On Mon, 2008-12-22 at 13:40 +0530, Vasanthakumar Thiagarajan wrote: > On Mon, Dec 22, 2008 at 12:19:45PM +0530, Johannes Berg wrote: > > > + case IW_AUTH_CIPHER_PAIRWISE: > > > + if (sdata->vif.type == NL80211_IFTYPE_STATION) { > > > + if (data->value & (IW_AUTH_CIPHER_WEP40 | > > > + IW_AUTH_CIPHER_WEP104 | IW_AUTH_CIPHER_TKIP)) > > > + sdata->u.sta.flags |= > > > + IEEE80211_STA_TKIP_WEP_USED; > > > + else > > > + sdata->u.sta.flags &= > > > + ~IEEE80211_STA_TKIP_WEP_USED; > > > + } > > > + break; > > > > Can't we check > > the key algorithm for the pairwise key associated with the AP's sta_info > > directly in _send_assoc? > > AP's sta_info will not have the negotiated pirwise cipher before association. Ok. I guess this patch is the way to go then, and we'll figure out how to make it work with nl80211/cfg80211 when we actually push all the key operations there. johannes
Attachment:
signature.asc
Description: This is a digitally signed message part