commit | e941749f4a17775eaf8a27e6a8f88a64f55959ce | [log] [tgz] |
---|---|---|
author | Abhishek Singh <absingh@qti.qualcomm.com> | Thu Sep 25 15:55:36 2014 +0530 |
committer | Satyanarayana Dash <c_sadash@qti.qualcomm.com> | Tue Sep 30 15:19:17 2014 +0530 |
tree | bc20c0e90a224d8531a2f6ea040fc3f807af08dd | |
parent | e054e4758e84dd0e9c53660bf8eb2690a6b4edd6 [diff] |
wlan: PMF: Do not delete station upon receiving spoof auth. when SAP & STA are connected in PMF state, if recorded auth packet is replayed through packet injector then SAP disconnects the connected STA. With this patch, SAP will not disconnect STA upon receiving spoof auth. It will inspect the rogue STA through SA query procedure upon receiving assoc request. Change-Id: Ie5c2851f3b1ec923e012364faccdf65e2e81567d CRs-Fixed: 730085