qcacld-3.0: Do not do PN check in case of WEP security
In WEP connection, IV values used for consecutive packets could be random and need not be monotonically increasing or consecutive in case of fragments. This could result in incorrect drop of fragments. Fix is to not do PN check in case of WEP security. Change-Id: I8bfe16f3bf68752f4279b3fae1cf485a3abc1af7 CRs-Fixed: 2977416
This commit is contained in:

committed by
Madan Koyyalamudi

parent
3aa48b7f6b
commit
b4377be446
@@ -1437,15 +1437,6 @@ ol_txrx_pdev_post_attach(struct cdp_soc_t *soc_hdl, uint8_t pdev_id)
|
||||
*/
|
||||
qdf_mem_zero(&pdev->rx_pn[0], sizeof(pdev->rx_pn));
|
||||
|
||||
/* WEP: 24-bit PN */
|
||||
pdev->rx_pn[htt_sec_type_wep40].len =
|
||||
pdev->rx_pn[htt_sec_type_wep104].len =
|
||||
pdev->rx_pn[htt_sec_type_wep128].len = 24;
|
||||
|
||||
pdev->rx_pn[htt_sec_type_wep40].cmp =
|
||||
pdev->rx_pn[htt_sec_type_wep104].cmp =
|
||||
pdev->rx_pn[htt_sec_type_wep128].cmp = ol_rx_pn_cmp24;
|
||||
|
||||
/* TKIP: 48-bit TSC, CCMP: 48-bit PN */
|
||||
pdev->rx_pn[htt_sec_type_tkip].len =
|
||||
pdev->rx_pn[htt_sec_type_tkip_nomic].len =
|
||||
|
Reference in New Issue
Block a user