From: Johannes Berg <johannes@sipsolutions.net>
To: Arend van Spriel <arend.vanspriel@broadcom.com>,
Luca Coelho <luca@coelho.fi>,
linux-wireless@vger.kernel.org, Jouni Malinen <j@w1.fi>
Cc: Avraham Stern <avraham.stern@intel.com>,
Luca Coelho <luciano.coelho@intel.com>
Subject: Re: [PATCH 5/9] cfg80211/nl80211: add authorized flag to roaming event
Date: Fri, 28 Apr 2017 23:02:35 +0200 [thread overview]
Message-ID: <1493413355.2431.19.camel@sipsolutions.net> (raw)
In-Reply-To: <30808bad-1f15-20bd-9bfe-0c10ab8555cd@broadcom.com> (sfid-20170426_120601_633858_AC9F0B99)
On Wed, 2017-04-26 at 12:05 +0200, Arend van Spriel wrote:
>
> > the mobility domain does not require new 802.1X authentication, but
> > roaming to another mobility domain does.
>
> Not sure about the terminology here. Is "mobility domain" the same
> as "ESS" which stands for extended service set as definced in
> 802.11 standard. If so, I would prefer use of that term here.
No. "Mobility domain" was defined in 802.11r, it's unrelated to ESS.
> > + * @authorized: true if the 802.1X authentication was done by the
> > driver or is
> > + * not needed (e.g., when Fast Transition protocol was
> > used), false
> > + * otherwise. Ignored for networks that don't use 802.1X
> > authentication.
>
> It is not ignored in this patch so it is expected user-space
> behavior you are describing, which is not really needed here in
> cfg80211 driver api.
Still kinda makes sense though to give that hint to the driver authors,
don't you think? Though it should be pretty clear ...
> > * well to remain backwards compatible.
> > * @NL80211_CMD_ROAM: request that the card roam (currently not
> > implemented),
>
> Do we want to keep this comment about the request scenario. Is it
> likely implemented soon/ever?
Heh, good question. Probably not, but it's kinda an unrelated cleanup,
no?
> > * sent as an event when the card/driver roamed by itself.
> > + * When used as an event, and the driver roamed in a
> > network that requires
> > + * 802.1X authentication,
> > %NL80211_ATTR_CONNECTION_AUTHORIZED should be set
> > + * if the 802.1X authentication was done by the driver or
> > if roaming was
> > + * done using Fast Transition protocol (in which case
> > 802.1X authentication
> > + * is not needed). If %NL80211_ATTR_CONNECTION_AUTHORIZED
> > is not set,
> > + * user space is responsible for the 802.1X authentication.
>
> Would you consider using NL80211_ATTR_PORT_AUTHORIZED instead
> referring to the 802.1X port entities.
I guess that makes sense, yeah.
johannes
next prev parent reply other threads:[~2017-04-28 21:02 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-04-26 7:58 [PATCH 0/9] cfg80211/mac80211 patches from our internal tree 2017-04-26 Luca Coelho
2017-04-26 7:58 ` [PATCH 1/9] ieee80211: add SUITE_B AKM selectors Luca Coelho
2017-04-26 7:58 ` [PATCH 2/9] mac80211: Add support for BSS max idle period element Luca Coelho
2017-04-28 9:26 ` Johannes Berg
2017-04-26 7:58 ` [PATCH 3/9] ieee80211: add FT-802.1X AKM suite selector Luca Coelho
2017-04-26 7:58 ` [PATCH 4/9] cfg80211: unify cfg80211_roamed() and cfg80211_roamed_bss() Luca Coelho
2017-04-26 8:54 ` Arend van Spriel
2017-04-28 9:25 ` Johannes Berg
2017-04-26 7:58 ` [PATCH 5/9] cfg80211/nl80211: add authorized flag to roaming event Luca Coelho
2017-04-26 10:05 ` Arend van Spriel
2017-04-26 18:44 ` Arend Van Spriel
2017-04-28 21:02 ` Johannes Berg [this message]
2017-05-01 9:40 ` Arend van Spriel
2017-05-02 6:59 ` Johannes Berg
2017-04-26 7:58 ` [PATCH 6/9] mac80211: don't parse encrypted management frames in ieee80211_frame_acked Luca Coelho
2017-04-26 7:58 ` [PATCH 7/9] ieee80211: fix kernel-doc parsing errors Luca Coelho
2017-04-26 7:58 ` [PATCH 8/9] mac80211: disentangle iflist_mtx and chanctx_mtx Luca Coelho
2017-04-26 7:58 ` [PATCH 9/9] mac80211: make multicast variable a bool in ieee80211_accept_frame() Luca Coelho
2017-04-26 8:08 ` [PATCH 0/9] cfg80211/mac80211 patches from our internal tree 2017-04-26 Johannes Berg
2017-04-26 8:11 ` Luca Coelho
2017-04-26 8:28 ` Johannes Berg
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1493413355.2431.19.camel@sipsolutions.net \
--to=johannes@sipsolutions.net \
--cc=arend.vanspriel@broadcom.com \
--cc=avraham.stern@intel.com \
--cc=j@w1.fi \
--cc=linux-wireless@vger.kernel.org \
--cc=luca@coelho.fi \
--cc=luciano.coelho@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).