netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Updated WE-18 (WPA) proposal
@ 2004-08-30  4:54 Jouni Malinen
  2004-08-30 16:50 ` Jean Tourrilhes
  2004-08-31  0:49 ` Pedro Ramalhais
  0 siblings, 2 replies; 13+ messages in thread
From: Jouni Malinen @ 2004-08-30  4:54 UTC (permalink / raw)
  To: Jean Tourrilhes; +Cc: netdev, hostap, Pedro Ramalhais

Finally, I had enough time to implement and test the proposed WE-18
(WPA) changes with Host AP driver and wpa_supplicant. This testing was
indeed needed since number of issues showed up. I have made an updated
version of the WE-18 proposal that seems to work with
hostap and wpa_supplicant (current development snapshot from
http://hostap/epitest.fi/). I have not yet verified how much of
interface needed for hostapd could be moved to these new parts of WE-18
instead of the currently used private ioctls.

Since WE-17 has apparently not yet been merged all the way into
linux-2.6 tree, the patch below is against Linux 2.6.8.1 that has been
patched with WE-17 patch (http://www.hpl.hp.com/personal/
Jean_Tourrilhes/Linux/iw268_we17-10.diff). This should be quite close
to what the final WE-18 would be diffed against. This WE-18 patch is
still experimental and it may still need to be changed (i.e., this
should not yet be merged into linux-2.6).

Change log against the latest WE-18 proposal (http://www.hpl.hp.com/
personal/Jean_Tourrilhes/Linux/iw_we18-3.diff):

- replaced optional parameter (iw_point) to SIOCSIWSCAN with a new ioctl
  (SIOCSIWSCANEXT) since the previous design was not really backwards
  compatible (e.g., 'iwlist wlan0 scan' did not work)
- replaced IWEVWPAIE/IWEVRSNIE with more generic IWEVGENIE which can
  also be used with non-WPA (e.g., IEEE 802.11e/WMM) IEs; in addition,
  fixed the type for this event to be IW_HEADER_TYPE_POINT (was _PARAM)
- use larger IW_GENERIC_IE_MAX (256->1024) to be able to handle possible
  needs for future IEEE 802.11 amendments
- added new IW_AUTH_INDEX parameters IW_AUTH_WPA_ENABLED and
  IW_AUTH_RX_UNENCRYPTED_EAPOL that were missing from the functionality
  needed by wpa_supplicant interface
- changed IW_AUTH_WPA_VERSION, IW_AUTH_PAIRWISE_CIPHER,
  IW_AUTH_GROUP_CIPHER, and IW_AUTH_KEY_MGMT to bit fields
- added LEAP to IW_AUTH_80211_AUTH_ALG values
- added IW_ENCODE_EXT_SET_TX_KEY (set key value and mark key as default
  TX key with one ioctl)
- added some more comments to areas that were unclear (have generated
  questions)
- added min_tokens values for SIOCSIWENCODEEXT and SIOCGIWENCODEEXT

Question: is length field in struct iw_point in bytes or tokens
(token_size bytes)? I assumed it was in bytes, but this did not work
very well with WE ioctls that had token_size != 1; I made SIOCSIWSCANEXT
use token_size = 1 for now, but it could be replaced to be
sizeof(struct) and min_tokens=max_tokesn=1 once this question is
resolved.



diff -upr 2.6.8.1-WE17/include/linux/wireless.h 2.6.8.1-WE18/include/linux/wireless.h
--- 2.6.8.1-WE17/include/linux/wireless.h	2004-08-29 21:23:32.277037256 -0700
+++ 2.6.8.1-WE18/include/linux/wireless.h	2004-08-29 19:25:33.000000000 -0700
@@ -1,7 +1,7 @@
 /*
  * This file define a set of standard wireless extensions
  *
- * Version :	17	21.6.04
+ * Version :	18	29.8.04
  *
  * Authors :	Jean Tourrilhes - HPL - <jt@hpl.hp.com>
  * Copyright (c) 1997-2004 Jean Tourrilhes, All Rights Reserved.
@@ -82,7 +82,7 @@
  * (there is some stuff that will be added in the future...)
  * I just plan to increment with each new version.
  */
-#define WIRELESS_EXT	17
+#define WIRELESS_EXT	18
 
 /*
  * Changes :
@@ -182,6 +182,19 @@
  *	- Document (struct iw_quality *)->updated, add new flags (INVALID)
  *	- Wireless Event capability in struct iw_range
  *	- Add support for relative TxPower (yick !)
+ *
+ * V17 to V18 (From Jouni Malinen <jkmaline@cc.hut.fi>)
+ * ----------
+ *	- Add support for WPA/WPA2
+ *	- Add extended encoding configuration (SIOCSIWENCODEEXT and
+ *	  SIOCGIWENCODEEXT)
+ *	- Add SIOCSIWGENIE/SIOCGIWGENIE
+ *	- Add SIOCSIWMLME
+ *	- Add struct iw_range bit field for supported encoding capabilities
+ *	- Add extended scan request (SIOCSIWSCANEXT)
+ *	- Add SIOCSIWAUTH/SIOCGIWAUTH for setting authentication and WPA
+ *	  related parameters (extensible up to 4096 parameter values)
+ *	- Add wireless events: IWEVGENIE, IWEVMICHAELMICFAILURE
  */
 
 /**************************** CONSTANTS ****************************/
@@ -256,6 +269,29 @@
 #define SIOCSIWPOWER	0x8B2C		/* set Power Management settings */
 #define SIOCGIWPOWER	0x8B2D		/* get Power Management settings */
 
+/* WPA : Generic IEEE 802.11 informatiom element (e.g., for WPA/RSN/WMM).
+ * This ioctl uses struct iw_point and data buffer that includes IE id and len
+ * fields. More than one IE may be included in the request. Setting the generic
+ * IE to empty buffer (len=0) removes the generic IE from the driver. */
+#define SIOCSIWGENIE	0x8B30		/* set generic IE */
+#define SIOCGIWGENIE	0x8B31		/* get generic IE */
+
+/* WPA : IEEE 802.11 MLME requests */
+#define SIOCSIWMLME	0x8B16		/* request MLME operation; uses
+					 * struct iw_mlme */
+/* WPA : Authentication mode parameters */
+#define SIOCSIWAUTH	0x8B32		/* set authentication mode params */
+#define SIOCGIWAUTH	0x8B33		/* get authentication mode params */
+
+/* WPA : Extended version of encoding configuration */
+#define SIOCSIWENCODEEXT 0x8B34		/* set encoding token & mode */
+#define SIOCGIWENCODEEXT 0x8B35		/* get encoding token & mode */
+
+/* Extended scan request; like SIOCSIWSCAN, but with additional parameters in
+ * struct iw_scan_req buffer. This shares SIOCGIWSCAN for reading the results.
+ */
+#define SIOCSIWSCANEXT	0x8B36		/* trigger scanning (extended) */
+
 /* -------------------- DEV PRIVATE IOCTL LIST -------------------- */
 
 /* These 32 ioctl are wireless device private, for 16 commands.
@@ -297,6 +333,15 @@
 #define IWEVCUSTOM	0x8C02		/* Driver specific ascii string */
 #define IWEVREGISTERED	0x8C03		/* Discovered a new node (AP mode) */
 #define IWEVEXPIRED	0x8C04		/* Expired a node (AP mode) */
+#define IWEVGENIE	0x8C05		/* Generic IE (WPA, RSN, WMM, ..)
+					 * (scan results); This includes id and
+					 * length fields. One IWEVGENIE may
+					 * contain more than one IE. Scan
+					 * results may contain one or more
+					 * IWEVGENIE events. */
+#define IWEVMICHAELMICFAILURE 0x8C06	/* Michael MIC failure
+					 * (struct iw_michaelmicfailure)
+					 */
 
 #define IWEVFIRST	0x8C00
 
@@ -432,12 +477,87 @@
 #define IW_SCAN_THIS_MODE	0x0020	/* Scan only this Mode */
 #define IW_SCAN_ALL_RATE	0x0040	/* Scan all Bit-Rates */
 #define IW_SCAN_THIS_RATE	0x0080	/* Scan only this Bit-Rate */
+/* struct iw_scan_req scan_type */
+#define IW_SCAN_TYPE_ACTIVE 0
+#define IW_SCAN_TYPE_PASSIVE 1
 /* Maximum size of returned data */
 #define IW_SCAN_MAX_DATA	4096	/* In bytes */
 
 /* Max number of char in custom event - use multiple of them if needed */
 #define IW_CUSTOM_MAX		256	/* In bytes */
 
+/* Generic information element */
+#define IW_GENERIC_IE_MAX	1024
+
+/* MLME requests (SIOCSIWMLME / struct iw_mlme) */
+#define IW_MLME_DEAUTH		0
+#define IW_MLME_DISASSOC	1
+
+/* SIOCSIWAUTH/SIOCGIWAUTH struct iw_param flags */
+#define IW_AUTH_INDEX		0x0FFF
+#define IW_AUTH_FLAGS		0xF000
+/* SIOCSIWAUTH/SIOCGIWAUTH parameters (0 .. 4095)
+ * (IW_AUTH_INDEX mask in struct iw_param flags; this is the index of the
+ * parameter that is being set/get to; value will be read/written to
+ * struct iw_param value field) */
+#define IW_AUTH_WPA_VERSION		0
+#define IW_AUTH_CIPHER_PAIRWISE		1
+#define IW_AUTH_CIPHER_GROUP		2
+#define IW_AUTH_KEY_MGMT		3
+#define IW_AUTH_TKIP_COUNTERMEASURES	4
+#define IW_AUTH_DROP_UNENCRYPTED	5
+#define IW_AUTH_80211_AUTH_ALG		6
+#define IW_AUTH_WPA_ENABLED		7
+#define IW_AUTH_RX_UNENCRYPTED_EAPOL	8
+
+/* IW_AUTH_WPA_VERSION values (bit field) */
+#define IW_AUTH_WPA_VERSION_DISABLED	0x00000001
+#define IW_AUTH_WPA_VERSION_WPA		0x00000002
+#define IW_AUTH_WPA_VERSION_WPA2	0x00000004
+
+/* IW_AUTH_PAIRWISE_CIPHER and IW_AUTH_GROUP_CIPHER values (bit field) */
+#define IW_AUTH_CIPHER_NONE	0x00000001
+#define IW_AUTH_CIPHER_WEP40	0x00000002
+#define IW_AUTH_CIPHER_TKIP	0x00000004
+#define IW_AUTH_CIPHER_CCMP	0x00000008
+#define IW_AUTH_CIPHER_WEP104	0x00000010
+
+/* IW_AUTH_KEY_MGMT values (bit field) */
+#define IW_AUTH_KEY_MGMT_802_1X	1
+#define IW_AUTH_KEY_MGMT_PSK	2
+
+/* IW_AUTH_80211_AUTH_ALG values (bit field) */
+#define IW_AUTH_ALG_OPEN_SYSTEM	0x00000001
+#define IW_AUTH_ALG_SHARED_KEY	0x00000002
+#define IW_AUTH_ALG_LEAP	0x00000004
+
+/* SIOCSIWENCODEEXT definitions */
+#define IW_ENCODE_SEQ_MAX_SIZE	8
+/* struct iw_encode_ext ->alg */
+#define IW_ENCODE_ALG_NONE	0
+#define IW_ENCODE_ALG_WEP	1
+#define IW_ENCODE_ALG_TKIP	2
+#define IW_ENCODE_ALG_CCMP	3
+/* struct iw_encode_ext ->ext_flags */
+#define IW_ENCODE_EXT_TX_SEQ_VALID	0x00000001
+#define IW_ENCODE_EXT_RX_SEQ_VALID	0x00000002
+#define IW_ENCODE_EXT_GROUP_KEY		0x00000004
+#define IW_ENCODE_EXT_SET_TX_KEY	0x00000008
+
+/* IWEVMICHAELMICFAILURE : struct iw_michaelmicfailure ->flags */
+#define IW_MICFAILURE_KEY_ID	0x00000003 /* Key ID 0..3 */
+#define IW_MICFAILURE_GROUP	0x00000004
+#define IW_MICFAILURE_PAIRWISE	0x00000008
+#define IW_MICFAILURE_STAKEY	0x00000010
+#define IW_MICFAILURE_COUNT	0x00000060 /* 1 or 2 (0 = count not supported)
+					    */
+
+/* Bit field values for enc_capa in struct iw_range */
+#define IW_ENC_CAPA_WPA		0x00000001
+#define IW_ENC_CAPA_WPA2	0x00000002
+#define IW_ENC_CAPA_CIPHER_TKIP	0x00000004
+#define IW_ENC_CAPA_CIPHER_CCMP	0x00000008
+
 /* Event capability macros - in (struct iw_range *)->event_capa
  * Because we have more than 32 possible events, we use an array of
  * 32 bit bitmasks. Note : 32 bits = 0x20 = 2^5. */
@@ -546,6 +666,86 @@ struct	iw_thrspy
 	struct iw_quality	high;		/* High threshold */
 };
 
+/*
+ *	Data for extended scan request (MLME-SCAN.request)
+ */
+struct	iw_scan_req
+{
+	__u8		mode;	/* IW_MODE_AUTO (= Both), IW_MODE_ADHOC, or
+				 * IW_MODE_INFRA */
+	__u8		scan_type; /* IW_SCAN_TYPE_{ACTIVE,PASSIVE} */
+	__u8		essid_len;
+	__u8		num_channels; /* num entries in channel_list;
+				       * 0 = scan all allowed channels */
+	struct sockaddr	bssid; /* ff:ff:ff:ff:ff:ff for broadcast BSSID or
+				* individual address of a specific BSS */
+	/* Use this ESSID if IW_SCAN_THIS_ESSID flag is used instead of using
+	 * the current ESSID. This allows scan requests for specific ESSID
+	 * without having to change the current ESSID and potentially breaking
+	 * the current association. */
+	__u8		essid[IW_ESSID_MAX_SIZE];
+	__u32		probe_delay; /* delay in usec prior to transmitting
+				      * ProbeReq */
+	__u32		min_channel_time; /* in TU, >= probe_delay */
+	__u32		max_channel_time; /* in TU, >= min_channel_time */
+	struct iw_freq	channel_list[IW_MAX_FREQUENCIES];
+};
+
+/* ------------------------- WPA SUPPORT ------------------------- */
+
+/*
+ *	Extended data structure for get/set encoding (this is used with
+ *	SIOCSIWENCODEEXT/SIOCGIWENCODEEXT. struct iw_point and IW_ENCODE_*
+ *	flags are used in the same way as with SIOCSIWENCODE/SIOCGIWENCODE and
+ *	only the data contents changes (key data -> this structure, including
+ *	key data).
+ *
+ *	If the new key is the first group key, it will be set as the default
+ *	TX key. Otherwise, default TX key index is only changed if
+ *	IW_ENCODE_EXT_SET_TX_KEY flag is set.
+ *
+ *	Key will be changed with SIOCSIWENCODEEXT in all cases except for
+ *	special "change TX key index" operation which is indicated by setting
+ *	key_len = 0 and ext_flags |= IW_ENCODE_EXT_SET_TX_KEY.
+ *
+ *	tx_seq/rx_seq are only used when respective
+ *	IW_ENCODE_EXT_{TX,RX}_SEQ_VALID flag is set in ext_flags. Normal
+ *	TKIP/CCMP operation is to set RX seq with SIOCSIWENCODEEXT and start
+ *	TX seq from zero whenever key is changed. SIOCGIWENCODEEXT is normally
+ *	used only by an Authenticator (AP or an IBSS station) to get the
+ *	current TX sequence number. Using TX_SEQ_VALID for SIOCSIWENCODEEXT and
+ *	RX_SEQ_VALID for SIOCGIWENCODEEXT are optional, but can be useful for
+ *	debugging/testing.
+ */
+struct	iw_encode_ext
+{
+	__u32		ext_flags; /* IW_ENCODE_EXT_* */
+	__u8		tx_seq[IW_ENCODE_SEQ_MAX_SIZE]; /* LSB first */
+	__u8		rx_seq[IW_ENCODE_SEQ_MAX_SIZE]; /* LSB first */
+	struct sockaddr	addr; /* ff:ff:ff:ff:ff:ff for broadcast/multicast
+			       * (group) keys or unicast address for
+			       * individual keys */
+	__u16		alg; /* IW_ENCODE_ALG_* */
+	__u16		key_len;
+	__u8		key[0];
+};
+
+/* SIOCSIWMLME data */
+struct	iw_mlme
+{
+	__u16		cmd; /* IW_MLME_* */
+	__u16		reason_code;
+	struct sockaddr	addr;
+};
+
+/* IWEVMICHAELMICFAILURE data */
+struct	iw_michaelmicfailure
+{
+	__u32		flags;
+	struct sockaddr	src_addr;
+	__u8		tsc[IW_ENCODE_SEQ_MAX_SIZE]; /* LSB first */
+};
+
 /* ------------------------ WIRELESS STATS ------------------------ */
 /*
  * Wireless statistics (used for /proc/net/wireless)
@@ -725,6 +925,8 @@ struct	iw_range
 	struct iw_freq	freq[IW_MAX_FREQUENCIES];	/* list */
 	/* Note : this frequency list doesn't need to fit channel numbers,
 	 * because each entry contain its channel index */
+
+	__u32		enc_capa; /* IW_ENC_CAPA_* bit field */
 };
 
 /*
diff -upr 2.6.8.1-WE17/net/core/wireless.c 2.6.8.1-WE18/net/core/wireless.c
--- 2.6.8.1-WE17/net/core/wireless.c	2004-08-29 21:23:32.285036040 -0700
+++ 2.6.8.1-WE18/net/core/wireless.c	2004-08-29 21:27:41.406163872 -0700
@@ -186,6 +186,12 @@ static const struct iw_ioctl_description
 		.header_type	= IW_HEADER_TYPE_ADDR,
 		.flags		= IW_DESCR_FLAG_DUMP,
 	},
+	[SIOCSIWMLME	- SIOCIWFIRST] = {
+		.header_type	= IW_HEADER_TYPE_POINT,
+		.token_size	= sizeof(struct iw_mlme),
+		.min_tokens	= 1,
+		.max_tokens	= 1,
+	},
 	[SIOCGIWAPLIST	- SIOCIWFIRST] = {
 		.header_type	= IW_HEADER_TYPE_POINT,
 		.token_size	= sizeof(struct sockaddr) +
@@ -272,6 +278,52 @@ static const struct iw_ioctl_description
 	[SIOCGIWPOWER	- SIOCIWFIRST] = {
 		.header_type	= IW_HEADER_TYPE_PARAM,
 	},
+	[SIOCSIWGENIE	- SIOCIWFIRST] = {
+		.header_type	= IW_HEADER_TYPE_POINT,
+		.token_size	= 1,
+		.max_tokens	= IW_GENERIC_IE_MAX,
+	},
+	[SIOCGIWGENIE	- SIOCIWFIRST] = {
+		.header_type	= IW_HEADER_TYPE_POINT,
+		.token_size	= 1,
+		.max_tokens	= IW_GENERIC_IE_MAX,
+	},
+	[SIOCSIWAUTH	- SIOCIWFIRST] = {
+		.header_type	= IW_HEADER_TYPE_PARAM,
+	},
+	[SIOCGIWAUTH	- SIOCIWFIRST] = {
+		.header_type	= IW_HEADER_TYPE_PARAM,
+	},
+	[SIOCSIWENCODEEXT - SIOCIWFIRST] = {
+		.header_type	= IW_HEADER_TYPE_POINT,
+		.token_size	= 1,
+		.min_tokens	= sizeof(struct iw_encode_ext),
+		.max_tokens	= sizeof(struct iw_encode_ext) +
+				  IW_ENCODING_TOKEN_MAX,
+	},
+	[SIOCGIWENCODEEXT - SIOCIWFIRST] = {
+		.header_type	= IW_HEADER_TYPE_POINT,
+		.token_size	= 1,
+		.min_tokens	= sizeof(struct iw_encode_ext),
+		.max_tokens	= sizeof(struct iw_encode_ext) +
+				  IW_ENCODING_TOKEN_MAX,
+	},
+	[SIOCSIWSCANEXT	- SIOCIWFIRST] = {
+		.header_type	= IW_HEADER_TYPE_POINT,
+#if 0
+		/* FIX: JKM - is this correct? Is length in struct iw_point
+		 * number of bytes or number of tokens in the buffer?
+		 * I changed this to use token_size=1 for now, since I assumed
+		 * length from user space would always be in bytes.. */
+		.token_size	= sizeof(struct iw_scan_req),
+		.min_tokens	= 1,
+		.max_tokens	= 1,
+#else
+		.token_size	= 1,
+		.min_tokens	= sizeof(struct iw_scan_req),
+		.max_tokens	= sizeof(struct iw_scan_req),
+#endif
+	},
 };
 static const int standard_ioctl_num = (sizeof(standard_ioctl) /
 				       sizeof(struct iw_ioctl_description));
@@ -298,6 +350,16 @@ static const struct iw_ioctl_description
 	[IWEVEXPIRED	- IWEVFIRST] = {
 		.header_type	= IW_HEADER_TYPE_ADDR, 
 	},
+	[IWEVGENIE	- IWEVFIRST] = {
+		.header_type	= IW_HEADER_TYPE_POINT,
+		.token_size	= 1,
+		.max_tokens	= IW_GENERIC_IE_MAX,
+	},
+	[IWEVMICHAELMICFAILURE	- IWEVFIRST] = {
+		.header_type	= IW_HEADER_TYPE_POINT, 
+		.token_size	= 1,
+		.max_tokens	= sizeof(struct iw_michaelmicfailure),
+	},
 };
 static const int standard_event_num = (sizeof(standard_event) /
 				       sizeof(struct iw_ioctl_description));



-- 
Jouni Malinen                                            PGP id EFC895FA

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-30  4:54 Updated WE-18 (WPA) proposal Jouni Malinen
@ 2004-08-30 16:50 ` Jean Tourrilhes
  2004-08-30 17:28   ` Jeff Garzik
  2004-08-31  0:49 ` Pedro Ramalhais
  1 sibling, 1 reply; 13+ messages in thread
From: Jean Tourrilhes @ 2004-08-30 16:50 UTC (permalink / raw)
  To: Jouni Malinen, netdev, hostap, Pedro Ramalhais

On Sun, Aug 29, 2004 at 09:54:41PM -0700, Jouni Malinen wrote:
> Finally, I had enough time to implement and test the proposed WE-18
> (WPA) changes with Host AP driver and wpa_supplicant.

	Great !

> Since WE-17 has apparently not yet been merged all the way into
> linux-2.6 tree, the patch below is against Linux 2.6.8.1 that has been
> patched with WE-17 patch (http://www.hpl.hp.com/personal/
> Jean_Tourrilhes/Linux/iw268_we17-10.diff).

	Don't worry, I'll fix that. Anyway, WE-17 is pending in Jeff's
tree, and I don't think he will make major changes to it.

> - replaced optional parameter (iw_point) to SIOCSIWSCAN with a new ioctl
>   (SIOCSIWSCANEXT) since the previous design was not really backwards
>   compatible (e.g., 'iwlist wlan0 scan' did not work)

	Latest Wireless Tools actually fixes that. Most distro seems
to have adopted WT-27-preXX, and I plan to release WT-27 soon after
WE-17, so I would not consider that a big issue.
	Having a separate ioctl has one advantage, you know if the
driver support it or not. One the other hand, having a single ioctl
may reduce bloat.

> Question: is length field in struct iw_point in bytes or tokens
> (token_size bytes)? I assumed it was in bytes, but this did not work
> very well with WE ioctls that had token_size != 1; I made SIOCSIWSCANEXT
> use token_size = 1 for now, but it could be replaced to be
> sizeof(struct) and min_tokens=max_tokesn=1 once this question is
> resolved.

	Originally, I was using length == num-tokens, with token-size != 1.
	However, after a while, I realised that having length ==
num-bytes was a much better option, so that's why the "newer" ioctls
tend to all have token_size == 1.
	In the case of SIOCSIWSCANEXT, it's especially important as
the struct may grow in the future, so the size would allow to
distinguish the various additions.

	Thanks a lot !

	Jean

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-30 16:50 ` Jean Tourrilhes
@ 2004-08-30 17:28   ` Jeff Garzik
  2004-08-30 17:42     ` Jean Tourrilhes
  0 siblings, 1 reply; 13+ messages in thread
From: Jeff Garzik @ 2004-08-30 17:28 UTC (permalink / raw)
  To: jt; +Cc: Jouni Malinen, netdev, hostap, Pedro Ramalhais

Jean Tourrilhes wrote:
> 	Don't worry, I'll fix that. Anyway, WE-17 is pending in Jeff's
> tree, and I don't think he will make major changes to it.


hehe :)

Yep, it's merged in netdev-2.6 (and thus -mm as well), and queued for 
upstream.

FWIW any 'radical' wireless changes will go into wireless-2.6.  There is 
still the stable upstream branch, to which WE patches can continue to be 
applied...

	Jeff

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-30 17:28   ` Jeff Garzik
@ 2004-08-30 17:42     ` Jean Tourrilhes
  2004-08-30 17:55       ` Jeff Garzik
  0 siblings, 1 reply; 13+ messages in thread
From: Jean Tourrilhes @ 2004-08-30 17:42 UTC (permalink / raw)
  To: Jeff Garzik; +Cc: netdev, Jouni Malinen, hostap, Pedro Ramalhais

On Mon, Aug 30, 2004 at 01:28:43PM -0400, Jeff Garzik wrote:
> Jean Tourrilhes wrote:
> >	Don't worry, I'll fix that. Anyway, WE-17 is pending in Jeff's
> >tree, and I don't think he will make major changes to it.
> 
> 
> hehe :)
> 
> Yep, it's merged in netdev-2.6 (and thus -mm as well), and queued for 
> upstream.

	Thanks ;-)

> FWIW any 'radical' wireless changes will go into wireless-2.6.  There is 
> still the stable upstream branch, to which WE patches can continue to be 
> applied...

	If you don't mind, I would like a bit more understanding about
how much is "radical" and how much is not. I would personally put that
around "breaking backward compatibility", but you may have other
ideas.
	Also, I'm not clear how the stuff in wireless-2.6 is supposed
to trickle into the other trees (netdev-2.6, -mm and Linus's), and how
to better link it with the CVS of the various drivers involved.

> 	Jeff

	Have fun...

	Jean

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-30 17:42     ` Jean Tourrilhes
@ 2004-08-30 17:55       ` Jeff Garzik
  2004-08-30 22:01         ` Luis R. Rodriguez
  0 siblings, 1 reply; 13+ messages in thread
From: Jeff Garzik @ 2004-08-30 17:55 UTC (permalink / raw)
  To: jt; +Cc: Jouni Malinen, netdev, hostap, Pedro Ramalhais

Jean Tourrilhes wrote:
> On Mon, Aug 30, 2004 at 01:28:43PM -0400, Jeff Garzik wrote:
> 
>>Jean Tourrilhes wrote:
>>
>>>	Don't worry, I'll fix that. Anyway, WE-17 is pending in Jeff's
>>>tree, and I don't think he will make major changes to it.
>>
>>
>>hehe :)
>>
>>Yep, it's merged in netdev-2.6 (and thus -mm as well), and queued for 
>>upstream.
> 
> 
> 	Thanks ;-)
> 
> 
>>FWIW any 'radical' wireless changes will go into wireless-2.6.  There is 
>>still the stable upstream branch, to which WE patches can continue to be 
>>applied...
> 
> 
> 	If you don't mind, I would like a bit more understanding about
> how much is "radical" and how much is not. I would personally put that
> around "breaking backward compatibility", but you may have other
> ideas.

Yes, as discussed (er, argued :)) radical would include breaking 
backwards compat.


> 	Also, I'm not clear how the stuff in wireless-2.6 is supposed
> to trickle into the other trees (netdev-2.6, -mm and Linus's), and how
> to better link it with the CVS of the various drivers involved.

Less of a trickle than a flood:  wireless-2.6 should be the target for 
development of shared wireless stack code.  As several drivers are 
currently using bits of HostAP, for example, wireless-2.6 should be a 
focal point for patches that modify these drivers to instead share the 
same code.

Once this generic work is done, it would get pushed all at once to 
netdev-2.6, where it would receive testing in -mm.  Then, later, pushed 
to mainline.

	Jeff

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-30 17:55       ` Jeff Garzik
@ 2004-08-30 22:01         ` Luis R. Rodriguez
  2004-08-30 22:20           ` Jeff Garzik
  0 siblings, 1 reply; 13+ messages in thread
From: Luis R. Rodriguez @ 2004-08-30 22:01 UTC (permalink / raw)
  To: Jeff Garzik; +Cc: jt, netdev, Jouni Malinen, hostap, Pedro Ramalhais

On Mon, Aug 30, 2004 at 01:55:52PM -0400, Jeff Garzik wrote:
> Jean Tourrilhes wrote:

<-- snip -->

> >	Also, I'm not clear how the stuff in wireless-2.6 is supposed
> >to trickle into the other trees (netdev-2.6, -mm and Linus's), and how
> >to better link it with the CVS of the various drivers involved.
> 
> Less of a trickle than a flood:  wireless-2.6 should be the target for 
> development of shared wireless stack code.  As several drivers are 
> currently using bits of HostAP, for example, wireless-2.6 should be a 
> focal point for patches that modify these drivers to instead share the 
> same code.
> 
> Once this generic work is done, it would get pushed all at once to 
> netdev-2.6, where it would receive testing in -mm.  Then, later, pushed 
> to mainline.
> 
> 	Jeff

Beides wpa_supplicant from hostap code (which is actually going into
WE18) what other code re-use is on the roadmap as of yet for wireless-2.6?

Also who is coordinating this?

	Luis

-- 
GnuPG Key fingerprint = 113F B290 C6D2 0251 4D84  A34A 6ADD 4937 E20A 525E

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-30 22:01         ` Luis R. Rodriguez
@ 2004-08-30 22:20           ` Jeff Garzik
  2004-08-31  8:54             ` Luis R. Rodriguez
  0 siblings, 1 reply; 13+ messages in thread
From: Jeff Garzik @ 2004-08-30 22:20 UTC (permalink / raw)
  To: Luis R. Rodriguez; +Cc: jt, Jouni Malinen, netdev, hostap, Pedro Ramalhais

Luis R. Rodriguez wrote:
> On Mon, Aug 30, 2004 at 01:55:52PM -0400, Jeff Garzik wrote:
> 
>>Jean Tourrilhes wrote:
> 
> 
> <-- snip -->
> 
>>>	Also, I'm not clear how the stuff in wireless-2.6 is supposed
>>>to trickle into the other trees (netdev-2.6, -mm and Linus's), and how
>>>to better link it with the CVS of the various drivers involved.
>>
>>Less of a trickle than a flood:  wireless-2.6 should be the target for 
>>development of shared wireless stack code.  As several drivers are 
>>currently using bits of HostAP, for example, wireless-2.6 should be a 
>>focal point for patches that modify these drivers to instead share the 
>>same code.
>>
>>Once this generic work is done, it would get pushed all at once to 
>>netdev-2.6, where it would receive testing in -mm.  Then, later, pushed 
>>to mainline.
>>
>>	Jeff
> 
> 
> Beides wpa_supplicant from hostap code (which is actually going into
> WE18) what other code re-use is on the roadmap as of yet for wireless-2.6?

Intel Centrino driver is re-using chunks of HostAP, and I'm looking at 
doing so for the RealTek 8180 driver I am about to publish.


> Also who is coordinating this?

The same person who coordinates the kernel at large... no one ;-)

	Jeff

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-30  4:54 Updated WE-18 (WPA) proposal Jouni Malinen
  2004-08-30 16:50 ` Jean Tourrilhes
@ 2004-08-31  0:49 ` Pedro Ramalhais
  2004-08-31  1:30   ` Jouni Malinen
  1 sibling, 1 reply; 13+ messages in thread
From: Pedro Ramalhais @ 2004-08-31  0:49 UTC (permalink / raw)
  To: Jouni Malinen; +Cc: Jean Tourrilhes, netdev, hostap

On Mon, 2004-08-30 at 05:54, Jouni Malinen wrote:
> Finally, I had enough time to implement and test the proposed WE-18
> (WPA) changes with Host AP driver and wpa_supplicant. This testing was
> indeed needed since number of issues showed up. I have made an updated
> version of the WE-18 proposal that seems to work with
> hostap and wpa_supplicant (current development snapshot from
> http://hostap/epitest.fi/). I have not yet verified how much of
> interface needed for hostapd could be moved to these new parts of WE-18
> instead of the currently used private ioctls.
> 
> Since WE-17 has apparently not yet been merged all the way into
> linux-2.6 tree, the patch below is against Linux 2.6.8.1 that has been
> patched with WE-17 patch (http://www.hpl.hp.com/personal/
> Jean_Tourrilhes/Linux/iw268_we17-10.diff). This should be quite close
> to what the final WE-18 would be diffed against. This WE-18 patch is
> still experimental and it may still need to be changed (i.e., this
> should not yet be merged into linux-2.6).
> 
> Change log against the latest WE-18 proposal (http://www.hpl.hp.com/
> personal/Jean_Tourrilhes/Linux/iw_we18-3.diff):
> 
> - replaced optional parameter (iw_point) to SIOCSIWSCAN with a new ioctl
>   (SIOCSIWSCANEXT) since the previous design was not really backwards
>   compatible (e.g., 'iwlist wlan0 scan' did not work)
> - replaced IWEVWPAIE/IWEVRSNIE with more generic IWEVGENIE which can
>   also be used with non-WPA (e.g., IEEE 802.11e/WMM) IEs; in addition,
>   fixed the type for this event to be IW_HEADER_TYPE_POINT (was _PARAM)
> - use larger IW_GENERIC_IE_MAX (256->1024) to be able to handle possible
>   needs for future IEEE 802.11 amendments
> - added new IW_AUTH_INDEX parameters IW_AUTH_WPA_ENABLED and
>   IW_AUTH_RX_UNENCRYPTED_EAPOL that were missing from the functionality
>   needed by wpa_supplicant interface
> - changed IW_AUTH_WPA_VERSION, IW_AUTH_PAIRWISE_CIPHER,
>   IW_AUTH_GROUP_CIPHER, and IW_AUTH_KEY_MGMT to bit fields
> - added LEAP to IW_AUTH_80211_AUTH_ALG values
> - added IW_ENCODE_EXT_SET_TX_KEY (set key value and mark key as default
>   TX key with one ioctl)
> - added some more comments to areas that were unclear (have generated
>   questions)
> - added min_tokens values for SIOCSIWENCODEEXT and SIOCGIWENCODEEXT
> 
> Question: is length field in struct iw_point in bytes or tokens
> (token_size bytes)? I assumed it was in bytes, but this did not work
> very well with WE ioctls that had token_size != 1; I made SIOCSIWSCANEXT
> use token_size = 1 for now, but it could be replaced to be
> sizeof(struct) and min_tokens=max_tokesn=1 once this question is
> resolved.

Hi Jouni and Jean!

#define IW_AUTH_RX_UNENCRYPTED_EAPOL   8
I think this define isn't needed because you can get the same
information from IW_AUTH_KEY_MGMT:
#define IW_AUTH_KEY_MGMT_802_1X        1
#define IW_AUTH_KEY_MGMT_PSK   2
because if IW_AUTH_KEY_MGMT_802_1X || IW_AUTH_KEY_MGMT_PSK , then you
want to pass unencrypted EAPOL packets.

Likewise for IW_AUTH_WPA_ENABLED which you can get from
IW_AUTH_WPA_VERSION:
/* IW_AUTH_WPA_VERSION values */
#define IW_AUTH_WPA_VERSION_DISABLED    0
#define IW_AUTH_WPA_VERSION_WPA         1
#define IW_AUTH_WPA_VERSION_WPA2        2
If IW_AUTH_WPA_VERSION == IW_AUTH_WPA_VERSION_DISABLED then WPA is
disabled, else if IW_AUTH_WPA_VERSION_WPA || IW_AUTH_WPA_VERSION_WPA2
then it's enabled.

Thanks!
-- 
Pedro Ramalhais <ramalhais@serrado.net>

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-31  0:49 ` Pedro Ramalhais
@ 2004-08-31  1:30   ` Jouni Malinen
  0 siblings, 0 replies; 13+ messages in thread
From: Jouni Malinen @ 2004-08-31  1:30 UTC (permalink / raw)
  To: Pedro Ramalhais; +Cc: Jean Tourrilhes, netdev, hostap

On Tue, Aug 31, 2004 at 01:49:47AM +0100, Pedro Ramalhais wrote:

> #define IW_AUTH_RX_UNENCRYPTED_EAPOL   8
> I think this define isn't needed because you can get the same
> information from IW_AUTH_KEY_MGMT:
> #define IW_AUTH_KEY_MGMT_802_1X        1
> #define IW_AUTH_KEY_MGMT_PSK   2
> because if IW_AUTH_KEY_MGMT_802_1X || IW_AUTH_KEY_MGMT_PSK , then you
> want to pass unencrypted EAPOL packets.

IW_AUTH_KEY_MGMT was added to support NDIS-like drivers that want to
generate WPA IE internally. Many drivers, e.g., Host AP, do not use them
at all. Consequently, I wanted to have a separate parameter for this
particular case. Drivers do not need to implement support for both
cases.

> Likewise for IW_AUTH_WPA_ENABLED which you can get from
> IW_AUTH_WPA_VERSION:
> /* IW_AUTH_WPA_VERSION values */
> #define IW_AUTH_WPA_VERSION_DISABLED    0
> #define IW_AUTH_WPA_VERSION_WPA         1
> #define IW_AUTH_WPA_VERSION_WPA2        2
> If IW_AUTH_WPA_VERSION == IW_AUTH_WPA_VERSION_DISABLED then WPA is
> disabled, else if IW_AUTH_WPA_VERSION_WPA || IW_AUTH_WPA_VERSION_WPA2
> then it's enabled.

This is not the same. IW_AUTH_WPA_ENABLED is used to configure the
driver in WPA mode before any scan requests whereas IW_AUTH_WPA_VERSION
is used only after the scan requests. Drivers are free to not implement
IW_AUTH_WPA_ENABLED handler if they are always in "WPA mode".

-- 
Jouni Malinen                                            PGP id EFC895FA

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-30 22:20           ` Jeff Garzik
@ 2004-08-31  8:54             ` Luis R. Rodriguez
  2004-08-31 15:33               ` Pedro Ramalhais
  0 siblings, 1 reply; 13+ messages in thread
From: Luis R. Rodriguez @ 2004-08-31  8:54 UTC (permalink / raw)
  To: Jeff Garzik
  Cc: netdev, Jouni Malinen, hostap, Luis R. Rodriguez, Pedro Ramalhais,
	jt

On Mon, Aug 30, 2004 at 06:20:01PM -0400, Jeff Garzik wrote:
> Luis R. Rodriguez wrote:
> >On Mon, Aug 30, 2004 at 01:55:52PM -0400, Jeff Garzik wrote:
> >
> >>Jean Tourrilhes wrote:
> >
> >
> ><-- snip -->
> >
> >>>	Also, I'm not clear how the stuff in wireless-2.6 is supposed
> >>>to trickle into the other trees (netdev-2.6, -mm and Linus's), and how
> >>>to better link it with the CVS of the various drivers involved.
> >>
> >>Less of a trickle than a flood:  wireless-2.6 should be the target for 
> >>development of shared wireless stack code.  As several drivers are 
> >>currently using bits of HostAP, for example, wireless-2.6 should be a 
> >>focal point for patches that modify these drivers to instead share the 
> >>same code.
> >>
> >>Once this generic work is done, it would get pushed all at once to 
> >>netdev-2.6, where it would receive testing in -mm.  Then, later, pushed 
> >>to mainline.
> >>
> >>	Jeff
> >
> >
> >Beides wpa_supplicant from hostap code (which is actually going into
> >WE18) what other code re-use is on the roadmap as of yet for wireless-2.6?
> 
> Intel Centrino driver is re-using chunks of HostAP, and I'm looking at 
> doing so for the RealTek 8180 driver I am about to publish.

Can someone elaborate on what "chunks" the centrino driver is using
from hostap?

Jeff what aspects are you looking to re-use from hostap?

I guess we at prism54 should also see what we can re-use too then.
Our next driver (a softmac driver) will have a lot more code since the
MAC will need to be implemented on the driver side -- I'm not yet sure
of the exact details as I haven't grep'd through the available code yet
I'm wondering though -- are there any other softmac drivers out there,
or to come soon?

	Luis

-- 
GnuPG Key fingerprint = 113F B290 C6D2 0251 4D84  A34A 6ADD 4937 E20A 525E

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-31  8:54             ` Luis R. Rodriguez
@ 2004-08-31 15:33               ` Pedro Ramalhais
  2004-08-31 15:48                 ` Vladimir Kondratiev
  0 siblings, 1 reply; 13+ messages in thread
From: Pedro Ramalhais @ 2004-08-31 15:33 UTC (permalink / raw)
  To: Luis R. Rodriguez
  Cc: Jeff Garzik, Luis R. Rodriguez, jt, Jouni Malinen, netdev, hostap

On Tue, 2004-08-31 at 09:54, Luis R. Rodriguez wrote:
> On Mon, Aug 30, 2004 at 06:20:01PM -0400, Jeff Garzik wrote:
> > Luis R. Rodriguez wrote:
> > >On Mon, Aug 30, 2004 at 01:55:52PM -0400, Jeff Garzik wrote:
> > >
> > >>Jean Tourrilhes wrote:
> > >
> > >
> > ><-- snip -->
> > >
> > >>>	Also, I'm not clear how the stuff in wireless-2.6 is supposed
> > >>>to trickle into the other trees (netdev-2.6, -mm and Linus's), and how
> > >>>to better link it with the CVS of the various drivers involved.
> > >>
> > >>Less of a trickle than a flood:  wireless-2.6 should be the target for 
> > >>development of shared wireless stack code.  As several drivers are 
> > >>currently using bits of HostAP, for example, wireless-2.6 should be a 
> > >>focal point for patches that modify these drivers to instead share the 
> > >>same code.
> > >>
> > >>Once this generic work is done, it would get pushed all at once to 
> > >>netdev-2.6, where it would receive testing in -mm.  Then, later, pushed 
> > >>to mainline.
> > >>
> > >>	Jeff
> > >
> > >
> > >Beides wpa_supplicant from hostap code (which is actually going into
> > >WE18) what other code re-use is on the roadmap as of yet for wireless-2.6?
> > 
> > Intel Centrino driver is re-using chunks of HostAP, and I'm looking at 
> > doing so for the RealTek 8180 driver I am about to publish.
> 
> Can someone elaborate on what "chunks" the centrino driver is using
> from hostap?
> 
> Jeff what aspects are you looking to re-use from hostap?
> 
> I guess we at prism54 should also see what we can re-use too then.
> Our next driver (a softmac driver) will have a lot more code since the
> MAC will need to be implemented on the driver side -- I'm not yet sure
> of the exact details as I haven't grep'd through the available code yet
> I'm wondering though -- are there any other softmac drivers out there,
> or to come soon?
> 
> 	Luis

The ipw2100 driver and ipw2200 driver both use these parts of hostap
code:
RX code (i think now it's in file hostap_80211_rx.c)
little parts of the TX code (hostap_80211_tx.c)
the hostap_crypt* code for WEP.
Some IEEE802.11 related parts of header files.
The ipw2100 is beggining to use hostap_crypt_tkip and hostap_crypt_ccmp
for WPA and WPA2.

I think that's it. Better ask James Ketrenos, he is one of the
developers at intel.
-- 
Pedro Ramalhais <ramalhais@serrado.net>

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-31 15:33               ` Pedro Ramalhais
@ 2004-08-31 15:48                 ` Vladimir Kondratiev
  2004-08-31 21:04                   ` Luis R. Rodriguez
  0 siblings, 1 reply; 13+ messages in thread
From: Vladimir Kondratiev @ 2004-08-31 15:48 UTC (permalink / raw)
  To: netdev
  Cc: Pedro Ramalhais, Luis R. Rodriguez, Jeff Garzik, jt,
	Jouni Malinen, hostap

[-- Attachment #1: Type: text/plain, Size: 2005 bytes --]

On Tuesday 31 August 2004 18:33, Pedro Ramalhais wrote:
PR> > > Intel Centrino driver is re-using chunks of HostAP, and I'm looking
 at PR> > > doing so for the RealTek 8180 driver I am about to publish.
PR> >
PR> > Can someone elaborate on what "chunks" the centrino driver is using
PR> > from hostap?
PR> >
PR> > Jeff what aspects are you looking to re-use from hostap?
PR> >
PR> > I guess we at prism54 should also see what we can re-use too then.
PR> > Our next driver (a softmac driver) will have a lot more code since the
PR> > MAC will need to be implemented on the driver side -- I'm not yet sure
PR> > of the exact details as I haven't grep'd through the available code yet
PR> > I'm wondering though -- are there any other softmac drivers out there,
PR> > or to come soon?
PR> >
PR> >  Luis
PR>
PR> The ipw2100 driver and ipw2200 driver both use these parts of hostap
PR> code:
PR> RX code (i think now it's in file hostap_80211_rx.c)
PR> little parts of the TX code (hostap_80211_tx.c)
PR> the hostap_crypt* code for WEP.
PR> Some IEEE802.11 related parts of header files.
PR> The ipw2100 is beggining to use hostap_crypt_tkip and hostap_crypt_ccmp
PR> for WPA and WPA2.
PR>
PR> I think that's it. Better ask James Ketrenos, he is one of the
PR> developers at intel.

Luis,
please correct me if I'm wrong. It seems to me that softmac drivers will need 
significant changes relative to the model that HostAP employ. Also, many 
changes dictated by QoS (TGe), if one want to really implement it. Will your 
product support TGe?
May be, we need to do design for generic "softmac" that will be then used with 
different PHY's. Question is, whether we can formally describe boundary 
between softmac and PHY.
I am interesting in joining this "softmac" development, as I will do some 
other .11 card which is "softmac". Can't reveal details yet, but we may 
discuss softmac issues without disclosing private info (I don't want to lose 
my job).

Vladimir.

[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: Updated WE-18 (WPA) proposal
  2004-08-31 15:48                 ` Vladimir Kondratiev
@ 2004-08-31 21:04                   ` Luis R. Rodriguez
  0 siblings, 0 replies; 13+ messages in thread
From: Luis R. Rodriguez @ 2004-08-31 21:04 UTC (permalink / raw)
  To: Vladimir Kondratiev
  Cc: netdev, Jouni Malinen, hostap, Luis R. Rodriguez, Pedro Ramalhais,
	jt, Jeff Garzik

On Tue, Aug 31, 2004 at 06:48:48PM +0300, Vladimir Kondratiev wrote:
> On Tuesday 31 August 2004 18:33, Pedro Ramalhais wrote:
> PR> > > Intel Centrino driver is re-using chunks of HostAP, and I'm looking
>  at PR> > > doing so for the RealTek 8180 driver I am about to publish.
> PR> >
> PR> > Can someone elaborate on what "chunks" the centrino driver is using
> PR> > from hostap?
> PR> >
> PR> > Jeff what aspects are you looking to re-use from hostap?
> PR> >
> PR> > I guess we at prism54 should also see what we can re-use too then.
> PR> > Our next driver (a softmac driver) will have a lot more code since the
> PR> > MAC will need to be implemented on the driver side -- I'm not yet sure
> PR> > of the exact details as I haven't grep'd through the available code yet
> PR> > I'm wondering though -- are there any other softmac drivers out there,
> PR> > or to come soon?
> PR> >
> PR> >  Luis
> PR>
> PR> The ipw2100 driver and ipw2200 driver both use these parts of hostap
> PR> code:
> PR> RX code (i think now it's in file hostap_80211_rx.c)
> PR> little parts of the TX code (hostap_80211_tx.c)
> PR> the hostap_crypt* code for WEP.
> PR> Some IEEE802.11 related parts of header files.
> PR> The ipw2100 is beggining to use hostap_crypt_tkip and hostap_crypt_ccmp
> PR> for WPA and WPA2.
> PR>
> PR> I think that's it. Better ask James Ketrenos, he is one of the
> PR> developers at intel.
> 
> Luis,
> please correct me if I'm wrong. It seems to me that softmac drivers will need 
> significant changes relative to the model that HostAP employ.

I am not sure as:

1. I haven't yet gone through hostap code besides wpa_supplicant
2. I haven't yet gone through the available softmac code:

http://www.dse.co.nz/isroot/dse/support/XH8196-linux.zip

Only once I have done both will I be able to tell. My guess yes
as I do not think hostap is softmac based.

> Also, many 
> changes dictated by QoS (TGe), if one want to really implement it. Will your 
> product support TGe?

Again, 2.

> May be, we need to do design for generic "softmac" that will be then used with 
> different PHY's. 

That's where I was going with my previous e-mail.

> Question is, whether we can formally describe boundary 
> between softmac and PHY.

We need as much public information available on softmac and review, or
have someone experienced enough in this field to talk up.

> I am interesting in joining this "softmac" development, as I will do some 
> other .11 card which is "softmac". Can't reveal details yet, but we may 
> discuss softmac issues without disclosing private info (I don't want to lose 
> my job).

Well at least this confirms another card will be softmac based, and
hence the possible need for code sharing.

-- 
GnuPG Key fingerprint = 113F B290 C6D2 0251 4D84  A34A 6ADD 4937 E20A 525E

^ permalink raw reply	[flat|nested] 13+ messages in thread

end of thread, other threads:[~2004-08-31 21:04 UTC | newest]

Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-08-30  4:54 Updated WE-18 (WPA) proposal Jouni Malinen
2004-08-30 16:50 ` Jean Tourrilhes
2004-08-30 17:28   ` Jeff Garzik
2004-08-30 17:42     ` Jean Tourrilhes
2004-08-30 17:55       ` Jeff Garzik
2004-08-30 22:01         ` Luis R. Rodriguez
2004-08-30 22:20           ` Jeff Garzik
2004-08-31  8:54             ` Luis R. Rodriguez
2004-08-31 15:33               ` Pedro Ramalhais
2004-08-31 15:48                 ` Vladimir Kondratiev
2004-08-31 21:04                   ` Luis R. Rodriguez
2004-08-31  0:49 ` Pedro Ramalhais
2004-08-31  1:30   ` Jouni Malinen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).