Commit a96202ac authored by Hector Martin's avatar Hector Martin Committed by Kalle Valo

wifi: brcmfmac: cfg80211: Add support for PMKID_V3 operations

Add support for the new PMKID_V3 API, which allows performing PMKID
mutations individually, instead of requiring the driver to keep track of
the full list. This new API is required by at least BCM4387.

Note that PMKID_V2 is not implemented yet.
Reviewed-by: default avatarLinus Walleij <linus.walleij@linaro.org>
Reviewed-by: default avatarArend van Spriel <arend.vanspriel@broadcom.com>
Signed-off-by: default avatarHector Martin <marcan@marcan.st>
Signed-off-by: default avatarKalle Valo <kvalo@kernel.org>
Link: https://lore.kernel.org/r/20230214092423.15175-5-marcan@marcan.st
parent d75ef1f8
...@@ -4306,6 +4306,37 @@ static s32 brcmf_cfg80211_suspend(struct wiphy *wiphy, ...@@ -4306,6 +4306,37 @@ static s32 brcmf_cfg80211_suspend(struct wiphy *wiphy,
return 0; return 0;
} }
static s32
brcmf_pmksa_v3_op(struct brcmf_if *ifp, struct cfg80211_pmksa *pmksa,
bool alive)
{
struct brcmf_pmk_op_v3_le *pmk_op;
int length = offsetof(struct brcmf_pmk_op_v3_le, pmk);
int ret;
pmk_op = kzalloc(sizeof(*pmk_op), GFP_KERNEL);
pmk_op->version = cpu_to_le16(BRCMF_PMKSA_VER_3);
if (!pmksa) {
/* Flush operation, operate on entire list */
pmk_op->count = cpu_to_le16(0);
} else {
/* Single PMK operation */
pmk_op->count = cpu_to_le16(1);
length += sizeof(struct brcmf_pmksa_v3);
memcpy(pmk_op->pmk[0].bssid, pmksa->bssid, ETH_ALEN);
memcpy(pmk_op->pmk[0].pmkid, pmksa->pmkid, WLAN_PMKID_LEN);
pmk_op->pmk[0].pmkid_len = WLAN_PMKID_LEN;
pmk_op->pmk[0].time_left = cpu_to_le32(alive ? BRCMF_PMKSA_NO_EXPIRY : 0);
}
pmk_op->length = cpu_to_le16(length);
ret = brcmf_fil_iovar_data_set(ifp, "pmkid_info", pmk_op, sizeof(*pmk_op));
kfree(pmk_op);
return ret;
}
static __used s32 static __used s32
brcmf_update_pmklist(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp) brcmf_update_pmklist(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp)
{ {
...@@ -4339,6 +4370,14 @@ brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev, ...@@ -4339,6 +4370,14 @@ brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev,
if (!check_vif_up(ifp->vif)) if (!check_vif_up(ifp->vif))
return -EIO; return -EIO;
brcmf_dbg(CONN, "set_pmksa - PMK bssid: %pM =\n", pmksa->bssid);
brcmf_dbg(CONN, "%*ph\n", WLAN_PMKID_LEN, pmksa->pmkid);
if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3))
return brcmf_pmksa_v3_op(ifp, pmksa, true);
/* TODO: implement PMKID_V2 */
npmk = le32_to_cpu(cfg->pmk_list.npmk); npmk = le32_to_cpu(cfg->pmk_list.npmk);
for (i = 0; i < npmk; i++) for (i = 0; i < npmk; i++)
if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN)) if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN))
...@@ -4355,9 +4394,6 @@ brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev, ...@@ -4355,9 +4394,6 @@ brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev,
return -EINVAL; return -EINVAL;
} }
brcmf_dbg(CONN, "set_pmksa - PMK bssid: %pM =\n", pmk[npmk].bssid);
brcmf_dbg(CONN, "%*ph\n", WLAN_PMKID_LEN, pmk[npmk].pmkid);
err = brcmf_update_pmklist(cfg, ifp); err = brcmf_update_pmklist(cfg, ifp);
brcmf_dbg(TRACE, "Exit\n"); brcmf_dbg(TRACE, "Exit\n");
...@@ -4381,6 +4417,11 @@ brcmf_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *ndev, ...@@ -4381,6 +4417,11 @@ brcmf_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *ndev,
brcmf_dbg(CONN, "del_pmksa - PMK bssid = %pM\n", pmksa->bssid); brcmf_dbg(CONN, "del_pmksa - PMK bssid = %pM\n", pmksa->bssid);
if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3))
return brcmf_pmksa_v3_op(ifp, pmksa, false);
/* TODO: implement PMKID_V2 */
npmk = le32_to_cpu(cfg->pmk_list.npmk); npmk = le32_to_cpu(cfg->pmk_list.npmk);
for (i = 0; i < npmk; i++) for (i = 0; i < npmk; i++)
if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN)) if (!memcmp(pmksa->bssid, pmk[i].bssid, ETH_ALEN))
...@@ -4417,6 +4458,11 @@ brcmf_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *ndev) ...@@ -4417,6 +4458,11 @@ brcmf_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *ndev)
if (!check_vif_up(ifp->vif)) if (!check_vif_up(ifp->vif))
return -EIO; return -EIO;
if (brcmf_feat_is_enabled(ifp, BRCMF_FEAT_PMKID_V3))
return brcmf_pmksa_v3_op(ifp, NULL, false);
/* TODO: implement PMKID_V2 */
memset(&cfg->pmk_list, 0, sizeof(cfg->pmk_list)); memset(&cfg->pmk_list, 0, sizeof(cfg->pmk_list));
err = brcmf_update_pmklist(cfg, ifp); err = brcmf_update_pmklist(cfg, ifp);
......
...@@ -174,6 +174,10 @@ ...@@ -174,6 +174,10 @@
#define BRCMF_HE_CAP_MCS_MAP_NSS_MAX 8 #define BRCMF_HE_CAP_MCS_MAP_NSS_MAX 8
#define BRCMF_PMKSA_VER_2 2
#define BRCMF_PMKSA_VER_3 3
#define BRCMF_PMKSA_NO_EXPIRY 0xffffffff
/* MAX_CHUNK_LEN is the maximum length for data passing to firmware in each /* MAX_CHUNK_LEN is the maximum length for data passing to firmware in each
* ioctl. It is relatively small because firmware has small maximum size input * ioctl. It is relatively small because firmware has small maximum size input
* playload restriction for ioctls. * playload restriction for ioctls.
...@@ -355,6 +359,12 @@ struct brcmf_ssid_le { ...@@ -355,6 +359,12 @@ struct brcmf_ssid_le {
unsigned char SSID[IEEE80211_MAX_SSID_LEN]; unsigned char SSID[IEEE80211_MAX_SSID_LEN];
}; };
/* Alternate SSID structure used in some places... */
struct brcmf_ssid8_le {
u8 SSID_len;
unsigned char SSID[IEEE80211_MAX_SSID_LEN];
};
struct brcmf_scan_params_le { struct brcmf_scan_params_le {
struct brcmf_ssid_le ssid_le; /* default: {0, ""} */ struct brcmf_ssid_le ssid_le; /* default: {0, ""} */
u8 bssid[ETH_ALEN]; /* default: bcast */ u8 bssid[ETH_ALEN]; /* default: bcast */
...@@ -875,6 +885,51 @@ struct brcmf_pmksa { ...@@ -875,6 +885,51 @@ struct brcmf_pmksa {
u8 pmkid[WLAN_PMKID_LEN]; u8 pmkid[WLAN_PMKID_LEN];
}; };
/**
* struct brcmf_pmksa_v2 - PMK Security Association
*
* @length: Length of the structure.
* @bssid: The AP's BSSID.
* @pmkid: The PMK ID.
* @pmk: PMK material for FILS key derivation.
* @pmk_len: Length of PMK data.
* @ssid: The AP's SSID.
* @fils_cache_id: FILS cache identifier
*/
struct brcmf_pmksa_v2 {
__le16 length;
u8 bssid[ETH_ALEN];
u8 pmkid[WLAN_PMKID_LEN];
u8 pmk[WLAN_PMK_LEN_SUITE_B_192];
__le16 pmk_len;
struct brcmf_ssid8_le ssid;
u16 fils_cache_id;
};
/**
* struct brcmf_pmksa_v3 - PMK Security Association
*
* @bssid: The AP's BSSID.
* @pmkid: The PMK ID.
* @pmkid_len: The length of the PMK ID.
* @pmk: PMK material for FILS key derivation.
* @pmk_len: Length of PMK data.
* @fils_cache_id: FILS cache identifier
* @ssid: The AP's SSID.
* @time_left: Remaining time until expiry. 0 = expired, ~0 = no expiry.
*/
struct brcmf_pmksa_v3 {
u8 bssid[ETH_ALEN];
u8 pmkid[WLAN_PMKID_LEN];
u8 pmkid_len;
u8 pmk[WLAN_PMK_LEN_SUITE_B_192];
u8 pmk_len;
__le16 fils_cache_id;
u8 pad;
struct brcmf_ssid8_le ssid;
__le32 time_left;
};
/** /**
* struct brcmf_pmk_list_le - List of pmksa's. * struct brcmf_pmk_list_le - List of pmksa's.
* *
...@@ -886,6 +941,34 @@ struct brcmf_pmk_list_le { ...@@ -886,6 +941,34 @@ struct brcmf_pmk_list_le {
struct brcmf_pmksa pmk[BRCMF_MAXPMKID]; struct brcmf_pmksa pmk[BRCMF_MAXPMKID];
}; };
/**
* struct brcmf_pmk_list_v2_le - List of pmksa's.
*
* @version: Request version.
* @length: Length of this structure.
* @pmk: PMK SA information.
*/
struct brcmf_pmk_list_v2_le {
__le16 version;
__le16 length;
struct brcmf_pmksa_v2 pmk[BRCMF_MAXPMKID];
};
/**
* struct brcmf_pmk_op_v3_le - Operation on PMKSA list.
*
* @version: Request version.
* @length: Length of this structure.
* @pmk: PMK SA information.
*/
struct brcmf_pmk_op_v3_le {
__le16 version;
__le16 length;
__le16 count;
__le16 pad;
struct brcmf_pmksa_v3 pmk[BRCMF_MAXPMKID];
};
/** /**
* struct brcmf_pno_param_le - PNO scan configuration parameters * struct brcmf_pno_param_le - PNO scan configuration parameters
* *
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment