ath11k: Ignore resetting peer auth flag in peer assoc cmd
authorSeevalamuthu Mariappan <seevalam@codeaurora.org>
Mon, 7 Dec 2020 14:16:08 +0000 (16:16 +0200)
committerKalle Valo <kvalo@codeaurora.org>
Mon, 7 Dec 2020 16:09:17 +0000 (18:09 +0200)
commit1daf58b23a1ed71c2064ea4d3aa517ac8669cf8d
treeb88f5512e964134f49fe03167f3e9f1160ccbecf
parente8e55d8919ea7e78e0768188bb3f42f8a252d4b3
ath11k: Ignore resetting peer auth flag in peer assoc cmd

Incase of hardware encryption, WMI_PEER_AUTH flag will be set by firmware
during install key. Since install key wont be done for software encryption
mode, firmware will not set this flag. Due to this, seeing traffic failure
in software encryption. Hence, avoid resetting peer auth flag if hardware
encryption disabled.

Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.4.0.1-01421-QCAHKSWPL_SILICONZ-1

Signed-off-by: Seevalamuthu Mariappan <seevalam@codeaurora.org>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
Link: https://lore.kernel.org/r/1606369414-25211-1-git-send-email-seevalam@codeaurora.org
drivers/net/wireless/ath/ath11k/wmi.c