From patchwork Fri Jul 23 14:42:25 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Pawe=C5=82_Drewniak?= X-Patchwork-Id: 12396175 X-Patchwork-Delegate: kvalo@adurom.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-14.2 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 509C5C4338F for ; Fri, 23 Jul 2021 14:42:39 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 306AC60EB6 for ; Fri, 23 Jul 2021 14:42:39 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235372AbhGWOCB (ORCPT ); Fri, 23 Jul 2021 10:02:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38104 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235467AbhGWOBz (ORCPT ); Fri, 23 Jul 2021 10:01:55 -0400 Received: from mail-wr1-x42c.google.com (mail-wr1-x42c.google.com [IPv6:2a00:1450:4864:20::42c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 19A5FC061760 for ; Fri, 23 Jul 2021 07:42:28 -0700 (PDT) Received: by mail-wr1-x42c.google.com with SMTP id j2so2598890wrx.9 for ; Fri, 23 Jul 2021 07:42:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=to:cc:from:subject:message-id:date:user-agent:mime-version :content-language:content-transfer-encoding; bh=W2/BoceWOJN+lUxPj8MwZIqnVeL+AJsUYJ9PcLxlffM=; b=vAj5Q4pwIcQKnRafBiJStGzfWUAcSIDU2wC1hUVB0ShM3wzSygn6woSaFXrhBkbsiK oYe4X+laDAlwIR56DKKRF8Qzs0/W1U3su/pmTf7HW2JMK82KW0A/wFxMUtOmXlG3qJhr Kp7MWX3kflQvMvRR2zBG721KTd0iTbQUapDhkklmMCcBgYWVqZt2KcfX6v7ictwYjq41 Ve11hqBhjehccANqQayLs5sHlwPak6sCPrCfdbi8JGnBw3wAYqalFSeK9hecXX4h0kOR 4W6qrqIyZi50aaUZJ9gelPMroLC3u7Pwq5HINPHBL8iMZRb4FsbxT8RQC0Vf8fuFe1t+ yY3A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:cc:from:subject:message-id:date:user-agent :mime-version:content-language:content-transfer-encoding; bh=W2/BoceWOJN+lUxPj8MwZIqnVeL+AJsUYJ9PcLxlffM=; b=C5zljt3di2JUK5beFSFRf/hCjQuABp+MQjDcdF8brelRifcuHFhcNtUbsuOOhOhBDd 92RQSnvjTRFLV44HL4k7z1+Dv1QXvsuvFzG87fpe1eid708nbMM6ksj41ajfoYZcKHQG 0DNl8ZLnCgckwUdKY6Taq+YsFoZ75tLnl0c2as/Om9IsshhwhlPBRNhsJoFPjeIYBxmH FPLxpjbsJzxrmyMfZ3puIwNy9YZ/UCH8KeU4cILMkPX3qK2sfE1EpTEFDyD/WXyUyTMo 5sLgdpGwbqAez9OQIjiGyLfRXa2LGkKaQ7s2nFtpB+jfs5tK3gw4QxjdzAkh8tTdpGkx pPpQ== X-Gm-Message-State: AOAM5338M2i7+3vwx+ffnN7k4qYBtYmpKfZLirMKkxFUxup2t0z1sHqJ jBc9NuXz8d4nLdSpSxMY5+c= X-Google-Smtp-Source: ABdhPJxpL2ORe752Oe8CpZbuWXy3pLN7zzfpQpXmVKc97ccxpb/MS/DarebSn4pG5TMhNp/QxGch9A== X-Received: by 2002:a05:6000:104a:: with SMTP id c10mr5777206wrx.368.1627051346690; Fri, 23 Jul 2021 07:42:26 -0700 (PDT) Received: from ?IPv6:2a02:8084:26e0:1c70:df03:b65e:11f3:a5a4? ([2a02:8084:26e0:1c70:df03:b65e:11f3:a5a4]) by smtp.gmail.com with ESMTPSA id v30sm35848086wrv.85.2021.07.23.07.42.25 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 23 Jul 2021 07:42:26 -0700 (PDT) To: linux-wireless@vger.kernel.org Cc: brcm80211-dev-list.pdl@broadcom.com, SHA-cyfmac-dev-list@infineon.com, Arend van Spriel , Franky Lin , Hante Meuleman , Chi-hsien Lin , Wright Feng , Chung-hsien Hsu From: =?utf-8?q?Pawe=C5=82_Drewniak?= Subject: [PATCH] brcmfmac: Add WPA3 Personal with FT to supported cipher suites Message-ID: Date: Fri, 23 Jul 2021 15:42:25 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org This allows the driver to connect to BSSIDs supporting SAE with 802.11r. Tested on Raspberry Pi 4 Model B (STA) and UniFi 6LR/OpenWRT 21.02.0-rc2. AP was set to 'sae-mixed' (WPA2/3 Personal). Signed-off-by: Paweł Drewniak --- .../net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c index cedba56fc448..f7b96cd69242 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c @@ -1829,6 +1829,14 @@ brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme) profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE; } break; + case WLAN_AKM_SUITE_FT_OVER_SAE: + val = WPA3_AUTH_SAE_PSK | WPA2_AUTH_FT; + profile->is_ft = true; + if (sme->crypto.sae_pwd) { + brcmf_dbg(INFO, "using SAE offload\n"); + profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE; + } + break; default: bphy_err(drvr, "invalid cipher group (%d)\n", sme->crypto.cipher_group);