From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A1DF7C742A7 for ; Sat, 13 Jul 2019 15:04:01 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 7C104208E4 for ; Sat, 13 Jul 2019 15:04:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1563030241; bh=Jak/d+IRqVxcglo3a01YV2Bw6lP+PMzRagdjYo8qPDE=; h=From:To:Cc:Subject:Date:List-ID:From; b=FTWzUZxxDbd/K/Fd0y6q8i/tngd6sPR/1g+ah2xAxWKT/dhef0wcF0QkNjFH4NCEh 0MyWegeBtCLb/Of1bcD64ecb/iT4cGyz/bQgVvDiemp4Ndlc2NHD6AG4O7FGaRs4is RMOksgt5FTddWtE2aKkNh1LWjiWmwT/NOYPzH2d0= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727943AbfGMPEB (ORCPT ); Sat, 13 Jul 2019 11:04:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:50458 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727626AbfGMPEA (ORCPT ); Sat, 13 Jul 2019 11:04:00 -0400 Received: from lore-desk-wlan.lan (unknown [151.66.36.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 30B3F20850; Sat, 13 Jul 2019 15:03:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1563030240; bh=Jak/d+IRqVxcglo3a01YV2Bw6lP+PMzRagdjYo8qPDE=; h=From:To:Cc:Subject:Date:From; b=ENiZiYKMY/k78Wjd5PMVj5d7PzHqsDhUVFv8LHdgHilWCwoovNSFLD/e/9TtKi0Fz xZdtYGmIiVFvbYNpY0vnXCZIiQKfhI3hOaiW0WaUzRjQpK26TzHbJ08rG1ElmtuC9p HoZGKhk7OOOBYppEHeCEOOXpARxKvfhv8f5Jt1ek= From: Lorenzo Bianconi To: johannes@sipsolutions.net Cc: linux-wireless@vger.kernel.org, nbd@nbd.name Subject: [PATCH] mac80211: add IEEE80211_KEY_FLAG_PUT_MMIE_SPACE to ieee80211_key_flags Date: Sat, 13 Jul 2019 17:03:51 +0200 Message-Id: <1dd6dd782121d0b9cc32dec6a01db474e568ffb2.1563030033.git.lorenzo@kernel.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Add IEEE80211_KEY_FLAG_PUT_MMIE_SPACE flag to ieee80211_key_flags in order to allow the driver to notify mac80211 to allocate mmie space for AES_CMAC hw cipher. Moreover mac80211 will set MMIE pn while MIC will be computed in hw. This is a preliminary patch to add BIP_CMAC_128 hw support to mt7615 driver Signed-off-by: Lorenzo Bianconi --- include/net/mac80211.h | 4 ++++ net/mac80211/wpa.c | 6 +++++- 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/include/net/mac80211.h b/include/net/mac80211.h index d26da013f7c0..204e5537def6 100644 --- a/include/net/mac80211.h +++ b/include/net/mac80211.h @@ -1702,6 +1702,9 @@ struct wireless_dev *ieee80211_vif_to_wdev(struct ieee80211_vif *vif); * a TKIP key if it only requires MIC space. Do not set together with * @IEEE80211_KEY_FLAG_GENERATE_MMIC on the same key. * @IEEE80211_KEY_FLAG_NO_AUTO_TX: Key needs explicit Tx activation. + * @IEEE80211_KEY_FLAG_PUT_MMIE_SPACE: This flag should be set by the driver + * for a AES_CMAC key if it only requires MMIE space. Moreover mac80211 + * will compute PN MMIE */ enum ieee80211_key_flags { IEEE80211_KEY_FLAG_GENERATE_IV_MGMT = BIT(0), @@ -1714,6 +1717,7 @@ enum ieee80211_key_flags { IEEE80211_KEY_FLAG_RESERVE_TAILROOM = BIT(7), IEEE80211_KEY_FLAG_PUT_MIC_SPACE = BIT(8), IEEE80211_KEY_FLAG_NO_AUTO_TX = BIT(9), + IEEE80211_KEY_FLAG_PUT_MMIE_SPACE = BIT(10), }; /** diff --git a/net/mac80211/wpa.c b/net/mac80211/wpa.c index a51c7909366e..969597ddbb76 100644 --- a/net/mac80211/wpa.c +++ b/net/mac80211/wpa.c @@ -946,7 +946,8 @@ ieee80211_crypto_aes_cmac_encrypt(struct ieee80211_tx_data *tx) info = IEEE80211_SKB_CB(skb); - if (info->control.hw_key) + if (info->control.hw_key && + !(key->conf.flags & IEEE80211_KEY_FLAG_PUT_MMIE_SPACE)) return TX_CONTINUE; if (WARN_ON(skb_tailroom(skb) < sizeof(*mmie))) @@ -962,6 +963,9 @@ ieee80211_crypto_aes_cmac_encrypt(struct ieee80211_tx_data *tx) bip_ipn_set64(mmie->sequence_number, pn64); + if (info->control.hw_key) + return TX_CONTINUE; + bip_aad(skb, aad); /* -- 2.21.0