qcacmn: Fix WEP functionality in converged set key
Fix WEP security mode issues in converged set key. Change-Id: Idd4071c8aef141cb45db9006c5773a94b352879a CRs-Fixed: 2400864
This commit is contained in:

committed by
nshrivas

parent
0e2d7fc5ad
commit
09a3b065f9
@@ -38,10 +38,23 @@ static void wlan_cfg80211_translate_key(struct wlan_objmgr_vdev *vdev,
|
||||
qdf_mem_zero(crypto_key, sizeof(*crypto_key));
|
||||
crypto_key->keylen = params->key_len;
|
||||
crypto_key->keyix = key_index;
|
||||
cfg80211_debug("key_type %d, opmode %d, key_len %d, seq_len %d",
|
||||
key_type, vdev->vdev_mlme.vdev_opmode,
|
||||
params->key_len, params->seq_len);
|
||||
qdf_mem_copy(&crypto_key->keyval[0], params->key, params->key_len);
|
||||
qdf_mem_copy(&crypto_key->keyrsc[0], params->seq, params->seq_len);
|
||||
|
||||
crypto_key->cipher_type = osif_nl_to_crypto_cipher_type(params->cipher);
|
||||
if (IS_WEP_CIPHER(crypto_key->cipher_type) && !mac_addr) {
|
||||
/*
|
||||
* This is a valid scenario in case of WEP, where-in the
|
||||
* keys are passed by the user space during the connect request
|
||||
* but since we did not connect yet, so we do not know the peer
|
||||
* address yet.
|
||||
*/
|
||||
cfg80211_debug("No Mac Address to copy");
|
||||
return;
|
||||
}
|
||||
if (key_type == WLAN_CRYPTO_KEY_TYPE_UNICAST) {
|
||||
qdf_mem_copy(&crypto_key->macaddr, mac_addr, QDF_MAC_ADDR_SIZE);
|
||||
} else {
|
||||
@@ -54,8 +67,7 @@ static void wlan_cfg80211_translate_key(struct wlan_objmgr_vdev *vdev,
|
||||
vdev->vdev_mlme.macaddr,
|
||||
QDF_MAC_ADDR_SIZE);
|
||||
}
|
||||
cfg80211_debug("key_type %d, opmode %d, mac %pM", key_type,
|
||||
vdev->vdev_mlme.vdev_opmode, crypto_key->macaddr);
|
||||
cfg80211_debug("mac %pM", crypto_key->macaddr);
|
||||
}
|
||||
|
||||
int wlan_cfg80211_store_key(struct wlan_objmgr_vdev *vdev,
|
||||
@@ -76,10 +88,6 @@ int wlan_cfg80211_store_key(struct wlan_objmgr_vdev *vdev,
|
||||
cfg80211_err("Key params is NULL");
|
||||
return -EINVAL;
|
||||
}
|
||||
if ((key_type == WLAN_CRYPTO_KEY_TYPE_UNICAST) && !mac_addr) {
|
||||
cfg80211_err("mac_addr is NULL for pairwise Key");
|
||||
return -EINVAL;
|
||||
}
|
||||
cipher_len = osif_nl_to_crypto_cipher_len(params->cipher);
|
||||
if (cipher_len < 0 || params->key_len < cipher_len) {
|
||||
cfg80211_err("cipher length %d less than reqd len %d",
|
||||
@@ -87,6 +95,13 @@ int wlan_cfg80211_store_key(struct wlan_objmgr_vdev *vdev,
|
||||
return -EINVAL;
|
||||
}
|
||||
cipher = osif_nl_to_crypto_cipher_type(params->cipher);
|
||||
if (!IS_WEP_CIPHER(cipher)) {
|
||||
if ((key_type == WLAN_CRYPTO_KEY_TYPE_UNICAST) &&
|
||||
!mac_addr) {
|
||||
cfg80211_err("mac_addr is NULL for pairwise Key");
|
||||
return -EINVAL;
|
||||
}
|
||||
}
|
||||
status = wlan_crypto_validate_key_params(cipher, key_index,
|
||||
params->key_len,
|
||||
params->seq_len);
|
||||
|
Reference in New Issue
Block a user