qcacld-3.0: Support single PMK feature for AKM SAE_EXT_KEY

If host founds below all conditions are true:
1. Connected AP sends CCX IE in beacon/probe response
2. single PMK feature enabled via ini
   "sae_single_pmk_feature_enabled"
3. And current connection is SAE with AKM type
   WLAN_CRYPTO_KEY_MGMT_SAE_EXT_KEY or
   WLAN_CRYPTO_KEY_MGMT_SAE

Then host should mark connected AP supports
"single PMK feature" and update same to FW via RSO
command.

Change-Id: I831cfefb60271b03e5c5cbdfde0bd5277ee116e0
CRs-Fixed: 3795133
This commit is contained in:
Abhinav Kumar
2024-04-22 23:56:35 -07:00
committed by Ravindra Konda
parent 606f641f70
commit 6cc31cba53
4 changed files with 8 additions and 4 deletions

View File

@@ -5265,7 +5265,8 @@ void wlan_mlme_update_sae_single_pmk(struct wlan_objmgr_vdev *vdev,
return;
}
if (keymgmt & (1 << WLAN_CRYPTO_KEY_MGMT_SAE))
if (QDF_HAS_PARAM(keymgmt, WLAN_CRYPTO_KEY_MGMT_SAE) ||
QDF_HAS_PARAM(keymgmt, WLAN_CRYPTO_KEY_MGMT_SAE_EXT_KEY))
is_sae_connection = true;
mlme_legacy_debug("SAE_SPMK: single_pmk_ap:%d, is_sae_connection:%d, pmk_len:%d",

View File

@@ -5626,7 +5626,8 @@ cm_store_sae_single_pmk_to_global_cache(struct wlan_objmgr_psoc *psoc,
wlan_cm_roam_cfg_get_value(psoc, vdev_id,
IS_SINGLE_PMK, &src_cfg);
if (!src_cfg.bool_value ||
!QDF_HAS_PARAM(akm, WLAN_CRYPTO_KEY_MGMT_SAE))
!(QDF_HAS_PARAM(akm, WLAN_CRYPTO_KEY_MGMT_SAE) ||
QDF_HAS_PARAM(akm, WLAN_CRYPTO_KEY_MGMT_SAE_EXT_KEY)))
return;
/*
* Mark the AP as single PMK capable in Crypto Table