key.c 17.5 KB
Newer Older
1 2 3 4
/*
 * Copyright 2002-2005, Instant802 Networks, Inc.
 * Copyright 2005-2006, Devicescape Software, Inc.
 * Copyright 2006-2007	Jiri Benc <jbenc@suse.cz>
5
 * Copyright 2007-2008	Johannes Berg <johannes@sipsolutions.net>
6 7 8 9 10 11
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
 */

J
Johannes Berg 已提交
12 13 14
#include <linux/if_ether.h>
#include <linux/etherdevice.h>
#include <linux/list.h>
15
#include <linux/rcupdate.h>
16
#include <linux/rtnetlink.h>
17
#include <linux/slab.h>
18
#include <linux/export.h>
19
#include <net/mac80211.h>
20
#include <asm/unaligned.h>
21
#include "ieee80211_i.h"
22
#include "driver-ops.h"
23 24
#include "debugfs_key.h"
#include "aes_ccm.h"
25
#include "aes_cmac.h"
26

J
Johannes Berg 已提交
27

J
Johannes Berg 已提交
28 29
/**
 * DOC: Key handling basics
J
Johannes Berg 已提交
30 31 32 33 34
 *
 * Key handling in mac80211 is done based on per-interface (sub_if_data)
 * keys and per-station keys. Since each station belongs to an interface,
 * each station key also belongs to that interface.
 *
35 36 37 38 39 40 41
 * Hardware acceleration is done on a best-effort basis for algorithms
 * that are implemented in software,  for each key the hardware is asked
 * to enable that key for offloading but if it cannot do that the key is
 * simply kept for software encryption (unless it is for an algorithm
 * that isn't implemented in software).
 * There is currently no way of knowing whether a key is handled in SW
 * or HW except by looking into debugfs.
J
Johannes Berg 已提交
42
 *
43 44 45 46 47 48
 * All key management is internally protected by a mutex. Within all
 * other parts of mac80211, key references are, just as STA structure
 * references, protected by RCU. Note, however, that some things are
 * unprotected, namely the key->sta dereferences within the hardware
 * acceleration functions. This means that sta_info_destroy() must
 * remove the key which waits for an RCU grace period.
J
Johannes Berg 已提交
49 50 51 52
 */

static const u8 bcast_addr[ETH_ALEN] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };

J
Johannes Berg 已提交
53
static void assert_key_lock(struct ieee80211_local *local)
54
{
55
	lockdep_assert_held(&local->key_mtx);
56 57
}

58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87
static void increment_tailroom_need_count(struct ieee80211_sub_if_data *sdata)
{
	/*
	 * When this count is zero, SKB resizing for allocating tailroom
	 * for IV or MMIC is skipped. But, this check has created two race
	 * cases in xmit path while transiting from zero count to one:
	 *
	 * 1. SKB resize was skipped because no key was added but just before
	 * the xmit key is added and SW encryption kicks off.
	 *
	 * 2. SKB resize was skipped because all the keys were hw planted but
	 * just before xmit one of the key is deleted and SW encryption kicks
	 * off.
	 *
	 * In both the above case SW encryption will find not enough space for
	 * tailroom and exits with WARN_ON. (See WARN_ONs at wpa.c)
	 *
	 * Solution has been explained at
	 * http://mid.gmane.org/1308590980.4322.19.camel@jlt3.sipsolutions.net
	 */

	if (!sdata->crypto_tx_tailroom_needed_cnt++) {
		/*
		 * Flush all XMIT packets currently using HW encryption or no
		 * encryption at all if the count transition is from 0 -> 1.
		 */
		synchronize_net();
	}
}

88
static int ieee80211_key_enable_hw_accel(struct ieee80211_key *key)
J
Johannes Berg 已提交
89
{
90
	struct ieee80211_sub_if_data *sdata;
91
	struct sta_info *sta;
J
Johannes Berg 已提交
92 93
	int ret;

94 95
	might_sleep();

96
	if (!key->local->ops->set_key)
97
		goto out_unsupported;
J
Johannes Berg 已提交
98

J
Johannes Berg 已提交
99 100
	assert_key_lock(key->local);

101
	sta = key->sta;
102

103 104 105 106 107 108 109 110
	/*
	 * If this is a per-STA GTK, check if it
	 * is supported; if not, return.
	 */
	if (sta && !(key->conf.flags & IEEE80211_KEY_FLAG_PAIRWISE) &&
	    !(key->local->hw.flags & IEEE80211_HW_SUPPORTS_PER_STA_GTK))
		goto out_unsupported;

111 112 113
	if (sta && !sta->uploaded)
		goto out_unsupported;

114
	sdata = key->sdata;
115 116 117 118 119 120 121 122
	if (sdata->vif.type == NL80211_IFTYPE_AP_VLAN) {
		/*
		 * The driver doesn't know anything about VLAN interfaces.
		 * Hence, don't send GTKs for VLAN interfaces to the driver.
		 */
		if (!(key->conf.flags & IEEE80211_KEY_FLAG_PAIRWISE))
			goto out_unsupported;
	}
J
Johannes Berg 已提交
123

124 125
	ret = drv_set_key(key->local, SET_KEY, sdata,
			  sta ? &sta->sta : NULL, &key->conf);
J
Johannes Berg 已提交
126

127
	if (!ret) {
J
Johannes Berg 已提交
128
		key->flags |= KEY_FLAG_UPLOADED_TO_HARDWARE;
129 130

		if (!((key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_MMIC) ||
131 132
		      (key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_IV) ||
		      (key->conf.flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE)))
133 134
			sdata->crypto_tx_tailroom_needed_cnt--;

135 136 137
		WARN_ON((key->conf.flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE) &&
			(key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_IV));

138 139
		return 0;
	}
J
Johannes Berg 已提交
140

141
	if (ret != -ENOSPC && ret != -EOPNOTSUPP)
J
Johannes Berg 已提交
142
		sdata_err(sdata,
J
Joe Perches 已提交
143
			  "failed to set key (%d, %pM) to hardware (%d)\n",
144 145
			  key->conf.keyidx,
			  sta ? sta->sta.addr : bcast_addr, ret);
146

147 148 149 150 151 152 153 154 155 156 157
 out_unsupported:
	switch (key->conf.cipher) {
	case WLAN_CIPHER_SUITE_WEP40:
	case WLAN_CIPHER_SUITE_WEP104:
	case WLAN_CIPHER_SUITE_TKIP:
	case WLAN_CIPHER_SUITE_CCMP:
	case WLAN_CIPHER_SUITE_AES_CMAC:
		/* all of these we can do in software */
		return 0;
	default:
		return -EINVAL;
158
	}
J
Johannes Berg 已提交
159 160 161 162
}

static void ieee80211_key_disable_hw_accel(struct ieee80211_key *key)
{
163
	struct ieee80211_sub_if_data *sdata;
164
	struct sta_info *sta;
J
Johannes Berg 已提交
165 166
	int ret;

167 168
	might_sleep();

169
	if (!key || !key->local->ops->set_key)
J
Johannes Berg 已提交
170 171
		return;

J
Johannes Berg 已提交
172 173 174
	assert_key_lock(key->local);

	if (!(key->flags & KEY_FLAG_UPLOADED_TO_HARDWARE))
J
Johannes Berg 已提交
175 176
		return;

177
	sta = key->sta;
178 179
	sdata = key->sdata;

180
	if (!((key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_MMIC) ||
181 182
	      (key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_IV) ||
	      (key->conf.flags & IEEE80211_KEY_FLAG_PUT_IV_SPACE)))
183 184
		increment_tailroom_need_count(sdata);

J
Johannes Berg 已提交
185
	ret = drv_set_key(key->local, DISABLE_KEY, sdata,
186
			  sta ? &sta->sta : NULL, &key->conf);
J
Johannes Berg 已提交
187 188

	if (ret)
J
Johannes Berg 已提交
189
		sdata_err(sdata,
J
Joe Perches 已提交
190
			  "failed to remove key (%d, %pM) from hardware (%d)\n",
191 192
			  key->conf.keyidx,
			  sta ? sta->sta.addr : bcast_addr, ret);
J
Johannes Berg 已提交
193

194 195 196 197
	key->flags &= ~KEY_FLAG_UPLOADED_TO_HARDWARE;
}

static void __ieee80211_set_default_key(struct ieee80211_sub_if_data *sdata,
198
					int idx, bool uni, bool multi)
199 200 201
{
	struct ieee80211_key *key = NULL;

J
Johannes Berg 已提交
202 203
	assert_key_lock(sdata->local);

204
	if (idx >= 0 && idx < NUM_DEFAULT_KEYS)
J
Johannes Berg 已提交
205
		key = key_mtx_dereference(sdata->local, sdata->keys[idx]);
206

207 208 209 210
	if (uni)
		rcu_assign_pointer(sdata->default_unicast_key, key);
	if (multi)
		rcu_assign_pointer(sdata->default_multicast_key, key);
211

212
	ieee80211_debugfs_key_update_default(sdata);
213 214
}

215 216
void ieee80211_set_default_key(struct ieee80211_sub_if_data *sdata, int idx,
			       bool uni, bool multi)
217
{
J
Johannes Berg 已提交
218
	mutex_lock(&sdata->local->key_mtx);
219
	__ieee80211_set_default_key(sdata, idx, uni, multi);
J
Johannes Berg 已提交
220
	mutex_unlock(&sdata->local->key_mtx);
221 222
}

223 224 225 226 227
static void
__ieee80211_set_default_mgmt_key(struct ieee80211_sub_if_data *sdata, int idx)
{
	struct ieee80211_key *key = NULL;

J
Johannes Berg 已提交
228 229
	assert_key_lock(sdata->local);

230 231
	if (idx >= NUM_DEFAULT_KEYS &&
	    idx < NUM_DEFAULT_KEYS + NUM_DEFAULT_MGMT_KEYS)
J
Johannes Berg 已提交
232
		key = key_mtx_dereference(sdata->local, sdata->keys[idx]);
233 234 235

	rcu_assign_pointer(sdata->default_mgmt_key, key);

236
	ieee80211_debugfs_key_update_default(sdata);
237 238 239 240 241
}

void ieee80211_set_default_mgmt_key(struct ieee80211_sub_if_data *sdata,
				    int idx)
{
J
Johannes Berg 已提交
242
	mutex_lock(&sdata->local->key_mtx);
243
	__ieee80211_set_default_mgmt_key(sdata, idx);
J
Johannes Berg 已提交
244
	mutex_unlock(&sdata->local->key_mtx);
245 246
}

247 248 249

static void __ieee80211_key_replace(struct ieee80211_sub_if_data *sdata,
				    struct sta_info *sta,
250
				    bool pairwise,
251 252 253
				    struct ieee80211_key *old,
				    struct ieee80211_key *new)
{
254 255
	int idx;
	bool defunikey, defmultikey, defmgmtkey;
256 257

	if (new)
258
		list_add_tail(&new->list, &sdata->key_list);
259

260 261 262 263 264 265 266 267
	if (sta && pairwise) {
		rcu_assign_pointer(sta->ptk, new);
	} else if (sta) {
		if (old)
			idx = old->conf.keyidx;
		else
			idx = new->conf.keyidx;
		rcu_assign_pointer(sta->gtk[idx], new);
268 269 270 271 272 273 274 275
	} else {
		WARN_ON(new && old && new->conf.keyidx != old->conf.keyidx);

		if (old)
			idx = old->conf.keyidx;
		else
			idx = new->conf.keyidx;

J
Johannes Berg 已提交
276 277 278 279 280 281 282 283 284
		defunikey = old &&
			old == key_mtx_dereference(sdata->local,
						sdata->default_unicast_key);
		defmultikey = old &&
			old == key_mtx_dereference(sdata->local,
						sdata->default_multicast_key);
		defmgmtkey = old &&
			old == key_mtx_dereference(sdata->local,
						sdata->default_mgmt_key);
285

286 287 288 289
		if (defunikey && !new)
			__ieee80211_set_default_key(sdata, -1, true, false);
		if (defmultikey && !new)
			__ieee80211_set_default_key(sdata, -1, false, true);
290 291
		if (defmgmtkey && !new)
			__ieee80211_set_default_mgmt_key(sdata, -1);
292 293

		rcu_assign_pointer(sdata->keys[idx], new);
294 295 296 297 298 299
		if (defunikey && new)
			__ieee80211_set_default_key(sdata, new->conf.keyidx,
						    true, false);
		if (defmultikey && new)
			__ieee80211_set_default_key(sdata, new->conf.keyidx,
						    false, true);
300 301 302
		if (defmgmtkey && new)
			__ieee80211_set_default_mgmt_key(sdata,
							 new->conf.keyidx);
303 304
	}

305 306
	if (old)
		list_del(&old->list);
J
Johannes Berg 已提交
307 308
}

309
struct ieee80211_key *ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
310 311
					  const u8 *key_data,
					  size_t seq_len, const u8 *seq)
312 313
{
	struct ieee80211_key *key;
314
	int i, j, err;
315

316
	BUG_ON(idx < 0 || idx >= NUM_DEFAULT_KEYS + NUM_DEFAULT_MGMT_KEYS);
J
Johannes Berg 已提交
317 318

	key = kzalloc(sizeof(struct ieee80211_key) + key_len, GFP_KERNEL);
319
	if (!key)
320
		return ERR_PTR(-ENOMEM);
J
Johannes Berg 已提交
321 322 323 324 325 326 327 328

	/*
	 * Default to software encryption; we'll later upload the
	 * key to the hardware if possible.
	 */
	key->conf.flags = 0;
	key->flags = 0;

329
	key->conf.cipher = cipher;
J
Johannes Berg 已提交
330 331
	key->conf.keyidx = idx;
	key->conf.keylen = key_len;
332 333 334
	switch (cipher) {
	case WLAN_CIPHER_SUITE_WEP40:
	case WLAN_CIPHER_SUITE_WEP104:
335 336 337
		key->conf.iv_len = WEP_IV_LEN;
		key->conf.icv_len = WEP_ICV_LEN;
		break;
338
	case WLAN_CIPHER_SUITE_TKIP:
339 340
		key->conf.iv_len = TKIP_IV_LEN;
		key->conf.icv_len = TKIP_ICV_LEN;
341
		if (seq) {
342 343 344 345 346 347 348
			for (i = 0; i < NUM_RX_DATA_QUEUES; i++) {
				key->u.tkip.rx[i].iv32 =
					get_unaligned_le32(&seq[2]);
				key->u.tkip.rx[i].iv16 =
					get_unaligned_le16(seq);
			}
		}
349
		spin_lock_init(&key->u.tkip.txlock);
350
		break;
351
	case WLAN_CIPHER_SUITE_CCMP:
352 353
		key->conf.iv_len = CCMP_HDR_LEN;
		key->conf.icv_len = CCMP_MIC_LEN;
354
		if (seq) {
355
			for (i = 0; i < NUM_RX_DATA_QUEUES + 1; i++)
356 357 358 359
				for (j = 0; j < CCMP_PN_LEN; j++)
					key->u.ccmp.rx_pn[i][j] =
						seq[CCMP_PN_LEN - j - 1];
		}
J
Johannes Berg 已提交
360 361 362 363 364
		/*
		 * Initialize AES key state here as an optimization so that
		 * it does not need to be initialized for every packet.
		 */
		key->u.ccmp.tfm = ieee80211_aes_key_setup_encrypt(key_data);
365 366
		if (IS_ERR(key->u.ccmp.tfm)) {
			err = PTR_ERR(key->u.ccmp.tfm);
367
			kfree(key);
368
			return ERR_PTR(err);
J
Johannes Berg 已提交
369
		}
J
Johannes Berg 已提交
370 371 372 373 374 375 376
		break;
	case WLAN_CIPHER_SUITE_AES_CMAC:
		key->conf.iv_len = 0;
		key->conf.icv_len = sizeof(struct ieee80211_mmie);
		if (seq)
			for (j = 0; j < 6; j++)
				key->u.aes_cmac.rx_pn[j] = seq[6 - j - 1];
377 378 379 380 381 382
		/*
		 * Initialize AES key state here as an optimization so that
		 * it does not need to be initialized for every packet.
		 */
		key->u.aes_cmac.tfm =
			ieee80211_aes_cmac_key_setup(key_data);
383 384
		if (IS_ERR(key->u.aes_cmac.tfm)) {
			err = PTR_ERR(key->u.aes_cmac.tfm);
385
			kfree(key);
386
			return ERR_PTR(err);
387
		}
J
Johannes Berg 已提交
388
		break;
389
	}
J
Johannes Berg 已提交
390 391
	memcpy(key->conf.key, key_data, key_len);
	INIT_LIST_HEAD(&key->list);
392

393 394
	return key;
}
J
Johannes Berg 已提交
395

J
Johannes Berg 已提交
396 397 398 399 400
static void __ieee80211_key_destroy(struct ieee80211_key *key)
{
	if (!key)
		return;

401 402 403 404 405 406
	/*
	 * Synchronize so the TX path can no longer be using
	 * this key before we free/remove it.
	 */
	synchronize_rcu();

407 408
	if (key->local)
		ieee80211_key_disable_hw_accel(key);
J
Johannes Berg 已提交
409

410
	if (key->conf.cipher == WLAN_CIPHER_SUITE_CCMP)
J
Johannes Berg 已提交
411
		ieee80211_aes_key_free(key->u.ccmp.tfm);
412
	if (key->conf.cipher == WLAN_CIPHER_SUITE_AES_CMAC)
J
Johannes Berg 已提交
413
		ieee80211_aes_cmac_key_free(key->u.aes_cmac.tfm);
414
	if (key->local) {
415
		ieee80211_debugfs_key_remove(key);
416 417
		key->sdata->crypto_tx_tailroom_needed_cnt--;
	}
J
Johannes Berg 已提交
418 419 420 421

	kfree(key);
}

422 423 424
int ieee80211_key_link(struct ieee80211_key *key,
		       struct ieee80211_sub_if_data *sdata,
		       struct sta_info *sta)
425 426
{
	struct ieee80211_key *old_key;
427
	int idx, ret;
428
	bool pairwise;
429 430 431 432

	BUG_ON(!sdata);
	BUG_ON(!key);

433
	pairwise = key->conf.flags & IEEE80211_KEY_FLAG_PAIRWISE;
434 435 436 437 438
	idx = key->conf.keyidx;
	key->local = sdata->local;
	key->sdata = sdata;
	key->sta = sta;

J
Johannes Berg 已提交
439 440 441 442 443
	if (sta) {
		/*
		 * some hardware cannot handle TKIP with QoS, so
		 * we indicate whether QoS could be in use.
		 */
J
Johannes Berg 已提交
444
		if (test_sta_flag(sta, WLAN_STA_WME))
J
Johannes Berg 已提交
445 446
			key->conf.flags |= IEEE80211_KEY_FLAG_WMM_STA;
	} else {
447
		if (sdata->vif.type == NL80211_IFTYPE_STATION) {
J
Johannes Berg 已提交
448 449
			struct sta_info *ap;

450
			/*
451 452
			 * We're getting a sta pointer in, so must be under
			 * appropriate locking for sta_info_get().
453
			 */
454

J
Johannes Berg 已提交
455
			/* same here, the AP could be using QoS */
456
			ap = sta_info_get(key->sdata, key->sdata->u.mgd.bssid);
J
Johannes Berg 已提交
457
			if (ap) {
J
Johannes Berg 已提交
458
				if (test_sta_flag(ap, WLAN_STA_WME))
J
Johannes Berg 已提交
459 460 461 462 463 464
					key->conf.flags |=
						IEEE80211_KEY_FLAG_WMM_STA;
			}
		}
	}

J
Johannes Berg 已提交
465
	mutex_lock(&sdata->local->key_mtx);
466

467
	if (sta && pairwise)
J
Johannes Berg 已提交
468
		old_key = key_mtx_dereference(sdata->local, sta->ptk);
469
	else if (sta)
J
Johannes Berg 已提交
470
		old_key = key_mtx_dereference(sdata->local, sta->gtk[idx]);
471
	else
J
Johannes Berg 已提交
472
		old_key = key_mtx_dereference(sdata->local, sdata->keys[idx]);
473

474 475
	increment_tailroom_need_count(sdata);

476
	__ieee80211_key_replace(sdata, sta, pairwise, old_key, key);
J
Johannes Berg 已提交
477
	__ieee80211_key_destroy(old_key);
478

J
Johannes Berg 已提交
479
	ieee80211_debugfs_key_add(key);
480

481
	ret = ieee80211_key_enable_hw_accel(key);
J
Johannes Berg 已提交
482

J
Johannes Berg 已提交
483
	mutex_unlock(&sdata->local->key_mtx);
484 485

	return ret;
486 487
}

488
void __ieee80211_key_free(struct ieee80211_key *key)
489
{
490 491 492
	if (!key)
		return;

493 494 495
	/*
	 * Replace key with nothingness if it was ever used.
	 */
J
Johannes Berg 已提交
496
	if (key->sdata)
497
		__ieee80211_key_replace(key->sdata, key->sta,
498 499
				key->conf.flags & IEEE80211_KEY_FLAG_PAIRWISE,
				key, NULL);
J
Johannes Berg 已提交
500
	__ieee80211_key_destroy(key);
501
}
502

503 504
void ieee80211_key_free(struct ieee80211_local *local,
			struct ieee80211_key *key)
505
{
J
Johannes Berg 已提交
506
	mutex_lock(&local->key_mtx);
J
Johannes Berg 已提交
507
	__ieee80211_key_free(key);
J
Johannes Berg 已提交
508
	mutex_unlock(&local->key_mtx);
J
Johannes Berg 已提交
509 510
}

J
Johannes Berg 已提交
511
void ieee80211_enable_keys(struct ieee80211_sub_if_data *sdata)
J
Johannes Berg 已提交
512 513
{
	struct ieee80211_key *key;
J
Johannes Berg 已提交
514

J
Johannes Berg 已提交
515
	ASSERT_RTNL();
J
Johannes Berg 已提交
516

517
	if (WARN_ON(!ieee80211_sdata_running(sdata)))
J
Johannes Berg 已提交
518
		return;
J
Johannes Berg 已提交
519

J
Johannes Berg 已提交
520
	mutex_lock(&sdata->local->key_mtx);
J
Johannes Berg 已提交
521

522 523 524 525
	sdata->crypto_tx_tailroom_needed_cnt = 0;

	list_for_each_entry(key, &sdata->key_list, list) {
		increment_tailroom_need_count(sdata);
J
Johannes Berg 已提交
526
		ieee80211_key_enable_hw_accel(key);
527
	}
528

J
Johannes Berg 已提交
529
	mutex_unlock(&sdata->local->key_mtx);
J
Johannes Berg 已提交
530 531
}

532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564
void ieee80211_iter_keys(struct ieee80211_hw *hw,
			 struct ieee80211_vif *vif,
			 void (*iter)(struct ieee80211_hw *hw,
				      struct ieee80211_vif *vif,
				      struct ieee80211_sta *sta,
				      struct ieee80211_key_conf *key,
				      void *data),
			 void *iter_data)
{
	struct ieee80211_local *local = hw_to_local(hw);
	struct ieee80211_key *key;
	struct ieee80211_sub_if_data *sdata;

	ASSERT_RTNL();

	mutex_lock(&local->key_mtx);
	if (vif) {
		sdata = vif_to_sdata(vif);
		list_for_each_entry(key, &sdata->key_list, list)
			iter(hw, &sdata->vif,
			     key->sta ? &key->sta->sta : NULL,
			     &key->conf, iter_data);
	} else {
		list_for_each_entry(sdata, &local->interfaces, list)
			list_for_each_entry(key, &sdata->key_list, list)
				iter(hw, &sdata->vif,
				     key->sta ? &key->sta->sta : NULL,
				     &key->conf, iter_data);
	}
	mutex_unlock(&local->key_mtx);
}
EXPORT_SYMBOL(ieee80211_iter_keys);

J
Johannes Berg 已提交
565
void ieee80211_disable_keys(struct ieee80211_sub_if_data *sdata)
J
Johannes Berg 已提交
566 567 568
{
	struct ieee80211_key *key;

J
Johannes Berg 已提交
569
	ASSERT_RTNL();
570

J
Johannes Berg 已提交
571
	mutex_lock(&sdata->local->key_mtx);
J
Johannes Berg 已提交
572

J
Johannes Berg 已提交
573 574
	list_for_each_entry(key, &sdata->key_list, list)
		ieee80211_key_disable_hw_accel(key);
J
Johannes Berg 已提交
575

J
Johannes Berg 已提交
576
	mutex_unlock(&sdata->local->key_mtx);
577
}
J
Johannes Berg 已提交
578

579 580 581
void ieee80211_free_keys(struct ieee80211_sub_if_data *sdata)
{
	struct ieee80211_key *key, *tmp;
582

J
Johannes Berg 已提交
583
	mutex_lock(&sdata->local->key_mtx);
584

585
	ieee80211_debugfs_key_remove_mgmt_default(sdata);
586 587

	list_for_each_entry_safe(key, tmp, &sdata->key_list, list)
J
Johannes Berg 已提交
588
		__ieee80211_key_free(key);
589

590 591
	ieee80211_debugfs_key_update_default(sdata);

J
Johannes Berg 已提交
592
	mutex_unlock(&sdata->local->key_mtx);
J
Johannes Berg 已提交
593
}
594 595 596 597 598 599 600 601 602 603 604 605


void ieee80211_gtk_rekey_notify(struct ieee80211_vif *vif, const u8 *bssid,
				const u8 *replay_ctr, gfp_t gfp)
{
	struct ieee80211_sub_if_data *sdata = vif_to_sdata(vif);

	trace_api_gtk_rekey_notify(sdata, bssid, replay_ctr);

	cfg80211_gtk_rekey_notify(sdata->dev, bssid, replay_ctr, gfp);
}
EXPORT_SYMBOL_GPL(ieee80211_gtk_rekey_notify);
606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679

void ieee80211_get_key_tx_seq(struct ieee80211_key_conf *keyconf,
			      struct ieee80211_key_seq *seq)
{
	struct ieee80211_key *key;
	u64 pn64;

	if (WARN_ON(!(keyconf->flags & IEEE80211_KEY_FLAG_GENERATE_IV)))
		return;

	key = container_of(keyconf, struct ieee80211_key, conf);

	switch (key->conf.cipher) {
	case WLAN_CIPHER_SUITE_TKIP:
		seq->tkip.iv32 = key->u.tkip.tx.iv32;
		seq->tkip.iv16 = key->u.tkip.tx.iv16;
		break;
	case WLAN_CIPHER_SUITE_CCMP:
		pn64 = atomic64_read(&key->u.ccmp.tx_pn);
		seq->ccmp.pn[5] = pn64;
		seq->ccmp.pn[4] = pn64 >> 8;
		seq->ccmp.pn[3] = pn64 >> 16;
		seq->ccmp.pn[2] = pn64 >> 24;
		seq->ccmp.pn[1] = pn64 >> 32;
		seq->ccmp.pn[0] = pn64 >> 40;
		break;
	case WLAN_CIPHER_SUITE_AES_CMAC:
		pn64 = atomic64_read(&key->u.aes_cmac.tx_pn);
		seq->ccmp.pn[5] = pn64;
		seq->ccmp.pn[4] = pn64 >> 8;
		seq->ccmp.pn[3] = pn64 >> 16;
		seq->ccmp.pn[2] = pn64 >> 24;
		seq->ccmp.pn[1] = pn64 >> 32;
		seq->ccmp.pn[0] = pn64 >> 40;
		break;
	default:
		WARN_ON(1);
	}
}
EXPORT_SYMBOL(ieee80211_get_key_tx_seq);

void ieee80211_get_key_rx_seq(struct ieee80211_key_conf *keyconf,
			      int tid, struct ieee80211_key_seq *seq)
{
	struct ieee80211_key *key;
	const u8 *pn;

	key = container_of(keyconf, struct ieee80211_key, conf);

	switch (key->conf.cipher) {
	case WLAN_CIPHER_SUITE_TKIP:
		if (WARN_ON(tid < 0 || tid >= NUM_RX_DATA_QUEUES))
			return;
		seq->tkip.iv32 = key->u.tkip.rx[tid].iv32;
		seq->tkip.iv16 = key->u.tkip.rx[tid].iv16;
		break;
	case WLAN_CIPHER_SUITE_CCMP:
		if (WARN_ON(tid < -1 || tid >= NUM_RX_DATA_QUEUES))
			return;
		if (tid < 0)
			pn = key->u.ccmp.rx_pn[NUM_RX_DATA_QUEUES];
		else
			pn = key->u.ccmp.rx_pn[tid];
		memcpy(seq->ccmp.pn, pn, CCMP_PN_LEN);
		break;
	case WLAN_CIPHER_SUITE_AES_CMAC:
		if (WARN_ON(tid != 0))
			return;
		pn = key->u.aes_cmac.rx_pn;
		memcpy(seq->aes_cmac.pn, pn, CMAC_PN_LEN);
		break;
	}
}
EXPORT_SYMBOL(ieee80211_get_key_rx_seq);