aboutsummaryrefslogtreecommitdiffstats
path: root/net/mac80211/key.c
diff options
context:
space:
mode:
authorYogesh Ashok Powar <yogeshp@marvell.com>2011-04-27 09:10:29 -0400
committerJohn W. Linville <linville@tuxdriver.com>2011-04-28 14:53:21 -0400
commitaac6af5534fade2b18682a0b9efad1a6c04c34c6 (patch)
tree786840d7b3dc0ea942e91075ffe6f2cf5ba9d5d9 /net/mac80211/key.c
parente2186b7c25ef9cdb6d631c8dd6a672f41abe22d5 (diff)
mac80211: Skip tailroom reservation for full HW-crypto devices
In xmit path, devices that do full hardware crypto (including TKIP MMIC) need no tailroom. For such devices, tailroom reservation can be skipped if all the keys are programmed into the hardware (i.e software crypto is not used for any of the keys) and none of the keys wants software to generate Michael MIC. Signed-off-by: Yogesh Ashok Powar <yogeshp@marvell.com> Signed-off-by: John W. Linville <linville@tuxdriver.com>
Diffstat (limited to 'net/mac80211/key.c')
-rw-r--r--net/mac80211/key.c19
1 files changed, 17 insertions, 2 deletions
diff --git a/net/mac80211/key.c b/net/mac80211/key.c
index af3c56482c80..ca3c626b011a 100644
--- a/net/mac80211/key.c
+++ b/net/mac80211/key.c
@@ -101,6 +101,10 @@ static int ieee80211_key_enable_hw_accel(struct ieee80211_key *key)
101 101
102 if (!ret) { 102 if (!ret) {
103 key->flags |= KEY_FLAG_UPLOADED_TO_HARDWARE; 103 key->flags |= KEY_FLAG_UPLOADED_TO_HARDWARE;
104
105 if (!(key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_MMIC))
106 key->local->crypto_tx_tailroom_needed_cnt--;
107
104 return 0; 108 return 0;
105 } 109 }
106 110
@@ -156,6 +160,9 @@ static void ieee80211_key_disable_hw_accel(struct ieee80211_key *key)
156 key->conf.keyidx, sta ? sta->addr : bcast_addr, ret); 160 key->conf.keyidx, sta ? sta->addr : bcast_addr, ret);
157 161
158 key->flags &= ~KEY_FLAG_UPLOADED_TO_HARDWARE; 162 key->flags &= ~KEY_FLAG_UPLOADED_TO_HARDWARE;
163
164 if (!(key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_MMIC))
165 key->local->crypto_tx_tailroom_needed_cnt++;
159} 166}
160 167
161void ieee80211_key_removed(struct ieee80211_key_conf *key_conf) 168void ieee80211_key_removed(struct ieee80211_key_conf *key_conf)
@@ -388,8 +395,10 @@ static void __ieee80211_key_destroy(struct ieee80211_key *key)
388 ieee80211_aes_key_free(key->u.ccmp.tfm); 395 ieee80211_aes_key_free(key->u.ccmp.tfm);
389 if (key->conf.cipher == WLAN_CIPHER_SUITE_AES_CMAC) 396 if (key->conf.cipher == WLAN_CIPHER_SUITE_AES_CMAC)
390 ieee80211_aes_cmac_key_free(key->u.aes_cmac.tfm); 397 ieee80211_aes_cmac_key_free(key->u.aes_cmac.tfm);
391 if (key->local) 398 if (key->local) {
392 ieee80211_debugfs_key_remove(key); 399 ieee80211_debugfs_key_remove(key);
400 key->local->crypto_tx_tailroom_needed_cnt--;
401 }
393 402
394 kfree(key); 403 kfree(key);
395} 404}
@@ -451,6 +460,8 @@ int ieee80211_key_link(struct ieee80211_key *key,
451 460
452 ieee80211_debugfs_key_add(key); 461 ieee80211_debugfs_key_add(key);
453 462
463 key->local->crypto_tx_tailroom_needed_cnt++;
464
454 ret = ieee80211_key_enable_hw_accel(key); 465 ret = ieee80211_key_enable_hw_accel(key);
455 466
456 mutex_unlock(&sdata->local->key_mtx); 467 mutex_unlock(&sdata->local->key_mtx);
@@ -492,8 +503,12 @@ void ieee80211_enable_keys(struct ieee80211_sub_if_data *sdata)
492 503
493 mutex_lock(&sdata->local->key_mtx); 504 mutex_lock(&sdata->local->key_mtx);
494 505
495 list_for_each_entry(key, &sdata->key_list, list) 506 sdata->local->crypto_tx_tailroom_needed_cnt = 0;
507
508 list_for_each_entry(key, &sdata->key_list, list) {
509 sdata->local->crypto_tx_tailroom_needed_cnt++;
496 ieee80211_key_enable_hw_accel(key); 510 ieee80211_key_enable_hw_accel(key);
511 }
497 512
498 mutex_unlock(&sdata->local->key_mtx); 513 mutex_unlock(&sdata->local->key_mtx);
499} 514}