[PATCHv2] wpa_supplicant: support IBSS RSN STA authorization

Jouni Malinen j
Sun Jan 29 11:10:56 PST 2012


On Sun, Jan 29, 2012 at 06:58:23PM +0100, Antonio Quartulli wrote:
> On Sun, Jan 29, 2012 at 07:52:31PM +0200, Jouni Malinen wrote:
> > Could you please explain what this is trying to do? It does not look
> > correct taking into account that I would assume similar control port
> > behavior to be used with KEY_MGMT_802_1X, KEY_MGMT_PSK,
> > KEY_MGMT_802_1X_SHA256, and KEY_MGMT_PSK_SHA256.

> The idea is that in case of creating a  RSN protected IBSS network, wpa_s has to
> tell the kernelspace that such network is RSN protected. But probably I got it
> wrong and such comparison should be done against WPA_KEY_MGMT_PSK instead of
> KEY_MGMT_802_1X.

Well, it should really be that full list above. Not that we really fully
support IEEE 802.1X with RSN IBSS at the moment, but anyway, we could
potentially do that and the driver wrapper does not need to know this
anyway, so better include all possibilities that would use the new
authorization mechanism.

> Can KEY_MGMT_802_1X_SHA256 and KEY_MGMT_PSK_SHA256 be allowed values for
> params->key_mgmt_suite in IBSS_RSN?

Yes. Though, the only once that are likely to work at this point are
WPA_KEY_MGMT_PSK and KEY_MGMT_PSK_SHA256. I don't think the version you
used previously ever set this flag, so it would be interesting to hear
how this was tested. Since the kernel change was not yet in
wireless-testing.git, I just verified that the authorization operations
are failing and left the patch waiting until the kernel side is ready.

-- 
Jouni Malinen                                            PGP id EFC895FA



More information about the Hostap mailing list