On Tue, May 13, 2008 at 11:41:15AM +0300, Emmanuel Grumbach wrote: > in mac80211 we perfectly know what the AP supports (in > ieee80211_send_assoc, I can read the IEs from the AP) , that's no the > issue here, the issue is what security alg the user will chose in the > 4way. This decision affects the associate even though it occurs after > the association Unless you are talking about IBSS (which would not use association), "the user" (as in the non-AP STA/Supplicant) does not select pairwise cipher in 4-way handshake; this happens in (re)association request. Only the AP/Authenticator is able to propose another cipher suite in 4-way handshake if per-client security policy rejects use of whatever cipher was selected during association (and I've not heard of anyone having implemented this). -- Jouni Malinen PGP id EFC895FA -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html