|
@@ -0,0 +1,224 @@
|
|
|
+/*
|
|
|
+ * Copyright (c) 2019 The Linux Foundation. All rights reserved.
|
|
|
+ *
|
|
|
+ * Permission to use, copy, modify, and/or distribute this software for
|
|
|
+ * any purpose with or without fee is hereby granted, provided that the
|
|
|
+ * above copyright notice and this permission notice appear in all
|
|
|
+ * copies.
|
|
|
+ *
|
|
|
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
|
|
|
+ * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
|
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
|
|
|
+ * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
|
|
|
+ * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
|
|
|
+ * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
|
|
|
+ * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
|
|
|
+ * PERFORMANCE OF THIS SOFTWARE.
|
|
|
+ */
|
|
|
+
|
|
|
+/**
|
|
|
+ * DOC: offload lmac interface APIs definitions for crypto
|
|
|
+ */
|
|
|
+
|
|
|
+#include <qdf_mem.h>
|
|
|
+#include <qdf_status.h>
|
|
|
+#include <target_if_crypto.h>
|
|
|
+#include <wmi_unified_priv.h>
|
|
|
+#include <wmi_unified_param.h>
|
|
|
+#include <wlan_objmgr_psoc_obj.h>
|
|
|
+#include <target_if.h>
|
|
|
+#include <wlan_crypto_global_def.h>
|
|
|
+#include <wlan_crypto_global_api.h>
|
|
|
+#include <wlan_objmgr_vdev_obj.h>
|
|
|
+#include <cdp_txrx_cmn_struct.h>
|
|
|
+#include <cds_api.h>
|
|
|
+#include <cdp_txrx_cmn.h>
|
|
|
+#include <wmi_unified_api.h>
|
|
|
+#include <cdp_txrx_peer_ops.h>
|
|
|
+
|
|
|
+#ifdef FEATURE_WLAN_WAPI
|
|
|
+static void wlan_crypto_set_wapi_key(struct wlan_objmgr_vdev *vdev,
|
|
|
+ bool pairwise,
|
|
|
+ enum wlan_crypto_cipher_type cipher_type,
|
|
|
+ struct set_key_params *params)
|
|
|
+{
|
|
|
+ static const unsigned char tx_iv[16] = {0x36, 0x5c, 0x36, 0x5c, 0x36,
|
|
|
+ 0x5c, 0x36, 0x5c, 0x36, 0x5c,
|
|
|
+ 0x36, 0x5c, 0x36, 0x5c, 0x36,
|
|
|
+ 0x5c};
|
|
|
+
|
|
|
+ static const unsigned char rx_iv[16] = {0x5c, 0x36, 0x5c, 0x36, 0x5c,
|
|
|
+ 0x36, 0x5c, 0x36, 0x5c, 0x36,
|
|
|
+ 0x5c, 0x36, 0x5c, 0x36, 0x5c,
|
|
|
+ 0x37};
|
|
|
+
|
|
|
+ if (cipher_type != WLAN_CRYPTO_CIPHER_WAPI_SMS4 ||
|
|
|
+ cipher_type != WLAN_CRYPTO_CIPHER_WAPI_GCM4)
|
|
|
+ return;
|
|
|
+
|
|
|
+ qdf_mem_copy(¶ms->rx_iv, &rx_iv,
|
|
|
+ WLAN_CRYPTO_WAPI_IV_SIZE);
|
|
|
+ qdf_mem_copy(¶ms->tx_iv, &tx_iv,
|
|
|
+ WLAN_CRYPTO_WAPI_IV_SIZE);
|
|
|
+
|
|
|
+ if (vdev->vdev_mlme.vdev_opmode == QDF_SAP_MODE) {
|
|
|
+ if (pairwise)
|
|
|
+ params->tx_iv[0] = 0x37;
|
|
|
+
|
|
|
+ params->rx_iv[WLAN_CRYPTO_WAPI_IV_SIZE - 1] = 0x36;
|
|
|
+ } else {
|
|
|
+ if (!pairwise)
|
|
|
+ params->rx_iv[WLAN_CRYPTO_WAPI_IV_SIZE - 1] = 0x36;
|
|
|
+ }
|
|
|
+
|
|
|
+ params->key_txmic_len = WLAN_CRYPTO_MIC_LEN;
|
|
|
+ params->key_rxmic_len = WLAN_CRYPTO_MIC_LEN;
|
|
|
+}
|
|
|
+#else
|
|
|
+static inline void wlan_crypto_set_wapi_key(struct wlan_objmgr_vdev *vdev,
|
|
|
+ bool pairwise,
|
|
|
+ enum wlan_crypto_cipher_type cipher,
|
|
|
+ struct set_key_params *params)
|
|
|
+{
|
|
|
+}
|
|
|
+#endif /* FEATURE_WLAN_WAPI */
|
|
|
+
|
|
|
+#ifdef BIG_ENDIAN_HOST
|
|
|
+static void wlan_crypto_endianness_conversion(uint8_t *dest, uint8_t *src,
|
|
|
+ uint32_t keylen)
|
|
|
+{
|
|
|
+ int8_t i;
|
|
|
+
|
|
|
+ for (i = 0; i < roundup(keylen, sizeof(uint32_t)) / 4; i++) {
|
|
|
+ *dest = le32_to_cpu(*src);
|
|
|
+ dest++;
|
|
|
+ src++;
|
|
|
+ }
|
|
|
+}
|
|
|
+#else
|
|
|
+static void wlan_crypto_endianness_conversion(uint8_t *dest, uint8_t *src,
|
|
|
+ uint32_t keylen)
|
|
|
+{
|
|
|
+ qdf_mem_copy(dest, src, keylen);
|
|
|
+}
|
|
|
+#endif
|
|
|
+
|
|
|
+QDF_STATUS target_if_crypto_set_key(struct wlan_objmgr_vdev *vdev,
|
|
|
+ struct wlan_crypto_key *req,
|
|
|
+ enum wlan_crypto_key_type key_type)
|
|
|
+{
|
|
|
+ struct set_key_params params = {0};
|
|
|
+ struct wlan_objmgr_psoc *psoc;
|
|
|
+ struct wlan_objmgr_pdev *pdev;
|
|
|
+ enum cdp_sec_type sec_type = cdp_sec_type_none;
|
|
|
+ void *soc = cds_get_context(QDF_MODULE_ID_SOC);
|
|
|
+ struct cdp_pdev *txrx_pdev = cds_get_context(QDF_MODULE_ID_TXRX);
|
|
|
+ struct cdp_vdev *txrx_vdev;
|
|
|
+ uint32_t pn[4] = {0, 0, 0, 0};
|
|
|
+ struct cdp_peer *peer = NULL;
|
|
|
+ uint8_t peer_id;
|
|
|
+ uint8_t def_tx_idx;
|
|
|
+ void *pdev_wmi_handle;
|
|
|
+ bool pairwise = false;
|
|
|
+ QDF_STATUS status;
|
|
|
+
|
|
|
+ pdev = wlan_vdev_get_pdev(vdev);
|
|
|
+ if (!pdev) {
|
|
|
+ target_if_err("Invalid PDEV");
|
|
|
+ return QDF_STATUS_E_FAILURE;
|
|
|
+ }
|
|
|
+ psoc = wlan_vdev_get_psoc(vdev);
|
|
|
+ if (!psoc) {
|
|
|
+ target_if_err("Invalid PSOC");
|
|
|
+ return QDF_STATUS_E_FAILURE;
|
|
|
+ }
|
|
|
+ soc = wlan_psoc_get_dp_handle(psoc);
|
|
|
+ if (!soc) {
|
|
|
+ target_if_err("Invalid DP Handle");
|
|
|
+ return QDF_STATUS_E_FAILURE;
|
|
|
+ }
|
|
|
+ params.vdev_id = wlan_vdev_get_id(vdev);
|
|
|
+ params.key_idx = req->keyix;
|
|
|
+ qdf_mem_copy(params.peer_mac, req->macaddr, IEEE80211_ADDR_LEN);
|
|
|
+ pdev_wmi_handle = GET_WMI_HDL_FROM_PDEV(pdev);
|
|
|
+ if (!pdev_wmi_handle) {
|
|
|
+ target_if_err("Invalid PDEV WMI handle");
|
|
|
+ return QDF_STATUS_E_FAILURE;
|
|
|
+ }
|
|
|
+
|
|
|
+ if (key_type != WLAN_CRYPTO_KEY_TYPE_UNICAST)
|
|
|
+ pairwise = false;
|
|
|
+ qdf_mem_copy(¶ms.key_rsc_ctr,
|
|
|
+ &req->keyrsc[0], sizeof(uint64_t));
|
|
|
+ params.key_flags = req->flags;
|
|
|
+ txrx_vdev = (struct cdp_vdev *)cdp_get_vdev_from_vdev_id(soc,
|
|
|
+ (struct cdp_pdev *)txrx_pdev, params.vdev_id);
|
|
|
+ peer = cdp_peer_find_by_addr(soc, txrx_pdev, req->macaddr, &peer_id);
|
|
|
+
|
|
|
+ if (!txrx_vdev) {
|
|
|
+ target_if_err("Invalid txrx vdev");
|
|
|
+ return QDF_STATUS_E_FAILURE;
|
|
|
+ }
|
|
|
+
|
|
|
+ if (!peer) {
|
|
|
+ target_if_err("Invalid peer");
|
|
|
+ return QDF_STATUS_E_FAILURE;
|
|
|
+ }
|
|
|
+
|
|
|
+ params.key_cipher = wlan_crypto_cipher_to_wmi_cipher(req->cipher_type);
|
|
|
+ sec_type = wlan_crypto_cipher_to_cdp_sec_type(req->cipher_type);
|
|
|
+ wlan_crypto_set_wapi_key(vdev, pairwise, req->cipher_type, ¶ms);
|
|
|
+
|
|
|
+ switch (req->cipher_type) {
|
|
|
+ case WLAN_CRYPTO_CIPHER_WEP:
|
|
|
+ def_tx_idx = wlan_crypto_get_default_key_idx(vdev, false);
|
|
|
+ if (pairwise && params.key_idx == def_tx_idx)
|
|
|
+ params.key_flags |= TX_USAGE;
|
|
|
+ else if ((vdev->vdev_mlme.vdev_opmode == QDF_SAP_MODE) &&
|
|
|
+ (params.key_idx == def_tx_idx))
|
|
|
+ params.key_flags |= TX_USAGE;
|
|
|
+ break;
|
|
|
+ case WLAN_CRYPTO_CIPHER_TKIP:
|
|
|
+ params.key_txmic_len = WLAN_CRYPTO_MIC_LEN;
|
|
|
+ params.key_rxmic_len = WLAN_CRYPTO_MIC_LEN;
|
|
|
+ break;
|
|
|
+ default:
|
|
|
+ break;
|
|
|
+ }
|
|
|
+
|
|
|
+ wlan_crypto_endianness_conversion(¶ms.key_data[0],
|
|
|
+ &req->keyval[0],
|
|
|
+ req->keylen);
|
|
|
+ params.key_len = req->keylen;
|
|
|
+ /* Set PN check & security type in data path */
|
|
|
+ cdp_set_pn_check(soc, txrx_vdev, peer, sec_type, pn);
|
|
|
+ cdp_set_key(soc, peer, pairwise,
|
|
|
+ (uint32_t *)(req->keyval +
|
|
|
+ WLAN_CRYPTO_IV_SIZE +
|
|
|
+ WLAN_CRYPTO_MIC_LEN));
|
|
|
+
|
|
|
+ target_if_debug("vdev_id:%d, key: idx:%d,len:%d", params.vdev_id,
|
|
|
+ params.key_idx, params.key_len);
|
|
|
+ target_if_debug("peer mac %pM", params.peer_mac);
|
|
|
+ QDF_TRACE_HEX_DUMP(QDF_MODULE_ID_CRYPTO, QDF_TRACE_LEVEL_DEBUG,
|
|
|
+ ¶ms.key_rsc_ctr, sizeof(uint64_t));
|
|
|
+ status = wmi_unified_setup_install_key_cmd(pdev_wmi_handle, ¶ms);
|
|
|
+
|
|
|
+ return status;
|
|
|
+}
|
|
|
+
|
|
|
+QDF_STATUS target_if_crypto_register_tx_ops(struct wlan_lmac_if_tx_ops *tx_ops)
|
|
|
+{
|
|
|
+ struct wlan_lmac_if_crypto_tx_ops *crypto;
|
|
|
+
|
|
|
+ if (!tx_ops) {
|
|
|
+ target_if_err("txops NULL");
|
|
|
+ return QDF_STATUS_E_FAILURE;
|
|
|
+ }
|
|
|
+ crypto = &tx_ops->crypto_tx_ops;
|
|
|
+
|
|
|
+ crypto->set_key = target_if_crypto_set_key;
|
|
|
+
|
|
|
+ return QDF_STATUS_SUCCESS;
|
|
|
+}
|
|
|
+
|