| /* Orinoco MIC helpers |
| * |
| * See copyright notice in main.c |
| */ |
| #include <linux/kernel.h> |
| #include <linux/string.h> |
| #include <linux/if_ether.h> |
| #include <linux/scatterlist.h> |
| #include <linux/crypto.h> |
| |
| #include "orinoco.h" |
| #include "mic.h" |
| |
| /********************************************************************/ |
| /* Michael MIC crypto setup */ |
| /********************************************************************/ |
| int orinoco_mic_init(struct orinoco_private *priv) |
| { |
| priv->tx_tfm_mic = crypto_alloc_hash("michael_mic", 0, 0); |
| if (IS_ERR(priv->tx_tfm_mic)) { |
| printk(KERN_DEBUG "orinoco_mic_init: could not allocate " |
| "crypto API michael_mic\n"); |
| priv->tx_tfm_mic = NULL; |
| return -ENOMEM; |
| } |
| |
| priv->rx_tfm_mic = crypto_alloc_hash("michael_mic", 0, 0); |
| if (IS_ERR(priv->rx_tfm_mic)) { |
| printk(KERN_DEBUG "orinoco_mic_init: could not allocate " |
| "crypto API michael_mic\n"); |
| priv->rx_tfm_mic = NULL; |
| return -ENOMEM; |
| } |
| |
| return 0; |
| } |
| |
| void orinoco_mic_free(struct orinoco_private *priv) |
| { |
| if (priv->tx_tfm_mic) |
| crypto_free_hash(priv->tx_tfm_mic); |
| if (priv->rx_tfm_mic) |
| crypto_free_hash(priv->rx_tfm_mic); |
| } |
| |
| int orinoco_mic(struct crypto_hash *tfm_michael, u8 *key, |
| u8 *da, u8 *sa, u8 priority, |
| u8 *data, size_t data_len, u8 *mic) |
| { |
| struct hash_desc desc; |
| struct scatterlist sg[2]; |
| u8 hdr[ETH_HLEN + 2]; /* size of header + padding */ |
| |
| if (tfm_michael == NULL) { |
| printk(KERN_WARNING "orinoco_mic: tfm_michael == NULL\n"); |
| return -1; |
| } |
| |
| /* Copy header into buffer. We need the padding on the end zeroed */ |
| memcpy(&hdr[0], da, ETH_ALEN); |
| memcpy(&hdr[ETH_ALEN], sa, ETH_ALEN); |
| hdr[ETH_ALEN * 2] = priority; |
| hdr[ETH_ALEN * 2 + 1] = 0; |
| hdr[ETH_ALEN * 2 + 2] = 0; |
| hdr[ETH_ALEN * 2 + 3] = 0; |
| |
| /* Use scatter gather to MIC header and data in one go */ |
| sg_init_table(sg, 2); |
| sg_set_buf(&sg[0], hdr, sizeof(hdr)); |
| sg_set_buf(&sg[1], data, data_len); |
| |
| if (crypto_hash_setkey(tfm_michael, key, MIC_KEYLEN)) |
| return -1; |
| |
| desc.tfm = tfm_michael; |
| desc.flags = 0; |
| return crypto_hash_digest(&desc, sg, data_len + sizeof(hdr), |
| mic); |
| } |