Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp709024yba; Thu, 9 May 2019 04:57:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqxDOBuVJl9AeQ+bQNgWd6HyNnDw5/MtIpn/+Z2sK3dCHLQcLs9G+F5gRni6BFK2EN/stMoZ X-Received: by 2002:a65:5588:: with SMTP id j8mr4889146pgs.306.1557403026477; Thu, 09 May 2019 04:57:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557403026; cv=none; d=google.com; s=arc-20160816; b=jPC8QDePun72AP0OTPJnyzptono9BHijoLu/vjHuj718JoOwue9Ww7wS+s8pluc0xD VVPjfoBIrqNEMmG/L94h4pN/pi2RpdXkGjuRaI2Xx9FJebtD06XlDvyAKruJyCe1JCOJ m2wCmvNeDLndcpnJUAFWuTP2ytH4z+5QBF3iskJtgSq5jCRtU++IuY3Gmv74XyUfycIs dx0htmyGOmn+g7ZFy1tCLDIU2TSl8JTz0Q7lEG/QZ1DBzoZMz4IiZbskzWh8TzYrU1BX tSXNNVrsPLORG7YGHNgwFbglm8EWKUbRE9gni+Rv6IBsJZrDWcN1/9qH4KK2lXLuick0 AlIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=WP0bLcCMNhbDrikns73eGACwFVs6dA5eEIoy+HuF4cY=; b=eUXgKLyyF3mROLMoEOYMCFGGXdcF1FqTg5CxLNV+hf4EIu+PomvDB+B2kcW1gpXnCV MZWqeQkFY+KibpPftefJESWpchsEM4dffOG1Rku7FegJCC6CrYF/TwfgOxAmwiJx8/RI UoznV4odvDbqgeim83qkgUFXvtWBW432he0m/sNAIv+AssHoJCbBL1UUVsYuoj+rgF3e je5NDQMK4r6IrYYYqOraN9oDTHYHtulSf0GCtIb5LIWEUsMSPNUPHQT/4Ra/rkqivcjW wE1cfLp9vtuqYR8WuqAw+TdIR39nmJHTVDARlIajeH/2AwijRWLiDk8P1Y3Y4ShW87a/ n7yw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@broadcom.com header.s=google header.b=c46N9Upy; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=broadcom.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f3si2395537plf.416.2019.05.09.04.56.31; Thu, 09 May 2019 04:57:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@broadcom.com header.s=google header.b=c46N9Upy; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=broadcom.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725963AbfEILyh (ORCPT + 99 others); Thu, 9 May 2019 07:54:37 -0400 Received: from mail-yw1-f67.google.com ([209.85.161.67]:46739 "EHLO mail-yw1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725943AbfEILyh (ORCPT ); Thu, 9 May 2019 07:54:37 -0400 Received: by mail-yw1-f67.google.com with SMTP id a130so1597784ywe.13 for ; Thu, 09 May 2019 04:54:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=WP0bLcCMNhbDrikns73eGACwFVs6dA5eEIoy+HuF4cY=; b=c46N9UpyXRs7elWpZBhfIGkWYVIfXcB3l9sFtfMCafyuL9ibb+wPKo7M0VBYvlRyTq vwMf9eXd3hJ+keEs0nXu0aS4AWls3FkGSrARTiXdHVuhxmab4hrsXQTZbhussjjRXhgC WQBcEmBnuZP/bR2nxK7/imzEZSCiUeRj2CKyA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=WP0bLcCMNhbDrikns73eGACwFVs6dA5eEIoy+HuF4cY=; b=JFxNbUNKrNOswVvySoPL6Bty+mHr6bhYtBqdpJJFJ00l4LkWrDU6ENELRx8fwlX4lB /qcbfuZ0AnB+XuhbQcHXr7CpfK9VaMhwath9mH0FVbfTTsM57Tblwu5YL6tV2OWdUaHW H73Ug/nt12+y8wbejY6avykARr+bs7/hqe3u6aCi0oGylty2KQEALitf+R51W4FNYIHW Xa/3zsgBdf243eYGpi8+oXZaICkPjLbCYgLA5QGLyDhxSYbCBp7TpmDpmsq8Ag6vg6c1 PZv5HkJ0bgfsENpBPUfse385YajigDCoGlIMlo7QWN5ve6hLyVdwmN8R0Js/PbCvhIOc kOgg== X-Gm-Message-State: APjAAAXXOsQanw6GrYYm7iFKOUJWu9TVHvn8wwvcALgbze9ygUAsJotJ VPnaOJtv3aToVAWfQwO5PoVnNw== X-Received: by 2002:a5b:d0e:: with SMTP id y14mr2005473ybp.103.1557402876614; Thu, 09 May 2019 04:54:36 -0700 (PDT) Received: from [10.230.40.234] ([192.19.215.250]) by smtp.gmail.com with ESMTPSA id i13sm517290ywl.22.2019.05.09.04.54.34 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 09 May 2019 04:54:35 -0700 (PDT) Subject: Re: [PATCH 2/6] brcmfmac: send port authorized event for 802.1X 4-way handshake offload To: Stanley Hsu Cc: Chi-Hsien Lin , "linux-wireless@vger.kernel.org" , "brcm80211-dev-list@broadcom.com" , brcm80211-dev-list , Franky Lin , Hante Meuleman , Wright Feng , Kalle Valo , Jouni Malinen References: <1546582221-143220-1-git-send-email-chi-hsien.lin@cypress.com> <1546582221-143220-2-git-send-email-chi-hsien.lin@cypress.com> <20190509085836.GB74912@aremote06.aus.cypress.com> From: Arend Van Spriel Message-ID: <8062d7c7-332c-8a10-40bd-9eadf682493f@broadcom.com> Date: Thu, 9 May 2019 13:54:32 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <20190509085836.GB74912@aremote06.aus.cypress.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org + Jouni On 5/9/2019 10:58 AM, Stanley Hsu wrote: > On Mon, Jan 07, 2019 at 10:44:01AM +0100, Arend Van Spriel wrote: >> On 1/4/2019 7:11 AM, Chi-Hsien Lin wrote: >>> From: Chung-Hsien Hsu >>> >>> With 4-way handshake offload for 802.1X authentication, a port >>> authorized event should be sent to user space after the completion of >>> 4-way handshake. It is used to indicate that a connection is authorized >>> and 802.1X authentication is no longer required. >> >> It had been a while since I had looked at our offload code >> (basically since the initial implementation for the nl80211 work) so >> I was unsure why this would be needed. >> >> So initially we added a PORT_AUTHORIZED *attribute* in the nl80211 >> api and later on the PORT_AUTHORIZED *event* was introduced and >> 4-way hs offload support in wpa_supplicant is ignoring the >> *attribute* and only handling the *event*. I think this information >> is important enough to add to this commit message with a reference >> to commit 503c1fb98ba3 ("cfg80211/nl80211: add a port authorized >> event") which "broke" the functionality in brcmfmac. > > Thanks a lot for the feedback. > After looking further, it is observed that the connection state will be > set to WPA_COMPLETED in wpa_supplicant after it sets PMK to the driver. > So no need to have this change. Let's drop it form the series. In my opinion wpa_supplicant does set WPA_COMPLETED too early. If we were to use eapol-over-nl80211 and set the netdev carrier when the connection is authorized it would be kinda ok and we would not need the event. Added Jouni to chime in on this. Regards, Arend