From 3d296a680607f0ac94239a7cf9bfd037028fc505 Mon Sep 17 00:00:00 2001 From: KOLANICH Date: Fri, 17 Dec 2021 00:00:00 +0000 Subject: [PATCH 2/3] A bit more useful error message for the case of PSK SHA256 --- src/wl/sys/wl_cfg80211_hybrid.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/src/wl/sys/wl_cfg80211_hybrid.c b/src/wl/sys/wl_cfg80211_hybrid.c index 56d7d3b..48ec2a2 100644 --- a/src/wl/sys/wl_cfg80211_hybrid.c +++ b/src/wl/sys/wl_cfg80211_hybrid.c @@ -915,6 +915,11 @@ wl_set_key_mgmt(struct net_device *dev, struct cfg80211_connect_params *sme) case WLAN_AKM_SUITE_8021X: val = WPA2_AUTH_UNSPECIFIED; break; + case WLAN_AKM_SUITE_PSK_SHA256: + //val = WPA2_AUTH_PSK_SHA256; + WL_ERR(("unsupported akm suite (WLAN_AKM_SUITE_PSK_SHA256). Disable WPA-PSK-SHA256 in hostapd config (or explicitly set ieee80211w=0 in OpenWRT UCI) as a workaround. Or alternatively find the way to implement it (IDK if the firmware has to be fixed too).\n")); + return -EINVAL; + break; case WLAN_AKM_SUITE_PSK: val = WPA2_AUTH_PSK; break; @@ -922,6 +927,9 @@ wl_set_key_mgmt(struct net_device *dev, struct cfg80211_connect_params *sme) WL_ERR(("invalid akm suite (%d)\n", sme->crypto.akm_suites[0])); return -EINVAL; } + } else if (val & WPA3_AUTH_SAE_PSK) { + WL_ERR(("WPA3 is not implemented in the driver (IDK if firmware has to be fixed too)\n")); + return -EINVAL; } WL_DBG(("setting wpa_auth to %d\n", val)); -- 2.32.0