Return-path: Received: from wolverine01.qualcomm.com ([199.106.114.254]:40744 "EHLO wolverine01.qualcomm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750819AbbCCFvd (ORCPT ); Tue, 3 Mar 2015 00:51:33 -0500 From: SenthilKumar Jegadeesan To: CC: , SenthilKumar Jegadeesan Subject: [PATCH V2 2/2] ath10k: Enable encrytion of ADDBA request in PMF configuration Date: Tue, 3 Mar 2015 11:20:48 +0530 Message-ID: <1425361848-24727-2-git-send-email-sjegadee@qti.qualcomm.com> (sfid-20150303_065135_947312_40DDB0CC) In-Reply-To: <1425361848-24727-1-git-send-email-sjegadee@qti.qualcomm.com> References: <1425361848-24727-1-git-send-email-sjegadee@qti.qualcomm.com> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-wireless-owner@vger.kernel.org List-ID: In HT mode, firmware is not encrypting ADDBA request as PMF configuration is not set in peer flags during association. Set peer flags for MFP enabled station in ath10k driver. This change depends on mac80211 patch "[PATCH] mac80211: send station PMF configuration to driver". Signed-off-by: SenthilKumar Jegadeesan --- drivers/net/wireless/ath/ath10k/mac.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/net/wireless/ath/ath10k/mac.c b/drivers/net/wireless/ath/ath10k/mac.c index 0c69687..83baed7 100644 --- a/drivers/net/wireless/ath/ath10k/mac.c +++ b/drivers/net/wireless/ath/ath10k/mac.c @@ -1759,6 +1759,9 @@ static int ath10k_peer_assoc_prepare(struct ath10k *ar, ath10k_peer_assoc_h_qos(ar, vif, sta, arg); ath10k_peer_assoc_h_phymode(ar, vif, sta, arg); + if (sta->mfp) + arg->peer_flags |= ar->wmi.peer_flags->wmi_peer_pmf; + return 0; } -- 1.9.1