Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/dtor/input
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / mac80211 / key.h
CommitLineData
f0706e82
JB
1/*
2 * Copyright 2002-2004, Instant802 Networks, Inc.
3 * Copyright 2005, Devicescape Software, Inc.
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 */
9
10#ifndef IEEE80211_KEY_H
11#define IEEE80211_KEY_H
12
13#include <linux/types.h>
8f37171a 14#include <linux/list.h>
f0706e82 15#include <linux/crypto.h>
db4d1169 16#include <linux/rcupdate.h>
f0706e82
JB
17#include <net/mac80211.h>
18
e31b8213
JB
19#define NUM_DEFAULT_KEYS 4
20#define NUM_DEFAULT_MGMT_KEYS 2
21
ffd7891d
LR
22#define WEP_IV_LEN 4
23#define WEP_ICV_LEN 4
ffd7891d
LR
24#define ALG_CCMP_KEY_LEN 16
25#define CCMP_HDR_LEN 8
26#define CCMP_MIC_LEN 8
27#define CCMP_TK_LEN 16
28#define CCMP_PN_LEN 6
29#define TKIP_IV_LEN 8
30#define TKIP_ICV_LEN 4
3ea542d3 31#define CMAC_PN_LEN 6
ffd7891d 32
11a843b7
JB
33struct ieee80211_local;
34struct ieee80211_sub_if_data;
35struct sta_info;
36
db4d1169
JB
37/**
38 * enum ieee80211_internal_key_flags - internal key flags
39 *
40 * @KEY_FLAG_UPLOADED_TO_HARDWARE: Indicates that this key is present
41 * in the hardware for TX crypto hardware acceleration.
95acac61 42 * @KEY_FLAG_TAINTED: Key is tainted and packets should be dropped.
db4d1169
JB
43 */
44enum ieee80211_internal_key_flags {
45 KEY_FLAG_UPLOADED_TO_HARDWARE = BIT(0),
95acac61 46 KEY_FLAG_TAINTED = BIT(1),
db4d1169 47};
11a843b7 48
ca99861d 49enum ieee80211_internal_tkip_state {
50 TKIP_STATE_NOT_INIT,
51 TKIP_STATE_PHASE1_DONE,
52 TKIP_STATE_PHASE1_HW_UPLOADED,
53};
54
b0f76b33 55struct tkip_ctx {
523b02ea
JB
56 u32 iv32; /* current iv32 */
57 u16 iv16; /* current iv16 */
58 u16 p1k[5]; /* p1k cache */
59 u32 p1k_iv32; /* iv32 for which p1k computed */
ca99861d 60 enum ieee80211_internal_tkip_state state;
b0f76b33
HH
61};
62
f0706e82 63struct ieee80211_key {
11a843b7
JB
64 struct ieee80211_local *local;
65 struct ieee80211_sub_if_data *sdata;
66 struct sta_info *sta;
67
3b96766f 68 /* for sdata list */
11a843b7
JB
69 struct list_head list;
70
ad0e2b5a 71 /* protected by key mutex */
11a843b7
JB
72 unsigned int flags;
73
f0706e82
JB
74 union {
75 struct {
523b02ea
JB
76 /* protects tx context */
77 spinlock_t txlock;
78
f0706e82 79 /* last used TSC */
b0f76b33 80 struct tkip_ctx tx;
f0706e82
JB
81
82 /* last received RSC */
5a306f58 83 struct tkip_ctx rx[IEEE80211_NUM_TIDS];
b98ea058
S
84
85 /* number of mic failures */
86 u32 mic_failures;
f0706e82
JB
87 } tkip;
88 struct {
aba83a0b 89 atomic64_t tx_pn;
9190252c
JM
90 /*
91 * Last received packet number. The first
5a306f58 92 * IEEE80211_NUM_TIDS counters are used with Data
9190252c
JM
93 * frames and the last counter is used with Robust
94 * Management frames.
95 */
5a306f58 96 u8 rx_pn[IEEE80211_NUM_TIDS + 1][CCMP_PN_LEN];
f0706e82
JB
97 struct crypto_cipher *tfm;
98 u32 replays; /* dot11RSNAStatsCCMPReplays */
f0706e82 99 } ccmp;
765cb46a 100 struct {
75396ae6 101 atomic64_t tx_pn;
3ea542d3 102 u8 rx_pn[CMAC_PN_LEN];
765cb46a
JM
103 struct crypto_cipher *tfm;
104 u32 replays; /* dot11RSNAStatsCMACReplays */
105 u32 icverrors; /* dot11RSNAStatsCMACICVErrors */
765cb46a 106 } aes_cmac;
f0706e82 107 } u;
f0706e82 108
8f20fc24
JB
109 /* number of times this key has been used */
110 int tx_rx_count;
f0706e82 111
e9f207f0
JB
112#ifdef CONFIG_MAC80211_DEBUGFS
113 struct {
114 struct dentry *stalink;
115 struct dentry *dir;
d9c58f30 116 int cnt;
e9f207f0
JB
117 } debugfs;
118#endif
119
8f20fc24
JB
120 /*
121 * key config, must be last because it contains key
122 * material as variable length member
123 */
124 struct ieee80211_key_conf conf;
f0706e82
JB
125};
126
97359d12 127struct ieee80211_key *ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
faa8fdc8
JM
128 const u8 *key_data,
129 size_t seq_len, const u8 *seq);
db4d1169
JB
130/*
131 * Insert a key into data structures (sdata, sta if necessary)
79cf2dfa 132 * to make it used, free old key. On failure, also free the new key.
db4d1169 133 */
79cf2dfa
JB
134int ieee80211_key_link(struct ieee80211_key *key,
135 struct ieee80211_sub_if_data *sdata,
136 struct sta_info *sta);
3b8d9c29 137void ieee80211_key_free(struct ieee80211_key *key, bool delay_tailroom);
79cf2dfa 138void ieee80211_key_free_unused(struct ieee80211_key *key);
f7e0104c
JB
139void ieee80211_set_default_key(struct ieee80211_sub_if_data *sdata, int idx,
140 bool uni, bool multi);
3cfcf6ac
JM
141void ieee80211_set_default_mgmt_key(struct ieee80211_sub_if_data *sdata,
142 int idx);
11a843b7 143void ieee80211_free_keys(struct ieee80211_sub_if_data *sdata);
6d10e46b
JB
144void ieee80211_free_sta_keys(struct ieee80211_local *local,
145 struct sta_info *sta);
11a843b7 146void ieee80211_enable_keys(struct ieee80211_sub_if_data *sdata);
11a843b7 147
40b275b6
JB
148#define key_mtx_dereference(local, ref) \
149 rcu_dereference_protected(ref, lockdep_is_held(&((local)->key_mtx)))
150
8d1f7ecd
JB
151void ieee80211_delayed_tailroom_dec(struct work_struct *wk);
152
f0706e82 153#endif /* IEEE80211_KEY_H */