> - The cfg80211 notification functions like cfg80211_connect_result > are not called in this series. Does the driver need to keep track of > each call and make sure it calls the right notifer? Right now orinoco > arbitrarily sends SIOCGIWAP, IWEVASSOCRESPIE and IWEVASSOCREQIE on > ?authorisation? Also not sure how this will tie in with > cfg80211_send_rx_auth/assoc. You don't have to worry about send_rx_auth/assoc -- those are for drivers like mac80211 that leave the SME up to cfg80211 or userspace. All you need to implement is a call to cfg80211_connect_result() and possibly cfg80211_roamed() when the card can roam itself if no BSSID is set. Those take the assoc request/response IEs too. You don't need to call wireless_send_event at all :) > - In station mode, is the connect crypto struct fully filled in > regardless of WEP/WPA? I'd like to set priv->encode_alg at this stage, > and then only accept keys of that type via add_key. Unfortunately > join_ibss doesn't have similar info. Yes, it should be filled in. I'm uncertain whether iw does it correctly for WEP right now, if not I can fix that. For IBSS, nl80211 can actually pass that info, but doesn't right now, it probably should do that though. > - In adhoc mode, how do you set open/shared WEP? i.e. how does orinoco > know to set priv->wep_restrict? What's priv->wep_restrict? open/shared in ad-hoc seems very strange since you have no authentication frames? > - Digging around cfg80211, it looks like set_default_key isn't called > when authentication is TKIP. How does the driver tell which key to use > for transmit? Are we supposed to assume the group key is the transmit > key? The pairwise key, of course. But you knew that, so I think I just don't understand the question. > - TKIP pairwise keys. I think orinoco has always ignored them. The Agere > driver installed pairwaise keys to index 0. Should I attempt anything? I don't think it can have ignored them for proper operation? When you're doing WPA, you can only receive with the group key, and transmit with the pairwise key negotiated with the AP. > - TKIP and ad-hoc. err... I plan on leaving this alone. :) So far I've only really supported WEP with IBSS in all this. I'm happy to work with somebody to add support for more, but I have to admit that I'm not particularly interested myself. johannes
Attachment:
signature.asc
Description: This is a digitally signed message part