In D44920#1026551, @emaste wrote:Can we decouple userland use in ifconfig? i.e., have ifconfig support 384 bits now
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Yesterday
Yesterday
Wed, May 15
Wed, May 15
I'm sure I've seen FCSes in 802.11 bpf traces? Maybe that's happening at the 802.11 radiotap level?
Tue, May 14
Tue, May 14
adrian committed rGc7f5f140bfdd: net80211: add initial key management suites from 802.11-2016, APIs to register… (authored by adrian).
net80211: add initial key management suites from 802.11-2016, APIs to register…
adrian committed rGdcf6ab2f2e38: net80211: allow a single wlan crypto module to register for >1 cipher (authored by adrian).
net80211: allow a single wlan crypto module to register for >1 cipher
adrian committed rG98e8df90b5cc: net80211: add placeholder module names for the new ciphers (authored by adrian).
net80211: add placeholder module names for the new ciphers
adrian committed rG05540e62e75f: net80211: add the 802.11-2016 cipher list to the crypto array set. (authored by adrian).
net80211: add the 802.11-2016 cipher list to the crypto array set.
Mon, May 13
Mon, May 13
oh, interesting! does 11n work on this driver in openbsd? I see some 11n stuff is commented out here.
Sun, May 12
Sun, May 12
adrian updated the summary of D44919: net80211: add initial key management suites from 802.11-2016, APIs to register them.
adrian updated the diff for D44919: net80211: add initial key management suites from 802.11-2016, APIs to register them.
remove the VAP keymgmt flags for now; will reintroduce it and change the
ioctl API to use that instead when it's necessary.
adrian added inline comments to D44919: net80211: add initial key management suites from 802.11-2016, APIs to register them.
adrian added inline comments to D44899: net80211: add the 802.11-2016 cipher list to the crypto array set..
adrian updated the diff for D44899: net80211: add the 802.11-2016 cipher list to the crypto array set..
remove NONE, from bz@
Thu, May 9
Thu, May 9
net80211: add new ciphers and RSN flags
adrian committed rGe9961ea16496: net80211: add driver / crypto methods to set the hardware / software cipher… (authored by adrian).
net80211: add driver / crypto methods to set the hardware / software cipher…
adrian committed rG491938d7435f: wpa: Remove the now not-needed local logic to hard-code cipher support (authored by adrian).
wpa: Remove the now not-needed local logic to hard-code cipher support
adrian committed rG1116e8b95c60: net80211: add a new field specifically for announcing specific ciphers (authored by adrian).
net80211: add a new field specifically for announcing specific ciphers
Fri, May 3
Fri, May 3
OK, I rebuilt world and found where this breaks userland.
adrian added a comment to D44827: net80211: add driver / crypto methods to set the hardware / software cipher suites.
In D44827#1027553, @bz wrote:This still has changes not marked "done".
Is there a change in the stack which does change the drivers to use this?
adrian added a comment to D44820: net80211: add a new field specifically for announcing specific ciphers.
In D44820#1027551, @bz wrote:Can you please update the commit message? Apart from that it seems fine-ish with what cc@ said.
Wed, May 1
Wed, May 1
address comments from cc@
adrian updated the diff for D44827: net80211: add driver / crypto methods to set the hardware / software cipher suites.
address comments by cc@
Tue, Apr 30
Tue, Apr 30
In D44920#1026551, @emaste wrote:Can we decouple userland use in ifconfig? i.e., have ifconfig support 384 bits now
adrian added inline comments to D44820: net80211: add a new field specifically for announcing specific ciphers.
Mon, Apr 29
Mon, Apr 29
adrian added a comment to D44919: net80211: add initial key management suites from 802.11-2016, APIs to register them.
I just removed the hw caps for now, i'll chase that up later when this stuff has landed and we've had a chance to think about how to support full supplicant/mlme management (like VERY fullmac) NICs.
adrian updated the diff for D44820: net80211: add a new field specifically for announcing specific ciphers.
push update
adrian updated the diff for D44919: net80211: add initial key management suites from 802.11-2016, APIs to register them.
address comments
adrian updated the diff for D44964: net80211: add IEEE80211_IOC_DEVCAPS2, include versioned responses.
address comments
Sun, Apr 28
Sun, Apr 28
adrian removed a reviewer for D44919: net80211: add initial key management suites from 802.11-2016, APIs to register them: bz.
adrian added inline comments to D44901: net80211: allow a single wlan crypto module to register for >1 cipher.
update to compile w/ stack changes
adrian updated the diff for D44901: net80211: allow a single wlan crypto module to register for >1 cipher.
address comments
Sat, Apr 27
Sat, Apr 27
comments!
adrian added inline comments to D44827: net80211: add driver / crypto methods to set the hardware / software cipher suites.
adrian updated the diff for D44820: net80211: add a new field specifically for announcing specific ciphers.
address feedback
Fri, Apr 26
Fri, Apr 26
adrian added a reviewer for D44964: net80211: add IEEE80211_IOC_DEVCAPS2, include versioned responses: wireless.
update diff url
adrian updated the diff for D44964: net80211: add IEEE80211_IOC_DEVCAPS2, include versioned responses.
update diff url
adrian requested review of D44964: net80211: add IEEE80211_IOC_DEVCAPS2, include versioned responses.
Thu, Apr 25
Thu, Apr 25
lgtm, whats this addressing? Whats the system behaviour when the count limit is hit?
adrian added a reviewer for D44937: wlan: add some calls to ieee80211_set_driver_keymgmt_suites(): wireless.
update diff url
adrian added a comment to D44827: net80211: add driver / crypto methods to set the hardware / software cipher suites.
In D44827#1024357, @cc wrote:In D44827#1023217, @adrian wrote:In D44827#1023209, @bz wrote:In D44827#1023208, @adrian wrote:eg ath(4) would do something like:
How do you want to implement ath_settkipmic() "nicely" without exposing the field?
oops my bad. it'll be a flag for hardware encryption support! I fixed the code snippet.
I don't get it. Without exposing the field ic_cryptocaps? And where is the "fixed the code snippet"?
adrian added a comment to D44827: net80211: add driver / crypto methods to set the hardware / software cipher suites.
In D44827#1024561, @bz wrote:Are you going to change the few drivers which need change to get rid of the public exposure as well? Otherwise this is a dead code before added.
adrian updated the summary of D44820: net80211: add a new field specifically for announcing specific ciphers.
adrian updated the diff for D44820: net80211: add a new field specifically for announcing specific ciphers.
address comments from cc@
adrian added a reviewer for D44936: wlan: update drivers to use ieee80211_set_hardware_ciphers(): wireless.
update w/ diff url
Wed, Apr 24
Wed, Apr 24
add missing RSN parsing stuff for hostapd
Tue, Apr 23
Tue, Apr 23
diff url update
add diff url
diff url
adrian updated the diff for D44919: net80211: add initial key management suites from 802.11-2016, APIs to register them.
add differential link
Mon, Apr 22
Mon, Apr 22
adrian updated the diff for D44827: net80211: add driver / crypto methods to set the hardware / software cipher suites.
comment from emaste
adrian added a comment to D44827: net80211: add driver / crypto methods to set the hardware / software cipher suites.
In D44827#1023673, @emaste wrote:I find it a little confusing with the verb & noun use of set in set_software_cipher_set - do you think set_software_ciphers (or set_sw_ciphers) is reasonable?
adrian added a reviewer for D44901: net80211: allow a single wlan crypto module to register for >1 cipher: wireless.
adrian added a reviewer for D44900: net80211: add placeholder module names for the new ciphers: wireless.
adrian added a reviewer for D44899: net80211: add the 802.11-2016 cipher list to the crypto array set.: wireless.
adrian updated the diff for D44899: net80211: add the 802.11-2016 cipher list to the crypto array set..
oops, url update again
adrian updated the diff for D44901: net80211: allow a single wlan crypto module to register for >1 cipher.
url update
url update
adrian updated the diff for D44901: net80211: allow a single wlan crypto module to register for >1 cipher.
url update
adrian requested review of D44901: net80211: allow a single wlan crypto module to register for >1 cipher.
adrian requested review of D44899: net80211: add the 802.11-2016 cipher list to the crypto array set..
Sat, Apr 20
Sat, Apr 20
adrian added a project to D44821: wpa: Remove the now not-needed local logic to hard-code cipher support: wireless.
adrian added a project to D44820: net80211: add a new field specifically for announcing specific ciphers: wireless.
adrian updated the diff for D44827: net80211: add driver / crypto methods to set the hardware / software cipher suites.
comments from bz
adrian added a comment to D44827: net80211: add driver / crypto methods to set the hardware / software cipher suites.
In D44827#1023209, @bz wrote:In D44827#1023208, @adrian wrote:eg ath(4) would do something like:
How do you want to implement ath_settkipmic() "nicely" without exposing the field?
Fri, Apr 19
Fri, Apr 19
adrian added a comment to D44827: net80211: add driver / crypto methods to set the hardware / software cipher suites.
eg ath(4) would do something like:
adrian added a comment to D44827: net80211: add driver / crypto methods to set the hardware / software cipher suites.
In D44827#1023017, @bz wrote:Can we shorten hardware/software to hw/sw?
Why do we need wrappers from general code into crypto? Isn't one of them enough to set (and probably also clear[1]) a field in the (currently) ic?
updated after looking at wpa's definition of it in the 802.11 spec headers in it: