nl80211: Set cipher suites when using user space SME
Previously, pairwise and group cipher suites were configured only when kernel SME (nl80211 connect API) was used. However, mac80211 needs this information even in the user space SME case for one thing: to disable HT when TKIP/WEP is used. Add NL80211_ATTR_CIPHER_SUITES_PAIRWISE to fix this special case with user space SME. This allows mac80211 to disable HT properly when the AP is configured with configuration that is not allowed.
This commit is contained in:
parent
b39f58347d
commit
aca0160548
2 changed files with 46 additions and 0 deletions
|
@ -4562,6 +4562,50 @@ static int wpa_driver_nl80211_associate(
|
||||||
NLA_PUT(msg, NL80211_ATTR_IE, params->wpa_ie_len,
|
NLA_PUT(msg, NL80211_ATTR_IE, params->wpa_ie_len,
|
||||||
params->wpa_ie);
|
params->wpa_ie);
|
||||||
|
|
||||||
|
if (params->pairwise_suite != CIPHER_NONE) {
|
||||||
|
int cipher;
|
||||||
|
|
||||||
|
switch (params->pairwise_suite) {
|
||||||
|
case CIPHER_WEP40:
|
||||||
|
cipher = WLAN_CIPHER_SUITE_WEP40;
|
||||||
|
break;
|
||||||
|
case CIPHER_WEP104:
|
||||||
|
cipher = WLAN_CIPHER_SUITE_WEP104;
|
||||||
|
break;
|
||||||
|
case CIPHER_CCMP:
|
||||||
|
cipher = WLAN_CIPHER_SUITE_CCMP;
|
||||||
|
break;
|
||||||
|
case CIPHER_TKIP:
|
||||||
|
default:
|
||||||
|
cipher = WLAN_CIPHER_SUITE_TKIP;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
wpa_printf(MSG_DEBUG, " * pairwise=0x%x\n", cipher);
|
||||||
|
NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE, cipher);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (params->group_suite != CIPHER_NONE) {
|
||||||
|
int cipher;
|
||||||
|
|
||||||
|
switch (params->group_suite) {
|
||||||
|
case CIPHER_WEP40:
|
||||||
|
cipher = WLAN_CIPHER_SUITE_WEP40;
|
||||||
|
break;
|
||||||
|
case CIPHER_WEP104:
|
||||||
|
cipher = WLAN_CIPHER_SUITE_WEP104;
|
||||||
|
break;
|
||||||
|
case CIPHER_CCMP:
|
||||||
|
cipher = WLAN_CIPHER_SUITE_CCMP;
|
||||||
|
break;
|
||||||
|
case CIPHER_TKIP:
|
||||||
|
default:
|
||||||
|
cipher = WLAN_CIPHER_SUITE_TKIP;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
wpa_printf(MSG_DEBUG, " * group=0x%x\n", cipher);
|
||||||
|
NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher);
|
||||||
|
}
|
||||||
|
|
||||||
#ifdef CONFIG_IEEE80211W
|
#ifdef CONFIG_IEEE80211W
|
||||||
if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_REQUIRED)
|
if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_REQUIRED)
|
||||||
NLA_PUT_U32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED);
|
NLA_PUT_U32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED);
|
||||||
|
|
|
@ -352,6 +352,8 @@ void sme_associate(struct wpa_supplicant *wpa_s, enum wpas_mode mode,
|
||||||
params.wpa_ie = wpa_s->sme.assoc_req_ie_len ?
|
params.wpa_ie = wpa_s->sme.assoc_req_ie_len ?
|
||||||
wpa_s->sme.assoc_req_ie : NULL;
|
wpa_s->sme.assoc_req_ie : NULL;
|
||||||
params.wpa_ie_len = wpa_s->sme.assoc_req_ie_len;
|
params.wpa_ie_len = wpa_s->sme.assoc_req_ie_len;
|
||||||
|
params.pairwise_suite = cipher_suite2driver(wpa_s->pairwise_cipher);
|
||||||
|
params.group_suite = cipher_suite2driver(wpa_s->group_cipher);
|
||||||
#ifdef CONFIG_IEEE80211R
|
#ifdef CONFIG_IEEE80211R
|
||||||
if (auth_type == WLAN_AUTH_FT && wpa_s->sme.ft_ies) {
|
if (auth_type == WLAN_AUTH_FT && wpa_s->sme.ft_ies) {
|
||||||
params.wpa_ie = wpa_s->sme.ft_ies;
|
params.wpa_ie = wpa_s->sme.ft_ies;
|
||||||
|
|
Loading…
Reference in a new issue