0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/*
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlson * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Use is subject to license terms.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/*
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Copyright (c) 2001 Atsushi Onoe
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Copyright (c) 2002-2005 Sam Leffler, Errno Consulting
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * All rights reserved.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc *
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Redistribution and use in source and binary forms, with or without
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * modification, are permitted provided that the following conditions
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * are met:
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * 1. Redistributions of source code must retain the above copyright
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * notice, this list of conditions and the following disclaimer.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * 2. Redistributions in binary form must reproduce the above copyright
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * notice, this list of conditions and the following disclaimer in the
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * documentation and/or other materials provided with the distribution.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * 3. The name of the author may not be used to endorse or promote products
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * derived from this software without specific prior written permission.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc *
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Alternatively, this software may be distributed under the terms of the
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * GNU General Public License ("GPL") version 2 as published by the Free
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Software Foundation.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc *
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#ifndef _SYS_NET80211_CRYPTO_H
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define _SYS_NET80211_CRYPTO_H
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#include <sys/types.h>
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlson#ifdef _KERNEL
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlson#include <sys/stream.h>
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#include <sys/mac.h>
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlson#endif
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#include <sys/net80211_proto.h>
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/*
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * 802.11 protocol crypto-related definitions.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#ifdef __cplusplus
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxcextern "C" {
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#endif
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_MAX_WPA_IE 40 /* IEEE802.11i */
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf/*
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf * Max size of optional information elements. We artificially
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf * constrain this; it's limited only by the max frame size (and
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf * the max parameter size of the wireless extensions).
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf */
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_MAX_OPT_IE 256
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_MLME_ASSOC 1 /* associate station */
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_MLME_DISASSOC 2 /* disassociate station */
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_MLME_DEAUTH 3 /* deauthenticate station */
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_MLME_AUTHORIZE 4 /* authorize station */
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_MLME_UNAUTHORIZE 5 /* unauthorize station */
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/*
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * NB: these values are ordered carefully; there are lots of
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * of implications in any reordering.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_CIPHER_WEP 0
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_CIPHER_TKIP 1
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_CIPHER_AES_OCB 2
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_CIPHER_AES_CCM 3
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_CIPHER_CKIP 4
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_CIPHER_NONE 5 /* pseudo value */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_CIPHER_MAX (IEEE80211_CIPHER_NONE+1)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/*
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Maxmium length of key in bytes
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * WEP key length present in the 802.11 standard is 40-bit.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Many implementations also support 104-bit WEP keys.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * 802.11i standardize TKIP/CCMP use 128-bit key
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEYBUF_SIZE 16
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_MICBUF_SIZE (8+8) /* space for both tx+rx keys */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/* Key Flags */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEY_XMIT 0x01 /* key used for xmit */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEY_RECV 0x02 /* key used for recv */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEY_GROUP /* key used for WPA group operation */ \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc 0x04
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEY_SWCRYPT 0x10 /* host-based encrypt/decrypt */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEY_SWMIC 0x20 /* host-based enmic/demic */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEY_COMMON /* common flags passed in by apps */ \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (IEEE80211_KEY_XMIT | IEEE80211_KEY_RECV | IEEE80211_KEY_GROUP)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_KEY_DEFAULT 0x80 /* default xmit key */
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/* WEP */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_WEP_KEYLEN 5 /* 40bit */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_WEP_IVLEN 3 /* 24bit */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_WEP_KIDLEN 1 /* 1 octet */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_WEP_CRCLEN 4 /* CRC-32 */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_WEP_NKID 4 /* number of key ids */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
a399b7655a1d835aa8606c2b29e4e777baac8635zf/*
a399b7655a1d835aa8606c2b29e4e777baac8635zf * 802.11i defines an extended IV for use with non-WEP ciphers.
a399b7655a1d835aa8606c2b29e4e777baac8635zf * When the EXTIV bit is set in the key id byte an additional
a399b7655a1d835aa8606c2b29e4e777baac8635zf * 4 bytes immediately follow the IV for TKIP. For CCMP the
a399b7655a1d835aa8606c2b29e4e777baac8635zf * EXTIV bit is likewise set but the 8 bytes represent the
a399b7655a1d835aa8606c2b29e4e777baac8635zf * CCMP header rather than IV+extended-IV.
a399b7655a1d835aa8606c2b29e4e777baac8635zf */
a399b7655a1d835aa8606c2b29e4e777baac8635zf#define IEEE80211_WEP_EXTIV 0x20
a399b7655a1d835aa8606c2b29e4e777baac8635zf#define IEEE80211_WEP_EXTIVLEN 4 /* extended IV length */
a399b7655a1d835aa8606c2b29e4e777baac8635zf#define IEEE80211_WEP_MICLEN 8 /* trailing MIC */
a399b7655a1d835aa8606c2b29e4e777baac8635zf
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_WEP_HDRLEN \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (IEEE80211_WEP_IVLEN + IEEE80211_WEP_KIDLEN)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_WEP_MINLEN \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (sizeof (struct ieee80211_frame) + \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc IEEE80211_WEP_HDRLEN + IEEE80211_WEP_CRCLEN)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/* Maximum number of keys */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEY_MAX IEEE80211_WEP_NKID
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxctypedef uint16_t ieee80211_keyix; /* h/w key index */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEYIX_NONE ((ieee80211_keyix) -1)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlson#ifdef _KERNEL
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlson
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlsonstruct ieee80211com;
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlsonstruct ieee80211_key;
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlson
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/*
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Template for a supported cipher. Ciphers register with the
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * crypto code.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc *
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_attach - Initialize cipher. The return value is set to wk_private
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_detach - Destruct a cipher.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_setkey - Validate key contents
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_encap - Encrypt the 802.11 MAC payload
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_decap - Decrypt the 802.11 MAC payload
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_enmic - Add MIC
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_demic - Check and remove MIC
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxcstruct ieee80211_cipher {
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc const char *ic_name; /* printable name */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint32_t ic_cipher; /* IEEE80211_CIPHER_* */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint32_t ic_header; /* size of privacy header (bytes) */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint32_t ic_trailer; /* size of privacy trailer (bytes) */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint32_t ic_miclen; /* size of mic trailer (bytes) */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc void *(*ic_attach)(struct ieee80211com *,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc struct ieee80211_key *);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc void (*ic_detach)(struct ieee80211_key *);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc int32_t (*ic_setkey)(struct ieee80211_key *);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc int32_t (*ic_encap)(struct ieee80211_key *, mblk_t *,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint8_t keyid);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc int32_t (*ic_decap)(struct ieee80211_key *, mblk_t *, int);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc int32_t (*ic_enmic)(struct ieee80211_key *, mblk_t *, int);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc int32_t (*ic_demic)(struct ieee80211_key *, mblk_t *, int);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc};
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxcextern const struct ieee80211_cipher ieee80211_cipher_none;
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxcstruct ieee80211_key {
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint8_t wk_keylen; /* key length in bytes */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint8_t wk_pad;
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint16_t wk_flags;
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint8_t wk_key[IEEE80211_KEYBUF_SIZE+IEEE80211_MICBUF_SIZE];
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc ieee80211_keyix wk_keyix; /* h/w key index */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc ieee80211_keyix wk_rxkeyix; /* optional h/w rx key index */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint64_t wk_keyrsc; /* key receive sequence counter */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint64_t wk_keytsc; /* key transmit sequence counter */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc const struct ieee80211_cipher *wk_cipher;
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc void *wk_private; /* private cipher state */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc};
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define wk_txmic wk_key+IEEE80211_KEYBUF_SIZE+0
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define wk_rxmic wk_key+IEEE80211_KEYBUF_SIZE+8
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/*
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Crypto state kept in each ieee80211com.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxcstruct ieee80211_crypto_state {
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc struct ieee80211_key cs_nw_keys[IEEE80211_KEY_MAX];
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc ieee80211_keyix cs_def_txkey; /* default/group tx key index */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint16_t cs_max_keyix; /* max h/w key index */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc int (*cs_key_alloc)(struct ieee80211com *,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc const struct ieee80211_key *,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc ieee80211_keyix *, ieee80211_keyix *);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc int (*cs_key_delete)(struct ieee80211com *,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc const struct ieee80211_key *);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc int (*cs_key_set)(struct ieee80211com *,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc const struct ieee80211_key *,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc const uint8_t mac[IEEE80211_ADDR_LEN]);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc void (*cs_key_update_begin)(struct ieee80211com *);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc void (*cs_key_update_end)(struct ieee80211com *);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc};
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/*
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Key update synchronization methods.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define KEY_UPDATE_BEGIN(ic) \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (ic)->ic_crypto.cs_key_update_begin(ic)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define KEY_UPDATE_END(ic) \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (ic)->ic_crypto.cs_key_update_end(ic)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define KEY_UNDEFINED(k) \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc ((k).wk_cipher == &ieee80211_cipher_none)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define DEV_KEY_ALLOC(ic, k, kix, rkix) \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (ic)->ic_crypto.cs_key_alloc(ic, k, kix, rkix)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define DEV_KEY_DELETE(ic, k) \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (ic)->ic_crypto.cs_key_delete(ic, k)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define DEV_KEY_SET(ic, k, m) \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (ic)->ic_crypto.cs_key_set(ic, k, m)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define CIPHER_DETACH(k) \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (k)->wk_cipher->ic_detach(k)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define CIPHER_ATTACH(k) \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (k)->wk_cipher->ic_attach(k)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define ieee80211_crypto_demic(ic, k, m, force) \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (((k)->wk_cipher->ic_miclen > 0) ? \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (k)->wk_cipher->ic_demic(k, m, force) : \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc 1)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define ieee80211_crypto_enmic(ic, k, m, force) \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc ((k)->wk_cipher->ic_miclen > 0 ? \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (k)->wk_cipher->ic_enmic(k, m, force) : \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc 1)
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxcvoid ieee80211_crypto_attach(struct ieee80211com *ic);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxcvoid ieee80211_crypto_detach(struct ieee80211com *ic);
239e91abc172c1397b1e94869c5d0e8ab67bfc22hxvoid ieee80211_crypto_register(struct ieee80211com *ic,
239e91abc172c1397b1e94869c5d0e8ab67bfc22hx const struct ieee80211_cipher *);
239e91abc172c1397b1e94869c5d0e8ab67bfc22hxvoid ieee80211_crypto_unregister(struct ieee80211com *ic,
239e91abc172c1397b1e94869c5d0e8ab67bfc22hx const struct ieee80211_cipher *);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxcvoid ieee80211_crypto_resetkey(struct ieee80211com *, struct ieee80211_key *,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc ieee80211_keyix);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlson#endif /* _KERNEL */
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlson
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#ifdef __cplusplus
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc}
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#endif
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#endif /* _SYS_NET80211_CRYPTO_H */