Received: by 2002:a25:2c96:0:0:0:0:0 with SMTP id s144csp840394ybs; Sun, 24 May 2020 23:58:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyxMjtMtyPT1sBIcJkdfoCajD9d0mSKOs/GfvqOmQH9Q9VOt53mBO7JYMS5z4jue9oDpHFN X-Received: by 2002:aa7:d8d3:: with SMTP id k19mr13987768eds.348.1590389893421; Sun, 24 May 2020 23:58:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590389893; cv=none; d=google.com; s=arc-20160816; b=ZUgoF8b8+IK1B9FCR4qGJLnDH7VFWvlQdhNL44I0Uv4QhLEMbtvLU5hvKcLqWcMZYJ ieEdYnEgaKMZSnw30POzIj2f/leALkXelnlTLvgnLhyCb0ac9eOy/W4RxrpcjlVcNONi pzIuKrlTeSh8QTcr50B9dNipjIlUYPJ66M8rO1iOuk24bW/5zMySIYHINQykOlSicx37 EKjBByFr90sH17/12bVmgPwHhce9g2jbi2fi3qGCiiIxK/raYk/hesbU6iUtaasCF2g7 J/kZaGC37Y9W8f1VIS1GF/gphLTBxqQe4co/YZaGbhdMO7rqnpS82vZxegCXbz5tb9Sm VDzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:message-id:in-reply-to:date:references:subject:cc:to :from:dmarc-filter:dkim-signature; bh=Me3GjJcJUW2Ik2X6lU5cKB4Pphg+XjttBxGjgK4qBO8=; b=vLqrqM71SdBK+NhGMgQ+yIBOVWoqq9w/3rgeyo8QPapeuo1Jmjlx2R1McFtmD1Ueb/ cmDJbnbY/lCwP0lyWn1RaxbnPYjzZcR7yerEF/kutxwzX6cwizcCtVvQHM+D3WCcS+oj t8dhP9eBe+v2HgLaVVmkPicG5WcymcBcBwmsQIWWOj96s/+IobC8kg50Zfn8noJtzIt8 Che5W57Obx4/7ILDTKXyHoIcXIT0n1hAL+12NdQFBUv8piL0ADLLDlPnqblkOJ0ohUxi GCze6WVRgfDF3vPkJQ1oGOGvJOo7PFGItnJxgD0oJE0RNBk3EeF6jU5Igd+0/2GYvu6E Q/+g== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=Q7yS6uf0; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i12si9357894ejx.447.2020.05.24.23.57.37; Sun, 24 May 2020 23:58:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=Q7yS6uf0; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388935AbgEYG4j (ORCPT + 99 others); Mon, 25 May 2020 02:56:39 -0400 Received: from mail26.static.mailgun.info ([104.130.122.26]:43622 "EHLO mail26.static.mailgun.info" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388385AbgEYG4i (ORCPT ); Mon, 25 May 2020 02:56:38 -0400 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1590389797; h=Content-Transfer-Encoding: Content-Type: MIME-Version: Message-ID: In-Reply-To: Date: References: Subject: Cc: To: From: Sender; bh=Me3GjJcJUW2Ik2X6lU5cKB4Pphg+XjttBxGjgK4qBO8=; b=Q7yS6uf0bf0Azbgz6M5hw/341/uUYyMbTbScR0cz/pbIKAPxHkN/vdrKsRX269uxCOM5DedA Fkv3FAPyvp7G0qh0uL2qSt0RyxaHGFbm22tFSpc4jhecqL16+K5dX/MwKSqUF8Qd/WfuAtW2 vrqdHYWFOPi4B81xV5aKGgvFscU= X-Mailgun-Sending-Ip: 104.130.122.26 X-Mailgun-Sid: WyI3YTAwOSIsICJsaW51eC13aXJlbGVzc0B2Z2VyLmtlcm5lbC5vcmciLCAiYmU5ZTRhIl0= Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by mxa.mailgun.org with ESMTP id 5ecb6c23.7f82d4197030-smtp-out-n05; Mon, 25 May 2020 06:56:35 -0000 (UTC) Received: by smtp.codeaurora.org (Postfix, from userid 1001) id 6DF75C433CB; Mon, 25 May 2020 06:56:35 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=2.0 tests=ALL_TRUSTED,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.0 Received: from potku.adurom.net (88-114-240-156.elisa-laajakaista.fi [88.114.240.156]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: kvalo) by smtp.codeaurora.org (Postfix) with ESMTPSA id EC1F4C433C9; Mon, 25 May 2020 06:56:32 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org EC1F4C433C9 Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; spf=none smtp.mailfrom=kvalo@codeaurora.org From: Kalle Valo To: =?utf-8?Q?Rafa=C5=82_Mi=C5=82ecki?= Cc: Larry Finger , Rui Salvaterra , "linux-wireless\@vger.kernel.org" , Michael =?utf-8?Q?B=C3=BCsch?= , b43-dev Subject: Re: [BUG?] b43: can't connect to WPA3 network (nohwcrypt=1) References: <20200521124608.4b5c78f2@wiggum> <20200521134011.656381ad@wiggum> <2b22b778-2f89-9c42-93a0-5c165de26f35@lwfinger.net> <20200522121910.254aefc1@wiggum> <87a720gpfb.fsf@tynnyri.adurom.net> <8252e6a1-b83c-64eb-2503-2686374216ae@lwfinger.net> Date: Mon, 25 May 2020 09:56:30 +0300 In-Reply-To: (=?utf-8?Q?=22Rafa=C5=82_Mi=C5=82ecki=22's?= message of "Sat, 23 May 2020 23:17:14 +0200") Message-ID: <87o8qca4f5.fsf@codeaurora.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.5 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Rafa=C5=82 Mi=C5=82ecki writes: > On Fri, 22 May 2020 at 23:06, Larry Finger wr= ote: >> On 5/22/20 3:40 PM, Rui Salvaterra wrote: >> > On Fri, 22 May 2020 at 19:02, Larry Finger = wrote: >> >> >> >> Rui, >> >> >> >> Does this one-line >> >> patch work for WPA3 without setting the nohwcrypt option? >> > >> > Ok, so it "works", but I don't know what actually happened (I didn't >> > do any performance testing yet). I got this relevant output on my >> > kmsg=E2=80=A6 >> > >> > rui@mcnugget:~$ dmesg | awk '(/80211/ || /b43/ || /wlan0/)' >> > [ 0.000000] Kernel command line: BOOT_IMAGE=3D/vmlinux-5.7.0-rc6+ >> > root=3DUUID=3D849bbef3-007e-491e-b187-9e259680c2e2 ro mitigations=3Doff >> > b43.qos=3D0 b43.verbose=3D3 usbhid.mousepoll=3D16 quiet splash >> > [ 0.035705] b43-pci-bridge 0001:10:12.0: enabling device (0004 -> 0= 006) >> > [ 0.210299] b43-pci-bridge 0001:10:12.0: Sonics Silicon Backplane >> > found on PCI device 0001:10:12.0 >> > [ 3.361908] b43-phy0: Broadcom 4318 WLAN found (core revision 9) >> > [ 3.454235] b43-phy0: Found PHY: Analog 3, Type 2 (G), Revision 7 >> > [ 3.454259] b43-phy0: Found Radio: Manuf 0x17F, ID 0x2050, Revision >> > 8, Version 0 >> > [ 3.485125] ieee80211 phy0: Selected rate control algorithm 'minstr= el_ht' >> > [ 28.697945] b43-phy0: Loading firmware version 666.2 (2011-02-23 01= :15:07) >> > [ 28.730381] b43-phy0 debug: Chip initialized >> > [ 28.731389] b43-phy0 debug: 32-bit DMA initialized >> > [ 28.731400] b43-phy0 debug: QoS disabled >> > [ 28.792272] b43-phy0 debug: Wireless interface started >> > [ 28.820318] b43-phy0 debug: Adding Interface type 2 >> > [ 33.944771] wlan0: authenticate with 04:f0:21:24:28:44 >> > [ 33.970449] wlan0: send auth to 04:f0:21:24:28:44 (try 1/3) >> > [ 34.026222] wlan0: authenticate with 04:f0:21:24:28:44 >> > [ 34.026241] wlan0: send auth to 04:f0:21:24:28:44 (try 1/3) >> > [ 34.028522] wlan0: authenticated >> > [ 34.043256] wlan0: associate with 04:f0:21:24:28:44 (try 1/3) >> > [ 34.046946] wlan0: RX AssocResp from 04:f0:21:24:28:44 (capab=3D0x4= 31 >> > status=3D30 aid=3D1) >> > [ 34.046964] wlan0: 04:f0:21:24:28:44 rejected association >> > temporarily; comeback duration 1000 TU (1024 ms) >> > [ 35.122051] wlan0: associate with 04:f0:21:24:28:44 (try 2/3) >> > [ 35.125547] wlan0: RX AssocResp from 04:f0:21:24:28:44 (capab=3D0x4= 31 >> > status=3D0 aid=3D1) >> > [ 35.125808] wlan0: associated >> > [ 35.268256] b43-phy0 debug: Using hardware based encryption for >> > keyidx: 0, mac: 04:f0:21:24:28:44 >> > [ 35.268762] b43-phy0 debug: Using hardware based encryption for >> > keyidx: 2, mac: ff:ff:ff:ff:ff:ff >> > [ 35.358586] wlan0: failed to set key (5, ff:ff:ff:ff:ff:ff) to hard= ware (-22) >> > [ 35.358977] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready >> > [ 87.283220] wlan0: failed to set key (4, ff:ff:ff:ff:ff:ff) to hard= ware (-22) >> > [ 87.283521] b43-phy0 debug: Using hardware based encryption for >> > keyidx: 1, mac: ff:ff:ff:ff:ff:ff >> > rui@mcnugget:~$ >> > >> > Meanwhile, iw list shows all the possible software cyphers: >> > >> > Supported Ciphers: >> > * WEP40 (00-0f-ac:1) >> > * WEP104 (00-0f-ac:5) >> > * TKIP (00-0f-ac:2) >> > * CCMP-128 (00-0f-ac:4) >> > * CCMP-256 (00-0f-ac:10) >> > * GCMP-128 (00-0f-ac:8) >> > * GCMP-256 (00-0f-ac:9) >> > * CMAC (00-0f-ac:6) >> > * CMAC-256 (00-0f-ac:13) >> > * GMAC-128 (00-0f-ac:11) >> > * GMAC-256 (00-0f-ac:12) >> > >> > What I'm not sure is if b43 is doing all the cyphers it supports in >> > hardware and falling back to software just for the unsupported ones, >> > or if it's doing everything in software. >> >> It will do supported ciphers in hardware, and unsupported using software= . The >> patch tells mac80211 that we will accept the newer ciphers, then in the >> set_key() callback, we tell it whether the current type will be handled = in >> hardware. Operations will be transparent. I will keep the nohwcrypt opti= on just >> in case someone has a hardware malfunction that prohibits hardware use f= or all >> ciphers, but it will not be needed in cases like yours. Performance will= be as >> you did earlier. > > Nice work Larry, thank you! Indeed, this is a perfect solution. --=20 https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatc= hes