mirror of
				https://git.kernel.org/pub/scm/network/wireless/iwd.git
				synced 2025-11-04 08:57:29 +01:00 
			
		
		
		
	station: Do not set or use the offload bit
station should be isolated as much as possible from the details of the driver type and how a particular AKM is handled under the hood. It will be up to wiphy to pick the best AKM for a given bss. netdev in turn will pick how to drive the particular AKM that was picked.
This commit is contained in:
		
							parent
							
								
									d79e883e93
								
							
						
					
					
						commit
						ca085d799d
					
				@ -116,7 +116,6 @@ struct handshake_state {
 | 
			
		||||
	bool wait_for_gtk : 1;
 | 
			
		||||
	bool no_rekey : 1;
 | 
			
		||||
	bool support_fils : 1;
 | 
			
		||||
	bool offload : 1;
 | 
			
		||||
	uint8_t ssid[32];
 | 
			
		||||
	size_t ssid_len;
 | 
			
		||||
	char *passphrase;
 | 
			
		||||
 | 
			
		||||
@ -981,16 +981,6 @@ static struct handshake_state *station_handshake_setup(struct station *station,
 | 
			
		||||
				goto no_psk;
 | 
			
		||||
 | 
			
		||||
			handshake_state_set_passphrase(hs, passphrase);
 | 
			
		||||
 | 
			
		||||
			/*
 | 
			
		||||
			 * TODO: This check isn't strictly correct since
 | 
			
		||||
			 * some drivers may support EXTERNAL_AUTH but since
 | 
			
		||||
			 * wiphy_can_connect takes this into account IWD should
 | 
			
		||||
			 * have already rejected the connection if this was the
 | 
			
		||||
			 * case.
 | 
			
		||||
			 */
 | 
			
		||||
			if (!wiphy_supports_cmds_auth_assoc(wiphy))
 | 
			
		||||
				hs->offload = true;
 | 
			
		||||
		} else {
 | 
			
		||||
			const uint8_t *psk = network_get_psk(network);
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user