mt7601u: let mac80211 validate rx CCMP PN
commita9eab62d41646cbf5d8b3408c9d4617bb9678e71
authorLorenzo Bianconi <lorenzo.bianconi@redhat.com>
Fri, 9 Mar 2018 09:41:41 +0000 (9 10:41 +0100)
committerKalle Valo <kvalo@codeaurora.org>
Tue, 13 Mar 2018 16:35:03 +0000 (13 18:35 +0200)
tree39eeaef2e951592a6bd3c9062beaa0d41d0abe97
parent2f04652f891a1911981988f6ce0c8a83098e9002
mt7601u: let mac80211 validate rx CCMP PN

Apparently the hardware does not perform CCMP PN validation so
let mac80211 take care of possible replay attacks in sw.
Moreover indicate ICV and MIC had been stripped setting corresponding
bits in ieee80211_rx_status.
The fix has been validated using 4.2.1 and 4.1.3 tests from the WiFi
Alliance vulnerability detection tool.

Fixes: c869f77d6abb ("add mt7601u driver")
Acked-by: Jakub Kicinski <kubakici@wp.pl>
Tested-by: David Park <david.park@hitemengineering.com>
Signed-off-by: Lorenzo Bianconi <lorenzo.bianconi@redhat.com>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
drivers/net/wireless/mediatek/mt7601u/initvals.h
drivers/net/wireless/mediatek/mt7601u/mac.c