blob: b3d65e0bedd31fbe370094a421c95c36430703c4 [file] [log] [blame]
Jeff Garzikb4538722005-05-12 22:48:20 -04001/*
2 * Original code based on Host AP (software wireless LAN access point) driver
3 * for Intersil Prism2/2.5/3.
4 *
5 * Copyright (c) 2001-2002, SSH Communications Security Corp and Jouni Malinen
Jouni Malinen85d32e72007-03-24 17:15:30 -07006 * <j@w1.fi>
7 * Copyright (c) 2002-2003, Jouni Malinen <j@w1.fi>
Jeff Garzikb4538722005-05-12 22:48:20 -04008 *
9 * Adaption to a generic IEEE 802.11 stack by James Ketrenos
10 * <jketreno@linux.intel.com>
11 *
12 * Copyright (c) 2004, Intel Corporation
13 *
14 * This program is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License version 2 as
16 * published by the Free Software Foundation. See README and COPYING for
17 * more details.
18 */
19
20/*
21 * This file defines the interface to the ieee80211 crypto module.
22 */
23#ifndef IEEE80211_CRYPT_H
24#define IEEE80211_CRYPT_H
25
Arnaldo Carvalho de Melo14c85022005-12-27 02:43:12 -020026#include <linux/types.h>
27#include <linux/list.h>
Adrian Bunk5fad5a22006-01-14 03:09:34 +010028#include <net/ieee80211.h>
Arnaldo Carvalho de Melo14c85022005-12-27 02:43:12 -020029#include <asm/atomic.h>
Jeff Garzikb4538722005-05-12 22:48:20 -040030
James Ketrenos6eb6edf2005-09-22 10:34:15 +000031enum {
James Ketrenosff0037b2005-10-03 10:23:42 -050032 IEEE80211_CRYPTO_TKIP_COUNTERMEASURES = (1 << 0),
James Ketrenos6eb6edf2005-09-22 10:34:15 +000033};
34
Arnaldo Carvalho de Melo14c85022005-12-27 02:43:12 -020035struct sk_buff;
36struct module;
37
Jeff Garzikb4538722005-05-12 22:48:20 -040038struct ieee80211_crypto_ops {
39 const char *name;
Christoph Hellwige3305622005-11-09 01:01:04 -050040 struct list_head list;
Jeff Garzikb4538722005-05-12 22:48:20 -040041
42 /* init new crypto context (e.g., allocate private data space,
43 * select IV, etc.); returns NULL on failure or pointer to allocated
44 * private data on success */
James Ketrenos6eb6edf2005-09-22 10:34:15 +000045 void *(*init) (int keyidx);
Jeff Garzikb4538722005-05-12 22:48:20 -040046
47 /* deinitialize crypto context and free allocated private data */
James Ketrenos74079fd2005-09-13 17:35:21 -050048 void (*deinit) (void *priv);
Jeff Garzikb4538722005-05-12 22:48:20 -040049
Zhu Yi9184d932006-01-19 16:22:32 +080050 int (*build_iv) (struct sk_buff * skb, int hdr_len,
51 u8 *key, int keylen, void *priv);
James Ketrenos31b59ea2005-09-21 11:58:49 -050052
Jeff Garzikb4538722005-05-12 22:48:20 -040053 /* encrypt/decrypt return < 0 on error or >= 0 on success. The return
54 * value from decrypt_mpdu is passed as the keyidx value for
55 * decrypt_msdu. skb must have enough head and tail room for the
56 * encryption; if not, error will be returned; these functions are
57 * called for all MPDUs (i.e., fragments).
58 */
James Ketrenos74079fd2005-09-13 17:35:21 -050059 int (*encrypt_mpdu) (struct sk_buff * skb, int hdr_len, void *priv);
60 int (*decrypt_mpdu) (struct sk_buff * skb, int hdr_len, void *priv);
Jeff Garzikb4538722005-05-12 22:48:20 -040061
62 /* These functions are called for full MSDUs, i.e. full frames.
63 * These can be NULL if full MSDU operations are not needed. */
James Ketrenos74079fd2005-09-13 17:35:21 -050064 int (*encrypt_msdu) (struct sk_buff * skb, int hdr_len, void *priv);
65 int (*decrypt_msdu) (struct sk_buff * skb, int keyidx, int hdr_len,
66 void *priv);
Jeff Garzikb4538722005-05-12 22:48:20 -040067
James Ketrenos74079fd2005-09-13 17:35:21 -050068 int (*set_key) (void *key, int len, u8 * seq, void *priv);
69 int (*get_key) (void *key, int len, u8 * seq, void *priv);
Jeff Garzikb4538722005-05-12 22:48:20 -040070
71 /* procfs handler for printing out key information and possible
72 * statistics */
James Ketrenos74079fd2005-09-13 17:35:21 -050073 char *(*print_stats) (char *p, void *priv);
Jeff Garzikb4538722005-05-12 22:48:20 -040074
James Ketrenos6eb6edf2005-09-22 10:34:15 +000075 /* Crypto specific flag get/set for configuration settings */
James Ketrenosff0037b2005-10-03 10:23:42 -050076 unsigned long (*get_flags) (void *priv);
77 unsigned long (*set_flags) (unsigned long flags, void *priv);
James Ketrenos6eb6edf2005-09-22 10:34:15 +000078
Jeff Garzikb4538722005-05-12 22:48:20 -040079 /* maximum number of bytes added by encryption; encrypt buf is
80 * allocated with extra_prefix_len bytes, copy of in_buf, and
81 * extra_postfix_len; encrypt need not use all this space, but
82 * the result must start at the beginning of the buffer and correct
83 * length must be returned */
James Ketrenos1264fc02005-09-21 11:54:53 -050084 int extra_mpdu_prefix_len, extra_mpdu_postfix_len;
85 int extra_msdu_prefix_len, extra_msdu_postfix_len;
Jeff Garzikb4538722005-05-12 22:48:20 -040086
87 struct module *owner;
88};
89
90struct ieee80211_crypt_data {
James Ketrenos74079fd2005-09-13 17:35:21 -050091 struct list_head list; /* delayed deletion list */
Jeff Garzikb4538722005-05-12 22:48:20 -040092 struct ieee80211_crypto_ops *ops;
93 void *priv;
94 atomic_t refcnt;
95};
96
Arnaldo Carvalho de Melo14c85022005-12-27 02:43:12 -020097struct ieee80211_device;
98
Jeff Garzikb4538722005-05-12 22:48:20 -040099int ieee80211_register_crypto_ops(struct ieee80211_crypto_ops *ops);
100int ieee80211_unregister_crypto_ops(struct ieee80211_crypto_ops *ops);
James Ketrenos74079fd2005-09-13 17:35:21 -0500101struct ieee80211_crypto_ops *ieee80211_get_crypto_ops(const char *name);
Jeff Garzikb4538722005-05-12 22:48:20 -0400102void ieee80211_crypt_deinit_entries(struct ieee80211_device *, int);
103void ieee80211_crypt_deinit_handler(unsigned long);
104void ieee80211_crypt_delayed_deinit(struct ieee80211_device *ieee,
105 struct ieee80211_crypt_data **crypt);
James Ketrenos0ad0c3c2005-09-21 11:54:15 -0500106void ieee80211_crypt_quiescing(struct ieee80211_device *ieee);
Jeff Garzikb4538722005-05-12 22:48:20 -0400107
108#endif