mirror of
https://github.com/AetherDroid/android_kernel_samsung_on5xelte.git
synced 2025-09-08 01:08:03 -04:00
Fixed MTP to work with TWRP
This commit is contained in:
commit
f6dfaef42e
50820 changed files with 20846062 additions and 0 deletions
150
net/mac80211/key.h
Normal file
150
net/mac80211/key.h
Normal file
|
@ -0,0 +1,150 @@
|
|||
/*
|
||||
* Copyright 2002-2004, Instant802 Networks, Inc.
|
||||
* Copyright 2005, Devicescape Software, Inc.
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*/
|
||||
|
||||
#ifndef IEEE80211_KEY_H
|
||||
#define IEEE80211_KEY_H
|
||||
|
||||
#include <linux/types.h>
|
||||
#include <linux/list.h>
|
||||
#include <linux/crypto.h>
|
||||
#include <linux/rcupdate.h>
|
||||
#include <net/mac80211.h>
|
||||
|
||||
#define NUM_DEFAULT_KEYS 4
|
||||
#define NUM_DEFAULT_MGMT_KEYS 2
|
||||
#define MAX_PN_LEN 16
|
||||
|
||||
struct ieee80211_local;
|
||||
struct ieee80211_sub_if_data;
|
||||
struct sta_info;
|
||||
|
||||
/**
|
||||
* enum ieee80211_internal_key_flags - internal key flags
|
||||
*
|
||||
* @KEY_FLAG_UPLOADED_TO_HARDWARE: Indicates that this key is present
|
||||
* in the hardware for TX crypto hardware acceleration.
|
||||
* @KEY_FLAG_TAINTED: Key is tainted and packets should be dropped.
|
||||
*/
|
||||
enum ieee80211_internal_key_flags {
|
||||
KEY_FLAG_UPLOADED_TO_HARDWARE = BIT(0),
|
||||
KEY_FLAG_TAINTED = BIT(1),
|
||||
};
|
||||
|
||||
enum ieee80211_internal_tkip_state {
|
||||
TKIP_STATE_NOT_INIT,
|
||||
TKIP_STATE_PHASE1_DONE,
|
||||
TKIP_STATE_PHASE1_HW_UPLOADED,
|
||||
};
|
||||
|
||||
struct tkip_ctx {
|
||||
u32 iv32; /* current iv32 */
|
||||
u16 iv16; /* current iv16 */
|
||||
u16 p1k[5]; /* p1k cache */
|
||||
u32 p1k_iv32; /* iv32 for which p1k computed */
|
||||
enum ieee80211_internal_tkip_state state;
|
||||
};
|
||||
|
||||
struct ieee80211_key {
|
||||
struct ieee80211_local *local;
|
||||
struct ieee80211_sub_if_data *sdata;
|
||||
struct sta_info *sta;
|
||||
|
||||
/* for sdata list */
|
||||
struct list_head list;
|
||||
|
||||
/* protected by key mutex */
|
||||
unsigned int flags;
|
||||
|
||||
union {
|
||||
struct {
|
||||
/* protects tx context */
|
||||
spinlock_t txlock;
|
||||
|
||||
/* last used TSC */
|
||||
struct tkip_ctx tx;
|
||||
|
||||
/* last received RSC */
|
||||
struct tkip_ctx rx[IEEE80211_NUM_TIDS];
|
||||
|
||||
/* number of mic failures */
|
||||
u32 mic_failures;
|
||||
} tkip;
|
||||
struct {
|
||||
atomic64_t tx_pn;
|
||||
/*
|
||||
* Last received packet number. The first
|
||||
* IEEE80211_NUM_TIDS counters are used with Data
|
||||
* frames and the last counter is used with Robust
|
||||
* Management frames.
|
||||
*/
|
||||
u8 rx_pn[IEEE80211_NUM_TIDS + 1][IEEE80211_CCMP_PN_LEN];
|
||||
struct crypto_aead *tfm;
|
||||
u32 replays; /* dot11RSNAStatsCCMPReplays */
|
||||
} ccmp;
|
||||
struct {
|
||||
atomic64_t tx_pn;
|
||||
u8 rx_pn[IEEE80211_CMAC_PN_LEN];
|
||||
struct crypto_cipher *tfm;
|
||||
u32 replays; /* dot11RSNAStatsCMACReplays */
|
||||
u32 icverrors; /* dot11RSNAStatsCMACICVErrors */
|
||||
} aes_cmac;
|
||||
struct {
|
||||
/* generic cipher scheme */
|
||||
u8 rx_pn[IEEE80211_NUM_TIDS + 1][MAX_PN_LEN];
|
||||
} gen;
|
||||
} u;
|
||||
|
||||
/* number of times this key has been used */
|
||||
int tx_rx_count;
|
||||
|
||||
#ifdef CONFIG_MAC80211_DEBUGFS
|
||||
struct {
|
||||
struct dentry *stalink;
|
||||
struct dentry *dir;
|
||||
int cnt;
|
||||
} debugfs;
|
||||
#endif
|
||||
|
||||
/*
|
||||
* key config, must be last because it contains key
|
||||
* material as variable length member
|
||||
*/
|
||||
struct ieee80211_key_conf conf;
|
||||
};
|
||||
|
||||
struct ieee80211_key *
|
||||
ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
|
||||
const u8 *key_data,
|
||||
size_t seq_len, const u8 *seq,
|
||||
const struct ieee80211_cipher_scheme *cs);
|
||||
/*
|
||||
* Insert a key into data structures (sdata, sta if necessary)
|
||||
* to make it used, free old key. On failure, also free the new key.
|
||||
*/
|
||||
int ieee80211_key_link(struct ieee80211_key *key,
|
||||
struct ieee80211_sub_if_data *sdata,
|
||||
struct sta_info *sta);
|
||||
void ieee80211_key_free(struct ieee80211_key *key, bool delay_tailroom);
|
||||
void ieee80211_key_free_unused(struct ieee80211_key *key);
|
||||
void ieee80211_set_default_key(struct ieee80211_sub_if_data *sdata, int idx,
|
||||
bool uni, bool multi);
|
||||
void ieee80211_set_default_mgmt_key(struct ieee80211_sub_if_data *sdata,
|
||||
int idx);
|
||||
void ieee80211_free_keys(struct ieee80211_sub_if_data *sdata,
|
||||
bool force_synchronize);
|
||||
void ieee80211_free_sta_keys(struct ieee80211_local *local,
|
||||
struct sta_info *sta);
|
||||
void ieee80211_enable_keys(struct ieee80211_sub_if_data *sdata);
|
||||
|
||||
#define key_mtx_dereference(local, ref) \
|
||||
rcu_dereference_protected(ref, lockdep_is_held(&((local)->key_mtx)))
|
||||
|
||||
void ieee80211_delayed_tailroom_dec(struct work_struct *wk);
|
||||
|
||||
#endif /* IEEE80211_KEY_H */
|
Loading…
Add table
Add a link
Reference in a new issue