On Tue, 2018-08-14 at 12:42 +0200, Alexander Wetzel wrote:
>
> + /* PTK only using key ID 0 needs special handling on rekey */
> + if (new_key && sta && ptk0rekey) {
> + local = old_key->local;
> + sdata = old_key->sdata;
> +
> + /* Stop TX till we are on the new key */
> + old_key->flags |= KEY_FLAG_TAINTED;
> + ieee80211_clear_fast_xmit(sta);
> +
> + /* Aggregation sessions during rekey are complicated due to
> + * the reorder buffer. Side step that by blocking aggregation
> + * and tear down running connections.
> + */
> + if (ieee80211_hw_check(&local->hw, AMPDU_AGGREGATION)) {
> + set_sta_flag(sta, WLAN_STA_BLOCK_BA);
> + ieee80211_sta_tear_down_BA_sessions(sta,
> +
> AGG_STOP_LOCAL_REQUEST);
> + }
> +
> + if (new_key->local->ops->replace_key) {
> + ret = drv_replace_key(old_key->local, sdata,
> + &sta->sta, &old_key->conf,
> + &new_key->conf);
> + if (!ret)
> + new_key->flags |= KEY_FLAG_UPLOADED_TO_HARDWARE;
> + else
> + sdata_err(sdata,
> + "failed to replace key (%d) for " \
> + "STA (%pM) in hardware: ret=(%d)\n",
> + old_key->conf.keyidx,
> + sta->sta.addr,
> + ret);
> +
> + old_key->flags &= ~KEY_FLAG_UPLOADED_TO_HARDWARE;
> + } else {
> + sdata_info(sdata,
> + "Userspace requested a PTK rekey for STA " \
> + "%pM while feature not supported! " \
> + "This may leak clear text packets or " \
> + "freeze the connection.",
> + sta->sta.addr);
This seems a bit weird - we know a likely dangerous thing is happening
and only print an info message? Why not just prevent this in the first
place?
johannes