Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp3212055ybl; Mon, 19 Aug 2019 14:17:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqypxL8h6BfIYXcqB9hUdCEeq5FabskB3gwnBLYOd171HrhyHR+hbjGgsDAtmdyarD1/zcQ8 X-Received: by 2002:aa7:946d:: with SMTP id t13mr27017683pfq.121.1566249438325; Mon, 19 Aug 2019 14:17:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566249438; cv=none; d=google.com; s=arc-20160816; b=NiowdQk/9s3FcgQgn2BX8F5xS0rpRIXstlFhQsKL1ZNcVKRVv8k7OIQclzd+F58jHs qrRqcGr67kFsEhe8hTmUaeE1ikVE8peCV/VbIjDd8Dyr0Q+LEzpbAKjUhLy1my6+eC+L xzXUtlKbz3LjpMdg5aartoIBJv6CL85PHoWCQc3j5V82gYrID3SuOcuUgHEZAZPGIXG6 7UOmpe1ndhES6epNE9+HdLWidmRG3iNop1j/Umez9CLTt6djam91RwsKB3pDxPpK55FM cBQ2d9n44Be1YqNI3eHDCo4ykklzhpZquva0tShsTGvy6bogK1xXlejt0OEsRPyqJ6CP IXKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:dkim-signature:subject; bh=om0LzyZZ6SNMpOI8l/rY+WbyPk7bfxjBa19AUtMVIes=; b=ouhhYyiP5s74jcoNZt3BjTAg5wMC4zNX9SkISxgQOXHiirb6a2l6OfU3rVNRjPl1u4 cuyc1cJoq23zmrHDVqGUjeXQJbI3cALRBs+1K7blvert/E0IcfTrwkPxg0T342vPprVR BYICTdbSM/gkMkH3LmNCf04nTe5aQ4WSe2StJ12w+xB6vVOJ8EPzfH+xkSUNFlrKmXhP Im+8DkiYS5e+/Wjak9YALz5y3qilenKRpxwVQpR4AEnMxVYGMYrY1bEEQc5JxuT+mXfC uX1UoVl00Kzd0bU64c7Aj6FEBTZVOBwa5AqCh6AenOsjJbjRgAvKpZcBu6eFHTktOkBh a+EA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@wetzel-home.de header.s=wetzel-home header.b=sOHZQUbv; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=wetzel-home.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 29si10667354pgk.306.2019.08.19.14.16.58; Mon, 19 Aug 2019 14:17:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@wetzel-home.de header.s=wetzel-home header.b=sOHZQUbv; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=wetzel-home.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728283AbfHSVPK (ORCPT + 99 others); Mon, 19 Aug 2019 17:15:10 -0400 Received: from 3.mo69.mail-out.ovh.net ([188.165.52.203]:49326 "EHLO 3.mo69.mail-out.ovh.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727971AbfHSVPK (ORCPT ); Mon, 19 Aug 2019 17:15:10 -0400 Received: from player716.ha.ovh.net (unknown [10.108.35.74]) by mo69.mail-out.ovh.net (Postfix) with ESMTP id 95EDE64484 for ; Mon, 19 Aug 2019 23:15:07 +0200 (CEST) Received: from awhome.eu (p4FF9179D.dip0.t-ipconnect.de [79.249.23.157]) (Authenticated sender: postmaster@awhome.eu) by player716.ha.ovh.net (Postfix) with ESMTPSA id 0DF578E406D2; Mon, 19 Aug 2019 21:15:04 +0000 (UTC) Subject: Re: [PATCH 4/4] iwlwifi: Enable Extended Key ID for mvm and dvm DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=wetzel-home.de; s=wetzel-home; t=1566249303; bh=hbmNEuDHtukGJieI+S52JwOjHwsSoZzrGFjR5aHnaG4=; h=Subject:To:Cc:References:From:Date:In-Reply-To; b=sOHZQUbv8as+MLIDdN713rES/nrPwk5q2NLnJLny8aCRunbD6XbGJeBa4gqYs8tH3 xxshjTZ38p9NBfBu4t3uwT53dgGJdSzjXHUK4RYYbpu44aUKHKY8uiCY/yP/dvB1Nr kt9l3ZPgIxT6tJ5viKY4ozSCiTcWLVcr/prCBcDA= To: Johannes Berg , Luca Coelho Cc: linux-wireless@vger.kernel.org References: <20190629195015.19680-1-alexander@wetzel-home.de> <20190629195015.19680-4-alexander@wetzel-home.de> From: Alexander Wetzel Message-ID: <42653433-58b5-10f0-288e-1e5731e012d1@wetzel-home.de> Date: Mon, 19 Aug 2019 23:15:03 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Ovh-Tracer-Id: 1250593322868219132 X-VR-SPAMSTATE: OK X-VR-SPAMSCORE: -100 X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgeduvddrudefledgudehkecutefuodetggdotefrodftvfcurfhrohhfihhlvgemucfqggfjpdevjffgvefmvefgnecuuegrihhlohhuthemucehtddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Am 19.08.19 um 22:23 schrieb Johannes Berg: > On Mon, 2019-08-19 at 17:52 +0200, Alexander Wetzel wrote: > >> We may also get away by adding only means to pass the keyid of the MPDU >> (zero or one) to the HW. That could be done quite simple, I think: >> >> We could add two new flags, e.g. IWL_TX_FLAGS_ENCRYPT_ID_0 and >> IWL_TX_FLAGS_ENCRYPT_ID_1 to avoid the need to change the structures >> iwl_tx_cmd_gen2 and iwl_tx_cmd_gen3. >> When the firmware would check and use the key referenced by the STA + >> flag-id prior to the "last installed" key that should be sufficient. >> By still using the last installed key without any of the new flags set >> we also would remain backward compatible. >> >> If you have any experimental firmware to test I'm happy to do so:-) >> Till then I'm back using older iwlwifi cards. > > I'm not convinced that we can change the TX API at all, I suspect we > have to go detect it as we saw in the other patch. If we do actually > have the ability to change the TX API it might be simpler overall, but > anyway, I'd have to go look at how this is all implemented before I > comment further. Doesn't seem like an intractable problem, the only > question is if we get to spend time on it :) You are thinking about keeping the tx API untouched and modify the key install logic? Just prevent the firmware to activate a key for Tx when it's installed and notify the firmware by some means when the key can be used for Tx and then switch everything to the new key? I guess there is no practical way I can get access to the firmware code, correct? For me it sounds harder than the optional flag extension I had in mind for the new tx API. After all one of the existing flags can already suppress the encryption. Checking for the presence of two optional flags and use these to select a different key sounded not very hard. But then I literally know nothing about that and if the card/firmware has some fundamental issue handling two unicast keys the picture changes of course... So let's wait and see what you can turn up. Till then we have more than enough other cards supporting Extended Key ID:-) Alexander