Explorar o código

qcacmn: Add fix for encryption fragment ping

when station connected to AP in security type other than tkip header
size is incremented with security header length causing stack to
misunderstood the protocol and not responding to the ping.

additional security header added after decap is removed.

Change-Id: I521b0990fe9e5746a8c8cfb29de7064cf51d0687
CRs-Fixed: 3509594
nobelj %!s(int64=2) %!d(string=hai) anos
pai
achega
bcacfe9271
Modificáronse 1 ficheiros con 0 adicións e 5 borrados
  1. 0 5
      dp/wifi3.0/dp_rx_defrag.c

+ 0 - 5
dp/wifi3.0/dp_rx_defrag.c

@@ -1498,8 +1498,6 @@ QDF_STATUS dp_rx_defrag(struct dp_txrx_peer *txrx_peer, unsigned int tid,
 			cur = tmp_next;
 		}
 
-		/* If success, increment header to be stripped later */
-		hdr_space += dp_f_ccmp.ic_header;
 		break;
 
 	case cdp_sec_type_wep40:
@@ -1518,8 +1516,6 @@ QDF_STATUS dp_rx_defrag(struct dp_txrx_peer *txrx_peer, unsigned int tid,
 			cur = tmp_next;
 		}
 
-		/* If success, increment header to be stripped later */
-		hdr_space += dp_f_wep.ic_header;
 		break;
 	case cdp_sec_type_aes_gcmp:
 	case cdp_sec_type_aes_gcmp_256:
@@ -1535,7 +1531,6 @@ QDF_STATUS dp_rx_defrag(struct dp_txrx_peer *txrx_peer, unsigned int tid,
 			cur = tmp_next;
 		}
 
-		hdr_space += dp_f_gcmp.ic_header;
 		break;
 	default:
 		break;