iwlwifi: mvm: advertise BIGTK client support if available
If the firmware has support, then advertise it to the stack and send the key down. Since we re-check the protection in the host anyway, we don't really need to do anything on RX except that we should drop frames that the firmware _knows_ are replay errors, since beacon filtering might otherwise result in replays being possible. Signed-off-by: Johannes Berg <johannes.berg@intel.com> Signed-off-by: Luca Coelho <luciano.coelho@intel.com> Link: https://lore.kernel.org/r/iwlwifi.20210205110447.f5a3d53301b3.I23e84c9bb0b039d9106a07e9d6847776757f9029@changeid Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
This commit is contained in:
committed by
Luca Coelho
parent
ddd83d328c
commit
b1fdc2505a
@ -3304,7 +3304,8 @@ static int iwl_mvm_send_sta_igtk(struct iwl_mvm *mvm,
|
||||
|
||||
/* verify the key details match the required command's expectations */
|
||||
if (WARN_ON((keyconf->flags & IEEE80211_KEY_FLAG_PAIRWISE) ||
|
||||
(keyconf->keyidx != 4 && keyconf->keyidx != 5) ||
|
||||
(keyconf->keyidx != 4 && keyconf->keyidx != 5 &&
|
||||
keyconf->keyidx != 6 && keyconf->keyidx != 7) ||
|
||||
(keyconf->cipher != WLAN_CIPHER_SUITE_AES_CMAC &&
|
||||
keyconf->cipher != WLAN_CIPHER_SUITE_BIP_GMAC_128 &&
|
||||
keyconf->cipher != WLAN_CIPHER_SUITE_BIP_GMAC_256)))
|
||||
@ -3353,9 +3354,10 @@ static int iwl_mvm_send_sta_igtk(struct iwl_mvm *mvm,
|
||||
((u64) pn[0] << 40));
|
||||
}
|
||||
|
||||
IWL_DEBUG_INFO(mvm, "%s igtk for sta %u\n",
|
||||
IWL_DEBUG_INFO(mvm, "%s %sIGTK (%d) for sta %u\n",
|
||||
remove_key ? "removing" : "installing",
|
||||
igtk_cmd.sta_id);
|
||||
keyconf->keyidx >= 6 ? "B" : "",
|
||||
keyconf->keyidx, igtk_cmd.sta_id);
|
||||
|
||||
if (!iwl_mvm_has_new_rx_api(mvm)) {
|
||||
struct iwl_mvm_mgmt_mcast_key_cmd_v1 igtk_cmd_v1 = {
|
||||
|
Reference in New Issue
Block a user