/* * Copyright (c) 2017-2018, 2020 The Linux Foundation. All rights reserved. * * Permission to use, copy, modify, and/or distribute this software for * any purpose with or without fee is hereby granted, provided that the * above copyright notice and this permission notice appear in all * copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR * PERFORMANCE OF THIS SOFTWARE. */ /** * DOC: qdf_crypto.h * This file provides OS abstraction for crypto APIs. */ #if !defined(__QDF_CRYPTO_H) #define __QDF_CRYPTO_H /* Include Files */ #include "qdf_status.h" #include #include /* Preprocessor definitions and constants */ #ifdef __cplusplus extern "C" { #endif /* __cplusplus */ #define AES_BLOCK_SIZE 16 #define HMAC_SHA256_CRYPTO_TYPE "hmac(sha256)" #define HMAC_SHA386_CRYPTO_TYPE "hmac(sha384)" #define SHA256_CRYPTO_TYPE "sha256" #define SHA386_CRYPTO_TYPE "sha384" #define SHA256_DIGEST_SIZE 32 #define SHA384_DIGEST_SIZE 48 #define FIXED_PARAM_OFFSET_ASSOC_REQ 4 #define FIXED_PARAM_OFFSET_ASSOC_RSP 6 #define CMAC_TLEN 8 /* CMAC TLen = 64 bits (8 octets) */ #define AAD_LEN 20 #define IEEE80211_MMIE_GMAC_MICLEN 16 #define IS_VALID_CTR_KEY_LEN(len) ((((len) == 16) || ((len) == 32) || \ ((len) == 48)) ? 1 : 0) #if 1 #if LINUX_VERSION_CODE > KERNEL_VERSION(2,6,19) typedef struct crypto_cipher * qdf_os_cipher_t; #else typedef struct crypto_tfm * qdf_os_cipher_t; #endif #endif #define WLAN_MAX_PRF_INTERATIONS_COUNT 255 /* Function declarations and documenation */ /** * qdf_get_hash: API to get hash using specific crypto and scatterlist * @type: crypto type * @element_cnt: scatterlist element count * @addr: scatterlist element array * @addr_len: element length array * @hash: new hash * * Return: 0 if success else error code */ int qdf_get_hash(uint8_t *type, uint8_t element_cnt, uint8_t *addr[], uint32_t *addr_len, int8_t *hash); /** * qdf_get_hmac_hash: API to get hmac hash using specific crypto and * scatterlist elements. * @type: crypto type * @key: key needs to be used for hmac api * @keylen: length of key * @element_cnt: scatterlist element count * @addr: scatterlist element array * @addr_len: element length array * @hash: new hash * * Return: 0 if success else error code */ int qdf_get_hmac_hash(uint8_t *type, uint8_t *key, uint32_t keylen, uint8_t element_cnt, uint8_t *addr[], uint32_t *addr_len, int8_t *hash); /** * qdf_default_hmac_sha256_kdf()- This API calculates key data using default kdf * defined in RFC4306. * @secret: key which needs to be used in crypto * @secret_len: key_len of secret * @label: PRF label * @optional_data: Data used for hash * @optional_data_len: data length * @key: key data output * @keylen: key data length * * This API creates default KDF as defined in RFC4306 * PRF+ (K,S) = T1 | T2 | T3 | T4 | ... * T1 = PRF (K, S | 0x01) * T2 = PRF (K, T1 | S | 0x02) * T3 = PRF (K, T2 | S | 0x03) * T4 = PRF (K, T3 | S | 0x04) * * for every iteration its creates 32 bit of hash * * Return: QDF_STATUS */ QDF_STATUS qdf_default_hmac_sha256_kdf(uint8_t *secret, uint32_t secret_len, uint8_t *label, uint8_t *optional_data, uint32_t optional_data_len, uint8_t *key, uint32_t keylen); /** * qdf_get_keyed_hash: API to get hash using specific crypto and * scatterlist elements. * @type: crypto type * @key: key needs to be used for hmac api * @keylen: length of key * @element_cnt: scatterlist element count * @addr: scatterlist element array * @addr_len: element length array * @hash: new hash * * Return: 0 if success else error code */ int qdf_get_keyed_hash(const char *alg, const uint8_t *key, unsigned int key_len, const uint8_t *src[], size_t *src_len, size_t num_elements, uint8_t *out); /** * qdf_update_dbl: This API does the doubling operation as defined in RFC5297 * @d: input for doubling * * Return: None */ void qdf_update_dbl(uint8_t *d); /** * qdf_aes_s2v: This API gets vector from AES string as defined in RFC5297 * output length will be AES_BLOCK_SIZE. * @key: key used for operation * @key_len: key len * @s: addresses of elements to be used * @s_len: array of element length * @num_s: number of elements * @out: pointer to output vector * * Return: 0 if success else Error number */ int qdf_aes_s2v(const uint8_t *key, unsigned int key_len, const uint8_t *s[], size_t s_len[], size_t num_s, uint8_t *out); /** * qdf_aes_ctr: This API defines AES Counter Mode * @key: key used for operation * @key_len: key len * @siv: Initialization vector * @src: input * @src_len: input len * @dest: output * @enc: if encryption needs to be done or decryption * * Return: 0 if success else Error number */ int qdf_aes_ctr(const uint8_t *key, unsigned int key_len, uint8_t *siv, const uint8_t *src, size_t src_len, uint8_t *dest, bool enc); /** * qdf_crypto_aes_gmac: This API calculates MIC for GMAC * @key: key used for operation * @key_length: key length * @iv: Initialization vector * @aad: Additional authentication data * @data: Pointer to data * @data_len: Length of data * @mic: Pointer to MIC * * Return: 0 if success else Error number */ int qdf_crypto_aes_gmac(const uint8_t *key, uint16_t key_length, uint8_t *iv, const uint8_t *aad, const uint8_t *data, uint16_t data_len, uint8_t *mic); /** * qdf_crypto_aes_128_cmac: This API calculates MIC for AES 128 CMAC * @key: key used for operation * @data: Pointer to data * @len: Length of data * @mic: Pointer to MIC * * Return: 0 if success else Error number */ int qdf_crypto_aes_128_cmac(const uint8_t *key, const uint8_t *data, uint16_t len, uint8_t *mic); #if 1 /** * qdf_crypto_alloc_cipher: allocate single block cipher handle * @alg_name: is the cra_name / name or cra_driver_name / driver name of the * single block cipher * * Return: allocated cipher handle in case of success, NULL otherwise */ qdf_os_cipher_t qdf_crypto_alloc_cipher(const char *alg_name); /** * qdf_crypto_free_cipher: zeroize and free the single block cipher handle * @ctx: cipher handle to be freed */ void qdf_crypto_free_cipher(qdf_os_cipher_t ctx); /** * qdf_crypto_alloc_hash: allocate synchronous message digest handle * @alg_name: is the cra_name / name or cra_driver_name / driver name of the * message digest cipher * @type: specifies the type of the cipher * @mask: specifies the mask for the cipher * * Allocate a cipher handle for a message digest. The returned struct * crypto_hash is the cipher handle that is required for any subsequent * API invocation for that message digest. * * Return: allocated cipher handle in case of success; IS_ERR() is true in case * of an error, PTR_ERR() returns the error code. */ struct crypto_hash *qdf_crypto_alloc_hash(const char *alg_name, u32 type, u32 mask); /** * crypto_free_hash: zeroize and free message digest handle * @tfm: cipher handle to be freed */ void qdf_crypto_free_hash(struct crypto_hash *tfm); #endif #ifdef __cplusplus } #endif /* __cplusplus */ #endif /* __QDF_CRYPTO_H */