On Fri, Aug 17, 2012 at 09:22:42AM +0800, Yeoh Chun-Yeow wrote:
> Hi, Thomas
>
> I have also observed that the CIPHER_AES_CMAC is not supported by the
> ath5k and thus the key installation for multicast frame failed. We can
> enable this by triggering the flags IEEE80211_HW_MFP_CAPABLE in
> base.c. Then, everything works fine. But I am not too sure whether the
> ath5k hardware supports this.
Hi,
AFAICT it should be fine. The stack will handle encrypt/hash and
decrypt/verify of management frames if IEEE80211_KEY_FLAG_SW_MGMT is
set, which ath5k already does. If you wanted, you could verify that
protection is enabled by removing
key->flags |= IEEE80211_KEY_FLAG_SW_MGMT;
in drivers/net/wireless/ath/ath5k/mac80211_ops.c and it should stop
working in hwcrypt mode (assuming your card supports hardware CCMP).
> Also there is only two transmission rates printed in rc_stat:
No idea there.
> P.S: ath5k is loaded with nohwcrypt=1
That would bypass the important bits, so it's worth a test without
the modparam.
--
Bob Copeland %% www.bobcopeland.com
_______________________________________________
Devel mailing list
[email protected]
http://lists.open80211s.org/cgi-bin/mailman/listinfo/devel