xref: /OK3568_Linux_fs/external/rkwifibt/drivers/rtl8852be/phl/phl_sec.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /******************************************************************************
2*4882a593Smuzhiyun  *
3*4882a593Smuzhiyun  * Copyright(c) 2019 Realtek Corporation.
4*4882a593Smuzhiyun  *
5*4882a593Smuzhiyun  * This program is free software; you can redistribute it and/or modify it
6*4882a593Smuzhiyun  * under the terms of version 2 of the GNU General Public License as
7*4882a593Smuzhiyun  * published by the Free Software Foundation.
8*4882a593Smuzhiyun  *
9*4882a593Smuzhiyun  * This program is distributed in the hope that it will be useful, but WITHOUT
10*4882a593Smuzhiyun  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11*4882a593Smuzhiyun  * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
12*4882a593Smuzhiyun  * more details.
13*4882a593Smuzhiyun  *
14*4882a593Smuzhiyun  *****************************************************************************/
15*4882a593Smuzhiyun #define _PHL_SEC_C_
16*4882a593Smuzhiyun #include "phl_headers.h"
17*4882a593Smuzhiyun 
18*4882a593Smuzhiyun #define RTW_PHL_EXT_KEY_LEN 32
19*4882a593Smuzhiyun #define RTW_SEC_KEY_TYPE_NUM 3
20*4882a593Smuzhiyun 
21*4882a593Smuzhiyun static enum rtw_phl_status
_phl_set_key(struct phl_info_t * phl_info,struct rtw_phl_stainfo_t * sta,struct phl_sec_param_h * crypt,u8 * keybuf)22*4882a593Smuzhiyun _phl_set_key(struct phl_info_t *phl_info,
23*4882a593Smuzhiyun              struct rtw_phl_stainfo_t *sta,
24*4882a593Smuzhiyun              struct phl_sec_param_h *crypt,
25*4882a593Smuzhiyun              u8 *keybuf)
26*4882a593Smuzhiyun {
27*4882a593Smuzhiyun 	enum rtw_hal_status hal_status = RTW_HAL_STATUS_FAILURE;
28*4882a593Smuzhiyun 	enum rtw_phl_status phl_status = RTW_PHL_STATUS_FAILURE;
29*4882a593Smuzhiyun 
30*4882a593Smuzhiyun 	if(keybuf)
31*4882a593Smuzhiyun 		PHL_INFO("Add_key:: enc_type(%d) key_id(%d) key_type(%d)\n",
32*4882a593Smuzhiyun 			 crypt->enc_type, crypt->keyid, crypt->key_type);
33*4882a593Smuzhiyun 	hal_status = rtw_hal_set_key(phl_info->hal,
34*4882a593Smuzhiyun 	                             sta,
35*4882a593Smuzhiyun 	                             crypt->enc_type,
36*4882a593Smuzhiyun 	                             (crypt->key_len==RTW_PHL_EXT_KEY_LEN)?1:0,
37*4882a593Smuzhiyun 	                             crypt->spp,
38*4882a593Smuzhiyun 	                             crypt->keyid,
39*4882a593Smuzhiyun 	                             crypt->key_type,
40*4882a593Smuzhiyun 	                             keybuf);
41*4882a593Smuzhiyun 	if (hal_status == RTW_HAL_STATUS_SUCCESS)
42*4882a593Smuzhiyun 		phl_status = RTW_PHL_STATUS_SUCCESS;
43*4882a593Smuzhiyun 
44*4882a593Smuzhiyun 	return phl_status;
45*4882a593Smuzhiyun }
46*4882a593Smuzhiyun 
47*4882a593Smuzhiyun #ifdef CONFIG_CMD_DISP
48*4882a593Smuzhiyun struct cmd_sec_param {
49*4882a593Smuzhiyun 	struct rtw_phl_stainfo_t *sta;
50*4882a593Smuzhiyun 	struct phl_sec_param_h *crypt;
51*4882a593Smuzhiyun 	u8 *keybuf;
52*4882a593Smuzhiyun };
53*4882a593Smuzhiyun 
54*4882a593Smuzhiyun static void
_phl_cmd_set_key_done(void * drv_priv,u8 * cmd,u32 cmd_len,enum rtw_phl_status status)55*4882a593Smuzhiyun _phl_cmd_set_key_done(void *drv_priv,
56*4882a593Smuzhiyun                       u8 *cmd,
57*4882a593Smuzhiyun                       u32 cmd_len,
58*4882a593Smuzhiyun                       enum rtw_phl_status status)
59*4882a593Smuzhiyun {
60*4882a593Smuzhiyun 	struct cmd_sec_param *param = (struct cmd_sec_param *)cmd;
61*4882a593Smuzhiyun 
62*4882a593Smuzhiyun 	if (param) {
63*4882a593Smuzhiyun 		if (param->keybuf)
64*4882a593Smuzhiyun 			_os_kmem_free(drv_priv,
65*4882a593Smuzhiyun 			             param->keybuf,
66*4882a593Smuzhiyun 			             param->crypt->key_len);
67*4882a593Smuzhiyun 
68*4882a593Smuzhiyun 		if (param->crypt)
69*4882a593Smuzhiyun 			_os_kmem_free(drv_priv,
70*4882a593Smuzhiyun 			             param->crypt,
71*4882a593Smuzhiyun 			             sizeof(struct phl_sec_param_h));
72*4882a593Smuzhiyun 
73*4882a593Smuzhiyun 		_os_kmem_free(drv_priv, param, cmd_len);
74*4882a593Smuzhiyun 	}
75*4882a593Smuzhiyun }
76*4882a593Smuzhiyun 
77*4882a593Smuzhiyun enum rtw_phl_status
_phl_cmd_set_key(void * phl,struct rtw_phl_stainfo_t * sta,struct phl_sec_param_h * crypt,u8 * keybuf,enum phl_cmd_type cmd_type,u32 cmd_timeout)78*4882a593Smuzhiyun _phl_cmd_set_key(void *phl,
79*4882a593Smuzhiyun                  struct rtw_phl_stainfo_t *sta,
80*4882a593Smuzhiyun                  struct phl_sec_param_h *crypt,
81*4882a593Smuzhiyun                  u8 *keybuf,
82*4882a593Smuzhiyun                  enum phl_cmd_type cmd_type,
83*4882a593Smuzhiyun                  u32 cmd_timeout)
84*4882a593Smuzhiyun {
85*4882a593Smuzhiyun 	struct phl_info_t *phl_info = (struct phl_info_t *)phl;
86*4882a593Smuzhiyun 	void *drv = phl_to_drvpriv(phl_info);
87*4882a593Smuzhiyun 	enum rtw_phl_status psts = RTW_PHL_STATUS_FAILURE;
88*4882a593Smuzhiyun 
89*4882a593Smuzhiyun 	struct cmd_sec_param *param = NULL;
90*4882a593Smuzhiyun 	u32 param_len = 0, crypt_len = 0;
91*4882a593Smuzhiyun 
92*4882a593Smuzhiyun 	if (cmd_type == PHL_CMD_DIRECTLY) {
93*4882a593Smuzhiyun 		psts = _phl_set_key(phl_info, sta, crypt, keybuf);
94*4882a593Smuzhiyun 		goto _exit;
95*4882a593Smuzhiyun 	}
96*4882a593Smuzhiyun 
97*4882a593Smuzhiyun 	param_len = sizeof(struct cmd_sec_param);
98*4882a593Smuzhiyun 	param = _os_kmem_alloc(drv, param_len);
99*4882a593Smuzhiyun 	if (param == NULL) {
100*4882a593Smuzhiyun 		PHL_ERR("%s: alloc param failed!\n", __func__);
101*4882a593Smuzhiyun 		psts = RTW_PHL_STATUS_RESOURCE;
102*4882a593Smuzhiyun 		goto error_param;
103*4882a593Smuzhiyun 	}
104*4882a593Smuzhiyun 	_os_mem_set(drv, param, 0, param_len);
105*4882a593Smuzhiyun 	param->sta = sta;
106*4882a593Smuzhiyun 
107*4882a593Smuzhiyun 	crypt_len = sizeof(struct phl_sec_param_h);
108*4882a593Smuzhiyun 	param->crypt = _os_kmem_alloc(drv, crypt_len);
109*4882a593Smuzhiyun 	if (param->crypt == NULL) {
110*4882a593Smuzhiyun 		PHL_ERR("%s: alloc param->crypt failed!\n", __func__);
111*4882a593Smuzhiyun 		psts = RTW_PHL_STATUS_RESOURCE;
112*4882a593Smuzhiyun 		goto error_crypt;
113*4882a593Smuzhiyun 	}
114*4882a593Smuzhiyun 	_os_mem_set(drv, param->crypt, 0, crypt_len);
115*4882a593Smuzhiyun 	_os_mem_cpy(drv, param->crypt, crypt, crypt_len);
116*4882a593Smuzhiyun 
117*4882a593Smuzhiyun 	if (keybuf) { /* set key */
118*4882a593Smuzhiyun 		param->keybuf = _os_kmem_alloc(drv, param->crypt->key_len);
119*4882a593Smuzhiyun 		if (param->keybuf == NULL) {
120*4882a593Smuzhiyun 			PHL_ERR("%s: alloc param->keybuf failed!\n", __func__);
121*4882a593Smuzhiyun 			psts = RTW_PHL_STATUS_RESOURCE;
122*4882a593Smuzhiyun 			goto error_key_buf;
123*4882a593Smuzhiyun 		}
124*4882a593Smuzhiyun 		_os_mem_cpy(drv, param->keybuf, keybuf, param->crypt->key_len);
125*4882a593Smuzhiyun 	}
126*4882a593Smuzhiyun 
127*4882a593Smuzhiyun 	psts = phl_cmd_enqueue(phl_info,
128*4882a593Smuzhiyun 	                       sta->wrole->hw_band,
129*4882a593Smuzhiyun 	                       MSG_EVT_SEC_KEY,
130*4882a593Smuzhiyun 	                       (u8 *)param,
131*4882a593Smuzhiyun 	                       param_len,
132*4882a593Smuzhiyun 	                       _phl_cmd_set_key_done,
133*4882a593Smuzhiyun 	                       cmd_type,
134*4882a593Smuzhiyun 	                       cmd_timeout);
135*4882a593Smuzhiyun 
136*4882a593Smuzhiyun 	if (is_cmd_failure(psts)) {
137*4882a593Smuzhiyun 		/* Send cmd success, but wait cmd fail*/
138*4882a593Smuzhiyun 		psts = RTW_PHL_STATUS_FAILURE;
139*4882a593Smuzhiyun 	} else if (psts != RTW_PHL_STATUS_SUCCESS) {
140*4882a593Smuzhiyun 		/* Send cmd fail */
141*4882a593Smuzhiyun 		psts = RTW_PHL_STATUS_FAILURE;
142*4882a593Smuzhiyun 		goto error_cmd;
143*4882a593Smuzhiyun 	}
144*4882a593Smuzhiyun 
145*4882a593Smuzhiyun 	return psts;
146*4882a593Smuzhiyun 
147*4882a593Smuzhiyun error_cmd:
148*4882a593Smuzhiyun 	if (param->keybuf)
149*4882a593Smuzhiyun 		_os_kmem_free(drv, param->keybuf, param->crypt->key_len);
150*4882a593Smuzhiyun error_key_buf:
151*4882a593Smuzhiyun 	if (param->crypt)
152*4882a593Smuzhiyun 		_os_kmem_free(drv, param->crypt, crypt_len);
153*4882a593Smuzhiyun 
154*4882a593Smuzhiyun error_crypt:
155*4882a593Smuzhiyun 	if (param)
156*4882a593Smuzhiyun 		_os_kmem_free(drv, param, param_len);
157*4882a593Smuzhiyun 
158*4882a593Smuzhiyun error_param:
159*4882a593Smuzhiyun _exit:
160*4882a593Smuzhiyun 	return psts;
161*4882a593Smuzhiyun }
162*4882a593Smuzhiyun 
163*4882a593Smuzhiyun enum rtw_phl_status
phl_cmd_set_key_hdl(struct phl_info_t * phl_info,u8 * param)164*4882a593Smuzhiyun phl_cmd_set_key_hdl(struct phl_info_t *phl_info, u8 *param)
165*4882a593Smuzhiyun {
166*4882a593Smuzhiyun 	struct cmd_sec_param *cmd_sec_param = (struct cmd_sec_param *)param;
167*4882a593Smuzhiyun 
168*4882a593Smuzhiyun 	return _phl_set_key(phl_info,
169*4882a593Smuzhiyun 	                    cmd_sec_param->sta,
170*4882a593Smuzhiyun 	                    cmd_sec_param->crypt,
171*4882a593Smuzhiyun 	                    cmd_sec_param->keybuf);
172*4882a593Smuzhiyun }
173*4882a593Smuzhiyun #endif /* CONFIG_CMD_DISP */
174*4882a593Smuzhiyun 
175*4882a593Smuzhiyun enum rtw_phl_status
rtw_phl_cmd_add_key(void * phl,struct rtw_phl_stainfo_t * sta,struct phl_sec_param_h * crypt,u8 * keybuf,enum phl_cmd_type cmd_type,u32 cmd_timeout)176*4882a593Smuzhiyun rtw_phl_cmd_add_key(void *phl,
177*4882a593Smuzhiyun                     struct rtw_phl_stainfo_t *sta,
178*4882a593Smuzhiyun                     struct phl_sec_param_h *crypt,
179*4882a593Smuzhiyun                     u8 *keybuf,
180*4882a593Smuzhiyun                     enum phl_cmd_type cmd_type,
181*4882a593Smuzhiyun                     u32 cmd_timeout)
182*4882a593Smuzhiyun {
183*4882a593Smuzhiyun #ifdef CONFIG_CMD_DISP
184*4882a593Smuzhiyun 	return _phl_cmd_set_key(phl, sta, crypt, keybuf, cmd_type, cmd_timeout);
185*4882a593Smuzhiyun #else
186*4882a593Smuzhiyun 	PHL_TRACE(COMP_PHL_DBG, _PHL_INFO_, "%s: not support add key cmd\n",
187*4882a593Smuzhiyun 	          __func__);
188*4882a593Smuzhiyun 
189*4882a593Smuzhiyun 	return _phl_set_key((struct phl_info_t *)phl, sta, crypt, keybuf);
190*4882a593Smuzhiyun #endif /* CONFIG_CMD_DISP */
191*4882a593Smuzhiyun }
192*4882a593Smuzhiyun 
193*4882a593Smuzhiyun enum rtw_phl_status
rtw_phl_cmd_del_key(void * phl,struct rtw_phl_stainfo_t * sta,struct phl_sec_param_h * crypt,enum phl_cmd_type cmd_type,u32 cmd_timeout)194*4882a593Smuzhiyun rtw_phl_cmd_del_key(void *phl,
195*4882a593Smuzhiyun                     struct rtw_phl_stainfo_t *sta,
196*4882a593Smuzhiyun                     struct phl_sec_param_h *crypt,
197*4882a593Smuzhiyun                     enum phl_cmd_type cmd_type,
198*4882a593Smuzhiyun                     u32 cmd_timeout)
199*4882a593Smuzhiyun {
200*4882a593Smuzhiyun #ifdef CONFIG_CMD_DISP
201*4882a593Smuzhiyun 	return _phl_cmd_set_key(phl, sta, crypt, NULL, cmd_type, cmd_timeout);
202*4882a593Smuzhiyun #else
203*4882a593Smuzhiyun 	PHL_TRACE(COMP_PHL_DBG, _PHL_INFO_, "%s: not support del key cmd\n",
204*4882a593Smuzhiyun 	          __func__);
205*4882a593Smuzhiyun 
206*4882a593Smuzhiyun 	return _phl_set_key((struct phl_info_t *)phl, sta, crypt, NULL);
207*4882a593Smuzhiyun #endif /* CONFIG_CMD_DISP */
208*4882a593Smuzhiyun }
209*4882a593Smuzhiyun 
rtw_phl_trans_sec_mode(u8 unicast,u8 multicast)210*4882a593Smuzhiyun u8 rtw_phl_trans_sec_mode(u8 unicast, u8 multicast)
211*4882a593Smuzhiyun {
212*4882a593Smuzhiyun 	u8	ret = RTW_SEC_ENT_MODE_0;
213*4882a593Smuzhiyun 
214*4882a593Smuzhiyun 	if (RTW_ENC_NONE == unicast && RTW_ENC_NONE == multicast) {
215*4882a593Smuzhiyun 		ret = RTW_SEC_ENT_MODE_0;
216*4882a593Smuzhiyun 	} else if ((RTW_ENC_WEP40 == unicast && RTW_ENC_WEP40 == multicast) ||
217*4882a593Smuzhiyun 		(RTW_ENC_WEP104 == unicast && RTW_ENC_WEP104 == multicast)) {
218*4882a593Smuzhiyun 		ret = RTW_SEC_ENT_MODE_1;
219*4882a593Smuzhiyun 	} else if (RTW_ENC_WEP40 == multicast || RTW_ENC_WEP104 == multicast) {
220*4882a593Smuzhiyun 		ret = RTW_SEC_ENT_MODE_3;
221*4882a593Smuzhiyun 	} else {
222*4882a593Smuzhiyun 		ret = RTW_SEC_ENT_MODE_2;
223*4882a593Smuzhiyun 	}
224*4882a593Smuzhiyun 
225*4882a593Smuzhiyun 	return ret;
226*4882a593Smuzhiyun }
227*4882a593Smuzhiyun 
rtw_phl_get_sec_cam_idx(void * phl,struct rtw_phl_stainfo_t * sta,u8 keyid,u8 key_type)228*4882a593Smuzhiyun u8 rtw_phl_get_sec_cam_idx(void *phl,
229*4882a593Smuzhiyun                            struct rtw_phl_stainfo_t *sta,
230*4882a593Smuzhiyun                            u8 keyid,
231*4882a593Smuzhiyun                            u8 key_type)
232*4882a593Smuzhiyun {
233*4882a593Smuzhiyun 	u8 ret = 0;
234*4882a593Smuzhiyun 	struct phl_info_t *phl_info = (struct phl_info_t *)phl;
235*4882a593Smuzhiyun 
236*4882a593Smuzhiyun 	ret = (u8) rtw_hal_search_key_idx(phl_info->hal, sta, keyid, key_type);
237*4882a593Smuzhiyun 
238*4882a593Smuzhiyun 	return ret;
239*4882a593Smuzhiyun }
240