On 14.03.2019 13:30, txt.file wrote:
Which other drivers implement this cipher? Is this cipher in the IEEE 802.11 
documents standardized?

On March 14, 2019 10:03:16 AM UTC, Robert Marko <[email protected]> wrote:
This patch will add support for using GCMP as cipher suite.
This is not a strong cipher but is only one supported by
wil6210 driver in order to have encrypted traffic.

Signed-off-by: Robert Marko <[email protected]>
---
scripts/netifd-wireless.sh | 1 +
1 file changed, 1 insertion(+)

diff --git a/scripts/netifd-wireless.sh b/scripts/netifd-wireless.sh
index 424b3ad..6bc48c6 100644
--- a/scripts/netifd-wireless.sh
+++ b/scripts/netifd-wireless.sh
@@ -200,6 +200,7 @@ wireless_vif_parse_encryption() {
                *tkip+aes|*tkip+ccmp|*aes+tkip|*ccmp+tkip) wpa_cipher="CCMP 
TKIP";;
                *aes|*ccmp) wpa_cipher="CCMP";;
                *tkip) wpa_cipher="TKIP";;
+               *gcmp) wpa_cipher="GCMP";;
        esac

        # 802.11n requires CCMP for WPA
_______________________________________________
openwrt-devel mailing list
[email protected]
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

https://www.wi-fi.org/discover-wi-fi/security

in wpa3

 * *Authenticated encryption**:* 256-bit Galois/Counter Mode Protocol
   (GCMP-256)

Regards

_______________________________________________
openwrt-devel mailing list
[email protected]
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to