aboutsummaryrefslogtreecommitdiffstats
path: root/rules.mk
diff options
context:
space:
mode:
authorFelix Fietkau <nbd@nbd.name>2023-08-31 13:02:00 +0200
committerFelix Fietkau <nbd@nbd.name>2023-09-18 16:52:25 +0200
commit6e09f88d29171f2ddd74cb5e70653dbe58f10af6 (patch)
tree81336bc632603fc0e54b74478cbbdbc7306f57af /rules.mk
parent6798f156f910b227abf21b683ab3723663a9de02 (diff)
downloadupstream-6e09f88d29171f2ddd74cb5e70653dbe58f10af6.tar.gz
upstream-6e09f88d29171f2ddd74cb5e70653dbe58f10af6.tar.bz2
upstream-6e09f88d29171f2ddd74cb5e70653dbe58f10af6.zip
netifd: update to the latest version
db3934d2f740 scripts/netifd-wireless.sh: properly fix WPA3 Enterprise support Support the following values for the different WPA3 Enterprise modes: - wpa3-mixed: WPA3 Enterprise transitional mode This supports EAP with both SHA1 and SHA-256, with optional MFP - wpa3: WPA3 Enterprise only mode This supports only SHA256 with mandatory MFP - wpa3-192: WPA3 Enterprise with mandatory 192 bit support This uses only GCMP-256 ciphers Disable 192 bit support and GCMP-256 ciphers for the regular "wpa3" mode. It seems that even leaving in optional 192 bit support breaks auth on some clients, including iOS devices. Signed-off-by: Felix Fietkau <nbd@nbd.name> (cherry picked from commit 8c03dc962f8e10f9fef0877a0f8d8235f619ef7d)
Diffstat (limited to 'rules.mk')
0 files changed, 0 insertions, 0 deletions