From patchwork Thu Apr 25 11:28:04 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ping-Ke Shih X-Patchwork-Id: 792310 Received: from rtits2.realtek.com.tw (rtits2.realtek.com [211.75.126.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 77D3D83CCD for ; Thu, 25 Apr 2024 11:28:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=211.75.126.72 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714044523; cv=none; b=j50u54b67DOcTQv7woRIgBXWp5U45sF6Q55UWbYOYa13CoVIgzs7YEecIrgEvSg8iIFRGfFeBNantbi+uhfpKk5Dhyiyaw3d8Sqn7VqFfqwA/CqD4pGWAEUgwU5qggh72SYJlEGpqPnK5KF4s7605Vav4in4iLHcMO7l/nB7UlQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714044523; c=relaxed/simple; bh=P7iouJRTSRvvRgXkqacDkSEEaD54HJMF/lGj+NRdyy8=; h=From:To:CC:Subject:Date:Message-ID:MIME-Version:Content-Type; b=jvinv5DupxEx0A/BbcaDP+ls3A2e0GbcyVwkVM2RsEcR8lSeeAP99E18EQcP5Xb9anJv/HCjQBlSPVSfGZ6hjaIBZgmASp+dK/UEYje2DiduHL1ug8eiv7lfvO3PaFTnnI2tvqKQnx6d8/cIeCDhP0lMHlkI/M9Vb4xH0gnquQA= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=realtek.com; spf=pass smtp.mailfrom=realtek.com; arc=none smtp.client-ip=211.75.126.72 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=realtek.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=realtek.com X-SpamFilter-By: ArmorX SpamTrap 5.78 with qID 43PBScn663482229, This message is accepted by code: ctloc85258 Received: from mail.realtek.com (rtexh36505.realtek.com.tw[172.21.6.25]) by rtits2.realtek.com.tw (8.15.2/2.95/5.92) with ESMTPS id 43PBScn663482229 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Thu, 25 Apr 2024 19:28:38 +0800 Received: from RTEXMBS04.realtek.com.tw (172.21.6.97) by RTEXH36505.realtek.com.tw (172.21.6.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Thu, 25 Apr 2024 19:28:38 +0800 Received: from [127.0.1.1] (172.16.16.129) by RTEXMBS04.realtek.com.tw (172.21.6.97) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Thu, 25 Apr 2024 19:28:37 +0800 From: Ping-Ke Shih To: CC: , Subject: [PATCH 00/12] wifi: rtw89: wow: support more exchange in WoWLAN mode Date: Thu, 25 Apr 2024 19:28:04 +0800 Message-ID: <20240425112816.26431-1-pkshih@realtek.com> X-Mailer: git-send-email 2.25.1 Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-ClientProxiedBy: RTEXMBS02.realtek.com.tw (172.21.6.95) To RTEXMBS04.realtek.com.tw (172.21.6.97) X-KSE-ServerInfo: RTEXH36505.realtek.com.tw, 9 X-KSE-AntiSpam-Interceptor-Info: fallback X-KSE-Antivirus-Interceptor-Info: fallback X-KSE-AntiSpam-Interceptor-Info: fallback Driver offload template frames to firmware as helpers to exchange keys and ARP response by firmware. First two patches are to prepare flows required by WoWLAN. Patches 5/12 and 6/12 are to access H2C command via struct instead of macros, which don't change logic at all. That last one is to support ARP response by firmware. Others are to maintain variant keys for variant ciphers between mac80211/driver/firmware. Chih-Kang Chang (10): wifi: rtw89: wow: refine WoWLAN flows of HCI interrupts and low power mode wifi: rtw89: wow: parsing Auth Key Management from associate request wifi: rtw89: wow: prepare PTK GTK info from mac80211 wifi: rtw89: use struct to access firmware command h2c_dctl_sec_cam_v1 wifi: rtw89: use struct to fill H2C of WoWLAN global configuration wifi: rtw89: wow: construct EAPoL packet for GTK rekey offload wifi: rtw89: wow: add GTK rekey feature related H2C commands wifi: rtw89: wow: update latest PTK GTK info to mac80211 after resume wifi: rtw89: wow: support 802.11w PMF IGTK rekey wifi: rtw89: wow: support WEP cipher on WoWLAN Chin-Yen Lee (2): wifi: rtw89: wow: send RFK pre-nofity H2C command in WoWLAN mode wifi: rtw89: wow: add ARP offload feature drivers/net/wireless/realtek/rtw89/cam.c | 120 ++- drivers/net/wireless/realtek/rtw89/cam.h | 71 +- drivers/net/wireless/realtek/rtw89/core.c | 6 +- drivers/net/wireless/realtek/rtw89/core.h | 51 ++ drivers/net/wireless/realtek/rtw89/fw.c | 334 +++++++- drivers/net/wireless/realtek/rtw89/fw.h | 466 +++--------- drivers/net/wireless/realtek/rtw89/mac.c | 43 ++ drivers/net/wireless/realtek/rtw89/mac.h | 7 + drivers/net/wireless/realtek/rtw89/mac80211.c | 26 + drivers/net/wireless/realtek/rtw89/ps.c | 3 +- drivers/net/wireless/realtek/rtw89/wow.c | 716 +++++++++++++++++- drivers/net/wireless/realtek/rtw89/wow.h | 50 ++ 12 files changed, 1501 insertions(+), 392 deletions(-)