Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp8416rwb; Tue, 27 Sep 2022 21:34:41 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7dz4vVUm4YqplToXvRGtpAwINhScjmFSXnowBtPBEJdpfUBgd+PV/GAaLw1GwULHOlN/Zk X-Received: by 2002:aa7:c1d8:0:b0:457:d582:2105 with SMTP id d24-20020aa7c1d8000000b00457d5822105mr3664808edp.379.1664339681137; Tue, 27 Sep 2022 21:34:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664339681; cv=none; d=google.com; s=arc-20160816; b=OG/zBmff2CuC74H6jVDPpisGnB+vOYCvyjNjv96c5xg/Q/hqAGFnBLU7eZIXX6gksf +g1dvjrhy27ByrOi6Eu0CU7SIfmk8ceTJyTzywOzdxZADpjp3WIuHc+7M+muqr19Vf5o Dp5zm3TJKmsvq9Xet8ioIqtjfMoSA9R2JhIiGMZ5u3YU0rq1AbGPdDkSQZB29KVfvZCS Pjwb8qEv7fjLrWo/KO9SzzQ0n7yEQfIKDLpWfxmnPEvMo8tPJ0uiQvKi2a9AgH4Nyf1J nkd3K8gBrER0zma3HtH1EuZKLh7qwLPXsj0hW28U22tuOztIKxSZvyyqL3oyZ32eAhkC 7xYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=Q3wM7kcQvzl9kFjE7wD2wl7IqoMhfwo7nAyDxOQng/U=; b=mYTONkoS+JUBrAw1DxLFZOwla25saCWCR1EWpqr5ORqvxJ9jOQp+w19tLWRFKOthWD dirhz7P7KNLjyPwX+n6rMPO2ns4D09fskOzleFEKfHgyQ/sCIY9SGeRK1FgF2RTfHrXV 9Kzr6fbtdqN82pqDYVhd3feicXCvOxu7wbEIxbhUo6gV4fgCoHz7jWtG26+tfdg0yr3F byDmDCDDGz7vTs9H2xD0J2yidUX1w7oEwRTteohpO/fxiI7xB3anvmbE5ZuJp88/L6aH QXJuK6taMzdyjTHbN1JeafQClfoBTlf3ZPE2gVD1LFBGsXi39fPLpJ9A5EdabIse5MiK 1VQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infineon.com header.s=IFXMAIL header.b=PJSiXXb9; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=infineon.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z10-20020a05640235ca00b004573275623fsi4274947edc.423.2022.09.27.21.34.01; Tue, 27 Sep 2022 21:34:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@infineon.com header.s=IFXMAIL header.b=PJSiXXb9; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=infineon.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230172AbiI1E0Z (ORCPT + 60 others); Wed, 28 Sep 2022 00:26:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51202 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229950AbiI1E0X (ORCPT ); Wed, 28 Sep 2022 00:26:23 -0400 Received: from smtp14.infineon.com (smtp14.infineon.com [IPv6:2a00:18f0:1e00:4::6]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6252110E5EC for ; Tue, 27 Sep 2022 21:26:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=infineon.com; i=@infineon.com; q=dns/txt; s=IFXMAIL; t=1664339182; x=1695875182; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=GapK3jCYzSTns9wyR6nd44f+6U1hYYtoHrt43eJR7PM=; b=PJSiXXb9gHmqsF31+u50B8wMVFh43+BlHzX7EzU5vPnQS8aMHIrk2fXO RH4hxbikBbkztQp3Xwgyap0TU5b7yWD8nztTga1RVPgbSCRsP5cek/cc1 +y5MIzgQM/qTbnta/jCL+/x25aVMr8cRoSNvEuiR5rn40UMAE0KrPf22r g=; X-SBRS: None X-IronPort-AV: E=McAfee;i="6500,9779,10483"; a="143095346" X-IronPort-AV: E=Sophos;i="5.93,351,1654552800"; d="scan'208";a="143095346" Received: from unknown (HELO mucxv002.muc.infineon.com) ([172.23.11.17]) by smtp14.infineon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Sep 2022 06:26:19 +0200 Received: from MUCSE805.infineon.com (MUCSE805.infineon.com [172.23.29.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mucxv002.muc.infineon.com (Postfix) with ESMTPS; Wed, 28 Sep 2022 06:26:18 +0200 (CEST) Received: from MUCSE835.infineon.com (172.23.7.107) by MUCSE805.infineon.com (172.23.29.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.29; Wed, 28 Sep 2022 06:26:18 +0200 Received: from [10.234.36.216] (10.234.36.216) by MUCSE835.infineon.com (172.23.7.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.29; Wed, 28 Sep 2022 06:26:16 +0200 Message-ID: Date: Wed, 28 Sep 2022 12:26:13 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.13.1 Subject: Re: [PATCH 1/3] brcmfmac: Support DPP feature Content-Language: en-US To: Franky Lin CC: , , , , , References: <20220921015951.16178-1-ian.lin@infineon.com> <20220921015951.16178-2-ian.lin@infineon.com> <0b102940-0175-7b66-d3c7-822e41ffa1e8@infineon.com> From: "Lin Ian (CSSITB CSS ICW SW WFS / EE)" In-Reply-To: Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.234.36.216] X-ClientProxiedBy: MUCSE807.infineon.com (172.23.29.33) To MUCSE835.infineon.com (172.23.7.107) X-Spam-Status: No, score=-9.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On 9/24/2022 12:36 AM, Franky Lin wrote: > >>>> }; >>>> >>>> s32 brcmf_p2p_attach(struct brcmf_cfg80211_info *cfg, bool p2pdev_forced); >>>> @@ -170,7 +171,8 @@ int brcmf_p2p_notify_action_tx_complete(struct brcmf_if *ifp, >>>> void *data); >>>> bool brcmf_p2p_send_action_frame(struct brcmf_cfg80211_info *cfg, >>>> struct net_device *ndev, >>>> - struct brcmf_fil_af_params_le *af_params); >>>> + struct brcmf_fil_af_params_le *af_params, >>>> + struct brcmf_cfg80211_vif *vif); >>>> bool brcmf_p2p_scan_finding_common_channel(struct brcmf_cfg80211_info *cfg, >>>> struct brcmf_bss_info_le *bi); >>>> s32 brcmf_p2p_notify_rx_mgmt_p2p_probereq(struct brcmf_if *ifp, >>>> diff --git a/drivers/net/wireless/broadcom/brcm80211/include/brcmu_wifi.h b/drivers/net/wireless/broadcom/brcm80211/include/brcmu_wifi.h >>>> index 7552bdb91991..3a9cad3730b8 100644 >>>> --- a/drivers/net/wireless/broadcom/brcm80211/include/brcmu_wifi.h >>>> +++ b/drivers/net/wireless/broadcom/brcm80211/include/brcmu_wifi.h >>>> @@ -233,6 +233,11 @@ static inline bool ac_bitmap_tst(u8 bitmap, int prec) >>>> >>>> #define WPA3_AUTH_SAE_PSK 0x40000 /* SAE with 4-way handshake */ >>>> >>>> +#define WFA_AUTH_DPP 0x200000 /* WFA DPP AUTH */ >>> This is incompatible with Broadcom's bit definitions. Please use a per >>> vendor approach. >> We had extended the bit definition. >> The authentication mode will be set to our FW so it's FW-dependent. >> Do you suggest I change the name? like CY_WFA_AUTH_DPP? > Being firmware dependent is exactly the problem here. The user > functions of this macro are in common code path so this bit could go > to firmware from any vendor. A mechanism should be in place to only > set this bit when the driver is working with a infineon/cypress > firmware. > > Regards, > - Franky > Currently we don't have such mechanism. Please abandon this review series. Thank you.