* Prism54 wpa update @ 2004-06-29 19:21 Luis R. Rodriguez 2004-06-29 20:22 ` Jeff Garzik 2004-06-30 1:49 ` Jouni Malinen 0 siblings, 2 replies; 6+ messages in thread From: Luis R. Rodriguez @ 2004-06-29 19:21 UTC (permalink / raw) To: Netdev; +Cc: prism54-devel [-- Attachment #1.1: Type: text/plain, Size: 662 bytes --] I'll keep my latest wpa work/patch at the following URL: http://prism54.org/~mcgrof/prism54-wpa.diff I've nuked module params and am relying on private ioctls now since, * we already have a [s|g]et_wpa priv iotcl, and * in preperation for the WPA patch for Wireless Extensions. I'll work on wpa ie scans tonight and try to fix mgt for handling traps in extended mode. This is not related to wpa, but I also made the firmware load at probe time. I turned the radio off at probe after firmware load time too since the device is not technically up yet. Luis -- GnuPG Key fingerprint = 113F B290 C6D2 0251 4D84 A34A 6ADD 4937 E20A 525E [-- Attachment #1.2: Type: application/pgp-signature, Size: 189 bytes --] [-- Attachment #2: Type: text/plain, Size: 151 bytes --] _______________________________________________ Prism54-devel mailing list Prism54-devel@prism54.org http://prism54.org/mailman/listinfo/prism54-devel ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Prism54 wpa update 2004-06-29 19:21 Prism54 wpa update Luis R. Rodriguez @ 2004-06-29 20:22 ` Jeff Garzik 2004-06-30 14:01 ` Luis R. Rodriguez 2004-06-30 1:49 ` Jouni Malinen 1 sibling, 1 reply; 6+ messages in thread From: Jeff Garzik @ 2004-06-29 20:22 UTC (permalink / raw) To: Netdev, prism54-devel On Tue, Jun 29, 2004 at 03:21:01PM -0400, Luis R. Rodriguez wrote: > > I'll keep my latest wpa work/patch at the following URL: > > http://prism54.org/~mcgrof/prism54-wpa.diff > > I've nuked module params and am relying on private ioctls now since, > > * we already have a [s|g]et_wpa priv iotcl, and > * in preperation for the WPA patch for Wireless Extensions. > > I'll work on wpa ie scans tonight and try to fix mgt for > handling traps in extended mode. This is not related to wpa, but > I also made the firmware load at probe time. I turned the radio > off at probe after firmware load time too since the device is > not technically up yet. Patch seems sane, though I vaguely recall xchg() not being atomic on all platforms (such as i386?). Maybe I'm wrong, an expert should speak up :) I also worry that the following is a race, but I have not traced the code to verify or discount my guess: + u32 mlme, authen, dot1x, filter, wep; + + + if (islpci_get_state(priv) < PRV_STATE_INIT) + return 0; down_write(&priv->mib_sem); ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Prism54 wpa update 2004-06-29 20:22 ` Jeff Garzik @ 2004-06-30 14:01 ` Luis R. Rodriguez 0 siblings, 0 replies; 6+ messages in thread From: Luis R. Rodriguez @ 2004-06-30 14:01 UTC (permalink / raw) To: Jeff Garzik; +Cc: Netdev, prism54-devel On Tue, Jun 29, 2004 at 04:22:10PM -0400, Jeff Garzik wrote: > On Tue, Jun 29, 2004 at 03:21:01PM -0400, Luis R. Rodriguez wrote: > > > > I'll keep my latest wpa work/patch at the following URL: > > > > http://prism54.org/~mcgrof/prism54-wpa.diff > > > > I've nuked module params and am relying on private ioctls now since, > > > > * we already have a [s|g]et_wpa priv iotcl, and > > * in preperation for the WPA patch for Wireless Extensions. > > > > I'll work on wpa ie scans tonight and try to fix mgt for > > handling traps in extended mode. This is not related to wpa, but > > I also made the firmware load at probe time. I turned the radio > > off at probe after firmware load time too since the device is > > not technically up yet. > > Patch seems sane, though I vaguely recall xchg() not being atomic on all > platforms (such as i386?). Maybe I'm wrong, an expert should speak up :) Just in case -- please don't apply the patch yet, I put it up as for review and update as to where I am. > I also worry that the following is a race, but I have not traced the > code to verify or discount my guess: > > + u32 mlme, authen, dot1x, filter, wep; > + > + > + if (islpci_get_state(priv) < PRV_STATE_INIT) > + return 0; > > down_write(&priv->mib_sem); FWIW, the context that this is within is prism54_set_wpa, a private ioctl. Luis -- GnuPG Key fingerprint = 113F B290 C6D2 0251 4D84 A34A 6ADD 4937 E20A 525E ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Prism54 wpa update 2004-06-29 19:21 Prism54 wpa update Luis R. Rodriguez 2004-06-29 20:22 ` Jeff Garzik @ 2004-06-30 1:49 ` Jouni Malinen 2004-06-30 15:13 ` [Prism54-devel] " Luis R. Rodriguez 1 sibling, 1 reply; 6+ messages in thread From: Jouni Malinen @ 2004-06-30 1:49 UTC (permalink / raw) To: Luis R. Rodriguez; +Cc: Netdev, prism54-devel On Tue, Jun 29, 2004 at 03:21:01PM -0400, Luis R. Rodriguez wrote: > I'll keep my latest wpa work/patch at the following URL: > > http://prism54.org/~mcgrof/prism54-wpa.diff Hmm.. I do not understand the change you did for priv->wpa processing. There seems to be some kind of misunderstanding on what DOT11_AUTHENABLE and DOT11_OID_MLMEAUTOLEVEL is set to in various mode. I do not fully understand what you mean with TKIP vs 802.1x. TKIP is an encryption algorithm like WEP. IEEE 802.1X is authentication protocol which can be used with IEEE 802.1X EAPOL-Key frames to distribute WEP keys _or_ with WPA to generate keying material for WPA 4-Way Handshake that will generate the data encryption keys. DOT11_AUTHENABLE should be set to DOT11_AUTH_OS for WPA modes (i.e., not _SK or _BOTH like you had in some cases). DOT11_AUTH_SK can only be used with static WEP configuration (i.e., not with WPA or with IEEE 802.1X when using dynamic WEP key generation). DOT11_AUTH_BOTH is likewise only reasonable for static WEP configuration since it includes _SK as an option. DOT11OID_MLMEAUTOLEVEL seems to be required to be DOT11_MLME_EXTENDED for all cases where WPA IE is used. -- Jouni Malinen PGP id EFC895FA ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [Prism54-devel] Re: Prism54 wpa update 2004-06-30 1:49 ` Jouni Malinen @ 2004-06-30 15:13 ` Luis R. Rodriguez 2004-06-30 15:45 ` Jouni Malinen 0 siblings, 1 reply; 6+ messages in thread From: Luis R. Rodriguez @ 2004-06-30 15:13 UTC (permalink / raw) To: Jouni Malinen; +Cc: Luis R. Rodriguez, Netdev, prism54-devel On Tue, Jun 29, 2004 at 06:49:30PM -0700, Jouni Malinen wrote: > On Tue, Jun 29, 2004 at 03:21:01PM -0400, Luis R. Rodriguez wrote: > > > I'll keep my latest wpa work/patch at the following URL: > > > > http://prism54.org/~mcgrof/prism54-wpa.diff > > Hmm.. I do not understand the change you did for priv->wpa processing. > There seems to be some kind of misunderstanding on what DOT11_AUTHENABLE > and DOT11_OID_MLMEAUTOLEVEL is set to in various mode. First, thanks for the reply. In regards to MLME, that was just a big fat typo. > I do not fully > understand what you mean with TKIP vs 802.1x. TKIP is an encryption > algorithm like WEP. IEEE 802.1X is authentication protocol which can be > used with IEEE 802.1X EAPOL-Key frames to distribute WEP keys _or_ with > WPA to generate keying material for WPA 4-Way Handshake that will > generate the data encryption keys. Yes, sorry, what I was trying to distinguish was using WPA using either PSK or 802.1x for 4-way handshake. I did not know there were two 802.1x key mechanisms though, as you point out. Wherever I said just TKIP I meant over TKIP using a PSK. I believe the second mode of 802.1x can be used with this chipset, not sure of the first though (to distribute WEP keys). > DOT11_AUTHENABLE should be set to DOT11_AUTH_OS for WPA modes (i.e., not > _SK or _BOTH like you had in some cases). DOT11_AUTH_SK can only be used > with static WEP configuration (i.e., not with WPA or with IEEE 802.1X > when using dynamic WEP key generation). DOT11_AUTH_BOTH is likewise only > reasonable for static WEP configuration since it includes _SK as an > option. OS stands for Open System here. Are you sure of this? I'll ask around, just to confirm too. > DOT11OID_MLMEAUTOLEVEL seems to be required to be > DOT11_MLME_EXTENDED for all cases where WPA IE is used. Yes, this I am aware of this. I've regenerated my patch. This *is* what I meant. I think then we just need to clear up on what values should be set for AUTHENABLE. I assumed the filter settings should work as I noted but I am not yet sure obviously since I cannot test yet. Last note is just keep in my that the patch is not supposed to work, its more of work in progress, particularly turning the radio off involves more work than what I currently have there. That is what I spend last night working on. I'll try to finish that off first before I move on to trying to detect WPA IEs. Luis -- GnuPG Key fingerprint = 113F B290 C6D2 0251 4D84 A34A 6ADD 4937 E20A 525E ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [Prism54-devel] Re: Prism54 wpa update 2004-06-30 15:13 ` [Prism54-devel] " Luis R. Rodriguez @ 2004-06-30 15:45 ` Jouni Malinen 0 siblings, 0 replies; 6+ messages in thread From: Jouni Malinen @ 2004-06-30 15:45 UTC (permalink / raw) To: Luis R. Rodriguez, Netdev, prism54-devel On Wed, Jun 30, 2004 at 11:13:46AM -0400, Luis R. Rodriguez wrote: > > algorithm like WEP. IEEE 802.1X is authentication protocol which can be > > used with IEEE 802.1X EAPOL-Key frames to distribute WEP keys _or_ with > > WPA to generate keying material for WPA 4-Way Handshake that will > > generate the data encryption keys. > > Yes, sorry, what I was trying to distinguish was using WPA using either > PSK or 802.1x for 4-way handshake. I did not know there were two 802.1x key > mechanisms though, as you point out. Wherever I said just TKIP I meant over TKIP > using a PSK. I believe the second mode of 802.1x can be used with this > chipset, not sure of the first though (to distribute WEP keys). I kind of though so, too, but the configuration did not match this at all.. WPA-PSK and WPA-EAP(IEEE 802.1X/RADIUS) should use the same settings for IEEE 802.11 auth alg and MLME auto level. > > DOT11_AUTHENABLE should be set to DOT11_AUTH_OS for WPA modes (i.e., not > > _SK or _BOTH like you had in some cases). DOT11_AUTH_SK can only be used > > with static WEP configuration (i.e., not with WPA or with IEEE 802.1X > > when using dynamic WEP key generation). DOT11_AUTH_BOTH is likewise only > > reasonable for static WEP configuration since it includes _SK as an > > option. > > OS stands for Open System here. Are you sure of this? I'll ask around, just to > confirm too. Yes, I'm sure. See IEEE 802.11 standard for details. Open System auth alg is required for WPA. Shared keys auth alg uses WEP, so the only to use it is to have pre-shared WEP keys. I don't remember whether FullMAC version of PrismGT driver has a separate mode for WPA, but if not, this oid needs to be OS. It certainly cannot be SK. -- Jouni Malinen PGP id EFC895FA ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2004-06-30 15:45 UTC | newest] Thread overview: 6+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2004-06-29 19:21 Prism54 wpa update Luis R. Rodriguez 2004-06-29 20:22 ` Jeff Garzik 2004-06-30 14:01 ` Luis R. Rodriguez 2004-06-30 1:49 ` Jouni Malinen 2004-06-30 15:13 ` [Prism54-devel] " Luis R. Rodriguez 2004-06-30 15:45 ` Jouni Malinen
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).