Return-path: Received: from mail-ob0-f174.google.com ([209.85.214.174]:39036 "EHLO mail-ob0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752416Ab2IJPLJ (ORCPT ); Mon, 10 Sep 2012 11:11:09 -0400 Received: by obbuo13 with SMTP id uo13so3075363obb.19 for ; Mon, 10 Sep 2012 08:11:08 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: <87zk4y3tsz.fsf@purkki.adurom.net> References: <1346146446-628-1-git-send-email-yeohchunyeow@gmail.com> <1346746298.3737.0.camel@jlt4.sipsolutions.net> <20120904102204.GA2541@w1.fi> <1346758521.3737.28.camel@jlt4.sipsolutions.net> <20120905071653.GB3629@w1.fi> <20120905080336.GA4747@w1.fi> <87zk4y3tsz.fsf@purkki.adurom.net> Date: Mon, 10 Sep 2012 23:11:08 +0800 Message-ID: (sfid-20120910_171114_101616_AC211A0A) Subject: Re: [PATCH] ath5k: add support of HW encryption in management frames From: Yeoh Chun-Yeow To: Kalle Valo Cc: Adrian Chadd , Jouni Malinen , Johannes Berg , linux-wireless@vger.kernel.org, jirislaby@gmail.com, mickflemm@gmail.com, mcgrof@qca.qualcomm.com, ath5k-devel@venema.h4ckr.net Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-wireless-owner@vger.kernel.org List-ID: Hi, all For your information, my submitted patch has allowed me to do the following and mainly to setup the secured mesh 802.11s using authsae: 1. Key installations for the following: /* key to protect integrity of multicast mgmt frames tx*/ install_key(nlcfg, NULL, CIPHER_AES_CMAC, NL80211_KEYTYPE_GROUP, 4, mgtk_tx); /* key to encrypt multicast data traffic */ install_key(nlcfg, NULL, CIPHER_CCMP, NL80211_KEYTYPE_GROUP, 0, mgtk_tx); /* key to encrypt/decrypt unicast data AND mgmt traffic to/from this peer */ install_key(&nlcfg, peer, CIPHER_CCMP, NL80211_KEYTYPE_PAIRWISE, 0, mtk); /* key to decrypt multicast data traffic from this peer */ install_key(&nlcfg, peer, CIPHER_CCMP, NL80211_KEYTYPE_GROUP, 0, peer_mgtk); /* to check integrity of multicast mgmt frames from this peer */ install_key(&nlcfg, peer, CIPHER_AES_CMAC, NL80211_KEYTYPE_GROUP, 4, peer_mgtk); 2. By using the submitted patch, how ever as Jouni has pointed out that testing with ath5k implementation alone may not be correct, due to the following statement: If the CCMP processing is done incorrectly, they could both mangle the results in the same way to hide the issue. thus I revert back by not disabling the IEEE80211_KEY_FLAG_SW_MGMT. However, with this, it has showed that robust unicast management frame is encrypted in SW but is decrypted wrongly in SW (perhaps HW decrypt it due to the HW accl enabling for unicast data frame). Hope this help. Thanks. Regards, Chun-Yeow On Mon, Sep 10, 2012 at 9:13 PM, Kalle Valo wrote: > Adrian Chadd writes: > >> Yeoh - can you please email me privately with a summary of what you >> implemented, what you've tested and what worked / what didn't work? > > Why privately? Better to have all the information public, you never know > if someone finds the info from the web and picks up the work. > > -- > Kalle Valo