Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp630828ybt; Fri, 19 Jun 2020 09:45:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy4nhb7FaRgoelNiPQjWnBiiAY9alg4QxBnE5q3fuTVE+owXmoFmbyuPoYI5Ftfhig0g2qd X-Received: by 2002:a17:906:3952:: with SMTP id g18mr4774006eje.68.1592585110969; Fri, 19 Jun 2020 09:45:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592585110; cv=none; d=google.com; s=arc-20160816; b=mUHpAUVhJKZy4ef/onuieRLtNdK0iviyj4q3r8F14grL/zDJXat9fF7OyJ+Px0WZyn itpijeuY8BMYie3I1EuvZ6lHS+wT/wVZU5V9tamA7Y7i0CvvMK1lLxP4GvsNdyVunjGQ 4A9KRO2bRKuoWyUyxP19r0UdLmiVDWA+/hi6QxZ8ux8pyCjF7DZdi819fdZcgm2PgFje QjhlN0g0YhLBpujPNVVXtLpEHyZ5rEhS68y9pXBjeNsO4xbSblCgnIgWCdQSq1FTdc0w VTfpySeuSThDHkf5U+PhfQjtBu8iJC+Sjob9g4+uqWa3NF6uKfxNSbfP5jjJ8fkNeb/3 UmKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JL9QBnV/LwM8Uzr2LCtX/DfPPbTzS47M94J1hsgufcI=; b=y2e22VtOTZvRourwpMtIMptSMiBrySkgZYMkHpZC/sMo+l4Q7scyxR/EDEhihUKbRb 53izEJOuAI98vDJyHGDL+gk/hg6EtEOQ4x2K88In2ZDYqBd0QJd0WK/k80+sJeg/mSNs QacpHUOJ1k3irZDhMuczZw8CqDYUtLARGI+sQf8vbyLK92/FoAJEjhiqyIwU5M0CR2DJ snDX4xctr8eQvjaKD0SR2gnmCINwMSSMDXLJdWvTHCNQwkTYOD/YBrB+50Q4+aTd1H7F S9LsENfreuyVFXfqovEURH77aZjJF8zXiXf5cMjOqP3mv32628B60Y+ZSdPCXjiYt8hP JmTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0V5rjDPK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qc4si4379728ejb.369.2020.06.19.09.44.48; Fri, 19 Jun 2020 09:45:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0V5rjDPK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388583AbgFSOof (ORCPT + 99 others); Fri, 19 Jun 2020 10:44:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:35354 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387581AbgFSOoF (ORCPT ); Fri, 19 Jun 2020 10:44:05 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 96D5D21582; Fri, 19 Jun 2020 14:44:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592577845; bh=GxwRv2tbHq5ZnBVPYPhzElcHE23j1SRyKV5iDO0mFho=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0V5rjDPKRWkZc0sKqxBDzT+P09503m8PkfIbpg28McxpYcVgKhi6R9FVUSsgPwT7I Y3wv366EQDJXaZeoheEefjSWcs9J2VsTeGwIWy/RUX/133pYmdlfGYGdvcohd1HUoH 4ViJkYQ7T6G6Xm2ik1ubGiviAVWAAGJPdvPUIv1A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Larry Finger , Kalle Valo Subject: [PATCH 4.9 112/128] b43_legacy: Fix connection problem with WPA3 Date: Fri, 19 Jun 2020 16:33:26 +0200 Message-Id: <20200619141626.061902739@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200619141620.148019466@linuxfoundation.org> References: <20200619141620.148019466@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Larry Finger commit 6a29d134c04a8acebb7a95251acea7ad7abba106 upstream. Since the driver was first introduced into the kernel, it has only handled the ciphers associated with WEP, WPA, and WPA2. It fails with WPA3 even though mac80211 can handle those additional ciphers in software, b43legacy did not report that it could handle them. By setting MFP_CAPABLE using ieee80211_set_hw(), the problem is fixed. With this change, b43legacy will handle the ciphers it knows in hardware, and let mac80211 handle the others in software. It is not necessary to use the module parameter NOHWCRYPT to turn hardware encryption off. Although this change essentially eliminates that module parameter, I am choosing to keep it for cases where the hardware is broken, and software encryption is required for all ciphers. Signed-off-by: Larry Finger Cc: Stable Signed-off-by: Kalle Valo Link: https://lore.kernel.org/r/20200526155909.5807-3-Larry.Finger@lwfinger.net Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/broadcom/b43legacy/main.c | 1 + 1 file changed, 1 insertion(+) --- a/drivers/net/wireless/broadcom/b43legacy/main.c +++ b/drivers/net/wireless/broadcom/b43legacy/main.c @@ -3835,6 +3835,7 @@ static int b43legacy_wireless_init(struc /* fill hw info */ ieee80211_hw_set(hw, RX_INCLUDES_FCS); ieee80211_hw_set(hw, SIGNAL_DBM); + ieee80211_hw_set(hw, MFP_CAPABLE); /* Allow WPA3 in software */ hw->wiphy->interface_modes = BIT(NL80211_IFTYPE_AP) |