[SERIAL] typo: buad -> baud
[linux-2.6/cjktty.git] / net / ieee80211 / ieee80211_crypt_tkip.c
blob93def94c1b3253e6fca9c960f39be0c5b2404998
1 /*
2 * Host AP crypt: host-based TKIP encryption implementation for Host AP driver
4 * Copyright (c) 2003-2004, Jouni Malinen <jkmaline@cc.hut.fi>
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation. See README and COPYING for
9 * more details.
12 #include <linux/config.h>
13 #include <linux/module.h>
14 #include <linux/init.h>
15 #include <linux/slab.h>
16 #include <linux/random.h>
17 #include <linux/skbuff.h>
18 #include <linux/netdevice.h>
19 #include <linux/if_ether.h>
20 #include <linux/if_arp.h>
21 #include <asm/string.h>
23 #include <net/ieee80211.h>
25 #include <linux/crypto.h>
26 #include <asm/scatterlist.h>
27 #include <linux/crc32.h>
29 MODULE_AUTHOR("Jouni Malinen");
30 MODULE_DESCRIPTION("Host AP crypt: TKIP");
31 MODULE_LICENSE("GPL");
33 struct ieee80211_tkip_data {
34 #define TKIP_KEY_LEN 32
35 u8 key[TKIP_KEY_LEN];
36 int key_set;
38 u32 tx_iv32;
39 u16 tx_iv16;
40 u16 tx_ttak[5];
41 int tx_phase1_done;
43 u32 rx_iv32;
44 u16 rx_iv16;
45 u16 rx_ttak[5];
46 int rx_phase1_done;
47 u32 rx_iv32_new;
48 u16 rx_iv16_new;
50 u32 dot11RSNAStatsTKIPReplays;
51 u32 dot11RSNAStatsTKIPICVErrors;
52 u32 dot11RSNAStatsTKIPLocalMICFailures;
54 int key_idx;
56 struct crypto_tfm *tfm_arc4;
57 struct crypto_tfm *tfm_michael;
59 /* scratch buffers for virt_to_page() (crypto API) */
60 u8 rx_hdr[16], tx_hdr[16];
62 unsigned long flags;
65 static unsigned long ieee80211_tkip_set_flags(unsigned long flags, void *priv)
67 struct ieee80211_tkip_data *_priv = priv;
68 unsigned long old_flags = _priv->flags;
69 _priv->flags = flags;
70 return old_flags;
73 static unsigned long ieee80211_tkip_get_flags(void *priv)
75 struct ieee80211_tkip_data *_priv = priv;
76 return _priv->flags;
79 static void *ieee80211_tkip_init(int key_idx)
81 struct ieee80211_tkip_data *priv;
83 priv = kzalloc(sizeof(*priv), GFP_ATOMIC);
84 if (priv == NULL)
85 goto fail;
87 priv->key_idx = key_idx;
89 priv->tfm_arc4 = crypto_alloc_tfm("arc4", 0);
90 if (priv->tfm_arc4 == NULL) {
91 printk(KERN_DEBUG "ieee80211_crypt_tkip: could not allocate "
92 "crypto API arc4\n");
93 goto fail;
96 priv->tfm_michael = crypto_alloc_tfm("michael_mic", 0);
97 if (priv->tfm_michael == NULL) {
98 printk(KERN_DEBUG "ieee80211_crypt_tkip: could not allocate "
99 "crypto API michael_mic\n");
100 goto fail;
103 return priv;
105 fail:
106 if (priv) {
107 if (priv->tfm_michael)
108 crypto_free_tfm(priv->tfm_michael);
109 if (priv->tfm_arc4)
110 crypto_free_tfm(priv->tfm_arc4);
111 kfree(priv);
114 return NULL;
117 static void ieee80211_tkip_deinit(void *priv)
119 struct ieee80211_tkip_data *_priv = priv;
120 if (_priv && _priv->tfm_michael)
121 crypto_free_tfm(_priv->tfm_michael);
122 if (_priv && _priv->tfm_arc4)
123 crypto_free_tfm(_priv->tfm_arc4);
124 kfree(priv);
127 static inline u16 RotR1(u16 val)
129 return (val >> 1) | (val << 15);
132 static inline u8 Lo8(u16 val)
134 return val & 0xff;
137 static inline u8 Hi8(u16 val)
139 return val >> 8;
142 static inline u16 Lo16(u32 val)
144 return val & 0xffff;
147 static inline u16 Hi16(u32 val)
149 return val >> 16;
152 static inline u16 Mk16(u8 hi, u8 lo)
154 return lo | (((u16) hi) << 8);
157 static inline u16 Mk16_le(u16 * v)
159 return le16_to_cpu(*v);
162 static const u16 Sbox[256] = {
163 0xC6A5, 0xF884, 0xEE99, 0xF68D, 0xFF0D, 0xD6BD, 0xDEB1, 0x9154,
164 0x6050, 0x0203, 0xCEA9, 0x567D, 0xE719, 0xB562, 0x4DE6, 0xEC9A,
165 0x8F45, 0x1F9D, 0x8940, 0xFA87, 0xEF15, 0xB2EB, 0x8EC9, 0xFB0B,
166 0x41EC, 0xB367, 0x5FFD, 0x45EA, 0x23BF, 0x53F7, 0xE496, 0x9B5B,
167 0x75C2, 0xE11C, 0x3DAE, 0x4C6A, 0x6C5A, 0x7E41, 0xF502, 0x834F,
168 0x685C, 0x51F4, 0xD134, 0xF908, 0xE293, 0xAB73, 0x6253, 0x2A3F,
169 0x080C, 0x9552, 0x4665, 0x9D5E, 0x3028, 0x37A1, 0x0A0F, 0x2FB5,
170 0x0E09, 0x2436, 0x1B9B, 0xDF3D, 0xCD26, 0x4E69, 0x7FCD, 0xEA9F,
171 0x121B, 0x1D9E, 0x5874, 0x342E, 0x362D, 0xDCB2, 0xB4EE, 0x5BFB,
172 0xA4F6, 0x764D, 0xB761, 0x7DCE, 0x527B, 0xDD3E, 0x5E71, 0x1397,
173 0xA6F5, 0xB968, 0x0000, 0xC12C, 0x4060, 0xE31F, 0x79C8, 0xB6ED,
174 0xD4BE, 0x8D46, 0x67D9, 0x724B, 0x94DE, 0x98D4, 0xB0E8, 0x854A,
175 0xBB6B, 0xC52A, 0x4FE5, 0xED16, 0x86C5, 0x9AD7, 0x6655, 0x1194,
176 0x8ACF, 0xE910, 0x0406, 0xFE81, 0xA0F0, 0x7844, 0x25BA, 0x4BE3,
177 0xA2F3, 0x5DFE, 0x80C0, 0x058A, 0x3FAD, 0x21BC, 0x7048, 0xF104,
178 0x63DF, 0x77C1, 0xAF75, 0x4263, 0x2030, 0xE51A, 0xFD0E, 0xBF6D,
179 0x814C, 0x1814, 0x2635, 0xC32F, 0xBEE1, 0x35A2, 0x88CC, 0x2E39,
180 0x9357, 0x55F2, 0xFC82, 0x7A47, 0xC8AC, 0xBAE7, 0x322B, 0xE695,
181 0xC0A0, 0x1998, 0x9ED1, 0xA37F, 0x4466, 0x547E, 0x3BAB, 0x0B83,
182 0x8CCA, 0xC729, 0x6BD3, 0x283C, 0xA779, 0xBCE2, 0x161D, 0xAD76,
183 0xDB3B, 0x6456, 0x744E, 0x141E, 0x92DB, 0x0C0A, 0x486C, 0xB8E4,
184 0x9F5D, 0xBD6E, 0x43EF, 0xC4A6, 0x39A8, 0x31A4, 0xD337, 0xF28B,
185 0xD532, 0x8B43, 0x6E59, 0xDAB7, 0x018C, 0xB164, 0x9CD2, 0x49E0,
186 0xD8B4, 0xACFA, 0xF307, 0xCF25, 0xCAAF, 0xF48E, 0x47E9, 0x1018,
187 0x6FD5, 0xF088, 0x4A6F, 0x5C72, 0x3824, 0x57F1, 0x73C7, 0x9751,
188 0xCB23, 0xA17C, 0xE89C, 0x3E21, 0x96DD, 0x61DC, 0x0D86, 0x0F85,
189 0xE090, 0x7C42, 0x71C4, 0xCCAA, 0x90D8, 0x0605, 0xF701, 0x1C12,
190 0xC2A3, 0x6A5F, 0xAEF9, 0x69D0, 0x1791, 0x9958, 0x3A27, 0x27B9,
191 0xD938, 0xEB13, 0x2BB3, 0x2233, 0xD2BB, 0xA970, 0x0789, 0x33A7,
192 0x2DB6, 0x3C22, 0x1592, 0xC920, 0x8749, 0xAAFF, 0x5078, 0xA57A,
193 0x038F, 0x59F8, 0x0980, 0x1A17, 0x65DA, 0xD731, 0x84C6, 0xD0B8,
194 0x82C3, 0x29B0, 0x5A77, 0x1E11, 0x7BCB, 0xA8FC, 0x6DD6, 0x2C3A,
197 static inline u16 _S_(u16 v)
199 u16 t = Sbox[Hi8(v)];
200 return Sbox[Lo8(v)] ^ ((t << 8) | (t >> 8));
203 #define PHASE1_LOOP_COUNT 8
205 static void tkip_mixing_phase1(u16 * TTAK, const u8 * TK, const u8 * TA,
206 u32 IV32)
208 int i, j;
210 /* Initialize the 80-bit TTAK from TSC (IV32) and TA[0..5] */
211 TTAK[0] = Lo16(IV32);
212 TTAK[1] = Hi16(IV32);
213 TTAK[2] = Mk16(TA[1], TA[0]);
214 TTAK[3] = Mk16(TA[3], TA[2]);
215 TTAK[4] = Mk16(TA[5], TA[4]);
217 for (i = 0; i < PHASE1_LOOP_COUNT; i++) {
218 j = 2 * (i & 1);
219 TTAK[0] += _S_(TTAK[4] ^ Mk16(TK[1 + j], TK[0 + j]));
220 TTAK[1] += _S_(TTAK[0] ^ Mk16(TK[5 + j], TK[4 + j]));
221 TTAK[2] += _S_(TTAK[1] ^ Mk16(TK[9 + j], TK[8 + j]));
222 TTAK[3] += _S_(TTAK[2] ^ Mk16(TK[13 + j], TK[12 + j]));
223 TTAK[4] += _S_(TTAK[3] ^ Mk16(TK[1 + j], TK[0 + j])) + i;
227 static void tkip_mixing_phase2(u8 * WEPSeed, const u8 * TK, const u16 * TTAK,
228 u16 IV16)
230 /* Make temporary area overlap WEP seed so that the final copy can be
231 * avoided on little endian hosts. */
232 u16 *PPK = (u16 *) & WEPSeed[4];
234 /* Step 1 - make copy of TTAK and bring in TSC */
235 PPK[0] = TTAK[0];
236 PPK[1] = TTAK[1];
237 PPK[2] = TTAK[2];
238 PPK[3] = TTAK[3];
239 PPK[4] = TTAK[4];
240 PPK[5] = TTAK[4] + IV16;
242 /* Step 2 - 96-bit bijective mixing using S-box */
243 PPK[0] += _S_(PPK[5] ^ Mk16_le((u16 *) & TK[0]));
244 PPK[1] += _S_(PPK[0] ^ Mk16_le((u16 *) & TK[2]));
245 PPK[2] += _S_(PPK[1] ^ Mk16_le((u16 *) & TK[4]));
246 PPK[3] += _S_(PPK[2] ^ Mk16_le((u16 *) & TK[6]));
247 PPK[4] += _S_(PPK[3] ^ Mk16_le((u16 *) & TK[8]));
248 PPK[5] += _S_(PPK[4] ^ Mk16_le((u16 *) & TK[10]));
250 PPK[0] += RotR1(PPK[5] ^ Mk16_le((u16 *) & TK[12]));
251 PPK[1] += RotR1(PPK[0] ^ Mk16_le((u16 *) & TK[14]));
252 PPK[2] += RotR1(PPK[1]);
253 PPK[3] += RotR1(PPK[2]);
254 PPK[4] += RotR1(PPK[3]);
255 PPK[5] += RotR1(PPK[4]);
257 /* Step 3 - bring in last of TK bits, assign 24-bit WEP IV value
258 * WEPSeed[0..2] is transmitted as WEP IV */
259 WEPSeed[0] = Hi8(IV16);
260 WEPSeed[1] = (Hi8(IV16) | 0x20) & 0x7F;
261 WEPSeed[2] = Lo8(IV16);
262 WEPSeed[3] = Lo8((PPK[5] ^ Mk16_le((u16 *) & TK[0])) >> 1);
264 #ifdef __BIG_ENDIAN
266 int i;
267 for (i = 0; i < 6; i++)
268 PPK[i] = (PPK[i] << 8) | (PPK[i] >> 8);
270 #endif
273 static int ieee80211_tkip_hdr(struct sk_buff *skb, int hdr_len,
274 u8 * rc4key, int keylen, void *priv)
276 struct ieee80211_tkip_data *tkey = priv;
277 int len;
278 u8 *pos;
279 struct ieee80211_hdr_4addr *hdr;
281 hdr = (struct ieee80211_hdr_4addr *)skb->data;
283 if (skb_headroom(skb) < 8 || skb->len < hdr_len)
284 return -1;
286 if (rc4key == NULL || keylen < 16)
287 return -1;
289 if (!tkey->tx_phase1_done) {
290 tkip_mixing_phase1(tkey->tx_ttak, tkey->key, hdr->addr2,
291 tkey->tx_iv32);
292 tkey->tx_phase1_done = 1;
294 tkip_mixing_phase2(rc4key, tkey->key, tkey->tx_ttak, tkey->tx_iv16);
296 len = skb->len - hdr_len;
297 pos = skb_push(skb, 8);
298 memmove(pos, pos + 8, hdr_len);
299 pos += hdr_len;
301 *pos++ = *rc4key;
302 *pos++ = *(rc4key + 1);
303 *pos++ = *(rc4key + 2);
304 *pos++ = (tkey->key_idx << 6) | (1 << 5) /* Ext IV included */ ;
305 *pos++ = tkey->tx_iv32 & 0xff;
306 *pos++ = (tkey->tx_iv32 >> 8) & 0xff;
307 *pos++ = (tkey->tx_iv32 >> 16) & 0xff;
308 *pos++ = (tkey->tx_iv32 >> 24) & 0xff;
310 tkey->tx_iv16++;
311 if (tkey->tx_iv16 == 0) {
312 tkey->tx_phase1_done = 0;
313 tkey->tx_iv32++;
316 return 8;
319 static int ieee80211_tkip_encrypt(struct sk_buff *skb, int hdr_len, void *priv)
321 struct ieee80211_tkip_data *tkey = priv;
322 int len;
323 u8 rc4key[16], *pos, *icv;
324 u32 crc;
325 struct scatterlist sg;
327 if (tkey->flags & IEEE80211_CRYPTO_TKIP_COUNTERMEASURES) {
328 if (net_ratelimit()) {
329 struct ieee80211_hdr_4addr *hdr =
330 (struct ieee80211_hdr_4addr *)skb->data;
331 printk(KERN_DEBUG ": TKIP countermeasures: dropped "
332 "TX packet to " MAC_FMT "\n",
333 MAC_ARG(hdr->addr1));
335 return -1;
338 if (skb_tailroom(skb) < 4 || skb->len < hdr_len)
339 return -1;
341 len = skb->len - hdr_len;
342 pos = skb->data + hdr_len;
344 if ((ieee80211_tkip_hdr(skb, hdr_len, rc4key, 16, priv)) < 0)
345 return -1;
347 icv = skb_put(skb, 4);
349 crc = ~crc32_le(~0, pos, len);
350 icv[0] = crc;
351 icv[1] = crc >> 8;
352 icv[2] = crc >> 16;
353 icv[3] = crc >> 24;
355 crypto_cipher_setkey(tkey->tfm_arc4, rc4key, 16);
356 sg.page = virt_to_page(pos);
357 sg.offset = offset_in_page(pos);
358 sg.length = len + 4;
359 crypto_cipher_encrypt(tkey->tfm_arc4, &sg, &sg, len + 4);
361 return 0;
364 static int ieee80211_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
366 struct ieee80211_tkip_data *tkey = priv;
367 u8 rc4key[16];
368 u8 keyidx, *pos;
369 u32 iv32;
370 u16 iv16;
371 struct ieee80211_hdr_4addr *hdr;
372 u8 icv[4];
373 u32 crc;
374 struct scatterlist sg;
375 int plen;
377 hdr = (struct ieee80211_hdr_4addr *)skb->data;
379 if (tkey->flags & IEEE80211_CRYPTO_TKIP_COUNTERMEASURES) {
380 if (net_ratelimit()) {
381 printk(KERN_DEBUG ": TKIP countermeasures: dropped "
382 "received packet from " MAC_FMT "\n",
383 MAC_ARG(hdr->addr2));
385 return -1;
388 if (skb->len < hdr_len + 8 + 4)
389 return -1;
391 pos = skb->data + hdr_len;
392 keyidx = pos[3];
393 if (!(keyidx & (1 << 5))) {
394 if (net_ratelimit()) {
395 printk(KERN_DEBUG "TKIP: received packet without ExtIV"
396 " flag from " MAC_FMT "\n", MAC_ARG(hdr->addr2));
398 return -2;
400 keyidx >>= 6;
401 if (tkey->key_idx != keyidx) {
402 printk(KERN_DEBUG "TKIP: RX tkey->key_idx=%d frame "
403 "keyidx=%d priv=%p\n", tkey->key_idx, keyidx, priv);
404 return -6;
406 if (!tkey->key_set) {
407 if (net_ratelimit()) {
408 printk(KERN_DEBUG "TKIP: received packet from " MAC_FMT
409 " with keyid=%d that does not have a configured"
410 " key\n", MAC_ARG(hdr->addr2), keyidx);
412 return -3;
414 iv16 = (pos[0] << 8) | pos[2];
415 iv32 = pos[4] | (pos[5] << 8) | (pos[6] << 16) | (pos[7] << 24);
416 pos += 8;
418 if (iv32 < tkey->rx_iv32 ||
419 (iv32 == tkey->rx_iv32 && iv16 <= tkey->rx_iv16)) {
420 if (net_ratelimit()) {
421 printk(KERN_DEBUG "TKIP: replay detected: STA=" MAC_FMT
422 " previous TSC %08x%04x received TSC "
423 "%08x%04x\n", MAC_ARG(hdr->addr2),
424 tkey->rx_iv32, tkey->rx_iv16, iv32, iv16);
426 tkey->dot11RSNAStatsTKIPReplays++;
427 return -4;
430 if (iv32 != tkey->rx_iv32 || !tkey->rx_phase1_done) {
431 tkip_mixing_phase1(tkey->rx_ttak, tkey->key, hdr->addr2, iv32);
432 tkey->rx_phase1_done = 1;
434 tkip_mixing_phase2(rc4key, tkey->key, tkey->rx_ttak, iv16);
436 plen = skb->len - hdr_len - 12;
438 crypto_cipher_setkey(tkey->tfm_arc4, rc4key, 16);
439 sg.page = virt_to_page(pos);
440 sg.offset = offset_in_page(pos);
441 sg.length = plen + 4;
442 crypto_cipher_decrypt(tkey->tfm_arc4, &sg, &sg, plen + 4);
444 crc = ~crc32_le(~0, pos, plen);
445 icv[0] = crc;
446 icv[1] = crc >> 8;
447 icv[2] = crc >> 16;
448 icv[3] = crc >> 24;
449 if (memcmp(icv, pos + plen, 4) != 0) {
450 if (iv32 != tkey->rx_iv32) {
451 /* Previously cached Phase1 result was already lost, so
452 * it needs to be recalculated for the next packet. */
453 tkey->rx_phase1_done = 0;
455 if (net_ratelimit()) {
456 printk(KERN_DEBUG "TKIP: ICV error detected: STA="
457 MAC_FMT "\n", MAC_ARG(hdr->addr2));
459 tkey->dot11RSNAStatsTKIPICVErrors++;
460 return -5;
463 /* Update real counters only after Michael MIC verification has
464 * completed */
465 tkey->rx_iv32_new = iv32;
466 tkey->rx_iv16_new = iv16;
468 /* Remove IV and ICV */
469 memmove(skb->data + 8, skb->data, hdr_len);
470 skb_pull(skb, 8);
471 skb_trim(skb, skb->len - 4);
473 return keyidx;
476 static int michael_mic(struct ieee80211_tkip_data *tkey, u8 * key, u8 * hdr,
477 u8 * data, size_t data_len, u8 * mic)
479 struct scatterlist sg[2];
481 if (tkey->tfm_michael == NULL) {
482 printk(KERN_WARNING "michael_mic: tfm_michael == NULL\n");
483 return -1;
485 sg[0].page = virt_to_page(hdr);
486 sg[0].offset = offset_in_page(hdr);
487 sg[0].length = 16;
489 sg[1].page = virt_to_page(data);
490 sg[1].offset = offset_in_page(data);
491 sg[1].length = data_len;
493 crypto_digest_init(tkey->tfm_michael);
494 crypto_digest_setkey(tkey->tfm_michael, key, 8);
495 crypto_digest_update(tkey->tfm_michael, sg, 2);
496 crypto_digest_final(tkey->tfm_michael, mic);
498 return 0;
501 static void michael_mic_hdr(struct sk_buff *skb, u8 * hdr)
503 struct ieee80211_hdr_4addr *hdr11;
505 hdr11 = (struct ieee80211_hdr_4addr *)skb->data;
506 switch (le16_to_cpu(hdr11->frame_ctl) &
507 (IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS)) {
508 case IEEE80211_FCTL_TODS:
509 memcpy(hdr, hdr11->addr3, ETH_ALEN); /* DA */
510 memcpy(hdr + ETH_ALEN, hdr11->addr2, ETH_ALEN); /* SA */
511 break;
512 case IEEE80211_FCTL_FROMDS:
513 memcpy(hdr, hdr11->addr1, ETH_ALEN); /* DA */
514 memcpy(hdr + ETH_ALEN, hdr11->addr3, ETH_ALEN); /* SA */
515 break;
516 case IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS:
517 memcpy(hdr, hdr11->addr3, ETH_ALEN); /* DA */
518 memcpy(hdr + ETH_ALEN, hdr11->addr4, ETH_ALEN); /* SA */
519 break;
520 case 0:
521 memcpy(hdr, hdr11->addr1, ETH_ALEN); /* DA */
522 memcpy(hdr + ETH_ALEN, hdr11->addr2, ETH_ALEN); /* SA */
523 break;
526 hdr[12] = 0; /* priority */
527 hdr[13] = hdr[14] = hdr[15] = 0; /* reserved */
530 static int ieee80211_michael_mic_add(struct sk_buff *skb, int hdr_len,
531 void *priv)
533 struct ieee80211_tkip_data *tkey = priv;
534 u8 *pos;
536 if (skb_tailroom(skb) < 8 || skb->len < hdr_len) {
537 printk(KERN_DEBUG "Invalid packet for Michael MIC add "
538 "(tailroom=%d hdr_len=%d skb->len=%d)\n",
539 skb_tailroom(skb), hdr_len, skb->len);
540 return -1;
543 michael_mic_hdr(skb, tkey->tx_hdr);
544 pos = skb_put(skb, 8);
545 if (michael_mic(tkey, &tkey->key[16], tkey->tx_hdr,
546 skb->data + hdr_len, skb->len - 8 - hdr_len, pos))
547 return -1;
549 return 0;
552 static void ieee80211_michael_mic_failure(struct net_device *dev,
553 struct ieee80211_hdr_4addr *hdr,
554 int keyidx)
556 union iwreq_data wrqu;
557 struct iw_michaelmicfailure ev;
559 /* TODO: needed parameters: count, keyid, key type, TSC */
560 memset(&ev, 0, sizeof(ev));
561 ev.flags = keyidx & IW_MICFAILURE_KEY_ID;
562 if (hdr->addr1[0] & 0x01)
563 ev.flags |= IW_MICFAILURE_GROUP;
564 else
565 ev.flags |= IW_MICFAILURE_PAIRWISE;
566 ev.src_addr.sa_family = ARPHRD_ETHER;
567 memcpy(ev.src_addr.sa_data, hdr->addr2, ETH_ALEN);
568 memset(&wrqu, 0, sizeof(wrqu));
569 wrqu.data.length = sizeof(ev);
570 wireless_send_event(dev, IWEVMICHAELMICFAILURE, &wrqu, (char *)&ev);
573 static int ieee80211_michael_mic_verify(struct sk_buff *skb, int keyidx,
574 int hdr_len, void *priv)
576 struct ieee80211_tkip_data *tkey = priv;
577 u8 mic[8];
579 if (!tkey->key_set)
580 return -1;
582 michael_mic_hdr(skb, tkey->rx_hdr);
583 if (michael_mic(tkey, &tkey->key[24], tkey->rx_hdr,
584 skb->data + hdr_len, skb->len - 8 - hdr_len, mic))
585 return -1;
586 if (memcmp(mic, skb->data + skb->len - 8, 8) != 0) {
587 struct ieee80211_hdr_4addr *hdr;
588 hdr = (struct ieee80211_hdr_4addr *)skb->data;
589 printk(KERN_DEBUG "%s: Michael MIC verification failed for "
590 "MSDU from " MAC_FMT " keyidx=%d\n",
591 skb->dev ? skb->dev->name : "N/A", MAC_ARG(hdr->addr2),
592 keyidx);
593 if (skb->dev)
594 ieee80211_michael_mic_failure(skb->dev, hdr, keyidx);
595 tkey->dot11RSNAStatsTKIPLocalMICFailures++;
596 return -1;
599 /* Update TSC counters for RX now that the packet verification has
600 * completed. */
601 tkey->rx_iv32 = tkey->rx_iv32_new;
602 tkey->rx_iv16 = tkey->rx_iv16_new;
604 skb_trim(skb, skb->len - 8);
606 return 0;
609 static int ieee80211_tkip_set_key(void *key, int len, u8 * seq, void *priv)
611 struct ieee80211_tkip_data *tkey = priv;
612 int keyidx;
613 struct crypto_tfm *tfm = tkey->tfm_michael;
614 struct crypto_tfm *tfm2 = tkey->tfm_arc4;
616 keyidx = tkey->key_idx;
617 memset(tkey, 0, sizeof(*tkey));
618 tkey->key_idx = keyidx;
619 tkey->tfm_michael = tfm;
620 tkey->tfm_arc4 = tfm2;
621 if (len == TKIP_KEY_LEN) {
622 memcpy(tkey->key, key, TKIP_KEY_LEN);
623 tkey->key_set = 1;
624 tkey->tx_iv16 = 1; /* TSC is initialized to 1 */
625 if (seq) {
626 tkey->rx_iv32 = (seq[5] << 24) | (seq[4] << 16) |
627 (seq[3] << 8) | seq[2];
628 tkey->rx_iv16 = (seq[1] << 8) | seq[0];
630 } else if (len == 0)
631 tkey->key_set = 0;
632 else
633 return -1;
635 return 0;
638 static int ieee80211_tkip_get_key(void *key, int len, u8 * seq, void *priv)
640 struct ieee80211_tkip_data *tkey = priv;
642 if (len < TKIP_KEY_LEN)
643 return -1;
645 if (!tkey->key_set)
646 return 0;
647 memcpy(key, tkey->key, TKIP_KEY_LEN);
649 if (seq) {
650 /* Return the sequence number of the last transmitted frame. */
651 u16 iv16 = tkey->tx_iv16;
652 u32 iv32 = tkey->tx_iv32;
653 if (iv16 == 0)
654 iv32--;
655 iv16--;
656 seq[0] = tkey->tx_iv16;
657 seq[1] = tkey->tx_iv16 >> 8;
658 seq[2] = tkey->tx_iv32;
659 seq[3] = tkey->tx_iv32 >> 8;
660 seq[4] = tkey->tx_iv32 >> 16;
661 seq[5] = tkey->tx_iv32 >> 24;
664 return TKIP_KEY_LEN;
667 static char *ieee80211_tkip_print_stats(char *p, void *priv)
669 struct ieee80211_tkip_data *tkip = priv;
670 p += sprintf(p, "key[%d] alg=TKIP key_set=%d "
671 "tx_pn=%02x%02x%02x%02x%02x%02x "
672 "rx_pn=%02x%02x%02x%02x%02x%02x "
673 "replays=%d icv_errors=%d local_mic_failures=%d\n",
674 tkip->key_idx, tkip->key_set,
675 (tkip->tx_iv32 >> 24) & 0xff,
676 (tkip->tx_iv32 >> 16) & 0xff,
677 (tkip->tx_iv32 >> 8) & 0xff,
678 tkip->tx_iv32 & 0xff,
679 (tkip->tx_iv16 >> 8) & 0xff,
680 tkip->tx_iv16 & 0xff,
681 (tkip->rx_iv32 >> 24) & 0xff,
682 (tkip->rx_iv32 >> 16) & 0xff,
683 (tkip->rx_iv32 >> 8) & 0xff,
684 tkip->rx_iv32 & 0xff,
685 (tkip->rx_iv16 >> 8) & 0xff,
686 tkip->rx_iv16 & 0xff,
687 tkip->dot11RSNAStatsTKIPReplays,
688 tkip->dot11RSNAStatsTKIPICVErrors,
689 tkip->dot11RSNAStatsTKIPLocalMICFailures);
690 return p;
693 static struct ieee80211_crypto_ops ieee80211_crypt_tkip = {
694 .name = "TKIP",
695 .init = ieee80211_tkip_init,
696 .deinit = ieee80211_tkip_deinit,
697 .build_iv = ieee80211_tkip_hdr,
698 .encrypt_mpdu = ieee80211_tkip_encrypt,
699 .decrypt_mpdu = ieee80211_tkip_decrypt,
700 .encrypt_msdu = ieee80211_michael_mic_add,
701 .decrypt_msdu = ieee80211_michael_mic_verify,
702 .set_key = ieee80211_tkip_set_key,
703 .get_key = ieee80211_tkip_get_key,
704 .print_stats = ieee80211_tkip_print_stats,
705 .extra_mpdu_prefix_len = 4 + 4, /* IV + ExtIV */
706 .extra_mpdu_postfix_len = 4, /* ICV */
707 .extra_msdu_postfix_len = 8, /* MIC */
708 .get_flags = ieee80211_tkip_get_flags,
709 .set_flags = ieee80211_tkip_set_flags,
710 .owner = THIS_MODULE,
713 static int __init ieee80211_crypto_tkip_init(void)
715 return ieee80211_register_crypto_ops(&ieee80211_crypt_tkip);
718 static void __exit ieee80211_crypto_tkip_exit(void)
720 ieee80211_unregister_crypto_ops(&ieee80211_crypt_tkip);
723 module_init(ieee80211_crypto_tkip_init);
724 module_exit(ieee80211_crypto_tkip_exit);