Search Linux Wireless

Re: [PATCH] [RFC v2] mac80211: Scale down to non-HT association with TKIP/WEP as pairwise cipher

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2008-12-22 at 13:40 +0530, Vasanthakumar Thiagarajan wrote:
> On Mon, Dec 22, 2008 at 12:19:45PM +0530, Johannes Berg wrote:
> > > +	case IW_AUTH_CIPHER_PAIRWISE:
> > > +		if (sdata->vif.type == NL80211_IFTYPE_STATION) {
> > > +			if (data->value & (IW_AUTH_CIPHER_WEP40 |
> > > +			    IW_AUTH_CIPHER_WEP104 | IW_AUTH_CIPHER_TKIP))
> > > +				sdata->u.sta.flags |=
> > > +					IEEE80211_STA_TKIP_WEP_USED;
> > > +			else
> > > +				sdata->u.sta.flags &=
> > > +					~IEEE80211_STA_TKIP_WEP_USED;
> > > +		}
> > > +		break;
> > 
> > Can't we check
> > the key algorithm for the pairwise key associated with the AP's sta_info
> > directly in _send_assoc?
> 
> AP's sta_info will not have the negotiated pirwise cipher before association.

Ok. I guess this patch is the way to go then, and we'll figure out how
to make it work with nl80211/cfg80211 when we actually push all the key
operations there.

johannes

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Linux Host AP]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Linux Kernel]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux