On Fri, Aug 17, 2012 at 09:22:42AM +0800, Yeoh Chun-Yeow wrote:
> Hi, Thomas
> 
> I have also observed that the CIPHER_AES_CMAC is not supported by the
> ath5k and thus the key installation for multicast frame failed. We can
> enable this by triggering the flags IEEE80211_HW_MFP_CAPABLE in
> base.c. Then, everything works fine. But I am not too sure whether the
> ath5k hardware supports this.

Hi,

AFAICT it should be fine.  The stack will handle encrypt/hash and
decrypt/verify of management frames if IEEE80211_KEY_FLAG_SW_MGMT is
set, which ath5k already does.  If you wanted, you could verify that
protection is enabled by removing

    key->flags |= IEEE80211_KEY_FLAG_SW_MGMT;

in drivers/net/wireless/ath/ath5k/mac80211_ops.c and it should stop
working in hwcrypt mode (assuming your card supports hardware CCMP).

> Also there is only two transmission rates printed in rc_stat:

No idea there.

> P.S: ath5k is loaded with nohwcrypt=1

That would bypass the important bits, so it's worth a test without
the modparam.

-- 
Bob Copeland %% www.bobcopeland.com
_______________________________________________
Devel mailing list
[email protected]
http://lists.open80211s.org/cgi-bin/mailman/listinfo/devel

Reply via email to