On Mon, 15 Nov 2010 22:30:48 +0200, Jouni Malinen <j@xxxxx> wrote: > This (commit a2c1e3dad516618cb0fbfb1a62c36d0b0744573a) seems to cause > some changes that may not have been intended.. I'm not sure whether to > call them all regressions, but it does break my 802.11w test setup.. ;-) > > With this change in place, robust management frames injected on a cooked > monitor interface do not get protected by mac80211 in station mode > (i.e., PMF in use on wlan0 and PTK in place; use mon0 to inject a > frame) while they used to get protected before this change. Reverting > this on top of wireless-testing.git now gets the old behavior back, too. > I have not verified whether this applies to other uses of cooked monitor > (e.g., Data frames or AP mode where Shared Key auth actually expects > injected frame to get protected in normal, non-testing-only use case). > > Is this a bug? Or do I need to figure out another way of getting the > frames injected on a monitor interface encrypted by mac80211? It's a bug. I suspect we set up the sta pointer first, and then the sdata pointer (when injecting) where if we do it the other way around it should work fine. johannes -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html