lib80211_crypt_tkip.c 21.0 KB
Newer Older
J
Jeff Garzik 已提交
1
/*
2
 * lib80211 crypt: host-based TKIP encryption implementation for lib80211
J
Jeff Garzik 已提交
3
 *
4
 * Copyright (c) 2003-2004, Jouni Malinen <j@w1.fi>
5
 * Copyright (c) 2008, John W. Linville <linville@tuxdriver.com>
J
Jeff Garzik 已提交
6 7 8 9 10 11 12
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation. See README and COPYING for
 * more details.
 */

13
#include <linux/err.h>
J
Jeff Garzik 已提交
14 15 16 17
#include <linux/module.h>
#include <linux/init.h>
#include <linux/slab.h>
#include <linux/random.h>
18
#include <linux/scatterlist.h>
J
Jeff Garzik 已提交
19 20
#include <linux/skbuff.h>
#include <linux/netdevice.h>
A
Al Viro 已提交
21
#include <linux/mm.h>
J
Jeff Garzik 已提交
22 23 24 25
#include <linux/if_ether.h>
#include <linux/if_arp.h>
#include <asm/string.h>

26 27 28
#include <linux/wireless.h>
#include <linux/ieee80211.h>
#include <net/iw_handler.h>
J
Jeff Garzik 已提交
29 30 31 32

#include <linux/crypto.h>
#include <linux/crc32.h>

33 34
#include <net/lib80211.h>

J
Jeff Garzik 已提交
35
MODULE_AUTHOR("Jouni Malinen");
36
MODULE_DESCRIPTION("lib80211 crypt: TKIP");
J
Jeff Garzik 已提交
37 38
MODULE_LICENSE("GPL");

39
struct lib80211_tkip_data {
J
Jeff Garzik 已提交
40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61
#define TKIP_KEY_LEN 32
	u8 key[TKIP_KEY_LEN];
	int key_set;

	u32 tx_iv32;
	u16 tx_iv16;
	u16 tx_ttak[5];
	int tx_phase1_done;

	u32 rx_iv32;
	u16 rx_iv16;
	u16 rx_ttak[5];
	int rx_phase1_done;
	u32 rx_iv32_new;
	u16 rx_iv16_new;

	u32 dot11RSNAStatsTKIPReplays;
	u32 dot11RSNAStatsTKIPICVErrors;
	u32 dot11RSNAStatsTKIPLocalMICFailures;

	int key_idx;

62 63 64 65
	struct crypto_blkcipher *rx_tfm_arc4;
	struct crypto_hash *rx_tfm_michael;
	struct crypto_blkcipher *tx_tfm_arc4;
	struct crypto_hash *tx_tfm_michael;
J
Jeff Garzik 已提交
66 67 68

	/* scratch buffers for virt_to_page() (crypto API) */
	u8 rx_hdr[16], tx_hdr[16];
69

70
	unsigned long flags;
J
Jeff Garzik 已提交
71 72
};

73
static unsigned long lib80211_tkip_set_flags(unsigned long flags, void *priv)
74
{
75
	struct lib80211_tkip_data *_priv = priv;
76 77 78 79 80
	unsigned long old_flags = _priv->flags;
	_priv->flags = flags;
	return old_flags;
}

81
static unsigned long lib80211_tkip_get_flags(void *priv)
82
{
83
	struct lib80211_tkip_data *_priv = priv;
84 85 86
	return _priv->flags;
}

87
static void *lib80211_tkip_init(int key_idx)
J
Jeff Garzik 已提交
88
{
89
	struct lib80211_tkip_data *priv;
J
Jeff Garzik 已提交
90

91
	priv = kzalloc(sizeof(*priv), GFP_ATOMIC);
J
Jeff Garzik 已提交
92 93
	if (priv == NULL)
		goto fail;
94

J
Jeff Garzik 已提交
95 96
	priv->key_idx = key_idx;

97
	priv->tx_tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0,
98
						CRYPTO_ALG_ASYNC);
99
	if (IS_ERR(priv->tx_tfm_arc4)) {
100
		printk(KERN_DEBUG "lib80211_crypt_tkip: could not allocate "
J
Jeff Garzik 已提交
101
		       "crypto API arc4\n");
102
		priv->tx_tfm_arc4 = NULL;
J
Jeff Garzik 已提交
103 104 105
		goto fail;
	}

106 107 108
	priv->tx_tfm_michael = crypto_alloc_hash("michael_mic", 0,
						 CRYPTO_ALG_ASYNC);
	if (IS_ERR(priv->tx_tfm_michael)) {
109
		printk(KERN_DEBUG "lib80211_crypt_tkip: could not allocate "
110
		       "crypto API michael_mic\n");
111
		priv->tx_tfm_michael = NULL;
112 113 114
		goto fail;
	}

115 116 117
	priv->rx_tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0,
						CRYPTO_ALG_ASYNC);
	if (IS_ERR(priv->rx_tfm_arc4)) {
118
		printk(KERN_DEBUG "lib80211_crypt_tkip: could not allocate "
119
		       "crypto API arc4\n");
120
		priv->rx_tfm_arc4 = NULL;
121 122 123
		goto fail;
	}

124 125 126
	priv->rx_tfm_michael = crypto_alloc_hash("michael_mic", 0,
						 CRYPTO_ALG_ASYNC);
	if (IS_ERR(priv->rx_tfm_michael)) {
127
		printk(KERN_DEBUG "lib80211_crypt_tkip: could not allocate "
J
Jeff Garzik 已提交
128
		       "crypto API michael_mic\n");
129
		priv->rx_tfm_michael = NULL;
J
Jeff Garzik 已提交
130 131 132 133 134
		goto fail;
	}

	return priv;

135
      fail:
J
Jeff Garzik 已提交
136
	if (priv) {
137
		if (priv->tx_tfm_michael)
138
			crypto_free_hash(priv->tx_tfm_michael);
139
		if (priv->tx_tfm_arc4)
140
			crypto_free_blkcipher(priv->tx_tfm_arc4);
141
		if (priv->rx_tfm_michael)
142
			crypto_free_hash(priv->rx_tfm_michael);
143
		if (priv->rx_tfm_arc4)
144
			crypto_free_blkcipher(priv->rx_tfm_arc4);
J
Jeff Garzik 已提交
145 146 147 148 149 150
		kfree(priv);
	}

	return NULL;
}

151
static void lib80211_tkip_deinit(void *priv)
J
Jeff Garzik 已提交
152
{
153
	struct lib80211_tkip_data *_priv = priv;
154 155
	if (_priv) {
		if (_priv->tx_tfm_michael)
156
			crypto_free_hash(_priv->tx_tfm_michael);
157
		if (_priv->tx_tfm_arc4)
158
			crypto_free_blkcipher(_priv->tx_tfm_arc4);
159
		if (_priv->rx_tfm_michael)
160
			crypto_free_hash(_priv->rx_tfm_michael);
161
		if (_priv->rx_tfm_arc4)
162
			crypto_free_blkcipher(_priv->rx_tfm_arc4);
163
	}
J
Jeff Garzik 已提交
164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196
	kfree(priv);
}

static inline u16 RotR1(u16 val)
{
	return (val >> 1) | (val << 15);
}

static inline u8 Lo8(u16 val)
{
	return val & 0xff;
}

static inline u8 Hi8(u16 val)
{
	return val >> 8;
}

static inline u16 Lo16(u32 val)
{
	return val & 0xffff;
}

static inline u16 Hi16(u32 val)
{
	return val >> 16;
}

static inline u16 Mk16(u8 hi, u8 lo)
{
	return lo | (((u16) hi) << 8);
}

A
Al Viro 已提交
197
static inline u16 Mk16_le(__le16 * v)
J
Jeff Garzik 已提交
198 199 200 201
{
	return le16_to_cpu(*v);
}

202
static const u16 Sbox[256] = {
J
Jeff Garzik 已提交
203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244
	0xC6A5, 0xF884, 0xEE99, 0xF68D, 0xFF0D, 0xD6BD, 0xDEB1, 0x9154,
	0x6050, 0x0203, 0xCEA9, 0x567D, 0xE719, 0xB562, 0x4DE6, 0xEC9A,
	0x8F45, 0x1F9D, 0x8940, 0xFA87, 0xEF15, 0xB2EB, 0x8EC9, 0xFB0B,
	0x41EC, 0xB367, 0x5FFD, 0x45EA, 0x23BF, 0x53F7, 0xE496, 0x9B5B,
	0x75C2, 0xE11C, 0x3DAE, 0x4C6A, 0x6C5A, 0x7E41, 0xF502, 0x834F,
	0x685C, 0x51F4, 0xD134, 0xF908, 0xE293, 0xAB73, 0x6253, 0x2A3F,
	0x080C, 0x9552, 0x4665, 0x9D5E, 0x3028, 0x37A1, 0x0A0F, 0x2FB5,
	0x0E09, 0x2436, 0x1B9B, 0xDF3D, 0xCD26, 0x4E69, 0x7FCD, 0xEA9F,
	0x121B, 0x1D9E, 0x5874, 0x342E, 0x362D, 0xDCB2, 0xB4EE, 0x5BFB,
	0xA4F6, 0x764D, 0xB761, 0x7DCE, 0x527B, 0xDD3E, 0x5E71, 0x1397,
	0xA6F5, 0xB968, 0x0000, 0xC12C, 0x4060, 0xE31F, 0x79C8, 0xB6ED,
	0xD4BE, 0x8D46, 0x67D9, 0x724B, 0x94DE, 0x98D4, 0xB0E8, 0x854A,
	0xBB6B, 0xC52A, 0x4FE5, 0xED16, 0x86C5, 0x9AD7, 0x6655, 0x1194,
	0x8ACF, 0xE910, 0x0406, 0xFE81, 0xA0F0, 0x7844, 0x25BA, 0x4BE3,
	0xA2F3, 0x5DFE, 0x80C0, 0x058A, 0x3FAD, 0x21BC, 0x7048, 0xF104,
	0x63DF, 0x77C1, 0xAF75, 0x4263, 0x2030, 0xE51A, 0xFD0E, 0xBF6D,
	0x814C, 0x1814, 0x2635, 0xC32F, 0xBEE1, 0x35A2, 0x88CC, 0x2E39,
	0x9357, 0x55F2, 0xFC82, 0x7A47, 0xC8AC, 0xBAE7, 0x322B, 0xE695,
	0xC0A0, 0x1998, 0x9ED1, 0xA37F, 0x4466, 0x547E, 0x3BAB, 0x0B83,
	0x8CCA, 0xC729, 0x6BD3, 0x283C, 0xA779, 0xBCE2, 0x161D, 0xAD76,
	0xDB3B, 0x6456, 0x744E, 0x141E, 0x92DB, 0x0C0A, 0x486C, 0xB8E4,
	0x9F5D, 0xBD6E, 0x43EF, 0xC4A6, 0x39A8, 0x31A4, 0xD337, 0xF28B,
	0xD532, 0x8B43, 0x6E59, 0xDAB7, 0x018C, 0xB164, 0x9CD2, 0x49E0,
	0xD8B4, 0xACFA, 0xF307, 0xCF25, 0xCAAF, 0xF48E, 0x47E9, 0x1018,
	0x6FD5, 0xF088, 0x4A6F, 0x5C72, 0x3824, 0x57F1, 0x73C7, 0x9751,
	0xCB23, 0xA17C, 0xE89C, 0x3E21, 0x96DD, 0x61DC, 0x0D86, 0x0F85,
	0xE090, 0x7C42, 0x71C4, 0xCCAA, 0x90D8, 0x0605, 0xF701, 0x1C12,
	0xC2A3, 0x6A5F, 0xAEF9, 0x69D0, 0x1791, 0x9958, 0x3A27, 0x27B9,
	0xD938, 0xEB13, 0x2BB3, 0x2233, 0xD2BB, 0xA970, 0x0789, 0x33A7,
	0x2DB6, 0x3C22, 0x1592, 0xC920, 0x8749, 0xAAFF, 0x5078, 0xA57A,
	0x038F, 0x59F8, 0x0980, 0x1A17, 0x65DA, 0xD731, 0x84C6, 0xD0B8,
	0x82C3, 0x29B0, 0x5A77, 0x1E11, 0x7BCB, 0xA8FC, 0x6DD6, 0x2C3A,
};

static inline u16 _S_(u16 v)
{
	u16 t = Sbox[Hi8(v)];
	return Sbox[Lo8(v)] ^ ((t << 8) | (t >> 8));
}

#define PHASE1_LOOP_COUNT 8

245 246
static void tkip_mixing_phase1(u16 * TTAK, const u8 * TK, const u8 * TA,
			       u32 IV32)
J
Jeff Garzik 已提交
247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266
{
	int i, j;

	/* Initialize the 80-bit TTAK from TSC (IV32) and TA[0..5] */
	TTAK[0] = Lo16(IV32);
	TTAK[1] = Hi16(IV32);
	TTAK[2] = Mk16(TA[1], TA[0]);
	TTAK[3] = Mk16(TA[3], TA[2]);
	TTAK[4] = Mk16(TA[5], TA[4]);

	for (i = 0; i < PHASE1_LOOP_COUNT; i++) {
		j = 2 * (i & 1);
		TTAK[0] += _S_(TTAK[4] ^ Mk16(TK[1 + j], TK[0 + j]));
		TTAK[1] += _S_(TTAK[0] ^ Mk16(TK[5 + j], TK[4 + j]));
		TTAK[2] += _S_(TTAK[1] ^ Mk16(TK[9 + j], TK[8 + j]));
		TTAK[3] += _S_(TTAK[2] ^ Mk16(TK[13 + j], TK[12 + j]));
		TTAK[4] += _S_(TTAK[3] ^ Mk16(TK[1 + j], TK[0 + j])) + i;
	}
}

267
static void tkip_mixing_phase2(u8 * WEPSeed, const u8 * TK, const u16 * TTAK,
J
Jeff Garzik 已提交
268 269 270 271
			       u16 IV16)
{
	/* Make temporary area overlap WEP seed so that the final copy can be
	 * avoided on little endian hosts. */
272
	u16 *PPK = (u16 *) & WEPSeed[4];
J
Jeff Garzik 已提交
273 274 275 276 277 278 279 280 281 282

	/* Step 1 - make copy of TTAK and bring in TSC */
	PPK[0] = TTAK[0];
	PPK[1] = TTAK[1];
	PPK[2] = TTAK[2];
	PPK[3] = TTAK[3];
	PPK[4] = TTAK[4];
	PPK[5] = TTAK[4] + IV16;

	/* Step 2 - 96-bit bijective mixing using S-box */
A
Al Viro 已提交
283 284 285 286 287 288 289 290 291
	PPK[0] += _S_(PPK[5] ^ Mk16_le((__le16 *) & TK[0]));
	PPK[1] += _S_(PPK[0] ^ Mk16_le((__le16 *) & TK[2]));
	PPK[2] += _S_(PPK[1] ^ Mk16_le((__le16 *) & TK[4]));
	PPK[3] += _S_(PPK[2] ^ Mk16_le((__le16 *) & TK[6]));
	PPK[4] += _S_(PPK[3] ^ Mk16_le((__le16 *) & TK[8]));
	PPK[5] += _S_(PPK[4] ^ Mk16_le((__le16 *) & TK[10]));

	PPK[0] += RotR1(PPK[5] ^ Mk16_le((__le16 *) & TK[12]));
	PPK[1] += RotR1(PPK[0] ^ Mk16_le((__le16 *) & TK[14]));
J
Jeff Garzik 已提交
292 293 294 295 296 297 298 299 300 301
	PPK[2] += RotR1(PPK[1]);
	PPK[3] += RotR1(PPK[2]);
	PPK[4] += RotR1(PPK[3]);
	PPK[5] += RotR1(PPK[4]);

	/* Step 3 - bring in last of TK bits, assign 24-bit WEP IV value
	 * WEPSeed[0..2] is transmitted as WEP IV */
	WEPSeed[0] = Hi8(IV16);
	WEPSeed[1] = (Hi8(IV16) | 0x20) & 0x7F;
	WEPSeed[2] = Lo8(IV16);
A
Al Viro 已提交
302
	WEPSeed[3] = Lo8((PPK[5] ^ Mk16_le((__le16 *) & TK[0])) >> 1);
J
Jeff Garzik 已提交
303 304 305 306 307 308 309 310 311 312

#ifdef __BIG_ENDIAN
	{
		int i;
		for (i = 0; i < 6; i++)
			PPK[i] = (PPK[i] << 8) | (PPK[i] >> 8);
	}
#endif
}

313
static int lib80211_tkip_hdr(struct sk_buff *skb, int hdr_len,
314
			      u8 * rc4key, int keylen, void *priv)
J
Jeff Garzik 已提交
315
{
316
	struct lib80211_tkip_data *tkey = priv;
J
Jeff Garzik 已提交
317
	int len;
318
	u8 *pos;
319
	struct ieee80211_hdr *hdr;
J
Jeff Garzik 已提交
320

321
	hdr = (struct ieee80211_hdr *)skb->data;
322

323
	if (skb_headroom(skb) < 8 || skb->len < hdr_len)
324 325 326 327
		return -1;

	if (rc4key == NULL || keylen < 16)
		return -1;
J
Jeff Garzik 已提交
328 329 330 331 332 333 334 335 336 337 338 339 340

	if (!tkey->tx_phase1_done) {
		tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2,
				   tkey->tx_iv32);
		tkey->tx_phase1_done = 1;
	}
	tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, tkey->tx_iv16);

	len = skb->len - hdr_len;
	pos = skb_push(skb, 8);
	memmove(pos, pos + 8, hdr_len);
	pos += hdr_len;

341 342 343
	*pos++ = *rc4key;
	*pos++ = *(rc4key + 1);
	*pos++ = *(rc4key + 2);
344
	*pos++ = (tkey->key_idx << 6) | (1 << 5) /* Ext IV included */ ;
J
Jeff Garzik 已提交
345 346 347 348 349
	*pos++ = tkey->tx_iv32 & 0xff;
	*pos++ = (tkey->tx_iv32 >> 8) & 0xff;
	*pos++ = (tkey->tx_iv32 >> 16) & 0xff;
	*pos++ = (tkey->tx_iv32 >> 24) & 0xff;

350 351 352 353 354
	tkey->tx_iv16++;
	if (tkey->tx_iv16 == 0) {
		tkey->tx_phase1_done = 0;
		tkey->tx_iv32++;
	}
J
Jeff Garzik 已提交
355

356
	return 8;
357 358
}

359
static int lib80211_tkip_encrypt(struct sk_buff *skb, int hdr_len, void *priv)
360
{
361
	struct lib80211_tkip_data *tkey = priv;
362
	struct blkcipher_desc desc = { .tfm = tkey->tx_tfm_arc4 };
363
	int len;
364 365
	u8 rc4key[16], *pos, *icv;
	u32 crc;
366 367
	struct scatterlist sg;

368
	if (tkey->flags & IEEE80211_CRYPTO_TKIP_COUNTERMEASURES) {
369
		if (net_ratelimit()) {
370 371
			struct ieee80211_hdr *hdr =
			    (struct ieee80211_hdr *)skb->data;
372
			printk(KERN_DEBUG ": TKIP countermeasures: dropped "
J
Johannes Berg 已提交
373
			       "TX packet to %pM\n", hdr->addr1);
374 375 376 377 378 379 380 381 382 383
		}
		return -1;
	}

	if (skb_tailroom(skb) < 4 || skb->len < hdr_len)
		return -1;

	len = skb->len - hdr_len;
	pos = skb->data + hdr_len;

384
	if ((lib80211_tkip_hdr(skb, hdr_len, rc4key, 16, priv)) < 0)
385 386
		return -1;

387 388 389 390 391 392 393 394
	icv = skb_put(skb, 4);

	crc = ~crc32_le(~0, pos, len);
	icv[0] = crc;
	icv[1] = crc >> 8;
	icv[2] = crc >> 16;
	icv[3] = crc >> 24;

395
	crypto_blkcipher_setkey(tkey->tx_tfm_arc4, rc4key, 16);
J
Jens Axboe 已提交
396
	sg_init_one(&sg, pos, len + 4);
397
	return crypto_blkcipher_encrypt(&desc, &sg, &sg, len + 4);
398 399
}

400 401 402 403 404 405 406 407 408 409 410 411 412
/*
 * deal with seq counter wrapping correctly.
 * refer to timer_after() for jiffies wrapping handling
 */
static inline int tkip_replay_check(u32 iv32_n, u16 iv16_n,
				    u32 iv32_o, u16 iv16_o)
{
	if ((s32)iv32_n - (s32)iv32_o < 0 ||
	    (iv32_n == iv32_o && iv16_n <= iv16_o))
		return 1;
	return 0;
}

413
static int lib80211_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
J
Jeff Garzik 已提交
414
{
415
	struct lib80211_tkip_data *tkey = priv;
416
	struct blkcipher_desc desc = { .tfm = tkey->rx_tfm_arc4 };
J
Jeff Garzik 已提交
417 418 419 420
	u8 rc4key[16];
	u8 keyidx, *pos;
	u32 iv32;
	u16 iv16;
421
	struct ieee80211_hdr *hdr;
J
Jeff Garzik 已提交
422 423 424 425 426
	u8 icv[4];
	u32 crc;
	struct scatterlist sg;
	int plen;

427
	hdr = (struct ieee80211_hdr *)skb->data;
428

429
	if (tkey->flags & IEEE80211_CRYPTO_TKIP_COUNTERMEASURES) {
430
		if (net_ratelimit()) {
431
			printk(KERN_DEBUG ": TKIP countermeasures: dropped "
J
Johannes Berg 已提交
432
			       "received packet from %pM\n", hdr->addr2);
433 434 435 436
		}
		return -1;
	}

J
Jeff Garzik 已提交
437 438 439 440 441 442 443 444
	if (skb->len < hdr_len + 8 + 4)
		return -1;

	pos = skb->data + hdr_len;
	keyidx = pos[3];
	if (!(keyidx & (1 << 5))) {
		if (net_ratelimit()) {
			printk(KERN_DEBUG "TKIP: received packet without ExtIV"
J
Johannes Berg 已提交
445
			       " flag from %pM\n", hdr->addr2);
J
Jeff Garzik 已提交
446 447 448 449 450 451 452 453 454 455 456
		}
		return -2;
	}
	keyidx >>= 6;
	if (tkey->key_idx != keyidx) {
		printk(KERN_DEBUG "TKIP: RX tkey->key_idx=%d frame "
		       "keyidx=%d priv=%p\n", tkey->key_idx, keyidx, priv);
		return -6;
	}
	if (!tkey->key_set) {
		if (net_ratelimit()) {
J
Johannes Berg 已提交
457
			printk(KERN_DEBUG "TKIP: received packet from %pM"
J
Jeff Garzik 已提交
458
			       " with keyid=%d that does not have a configured"
J
Johannes Berg 已提交
459
			       " key\n", hdr->addr2, keyidx);
J
Jeff Garzik 已提交
460 461 462 463 464 465 466
		}
		return -3;
	}
	iv16 = (pos[0] << 8) | pos[2];
	iv32 = pos[4] | (pos[5] << 8) | (pos[6] << 16) | (pos[7] << 24);
	pos += 8;

467
	if (tkip_replay_check(iv32, iv16, tkey->rx_iv32, tkey->rx_iv16)) {
468
#ifdef CONFIG_LIB80211_DEBUG
469 470
		if (net_ratelimit()) {
			printk(KERN_DEBUG "TKIP: replay detected: STA=%pM"
J
Jeff Garzik 已提交
471
			       " previous TSC %08x%04x received TSC "
J
Johannes Berg 已提交
472
			       "%08x%04x\n", hdr->addr2,
J
Jeff Garzik 已提交
473 474
			       tkey->rx_iv32, tkey->rx_iv16, iv32, iv16);
		}
475
#endif
J
Jeff Garzik 已提交
476 477 478 479 480 481 482 483 484 485 486 487
		tkey->dot11RSNAStatsTKIPReplays++;
		return -4;
	}

	if (iv32 != tkey->rx_iv32 || !tkey->rx_phase1_done) {
		tkip_mixing_phase1(tkey->rx_ttak, tkey->key, hdr->addr2, iv32);
		tkey->rx_phase1_done = 1;
	}
	tkip_mixing_phase2(rc4key, tkey->key, tkey->rx_ttak, iv16);

	plen = skb->len - hdr_len - 12;

488
	crypto_blkcipher_setkey(tkey->rx_tfm_arc4, rc4key, 16);
J
Jens Axboe 已提交
489
	sg_init_one(&sg, pos, plen + 4);
490 491 492
	if (crypto_blkcipher_decrypt(&desc, &sg, &sg, plen + 4)) {
		if (net_ratelimit()) {
			printk(KERN_DEBUG ": TKIP: failed to decrypt "
J
Johannes Berg 已提交
493 494
			       "received packet from %pM\n",
			       hdr->addr2);
495 496 497
		}
		return -7;
	}
J
Jeff Garzik 已提交
498 499 500 501 502 503 504 505 506 507 508 509

	crc = ~crc32_le(~0, pos, plen);
	icv[0] = crc;
	icv[1] = crc >> 8;
	icv[2] = crc >> 16;
	icv[3] = crc >> 24;
	if (memcmp(icv, pos + plen, 4) != 0) {
		if (iv32 != tkey->rx_iv32) {
			/* Previously cached Phase1 result was already lost, so
			 * it needs to be recalculated for the next packet. */
			tkey->rx_phase1_done = 0;
		}
510
#ifdef CONFIG_LIB80211_DEBUG
511 512
		if (net_ratelimit()) {
			printk(KERN_DEBUG "TKIP: ICV error detected: STA="
J
Johannes Berg 已提交
513
			       "%pM\n", hdr->addr2);
J
Jeff Garzik 已提交
514
		}
515
#endif
J
Jeff Garzik 已提交
516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532
		tkey->dot11RSNAStatsTKIPICVErrors++;
		return -5;
	}

	/* Update real counters only after Michael MIC verification has
	 * completed */
	tkey->rx_iv32_new = iv32;
	tkey->rx_iv16_new = iv16;

	/* Remove IV and ICV */
	memmove(skb->data + 8, skb->data, hdr_len);
	skb_pull(skb, 8);
	skb_trim(skb, skb->len - 4);

	return keyidx;
}

533
static int michael_mic(struct crypto_hash *tfm_michael, u8 * key, u8 * hdr,
534
		       u8 * data, size_t data_len, u8 * mic)
J
Jeff Garzik 已提交
535
{
536
	struct hash_desc desc;
J
Jeff Garzik 已提交
537 538
	struct scatterlist sg[2];

539
	if (tfm_michael == NULL) {
J
Jeff Garzik 已提交
540 541 542
		printk(KERN_WARNING "michael_mic: tfm_michael == NULL\n");
		return -1;
	}
J
Jens Axboe 已提交
543
	sg_init_table(sg, 2);
544 545
	sg_set_buf(&sg[0], hdr, 16);
	sg_set_buf(&sg[1], data, data_len);
J
Jeff Garzik 已提交
546

547
	if (crypto_hash_setkey(tfm_michael, key, 8))
548
		return -1;
J
Jeff Garzik 已提交
549

550
	desc.tfm = tfm_michael;
551 552
	desc.flags = 0;
	return crypto_hash_digest(&desc, sg, data_len + 16, mic);
J
Jeff Garzik 已提交
553 554
}

555
static void michael_mic_hdr(struct sk_buff *skb, u8 * hdr)
J
Jeff Garzik 已提交
556
{
557
	struct ieee80211_hdr *hdr11;
J
Jeff Garzik 已提交
558

559
	hdr11 = (struct ieee80211_hdr *)skb->data;
560

561
	switch (le16_to_cpu(hdr11->frame_control) &
J
Jeff Garzik 已提交
562 563
		(IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS)) {
	case IEEE80211_FCTL_TODS:
564 565
		memcpy(hdr, hdr11->addr3, ETH_ALEN);	/* DA */
		memcpy(hdr + ETH_ALEN, hdr11->addr2, ETH_ALEN);	/* SA */
J
Jeff Garzik 已提交
566 567
		break;
	case IEEE80211_FCTL_FROMDS:
568 569
		memcpy(hdr, hdr11->addr1, ETH_ALEN);	/* DA */
		memcpy(hdr + ETH_ALEN, hdr11->addr3, ETH_ALEN);	/* SA */
J
Jeff Garzik 已提交
570 571
		break;
	case IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS:
572 573
		memcpy(hdr, hdr11->addr3, ETH_ALEN);	/* DA */
		memcpy(hdr + ETH_ALEN, hdr11->addr4, ETH_ALEN);	/* SA */
J
Jeff Garzik 已提交
574 575
		break;
	case 0:
576 577
		memcpy(hdr, hdr11->addr1, ETH_ALEN);	/* DA */
		memcpy(hdr + ETH_ALEN, hdr11->addr2, ETH_ALEN);	/* SA */
J
Jeff Garzik 已提交
578 579 580
		break;
	}

581 582 583
	if (ieee80211_is_data_qos(hdr11->frame_control)) {
		hdr[12] = le16_to_cpu(*ieee80211_get_qos_ctl(hdr11))
			& IEEE80211_QOS_CTL_TID_MASK;
584 585 586
	} else
		hdr[12] = 0;		/* priority */

587
	hdr[13] = hdr[14] = hdr[15] = 0;	/* reserved */
J
Jeff Garzik 已提交
588 589
}

590
static int lib80211_michael_mic_add(struct sk_buff *skb, int hdr_len,
591
				     void *priv)
J
Jeff Garzik 已提交
592
{
593
	struct lib80211_tkip_data *tkey = priv;
J
Jeff Garzik 已提交
594 595 596 597 598 599 600 601 602 603 604
	u8 *pos;

	if (skb_tailroom(skb) < 8 || skb->len < hdr_len) {
		printk(KERN_DEBUG "Invalid packet for Michael MIC add "
		       "(tailroom=%d hdr_len=%d skb->len=%d)\n",
		       skb_tailroom(skb), hdr_len, skb->len);
		return -1;
	}

	michael_mic_hdr(skb, tkey->tx_hdr);
	pos = skb_put(skb, 8);
605
	if (michael_mic(tkey->tx_tfm_michael, &tkey->key[16], tkey->tx_hdr,
J
Jeff Garzik 已提交
606 607 608 609 610 611
			skb->data + hdr_len, skb->len - 8 - hdr_len, pos))
		return -1;

	return 0;
}

612 613
static void lib80211_michael_mic_failure(struct net_device *dev,
					  struct ieee80211_hdr *hdr,
614
					  int keyidx)
J
Jeff Garzik 已提交
615 616 617 618 619 620 621 622 623 624 625 626 627 628 629
{
	union iwreq_data wrqu;
	struct iw_michaelmicfailure ev;

	/* TODO: needed parameters: count, keyid, key type, TSC */
	memset(&ev, 0, sizeof(ev));
	ev.flags = keyidx & IW_MICFAILURE_KEY_ID;
	if (hdr->addr1[0] & 0x01)
		ev.flags |= IW_MICFAILURE_GROUP;
	else
		ev.flags |= IW_MICFAILURE_PAIRWISE;
	ev.src_addr.sa_family = ARPHRD_ETHER;
	memcpy(ev.src_addr.sa_data, hdr->addr2, ETH_ALEN);
	memset(&wrqu, 0, sizeof(wrqu));
	wrqu.data.length = sizeof(ev);
630
	wireless_send_event(dev, IWEVMICHAELMICFAILURE, &wrqu, (char *)&ev);
J
Jeff Garzik 已提交
631 632
}

633
static int lib80211_michael_mic_verify(struct sk_buff *skb, int keyidx,
634
					int hdr_len, void *priv)
J
Jeff Garzik 已提交
635
{
636
	struct lib80211_tkip_data *tkey = priv;
J
Jeff Garzik 已提交
637 638 639 640 641 642
	u8 mic[8];

	if (!tkey->key_set)
		return -1;

	michael_mic_hdr(skb, tkey->rx_hdr);
643
	if (michael_mic(tkey->rx_tfm_michael, &tkey->key[24], tkey->rx_hdr,
J
Jeff Garzik 已提交
644 645 646
			skb->data + hdr_len, skb->len - 8 - hdr_len, mic))
		return -1;
	if (memcmp(mic, skb->data + skb->len - 8, 8) != 0) {
647 648
		struct ieee80211_hdr *hdr;
		hdr = (struct ieee80211_hdr *)skb->data;
J
Jeff Garzik 已提交
649
		printk(KERN_DEBUG "%s: Michael MIC verification failed for "
J
Johannes Berg 已提交
650 651
		       "MSDU from %pM keyidx=%d\n",
		       skb->dev ? skb->dev->name : "N/A", hdr->addr2,
J
Jeff Garzik 已提交
652 653
		       keyidx);
		if (skb->dev)
654
			lib80211_michael_mic_failure(skb->dev, hdr, keyidx);
J
Jeff Garzik 已提交
655 656 657 658 659 660 661 662 663 664 665 666 667 668
		tkey->dot11RSNAStatsTKIPLocalMICFailures++;
		return -1;
	}

	/* Update TSC counters for RX now that the packet verification has
	 * completed. */
	tkey->rx_iv32 = tkey->rx_iv32_new;
	tkey->rx_iv16 = tkey->rx_iv16_new;

	skb_trim(skb, skb->len - 8);

	return 0;
}

669
static int lib80211_tkip_set_key(void *key, int len, u8 * seq, void *priv)
J
Jeff Garzik 已提交
670
{
671
	struct lib80211_tkip_data *tkey = priv;
J
Jeff Garzik 已提交
672
	int keyidx;
673 674 675 676
	struct crypto_hash *tfm = tkey->tx_tfm_michael;
	struct crypto_blkcipher *tfm2 = tkey->tx_tfm_arc4;
	struct crypto_hash *tfm3 = tkey->rx_tfm_michael;
	struct crypto_blkcipher *tfm4 = tkey->rx_tfm_arc4;
J
Jeff Garzik 已提交
677 678 679 680

	keyidx = tkey->key_idx;
	memset(tkey, 0, sizeof(*tkey));
	tkey->key_idx = keyidx;
681 682 683 684
	tkey->tx_tfm_michael = tfm;
	tkey->tx_tfm_arc4 = tfm2;
	tkey->rx_tfm_michael = tfm3;
	tkey->rx_tfm_arc4 = tfm4;
J
Jeff Garzik 已提交
685 686 687
	if (len == TKIP_KEY_LEN) {
		memcpy(tkey->key, key, TKIP_KEY_LEN);
		tkey->key_set = 1;
688
		tkey->tx_iv16 = 1;	/* TSC is initialized to 1 */
J
Jeff Garzik 已提交
689 690
		if (seq) {
			tkey->rx_iv32 = (seq[5] << 24) | (seq[4] << 16) |
691
			    (seq[3] << 8) | seq[2];
J
Jeff Garzik 已提交
692 693 694 695 696 697 698 699 700 701
			tkey->rx_iv16 = (seq[1] << 8) | seq[0];
		}
	} else if (len == 0)
		tkey->key_set = 0;
	else
		return -1;

	return 0;
}

702
static int lib80211_tkip_get_key(void *key, int len, u8 * seq, void *priv)
J
Jeff Garzik 已提交
703
{
704
	struct lib80211_tkip_data *tkey = priv;
J
Jeff Garzik 已提交
705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730

	if (len < TKIP_KEY_LEN)
		return -1;

	if (!tkey->key_set)
		return 0;
	memcpy(key, tkey->key, TKIP_KEY_LEN);

	if (seq) {
		/* Return the sequence number of the last transmitted frame. */
		u16 iv16 = tkey->tx_iv16;
		u32 iv32 = tkey->tx_iv32;
		if (iv16 == 0)
			iv32--;
		iv16--;
		seq[0] = tkey->tx_iv16;
		seq[1] = tkey->tx_iv16 >> 8;
		seq[2] = tkey->tx_iv32;
		seq[3] = tkey->tx_iv32 >> 8;
		seq[4] = tkey->tx_iv32 >> 16;
		seq[5] = tkey->tx_iv32 >> 24;
	}

	return TKIP_KEY_LEN;
}

731
static char *lib80211_tkip_print_stats(char *p, void *priv)
J
Jeff Garzik 已提交
732
{
733
	struct lib80211_tkip_data *tkip = priv;
J
Jeff Garzik 已提交
734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756
	p += sprintf(p, "key[%d] alg=TKIP key_set=%d "
		     "tx_pn=%02x%02x%02x%02x%02x%02x "
		     "rx_pn=%02x%02x%02x%02x%02x%02x "
		     "replays=%d icv_errors=%d local_mic_failures=%d\n",
		     tkip->key_idx, tkip->key_set,
		     (tkip->tx_iv32 >> 24) & 0xff,
		     (tkip->tx_iv32 >> 16) & 0xff,
		     (tkip->tx_iv32 >> 8) & 0xff,
		     tkip->tx_iv32 & 0xff,
		     (tkip->tx_iv16 >> 8) & 0xff,
		     tkip->tx_iv16 & 0xff,
		     (tkip->rx_iv32 >> 24) & 0xff,
		     (tkip->rx_iv32 >> 16) & 0xff,
		     (tkip->rx_iv32 >> 8) & 0xff,
		     tkip->rx_iv32 & 0xff,
		     (tkip->rx_iv16 >> 8) & 0xff,
		     tkip->rx_iv16 & 0xff,
		     tkip->dot11RSNAStatsTKIPReplays,
		     tkip->dot11RSNAStatsTKIPICVErrors,
		     tkip->dot11RSNAStatsTKIPLocalMICFailures);
	return p;
}

757
static struct lib80211_crypto_ops lib80211_crypt_tkip = {
758
	.name = "TKIP",
759 760 761 762 763 764 765 766 767 768
	.init = lib80211_tkip_init,
	.deinit = lib80211_tkip_deinit,
	.build_iv = lib80211_tkip_hdr,
	.encrypt_mpdu = lib80211_tkip_encrypt,
	.decrypt_mpdu = lib80211_tkip_decrypt,
	.encrypt_msdu = lib80211_michael_mic_add,
	.decrypt_msdu = lib80211_michael_mic_verify,
	.set_key = lib80211_tkip_set_key,
	.get_key = lib80211_tkip_get_key,
	.print_stats = lib80211_tkip_print_stats,
769 770 771
	.extra_mpdu_prefix_len = 4 + 4,	/* IV + ExtIV */
	.extra_mpdu_postfix_len = 4,	/* ICV */
	.extra_msdu_postfix_len = 8,	/* MIC */
772 773
	.get_flags = lib80211_tkip_get_flags,
	.set_flags = lib80211_tkip_set_flags,
774
	.owner = THIS_MODULE,
J
Jeff Garzik 已提交
775 776
};

777
static int __init lib80211_crypto_tkip_init(void)
J
Jeff Garzik 已提交
778
{
779
	return lib80211_register_crypto_ops(&lib80211_crypt_tkip);
J
Jeff Garzik 已提交
780 781
}

782
static void __exit lib80211_crypto_tkip_exit(void)
J
Jeff Garzik 已提交
783
{
784
	lib80211_unregister_crypto_ops(&lib80211_crypt_tkip);
J
Jeff Garzik 已提交
785 786
}

787 788
module_init(lib80211_crypto_tkip_init);
module_exit(lib80211_crypto_tkip_exit);