mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2024-11-26 02:19:26 +01:00
station: Do not set or use the offload bit
station should be isolated as much as possible from the details of the driver type and how a particular AKM is handled under the hood. It will be up to wiphy to pick the best AKM for a given bss. netdev in turn will pick how to drive the particular AKM that was picked.
This commit is contained in:
parent
d79e883e93
commit
ca085d799d
@ -116,7 +116,6 @@ struct handshake_state {
|
||||
bool wait_for_gtk : 1;
|
||||
bool no_rekey : 1;
|
||||
bool support_fils : 1;
|
||||
bool offload : 1;
|
||||
uint8_t ssid[32];
|
||||
size_t ssid_len;
|
||||
char *passphrase;
|
||||
|
@ -981,16 +981,6 @@ static struct handshake_state *station_handshake_setup(struct station *station,
|
||||
goto no_psk;
|
||||
|
||||
handshake_state_set_passphrase(hs, passphrase);
|
||||
|
||||
/*
|
||||
* TODO: This check isn't strictly correct since
|
||||
* some drivers may support EXTERNAL_AUTH but since
|
||||
* wiphy_can_connect takes this into account IWD should
|
||||
* have already rejected the connection if this was the
|
||||
* case.
|
||||
*/
|
||||
if (!wiphy_supports_cmds_auth_assoc(wiphy))
|
||||
hs->offload = true;
|
||||
} else {
|
||||
const uint8_t *psk = network_get_psk(network);
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user