rtw_security.h 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431
  1. /******************************************************************************
  2. *
  3. * Copyright(c) 2007 - 2011 Realtek Corporation. All rights reserved.
  4. *
  5. * This program is free software; you can redistribute it and/or modify it
  6. * under the terms of version 2 of the GNU General Public License as
  7. * published by the Free Software Foundation.
  8. *
  9. * This program is distributed in the hope that it will be useful, but WITHOUT
  10. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11. * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
  12. * more details.
  13. *
  14. * You should have received a copy of the GNU General Public License along with
  15. * this program; if not, write to the Free Software Foundation, Inc.,
  16. * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
  17. *
  18. *
  19. ******************************************************************************/
  20. #ifndef __RTW_SECURITY_H_
  21. #define __RTW_SECURITY_H_
  22. #define _NO_PRIVACY_ 0x0
  23. #define _WEP40_ 0x1
  24. #define _TKIP_ 0x2
  25. #define _TKIP_WTMIC_ 0x3
  26. #define _AES_ 0x4
  27. #define _WEP104_ 0x5
  28. #define _WEP_WPA_MIXED_ 0x07 // WEP + WPA
  29. #define _SMS4_ 0x06
  30. #define is_wep_enc(alg) (((alg) == _WEP40_) || ((alg) == _WEP104_))
  31. #define _WPA_IE_ID_ 0xdd
  32. #define _WPA2_IE_ID_ 0x30
  33. #define SHA256_MAC_LEN 32
  34. #define AES_BLOCK_SIZE 16
  35. #define AES_PRIV_SIZE (4 * 44)
  36. typedef enum {
  37. ENCRYP_PROTOCOL_OPENSYS, //open system
  38. ENCRYP_PROTOCOL_WEP, //WEP
  39. ENCRYP_PROTOCOL_WPA, //WPA
  40. ENCRYP_PROTOCOL_WPA2, //WPA2
  41. ENCRYP_PROTOCOL_WAPI, //WAPI: Not support in this version
  42. ENCRYP_PROTOCOL_MAX
  43. }ENCRYP_PROTOCOL_E;
  44. #ifndef Ndis802_11AuthModeWPA2
  45. #define Ndis802_11AuthModeWPA2 (Ndis802_11AuthModeWPANone + 1)
  46. #endif
  47. #ifndef Ndis802_11AuthModeWPA2PSK
  48. #define Ndis802_11AuthModeWPA2PSK (Ndis802_11AuthModeWPANone + 2)
  49. #endif
  50. union pn48 {
  51. u64 val;
  52. #ifdef CONFIG_LITTLE_ENDIAN
  53. struct {
  54. u8 TSC0;
  55. u8 TSC1;
  56. u8 TSC2;
  57. u8 TSC3;
  58. u8 TSC4;
  59. u8 TSC5;
  60. u8 TSC6;
  61. u8 TSC7;
  62. } _byte_;
  63. #elif defined(CONFIG_BIG_ENDIAN)
  64. struct {
  65. u8 TSC7;
  66. u8 TSC6;
  67. u8 TSC5;
  68. u8 TSC4;
  69. u8 TSC3;
  70. u8 TSC2;
  71. u8 TSC1;
  72. u8 TSC0;
  73. } _byte_;
  74. #endif
  75. };
  76. union Keytype {
  77. u8 skey[16];
  78. u32 lkey[4];
  79. };
  80. typedef struct _RT_PMKID_LIST
  81. {
  82. u8 bUsed;
  83. u8 Bssid[6];
  84. u8 PMKID[16];
  85. u8 SsidBuf[33];
  86. u8* ssid_octet;
  87. u16 ssid_length;
  88. } RT_PMKID_LIST, *PRT_PMKID_LIST;
  89. struct security_priv
  90. {
  91. u32 dot11AuthAlgrthm; // 802.11 auth, could be open, shared, 8021x and authswitch
  92. u32 dot11PrivacyAlgrthm; // This specify the privacy for shared auth. algorithm.
  93. /* WEP */
  94. u32 dot11PrivacyKeyIndex; // this is only valid for legendary wep, 0~3 for key id. (tx key index)
  95. union Keytype dot11DefKey[4]; // this is only valid for def. key
  96. u32 dot11DefKeylen[4];
  97. u32 dot118021XGrpPrivacy; // This specify the privacy algthm. used for Grp key
  98. u32 dot118021XGrpKeyid; // key id used for Grp Key ( tx key index)
  99. union Keytype dot118021XGrpKey[4]; // 802.1x Group Key, for inx0 and inx1
  100. union Keytype dot118021XGrptxmickey[4];
  101. union Keytype dot118021XGrprxmickey[4];
  102. union pn48 dot11Grptxpn; // PN48 used for Grp Key xmit.
  103. union pn48 dot11Grprxpn; // PN48 used for Grp Key recv.
  104. #ifdef CONFIG_AP_MODE
  105. //extend security capabilities for AP_MODE
  106. unsigned int dot8021xalg;//0:disable, 1:psk, 2:802.1x
  107. unsigned int wpa_psk;//0:disable, bit(0): WPA, bit(1):WPA2
  108. unsigned int wpa_group_cipher;
  109. unsigned int wpa2_group_cipher;
  110. unsigned int wpa_pairwise_cipher;
  111. unsigned int wpa2_pairwise_cipher;
  112. #endif
  113. u8 wps_ie[MAX_WPS_IE_LEN];//added in assoc req
  114. int wps_ie_len;
  115. u8 binstallGrpkey;
  116. u8 busetkipkey;
  117. //_timer tkip_timer;
  118. u8 bcheck_grpkey;
  119. u8 bgrpkey_handshake;
  120. //u8 packet_cnt;//unused, removed
  121. s32 sw_encrypt;//from registry_priv
  122. s32 sw_decrypt;//from registry_priv
  123. s32 hw_decrypted;//if the rx packets is hw_decrypted==_FALSE, it means the hw has not been ready.
  124. //keeps the auth_type & enc_status from upper layer ioctl(wpa_supplicant or wzc)
  125. u32 ndisauthtype; // NDIS_802_11_AUTHENTICATION_MODE
  126. u32 ndisencryptstatus; // NDIS_802_11_ENCRYPTION_STATUS
  127. WLAN_BSSID_EX sec_bss; //for joinbss (h2c buffer) usage
  128. NDIS_802_11_WEP ndiswep;
  129. #ifdef PLATFORM_WINDOWS
  130. u8 KeyMaterial[16];// variable length depending on above field.
  131. #endif
  132. u8 assoc_info[600];
  133. u8 szofcapability[256]; //for wpa2 usage
  134. u8 oidassociation[512]; //for wpa/wpa2 usage
  135. u8 authenticator_ie[256]; //store ap security information element
  136. u8 supplicant_ie[256]; //store sta security information element
  137. //for tkip countermeasure
  138. u32 last_mic_err_time;
  139. u8 btkip_countermeasure;
  140. u8 btkip_wait_report;
  141. u32 btkip_countermeasure_time;
  142. //---------------------------------------------------------------------------
  143. // For WPA2 Pre-Authentication.
  144. //---------------------------------------------------------------------------
  145. //u8 RegEnablePreAuth; // Default value: Pre-Authentication enabled or not, from registry "EnablePreAuth". Added by Annie, 2005-11-01.
  146. //u8 EnablePreAuthentication; // Current Value: Pre-Authentication enabled or not.
  147. RT_PMKID_LIST PMKIDList[NUM_PMKID_CACHE]; // Renamed from PreAuthKey[NUM_PRE_AUTH_KEY]. Annie, 2006-10-13.
  148. u8 PMKIDIndex;
  149. //u32 PMKIDCount; // Added by Annie, 2006-10-13.
  150. //u8 szCapability[256]; // For WPA2-PSK using zero-config, by Annie, 2005-09-20.
  151. u8 bWepDefaultKeyIdxSet;
  152. };
  153. /* fix compilation for 5.8 kernel to avoid redefinition of struct */
  154. #define sha256_state sha256_state_rtl8812
  155. struct sha256_state {
  156. u64 length;
  157. u32 state[8], curlen;
  158. u8 buf[64];
  159. };
  160. #define GET_ENCRY_ALGO(psecuritypriv, psta, encry_algo, bmcst)\
  161. do{\
  162. switch(psecuritypriv->dot11AuthAlgrthm)\
  163. {\
  164. case dot11AuthAlgrthm_Open:\
  165. case dot11AuthAlgrthm_Shared:\
  166. case dot11AuthAlgrthm_Auto:\
  167. encry_algo = (u8)psecuritypriv->dot11PrivacyAlgrthm;\
  168. break;\
  169. case dot11AuthAlgrthm_8021X:\
  170. if(bmcst)\
  171. encry_algo = (u8)psecuritypriv->dot118021XGrpPrivacy;\
  172. else\
  173. encry_algo =(u8) psta->dot118021XPrivacy;\
  174. break;\
  175. case dot11AuthAlgrthm_WAPI:\
  176. encry_algo = (u8)psecuritypriv->dot11PrivacyAlgrthm;\
  177. break;\
  178. }\
  179. }while(0)
  180. #define SET_ICE_IV_LEN( iv_len, icv_len, encrypt)\
  181. do{\
  182. switch(encrypt)\
  183. {\
  184. case _WEP40_:\
  185. case _WEP104_:\
  186. iv_len = 4;\
  187. icv_len = 4;\
  188. break;\
  189. case _TKIP_:\
  190. iv_len = 8;\
  191. icv_len = 4;\
  192. break;\
  193. case _AES_:\
  194. iv_len = 8;\
  195. icv_len = 8;\
  196. break;\
  197. case _SMS4_:\
  198. iv_len = 18;\
  199. icv_len = 16;\
  200. break;\
  201. default:\
  202. iv_len = 0;\
  203. icv_len = 0;\
  204. break;\
  205. }\
  206. }while(0)
  207. #define GET_TKIP_PN(iv,dot11txpn)\
  208. do{\
  209. dot11txpn._byte_.TSC0=iv[2];\
  210. dot11txpn._byte_.TSC1=iv[0];\
  211. dot11txpn._byte_.TSC2=iv[4];\
  212. dot11txpn._byte_.TSC3=iv[5];\
  213. dot11txpn._byte_.TSC4=iv[6];\
  214. dot11txpn._byte_.TSC5=iv[7];\
  215. }while(0)
  216. #define ROL32( A, n ) ( ((A) << (n)) | ( ((A)>>(32-(n))) & ( (1UL << (n)) - 1 ) ) )
  217. #define ROR32( A, n ) ROL32( (A), 32-(n) )
  218. struct mic_data
  219. {
  220. u32 K0, K1; // Key
  221. u32 L, R; // Current state
  222. u32 M; // Message accumulator (single word)
  223. u32 nBytesInM; // # bytes in M
  224. };
  225. extern const u32 Te0[256];
  226. extern const u32 Te1[256];
  227. extern const u32 Te2[256];
  228. extern const u32 Te3[256];
  229. extern const u32 Te4[256];
  230. extern const u32 Td0[256];
  231. extern const u32 Td1[256];
  232. extern const u32 Td2[256];
  233. extern const u32 Td3[256];
  234. extern const u32 Td4[256];
  235. extern const u32 rcon[10];
  236. extern const u8 Td4s[256];
  237. extern const u8 rcons[10];
  238. #define RCON(i) (rcons[(i)] << 24)
  239. static inline u32 rotr(u32 val, int bits)
  240. {
  241. return (val >> bits) | (val << (32 - bits));
  242. }
  243. #define TE0(i) Te0[((i) >> 24) & 0xff]
  244. #define TE1(i) rotr(Te0[((i) >> 16) & 0xff], 8)
  245. #define TE2(i) rotr(Te0[((i) >> 8) & 0xff], 16)
  246. #define TE3(i) rotr(Te0[(i) & 0xff], 24)
  247. #define TE41(i) ((Te0[((i) >> 24) & 0xff] << 8) & 0xff000000)
  248. #define TE42(i) (Te0[((i) >> 16) & 0xff] & 0x00ff0000)
  249. #define TE43(i) (Te0[((i) >> 8) & 0xff] & 0x0000ff00)
  250. #define TE44(i) ((Te0[(i) & 0xff] >> 8) & 0x000000ff)
  251. #define TE421(i) ((Te0[((i) >> 16) & 0xff] << 8) & 0xff000000)
  252. #define TE432(i) (Te0[((i) >> 8) & 0xff] & 0x00ff0000)
  253. #define TE443(i) (Te0[(i) & 0xff] & 0x0000ff00)
  254. #define TE414(i) ((Te0[((i) >> 24) & 0xff] >> 8) & 0x000000ff)
  255. #define TE4(i) ((Te0[(i)] >> 8) & 0x000000ff)
  256. #define TD0(i) Td0[((i) >> 24) & 0xff]
  257. #define TD1(i) rotr(Td0[((i) >> 16) & 0xff], 8)
  258. #define TD2(i) rotr(Td0[((i) >> 8) & 0xff], 16)
  259. #define TD3(i) rotr(Td0[(i) & 0xff], 24)
  260. #define TD41(i) (Td4s[((i) >> 24) & 0xff] << 24)
  261. #define TD42(i) (Td4s[((i) >> 16) & 0xff] << 16)
  262. #define TD43(i) (Td4s[((i) >> 8) & 0xff] << 8)
  263. #define TD44(i) (Td4s[(i) & 0xff])
  264. #define TD0_(i) Td0[(i) & 0xff]
  265. #define TD1_(i) rotr(Td0[(i) & 0xff], 8)
  266. #define TD2_(i) rotr(Td0[(i) & 0xff], 16)
  267. #define TD3_(i) rotr(Td0[(i) & 0xff], 24)
  268. #define GETU32(pt) (((u32)(pt)[0] << 24) ^ ((u32)(pt)[1] << 16) ^ \
  269. ((u32)(pt)[2] << 8) ^ ((u32)(pt)[3]))
  270. #define PUTU32(ct, st) { \
  271. (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); \
  272. (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); }
  273. #define WPA_GET_BE32(a) ((((u32) (a)[0]) << 24) | (((u32) (a)[1]) << 16) | \
  274. (((u32) (a)[2]) << 8) | ((u32) (a)[3]))
  275. #define WPA_PUT_LE16(a, val) \
  276. do { \
  277. (a)[1] = ((u16) (val)) >> 8; \
  278. (a)[0] = ((u16) (val)) & 0xff; \
  279. } while (0)
  280. #define WPA_PUT_BE32(a, val) \
  281. do { \
  282. (a)[0] = (u8) ((((u32) (val)) >> 24) & 0xff); \
  283. (a)[1] = (u8) ((((u32) (val)) >> 16) & 0xff); \
  284. (a)[2] = (u8) ((((u32) (val)) >> 8) & 0xff); \
  285. (a)[3] = (u8) (((u32) (val)) & 0xff); \
  286. } while (0)
  287. #define WPA_PUT_BE64(a, val) \
  288. do { \
  289. (a)[0] = (u8) (((u64) (val)) >> 56); \
  290. (a)[1] = (u8) (((u64) (val)) >> 48); \
  291. (a)[2] = (u8) (((u64) (val)) >> 40); \
  292. (a)[3] = (u8) (((u64) (val)) >> 32); \
  293. (a)[4] = (u8) (((u64) (val)) >> 24); \
  294. (a)[5] = (u8) (((u64) (val)) >> 16); \
  295. (a)[6] = (u8) (((u64) (val)) >> 8); \
  296. (a)[7] = (u8) (((u64) (val)) & 0xff); \
  297. } while (0)
  298. /* ===== start - public domain SHA256 implementation ===== */
  299. /* This is based on SHA256 implementation in LibTomCrypt that was released into
  300. * public domain by Tom St Denis. */
  301. /* the K array */
  302. static const unsigned long K[64] = {
  303. 0x428a2f98UL, 0x71374491UL, 0xb5c0fbcfUL, 0xe9b5dba5UL, 0x3956c25bUL,
  304. 0x59f111f1UL, 0x923f82a4UL, 0xab1c5ed5UL, 0xd807aa98UL, 0x12835b01UL,
  305. 0x243185beUL, 0x550c7dc3UL, 0x72be5d74UL, 0x80deb1feUL, 0x9bdc06a7UL,
  306. 0xc19bf174UL, 0xe49b69c1UL, 0xefbe4786UL, 0x0fc19dc6UL, 0x240ca1ccUL,
  307. 0x2de92c6fUL, 0x4a7484aaUL, 0x5cb0a9dcUL, 0x76f988daUL, 0x983e5152UL,
  308. 0xa831c66dUL, 0xb00327c8UL, 0xbf597fc7UL, 0xc6e00bf3UL, 0xd5a79147UL,
  309. 0x06ca6351UL, 0x14292967UL, 0x27b70a85UL, 0x2e1b2138UL, 0x4d2c6dfcUL,
  310. 0x53380d13UL, 0x650a7354UL, 0x766a0abbUL, 0x81c2c92eUL, 0x92722c85UL,
  311. 0xa2bfe8a1UL, 0xa81a664bUL, 0xc24b8b70UL, 0xc76c51a3UL, 0xd192e819UL,
  312. 0xd6990624UL, 0xf40e3585UL, 0x106aa070UL, 0x19a4c116UL, 0x1e376c08UL,
  313. 0x2748774cUL, 0x34b0bcb5UL, 0x391c0cb3UL, 0x4ed8aa4aUL, 0x5b9cca4fUL,
  314. 0x682e6ff3UL, 0x748f82eeUL, 0x78a5636fUL, 0x84c87814UL, 0x8cc70208UL,
  315. 0x90befffaUL, 0xa4506cebUL, 0xbef9a3f7UL, 0xc67178f2UL
  316. };
  317. /* Various logical functions */
  318. #define RORc(x, y) \
  319. ( ((((unsigned long) (x) & 0xFFFFFFFFUL) >> (unsigned long) ((y) & 31)) | \
  320. ((unsigned long) (x) << (unsigned long) (32 - ((y) & 31)))) & 0xFFFFFFFFUL)
  321. #define Ch(x,y,z) (z ^ (x & (y ^ z)))
  322. #define Maj(x,y,z) (((x | y) & z) | (x & y))
  323. #define S(x, n) RORc((x), (n))
  324. #define R(x, n) (((x)&0xFFFFFFFFUL)>>(n))
  325. #define Sigma0(x) (S(x, 2) ^ S(x, 13) ^ S(x, 22))
  326. #define Sigma1(x) (S(x, 6) ^ S(x, 11) ^ S(x, 25))
  327. #define Gamma0(x) (S(x, 7) ^ S(x, 18) ^ R(x, 3))
  328. #define Gamma1(x) (S(x, 17) ^ S(x, 19) ^ R(x, 10))
  329. #ifndef MIN
  330. #define MIN(x, y) (((x) < (y)) ? (x) : (y))
  331. #endif
  332. void rtw_secmicsetkey(struct mic_data *pmicdata, u8 * key );
  333. void rtw_secmicappendbyte(struct mic_data *pmicdata, u8 b );
  334. void rtw_secmicappend(struct mic_data *pmicdata, u8 * src, u32 nBytes );
  335. void rtw_secgetmic(struct mic_data *pmicdata, u8 * dst );
  336. void rtw_seccalctkipmic(
  337. u8 * key,
  338. u8 *header,
  339. u8 *data,
  340. u32 data_len,
  341. u8 *Miccode,
  342. u8 priority);
  343. u32 rtw_aes_encrypt(_adapter *padapter, u8 *pxmitframe);
  344. u32 rtw_tkip_encrypt(_adapter *padapter, u8 *pxmitframe);
  345. void rtw_wep_encrypt(_adapter *padapter, u8 *pxmitframe);
  346. u32 rtw_aes_decrypt(_adapter *padapter, u8 *precvframe);
  347. u32 rtw_tkip_decrypt(_adapter *padapter, u8 *precvframe);
  348. void rtw_wep_decrypt(_adapter *padapter, u8 *precvframe);
  349. #ifdef CONFIG_TDLS
  350. void wpa_tdls_generate_tpk(_adapter *padapter, struct sta_info *psta);
  351. int wpa_tdls_ftie_mic(u8 *kck, u8 trans_seq,
  352. u8 *lnkid, u8 *rsnie, u8 *timeoutie, u8 *ftie,
  353. u8 *mic);
  354. int tdls_verify_mic(u8 *kck, u8 trans_seq,
  355. u8 *lnkid, u8 *rsnie, u8 *timeoutie, u8 *ftie);
  356. #endif //CONFIG_TDLS
  357. void rtw_use_tkipkey_handler(RTW_TIMER_HDL_ARGS);
  358. #endif //__RTL871X_SECURITY_H_