypt && > - !(rx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT)) { > + !rx->key->force_sw_encrypt) { > if (rx->local->wiphy.flags & IEEE80211_HW_WEP_INCLUDE_IV) { > if (skb->len < MICHAEL_MIC_LEN) > return TXRX_DROP; > @@ -297,9 +295,7 @@ static int tkip_encrypt_skb(struct ieee8 > hdrlen = ieee80211_get_hdrlen(fc); > len = skb->len - hdrlen; > > - tailneed = (!tx->key->force_sw_encrypt && > - !(tx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT)) > - ? 0 : TKIP_ICV_LEN; > + tailneed = !tx->key->force_sw_encrypt ? 0 : TKIP_ICV_LEN; > if ((skb_headroom(skb) < TKIP_IV_LEN || > skb_tailroom(skb) < tailneed)) { > I802_DEBUG_INC(tx->local->tx_expand_skb_head); > @@ -331,8 +327,7 @@ iv_inc: > skip_iv_inc: > #endif /* CONFIG_HOSTAPD_WPA_TESTING */ > > - if (!tx->key->force_sw_encrypt && > - !(tx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT) > + if (!tx->key->force_sw_encrypt > #ifdef CONFIG_HOSTAPD_WPA_TESTING > && !tx->wpa_test > #endif /* CONFIG_HOSTAPD_WPA_TESTING */ > @@ -427,7 +422,6 @@ ieee80211_tx_h_tkip_encrypt(struct ieee8 > #endif /* CONFIG_HOSTAPD_WPA_TESTING */ > > if (!tx->key->force_sw_encrypt && > - !(tx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT) && > !(tx->local->wiphy.flags & IEEE80211_HW_WEP_INCLUDE_IV) && > !wpa_test) { > /* hwaccel - with no need for preallocated room for IV/ICV */ > @@ -506,8 +500,7 @@ ieee80211_rx_h_tkip_decrypt(struct ieee8 > #endif /* CONFIG_HOSTAPD_WPA_TESTING */ > > if ((rx->u.rx.status->flag & RX_FLAG_DECRYPTED) && > - !rx->key->force_sw_encrypt && > - !(rx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT)) { > + !rx->key->force_sw_encrypt) { > if (!(rx->local->wiphy.flags & IEEE80211_HW_WEP_INCLUDE_IV)) { > /* Hardware takes care of all processing, including > * replay protection, so no need to continue here. */ > @@ -651,9 +644,7 @@ static int ccmp_encrypt_skb(struct ieee8 > hdrlen = ieee80211_get_hdrlen(fc); > len = skb->len - hdrlen; > > - tailneed = (!key->force_sw_encrypt && > - !(tx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT)) > - ? 0 : CCMP_MIC_LEN; > + tailneed = !key->force_sw_encrypt ? 0 : CCMP_MIC_LEN; > > if ((skb_headroom(skb) < CCMP_HDR_LEN || > skb_tailroom(skb) < tailneed)) { > @@ -693,8 +684,7 @@ skip_pn_inc: > > ccmp_pn2hdr(pos, pn, key->keyidx); > > - if (!key->force_sw_encrypt && > - !(tx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT)) { > + if (!key->force_sw_encrypt) { > /* hwaccel - with preallocated room for CCMP header */ > tx->u.tx.control->key_idx = key->hw_key_idx; > return 0; > @@ -749,7 +739,6 @@ ieee80211_tx_h_ccmp_encrypt(struct ieee8 > ieee80211_tx_set_iswep(tx); > > if (!tx->key->force_sw_encrypt && > - !(tx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT) && > !(tx->local->wiphy.flags & IEEE80211_HW_WEP_INCLUDE_IV)) { > /* hwaccel - with no need for preallocated room for CCMP " > * header or MIC fields */ > @@ -802,7 +791,6 @@ ieee80211_rx_h_ccmp_decrypt(struct ieee8 > > if ((rx->u.rx.status->flag & RX_FLAG_DECRYPTED) && > !key->force_sw_encrypt && > - !(rx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT) && > !(rx->local->wiphy.flags & IEEE80211_HW_WEP_INCLUDE_IV)) > return TXRX_CONTINUE; > > @@ -823,8 +811,7 @@ ieee80211_rx_h_ccmp_decrypt(struct ieee8 > } > > if ((rx->u.rx.status->flag & RX_FLAG_DECRYPTED) && > - !key->force_sw_encrypt && > - !(rx->local->wiphy.conf.flags & IEEE80211_CONF_SW_DECRYPT)) { > + !key->force_sw_encrypt) { > /* hwaccel has already decrypted frame and verified MIC */ > } else { > u8 *scratch, *b_0, *aad; > > > -- Greetings Michael. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html