Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp7520128rwb; Tue, 6 Dec 2022 06:49:21 -0800 (PST) X-Google-Smtp-Source: AA0mqf6hnJPwJqPrdP/3ogp+j8VlD683moTRMRXvyszd/8hTpjrw0xy183jfc5IycHhVIIOevmmM X-Received: by 2002:aa7:938b:0:b0:576:9b24:ca60 with SMTP id t11-20020aa7938b000000b005769b24ca60mr15835386pfe.7.1670338161248; Tue, 06 Dec 2022 06:49:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670338161; cv=none; d=google.com; s=arc-20160816; b=C2ElW7NlqPoeYdQ7J8uq1ASl2La3PY6GazHEYUTSNIKcEf8AMCTSavQWucNWWnm3Mw Fmks7kz5gOo0vLMJD8oRGi+NYoymMDJcf5ks0LQzZbjX4fl1ZSgDfEFwskB+1T2AtsQS MuGgyKJrS666pklGXc4OZCD1NKOAmVQdyhr89YTWFlo6wSQ6PO0xQF0pOeXkiPsPbKVw OB8CV/iRS+RS73gHOvQCRIBlTnI8mSd/RiQa47rTtffi00p4Neb6HDA9DBlW4m16Hplz R6aZU0OS5KcV98i7UBu43/7g04vqgtsLVmmoxsSifb2c4QJZfFWYkWZYGBClXZF5/HWU ZQ6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=tfG2oQYk60ZqsRnZeCCQ976WpFyNy1QHxB/tA+Kw+DM=; b=yQlNGDCGR7WK3NIdQcJaq2oqEGtpAI1QXuAre+Dw/Qa09OQu/67fGWqqTpkz3YNsgG IaQcqV1H4bPE64WwmM5RRk2xJj7YRFpIKfuzSXG+06Y+jcuKD18bRB+WqYpu5MKZJlEc gjMclR1Q0KreTA3RL8Rupc+Fu1f5h+JY3snjmZqQBN6NSciov9/V11q9TgxQyfsqLolG InCrNf5a7JDDA///PKiFsvcWNmJSjd4Yqup1cXEJY5Y4vrJ0wfNO8B/27RUz9AgyhyxQ atXVZCzLZwCeRAzi7T74+MA7u2oRuDPo+k2TrCDyniNyo4lMPlMlYdGp7Oxy96X5vEUa XFcA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=nzx+mM65; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 143-20020a630195000000b004786b75fb89si16528034pgb.846.2022.12.06.06.49.13; Tue, 06 Dec 2022 06:49:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=nzx+mM65; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233834AbiLFOhm (ORCPT + 66 others); Tue, 6 Dec 2022 09:37:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41696 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232458AbiLFOhk (ORCPT ); Tue, 6 Dec 2022 09:37:40 -0500 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3AE8A62F7 for ; Tue, 6 Dec 2022 06:37:37 -0800 (PST) Received: from pps.filterd (m0279870.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2B6DiL4T017746; Tue, 6 Dec 2022 14:37:34 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type; s=qcppdkim1; bh=tfG2oQYk60ZqsRnZeCCQ976WpFyNy1QHxB/tA+Kw+DM=; b=nzx+mM65OgCl5NGcQs6uOuH/aVzPdd21sARpxdeuWU5jEOubZ4tSDDyPRANhT5zF/7Uq fKku2u4/pEOtVF1Ugrov5eo9E8EZAY2wlmrkKdwXJmCJzI0WibZltsWAki4ZcGPM591P ioqlUrlZCg+NBG2SDAl1MT93ZIxk/gU+Gyr4OgmeXkqRWTR7F78Wj+RnOBuAhvK1dwcQ LZBNC7imWBUgPsqw79GFN99SDN2gJ30GSzI1KzO2lJKUSsjyBy7vbszS35lw5LlHAwm5 EHGjbK6XPrbYBMxiZjUZR/l9gQTPjjdmMnVhXPr62VN4IgGle/JSaiQoo5MdqQ2C1byP 7g== Received: from nalasppmta03.qualcomm.com (Global_NAT1.qualcomm.com [129.46.96.20]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3m9e61kkxu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 06 Dec 2022 14:37:34 +0000 Received: from nalasex01a.na.qualcomm.com (nalasex01a.na.qualcomm.com [10.47.209.196]) by NALASPPMTA03.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 2B6EbXMq029631 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 6 Dec 2022 14:37:33 GMT Received: from cnss-mw-linux.qualcomm.com (10.80.80.8) by nalasex01a.na.qualcomm.com (10.47.209.196) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.36; Tue, 6 Dec 2022 06:37:31 -0800 From: Veerendranath Jakkam To: CC: Subject: [PATCH 1/2] wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() Date: Tue, 6 Dec 2022 20:07:14 +0530 Message-ID: <20221206143715.1802987-2-quic_vjakkam@quicinc.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221206143715.1802987-1-quic_vjakkam@quicinc.com> References: <20221206143715.1802987-1-quic_vjakkam@quicinc.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nalasex01a.na.qualcomm.com (10.47.209.196) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-ORIG-GUID: sawGu2Y32lbBvuXTQRv7Ge3d0LLh47I5 X-Proofpoint-GUID: sawGu2Y32lbBvuXTQRv7Ge3d0LLh47I5 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.923,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-12-06_09,2022-12-06_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 bulkscore=0 suspectscore=0 mlxscore=0 priorityscore=1501 mlxlogscore=999 adultscore=0 spamscore=0 malwarescore=0 clxscore=1015 impostorscore=0 lowpriorityscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2210170000 definitions=main-2212060119 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org From: Shivani Baranwal The extended KCK key length check wrongly using the KEK key attribute for validation. Due to this GTK rekey offload is failing when the KCK key length is 24 bytes even though the driver advertising WIPHY_FLAG_SUPPORTS_EXT_KEK_KCK flag. Use correct attribute to fix the same. Fixes: 093a48d2aa4b ("cfg80211: support bigger kek/kck key length") Signed-off-by: Shivani Baranwal Signed-off-by: Veerendranath Jakkam --- net/wireless/nl80211.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/wireless/nl80211.c b/net/wireless/nl80211.c index 33a82ecab9d5..02b9a0280896 100644 --- a/net/wireless/nl80211.c +++ b/net/wireless/nl80211.c @@ -13809,7 +13809,7 @@ static int nl80211_set_rekey_data(struct sk_buff *skb, struct genl_info *info) return -ERANGE; if (nla_len(tb[NL80211_REKEY_DATA_KCK]) != NL80211_KCK_LEN && !(rdev->wiphy.flags & WIPHY_FLAG_SUPPORTS_EXT_KEK_KCK && - nla_len(tb[NL80211_REKEY_DATA_KEK]) == NL80211_KCK_EXT_LEN)) + nla_len(tb[NL80211_REKEY_DATA_KCK]) == NL80211_KCK_EXT_LEN)) return -ERANGE; rekey_data.kek = nla_data(tb[NL80211_REKEY_DATA_KEK]); -- 2.25.1