Received: by 2002:a25:d80d:0:0:0:0:0 with SMTP id p13csp286870ybg; Sat, 23 May 2020 14:21:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyXUeOwPMHYpUq1uMXdVsQqnP282qmus3k4hy9O4hh37CT3nnhCnK5j3asbxMstHHgZ6KOI X-Received: by 2002:a17:906:a18b:: with SMTP id s11mr13053986ejy.268.1590268904924; Sat, 23 May 2020 14:21:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590268904; cv=none; d=google.com; s=arc-20160816; b=KbvSrbkuNPwcJFqSc1nqYw4/wn2CoAIQCPb3EiLuYMZQo3BXVbukYIAfKBERlPZ32T IdjHE1DKcII3Ub67PhGgn5qmXfq72wvq6TRjtCrPTgWJ5Yu0uFvTZDU27TWo436M8vQj PEBLkLDP9UpCwaYGwKdxbyyyQ6tcNgMN9/SOkxX94MYOrQlzImN4eEvIa+LAODP8Hc5e 05biYSVKvKeYDzL5y90zFLNUf2O9X0Hc/brjy2Inlu1yEkbgpgyZX5WWcsusrnd4UFMY seUT+fPBd+vOKp2dTEh2CIFIK6uEcOAMEKKyQ0iwETCHHJQEwOix3p8CqMCZQ8KxCyW9 c2Zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=JLqHLg7jE9fD4cf0fKA2yrUDcwGrJXd29V4hmwSHA4w=; b=G3Tht40G8EZPYfkSt/vpUCnsiou3/MxpX0oc1QwrRV20YUf1qyJqiEeliqIg+Cggrt IckjNqht7+/1rOtLkXvymNYWIIzYFe1eaGT+on/c35xNxUW0pHi/6GRaGJNPQHvtv5mn 5B++l6wl2ThC8vl0sHTGZGMGn3jXy5MvDmJDHXyF3Pp/a/UhWjsX4dmD7SBIHMQXEVEw 2F+loSXq3Myw2COtizMwNz6QqgagLzADuEjev7lA2sXaO1x8TukMG3LTBHO8VkG0bPyX S0lAKed8NnrEq6pI98U/cEIvyjU916Q8k60hlVouLXN2XO/ilroXwA1sF4ihGvKKk86T gkhQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=D3rlJd4t; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l4si6602928edl.169.2020.05.23.14.20.48; Sat, 23 May 2020 14:21:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=D3rlJd4t; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387998AbgEWVR1 (ORCPT + 99 others); Sat, 23 May 2020 17:17:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58296 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387586AbgEWVR1 (ORCPT ); Sat, 23 May 2020 17:17:27 -0400 Received: from mail-yb1-xb41.google.com (mail-yb1-xb41.google.com [IPv6:2607:f8b0:4864:20::b41]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BFE14C061A0E for ; Sat, 23 May 2020 14:17:26 -0700 (PDT) Received: by mail-yb1-xb41.google.com with SMTP id r23so2727263ybd.10 for ; Sat, 23 May 2020 14:17:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=JLqHLg7jE9fD4cf0fKA2yrUDcwGrJXd29V4hmwSHA4w=; b=D3rlJd4tBakt7gdP+KhCrJ6Q+mHtayhT77WNPO5+s82D09DRxyy3xXJKweKuQPAEBx r6kJOU+gTd15l5VJHuh5ormCORW/mtkuntnUncxglvCkI1IiiRqR/n1T+NXmjdCgeYTN zfFkA1RwqHUgZOY8+7yIcfLNtK7VMGbPP5+5iRjE0S+9wBR6Bg+wkBL38K4hfxPmQPSN xbNH7yPz+wRcMbkXVJBJJ/LEwu4QoPdu/9MBtB9C2M04X8FlnncviEfYo8OHygtcimiJ hPGKPzAxynJNOXo10WJ+3SH+kgwiUgMVH5k80gljwIjBbsbpOQQFF9nANt9t2JzdpNyK u15A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=JLqHLg7jE9fD4cf0fKA2yrUDcwGrJXd29V4hmwSHA4w=; b=maFky9yzEQJ/TskJ9uTb/Z6H/Trf9J2iX5RrMd8HXafn9jNqCZYEYDJFeK1sLgJoQL 9Typ5/yOcozIE4PH+gAHOZ8P2Di16kGz6FB4oD2mV4W2lZiMi/hS+K/6KCrBd2B2Vrkl NPGP/2G4m79n4g2G9ZpPaV+Xyqs2lX5CFai05DJiI1Rax88+qrJvG58yf/ofUeKUx4Ra mLuVhjPJRwNPXMLAZDh4uLXh9e4ZkT9kHMfMTo+x2iZV1bEC/SyrfS7Golh7SWfSqXvo mNyzNJA0UvIXFmomzia7r5a9MpN8LiRnigpKCxm8pqFa8xG0isdH4CfpSEDIFHgyLhZr +VFg== X-Gm-Message-State: AOAM532AHcfokwiVKoagUuzmXEUyIpBCicZYquI4VrhyAkXglT+rYTTk 5mNqWEHNWc18mZxtBe9LB85l0bYefq/m1RGp5II= X-Received: by 2002:a25:c1c5:: with SMTP id r188mr32692127ybf.240.1590268645891; Sat, 23 May 2020 14:17:25 -0700 (PDT) MIME-Version: 1.0 References: <20200521124608.4b5c78f2@wiggum> <20200521134011.656381ad@wiggum> <2b22b778-2f89-9c42-93a0-5c165de26f35@lwfinger.net> <20200522121910.254aefc1@wiggum> <87a720gpfb.fsf@tynnyri.adurom.net> <8252e6a1-b83c-64eb-2503-2686374216ae@lwfinger.net> In-Reply-To: <8252e6a1-b83c-64eb-2503-2686374216ae@lwfinger.net> From: =?UTF-8?B?UmFmYcWCIE1pxYJlY2tp?= Date: Sat, 23 May 2020 23:17:14 +0200 Message-ID: Subject: Re: [BUG?] b43: can't connect to WPA3 network (nohwcrypt=1) To: Larry Finger Cc: Rui Salvaterra , "linux-wireless@vger.kernel.org" , =?UTF-8?Q?Michael_B=C3=BCsch?= , Kalle Valo , b43-dev Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Fri, 22 May 2020 at 23:06, Larry Finger wrot= e: > On 5/22/20 3:40 PM, Rui Salvaterra wrote: > > On Fri, 22 May 2020 at 19:02, Larry Finger = wrote: > >> > >> Rui, > >> > >> Does this one-line > >> patch work for WPA3 without setting the nohwcrypt option? > > > > Ok, so it "works", but I don't know what actually happened (I didn't > > do any performance testing yet). I got this relevant output on my > > kmsg=E2=80=A6 > > > > rui@mcnugget:~$ dmesg | awk '(/80211/ || /b43/ || /wlan0/)' > > [ 0.000000] Kernel command line: BOOT_IMAGE=3D/vmlinux-5.7.0-rc6+ > > root=3DUUID=3D849bbef3-007e-491e-b187-9e259680c2e2 ro mitigations=3Doff > > b43.qos=3D0 b43.verbose=3D3 usbhid.mousepoll=3D16 quiet splash > > [ 0.035705] b43-pci-bridge 0001:10:12.0: enabling device (0004 -> 00= 06) > > [ 0.210299] b43-pci-bridge 0001:10:12.0: Sonics Silicon Backplane > > found on PCI device 0001:10:12.0 > > [ 3.361908] b43-phy0: Broadcom 4318 WLAN found (core revision 9) > > [ 3.454235] b43-phy0: Found PHY: Analog 3, Type 2 (G), Revision 7 > > [ 3.454259] b43-phy0: Found Radio: Manuf 0x17F, ID 0x2050, Revision > > 8, Version 0 > > [ 3.485125] ieee80211 phy0: Selected rate control algorithm 'minstre= l_ht' > > [ 28.697945] b43-phy0: Loading firmware version 666.2 (2011-02-23 01:= 15:07) > > [ 28.730381] b43-phy0 debug: Chip initialized > > [ 28.731389] b43-phy0 debug: 32-bit DMA initialized > > [ 28.731400] b43-phy0 debug: QoS disabled > > [ 28.792272] b43-phy0 debug: Wireless interface started > > [ 28.820318] b43-phy0 debug: Adding Interface type 2 > > [ 33.944771] wlan0: authenticate with 04:f0:21:24:28:44 > > [ 33.970449] wlan0: send auth to 04:f0:21:24:28:44 (try 1/3) > > [ 34.026222] wlan0: authenticate with 04:f0:21:24:28:44 > > [ 34.026241] wlan0: send auth to 04:f0:21:24:28:44 (try 1/3) > > [ 34.028522] wlan0: authenticated > > [ 34.043256] wlan0: associate with 04:f0:21:24:28:44 (try 1/3) > > [ 34.046946] wlan0: RX AssocResp from 04:f0:21:24:28:44 (capab=3D0x43= 1 > > status=3D30 aid=3D1) > > [ 34.046964] wlan0: 04:f0:21:24:28:44 rejected association > > temporarily; comeback duration 1000 TU (1024 ms) > > [ 35.122051] wlan0: associate with 04:f0:21:24:28:44 (try 2/3) > > [ 35.125547] wlan0: RX AssocResp from 04:f0:21:24:28:44 (capab=3D0x43= 1 > > status=3D0 aid=3D1) > > [ 35.125808] wlan0: associated > > [ 35.268256] b43-phy0 debug: Using hardware based encryption for > > keyidx: 0, mac: 04:f0:21:24:28:44 > > [ 35.268762] b43-phy0 debug: Using hardware based encryption for > > keyidx: 2, mac: ff:ff:ff:ff:ff:ff > > [ 35.358586] wlan0: failed to set key (5, ff:ff:ff:ff:ff:ff) to hardw= are (-22) > > [ 35.358977] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready > > [ 87.283220] wlan0: failed to set key (4, ff:ff:ff:ff:ff:ff) to hardw= are (-22) > > [ 87.283521] b43-phy0 debug: Using hardware based encryption for > > keyidx: 1, mac: ff:ff:ff:ff:ff:ff > > rui@mcnugget:~$ > > > > Meanwhile, iw list shows all the possible software cyphers: > > > > Supported Ciphers: > > * WEP40 (00-0f-ac:1) > > * WEP104 (00-0f-ac:5) > > * TKIP (00-0f-ac:2) > > * CCMP-128 (00-0f-ac:4) > > * CCMP-256 (00-0f-ac:10) > > * GCMP-128 (00-0f-ac:8) > > * GCMP-256 (00-0f-ac:9) > > * CMAC (00-0f-ac:6) > > * CMAC-256 (00-0f-ac:13) > > * GMAC-128 (00-0f-ac:11) > > * GMAC-256 (00-0f-ac:12) > > > > What I'm not sure is if b43 is doing all the cyphers it supports in > > hardware and falling back to software just for the unsupported ones, > > or if it's doing everything in software. > It will do supported ciphers in hardware, and unsupported using software.= The > patch tells mac80211 that we will accept the newer ciphers, then in the > set_key() callback, we tell it whether the current type will be handled i= n > hardware. Operations will be transparent. I will keep the nohwcrypt optio= n just > in case someone has a hardware malfunction that prohibits hardware use fo= r all > ciphers, but it will not be needed in cases like yours. Performance will = be as > you did earlier. Nice work Larry, thank you! --=20 Rafa=C5=82