Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp786919ybt; Fri, 19 Jun 2020 13:48:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwiz/z47Jzj3Hhr+/Aal1eNG+kr9DM5mJQHTG9HzqA++XszuwecKSDsfj0F4NECdedFt4Wz X-Received: by 2002:a50:e1c5:: with SMTP id m5mr5236601edl.47.1592599718295; Fri, 19 Jun 2020 13:48:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592599718; cv=none; d=google.com; s=arc-20160816; b=DLG9Wby7k8Em1HZyfHQePwFNj8CJzLKv3kAcPaKwQiLlQtZF6bTnHnosLVxjOz+lea KJHWa3QYAtpsnA/m+CcV3fCKz/mkqaXsLOf9JbHCRT5umpVRIJXqJGd/zCFs2F9nYwMS fbZBG6TKegsEE5PLK0pYnVtqLp0FrAvnOyCFDqBMwK6WpK59ssN7dRxo4MI7Ps3f8Y7S /CaGV52MLl+wtBkNGJNLHVe+pp5sjhLeXZAeOtKq+qZH2rB3WXLTBVVLq5OfoJkCdBtJ OyCbzirlQ3wXK6LK/l8homy3x+songo61zUaZdN9mbTLjVd1aBqNcVwSK1upgnRELuVT cGhg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JL9QBnV/LwM8Uzr2LCtX/DfPPbTzS47M94J1hsgufcI=; b=1JctvdelX11RpzS5mhd8IZf+p2vl5vzxQcAChF207WojLyb+1laDAGfRIxWLh4K+97 /m9dYX1EGW20OA1xomstxQrvmTvGyx7r37fbHi6HuHHKZmioBrdRFiesUx4a1U7YSPQ3 FhyMAIcsXjFWRP32YkOjr2Bg+LlJaaJ/Pz5lS6B9hJFACv56rC4H2tdT8kOqFGNwohpT Agq/QNiFEB1AHEnBScw31oryb4RaWybp2DZXvE5mmya13vsywCdLo6VbagNl+S+WBnKn vclqM1ot8HoJyztAYuGDwnQOMIvPBmgnbf6SvIave1zu1doN0zwq6hA2iAJQkaUV0DiD 3aOw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PqEEKhe9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id by8si4448752edb.354.2020.06.19.13.48.10; Fri, 19 Jun 2020 13:48:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PqEEKhe9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391053AbgFSPDq (ORCPT + 99 others); Fri, 19 Jun 2020 11:03:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:60168 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390916AbgFSPDY (ORCPT ); Fri, 19 Jun 2020 11:03:24 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D9E33206DB; Fri, 19 Jun 2020 15:03:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592579004; bh=GxwRv2tbHq5ZnBVPYPhzElcHE23j1SRyKV5iDO0mFho=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PqEEKhe9h74vmUTerwqRsCA+q1Vi6g3tVqHAVv5OkM8DYyn8jiPQXdUxri9P+BcEA fT5F8QA7M2qvUY1x44yDDxLKuugY6lUKtjzXF5FYHvYgtoWJMlIjF8Iuirx6GPTgQF 09HwYa7T0ozzpYaRTHuzAmUQkbhC7pkJ/5OzVqtI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Larry Finger , Kalle Valo Subject: [PATCH 4.19 239/267] b43_legacy: Fix connection problem with WPA3 Date: Fri, 19 Jun 2020 16:33:44 +0200 Message-Id: <20200619141700.161928781@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200619141648.840376470@linuxfoundation.org> References: <20200619141648.840376470@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Larry Finger commit 6a29d134c04a8acebb7a95251acea7ad7abba106 upstream. Since the driver was first introduced into the kernel, it has only handled the ciphers associated with WEP, WPA, and WPA2. It fails with WPA3 even though mac80211 can handle those additional ciphers in software, b43legacy did not report that it could handle them. By setting MFP_CAPABLE using ieee80211_set_hw(), the problem is fixed. With this change, b43legacy will handle the ciphers it knows in hardware, and let mac80211 handle the others in software. It is not necessary to use the module parameter NOHWCRYPT to turn hardware encryption off. Although this change essentially eliminates that module parameter, I am choosing to keep it for cases where the hardware is broken, and software encryption is required for all ciphers. Signed-off-by: Larry Finger Cc: Stable Signed-off-by: Kalle Valo Link: https://lore.kernel.org/r/20200526155909.5807-3-Larry.Finger@lwfinger.net Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/broadcom/b43legacy/main.c | 1 + 1 file changed, 1 insertion(+) --- a/drivers/net/wireless/broadcom/b43legacy/main.c +++ b/drivers/net/wireless/broadcom/b43legacy/main.c @@ -3835,6 +3835,7 @@ static int b43legacy_wireless_init(struc /* fill hw info */ ieee80211_hw_set(hw, RX_INCLUDES_FCS); ieee80211_hw_set(hw, SIGNAL_DBM); + ieee80211_hw_set(hw, MFP_CAPABLE); /* Allow WPA3 in software */ hw->wiphy->interface_modes = BIT(NL80211_IFTYPE_AP) |