blob: 5b9c61c4d3a625d1596b24b805cc5975d5844e8a [file] [log] [blame]
Antoine Tenartc0e4ead2020-01-13 23:31:39 +01001/* SPDX-License-Identifier: GPL-2.0+ */
2/*
3 * MACsec netdev header, used for h/w accelerated implementations.
4 *
5 * Copyright (c) 2015 Sabrina Dubroca <sd@queasysnail.net>
6 */
7#ifndef _NET_MACSEC_H_
8#define _NET_MACSEC_H_
9
10#include <linux/u64_stats_sync.h>
11#include <uapi/linux/if_link.h>
12#include <uapi/linux/if_macsec.h>
13
Era Mayflower48ef50f2020-03-09 19:47:02 +000014#define MACSEC_DEFAULT_PN_LEN 4
15#define MACSEC_XPN_PN_LEN 8
16
Antoine Tenartc0e4ead2020-01-13 23:31:39 +010017#define MACSEC_NUM_AN 4 /* 2 bits for the association number */
18
Lior Nahmansonb1671252022-09-05 22:21:15 -070019#define MACSEC_SCI_LEN 8
20#define MACSEC_PORT_ES (htons(0x0001))
21
22#define MACSEC_TCI_VERSION 0x80
23#define MACSEC_TCI_ES 0x40 /* end station */
24#define MACSEC_TCI_SC 0x20 /* SCI present */
25#define MACSEC_TCI_SCB 0x10 /* epon */
26#define MACSEC_TCI_E 0x08 /* encryption */
27#define MACSEC_TCI_C 0x04 /* changed text */
28#define MACSEC_AN_MASK 0x03 /* association number */
29#define MACSEC_TCI_CONFID (MACSEC_TCI_E | MACSEC_TCI_C)
30
31#define MACSEC_DEFAULT_ICV_LEN 16
32
Era Mayflowera21ecf02020-03-09 19:47:01 +000033typedef u64 __bitwise sci_t;
34typedef u32 __bitwise ssci_t;
35
Lior Nahmanson0a28bfd2022-09-05 22:21:13 -070036struct metadata_dst;
37
Era Mayflowera21ecf02020-03-09 19:47:01 +000038typedef union salt {
39 struct {
40 u32 ssci;
41 u64 pn;
42 } __packed;
43 u8 bytes[MACSEC_SALT_LEN];
44} __packed salt_t;
45
46typedef union pn {
47 struct {
48#if defined(__LITTLE_ENDIAN_BITFIELD)
49 u32 lower;
50 u32 upper;
51#elif defined(__BIG_ENDIAN_BITFIELD)
52 u32 upper;
53 u32 lower;
54#else
55#error "Please fix <asm/byteorder.h>"
56#endif
57 };
58 u64 full64;
59} pn_t;
60
Antoine Tenartc0e4ead2020-01-13 23:31:39 +010061/**
62 * struct macsec_key - SA key
63 * @id: user-provided key identifier
64 * @tfm: crypto struct, key storage
Era Mayflowera21ecf02020-03-09 19:47:01 +000065 * @salt: salt used to generate IV in XPN cipher suites
Antoine Tenartc0e4ead2020-01-13 23:31:39 +010066 */
67struct macsec_key {
68 u8 id[MACSEC_KEYID_LEN];
69 struct crypto_aead *tfm;
Era Mayflowera21ecf02020-03-09 19:47:01 +000070 salt_t salt;
Antoine Tenartc0e4ead2020-01-13 23:31:39 +010071};
72
73struct macsec_rx_sc_stats {
74 __u64 InOctetsValidated;
75 __u64 InOctetsDecrypted;
76 __u64 InPktsUnchecked;
77 __u64 InPktsDelayed;
78 __u64 InPktsOK;
79 __u64 InPktsInvalid;
80 __u64 InPktsLate;
81 __u64 InPktsNotValid;
82 __u64 InPktsNotUsingSA;
83 __u64 InPktsUnusedSA;
84};
85
86struct macsec_rx_sa_stats {
87 __u32 InPktsOK;
88 __u32 InPktsInvalid;
89 __u32 InPktsNotValid;
90 __u32 InPktsNotUsingSA;
91 __u32 InPktsUnusedSA;
92};
93
94struct macsec_tx_sa_stats {
95 __u32 OutPktsProtected;
96 __u32 OutPktsEncrypted;
97};
98
99struct macsec_tx_sc_stats {
100 __u64 OutPktsProtected;
101 __u64 OutPktsEncrypted;
102 __u64 OutOctetsProtected;
103 __u64 OutOctetsEncrypted;
104};
105
Dmitry Bogdanovb62c3622020-03-25 15:52:37 +0300106struct macsec_dev_stats {
107 __u64 OutPktsUntagged;
108 __u64 InPktsUntagged;
109 __u64 OutPktsTooLong;
110 __u64 InPktsNoTag;
111 __u64 InPktsBadTag;
112 __u64 InPktsUnknownSCI;
113 __u64 InPktsNoSCI;
114 __u64 InPktsOverrun;
115};
116
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100117/**
118 * struct macsec_rx_sa - receive secure association
119 * @active:
120 * @next_pn: packet number expected for the next packet
121 * @lock: protects next_pn manipulations
122 * @key: key structure
Era Mayflowera21ecf02020-03-09 19:47:01 +0000123 * @ssci: short secure channel identifier
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100124 * @stats: per-SA stats
125 */
126struct macsec_rx_sa {
127 struct macsec_key key;
Era Mayflowera21ecf02020-03-09 19:47:01 +0000128 ssci_t ssci;
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100129 spinlock_t lock;
Era Mayflowera21ecf02020-03-09 19:47:01 +0000130 union {
131 pn_t next_pn_halves;
132 u64 next_pn;
133 };
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100134 refcount_t refcnt;
135 bool active;
136 struct macsec_rx_sa_stats __percpu *stats;
137 struct macsec_rx_sc *sc;
138 struct rcu_head rcu;
139};
140
141struct pcpu_rx_sc_stats {
142 struct macsec_rx_sc_stats stats;
143 struct u64_stats_sync syncp;
144};
145
146struct pcpu_tx_sc_stats {
147 struct macsec_tx_sc_stats stats;
148 struct u64_stats_sync syncp;
149};
150
151/**
152 * struct macsec_rx_sc - receive secure channel
153 * @sci: secure channel identifier for this SC
154 * @active: channel is active
155 * @sa: array of secure associations
156 * @stats: per-SC stats
157 */
158struct macsec_rx_sc {
159 struct macsec_rx_sc __rcu *next;
160 sci_t sci;
161 bool active;
162 struct macsec_rx_sa __rcu *sa[MACSEC_NUM_AN];
163 struct pcpu_rx_sc_stats __percpu *stats;
164 refcount_t refcnt;
165 struct rcu_head rcu_head;
166};
167
168/**
169 * struct macsec_tx_sa - transmit secure association
170 * @active:
171 * @next_pn: packet number to use for the next packet
172 * @lock: protects next_pn manipulations
173 * @key: key structure
Era Mayflowera21ecf02020-03-09 19:47:01 +0000174 * @ssci: short secure channel identifier
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100175 * @stats: per-SA stats
176 */
177struct macsec_tx_sa {
178 struct macsec_key key;
Era Mayflowera21ecf02020-03-09 19:47:01 +0000179 ssci_t ssci;
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100180 spinlock_t lock;
Era Mayflowera21ecf02020-03-09 19:47:01 +0000181 union {
182 pn_t next_pn_halves;
183 u64 next_pn;
184 };
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100185 refcount_t refcnt;
186 bool active;
187 struct macsec_tx_sa_stats __percpu *stats;
188 struct rcu_head rcu;
189};
190
191/**
192 * struct macsec_tx_sc - transmit secure channel
193 * @active:
194 * @encoding_sa: association number of the SA currently in use
195 * @encrypt: encrypt packets on transmit, or authenticate only
196 * @send_sci: always include the SCI in the SecTAG
197 * @end_station:
198 * @scb: single copy broadcast flag
199 * @sa: array of secure associations
200 * @stats: stats for this TXSC
Lior Nahmanson0a28bfd2022-09-05 22:21:13 -0700201 * @md_dst: MACsec offload metadata dst
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100202 */
203struct macsec_tx_sc {
204 bool active;
205 u8 encoding_sa;
206 bool encrypt;
207 bool send_sci;
208 bool end_station;
209 bool scb;
210 struct macsec_tx_sa __rcu *sa[MACSEC_NUM_AN];
211 struct pcpu_tx_sc_stats __percpu *stats;
Lior Nahmanson0a28bfd2022-09-05 22:21:13 -0700212 struct metadata_dst *md_dst;
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100213};
214
215/**
216 * struct macsec_secy - MACsec Security Entity
217 * @netdev: netdevice for this SecY
218 * @n_rx_sc: number of receive secure channels configured on this SecY
219 * @sci: secure channel identifier used for tx
220 * @key_len: length of keys used by the cipher suite
221 * @icv_len: length of ICV used by the cipher suite
222 * @validate_frames: validation mode
Era Mayflowera21ecf02020-03-09 19:47:01 +0000223 * @xpn: enable XPN for this SecY
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100224 * @operational: MAC_Operational flag
225 * @protect_frames: enable protection for this SecY
226 * @replay_protect: enable packet number checks on receive
227 * @replay_window: size of the replay window
228 * @tx_sc: transmit secure channel
229 * @rx_sc: linked list of receive secure channels
230 */
231struct macsec_secy {
232 struct net_device *netdev;
233 unsigned int n_rx_sc;
234 sci_t sci;
235 u16 key_len;
236 u16 icv_len;
237 enum macsec_validation_type validate_frames;
Era Mayflowera21ecf02020-03-09 19:47:01 +0000238 bool xpn;
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100239 bool operational;
240 bool protect_frames;
241 bool replay_protect;
242 u32 replay_window;
243 struct macsec_tx_sc tx_sc;
244 struct macsec_rx_sc __rcu *rx_sc;
245};
246
Antoine Tenart76564262020-01-13 23:31:40 +0100247/**
248 * struct macsec_context - MACsec context for hardware offloading
249 */
250struct macsec_context {
Antoine Tenart8fa91372020-03-25 15:52:32 +0300251 union {
252 struct net_device *netdev;
253 struct phy_device *phydev;
254 };
Antoine Tenart76564262020-01-13 23:31:40 +0100255 enum macsec_offload offload;
256
257 struct macsec_secy *secy;
258 struct macsec_rx_sc *rx_sc;
259 struct {
260 unsigned char assoc_num;
Antoine Tenart1f7fe512021-06-24 11:38:28 +0200261 u8 key[MACSEC_MAX_KEY_LEN];
Antoine Tenart76564262020-01-13 23:31:40 +0100262 union {
263 struct macsec_rx_sa *rx_sa;
264 struct macsec_tx_sa *tx_sa;
265 };
266 } sa;
Dmitry Bogdanovb62c3622020-03-25 15:52:37 +0300267 union {
268 struct macsec_tx_sc_stats *tx_sc_stats;
269 struct macsec_tx_sa_stats *tx_sa_stats;
270 struct macsec_rx_sc_stats *rx_sc_stats;
271 struct macsec_rx_sa_stats *rx_sa_stats;
272 struct macsec_dev_stats *dev_stats;
273 } stats;
Antoine Tenart76564262020-01-13 23:31:40 +0100274};
275
Antoine Tenart0830e202020-01-13 23:31:41 +0100276/**
277 * struct macsec_ops - MACsec offloading operations
278 */
279struct macsec_ops {
280 /* Device wide */
281 int (*mdo_dev_open)(struct macsec_context *ctx);
282 int (*mdo_dev_stop)(struct macsec_context *ctx);
283 /* SecY */
284 int (*mdo_add_secy)(struct macsec_context *ctx);
285 int (*mdo_upd_secy)(struct macsec_context *ctx);
286 int (*mdo_del_secy)(struct macsec_context *ctx);
287 /* Security channels */
288 int (*mdo_add_rxsc)(struct macsec_context *ctx);
289 int (*mdo_upd_rxsc)(struct macsec_context *ctx);
290 int (*mdo_del_rxsc)(struct macsec_context *ctx);
291 /* Security associations */
292 int (*mdo_add_rxsa)(struct macsec_context *ctx);
293 int (*mdo_upd_rxsa)(struct macsec_context *ctx);
294 int (*mdo_del_rxsa)(struct macsec_context *ctx);
295 int (*mdo_add_txsa)(struct macsec_context *ctx);
296 int (*mdo_upd_txsa)(struct macsec_context *ctx);
297 int (*mdo_del_txsa)(struct macsec_context *ctx);
Dmitry Bogdanovb62c3622020-03-25 15:52:37 +0300298 /* Statistics */
299 int (*mdo_get_dev_stats)(struct macsec_context *ctx);
300 int (*mdo_get_tx_sc_stats)(struct macsec_context *ctx);
301 int (*mdo_get_tx_sa_stats)(struct macsec_context *ctx);
302 int (*mdo_get_rx_sc_stats)(struct macsec_context *ctx);
303 int (*mdo_get_rx_sa_stats)(struct macsec_context *ctx);
Antoine Tenart0830e202020-01-13 23:31:41 +0100304};
305
Antoine Tenart5c937de2020-01-13 23:31:47 +0100306void macsec_pn_wrapped(struct macsec_secy *secy, struct macsec_tx_sa *tx_sa);
Lior Nahmansonb1671252022-09-05 22:21:15 -0700307static inline bool macsec_send_sci(const struct macsec_secy *secy)
308{
309 const struct macsec_tx_sc *tx_sc = &secy->tx_sc;
310
311 return tx_sc->send_sci ||
312 (secy->n_rx_sc > 1 && !tx_sc->end_station && !tx_sc->scb);
313}
Antoine Tenart5c937de2020-01-13 23:31:47 +0100314
Antoine Tenartc0e4ead2020-01-13 23:31:39 +0100315#endif /* _NET_MACSEC_H_ */