diff options
| author | Srinivas Girigowda <sgirigow@qca.qualcomm.com> | 2014-11-13 11:11:25 -0800 |
|---|---|---|
| committer | Akash Patel <c_akashp@qca.qualcomm.com> | 2014-11-15 00:01:22 -0800 |
| commit | e7f3e95cdd7c707195f72d46389f2c8c7f6eeece (patch) | |
| tree | 7c942ac073205e1ba7b97984ef1936c40ba98f6f | |
| parent | 020322048fc463c382028cb050e914126595aff7 (diff) | |
qcacld: Remove randomize MAC for host normal scan request
WPS probe requests are generated by the supplicant and hence enabling
MAC spoofing (random MAC) flag in these scans causing WPS failure.
The expectation for now is to randomize the MAC only for PNO and GSCAN
firmware generated probe requests.
Hence, fix this issue by removing the MAC spoofing flag for normal scan.
Change-Id: If527fc589c308894f5213bd23cb40110e8232b0d
CRs-Fixed: 755632
| -rw-r--r-- | CORE/SERVICES/WMA/wma.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/CORE/SERVICES/WMA/wma.c b/CORE/SERVICES/WMA/wma.c index b57831b72345..b926c581f9d3 100644 --- a/CORE/SERVICES/WMA/wma.c +++ b/CORE/SERVICES/WMA/wma.c @@ -6834,8 +6834,7 @@ VOS_STATUS wma_get_buf_start_scan_cmd(tp_wma_handle wma_handle, cmd->scan_ctrl_flags |= WMI_SCAN_ADD_BCAST_PROBE_REQ; if (scan_req->scanType == eSIR_PASSIVE_SCAN) cmd->scan_ctrl_flags |= WMI_SCAN_FLAG_PASSIVE; - cmd->scan_ctrl_flags |= WMI_SCAN_FILTER_PROBE_REQ | - WMI_SCAN_ADD_SPOOFED_MAC_IN_PROBE_REQ; + cmd->scan_ctrl_flags |= WMI_SCAN_FILTER_PROBE_REQ; /* * Decide burst_duration and dwell_time_active based on * what type of devices are active. |
