return RSN_AUTH_KEY_MGMT_OWE;
if (akm & WPA_KEY_MGMT_DPP)
return RSN_AUTH_KEY_MGMT_DPP;
+#ifdef CONFIG_PASN
+ if (akm & WPA_KEY_MGMT_PASN)
+ return RSN_AUTH_KEY_MGMT_PASN;
+#endif /* CONFIG_PASN */
return 0;
}
goto fail;
for (i = 0; i < params->num_peers; i++) {
+ int akmp, cipher;
+
attr1 = nla_nest_start(msg, i);
if (!attr1 ||
nla_put(msg, QCA_WLAN_VENDOR_ATTR_PASN_PEER_SRC_ADDR,
QCA_WLAN_VENDOR_ATTR_PASN_PEER_STATUS_SUCCESS))
goto fail;
+ akmp = params->peer[i].akmp;
+ cipher = params->peer[i].cipher;
+ if (nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_PASN_PEER_AKM,
+ wpa_akm_to_suite(akmp)) ||
+ nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_PASN_PEER_CIPHER,
+ wpa_cipher_to_cipher_suite(cipher)))
+ goto fail;
+
wpa_printf(MSG_DEBUG,
"nl80211: Own address[%u]: " MACSTR
- " Peer address[%u]: " MACSTR " Status: %s",
+ " Peer address[%u]: " MACSTR
+ " Status: %s AKMP: 0x%x cipher: 0x%x",
i, MAC2STR(params->peer[i].own_addr), i,
MAC2STR(params->peer[i].peer_addr),
- params->peer[i].status ? "Fail" : "Success");
+ params->peer[i].status ? "Fail" : "Success",
+ akmp, cipher);
nla_nest_end(msg, attr1);
}