2016-10-21, 13:11:37 +0200, Tobias Brunner wrote:
> Even if sending SCIs is explicitly disabled, the code that creates the
> Security Tag might still decide to add it (e.g. if multiple RX SCs are
> defined on the MACsec interface).
> But because the header length so far only depended on the configuration
> option the SCI might not actually have ended up in the packet, while the
> SC flag in the TCI field of the Security Tag was still set, resulting
> in invalid MACsec frames.

Or overwriting the original frame's contents (ethertype and eg
beginning of the IP header) if !encrypt.


Fixes: c09440f7dcb3 ("macsec: introduce IEEE 802.1AE driver")


[snip]
> @@ -440,12 +448,12 @@ static void macsec_fill_sectag(struct macsec_eth_header 
> *h,
>                              const struct macsec_secy *secy, u32 pn)
>  {
>       const struct macsec_tx_sc *tx_sc = &secy->tx_sc;
> +     bool sci_present = send_sci(secy);

You're already computing this in macsec_encrypt() just before calling
macsec_fill_sectag(), so you could pass it as argument instead of
recomputing it.

Other than that, LGTM, thanks!


-- 
Sabrina

Reply via email to