80 lines
		
	
	
	
		
			2.1 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
		
		
			
		
	
	
			80 lines
		
	
	
	
		
			2.1 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
|   | /* Orinoco MIC helpers
 | ||
|  |  * | ||
|  |  * See copyright notice in main.c | ||
|  |  */ | ||
|  | #include <linux/kernel.h>
 | ||
|  | #include <linux/string.h>
 | ||
|  | #include <linux/if_ether.h>
 | ||
|  | #include <linux/scatterlist.h>
 | ||
|  | #include <linux/crypto.h>
 | ||
|  | 
 | ||
|  | #include "orinoco.h"
 | ||
|  | #include "mic.h"
 | ||
|  | 
 | ||
|  | /********************************************************************/ | ||
|  | /* Michael MIC crypto setup                                         */ | ||
|  | /********************************************************************/ | ||
|  | int orinoco_mic_init(struct orinoco_private *priv) | ||
|  | { | ||
|  | 	priv->tx_tfm_mic = crypto_alloc_hash("michael_mic", 0, 0); | ||
|  | 	if (IS_ERR(priv->tx_tfm_mic)) { | ||
|  | 		printk(KERN_DEBUG "orinoco_mic_init: could not allocate " | ||
|  | 		       "crypto API michael_mic\n"); | ||
|  | 		priv->tx_tfm_mic = NULL; | ||
|  | 		return -ENOMEM; | ||
|  | 	} | ||
|  | 
 | ||
|  | 	priv->rx_tfm_mic = crypto_alloc_hash("michael_mic", 0, 0); | ||
|  | 	if (IS_ERR(priv->rx_tfm_mic)) { | ||
|  | 		printk(KERN_DEBUG "orinoco_mic_init: could not allocate " | ||
|  | 		       "crypto API michael_mic\n"); | ||
|  | 		priv->rx_tfm_mic = NULL; | ||
|  | 		return -ENOMEM; | ||
|  | 	} | ||
|  | 
 | ||
|  | 	return 0; | ||
|  | } | ||
|  | 
 | ||
|  | void orinoco_mic_free(struct orinoco_private *priv) | ||
|  | { | ||
|  | 	if (priv->tx_tfm_mic) | ||
|  | 		crypto_free_hash(priv->tx_tfm_mic); | ||
|  | 	if (priv->rx_tfm_mic) | ||
|  | 		crypto_free_hash(priv->rx_tfm_mic); | ||
|  | } | ||
|  | 
 | ||
|  | int orinoco_mic(struct crypto_hash *tfm_michael, u8 *key, | ||
|  | 		u8 *da, u8 *sa, u8 priority, | ||
|  | 		u8 *data, size_t data_len, u8 *mic) | ||
|  | { | ||
|  | 	struct hash_desc desc; | ||
|  | 	struct scatterlist sg[2]; | ||
|  | 	u8 hdr[ETH_HLEN + 2]; /* size of header + padding */ | ||
|  | 
 | ||
|  | 	if (tfm_michael == NULL) { | ||
|  | 		printk(KERN_WARNING "orinoco_mic: tfm_michael == NULL\n"); | ||
|  | 		return -1; | ||
|  | 	} | ||
|  | 
 | ||
|  | 	/* Copy header into buffer. We need the padding on the end zeroed */ | ||
|  | 	memcpy(&hdr[0], da, ETH_ALEN); | ||
|  | 	memcpy(&hdr[ETH_ALEN], sa, ETH_ALEN); | ||
|  | 	hdr[ETH_ALEN*2] = priority; | ||
|  | 	hdr[ETH_ALEN*2+1] = 0; | ||
|  | 	hdr[ETH_ALEN*2+2] = 0; | ||
|  | 	hdr[ETH_ALEN*2+3] = 0; | ||
|  | 
 | ||
|  | 	/* Use scatter gather to MIC header and data in one go */ | ||
|  | 	sg_init_table(sg, 2); | ||
|  | 	sg_set_buf(&sg[0], hdr, sizeof(hdr)); | ||
|  | 	sg_set_buf(&sg[1], data, data_len); | ||
|  | 
 | ||
|  | 	if (crypto_hash_setkey(tfm_michael, key, MIC_KEYLEN)) | ||
|  | 		return -1; | ||
|  | 
 | ||
|  | 	desc.tfm = tfm_michael; | ||
|  | 	desc.flags = 0; | ||
|  | 	return crypto_hash_digest(&desc, sg, data_len + sizeof(hdr), | ||
|  | 				  mic); | ||
|  | } |