#include <sys/types.h>
#include <sys/note.h>
#include <sys/crypto/common.h>
#include <sys/crypto/api.h>
#include <sys/strsun.h>
#include "net80211_impl.h"
extern const struct ieee80211_cipher wep;
extern const struct ieee80211_cipher tkip;
extern const struct ieee80211_cipher ccmp;
static const char *cipher_modnames[] = {
"wlan_wep",
"wlan_tkip",
"wlan_aes_ocb",
"wlan_ccmp",
"wlan_ckip",
};
static int
nulldev_key_alloc(ieee80211com_t *ic, const struct ieee80211_key *k,
ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix)
{
*keyix = 0;
*rxkeyix = IEEE80211_KEYIX_NONE;
return (1);
}
static int
nulldev_key_delete(ieee80211com_t *ic, const struct ieee80211_key *k)
{
return (1);
}
static int
nulldev_key_set(ieee80211com_t *ic, const struct ieee80211_key *k,
const uint8_t *mac)
{
return (1);
}
static void
nulldev_key_update(ieee80211com_t *ic)
{
}
void
ieee80211_crypto_resetkey(ieee80211com_t *ic,
struct ieee80211_key *k, ieee80211_keyix ix)
{
k->wk_cipher = &ieee80211_cipher_none;
k->wk_private = k->wk_cipher->ic_attach(ic, k);
k->wk_keyix = ix;
k->wk_flags = IEEE80211_KEY_XMIT | IEEE80211_KEY_RECV;
}
int
ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags,
struct ieee80211_key *key)
{
const struct ieee80211_cipher *cip;
ieee80211_keyix keyix, rxkeyix;
void *keyctx;
uint16_t oflags;
if (cipher >= IEEE80211_CIPHER_MAX) {
ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_newkey: "
"invalid cipher %u\n", cipher);
return (0);
}
cip = ic->ic_ciphers[cipher];
if (cip == NULL) {
ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_newkey: "
"unable to load cipher %u, module %s\n",
cipher, cipher < IEEE80211_N(cipher_modnames) ?
cipher_modnames[cipher] : "<unknown>");
return (0);
}
oflags = key->wk_flags;
flags &= IEEE80211_KEY_COMMON;
if ((ic->ic_caps & (1<<cipher)) == 0) {
ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_newkey: "
"no h/w support for cipher %s, falling back to s/w\n",
cip->ic_name);
flags |= IEEE80211_KEY_SWCRYPT;
}
if (cipher == IEEE80211_CIPHER_TKIP &&
(ic->ic_caps & IEEE80211_C_TKIPMIC) == 0) {
ieee80211_dbg(IEEE80211_MSG_CRYPTO,
"no h/w support for TKIP MIC, falling back to s/w\n");
flags |= IEEE80211_KEY_SWMIC;
}
if (key->wk_cipher != cip || key->wk_flags != flags) {
again:
key->wk_flags = (uint16_t)flags;
keyctx = cip->ic_attach(ic, key);
if (keyctx == NULL) {
ieee80211_dbg(IEEE80211_MSG_CRYPTO, "crypto_setkey: "
"unable to attach cipher %s\n", cip->ic_name);
key->wk_flags = oflags;
return (0);
}
CIPHER_DETACH(key);
key->wk_cipher = cip;
key->wk_private = keyctx;
}
key->wk_flags = (uint16_t)flags;
if (key->wk_keyix == IEEE80211_KEYIX_NONE) {
if (!DEV_KEY_ALLOC(ic, key, &keyix, &rxkeyix)) {
if ((key->wk_flags & IEEE80211_KEY_SWCRYPT) == 0) {
ieee80211_dbg(IEEE80211_MSG_CRYPTO,
"crypto_setkey: "
"no h/w resources for cipher %s, "
"falling back to s/w\n", cip->ic_name);
oflags = key->wk_flags;
flags |= IEEE80211_KEY_SWCRYPT;
if (cipher == IEEE80211_CIPHER_TKIP)
flags |= IEEE80211_KEY_SWMIC;
goto again;
}
ieee80211_dbg(IEEE80211_MSG_CRYPTO, "crypto_setkey: "
"unable to setup cipher %s\n", cip->ic_name);
return (0);
}
key->wk_keyix = keyix;
key->wk_rxkeyix = rxkeyix;
}
return (1);
}
static int
ieee80211_crypto_delkey_locked(ieee80211com_t *ic, struct ieee80211_key *key)
{
uint16_t keyix;
ASSERT(key->wk_cipher != NULL);
keyix = key->wk_keyix;
if (keyix != IEEE80211_KEYIX_NONE) {
if (!DEV_KEY_DELETE(ic, key)) {
ieee80211_dbg(IEEE80211_MSG_CRYPTO,
"ieee80211_crypto_delkey_locked: ",
"driverdeletes key %u failed\n", keyix);
}
}
CIPHER_DETACH(key);
bzero(key, sizeof (struct ieee80211_key));
ieee80211_crypto_resetkey(ic, key, IEEE80211_KEYIX_NONE);
return (1);
}
int
ieee80211_crypto_delkey(ieee80211com_t *ic, struct ieee80211_key *key)
{
int status;
KEY_UPDATE_BEGIN(ic);
status = ieee80211_crypto_delkey_locked(ic, key);
KEY_UPDATE_END(ic);
return (status);
}
static void
ieee80211_crypto_delglobalkeys(ieee80211com_t *ic)
{
int i;
KEY_UPDATE_BEGIN(ic);
for (i = 0; i < IEEE80211_WEP_NKID; i++)
(void) ieee80211_crypto_delkey_locked(ic, &ic->ic_nw_keys[i]);
KEY_UPDATE_END(ic);
}
int
ieee80211_crypto_setkey(ieee80211com_t *ic, struct ieee80211_key *key,
const uint8_t *macaddr)
{
const struct ieee80211_cipher *cip = key->wk_cipher;
ASSERT(cip != NULL);
ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_setkey: "
"%s keyix %u flags 0x%x mac %s len %u\n",
cip->ic_name, key->wk_keyix, key->wk_flags,
ieee80211_macaddr_sprintf(macaddr), key->wk_keylen);
if (cip->ic_setkey(key) == 0) {
ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_setkey: "
"cipher %s rejected key index %u len %u flags 0x%x\n",
cip->ic_name, key->wk_keyix, key->wk_keylen,
key->wk_flags);
return (0);
}
if (key->wk_keyix == IEEE80211_KEYIX_NONE) {
ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_setkey: "
"no key index; should not happen!\n");
return (0);
}
return (DEV_KEY_SET(ic, key, macaddr));
}
struct ieee80211_key *
ieee80211_crypto_getkey(ieee80211com_t *ic)
{
if (ic->ic_def_txkey == IEEE80211_KEYIX_NONE ||
KEY_UNDEFINED(ic->ic_nw_keys[ic->ic_def_txkey]))
return (NULL);
return (&ic->ic_nw_keys[ic->ic_def_txkey]);
}
uint8_t
ieee80211_crypto_getciphertype(ieee80211com_t *ic)
{
struct ieee80211_key *key;
uint32_t cipher;
static const uint8_t ciphermap[] = {
WIFI_SEC_WEP,
WIFI_SEC_WPA,
(uint8_t)-1,
WIFI_SEC_WPA,
(uint8_t)-1,
WIFI_SEC_NONE,
};
if ((ic->ic_flags & IEEE80211_F_PRIVACY) == 0)
return (WIFI_SEC_NONE);
key = ieee80211_crypto_getkey(ic);
if (key == NULL)
return (WIFI_SEC_NONE);
cipher = key->wk_cipher->ic_cipher;
ASSERT(cipher < IEEE80211_N(ciphermap));
return (ciphermap[cipher]);
}
struct ieee80211_key *
ieee80211_crypto_encap(ieee80211com_t *ic, mblk_t *mp)
{
struct ieee80211_key *k;
const struct ieee80211_cipher *cip;
uint8_t keyix;
if (ic->ic_def_txkey == IEEE80211_KEYIX_NONE) {
ieee80211_dbg(IEEE80211_MSG_CRYPTO,
"ieee80211_crypto_encap: %s",
" No default xmit key for frame\n");
return (NULL);
}
keyix = ic->ic_def_txkey;
k = &ic->ic_nw_keys[ic->ic_def_txkey];
cip = k->wk_cipher;
return (cip->ic_encap(k, mp, keyix<<6) ? k : NULL);
}
struct ieee80211_key *
ieee80211_crypto_decap(ieee80211com_t *ic, mblk_t *mp, int hdrlen)
{
struct ieee80211_key *k;
const struct ieee80211_cipher *cip;
uint8_t *ivp;
uint8_t keyid;
if (MBLKL(mp) < IEEE80211_WEP_MINLEN) {
ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_decap:"
" WEP data frame too short, len %u\n",
MBLKL(mp));
return (NULL);
}
ivp = mp->b_rptr + hdrlen;
keyid = ivp[IEEE80211_WEP_IVLEN];
k = &ic->ic_nw_keys[keyid >> 6];
if (k->wk_cipher == &ieee80211_cipher_none ||
k->wk_cipher == NULL)
return (NULL);
cip = k->wk_cipher;
return ((cip->ic_decap)(k, mp, hdrlen) ? k : NULL);
}
void
ieee80211_crypto_attach(ieee80211com_t *ic)
{
struct ieee80211_crypto_state *cs = &ic->ic_crypto;
int i;
(void) crypto_mech2id(SUN_CKM_RC4);
(void) crypto_mech2id(SUN_CKM_AES_CBC);
(void) crypto_mech2id(SUN_CKM_AES_CCM);
cs->cs_def_txkey = IEEE80211_KEYIX_NONE;
for (i = 0; i < IEEE80211_WEP_NKID; i++) {
ieee80211_crypto_resetkey(ic, &cs->cs_nw_keys[i],
IEEE80211_KEYIX_NONE);
}
cs->cs_key_alloc = nulldev_key_alloc;
cs->cs_key_set = nulldev_key_set;
cs->cs_key_delete = nulldev_key_delete;
cs->cs_key_update_begin = nulldev_key_update;
cs->cs_key_update_end = nulldev_key_update;
ieee80211_crypto_register(ic, &wep);
ieee80211_crypto_register(ic, &tkip);
ieee80211_crypto_register(ic, &ccmp);
}
void
ieee80211_crypto_detach(ieee80211com_t *ic)
{
ieee80211_crypto_delglobalkeys(ic);
ieee80211_crypto_unregister(ic, &wep);
ieee80211_crypto_unregister(ic, &tkip);
ieee80211_crypto_unregister(ic, &ccmp);
}
void
ieee80211_crypto_register(ieee80211com_t *ic,
const struct ieee80211_cipher *cip)
{
if (cip->ic_cipher >= IEEE80211_CIPHER_MAX) {
ieee80211_err("ieee80211_crypto_register: "
"cipher %s has an invalid cipher index %u\n",
cip->ic_name, cip->ic_cipher);
return;
}
if (ic->ic_ciphers[cip->ic_cipher] != NULL &&
ic->ic_ciphers[cip->ic_cipher] != cip) {
ieee80211_err("ieee80211_crypto_register: "
"cipher %s registered with a different template\n",
cip->ic_name);
return;
}
ic->ic_ciphers[cip->ic_cipher] = cip;
}
void
ieee80211_crypto_unregister(ieee80211com_t *ic,
const struct ieee80211_cipher *cip)
{
if (cip->ic_cipher >= IEEE80211_CIPHER_MAX) {
ieee80211_err("ieee80211_crypto_unregister: "
"cipher %s has an invalid cipher index %u\n",
cip->ic_name, cip->ic_cipher);
return;
}
if (ic->ic_ciphers[cip->ic_cipher] != NULL &&
ic->ic_ciphers[cip->ic_cipher] != cip) {
ieee80211_err("ieee80211_crypto_unregister: "
"cipher %s registered with a different template\n",
cip->ic_name);
return;
}
ic->ic_ciphers[cip->ic_cipher] = NULL;
}