| /* |
| * Copyright (c) 2017-2018 The Linux Foundation. All rights reserved. |
| * |
| * Permission to use, copy, modify, and/or distribute this software for |
| * any purpose with or without fee is hereby granted, provided that the |
| * above copyright notice and this permission notice appear in all |
| * copies. |
| * |
| * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL |
| * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED |
| * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE |
| * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL |
| * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR |
| * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER |
| * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR |
| * PERFORMANCE OF THIS SOFTWARE. |
| */ |
| |
| /** |
| * DOC: Public API intialization of crypto service with object manager |
| */ |
| #include <qdf_types.h> |
| #include <wlan_cmn.h> |
| #include <wlan_objmgr_cmn.h> |
| #include <wlan_objmgr_global_obj.h> |
| #include <wlan_objmgr_psoc_obj.h> |
| #include <wlan_objmgr_pdev_obj.h> |
| #include <wlan_objmgr_vdev_obj.h> |
| #include <wlan_objmgr_peer_obj.h> |
| |
| #include "wlan_crypto_global_def.h" |
| #include "wlan_crypto_def_i.h" |
| #include "wlan_crypto_main_i.h" |
| #include "wlan_crypto_obj_mgr_i.h" |
| |
| |
| static QDF_STATUS tkip_enmic(struct wlan_crypto_key *key, qdf_nbuf_t wbuf, |
| uint8_t encapdone, uint8_t hdrlen); |
| static QDF_STATUS tkip_demic(struct wlan_crypto_key *key, qdf_nbuf_t wbuf, |
| uint8_t tid, uint8_t hdrlen); |
| |
| |
| static QDF_STATUS tkip_setkey(struct wlan_crypto_key *key) |
| { |
| return QDF_STATUS_SUCCESS; |
| } |
| |
| static QDF_STATUS tkip_encap(struct wlan_crypto_key *key, |
| qdf_nbuf_t wbuf, |
| uint8_t encapdone, |
| uint8_t hdrlen){ |
| uint8_t *ivp; |
| struct wlan_crypto_cipher *cipher_table; |
| |
| cipher_table = key->cipher_table; |
| |
| /* |
| * Copy down 802.11 header and add the IV, KeyID, and ExtIV. |
| */ |
| if (encapdone) { |
| ivp = (uint8_t *)qdf_nbuf_data(wbuf); |
| } else { |
| uint8_t ivmictrailer_len = cipher_table->header + |
| cipher_table->miclen + |
| cipher_table->trailer; |
| ivp = qdf_nbuf_push_head(wbuf, ivmictrailer_len); |
| qdf_mem_move(ivp, (ivp + ivmictrailer_len), hdrlen); |
| qdf_mem_move((ivp + hdrlen + cipher_table->header), |
| (ivp + ivmictrailer_len + hdrlen), |
| (qdf_nbuf_len(wbuf) - hdrlen - ivmictrailer_len)); |
| } |
| |
| ivp += hdrlen; |
| key->keytsc++; /* XXX wrap at 48 bits */ |
| |
| ivp[0] = key->keytsc >> 8; /* TSC1 */ |
| ivp[1] = (ivp[0] | 0x20) & 0x7f; /* WEP seed */ |
| ivp[2] = key->keytsc >> 0; /* TSC0*/ |
| ivp[3] = (key->keyix << 6) | WLAN_CRYPTO_EXT_IV_BIT; /* KeyID | ExtID */ |
| ivp[4] = key->keytsc >> 16; /* PN2 */ |
| ivp[5] = key->keytsc >> 24; /* PN3 */ |
| ivp[6] = key->keytsc >> 32; /* PN4 */ |
| ivp[7] = key->keytsc >> 40; /* PN5 */ |
| |
| /* |
| * Finally, do software encrypt if neeed. |
| */ |
| if (key->flags & WLAN_CRYPTO_KEY_SWENCRYPT) { |
| qdf_nbuf_realloc_tailroom(wbuf, cipher_table->miclen); |
| if (qdf_nbuf_realloc_tailroom(wbuf, cipher_table->miclen) |
| && (!wlan_crypto_tkip_encrypt(key->keyval, |
| qdf_nbuf_data(wbuf), qdf_nbuf_len(wbuf), |
| hdrlen))){ |
| return QDF_STATUS_CRYPTO_ENCRYPT_FAILED; |
| } |
| } |
| |
| return QDF_STATUS_SUCCESS; |
| } |
| |
| static QDF_STATUS tkip_decap(struct wlan_crypto_key *key, |
| qdf_nbuf_t wbuf, |
| uint8_t tid, |
| uint8_t hdrlen){ |
| struct ieee80211_hdr *hdr; |
| uint8_t *ivp, *origHdr; |
| uint64_t pn; |
| struct wlan_crypto_cipher *cipher_table; |
| |
| cipher_table = key->cipher_table; |
| |
| /* |
| * Header should have extended IV and sequence number; |
| * verify the former and validate the latter. |
| */ |
| origHdr = (uint8_t *)qdf_nbuf_data(wbuf); |
| hdr = (struct ieee80211_hdr *)origHdr; |
| |
| ivp = origHdr + hdrlen; |
| |
| if ((ivp[WLAN_CRYPTO_IV_LEN] & WLAN_CRYPTO_EXT_IV_BIT) == 0) |
| return 0; |
| |
| tid = wlan_get_tid(qdf_nbuf_data(wbuf)); |
| |
| pn = READ_6(ivp[0], ivp[1], ivp[4], ivp[5], ivp[6], ivp[7]); |
| |
| if (pn <= key->keyrsc[tid]) { |
| /* Replay violation.*/ |
| return QDF_STATUS_CRYPTO_DECRYPT_FAILED; |
| } |
| |
| if ((key->flags & WLAN_CRYPTO_KEY_SWDECRYPT)) { |
| if (!wlan_crypto_tkip_decrypt(key->keyval, |
| (struct ieee80211_hdr *)origHdr, |
| (origHdr + hdrlen), |
| (qdf_nbuf_len(wbuf) - hdrlen))) |
| return QDF_STATUS_CRYPTO_DECRYPT_FAILED; |
| } |
| |
| /* |
| * Copy up 802.11 header and strip crypto bits. |
| */ |
| qdf_mem_move(origHdr + cipher_table->header, origHdr, hdrlen); |
| |
| qdf_nbuf_pull_head(wbuf, cipher_table->header); |
| qdf_nbuf_trim_tail(wbuf, cipher_table->trailer); |
| |
| return QDF_STATUS_SUCCESS; |
| } |
| static QDF_STATUS tkip_enmic(struct wlan_crypto_key *key, |
| qdf_nbuf_t wbuf, |
| uint8_t encapdone, |
| uint8_t hdrlen){ |
| return QDF_STATUS_SUCCESS; |
| } |
| static QDF_STATUS tkip_demic(struct wlan_crypto_key *key, |
| qdf_nbuf_t wbuf, |
| uint8_t tid, |
| uint8_t hdrlen){ |
| struct wlan_crypto_cipher *cipher_table; |
| |
| cipher_table = key->cipher_table; |
| qdf_nbuf_trim_tail(wbuf, cipher_table->miclen); |
| return QDF_STATUS_SUCCESS; |
| } |
| |
| const struct wlan_crypto_cipher tkip_cipher_table = { |
| "TKIP", |
| WLAN_CRYPTO_CIPHER_TKIP, |
| WLAN_CRYPTO_IV_LEN + WLAN_CRYPTO_KEYID_LEN + WLAN_CRYPTO_EXT_IV_LEN, |
| WLAN_CRYPTO_CRC_LEN, |
| WLAN_CRYPTO_MIC_LEN, |
| 256, |
| tkip_setkey, |
| tkip_encap, |
| tkip_decap, |
| tkip_enmic, |
| tkip_demic, |
| }; |
| |
| const struct wlan_crypto_cipher *tkip_register(void) |
| { |
| return &tkip_cipher_table; |
| } |