From b1fb28c19ec4b407fb7f9a4d06ffdc82e86a5889 Mon Sep 17 00:00:00 2001 From: Krunal Soni Date: Tue, 23 Sep 2014 20:49:35 -0700 Subject: qcacld:PMF: Do not delete station upon receiving spoof auth. when SAP & STA are connected in PMF state, if recorded auth packet is replayed through packet injector then SAP disconnects the connected STA. With this patch, SAP will not disconnect STA upon receiving spoof auth. It will inspect the rogue STA through SA query procedure upon receiving assoc request. Change-Id: Id6b246f8976ea1e6871b755c37fef50656e5b918 CRs-Fixed: 683701 --- CORE/MAC/src/pe/lim/limProcessAuthFrame.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/CORE/MAC/src/pe/lim/limProcessAuthFrame.c b/CORE/MAC/src/pe/lim/limProcessAuthFrame.c index 08ffbfcf82db..1571720ad579 100644 --- a/CORE/MAC/src/pe/lim/limProcessAuthFrame.c +++ b/CORE/MAC/src/pe/lim/limProcessAuthFrame.c @@ -657,7 +657,11 @@ limProcessAuthFrame(tpAniSirGlobal pMac, tANI_U8 *pRxPacketInfo, tpPESession pse pStaDs = NULL; } - if (NULL != pStaDs) + if (NULL != pStaDs +#ifdef WLAN_FEATURE_11W + && !pStaDs->rmfEnabled +#endif + ) { PELOGE(limLog(pMac, LOGE, FL("lim Delete Station Context (staId: %d, assocId: %d) "), -- cgit v1.2.3