]> err.no Git - linux-2.6/commitdiff
net/ieee80211: fix more crypto-related build breakage
authorJeff Garzik <jeff@garzik.org>
Sat, 23 Sep 2006 01:19:05 +0000 (21:19 -0400)
committerJeff Garzik <jeff@garzik.org>
Sat, 23 Sep 2006 01:19:05 +0000 (21:19 -0400)
Signed-off-by: Jeff Garzik <jeff@garzik.org>
net/ieee80211/ieee80211_crypt_tkip.c
net/ieee80211/ieee80211_crypt_wep.c

index 259572dfd4f1923fdab04ff0d5e1d719094754da..4200ec509866581c60c6faeb07fa973f97528048 100644 (file)
@@ -93,7 +93,7 @@ static void *ieee80211_tkip_init(int key_idx)
        if (IS_ERR(priv->tx_tfm_arc4)) {
                printk(KERN_DEBUG "ieee80211_crypt_tkip: could not allocate "
                       "crypto API arc4\n");
-               priv->tfm_arc4 = NULL;
+               priv->tx_tfm_arc4 = NULL;
                goto fail;
        }
 
@@ -102,6 +102,7 @@ static void *ieee80211_tkip_init(int key_idx)
        if (IS_ERR(priv->tx_tfm_michael)) {
                printk(KERN_DEBUG "ieee80211_crypt_tkip: could not allocate "
                       "crypto API michael_mic\n");
+               priv->tx_tfm_michael = NULL;
                goto fail;
        }
 
@@ -110,6 +111,7 @@ static void *ieee80211_tkip_init(int key_idx)
        if (IS_ERR(priv->rx_tfm_arc4)) {
                printk(KERN_DEBUG "ieee80211_crypt_tkip: could not allocate "
                       "crypto API arc4\n");
+               priv->rx_tfm_arc4 = NULL;
                goto fail;
        }
 
@@ -118,7 +120,7 @@ static void *ieee80211_tkip_init(int key_idx)
        if (IS_ERR(priv->rx_tfm_michael)) {
                printk(KERN_DEBUG "ieee80211_crypt_tkip: could not allocate "
                       "crypto API michael_mic\n");
-               priv->tfm_michael = NULL;
+               priv->rx_tfm_michael = NULL;
                goto fail;
        }
 
@@ -392,6 +394,19 @@ static int ieee80211_tkip_encrypt(struct sk_buff *skb, int hdr_len, void *priv)
        return crypto_blkcipher_encrypt(&desc, &sg, &sg, len + 4);
 }
 
+/*
+ * deal with seq counter wrapping correctly.
+ * refer to timer_after() for jiffies wrapping handling
+ */
+static inline int tkip_replay_check(u32 iv32_n, u16 iv16_n,
+                                   u32 iv32_o, u16 iv16_o)
+{
+       if ((s32)iv32_n - (s32)iv32_o < 0 ||
+           (iv32_n == iv32_o && iv16_n <= iv16_o))
+               return 1;
+       return 0;
+}
+
 static int ieee80211_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
 {
        struct ieee80211_tkip_data *tkey = priv;
index 9eeec13c28b07f07513c8a8df5fe6be43550b384..1b2efff11d39ff63fab9935e070b62d01897c193 100644 (file)
@@ -50,7 +50,7 @@ static void *prism2_wep_init(int keyidx)
        if (IS_ERR(priv->tx_tfm)) {
                printk(KERN_DEBUG "ieee80211_crypt_wep: could not allocate "
                       "crypto API arc4\n");
-               priv->tfm = NULL;
+               priv->tx_tfm = NULL;
                goto fail;
        }
 
@@ -58,6 +58,7 @@ static void *prism2_wep_init(int keyidx)
        if (IS_ERR(priv->rx_tfm)) {
                printk(KERN_DEBUG "ieee80211_crypt_wep: could not allocate "
                       "crypto API arc4\n");
+               priv->rx_tfm = NULL;
                goto fail;
        }
        /* start WEP IV from a random value */