Blame SOURCES/macsec-0016-mka-Add-enable_encrypt-op-and-call-it-from-CP-state-.patch

9c84ec
From 1d3d0666a6ed345da39886426c4416a4debfd094 Mon Sep 17 00:00:00 2001
9c84ec
Message-Id: <1d3d0666a6ed345da39886426c4416a4debfd094.1488376602.git.dcaratti@redhat.com>
9c84ec
From: Sabrina Dubroca <sd@queasysnail.net>
9c84ec
Date: Wed, 2 Nov 2016 16:38:38 +0100
9c84ec
Subject: [PATCH] mka: Add enable_encrypt op and call it from CP state machine
9c84ec
9c84ec
This allows MKA to turn encryption on/off down to the driver.
9c84ec
9c84ec
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
9c84ec
---
9c84ec
 src/drivers/driver.h          |  9 +++++++++
9c84ec
 src/pae/ieee802_1x_cp.c       |  4 ++++
9c84ec
 src/pae/ieee802_1x_kay.h      |  1 +
9c84ec
 src/pae/ieee802_1x_secy_ops.c | 20 ++++++++++++++++++++
9c84ec
 src/pae/ieee802_1x_secy_ops.h |  1 +
9c84ec
 wpa_supplicant/driver_i.h     |  8 ++++++++
9c84ec
 wpa_supplicant/wpas_kay.c     |  7 +++++++
9c84ec
 7 files changed, 50 insertions(+)
9c84ec
9c84ec
diff --git a/src/drivers/driver.h b/src/drivers/driver.h
9c84ec
index 9a6db90..0cb68ba 100644
9c84ec
--- a/src/drivers/driver.h
9c84ec
+++ b/src/drivers/driver.h
9c84ec
@@ -3339,6 +3339,15 @@ struct wpa_driver_ops {
9c84ec
 	int (*enable_protect_frames)(void *priv, Boolean enabled);
9c84ec
 
9c84ec
 	/**
9c84ec
+	 * enable_encrypt - Set encryption status
9c84ec
+	 * @priv: Private driver interface data
9c84ec
+	 * @enabled: TRUE = encrypt outgoing traffic
9c84ec
+	 *           FALSE = integrity-only protection on outgoing traffic
9c84ec
+	 * Returns: 0 on success, -1 on failure (or if not supported)
9c84ec
+	 */
9c84ec
+	int (*enable_encrypt)(void *priv, Boolean enabled);
9c84ec
+
9c84ec
+	/**
9c84ec
 	 * set_replay_protect - Set replay protect status and window size
9c84ec
 	 * @priv: Private driver interface data
9c84ec
 	 * @enabled: TRUE = replay protect enabled
9c84ec
diff --git a/src/pae/ieee802_1x_cp.c b/src/pae/ieee802_1x_cp.c
9c84ec
index e294e64..360fcd3 100644
9c84ec
--- a/src/pae/ieee802_1x_cp.c
9c84ec
+++ b/src/pae/ieee802_1x_cp.c
9c84ec
@@ -159,6 +159,7 @@ SM_STATE(CP, ALLOWED)
9c84ec
 
9c84ec
 	secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
9c84ec
 	secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
9c84ec
+	secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
9c84ec
 	secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
9c84ec
 	secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
9c84ec
 }
9c84ec
@@ -177,6 +178,7 @@ SM_STATE(CP, AUTHENTICATED)
9c84ec
 
9c84ec
 	secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
9c84ec
 	secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
9c84ec
+	secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
9c84ec
 	secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
9c84ec
 	secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
9c84ec
 }
9c84ec
@@ -203,6 +205,7 @@ SM_STATE(CP, SECURED)
9c84ec
 	secy_cp_control_confidentiality_offset(sm->kay,
9c84ec
 					       sm->confidentiality_offset);
9c84ec
 	secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
9c84ec
+	secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
9c84ec
 	secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
9c84ec
 	secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
9c84ec
 }
9c84ec
@@ -466,6 +469,7 @@ struct ieee802_1x_cp_sm * ieee802_1x_cp_sm_init(struct ieee802_1x_kay *kay)
9c84ec
 	wpa_printf(MSG_DEBUG, "CP: state machine created");
9c84ec
 
9c84ec
 	secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
9c84ec
+	secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
9c84ec
 	secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
9c84ec
 	secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
9c84ec
 	secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
9c84ec
diff --git a/src/pae/ieee802_1x_kay.h b/src/pae/ieee802_1x_kay.h
9c84ec
index 618e45b..fb49f62 100644
9c84ec
--- a/src/pae/ieee802_1x_kay.h
9c84ec
+++ b/src/pae/ieee802_1x_kay.h
9c84ec
@@ -142,6 +142,7 @@ struct ieee802_1x_kay_ctx {
9c84ec
 	int (*macsec_deinit)(void *ctx);
9c84ec
 	int (*macsec_get_capability)(void *priv, enum macsec_cap *cap);
9c84ec
 	int (*enable_protect_frames)(void *ctx, Boolean enabled);
9c84ec
+	int (*enable_encrypt)(void *ctx, Boolean enabled);
9c84ec
 	int (*set_replay_protect)(void *ctx, Boolean enabled, u32 window);
9c84ec
 	int (*set_current_cipher_suite)(void *ctx, u64 cs);
9c84ec
 	int (*enable_controlled_port)(void *ctx, Boolean enabled);
9c84ec
diff --git a/src/pae/ieee802_1x_secy_ops.c b/src/pae/ieee802_1x_secy_ops.c
9c84ec
index b1a9d22..ab5339b 100644
9c84ec
--- a/src/pae/ieee802_1x_secy_ops.c
9c84ec
+++ b/src/pae/ieee802_1x_secy_ops.c
9c84ec
@@ -45,6 +45,26 @@ int secy_cp_control_protect_frames(struct ieee802_1x_kay *kay, Boolean enabled)
9c84ec
 }
9c84ec
 
9c84ec
 
9c84ec
+int secy_cp_control_encrypt(struct ieee802_1x_kay *kay, Boolean enabled)
9c84ec
+{
9c84ec
+	struct ieee802_1x_kay_ctx *ops;
9c84ec
+
9c84ec
+	if (!kay) {
9c84ec
+		wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
9c84ec
+		return -1;
9c84ec
+	}
9c84ec
+
9c84ec
+	ops = kay->ctx;
9c84ec
+	if (!ops || !ops->enable_encrypt) {
9c84ec
+		wpa_printf(MSG_ERROR,
9c84ec
+			   "KaY: secy enable_encrypt operation not supported");
9c84ec
+		return -1;
9c84ec
+	}
9c84ec
+
9c84ec
+	return ops->enable_encrypt(ops->ctx, enabled);
9c84ec
+}
9c84ec
+
9c84ec
+
9c84ec
 int secy_cp_control_replay(struct ieee802_1x_kay *kay, Boolean enabled, u32 win)
9c84ec
 {
9c84ec
 	struct ieee802_1x_kay_ctx *ops;
9c84ec
diff --git a/src/pae/ieee802_1x_secy_ops.h b/src/pae/ieee802_1x_secy_ops.h
9c84ec
index 477120b..9fb29c3 100644
9c84ec
--- a/src/pae/ieee802_1x_secy_ops.h
9c84ec
+++ b/src/pae/ieee802_1x_secy_ops.h
9c84ec
@@ -21,6 +21,7 @@ int secy_deinit_macsec(struct ieee802_1x_kay *kay);
9c84ec
 int secy_cp_control_validate_frames(struct ieee802_1x_kay *kay,
9c84ec
 				    enum validate_frames vf);
9c84ec
 int secy_cp_control_protect_frames(struct ieee802_1x_kay *kay, Boolean flag);
9c84ec
+int secy_cp_control_encrypt(struct ieee802_1x_kay *kay, Boolean enabled);
9c84ec
 int secy_cp_control_replay(struct ieee802_1x_kay *kay, Boolean flag, u32 win);
9c84ec
 int secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, u64 cs);
9c84ec
 int secy_cp_control_confidentiality_offset(struct ieee802_1x_kay *kay,
9c84ec
diff --git a/wpa_supplicant/driver_i.h b/wpa_supplicant/driver_i.h
9c84ec
index c9bb20d..cf08556 100644
9c84ec
--- a/wpa_supplicant/driver_i.h
9c84ec
+++ b/wpa_supplicant/driver_i.h
9c84ec
@@ -731,6 +731,14 @@ static inline int wpa_drv_enable_protect_frames(struct wpa_supplicant *wpa_s,
9c84ec
 	return wpa_s->driver->enable_protect_frames(wpa_s->drv_priv, enabled);
9c84ec
 }
9c84ec
 
9c84ec
+static inline int wpa_drv_enable_encrypt(struct wpa_supplicant *wpa_s,
9c84ec
+						Boolean enabled)
9c84ec
+{
9c84ec
+	if (!wpa_s->driver->enable_encrypt)
9c84ec
+		return -1;
9c84ec
+	return wpa_s->driver->enable_encrypt(wpa_s->drv_priv, enabled);
9c84ec
+}
9c84ec
+
9c84ec
 static inline int wpa_drv_set_replay_protect(struct wpa_supplicant *wpa_s,
9c84ec
 					     Boolean enabled, u32 window)
9c84ec
 {
9c84ec
diff --git a/wpa_supplicant/wpas_kay.c b/wpa_supplicant/wpas_kay.c
9c84ec
index 6343154..2ff4895 100644
9c84ec
--- a/wpa_supplicant/wpas_kay.c
9c84ec
+++ b/wpa_supplicant/wpas_kay.c
9c84ec
@@ -50,6 +50,12 @@ static int wpas_enable_protect_frames(void *wpa_s, Boolean enabled)
9c84ec
 }
9c84ec
 
9c84ec
 
9c84ec
+static int wpas_enable_encrypt(void *wpa_s, Boolean enabled)
9c84ec
+{
9c84ec
+	return wpa_drv_enable_encrypt(wpa_s, enabled);
9c84ec
+}
9c84ec
+
9c84ec
+
9c84ec
 static int wpas_set_replay_protect(void *wpa_s, Boolean enabled, u32 window)
9c84ec
 {
9c84ec
 	return wpa_drv_set_replay_protect(wpa_s, enabled, window);
9c84ec
@@ -206,6 +212,7 @@ int ieee802_1x_alloc_kay_sm(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
9c84ec
 	kay_ctx->macsec_deinit = wpas_macsec_deinit;
9c84ec
 	kay_ctx->macsec_get_capability = wpas_macsec_get_capability;
9c84ec
 	kay_ctx->enable_protect_frames = wpas_enable_protect_frames;
9c84ec
+	kay_ctx->enable_encrypt = wpas_enable_encrypt;
9c84ec
 	kay_ctx->set_replay_protect = wpas_set_replay_protect;
9c84ec
 	kay_ctx->set_current_cipher_suite = wpas_set_current_cipher_suite;
9c84ec
 	kay_ctx->enable_controlled_port = wpas_enable_controlled_port;
9c84ec
-- 
9c84ec
2.7.4
9c84ec