===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/68.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -r1.32 -r1.33
--- www/68.html 2020/10/03 20:37:32 1.32
+++ www/68.html 2020/10/03 20:48:07 1.33
@@ -233,15 +233,17 @@
Added or improved wireless network drivers:
- Added support to urtwn(4) for TP-Link TL-WN822N-EU v5 (and v4).
-
- Added WPA2 (CCMP) crypto offload support to iwx(4).
-
- Fixed a fatal firmware error at run-time on iwx(4).
+
- Added WPA2 (CCMP) crypto offload support to iwm(4) and
+ iwx(4),
+ reducing CPU load during traffic bursts.
+
- Fixed causes of several fatal firmware errors on iwx(4) devices.
- Added bwfm(4) support for BCM4359 SDIO variants such as the AP6359SA module found on the RockPro64 WiFi module.
- Enabled critical temperature detection in iwx(4) firmware.
- Fixed mbuf leak in urtwn(4) with frames CCMP-encrypted by hardware.
- Added support for the D-Link DWA-121 rev B1 urtwn(4) device.
- Repaired athn(4) in client mode against WPA2 access points.
+
- Prevented a panic where athn(4) attempted to transmit old, unencryptable frames after switching to a new group key in hostap mode.
- Switched iwx(4) from -46 to -48 firmware.
-
- Fixed athn(4) use with WPA2 APs.
- Enabled background scanning on iwx(4) devices.
- Fixed gain calibration for some iwn(4) devices (5000 and up).
- Added support for AX201 devices to iwx(4).
@@ -270,12 +272,9 @@
- IEEE 802.11 wireless stack improvements and bugfixes:
- Fixed CCMP replay checks with 11n Rx aggregation and CCMP hardware offloading.
-
- Offloaded CCMP (WPA2) encryption and decryption to iwm(4) hardware, reducing CPU load during traffic bursts.
-
- Adjusted to complete group key renewal immediately if no station is associated when ieee80211_proto.c runs.
+
- In hostap mode, complete WPA group key renewals immediately if no station is associated.
- Improved processing of lost frames during 802.11 Rx aggregation.
- Allowed passage of unencrypted 802.11 frames during hardware decryption post-processing, fixing failure of some ral(4) devices to receive packets on encrypted networks.
-
- Prevented a fatal iwx(4) firmware error when the driver moves out of AUTH state.
-
- Prevented a panic where athn(4) attempted to transmit old, unencryptable frames after switching to a new group key in hostap mode.
- Prevented a use-after-free when a wireless device is detached.