|
@@ -891,7 +891,8 @@ static bool cm_is_retry_with_same_candidate(struct cnx_mgr *cm_ctx,
|
|
|
* AP has reconnect on assoc timeout OUI.
|
|
|
*/
|
|
|
sae_connection = key_mgmt & (1 << WLAN_CRYPTO_KEY_MGMT_SAE |
|
|
|
- 1 << WLAN_CRYPTO_KEY_MGMT_FT_SAE);
|
|
|
+ 1 << WLAN_CRYPTO_KEY_MGMT_FT_SAE |
|
|
|
+ 1 << WLAN_CRYPTO_KEY_MGMT_SAE_EXT_KEY);
|
|
|
if (resp->reason == CM_ASSOC_TIMEOUT && (sae_connection ||
|
|
|
(mlme_get_reconn_after_assoc_timeout_flag(psoc, resp->vdev_id)))) {
|
|
|
/* For SAE use max retry count from INI */
|
|
@@ -1940,6 +1941,8 @@ void cm_update_per_peer_key_mgmt_crypto_params(struct wlan_objmgr_vdev *vdev,
|
|
|
*/
|
|
|
if (QDF_HAS_PARAM(neg_akm, WLAN_CRYPTO_KEY_MGMT_FT_SAE))
|
|
|
QDF_SET_PARAM(key_mgmt, WLAN_CRYPTO_KEY_MGMT_FT_SAE);
|
|
|
+ else if (QDF_HAS_PARAM(neg_akm, WLAN_CRYPTO_KEY_MGMT_SAE_EXT_KEY))
|
|
|
+ QDF_SET_PARAM(key_mgmt, WLAN_CRYPTO_KEY_MGMT_SAE_EXT_KEY);
|
|
|
else if (QDF_HAS_PARAM(neg_akm, WLAN_CRYPTO_KEY_MGMT_SAE))
|
|
|
QDF_SET_PARAM(key_mgmt, WLAN_CRYPTO_KEY_MGMT_SAE);
|
|
|
else if (QDF_HAS_PARAM(neg_akm, WLAN_CRYPTO_KEY_MGMT_IEEE8021X_SUITE_B))
|