Received: by 2002:a05:7412:8598:b0:f9:33c2:5753 with SMTP id n24csp365290rdh; Tue, 19 Dec 2023 00:57:28 -0800 (PST) X-Google-Smtp-Source: AGHT+IEmAL+tTP6RSOrzZXd9IpuhjdiHn1IXBUlpqNWQfHPgqHtba4J8ruEVsgbjNSfwKt4mw5u5 X-Received: by 2002:a0d:ccce:0:b0:5d7:1940:b39d with SMTP id o197-20020a0dccce000000b005d71940b39dmr14228728ywd.105.1702976248651; Tue, 19 Dec 2023 00:57:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702976248; cv=none; d=google.com; s=arc-20160816; b=sqG9lOsqmrxwyC/ZNY8yGLyePswg3UrSmwVbEc7fd7T6XRKOv0ApbObcsNe+CzRt12 Hk8A+CpU2RWMWbW03fKR6mngkxnEY1ICd0A66NmmkXw/p0uK9BwNkW824HzOC+AokFBy r87cGEIM53wNC7QKylZS/hZG2xtpgNGwJtdCze+s3fixa6CkpAAw5m4DPTTjqpxiO2Hv df+Mob/7OhkqmEHecf0yfmQdekDdJU8bVrkT3oh4nUCWqQm6xk1N3osIw98Gp0PPT02P INmul5qyD52WbOKjlJ0ZlMZQetCYWJeGWLT54s+80RhDxmS8F/UELxQDyPj7aMVoOSM6 raBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :user-agent:message-id:in-reply-to:date:references:subject:cc:to :from:dkim-signature; bh=s61d7wGNdqc39AzDQZu+Z5IAh6n7JCrz7XRqBKqd9iE=; fh=bnNLk8Jlq0x+y+KbrjALQ974eh23fAaJpW0mZxR/Vjo=; b=ZDg3pVjjwKk0h+TPyqCfGzWvBsKlP3aoevlmf1gXFZshnOMEawHsunhcDbznSQsncD ELBlKj8KCKBzxdDe/MMZBv2EJd2XQrBBmdNub9ZOfQicNRVj+J9k3Mhrcvu7AIdbO0pb WbLlTPLcE1e8NW6tsxAZIozW9l2b8CV1O5s1etXf042IrBiMYJm7VA/QzsZCnY8PkdUE w1LKvBAct1CmV541uhE0pfRVQyzyx60mgFnHRe90769FS6Vb+pTzfpApm6r2lL+3Tmdw A5L4V/x9ZVgEfgeF+bgWN5q8d3xj09w2Qp4zPx5T9u4kGUjWqdyIwcCEAn/d2Xov55qb aouw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DousJW5s; spf=pass (google.com: domain of linux-wireless+bounces-981-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-wireless+bounces-981-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id i15-20020a0cf38f000000b0067f24ee88cfsi7864393qvk.472.2023.12.19.00.57.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 Dec 2023 00:57:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless+bounces-981-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DousJW5s; spf=pass (google.com: domain of linux-wireless+bounces-981-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-wireless+bounces-981-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 526251C23376 for ; Tue, 19 Dec 2023 08:57:28 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5D4FC11CB3; Tue, 19 Dec 2023 08:57:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="DousJW5s" X-Original-To: linux-wireless@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2D87713FE3; Tue, 19 Dec 2023 08:57:21 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 646F1C433C7; Tue, 19 Dec 2023 08:57:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1702976241; bh=uFQlqLQP1G7wjfdANmp5BLEZwEILv8d1iFYDF7MRx6I=; h=From:To:Cc:Subject:References:Date:In-Reply-To:From; b=DousJW5sjM7HJvwYXPYiinIAEyL5QyeWPfBccOPDbCW9/vX6nAuGHK8CYUk92nNCr WVvnmY7iNQAXEyVd0FGlNlwBSFhyPA10aY+f9fEL3jatPPRT2zHJUNfbWHnhH3EQan wEJ8M3i4AF5vXnFdOxVdQPCcSAcnYlUbthzzkclg8btFNWh+fnsgXZuhplku7n/kZF WHHLO/DYbF/MnNgm1uDsaGt2DhJ9txxWy3+DDwR1uVKQflE1+sWs8vkkCfpjFZKj6a /G8dcSSrNWlHFDBSG8FthDg8VyyHeEHi1EOSg8AtmrH2s4evGToRVDJOdX6hl9vWP8 l7LJlbtqdEzCg== From: Kalle Valo To: Arend Van Spriel Cc: Hector Martin , Arend van Spriel , Franky Lin , Hante Meuleman , Daniel Berlin , , , , , Subject: Re: [PATCH] wifi: brcmfmac: cfg80211: Use WSEC to set SAE password References: <20231107-brcmfmac-wpa3-v1-1-4c7db8636680@marcan.st> <170281231651.2255653.7498073085103487666.kvalo@kernel.org> <18c80d15e30.279b.9b12b7fc0a3841636cfb5e919b41b954@broadcom.com> Date: Tue, 19 Dec 2023 10:57:17 +0200 In-Reply-To: <18c80d15e30.279b.9b12b7fc0a3841636cfb5e919b41b954@broadcom.com> (Arend Van Spriel's message of "Tue, 19 Dec 2023 09:52:23 +0100") Message-ID: <877clash76.fsf@kernel.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux) Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain Arend Van Spriel writes: > On December 17, 2023 12:25:23 PM Kalle Valo wrote: > >> Hector Martin wrote: >> >>> Using the WSEC command instead of sae_password seems to be the supported >>> mechanism on newer firmware, and also how the brcmdhd driver does it. >>> >>> According to user reports [1], the sae_password codepath doesn't actually >>> work on machines with Cypress chips anyway, so no harm in removing it. >>> >>> This makes WPA3 work with iwd, or with wpa_supplicant pending a support >>> patchset [2]. >>> >>> [1] https://rachelbythebay.com/w/2023/11/06/wpa3/ >>> [2] http://lists.infradead.org/pipermail/hostap/2023-July/041653.html >>> >>> Signed-off-by: Hector Martin >>> Reviewed-by: Neal Gompa >> >> Arend, what do you think? >> >> We recently talked about people testing brcmfmac patches, has anyone else >> tested this? > > Not sure I already replied so maybe I am repeating myself. I would > prefer to keep the Cypress sae_password path as well although it > reportedly does not work. The vendor support in the driver can be used > to accommodate for that. The other option would be to have people with > Cypress chipset test this patch. If that works for both we can > consider dropping the sae_password path. Ok, thanks for checking. -- https://patchwork.kernel.org/project/linux-wireless/list/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches