mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-15 00:34:10 +08:00
mac80211: Fix Ptk0 rekey documentation
@IEEE80211_KEY_FLAG_GENERATE_IV setting is irrelevant for RX. Move the requirement to the correct section in the PTK0 rekey documentation. Signed-off-by: Alexander Wetzel <alexander@wetzel-home.de> Link: https://lore.kernel.org/r/20210924200514.7936-1-alexander@wetzel-home.de Signed-off-by: Johannes Berg <johannes.berg@intel.com>
This commit is contained in:
parent
111461d573
commit
33092aca85
@ -2818,13 +2818,13 @@ void ieee80211_free_txskb(struct ieee80211_hw *hw, struct sk_buff *skb);
|
||||
* Mac80211 drivers should set the @NL80211_EXT_FEATURE_CAN_REPLACE_PTK0 flag
|
||||
* when they are able to replace in-use PTK keys according to the following
|
||||
* requirements:
|
||||
* 1) They do not hand over frames decrypted with the old key to
|
||||
mac80211 once the call to set_key() with command %DISABLE_KEY has been
|
||||
completed when also setting @IEEE80211_KEY_FLAG_GENERATE_IV for any key,
|
||||
* 1) They do not hand over frames decrypted with the old key to mac80211
|
||||
once the call to set_key() with command %DISABLE_KEY has been completed,
|
||||
2) either drop or continue to use the old key for any outgoing frames queued
|
||||
at the time of the key deletion (including re-transmits),
|
||||
3) never send out a frame queued prior to the set_key() %SET_KEY command
|
||||
encrypted with the new key and
|
||||
encrypted with the new key when also needing
|
||||
@IEEE80211_KEY_FLAG_GENERATE_IV and
|
||||
4) never send out a frame unencrypted when it should be encrypted.
|
||||
Mac80211 will not queue any new frames for a deleted key to the driver.
|
||||
*/
|
||||
|
Loading…
Reference in New Issue
Block a user