1
2
3
4
5
6
7
8#include <linux/etherdevice.h>
9#include <net/mac80211.h>
10
11#include "key.h"
12#include "wfx.h"
13#include "hif_tx_mib.h"
14
15static int wfx_alloc_key(struct wfx_dev *wdev)
16{
17 int idx;
18
19 idx = ffs(~wdev->key_map) - 1;
20 if (idx < 0 || idx >= MAX_KEY_ENTRIES)
21 return -1;
22
23 wdev->key_map |= BIT(idx);
24 return idx;
25}
26
27static void wfx_free_key(struct wfx_dev *wdev, int idx)
28{
29 WARN(!(wdev->key_map & BIT(idx)), "inconsistent key allocation");
30 wdev->key_map &= ~BIT(idx);
31}
32
33static u8 fill_wep_pair(struct hif_wep_pairwise_key *msg,
34 struct ieee80211_key_conf *key, u8 *peer_addr)
35{
36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data");
37 msg->key_length = key->keylen;
38 memcpy(msg->key_data, key->key, key->keylen);
39 ether_addr_copy(msg->peer_address, peer_addr);
40 return HIF_KEY_TYPE_WEP_PAIRWISE;
41}
42
43static u8 fill_wep_group(struct hif_wep_group_key *msg,
44 struct ieee80211_key_conf *key)
45{
46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data");
47 msg->key_id = key->keyidx;
48 msg->key_length = key->keylen;
49 memcpy(msg->key_data, key->key, key->keylen);
50 return HIF_KEY_TYPE_WEP_DEFAULT;
51}
52
53static u8 fill_tkip_pair(struct hif_tkip_pairwise_key *msg,
54 struct ieee80211_key_conf *key, u8 *peer_addr)
55{
56 u8 *keybuf = key->key;
57
58 WARN(key->keylen != sizeof(msg->tkip_key_data)
59 + sizeof(msg->tx_mic_key)
60 + sizeof(msg->rx_mic_key), "inconsistent data");
61 memcpy(msg->tkip_key_data, keybuf, sizeof(msg->tkip_key_data));
62 keybuf += sizeof(msg->tkip_key_data);
63 memcpy(msg->tx_mic_key, keybuf, sizeof(msg->tx_mic_key));
64 keybuf += sizeof(msg->tx_mic_key);
65 memcpy(msg->rx_mic_key, keybuf, sizeof(msg->rx_mic_key));
66 ether_addr_copy(msg->peer_address, peer_addr);
67 return HIF_KEY_TYPE_TKIP_PAIRWISE;
68}
69
70static u8 fill_tkip_group(struct hif_tkip_group_key *msg,
71 struct ieee80211_key_conf *key,
72 struct ieee80211_key_seq *seq,
73 enum nl80211_iftype iftype)
74{
75 u8 *keybuf = key->key;
76
77 WARN(key->keylen != sizeof(msg->tkip_key_data)
78 + 2 * sizeof(msg->rx_mic_key), "inconsistent data");
79 msg->key_id = key->keyidx;
80 memcpy(msg->rx_sequence_counter,
81 &seq->tkip.iv16, sizeof(seq->tkip.iv16));
82 memcpy(msg->rx_sequence_counter + sizeof(u16),
83 &seq->tkip.iv32, sizeof(seq->tkip.iv32));
84 memcpy(msg->tkip_key_data, keybuf, sizeof(msg->tkip_key_data));
85 keybuf += sizeof(msg->tkip_key_data);
86 if (iftype == NL80211_IFTYPE_AP)
87
88 memcpy(msg->rx_mic_key, keybuf + 0, sizeof(msg->rx_mic_key));
89 else
90
91 memcpy(msg->rx_mic_key, keybuf + 8, sizeof(msg->rx_mic_key));
92 return HIF_KEY_TYPE_TKIP_GROUP;
93}
94
95static u8 fill_ccmp_pair(struct hif_aes_pairwise_key *msg,
96 struct ieee80211_key_conf *key, u8 *peer_addr)
97{
98 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data");
99 ether_addr_copy(msg->peer_address, peer_addr);
100 memcpy(msg->aes_key_data, key->key, key->keylen);
101 return HIF_KEY_TYPE_AES_PAIRWISE;
102}
103
104static u8 fill_ccmp_group(struct hif_aes_group_key *msg,
105 struct ieee80211_key_conf *key,
106 struct ieee80211_key_seq *seq)
107{
108 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data");
109 memcpy(msg->aes_key_data, key->key, key->keylen);
110 memcpy(msg->rx_sequence_counter, seq->ccmp.pn, sizeof(seq->ccmp.pn));
111 memreverse(msg->rx_sequence_counter, sizeof(seq->ccmp.pn));
112 msg->key_id = key->keyidx;
113 return HIF_KEY_TYPE_AES_GROUP;
114}
115
116static u8 fill_sms4_pair(struct hif_wapi_pairwise_key *msg,
117 struct ieee80211_key_conf *key, u8 *peer_addr)
118{
119 u8 *keybuf = key->key;
120
121 WARN(key->keylen != sizeof(msg->wapi_key_data)
122 + sizeof(msg->mic_key_data), "inconsistent data");
123 ether_addr_copy(msg->peer_address, peer_addr);
124 memcpy(msg->wapi_key_data, keybuf, sizeof(msg->wapi_key_data));
125 keybuf += sizeof(msg->wapi_key_data);
126 memcpy(msg->mic_key_data, keybuf, sizeof(msg->mic_key_data));
127 msg->key_id = key->keyidx;
128 return HIF_KEY_TYPE_WAPI_PAIRWISE;
129}
130
131static u8 fill_sms4_group(struct hif_wapi_group_key *msg,
132 struct ieee80211_key_conf *key)
133{
134 u8 *keybuf = key->key;
135
136 WARN(key->keylen != sizeof(msg->wapi_key_data)
137 + sizeof(msg->mic_key_data), "inconsistent data");
138 memcpy(msg->wapi_key_data, keybuf, sizeof(msg->wapi_key_data));
139 keybuf += sizeof(msg->wapi_key_data);
140 memcpy(msg->mic_key_data, keybuf, sizeof(msg->mic_key_data));
141 msg->key_id = key->keyidx;
142 return HIF_KEY_TYPE_WAPI_GROUP;
143}
144
145static u8 fill_aes_cmac_group(struct hif_igtk_group_key *msg,
146 struct ieee80211_key_conf *key,
147 struct ieee80211_key_seq *seq)
148{
149 WARN(key->keylen != sizeof(msg->igtk_key_data), "inconsistent data");
150 memcpy(msg->igtk_key_data, key->key, key->keylen);
151 memcpy(msg->ipn, seq->aes_cmac.pn, sizeof(seq->aes_cmac.pn));
152 memreverse(msg->ipn, sizeof(seq->aes_cmac.pn));
153 msg->key_id = key->keyidx;
154 return HIF_KEY_TYPE_IGTK_GROUP;
155}
156
157static int wfx_add_key(struct wfx_vif *wvif, struct ieee80211_sta *sta,
158 struct ieee80211_key_conf *key)
159{
160 int ret;
161 struct hif_req_add_key k = { };
162 struct ieee80211_key_seq seq;
163 struct wfx_dev *wdev = wvif->wdev;
164 int idx = wfx_alloc_key(wvif->wdev);
165 bool pairwise = key->flags & IEEE80211_KEY_FLAG_PAIRWISE;
166
167 WARN(key->flags & IEEE80211_KEY_FLAG_PAIRWISE && !sta, "inconsistent data");
168 ieee80211_get_key_rx_seq(key, 0, &seq);
169 if (idx < 0)
170 return -EINVAL;
171 k.int_id = wvif->id;
172 k.entry_index = idx;
173 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 ||
174 key->cipher == WLAN_CIPHER_SUITE_WEP104) {
175 if (pairwise)
176 k.type = fill_wep_pair(&k.key.wep_pairwise_key, key,
177 sta->addr);
178 else
179 k.type = fill_wep_group(&k.key.wep_group_key, key);
180 } else if (key->cipher == WLAN_CIPHER_SUITE_TKIP) {
181 if (pairwise)
182 k.type = fill_tkip_pair(&k.key.tkip_pairwise_key, key,
183 sta->addr);
184 else
185 k.type = fill_tkip_group(&k.key.tkip_group_key, key,
186 &seq, wvif->vif->type);
187 } else if (key->cipher == WLAN_CIPHER_SUITE_CCMP) {
188 if (pairwise)
189 k.type = fill_ccmp_pair(&k.key.aes_pairwise_key, key,
190 sta->addr);
191 else
192 k.type = fill_ccmp_group(&k.key.aes_group_key, key,
193 &seq);
194 } else if (key->cipher == WLAN_CIPHER_SUITE_SMS4) {
195 if (pairwise)
196 k.type = fill_sms4_pair(&k.key.wapi_pairwise_key, key,
197 sta->addr);
198 else
199 k.type = fill_sms4_group(&k.key.wapi_group_key, key);
200 } else if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) {
201 k.type = fill_aes_cmac_group(&k.key.igtk_group_key, key, &seq);
202 key->flags |= IEEE80211_KEY_FLAG_GENERATE_MMIE;
203 } else {
204 dev_warn(wdev->dev, "unsupported key type %d\n", key->cipher);
205 wfx_free_key(wdev, idx);
206 return -EOPNOTSUPP;
207 }
208 ret = hif_add_key(wdev, &k);
209 if (ret) {
210 wfx_free_key(wdev, idx);
211 return -EOPNOTSUPP;
212 }
213 key->flags |= IEEE80211_KEY_FLAG_PUT_IV_SPACE |
214 IEEE80211_KEY_FLAG_RESERVE_TAILROOM;
215 key->hw_key_idx = idx;
216 return 0;
217}
218
219static int wfx_remove_key(struct wfx_vif *wvif, struct ieee80211_key_conf *key)
220{
221 WARN(key->hw_key_idx >= MAX_KEY_ENTRIES, "corrupted hw_key_idx");
222 wfx_free_key(wvif->wdev, key->hw_key_idx);
223 return hif_remove_key(wvif->wdev, key->hw_key_idx);
224}
225
226int wfx_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd,
227 struct ieee80211_vif *vif, struct ieee80211_sta *sta,
228 struct ieee80211_key_conf *key)
229{
230 int ret = -EOPNOTSUPP;
231 struct wfx_vif *wvif = (struct wfx_vif *)vif->drv_priv;
232
233 mutex_lock(&wvif->wdev->conf_mutex);
234 if (cmd == SET_KEY)
235 ret = wfx_add_key(wvif, sta, key);
236 if (cmd == DISABLE_KEY)
237 ret = wfx_remove_key(wvif, key);
238 mutex_unlock(&wvif->wdev->conf_mutex);
239 return ret;
240}
241
242