aboutsummaryrefslogtreecommitdiffstats
path: root/drivers/net/wireless
diff options
context:
space:
mode:
authorJouni Malinen <jouni.malinen@atheros.com>2008-12-18 07:33:00 -0500
committerJohn W. Linville <linville@tuxdriver.com>2008-12-19 15:23:53 -0500
commitbe2864cfff2fe4b599b46f03cce1e7689e05c60c (patch)
tree2d25940ee9e8af06be7f903c8265722d81b07148 /drivers/net/wireless
parentea6121328885640c137b0a8830f67ca6c386a24a (diff)
ath9k: Fixed RX decryption status reporting
The RX code in ath9k uses sc_keymap to figure out whether a default key was used. However, the default key entries in sc_keymap were always set and as such, frames could have been claimed to be decrypted by hardware when they were not. This can cause problems especially with TKIP since mac80211 is validating the Michael MIC in the frame and this will result in MIC failure and potentially TKIP countermeasures if the frame was not decrypted correctly. Change key cache slot allocation to mark only the keys that really have been used in sc_keymap to avoid the issue. The key cache slot selection routines are now internally avoiding the slots that may be needed for TKIP group keys. Signed-off-by: Jouni Malinen <jouni.malinen@atheros.com> Signed-off-by: John W. Linville <linville@tuxdriver.com>
Diffstat (limited to 'drivers/net/wireless')
-rw-r--r--drivers/net/wireless/ath9k/main.c26
1 files changed, 12 insertions, 14 deletions
diff --git a/drivers/net/wireless/ath9k/main.c b/drivers/net/wireless/ath9k/main.c
index b44736782abd..191eec50dc75 100644
--- a/drivers/net/wireless/ath9k/main.c
+++ b/drivers/net/wireless/ath9k/main.c
@@ -776,6 +776,18 @@ static int ath_reserve_key_cache_slot(struct ath_softc *sc)
776 776
777 /* No partially used TKIP slots, pick any available slot */ 777 /* No partially used TKIP slots, pick any available slot */
778 for (i = IEEE80211_WEP_NKID; i < sc->sc_keymax; i++) { 778 for (i = IEEE80211_WEP_NKID; i < sc->sc_keymax; i++) {
779 /* Do not allow slots that could be needed for TKIP group keys
780 * to be used. This limitation could be removed if we know that
781 * TKIP will not be used. */
782 if (i >= 64 && i < 64 + IEEE80211_WEP_NKID)
783 continue;
784 if (sc->sc_splitmic) {
785 if (i >= 32 && i < 32 + IEEE80211_WEP_NKID)
786 continue;
787 if (i >= 64 + 32 && i < 64 + 32 + IEEE80211_WEP_NKID)
788 continue;
789 }
790
779 if (!test_bit(i, sc->sc_keymap)) 791 if (!test_bit(i, sc->sc_keymap))
780 return i; /* Found a free slot for a key */ 792 return i; /* Found a free slot for a key */
781 } 793 }
@@ -1361,20 +1373,6 @@ static int ath_init(u16 devid, struct ath_softc *sc)
1361 */ 1373 */
1362 for (i = 0; i < sc->sc_keymax; i++) 1374 for (i = 0; i < sc->sc_keymax; i++)
1363 ath9k_hw_keyreset(ah, (u16) i); 1375 ath9k_hw_keyreset(ah, (u16) i);
1364 /*
1365 * Mark key cache slots associated with global keys
1366 * as in use. If we knew TKIP was not to be used we
1367 * could leave the +32, +64, and +32+64 slots free.
1368 */
1369 for (i = 0; i < IEEE80211_WEP_NKID; i++) {
1370 set_bit(i, sc->sc_keymap);
1371 set_bit(i + 64, sc->sc_keymap);
1372 if (ath9k_hw_getcapability(ah, ATH9K_CAP_TKIP_SPLIT,
1373 0, NULL)) {
1374 set_bit(i + 32, sc->sc_keymap);
1375 set_bit(i + 32 + 64, sc->sc_keymap);
1376 }
1377 }
1378 1376
1379 /* Collect the channel list using the default country code */ 1377 /* Collect the channel list using the default country code */
1380 1378