blob: de56a47edb0058ff4b70d0c50b5a7ad43fe1f820 [file] [log] [blame]
Jeff Garzikb4538722005-05-12 22:48:20 -04001/*
2 * Host AP crypt: host-based TKIP encryption implementation for Host AP driver
3 *
4 * Copyright (c) 2003-2004, Jouni Malinen <jkmaline@cc.hut.fi>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation. See README and COPYING for
9 * more details.
10 */
11
12#include <linux/config.h>
Jeff Garzikb4538722005-05-12 22:48:20 -040013#include <linux/module.h>
14#include <linux/init.h>
15#include <linux/slab.h>
16#include <linux/random.h>
17#include <linux/skbuff.h>
18#include <linux/netdevice.h>
19#include <linux/if_ether.h>
20#include <linux/if_arp.h>
21#include <asm/string.h>
22
23#include <net/ieee80211.h>
24
Jeff Garzikb4538722005-05-12 22:48:20 -040025#include <linux/crypto.h>
26#include <asm/scatterlist.h>
27#include <linux/crc32.h>
28
29MODULE_AUTHOR("Jouni Malinen");
30MODULE_DESCRIPTION("Host AP crypt: TKIP");
31MODULE_LICENSE("GPL");
32
33struct ieee80211_tkip_data {
34#define TKIP_KEY_LEN 32
35 u8 key[TKIP_KEY_LEN];
36 int key_set;
37
38 u32 tx_iv32;
39 u16 tx_iv16;
40 u16 tx_ttak[5];
41 int tx_phase1_done;
42
43 u32 rx_iv32;
44 u16 rx_iv16;
45 u16 rx_ttak[5];
46 int rx_phase1_done;
47 u32 rx_iv32_new;
48 u16 rx_iv16_new;
49
50 u32 dot11RSNAStatsTKIPReplays;
51 u32 dot11RSNAStatsTKIPICVErrors;
52 u32 dot11RSNAStatsTKIPLocalMICFailures;
53
54 int key_idx;
55
56 struct crypto_tfm *tfm_arc4;
57 struct crypto_tfm *tfm_michael;
58
59 /* scratch buffers for virt_to_page() (crypto API) */
60 u8 rx_hdr[16], tx_hdr[16];
James Ketrenos20d64712005-09-21 11:53:43 -050061
James Ketrenos6eb6edf2005-09-22 10:34:15 +000062 unsigned long flags;
Jeff Garzikb4538722005-05-12 22:48:20 -040063};
64
James Ketrenos6eb6edf2005-09-22 10:34:15 +000065static unsigned long ieee80211_tkip_set_flags(unsigned long flags, void *priv)
66{
67 struct ieee80211_tkip_data *_priv = priv;
68 unsigned long old_flags = _priv->flags;
69 _priv->flags = flags;
70 return old_flags;
71}
72
73static unsigned long ieee80211_tkip_get_flags(void *priv)
74{
75 struct ieee80211_tkip_data *_priv = priv;
76 return _priv->flags;
77}
78
79static void *ieee80211_tkip_init(int key_idx)
Jeff Garzikb4538722005-05-12 22:48:20 -040080{
81 struct ieee80211_tkip_data *priv;
82
Zhu Yi8aa914b2006-01-19 16:22:07 +080083 priv = kzalloc(sizeof(*priv), GFP_ATOMIC);
Jeff Garzikb4538722005-05-12 22:48:20 -040084 if (priv == NULL)
85 goto fail;
James Ketrenos20d64712005-09-21 11:53:43 -050086
Jeff Garzikb4538722005-05-12 22:48:20 -040087 priv->key_idx = key_idx;
88
89 priv->tfm_arc4 = crypto_alloc_tfm("arc4", 0);
90 if (priv->tfm_arc4 == NULL) {
91 printk(KERN_DEBUG "ieee80211_crypt_tkip: could not allocate "
92 "crypto API arc4\n");
93 goto fail;
94 }
95
96 priv->tfm_michael = crypto_alloc_tfm("michael_mic", 0);
97 if (priv->tfm_michael == NULL) {
98 printk(KERN_DEBUG "ieee80211_crypt_tkip: could not allocate "
99 "crypto API michael_mic\n");
100 goto fail;
101 }
102
103 return priv;
104
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400105 fail:
Jeff Garzikb4538722005-05-12 22:48:20 -0400106 if (priv) {
107 if (priv->tfm_michael)
108 crypto_free_tfm(priv->tfm_michael);
109 if (priv->tfm_arc4)
110 crypto_free_tfm(priv->tfm_arc4);
111 kfree(priv);
112 }
113
114 return NULL;
115}
116
Jeff Garzikb4538722005-05-12 22:48:20 -0400117static void ieee80211_tkip_deinit(void *priv)
118{
119 struct ieee80211_tkip_data *_priv = priv;
120 if (_priv && _priv->tfm_michael)
121 crypto_free_tfm(_priv->tfm_michael);
122 if (_priv && _priv->tfm_arc4)
123 crypto_free_tfm(_priv->tfm_arc4);
124 kfree(priv);
125}
126
Jeff Garzikb4538722005-05-12 22:48:20 -0400127static inline u16 RotR1(u16 val)
128{
129 return (val >> 1) | (val << 15);
130}
131
Jeff Garzikb4538722005-05-12 22:48:20 -0400132static inline u8 Lo8(u16 val)
133{
134 return val & 0xff;
135}
136
Jeff Garzikb4538722005-05-12 22:48:20 -0400137static inline u8 Hi8(u16 val)
138{
139 return val >> 8;
140}
141
Jeff Garzikb4538722005-05-12 22:48:20 -0400142static inline u16 Lo16(u32 val)
143{
144 return val & 0xffff;
145}
146
Jeff Garzikb4538722005-05-12 22:48:20 -0400147static inline u16 Hi16(u32 val)
148{
149 return val >> 16;
150}
151
Jeff Garzikb4538722005-05-12 22:48:20 -0400152static inline u16 Mk16(u8 hi, u8 lo)
153{
154 return lo | (((u16) hi) << 8);
155}
156
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400157static inline u16 Mk16_le(u16 * v)
Jeff Garzikb4538722005-05-12 22:48:20 -0400158{
159 return le16_to_cpu(*v);
160}
161
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400162static const u16 Sbox[256] = {
Jeff Garzikb4538722005-05-12 22:48:20 -0400163 0xC6A5, 0xF884, 0xEE99, 0xF68D, 0xFF0D, 0xD6BD, 0xDEB1, 0x9154,
164 0x6050, 0x0203, 0xCEA9, 0x567D, 0xE719, 0xB562, 0x4DE6, 0xEC9A,
165 0x8F45, 0x1F9D, 0x8940, 0xFA87, 0xEF15, 0xB2EB, 0x8EC9, 0xFB0B,
166 0x41EC, 0xB367, 0x5FFD, 0x45EA, 0x23BF, 0x53F7, 0xE496, 0x9B5B,
167 0x75C2, 0xE11C, 0x3DAE, 0x4C6A, 0x6C5A, 0x7E41, 0xF502, 0x834F,
168 0x685C, 0x51F4, 0xD134, 0xF908, 0xE293, 0xAB73, 0x6253, 0x2A3F,
169 0x080C, 0x9552, 0x4665, 0x9D5E, 0x3028, 0x37A1, 0x0A0F, 0x2FB5,
170 0x0E09, 0x2436, 0x1B9B, 0xDF3D, 0xCD26, 0x4E69, 0x7FCD, 0xEA9F,
171 0x121B, 0x1D9E, 0x5874, 0x342E, 0x362D, 0xDCB2, 0xB4EE, 0x5BFB,
172 0xA4F6, 0x764D, 0xB761, 0x7DCE, 0x527B, 0xDD3E, 0x5E71, 0x1397,
173 0xA6F5, 0xB968, 0x0000, 0xC12C, 0x4060, 0xE31F, 0x79C8, 0xB6ED,
174 0xD4BE, 0x8D46, 0x67D9, 0x724B, 0x94DE, 0x98D4, 0xB0E8, 0x854A,
175 0xBB6B, 0xC52A, 0x4FE5, 0xED16, 0x86C5, 0x9AD7, 0x6655, 0x1194,
176 0x8ACF, 0xE910, 0x0406, 0xFE81, 0xA0F0, 0x7844, 0x25BA, 0x4BE3,
177 0xA2F3, 0x5DFE, 0x80C0, 0x058A, 0x3FAD, 0x21BC, 0x7048, 0xF104,
178 0x63DF, 0x77C1, 0xAF75, 0x4263, 0x2030, 0xE51A, 0xFD0E, 0xBF6D,
179 0x814C, 0x1814, 0x2635, 0xC32F, 0xBEE1, 0x35A2, 0x88CC, 0x2E39,
180 0x9357, 0x55F2, 0xFC82, 0x7A47, 0xC8AC, 0xBAE7, 0x322B, 0xE695,
181 0xC0A0, 0x1998, 0x9ED1, 0xA37F, 0x4466, 0x547E, 0x3BAB, 0x0B83,
182 0x8CCA, 0xC729, 0x6BD3, 0x283C, 0xA779, 0xBCE2, 0x161D, 0xAD76,
183 0xDB3B, 0x6456, 0x744E, 0x141E, 0x92DB, 0x0C0A, 0x486C, 0xB8E4,
184 0x9F5D, 0xBD6E, 0x43EF, 0xC4A6, 0x39A8, 0x31A4, 0xD337, 0xF28B,
185 0xD532, 0x8B43, 0x6E59, 0xDAB7, 0x018C, 0xB164, 0x9CD2, 0x49E0,
186 0xD8B4, 0xACFA, 0xF307, 0xCF25, 0xCAAF, 0xF48E, 0x47E9, 0x1018,
187 0x6FD5, 0xF088, 0x4A6F, 0x5C72, 0x3824, 0x57F1, 0x73C7, 0x9751,
188 0xCB23, 0xA17C, 0xE89C, 0x3E21, 0x96DD, 0x61DC, 0x0D86, 0x0F85,
189 0xE090, 0x7C42, 0x71C4, 0xCCAA, 0x90D8, 0x0605, 0xF701, 0x1C12,
190 0xC2A3, 0x6A5F, 0xAEF9, 0x69D0, 0x1791, 0x9958, 0x3A27, 0x27B9,
191 0xD938, 0xEB13, 0x2BB3, 0x2233, 0xD2BB, 0xA970, 0x0789, 0x33A7,
192 0x2DB6, 0x3C22, 0x1592, 0xC920, 0x8749, 0xAAFF, 0x5078, 0xA57A,
193 0x038F, 0x59F8, 0x0980, 0x1A17, 0x65DA, 0xD731, 0x84C6, 0xD0B8,
194 0x82C3, 0x29B0, 0x5A77, 0x1E11, 0x7BCB, 0xA8FC, 0x6DD6, 0x2C3A,
195};
196
Jeff Garzikb4538722005-05-12 22:48:20 -0400197static inline u16 _S_(u16 v)
198{
199 u16 t = Sbox[Hi8(v)];
200 return Sbox[Lo8(v)] ^ ((t << 8) | (t >> 8));
201}
202
Jeff Garzikb4538722005-05-12 22:48:20 -0400203#define PHASE1_LOOP_COUNT 8
204
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400205static void tkip_mixing_phase1(u16 * TTAK, const u8 * TK, const u8 * TA,
206 u32 IV32)
Jeff Garzikb4538722005-05-12 22:48:20 -0400207{
208 int i, j;
209
210 /* Initialize the 80-bit TTAK from TSC (IV32) and TA[0..5] */
211 TTAK[0] = Lo16(IV32);
212 TTAK[1] = Hi16(IV32);
213 TTAK[2] = Mk16(TA[1], TA[0]);
214 TTAK[3] = Mk16(TA[3], TA[2]);
215 TTAK[4] = Mk16(TA[5], TA[4]);
216
217 for (i = 0; i < PHASE1_LOOP_COUNT; i++) {
218 j = 2 * (i & 1);
219 TTAK[0] += _S_(TTAK[4] ^ Mk16(TK[1 + j], TK[0 + j]));
220 TTAK[1] += _S_(TTAK[0] ^ Mk16(TK[5 + j], TK[4 + j]));
221 TTAK[2] += _S_(TTAK[1] ^ Mk16(TK[9 + j], TK[8 + j]));
222 TTAK[3] += _S_(TTAK[2] ^ Mk16(TK[13 + j], TK[12 + j]));
223 TTAK[4] += _S_(TTAK[3] ^ Mk16(TK[1 + j], TK[0 + j])) + i;
224 }
225}
226
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400227static void tkip_mixing_phase2(u8 * WEPSeed, const u8 * TK, const u16 * TTAK,
Jeff Garzikb4538722005-05-12 22:48:20 -0400228 u16 IV16)
229{
230 /* Make temporary area overlap WEP seed so that the final copy can be
231 * avoided on little endian hosts. */
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400232 u16 *PPK = (u16 *) & WEPSeed[4];
Jeff Garzikb4538722005-05-12 22:48:20 -0400233
234 /* Step 1 - make copy of TTAK and bring in TSC */
235 PPK[0] = TTAK[0];
236 PPK[1] = TTAK[1];
237 PPK[2] = TTAK[2];
238 PPK[3] = TTAK[3];
239 PPK[4] = TTAK[4];
240 PPK[5] = TTAK[4] + IV16;
241
242 /* Step 2 - 96-bit bijective mixing using S-box */
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400243 PPK[0] += _S_(PPK[5] ^ Mk16_le((u16 *) & TK[0]));
244 PPK[1] += _S_(PPK[0] ^ Mk16_le((u16 *) & TK[2]));
245 PPK[2] += _S_(PPK[1] ^ Mk16_le((u16 *) & TK[4]));
246 PPK[3] += _S_(PPK[2] ^ Mk16_le((u16 *) & TK[6]));
247 PPK[4] += _S_(PPK[3] ^ Mk16_le((u16 *) & TK[8]));
248 PPK[5] += _S_(PPK[4] ^ Mk16_le((u16 *) & TK[10]));
Jeff Garzikb4538722005-05-12 22:48:20 -0400249
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400250 PPK[0] += RotR1(PPK[5] ^ Mk16_le((u16 *) & TK[12]));
251 PPK[1] += RotR1(PPK[0] ^ Mk16_le((u16 *) & TK[14]));
Jeff Garzikb4538722005-05-12 22:48:20 -0400252 PPK[2] += RotR1(PPK[1]);
253 PPK[3] += RotR1(PPK[2]);
254 PPK[4] += RotR1(PPK[3]);
255 PPK[5] += RotR1(PPK[4]);
256
257 /* Step 3 - bring in last of TK bits, assign 24-bit WEP IV value
258 * WEPSeed[0..2] is transmitted as WEP IV */
259 WEPSeed[0] = Hi8(IV16);
260 WEPSeed[1] = (Hi8(IV16) | 0x20) & 0x7F;
261 WEPSeed[2] = Lo8(IV16);
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400262 WEPSeed[3] = Lo8((PPK[5] ^ Mk16_le((u16 *) & TK[0])) >> 1);
Jeff Garzikb4538722005-05-12 22:48:20 -0400263
264#ifdef __BIG_ENDIAN
265 {
266 int i;
267 for (i = 0; i < 6; i++)
268 PPK[i] = (PPK[i] << 8) | (PPK[i] >> 8);
269 }
270#endif
271}
272
James Ketrenos31b59ea2005-09-21 11:58:49 -0500273static u8 *ieee80211_tkip_hdr(struct sk_buff *skb, int hdr_len, void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -0400274{
275 struct ieee80211_tkip_data *tkey = priv;
276 int len;
James Ketrenos31b59ea2005-09-21 11:58:49 -0500277 u8 *rc4key, *pos, *icv;
James Ketrenosee34af32005-09-21 11:54:36 -0500278 struct ieee80211_hdr_4addr *hdr;
Jeff Garzikb4538722005-05-12 22:48:20 -0400279 u32 crc;
Jeff Garzikb4538722005-05-12 22:48:20 -0400280
James Ketrenosee34af32005-09-21 11:54:36 -0500281 hdr = (struct ieee80211_hdr_4addr *)skb->data;
James Ketrenos20d64712005-09-21 11:53:43 -0500282
James Ketrenos31b59ea2005-09-21 11:58:49 -0500283 if (skb_headroom(skb) < 8 || skb->len < hdr_len)
284 return NULL;
Jeff Garzikb4538722005-05-12 22:48:20 -0400285
Jeff Garzikb4538722005-05-12 22:48:20 -0400286 if (!tkey->tx_phase1_done) {
287 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2,
288 tkey->tx_iv32);
289 tkey->tx_phase1_done = 1;
290 }
James Ketrenos31b59ea2005-09-21 11:58:49 -0500291 rc4key = kmalloc(16, GFP_ATOMIC);
292 if (!rc4key)
293 return NULL;
Jeff Garzikb4538722005-05-12 22:48:20 -0400294 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, tkey->tx_iv16);
295
296 len = skb->len - hdr_len;
297 pos = skb_push(skb, 8);
298 memmove(pos, pos + 8, hdr_len);
299 pos += hdr_len;
300 icv = skb_put(skb, 4);
301
James Ketrenos31b59ea2005-09-21 11:58:49 -0500302 *pos++ = *rc4key;
303 *pos++ = *(rc4key + 1);
304 *pos++ = *(rc4key + 2);
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400305 *pos++ = (tkey->key_idx << 6) | (1 << 5) /* Ext IV included */ ;
Jeff Garzikb4538722005-05-12 22:48:20 -0400306 *pos++ = tkey->tx_iv32 & 0xff;
307 *pos++ = (tkey->tx_iv32 >> 8) & 0xff;
308 *pos++ = (tkey->tx_iv32 >> 16) & 0xff;
309 *pos++ = (tkey->tx_iv32 >> 24) & 0xff;
310
311 crc = ~crc32_le(~0, pos, len);
312 icv[0] = crc;
313 icv[1] = crc >> 8;
314 icv[2] = crc >> 16;
315 icv[3] = crc >> 24;
316
James Ketrenos31b59ea2005-09-21 11:58:49 -0500317 return rc4key;
318}
319
320static int ieee80211_tkip_encrypt(struct sk_buff *skb, int hdr_len, void *priv)
321{
322 struct ieee80211_tkip_data *tkey = priv;
323 int len;
324 const u8 *rc4key;
325 u8 *pos;
326 struct scatterlist sg;
327
James Ketrenos6eb6edf2005-09-22 10:34:15 +0000328 if (tkey->flags & IEEE80211_CRYPTO_TKIP_COUNTERMEASURES) {
James Ketrenos31b59ea2005-09-21 11:58:49 -0500329 if (net_ratelimit()) {
330 struct ieee80211_hdr_4addr *hdr =
331 (struct ieee80211_hdr_4addr *)skb->data;
James Ketrenos6eb6edf2005-09-22 10:34:15 +0000332 printk(KERN_DEBUG "TKIP countermeasures: dropped "
James Ketrenos31b59ea2005-09-21 11:58:49 -0500333 "TX packet to " MAC_FMT "\n",
James Ketrenos6eb6edf2005-09-22 10:34:15 +0000334 MAC_ARG(hdr->addr1));
James Ketrenos31b59ea2005-09-21 11:58:49 -0500335 }
336 return -1;
337 }
338
339 if (skb_tailroom(skb) < 4 || skb->len < hdr_len)
340 return -1;
341
342 len = skb->len - hdr_len;
343 pos = skb->data + hdr_len;
344
345 rc4key = ieee80211_tkip_hdr(skb, hdr_len, priv);
346 if (!rc4key)
347 return -1;
348
Jeff Garzikb4538722005-05-12 22:48:20 -0400349 crypto_cipher_setkey(tkey->tfm_arc4, rc4key, 16);
350 sg.page = virt_to_page(pos);
351 sg.offset = offset_in_page(pos);
352 sg.length = len + 4;
353 crypto_cipher_encrypt(tkey->tfm_arc4, &sg, &sg, len + 4);
354
355 tkey->tx_iv16++;
356 if (tkey->tx_iv16 == 0) {
357 tkey->tx_phase1_done = 0;
358 tkey->tx_iv32++;
359 }
360
361 return 0;
362}
363
364static int ieee80211_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
365{
366 struct ieee80211_tkip_data *tkey = priv;
367 u8 rc4key[16];
368 u8 keyidx, *pos;
369 u32 iv32;
370 u16 iv16;
James Ketrenosee34af32005-09-21 11:54:36 -0500371 struct ieee80211_hdr_4addr *hdr;
Jeff Garzikb4538722005-05-12 22:48:20 -0400372 u8 icv[4];
373 u32 crc;
374 struct scatterlist sg;
375 int plen;
376
James Ketrenosee34af32005-09-21 11:54:36 -0500377 hdr = (struct ieee80211_hdr_4addr *)skb->data;
James Ketrenos20d64712005-09-21 11:53:43 -0500378
James Ketrenos6eb6edf2005-09-22 10:34:15 +0000379 if (tkey->flags & IEEE80211_CRYPTO_TKIP_COUNTERMEASURES) {
James Ketrenos20d64712005-09-21 11:53:43 -0500380 if (net_ratelimit()) {
James Ketrenos6eb6edf2005-09-22 10:34:15 +0000381 printk(KERN_DEBUG "TKIP countermeasures: dropped "
James Ketrenos20d64712005-09-21 11:53:43 -0500382 "received packet from " MAC_FMT "\n",
James Ketrenos6eb6edf2005-09-22 10:34:15 +0000383 MAC_ARG(hdr->addr2));
James Ketrenos20d64712005-09-21 11:53:43 -0500384 }
385 return -1;
386 }
387
Jeff Garzikb4538722005-05-12 22:48:20 -0400388 if (skb->len < hdr_len + 8 + 4)
389 return -1;
390
Jeff Garzikb4538722005-05-12 22:48:20 -0400391 pos = skb->data + hdr_len;
392 keyidx = pos[3];
393 if (!(keyidx & (1 << 5))) {
394 if (net_ratelimit()) {
395 printk(KERN_DEBUG "TKIP: received packet without ExtIV"
396 " flag from " MAC_FMT "\n", MAC_ARG(hdr->addr2));
397 }
398 return -2;
399 }
400 keyidx >>= 6;
401 if (tkey->key_idx != keyidx) {
402 printk(KERN_DEBUG "TKIP: RX tkey->key_idx=%d frame "
403 "keyidx=%d priv=%p\n", tkey->key_idx, keyidx, priv);
404 return -6;
405 }
406 if (!tkey->key_set) {
407 if (net_ratelimit()) {
408 printk(KERN_DEBUG "TKIP: received packet from " MAC_FMT
409 " with keyid=%d that does not have a configured"
410 " key\n", MAC_ARG(hdr->addr2), keyidx);
411 }
412 return -3;
413 }
414 iv16 = (pos[0] << 8) | pos[2];
415 iv32 = pos[4] | (pos[5] << 8) | (pos[6] << 16) | (pos[7] << 24);
416 pos += 8;
417
418 if (iv32 < tkey->rx_iv32 ||
419 (iv32 == tkey->rx_iv32 && iv16 <= tkey->rx_iv16)) {
420 if (net_ratelimit()) {
421 printk(KERN_DEBUG "TKIP: replay detected: STA=" MAC_FMT
422 " previous TSC %08x%04x received TSC "
423 "%08x%04x\n", MAC_ARG(hdr->addr2),
424 tkey->rx_iv32, tkey->rx_iv16, iv32, iv16);
425 }
426 tkey->dot11RSNAStatsTKIPReplays++;
427 return -4;
428 }
429
430 if (iv32 != tkey->rx_iv32 || !tkey->rx_phase1_done) {
431 tkip_mixing_phase1(tkey->rx_ttak, tkey->key, hdr->addr2, iv32);
432 tkey->rx_phase1_done = 1;
433 }
434 tkip_mixing_phase2(rc4key, tkey->key, tkey->rx_ttak, iv16);
435
436 plen = skb->len - hdr_len - 12;
437
438 crypto_cipher_setkey(tkey->tfm_arc4, rc4key, 16);
439 sg.page = virt_to_page(pos);
440 sg.offset = offset_in_page(pos);
441 sg.length = plen + 4;
442 crypto_cipher_decrypt(tkey->tfm_arc4, &sg, &sg, plen + 4);
443
444 crc = ~crc32_le(~0, pos, plen);
445 icv[0] = crc;
446 icv[1] = crc >> 8;
447 icv[2] = crc >> 16;
448 icv[3] = crc >> 24;
449 if (memcmp(icv, pos + plen, 4) != 0) {
450 if (iv32 != tkey->rx_iv32) {
451 /* Previously cached Phase1 result was already lost, so
452 * it needs to be recalculated for the next packet. */
453 tkey->rx_phase1_done = 0;
454 }
455 if (net_ratelimit()) {
456 printk(KERN_DEBUG "TKIP: ICV error detected: STA="
457 MAC_FMT "\n", MAC_ARG(hdr->addr2));
458 }
459 tkey->dot11RSNAStatsTKIPICVErrors++;
460 return -5;
461 }
462
463 /* Update real counters only after Michael MIC verification has
464 * completed */
465 tkey->rx_iv32_new = iv32;
466 tkey->rx_iv16_new = iv16;
467
468 /* Remove IV and ICV */
469 memmove(skb->data + 8, skb->data, hdr_len);
470 skb_pull(skb, 8);
471 skb_trim(skb, skb->len - 4);
472
473 return keyidx;
474}
475
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400476static int michael_mic(struct ieee80211_tkip_data *tkey, u8 * key, u8 * hdr,
477 u8 * data, size_t data_len, u8 * mic)
Jeff Garzikb4538722005-05-12 22:48:20 -0400478{
479 struct scatterlist sg[2];
480
481 if (tkey->tfm_michael == NULL) {
482 printk(KERN_WARNING "michael_mic: tfm_michael == NULL\n");
483 return -1;
484 }
485 sg[0].page = virt_to_page(hdr);
486 sg[0].offset = offset_in_page(hdr);
487 sg[0].length = 16;
488
489 sg[1].page = virt_to_page(data);
490 sg[1].offset = offset_in_page(data);
491 sg[1].length = data_len;
492
493 crypto_digest_init(tkey->tfm_michael);
494 crypto_digest_setkey(tkey->tfm_michael, key, 8);
495 crypto_digest_update(tkey->tfm_michael, sg, 2);
496 crypto_digest_final(tkey->tfm_michael, mic);
497
498 return 0;
499}
500
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400501static void michael_mic_hdr(struct sk_buff *skb, u8 * hdr)
Jeff Garzikb4538722005-05-12 22:48:20 -0400502{
James Ketrenosee34af32005-09-21 11:54:36 -0500503 struct ieee80211_hdr_4addr *hdr11;
Jeff Garzikb4538722005-05-12 22:48:20 -0400504
James Ketrenosee34af32005-09-21 11:54:36 -0500505 hdr11 = (struct ieee80211_hdr_4addr *)skb->data;
Jeff Garzikb4538722005-05-12 22:48:20 -0400506 switch (le16_to_cpu(hdr11->frame_ctl) &
507 (IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS)) {
508 case IEEE80211_FCTL_TODS:
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400509 memcpy(hdr, hdr11->addr3, ETH_ALEN); /* DA */
510 memcpy(hdr + ETH_ALEN, hdr11->addr2, ETH_ALEN); /* SA */
Jeff Garzikb4538722005-05-12 22:48:20 -0400511 break;
512 case IEEE80211_FCTL_FROMDS:
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400513 memcpy(hdr, hdr11->addr1, ETH_ALEN); /* DA */
514 memcpy(hdr + ETH_ALEN, hdr11->addr3, ETH_ALEN); /* SA */
Jeff Garzikb4538722005-05-12 22:48:20 -0400515 break;
516 case IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS:
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400517 memcpy(hdr, hdr11->addr3, ETH_ALEN); /* DA */
518 memcpy(hdr + ETH_ALEN, hdr11->addr4, ETH_ALEN); /* SA */
Jeff Garzikb4538722005-05-12 22:48:20 -0400519 break;
520 case 0:
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400521 memcpy(hdr, hdr11->addr1, ETH_ALEN); /* DA */
522 memcpy(hdr + ETH_ALEN, hdr11->addr2, ETH_ALEN); /* SA */
Jeff Garzikb4538722005-05-12 22:48:20 -0400523 break;
524 }
525
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400526 hdr[12] = 0; /* priority */
527 hdr[13] = hdr[14] = hdr[15] = 0; /* reserved */
Jeff Garzikb4538722005-05-12 22:48:20 -0400528}
529
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400530static int ieee80211_michael_mic_add(struct sk_buff *skb, int hdr_len,
531 void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -0400532{
533 struct ieee80211_tkip_data *tkey = priv;
534 u8 *pos;
535
536 if (skb_tailroom(skb) < 8 || skb->len < hdr_len) {
537 printk(KERN_DEBUG "Invalid packet for Michael MIC add "
538 "(tailroom=%d hdr_len=%d skb->len=%d)\n",
539 skb_tailroom(skb), hdr_len, skb->len);
540 return -1;
541 }
542
543 michael_mic_hdr(skb, tkey->tx_hdr);
544 pos = skb_put(skb, 8);
545 if (michael_mic(tkey, &tkey->key[16], tkey->tx_hdr,
546 skb->data + hdr_len, skb->len - 8 - hdr_len, pos))
547 return -1;
548
549 return 0;
550}
551
Jeff Garzikb4538722005-05-12 22:48:20 -0400552static void ieee80211_michael_mic_failure(struct net_device *dev,
James Ketrenosee34af32005-09-21 11:54:36 -0500553 struct ieee80211_hdr_4addr *hdr,
554 int keyidx)
Jeff Garzikb4538722005-05-12 22:48:20 -0400555{
556 union iwreq_data wrqu;
557 struct iw_michaelmicfailure ev;
558
559 /* TODO: needed parameters: count, keyid, key type, TSC */
560 memset(&ev, 0, sizeof(ev));
561 ev.flags = keyidx & IW_MICFAILURE_KEY_ID;
562 if (hdr->addr1[0] & 0x01)
563 ev.flags |= IW_MICFAILURE_GROUP;
564 else
565 ev.flags |= IW_MICFAILURE_PAIRWISE;
566 ev.src_addr.sa_family = ARPHRD_ETHER;
567 memcpy(ev.src_addr.sa_data, hdr->addr2, ETH_ALEN);
568 memset(&wrqu, 0, sizeof(wrqu));
569 wrqu.data.length = sizeof(ev);
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400570 wireless_send_event(dev, IWEVMICHAELMICFAILURE, &wrqu, (char *)&ev);
Jeff Garzikb4538722005-05-12 22:48:20 -0400571}
Jeff Garzikb4538722005-05-12 22:48:20 -0400572
573static int ieee80211_michael_mic_verify(struct sk_buff *skb, int keyidx,
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400574 int hdr_len, void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -0400575{
576 struct ieee80211_tkip_data *tkey = priv;
577 u8 mic[8];
578
579 if (!tkey->key_set)
580 return -1;
581
582 michael_mic_hdr(skb, tkey->rx_hdr);
583 if (michael_mic(tkey, &tkey->key[24], tkey->rx_hdr,
584 skb->data + hdr_len, skb->len - 8 - hdr_len, mic))
585 return -1;
586 if (memcmp(mic, skb->data + skb->len - 8, 8) != 0) {
James Ketrenosee34af32005-09-21 11:54:36 -0500587 struct ieee80211_hdr_4addr *hdr;
588 hdr = (struct ieee80211_hdr_4addr *)skb->data;
Jeff Garzikb4538722005-05-12 22:48:20 -0400589 printk(KERN_DEBUG "%s: Michael MIC verification failed for "
590 "MSDU from " MAC_FMT " keyidx=%d\n",
591 skb->dev ? skb->dev->name : "N/A", MAC_ARG(hdr->addr2),
592 keyidx);
593 if (skb->dev)
594 ieee80211_michael_mic_failure(skb->dev, hdr, keyidx);
595 tkey->dot11RSNAStatsTKIPLocalMICFailures++;
596 return -1;
597 }
598
599 /* Update TSC counters for RX now that the packet verification has
600 * completed. */
601 tkey->rx_iv32 = tkey->rx_iv32_new;
602 tkey->rx_iv16 = tkey->rx_iv16_new;
603
604 skb_trim(skb, skb->len - 8);
605
606 return 0;
607}
608
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400609static int ieee80211_tkip_set_key(void *key, int len, u8 * seq, void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -0400610{
611 struct ieee80211_tkip_data *tkey = priv;
612 int keyidx;
613 struct crypto_tfm *tfm = tkey->tfm_michael;
614 struct crypto_tfm *tfm2 = tkey->tfm_arc4;
615
616 keyidx = tkey->key_idx;
617 memset(tkey, 0, sizeof(*tkey));
618 tkey->key_idx = keyidx;
619 tkey->tfm_michael = tfm;
620 tkey->tfm_arc4 = tfm2;
621 if (len == TKIP_KEY_LEN) {
622 memcpy(tkey->key, key, TKIP_KEY_LEN);
623 tkey->key_set = 1;
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400624 tkey->tx_iv16 = 1; /* TSC is initialized to 1 */
Jeff Garzikb4538722005-05-12 22:48:20 -0400625 if (seq) {
626 tkey->rx_iv32 = (seq[5] << 24) | (seq[4] << 16) |
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400627 (seq[3] << 8) | seq[2];
Jeff Garzikb4538722005-05-12 22:48:20 -0400628 tkey->rx_iv16 = (seq[1] << 8) | seq[0];
629 }
630 } else if (len == 0)
631 tkey->key_set = 0;
632 else
633 return -1;
634
635 return 0;
636}
637
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400638static int ieee80211_tkip_get_key(void *key, int len, u8 * seq, void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -0400639{
640 struct ieee80211_tkip_data *tkey = priv;
641
642 if (len < TKIP_KEY_LEN)
643 return -1;
644
645 if (!tkey->key_set)
646 return 0;
647 memcpy(key, tkey->key, TKIP_KEY_LEN);
648
649 if (seq) {
650 /* Return the sequence number of the last transmitted frame. */
651 u16 iv16 = tkey->tx_iv16;
652 u32 iv32 = tkey->tx_iv32;
653 if (iv16 == 0)
654 iv32--;
655 iv16--;
656 seq[0] = tkey->tx_iv16;
657 seq[1] = tkey->tx_iv16 >> 8;
658 seq[2] = tkey->tx_iv32;
659 seq[3] = tkey->tx_iv32 >> 8;
660 seq[4] = tkey->tx_iv32 >> 16;
661 seq[5] = tkey->tx_iv32 >> 24;
662 }
663
664 return TKIP_KEY_LEN;
665}
666
Jeff Garzik0edd5b42005-09-07 00:48:31 -0400667static char *ieee80211_tkip_print_stats(char *p, void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -0400668{
669 struct ieee80211_tkip_data *tkip = priv;
670 p += sprintf(p, "key[%d] alg=TKIP key_set=%d "
671 "tx_pn=%02x%02x%02x%02x%02x%02x "
672 "rx_pn=%02x%02x%02x%02x%02x%02x "
673 "replays=%d icv_errors=%d local_mic_failures=%d\n",
674 tkip->key_idx, tkip->key_set,
675 (tkip->tx_iv32 >> 24) & 0xff,
676 (tkip->tx_iv32 >> 16) & 0xff,
677 (tkip->tx_iv32 >> 8) & 0xff,
678 tkip->tx_iv32 & 0xff,
679 (tkip->tx_iv16 >> 8) & 0xff,
680 tkip->tx_iv16 & 0xff,
681 (tkip->rx_iv32 >> 24) & 0xff,
682 (tkip->rx_iv32 >> 16) & 0xff,
683 (tkip->rx_iv32 >> 8) & 0xff,
684 tkip->rx_iv32 & 0xff,
685 (tkip->rx_iv16 >> 8) & 0xff,
686 tkip->rx_iv16 & 0xff,
687 tkip->dot11RSNAStatsTKIPReplays,
688 tkip->dot11RSNAStatsTKIPICVErrors,
689 tkip->dot11RSNAStatsTKIPLocalMICFailures);
690 return p;
691}
692
Jeff Garzikb4538722005-05-12 22:48:20 -0400693static struct ieee80211_crypto_ops ieee80211_crypt_tkip = {
James Ketrenos74079fd2005-09-13 17:35:21 -0500694 .name = "TKIP",
695 .init = ieee80211_tkip_init,
696 .deinit = ieee80211_tkip_deinit,
697 .encrypt_mpdu = ieee80211_tkip_encrypt,
698 .decrypt_mpdu = ieee80211_tkip_decrypt,
699 .encrypt_msdu = ieee80211_michael_mic_add,
700 .decrypt_msdu = ieee80211_michael_mic_verify,
701 .set_key = ieee80211_tkip_set_key,
702 .get_key = ieee80211_tkip_get_key,
703 .print_stats = ieee80211_tkip_print_stats,
James Ketrenos1264fc02005-09-21 11:54:53 -0500704 .extra_mpdu_prefix_len = 4 + 4, /* IV + ExtIV */
705 .extra_mpdu_postfix_len = 4, /* ICV */
706 .extra_msdu_postfix_len = 8, /* MIC */
James Ketrenos6eb6edf2005-09-22 10:34:15 +0000707 .get_flags = ieee80211_tkip_get_flags,
708 .set_flags = ieee80211_tkip_set_flags,
James Ketrenos74079fd2005-09-13 17:35:21 -0500709 .owner = THIS_MODULE,
Jeff Garzikb4538722005-05-12 22:48:20 -0400710};
711
Jeff Garzikb4538722005-05-12 22:48:20 -0400712static int __init ieee80211_crypto_tkip_init(void)
713{
714 return ieee80211_register_crypto_ops(&ieee80211_crypt_tkip);
715}
716
Jeff Garzikb4538722005-05-12 22:48:20 -0400717static void __exit ieee80211_crypto_tkip_exit(void)
718{
719 ieee80211_unregister_crypto_ops(&ieee80211_crypt_tkip);
720}
721
Jeff Garzikb4538722005-05-12 22:48:20 -0400722module_init(ieee80211_crypto_tkip_init);
723module_exit(ieee80211_crypto_tkip_exit);