wpa.c 31.7 KB
Newer Older
1 2
/*
 * Copyright 2002-2004, Instant802 Networks, Inc.
3
 * Copyright 2008, Jouni Malinen <j@w1.fi>
4
 * Copyright (C) 2016-2017 Intel Deutschland GmbH
5 6 7 8 9 10 11 12 13 14
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
 */

#include <linux/netdevice.h>
#include <linux/types.h>
#include <linux/skbuff.h>
#include <linux/compiler.h>
15
#include <linux/ieee80211.h>
16
#include <linux/gfp.h>
17
#include <asm/unaligned.h>
18
#include <net/mac80211.h>
J
Johannes Berg 已提交
19
#include <crypto/aes.h>
20
#include <crypto/algapi.h>
J
Johannes Berg 已提交
21

22 23 24 25
#include "ieee80211_i.h"
#include "michael.h"
#include "tkip.h"
#include "aes_ccm.h"
26
#include "aes_cmac.h"
27
#include "aes_gmac.h"
28
#include "aes_gcm.h"
29 30
#include "wpa.h"

31
ieee80211_tx_result
32
ieee80211_tx_h_michael_mic_add(struct ieee80211_tx_data *tx)
33
{
34
	u8 *data, *key, *mic;
35
	size_t data_len;
36 37
	unsigned int hdrlen;
	struct ieee80211_hdr *hdr;
38
	struct sk_buff *skb = tx->skb;
39
	struct ieee80211_tx_info *info = IEEE80211_SKB_CB(skb);
40
	int tail;
41

42
	hdr = (struct ieee80211_hdr *)skb->data;
43 44
	if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP ||
	    skb->len < 24 || !ieee80211_is_data_present(hdr->frame_control))
45
		return TX_CONTINUE;
46

47 48
	hdrlen = ieee80211_hdrlen(hdr->frame_control);
	if (skb->len < hdrlen)
49
		return TX_DROP;
50

51 52 53
	data = skb->data + hdrlen;
	data_len = skb->len - hdrlen;

54 55 56 57 58
	if (unlikely(info->flags & IEEE80211_TX_INTFL_TKIP_MIC_FAILURE)) {
		/* Need to use software crypto for the test */
		info->control.hw_key = NULL;
	}

59
	if (info->control.hw_key &&
60
	    (info->flags & IEEE80211_TX_CTL_DONTFRAG ||
61
	     ieee80211_hw_check(&tx->local->hw, SUPPORTS_TX_FRAG)) &&
62 63 64
	    !(tx->key->conf.flags & (IEEE80211_KEY_FLAG_GENERATE_MMIC |
				     IEEE80211_KEY_FLAG_PUT_MIC_SPACE))) {
		/* hwaccel - with no need for SW-generated MMIC or MIC space */
65
		return TX_CONTINUE;
66 67
	}

68
	tail = MICHAEL_MIC_LEN;
69
	if (!info->control.hw_key)
70
		tail += IEEE80211_TKIP_ICV_LEN;
71

72 73 74 75 76
	if (WARN(skb_tailroom(skb) < tail ||
		 skb_headroom(skb) < IEEE80211_TKIP_IV_LEN,
		 "mmic: not enough head/tail (%d/%d,%d/%d)\n",
		 skb_headroom(skb), IEEE80211_TKIP_IV_LEN,
		 skb_tailroom(skb), tail))
77
		return TX_DROP;
78 79

	mic = skb_put(skb, MICHAEL_MIC_LEN);
80 81 82 83 84 85 86 87

	if (tx->key->conf.flags & IEEE80211_KEY_FLAG_PUT_MIC_SPACE) {
		/* Zeroed MIC can help with debug */
		memset(mic, 0, MICHAEL_MIC_LEN);
		return TX_CONTINUE;
	}

	key = &tx->key->conf.key[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY];
88
	michael_mic(key, hdr, data, data_len, mic);
89 90
	if (unlikely(info->flags & IEEE80211_TX_INTFL_TKIP_MIC_FAILURE))
		mic[0]++;
91

92
	return TX_CONTINUE;
93 94 95
}


96
ieee80211_rx_result
97
ieee80211_rx_h_michael_mic_verify(struct ieee80211_rx_data *rx)
98
{
99
	u8 *data, *key = NULL;
100
	size_t data_len;
101
	unsigned int hdrlen;
102 103
	u8 mic[MICHAEL_MIC_LEN];
	struct sk_buff *skb = rx->skb;
J
Johannes Berg 已提交
104 105
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(skb);
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
106

107 108 109 110 111
	/*
	 * it makes no sense to check for MIC errors on anything other
	 * than data frames.
	 */
	if (!ieee80211_is_data_present(hdr->frame_control))
112
		return RX_CONTINUE;
113

114 115 116 117 118 119 120 121
	/*
	 * No way to verify the MIC if the hardware stripped it or
	 * the IV with the key index. In this case we have solely rely
	 * on the driver to set RX_FLAG_MMIC_ERROR in the event of a
	 * MIC failure report.
	 */
	if (status->flag & (RX_FLAG_MMIC_STRIPPED | RX_FLAG_IV_STRIPPED)) {
		if (status->flag & RX_FLAG_MMIC_ERROR)
122
			goto mic_fail_no_key;
123

124 125
		if (!(status->flag & RX_FLAG_IV_STRIPPED) && rx->key &&
		    rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP)
126 127 128 129 130 131 132 133 134 135
			goto update_iv;

		return RX_CONTINUE;
	}

	/*
	 * Some hardware seems to generate Michael MIC failure reports; even
	 * though, the frame was not encrypted with TKIP and therefore has no
	 * MIC. Ignore the flag them to avoid triggering countermeasures.
	 */
136
	if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP ||
137
	    !(status->flag & RX_FLAG_DECRYPTED))
138
		return RX_CONTINUE;
139

140 141 142 143 144
	if (rx->sdata->vif.type == NL80211_IFTYPE_AP && rx->key->conf.keyidx) {
		/*
		 * APs with pairwise keys should never receive Michael MIC
		 * errors for non-zero keyidx because these are reserved for
		 * group keys and only the AP is sending real multicast
145
		 * frames in the BSS.
146 147 148 149 150 151 152
		 */
		return RX_DROP_UNUSABLE;
	}

	if (status->flag & RX_FLAG_MMIC_ERROR)
		goto mic_fail;

153 154
	hdrlen = ieee80211_hdrlen(hdr->frame_control);
	if (skb->len < hdrlen + MICHAEL_MIC_LEN)
J
Johannes Berg 已提交
155
		return RX_DROP_UNUSABLE;
156

157 158 159 160
	if (skb_linearize(rx->skb))
		return RX_DROP_UNUSABLE;
	hdr = (void *)skb->data;

161 162
	data = skb->data + hdrlen;
	data_len = skb->len - hdrlen - MICHAEL_MIC_LEN;
163
	key = &rx->key->conf.key[NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY];
164
	michael_mic(key, hdr, data, data_len, mic);
165
	if (crypto_memneq(mic, data + data_len, MICHAEL_MIC_LEN))
166
		goto mic_fail;
167 168 169 170

	/* remove Michael MIC from payload */
	skb_trim(skb, skb->len - MICHAEL_MIC_LEN);

171
update_iv:
172
	/* update IV in key information to be able to detect replays */
173 174
	rx->key->u.tkip.rx[rx->security_idx].iv32 = rx->tkip_iv32;
	rx->key->u.tkip.rx[rx->security_idx].iv16 = rx->tkip_iv16;
175

176
	return RX_CONTINUE;
177 178

mic_fail:
179 180 181
	rx->key->u.tkip.mic_failures++;

mic_fail_no_key:
182 183 184 185 186
	/*
	 * In some cases the key can be unset - e.g. a multicast packet, in
	 * a driver that supports HW encryption. Send up the key idx only if
	 * the key is set.
	 */
J
Johannes Berg 已提交
187 188 189 190 191 192
	cfg80211_michael_mic_failure(rx->sdata->dev, hdr->addr2,
				     is_multicast_ether_addr(hdr->addr1) ?
				     NL80211_KEYTYPE_GROUP :
				     NL80211_KEYTYPE_PAIRWISE,
				     rx->key ? rx->key->conf.keyidx : -1,
				     NULL, GFP_ATOMIC);
193
	return RX_DROP_UNUSABLE;
194 195
}

196
static int tkip_encrypt_skb(struct ieee80211_tx_data *tx, struct sk_buff *skb)
197 198 199
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;
	struct ieee80211_key *key = tx->key;
200
	struct ieee80211_tx_info *info = IEEE80211_SKB_CB(skb);
201 202
	unsigned int hdrlen;
	int len, tail;
203
	u64 pn;
204 205
	u8 *pos;

206
	if (info->control.hw_key &&
207 208
	    !(info->control.hw_key->flags & IEEE80211_KEY_FLAG_GENERATE_IV) &&
	    !(info->control.hw_key->flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE)) {
209
		/* hwaccel - with no need for software-generated IV */
210
		return 0;
211 212
	}

213
	hdrlen = ieee80211_hdrlen(hdr->frame_control);
214 215
	len = skb->len - hdrlen;

216
	if (info->control.hw_key)
217
		tail = 0;
J
Johannes Berg 已提交
218
	else
219
		tail = IEEE80211_TKIP_ICV_LEN;
220 221

	if (WARN_ON(skb_tailroom(skb) < tail ||
222
		    skb_headroom(skb) < IEEE80211_TKIP_IV_LEN))
223
		return -1;
224

225 226
	pos = skb_push(skb, IEEE80211_TKIP_IV_LEN);
	memmove(pos, pos + IEEE80211_TKIP_IV_LEN, hdrlen);
227 228
	pos += hdrlen;

229 230 231 232 233
	/* the HW only needs room for the IV, but not the actual IV */
	if (info->control.hw_key &&
	    (info->control.hw_key->flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE))
		return 0;

234
	/* Increase IV for the frame */
235 236
	pn = atomic64_inc_return(&key->conf.tx_pn);
	pos = ieee80211_tkip_add_iv(pos, &key->conf, pn);
237

238 239
	/* hwaccel - with software IV */
	if (info->control.hw_key)
240 241 242
		return 0;

	/* Add room for ICV */
243
	skb_put(skb, IEEE80211_TKIP_ICV_LEN);
244

245
	return ieee80211_tkip_encrypt_data(tx->local->wep_tx_tfm,
246
					   key, skb, pos, len);
247 248 249
}


250
ieee80211_tx_result
251
ieee80211_crypto_tkip_encrypt(struct ieee80211_tx_data *tx)
252
{
253
	struct sk_buff *skb;
254

255
	ieee80211_tx_set_protected(tx);
256

257
	skb_queue_walk(&tx->skbs, skb) {
J
Johannes Berg 已提交
258 259
		if (tkip_encrypt_skb(tx, skb) < 0)
			return TX_DROP;
260
	}
261

262
	return TX_CONTINUE;
263 264 265
}


266
ieee80211_rx_result
267
ieee80211_crypto_tkip_decrypt(struct ieee80211_rx_data *rx)
268 269
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) rx->skb->data;
270
	int hdrlen, res, hwaccel = 0;
271 272
	struct ieee80211_key *key = rx->key;
	struct sk_buff *skb = rx->skb;
J
Johannes Berg 已提交
273
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(skb);
274

275
	hdrlen = ieee80211_hdrlen(hdr->frame_control);
276

277
	if (!ieee80211_is_data(hdr->frame_control))
278
		return RX_CONTINUE;
279 280

	if (!rx->sta || skb->len - hdrlen < 12)
J
Johannes Berg 已提交
281
		return RX_DROP_UNUSABLE;
282

283 284 285 286 287
	/* it may be possible to optimize this a bit more */
	if (skb_linearize(rx->skb))
		return RX_DROP_UNUSABLE;
	hdr = (void *)skb->data;

288 289 290 291 292 293
	/*
	 * Let TKIP code verify IV, but skip decryption.
	 * In the case where hardware checks the IV as well,
	 * we don't even get here, see ieee80211_rx_h_decrypt()
	 */
	if (status->flag & RX_FLAG_DECRYPTED)
294 295 296 297
		hwaccel = 1;

	res = ieee80211_tkip_decrypt_data(rx->local->wep_rx_tfm,
					  key, skb->data + hdrlen,
298
					  skb->len - hdrlen, rx->sta->sta.addr,
299
					  hdr->addr1, hwaccel, rx->security_idx,
300 301
					  &rx->tkip_iv32,
					  &rx->tkip_iv16);
302
	if (res != TKIP_DECRYPT_OK)
J
Johannes Berg 已提交
303
		return RX_DROP_UNUSABLE;
304 305

	/* Trim ICV */
306 307
	if (!(status->flag & RX_FLAG_ICV_STRIPPED))
		skb_trim(skb, skb->len - IEEE80211_TKIP_ICV_LEN);
308 309

	/* Remove IV */
310 311
	memmove(skb->data + IEEE80211_TKIP_IV_LEN, skb->data, hdrlen);
	skb_pull(skb, IEEE80211_TKIP_IV_LEN);
312

313
	return RX_CONTINUE;
314 315 316
}


317
static void ccmp_special_blocks(struct sk_buff *skb, u8 *pn, u8 *b_0, u8 *aad)
318
{
319
	__le16 mask_fc;
320
	int a4_included, mgmt;
321
	u8 qos_tid;
322
	u16 len_a;
323 324
	unsigned int hdrlen;
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
325

326
	/*
327
	 * Mask FC: zero subtype b4 b5 b6 (if not mgmt)
328 329
	 * Retry, PwrMgt, MoreData; set Protected
	 */
330
	mgmt = ieee80211_is_mgmt(hdr->frame_control);
331
	mask_fc = hdr->frame_control;
332
	mask_fc &= ~cpu_to_le16(IEEE80211_FCTL_RETRY |
333
				IEEE80211_FCTL_PM | IEEE80211_FCTL_MOREDATA);
334 335
	if (!mgmt)
		mask_fc &= ~cpu_to_le16(0x0070);
336 337 338 339 340
	mask_fc |= cpu_to_le16(IEEE80211_FCTL_PROTECTED);

	hdrlen = ieee80211_hdrlen(hdr->frame_control);
	len_a = hdrlen - 2;
	a4_included = ieee80211_has_a4(hdr->frame_control);
341

342
	if (ieee80211_is_data_qos(hdr->frame_control))
S
Sara Sharon 已提交
343
		qos_tid = ieee80211_get_tid(hdr);
344 345 346
	else
		qos_tid = 0;

347 348 349 350 351 352 353 354
	/* In CCM, the initial vectors (IV) used for CTR mode encryption and CBC
	 * mode authentication are not allowed to collide, yet both are derived
	 * from this vector b_0. We only set L := 1 here to indicate that the
	 * data size can be represented in (L+1) bytes. The CCM layer will take
	 * care of storing the data length in the top (L+1) bytes and setting
	 * and clearing the other bits as is required to derive the two IVs.
	 */
	b_0[0] = 0x1;
355

356 357 358 359
	/* Nonce: Nonce Flags | A2 | PN
	 * Nonce Flags: Priority (b0..b3) | Management (b4) | Reserved (b5..b7)
	 */
	b_0[1] = qos_tid | (mgmt << 4);
360
	memcpy(&b_0[2], hdr->addr2, ETH_ALEN);
361
	memcpy(&b_0[8], pn, IEEE80211_CCMP_PN_LEN);
362 363 364

	/* AAD (extra authenticate-only data) / masked 802.11 header
	 * FC | A1 | A2 | A3 | SC | [A4] | [QC] */
365 366
	put_unaligned_be16(len_a, &aad[0]);
	put_unaligned(mask_fc, (__le16 *)&aad[2]);
367
	memcpy(&aad[4], &hdr->addr1, 3 * ETH_ALEN);
368 369 370 371

	/* Mask Seq#, leave Frag# */
	aad[22] = *((u8 *) &hdr->seq_ctrl) & 0x0f;
	aad[23] = 0;
372

373
	if (a4_included) {
374
		memcpy(&aad[24], hdr->addr4, ETH_ALEN);
375
		aad[30] = qos_tid;
376
		aad[31] = 0;
377
	} else {
378
		memset(&aad[24], 0, ETH_ALEN + IEEE80211_QOS_CTL_LEN);
379
		aad[24] = qos_tid;
380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396
	}
}


static inline void ccmp_pn2hdr(u8 *hdr, u8 *pn, int key_id)
{
	hdr[0] = pn[5];
	hdr[1] = pn[4];
	hdr[2] = 0;
	hdr[3] = 0x20 | (key_id << 6);
	hdr[4] = pn[3];
	hdr[5] = pn[2];
	hdr[6] = pn[1];
	hdr[7] = pn[0];
}


J
Johannes Berg 已提交
397
static inline void ccmp_hdr2pn(u8 *pn, u8 *hdr)
398 399 400 401 402 403 404 405 406 407
{
	pn[0] = hdr[7];
	pn[1] = hdr[6];
	pn[2] = hdr[5];
	pn[3] = hdr[4];
	pn[4] = hdr[1];
	pn[5] = hdr[0];
}


J
Jouni Malinen 已提交
408 409
static int ccmp_encrypt_skb(struct ieee80211_tx_data *tx, struct sk_buff *skb,
			    unsigned int mic_len)
410 411 412
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;
	struct ieee80211_key *key = tx->key;
413
	struct ieee80211_tx_info *info = IEEE80211_SKB_CB(skb);
414
	int hdrlen, len, tail;
J
Johannes Berg 已提交
415 416 417
	u8 *pos;
	u8 pn[6];
	u64 pn64;
418
	u8 aad[CCM_AAD_LEN];
419
	u8 b_0[AES_BLOCK_SIZE];
420

421
	if (info->control.hw_key &&
422
	    !(info->control.hw_key->flags & IEEE80211_KEY_FLAG_GENERATE_IV) &&
423 424 425 426
	    !(info->control.hw_key->flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE) &&
	    !((info->control.hw_key->flags &
	       IEEE80211_KEY_FLAG_GENERATE_IV_MGMT) &&
	      ieee80211_is_mgmt(hdr->frame_control))) {
427 428 429 430
		/*
		 * hwaccel has no need for preallocated room for CCMP
		 * header or MIC fields
		 */
431
		return 0;
432 433
	}

434
	hdrlen = ieee80211_hdrlen(hdr->frame_control);
435 436
	len = skb->len - hdrlen;

437
	if (info->control.hw_key)
438
		tail = 0;
J
Johannes Berg 已提交
439
	else
J
Jouni Malinen 已提交
440
		tail = mic_len;
441 442

	if (WARN_ON(skb_tailroom(skb) < tail ||
443
		    skb_headroom(skb) < IEEE80211_CCMP_HDR_LEN))
444
		return -1;
445

446 447
	pos = skb_push(skb, IEEE80211_CCMP_HDR_LEN);
	memmove(pos, pos + IEEE80211_CCMP_HDR_LEN, hdrlen);
448 449

	/* the HW only needs room for the IV, but not the actual IV */
450 451
	if (info->control.hw_key &&
	    (info->control.hw_key->flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE))
452 453
		return 0;

454 455 456
	hdr = (struct ieee80211_hdr *) pos;
	pos += hdrlen;

457
	pn64 = atomic64_inc_return(&key->conf.tx_pn);
458

J
Johannes Berg 已提交
459 460 461 462 463 464
	pn[5] = pn64;
	pn[4] = pn64 >> 8;
	pn[3] = pn64 >> 16;
	pn[2] = pn64 >> 24;
	pn[1] = pn64 >> 32;
	pn[0] = pn64 >> 40;
465

466
	ccmp_pn2hdr(pos, pn, key->conf.keyidx);
467

468 469
	/* hwaccel - with software CCMP header */
	if (info->control.hw_key)
470 471
		return 0;

472
	pos += IEEE80211_CCMP_HDR_LEN;
473
	ccmp_special_blocks(skb, pn, b_0, aad);
474
	return ieee80211_aes_ccm_encrypt(key->u.ccmp.tfm, b_0, aad, pos, len,
475
					 skb_put(skb, mic_len));
476 477 478
}


479
ieee80211_tx_result
J
Jouni Malinen 已提交
480 481
ieee80211_crypto_ccmp_encrypt(struct ieee80211_tx_data *tx,
			      unsigned int mic_len)
482
{
483
	struct sk_buff *skb;
484

485
	ieee80211_tx_set_protected(tx);
486

487
	skb_queue_walk(&tx->skbs, skb) {
J
Jouni Malinen 已提交
488
		if (ccmp_encrypt_skb(tx, skb, mic_len) < 0)
J
Johannes Berg 已提交
489
			return TX_DROP;
490
	}
491

492
	return TX_CONTINUE;
493 494 495
}


496
ieee80211_rx_result
J
Jouni Malinen 已提交
497 498
ieee80211_crypto_ccmp_decrypt(struct ieee80211_rx_data *rx,
			      unsigned int mic_len)
499
{
500
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)rx->skb->data;
501 502 503
	int hdrlen;
	struct ieee80211_key *key = rx->key;
	struct sk_buff *skb = rx->skb;
J
Johannes Berg 已提交
504
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(skb);
505
	u8 pn[IEEE80211_CCMP_PN_LEN];
506
	int data_len;
507
	int queue;
508

509
	hdrlen = ieee80211_hdrlen(hdr->frame_control);
510

511
	if (!ieee80211_is_data(hdr->frame_control) &&
512
	    !ieee80211_is_robust_mgmt_frame(skb))
513
		return RX_CONTINUE;
514

515
	if (status->flag & RX_FLAG_DECRYPTED) {
516
		if (!pskb_may_pull(rx->skb, hdrlen + IEEE80211_CCMP_HDR_LEN))
517
			return RX_DROP_UNUSABLE;
518 519
		if (status->flag & RX_FLAG_MIC_STRIPPED)
			mic_len = 0;
520 521 522 523 524
	} else {
		if (skb_linearize(rx->skb))
			return RX_DROP_UNUSABLE;
	}

525 526 527 528
	data_len = skb->len - hdrlen - IEEE80211_CCMP_HDR_LEN - mic_len;
	if (!rx->sta || data_len < 0)
		return RX_DROP_UNUSABLE;

529
	if (!(status->flag & RX_FLAG_PN_VALIDATED)) {
530 531
		int res;

532
		ccmp_hdr2pn(pn, skb->data + hdrlen);
533

534
		queue = rx->security_idx;
535

536 537 538 539
		res = memcmp(pn, key->u.ccmp.rx_pn[queue],
			     IEEE80211_CCMP_PN_LEN);
		if (res < 0 ||
		    (!res && !(status->flag & RX_FLAG_ALLOW_SAME_PN))) {
540
			key->u.ccmp.replays++;
J
Johannes Berg 已提交
541
			return RX_DROP_UNUSABLE;
542 543 544 545 546 547 548 549 550 551 552 553
		}

		if (!(status->flag & RX_FLAG_DECRYPTED)) {
			u8 aad[2 * AES_BLOCK_SIZE];
			u8 b_0[AES_BLOCK_SIZE];
			/* hardware didn't decrypt/verify MIC */
			ccmp_special_blocks(skb, pn, b_0, aad);

			if (ieee80211_aes_ccm_decrypt(
				    key->u.ccmp.tfm, b_0, aad,
				    skb->data + hdrlen + IEEE80211_CCMP_HDR_LEN,
				    data_len,
554
				    skb->data + skb->len - mic_len))
555 556 557 558
				return RX_DROP_UNUSABLE;
		}

		memcpy(key->u.ccmp.rx_pn[queue], pn, IEEE80211_CCMP_PN_LEN);
559 560 561
	}

	/* Remove CCMP header and MIC */
J
Jouni Malinen 已提交
562
	if (pskb_trim(skb, skb->len - mic_len))
563
		return RX_DROP_UNUSABLE;
564 565
	memmove(skb->data + IEEE80211_CCMP_HDR_LEN, skb->data, hdrlen);
	skb_pull(skb, IEEE80211_CCMP_HDR_LEN);
566

567
	return RX_CONTINUE;
568
}
569

570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603
static void gcmp_special_blocks(struct sk_buff *skb, u8 *pn, u8 *j_0, u8 *aad)
{
	__le16 mask_fc;
	u8 qos_tid;
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;

	memcpy(j_0, hdr->addr2, ETH_ALEN);
	memcpy(&j_0[ETH_ALEN], pn, IEEE80211_GCMP_PN_LEN);
	j_0[13] = 0;
	j_0[14] = 0;
	j_0[AES_BLOCK_SIZE - 1] = 0x01;

	/* AAD (extra authenticate-only data) / masked 802.11 header
	 * FC | A1 | A2 | A3 | SC | [A4] | [QC]
	 */
	put_unaligned_be16(ieee80211_hdrlen(hdr->frame_control) - 2, &aad[0]);
	/* Mask FC: zero subtype b4 b5 b6 (if not mgmt)
	 * Retry, PwrMgt, MoreData; set Protected
	 */
	mask_fc = hdr->frame_control;
	mask_fc &= ~cpu_to_le16(IEEE80211_FCTL_RETRY |
				IEEE80211_FCTL_PM | IEEE80211_FCTL_MOREDATA);
	if (!ieee80211_is_mgmt(hdr->frame_control))
		mask_fc &= ~cpu_to_le16(0x0070);
	mask_fc |= cpu_to_le16(IEEE80211_FCTL_PROTECTED);

	put_unaligned(mask_fc, (__le16 *)&aad[2]);
	memcpy(&aad[4], &hdr->addr1, 3 * ETH_ALEN);

	/* Mask Seq#, leave Frag# */
	aad[22] = *((u8 *)&hdr->seq_ctrl) & 0x0f;
	aad[23] = 0;

	if (ieee80211_is_data_qos(hdr->frame_control))
S
Sara Sharon 已提交
604
		qos_tid = ieee80211_get_tid(hdr);
605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648
	else
		qos_tid = 0;

	if (ieee80211_has_a4(hdr->frame_control)) {
		memcpy(&aad[24], hdr->addr4, ETH_ALEN);
		aad[30] = qos_tid;
		aad[31] = 0;
	} else {
		memset(&aad[24], 0, ETH_ALEN + IEEE80211_QOS_CTL_LEN);
		aad[24] = qos_tid;
	}
}

static inline void gcmp_pn2hdr(u8 *hdr, const u8 *pn, int key_id)
{
	hdr[0] = pn[5];
	hdr[1] = pn[4];
	hdr[2] = 0;
	hdr[3] = 0x20 | (key_id << 6);
	hdr[4] = pn[3];
	hdr[5] = pn[2];
	hdr[6] = pn[1];
	hdr[7] = pn[0];
}

static inline void gcmp_hdr2pn(u8 *pn, const u8 *hdr)
{
	pn[0] = hdr[7];
	pn[1] = hdr[6];
	pn[2] = hdr[5];
	pn[3] = hdr[4];
	pn[4] = hdr[1];
	pn[5] = hdr[0];
}

static int gcmp_encrypt_skb(struct ieee80211_tx_data *tx, struct sk_buff *skb)
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
	struct ieee80211_key *key = tx->key;
	struct ieee80211_tx_info *info = IEEE80211_SKB_CB(skb);
	int hdrlen, len, tail;
	u8 *pos;
	u8 pn[6];
	u64 pn64;
649
	u8 aad[GCM_AAD_LEN];
650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688
	u8 j_0[AES_BLOCK_SIZE];

	if (info->control.hw_key &&
	    !(info->control.hw_key->flags & IEEE80211_KEY_FLAG_GENERATE_IV) &&
	    !(info->control.hw_key->flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE) &&
	    !((info->control.hw_key->flags &
	       IEEE80211_KEY_FLAG_GENERATE_IV_MGMT) &&
	      ieee80211_is_mgmt(hdr->frame_control))) {
		/* hwaccel has no need for preallocated room for GCMP
		 * header or MIC fields
		 */
		return 0;
	}

	hdrlen = ieee80211_hdrlen(hdr->frame_control);
	len = skb->len - hdrlen;

	if (info->control.hw_key)
		tail = 0;
	else
		tail = IEEE80211_GCMP_MIC_LEN;

	if (WARN_ON(skb_tailroom(skb) < tail ||
		    skb_headroom(skb) < IEEE80211_GCMP_HDR_LEN))
		return -1;

	pos = skb_push(skb, IEEE80211_GCMP_HDR_LEN);
	memmove(pos, pos + IEEE80211_GCMP_HDR_LEN, hdrlen);
	skb_set_network_header(skb, skb_network_offset(skb) +
				    IEEE80211_GCMP_HDR_LEN);

	/* the HW only needs room for the IV, but not the actual IV */
	if (info->control.hw_key &&
	    (info->control.hw_key->flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE))
		return 0;

	hdr = (struct ieee80211_hdr *)pos;
	pos += hdrlen;

689
	pn64 = atomic64_inc_return(&key->conf.tx_pn);
690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705

	pn[5] = pn64;
	pn[4] = pn64 >> 8;
	pn[3] = pn64 >> 16;
	pn[2] = pn64 >> 24;
	pn[1] = pn64 >> 32;
	pn[0] = pn64 >> 40;

	gcmp_pn2hdr(pos, pn, key->conf.keyidx);

	/* hwaccel - with software GCMP header */
	if (info->control.hw_key)
		return 0;

	pos += IEEE80211_GCMP_HDR_LEN;
	gcmp_special_blocks(skb, pn, j_0, aad);
706 707
	return ieee80211_aes_gcm_encrypt(key->u.gcmp.tfm, j_0, aad, pos, len,
					 skb_put(skb, IEEE80211_GCMP_MIC_LEN));
708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733
}

ieee80211_tx_result
ieee80211_crypto_gcmp_encrypt(struct ieee80211_tx_data *tx)
{
	struct sk_buff *skb;

	ieee80211_tx_set_protected(tx);

	skb_queue_walk(&tx->skbs, skb) {
		if (gcmp_encrypt_skb(tx, skb) < 0)
			return TX_DROP;
	}

	return TX_CONTINUE;
}

ieee80211_rx_result
ieee80211_crypto_gcmp_decrypt(struct ieee80211_rx_data *rx)
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)rx->skb->data;
	int hdrlen;
	struct ieee80211_key *key = rx->key;
	struct sk_buff *skb = rx->skb;
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(skb);
	u8 pn[IEEE80211_GCMP_PN_LEN];
734
	int data_len, queue, mic_len = IEEE80211_GCMP_MIC_LEN;
735 736 737 738 739 740 741 742 743 744

	hdrlen = ieee80211_hdrlen(hdr->frame_control);

	if (!ieee80211_is_data(hdr->frame_control) &&
	    !ieee80211_is_robust_mgmt_frame(skb))
		return RX_CONTINUE;

	if (status->flag & RX_FLAG_DECRYPTED) {
		if (!pskb_may_pull(rx->skb, hdrlen + IEEE80211_GCMP_HDR_LEN))
			return RX_DROP_UNUSABLE;
745 746
		if (status->flag & RX_FLAG_MIC_STRIPPED)
			mic_len = 0;
747 748 749 750 751
	} else {
		if (skb_linearize(rx->skb))
			return RX_DROP_UNUSABLE;
	}

752 753 754 755
	data_len = skb->len - hdrlen - IEEE80211_GCMP_HDR_LEN - mic_len;
	if (!rx->sta || data_len < 0)
		return RX_DROP_UNUSABLE;

756
	if (!(status->flag & RX_FLAG_PN_VALIDATED)) {
757 758
		int res;

759
		gcmp_hdr2pn(pn, skb->data + hdrlen);
760

761
		queue = rx->security_idx;
762

763 764 765 766
		res = memcmp(pn, key->u.gcmp.rx_pn[queue],
			     IEEE80211_GCMP_PN_LEN);
		if (res < 0 ||
		    (!res && !(status->flag & RX_FLAG_ALLOW_SAME_PN))) {
767
			key->u.gcmp.replays++;
768
			return RX_DROP_UNUSABLE;
769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786
		}

		if (!(status->flag & RX_FLAG_DECRYPTED)) {
			u8 aad[2 * AES_BLOCK_SIZE];
			u8 j_0[AES_BLOCK_SIZE];
			/* hardware didn't decrypt/verify MIC */
			gcmp_special_blocks(skb, pn, j_0, aad);

			if (ieee80211_aes_gcm_decrypt(
				    key->u.gcmp.tfm, j_0, aad,
				    skb->data + hdrlen + IEEE80211_GCMP_HDR_LEN,
				    data_len,
				    skb->data + skb->len -
				    IEEE80211_GCMP_MIC_LEN))
				return RX_DROP_UNUSABLE;
		}

		memcpy(key->u.gcmp.rx_pn[queue], pn, IEEE80211_GCMP_PN_LEN);
787 788 789
	}

	/* Remove GCMP header and MIC */
790
	if (pskb_trim(skb, skb->len - mic_len))
791 792 793 794 795 796 797
		return RX_DROP_UNUSABLE;
	memmove(skb->data + IEEE80211_GCMP_HDR_LEN, skb->data, hdrlen);
	skb_pull(skb, IEEE80211_GCMP_HDR_LEN);

	return RX_CONTINUE;
}

798 799 800 801 802 803 804 805
static ieee80211_tx_result
ieee80211_crypto_cs_encrypt(struct ieee80211_tx_data *tx,
			    struct sk_buff *skb)
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
	struct ieee80211_key *key = tx->key;
	struct ieee80211_tx_info *info = IEEE80211_SKB_CB(skb);
	int hdrlen;
806
	u8 *pos, iv_len = key->conf.iv_len;
807 808 809 810 811 812 813

	if (info->control.hw_key &&
	    !(info->control.hw_key->flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE)) {
		/* hwaccel has no need for preallocated head room */
		return TX_CONTINUE;
	}

814 815
	if (unlikely(skb_headroom(skb) < iv_len &&
		     pskb_expand_head(skb, iv_len, 0, GFP_ATOMIC)))
816 817 818 819
		return TX_DROP;

	hdrlen = ieee80211_hdrlen(hdr->frame_control);

820 821
	pos = skb_push(skb, iv_len);
	memmove(pos, pos + iv_len, hdrlen);
822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868

	return TX_CONTINUE;
}

static inline int ieee80211_crypto_cs_pn_compare(u8 *pn1, u8 *pn2, int len)
{
	int i;

	/* pn is little endian */
	for (i = len - 1; i >= 0; i--) {
		if (pn1[i] < pn2[i])
			return -1;
		else if (pn1[i] > pn2[i])
			return 1;
	}

	return 0;
}

static ieee80211_rx_result
ieee80211_crypto_cs_decrypt(struct ieee80211_rx_data *rx)
{
	struct ieee80211_key *key = rx->key;
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)rx->skb->data;
	const struct ieee80211_cipher_scheme *cs = NULL;
	int hdrlen = ieee80211_hdrlen(hdr->frame_control);
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(rx->skb);
	int data_len;
	u8 *rx_pn;
	u8 *skb_pn;
	u8 qos_tid;

	if (!rx->sta || !rx->sta->cipher_scheme ||
	    !(status->flag & RX_FLAG_DECRYPTED))
		return RX_DROP_UNUSABLE;

	if (!ieee80211_is_data(hdr->frame_control))
		return RX_CONTINUE;

	cs = rx->sta->cipher_scheme;

	data_len = rx->skb->len - hdrlen - cs->hdr_len;

	if (data_len < 0)
		return RX_DROP_UNUSABLE;

	if (ieee80211_is_data_qos(hdr->frame_control))
S
Sara Sharon 已提交
869
		qos_tid = ieee80211_get_tid(hdr);
870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894
	else
		qos_tid = 0;

	if (skb_linearize(rx->skb))
		return RX_DROP_UNUSABLE;

	hdr = (struct ieee80211_hdr *)rx->skb->data;

	rx_pn = key->u.gen.rx_pn[qos_tid];
	skb_pn = rx->skb->data + hdrlen + cs->pn_off;

	if (ieee80211_crypto_cs_pn_compare(skb_pn, rx_pn, cs->pn_len) <= 0)
		return RX_DROP_UNUSABLE;

	memcpy(rx_pn, skb_pn, cs->pn_len);

	/* remove security header and MIC */
	if (pskb_trim(rx->skb, rx->skb->len - cs->mic_len))
		return RX_DROP_UNUSABLE;

	memmove(rx->skb->data + cs->hdr_len, rx->skb->data, hdrlen);
	skb_pull(rx->skb, cs->hdr_len);

	return RX_CONTINUE;
}
895 896 897

static void bip_aad(struct sk_buff *skb, u8 *aad)
{
898 899 900
	__le16 mask_fc;
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;

901 902 903 904
	/* BIP AAD: FC(masked) || A1 || A2 || A3 */

	/* FC type/subtype */
	/* Mask FC Retry, PwrMgt, MoreData flags to zero */
905 906 907 908
	mask_fc = hdr->frame_control;
	mask_fc &= ~cpu_to_le16(IEEE80211_FCTL_RETRY | IEEE80211_FCTL_PM |
				IEEE80211_FCTL_MOREDATA);
	put_unaligned(mask_fc, (__le16 *) &aad[0]);
909
	/* A1 || A2 || A3 */
910
	memcpy(aad + 2, &hdr->addr1, 3 * ETH_ALEN);
911 912 913
}


J
Johannes Berg 已提交
914 915 916 917 918 919 920 921 922 923
static inline void bip_ipn_set64(u8 *d, u64 pn)
{
	*d++ = pn;
	*d++ = pn >> 8;
	*d++ = pn >> 16;
	*d++ = pn >> 24;
	*d++ = pn >> 32;
	*d = pn >> 40;
}

924 925 926 927 928 929 930 931 932 933 934 935 936 937
static inline void bip_ipn_swap(u8 *d, const u8 *s)
{
	*d++ = s[5];
	*d++ = s[4];
	*d++ = s[3];
	*d++ = s[2];
	*d++ = s[1];
	*d = s[0];
}


ieee80211_tx_result
ieee80211_crypto_aes_cmac_encrypt(struct ieee80211_tx_data *tx)
{
938 939
	struct sk_buff *skb;
	struct ieee80211_tx_info *info;
940 941
	struct ieee80211_key *key = tx->key;
	struct ieee80211_mmie *mmie;
J
Johannes Berg 已提交
942 943
	u8 aad[20];
	u64 pn64;
944

945 946 947 948 949 950 951
	if (WARN_ON(skb_queue_len(&tx->skbs) != 1))
		return TX_DROP;

	skb = skb_peek(&tx->skbs);

	info = IEEE80211_SKB_CB(skb);

952
	if (info->control.hw_key)
953
		return TX_CONTINUE;
954 955 956 957

	if (WARN_ON(skb_tailroom(skb) < sizeof(*mmie)))
		return TX_DROP;

958
	mmie = skb_put(skb, sizeof(*mmie));
959 960 961 962 963
	mmie->element_id = WLAN_EID_MMIE;
	mmie->length = sizeof(*mmie) - 2;
	mmie->key_id = cpu_to_le16(key->conf.keyidx);

	/* PN = PN + 1 */
964
	pn64 = atomic64_inc_return(&key->conf.tx_pn);
965

J
Johannes Berg 已提交
966
	bip_ipn_set64(mmie->sequence_number, pn64);
967 968 969 970 971 972

	bip_aad(skb, aad);

	/*
	 * MIC = AES-128-CMAC(IGTK, AAD || Management Frame Body || MMIE, 64)
	 */
J
Johannes Berg 已提交
973 974
	ieee80211_aes_cmac(key->u.aes_cmac.tfm, aad,
			   skb->data + 24, skb->len - 24, mmie->mic);
975 976 977 978

	return TX_CONTINUE;
}

979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001
ieee80211_tx_result
ieee80211_crypto_aes_cmac_256_encrypt(struct ieee80211_tx_data *tx)
{
	struct sk_buff *skb;
	struct ieee80211_tx_info *info;
	struct ieee80211_key *key = tx->key;
	struct ieee80211_mmie_16 *mmie;
	u8 aad[20];
	u64 pn64;

	if (WARN_ON(skb_queue_len(&tx->skbs) != 1))
		return TX_DROP;

	skb = skb_peek(&tx->skbs);

	info = IEEE80211_SKB_CB(skb);

	if (info->control.hw_key)
		return TX_CONTINUE;

	if (WARN_ON(skb_tailroom(skb) < sizeof(*mmie)))
		return TX_DROP;

1002
	mmie = skb_put(skb, sizeof(*mmie));
1003 1004 1005 1006 1007
	mmie->element_id = WLAN_EID_MMIE;
	mmie->length = sizeof(*mmie) - 2;
	mmie->key_id = cpu_to_le16(key->conf.keyidx);

	/* PN = PN + 1 */
1008
	pn64 = atomic64_inc_return(&key->conf.tx_pn);
1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020

	bip_ipn_set64(mmie->sequence_number, pn64);

	bip_aad(skb, aad);

	/* MIC = AES-256-CMAC(IGTK, AAD || Management Frame Body || MMIE, 128)
	 */
	ieee80211_aes_cmac_256(key->u.aes_cmac.tfm, aad,
			       skb->data + 24, skb->len - 24, mmie->mic);

	return TX_CONTINUE;
}
1021 1022 1023 1024 1025

ieee80211_rx_result
ieee80211_crypto_aes_cmac_decrypt(struct ieee80211_rx_data *rx)
{
	struct sk_buff *skb = rx->skb;
J
Johannes Berg 已提交
1026
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(skb);
1027 1028 1029 1030 1031 1032 1033 1034
	struct ieee80211_key *key = rx->key;
	struct ieee80211_mmie *mmie;
	u8 aad[20], mic[8], ipn[6];
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;

	if (!ieee80211_is_mgmt(hdr->frame_control))
		return RX_CONTINUE;

1035 1036
	/* management frames are already linear */

1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052
	if (skb->len < 24 + sizeof(*mmie))
		return RX_DROP_UNUSABLE;

	mmie = (struct ieee80211_mmie *)
		(skb->data + skb->len - sizeof(*mmie));
	if (mmie->element_id != WLAN_EID_MMIE ||
	    mmie->length != sizeof(*mmie) - 2)
		return RX_DROP_UNUSABLE; /* Invalid MMIE */

	bip_ipn_swap(ipn, mmie->sequence_number);

	if (memcmp(ipn, key->u.aes_cmac.rx_pn, 6) <= 0) {
		key->u.aes_cmac.replays++;
		return RX_DROP_UNUSABLE;
	}

J
Johannes Berg 已提交
1053
	if (!(status->flag & RX_FLAG_DECRYPTED)) {
1054 1055
		/* hardware didn't decrypt/verify MIC */
		bip_aad(skb, aad);
J
Johannes Berg 已提交
1056
		ieee80211_aes_cmac(key->u.aes_cmac.tfm, aad,
1057
				   skb->data + 24, skb->len - 24, mic);
1058
		if (crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) {
1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070
			key->u.aes_cmac.icverrors++;
			return RX_DROP_UNUSABLE;
		}
	}

	memcpy(key->u.aes_cmac.rx_pn, ipn, 6);

	/* Remove MMIE */
	skb_trim(skb, skb->len - sizeof(*mmie));

	return RX_CONTINUE;
}
1071

1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107
ieee80211_rx_result
ieee80211_crypto_aes_cmac_256_decrypt(struct ieee80211_rx_data *rx)
{
	struct sk_buff *skb = rx->skb;
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(skb);
	struct ieee80211_key *key = rx->key;
	struct ieee80211_mmie_16 *mmie;
	u8 aad[20], mic[16], ipn[6];
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;

	if (!ieee80211_is_mgmt(hdr->frame_control))
		return RX_CONTINUE;

	/* management frames are already linear */

	if (skb->len < 24 + sizeof(*mmie))
		return RX_DROP_UNUSABLE;

	mmie = (struct ieee80211_mmie_16 *)
		(skb->data + skb->len - sizeof(*mmie));
	if (mmie->element_id != WLAN_EID_MMIE ||
	    mmie->length != sizeof(*mmie) - 2)
		return RX_DROP_UNUSABLE; /* Invalid MMIE */

	bip_ipn_swap(ipn, mmie->sequence_number);

	if (memcmp(ipn, key->u.aes_cmac.rx_pn, 6) <= 0) {
		key->u.aes_cmac.replays++;
		return RX_DROP_UNUSABLE;
	}

	if (!(status->flag & RX_FLAG_DECRYPTED)) {
		/* hardware didn't decrypt/verify MIC */
		bip_aad(skb, aad);
		ieee80211_aes_cmac_256(key->u.aes_cmac.tfm, aad,
				       skb->data + 24, skb->len - 24, mic);
1108
		if (crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) {
1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121
			key->u.aes_cmac.icverrors++;
			return RX_DROP_UNUSABLE;
		}
	}

	memcpy(key->u.aes_cmac.rx_pn, ipn, 6);

	/* Remove MMIE */
	skb_trim(skb, skb->len - sizeof(*mmie));

	return RX_CONTINUE;
}

1122 1123 1124 1125 1126 1127 1128 1129
ieee80211_tx_result
ieee80211_crypto_aes_gmac_encrypt(struct ieee80211_tx_data *tx)
{
	struct sk_buff *skb;
	struct ieee80211_tx_info *info;
	struct ieee80211_key *key = tx->key;
	struct ieee80211_mmie_16 *mmie;
	struct ieee80211_hdr *hdr;
1130
	u8 aad[GMAC_AAD_LEN];
1131
	u64 pn64;
1132
	u8 nonce[GMAC_NONCE_LEN];
1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146

	if (WARN_ON(skb_queue_len(&tx->skbs) != 1))
		return TX_DROP;

	skb = skb_peek(&tx->skbs);

	info = IEEE80211_SKB_CB(skb);

	if (info->control.hw_key)
		return TX_CONTINUE;

	if (WARN_ON(skb_tailroom(skb) < sizeof(*mmie)))
		return TX_DROP;

1147
	mmie = skb_put(skb, sizeof(*mmie));
1148 1149 1150 1151 1152
	mmie->element_id = WLAN_EID_MMIE;
	mmie->length = sizeof(*mmie) - 2;
	mmie->key_id = cpu_to_le16(key->conf.keyidx);

	/* PN = PN + 1 */
1153
	pn64 = atomic64_inc_return(&key->conf.tx_pn);
1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177

	bip_ipn_set64(mmie->sequence_number, pn64);

	bip_aad(skb, aad);

	hdr = (struct ieee80211_hdr *)skb->data;
	memcpy(nonce, hdr->addr2, ETH_ALEN);
	bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number);

	/* MIC = AES-GMAC(IGTK, AAD || Management Frame Body || MMIE, 128) */
	if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce,
			       skb->data + 24, skb->len - 24, mmie->mic) < 0)
		return TX_DROP;

	return TX_CONTINUE;
}

ieee80211_rx_result
ieee80211_crypto_aes_gmac_decrypt(struct ieee80211_rx_data *rx)
{
	struct sk_buff *skb = rx->skb;
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(skb);
	struct ieee80211_key *key = rx->key;
	struct ieee80211_mmie_16 *mmie;
1178
	u8 aad[GMAC_AAD_LEN], mic[GMAC_MIC_LEN], ipn[6], nonce[GMAC_NONCE_LEN];
1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;

	if (!ieee80211_is_mgmt(hdr->frame_control))
		return RX_CONTINUE;

	/* management frames are already linear */

	if (skb->len < 24 + sizeof(*mmie))
		return RX_DROP_UNUSABLE;

	mmie = (struct ieee80211_mmie_16 *)
		(skb->data + skb->len - sizeof(*mmie));
	if (mmie->element_id != WLAN_EID_MMIE ||
	    mmie->length != sizeof(*mmie) - 2)
		return RX_DROP_UNUSABLE; /* Invalid MMIE */

	bip_ipn_swap(ipn, mmie->sequence_number);

	if (memcmp(ipn, key->u.aes_gmac.rx_pn, 6) <= 0) {
		key->u.aes_gmac.replays++;
		return RX_DROP_UNUSABLE;
	}

	if (!(status->flag & RX_FLAG_DECRYPTED)) {
		/* hardware didn't decrypt/verify MIC */
		bip_aad(skb, aad);

		memcpy(nonce, hdr->addr2, ETH_ALEN);
		memcpy(nonce + ETH_ALEN, ipn, 6);

		if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce,
				       skb->data + 24, skb->len - 24,
				       mic) < 0 ||
1212
		    crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) {
1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225
			key->u.aes_gmac.icverrors++;
			return RX_DROP_UNUSABLE;
		}
	}

	memcpy(key->u.aes_gmac.rx_pn, ipn, 6);

	/* Remove MMIE */
	skb_trim(skb, skb->len - sizeof(*mmie));

	return RX_CONTINUE;
}

1226 1227 1228 1229 1230
ieee80211_tx_result
ieee80211_crypto_hw_encrypt(struct ieee80211_tx_data *tx)
{
	struct sk_buff *skb;
	struct ieee80211_tx_info *info = NULL;
1231
	ieee80211_tx_result res;
1232 1233 1234 1235 1236 1237 1238

	skb_queue_walk(&tx->skbs, skb) {
		info  = IEEE80211_SKB_CB(skb);

		/* handle hw-only algorithm */
		if (!info->control.hw_key)
			return TX_DROP;
1239

1240
		if (tx->key->flags & KEY_FLAG_CIPHER_SCHEME) {
1241 1242 1243 1244
			res = ieee80211_crypto_cs_encrypt(tx, skb);
			if (res != TX_CONTINUE)
				return res;
		}
1245 1246 1247 1248 1249 1250
	}

	ieee80211_tx_set_protected(tx);

	return TX_CONTINUE;
}
1251 1252 1253 1254

ieee80211_rx_result
ieee80211_crypto_hw_decrypt(struct ieee80211_rx_data *rx)
{
1255
	if (rx->sta && rx->sta->cipher_scheme)
1256 1257 1258 1259
		return ieee80211_crypto_cs_decrypt(rx);

	return RX_DROP_UNUSABLE;
}