driver_macsec_qca.c 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891
  1. /*
  2. * Wired Ethernet driver interface for QCA MACsec driver
  3. * Copyright (c) 2005-2009, Jouni Malinen <j@w1.fi>
  4. * Copyright (c) 2004, Gunter Burchardt <tira@isx.de>
  5. * Copyright (c) 2013-2014, Qualcomm Atheros, Inc.
  6. *
  7. * This software may be distributed under the terms of the BSD license.
  8. * See README for more details.
  9. */
  10. #include "includes.h"
  11. #include <sys/ioctl.h>
  12. #include <net/if.h>
  13. #ifdef __linux__
  14. #include <netpacket/packet.h>
  15. #include <net/if_arp.h>
  16. #include <net/if.h>
  17. #endif /* __linux__ */
  18. #if defined(__FreeBSD__) || defined(__DragonFly__) || defined(__FreeBSD_kernel__)
  19. #include <net/if_dl.h>
  20. #include <net/if_media.h>
  21. #endif /* defined(__FreeBSD__) || defined(__DragonFly__) || defined(__FreeBSD_kernel__) */
  22. #ifdef __sun__
  23. #include <sys/sockio.h>
  24. #endif /* __sun__ */
  25. #include "utils/common.h"
  26. #include "utils/eloop.h"
  27. #include "common/defs.h"
  28. #include "common/ieee802_1x_defs.h"
  29. #include "driver.h"
  30. #include "nss_macsec_secy.h"
  31. #include "nss_macsec_secy_rx.h"
  32. #include "nss_macsec_secy_tx.h"
  33. #define MAXSC 16
  34. /* TCI field definition */
  35. #define TCI_ES 0x40
  36. #define TCI_SC 0x20
  37. #define TCI_SCB 0x10
  38. #define TCI_E 0x08
  39. #define TCI_C 0x04
  40. #ifdef _MSC_VER
  41. #pragma pack(push, 1)
  42. #endif /* _MSC_VER */
  43. #ifdef _MSC_VER
  44. #pragma pack(pop)
  45. #endif /* _MSC_VER */
  46. static const u8 pae_group_addr[ETH_ALEN] =
  47. { 0x01, 0x80, 0xc2, 0x00, 0x00, 0x03 };
  48. struct macsec_qca_data {
  49. char ifname[IFNAMSIZ + 1];
  50. u32 secy_id;
  51. void *ctx;
  52. int sock; /* raw packet socket for driver access */
  53. int pf_sock;
  54. int membership, multi, iff_allmulti, iff_up;
  55. /* shadow */
  56. Boolean always_include_sci;
  57. Boolean use_es;
  58. Boolean use_scb;
  59. Boolean protect_frames;
  60. Boolean replay_protect;
  61. u32 replay_window;
  62. };
  63. static int macsec_qca_multicast_membership(int sock, int ifindex,
  64. const u8 *addr, int add)
  65. {
  66. #ifdef __linux__
  67. struct packet_mreq mreq;
  68. if (sock < 0)
  69. return -1;
  70. os_memset(&mreq, 0, sizeof(mreq));
  71. mreq.mr_ifindex = ifindex;
  72. mreq.mr_type = PACKET_MR_MULTICAST;
  73. mreq.mr_alen = ETH_ALEN;
  74. os_memcpy(mreq.mr_address, addr, ETH_ALEN);
  75. if (setsockopt(sock, SOL_PACKET,
  76. add ? PACKET_ADD_MEMBERSHIP : PACKET_DROP_MEMBERSHIP,
  77. &mreq, sizeof(mreq)) < 0) {
  78. wpa_printf(MSG_ERROR, "setsockopt: %s", strerror(errno));
  79. return -1;
  80. }
  81. return 0;
  82. #else /* __linux__ */
  83. return -1;
  84. #endif /* __linux__ */
  85. }
  86. static int macsec_qca_get_ssid(void *priv, u8 *ssid)
  87. {
  88. ssid[0] = 0;
  89. return 0;
  90. }
  91. static int macsec_qca_get_bssid(void *priv, u8 *bssid)
  92. {
  93. /* Report PAE group address as the "BSSID" for macsec connection. */
  94. os_memcpy(bssid, pae_group_addr, ETH_ALEN);
  95. return 0;
  96. }
  97. static int macsec_qca_get_capa(void *priv, struct wpa_driver_capa *capa)
  98. {
  99. os_memset(capa, 0, sizeof(*capa));
  100. capa->flags = WPA_DRIVER_FLAGS_WIRED;
  101. return 0;
  102. }
  103. static int macsec_qca_get_ifflags(const char *ifname, int *flags)
  104. {
  105. struct ifreq ifr;
  106. int s;
  107. s = socket(PF_INET, SOCK_DGRAM, 0);
  108. if (s < 0) {
  109. wpa_printf(MSG_ERROR, "socket: %s", strerror(errno));
  110. return -1;
  111. }
  112. os_memset(&ifr, 0, sizeof(ifr));
  113. os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
  114. if (ioctl(s, SIOCGIFFLAGS, (caddr_t) &ifr) < 0) {
  115. wpa_printf(MSG_ERROR, "ioctl[SIOCGIFFLAGS]: %s",
  116. strerror(errno));
  117. close(s);
  118. return -1;
  119. }
  120. close(s);
  121. *flags = ifr.ifr_flags & 0xffff;
  122. return 0;
  123. }
  124. static int macsec_qca_set_ifflags(const char *ifname, int flags)
  125. {
  126. struct ifreq ifr;
  127. int s;
  128. s = socket(PF_INET, SOCK_DGRAM, 0);
  129. if (s < 0) {
  130. wpa_printf(MSG_ERROR, "socket: %s", strerror(errno));
  131. return -1;
  132. }
  133. os_memset(&ifr, 0, sizeof(ifr));
  134. os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
  135. ifr.ifr_flags = flags & 0xffff;
  136. if (ioctl(s, SIOCSIFFLAGS, (caddr_t) &ifr) < 0) {
  137. wpa_printf(MSG_ERROR, "ioctl[SIOCSIFFLAGS]: %s",
  138. strerror(errno));
  139. close(s);
  140. return -1;
  141. }
  142. close(s);
  143. return 0;
  144. }
  145. #if defined(__FreeBSD__) || defined(__DragonFly__) || defined(__FreeBSD_kernel__)
  146. static int macsec_qca_get_ifstatus(const char *ifname, int *status)
  147. {
  148. struct ifmediareq ifmr;
  149. int s;
  150. s = socket(PF_INET, SOCK_DGRAM, 0);
  151. if (s < 0) {
  152. wpa_print(MSG_ERROR, "socket: %s", strerror(errno));
  153. return -1;
  154. }
  155. os_memset(&ifmr, 0, sizeof(ifmr));
  156. os_strlcpy(ifmr.ifm_name, ifname, IFNAMSIZ);
  157. if (ioctl(s, SIOCGIFMEDIA, (caddr_t) &ifmr) < 0) {
  158. wpa_printf(MSG_ERROR, "ioctl[SIOCGIFMEDIA]: %s",
  159. strerror(errno));
  160. close(s);
  161. return -1;
  162. }
  163. close(s);
  164. *status = (ifmr.ifm_status & (IFM_ACTIVE | IFM_AVALID)) ==
  165. (IFM_ACTIVE | IFM_AVALID);
  166. return 0;
  167. }
  168. #endif /* defined(__FreeBSD__) || defined(__DragonFly__) || defined(FreeBSD_kernel__) */
  169. static int macsec_qca_multi(const char *ifname, const u8 *addr, int add)
  170. {
  171. struct ifreq ifr;
  172. int s;
  173. #ifdef __sun__
  174. return -1;
  175. #endif /* __sun__ */
  176. s = socket(PF_INET, SOCK_DGRAM, 0);
  177. if (s < 0) {
  178. wpa_printf(MSG_ERROR, "socket: %s", strerror(errno));
  179. return -1;
  180. }
  181. os_memset(&ifr, 0, sizeof(ifr));
  182. os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
  183. #ifdef __linux__
  184. ifr.ifr_hwaddr.sa_family = AF_UNSPEC;
  185. os_memcpy(ifr.ifr_hwaddr.sa_data, addr, ETH_ALEN);
  186. #endif /* __linux__ */
  187. #if defined(__FreeBSD__) || defined(__DragonFly__) || defined(__FreeBSD_kernel__)
  188. {
  189. struct sockaddr_dl *dlp;
  190. dlp = (struct sockaddr_dl *) &ifr.ifr_addr;
  191. dlp->sdl_len = sizeof(struct sockaddr_dl);
  192. dlp->sdl_family = AF_LINK;
  193. dlp->sdl_index = 0;
  194. dlp->sdl_nlen = 0;
  195. dlp->sdl_alen = ETH_ALEN;
  196. dlp->sdl_slen = 0;
  197. os_memcpy(LLADDR(dlp), addr, ETH_ALEN);
  198. }
  199. #endif /* defined(__FreeBSD__) || defined(__DragonFly__) || defined(FreeBSD_kernel__) */
  200. #if defined(__NetBSD__) || defined(__OpenBSD__) || defined(__APPLE__)
  201. {
  202. struct sockaddr *sap;
  203. sap = (struct sockaddr *) &ifr.ifr_addr;
  204. sap->sa_len = sizeof(struct sockaddr);
  205. sap->sa_family = AF_UNSPEC;
  206. os_memcpy(sap->sa_data, addr, ETH_ALEN);
  207. }
  208. #endif /* defined(__NetBSD__) || defined(__OpenBSD__) || defined(__APPLE__) */
  209. if (ioctl(s, add ? SIOCADDMULTI : SIOCDELMULTI, (caddr_t) &ifr) < 0) {
  210. wpa_printf(MSG_ERROR, "ioctl[SIOC{ADD/DEL}MULTI]: %s",
  211. strerror(errno));
  212. close(s);
  213. return -1;
  214. }
  215. close(s);
  216. return 0;
  217. }
  218. static void __macsec_drv_init(struct macsec_qca_data *drv)
  219. {
  220. int ret = 0;
  221. fal_rx_ctl_filt_t rx_ctl_filt;
  222. fal_tx_ctl_filt_t tx_ctl_filt;
  223. wpa_printf(MSG_INFO, "%s: secy_id=%d", __func__, drv->secy_id);
  224. /* Enable Secy and Let EAPoL bypass */
  225. ret = nss_macsec_secy_en_set(drv->secy_id, TRUE);
  226. if (ret)
  227. wpa_printf(MSG_ERROR, "nss_macsec_secy_en_set: FAIL");
  228. ret = nss_macsec_secy_sc_sa_mapping_mode_set(drv->secy_id,
  229. FAL_SC_SA_MAP_1_4);
  230. if (ret)
  231. wpa_printf(MSG_ERROR,
  232. "nss_macsec_secy_sc_sa_mapping_mode_set: FAIL");
  233. os_memset(&rx_ctl_filt, 0, sizeof(rx_ctl_filt));
  234. rx_ctl_filt.bypass = 1;
  235. rx_ctl_filt.match_type = IG_CTL_COMPARE_ETHER_TYPE;
  236. rx_ctl_filt.match_mask = 0xffff;
  237. rx_ctl_filt.ether_type_da_range = 0x888e;
  238. ret = nss_macsec_secy_rx_ctl_filt_set(drv->secy_id, 0, &rx_ctl_filt);
  239. if (ret)
  240. wpa_printf(MSG_ERROR, "nss_macsec_secy_rx_ctl_filt_set: FAIL");
  241. os_memset(&tx_ctl_filt, 0, sizeof(tx_ctl_filt));
  242. tx_ctl_filt.bypass = 1;
  243. tx_ctl_filt.match_type = EG_CTL_COMPARE_ETHER_TYPE;
  244. tx_ctl_filt.match_mask = 0xffff;
  245. tx_ctl_filt.ether_type_da_range = 0x888e;
  246. ret = nss_macsec_secy_tx_ctl_filt_set(drv->secy_id, 0, &tx_ctl_filt);
  247. if (ret)
  248. wpa_printf(MSG_ERROR, "nss_macsec_secy_tx_ctl_filt_set: FAIL");
  249. }
  250. static void __macsec_drv_deinit(struct macsec_qca_data *drv)
  251. {
  252. nss_macsec_secy_en_set(drv->secy_id, FALSE);
  253. nss_macsec_secy_rx_sc_del_all(drv->secy_id);
  254. nss_macsec_secy_tx_sc_del_all(drv->secy_id);
  255. }
  256. static void * macsec_qca_init(void *ctx, const char *ifname)
  257. {
  258. struct macsec_qca_data *drv;
  259. int flags;
  260. drv = os_zalloc(sizeof(*drv));
  261. if (drv == NULL)
  262. return NULL;
  263. os_strlcpy(drv->ifname, ifname, sizeof(drv->ifname));
  264. drv->ctx = ctx;
  265. /* Board specific settings */
  266. if (os_memcmp("eth2", drv->ifname, 4) == 0)
  267. drv->secy_id = 1;
  268. else if (os_memcmp("eth3", drv->ifname, 4) == 0)
  269. drv->secy_id = 2;
  270. else
  271. drv->secy_id = -1;
  272. #ifdef __linux__
  273. drv->pf_sock = socket(PF_PACKET, SOCK_DGRAM, 0);
  274. if (drv->pf_sock < 0)
  275. wpa_printf(MSG_ERROR, "socket(PF_PACKET): %s", strerror(errno));
  276. #else /* __linux__ */
  277. drv->pf_sock = -1;
  278. #endif /* __linux__ */
  279. if (macsec_qca_get_ifflags(ifname, &flags) == 0 &&
  280. !(flags & IFF_UP) &&
  281. macsec_qca_set_ifflags(ifname, flags | IFF_UP) == 0) {
  282. drv->iff_up = 1;
  283. }
  284. if (macsec_qca_multicast_membership(drv->pf_sock,
  285. if_nametoindex(drv->ifname),
  286. pae_group_addr, 1) == 0) {
  287. wpa_printf(MSG_DEBUG,
  288. "%s: Added multicast membership with packet socket",
  289. __func__);
  290. drv->membership = 1;
  291. } else if (macsec_qca_multi(ifname, pae_group_addr, 1) == 0) {
  292. wpa_printf(MSG_DEBUG,
  293. "%s: Added multicast membership with SIOCADDMULTI",
  294. __func__);
  295. drv->multi = 1;
  296. } else if (macsec_qca_get_ifflags(ifname, &flags) < 0) {
  297. wpa_printf(MSG_INFO, "%s: Could not get interface flags",
  298. __func__);
  299. os_free(drv);
  300. return NULL;
  301. } else if (flags & IFF_ALLMULTI) {
  302. wpa_printf(MSG_DEBUG,
  303. "%s: Interface is already configured for multicast",
  304. __func__);
  305. } else if (macsec_qca_set_ifflags(ifname, flags | IFF_ALLMULTI) < 0) {
  306. wpa_printf(MSG_INFO, "%s: Failed to enable allmulti",
  307. __func__);
  308. os_free(drv);
  309. return NULL;
  310. } else {
  311. wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode", __func__);
  312. drv->iff_allmulti = 1;
  313. }
  314. #if defined(__FreeBSD__) || defined(__DragonFly__) || defined(__FreeBSD_kernel__)
  315. {
  316. int status;
  317. wpa_printf(MSG_DEBUG, "%s: waiting for link to become active",
  318. __func__);
  319. while (macsec_qca_get_ifstatus(ifname, &status) == 0 &&
  320. status == 0)
  321. sleep(1);
  322. }
  323. #endif /* defined(__FreeBSD__) || defined(__DragonFly__) || defined(FreeBSD_kernel__) */
  324. return drv;
  325. }
  326. static void macsec_qca_deinit(void *priv)
  327. {
  328. struct macsec_qca_data *drv = priv;
  329. int flags;
  330. if (drv->membership &&
  331. macsec_qca_multicast_membership(drv->pf_sock,
  332. if_nametoindex(drv->ifname),
  333. pae_group_addr, 0) < 0) {
  334. wpa_printf(MSG_DEBUG,
  335. "%s: Failed to remove PAE multicast group (PACKET)",
  336. __func__);
  337. }
  338. if (drv->multi &&
  339. macsec_qca_multi(drv->ifname, pae_group_addr, 0) < 0) {
  340. wpa_printf(MSG_DEBUG,
  341. "%s: Failed to remove PAE multicast group (SIOCDELMULTI)",
  342. __func__);
  343. }
  344. if (drv->iff_allmulti &&
  345. (macsec_qca_get_ifflags(drv->ifname, &flags) < 0 ||
  346. macsec_qca_set_ifflags(drv->ifname, flags & ~IFF_ALLMULTI) < 0)) {
  347. wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode",
  348. __func__);
  349. }
  350. if (drv->iff_up &&
  351. macsec_qca_get_ifflags(drv->ifname, &flags) == 0 &&
  352. (flags & IFF_UP) &&
  353. macsec_qca_set_ifflags(drv->ifname, flags & ~IFF_UP) < 0) {
  354. wpa_printf(MSG_DEBUG, "%s: Failed to set the interface down",
  355. __func__);
  356. }
  357. if (drv->pf_sock != -1)
  358. close(drv->pf_sock);
  359. os_free(drv);
  360. }
  361. static int macsec_qca_macsec_init(void *priv, struct macsec_init_params *params)
  362. {
  363. struct macsec_qca_data *drv = priv;
  364. drv->always_include_sci = params->always_include_sci;
  365. drv->use_es = params->use_es;
  366. drv->use_scb = params->use_scb;
  367. wpa_printf(MSG_DEBUG, "%s: es=%d, scb=%d, sci=%d",
  368. __func__, drv->use_es, drv->use_scb,
  369. drv->always_include_sci);
  370. __macsec_drv_init(drv);
  371. return 0;
  372. }
  373. static int macsec_qca_macsec_deinit(void *priv)
  374. {
  375. struct macsec_qca_data *drv = priv;
  376. wpa_printf(MSG_DEBUG, "%s", __func__);
  377. __macsec_drv_deinit(drv);
  378. return 0;
  379. }
  380. static int macsec_qca_enable_protect_frames(void *priv, Boolean enabled)
  381. {
  382. struct macsec_qca_data *drv = priv;
  383. int ret = 0;
  384. wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
  385. drv->protect_frames = enabled;
  386. return ret;
  387. }
  388. static int macsec_qca_set_replay_protect(void *priv, Boolean enabled,
  389. unsigned int window)
  390. {
  391. struct macsec_qca_data *drv = priv;
  392. int ret = 0;
  393. wpa_printf(MSG_DEBUG, "%s: enabled=%d, win=%u",
  394. __func__, enabled, window);
  395. drv->replay_protect = enabled;
  396. drv->replay_window = window;
  397. return ret;
  398. }
  399. static int macsec_qca_set_current_cipher_suite(void *priv, const u8 *cs,
  400. size_t cs_len)
  401. {
  402. u8 default_cs_id[] = CS_ID_GCM_AES_128;
  403. if (cs_len != CS_ID_LEN ||
  404. os_memcmp(cs, default_cs_id, cs_len) != 0) {
  405. wpa_hexdump(MSG_ERROR, "macsec: NOT supported CipherSuite",
  406. cs, cs_len);
  407. return -1;
  408. }
  409. /* Support default Cipher Suite 0080020001000001 (GCM-AES-128) */
  410. wpa_printf(MSG_DEBUG, "%s: default support aes-gcm-128", __func__);
  411. return 0;
  412. }
  413. static int macsec_qca_enable_controlled_port(void *priv, Boolean enabled)
  414. {
  415. struct macsec_qca_data *drv = priv;
  416. int ret = 0;
  417. wpa_printf(MSG_DEBUG, "%s: enable=%d", __func__, enabled);
  418. ret += nss_macsec_secy_controlled_port_en_set(drv->secy_id, enabled);
  419. return ret;
  420. }
  421. static int macsec_qca_get_receive_lowest_pn(void *priv, u32 channel, u8 an,
  422. u32 *lowest_pn)
  423. {
  424. struct macsec_qca_data *drv = priv;
  425. int ret = 0;
  426. u32 next_pn = 0;
  427. bool enabled = FALSE;
  428. u32 win;
  429. ret += nss_macsec_secy_rx_sa_next_pn_get(drv->secy_id, channel, an,
  430. &next_pn);
  431. ret += nss_macsec_secy_rx_sc_replay_protect_get(drv->secy_id, channel,
  432. &enabled);
  433. ret += nss_macsec_secy_rx_sc_anti_replay_window_get(drv->secy_id,
  434. channel, &win);
  435. if (enabled)
  436. *lowest_pn = (next_pn > win) ? (next_pn - win) : 1;
  437. else
  438. *lowest_pn = next_pn;
  439. wpa_printf(MSG_DEBUG, "%s: lpn=0x%x", __func__, *lowest_pn);
  440. return ret;
  441. }
  442. static int macsec_qca_get_transmit_next_pn(void *priv, u32 channel, u8 an,
  443. u32 *next_pn)
  444. {
  445. struct macsec_qca_data *drv = priv;
  446. int ret = 0;
  447. ret += nss_macsec_secy_tx_sa_next_pn_get(drv->secy_id, channel, an,
  448. next_pn);
  449. wpa_printf(MSG_DEBUG, "%s: npn=0x%x", __func__, *next_pn);
  450. return ret;
  451. }
  452. int macsec_qca_set_transmit_next_pn(void *priv, u32 channel, u8 an, u32 next_pn)
  453. {
  454. struct macsec_qca_data *drv = priv;
  455. int ret = 0;
  456. ret += nss_macsec_secy_tx_sa_next_pn_set(drv->secy_id, channel, an,
  457. next_pn);
  458. wpa_printf(MSG_INFO, "%s: npn=0x%x", __func__, next_pn);
  459. return ret;
  460. }
  461. static int macsec_qca_get_available_receive_sc(void *priv, u32 *channel)
  462. {
  463. struct macsec_qca_data *drv = priv;
  464. int ret = 0;
  465. u32 sc_ch = 0;
  466. bool in_use = FALSE;
  467. for (sc_ch = 0; sc_ch < MAXSC; sc_ch++) {
  468. ret = nss_macsec_secy_rx_sc_in_used_get(drv->secy_id, sc_ch,
  469. &in_use);
  470. if (ret)
  471. continue;
  472. if (!in_use) {
  473. *channel = sc_ch;
  474. wpa_printf(MSG_DEBUG, "%s: channel=%d",
  475. __func__, *channel);
  476. return 0;
  477. }
  478. }
  479. wpa_printf(MSG_DEBUG, "%s: no available channel", __func__);
  480. return -1;
  481. }
  482. static int macsec_qca_create_receive_sc(void *priv, u32 channel,
  483. const u8 *sci_addr, u16 sci_port,
  484. unsigned int conf_offset,
  485. int validation)
  486. {
  487. struct macsec_qca_data *drv = priv;
  488. int ret = 0;
  489. fal_rx_prc_lut_t entry;
  490. fal_rx_sc_validate_frame_e vf;
  491. enum validate_frames validate_frames = validation;
  492. wpa_printf(MSG_DEBUG, "%s: channel=%d", __func__, channel);
  493. /* rx prc lut */
  494. os_memset(&entry, 0, sizeof(entry));
  495. os_memcpy(entry.sci, sci_addr, ETH_ALEN);
  496. entry.sci[6] = (sci_port >> 8) & 0xf;
  497. entry.sci[7] = sci_port & 0xf;
  498. entry.sci_mask = 0xf;
  499. entry.valid = 1;
  500. entry.channel = channel;
  501. entry.action = FAL_RX_PRC_ACTION_PROCESS;
  502. entry.offset = conf_offset;
  503. /* rx validate frame */
  504. if (validate_frames == Strict)
  505. vf = FAL_RX_SC_VALIDATE_FRAME_STRICT;
  506. else if (validate_frames == Checked)
  507. vf = FAL_RX_SC_VALIDATE_FRAME_CHECK;
  508. else
  509. vf = FAL_RX_SC_VALIDATE_FRAME_DISABLED;
  510. ret += nss_macsec_secy_rx_prc_lut_set(drv->secy_id, channel, &entry);
  511. ret += nss_macsec_secy_rx_sc_create(drv->secy_id, channel);
  512. ret += nss_macsec_secy_rx_sc_validate_frame_set(drv->secy_id, channel,
  513. vf);
  514. ret += nss_macsec_secy_rx_sc_replay_protect_set(drv->secy_id, channel,
  515. drv->replay_protect);
  516. ret += nss_macsec_secy_rx_sc_anti_replay_window_set(drv->secy_id,
  517. channel,
  518. drv->replay_window);
  519. return ret;
  520. }
  521. static int macsec_qca_delete_receive_sc(void *priv, u32 channel)
  522. {
  523. struct macsec_qca_data *drv = priv;
  524. int ret = 0;
  525. fal_rx_prc_lut_t entry;
  526. wpa_printf(MSG_DEBUG, "%s: channel=%d", __func__, channel);
  527. /* rx prc lut */
  528. os_memset(&entry, 0, sizeof(entry));
  529. ret += nss_macsec_secy_rx_sc_del(drv->secy_id, channel);
  530. ret += nss_macsec_secy_rx_prc_lut_set(drv->secy_id, channel, &entry);
  531. return ret;
  532. }
  533. static int macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an,
  534. u32 lowest_pn, const u8 *sak)
  535. {
  536. struct macsec_qca_data *drv = priv;
  537. int ret = 0;
  538. fal_rx_sak_t rx_sak;
  539. int i = 0;
  540. wpa_printf(MSG_DEBUG, "%s, channel=%d, an=%d, lpn=0x%x",
  541. __func__, channel, an, lowest_pn);
  542. os_memset(&rx_sak, 0, sizeof(rx_sak));
  543. for (i = 0; i < 16; i++)
  544. rx_sak.sak[i] = sak[15 - i];
  545. ret += nss_macsec_secy_rx_sa_create(drv->secy_id, channel, an);
  546. ret += nss_macsec_secy_rx_sak_set(drv->secy_id, channel, an, &rx_sak);
  547. return ret;
  548. }
  549. static int macsec_qca_enable_receive_sa(void *priv, u32 channel, u8 an)
  550. {
  551. struct macsec_qca_data *drv = priv;
  552. int ret = 0;
  553. wpa_printf(MSG_DEBUG, "%s: channel=%d, an=%d", __func__, channel, an);
  554. ret += nss_macsec_secy_rx_sa_en_set(drv->secy_id, channel, an, TRUE);
  555. return ret;
  556. }
  557. static int macsec_qca_disable_receive_sa(void *priv, u32 channel, u8 an)
  558. {
  559. struct macsec_qca_data *drv = priv;
  560. int ret = 0;
  561. wpa_printf(MSG_DEBUG, "%s: channel=%d, an=%d", __func__, channel, an);
  562. ret += nss_macsec_secy_rx_sa_en_set(drv->secy_id, channel, an, FALSE);
  563. return ret;
  564. }
  565. static int macsec_qca_get_available_transmit_sc(void *priv, u32 *channel)
  566. {
  567. struct macsec_qca_data *drv = priv;
  568. int ret = 0;
  569. u32 sc_ch = 0;
  570. bool in_use = FALSE;
  571. for (sc_ch = 0; sc_ch < MAXSC; sc_ch++) {
  572. ret = nss_macsec_secy_tx_sc_in_used_get(drv->secy_id, sc_ch,
  573. &in_use);
  574. if (ret)
  575. continue;
  576. if (!in_use) {
  577. *channel = sc_ch;
  578. wpa_printf(MSG_DEBUG, "%s: channel=%d",
  579. __func__, *channel);
  580. return 0;
  581. }
  582. }
  583. wpa_printf(MSG_DEBUG, "%s: no avaiable channel", __func__);
  584. return -1;
  585. }
  586. static int macsec_qca_create_transmit_sc(void *priv, u32 channel,
  587. const u8 *sci_addr, u16 sci_port,
  588. unsigned int conf_offset)
  589. {
  590. struct macsec_qca_data *drv = priv;
  591. int ret = 0;
  592. fal_tx_class_lut_t entry;
  593. u8 psci[ETH_ALEN + 2];
  594. wpa_printf(MSG_DEBUG, "%s: channel=%d", __func__, channel);
  595. /* class lut */
  596. os_memset(&entry, 0, sizeof(entry));
  597. entry.valid = 1;
  598. entry.action = FAL_TX_CLASS_ACTION_FORWARD;
  599. entry.channel = channel;
  600. os_memcpy(psci, sci_addr, ETH_ALEN);
  601. psci[6] = (sci_port >> 8) & 0xf;
  602. psci[7] = sci_port & 0xf;
  603. ret += nss_macsec_secy_tx_class_lut_set(drv->secy_id, channel, &entry);
  604. ret += nss_macsec_secy_tx_sc_create(drv->secy_id, channel, psci, 8);
  605. ret += nss_macsec_secy_tx_sc_protect_set(drv->secy_id, channel,
  606. drv->protect_frames);
  607. ret += nss_macsec_secy_tx_sc_confidentiality_offset_set(drv->secy_id,
  608. channel,
  609. conf_offset);
  610. return ret;
  611. }
  612. static int macsec_qca_delete_transmit_sc(void *priv, u32 channel)
  613. {
  614. struct macsec_qca_data *drv = priv;
  615. int ret = 0;
  616. fal_tx_class_lut_t entry;
  617. wpa_printf(MSG_DEBUG, "%s: channel=%d", __func__, channel);
  618. /* class lut */
  619. os_memset(&entry, 0, sizeof(entry));
  620. ret += nss_macsec_secy_tx_class_lut_set(drv->secy_id, channel, &entry);
  621. ret += nss_macsec_secy_tx_sc_del(drv->secy_id, channel);
  622. return ret;
  623. }
  624. static int macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an,
  625. u32 next_pn, Boolean confidentiality,
  626. const u8 *sak)
  627. {
  628. struct macsec_qca_data *drv = priv;
  629. int ret = 0;
  630. u8 tci = 0;
  631. fal_tx_sak_t tx_sak;
  632. int i;
  633. wpa_printf(MSG_DEBUG,
  634. "%s: channel=%d, an=%d, next_pn=0x%x, confidentiality=%d",
  635. __func__, channel, an, next_pn, confidentiality);
  636. if (drv->always_include_sci)
  637. tci |= TCI_SC;
  638. else if (drv->use_es)
  639. tci |= TCI_ES;
  640. else if (drv->use_scb)
  641. tci |= TCI_SCB;
  642. if (confidentiality)
  643. tci |= TCI_E | TCI_C;
  644. os_memset(&tx_sak, 0, sizeof(tx_sak));
  645. for (i = 0; i < 16; i++)
  646. tx_sak.sak[i] = sak[15 - i];
  647. ret += nss_macsec_secy_tx_sa_next_pn_set(drv->secy_id, channel, an,
  648. next_pn);
  649. ret += nss_macsec_secy_tx_sak_set(drv->secy_id, channel, an, &tx_sak);
  650. ret += nss_macsec_secy_tx_sc_tci_7_2_set(drv->secy_id, channel,
  651. (tci >> 2));
  652. ret += nss_macsec_secy_tx_sc_an_set(drv->secy_id, channel, an);
  653. return ret;
  654. }
  655. static int macsec_qca_enable_transmit_sa(void *priv, u32 channel, u8 an)
  656. {
  657. struct macsec_qca_data *drv = priv;
  658. int ret = 0;
  659. wpa_printf(MSG_DEBUG, "%s: channel=%d, an=%d", __func__, channel, an);
  660. ret += nss_macsec_secy_tx_sa_en_set(drv->secy_id, channel, an, TRUE);
  661. return ret;
  662. }
  663. static int macsec_qca_disable_transmit_sa(void *priv, u32 channel, u8 an)
  664. {
  665. struct macsec_qca_data *drv = priv;
  666. int ret = 0;
  667. wpa_printf(MSG_DEBUG, "%s: channel=%d, an=%d", __func__, channel, an);
  668. ret += nss_macsec_secy_tx_sa_en_set(drv->secy_id, channel, an, FALSE);
  669. return ret;
  670. }
  671. const struct wpa_driver_ops wpa_driver_macsec_qca_ops = {
  672. .name = "macsec_qca",
  673. .desc = "QCA MACsec Ethernet driver",
  674. .get_ssid = macsec_qca_get_ssid,
  675. .get_bssid = macsec_qca_get_bssid,
  676. .get_capa = macsec_qca_get_capa,
  677. .init = macsec_qca_init,
  678. .deinit = macsec_qca_deinit,
  679. .macsec_init = macsec_qca_macsec_init,
  680. .macsec_deinit = macsec_qca_macsec_deinit,
  681. .enable_protect_frames = macsec_qca_enable_protect_frames,
  682. .set_replay_protect = macsec_qca_set_replay_protect,
  683. .set_current_cipher_suite = macsec_qca_set_current_cipher_suite,
  684. .enable_controlled_port = macsec_qca_enable_controlled_port,
  685. .get_receive_lowest_pn = macsec_qca_get_receive_lowest_pn,
  686. .get_transmit_next_pn = macsec_qca_get_transmit_next_pn,
  687. .set_transmit_next_pn = macsec_qca_set_transmit_next_pn,
  688. .get_available_receive_sc = macsec_qca_get_available_receive_sc,
  689. .create_receive_sc = macsec_qca_create_receive_sc,
  690. .delete_receive_sc = macsec_qca_delete_receive_sc,
  691. .create_receive_sa = macsec_qca_create_receive_sa,
  692. .enable_receive_sa = macsec_qca_enable_receive_sa,
  693. .disable_receive_sa = macsec_qca_disable_receive_sa,
  694. .get_available_transmit_sc = macsec_qca_get_available_transmit_sc,
  695. .create_transmit_sc = macsec_qca_create_transmit_sc,
  696. .delete_transmit_sc = macsec_qca_delete_transmit_sc,
  697. .create_transmit_sa = macsec_qca_create_transmit_sa,
  698. .enable_transmit_sa = macsec_qca_enable_transmit_sa,
  699. .disable_transmit_sa = macsec_qca_disable_transmit_sa,
  700. };