On 14.03.2019 13:30, txt.file wrote:
Which other drivers implement this cipher? Is this cipher in the IEEE 802.11
documents standardized?
On March 14, 2019 10:03:16 AM UTC, Robert Marko <[email protected]> wrote:
This patch will add support for using GCMP as cipher suite.
This is not a strong cipher but is only one supported by
wil6210 driver in order to have encrypted traffic.
Signed-off-by: Robert Marko <[email protected]>
---
scripts/netifd-wireless.sh | 1 +
1 file changed, 1 insertion(+)
diff --git a/scripts/netifd-wireless.sh b/scripts/netifd-wireless.sh
index 424b3ad..6bc48c6 100644
--- a/scripts/netifd-wireless.sh
+++ b/scripts/netifd-wireless.sh
@@ -200,6 +200,7 @@ wireless_vif_parse_encryption() {
*tkip+aes|*tkip+ccmp|*aes+tkip|*ccmp+tkip) wpa_cipher="CCMP
TKIP";;
*aes|*ccmp) wpa_cipher="CCMP";;
*tkip) wpa_cipher="TKIP";;
+ *gcmp) wpa_cipher="GCMP";;
esac
# 802.11n requires CCMP for WPA
_______________________________________________
openwrt-devel mailing list
[email protected]
https://lists.openwrt.org/mailman/listinfo/openwrt-devel
https://www.wi-fi.org/discover-wi-fi/security
in wpa3
* *Authenticated encryption**:* 256-bit Galois/Counter Mode Protocol
(GCMP-256)
Regards
_______________________________________________
openwrt-devel mailing list
[email protected]
https://lists.openwrt.org/mailman/listinfo/openwrt-devel