Return-path: Received: from fg-out-1718.google.com ([72.14.220.157]:53873 "EHLO fg-out-1718.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756929AbYEMIlT (ORCPT ); Tue, 13 May 2008 04:41:19 -0400 Received: by fg-out-1718.google.com with SMTP id 19so2077610fgg.17 for ; Tue, 13 May 2008 01:41:15 -0700 (PDT) Message-ID: <8704f27d0805130141s403167b8q49eecb645d0461c1@mail.gmail.com> (sfid-20080513_104122_128357_19A3FF3E) Date: Tue, 13 May 2008 11:41:15 +0300 From: "Emmanuel Grumbach" To: "Johannes Berg" Subject: Re: 11n + wpa_supplicant Cc: "Jouni Malinen" , "Linux Wireless" , "Tomas Winkler" In-Reply-To: <1210667328.3646.24.camel@johannes.berg> MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 References: <8704f27d0805130118p6f597743sebed5a2cdb6d59cb@mail.gmail.com> <1210667328.3646.24.camel@johannes.berg> Sender: linux-wireless-owner@vger.kernel.org List-ID: > > I would think that, indeed, it *is* its job since its job is > key/algorithm selection and 11n limits the choices. > depends on priorities, maybe the security selection should limit the 11n... IMHO, security should be in higher priority since the user explicitly said he wants TKIP > How about we simply put the 11n information element into the generic IE > and have mac80211 use that? > in mac80211 we perfectly know what the AP supports (in ieee80211_send_assoc, I can read the IEs from the AP) , that's no the issue here, the issue is what security alg the user will chose in the 4way. This decision affects the associate even though it occurs after the association > johannes > -- Emmanuel Grumbach egrumbach@gmail.com