Search Linux Wireless

Re: [PATCH] [RFC v2] mac80211: Scale down to non-HT association with TKIP/WEP as pairwise cipher

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Dec 22, 2008 at 12:19:45PM +0530, Johannes Berg wrote:
> > +	case IW_AUTH_CIPHER_PAIRWISE:
> > +		if (sdata->vif.type == NL80211_IFTYPE_STATION) {
> > +			if (data->value & (IW_AUTH_CIPHER_WEP40 |
> > +			    IW_AUTH_CIPHER_WEP104 | IW_AUTH_CIPHER_TKIP))
> > +				sdata->u.sta.flags |=
> > +					IEEE80211_STA_TKIP_WEP_USED;
> > +			else
> > +				sdata->u.sta.flags &=
> > +					~IEEE80211_STA_TKIP_WEP_USED;
> > +		}
> > +		break;
> 
> I still think you might need to put something into cfg.c. 

I could not find a hook in cfg.c which is meant for configuring negotiated
pairwise cipher into driver. You mean add_key() ?, which configures
the key after the association.

> Can't we check the key algorithm for the pairwise key associated 
> with the AP's sta_info directly in _send_assoc?

In that case, I might need to introduce one more entry in
enum ieee80211_key_alg called ALG_NONE. When we have a new
entry in enum, we might end up handling that in all the case
statements wherever this enum is used (quite a few places in
mac80211 and almost all the drivers) to
mute compilation warnings.

Vasanth


--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Host AP]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Linux Kernel]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux