Skip to content

Commit 9ae705c

Browse files
jmberglinvjw
authored andcommitted
mac80211: rename TKIP debugging Kconfig symbol
... to MAC80211_TKIP_DEBUG rather than TKIP_DEBUG. Signed-off-by: Johannes Berg <[email protected]> Signed-off-by: John W. Linville <[email protected]>
1 parent f225763 commit 9ae705c

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

net/mac80211/Kconfig

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ config MAC80211_LOWTX_FRAME_DUMP
150150
If unsure, say N and insert the debugging code
151151
you require into the driver you are debugging.
152152

153-
config TKIP_DEBUG
153+
config MAC80211_TKIP_DEBUG
154154
bool "TKIP debugging"
155155
depends on MAC80211_DEBUG
156156

net/mac80211/tkip.c

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ void ieee80211_get_tkip_key(struct ieee80211_key_conf *keyconf,
167167
tk = &key->conf.key[ALG_TKIP_TEMP_ENCR_KEY];
168168
ctx = &key->u.tkip.tx;
169169

170-
#ifdef CONFIG_TKIP_DEBUG
170+
#ifdef CONFIG_MAC80211_TKIP_DEBUG
171171
printk(KERN_DEBUG "TKIP encrypt: iv16 = 0x%04x, iv32 = 0x%08x\n",
172172
iv16, iv32);
173173

@@ -177,7 +177,7 @@ void ieee80211_get_tkip_key(struct ieee80211_key_conf *keyconf,
177177
printk(KERN_DEBUG "Wrap around of iv16 in the middle of a "
178178
"fragmented packet\n");
179179
}
180-
#endif /* CONFIG_TKIP_DEBUG */
180+
#endif
181181

182182
/* Update the p1k only when the iv16 in the packet wraps around, this
183183
* might occur after the wrap around of iv16 in the key in case of
@@ -240,7 +240,7 @@ int ieee80211_tkip_decrypt_data(struct crypto_blkcipher *tfm,
240240
keyid = pos[3];
241241
iv32 = get_unaligned_le32(pos + 4);
242242
pos += 8;
243-
#ifdef CONFIG_TKIP_DEBUG
243+
#ifdef CONFIG_MAC80211_TKIP_DEBUG
244244
{
245245
int i;
246246
printk(KERN_DEBUG "TKIP decrypt: data(len=%zd)", payload_len);
@@ -250,7 +250,7 @@ int ieee80211_tkip_decrypt_data(struct crypto_blkcipher *tfm,
250250
printk(KERN_DEBUG "TKIP decrypt: iv16=%04x iv32=%08x\n",
251251
iv16, iv32);
252252
}
253-
#endif /* CONFIG_TKIP_DEBUG */
253+
#endif
254254

255255
if (!(keyid & (1 << 5)))
256256
return TKIP_DECRYPT_NO_EXT_IV;
@@ -262,14 +262,14 @@ int ieee80211_tkip_decrypt_data(struct crypto_blkcipher *tfm,
262262
(iv32 < key->u.tkip.rx[queue].iv32 ||
263263
(iv32 == key->u.tkip.rx[queue].iv32 &&
264264
iv16 <= key->u.tkip.rx[queue].iv16))) {
265-
#ifdef CONFIG_TKIP_DEBUG
265+
#ifdef CONFIG_MAC80211_TKIP_DEBUG
266266
DECLARE_MAC_BUF(mac);
267267
printk(KERN_DEBUG "TKIP replay detected for RX frame from "
268268
"%s (RX IV (%04x,%02x) <= prev. IV (%04x,%02x)\n",
269269
print_mac(mac, ta),
270270
iv32, iv16, key->u.tkip.rx[queue].iv32,
271271
key->u.tkip.rx[queue].iv16);
272-
#endif /* CONFIG_TKIP_DEBUG */
272+
#endif
273273
return TKIP_DECRYPT_REPLAY;
274274
}
275275

@@ -283,7 +283,7 @@ int ieee80211_tkip_decrypt_data(struct crypto_blkcipher *tfm,
283283
key->u.tkip.rx[queue].iv32 != iv32) {
284284
/* IV16 wrapped around - perform TKIP phase 1 */
285285
tkip_mixing_phase1(tk, &key->u.tkip.rx[queue], ta, iv32);
286-
#ifdef CONFIG_TKIP_DEBUG
286+
#ifdef CONFIG_MAC80211_TKIP_DEBUG
287287
{
288288
int i;
289289
DECLARE_MAC_BUF(mac);
@@ -299,7 +299,7 @@ int ieee80211_tkip_decrypt_data(struct crypto_blkcipher *tfm,
299299
printk("%04x ", key->u.tkip.rx[queue].p1k[i]);
300300
printk("\n");
301301
}
302-
#endif /* CONFIG_TKIP_DEBUG */
302+
#endif
303303
if (key->local->ops->update_tkip_key &&
304304
key->flags & KEY_FLAG_UPLOADED_TO_HARDWARE) {
305305
u8 bcast[ETH_ALEN] =
@@ -316,15 +316,15 @@ int ieee80211_tkip_decrypt_data(struct crypto_blkcipher *tfm,
316316
}
317317

318318
tkip_mixing_phase2(tk, &key->u.tkip.rx[queue], iv16, rc4key);
319-
#ifdef CONFIG_TKIP_DEBUG
319+
#ifdef CONFIG_MAC80211_TKIP_DEBUG
320320
{
321321
int i;
322322
printk(KERN_DEBUG "TKIP decrypt: Phase2 rc4key=");
323323
for (i = 0; i < 16; i++)
324324
printk("%02x ", rc4key[i]);
325325
printk("\n");
326326
}
327-
#endif /* CONFIG_TKIP_DEBUG */
327+
#endif
328328

329329
res = ieee80211_wep_decrypt_data(tfm, rc4key, 16, pos, payload_len - 12);
330330
done:

0 commit comments

Comments
 (0)