On Sun, 2010-10-10 at 19:50 +0200, Michael BÃsch wrote: > On Sun, 2010-10-10 at 18:52 +0200, Johannes Berg wrote: > > From: Johannes Berg <johannes.berg@xxxxxxxxx> > > > > Since this small buffer isn't used for DMA, > > we can simply allocate it on the stack, it > > just needs to be 16 bytes of which only 8 > > will be used for WEP40 keys. > > > > Signed-off-by: Johannes Berg <johannes.berg@xxxxxxxxx> > > --- > > net/mac80211/wep.c | 8 +------- > > 1 file changed, 1 insertion(+), 7 deletions(-) > > > > --- wireless-testing.orig/net/mac80211/wep.c 2010-10-08 14:50:35.000000000 +0200 > > +++ wireless-testing/net/mac80211/wep.c 2010-10-08 14:51:41.000000000 +0200 > > @@ -222,7 +222,7 @@ static int ieee80211_wep_decrypt(struct > > struct ieee80211_key *key) > > { > > u32 klen; > > - u8 *rc4key; > > + u8 rc4key[3 + WLAN_KEY_LEN_WEP104]; > > u8 keyidx; > > struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data; > > unsigned int hdrlen; > > @@ -245,10 +245,6 @@ static int ieee80211_wep_decrypt(struct > > > > klen = 3 + key->conf.keylen; > > What about > if (WARN_ON(klen > sizeof(rc4key))) > return -1; > to harden this a bit for accidental stack overflows? Not sure, it doesn't really seem worth it -- if somebody really wanted to extend mac80211 to support WEP256 he'd also have to find and change the other places that already contain similar code. Not that it's really a hotpath though (since 11n doesn't support WEP). johannes -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html