void ieee80211_free_keys(struct ieee80211_sub_if_data *sdata) { struct ieee80211_key *key, *tmp; list_for_each_entry_safe(key, tmp, &sdata->key_list, list) ieee80211_key_free(key); }
static int ieee80211_set_encryption(struct ieee80211_sub_if_data *sdata, u8 *sta_addr, int idx, int alg, int remove, int set_tx_key, const u8 *_key, size_t key_len) { struct ieee80211_local *local = sdata->local; struct sta_info *sta; struct ieee80211_key *key; int err; if (idx < 0 || idx >= NUM_DEFAULT_KEYS) { printk(KERN_DEBUG "%s: set_encrypt - invalid idx=%d\n", sdata->dev->name, idx); return -EINVAL; } if (remove) { rcu_read_lock(); err = 0; if (is_broadcast_ether_addr(sta_addr)) { key = sdata->keys[idx]; } else { sta = sta_info_get(local, sta_addr); if (!sta) { err = -ENOENT; goto out_unlock; } key = sta->key; } ieee80211_key_free(key); } else { key = ieee80211_key_alloc(alg, idx, key_len, _key); if (!key) return -ENOMEM; sta = NULL; err = 0; rcu_read_lock(); if (!is_broadcast_ether_addr(sta_addr)) { set_tx_key = 0; /* * According to the standard, the key index of a * pairwise key must be zero. However, some AP are * broken when it comes to WEP key indices, so we * work around this. */ if (idx != 0 && alg != ALG_WEP) { ieee80211_key_free(key); err = -EINVAL; goto out_unlock; } sta = sta_info_get(local, sta_addr); if (!sta) { ieee80211_key_free(key); err = -ENOENT; goto out_unlock; } } if (alg == ALG_WEP && key_len != LEN_WEP40 && key_len != LEN_WEP104) { ieee80211_key_free(key); err = -EINVAL; goto out_unlock; } ieee80211_key_link(key, sdata, sta); if (set_tx_key || (!sta && !sdata->default_key && key)) ieee80211_set_default_key(sdata, idx); } out_unlock: rcu_read_unlock(); return err; }
struct ieee80211_key *ieee80211_key_alloc(struct ieee80211_sub_if_data *sdata, struct sta_info *sta, enum ieee80211_key_alg alg, int idx, size_t key_len, const u8 *key_data) { struct ieee80211_key *key; BUG_ON(idx < 0 || idx >= NUM_DEFAULT_KEYS); key = kzalloc(sizeof(struct ieee80211_key) + key_len, GFP_KERNEL); if (!key) return NULL; /* * Default to software encryption; we'll later upload the * key to the hardware if possible. */ key->conf.flags = 0; key->flags = 0; key->conf.alg = alg; key->conf.keyidx = idx; key->conf.keylen = key_len; memcpy(key->conf.key, key_data, key_len); key->local = sdata->local; key->sdata = sdata; key->sta = sta; if (alg == ALG_CCMP) { /* * Initialize AES key state here as an optimization so that * it does not need to be initialized for every packet. */ key->u.ccmp.tfm = ieee80211_aes_key_setup_encrypt(key_data); if (!key->u.ccmp.tfm) { ieee80211_key_free(key); return NULL; } } ieee80211_debugfs_key_add(key->local, key); /* remove key first */ if (sta) ieee80211_key_free(sta->key); else ieee80211_key_free(sdata->keys[idx]); if (sta) { ieee80211_debugfs_key_sta_link(key, sta); /* * some hardware cannot handle TKIP with QoS, so * we indicate whether QoS could be in use. */ if (sta->flags & WLAN_STA_WME) key->conf.flags |= IEEE80211_KEY_FLAG_WMM_STA; } else { if (sdata->type == IEEE80211_IF_TYPE_STA) { struct sta_info *ap; /* same here, the AP could be using QoS */ ap = sta_info_get(key->local, key->sdata->u.sta.bssid); if (ap) { if (ap->flags & WLAN_STA_WME) key->conf.flags |= IEEE80211_KEY_FLAG_WMM_STA; sta_info_put(ap); } } } /* enable hwaccel if appropriate */ if (netif_running(key->sdata->dev)) ieee80211_key_enable_hw_accel(key); if (sta) rcu_assign_pointer(sta->key, key); else rcu_assign_pointer(sdata->keys[idx], key); list_add(&key->list, &sdata->key_list); return key; }
static int ieee80211_set_encryption(struct net_device *dev, u8 *sta_addr, int idx, int alg, int remove, int set_tx_key, const u8 *_key, size_t key_len) { struct ieee80211_local *local = wdev_priv(dev->ieee80211_ptr); struct sta_info *sta; struct ieee80211_key *key; struct ieee80211_sub_if_data *sdata; sdata = IEEE80211_DEV_TO_SUB_IF(dev); if (idx < 0 || idx >= NUM_DEFAULT_KEYS) { printk(KERN_DEBUG "%s: set_encrypt - invalid idx=%d\n", dev->name, idx); return -EINVAL; } if (remove) { if (is_broadcast_ether_addr(sta_addr)) { key = sdata->keys[idx]; } else { sta = sta_info_get(local, sta_addr); if (!sta) return -ENOENT; key = sta->key; } if (!key) return -ENOENT; ieee80211_key_free(key); return 0; } else { key = ieee80211_key_alloc(alg, idx, key_len, _key); if (!key) return -ENOMEM; sta = NULL; if (!is_broadcast_ether_addr(sta_addr)) { set_tx_key = 0; /* * According to the standard, the key index of a * pairwise key must be zero. However, some AP are * broken when it comes to WEP key indices, so we * work around this. */ if (idx != 0 && alg != ALG_WEP) { ieee80211_key_free(key); return -EINVAL; } sta = sta_info_get(local, sta_addr); if (!sta) { ieee80211_key_free(key); return -ENOENT; } } ieee80211_key_link(key, sdata, sta); if (set_tx_key || (!sta && !sdata->default_key && key)) ieee80211_set_default_key(sdata, idx); } return 0; }