[RFC] ath10k: Fix shared WEP
Kalle Valo
kvalo at qca.qualcomm.com
Fri Nov 21 09:05:41 PST 2014
Sujith Manoharan <sujith at msujith.org> writes:
> From: Sujith Manoharan <c_manoha at qca.qualcomm.com>
>
> When static keys are used in shared WEP, when a
> station is associated, message 3 is sent with an
> encrypted payload. But, for subsequent
> authentications that are triggered without a
> deauth, the auth frame is decrypted by the HW. To
> handle this, check if the WEP keys have already
> been set for the peer and if so, mark the
> frame as decrypted.
>
> Signed-off-by: Sujith Manoharan <c_manoha at qca.qualcomm.com>
[...]
> + if (peer_key) {
> + ath10k_dbg(ar, ATH10K_DBG_MAC,
> + "wep key present for peer: %pM\n", addr);
> + status->flag |= RX_FLAG_DECRYPTED;
> + }
> + }
> +
> +}
A checkpatch warning:
drivers/net/wireless/ath/ath10k/wmi.c:1141: CHECK: Blank lines aren't necessary before a close brace '}'
--
Kalle Valo
More information about the ath10k
mailing list