|
@@ -1844,6 +1844,40 @@ bool lim_process_sae_preauth_frame(struct mac_context *mac, uint8_t *rx_pkt)
|
|
|
}
|
|
|
|
|
|
#define WLAN_MIN_AUTH_FRM_ALGO_FIELD_LEN 2
|
|
|
+
|
|
|
+#ifdef WLAN_FEATURE_ROAM_OFFLOAD
|
|
|
+static void lim_process_ft_sae_auth_frame(struct mac_context *mac,
|
|
|
+ struct pe_session *pe_session,
|
|
|
+ uint8_t *body, uint16_t frame_len)
|
|
|
+{
|
|
|
+}
|
|
|
+#else
|
|
|
+/**
|
|
|
+ * lim_process_ft_sae_auth_frame() - process SAE pre auth frame for LFR2
|
|
|
+ * @mac: pointer to mac_context
|
|
|
+ * @pe_session: pointer to pe session
|
|
|
+ * @body: auth frame body
|
|
|
+ * @frame_len: auth frame length
|
|
|
+ *
|
|
|
+ * Return: void
|
|
|
+ */
|
|
|
+static void lim_process_ft_sae_auth_frame(struct mac_context *mac,
|
|
|
+ struct pe_session *pe_session,
|
|
|
+ uint8_t *body, uint16_t frame_len)
|
|
|
+{
|
|
|
+ tpSirMacAuthFrameBody auth = (tpSirMacAuthFrameBody)body;
|
|
|
+
|
|
|
+ if (!pe_session || !pe_session->ftPEContext.pFTPreAuthReq) {
|
|
|
+ pe_debug("cannot find session or FT in FT pre-auth phase");
|
|
|
+ return;
|
|
|
+ }
|
|
|
+
|
|
|
+ if (auth->authTransactionSeqNumber == SIR_MAC_AUTH_FRAME_2)
|
|
|
+ lim_handle_ft_pre_auth_rsp(mac, QDF_STATUS_SUCCESS, body,
|
|
|
+ frame_len, pe_session);
|
|
|
+}
|
|
|
+#endif
|
|
|
+
|
|
|
/**
|
|
|
*
|
|
|
* Pass the received Auth frame. This is possibly the pre-auth from the
|
|
@@ -1884,18 +1918,6 @@ QDF_STATUS lim_process_auth_frame_no_session(struct mac_context *mac,
|
|
|
(uint)abs((int8_t)WMA_GET_RX_RSSI_NORMALIZED(pBd)),
|
|
|
auth_alg, curr_seq_num);
|
|
|
|
|
|
- sae_auth_frame = lim_process_sae_preauth_frame(mac, pBd);
|
|
|
- if (sae_auth_frame)
|
|
|
- return QDF_STATUS_SUCCESS;
|
|
|
-
|
|
|
- if (auth_alg == eSIR_AUTH_TYPE_PASN) {
|
|
|
- vdev_id = lim_get_pasn_peer_vdev_id(mac, mac_hdr->bssId);
|
|
|
- if (vdev_id == WLAN_UMAC_VDEV_ID_MAX)
|
|
|
- return QDF_STATUS_E_FAILURE;
|
|
|
-
|
|
|
- return lim_process_pasn_auth_frame(mac, vdev_id, pBd);
|
|
|
- }
|
|
|
-
|
|
|
/* Auth frame has come on a new BSS, however, we need to find the session
|
|
|
* from where the auth-req was sent to the new AP
|
|
|
*/
|
|
@@ -1911,6 +1933,20 @@ QDF_STATUS lim_process_auth_frame_no_session(struct mac_context *mac,
|
|
|
}
|
|
|
}
|
|
|
|
|
|
+ sae_auth_frame = lim_process_sae_preauth_frame(mac, pBd);
|
|
|
+ if (sae_auth_frame) {
|
|
|
+ lim_process_ft_sae_auth_frame(mac, pe_session, pBody, frameLen);
|
|
|
+ return QDF_STATUS_SUCCESS;
|
|
|
+ }
|
|
|
+
|
|
|
+ if (auth_alg == eSIR_AUTH_TYPE_PASN) {
|
|
|
+ vdev_id = lim_get_pasn_peer_vdev_id(mac, mac_hdr->bssId);
|
|
|
+ if (vdev_id == WLAN_UMAC_VDEV_ID_MAX)
|
|
|
+ return QDF_STATUS_E_FAILURE;
|
|
|
+
|
|
|
+ return lim_process_pasn_auth_frame(mac, vdev_id, pBd);
|
|
|
+ }
|
|
|
+
|
|
|
if (!pe_session) {
|
|
|
pe_debug("cannot find session id in FT pre-auth phase");
|
|
|
return QDF_STATUS_E_FAILURE;
|