On Thu, 2008-12-18 at 14:40 +0200, Jouni Malinen wrote: > mac80211 used to allow drivers to indicate that Michael MIC has already > been verified in received frames to allow the somewhat heavy operation > of validating this in software to be avoided. This disappeared as part > of hardware crypto flag rework (commit > 7848ba7d7a010ccb265617fc2bc053e2bdf06f48). The changes below propose a > bit different mechanism for achieving the same benefit for host CPU with > wlan designs that can verify Michael MIC for unfragmented frames in > hardware. > > I'm also including a patch to ath9k to start using this new mechanism > and move Michael MIC processing to hardware for both TX and RX whenever > possible. It seems to work based on minimal testing, but I do not want > to submit it to be merged before more thorough testing has taken place. > > > Some hardware acceleration designs for TKIP take care of Michael MIC > verification in received frames (well, at least for frames that were > not fragmented). Add an RX status flag to allow the expensive software > validation of the Michael MIC to be skipped in cases where it has > already been verified in hardware. > > Signed-off-by: Jouni Malinen <jouni.malinen@xxxxxxxxxxx> I probably thought you'd just strip it in that case, but this seems fine too. johannes
Attachment:
signature.asc
Description: This is a digitally signed message part