On Mon, Dec 22, 2008 at 12:19:45PM +0530, Johannes Berg wrote: > > + case IW_AUTH_CIPHER_PAIRWISE: > > + if (sdata->vif.type == NL80211_IFTYPE_STATION) { > > + if (data->value & (IW_AUTH_CIPHER_WEP40 | > > + IW_AUTH_CIPHER_WEP104 | IW_AUTH_CIPHER_TKIP)) > > + sdata->u.sta.flags |= > > + IEEE80211_STA_TKIP_WEP_USED; > > + else > > + sdata->u.sta.flags &= > > + ~IEEE80211_STA_TKIP_WEP_USED; > > + } > > + break; > > I still think you might need to put something into cfg.c. I could not find a hook in cfg.c which is meant for configuring negotiated pairwise cipher into driver. You mean add_key() ?, which configures the key after the association. > Can't we check the key algorithm for the pairwise key associated > with the AP's sta_info directly in _send_assoc? In that case, I might need to introduce one more entry in enum ieee80211_key_alg called ALG_NONE. When we have a new entry in enum, we might end up handling that in all the case statements wherever this enum is used (quite a few places in mac80211 and almost all the drivers) to mute compilation warnings. Vasanth -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html