Historical ath9k-devel archives
 help / color / mirror / Atom feed
From: Adrian Chadd <adrian@freebsd.org>
To: ath9k-devel@lists.ath9k.org
Subject: [ath9k-devel] Cryptography of ath9k driver
Date: Fri, 4 Nov 2016 22:08:07 -0700	[thread overview]
Message-ID: <CAJ-Vmon+Y-ykZKXkV7Hozm37BJdrfghT0PZYLRX61CayMmayQw@mail.gmail.com> (raw)
In-Reply-To: <CACfn7v75-K44GV_MmSZO9mmHBo71_pB1FxJ7muvy5g5awOP5Eg@mail.gmail.com>

hi,

person who gave talk here :)

so the mac does do wep, tkip, ccmp encryption. the mfp frames use
another encryption type that the mac doesn't do, so it is then done in
software.

each keycache entry in mac80211 tags things as hw or sw handled.

it clears that flag so mac80211 doesn't attempt to treat it as
decrypted by hardware. it overrides whatever the RX path has already
set up in that flag word.


-a


On 26 October 2016 at 04:10, Jeon <sjeon87+ath9k@gmail.com> wrote:
> Thanks for response.
>
> Well, I mean, are those hardware cryptography and nohwcrypt modparam
> applying only to management frames (i.e., are data frames already being
> en/decrypted by using software cryptography in mac/ieee80211 kernel module?)
>
> Regards,
> Jeon.
>
>
> On Wed, Oct 26, 2016 at 7:38 PM, Janusz Dziedzic <janusz.dziedzic@tieto.com>
> wrote:
>>
>>
>>
>> On 26 October 2016 at 08:53, Jeon <sjeon87+ath9k@gmail.com> wrote:
>>>
>>> I am investigating how ath9k performs cryptography.
>>>
>>> In slide 15 of DEFCON conference 2014 (link), it says, ath9k performs
>>> cryptography a on software side.
>>>
>>> On the other hand, when I look into ath9k source codes, I found
>>> somethings like below:
>>>
>>> ath9k/common.c:162-166:
>>>
>>>     if (ah->sw_mgmt_crypto_rx &&
>>>   (rxs->flag & RX_FLAG_DECRYPTED) &&
>>>   ieee80211_is_mgmt(fc))
>>>   /* Use software decrypt for management frames. */
>>>   rxs->flag &= ~RX_FLAG_DECRYPTED;
>>>
>>> As I understand, ath9k can choose hw/sw cryptography for management
>>> frames. However, what about data frames? I couldn't find any clue about
>>> cryptography for data frames.
>>>
>>> Can I take it as ath9k already performs software cryptography for data
>>> frames and shifts the responsibility of cryptography to mac80211 driver? And
>>> exceptionally for management frames, can ath9k choose hw/sw cryptography?
>>>
>>
>> modinfo ath9k (check nohwcrypt param)
>>
>> BR
>> Janusz
>
>
>
> _______________________________________________
> ath9k-devel mailing list
> ath9k-devel at lists.ath9k.org
> https://lists.ath9k.org/mailman/listinfo/ath9k-devel
>

      reply	other threads:[~2016-11-05  5:08 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-10-26  6:53 [ath9k-devel] Cryptography of ath9k driver Jeon
2016-10-26 10:38 ` Janusz Dziedzic
2016-10-26 11:10   ` Jeon
2016-11-05  5:08     ` Adrian Chadd [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAJ-Vmon+Y-ykZKXkV7Hozm37BJdrfghT0PZYLRX61CayMmayQw@mail.gmail.com \
    --to=adrian@freebsd.org \
    --cc=ath9k-devel@lists.ath9k.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).