summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorKrunal Soni <ksoni@qca.qualcomm.com>2014-09-23 20:49:35 -0700
committerAnjaneeDevi Kapparapu <c_akappa@qti.qualcomm.com>2014-09-25 17:32:50 +0530
commitb1fb28c19ec4b407fb7f9a4d06ffdc82e86a5889 (patch)
tree8afa7cabc55e7eda8a1516dee7b031b8725f91b1
parentb32382ea48ac7dea3c42173d5042be4f8123a765 (diff)
qcacld:PMF: Do not delete station upon receiving spoof auth.
when SAP & STA are connected in PMF state, if recorded auth packet is replayed through packet injector then SAP disconnects the connected STA. With this patch, SAP will not disconnect STA upon receiving spoof auth. It will inspect the rogue STA through SA query procedure upon receiving assoc request. Change-Id: Id6b246f8976ea1e6871b755c37fef50656e5b918 CRs-Fixed: 683701
-rw-r--r--CORE/MAC/src/pe/lim/limProcessAuthFrame.c6
1 files changed, 5 insertions, 1 deletions
diff --git a/CORE/MAC/src/pe/lim/limProcessAuthFrame.c b/CORE/MAC/src/pe/lim/limProcessAuthFrame.c
index 08ffbfcf82db..1571720ad579 100644
--- a/CORE/MAC/src/pe/lim/limProcessAuthFrame.c
+++ b/CORE/MAC/src/pe/lim/limProcessAuthFrame.c
@@ -657,7 +657,11 @@ limProcessAuthFrame(tpAniSirGlobal pMac, tANI_U8 *pRxPacketInfo, tpPESession pse
pStaDs = NULL;
}
- if (NULL != pStaDs)
+ if (NULL != pStaDs
+#ifdef WLAN_FEATURE_11W
+ && !pStaDs->rmfEnabled
+#endif
+ )
{
PELOGE(limLog(pMac, LOGE,
FL("lim Delete Station Context (staId: %d, assocId: %d) "),