On Thursday, April 12, 2018 01:46 PM, Loic Poulain wrote:
> Hi Daniel,
> 
>> @@ -564,10 +565,13 @@ static int wcn36xx_set_key(struct ieee80211_hw *hw, 
>> enum set_key_cmd cmd,
>>                 break;
>>         case DISABLE_KEY:
>>                 if (!(IEEE80211_KEY_FLAG_PAIRWISE & key_conf->flags)) {
>> +                       if (vif_priv->bss_index != 
>> WCN36XX_HAL_BSS_INVALID_IDX)
>> +                               wcn36xx_smd_remove_bsskey(wcn,
>> +                                       vif_priv->encrypt_type,
>> +                                       vif_priv->bss_index,
>> +                                       key_conf->keyidx);
>> +
>>                         vif_priv->encrypt_type = WCN36XX_HAL_ED_NONE;
>> -                       wcn36xx_smd_remove_bsskey(wcn,
>> -                               vif_priv->encrypt_type,
>> -                               key_conf->keyidx);
> 
> Note that moving vif_priv->encrypt_type = WCN36XX_HAL_ED_NONE after
> key removal also fixes an issue I observed in AP mode:
> wcn36xx: ERROR hal_remove_bsskey response failed err=6

Yeah, sorry. I did that intentionally, but missed to mention it in the
commit log.


Thanks,
Daniel

Reply via email to