Re: [PATCH] netifd: fix WPA3 enterprise ciphers

2022-08-13 Thread Hauke Mehrtens
On 6/26/22 17:21, Joerg Werner wrote: WPA3 enterprise requires wpa_cipher to be GCMP-256, so if the user set encryption to wpa3 or wpa3-mixed, then add GCMP-256. Also allow explicit selection of GCMP-256 by adding gcmp256 at the end of the encryption value. This code from hostapd looks like

Fwd: [PATCH] netifd: fix WPA3 enterprise ciphers

2022-06-27 Thread Jörg Werner
[Resending due to previous response being rejected by the list due to being an HTML e-mail] Hi NIck, take a look at the Cisco link you have sent, there is an interoperability table at the end. GCMP with Suite B 1x is basically supported by none of the STA. If you use wpa3 as the encryption

Re: [PATCH] netifd: fix WPA3 enterprise ciphers

2022-06-26 Thread Nick Lowe
Hi Joerg, Where is this stated? If I check the following Cisco link, this is not constrained in this way on their products: https://www.cisco.com/c/en/us/products/collateral/wireless/catalyst-9100ax-access-points/wpa3-dep-guide-og.html If I check the Wi-Fi alliance spec at

[PATCH] netifd: fix WPA3 enterprise ciphers

2022-06-26 Thread Joerg Werner
WPA3 enterprise requires wpa_cipher to be GCMP-256, so if the user set encryption to wpa3 or wpa3-mixed, then add GCMP-256. Also allow explicit selection of GCMP-256 by adding gcmp256 at the end of the encryption value. Signed-off-by: Joerg Werner --- scripts/netifd-wireless.sh | 5 - 1