key.c 17.5 KB
Newer Older
1 2 3 4
/*
 * Copyright 2002-2005, Instant802 Networks, Inc.
 * Copyright 2005-2006, Devicescape Software, Inc.
 * Copyright 2006-2007	Jiri Benc <jbenc@suse.cz>
5
 * Copyright 2007-2008	Johannes Berg <johannes@sipsolutions.net>
6 7 8 9 10 11
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
 */

J
Johannes Berg 已提交
12 13 14
#include <linux/if_ether.h>
#include <linux/etherdevice.h>
#include <linux/list.h>
15
#include <linux/rcupdate.h>
16
#include <linux/rtnetlink.h>
17
#include <linux/slab.h>
18
#include <linux/export.h>
19
#include <net/mac80211.h>
20
#include <asm/unaligned.h>
21
#include "ieee80211_i.h"
22
#include "driver-ops.h"
23 24
#include "debugfs_key.h"
#include "aes_ccm.h"
25
#include "aes_cmac.h"
26

J
Johannes Berg 已提交
27

J
Johannes Berg 已提交
28 29
/**
 * DOC: Key handling basics
J
Johannes Berg 已提交
30 31 32 33 34
 *
 * Key handling in mac80211 is done based on per-interface (sub_if_data)
 * keys and per-station keys. Since each station belongs to an interface,
 * each station key also belongs to that interface.
 *
35 36 37 38 39 40 41
 * Hardware acceleration is done on a best-effort basis for algorithms
 * that are implemented in software,  for each key the hardware is asked
 * to enable that key for offloading but if it cannot do that the key is
 * simply kept for software encryption (unless it is for an algorithm
 * that isn't implemented in software).
 * There is currently no way of knowing whether a key is handled in SW
 * or HW except by looking into debugfs.
J
Johannes Berg 已提交
42
 *
43 44 45 46 47 48
 * All key management is internally protected by a mutex. Within all
 * other parts of mac80211, key references are, just as STA structure
 * references, protected by RCU. Note, however, that some things are
 * unprotected, namely the key->sta dereferences within the hardware
 * acceleration functions. This means that sta_info_destroy() must
 * remove the key which waits for an RCU grace period.
J
Johannes Berg 已提交
49 50 51 52
 */

static const u8 bcast_addr[ETH_ALEN] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };

J
Johannes Berg 已提交
53
static void assert_key_lock(struct ieee80211_local *local)
54
{
55
	lockdep_assert_held(&local->key_mtx);
56 57
}

58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87
static void increment_tailroom_need_count(struct ieee80211_sub_if_data *sdata)
{
	/*
	 * When this count is zero, SKB resizing for allocating tailroom
	 * for IV or MMIC is skipped. But, this check has created two race
	 * cases in xmit path while transiting from zero count to one:
	 *
	 * 1. SKB resize was skipped because no key was added but just before
	 * the xmit key is added and SW encryption kicks off.
	 *
	 * 2. SKB resize was skipped because all the keys were hw planted but
	 * just before xmit one of the key is deleted and SW encryption kicks
	 * off.
	 *
	 * In both the above case SW encryption will find not enough space for
	 * tailroom and exits with WARN_ON. (See WARN_ONs at wpa.c)
	 *
	 * Solution has been explained at
	 * http://mid.gmane.org/1308590980.4322.19.camel@jlt3.sipsolutions.net
	 */

	if (!sdata->crypto_tx_tailroom_needed_cnt++) {
		/*
		 * Flush all XMIT packets currently using HW encryption or no
		 * encryption at all if the count transition is from 0 -> 1.
		 */
		synchronize_net();
	}
}

88
static int ieee80211_key_enable_hw_accel(struct ieee80211_key *key)
J
Johannes Berg 已提交
89
{
90
	struct ieee80211_sub_if_data *sdata;
91
	struct sta_info *sta;
J
Johannes Berg 已提交
92 93
	int ret;

94 95
	might_sleep();

96
	if (!key->local->ops->set_key)
97
		goto out_unsupported;
J
Johannes Berg 已提交
98

J
Johannes Berg 已提交
99 100
	assert_key_lock(key->local);

101
	sta = key->sta;
102

103 104 105 106 107 108 109 110
	/*
	 * If this is a per-STA GTK, check if it
	 * is supported; if not, return.
	 */
	if (sta && !(key->conf.flags & IEEE80211_KEY_FLAG_PAIRWISE) &&
	    !(key->local->hw.flags & IEEE80211_HW_SUPPORTS_PER_STA_GTK))
		goto out_unsupported;

111 112 113
	if (sta && !sta->uploaded)
		goto out_unsupported;

114
	sdata = key->sdata;
115 116 117 118 119 120 121 122
	if (sdata->vif.type == NL80211_IFTYPE_AP_VLAN) {
		/*
		 * The driver doesn't know anything about VLAN interfaces.
		 * Hence, don't send GTKs for VLAN interfaces to the driver.
		 */
		if (!(key->conf.flags & IEEE80211_KEY_FLAG_PAIRWISE))
			goto out_unsupported;
	}
J
Johannes Berg 已提交
123

124 125
	ret = drv_set_key(key->local, SET_KEY, sdata,
			  sta ? &sta->sta : NULL, &key->conf);
J
Johannes Berg 已提交
126

127
	if (!ret) {
J
Johannes Berg 已提交
128
		key->flags |= KEY_FLAG_UPLOADED_TO_HARDWARE;
129 130

		if (!((key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_MMIC) ||
131 132
		      (key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_IV) ||
		      (key->conf.flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE)))
133 134
			sdata->crypto_tx_tailroom_needed_cnt--;

135 136 137
		WARN_ON((key->conf.flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE) &&
			(key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_IV));

138 139
		return 0;
	}
J
Johannes Berg 已提交
140

141
	if (ret != -ENOSPC && ret != -EOPNOTSUPP)
J
Johannes Berg 已提交
142
		sdata_err(sdata,
J
Joe Perches 已提交
143
			  "failed to set key (%d, %pM) to hardware (%d)\n",
144 145
			  key->conf.keyidx,
			  sta ? sta->sta.addr : bcast_addr, ret);
146

147 148 149 150 151 152 153 154 155 156 157
 out_unsupported:
	switch (key->conf.cipher) {
	case WLAN_CIPHER_SUITE_WEP40:
	case WLAN_CIPHER_SUITE_WEP104:
	case WLAN_CIPHER_SUITE_TKIP:
	case WLAN_CIPHER_SUITE_CCMP:
	case WLAN_CIPHER_SUITE_AES_CMAC:
		/* all of these we can do in software */
		return 0;
	default:
		return -EINVAL;
158
	}
J
Johannes Berg 已提交
159 160 161 162
}

static void ieee80211_key_disable_hw_accel(struct ieee80211_key *key)
{
163
	struct ieee80211_sub_if_data *sdata;
164
	struct sta_info *sta;
J
Johannes Berg 已提交
165 166
	int ret;

167 168
	might_sleep();

169
	if (!key || !key->local->ops->set_key)
J
Johannes Berg 已提交
170 171
		return;

J
Johannes Berg 已提交
172 173 174
	assert_key_lock(key->local);

	if (!(key->flags & KEY_FLAG_UPLOADED_TO_HARDWARE))
J
Johannes Berg 已提交
175 176
		return;

177
	sta = key->sta;
178 179
	sdata = key->sdata;

180
	if (!((key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_MMIC) ||
181 182
	      (key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_IV) ||
	      (key->conf.flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE)))
183 184
		increment_tailroom_need_count(sdata);

J
Johannes Berg 已提交
185
	ret = drv_set_key(key->local, DISABLE_KEY, sdata,
186
			  sta ? &sta->sta : NULL, &key->conf);
J
Johannes Berg 已提交
187 188

	if (ret)
J
Johannes Berg 已提交
189
		sdata_err(sdata,
J
Joe Perches 已提交
190
			  "failed to remove key (%d, %pM) from hardware (%d)\n",
191 192
			  key->conf.keyidx,
			  sta ? sta->sta.addr : bcast_addr, ret);
J
Johannes Berg 已提交
193

194 195 196 197
	key->flags &= ~KEY_FLAG_UPLOADED_TO_HARDWARE;
}

static void __ieee80211_set_default_key(struct ieee80211_sub_if_data *sdata,
198
					int idx, bool uni, bool multi)
199 200 201
{
	struct ieee80211_key *key = NULL;

J
Johannes Berg 已提交
202 203
	assert_key_lock(sdata->local);

204
	if (idx >= 0 && idx < NUM_DEFAULT_KEYS)
J
Johannes Berg 已提交
205
		key = key_mtx_dereference(sdata->local, sdata->keys[idx]);
206

207 208 209 210
	if (uni)
		rcu_assign_pointer(sdata->default_unicast_key, key);
	if (multi)
		rcu_assign_pointer(sdata->default_multicast_key, key);
211

212
	ieee80211_debugfs_key_update_default(sdata);
213 214
}

215 216
void ieee80211_set_default_key(struct ieee80211_sub_if_data *sdata, int idx,
			       bool uni, bool multi)
217
{
J
Johannes Berg 已提交
218
	mutex_lock(&sdata->local->key_mtx);
219
	__ieee80211_set_default_key(sdata, idx, uni, multi);
J
Johannes Berg 已提交
220
	mutex_unlock(&sdata->local->key_mtx);
221 222
}

223 224 225 226 227
static void
__ieee80211_set_default_mgmt_key(struct ieee80211_sub_if_data *sdata, int idx)
{
	struct ieee80211_key *key = NULL;

J
Johannes Berg 已提交
228 229
	assert_key_lock(sdata->local);

230 231
	if (idx >= NUM_DEFAULT_KEYS &&
	    idx < NUM_DEFAULT_KEYS + NUM_DEFAULT_MGMT_KEYS)
J
Johannes Berg 已提交
232
		key = key_mtx_dereference(sdata->local, sdata->keys[idx]);
233 234 235

	rcu_assign_pointer(sdata->default_mgmt_key, key);

236
	ieee80211_debugfs_key_update_default(sdata);
237 238 239 240 241
}

void ieee80211_set_default_mgmt_key(struct ieee80211_sub_if_data *sdata,
				    int idx)
{
J
Johannes Berg 已提交
242
	mutex_lock(&sdata->local->key_mtx);
243
	__ieee80211_set_default_mgmt_key(sdata, idx);
J
Johannes Berg 已提交
244
	mutex_unlock(&sdata->local->key_mtx);
245 246
}

247 248 249

static void __ieee80211_key_replace(struct ieee80211_sub_if_data *sdata,
				    struct sta_info *sta,
250
				    bool pairwise,
251 252 253
				    struct ieee80211_key *old,
				    struct ieee80211_key *new)
{
254 255
	int idx;
	bool defunikey, defmultikey, defmgmtkey;
256 257

	if (new)
258
		list_add_tail(&new->list, &sdata->key_list);
259

260 261 262 263 264 265 266 267
	if (sta && pairwise) {
		rcu_assign_pointer(sta->ptk, new);
	} else if (sta) {
		if (old)
			idx = old->conf.keyidx;
		else
			idx = new->conf.keyidx;
		rcu_assign_pointer(sta->gtk[idx], new);
268 269 270 271 272 273 274 275
	} else {
		WARN_ON(new && old && new->conf.keyidx != old->conf.keyidx);

		if (old)
			idx = old->conf.keyidx;
		else
			idx = new->conf.keyidx;

J
Johannes Berg 已提交
276 277 278 279 280 281 282 283 284
		defunikey = old &&
			old == key_mtx_dereference(sdata->local,
						sdata->default_unicast_key);
		defmultikey = old &&
			old == key_mtx_dereference(sdata->local,
						sdata->default_multicast_key);
		defmgmtkey = old &&
			old == key_mtx_dereference(sdata->local,
						sdata->default_mgmt_key);
285

286 287 288 289
		if (defunikey && !new)
			__ieee80211_set_default_key(sdata, -1, true, false);
		if (defmultikey && !new)
			__ieee80211_set_default_key(sdata, -1, false, true);
290 291
		if (defmgmtkey && !new)
			__ieee80211_set_default_mgmt_key(sdata, -1);
292 293

		rcu_assign_pointer(sdata->keys[idx], new);
294 295 296 297 298 299
		if (defunikey && new)
			__ieee80211_set_default_key(sdata, new->conf.keyidx,
						    true, false);
		if (defmultikey && new)
			__ieee80211_set_default_key(sdata, new->conf.keyidx,
						    false, true);
300 301 302
		if (defmgmtkey && new)
			__ieee80211_set_default_mgmt_key(sdata,
							 new->conf.keyidx);
303 304
	}

305 306
	if (old)
		list_del(&old->list);
J
Johannes Berg 已提交
307 308
}

309
struct ieee80211_key *ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
310 311
					  const u8 *key_data,
					  size_t seq_len, const u8 *seq)
312 313
{
	struct ieee80211_key *key;
314
	int i, j, err;
315

316
	BUG_ON(idx < 0 || idx >= NUM_DEFAULT_KEYS + NUM_DEFAULT_MGMT_KEYS);
J
Johannes Berg 已提交
317 318

	key = kzalloc(sizeof(struct ieee80211_key) + key_len, GFP_KERNEL);
319
	if (!key)
320
		return ERR_PTR(-ENOMEM);
J
Johannes Berg 已提交
321 322 323 324 325 326 327 328

	/*
	 * Default to software encryption; we'll later upload the
	 * key to the hardware if possible.
	 */
	key->conf.flags = 0;
	key->flags = 0;

329
	key->conf.cipher = cipher;
J
Johannes Berg 已提交
330 331
	key->conf.keyidx = idx;
	key->conf.keylen = key_len;
332 333 334
	switch (cipher) {
	case WLAN_CIPHER_SUITE_WEP40:
	case WLAN_CIPHER_SUITE_WEP104:
335 336 337
		key->conf.iv_len = WEP_IV_LEN;
		key->conf.icv_len = WEP_ICV_LEN;
		break;
338
	case WLAN_CIPHER_SUITE_TKIP:
339 340
		key->conf.iv_len = TKIP_IV_LEN;
		key->conf.icv_len = TKIP_ICV_LEN;
341
		if (seq) {
342
			for (i = 0; i < IEEE80211_NUM_TIDS; i++) {
343 344 345 346 347 348
				key->u.tkip.rx[i].iv32 =
					get_unaligned_le32(&seq[2]);
				key->u.tkip.rx[i].iv16 =
					get_unaligned_le16(seq);
			}
		}
349
		spin_lock_init(&key->u.tkip.txlock);
350
		break;
351
	case WLAN_CIPHER_SUITE_CCMP:
352 353
		key->conf.iv_len = CCMP_HDR_LEN;
		key->conf.icv_len = CCMP_MIC_LEN;
354
		if (seq) {
355
			for (i = 0; i < IEEE80211_NUM_TIDS + 1; i++)
356 357 358 359
				for (j = 0; j < CCMP_PN_LEN; j++)
					key->u.ccmp.rx_pn[i][j] =
						seq[CCMP_PN_LEN - j - 1];
		}
J
Johannes Berg 已提交
360 361 362 363 364
		/*
		 * Initialize AES key state here as an optimization so that
		 * it does not need to be initialized for every packet.
		 */
		key->u.ccmp.tfm = ieee80211_aes_key_setup_encrypt(key_data);
365 366
		if (IS_ERR(key->u.ccmp.tfm)) {
			err = PTR_ERR(key->u.ccmp.tfm);
367
			kfree(key);
368
			return ERR_PTR(err);
J
Johannes Berg 已提交
369
		}
J
Johannes Berg 已提交
370 371 372 373 374
		break;
	case WLAN_CIPHER_SUITE_AES_CMAC:
		key->conf.iv_len = 0;
		key->conf.icv_len = sizeof(struct ieee80211_mmie);
		if (seq)
J
Johannes Berg 已提交
375 376 377
			for (j = 0; j < CMAC_PN_LEN; j++)
				key->u.aes_cmac.rx_pn[j] =
					seq[CMAC_PN_LEN - j - 1];
378 379 380 381 382 383
		/*
		 * Initialize AES key state here as an optimization so that
		 * it does not need to be initialized for every packet.
		 */
		key->u.aes_cmac.tfm =
			ieee80211_aes_cmac_key_setup(key_data);
384 385
		if (IS_ERR(key->u.aes_cmac.tfm)) {
			err = PTR_ERR(key->u.aes_cmac.tfm);
386
			kfree(key);
387
			return ERR_PTR(err);
388
		}
J
Johannes Berg 已提交
389
		break;
390
	}
J
Johannes Berg 已提交
391 392
	memcpy(key->conf.key, key_data, key_len);
	INIT_LIST_HEAD(&key->list);
393

394 395
	return key;
}
J
Johannes Berg 已提交
396

J
Johannes Berg 已提交
397 398 399 400 401
static void __ieee80211_key_destroy(struct ieee80211_key *key)
{
	if (!key)
		return;

402 403 404 405
	/*
	 * Synchronize so the TX path can no longer be using
	 * this key before we free/remove it.
	 */
406
	synchronize_net();
407

408 409
	if (key->local)
		ieee80211_key_disable_hw_accel(key);
J
Johannes Berg 已提交
410

411
	if (key->conf.cipher == WLAN_CIPHER_SUITE_CCMP)
J
Johannes Berg 已提交
412
		ieee80211_aes_key_free(key->u.ccmp.tfm);
413
	if (key->conf.cipher == WLAN_CIPHER_SUITE_AES_CMAC)
J
Johannes Berg 已提交
414
		ieee80211_aes_cmac_key_free(key->u.aes_cmac.tfm);
415
	if (key->local) {
416
		ieee80211_debugfs_key_remove(key);
417 418
		key->sdata->crypto_tx_tailroom_needed_cnt--;
	}
J
Johannes Berg 已提交
419 420 421 422

	kfree(key);
}

423 424 425
int ieee80211_key_link(struct ieee80211_key *key,
		       struct ieee80211_sub_if_data *sdata,
		       struct sta_info *sta)
426 427
{
	struct ieee80211_key *old_key;
428
	int idx, ret;
429
	bool pairwise;
430 431 432 433

	BUG_ON(!sdata);
	BUG_ON(!key);

434
	pairwise = key->conf.flags & IEEE80211_KEY_FLAG_PAIRWISE;
435 436 437 438 439
	idx = key->conf.keyidx;
	key->local = sdata->local;
	key->sdata = sdata;
	key->sta = sta;

J
Johannes Berg 已提交
440 441 442 443 444
	if (sta) {
		/*
		 * some hardware cannot handle TKIP with QoS, so
		 * we indicate whether QoS could be in use.
		 */
J
Johannes Berg 已提交
445
		if (test_sta_flag(sta, WLAN_STA_WME))
J
Johannes Berg 已提交
446 447
			key->conf.flags |= IEEE80211_KEY_FLAG_WMM_STA;
	} else {
448
		if (sdata->vif.type == NL80211_IFTYPE_STATION) {
J
Johannes Berg 已提交
449 450
			struct sta_info *ap;

451
			/*
452 453
			 * We're getting a sta pointer in, so must be under
			 * appropriate locking for sta_info_get().
454
			 */
455

J
Johannes Berg 已提交
456
			/* same here, the AP could be using QoS */
457
			ap = sta_info_get(key->sdata, key->sdata->u.mgd.bssid);
J
Johannes Berg 已提交
458
			if (ap) {
J
Johannes Berg 已提交
459
				if (test_sta_flag(ap, WLAN_STA_WME))
J
Johannes Berg 已提交
460 461 462 463 464 465
					key->conf.flags |=
						IEEE80211_KEY_FLAG_WMM_STA;
			}
		}
	}

J
Johannes Berg 已提交
466
	mutex_lock(&sdata->local->key_mtx);
467

468
	if (sta && pairwise)
J
Johannes Berg 已提交
469
		old_key = key_mtx_dereference(sdata->local, sta->ptk);
470
	else if (sta)
J
Johannes Berg 已提交
471
		old_key = key_mtx_dereference(sdata->local, sta->gtk[idx]);
472
	else
J
Johannes Berg 已提交
473
		old_key = key_mtx_dereference(sdata->local, sdata->keys[idx]);
474

475 476
	increment_tailroom_need_count(sdata);

477
	__ieee80211_key_replace(sdata, sta, pairwise, old_key, key);
J
Johannes Berg 已提交
478
	__ieee80211_key_destroy(old_key);
479

J
Johannes Berg 已提交
480
	ieee80211_debugfs_key_add(key);
481

482
	ret = ieee80211_key_enable_hw_accel(key);
J
Johannes Berg 已提交
483

J
Johannes Berg 已提交
484
	mutex_unlock(&sdata->local->key_mtx);
485 486

	return ret;
487 488
}

489
void __ieee80211_key_free(struct ieee80211_key *key)
490
{
491 492 493
	if (!key)
		return;

494 495 496
	/*
	 * Replace key with nothingness if it was ever used.
	 */
J
Johannes Berg 已提交
497
	if (key->sdata)
498
		__ieee80211_key_replace(key->sdata, key->sta,
499 500
				key->conf.flags & IEEE80211_KEY_FLAG_PAIRWISE,
				key, NULL);
J
Johannes Berg 已提交
501
	__ieee80211_key_destroy(key);
502
}
503

504 505
void ieee80211_key_free(struct ieee80211_local *local,
			struct ieee80211_key *key)
506
{
J
Johannes Berg 已提交
507
	mutex_lock(&local->key_mtx);
J
Johannes Berg 已提交
508
	__ieee80211_key_free(key);
J
Johannes Berg 已提交
509
	mutex_unlock(&local->key_mtx);
J
Johannes Berg 已提交
510 511
}

J
Johannes Berg 已提交
512
void ieee80211_enable_keys(struct ieee80211_sub_if_data *sdata)
J
Johannes Berg 已提交
513 514
{
	struct ieee80211_key *key;
J
Johannes Berg 已提交
515

J
Johannes Berg 已提交
516
	ASSERT_RTNL();
J
Johannes Berg 已提交
517

518
	if (WARN_ON(!ieee80211_sdata_running(sdata)))
J
Johannes Berg 已提交
519
		return;
J
Johannes Berg 已提交
520

J
Johannes Berg 已提交
521
	mutex_lock(&sdata->local->key_mtx);
J
Johannes Berg 已提交
522

523 524 525 526
	sdata->crypto_tx_tailroom_needed_cnt = 0;

	list_for_each_entry(key, &sdata->key_list, list) {
		increment_tailroom_need_count(sdata);
J
Johannes Berg 已提交
527
		ieee80211_key_enable_hw_accel(key);
528
	}
529

J
Johannes Berg 已提交
530
	mutex_unlock(&sdata->local->key_mtx);
J
Johannes Berg 已提交
531 532
}

533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565
void ieee80211_iter_keys(struct ieee80211_hw *hw,
			 struct ieee80211_vif *vif,
			 void (*iter)(struct ieee80211_hw *hw,
				      struct ieee80211_vif *vif,
				      struct ieee80211_sta *sta,
				      struct ieee80211_key_conf *key,
				      void *data),
			 void *iter_data)
{
	struct ieee80211_local *local = hw_to_local(hw);
	struct ieee80211_key *key;
	struct ieee80211_sub_if_data *sdata;

	ASSERT_RTNL();

	mutex_lock(&local->key_mtx);
	if (vif) {
		sdata = vif_to_sdata(vif);
		list_for_each_entry(key, &sdata->key_list, list)
			iter(hw, &sdata->vif,
			     key->sta ? &key->sta->sta : NULL,
			     &key->conf, iter_data);
	} else {
		list_for_each_entry(sdata, &local->interfaces, list)
			list_for_each_entry(key, &sdata->key_list, list)
				iter(hw, &sdata->vif,
				     key->sta ? &key->sta->sta : NULL,
				     &key->conf, iter_data);
	}
	mutex_unlock(&local->key_mtx);
}
EXPORT_SYMBOL(ieee80211_iter_keys);

J
Johannes Berg 已提交
566
void ieee80211_disable_keys(struct ieee80211_sub_if_data *sdata)
J
Johannes Berg 已提交
567 568 569
{
	struct ieee80211_key *key;

J
Johannes Berg 已提交
570
	ASSERT_RTNL();
571

J
Johannes Berg 已提交
572
	mutex_lock(&sdata->local->key_mtx);
J
Johannes Berg 已提交
573

J
Johannes Berg 已提交
574 575
	list_for_each_entry(key, &sdata->key_list, list)
		ieee80211_key_disable_hw_accel(key);
J
Johannes Berg 已提交
576

J
Johannes Berg 已提交
577
	mutex_unlock(&sdata->local->key_mtx);
578
}
J
Johannes Berg 已提交
579

580 581 582
void ieee80211_free_keys(struct ieee80211_sub_if_data *sdata)
{
	struct ieee80211_key *key, *tmp;
583

J
Johannes Berg 已提交
584
	mutex_lock(&sdata->local->key_mtx);
585

586
	ieee80211_debugfs_key_remove_mgmt_default(sdata);
587 588

	list_for_each_entry_safe(key, tmp, &sdata->key_list, list)
J
Johannes Berg 已提交
589
		__ieee80211_key_free(key);
590

591 592
	ieee80211_debugfs_key_update_default(sdata);

J
Johannes Berg 已提交
593
	mutex_unlock(&sdata->local->key_mtx);
J
Johannes Berg 已提交
594
}
595 596 597 598 599 600 601 602 603 604 605 606


void ieee80211_gtk_rekey_notify(struct ieee80211_vif *vif, const u8 *bssid,
				const u8 *replay_ctr, gfp_t gfp)
{
	struct ieee80211_sub_if_data *sdata = vif_to_sdata(vif);

	trace_api_gtk_rekey_notify(sdata, bssid, replay_ctr);

	cfg80211_gtk_rekey_notify(sdata->dev, bssid, replay_ctr, gfp);
}
EXPORT_SYMBOL_GPL(ieee80211_gtk_rekey_notify);
607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657

void ieee80211_get_key_tx_seq(struct ieee80211_key_conf *keyconf,
			      struct ieee80211_key_seq *seq)
{
	struct ieee80211_key *key;
	u64 pn64;

	if (WARN_ON(!(keyconf->flags & IEEE80211_KEY_FLAG_GENERATE_IV)))
		return;

	key = container_of(keyconf, struct ieee80211_key, conf);

	switch (key->conf.cipher) {
	case WLAN_CIPHER_SUITE_TKIP:
		seq->tkip.iv32 = key->u.tkip.tx.iv32;
		seq->tkip.iv16 = key->u.tkip.tx.iv16;
		break;
	case WLAN_CIPHER_SUITE_CCMP:
		pn64 = atomic64_read(&key->u.ccmp.tx_pn);
		seq->ccmp.pn[5] = pn64;
		seq->ccmp.pn[4] = pn64 >> 8;
		seq->ccmp.pn[3] = pn64 >> 16;
		seq->ccmp.pn[2] = pn64 >> 24;
		seq->ccmp.pn[1] = pn64 >> 32;
		seq->ccmp.pn[0] = pn64 >> 40;
		break;
	case WLAN_CIPHER_SUITE_AES_CMAC:
		pn64 = atomic64_read(&key->u.aes_cmac.tx_pn);
		seq->ccmp.pn[5] = pn64;
		seq->ccmp.pn[4] = pn64 >> 8;
		seq->ccmp.pn[3] = pn64 >> 16;
		seq->ccmp.pn[2] = pn64 >> 24;
		seq->ccmp.pn[1] = pn64 >> 32;
		seq->ccmp.pn[0] = pn64 >> 40;
		break;
	default:
		WARN_ON(1);
	}
}
EXPORT_SYMBOL(ieee80211_get_key_tx_seq);

void ieee80211_get_key_rx_seq(struct ieee80211_key_conf *keyconf,
			      int tid, struct ieee80211_key_seq *seq)
{
	struct ieee80211_key *key;
	const u8 *pn;

	key = container_of(keyconf, struct ieee80211_key, conf);

	switch (key->conf.cipher) {
	case WLAN_CIPHER_SUITE_TKIP:
658
		if (WARN_ON(tid < 0 || tid >= IEEE80211_NUM_TIDS))
659 660 661 662 663
			return;
		seq->tkip.iv32 = key->u.tkip.rx[tid].iv32;
		seq->tkip.iv16 = key->u.tkip.rx[tid].iv16;
		break;
	case WLAN_CIPHER_SUITE_CCMP:
664
		if (WARN_ON(tid < -1 || tid >= IEEE80211_NUM_TIDS))
665 666
			return;
		if (tid < 0)
667
			pn = key->u.ccmp.rx_pn[IEEE80211_NUM_TIDS];
668 669 670 671 672 673 674 675 676 677 678 679 680
		else
			pn = key->u.ccmp.rx_pn[tid];
		memcpy(seq->ccmp.pn, pn, CCMP_PN_LEN);
		break;
	case WLAN_CIPHER_SUITE_AES_CMAC:
		if (WARN_ON(tid != 0))
			return;
		pn = key->u.aes_cmac.rx_pn;
		memcpy(seq->aes_cmac.pn, pn, CMAC_PN_LEN);
		break;
	}
}
EXPORT_SYMBOL(ieee80211_get_key_rx_seq);