1 /* SPDX-License-Identifier: GPL-2.0+ */
3 * MACsec netdev header, used for h/w accelerated implementations.
5 * Copyright (c) 2015 Sabrina Dubroca <sd@queasysnail.net>
10 #include <linux/u64_stats_sync.h>
11 #include <linux/if_vlan.h>
12 #include <uapi/linux/if_link.h>
13 #include <uapi/linux/if_macsec.h>
15 #define MACSEC_DEFAULT_PN_LEN 4
16 #define MACSEC_XPN_PN_LEN 8
18 #define MACSEC_NUM_AN 4 /* 2 bits for the association number */
20 #define MACSEC_SCI_LEN 8
21 #define MACSEC_PORT_ES (htons(0x0001))
23 #define MACSEC_TCI_VERSION 0x80
24 #define MACSEC_TCI_ES 0x40 /* end station */
25 #define MACSEC_TCI_SC 0x20 /* SCI present */
26 #define MACSEC_TCI_SCB 0x10 /* epon */
27 #define MACSEC_TCI_E 0x08 /* encryption */
28 #define MACSEC_TCI_C 0x04 /* changed text */
29 #define MACSEC_AN_MASK 0x03 /* association number */
30 #define MACSEC_TCI_CONFID (MACSEC_TCI_E | MACSEC_TCI_C)
32 #define MACSEC_DEFAULT_ICV_LEN 16
34 typedef u64 __bitwise sci_t
;
35 typedef u32 __bitwise ssci_t
;
44 u8 bytes
[MACSEC_SALT_LEN
];
49 #if defined(__LITTLE_ENDIAN_BITFIELD)
52 #elif defined(__BIG_ENDIAN_BITFIELD)
56 #error "Please fix <asm/byteorder.h>"
63 * struct macsec_key - SA key
64 * @id: user-provided key identifier
65 * @tfm: crypto struct, key storage
66 * @salt: salt used to generate IV in XPN cipher suites
69 u8 id
[MACSEC_KEYID_LEN
];
70 struct crypto_aead
*tfm
;
74 struct macsec_rx_sc_stats
{
75 __u64 InOctetsValidated
;
76 __u64 InOctetsDecrypted
;
77 __u64 InPktsUnchecked
;
83 __u64 InPktsNotUsingSA
;
87 struct macsec_rx_sa_stats
{
91 __u32 InPktsNotUsingSA
;
95 struct macsec_tx_sa_stats
{
96 __u32 OutPktsProtected
;
97 __u32 OutPktsEncrypted
;
100 struct macsec_tx_sc_stats
{
101 __u64 OutPktsProtected
;
102 __u64 OutPktsEncrypted
;
103 __u64 OutOctetsProtected
;
104 __u64 OutOctetsEncrypted
;
107 struct macsec_dev_stats
{
108 __u64 OutPktsUntagged
;
109 __u64 InPktsUntagged
;
110 __u64 OutPktsTooLong
;
113 __u64 InPktsUnknownSCI
;
119 * struct macsec_rx_sa - receive secure association
121 * @next_pn: packet number expected for the next packet
122 * @lock: protects next_pn manipulations
123 * @key: key structure
124 * @ssci: short secure channel identifier
125 * @stats: per-SA stats
127 struct macsec_rx_sa
{
128 struct macsec_key key
;
137 struct macsec_rx_sa_stats __percpu
*stats
;
138 struct macsec_rx_sc
*sc
;
142 struct pcpu_rx_sc_stats
{
143 struct macsec_rx_sc_stats stats
;
144 struct u64_stats_sync syncp
;
147 struct pcpu_tx_sc_stats
{
148 struct macsec_tx_sc_stats stats
;
149 struct u64_stats_sync syncp
;
153 * struct macsec_rx_sc - receive secure channel
154 * @sci: secure channel identifier for this SC
155 * @active: channel is active
156 * @sa: array of secure associations
157 * @stats: per-SC stats
159 struct macsec_rx_sc
{
160 struct macsec_rx_sc __rcu
*next
;
163 struct macsec_rx_sa __rcu
*sa
[MACSEC_NUM_AN
];
164 struct pcpu_rx_sc_stats __percpu
*stats
;
166 struct rcu_head rcu_head
;
170 * struct macsec_tx_sa - transmit secure association
172 * @next_pn: packet number to use for the next packet
173 * @lock: protects next_pn manipulations
174 * @key: key structure
175 * @ssci: short secure channel identifier
176 * @stats: per-SA stats
178 struct macsec_tx_sa
{
179 struct macsec_key key
;
188 struct macsec_tx_sa_stats __percpu
*stats
;
193 * struct macsec_tx_sc - transmit secure channel
195 * @encoding_sa: association number of the SA currently in use
196 * @encrypt: encrypt packets on transmit, or authenticate only
197 * @send_sci: always include the SCI in the SecTAG
199 * @scb: single copy broadcast flag
200 * @sa: array of secure associations
201 * @stats: stats for this TXSC
202 * @md_dst: MACsec offload metadata dst
204 struct macsec_tx_sc
{
211 struct macsec_tx_sa __rcu
*sa
[MACSEC_NUM_AN
];
212 struct pcpu_tx_sc_stats __percpu
*stats
;
213 struct metadata_dst
*md_dst
;
217 * struct macsec_secy - MACsec Security Entity
218 * @netdev: netdevice for this SecY
219 * @n_rx_sc: number of receive secure channels configured on this SecY
220 * @sci: secure channel identifier used for tx
221 * @key_len: length of keys used by the cipher suite
222 * @icv_len: length of ICV used by the cipher suite
223 * @validate_frames: validation mode
224 * @xpn: enable XPN for this SecY
225 * @operational: MAC_Operational flag
226 * @protect_frames: enable protection for this SecY
227 * @replay_protect: enable packet number checks on receive
228 * @replay_window: size of the replay window
229 * @tx_sc: transmit secure channel
230 * @rx_sc: linked list of receive secure channels
233 struct net_device
*netdev
;
234 unsigned int n_rx_sc
;
238 enum macsec_validation_type validate_frames
;
244 struct macsec_tx_sc tx_sc
;
245 struct macsec_rx_sc __rcu
*rx_sc
;
249 * struct macsec_context - MACsec context for hardware offloading
250 * @netdev: a valid pointer to a struct net_device if @offload ==
252 * @phydev: a valid pointer to a struct phy_device if @offload ==
254 * @offload: MACsec offload status
255 * @secy: pointer to a MACsec SecY
256 * @rx_sc: pointer to a RX SC
257 * @update_pn: when updating the SA, update the next PN
258 * @assoc_num: association number of the target SA
259 * @key: key of the target SA
260 * @rx_sa: pointer to an RX SA if a RX SA is added/updated/removed
261 * @tx_sa: pointer to an TX SA if a TX SA is added/updated/removed
262 * @tx_sc_stats: pointer to TX SC stats structure
263 * @tx_sa_stats: pointer to TX SA stats structure
264 * @rx_sc_stats: pointer to RX SC stats structure
265 * @rx_sa_stats: pointer to RX SA stats structure
266 * @dev_stats: pointer to dev stats structure
268 struct macsec_context
{
270 struct net_device
*netdev
;
271 struct phy_device
*phydev
;
273 enum macsec_offload offload
;
275 struct macsec_secy
*secy
;
276 struct macsec_rx_sc
*rx_sc
;
279 unsigned char assoc_num
;
280 u8 key
[MACSEC_MAX_KEY_LEN
];
282 struct macsec_rx_sa
*rx_sa
;
283 struct macsec_tx_sa
*tx_sa
;
287 struct macsec_tx_sc_stats
*tx_sc_stats
;
288 struct macsec_tx_sa_stats
*tx_sa_stats
;
289 struct macsec_rx_sc_stats
*rx_sc_stats
;
290 struct macsec_rx_sa_stats
*rx_sa_stats
;
291 struct macsec_dev_stats
*dev_stats
;
296 * struct macsec_ops - MACsec offloading operations
297 * @mdo_dev_open: called when the MACsec interface transitions to the up state
298 * @mdo_dev_stop: called when the MACsec interface transitions to the down
300 * @mdo_add_secy: called when a new SecY is added
301 * @mdo_upd_secy: called when the SecY flags are changed or the MAC address of
302 * the MACsec interface is changed
303 * @mdo_del_secy: called when the hw offload is disabled or the MACsec
304 * interface is removed
305 * @mdo_add_rxsc: called when a new RX SC is added
306 * @mdo_upd_rxsc: called when a certain RX SC is updated
307 * @mdo_del_rxsc: called when a certain RX SC is removed
308 * @mdo_add_rxsa: called when a new RX SA is added
309 * @mdo_upd_rxsa: called when a certain RX SA is updated
310 * @mdo_del_rxsa: called when a certain RX SA is removed
311 * @mdo_add_txsa: called when a new TX SA is added
312 * @mdo_upd_txsa: called when a certain TX SA is updated
313 * @mdo_del_txsa: called when a certain TX SA is removed
314 * @mdo_get_dev_stats: called when dev stats are read
315 * @mdo_get_tx_sc_stats: called when TX SC stats are read
316 * @mdo_get_tx_sa_stats: called when TX SA stats are read
317 * @mdo_get_rx_sc_stats: called when RX SC stats are read
318 * @mdo_get_rx_sa_stats: called when RX SA stats are read
319 * @mdo_insert_tx_tag: called to insert the TX tag
320 * @needed_headroom: number of bytes reserved at the beginning of the sk_buff
322 * @needed_tailroom: number of bytes reserved at the end of the sk_buff for the
324 * @rx_uses_md_dst: whether MACsec device offload supports sk_buff md_dst
328 int (*mdo_dev_open
)(struct macsec_context
*ctx
);
329 int (*mdo_dev_stop
)(struct macsec_context
*ctx
);
331 int (*mdo_add_secy
)(struct macsec_context
*ctx
);
332 int (*mdo_upd_secy
)(struct macsec_context
*ctx
);
333 int (*mdo_del_secy
)(struct macsec_context
*ctx
);
334 /* Security channels */
335 int (*mdo_add_rxsc
)(struct macsec_context
*ctx
);
336 int (*mdo_upd_rxsc
)(struct macsec_context
*ctx
);
337 int (*mdo_del_rxsc
)(struct macsec_context
*ctx
);
338 /* Security associations */
339 int (*mdo_add_rxsa
)(struct macsec_context
*ctx
);
340 int (*mdo_upd_rxsa
)(struct macsec_context
*ctx
);
341 int (*mdo_del_rxsa
)(struct macsec_context
*ctx
);
342 int (*mdo_add_txsa
)(struct macsec_context
*ctx
);
343 int (*mdo_upd_txsa
)(struct macsec_context
*ctx
);
344 int (*mdo_del_txsa
)(struct macsec_context
*ctx
);
346 int (*mdo_get_dev_stats
)(struct macsec_context
*ctx
);
347 int (*mdo_get_tx_sc_stats
)(struct macsec_context
*ctx
);
348 int (*mdo_get_tx_sa_stats
)(struct macsec_context
*ctx
);
349 int (*mdo_get_rx_sc_stats
)(struct macsec_context
*ctx
);
350 int (*mdo_get_rx_sa_stats
)(struct macsec_context
*ctx
);
352 int (*mdo_insert_tx_tag
)(struct phy_device
*phydev
,
353 struct sk_buff
*skb
);
354 unsigned int needed_headroom
;
355 unsigned int needed_tailroom
;
359 void macsec_pn_wrapped(struct macsec_secy
*secy
, struct macsec_tx_sa
*tx_sa
);
360 static inline bool macsec_send_sci(const struct macsec_secy
*secy
)
362 const struct macsec_tx_sc
*tx_sc
= &secy
->tx_sc
;
364 return tx_sc
->send_sci
||
365 (secy
->n_rx_sc
> 1 && !tx_sc
->end_station
&& !tx_sc
->scb
);
367 struct net_device
*macsec_get_real_dev(const struct net_device
*dev
);
368 bool macsec_netdev_is_offloaded(struct net_device
*dev
);
370 static inline void *macsec_netdev_priv(const struct net_device
*dev
)
372 #if IS_ENABLED(CONFIG_VLAN_8021Q)
373 if (is_vlan_dev(dev
))
374 return netdev_priv(vlan_dev_priv(dev
)->real_dev
);
376 return netdev_priv(dev
);
379 static inline u64
sci_to_cpu(sci_t sci
)
381 return be64_to_cpu((__force __be64
)sci
);
384 #endif /* _NET_MACSEC_H_ */