19 Jun, 2019

1 commit

  • Based on 2 normalized pattern(s):

    this program is free software you can redistribute it and or modify
    it under the terms of the gnu general public license version 2 as
    published by the free software foundation

    this program is free software you can redistribute it and or modify
    it under the terms of the gnu general public license version 2 as
    published by the free software foundation #

    extracted by the scancode license scanner the SPDX license identifier

    GPL-2.0-only

    has been chosen to replace the boilerplate/reference in 4122 file(s).

    Signed-off-by: Thomas Gleixner
    Reviewed-by: Enrico Weigelt
    Reviewed-by: Kate Stewart
    Reviewed-by: Allison Randal
    Cc: linux-spdx@vger.kernel.org
    Link: https://lkml.kernel.org/r/20190604081206.933168790@linutronix.de
    Signed-off-by: Greg Kroah-Hartman

    Thomas Gleixner
     

08 Feb, 2017

1 commit

  • Instead of open coding the CMAC algorithm in the mac80211 driver using
    byte wide xors and calls into the crypto layer for each block of data,
    instantiate a cmac(aes) synchronous hash and pass all the data into it
    directly. This does not only simplify the code, it also allows the use
    of more efficient and more secure implementations, especially on
    platforms where SIMD ciphers have a considerable setup cost.

    Signed-off-by: Ard Biesheuvel
    Signed-off-by: Johannes Berg

    Ard Biesheuvel
     

27 Oct, 2016

1 commit


13 Aug, 2015

1 commit


27 Jan, 2015

1 commit

  • This allows mac80211 to configure BIP-CMAC-256 to the driver and also
    use software-implementation within mac80211 when the driver does not
    support this with hardware accelaration.

    Signed-off-by: Jouni Malinen
    Signed-off-by: Johannes Berg

    Jouni Malinen
     

18 Dec, 2013

1 commit


08 Nov, 2012

1 commit


24 Oct, 2012

1 commit

  • Expose a function for the AES-CMAC subkey calculation
    to drivers. This is the first step of the AES-CMAC
    cipher key setup and may be required for CMAC hardware
    offloading.

    Signed-off-by: Assaf Krauss
    Reviewed-by: Emmanuel Grumbach
    Signed-off-by: Johannes Berg

    Assaf Krauss
     

20 Aug, 2012

1 commit


08 Jul, 2011

2 commits

  • mac80211 has a defnition of AES_BLOCK_SIZE and
    multiple definitions of AES_BLOCK_LEN. Remove
    them all and use crypto/aes.h.

    Signed-off-by: Johannes Berg
    Signed-off-by: John W. Linville

    Johannes Berg
     
  • Just like TKIP and CCMP, CMAC has the PN race.
    It might not actually be possible to hit it now
    since there aren't multiple ACs for management
    frames, but fix it anyway.

    Also move scratch buffers onto the stack.

    Signed-off-by: Johannes Berg
    Signed-off-by: John W. Linville

    Johannes Berg
     

16 Nov, 2010

1 commit

  • crypto_free_cipher() is a wrapper around crypto_free_tfm() which is a
    wrapper around crypto_destroy_tfm() and the latter can handle being passed
    a NULL pointer, so checking for NULL in the
    ieee80211_aes_key_free()/ieee80211_aes_cmac_key_free() wrappers around
    crypto_free_cipher() is pointless and just increase object code size
    needlesly and makes us execute extra test/branch instructions that we
    don't need.
    Btw; don't we have to many wrappers around wrappers ad nauseam here?
    Anyway, this patch removes the redundant conditionals.

    Signed-off-by: Jesper Juhl
    Signed-off-by: John W. Linville

    Jesper Juhl
     

17 Aug, 2010

1 commit

  • ieee80211_add_key() currently returns -ENOMEM in case of any error,
    including a missing crypto algorithm. Change ieee80211_key_alloc()
    and ieee80211_aes_{key_setup_encrypt,cmac_key_setup}() to encode
    errors with ERR_PTR() rather than returning NULL, and change
    ieee80211_add_key() accordingly.

    Compile-tested only.

    Reported-by: Marcin Owsiany
    Signed-off-by: Ben Hutchings
    Acked-by: Johannes Berg
    Signed-off-by: John W. Linville

    Ben Hutchings
     

30 Jan, 2009

1 commit

  • Implement Broadcast/Multicast Integrity Protocol for management frame
    protection. This patch adds the needed definitions for the new
    information element (MMIE) and implementation for the new "encryption"
    type (though, BIP is actually not encrypting data, it provides only
    integrity protection). These routines will be used by a follow-on patch
    that enables BIP for multicast/broadcast robust management frames.

    Signed-off-by: Jouni Malinen
    Acked-by: Johannes Berg
    Signed-off-by: John W. Linville

    Jouni Malinen