Browse Source

qcacld-3.0: Removed bTkipCntrMeasActive from pe_session

bTkipCntrMeasActive was not getting filling anywhere, hence
was removed from pe_session struct along with releveant code
where it was checked.

Change-Id: I8926bedef61c6468f8de2f73b4991c4c4860810b
CRs-Fixed: 2687067
Utkarsh Bhatnagar 4 years ago
parent
commit
eeaa86c203

+ 0 - 2
core/mac/src/pe/include/lim_session.h

@@ -239,8 +239,6 @@ struct pe_session {
 #endif
 	uint32_t encryptType;
 
-	bool bTkipCntrMeasActive;       /* Used to keep record of TKIP counter measures start/stop */
-
 	uint8_t gLimProtectionControl;  /* used for 11n protection */
 
 	uint8_t gHTNonGFDevicesPresent;

+ 0 - 30
core/mac/src/pe/lim/lim_process_assoc_req_frame.c

@@ -229,33 +229,6 @@ static bool lim_chk_sa_da(struct mac_context *mac_ctx, tpSirMacMgmtHdr hdr,
 	return false;
 }
 
-/**
- * lim_chk_tkip() - checks TKIP counter measure is active
- * @mac_ctx: pointer to Global MAC structure
- * @hdr: pointer to the MAC head
- * @session: pointer to pe session entry
- * @sub_type: Assoc(=0) or Reassoc(=1) Requestframe
- *
- * Checks TKIP counter measure is active
- *
- * Return: true of no error, false otherwise
- */
-static bool lim_chk_tkip(struct mac_context *mac_ctx, tpSirMacMgmtHdr hdr,
-			 struct pe_session *session, uint8_t sub_type)
-{
-	/*
-	 * If TKIP counter measures active send Assoc Rsp frame to station
-	 * with eSIR_MAC_MIC_FAILURE_REASON
-	 */
-	if (!(session->bTkipCntrMeasActive && LIM_IS_AP_ROLE(session)))
-		return true;
-
-	pe_err("Assoc Req rejected: TKIP counter measure is active");
-	lim_send_assoc_rsp_mgmt_frame(mac_ctx, eSIR_MAC_MIC_FAILURE_REASON, 1,
-				      hdr->sa, sub_type, 0, session, false);
-	return false;
-}
-
 /**
  * lim_chk_assoc_req_parse_error() - checks for error in frame parsing
  * @mac_ctx: pointer to Global MAC structure
@@ -2339,9 +2312,6 @@ void lim_process_assoc_req_frame(struct mac_context *mac_ctx, uint8_t *rx_pkt_in
 	if (false == lim_chk_sa_da(mac_ctx, hdr, session, sub_type))
 		return;
 
-	if (false == lim_chk_tkip(mac_ctx, hdr, session, sub_type))
-		return;
-
 	/* check for the presence of vendor IE */
 	if ((session->access_policy_vendor_ie) &&
 		(session->access_policy ==

+ 0 - 13
core/mac/src/pe/lim/lim_process_auth_frame.c

@@ -1309,19 +1309,6 @@ lim_process_auth_frame(struct mac_context *mac_ctx, uint8_t *rx_pkt_info,
 	 * Note: WEP bit is set in FC of MAC header.
 	 */
 	if (mac_hdr->fc.wep) {
-		/*
-		 * If TKIP counter measures enabled then issue Deauth
-		 * frame to station
-		 */
-		if (pe_session->bTkipCntrMeasActive &&
-				LIM_IS_AP_ROLE(pe_session)) {
-			pe_err("Tkip counter enabled, send deauth to: %pM",
-				mac_hdr->sa);
-			lim_send_deauth_mgmt_frame(mac_ctx,
-					eSIR_MAC_MIC_FAILURE_REASON,
-					mac_hdr->sa, pe_session, false);
-			goto free;
-		}
 		if (frame_len < 4) {
 			pe_err("invalid frame len: %d", frame_len);
 			goto free;