diff options
author | Seevalamuthu Mariappan <seevalam@codeaurora.org> | 2020-12-07 16:16:08 +0200 |
---|---|---|
committer | Kalle Valo <kvalo@codeaurora.org> | 2020-12-07 18:09:17 +0200 |
commit | 1daf58b23a1ed71c2064ea4d3aa517ac8669cf8d (patch) | |
tree | b88f5512e964134f49fe03167f3e9f1160ccbecf /drivers/net/wireless/ath/ath9k/dfs_debug.c | |
parent | e8e55d8919ea7e78e0768188bb3f42f8a252d4b3 (diff) | |
download | linux-1daf58b23a1ed71c2064ea4d3aa517ac8669cf8d.tar.bz2 |
ath11k: Ignore resetting peer auth flag in peer assoc cmd
Incase of hardware encryption, WMI_PEER_AUTH flag will be set by firmware
during install key. Since install key wont be done for software encryption
mode, firmware will not set this flag. Due to this, seeing traffic failure
in software encryption. Hence, avoid resetting peer auth flag if hardware
encryption disabled.
Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.4.0.1-01421-QCAHKSWPL_SILICONZ-1
Signed-off-by: Seevalamuthu Mariappan <seevalam@codeaurora.org>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
Link: https://lore.kernel.org/r/1606369414-25211-1-git-send-email-seevalam@codeaurora.org
Diffstat (limited to 'drivers/net/wireless/ath/ath9k/dfs_debug.c')
0 files changed, 0 insertions, 0 deletions