diff options
Diffstat (limited to 'usr/src/uts/common/io/net80211/net80211_crypto.c')
-rw-r--r-- | usr/src/uts/common/io/net80211/net80211_crypto.c | 510 |
1 files changed, 510 insertions, 0 deletions
diff --git a/usr/src/uts/common/io/net80211/net80211_crypto.c b/usr/src/uts/common/io/net80211/net80211_crypto.c new file mode 100644 index 0000000000..214e1700ec --- /dev/null +++ b/usr/src/uts/common/io/net80211/net80211_crypto.c @@ -0,0 +1,510 @@ +/* + * Copyright 2006 Sun Microsystems, Inc. All rights reserved. + * Use is subject to license terms. + */ + +/* + * Copyright (c) 2001 Atsushi Onoe + * Copyright (c) 2002-2005 Sam Leffler, Errno Consulting + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 3. The name of the author may not be used to endorse or promote products + * derived from this software without specific prior written permission. + * + * Alternatively, this software may be distributed under the terms of the + * GNU General Public License ("GPL") version 2 as published by the Free + * Software Foundation. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. + * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +#pragma ident "%Z%%M% %I% %E% SMI" + +/* + * IEEE 802.11 generic crypto support + */ +#include <sys/types.h> +#include <sys/note.h> +#include "net80211_impl.h" + +extern const struct ieee80211_cipher wep; + +/* + * Table of registered cipher modules. + */ +static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; +static const char *cipher_modnames[] = { + "wlan_wep", /* IEEE80211_CIPHER_WEP */ + "wlan_tkip", /* IEEE80211_CIPHER_TKIP */ + "wlan_aes_ocb", /* IEEE80211_CIPHER_AES_OCB */ + "wlan_ccmp", /* IEEE80211_CIPHER_AES_CCM */ + "wlan_ckip", /* IEEE80211_CIPHER_CKIP */ +}; + +/* + * Default "null" key management routines. + */ +/* ARGSUSED */ +static int +nulldev_key_alloc(ieee80211com_t *ic, const struct ieee80211_key *k, + ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) +{ + *keyix = 0; /* use key index 0 for ucast key */ + *rxkeyix = IEEE80211_KEYIX_NONE; + return (1); +} + +/* ARGSUSED */ +static int +nulldev_key_delete(ieee80211com_t *ic, const struct ieee80211_key *k) +{ + return (1); +} + +/* ARGSUSED */ +static int +nulldev_key_set(ieee80211com_t *ic, const struct ieee80211_key *k, + const uint8_t *mac) +{ + return (1); +} + +/* ARGSUSED */ +static void +nulldev_key_update(ieee80211com_t *ic) +{ + /* noop */ +} + +/* + * Reset key state to an unused state. The crypto + * key allocation mechanism insures other state (e.g. + * key data) is properly setup before a key is used. + */ +void +ieee80211_crypto_resetkey(ieee80211com_t *ic, + struct ieee80211_key *k, ieee80211_keyix ix) +{ + k->wk_cipher = &ieee80211_cipher_none; + k->wk_private = k->wk_cipher->ic_attach(ic, k); + k->wk_keyix = ix; + k->wk_flags = IEEE80211_KEY_XMIT | IEEE80211_KEY_RECV; +} + +/* + * Establish a relationship between the specified key and cipher + * and, if necessary, allocate a hardware index from the driver. + * Note that when a fixed key index is required it must be specified + * and we blindly assign it w/o consulting the driver. + * + * This must be the first call applied to a key; all the other key + * routines assume wk_cipher is setup. + * + * Locking must be handled by the caller using: + * ieee80211_key_update_begin(ic); + * ieee80211_key_update_end(ic); + */ +int +ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags, + struct ieee80211_key *key) +{ + const struct ieee80211_cipher *cip; + ieee80211_keyix keyix, rxkeyix; + void *keyctx; + uint16_t oflags; + + /* + * Validate cipher and set reference to cipher routines. + */ + if (cipher >= IEEE80211_CIPHER_MAX) { + ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_newkey: " + "invalid cipher %u\n", cipher); + return (0); + } + cip = ciphers[cipher]; + /* already load all the ciphers, cip can't be NULL */ + if (cip == NULL) { + ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_newkey: " + "unable to load cipher %u, module %s\n", + cipher, cipher < IEEE80211_N(cipher_modnames) ? + cipher_modnames[cipher] : "<unknown>"); + return (0); + } + + oflags = key->wk_flags; + flags &= IEEE80211_KEY_COMMON; + /* + * If the hardware does not support the cipher then + * fallback to a host-based implementation. + */ + if ((ic->ic_caps & (1<<cipher)) == 0) { + ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_newkey: " + "no h/w support for cipher %s, falling back to s/w\n", + cip->ic_name); + flags |= IEEE80211_KEY_SWCRYPT; + } + + /* + * Bind cipher to key instance. Note we do this + * after checking the device capabilities so the + * cipher module can optimize space usage based on + * whether or not it needs to do the cipher work. + */ + if (key->wk_cipher != cip || key->wk_flags != flags) { +again: + /* + * Fillin the flags so cipher modules can see s/w + * crypto requirements and potentially allocate + * different state and/or attach different method + * pointers. + */ + key->wk_flags = (uint16_t)flags; + keyctx = cip->ic_attach(ic, key); + if (keyctx == NULL) { + ieee80211_dbg(IEEE80211_MSG_CRYPTO, "crypto_setkey: " + "unable to attach cipher %s\n", cip->ic_name); + key->wk_flags = oflags; /* restore old flags */ + return (0); + } + CIPHER_DETACH(key); /* Detach old cipher */ + key->wk_cipher = cip; + key->wk_private = keyctx; + } + /* + * Commit to requested usage so driver can see the flags. + */ + key->wk_flags = (uint16_t)flags; + + /* + * Ask the driver for a key index if we don't have one. + * Note that entries in the global key table always have + * an index; this means it's safe to call this routine + * for these entries just to setup the reference to the + * cipher template. Note also that when using software + * crypto we also call the driver to give us a key index. + */ + if (key->wk_keyix == IEEE80211_KEYIX_NONE) { + if (!DEV_KEY_ALLOC(ic, key, &keyix, &rxkeyix)) { + /* + * Driver has no room; fallback to doing crypto + * in the host. We change the flags and start the + * procedure over. If we get back here then there's + * no hope and we bail. Note that this can leave + * the key in a inconsistent state if the caller + * continues to use it. + */ + if ((key->wk_flags & IEEE80211_KEY_SWCRYPT) == 0) { + ieee80211_dbg(IEEE80211_MSG_CRYPTO, + "crypto_setkey: " + "no h/w resources for cipher %s, " + "falling back to s/w\n", cip->ic_name); + oflags = key->wk_flags; + flags |= IEEE80211_KEY_SWCRYPT; + if (cipher == IEEE80211_CIPHER_TKIP) + flags |= IEEE80211_KEY_SWMIC; + goto again; + } + ieee80211_dbg(IEEE80211_MSG_CRYPTO, "crypto_setkey: " + "unable to setup cipher %s\n", cip->ic_name); + return (0); + } + key->wk_keyix = keyix; + key->wk_rxkeyix = rxkeyix; + } + return (1); +} + +/* + * Remove the key (no locking, for internal use). + */ +static int +ieee80211_crypto_delkey_locked(ieee80211com_t *ic, struct ieee80211_key *key) +{ + uint16_t keyix; + + ASSERT(key->wk_cipher != NULL); + + keyix = key->wk_keyix; + if (keyix != IEEE80211_KEYIX_NONE) { + /* + * Remove hardware entry. + */ + if (!DEV_KEY_DELETE(ic, key)) { + ieee80211_dbg(IEEE80211_MSG_CRYPTO, + "ieee80211_crypto_delkey_locked: ", + "driverdeletes key %u failed\n", keyix); + } + } + CIPHER_DETACH(key); + bzero(key, sizeof (struct ieee80211_key)); + /* NB: cannot depend on key index to decide this */ + ieee80211_crypto_resetkey(ic, key, IEEE80211_KEYIX_NONE); + return (1); +} + +/* + * Remove the specified key. + */ +int +ieee80211_crypto_delkey(ieee80211com_t *ic, struct ieee80211_key *key) +{ + int status; + + KEY_UPDATE_BEGIN(ic); + status = ieee80211_crypto_delkey_locked(ic, key); + KEY_UPDATE_END(ic); + return (status); +} + +/* + * Clear the global key table. + */ +static void +ieee80211_crypto_delglobalkeys(ieee80211com_t *ic) +{ + int i; + + KEY_UPDATE_BEGIN(ic); + for (i = 0; i < IEEE80211_WEP_NKID; i++) + (void) ieee80211_crypto_delkey_locked(ic, &ic->ic_nw_keys[i]); + KEY_UPDATE_END(ic); +} + +/* + * Set the contents of the specified key. + * + * Locking must be handled by the caller using: + * ieee80211_key_update_begin(ic); + * ieee80211_key_update_end(ic); + */ +int +ieee80211_crypto_setkey(ieee80211com_t *ic, struct ieee80211_key *key, + const uint8_t *macaddr) +{ + const struct ieee80211_cipher *cip = key->wk_cipher; + + ASSERT(cip != NULL); + + ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_setkey: " + "%s keyix %u flags 0x%x mac %s len %u\n", + cip->ic_name, key->wk_keyix, key->wk_flags, + ieee80211_macaddr_sprintf(macaddr), key->wk_keylen); + + /* + * Give cipher a chance to validate key contents. + * should happen before modifying state. + */ + if (cip->ic_setkey(key) == 0) { + ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_setkey: " + "cipher %s rejected key index %u len %u flags 0x%x\n", + cip->ic_name, key->wk_keyix, key->wk_keylen, + key->wk_flags); + return (0); + } + if (key->wk_keyix == IEEE80211_KEYIX_NONE) { + ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_setkey: " + "no key index; should not happen!\n"); + return (0); + } + return (DEV_KEY_SET(ic, key, macaddr)); +} + +/* + * Return the transmit key to use in sending a frame. + */ +struct ieee80211_key * +ieee80211_crypto_getkey(ieee80211com_t *ic) +{ + if (ic->ic_def_txkey == IEEE80211_KEYIX_NONE || + KEY_UNDEFINED(ic->ic_nw_keys[ic->ic_def_txkey])) + return (NULL); + return (&ic->ic_nw_keys[ic->ic_def_txkey]); +} + +uint8_t +ieee80211_crypto_getciphertype(ieee80211com_t *ic) +{ + struct ieee80211_key *key; + uint32_t cipher; + static const uint8_t ciphermap[] = { + WIFI_SEC_WEP, /* IEEE80211_CIPHER_WEP */ + (uint8_t)-1, /* IEEE80211_CIPHER_TKIP */ + (uint8_t)-1, /* IEEE80211_CIPHER_AES_OCB */ + (uint8_t)-1, /* IEEE80211_CIPHER_AES_CCM */ + (uint8_t)-1, /* 4 is not allocated */ + (uint8_t)-1, /* IEEE80211_CIPHER_CKIP */ + WIFI_SEC_NONE, /* IEEE80211_CIPHER_NONE */ + }; + + if ((ic->ic_flags & IEEE80211_F_PRIVACY) == 0) + return (WIFI_SEC_NONE); + + key = ieee80211_crypto_getkey(ic); + if (key == NULL) + return (WIFI_SEC_NONE); + + cipher = key->wk_cipher->ic_cipher; + ASSERT(cipher < IEEE80211_N(ciphermap)); + return (ciphermap[cipher]); +} + +/* + * Add privacy headers appropriate for the specified key. + */ +struct ieee80211_key * +ieee80211_crypto_encap(ieee80211com_t *ic, mblk_t *mp) +{ + struct ieee80211_key *k; + const struct ieee80211_cipher *cip; + uint8_t keyix; + + if (ic->ic_def_txkey == IEEE80211_KEYIX_NONE) { + ieee80211_dbg(IEEE80211_MSG_CRYPTO, + "ieee80211_crypto_encap: %s", + " No default xmit key for frame\n"); + return (NULL); + } + keyix = ic->ic_def_txkey; + k = &ic->ic_nw_keys[ic->ic_def_txkey]; + cip = k->wk_cipher; + return (cip->ic_encap(k, mp, keyix<<6) ? k : NULL); +} + +/* + * Validate and strip privacy headers (and trailer) for a + * received frame that has the WEP/Privacy bit set. + */ +struct ieee80211_key * +ieee80211_crypto_decap(ieee80211com_t *ic, mblk_t *mp, int hdrlen) +{ + struct ieee80211_key *k; + const struct ieee80211_cipher *cip; + uint8_t *ivp; + uint8_t keyid; + + /* NB: this minimum size data frame could be bigger */ + if ((mp->b_wptr - mp->b_rptr) < IEEE80211_WEP_MINLEN) { + ieee80211_dbg(IEEE80211_MSG_CRYPTO, "ieee80211_crypto_decap:" + " WEP data frame too short, len %u\n", + mp->b_wptr - mp->b_rptr); + return (NULL); + } + /* + * Locate the key. If unicast and there is no unicast + * key then we fall back to the key id in the header. + * This assumes unicast keys are only configured when + * the key id in the header is meaningless (typically 0). + */ + ivp = mp->b_rptr + hdrlen; + keyid = ivp[IEEE80211_WEP_IVLEN]; + k = &ic->ic_nw_keys[keyid >> 6]; + + /* check to avoid panic when wep is on but key is not set */ + if (k->wk_cipher == &ieee80211_cipher_none || + k->wk_cipher == NULL) + return (NULL); + + cip = k->wk_cipher; + return ((cip->ic_decap)(k, mp, hdrlen) ? k : NULL); +} + + +/* + * Setup crypto support. + */ +void +ieee80211_crypto_attach(ieee80211com_t *ic) +{ + struct ieee80211_crypto_state *cs = &ic->ic_crypto; + int i; + + /* NB: we assume everything is pre-zero'd */ + cs->cs_def_txkey = IEEE80211_KEYIX_NONE; + for (i = 0; i < IEEE80211_WEP_NKID; i++) { + ieee80211_crypto_resetkey(ic, &cs->cs_nw_keys[i], + IEEE80211_KEYIX_NONE); + } + + /* + * Initialize the driver key support routines to noop entries. + * This is useful especially for the cipher test modules. + */ + cs->cs_key_alloc = nulldev_key_alloc; + cs->cs_key_set = nulldev_key_set; + cs->cs_key_delete = nulldev_key_delete; + cs->cs_key_update_begin = nulldev_key_update; + cs->cs_key_update_end = nulldev_key_update; + + ieee80211_crypto_register(&wep); +} + +/* + * Teardown crypto support. + */ +void +ieee80211_crypto_detach(ieee80211com_t *ic) +{ + ieee80211_crypto_delglobalkeys(ic); + + ieee80211_crypto_unregister(&wep); +} + +/* + * Register a crypto cipher module. + */ +void +ieee80211_crypto_register(const struct ieee80211_cipher *cip) +{ + if (cip->ic_cipher >= IEEE80211_CIPHER_MAX) { + ieee80211_err("ieee80211_crypto_register: " + "cipher %s has an invalid cipher index %u\n", + cip->ic_name, cip->ic_cipher); + return; + } + if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { + ieee80211_err("ieee80211_crypto_register: " + "cipher %s registered with a different template\n", + cip->ic_name); + return; + } + ciphers[cip->ic_cipher] = cip; +} + +/* + * Unregister a crypto cipher module. + */ +void +ieee80211_crypto_unregister(const struct ieee80211_cipher *cip) +{ + if (cip->ic_cipher >= IEEE80211_CIPHER_MAX) { + ieee80211_err("ieee80211_crypto_unregister: " + "cipher %s has an invalid cipher index %u\n", + cip->ic_name, cip->ic_cipher); + return; + } + if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { + ieee80211_err("ieee80211_crypto_unregister: " + "cipher %s registered with a different template\n", + cip->ic_name); + return; + } + /* NB: don't complain about not being registered */ + ciphers[cip->ic_cipher] = NULL; +} |