qcacld-3.0: Fix invalid PMK sent for FILS-FT roam
For FT-FILS AKM, 1st connection to an AP in a realm takes place with Full EAP. 2nd connection to any AP in the realm does the FT initial mobility domain association with authentication algorithm as FILS. Subsequent connection/roam happens with FT protocol. fils_ft key is derived during 2nd connection. But driver copies from fils_ft buffer after 1st connection is complete to fill the PMK in the 11r TLV. This causes the pmk len = 0 is sent in the 11r TLV. Fill the initial connection PMK in RSO command after 1st connection. From 2nd connection onwards fill the fils_ft. Change-Id: I52399fc7bd3526a11e29c54a3ca13d43bbaf6b80 CRs-Fixed: 3197226
This commit is contained in:

committed by
Madan Koyyalamudi

父節點
6f6ef983eb
當前提交
ea0b8725af
@@ -3464,8 +3464,9 @@ static void wmi_fill_roam_offload_11r_params(
|
||||
|
||||
src_11r_params = &roam_req->rso_11r_info;
|
||||
|
||||
if (akm == WMI_AUTH_FT_RSNA_FILS_SHA256 ||
|
||||
akm == WMI_AUTH_FT_RSNA_FILS_SHA384) {
|
||||
if ((akm == WMI_AUTH_FT_RSNA_FILS_SHA256 ||
|
||||
akm == WMI_AUTH_FT_RSNA_FILS_SHA384) &&
|
||||
roam_req->fils_roam_config.fils_ft_len) {
|
||||
psk_msk = roam_req->fils_roam_config.fils_ft;
|
||||
len = roam_req->fils_roam_config.fils_ft_len;
|
||||
} else {
|
||||
|
Reference in New Issue
Block a user