Received: by 2002:a25:2c96:0:0:0:0:0 with SMTP id s144csp156993ybs; Tue, 26 May 2020 06:10:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwLs9OSfQbOB5Dnw6/FethIiZZYsKFJdEeSU3AQvukcS2TxB21ykezBLxK4PwAEdA5yHdJ5 X-Received: by 2002:a05:6402:296:: with SMTP id l22mr20424478edv.353.1590498609917; Tue, 26 May 2020 06:10:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590498609; cv=none; d=google.com; s=arc-20160816; b=cjiom/MdRzwV03TJZJjbqju4hVkUNUwlBUroEe0jxlPooA25dglIA36Y8O+4DWXRMI XHpmvuVVAitYg5mj9/mmPR32Hs8zts33Kcqu5g/8Dp+ZK32qxBjw+hGEJqTGOiCq9PC5 ePHk6aWfj2ZURjGC6Je7QNFrmKHlbO3Lcrx2kjq7990Zbcf4gaX9k0DqOptg0/6reaS0 Gdq2Vs2yInZ1FPh4yGW5ROc2aelaojC+vQYY9w5V0AwOJMJOFMDPoWfj615zBQ/LpB4A ZniRr8STI7JNS/yxHpvVom1fpCB9at+C86CLVxzuJQkHTy0F/szx3O1GlR2xgMQqfUco f4pQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=ZZJOZPzM3Bt5YlM4OsiBrzs0Ta5m8bRIwuM4nxzt9D4=; b=P7dHkPGBIusrToIIYdJp/zdNJH6pRzSpBeL+G150/5mOEYxV6IqeaZUt8/YwL1F9tK oy9WV9OpeoS6o9eHdDIHlGpWpIQmbYZLDvMGFiyfMqmkwEdjQB9RYOTQyTnWDX5c0YG6 ZbHWKv4b+eO3BC1SwBsKkKHbjY2T3pyDEcVwdR2WuBcSH2YeyZoUNRy7ERETi4E48B4h 4Ghjry83wcsRGDiVgYJuUd7yOWI+HV6mIwezJed1ZfgEl7GuK+Leca5BLiP76InnxY02 d5tzvIundjD1OVVmxcMAC6u7/n0575nVxtLDIG1Y7kgg4Q6Ea0VySnB6EAog9IHgoWiU +jFg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ds22si14794347ejc.227.2020.05.26.06.09.44; Tue, 26 May 2020 06:10:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389269AbgEZMob (ORCPT + 99 others); Tue, 26 May 2020 08:44:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58520 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389265AbgEZMob (ORCPT ); Tue, 26 May 2020 08:44:31 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:191:4433::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B9FB4C03E96D for ; Tue, 26 May 2020 05:44:30 -0700 (PDT) Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.93) (envelope-from ) id 1jdYwU-003QQT-3X; Tue, 26 May 2020 14:44:26 +0200 Message-ID: Subject: Re: [PATCH 1/2] mac80211: enable TKIP when using encapsulation offloading From: Johannes Berg To: Sathishkumar Muruganandam , ath11k@lists.infradead.org Cc: linux-wireless@vger.kernel.org Date: Tue, 26 May 2020 14:44:25 +0200 In-Reply-To: <1587720951-9222-2-git-send-email-murugana@codeaurora.org> (sfid-20200424_113624_468114_4CC488DE) References: <1587720951-9222-1-git-send-email-murugana@codeaurora.org> <1587720951-9222-2-git-send-email-murugana@codeaurora.org> (sfid-20200424_113624_468114_4CC488DE) Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.2 (3.36.2-1.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Fri, 2020-04-24 at 15:05 +0530, Sathishkumar Muruganandam wrote: > TKIP was disabled on encap offload mode since if TKIP MIC error > reporting is not capable by the driver using encap offload mode, > then TKIP countermeasures wont work. > > Enabling back TKIP bring-up in encap offload mode to leave the > control with the driver to disable hw encap when it is not capable > of TKIP MIC error reporting. So how can the driver do TKIP MIC error reporting? I don't think it can. It doesn't have all the necessary information to call cfg80211_michael_mic_failure(), as far as I can tell. I'm not applying this until I see at least the *ability* for drivers to do it. I mean, I don't really want to worry about your driver's correctness, but if you then turn around and realize that you *cannot* actually implement the right behaviour, that's no good either. johannes