diff mbox series

brcmfmac: Add WPA3 Personal with FT to supported cipher suites

Message ID d676c466-fb2f-2301-ff5a-9b90141b6df1@gmail.com (mailing list archive)
State Changes Requested
Delegated to: Kalle Valo
Headers show
Series brcmfmac: Add WPA3 Personal with FT to supported cipher suites | expand

Commit Message

Paweł Drewniak July 23, 2021, 2:42 p.m. UTC
This allows the driver to connect to BSSIDs supporting SAE with 802.11r.
Tested on Raspberry Pi 4 Model B (STA) and UniFi 6LR/OpenWRT 21.02.0-rc2.
AP was set to 'sae-mixed' (WPA2/3 Personal).

Signed-off-by: Paweł Drewniak <czajernia@gmail.com>
---
 .../net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c   | 8 ++++++++
 1 file changed, 8 insertions(+)

Comments

Kalle Valo Aug. 21, 2021, 3:47 p.m. UTC | #1
Paweł Drewniak <czajernia@gmail.com> wrote:

> This allows the driver to connect to BSSIDs supporting SAE with 802.11r.
> Tested on Raspberry Pi 4 Model B (STA) and UniFi 6LR/OpenWRT 21.02.0-rc2.
> AP was set to 'sae-mixed' (WPA2/3 Personal).
> 
> Signed-off-by: Paweł Drewniak <czajernia@gmail.com>

Failed to apply, please rebase on top of wireless-drivers-next.

error: patch failed: drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c:1829
error: drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c: patch does not apply
error: Did you hand edit your patch?
It does not apply to blobs recorded in its index.
hint: Use 'git am --show-current-patch' to see the failed patch
Applying: brcmfmac: Add WPA3 Personal with FT to supported cipher suites
Using index info to reconstruct a base tree...
Patch failed at 0001 brcmfmac: Add WPA3 Personal with FT to supported cipher suites

Patch set to Changes Requested.
diff mbox series

Patch

diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
index cedba56fc448..f7b96cd69242 100644
--- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
+++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
@@ -1829,6 +1829,14 @@  brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme)
                                profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE;
                        }
                        break;
+               case WLAN_AKM_SUITE_FT_OVER_SAE:
+                       val = WPA3_AUTH_SAE_PSK | WPA2_AUTH_FT;
+                       profile->is_ft = true;
+                       if (sme->crypto.sae_pwd) {
+                               brcmf_dbg(INFO, "using SAE offload\n");
+                               profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE;
+                       }
+                       break;
                default:
                        bphy_err(drvr, "invalid cipher group (%d)\n",
                                 sme->crypto.cipher_group);