freebsd-nq/sys/net80211/ieee80211_crypto_none.c
Sam Leffler 8a1b9b6ad4 Update 802.11 support; too much new functionality to fully describe
here but it includes completed 802.11g, WPA, 802.11i, 802.1x, WME/WMM,
AP-side power-save, crypto plugin framework, authenticator plugin framework,
and access control plugin frameowrk.
2004-12-08 17:26:47 +00:00

150 lines
4.3 KiB
C

/*-
* Copyright (c) 2002-2004 Sam Leffler, Errno Consulting
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* Alternatively, this software may be distributed under the terms of the
* GNU General Public License ("GPL") version 2 as published by the Free
* Software Foundation.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <sys/cdefs.h>
__FBSDID("$FreeBSD$");
/*
* IEEE 802.11 NULL crypto support.
*/
#include <sys/param.h>
#include <sys/systm.h>
#include <sys/mbuf.h>
#include <sys/module.h>
#include <sys/socket.h>
#include <net/if.h>
#include <net/if_media.h>
#include <net/ethernet.h>
#include <net80211/ieee80211_var.h>
static void *none_attach(struct ieee80211com *, struct ieee80211_key *);
static void none_detach(struct ieee80211_key *);
static int none_setkey(struct ieee80211_key *);
static int none_encap(struct ieee80211_key *, struct mbuf *, u_int8_t);
static int none_decap(struct ieee80211_key *, struct mbuf *);
static int none_enmic(struct ieee80211_key *, struct mbuf *);
static int none_demic(struct ieee80211_key *, struct mbuf *);
const struct ieee80211_cipher ieee80211_cipher_none = {
.ic_name = "NONE",
.ic_cipher = IEEE80211_CIPHER_NONE,
.ic_header = 0,
.ic_trailer = 0,
.ic_miclen = 0,
.ic_attach = none_attach,
.ic_detach = none_detach,
.ic_setkey = none_setkey,
.ic_encap = none_encap,
.ic_decap = none_decap,
.ic_enmic = none_enmic,
.ic_demic = none_demic,
};
static void *
none_attach(struct ieee80211com *ic, struct ieee80211_key *k)
{
return ic; /* for diagnostics+stats */
}
static void
none_detach(struct ieee80211_key *k)
{
(void) k;
}
static int
none_setkey(struct ieee80211_key *k)
{
(void) k;
return 1;
}
static int
none_encap(struct ieee80211_key *k, struct mbuf *m, u_int8_t keyid)
{
struct ieee80211com *ic = k->wk_private;
#ifdef IEEE80211_DEBUG
struct ieee80211_frame *wh = mtod(m, struct ieee80211_frame *);
#endif
/*
* The specified key is not setup; this can
* happen, at least, when changing keys.
*/
IEEE80211_DPRINTF(ic, IEEE80211_MSG_CRYPTO,
"[%s] key (id %u) is invalid\n",
ether_sprintf(wh->i_addr1), keyid>>6);
ic->ic_stats.is_tx_badcipher++;
return 0;
}
static int
none_decap(struct ieee80211_key *k, struct mbuf *m)
{
struct ieee80211com *ic = k->wk_private;
#ifdef IEEE80211_DEBUG
struct ieee80211_frame *wh = mtod(m, struct ieee80211_frame *);
const u_int8_t *ivp = (const u_int8_t *)&wh[1];
#endif
/*
* The specified key is not setup; this can
* happen, at least, when changing keys.
*/
/* XXX useful to know dst too */
IEEE80211_DPRINTF(ic, IEEE80211_MSG_CRYPTO,
"[%s] key (id %u) is invalid\n",
ether_sprintf(wh->i_addr2), ivp[IEEE80211_WEP_IVLEN] >> 6);
ic->ic_stats.is_rx_badkeyid++;
return 0;
}
static int
none_enmic(struct ieee80211_key *k, struct mbuf *m)
{
struct ieee80211com *ic = k->wk_private;
ic->ic_stats.is_tx_badcipher++;
return 0;
}
static int
none_demic(struct ieee80211_key *k, struct mbuf *m)
{
struct ieee80211com *ic = k->wk_private;
ic->ic_stats.is_rx_badkeyid++;
return 0;
}