qcacld-3.0: Do not do PN check in case of WEP security

In WEP connection, IV values used for consecutive packets
could be random and need not be monotonically increasing
or consecutive in case of fragments. This could result in
incorrect drop of fragments.

Fix is to not do PN check in case of WEP security.

Change-Id: I8bfe16f3bf68752f4279b3fae1cf485a3abc1af7
CRs-Fixed: 2977416
This commit is contained in:
Yeshwanth Sriram Guntuka
2021-06-22 13:41:49 +05:30
committed by Madan Koyyalamudi
parent 3aa48b7f6b
commit b4377be446

View File

@@ -1437,15 +1437,6 @@ ol_txrx_pdev_post_attach(struct cdp_soc_t *soc_hdl, uint8_t pdev_id)
*/
qdf_mem_zero(&pdev->rx_pn[0], sizeof(pdev->rx_pn));
/* WEP: 24-bit PN */
pdev->rx_pn[htt_sec_type_wep40].len =
pdev->rx_pn[htt_sec_type_wep104].len =
pdev->rx_pn[htt_sec_type_wep128].len = 24;
pdev->rx_pn[htt_sec_type_wep40].cmp =
pdev->rx_pn[htt_sec_type_wep104].cmp =
pdev->rx_pn[htt_sec_type_wep128].cmp = ol_rx_pn_cmp24;
/* TKIP: 48-bit TSC, CCMP: 48-bit PN */
pdev->rx_pn[htt_sec_type_tkip].len =
pdev->rx_pn[htt_sec_type_tkip_nomic].len =