Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp2801234rdd; Sat, 13 Jan 2024 02:36:20 -0800 (PST) X-Google-Smtp-Source: AGHT+IHQ0YJJFa5xtgKmEgqAcbZx6SGXD3kI9gHAM6Eome2xgVDjhhucBjIrdMYff5ol2xyAqRCX X-Received: by 2002:a05:6a20:938b:b0:19a:3eda:cced with SMTP id x11-20020a056a20938b00b0019a3edaccedmr3903738pzh.41.1705142180530; Sat, 13 Jan 2024 02:36:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705142180; cv=none; d=google.com; s=arc-20160816; b=ZfRUnGFpievP/uQ1lE+TEP1aXQE3ttH9mack6L4x/E22p1boB41DerpYevaEm4pwEt Q934f3NULzL4TtJF+H7fWWkfeQqRJRiPtry0T8p5qdd0TAfM02U1/brybBmjvkeJx1Ub P1WXYkap0mSybsOj0YTPxGMw3lc3lxq+owknIwZT4qQ5Pyj8lXtQzQRK41GUYJ/x7G3u taUJBT/9m+uIci8il+ajGp3y1AAW9Ho6UsSpRv4r0QViLdbKmg0J/fsFWpeCERQ4jrS6 g40NbouGNB1LeBzpzgR8B/10d2lAABR2exvXAi8KLsjeo+A/JKpj4XO6Fxcc7pvEnFJE VLDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=to:references:message-id:content-transfer-encoding:cc:date :in-reply-to:from:subject:mime-version:list-unsubscribe :list-subscribe:list-id:precedence; bh=st6kOB4J0IhYAPNVaJ28/bSjgrglNafblrx8nmIt+Tg=; fh=lgJafJKV+LtFtKLAqTkcZRea53Uz8tFQ7HbMKo5qI08=; b=YwtcMtOaKmHOaSAmh/eGvopUo+0+kP9WYIJ5ju0d8jmrl0msQY52YSTOptj6EkWLe2 /t/+QWE6GBWr4WRX2KKMGqYiw07nbgAyxrUDADTUAp6BgObvFzPr4d2fgm82UwKwZkGY MOG+0KdN43Ul5iLepJ+kUiLN9LI5lG2AoSFv3o7VAoxn66wNd6JR3kpqjTI2h3GDZAfJ oUK/l3TFb+4niy8GrzDWWY1+yTU9vgt3wWFa+PKVR2GuoWPM9P06W148R3qaoddlxW97 Of2vqaGRrCRkzsDChqFHho+IDhWEmWNuZrGXmzMHbsHTHHyK1uDmK+f+1P+jWwmFNnrC 3Urg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless+bounces-1875-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-wireless+bounces-1875-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id s133-20020a632c8b000000b005afc5ea43fdsi5048444pgs.849.2024.01.13.02.36.20 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 13 Jan 2024 02:36:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless+bounces-1875-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless+bounces-1875-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-wireless+bounces-1875-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id C3A05B2318F for ; Sat, 13 Jan 2024 10:36:16 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8664B17BC8; Sat, 13 Jan 2024 10:36:13 +0000 (UTC) X-Original-To: linux-wireless@vger.kernel.org Received: from mail.holtmann.org (coyote.holtmann.net [212.227.132.17]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C13D020DC6 for ; Sat, 13 Jan 2024 10:36:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=holtmann.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=holtmann.org Received: from smtpclient.apple (p5b3d275b.dip0.t-ipconnect.de [91.61.39.91]) by mail.holtmann.org (Postfix) with ESMTPSA id EEBCFCECCB; Sat, 13 Jan 2024 11:36:03 +0100 (CET) Content-Type: text/plain; charset=utf-8 Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.300.61.1.2\)) Subject: Re: [PATCH V2 2/4] wifi: brcmfmac: add per-vendor feature detection callback From: Marcel Holtmann In-Reply-To: <20240103095704.135651-3-arend.vanspriel@broadcom.com> Date: Sat, 13 Jan 2024 11:35:53 +0100 Cc: Kalle Valo , linux-wireless@vger.kernel.org Content-Transfer-Encoding: quoted-printable Message-Id: References: <20240103095704.135651-1-arend.vanspriel@broadcom.com> <20240103095704.135651-3-arend.vanspriel@broadcom.com> To: Arend van Spriel X-Mailer: Apple Mail (2.3774.300.61.1.2) Hi Arend, > Adding a .feat_attach() callback allowing per-vendor overrides > of the driver feature flags. In this patch the callback is only > provided by BCA vendor to disable SAE feature as it has not been > confirmed yet. BCA chips generally do not have the in-driver > supplicant (idsup) feature so they rely on NL80211_CMD_EXTERNAL_AUTH > to trigger user-space authentication. is there any way to tell if idsup is supported (firmware string or some other mechanism). The just disabling and not implementing support for external_auth is really having this stuck in WPA2 legacy world. The whole out-dated firmware game on Raspberry Pi is already a mess. My problem is really that WiFi 6E and WiFi 7 are essentially mandating WPA3/SAE only support as soon as you move into 6 GHz operation and the errors presented to the user are not decodable if you don=E2=80=99t have = a good understanding on what WiFi certification mandates. Regards Marcel