2014-03-25 20:39:02 +01:00
|
|
|
/*
|
|
|
|
* SecY Operations
|
|
|
|
* Copyright (c) 2013, Qualcomm Atheros, Inc.
|
|
|
|
*
|
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "utils/includes.h"
|
|
|
|
|
|
|
|
#include "utils/common.h"
|
|
|
|
#include "utils/eloop.h"
|
|
|
|
#include "common/defs.h"
|
|
|
|
#include "drivers/driver.h"
|
|
|
|
#include "pae/ieee802_1x_kay.h"
|
|
|
|
#include "pae/ieee802_1x_kay_i.h"
|
|
|
|
#include "pae/ieee802_1x_secy_ops.h"
|
|
|
|
|
|
|
|
|
|
|
|
int secy_cp_control_validate_frames(struct ieee802_1x_kay *kay,
|
|
|
|
enum validate_frames vf)
|
|
|
|
{
|
|
|
|
kay->vf = vf;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-04-24 00:27:57 +02:00
|
|
|
int secy_cp_control_protect_frames(struct ieee802_1x_kay *kay, bool enabled)
|
2014-03-25 20:39:02 +01:00
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->enable_protect_frames) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy enable_protect_frames operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ops->enable_protect_frames(ops->ctx, enabled);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-04-24 00:27:57 +02:00
|
|
|
int secy_cp_control_encrypt(struct ieee802_1x_kay *kay, bool enabled)
|
2016-11-02 16:38:38 +01:00
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->enable_encrypt) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy enable_encrypt operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ops->enable_encrypt(ops->ctx, enabled);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-04-24 00:27:57 +02:00
|
|
|
int secy_cp_control_replay(struct ieee802_1x_kay *kay, bool enabled, u32 win)
|
2014-03-25 20:39:02 +01:00
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->set_replay_protect) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy set_replay_protect operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ops->set_replay_protect(ops->ctx, enabled, win);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-08-12 15:07:35 +02:00
|
|
|
int secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, u64 cs)
|
2014-03-25 20:39:02 +01:00
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->set_current_cipher_suite) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy set_current_cipher_suite operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-08-15 11:43:42 +02:00
|
|
|
return ops->set_current_cipher_suite(ops->ctx, cs);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_cp_control_confidentiality_offset(struct ieee802_1x_kay *kay,
|
|
|
|
enum confidentiality_offset co)
|
|
|
|
{
|
|
|
|
kay->co = co;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-04-24 00:27:57 +02:00
|
|
|
int secy_cp_control_enable_port(struct ieee802_1x_kay *kay, bool enabled)
|
2014-03-25 20:39:02 +01:00
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->enable_controlled_port) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy enable_controlled_port operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ops->enable_controlled_port(ops->ctx, enabled);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-10-07 12:08:12 +02:00
|
|
|
int secy_get_capability(struct ieee802_1x_kay *kay, enum macsec_cap *cap)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->macsec_get_capability) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy macsec_get_capability operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ops->macsec_get_capability(ops->ctx, cap);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-03-25 20:39:02 +01:00
|
|
|
int secy_get_receive_lowest_pn(struct ieee802_1x_kay *kay,
|
|
|
|
struct receive_sa *rxsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !rxsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->get_receive_lowest_pn) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy get_receive_lowest_pn operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-09-20 09:43:05 +02:00
|
|
|
return ops->get_receive_lowest_pn(ops->ctx, rxsa);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_get_transmit_next_pn(struct ieee802_1x_kay *kay,
|
|
|
|
struct transmit_sa *txsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !txsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->get_transmit_next_pn) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
2018-11-02 19:02:15 +01:00
|
|
|
"KaY: secy get_transmit_next_pn operation not supported");
|
2014-03-25 20:39:02 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-09-20 09:43:05 +02:00
|
|
|
return ops->get_transmit_next_pn(ops->ctx, txsa);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_set_transmit_next_pn(struct ieee802_1x_kay *kay,
|
|
|
|
struct transmit_sa *txsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !txsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->set_transmit_next_pn) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
2018-11-02 19:02:15 +01:00
|
|
|
"KaY: secy set_transmit_next_pn operation not supported");
|
2014-03-25 20:39:02 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-09-20 09:43:05 +02:00
|
|
|
return ops->set_transmit_next_pn(ops->ctx, txsa);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-02-20 20:28:39 +01:00
|
|
|
int secy_set_receive_lowest_pn(struct ieee802_1x_kay *kay,
|
|
|
|
struct receive_sa *rxsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !rxsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->set_receive_lowest_pn) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy set_receive_lowest_pn operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ops->set_receive_lowest_pn(ops->ctx, rxsa);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-03-25 20:39:02 +01:00
|
|
|
int secy_create_receive_sc(struct ieee802_1x_kay *kay, struct receive_sc *rxsc)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !rxsc) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->create_receive_sc) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy create_receive_sc operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-10-07 12:08:10 +02:00
|
|
|
return ops->create_receive_sc(ops->ctx, rxsc, kay->vf, kay->co);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_delete_receive_sc(struct ieee802_1x_kay *kay, struct receive_sc *rxsc)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !rxsc) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->delete_receive_sc) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy delete_receive_sc operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-10-07 12:08:10 +02:00
|
|
|
return ops->delete_receive_sc(ops->ctx, rxsc);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_create_receive_sa(struct ieee802_1x_kay *kay, struct receive_sa *rxsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !rxsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->create_receive_sa) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy create_receive_sa operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-09-20 09:43:09 +02:00
|
|
|
return ops->create_receive_sa(ops->ctx, rxsa);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-10-21 14:45:28 +02:00
|
|
|
int secy_delete_receive_sa(struct ieee802_1x_kay *kay, struct receive_sa *rxsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !rxsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->delete_receive_sa) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy delete_receive_sa operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ops->delete_receive_sa(ops->ctx, rxsa);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-03-25 20:39:02 +01:00
|
|
|
int secy_enable_receive_sa(struct ieee802_1x_kay *kay, struct receive_sa *rxsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !rxsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->enable_receive_sa) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy enable_receive_sa operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2020-04-24 00:27:57 +02:00
|
|
|
rxsa->enable_receive = true;
|
2014-03-25 20:39:02 +01:00
|
|
|
|
2016-09-20 09:43:09 +02:00
|
|
|
return ops->enable_receive_sa(ops->ctx, rxsa);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_disable_receive_sa(struct ieee802_1x_kay *kay, struct receive_sa *rxsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !rxsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->disable_receive_sa) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy disable_receive_sa operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2020-04-24 00:27:57 +02:00
|
|
|
rxsa->enable_receive = false;
|
2014-03-25 20:39:02 +01:00
|
|
|
|
2016-09-20 09:43:09 +02:00
|
|
|
return ops->disable_receive_sa(ops->ctx, rxsa);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_create_transmit_sc(struct ieee802_1x_kay *kay,
|
|
|
|
struct transmit_sc *txsc)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !txsc) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->create_transmit_sc) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy create_transmit_sc operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-10-07 12:08:09 +02:00
|
|
|
return ops->create_transmit_sc(ops->ctx, txsc, kay->co);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_delete_transmit_sc(struct ieee802_1x_kay *kay,
|
|
|
|
struct transmit_sc *txsc)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !txsc) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->delete_transmit_sc) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy delete_transmit_sc operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-10-07 12:08:09 +02:00
|
|
|
return ops->delete_transmit_sc(ops->ctx, txsc);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_create_transmit_sa(struct ieee802_1x_kay *kay,
|
|
|
|
struct transmit_sa *txsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !txsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->create_transmit_sa) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy create_transmit_sa operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-09-20 09:43:07 +02:00
|
|
|
return ops->create_transmit_sa(ops->ctx, txsa);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-10-21 14:45:28 +02:00
|
|
|
int secy_delete_transmit_sa(struct ieee802_1x_kay *kay,
|
|
|
|
struct transmit_sa *txsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !txsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->delete_transmit_sa) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy delete_transmit_sa operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ops->delete_transmit_sa(ops->ctx, txsa);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-03-25 20:39:02 +01:00
|
|
|
int secy_enable_transmit_sa(struct ieee802_1x_kay *kay,
|
|
|
|
struct transmit_sa *txsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !txsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->enable_transmit_sa) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy enable_transmit_sa operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2020-04-24 00:27:57 +02:00
|
|
|
txsa->enable_transmit = true;
|
2014-03-25 20:39:02 +01:00
|
|
|
|
2016-09-20 09:43:07 +02:00
|
|
|
return ops->enable_transmit_sa(ops->ctx, txsa);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_disable_transmit_sa(struct ieee802_1x_kay *kay,
|
|
|
|
struct transmit_sa *txsa)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay || !txsa) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->disable_transmit_sa) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy disable_transmit_sa operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2020-04-24 00:27:57 +02:00
|
|
|
txsa->enable_transmit = false;
|
2014-03-25 20:39:02 +01:00
|
|
|
|
2016-09-20 09:43:07 +02:00
|
|
|
return ops->disable_transmit_sa(ops->ctx, txsa);
|
2014-03-25 20:39:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_init_macsec(struct ieee802_1x_kay *kay)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
struct macsec_init_params params;
|
|
|
|
|
|
|
|
if (!kay) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->macsec_init) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy macsec_init operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2020-04-24 00:27:57 +02:00
|
|
|
params.use_es = false;
|
|
|
|
params.use_scb = false;
|
|
|
|
params.always_include_sci = true;
|
2014-03-25 20:39:02 +01:00
|
|
|
|
|
|
|
ret = ops->macsec_init(ops->ctx, ¶ms);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int secy_deinit_macsec(struct ieee802_1x_kay *kay)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_kay_ctx *ops;
|
|
|
|
|
|
|
|
if (!kay) {
|
|
|
|
wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ops = kay->ctx;
|
|
|
|
if (!ops || !ops->macsec_deinit) {
|
|
|
|
wpa_printf(MSG_ERROR,
|
|
|
|
"KaY: secy macsec_deinit operation not supported");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ops->macsec_deinit(ops->ctx);
|
|
|
|
}
|