-
Notifications
You must be signed in to change notification settings - Fork 8.4k
manifest: Update nrf_wifi #81514
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
manifest: Update nrf_wifi #81514
Conversation
|
The following west manifest projects have changed revision in this Pull Request:
Additional metadata changed:
⛔ DNM label due to: 1 project with metadata changes Note: This message is automatically posted and updated by the Manifest GitHub Action. |
bdf0f05 to
3507aab
Compare
982861f
3507aab to
982861f
Compare
982861f to
1e5d689
Compare
Updated manifest to include separate security types for 802.1X in display of scan results when APs have EAP and PMF enabled. BSS display limit based on user-configured non-zero values set via CMD_INIT, along with support for few other regulatory domain updates in firmware. Upstream PR: zephyrproject-rtos/zephyr#81514 Signed-off-by: Karun Kumar Eagalapati <[email protected]>
EAP_TLS_SHA256 was being identified as EAP_TLS in display scan results. Identify the security type in scan results sent by RPU and display accordingly. Upstream PR: zephyrproject-rtos/zephyr#81514 Signed-off-by: Ravi Dondaputi <[email protected]>
Expand the security modes identified in the display-scan results. Add appropriate strings for corresponding enumerations. Upstream PR: zephyrproject-rtos/zephyr#81514 Signed-off-by: Ravi Dondaputi <[email protected]>
5392c6c to
61508ab
Compare
61508ab to
3f6c563
Compare
3f6c563 to
3f42556
Compare
3f42556 to
04f4ec7
Compare
04f4ec7 to
a124830
Compare
Updated manifest to include separate security types for 802.1X in display of scan results when APs have EAP and PMF enabled. BSS display limit based on user-configured non-zero values set via CMD_INIT, along with support for few other regulatory domain updates in firmware. Signed-off-by: Karun Kumar Eagalapati <[email protected]>
EAP_TLS_SHA256 was being identified as EAP_TLS in display scan results. Identify the security type in scan results sent by RPU and display accordingly. Signed-off-by: Ravi Dondaputi <[email protected]>
Expand the security modes identified in the display-scan results. Add appropriate strings for corresponding enumerations. Signed-off-by: Ravi Dondaputi <[email protected]>
a124830 to
3428a11
Compare
| case NRF_WIFI_OPEN: | ||
| case NRF_WIFI_WEP: | ||
| case NRF_WIFI_WPA: | ||
| case NRF_WIFI_WPA2: | ||
| case NRF_WIFI_WPA2_256: | ||
| case NRF_WIFI_WPA3: | ||
| case NRF_WIFI_WAPI: | ||
| case NRF_WIFI_FT_EAP_SHA384: | ||
| case NRF_WIFI_FT_PSK_SHA384: | ||
| case NRF_WIFI_PSK_SHA384: | ||
| return WIFI_CIPHER_SUITE_B_NA; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These can be removed as default is NA
| extern "C" { | ||
| #endif | ||
|
|
||
| /** @brief IEEE 802.11 SUITE-B */ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| /** @brief IEEE 802.11 SUITE-B */ | |
| /** @brief NSA SUITE-B crypto suites */ |
| const char *wifi_security_txt(enum wifi_security_type security) | ||
| { | ||
| if (is_enterprise_security(security)) { | ||
| return "IEEE_8021_x"; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| return "IEEE_8021_x"; | |
| return "8021.x"; |
|
FYI @Rex-Chen-NXP |
| #endif | ||
|
|
||
| /** @brief IEEE 802.11 SUITE-B */ | ||
| enum wifi_cipher_suite_b { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you make it align with 'enum wifi_suiteb_type', then remove one of those to avoid duplicate implementation.
| static struct wifi_roaming_params roaming_params; | ||
| #endif | ||
|
|
||
| const bool is_enterprise_security(enum wifi_security_type security) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
similar with function is_eap_valid_security, pls move one of them to avoid duplicate impl
| return "WPA/WPA2/WPA3 PSK"; | ||
| case WIFI_SECURITY_TYPE_DPP: | ||
| return "DPP"; | ||
| case WIFI_SECURITY_TYPE_EAP_PEAP_MSCHAPV2: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why delete those types?
| case NRF_WIFI_EAP: | ||
| case NRF_WIFI_EAP_TLS_SHA256: | ||
| case NRF_WIFI_FT_EAP: | ||
| return WIFI_CIPHER_SUITE_B_NONE; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How to distinguish WIFI_CIPHER_SUITE_B_NA and WIFI_CIPHER_SUITE_B_NONE?
Why NRF_WIFI_FT_EAP_SHA384 belongs to WIFI_CIPHER_SUITE_B_NA?
|
This pull request has been marked as stale because it has been open (more than) 60 days with no activity. Remove the stale label or add a comment saying that you would like to have the label removed otherwise this pull request will automatically be closed in 14 days. Note, that you can always re-open a closed pull request at any time. |
|
This pull request has been marked as stale because it has been open (more than) 60 days with no activity. Remove the stale label or add a comment saying that you would like to have the label removed otherwise this pull request will automatically be closed in 14 days. Note, that you can always re-open a closed pull request at any time. |
|
Closing this as it's merged to ncs through another PR |
Updated manifest to include separate security type for EAP TLS SHA256 in display of scan results when APs have EAP and PMF enabled.