diff options
| author | Krunal Soni <ksoni@qca.qualcomm.com> | 2014-09-23 20:49:35 -0700 |
|---|---|---|
| committer | AnjaneeDevi Kapparapu <c_akappa@qti.qualcomm.com> | 2014-09-25 17:32:50 +0530 |
| commit | b1fb28c19ec4b407fb7f9a4d06ffdc82e86a5889 (patch) | |
| tree | 8afa7cabc55e7eda8a1516dee7b031b8725f91b1 | |
| parent | b32382ea48ac7dea3c42173d5042be4f8123a765 (diff) | |
qcacld:PMF: Do not delete station upon receiving spoof auth.
when SAP & STA are connected in PMF state, if recorded auth packet
is replayed through packet injector then SAP disconnects the
connected STA.
With this patch, SAP will not disconnect STA upon receiving spoof
auth. It will inspect the rogue STA through SA query procedure upon
receiving assoc request.
Change-Id: Id6b246f8976ea1e6871b755c37fef50656e5b918
CRs-Fixed: 683701
| -rw-r--r-- | CORE/MAC/src/pe/lim/limProcessAuthFrame.c | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/CORE/MAC/src/pe/lim/limProcessAuthFrame.c b/CORE/MAC/src/pe/lim/limProcessAuthFrame.c index 08ffbfcf82db..1571720ad579 100644 --- a/CORE/MAC/src/pe/lim/limProcessAuthFrame.c +++ b/CORE/MAC/src/pe/lim/limProcessAuthFrame.c @@ -657,7 +657,11 @@ limProcessAuthFrame(tpAniSirGlobal pMac, tANI_U8 *pRxPacketInfo, tpPESession pse pStaDs = NULL; } - if (NULL != pStaDs) + if (NULL != pStaDs +#ifdef WLAN_FEATURE_11W + && !pStaDs->rmfEnabled +#endif + ) { PELOGE(limLog(pMac, LOGE, FL("lim Delete Station Context (staId: %d, assocId: %d) "), |
