Return-path: Received: from mail-ob0-f174.google.com ([209.85.214.174]:46889 "EHLO mail-ob0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751388Ab2IKGrA (ORCPT ); Tue, 11 Sep 2012 02:47:00 -0400 Received: by obbuo13 with SMTP id uo13so240417obb.19 for ; Mon, 10 Sep 2012 23:47:00 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: References: <1346146446-628-1-git-send-email-yeohchunyeow@gmail.com> <1346746298.3737.0.camel@jlt4.sipsolutions.net> <20120904102204.GA2541@w1.fi> <1346758521.3737.28.camel@jlt4.sipsolutions.net> <20120905071653.GB3629@w1.fi> <20120905080336.GA4747@w1.fi> <87zk4y3tsz.fsf@purkki.adurom.net> Date: Tue, 11 Sep 2012 09:46:59 +0300 Message-ID: (sfid-20120911_084705_665704_89F6403B) Subject: Re: [PATCH] ath5k: add support of HW encryption in management frames From: Nick Kossifidis To: Yeoh Chun-Yeow Cc: Kalle Valo , Adrian Chadd , Jouni Malinen , Johannes Berg , linux-wireless@vger.kernel.org, jirislaby@gmail.com, mcgrof@qca.qualcomm.com, ath5k-devel@venema.h4ckr.net Content-Type: text/plain; charset=UTF-8 Sender: linux-wireless-owner@vger.kernel.org List-ID: 2012/9/10 Yeoh Chun-Yeow : > Hi, all > > For your information, my submitted patch has allowed me to do the > following and mainly to setup the secured mesh 802.11s using authsae: > > 1. Key installations for the following: > /* key to protect integrity of multicast mgmt frames tx*/ > install_key(nlcfg, NULL, CIPHER_AES_CMAC, NL80211_KEYTYPE_GROUP, 4, mgtk_tx); > /* key to encrypt multicast data traffic */ > install_key(nlcfg, NULL, CIPHER_CCMP, NL80211_KEYTYPE_GROUP, 0, mgtk_tx); > /* key to encrypt/decrypt unicast data AND mgmt traffic to/from this peer */ > install_key(&nlcfg, peer, CIPHER_CCMP, NL80211_KEYTYPE_PAIRWISE, 0, mtk); > /* key to decrypt multicast data traffic from this peer */ > install_key(&nlcfg, peer, CIPHER_CCMP, NL80211_KEYTYPE_GROUP, 0, peer_mgtk); > /* to check integrity of multicast mgmt frames from this peer */ > install_key(&nlcfg, peer, CIPHER_AES_CMAC, NL80211_KEYTYPE_GROUP, 4, peer_mgtk); > > 2. By using the submitted patch, how ever as Jouni has pointed out > that testing with ath5k implementation alone may not be correct, due > to the following statement: > If the CCMP processing is done incorrectly, they could both mangle the > results in the same way to hide the issue. > > thus I revert back by not disabling the IEEE80211_KEY_FLAG_SW_MGMT. > However, with this, it has showed that robust unicast management frame > is encrypted in SW but is decrypted wrongly in SW (perhaps HW decrypt > it due to the HW accl enabling for unicast data frame). > > Hope this help. > > Thanks. > > Regards, > Chun-Yeow > > On Mon, Sep 10, 2012 at 9:13 PM, Kalle Valo wrote: >> Adrian Chadd writes: >> >>> Yeoh - can you please email me privately with a summary of what you >>> implemented, what you've tested and what worked / what didn't work? >> >> Why privately? Better to have all the information public, you never know >> if someone finds the info from the web and picks up the work. >> >> -- >> Kalle Valo Have you tried disabing RX or TX only encryption/decryption on hw trough PCU DIAG register ? -- GPG ID: 0xEE878588 As you read this post global entropy rises. Have Fun ;-) Nick