blob: e127b6f7fc9f4f7253dd28c2b3ead46396c88bd8 [file] [log] [blame]
Thomas Gleixner21042e42019-06-04 10:11:34 +02001// SPDX-License-Identifier: GPL-2.0-only
Jeff Garzikb4538722005-05-12 22:48:20 -04002/*
John W. Linville274bfb82008-10-29 11:35:05 -04003 * lib80211 crypt: host-based WEP encryption implementation for lib80211
Jeff Garzikb4538722005-05-12 22:48:20 -04004 *
Jouni Malinen85d32e72007-03-24 17:15:30 -07005 * Copyright (c) 2002-2004, Jouni Malinen <j@w1.fi>
John W. Linville274bfb82008-10-29 11:35:05 -04006 * Copyright (c) 2008, John W. Linville <linville@tuxdriver.com>
Jeff Garzikb4538722005-05-12 22:48:20 -04007 */
8
Herbert Xuf12cc202006-08-22 20:36:13 +10009#include <linux/err.h>
Jeff Garzikb4538722005-05-12 22:48:20 -040010#include <linux/module.h>
11#include <linux/init.h>
12#include <linux/slab.h>
13#include <linux/random.h>
Ralf Baechle11763602007-10-23 20:42:11 +020014#include <linux/scatterlist.h>
Jeff Garzikb4538722005-05-12 22:48:20 -040015#include <linux/skbuff.h>
Al Virod7fe0f22006-12-03 23:15:30 -050016#include <linux/mm.h>
Jeff Garzikb4538722005-05-12 22:48:20 -040017#include <asm/string.h>
18
John W. Linville274bfb82008-10-29 11:35:05 -040019#include <net/lib80211.h>
Jeff Garzikb4538722005-05-12 22:48:20 -040020
Johannes Bergb802a5d2018-10-01 09:16:08 +020021#include <linux/crypto.h>
Jeff Garzikb4538722005-05-12 22:48:20 -040022#include <linux/crc32.h>
23
24MODULE_AUTHOR("Jouni Malinen");
John W. Linville274bfb82008-10-29 11:35:05 -040025MODULE_DESCRIPTION("lib80211 crypt: WEP");
Jeff Garzikb4538722005-05-12 22:48:20 -040026MODULE_LICENSE("GPL");
27
John W. Linville274bfb82008-10-29 11:35:05 -040028struct lib80211_wep_data {
Jeff Garzikb4538722005-05-12 22:48:20 -040029 u32 iv;
30#define WEP_KEY_LEN 13
31 u8 key[WEP_KEY_LEN + 1];
32 u8 key_len;
33 u8 key_idx;
Johannes Bergb802a5d2018-10-01 09:16:08 +020034 struct crypto_cipher *tx_tfm;
35 struct crypto_cipher *rx_tfm;
Jeff Garzikb4538722005-05-12 22:48:20 -040036};
37
John W. Linville274bfb82008-10-29 11:35:05 -040038static void *lib80211_wep_init(int keyidx)
Jeff Garzikb4538722005-05-12 22:48:20 -040039{
John W. Linville274bfb82008-10-29 11:35:05 -040040 struct lib80211_wep_data *priv;
Jeff Garzikb4538722005-05-12 22:48:20 -040041
Panagiotis Issaris0da974f2006-07-21 14:51:30 -070042 priv = kzalloc(sizeof(*priv), GFP_ATOMIC);
Jeff Garzikb4538722005-05-12 22:48:20 -040043 if (priv == NULL)
44 goto fail;
Jeff Garzikb4538722005-05-12 22:48:20 -040045 priv->key_idx = keyidx;
46
Eric Biggers1ad0f162018-11-14 12:19:39 -080047 priv->tx_tfm = crypto_alloc_cipher("arc4", 0, 0);
Jeff Garzik28eb1772006-09-22 20:10:23 -040048 if (IS_ERR(priv->tx_tfm)) {
Jeff Garzik18379872006-09-22 21:19:05 -040049 priv->tx_tfm = NULL;
Jeff Garzikb4538722005-05-12 22:48:20 -040050 goto fail;
51 }
52
Eric Biggers1ad0f162018-11-14 12:19:39 -080053 priv->rx_tfm = crypto_alloc_cipher("arc4", 0, 0);
Jeff Garzik28eb1772006-09-22 20:10:23 -040054 if (IS_ERR(priv->rx_tfm)) {
Jeff Garzik18379872006-09-22 21:19:05 -040055 priv->rx_tfm = NULL;
Zhu Yi5a656942006-08-21 11:33:56 +080056 goto fail;
57 }
Jeff Garzikb4538722005-05-12 22:48:20 -040058 /* start WEP IV from a random value */
59 get_random_bytes(&priv->iv, 4);
60
61 return priv;
62
Jeff Garzik0edd5b42005-09-07 00:48:31 -040063 fail:
Jeff Garzikb4538722005-05-12 22:48:20 -040064 if (priv) {
Johannes Bergb802a5d2018-10-01 09:16:08 +020065 crypto_free_cipher(priv->tx_tfm);
66 crypto_free_cipher(priv->rx_tfm);
Jeff Garzikb4538722005-05-12 22:48:20 -040067 kfree(priv);
68 }
69 return NULL;
70}
71
John W. Linville274bfb82008-10-29 11:35:05 -040072static void lib80211_wep_deinit(void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -040073{
John W. Linville274bfb82008-10-29 11:35:05 -040074 struct lib80211_wep_data *_priv = priv;
Zhu Yi5a656942006-08-21 11:33:56 +080075 if (_priv) {
Johannes Bergb802a5d2018-10-01 09:16:08 +020076 crypto_free_cipher(_priv->tx_tfm);
77 crypto_free_cipher(_priv->rx_tfm);
Zhu Yi5a656942006-08-21 11:33:56 +080078 }
Jeff Garzikb4538722005-05-12 22:48:20 -040079 kfree(priv);
80}
81
Johannes Berga4bf26f2005-12-31 11:35:20 +010082/* Add WEP IV/key info to a frame that has at least 4 bytes of headroom */
John W. Linville274bfb82008-10-29 11:35:05 -040083static int lib80211_wep_build_iv(struct sk_buff *skb, int hdr_len,
Zhu Yi9184d932006-01-19 16:22:32 +080084 u8 *key, int keylen, void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -040085{
John W. Linville274bfb82008-10-29 11:35:05 -040086 struct lib80211_wep_data *wep = priv;
Rajkumar Manoharan6572e912011-04-25 15:56:16 +053087 u32 klen;
Johannes Berga4bf26f2005-12-31 11:35:20 +010088 u8 *pos;
YOSHIFUJI Hideaki64265652007-02-09 23:24:46 +090089
Johannes Berga4bf26f2005-12-31 11:35:20 +010090 if (skb_headroom(skb) < 4 || skb->len < hdr_len)
Jeff Garzikb4538722005-05-12 22:48:20 -040091 return -1;
92
Jeff Garzikb4538722005-05-12 22:48:20 -040093 pos = skb_push(skb, 4);
94 memmove(pos, pos + 4, hdr_len);
95 pos += hdr_len;
96
97 klen = 3 + wep->key_len;
98
99 wep->iv++;
100
101 /* Fluhrer, Mantin, and Shamir have reported weaknesses in the key
102 * scheduling algorithm of RC4. At least IVs (KeyByte + 3, 0xff, N)
103 * can be used to speedup attacks, so avoid using them. */
104 if ((wep->iv & 0xff00) == 0xff00) {
105 u8 B = (wep->iv >> 16) & 0xff;
106 if (B >= 3 && B < klen)
107 wep->iv += 0x0100;
108 }
109
110 /* Prepend 24-bit IV to RC4 key and TX frame */
Johannes Berga4bf26f2005-12-31 11:35:20 +0100111 *pos++ = (wep->iv >> 16) & 0xff;
112 *pos++ = (wep->iv >> 8) & 0xff;
113 *pos++ = wep->iv & 0xff;
Jeff Garzikb4538722005-05-12 22:48:20 -0400114 *pos++ = wep->key_idx << 6;
115
Johannes Berga4bf26f2005-12-31 11:35:20 +0100116 return 0;
117}
118
119/* Perform WEP encryption on given skb that has at least 4 bytes of headroom
120 * for IV and 4 bytes of tailroom for ICV. Both IV and ICV will be transmitted,
121 * so the payload length increases with 8 bytes.
122 *
123 * WEP frame payload: IV + TX key idx, RC4(data), ICV = RC4(CRC32(data))
124 */
John W. Linville274bfb82008-10-29 11:35:05 -0400125static int lib80211_wep_encrypt(struct sk_buff *skb, int hdr_len, void *priv)
Johannes Berga4bf26f2005-12-31 11:35:20 +0100126{
John W. Linville274bfb82008-10-29 11:35:05 -0400127 struct lib80211_wep_data *wep = priv;
Johannes Berga4bf26f2005-12-31 11:35:20 +0100128 u32 crc, klen, len;
129 u8 *pos, *icv;
Johannes Berga4bf26f2005-12-31 11:35:20 +0100130 u8 key[WEP_KEY_LEN + 3];
Johannes Bergb802a5d2018-10-01 09:16:08 +0200131 int i;
Johannes Berga4bf26f2005-12-31 11:35:20 +0100132
John W. Linville274bfb82008-10-29 11:35:05 -0400133 /* other checks are in lib80211_wep_build_iv */
Johannes Berga4bf26f2005-12-31 11:35:20 +0100134 if (skb_tailroom(skb) < 4)
135 return -1;
YOSHIFUJI Hideaki64265652007-02-09 23:24:46 +0900136
Johannes Berga4bf26f2005-12-31 11:35:20 +0100137 /* add the IV to the frame */
John W. Linville274bfb82008-10-29 11:35:05 -0400138 if (lib80211_wep_build_iv(skb, hdr_len, NULL, 0, priv))
Johannes Berga4bf26f2005-12-31 11:35:20 +0100139 return -1;
YOSHIFUJI Hideaki64265652007-02-09 23:24:46 +0900140
Johannes Berga4bf26f2005-12-31 11:35:20 +0100141 /* Copy the IV into the first 3 bytes of the key */
Arnaldo Carvalho de Melod626f622007-03-27 18:55:52 -0300142 skb_copy_from_linear_data_offset(skb, hdr_len, key, 3);
Johannes Berga4bf26f2005-12-31 11:35:20 +0100143
Jeff Garzikb4538722005-05-12 22:48:20 -0400144 /* Copy rest of the WEP key (the secret part) */
145 memcpy(key + 3, wep->key, wep->key_len);
YOSHIFUJI Hideaki64265652007-02-09 23:24:46 +0900146
Johannes Berga4bf26f2005-12-31 11:35:20 +0100147 len = skb->len - hdr_len - 4;
148 pos = skb->data + hdr_len + 4;
149 klen = 3 + wep->key_len;
Jeff Garzikb4538722005-05-12 22:48:20 -0400150
Johannes Berga4bf26f2005-12-31 11:35:20 +0100151 /* Append little-endian CRC32 over only the data and encrypt it to produce ICV */
Jeff Garzikb4538722005-05-12 22:48:20 -0400152 crc = ~crc32_le(~0, pos, len);
153 icv = skb_put(skb, 4);
154 icv[0] = crc;
155 icv[1] = crc >> 8;
156 icv[2] = crc >> 16;
157 icv[3] = crc >> 24;
158
Johannes Bergb802a5d2018-10-01 09:16:08 +0200159 crypto_cipher_setkey(wep->tx_tfm, key, klen);
160
161 for (i = 0; i < len + 4; i++)
162 crypto_cipher_encrypt_one(wep->tx_tfm, pos + i, pos + i);
163
164 return 0;
Jeff Garzikb4538722005-05-12 22:48:20 -0400165}
166
Jeff Garzikb4538722005-05-12 22:48:20 -0400167/* Perform WEP decryption on given buffer. Buffer includes whole WEP part of
168 * the frame: IV (4 bytes), encrypted payload (including SNAP header),
169 * ICV (4 bytes). len includes both IV and ICV.
170 *
171 * Returns 0 if frame was decrypted successfully and ICV was correct and -1 on
172 * failure. If frame is OK, IV and ICV will be removed.
173 */
John W. Linville274bfb82008-10-29 11:35:05 -0400174static int lib80211_wep_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -0400175{
John W. Linville274bfb82008-10-29 11:35:05 -0400176 struct lib80211_wep_data *wep = priv;
Jeff Garzikb4538722005-05-12 22:48:20 -0400177 u32 crc, klen, plen;
178 u8 key[WEP_KEY_LEN + 3];
179 u8 keyidx, *pos, icv[4];
Johannes Bergb802a5d2018-10-01 09:16:08 +0200180 int i;
Jeff Garzikb4538722005-05-12 22:48:20 -0400181
182 if (skb->len < hdr_len + 8)
183 return -1;
184
185 pos = skb->data + hdr_len;
186 key[0] = *pos++;
187 key[1] = *pos++;
188 key[2] = *pos++;
189 keyidx = *pos++ >> 6;
190 if (keyidx != wep->key_idx)
191 return -1;
192
193 klen = 3 + wep->key_len;
194
195 /* Copy rest of the WEP key (the secret part) */
196 memcpy(key + 3, wep->key, wep->key_len);
197
198 /* Apply RC4 to data and compute CRC32 over decrypted data */
199 plen = skb->len - hdr_len - 8;
200
Johannes Bergb802a5d2018-10-01 09:16:08 +0200201 crypto_cipher_setkey(wep->rx_tfm, key, klen);
202 for (i = 0; i < plen + 4; i++)
203 crypto_cipher_decrypt_one(wep->rx_tfm, pos + i, pos + i);
Jeff Garzikb4538722005-05-12 22:48:20 -0400204
205 crc = ~crc32_le(~0, pos, plen);
206 icv[0] = crc;
207 icv[1] = crc >> 8;
208 icv[2] = crc >> 16;
209 icv[3] = crc >> 24;
210 if (memcmp(icv, pos + plen, 4) != 0) {
211 /* ICV mismatch - drop frame */
212 return -2;
213 }
214
215 /* Remove IV and ICV */
216 memmove(skb->data + 4, skb->data, hdr_len);
217 skb_pull(skb, 4);
218 skb_trim(skb, skb->len - 4);
219
220 return 0;
221}
222
John W. Linville274bfb82008-10-29 11:35:05 -0400223static int lib80211_wep_set_key(void *key, int len, u8 * seq, void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -0400224{
John W. Linville274bfb82008-10-29 11:35:05 -0400225 struct lib80211_wep_data *wep = priv;
Jeff Garzikb4538722005-05-12 22:48:20 -0400226
227 if (len < 0 || len > WEP_KEY_LEN)
228 return -1;
229
230 memcpy(wep->key, key, len);
231 wep->key_len = len;
232
233 return 0;
234}
235
John W. Linville274bfb82008-10-29 11:35:05 -0400236static int lib80211_wep_get_key(void *key, int len, u8 * seq, void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -0400237{
John W. Linville274bfb82008-10-29 11:35:05 -0400238 struct lib80211_wep_data *wep = priv;
Jeff Garzikb4538722005-05-12 22:48:20 -0400239
240 if (len < wep->key_len)
241 return -1;
242
243 memcpy(key, wep->key, wep->key_len);
244
245 return wep->key_len;
246}
247
David Howells6bbefe82013-04-10 21:13:23 +0100248static void lib80211_wep_print_stats(struct seq_file *m, void *priv)
Jeff Garzikb4538722005-05-12 22:48:20 -0400249{
John W. Linville274bfb82008-10-29 11:35:05 -0400250 struct lib80211_wep_data *wep = priv;
David Howells6bbefe82013-04-10 21:13:23 +0100251 seq_printf(m, "key[%d] alg=WEP len=%d\n", wep->key_idx, wep->key_len);
Jeff Garzikb4538722005-05-12 22:48:20 -0400252}
253
John W. Linville274bfb82008-10-29 11:35:05 -0400254static struct lib80211_crypto_ops lib80211_crypt_wep = {
James Ketrenos74079fd2005-09-13 17:35:21 -0500255 .name = "WEP",
John W. Linville274bfb82008-10-29 11:35:05 -0400256 .init = lib80211_wep_init,
257 .deinit = lib80211_wep_deinit,
John W. Linville274bfb82008-10-29 11:35:05 -0400258 .encrypt_mpdu = lib80211_wep_encrypt,
259 .decrypt_mpdu = lib80211_wep_decrypt,
James Ketrenos74079fd2005-09-13 17:35:21 -0500260 .encrypt_msdu = NULL,
261 .decrypt_msdu = NULL,
John W. Linville274bfb82008-10-29 11:35:05 -0400262 .set_key = lib80211_wep_set_key,
263 .get_key = lib80211_wep_get_key,
264 .print_stats = lib80211_wep_print_stats,
James Ketrenos1264fc02005-09-21 11:54:53 -0500265 .extra_mpdu_prefix_len = 4, /* IV */
266 .extra_mpdu_postfix_len = 4, /* ICV */
James Ketrenos74079fd2005-09-13 17:35:21 -0500267 .owner = THIS_MODULE,
Jeff Garzikb4538722005-05-12 22:48:20 -0400268};
269
John W. Linville274bfb82008-10-29 11:35:05 -0400270static int __init lib80211_crypto_wep_init(void)
Jeff Garzikb4538722005-05-12 22:48:20 -0400271{
John W. Linville274bfb82008-10-29 11:35:05 -0400272 return lib80211_register_crypto_ops(&lib80211_crypt_wep);
Jeff Garzikb4538722005-05-12 22:48:20 -0400273}
274
John W. Linville274bfb82008-10-29 11:35:05 -0400275static void __exit lib80211_crypto_wep_exit(void)
Jeff Garzikb4538722005-05-12 22:48:20 -0400276{
John W. Linville274bfb82008-10-29 11:35:05 -0400277 lib80211_unregister_crypto_ops(&lib80211_crypt_wep);
Jeff Garzikb4538722005-05-12 22:48:20 -0400278}
279
John W. Linville274bfb82008-10-29 11:35:05 -0400280module_init(lib80211_crypto_wep_init);
281module_exit(lib80211_crypto_wep_exit);