Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp995640ybt; Fri, 19 Jun 2020 21:00:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwHrheiG92nNmuk7lECiAZVWGnBFlGpHBRGtdp9FA1sPQOeUuDsOhUJRrWe0q6a6EX/mcbC X-Received: by 2002:a17:906:b59:: with SMTP id v25mr6700622ejg.114.1592625603989; Fri, 19 Jun 2020 21:00:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592625603; cv=none; d=google.com; s=arc-20160816; b=qtS2MhEs0OBR0jafwgh7tKEVBMR1vppJl31CyZ1AoYItnrJyEvS4TrnzO+OiuMMTyd eWkQKzb7o4Ql5DEft0AdoCeg80HQT3IKfeYLp7ZkjS9/jFSW9YNpWvDOfGUxYrt1nLYM hj8SzmpmF5ybUNh9uY900EssKNwJaWoDGcj7yPTapeuyvL+NP1VU59aoeUV1B3YUc8z4 7uxg2o1cRD1abLOzAq7UV9bgb4VE4wkhifvrE1sxmSf87Kn4xfg6mL+nWyydPSSytAHG tYepKnrSLogRAA8KNvBiCwdk+fhCHAMKNM7tUHNloLyTcWExBq5/FdLemRmFdKU0PZ1k gfvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JL9QBnV/LwM8Uzr2LCtX/DfPPbTzS47M94J1hsgufcI=; b=K+nWsJADofVtiNK93SX5NvxHS5mxMTRcs9PcyTgqqlVcENJG242lP51VwntUjigQHB 99dU0ZUgP5IyU5frcZJgPwqTIouYneuf10QAxRKL90CZ6EW60cGtxmsiXGgUIvKK7eO8 mf/zkbqsbtREuMmTy2CKCzVh4AY/zD38rv69E3NpZJ33tGMg3jtwmYa6tjuzOLotK4y2 y/o1HOBtVcRJ4IoF8UYVaZmblP38AwVFmLrvU0yglSAlfRMjRg9WSThJAv/DpqxRczsF ykr16bdaGSCgrkTPZsyxQy5trIuDF4FYNVpZqVg+P5JKisHy7tplcMaxUUJtTWgqp2aO JlCw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qH5jQRcn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gy17si4645255ejb.244.2020.06.19.20.59.42; Fri, 19 Jun 2020 21:00:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qH5jQRcn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2395097AbgFSQce (ORCPT + 99 others); Fri, 19 Jun 2020 12:32:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:45920 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388794AbgFSOwB (ORCPT ); Fri, 19 Jun 2020 10:52:01 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4CAFC217D8; Fri, 19 Jun 2020 14:52:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592578321; bh=GxwRv2tbHq5ZnBVPYPhzElcHE23j1SRyKV5iDO0mFho=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qH5jQRcnpxkRPnwPMsfrKPS+vqHl6crV9Dd69vqgVjKPIYM6NRch6xpmBw41KnD8i CkTuvM19OiExj4T9HYbnsjGjy+PGV6ZeT2LDisrOvpCFaJyJMsjXIZaRTtnkzQv03Z fKOXcDChlcXJ9RPQ80HE8mRwAV1O1SD3otUdEzdY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Larry Finger , Kalle Valo Subject: [PATCH 4.14 169/190] b43_legacy: Fix connection problem with WPA3 Date: Fri, 19 Jun 2020 16:33:34 +0200 Message-Id: <20200619141642.224351708@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200619141633.446429600@linuxfoundation.org> References: <20200619141633.446429600@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Larry Finger commit 6a29d134c04a8acebb7a95251acea7ad7abba106 upstream. Since the driver was first introduced into the kernel, it has only handled the ciphers associated with WEP, WPA, and WPA2. It fails with WPA3 even though mac80211 can handle those additional ciphers in software, b43legacy did not report that it could handle them. By setting MFP_CAPABLE using ieee80211_set_hw(), the problem is fixed. With this change, b43legacy will handle the ciphers it knows in hardware, and let mac80211 handle the others in software. It is not necessary to use the module parameter NOHWCRYPT to turn hardware encryption off. Although this change essentially eliminates that module parameter, I am choosing to keep it for cases where the hardware is broken, and software encryption is required for all ciphers. Signed-off-by: Larry Finger Cc: Stable Signed-off-by: Kalle Valo Link: https://lore.kernel.org/r/20200526155909.5807-3-Larry.Finger@lwfinger.net Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/broadcom/b43legacy/main.c | 1 + 1 file changed, 1 insertion(+) --- a/drivers/net/wireless/broadcom/b43legacy/main.c +++ b/drivers/net/wireless/broadcom/b43legacy/main.c @@ -3835,6 +3835,7 @@ static int b43legacy_wireless_init(struc /* fill hw info */ ieee80211_hw_set(hw, RX_INCLUDES_FCS); ieee80211_hw_set(hw, SIGNAL_DBM); + ieee80211_hw_set(hw, MFP_CAPABLE); /* Allow WPA3 in software */ hw->wiphy->interface_modes = BIT(NL80211_IFTYPE_AP) |