The TX/RX path all use the local->wep_tfm to encrypt and decrypt
packets. Each {en|de}crypt operation need set a new RC4key,
this may corrupt the previous set key that is still being used.
Thus cause a lot of decrypton error or encryption with the wrong key.
Use two tfm (tx_tfm and rx_tfm) to avoid this race.

Signed-off-by: Hong Liu <[EMAIL PROTECTED]>

---

 net/d80211/ieee80211_i.h |    3 ++-
 net/d80211/wep.c         |   18 +++++++++++++-----
 net/d80211/wpa.c         |    6 ++++--
 3 files changed, 19 insertions(+), 8 deletions(-)

634c9615ce3cd06dc7f6aff05e43e61490a53472
diff --git a/net/d80211/ieee80211_i.h b/net/d80211/ieee80211_i.h
index 425fc9b..152b41a 100644
--- a/net/d80211/ieee80211_i.h
+++ b/net/d80211/ieee80211_i.h
@@ -402,7 +402,8 @@ #define IEEE80211_IRQSAFE_QUEUE_LIMIT 12
        int long_retry_limit; /* dot11LongRetryLimit */
        int short_preamble; /* use short preamble with IEEE 802.11b */
 
-       struct crypto_tfm *wep_tfm;
+       struct crypto_tfm *wep_tx_tfm;
+       struct crypto_tfm *wep_rx_tfm;
        u32 wep_iv;
        int key_tx_rx_threshold; /* number of times any key can be used in TX
                                  * or RX before generating a rekey
diff --git a/net/d80211/wep.c b/net/d80211/wep.c
index 22c2e53..06e0230 100644
--- a/net/d80211/wep.c
+++ b/net/d80211/wep.c
@@ -26,16 +26,23 @@ int ieee80211_wep_init(struct ieee80211_
        /* start WEP IV from a random value */
        get_random_bytes(&local->wep_iv, WEP_IV_LEN);
 
-       local->wep_tfm = crypto_alloc_tfm("arc4", 0);
-       if (!local->wep_tfm)
+       local->wep_tx_tfm = crypto_alloc_tfm("arc4", 0);
+       if (!local->wep_tx_tfm)
                return -ENOMEM;
 
+       local->wep_rx_tfm = crypto_alloc_tfm("arc4", 0);
+       if (!local->wep_rx_tfm) {
+               crypto_free_tfm(local->wep_tx_tfm);
+               return -ENOMEM;
+       }
+
        return 0;
 }
 
 void ieee80211_wep_free(struct ieee80211_local *local)
 {
-       crypto_free_tfm(local->wep_tfm);
+       crypto_free_tfm(local->wep_tx_tfm);
+       crypto_free_tfm(local->wep_rx_tfm);
 }
 
 static inline int ieee80211_wep_weak_iv(u32 iv, int keylen)
@@ -172,7 +179,8 @@ int ieee80211_wep_encrypt(struct ieee802
        /* Add room for ICV */
        skb_put(skb, WEP_ICV_LEN);
 
-       ieee80211_wep_encrypt_data(local->wep_tfm, rc4key, klen, iv + 
WEP_IV_LEN, len);
+       ieee80211_wep_encrypt_data(local->wep_tx_tfm, rc4key, klen,
+                                  iv + WEP_IV_LEN, len);
 
        kfree(rc4key);
 
@@ -252,7 +260,7 @@ int ieee80211_wep_decrypt(struct ieee802
        /* Copy rest of the WEP key (the secret part) */
        memcpy(rc4key + 3, key->key, key->keylen);
 
-       if (ieee80211_wep_decrypt_data(local->wep_tfm, rc4key, klen,
+       if (ieee80211_wep_decrypt_data(local->wep_rx_tfm, rc4key, klen,
                                       skb->data + hdrlen + WEP_IV_LEN,
                                       len)) {
                printk(KERN_DEBUG "WEP decrypt failed (ICV)\n");
diff --git a/net/d80211/wpa.c b/net/d80211/wpa.c
index 5e62464..ef707ad 100644
--- a/net/d80211/wpa.c
+++ b/net/d80211/wpa.c
@@ -352,7 +352,8 @@ #endif /* CONFIG_HOSTAPD_WPA_TESTING */
        skb_put(skb, TKIP_ICV_LEN);
 
        hdr = (struct ieee80211_hdr *) skb->data;
-       ieee80211_tkip_encrypt_data(tx->local->wep_tfm, key, pos, len, 
hdr->addr2);
+       ieee80211_tkip_encrypt_data(tx->local->wep_tx_tfm,
+                                   key, pos, len, hdr->addr2);
        return 0;
 }
 
@@ -495,7 +496,8 @@ #endif /* CONFIG_HOSTAPD_WPA_TESTING */
                hwaccel = 1;
        }
 
-       res = ieee80211_tkip_decrypt_data(rx->local->wep_tfm, key, skb->data + 
hdrlen,
+       res = ieee80211_tkip_decrypt_data(rx->local->wep_rx_tfm,
+                                         key, skb->data + hdrlen,
                                          skb->len - hdrlen, rx->sta->addr,
                                          hwaccel, rx->u.rx.queue);
        if (res != TKIP_DECRYPT_OK || wpa_test) {
-- 
1.3.3

-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to