wpa.c 15.1 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14
/*
 * Copyright 2002-2004, Instant802 Networks, Inc.
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
 */

#include <linux/netdevice.h>
#include <linux/types.h>
#include <linux/slab.h>
#include <linux/skbuff.h>
#include <linux/compiler.h>
#include <net/mac80211.h>
J
Johannes Berg 已提交
15

16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72
#include "ieee80211_i.h"
#include "michael.h"
#include "tkip.h"
#include "aes_ccm.h"
#include "wpa.h"

static int ieee80211_get_hdr_info(const struct sk_buff *skb, u8 **sa, u8 **da,
				  u8 *qos_tid, u8 **data, size_t *data_len)
{
	struct ieee80211_hdr *hdr;
	size_t hdrlen;
	u16 fc;
	int a4_included;
	u8 *pos;

	hdr = (struct ieee80211_hdr *) skb->data;
	fc = le16_to_cpu(hdr->frame_control);

	hdrlen = 24;
	if ((fc & (IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS)) ==
	    (IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS)) {
		hdrlen += ETH_ALEN;
		*sa = hdr->addr4;
		*da = hdr->addr3;
	} else if (fc & IEEE80211_FCTL_FROMDS) {
		*sa = hdr->addr3;
		*da = hdr->addr1;
	} else if (fc & IEEE80211_FCTL_TODS) {
		*sa = hdr->addr2;
		*da = hdr->addr3;
	} else {
		*sa = hdr->addr2;
		*da = hdr->addr1;
	}

	if (fc & 0x80)
		hdrlen += 2;

	*data = skb->data + hdrlen;
	*data_len = skb->len - hdrlen;

	a4_included = (fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
		(IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS);
	if ((fc & IEEE80211_FCTL_FTYPE) == IEEE80211_FTYPE_DATA &&
	    fc & IEEE80211_STYPE_QOS_DATA) {
		pos = (u8 *) &hdr->addr4;
		if (a4_included)
			pos += 6;
		*qos_tid = pos[0] & 0x0f;
		*qos_tid |= 0x80; /* qos_included flag */
	} else
		*qos_tid = 0;

	return skb->len < hdrlen ? -1 : 0;
}


73
ieee80211_tx_result
74
ieee80211_tx_h_michael_mic_add(struct ieee80211_tx_data *tx)
75 76 77 78 79 80 81 82 83 84
{
	u8 *data, *sa, *da, *key, *mic, qos_tid;
	size_t data_len;
	u16 fc;
	struct sk_buff *skb = tx->skb;
	int authenticator;
	int wpa_test = 0;

	fc = tx->fc;

85
	if (!tx->key || tx->key->conf.alg != ALG_TKIP || skb->len < 24 ||
86
	    !WLAN_FC_DATA_PRESENT(fc))
87
		return TX_CONTINUE;
88 89

	if (ieee80211_get_hdr_info(skb, &sa, &da, &qos_tid, &data, &data_len))
90
		return TX_DROP;
91

J
Johannes Berg 已提交
92
	if ((tx->key->flags & KEY_FLAG_UPLOADED_TO_HARDWARE) &&
93
	    !(tx->flags & IEEE80211_TX_FRAGMENTED) &&
94
	    !(tx->key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_MMIC) &&
95 96 97
	    !wpa_test) {
		/* hwaccel - with no need for preallocated room for Michael MIC
		 */
98
		return TX_CONTINUE;
99 100 101 102 103 104 105 106 107
	}

	if (skb_tailroom(skb) < MICHAEL_MIC_LEN) {
		I802_DEBUG_INC(tx->local->tx_expand_skb_head);
		if (unlikely(pskb_expand_head(skb, TKIP_IV_LEN,
					      MICHAEL_MIC_LEN + TKIP_ICV_LEN,
					      GFP_ATOMIC))) {
			printk(KERN_DEBUG "%s: failed to allocate more memory "
			       "for Michael MIC\n", tx->dev->name);
108
			return TX_DROP;
109 110 111 112 113 114 115 116
		}
	}

#if 0
	authenticator = fc & IEEE80211_FCTL_FROMDS; /* FIX */
#else
	authenticator = 1;
#endif
117 118
	key = &tx->key->conf.key[authenticator ? ALG_TKIP_TEMP_AUTH_TX_MIC_KEY :
				 ALG_TKIP_TEMP_AUTH_RX_MIC_KEY];
119 120 121
	mic = skb_put(skb, MICHAEL_MIC_LEN);
	michael_mic(key, da, sa, qos_tid & 0x0f, data, data_len, mic);

122
	return TX_CONTINUE;
123 124 125
}


126
ieee80211_rx_result
127
ieee80211_rx_h_michael_mic_verify(struct ieee80211_rx_data *rx)
128 129 130 131 132 133 134
{
	u8 *data, *sa, *da, *key = NULL, qos_tid;
	size_t data_len;
	u16 fc;
	u8 mic[MICHAEL_MIC_LEN];
	struct sk_buff *skb = rx->skb;
	int authenticator = 1, wpa_test = 0;
135
	DECLARE_MAC_BUF(mac);
136 137 138

	fc = rx->fc;

139 140 141
	/*
	 * No way to verify the MIC if the hardware stripped it
	 */
142
	if (rx->status->flag & RX_FLAG_MMIC_STRIPPED)
143
		return RX_CONTINUE;
144

145
	if (!rx->key || rx->key->conf.alg != ALG_TKIP ||
146
	    !(rx->fc & IEEE80211_FCTL_PROTECTED) || !WLAN_FC_DATA_PRESENT(fc))
147
		return RX_CONTINUE;
148 149 150

	if (ieee80211_get_hdr_info(skb, &sa, &da, &qos_tid, &data, &data_len)
	    || data_len < MICHAEL_MIC_LEN)
J
Johannes Berg 已提交
151
		return RX_DROP_UNUSABLE;
152 153 154 155 156 157 158 159

	data_len -= MICHAEL_MIC_LEN;

#if 0
	authenticator = fc & IEEE80211_FCTL_TODS; /* FIX */
#else
	authenticator = 1;
#endif
160 161
	key = &rx->key->conf.key[authenticator ? ALG_TKIP_TEMP_AUTH_RX_MIC_KEY :
				 ALG_TKIP_TEMP_AUTH_TX_MIC_KEY];
162 163
	michael_mic(key, da, sa, qos_tid & 0x0f, data, data_len, mic);
	if (memcmp(mic, data + data_len, MICHAEL_MIC_LEN) != 0 || wpa_test) {
164
		if (!(rx->flags & IEEE80211_RX_RA_MATCH))
J
Johannes Berg 已提交
165
			return RX_DROP_UNUSABLE;
166 167

		printk(KERN_DEBUG "%s: invalid Michael MIC in data frame from "
168
		       "%s\n", rx->dev->name, print_mac(mac, sa));
169

170
		mac80211_ev_michael_mic_failure(rx->dev, rx->key->conf.keyidx,
J
Johannes Berg 已提交
171
						(void *) skb->data);
J
Johannes Berg 已提交
172
		return RX_DROP_UNUSABLE;
173 174 175 176 177
	}

	/* remove Michael MIC from payload */
	skb_trim(skb, skb->len - MICHAEL_MIC_LEN);

178
	/* update IV in key information to be able to detect replays */
179 180
	rx->key->u.tkip.iv32_rx[rx->queue] = rx->tkip_iv32;
	rx->key->u.tkip.iv16_rx[rx->queue] = rx->tkip_iv16;
181

182
	return RX_CONTINUE;
183 184 185
}


186
static int tkip_encrypt_skb(struct ieee80211_tx_data *tx,
187 188 189 190 191 192 193 194 195 196 197 198
			    struct sk_buff *skb, int test)
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;
	struct ieee80211_key *key = tx->key;
	int hdrlen, len, tailneed;
	u16 fc;
	u8 *pos;

	fc = le16_to_cpu(hdr->frame_control);
	hdrlen = ieee80211_get_hdrlen(fc);
	len = skb->len - hdrlen;

J
Johannes Berg 已提交
199
	if (tx->key->flags & KEY_FLAG_UPLOADED_TO_HARDWARE)
200
		tailneed = 0;
J
Johannes Berg 已提交
201 202
	else
		tailneed = TKIP_ICV_LEN;
203

204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220
	if ((skb_headroom(skb) < TKIP_IV_LEN ||
	     skb_tailroom(skb) < tailneed)) {
		I802_DEBUG_INC(tx->local->tx_expand_skb_head);
		if (unlikely(pskb_expand_head(skb, TKIP_IV_LEN, tailneed,
					      GFP_ATOMIC)))
			return -1;
	}

	pos = skb_push(skb, TKIP_IV_LEN);
	memmove(pos, pos + TKIP_IV_LEN, hdrlen);
	pos += hdrlen;

	/* Increase IV for the frame */
	key->u.tkip.iv16++;
	if (key->u.tkip.iv16 == 0)
		key->u.tkip.iv32++;

J
Johannes Berg 已提交
221
	if (tx->key->flags & KEY_FLAG_UPLOADED_TO_HARDWARE) {
222 223 224 225 226 227 228 229 230
		hdr = (struct ieee80211_hdr *)skb->data;

		/* hwaccel - with preallocated room for IV */
		ieee80211_tkip_add_iv(pos, key,
				      (u8) (key->u.tkip.iv16 >> 8),
				      (u8) (((key->u.tkip.iv16 >> 8) | 0x20) &
					    0x7f),
				      (u8) key->u.tkip.iv16);

231
		tx->control->key_idx = tx->key->conf.hw_key_idx;
232 233 234 235 236 237 238 239 240 241 242 243 244
		return 0;
	}

	/* Add room for ICV */
	skb_put(skb, TKIP_ICV_LEN);

	hdr = (struct ieee80211_hdr *) skb->data;
	ieee80211_tkip_encrypt_data(tx->local->wep_tx_tfm,
				    key, pos, len, hdr->addr2);
	return 0;
}


245
ieee80211_tx_result
246
ieee80211_crypto_tkip_encrypt(struct ieee80211_tx_data *tx)
247 248 249 250
{
	struct sk_buff *skb = tx->skb;
	int wpa_test = 0, test = 0;

251 252 253
	tx->control->icv_len = TKIP_ICV_LEN;
	tx->control->iv_len = TKIP_IV_LEN;
	ieee80211_tx_set_protected(tx);
254

J
Johannes Berg 已提交
255
	if ((tx->key->flags & KEY_FLAG_UPLOADED_TO_HARDWARE) &&
256
	    !(tx->key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_IV) &&
257 258
	    !wpa_test) {
		/* hwaccel - with no need for preallocated room for IV/ICV */
259
		tx->control->key_idx = tx->key->conf.hw_key_idx;
260
		return TX_CONTINUE;
261 262 263
	}

	if (tkip_encrypt_skb(tx, skb, test) < 0)
264
		return TX_DROP;
265

266
	if (tx->extra_frag) {
267
		int i;
268 269
		for (i = 0; i < tx->num_extra_frag; i++) {
			if (tkip_encrypt_skb(tx, tx->extra_frag[i], test)
270
			    < 0)
271
				return TX_DROP;
272 273 274
		}
	}

275
	return TX_CONTINUE;
276 277 278
}


279
ieee80211_rx_result
280
ieee80211_crypto_tkip_decrypt(struct ieee80211_rx_data *rx)
281 282 283 284 285 286
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) rx->skb->data;
	u16 fc;
	int hdrlen, res, hwaccel = 0, wpa_test = 0;
	struct ieee80211_key *key = rx->key;
	struct sk_buff *skb = rx->skb;
287
	DECLARE_MAC_BUF(mac);
288 289 290 291

	fc = le16_to_cpu(hdr->frame_control);
	hdrlen = ieee80211_get_hdrlen(fc);

292
	if ((rx->fc & IEEE80211_FCTL_FTYPE) != IEEE80211_FTYPE_DATA)
293
		return RX_CONTINUE;
294 295

	if (!rx->sta || skb->len - hdrlen < 12)
J
Johannes Berg 已提交
296
		return RX_DROP_UNUSABLE;
297

298 299
	if (rx->status->flag & RX_FLAG_DECRYPTED) {
		if (rx->status->flag & RX_FLAG_IV_STRIPPED) {
300 301 302 303 304
			/*
			 * Hardware took care of all processing, including
			 * replay protection, and stripped the ICV/IV so
			 * we cannot do any checks here.
			 */
305
			return RX_CONTINUE;
306 307 308 309 310 311 312 313 314
		}

		/* let TKIP code verify IV, but skip decryption */
		hwaccel = 1;
	}

	res = ieee80211_tkip_decrypt_data(rx->local->wep_rx_tfm,
					  key, skb->data + hdrlen,
					  skb->len - hdrlen, rx->sta->addr,
315 316 317
					  hwaccel, rx->queue,
					  &rx->tkip_iv32,
					  &rx->tkip_iv16);
318
	if (res != TKIP_DECRYPT_OK || wpa_test) {
319 320 321 322 323 324
#ifdef CONFIG_MAC80211_DEBUG
		if (net_ratelimit())
			printk(KERN_DEBUG "%s: TKIP decrypt failed for RX "
			       "frame from %s (res=%d)\n", rx->dev->name,
			       print_mac(mac, rx->sta->addr), res);
#endif /* CONFIG_MAC80211_DEBUG */
J
Johannes Berg 已提交
325
		return RX_DROP_UNUSABLE;
326 327 328 329 330 331 332 333 334
	}

	/* Trim ICV */
	skb_trim(skb, skb->len - TKIP_ICV_LEN);

	/* Remove IV */
	memmove(skb->data + TKIP_IV_LEN, skb->data, hdrlen);
	skb_pull(skb, TKIP_IV_LEN);

335
	return RX_CONTINUE;
336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431
}


static void ccmp_special_blocks(struct sk_buff *skb, u8 *pn, u8 *b_0, u8 *aad,
				int encrypted)
{
	u16 fc;
	int a4_included, qos_included;
	u8 qos_tid, *fc_pos, *data, *sa, *da;
	int len_a;
	size_t data_len;
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;

	fc_pos = (u8 *) &hdr->frame_control;
	fc = fc_pos[0] ^ (fc_pos[1] << 8);
	a4_included = (fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
		(IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS);

	ieee80211_get_hdr_info(skb, &sa, &da, &qos_tid, &data, &data_len);
	data_len -= CCMP_HDR_LEN + (encrypted ? CCMP_MIC_LEN : 0);
	if (qos_tid & 0x80) {
		qos_included = 1;
		qos_tid &= 0x0f;
	} else
		qos_included = 0;
	/* First block, b_0 */

	b_0[0] = 0x59; /* flags: Adata: 1, M: 011, L: 001 */
	/* Nonce: QoS Priority | A2 | PN */
	b_0[1] = qos_tid;
	memcpy(&b_0[2], hdr->addr2, 6);
	memcpy(&b_0[8], pn, CCMP_PN_LEN);
	/* l(m) */
	b_0[14] = (data_len >> 8) & 0xff;
	b_0[15] = data_len & 0xff;


	/* AAD (extra authenticate-only data) / masked 802.11 header
	 * FC | A1 | A2 | A3 | SC | [A4] | [QC] */

	len_a = a4_included ? 28 : 22;
	if (qos_included)
		len_a += 2;

	aad[0] = 0; /* (len_a >> 8) & 0xff; */
	aad[1] = len_a & 0xff;
	/* Mask FC: zero subtype b4 b5 b6 */
	aad[2] = fc_pos[0] & ~(BIT(4) | BIT(5) | BIT(6));
	/* Retry, PwrMgt, MoreData; set Protected */
	aad[3] = (fc_pos[1] & ~(BIT(3) | BIT(4) | BIT(5))) | BIT(6);
	memcpy(&aad[4], &hdr->addr1, 18);

	/* Mask Seq#, leave Frag# */
	aad[22] = *((u8 *) &hdr->seq_ctrl) & 0x0f;
	aad[23] = 0;
	if (a4_included) {
		memcpy(&aad[24], hdr->addr4, 6);
		aad[30] = 0;
		aad[31] = 0;
	} else
		memset(&aad[24], 0, 8);
	if (qos_included) {
		u8 *dpos = &aad[a4_included ? 30 : 24];

		/* Mask QoS Control field */
		dpos[0] = qos_tid;
		dpos[1] = 0;
	}
}


static inline void ccmp_pn2hdr(u8 *hdr, u8 *pn, int key_id)
{
	hdr[0] = pn[5];
	hdr[1] = pn[4];
	hdr[2] = 0;
	hdr[3] = 0x20 | (key_id << 6);
	hdr[4] = pn[3];
	hdr[5] = pn[2];
	hdr[6] = pn[1];
	hdr[7] = pn[0];
}


static inline int ccmp_hdr2pn(u8 *pn, u8 *hdr)
{
	pn[0] = hdr[7];
	pn[1] = hdr[6];
	pn[2] = hdr[5];
	pn[3] = hdr[4];
	pn[4] = hdr[1];
	pn[5] = hdr[0];
	return (hdr[3] >> 6) & 0x03;
}


432
static int ccmp_encrypt_skb(struct ieee80211_tx_data *tx,
433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449
			    struct sk_buff *skb, int test)
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;
	struct ieee80211_key *key = tx->key;
	int hdrlen, len, tailneed;
	u16 fc;
	u8 *pos, *pn, *b_0, *aad, *scratch;
	int i;

	scratch = key->u.ccmp.tx_crypto_buf;
	b_0 = scratch + 3 * AES_BLOCK_LEN;
	aad = scratch + 4 * AES_BLOCK_LEN;

	fc = le16_to_cpu(hdr->frame_control);
	hdrlen = ieee80211_get_hdrlen(fc);
	len = skb->len - hdrlen;

J
Johannes Berg 已提交
450
	if (key->flags & KEY_FLAG_UPLOADED_TO_HARDWARE)
451
		tailneed = 0;
J
Johannes Berg 已提交
452 453
	else
		tailneed = CCMP_MIC_LEN;
454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476

	if ((skb_headroom(skb) < CCMP_HDR_LEN ||
	     skb_tailroom(skb) < tailneed)) {
		I802_DEBUG_INC(tx->local->tx_expand_skb_head);
		if (unlikely(pskb_expand_head(skb, CCMP_HDR_LEN, tailneed,
					      GFP_ATOMIC)))
			return -1;
	}

	pos = skb_push(skb, CCMP_HDR_LEN);
	memmove(pos, pos + CCMP_HDR_LEN, hdrlen);
	hdr = (struct ieee80211_hdr *) pos;
	pos += hdrlen;

	/* PN = PN + 1 */
	pn = key->u.ccmp.tx_pn;

	for (i = CCMP_PN_LEN - 1; i >= 0; i--) {
		pn[i]++;
		if (pn[i])
			break;
	}

477
	ccmp_pn2hdr(pos, pn, key->conf.keyidx);
478

J
Johannes Berg 已提交
479
	if (key->flags & KEY_FLAG_UPLOADED_TO_HARDWARE) {
480
		/* hwaccel - with preallocated room for CCMP header */
481
		tx->control->key_idx = key->conf.hw_key_idx;
482 483 484 485 486 487 488 489 490 491 492 493
		return 0;
	}

	pos += CCMP_HDR_LEN;
	ccmp_special_blocks(skb, pn, b_0, aad, 0);
	ieee80211_aes_ccm_encrypt(key->u.ccmp.tfm, scratch, b_0, aad, pos, len,
				  pos, skb_put(skb, CCMP_MIC_LEN));

	return 0;
}


494
ieee80211_tx_result
495
ieee80211_crypto_ccmp_encrypt(struct ieee80211_tx_data *tx)
496 497 498 499
{
	struct sk_buff *skb = tx->skb;
	int test = 0;

500 501 502
	tx->control->icv_len = CCMP_MIC_LEN;
	tx->control->iv_len = CCMP_HDR_LEN;
	ieee80211_tx_set_protected(tx);
503

J
Johannes Berg 已提交
504
	if ((tx->key->flags & KEY_FLAG_UPLOADED_TO_HARDWARE) &&
505
	    !(tx->key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_IV)) {
506 507
		/* hwaccel - with no need for preallocated room for CCMP "
		 * header or MIC fields */
508
		tx->control->key_idx = tx->key->conf.hw_key_idx;
509
		return TX_CONTINUE;
510 511 512
	}

	if (ccmp_encrypt_skb(tx, skb, test) < 0)
513
		return TX_DROP;
514

515
	if (tx->extra_frag) {
516
		int i;
517 518
		for (i = 0; i < tx->num_extra_frag; i++) {
			if (ccmp_encrypt_skb(tx, tx->extra_frag[i], test)
519
			    < 0)
520
				return TX_DROP;
521 522 523
		}
	}

524
	return TX_CONTINUE;
525 526 527
}


528
ieee80211_rx_result
529
ieee80211_crypto_ccmp_decrypt(struct ieee80211_rx_data *rx)
530 531 532 533 534 535 536 537
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) rx->skb->data;
	u16 fc;
	int hdrlen;
	struct ieee80211_key *key = rx->key;
	struct sk_buff *skb = rx->skb;
	u8 pn[CCMP_PN_LEN];
	int data_len;
538
	DECLARE_MAC_BUF(mac);
539 540 541 542

	fc = le16_to_cpu(hdr->frame_control);
	hdrlen = ieee80211_get_hdrlen(fc);

543
	if ((rx->fc & IEEE80211_FCTL_FTYPE) != IEEE80211_FTYPE_DATA)
544
		return RX_CONTINUE;
545 546 547

	data_len = skb->len - hdrlen - CCMP_HDR_LEN - CCMP_MIC_LEN;
	if (!rx->sta || data_len < 0)
J
Johannes Berg 已提交
548
		return RX_DROP_UNUSABLE;
549

550 551
	if ((rx->status->flag & RX_FLAG_DECRYPTED) &&
	    (rx->status->flag & RX_FLAG_IV_STRIPPED))
552
		return RX_CONTINUE;
553 554 555

	(void) ccmp_hdr2pn(pn, skb->data + hdrlen);

556
	if (memcmp(pn, key->u.ccmp.rx_pn[rx->queue], CCMP_PN_LEN) <= 0) {
557
#ifdef CONFIG_MAC80211_DEBUG
558
		u8 *ppn = key->u.ccmp.rx_pn[rx->queue];
559

560
		printk(KERN_DEBUG "%s: CCMP replay detected for RX frame from "
561
		       "%s (RX PN %02x%02x%02x%02x%02x%02x <= prev. PN "
562
		       "%02x%02x%02x%02x%02x%02x)\n", rx->dev->name,
563
		       print_mac(mac, rx->sta->addr),
564 565 566 567
		       pn[0], pn[1], pn[2], pn[3], pn[4], pn[5],
		       ppn[0], ppn[1], ppn[2], ppn[3], ppn[4], ppn[5]);
#endif /* CONFIG_MAC80211_DEBUG */
		key->u.ccmp.replays++;
J
Johannes Berg 已提交
568
		return RX_DROP_UNUSABLE;
569 570
	}

571
	if (!(rx->status->flag & RX_FLAG_DECRYPTED)) {
572
		/* hardware didn't decrypt/verify MIC */
573 574 575 576 577 578 579 580 581 582 583 584 585
		u8 *scratch, *b_0, *aad;

		scratch = key->u.ccmp.rx_crypto_buf;
		b_0 = scratch + 3 * AES_BLOCK_LEN;
		aad = scratch + 4 * AES_BLOCK_LEN;

		ccmp_special_blocks(skb, pn, b_0, aad, 1);

		if (ieee80211_aes_ccm_decrypt(
			    key->u.ccmp.tfm, scratch, b_0, aad,
			    skb->data + hdrlen + CCMP_HDR_LEN, data_len,
			    skb->data + skb->len - CCMP_MIC_LEN,
			    skb->data + hdrlen + CCMP_HDR_LEN)) {
586 587 588 589 590 591
#ifdef CONFIG_MAC80211_DEBUG
			if (net_ratelimit())
				printk(KERN_DEBUG "%s: CCMP decrypt failed "
				       "for RX frame from %s\n", rx->dev->name,
				       print_mac(mac, rx->sta->addr));
#endif /* CONFIG_MAC80211_DEBUG */
J
Johannes Berg 已提交
592
			return RX_DROP_UNUSABLE;
593 594 595
		}
	}

596
	memcpy(key->u.ccmp.rx_pn[rx->queue], pn, CCMP_PN_LEN);
597 598 599 600 601 602

	/* Remove CCMP header and MIC */
	skb_trim(skb, skb->len - CCMP_MIC_LEN);
	memmove(skb->data + CCMP_HDR_LEN, skb->data, hdrlen);
	skb_pull(skb, CCMP_HDR_LEN);

603
	return RX_CONTINUE;
604
}