|
@@ -10522,6 +10522,13 @@ csr_update_key_cmd(tpAniSirGlobal mac_ctx, struct csr_roam_session *session,
|
|
|
}
|
|
|
qdf_mem_copy(session->eseCckmInfo.btk, set_key->Key,
|
|
|
SIR_BTK_KEY_LEN);
|
|
|
+ /*
|
|
|
+ * KRK and BTK are updated by upper layer back to back. Send
|
|
|
+ * updated KRK and BTK together to FW here.
|
|
|
+ */
|
|
|
+ csr_roam_offload_scan(mac_ctx, session->sessionId,
|
|
|
+ ROAM_SCAN_OFFLOAD_UPDATE_CFG,
|
|
|
+ REASON_ROAM_PSK_PMK_CHANGED);
|
|
|
break;
|
|
|
#endif
|
|
|
#endif /* FEATURE_WLAN_ESE */
|
|
@@ -14031,6 +14038,13 @@ QDF_STATUS csr_roam_set_psk_pmk(tpAniSirGlobal pMac, uint32_t sessionId,
|
|
|
}
|
|
|
qdf_mem_copy(pSession->psk_pmk, pPSK_PMK, sizeof(pSession->psk_pmk));
|
|
|
pSession->pmk_len = pmk_len;
|
|
|
+
|
|
|
+ if (csr_is_auth_type_ese(pMac->roam.roamSession[sessionId].
|
|
|
+ connectedProfile.AuthType)) {
|
|
|
+ sme_debug("PMK update is not required for ESE");
|
|
|
+ return QDF_STATUS_SUCCESS;
|
|
|
+ }
|
|
|
+
|
|
|
csr_roam_offload_scan(pMac, sessionId,
|
|
|
ROAM_SCAN_OFFLOAD_UPDATE_CFG,
|
|
|
REASON_ROAM_PSK_PMK_CHANGED);
|