Received: by 2002:a89:d88:0:b0:1fa:5c73:8e2d with SMTP id eb8csp2518564lqb; Tue, 28 May 2024 02:19:27 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXfbuhc99sMWcHtAmV8XLAZC7ajgsvc0zk7NISVmPEbviFI3AP/ZoQNp+MqItXw87XHyXYRFhtq9uU5/II1Z/++p/iABLmCmU2X0iH7SA== X-Google-Smtp-Source: AGHT+IEng39NSc7WKT+AcXBR5dx46dw5PzqlcPyA/0/R1YUDCTCTt81IG/c8fuLcoQdSvjW920N+ X-Received: by 2002:a05:622a:2997:b0:43f:a084:58ff with SMTP id d75a77b69052e-43fb0ea5432mr126794991cf.33.1716887967434; Tue, 28 May 2024 02:19:27 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716887967; cv=pass; d=google.com; s=arc-20160816; b=Kc5x9d2XAOX+uwVQq/E6DqYUZTW3B21JRpi1wKVHraL2+xTB9oZspTg35AW3qOXLwD j4ztAbH1WZmgLFLis0kVlAmV0whY7dTvqJlcbO/ap3TVtq4D31yIRdm//mNDoEUpelSs 78ZN8/OUNBX6GtPE+rMoh/uByufA5Ek20aSmysHaaremyXL8obH1w6V/dFAp6iAdjdQa vIwYjxvdpgUau+9W7o1jKC0SKlx8/xxX1Sy6KJAh1ECaiRopuNqzDqYAcoGJH4r0+2hN Lfz1wfy3zA4jcSYrsPdHp36WcvTuqOgW65Gq87IcEgmcSfIYaKhaTqBFX5sVBsKSU4yo bqxA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=date:sender:message-id:content-transfer-encoding :content-disposition:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:subject:cc:to:from:references:in-reply-to :dkim-signature; bh=UhjKQTZ4N5nNFgPTwE1YDpUmEfTGwnyBm7+TW+XXveY=; fh=9bEIRt1kFu0w5v3JaxBB4EWBt9QnAvmJsO4AZi65+Ao=; b=l97L4dWJVSkyf/dJgAUsKC6bH87ZIaEo+fZQAs8rGueOFSiDed5HCx8T8Q5G5f29Ja Xui2SrsNYZrlG6jHob0qjKiErErAVQd3RJCTxPe0VxFQeIo5shqIpanhI1c5vpvy4gpD 2LSMSjt0P7OIVaiTlnlg9I7vvC8ExGJnAMu19cUQ6dQRH9sG6sXZotVAIN7SI5HKM1T0 3ol0kAWKYSEK8psJe1msaf377Kj7OftdhFghpajyx50TcO+uqaCKf4DZ/Ze+NT5yBRgy iMPFUbDLr2j4PdLLPIqMVfA1UvdAMCVS0io+DG5veTV4E2lC52JFmB8/egmeskiet9Hp Ka9Q==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=fail (test mode) header.i=@armlinux.org.uk header.s=pandora-2019 header.b=0j++Yg4X; arc=pass (i=1 dkim=pass dkdomain=armlinux.org.uk dmarc=pass fromdomain=armlinux.org.uk); spf=pass (google.com: domain of linux-wireless+bounces-8178-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-wireless+bounces-8178-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=armlinux.org.uk Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id d75a77b69052e-43fb17b9945si102155041cf.121.2024.05.28.02.19.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 May 2024 02:19:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless+bounces-8178-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=fail (test mode) header.i=@armlinux.org.uk header.s=pandora-2019 header.b=0j++Yg4X; arc=pass (i=1 dkim=pass dkdomain=armlinux.org.uk dmarc=pass fromdomain=armlinux.org.uk); spf=pass (google.com: domain of linux-wireless+bounces-8178-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-wireless+bounces-8178-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=armlinux.org.uk Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 056081C22EA7 for ; Tue, 28 May 2024 09:19:27 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 915DE13E3E4; Tue, 28 May 2024 09:18:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=armlinux.org.uk header.i=@armlinux.org.uk header.b="0j++Yg4X" X-Original-To: linux-wireless@vger.kernel.org Received: from pandora.armlinux.org.uk (pandora.armlinux.org.uk [78.32.30.218]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0BE3D13D880; Tue, 28 May 2024 09:18:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=78.32.30.218 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716887889; cv=none; b=YWczj3uRAGho9szdEJHwT7meqnBFSAyA+Mvx4WdIGj9WnptZSPzI/RR/55+rlOzMYdY2v9SUVmKw+qMggylWisO49QG/vgxvnTsRZcI/XbBxKsmRSCK0CEoSnuPWLrqE/U7+EDZjkPFbGRg5IzIFcIG3A0SAddi/IClJyULQ/F0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716887889; c=relaxed/simple; bh=x1k4gsqI+QHKZYqcjtRet4AtaX2EO5HGhcwTJVyOrA8=; h=In-Reply-To:References:From:To:Cc:Subject:MIME-Version: Content-Disposition:Content-Type:Message-Id:Date; b=fSTteYFzjxNBTLt5QxjRNOyLGj++EvG8Yzimc0YpLhoLFbeSGLDdvFbOm2UV2uDqIyvPSRlv7JJPmk7+GhNz39I/Vl3Thv5aoWl80aImL4SpSrA6R+XgQ/li/O2inWAQ1JwSAtzrTvnTqEUWNGQGOCXOblPWheKQuAeKJORiyeI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=armlinux.org.uk; spf=none smtp.mailfrom=armlinux.org.uk; dkim=pass (2048-bit key) header.d=armlinux.org.uk header.i=@armlinux.org.uk header.b=0j++Yg4X; arc=none smtp.client-ip=78.32.30.218 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=armlinux.org.uk Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=armlinux.org.uk DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=armlinux.org.uk; s=pandora-2019; h=Date:Sender:Message-Id:Content-Type: Content-Transfer-Encoding:MIME-Version:Subject:Cc:To:From:References: In-Reply-To:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help: List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=UhjKQTZ4N5nNFgPTwE1YDpUmEfTGwnyBm7+TW+XXveY=; b=0j++Yg4X0Uc54LA0/icRYLrayu gpl3/s6FkxMROSylQSv7C5dJ+GwWcgOfOFn0stvpGjymKAeoYWTNXnzMdonC9POeyJbYr+8nKuDsU PB8TKd9YJnzh3CU+mRhtVQo4OtZAFcfxU/lMpK58Yxkfem6DfXjz01mL4SgP5bhAydPXE3erKYBIi 3veBYti41cPd3KUw5dOofHo3BIWdjgs1CqAaa6qbqdpez56yRh+YQR5ZwxRcLskznZtwGWYXs+YWQ dKElDZhYEHUcFI2EkCK5L5snvN++HJTirdvje0FiGE8b3Jbgv3xv4Qo5q62DLXIc9Z2JCa2K6hcrT BjQMenCg==; Received: from e0022681537dd.dyn.armlinux.org.uk ([fd8f:7570:feb6:1:222:68ff:fe15:37dd]:43032 helo=rmk-PC.armlinux.org.uk) by pandora.armlinux.org.uk with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from ) id 1sBsy0-0004Y8-0A; Tue, 28 May 2024 10:18:00 +0100 Received: from rmk by rmk-PC.armlinux.org.uk with local (Exim 4.94.2) (envelope-from ) id 1sBsy2-00E8vo-KK; Tue, 28 May 2024 10:18:02 +0100 In-Reply-To: References: From: "Russell King (Oracle)" To: Kalle Valo Cc: Johannes Berg , Michael Nemanov , linux-kernel@vger.kernel.org, linux-wireless@vger.kernel.org Subject: [PATCH wireless-next 5/8] wifi: wlcore: store AP encryption key type Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="utf-8" Message-Id: Sender: Russell King Date: Tue, 28 May 2024 10:18:02 +0100 Updates for WL18xx firmware 8.9.1.x.x need to know the AP encryption key type. Store this when a new key is set. Patch extracted from: https://git.ti.com/cgit/wilink8-wlan/build-utilites/tree/patches/kernel_patches/4.19.38/0023-wlcore-Fixing-PN-drift-on-encrypted-link-after-recov.patch?h=r8.9&id=a2ee50aa5190ed3b334373d6cd09b1bff56ffcf7 Signed-off-by: Russell King (Oracle) --- drivers/net/wireless/ti/wlcore/main.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/net/wireless/ti/wlcore/main.c b/drivers/net/wireless/ti/wlcore/main.c index 3defe49c5120..8f82666f379c 100644 --- a/drivers/net/wireless/ti/wlcore/main.c +++ b/drivers/net/wireless/ti/wlcore/main.c @@ -3537,6 +3537,10 @@ int wlcore_set_key(struct wl1271 *wl, enum set_key_cmd cmd, return ret; } + /* Store AP encryption key type */ + if (wlvif->bss_type == BSS_TYPE_AP_BSS) + wlvif->encryption_type = key_type; + /* * reconfiguring arp response if the unicast (or common) * encryption key type was changed -- 2.30.2