Kalle Valo <kvalo@xxxxxxxxxxxxxxxx> wrote: > Rx data frames notified through HTT_T2H_MSG_TYPE_RX_IND and > HTT_T2H_MSG_TYPE_RX_FRAG_IND expect PN/TSC check to be done > on host (mac80211) rather than firmware. Rebuild cipher header > in every received data frames (that are notified through those > HTT interfaces) from the rx_hdr_status tlv available in the > rx descriptor of the first msdu. Skip setting RX_FLAG_IV_STRIPPED > flag for the packets which requires mac80211 PN/TSC check support > and set appropriate RX_FLAG for stripped crypto tail. Hw QCA988X, > QCA9887, QCA99X0, QCA9984, QCA9888 and QCA4019 currently need the > rebuilding of cipher header to perform PN/TSC check for replay > attack. > > Please note that removing crypto tail for CCMP-256, GCMP and GCMP-256 ciphers > in raw mode needs to be fixed. Since Rx with these ciphers in raw > mode does not work in the current form even without this patch and > removing crypto tail for these chipers needs clean up, raw mode related > issues in CCMP-256, GCMP and GCMP-256 can be addressed in follow up > patches. > > Tested-by: Manikanta Pubbisetty <mpubbise@xxxxxxxxxxxxxxxx> > Signed-off-by: Vasanthakumar Thiagarajan <vthiagar@xxxxxxxxxxxxxxxx> > Signed-off-by: Kalle Valo <kvalo@xxxxxxxxxxxxxxxx> Patch applied to ath-current branch of ath.git, thanks. 7eccb738fce5 ath10k: rebuild crypto header in rx data frames -- https://patchwork.kernel.org/patch/10028621/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches