1
0
mirror of https://git.FreeBSD.org/src.git synced 2024-12-13 10:02:38 +00:00

Add ieee80211_crypto_reload_keys to push all keys known

to net80211 back into the device; intended for use on resume
by devices that lose the contents of their h/w key table.
This commit is contained in:
Sam Leffler 2008-05-28 23:33:29 +00:00
parent 71fe06ca7f
commit 06b2d888f6
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=179396
2 changed files with 44 additions and 0 deletions

View File

@ -609,3 +609,46 @@ ieee80211_crypto_decap(struct ieee80211_node *ni, struct mbuf *m, int hdrlen)
#undef IEEE80211_WEP_MINLEN
#undef IEEE80211_WEP_HDRLEN
}
static void
load_ucastkey(void *arg, struct ieee80211_node *ni)
{
struct ieee80211vap *vap = ni->ni_vap;
struct ieee80211_key *k;
if (vap->iv_state != IEEE80211_S_RUN)
return;
k = &ni->ni_ucastkey;
if (k->wk_keyix != IEEE80211_KEYIX_NONE)
dev_key_set(vap, k);
}
/*
* Re-load all keys known to the 802.11 layer that may
* have hardware state backing them. This is used by
* drivers on resume to push keys down into the device.
*/
void
ieee80211_crypto_reload_keys(struct ieee80211com *ic)
{
struct ieee80211vap *vap;
int i;
/*
* Keys in the global key table of each vap.
*/
/* NB: used only during resume so don't lock for now */
TAILQ_FOREACH(vap, &ic->ic_vaps, iv_next) {
if (vap->iv_state != IEEE80211_S_RUN)
continue;
for (i = 0; i < IEEE80211_WEP_NKID; i++) {
const struct ieee80211_key *k = &vap->iv_nw_keys[i];
if (k->wk_keyix != IEEE80211_KEYIX_NONE)
dev_key_set(vap, k);
}
}
/*
* Unicast keys.
*/
ieee80211_iterate_nodes(&ic->ic_sta, load_ucastkey, NULL);
}

View File

@ -147,6 +147,7 @@ int ieee80211_crypto_delkey(struct ieee80211vap *,
struct ieee80211_key *);
int ieee80211_crypto_setkey(struct ieee80211vap *, struct ieee80211_key *);
void ieee80211_crypto_delglobalkeys(struct ieee80211vap *);
void ieee80211_crypto_reload_keys(struct ieee80211com *);
/*
* Template for a supported cipher. Ciphers register with the