@@ -550,7 +550,7 @@ ieee80211_crypto_ccmp_decrypt(struct ieee80211_rx_data *rx,
550550 if (res < 0 ||
551551 (!res && !(status -> flag & RX_FLAG_ALLOW_SAME_PN ))) {
552552 key -> u .ccmp .replays ++ ;
553- return RX_DROP_UNUSABLE ;
553+ return RX_DROP_U_REPLAY ;
554554 }
555555
556556 if (!(status -> flag & RX_FLAG_DECRYPTED )) {
@@ -564,7 +564,7 @@ ieee80211_crypto_ccmp_decrypt(struct ieee80211_rx_data *rx,
564564 skb -> data + hdrlen + IEEE80211_CCMP_HDR_LEN ,
565565 data_len ,
566566 skb -> data + skb -> len - mic_len ))
567- return RX_DROP_UNUSABLE ;
567+ return RX_DROP_U_MIC_FAIL ;
568568 }
569569
570570 memcpy (key -> u .ccmp .rx_pn [queue ], pn , IEEE80211_CCMP_PN_LEN );
@@ -746,7 +746,7 @@ ieee80211_crypto_gcmp_decrypt(struct ieee80211_rx_data *rx)
746746 if (res < 0 ||
747747 (!res && !(status -> flag & RX_FLAG_ALLOW_SAME_PN ))) {
748748 key -> u .gcmp .replays ++ ;
749- return RX_DROP_UNUSABLE ;
749+ return RX_DROP_U_REPLAY ;
750750 }
751751
752752 if (!(status -> flag & RX_FLAG_DECRYPTED )) {
@@ -761,7 +761,7 @@ ieee80211_crypto_gcmp_decrypt(struct ieee80211_rx_data *rx)
761761 data_len ,
762762 skb -> data + skb -> len -
763763 IEEE80211_GCMP_MIC_LEN ))
764- return RX_DROP_UNUSABLE ;
764+ return RX_DROP_U_MIC_FAIL ;
765765 }
766766
767767 memcpy (key -> u .gcmp .rx_pn [queue ], pn , IEEE80211_GCMP_PN_LEN );
@@ -930,13 +930,13 @@ ieee80211_crypto_aes_cmac_decrypt(struct ieee80211_rx_data *rx)
930930 (skb -> data + skb -> len - sizeof (* mmie ));
931931 if (mmie -> element_id != WLAN_EID_MMIE ||
932932 mmie -> length != sizeof (* mmie ) - 2 )
933- return RX_DROP_UNUSABLE ; /* Invalid MMIE */
933+ return RX_DROP_U_BAD_MMIE ; /* Invalid MMIE */
934934
935935 bip_ipn_swap (ipn , mmie -> sequence_number );
936936
937937 if (memcmp (ipn , key -> u .aes_cmac .rx_pn , 6 ) <= 0 ) {
938938 key -> u .aes_cmac .replays ++ ;
939- return RX_DROP_UNUSABLE ;
939+ return RX_DROP_U_REPLAY ;
940940 }
941941
942942 if (!(status -> flag & RX_FLAG_DECRYPTED )) {
@@ -946,7 +946,7 @@ ieee80211_crypto_aes_cmac_decrypt(struct ieee80211_rx_data *rx)
946946 skb -> data + 24 , skb -> len - 24 , mic );
947947 if (crypto_memneq (mic , mmie -> mic , sizeof (mmie -> mic ))) {
948948 key -> u .aes_cmac .icverrors ++ ;
949- return RX_DROP_UNUSABLE ;
949+ return RX_DROP_U_MIC_FAIL ;
950950 }
951951 }
952952
@@ -986,7 +986,7 @@ ieee80211_crypto_aes_cmac_256_decrypt(struct ieee80211_rx_data *rx)
986986
987987 if (memcmp (ipn , key -> u .aes_cmac .rx_pn , 6 ) <= 0 ) {
988988 key -> u .aes_cmac .replays ++ ;
989- return RX_DROP_UNUSABLE ;
989+ return RX_DROP_U_REPLAY ;
990990 }
991991
992992 if (!(status -> flag & RX_FLAG_DECRYPTED )) {
@@ -996,7 +996,7 @@ ieee80211_crypto_aes_cmac_256_decrypt(struct ieee80211_rx_data *rx)
996996 skb -> data + 24 , skb -> len - 24 , mic );
997997 if (crypto_memneq (mic , mmie -> mic , sizeof (mmie -> mic ))) {
998998 key -> u .aes_cmac .icverrors ++ ;
999- return RX_DROP_UNUSABLE ;
999+ return RX_DROP_U_MIC_FAIL ;
10001000 }
10011001 }
10021002
@@ -1079,13 +1079,13 @@ ieee80211_crypto_aes_gmac_decrypt(struct ieee80211_rx_data *rx)
10791079 (skb -> data + skb -> len - sizeof (* mmie ));
10801080 if (mmie -> element_id != WLAN_EID_MMIE ||
10811081 mmie -> length != sizeof (* mmie ) - 2 )
1082- return RX_DROP_UNUSABLE ; /* Invalid MMIE */
1082+ return RX_DROP_U_BAD_MMIE ; /* Invalid MMIE */
10831083
10841084 bip_ipn_swap (ipn , mmie -> sequence_number );
10851085
10861086 if (memcmp (ipn , key -> u .aes_gmac .rx_pn , 6 ) <= 0 ) {
10871087 key -> u .aes_gmac .replays ++ ;
1088- return RX_DROP_UNUSABLE ;
1088+ return RX_DROP_U_REPLAY ;
10891089 }
10901090
10911091 if (!(status -> flag & RX_FLAG_DECRYPTED )) {
@@ -1104,7 +1104,7 @@ ieee80211_crypto_aes_gmac_decrypt(struct ieee80211_rx_data *rx)
11041104 crypto_memneq (mic , mmie -> mic , sizeof (mmie -> mic ))) {
11051105 key -> u .aes_gmac .icverrors ++ ;
11061106 kfree (mic );
1107- return RX_DROP_UNUSABLE ;
1107+ return RX_DROP_U_MIC_FAIL ;
11081108 }
11091109 kfree (mic );
11101110 }
0 commit comments