2016-10-21, 13:11:37 +0200, Tobias Brunner wrote:
> Even if sending SCIs is explicitly disabled, the code that creates the
> Security Tag might still decide to add it (e.g. if multiple RX SCs are
> defined on the MACsec interface).
> But because the header length so far only depended on the configuration
> option the SCI might not actually have ended up in the packet, while the
> SC flag in the TCI field of the Security Tag was still set, resulting
> in invalid MACsec frames.
Or overwriting the original frame's contents (ethertype and eg
beginning of the IP header) if !encrypt.
Fixes: c09440f7dcb3 ("macsec: introduce IEEE 802.1AE driver")
[snip]
> @@ -440,12 +448,12 @@ static void macsec_fill_sectag(struct macsec_eth_header
> *h,
> const struct macsec_secy *secy, u32 pn)
> {
> const struct macsec_tx_sc *tx_sc = &secy->tx_sc;
> + bool sci_present = send_sci(secy);
You're already computing this in macsec_encrypt() just before calling
macsec_fill_sectag(), so you could pass it as argument instead of
recomputing it.
Other than that, LGTM, thanks!
--
Sabrina