소스 검색

qcacmn: Add fix for encryption fragment ping

when station connected to AP in security type other than tkip header
size is incremented with security header length causing stack to
misunderstood the protocol and not responding to the ping.

additional security header added after decap is removed.

Change-Id: I521b0990fe9e5746a8c8cfb29de7064cf51d0687
CRs-Fixed: 3509594
nobelj 2 년 전
부모
커밋
bcacfe9271
1개의 변경된 파일0개의 추가작업 그리고 5개의 파일을 삭제
  1. 0 5
      dp/wifi3.0/dp_rx_defrag.c

+ 0 - 5
dp/wifi3.0/dp_rx_defrag.c

@@ -1498,8 +1498,6 @@ QDF_STATUS dp_rx_defrag(struct dp_txrx_peer *txrx_peer, unsigned int tid,
 			cur = tmp_next;
 		}
 
-		/* If success, increment header to be stripped later */
-		hdr_space += dp_f_ccmp.ic_header;
 		break;
 
 	case cdp_sec_type_wep40:
@@ -1518,8 +1516,6 @@ QDF_STATUS dp_rx_defrag(struct dp_txrx_peer *txrx_peer, unsigned int tid,
 			cur = tmp_next;
 		}
 
-		/* If success, increment header to be stripped later */
-		hdr_space += dp_f_wep.ic_header;
 		break;
 	case cdp_sec_type_aes_gcmp:
 	case cdp_sec_type_aes_gcmp_256:
@@ -1535,7 +1531,6 @@ QDF_STATUS dp_rx_defrag(struct dp_txrx_peer *txrx_peer, unsigned int tid,
 			cur = tmp_next;
 		}
 
-		hdr_space += dp_f_gcmp.ic_header;
 		break;
 	default:
 		break;