mac80211: use CMAC_PN_LEN
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / mac80211 / key.h
CommitLineData
f0706e82
JB
1/*
2 * Copyright 2002-2004, Instant802 Networks, Inc.
3 * Copyright 2005, Devicescape Software, Inc.
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 */
9
10#ifndef IEEE80211_KEY_H
11#define IEEE80211_KEY_H
12
13#include <linux/types.h>
8f37171a 14#include <linux/list.h>
f0706e82 15#include <linux/crypto.h>
db4d1169 16#include <linux/rcupdate.h>
f0706e82
JB
17#include <net/mac80211.h>
18
e31b8213
JB
19#define NUM_DEFAULT_KEYS 4
20#define NUM_DEFAULT_MGMT_KEYS 2
21
ffd7891d
LR
22#define WEP_IV_LEN 4
23#define WEP_ICV_LEN 4
ffd7891d
LR
24#define ALG_CCMP_KEY_LEN 16
25#define CCMP_HDR_LEN 8
26#define CCMP_MIC_LEN 8
27#define CCMP_TK_LEN 16
28#define CCMP_PN_LEN 6
29#define TKIP_IV_LEN 8
30#define TKIP_ICV_LEN 4
3ea542d3 31#define CMAC_PN_LEN 6
ffd7891d 32
9e26297a 33#define NUM_RX_DATA_QUEUES 16
f0706e82 34
11a843b7
JB
35struct ieee80211_local;
36struct ieee80211_sub_if_data;
37struct sta_info;
38
db4d1169
JB
39/**
40 * enum ieee80211_internal_key_flags - internal key flags
41 *
42 * @KEY_FLAG_UPLOADED_TO_HARDWARE: Indicates that this key is present
43 * in the hardware for TX crypto hardware acceleration.
95acac61 44 * @KEY_FLAG_TAINTED: Key is tainted and packets should be dropped.
db4d1169
JB
45 */
46enum ieee80211_internal_key_flags {
47 KEY_FLAG_UPLOADED_TO_HARDWARE = BIT(0),
95acac61 48 KEY_FLAG_TAINTED = BIT(1),
db4d1169 49};
11a843b7 50
ca99861d 51enum ieee80211_internal_tkip_state {
52 TKIP_STATE_NOT_INIT,
53 TKIP_STATE_PHASE1_DONE,
54 TKIP_STATE_PHASE1_HW_UPLOADED,
55};
56
b0f76b33 57struct tkip_ctx {
523b02ea
JB
58 u32 iv32; /* current iv32 */
59 u16 iv16; /* current iv16 */
60 u16 p1k[5]; /* p1k cache */
61 u32 p1k_iv32; /* iv32 for which p1k computed */
ca99861d 62 enum ieee80211_internal_tkip_state state;
b0f76b33
HH
63};
64
f0706e82 65struct ieee80211_key {
11a843b7
JB
66 struct ieee80211_local *local;
67 struct ieee80211_sub_if_data *sdata;
68 struct sta_info *sta;
69
3b96766f 70 /* for sdata list */
11a843b7
JB
71 struct list_head list;
72
ad0e2b5a 73 /* protected by key mutex */
11a843b7
JB
74 unsigned int flags;
75
f0706e82
JB
76 union {
77 struct {
523b02ea
JB
78 /* protects tx context */
79 spinlock_t txlock;
80
f0706e82 81 /* last used TSC */
b0f76b33 82 struct tkip_ctx tx;
f0706e82
JB
83
84 /* last received RSC */
b0f76b33 85 struct tkip_ctx rx[NUM_RX_DATA_QUEUES];
f0706e82
JB
86 } tkip;
87 struct {
aba83a0b 88 atomic64_t tx_pn;
9190252c
JM
89 /*
90 * Last received packet number. The first
91 * NUM_RX_DATA_QUEUES counters are used with Data
92 * frames and the last counter is used with Robust
93 * Management frames.
94 */
3ea542d3 95 u8 rx_pn[NUM_RX_DATA_QUEUES + 1][CCMP_PN_LEN];
f0706e82
JB
96 struct crypto_cipher *tfm;
97 u32 replays; /* dot11RSNAStatsCCMPReplays */
f0706e82 98 } ccmp;
765cb46a 99 struct {
75396ae6 100 atomic64_t tx_pn;
3ea542d3 101 u8 rx_pn[CMAC_PN_LEN];
765cb46a
JM
102 struct crypto_cipher *tfm;
103 u32 replays; /* dot11RSNAStatsCMACReplays */
104 u32 icverrors; /* dot11RSNAStatsCMACICVErrors */
765cb46a 105 } aes_cmac;
f0706e82 106 } u;
f0706e82 107
8f20fc24
JB
108 /* number of times this key has been used */
109 int tx_rx_count;
f0706e82 110
e9f207f0
JB
111#ifdef CONFIG_MAC80211_DEBUGFS
112 struct {
113 struct dentry *stalink;
114 struct dentry *dir;
d9c58f30 115 int cnt;
e9f207f0
JB
116 } debugfs;
117#endif
118
8f20fc24
JB
119 /*
120 * key config, must be last because it contains key
121 * material as variable length member
122 */
123 struct ieee80211_key_conf conf;
f0706e82
JB
124};
125
97359d12 126struct ieee80211_key *ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
faa8fdc8
JM
127 const u8 *key_data,
128 size_t seq_len, const u8 *seq);
db4d1169
JB
129/*
130 * Insert a key into data structures (sdata, sta if necessary)
131 * to make it used, free old key.
132 */
3ffc2a90
JB
133int __must_check ieee80211_key_link(struct ieee80211_key *key,
134 struct ieee80211_sub_if_data *sdata,
135 struct sta_info *sta);
5c0c3641 136void __ieee80211_key_free(struct ieee80211_key *key);
32162a4d
JM
137void ieee80211_key_free(struct ieee80211_local *local,
138 struct ieee80211_key *key);
f7e0104c
JB
139void ieee80211_set_default_key(struct ieee80211_sub_if_data *sdata, int idx,
140 bool uni, bool multi);
3cfcf6ac
JM
141void ieee80211_set_default_mgmt_key(struct ieee80211_sub_if_data *sdata,
142 int idx);
11a843b7
JB
143void ieee80211_free_keys(struct ieee80211_sub_if_data *sdata);
144void ieee80211_enable_keys(struct ieee80211_sub_if_data *sdata);
145void ieee80211_disable_keys(struct ieee80211_sub_if_data *sdata);
146
40b275b6
JB
147#define key_mtx_dereference(local, ref) \
148 rcu_dereference_protected(ref, lockdep_is_held(&((local)->key_mtx)))
149
f0706e82 150#endif /* IEEE80211_KEY_H */