mirror of https://gitee.com/openkylin/linux.git
a9eab62d41
Apparently the hardware does not perform CCMP PN validation so
let mac80211 take care of possible replay attacks in sw.
Moreover indicate ICV and MIC had been stripped setting corresponding
bits in ieee80211_rx_status.
The fix has been validated using 4.2.1 and 4.1.3 tests from the WiFi
Alliance vulnerability detection tool.
Fixes:
|
||
---|---|---|
.. | ||
Kconfig | ||
Makefile | ||
core.c | ||
debugfs.c | ||
dma.c | ||
dma.h | ||
eeprom.c | ||
eeprom.h | ||
init.c | ||
initvals.h | ||
initvals_phy.h | ||
mac.c | ||
mac.h | ||
main.c | ||
mcu.c | ||
mcu.h | ||
mt7601u.h | ||
phy.c | ||
regs.h | ||
trace.c | ||
trace.h | ||
tx.c | ||
usb.c | ||
usb.h | ||
util.c |