Loading...
1/* SPDX-License-Identifier: GPL-2.0+ */
2/*
3 * MACsec netdev header, used for h/w accelerated implementations.
4 *
5 * Copyright (c) 2015 Sabrina Dubroca <sd@queasysnail.net>
6 */
7#ifndef _NET_MACSEC_H_
8#define _NET_MACSEC_H_
9
10#include <linux/u64_stats_sync.h>
11#include <linux/if_vlan.h>
12#include <uapi/linux/if_link.h>
13#include <uapi/linux/if_macsec.h>
14
15#define MACSEC_DEFAULT_PN_LEN 4
16#define MACSEC_XPN_PN_LEN 8
17
18#define MACSEC_NUM_AN 4 /* 2 bits for the association number */
19
20#define MACSEC_SCI_LEN 8
21#define MACSEC_PORT_ES (htons(0x0001))
22
23#define MACSEC_TCI_VERSION 0x80
24#define MACSEC_TCI_ES 0x40 /* end station */
25#define MACSEC_TCI_SC 0x20 /* SCI present */
26#define MACSEC_TCI_SCB 0x10 /* epon */
27#define MACSEC_TCI_E 0x08 /* encryption */
28#define MACSEC_TCI_C 0x04 /* changed text */
29#define MACSEC_AN_MASK 0x03 /* association number */
30#define MACSEC_TCI_CONFID (MACSEC_TCI_E | MACSEC_TCI_C)
31
32#define MACSEC_DEFAULT_ICV_LEN 16
33
34typedef u64 __bitwise sci_t;
35typedef u32 __bitwise ssci_t;
36
37struct metadata_dst;
38
39typedef union salt {
40 struct {
41 u32 ssci;
42 u64 pn;
43 } __packed;
44 u8 bytes[MACSEC_SALT_LEN];
45} __packed salt_t;
46
47typedef union pn {
48 struct {
49#if defined(__LITTLE_ENDIAN_BITFIELD)
50 u32 lower;
51 u32 upper;
52#elif defined(__BIG_ENDIAN_BITFIELD)
53 u32 upper;
54 u32 lower;
55#else
56#error "Please fix <asm/byteorder.h>"
57#endif
58 };
59 u64 full64;
60} pn_t;
61
62/**
63 * struct macsec_key - SA key
64 * @id: user-provided key identifier
65 * @tfm: crypto struct, key storage
66 * @salt: salt used to generate IV in XPN cipher suites
67 */
68struct macsec_key {
69 u8 id[MACSEC_KEYID_LEN];
70 struct crypto_aead *tfm;
71 salt_t salt;
72};
73
74struct macsec_rx_sc_stats {
75 __u64 InOctetsValidated;
76 __u64 InOctetsDecrypted;
77 __u64 InPktsUnchecked;
78 __u64 InPktsDelayed;
79 __u64 InPktsOK;
80 __u64 InPktsInvalid;
81 __u64 InPktsLate;
82 __u64 InPktsNotValid;
83 __u64 InPktsNotUsingSA;
84 __u64 InPktsUnusedSA;
85};
86
87struct macsec_rx_sa_stats {
88 __u32 InPktsOK;
89 __u32 InPktsInvalid;
90 __u32 InPktsNotValid;
91 __u32 InPktsNotUsingSA;
92 __u32 InPktsUnusedSA;
93};
94
95struct macsec_tx_sa_stats {
96 __u32 OutPktsProtected;
97 __u32 OutPktsEncrypted;
98};
99
100struct macsec_tx_sc_stats {
101 __u64 OutPktsProtected;
102 __u64 OutPktsEncrypted;
103 __u64 OutOctetsProtected;
104 __u64 OutOctetsEncrypted;
105};
106
107struct macsec_dev_stats {
108 __u64 OutPktsUntagged;
109 __u64 InPktsUntagged;
110 __u64 OutPktsTooLong;
111 __u64 InPktsNoTag;
112 __u64 InPktsBadTag;
113 __u64 InPktsUnknownSCI;
114 __u64 InPktsNoSCI;
115 __u64 InPktsOverrun;
116};
117
118/**
119 * struct macsec_rx_sa - receive secure association
120 * @active:
121 * @next_pn: packet number expected for the next packet
122 * @lock: protects next_pn manipulations
123 * @key: key structure
124 * @ssci: short secure channel identifier
125 * @stats: per-SA stats
126 */
127struct macsec_rx_sa {
128 struct macsec_key key;
129 ssci_t ssci;
130 spinlock_t lock;
131 union {
132 pn_t next_pn_halves;
133 u64 next_pn;
134 };
135 refcount_t refcnt;
136 bool active;
137 struct macsec_rx_sa_stats __percpu *stats;
138 struct macsec_rx_sc *sc;
139 struct rcu_head rcu;
140};
141
142struct pcpu_rx_sc_stats {
143 struct macsec_rx_sc_stats stats;
144 struct u64_stats_sync syncp;
145};
146
147struct pcpu_tx_sc_stats {
148 struct macsec_tx_sc_stats stats;
149 struct u64_stats_sync syncp;
150};
151
152/**
153 * struct macsec_rx_sc - receive secure channel
154 * @sci: secure channel identifier for this SC
155 * @active: channel is active
156 * @sa: array of secure associations
157 * @stats: per-SC stats
158 */
159struct macsec_rx_sc {
160 struct macsec_rx_sc __rcu *next;
161 sci_t sci;
162 bool active;
163 struct macsec_rx_sa __rcu *sa[MACSEC_NUM_AN];
164 struct pcpu_rx_sc_stats __percpu *stats;
165 refcount_t refcnt;
166 struct rcu_head rcu_head;
167};
168
169/**
170 * struct macsec_tx_sa - transmit secure association
171 * @active:
172 * @next_pn: packet number to use for the next packet
173 * @lock: protects next_pn manipulations
174 * @key: key structure
175 * @ssci: short secure channel identifier
176 * @stats: per-SA stats
177 */
178struct macsec_tx_sa {
179 struct macsec_key key;
180 ssci_t ssci;
181 spinlock_t lock;
182 union {
183 pn_t next_pn_halves;
184 u64 next_pn;
185 };
186 refcount_t refcnt;
187 bool active;
188 struct macsec_tx_sa_stats __percpu *stats;
189 struct rcu_head rcu;
190};
191
192/**
193 * struct macsec_tx_sc - transmit secure channel
194 * @active:
195 * @encoding_sa: association number of the SA currently in use
196 * @encrypt: encrypt packets on transmit, or authenticate only
197 * @send_sci: always include the SCI in the SecTAG
198 * @end_station:
199 * @scb: single copy broadcast flag
200 * @sa: array of secure associations
201 * @stats: stats for this TXSC
202 * @md_dst: MACsec offload metadata dst
203 */
204struct macsec_tx_sc {
205 bool active;
206 u8 encoding_sa;
207 bool encrypt;
208 bool send_sci;
209 bool end_station;
210 bool scb;
211 struct macsec_tx_sa __rcu *sa[MACSEC_NUM_AN];
212 struct pcpu_tx_sc_stats __percpu *stats;
213 struct metadata_dst *md_dst;
214};
215
216/**
217 * struct macsec_secy - MACsec Security Entity
218 * @netdev: netdevice for this SecY
219 * @n_rx_sc: number of receive secure channels configured on this SecY
220 * @sci: secure channel identifier used for tx
221 * @key_len: length of keys used by the cipher suite
222 * @icv_len: length of ICV used by the cipher suite
223 * @validate_frames: validation mode
224 * @xpn: enable XPN for this SecY
225 * @operational: MAC_Operational flag
226 * @protect_frames: enable protection for this SecY
227 * @replay_protect: enable packet number checks on receive
228 * @replay_window: size of the replay window
229 * @tx_sc: transmit secure channel
230 * @rx_sc: linked list of receive secure channels
231 */
232struct macsec_secy {
233 struct net_device *netdev;
234 unsigned int n_rx_sc;
235 sci_t sci;
236 u16 key_len;
237 u16 icv_len;
238 enum macsec_validation_type validate_frames;
239 bool xpn;
240 bool operational;
241 bool protect_frames;
242 bool replay_protect;
243 u32 replay_window;
244 struct macsec_tx_sc tx_sc;
245 struct macsec_rx_sc __rcu *rx_sc;
246};
247
248/**
249 * struct macsec_context - MACsec context for hardware offloading
250 * @netdev: a valid pointer to a struct net_device if @offload ==
251 * MACSEC_OFFLOAD_MAC
252 * @phydev: a valid pointer to a struct phy_device if @offload ==
253 * MACSEC_OFFLOAD_PHY
254 * @offload: MACsec offload status
255 * @secy: pointer to a MACsec SecY
256 * @rx_sc: pointer to a RX SC
257 * @update_pn: when updating the SA, update the next PN
258 * @assoc_num: association number of the target SA
259 * @key: key of the target SA
260 * @rx_sa: pointer to an RX SA if a RX SA is added/updated/removed
261 * @tx_sa: pointer to an TX SA if a TX SA is added/updated/removed
262 * @tx_sc_stats: pointer to TX SC stats structure
263 * @tx_sa_stats: pointer to TX SA stats structure
264 * @rx_sc_stats: pointer to RX SC stats structure
265 * @rx_sa_stats: pointer to RX SA stats structure
266 * @dev_stats: pointer to dev stats structure
267 */
268struct macsec_context {
269 union {
270 struct net_device *netdev;
271 struct phy_device *phydev;
272 };
273 enum macsec_offload offload;
274
275 struct macsec_secy *secy;
276 struct macsec_rx_sc *rx_sc;
277 struct {
278 bool update_pn;
279 unsigned char assoc_num;
280 u8 key[MACSEC_MAX_KEY_LEN];
281 union {
282 struct macsec_rx_sa *rx_sa;
283 struct macsec_tx_sa *tx_sa;
284 };
285 } sa;
286 union {
287 struct macsec_tx_sc_stats *tx_sc_stats;
288 struct macsec_tx_sa_stats *tx_sa_stats;
289 struct macsec_rx_sc_stats *rx_sc_stats;
290 struct macsec_rx_sa_stats *rx_sa_stats;
291 struct macsec_dev_stats *dev_stats;
292 } stats;
293};
294
295/**
296 * struct macsec_ops - MACsec offloading operations
297 * @mdo_dev_open: called when the MACsec interface transitions to the up state
298 * @mdo_dev_stop: called when the MACsec interface transitions to the down
299 * state
300 * @mdo_add_secy: called when a new SecY is added
301 * @mdo_upd_secy: called when the SecY flags are changed or the MAC address of
302 * the MACsec interface is changed
303 * @mdo_del_secy: called when the hw offload is disabled or the MACsec
304 * interface is removed
305 * @mdo_add_rxsc: called when a new RX SC is added
306 * @mdo_upd_rxsc: called when a certain RX SC is updated
307 * @mdo_del_rxsc: called when a certain RX SC is removed
308 * @mdo_add_rxsa: called when a new RX SA is added
309 * @mdo_upd_rxsa: called when a certain RX SA is updated
310 * @mdo_del_rxsa: called when a certain RX SA is removed
311 * @mdo_add_txsa: called when a new TX SA is added
312 * @mdo_upd_txsa: called when a certain TX SA is updated
313 * @mdo_del_txsa: called when a certain TX SA is removed
314 * @mdo_get_dev_stats: called when dev stats are read
315 * @mdo_get_tx_sc_stats: called when TX SC stats are read
316 * @mdo_get_tx_sa_stats: called when TX SA stats are read
317 * @mdo_get_rx_sc_stats: called when RX SC stats are read
318 * @mdo_get_rx_sa_stats: called when RX SA stats are read
319 * @mdo_insert_tx_tag: called to insert the TX tag
320 * @needed_headroom: number of bytes reserved at the beginning of the sk_buff
321 * for the TX tag
322 * @needed_tailroom: number of bytes reserved at the end of the sk_buff for the
323 * TX tag
324 * @rx_uses_md_dst: whether MACsec device offload supports sk_buff md_dst
325 */
326struct macsec_ops {
327 /* Device wide */
328 int (*mdo_dev_open)(struct macsec_context *ctx);
329 int (*mdo_dev_stop)(struct macsec_context *ctx);
330 /* SecY */
331 int (*mdo_add_secy)(struct macsec_context *ctx);
332 int (*mdo_upd_secy)(struct macsec_context *ctx);
333 int (*mdo_del_secy)(struct macsec_context *ctx);
334 /* Security channels */
335 int (*mdo_add_rxsc)(struct macsec_context *ctx);
336 int (*mdo_upd_rxsc)(struct macsec_context *ctx);
337 int (*mdo_del_rxsc)(struct macsec_context *ctx);
338 /* Security associations */
339 int (*mdo_add_rxsa)(struct macsec_context *ctx);
340 int (*mdo_upd_rxsa)(struct macsec_context *ctx);
341 int (*mdo_del_rxsa)(struct macsec_context *ctx);
342 int (*mdo_add_txsa)(struct macsec_context *ctx);
343 int (*mdo_upd_txsa)(struct macsec_context *ctx);
344 int (*mdo_del_txsa)(struct macsec_context *ctx);
345 /* Statistics */
346 int (*mdo_get_dev_stats)(struct macsec_context *ctx);
347 int (*mdo_get_tx_sc_stats)(struct macsec_context *ctx);
348 int (*mdo_get_tx_sa_stats)(struct macsec_context *ctx);
349 int (*mdo_get_rx_sc_stats)(struct macsec_context *ctx);
350 int (*mdo_get_rx_sa_stats)(struct macsec_context *ctx);
351 /* Offload tag */
352 int (*mdo_insert_tx_tag)(struct phy_device *phydev,
353 struct sk_buff *skb);
354 unsigned int needed_headroom;
355 unsigned int needed_tailroom;
356 bool rx_uses_md_dst;
357};
358
359void macsec_pn_wrapped(struct macsec_secy *secy, struct macsec_tx_sa *tx_sa);
360static inline bool macsec_send_sci(const struct macsec_secy *secy)
361{
362 const struct macsec_tx_sc *tx_sc = &secy->tx_sc;
363
364 return tx_sc->send_sci ||
365 (secy->n_rx_sc > 1 && !tx_sc->end_station && !tx_sc->scb);
366}
367struct net_device *macsec_get_real_dev(const struct net_device *dev);
368bool macsec_netdev_is_offloaded(struct net_device *dev);
369
370static inline void *macsec_netdev_priv(const struct net_device *dev)
371{
372#if IS_ENABLED(CONFIG_VLAN_8021Q)
373 if (is_vlan_dev(dev))
374 return netdev_priv(vlan_dev_priv(dev)->real_dev);
375#endif
376 return netdev_priv(dev);
377}
378
379static inline u64 sci_to_cpu(sci_t sci)
380{
381 return be64_to_cpu((__force __be64)sci);
382}
383
384#endif /* _NET_MACSEC_H_ */
1/* SPDX-License-Identifier: GPL-2.0+ */
2/*
3 * MACsec netdev header, used for h/w accelerated implementations.
4 *
5 * Copyright (c) 2015 Sabrina Dubroca <sd@queasysnail.net>
6 */
7#ifndef _NET_MACSEC_H_
8#define _NET_MACSEC_H_
9
10#include <linux/u64_stats_sync.h>
11#include <uapi/linux/if_link.h>
12#include <uapi/linux/if_macsec.h>
13
14#define MACSEC_DEFAULT_PN_LEN 4
15#define MACSEC_XPN_PN_LEN 8
16
17#define MACSEC_SALT_LEN 12
18#define MACSEC_NUM_AN 4 /* 2 bits for the association number */
19
20typedef u64 __bitwise sci_t;
21typedef u32 __bitwise ssci_t;
22
23typedef union salt {
24 struct {
25 u32 ssci;
26 u64 pn;
27 } __packed;
28 u8 bytes[MACSEC_SALT_LEN];
29} __packed salt_t;
30
31typedef union pn {
32 struct {
33#if defined(__LITTLE_ENDIAN_BITFIELD)
34 u32 lower;
35 u32 upper;
36#elif defined(__BIG_ENDIAN_BITFIELD)
37 u32 upper;
38 u32 lower;
39#else
40#error "Please fix <asm/byteorder.h>"
41#endif
42 };
43 u64 full64;
44} pn_t;
45
46/**
47 * struct macsec_key - SA key
48 * @id: user-provided key identifier
49 * @tfm: crypto struct, key storage
50 * @salt: salt used to generate IV in XPN cipher suites
51 */
52struct macsec_key {
53 u8 id[MACSEC_KEYID_LEN];
54 struct crypto_aead *tfm;
55 salt_t salt;
56};
57
58struct macsec_rx_sc_stats {
59 __u64 InOctetsValidated;
60 __u64 InOctetsDecrypted;
61 __u64 InPktsUnchecked;
62 __u64 InPktsDelayed;
63 __u64 InPktsOK;
64 __u64 InPktsInvalid;
65 __u64 InPktsLate;
66 __u64 InPktsNotValid;
67 __u64 InPktsNotUsingSA;
68 __u64 InPktsUnusedSA;
69};
70
71struct macsec_rx_sa_stats {
72 __u32 InPktsOK;
73 __u32 InPktsInvalid;
74 __u32 InPktsNotValid;
75 __u32 InPktsNotUsingSA;
76 __u32 InPktsUnusedSA;
77};
78
79struct macsec_tx_sa_stats {
80 __u32 OutPktsProtected;
81 __u32 OutPktsEncrypted;
82};
83
84struct macsec_tx_sc_stats {
85 __u64 OutPktsProtected;
86 __u64 OutPktsEncrypted;
87 __u64 OutOctetsProtected;
88 __u64 OutOctetsEncrypted;
89};
90
91struct macsec_dev_stats {
92 __u64 OutPktsUntagged;
93 __u64 InPktsUntagged;
94 __u64 OutPktsTooLong;
95 __u64 InPktsNoTag;
96 __u64 InPktsBadTag;
97 __u64 InPktsUnknownSCI;
98 __u64 InPktsNoSCI;
99 __u64 InPktsOverrun;
100};
101
102/**
103 * struct macsec_rx_sa - receive secure association
104 * @active:
105 * @next_pn: packet number expected for the next packet
106 * @lock: protects next_pn manipulations
107 * @key: key structure
108 * @ssci: short secure channel identifier
109 * @stats: per-SA stats
110 */
111struct macsec_rx_sa {
112 struct macsec_key key;
113 ssci_t ssci;
114 spinlock_t lock;
115 union {
116 pn_t next_pn_halves;
117 u64 next_pn;
118 };
119 refcount_t refcnt;
120 bool active;
121 struct macsec_rx_sa_stats __percpu *stats;
122 struct macsec_rx_sc *sc;
123 struct rcu_head rcu;
124};
125
126struct pcpu_rx_sc_stats {
127 struct macsec_rx_sc_stats stats;
128 struct u64_stats_sync syncp;
129};
130
131struct pcpu_tx_sc_stats {
132 struct macsec_tx_sc_stats stats;
133 struct u64_stats_sync syncp;
134};
135
136/**
137 * struct macsec_rx_sc - receive secure channel
138 * @sci: secure channel identifier for this SC
139 * @active: channel is active
140 * @sa: array of secure associations
141 * @stats: per-SC stats
142 */
143struct macsec_rx_sc {
144 struct macsec_rx_sc __rcu *next;
145 sci_t sci;
146 bool active;
147 struct macsec_rx_sa __rcu *sa[MACSEC_NUM_AN];
148 struct pcpu_rx_sc_stats __percpu *stats;
149 refcount_t refcnt;
150 struct rcu_head rcu_head;
151};
152
153/**
154 * struct macsec_tx_sa - transmit secure association
155 * @active:
156 * @next_pn: packet number to use for the next packet
157 * @lock: protects next_pn manipulations
158 * @key: key structure
159 * @ssci: short secure channel identifier
160 * @stats: per-SA stats
161 */
162struct macsec_tx_sa {
163 struct macsec_key key;
164 ssci_t ssci;
165 spinlock_t lock;
166 union {
167 pn_t next_pn_halves;
168 u64 next_pn;
169 };
170 refcount_t refcnt;
171 bool active;
172 struct macsec_tx_sa_stats __percpu *stats;
173 struct rcu_head rcu;
174};
175
176/**
177 * struct macsec_tx_sc - transmit secure channel
178 * @active:
179 * @encoding_sa: association number of the SA currently in use
180 * @encrypt: encrypt packets on transmit, or authenticate only
181 * @send_sci: always include the SCI in the SecTAG
182 * @end_station:
183 * @scb: single copy broadcast flag
184 * @sa: array of secure associations
185 * @stats: stats for this TXSC
186 */
187struct macsec_tx_sc {
188 bool active;
189 u8 encoding_sa;
190 bool encrypt;
191 bool send_sci;
192 bool end_station;
193 bool scb;
194 struct macsec_tx_sa __rcu *sa[MACSEC_NUM_AN];
195 struct pcpu_tx_sc_stats __percpu *stats;
196};
197
198/**
199 * struct macsec_secy - MACsec Security Entity
200 * @netdev: netdevice for this SecY
201 * @n_rx_sc: number of receive secure channels configured on this SecY
202 * @sci: secure channel identifier used for tx
203 * @key_len: length of keys used by the cipher suite
204 * @icv_len: length of ICV used by the cipher suite
205 * @validate_frames: validation mode
206 * @xpn: enable XPN for this SecY
207 * @operational: MAC_Operational flag
208 * @protect_frames: enable protection for this SecY
209 * @replay_protect: enable packet number checks on receive
210 * @replay_window: size of the replay window
211 * @tx_sc: transmit secure channel
212 * @rx_sc: linked list of receive secure channels
213 */
214struct macsec_secy {
215 struct net_device *netdev;
216 unsigned int n_rx_sc;
217 sci_t sci;
218 u16 key_len;
219 u16 icv_len;
220 enum macsec_validation_type validate_frames;
221 bool xpn;
222 bool operational;
223 bool protect_frames;
224 bool replay_protect;
225 u32 replay_window;
226 struct macsec_tx_sc tx_sc;
227 struct macsec_rx_sc __rcu *rx_sc;
228};
229
230/**
231 * struct macsec_context - MACsec context for hardware offloading
232 */
233struct macsec_context {
234 union {
235 struct net_device *netdev;
236 struct phy_device *phydev;
237 };
238 enum macsec_offload offload;
239
240 struct macsec_secy *secy;
241 struct macsec_rx_sc *rx_sc;
242 struct {
243 unsigned char assoc_num;
244 u8 key[MACSEC_KEYID_LEN];
245 union {
246 struct macsec_rx_sa *rx_sa;
247 struct macsec_tx_sa *tx_sa;
248 };
249 } sa;
250 union {
251 struct macsec_tx_sc_stats *tx_sc_stats;
252 struct macsec_tx_sa_stats *tx_sa_stats;
253 struct macsec_rx_sc_stats *rx_sc_stats;
254 struct macsec_rx_sa_stats *rx_sa_stats;
255 struct macsec_dev_stats *dev_stats;
256 } stats;
257
258 u8 prepare:1;
259};
260
261/**
262 * struct macsec_ops - MACsec offloading operations
263 */
264struct macsec_ops {
265 /* Device wide */
266 int (*mdo_dev_open)(struct macsec_context *ctx);
267 int (*mdo_dev_stop)(struct macsec_context *ctx);
268 /* SecY */
269 int (*mdo_add_secy)(struct macsec_context *ctx);
270 int (*mdo_upd_secy)(struct macsec_context *ctx);
271 int (*mdo_del_secy)(struct macsec_context *ctx);
272 /* Security channels */
273 int (*mdo_add_rxsc)(struct macsec_context *ctx);
274 int (*mdo_upd_rxsc)(struct macsec_context *ctx);
275 int (*mdo_del_rxsc)(struct macsec_context *ctx);
276 /* Security associations */
277 int (*mdo_add_rxsa)(struct macsec_context *ctx);
278 int (*mdo_upd_rxsa)(struct macsec_context *ctx);
279 int (*mdo_del_rxsa)(struct macsec_context *ctx);
280 int (*mdo_add_txsa)(struct macsec_context *ctx);
281 int (*mdo_upd_txsa)(struct macsec_context *ctx);
282 int (*mdo_del_txsa)(struct macsec_context *ctx);
283 /* Statistics */
284 int (*mdo_get_dev_stats)(struct macsec_context *ctx);
285 int (*mdo_get_tx_sc_stats)(struct macsec_context *ctx);
286 int (*mdo_get_tx_sa_stats)(struct macsec_context *ctx);
287 int (*mdo_get_rx_sc_stats)(struct macsec_context *ctx);
288 int (*mdo_get_rx_sa_stats)(struct macsec_context *ctx);
289};
290
291void macsec_pn_wrapped(struct macsec_secy *secy, struct macsec_tx_sa *tx_sa);
292
293#endif /* _NET_MACSEC_H_ */