mirror of
				https://git.kernel.org/pub/scm/network/wireless/iwd.git
				synced 2025-10-30 20:37:26 +01:00 
			
		
		
		
	station: disable OCV if offloading is supported
It was seen during testing that several offload-capable cards were not including the OCI in the 4-way handshake. This made any OCV capable AP unconnectable. To be safe disable OCV on any cards that support offloading.
This commit is contained in:
		
							parent
							
								
									747cb00c31
								
							
						
					
					
						commit
						42ab82c20c
					
				| @ -1085,7 +1085,20 @@ build_ie: | ||||
| 					&disable_ocv)) | ||||
| 		disable_ocv = false; | ||||
| 
 | ||||
| 	info.ocvc = !disable_ocv && bss_info.ocvc && info.mfpc; | ||||
| 	/*
 | ||||
| 	 * Obviously do not enable OCV if explicitly disabled or no AP support. | ||||
| 	 * | ||||
| 	 * Not obviously hostapd rejects OCV support if MFPC is not enabled. | ||||
| 	 * This is not really specified by the spec, but we have to work around | ||||
| 	 * this limitation. | ||||
| 	 * | ||||
| 	 * Another limitation is full mac cards. With limited testing it was | ||||
| 	 * seen that they do not include the OCI in the 4-way handshake yet | ||||
| 	 * still advertise the capability. Because of this OCV is disabled if | ||||
| 	 * any offload features are detected (since IWD prefers to use offload). | ||||
| 	 */ | ||||
| 	info.ocvc = !disable_ocv && bss_info.ocvc && info.mfpc && | ||||
| 			!wiphy_can_offload(wiphy);; | ||||
| 
 | ||||
| 	/*
 | ||||
| 	 * IEEE 802.11-2020 9.4.2.24.4 states extended key IDs can only be used | ||||
|  | ||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user
	 James Prestwood
						James Prestwood