diff options
author | Stanislaw Gruszka <sgruszka@redhat.com> | 2010-07-27 10:48:24 -0400 |
---|---|---|
committer | John W. Linville <linville@tuxdriver.com> | 2010-07-27 14:59:59 -0400 |
commit | 98ec62185cd940765a096c88a3f14147dd1d3bd4 (patch) | |
tree | 6650ced692ff617264e289928047f0b96a8da7cf /drivers/net/wireless/rt2x00/rt2500usb.c | |
parent | ac59b496d9fd0b7425219e8dc5d4f1f6f0083efc (diff) |
rt2500usb: disallow to set WEP key with non zero index
On our hardware (050d:7050 Belkin Components F5D7050 Wireless G Adapter),
setting any WEP key with non zero index, cause rx frames corruption.
Note: perhaps (I did not check) this can be fixed differently - by using
hw_key_idx the same as true MAC key index. But according to the comment in
rt2x00mac_set_key():
"the hardware requires keys to be assigned in correct order (When key 1
is provided but key 0 is not, then the key is not found by the hardware
during RX)"
this will be quite problematic. Since WEP should not be used, disabling
hardware crypto offload for it will not hurt much. Beside static
one key WEP will still be offloaded.
Signed-off-by: Stanislaw Gruszka <sgruszka@redhat.com>
Acked-by: Ivo van Doorn <IvDoorn@gmail.com>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Diffstat (limited to 'drivers/net/wireless/rt2x00/rt2500usb.c')
-rw-r--r-- | drivers/net/wireless/rt2x00/rt2500usb.c | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/drivers/net/wireless/rt2x00/rt2500usb.c b/drivers/net/wireless/rt2x00/rt2500usb.c index 08240f813ef4..cdaf93f48263 100644 --- a/drivers/net/wireless/rt2x00/rt2500usb.c +++ b/drivers/net/wireless/rt2x00/rt2500usb.c | |||
@@ -351,6 +351,14 @@ static int rt2500usb_config_key(struct rt2x00_dev *rt2x00dev, | |||
351 | 351 | ||
352 | if (crypto->cmd == SET_KEY) { | 352 | if (crypto->cmd == SET_KEY) { |
353 | /* | 353 | /* |
354 | * Disallow to set WEP key other than with index 0, | ||
355 | * it is known that not work at least on some hardware. | ||
356 | * SW crypto will be used in that case. | ||
357 | */ | ||
358 | if (key->alg == ALG_WEP && key->keyidx != 0) | ||
359 | return -EOPNOTSUPP; | ||
360 | |||
361 | /* | ||
354 | * Pairwise key will always be entry 0, but this | 362 | * Pairwise key will always be entry 0, but this |
355 | * could collide with a shared key on the same | 363 | * could collide with a shared key on the same |
356 | * position... | 364 | * position... |