Return-path: Received: from sabertooth02.qualcomm.com ([65.197.215.38]:51640 "EHLO sabertooth02.qualcomm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753034AbbCLM7m (ORCPT ); Thu, 12 Mar 2015 08:59:42 -0400 From: Kalle Valo To: Bartosz Markowski CC: , Subject: Re: [PATCH v2] ath10k: fix PMG by using AES-CMAC/IGTK software crypto References: <1425994339-15864-1-git-send-email-bartosz.markowski@tieto.com> Date: Thu, 12 Mar 2015 14:59:32 +0200 In-Reply-To: <1425994339-15864-1-git-send-email-bartosz.markowski@tieto.com> (Bartosz Markowski's message of "Tue, 10 Mar 2015 14:32:19 +0100") Message-ID: <87lhj2v0az.fsf@kamboji.qca.qualcomm.com> (sfid-20150312_135945_475027_1D57A555) MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: linux-wireless-owner@vger.kernel.org List-ID: Bartosz Markowski writes: > While testing with older supplicant, .drv_set_key() was failing due to > higher than ath10k firmware could handle key_index (WMI_MAX_KEY_INDEX == 3). > > -- > wpa_driver_nl80211_set_key: ifindex=15 alg=4 addr=0x7f02b129fbe3 key_idx=4 set_tx=0 seq_len=6 key_len=16 > broadcast key > nl80211: set_key failed; err=-22 Invalid argument) > wlan0: WPA: Failed to configure IGTK to the driver > wlan0: RSN: Failed to configure IGTK > -- > > In order to fix this case (PMF: AES-CMAC/IGTK) force the AES_CMAC cipher to > be handled by software. > > Signed-off-by: Bartosz Markowski Thanks, applied. I just did s/PMG/PMF/. -- Kalle Valo