aboutsummaryrefslogtreecommitdiffstats
path: root/scripts
diff options
context:
space:
mode:
authorFelix Fietkau <nbd@nbd.name>2023-08-31 13:02:00 +0200
committerFelix Fietkau <nbd@nbd.name>2023-08-31 13:05:13 +0200
commit8c03dc962f8e10f9fef0877a0f8d8235f619ef7d (patch)
treeafac2f6cfe927c8a081b71678d518d598db136fc /scripts
parentb63df6ce5d0639e6106967fd445c96518da52afb (diff)
downloadupstream-8c03dc962f8e10f9fef0877a0f8d8235f619ef7d.tar.gz
upstream-8c03dc962f8e10f9fef0877a0f8d8235f619ef7d.tar.bz2
upstream-8c03dc962f8e10f9fef0877a0f8d8235f619ef7d.zip
netifd: update to the latest version
db3934d2f740 scripts/netifd-wireless.sh: properly fix WPA3 Enterprise support Support the following values for the different WPA3 Enterprise modes: - wpa3-mixed: WPA3 Enterprise transitional mode This supports EAP with both SHA1 and SHA-256, with optional MFP - wpa3: WPA3 Enterprise only mode This supports only SHA256 with mandatory MFP - wpa3-192: WPA3 Enterprise with mandatory 192 bit support This uses only GCMP-256 ciphers Disable 192 bit support and GCMP-256 ciphers for the regular "wpa3" mode. It seems that even leaving in optional 192 bit support breaks auth on some clients, including iOS devices. Signed-off-by: Felix Fietkau <nbd@nbd.name>
Diffstat (limited to 'scripts')
0 files changed, 0 insertions, 0 deletions