diff mbox series

[v2] brcmfmac: Add WPA3 Personal with FT to supported cipher suites

Message ID 20210824221330.3847139-1-czajernia@gmail.com
State New
Headers show
Series [v2] brcmfmac: Add WPA3 Personal with FT to supported cipher suites | expand

Commit Message

Paweł Drewniak Aug. 24, 2021, 10:13 p.m. UTC
This allows the driver to connect to BSSIDs supporting SAE with 802.11r.
Tested on Raspberry Pi 4 Model B (STA) and UniFi 6LR/OpenWRT 21.02.0-rc2.
AP was set to 'sae-mixed' (WPA2/3 Personal).

Signed-off-by: Paweł Drewniak <czajernia@gmail.com>
---
Changes in v2:
- rebase on top of wireless-drivers-next
---
 .../net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c   | 8 ++++++++
 1 file changed, 8 insertions(+)

Comments

Kalle Valo Aug. 29, 2021, 8:33 a.m. UTC | #1
Paweł Drewniak <czajernia@gmail.com> wrote:

> This allows the driver to connect to BSSIDs supporting SAE with 802.11r.

> Tested on Raspberry Pi 4 Model B (STA) and UniFi 6LR/OpenWRT 21.02.0-rc2.

> AP was set to 'sae-mixed' (WPA2/3 Personal).

> 

> Signed-off-by: Paweł Drewniak <czajernia@gmail.com>


Patch applied to wireless-drivers-next.git, thanks.

4b51de063d53 brcmfmac: Add WPA3 Personal with FT to supported cipher suites

-- 
https://patchwork.kernel.org/project/linux-wireless/patch/20210824221330.3847139-1-czajernia@gmail.com/

https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches
diff mbox series

Patch

diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
index cedba56fc..f7b96cd69 100644
--- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
+++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
@@ -1829,6 +1829,14 @@  brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme)
 				profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE;
 			}
 			break;
+		case WLAN_AKM_SUITE_FT_OVER_SAE:
+			val = WPA3_AUTH_SAE_PSK | WPA2_AUTH_FT;
+			profile->is_ft = true;
+			if (sme->crypto.sae_pwd) {
+				brcmf_dbg(INFO, "using SAE offload\n");
+				profile->use_fwsup = BRCMF_PROFILE_FWSUP_SAE;
+			}
+			break;
 		default:
 			bphy_err(drvr, "invalid cipher group (%d)\n",
 				 sme->crypto.cipher_group);