Received: by 2002:a05:7412:8598:b0:f9:33c2:5753 with SMTP id n24csp420973rdh; Tue, 19 Dec 2023 03:07:25 -0800 (PST) X-Google-Smtp-Source: AGHT+IFJ/PkdPH0yv6GqyUYAr+FQ8IHJ/qTryMBlccJV9bU/DuL5QSnor7hbr3X1yg6VXxfds6zD X-Received: by 2002:a05:620a:91d:b0:77f:ae88:1d50 with SMTP id v29-20020a05620a091d00b0077fae881d50mr1183618qkv.41.1702984045405; Tue, 19 Dec 2023 03:07:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702984045; cv=none; d=google.com; s=arc-20160816; b=Lqy3SfwugMEUGf0sS3pgpY0PSnqMJbEF4Pivti3GZrIbFwcd3qcoLszHjQ7D+SXhAZ naF0YsRj+O3UfrAWAvfSVBcRlQoA5bIWNjd2OD++A2lJu/cRKM94QGXrMc4H7RWVskJI tL9kYFJd11PiM//75jd67YwZ87WH2HJaZDdn1fDwk4NyGJMgkU7PBA+lpwYjAprjp2Va 9yRnumFJAXVzRGSqKHXDvxc6HCg1HLbDIw/0Id+QgAbUm6YF+1bAILQPP6ue9mm+zCDI OJyBfYO6K4RY4tVIcyZuLh4kVjnqHr3ypl+8LU5S/VS2v73yJ17NNmcsLPeyjijkOBnv y1cQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:content-language :references:cc:to:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id:dkim-signature; bh=9ZG46WLMEefNSk8+OGWqIMDQokKbkXv1W+WqP5kBxL8=; fh=sGll3ZHSv2C3DaUzw7jZmrgS7MoG1Z7KHdbLDvCALIk=; b=pIsee1Oda/WTRlPY4zo5q0nOxvn6StuPbCRNW6R7jHRpR+HGLcI8iLLSbW9fUdZ4+9 J6LyCBnr4o1JY3ml+4Zqj1XOpziIT6MY5KKlR5PBPAJZ1q4cScsq5rA6A55mSMYww4fw WbyG5v0qQKdw29wWMpX6avcXPeOXdNF+GDRdg4oHVQMiuxigFaYi6D57ebSm+y5GvzZR wx5I74SaMV9RtH5b06+rqQoF4iOSrVvn3BeNFEg/vCIaEsseQV3O8aRKKH722zJh4QN5 qjF8ygUBU5zbKEa2TlCooxr36ko35jyHOLMIeEAUiInfU6ImrI1RcFQvWGlxxweDa13b 7zWA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@marcan.st header.s=default header.b=EmhvUoL1; spf=pass (google.com: domain of linux-wireless+bounces-990-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-wireless+bounces-990-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=marcan.st Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id pe35-20020a05620a852300b0077fb0c02536si9083773qkn.460.2023.12.19.03.07.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 Dec 2023 03:07:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless+bounces-990-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@marcan.st header.s=default header.b=EmhvUoL1; spf=pass (google.com: domain of linux-wireless+bounces-990-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-wireless+bounces-990-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=marcan.st Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id B9C151C2383C for ; Tue, 19 Dec 2023 11:07:24 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9614C1549B; Tue, 19 Dec 2023 11:07:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=marcan.st header.i=@marcan.st header.b="EmhvUoL1" X-Original-To: linux-wireless@vger.kernel.org Received: from mail.marcansoft.com (marcansoft.com [212.63.210.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 686741548E; Tue, 19 Dec 2023 11:07:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=marcan.st Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=marcan.st Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: marcan@marcan.st) by mail.marcansoft.com (Postfix) with ESMTPSA id 82ED647326; Tue, 19 Dec 2023 11:01:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=marcan.st; s=default; t=1702983707; bh=mZHa/PlWUTBOSVq8chMFTuSNQbSxKM92GV2NvSK0zF0=; h=Date:Subject:To:Cc:References:From:In-Reply-To; b=EmhvUoL1tIGeLq2pn9Dvyg+n1e5zqt/RFDtFPkLDe59K0/mG/pEDvdop2h66UahQa 0iY/dc2b1tIJ3MKTxla/+VdNfcCPqMtyDeC1eRNKYLlS4s8t0QvESt5ZEgzAOmKGW5 FdiyYoSPwwdFHKGqSpfkDxYDK4yrAvwKH5GBz0zRxa1TUioPgIfTbtriNYYyeJId+d Vd3IWEPkJO99Czk+oFbW5fFpNVuEQcMatqKZ4VXnx4R8bpL2AHrK/SD+5pPjqBoH1J lqW58x8/dZDlZWa1/ALuuWhAMLIvNPkqSJe9n1mWSUsf6CO9JVoqmgjrj8Q5EGYqn7 6O47tUAAVKGDg== Message-ID: <1b51997f-2994-46e8-ac58-90106d1c486d@marcan.st> Date: Tue, 19 Dec 2023 20:01:39 +0900 Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH] wifi: brcmfmac: cfg80211: Use WSEC to set SAE password To: Arend Van Spriel , Kalle Valo Cc: Arend van Spriel , Franky Lin , Hante Meuleman , Daniel Berlin , linux-wireless@vger.kernel.org, brcm80211-dev-list.pdl@broadcom.com, SHA-cyfmac-dev-list@infineon.com, linux-kernel@vger.kernel.org, asahi@lists.linux.dev References: <20231107-brcmfmac-wpa3-v1-1-4c7db8636680@marcan.st> <170281231651.2255653.7498073085103487666.kvalo@kernel.org> <18c80d15e30.279b.9b12b7fc0a3841636cfb5e919b41b954@broadcom.com> Content-Language: en-US From: Hector Martin In-Reply-To: <18c80d15e30.279b.9b12b7fc0a3841636cfb5e919b41b954@broadcom.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit On 2023/12/19 17:52, Arend Van Spriel wrote: > On December 17, 2023 12:25:23 PM Kalle Valo wrote: > >> Hector Martin wrote: >> >>> Using the WSEC command instead of sae_password seems to be the supported >>> mechanism on newer firmware, and also how the brcmdhd driver does it. >>> >>> According to user reports [1], the sae_password codepath doesn't actually >>> work on machines with Cypress chips anyway, so no harm in removing it. >>> >>> This makes WPA3 work with iwd, or with wpa_supplicant pending a support >>> patchset [2]. >>> >>> [1] https://rachelbythebay.com/w/2023/11/06/wpa3/ >>> [2] http://lists.infradead.org/pipermail/hostap/2023-July/041653.html >>> >>> Signed-off-by: Hector Martin >>> Reviewed-by: Neal Gompa >> >> Arend, what do you think? >> >> We recently talked about people testing brcmfmac patches, has anyone else >> tested this? > > Not sure I already replied so maybe I am repeating myself. I would prefer > to keep the Cypress sae_password path as well although it reportedly does > not work. The vendor support in the driver can be used to accommodate for > that. The other option would be to have people with Cypress chipset test > this patch. If that works for both we can consider dropping the > sae_password path. > > Regards, > Arend So, if nobody from Cypress chimes in ever, and nobody cares nor tests Cypress chipsets, are we keeping any and all existing Cypress code-paths as bitrotting code forever and adding gratuitous conditionals every time any functionality needs to change "just in case it breaks Cypress" even though it has been tested compatible on Broadcom chipsets/firmware? Because that's not sustainable long term. - Hector