2 * Wired Ethernet driver interface for QCA MACsec driver
3 * Copyright (c) 2005-2009, Jouni Malinen <j@w1.fi>
4 * Copyright (c) 2004, Gunter Burchardt <tira@isx.de>
5 * Copyright (c) 2013-2014, Qualcomm Atheros, Inc.
7 * This software may be distributed under the terms of the BSD license.
8 * See README for more details.
12 #include <sys/ioctl.h>
15 #include <netpacket/packet.h>
16 #include <net/if_arp.h>
18 #endif /* __linux__ */
19 #if defined(__FreeBSD__) || defined(__DragonFly__) || defined(__FreeBSD_kernel__)
20 #include <net/if_dl.h>
21 #include <net/if_media.h>
22 #endif /* defined(__FreeBSD__) || defined(__DragonFly__) || defined(__FreeBSD_kernel__) */
24 #include <sys/sockio.h>
27 #include "utils/common.h"
28 #include "utils/eloop.h"
29 #include "common/defs.h"
30 #include "common/ieee802_1x_defs.h"
33 #include "nss_macsec_secy.h"
34 #include "nss_macsec_secy_rx.h"
35 #include "nss_macsec_secy_tx.h"
39 /* TCI field definition */
54 static const u8 pae_group_addr[ETH_ALEN] =
55 { 0x01, 0x80, 0xc2, 0x00, 0x00, 0x03 };
57 struct macsec_qca_data {
58 char ifname[IFNAMSIZ + 1];
62 int sock; /* raw packet socket for driver access */
64 int membership, multi, iff_allmulti, iff_up;
67 Boolean always_include_sci;
70 Boolean protect_frames;
71 Boolean replay_protect;
76 static int macsec_qca_multicast_membership(int sock, int ifindex,
77 const u8 *addr, int add)
80 struct packet_mreq mreq;
85 os_memset(&mreq, 0, sizeof(mreq));
86 mreq.mr_ifindex = ifindex;
87 mreq.mr_type = PACKET_MR_MULTICAST;
88 mreq.mr_alen = ETH_ALEN;
89 os_memcpy(mreq.mr_address, addr, ETH_ALEN);
91 if (setsockopt(sock, SOL_PACKET,
92 add ? PACKET_ADD_MEMBERSHIP : PACKET_DROP_MEMBERSHIP,
93 &mreq, sizeof(mreq)) < 0) {
94 wpa_printf(MSG_ERROR, "setsockopt: %s", strerror(errno));
100 #endif /* __linux__ */
104 static int macsec_qca_get_ssid(void *priv, u8 *ssid)
111 static int macsec_qca_get_bssid(void *priv, u8 *bssid)
113 /* Report PAE group address as the "BSSID" for macsec connection. */
114 os_memcpy(bssid, pae_group_addr, ETH_ALEN);
119 static int macsec_qca_get_capa(void *priv, struct wpa_driver_capa *capa)
121 os_memset(capa, 0, sizeof(*capa));
122 capa->flags = WPA_DRIVER_FLAGS_WIRED;
127 static int macsec_qca_get_ifflags(const char *ifname, int *flags)
132 s = socket(PF_INET, SOCK_DGRAM, 0);
134 wpa_printf(MSG_ERROR, "socket: %s", strerror(errno));
138 os_memset(&ifr, 0, sizeof(ifr));
139 os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
140 if (ioctl(s, SIOCGIFFLAGS, (caddr_t) &ifr) < 0) {
141 wpa_printf(MSG_ERROR, "ioctl[SIOCGIFFLAGS]: %s",
147 *flags = ifr.ifr_flags & 0xffff;
152 static int macsec_qca_set_ifflags(const char *ifname, int flags)
157 s = socket(PF_INET, SOCK_DGRAM, 0);
159 wpa_printf(MSG_ERROR, "socket: %s", strerror(errno));
163 os_memset(&ifr, 0, sizeof(ifr));
164 os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
165 ifr.ifr_flags = flags & 0xffff;
166 if (ioctl(s, SIOCSIFFLAGS, (caddr_t) &ifr) < 0) {
167 wpa_printf(MSG_ERROR, "ioctl[SIOCSIFFLAGS]: %s",
177 #if defined(__FreeBSD__) || defined(__DragonFly__) || defined(__FreeBSD_kernel__)
178 static int macsec_qca_get_ifstatus(const char *ifname, int *status)
180 struct ifmediareq ifmr;
183 s = socket(PF_INET, SOCK_DGRAM, 0);
185 wpa_print(MSG_ERROR, "socket: %s", strerror(errno));
189 os_memset(&ifmr, 0, sizeof(ifmr));
190 os_strlcpy(ifmr.ifm_name, ifname, IFNAMSIZ);
191 if (ioctl(s, SIOCGIFMEDIA, (caddr_t) &ifmr) < 0) {
192 wpa_printf(MSG_ERROR, "ioctl[SIOCGIFMEDIA]: %s",
198 *status = (ifmr.ifm_status & (IFM_ACTIVE | IFM_AVALID)) ==
199 (IFM_ACTIVE | IFM_AVALID);
203 #endif /* defined(__FreeBSD__) || defined(__DragonFly__) || defined(FreeBSD_kernel__) */
206 static int macsec_qca_multi(const char *ifname, const u8 *addr, int add)
215 s = socket(PF_INET, SOCK_DGRAM, 0);
217 wpa_printf(MSG_ERROR, "socket: %s", strerror(errno));
221 os_memset(&ifr, 0, sizeof(ifr));
222 os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
224 ifr.ifr_hwaddr.sa_family = AF_UNSPEC;
225 os_memcpy(ifr.ifr_hwaddr.sa_data, addr, ETH_ALEN);
226 #endif /* __linux__ */
227 #if defined(__FreeBSD__) || defined(__DragonFly__) || defined(__FreeBSD_kernel__)
229 struct sockaddr_dl *dlp;
230 dlp = (struct sockaddr_dl *) &ifr.ifr_addr;
231 dlp->sdl_len = sizeof(struct sockaddr_dl);
232 dlp->sdl_family = AF_LINK;
235 dlp->sdl_alen = ETH_ALEN;
237 os_memcpy(LLADDR(dlp), addr, ETH_ALEN);
239 #endif /* defined(__FreeBSD__) || defined(__DragonFly__) || defined(FreeBSD_kernel__) */
240 #if defined(__NetBSD__) || defined(__OpenBSD__) || defined(__APPLE__)
242 struct sockaddr *sap;
243 sap = (struct sockaddr *) &ifr.ifr_addr;
244 sap->sa_len = sizeof(struct sockaddr);
245 sap->sa_family = AF_UNSPEC;
246 os_memcpy(sap->sa_data, addr, ETH_ALEN);
248 #endif /* defined(__NetBSD__) || defined(__OpenBSD__) || defined(__APPLE__) */
250 if (ioctl(s, add ? SIOCADDMULTI : SIOCDELMULTI, (caddr_t) &ifr) < 0) {
251 wpa_printf(MSG_ERROR, "ioctl[SIOC{ADD/DEL}MULTI]: %s",
261 static void __macsec_drv_init(struct macsec_qca_data *drv)
264 fal_rx_ctl_filt_t rx_ctl_filt;
265 fal_tx_ctl_filt_t tx_ctl_filt;
267 wpa_printf(MSG_INFO, "%s: secy_id=%d", __func__, drv->secy_id);
269 /* Enable Secy and Let EAPoL bypass */
270 ret = nss_macsec_secy_en_set(drv->secy_id, TRUE);
272 wpa_printf(MSG_ERROR, "nss_macsec_secy_en_set: FAIL");
274 ret = nss_macsec_secy_sc_sa_mapping_mode_set(drv->secy_id,
277 wpa_printf(MSG_ERROR,
278 "nss_macsec_secy_sc_sa_mapping_mode_set: FAIL");
280 os_memset(&rx_ctl_filt, 0, sizeof(rx_ctl_filt));
281 rx_ctl_filt.bypass = 1;
282 rx_ctl_filt.match_type = IG_CTL_COMPARE_ETHER_TYPE;
283 rx_ctl_filt.match_mask = 0xffff;
284 rx_ctl_filt.ether_type_da_range = 0x888e;
285 ret = nss_macsec_secy_rx_ctl_filt_set(drv->secy_id, 0, &rx_ctl_filt);
287 wpa_printf(MSG_ERROR, "nss_macsec_secy_rx_ctl_filt_set: FAIL");
289 os_memset(&tx_ctl_filt, 0, sizeof(tx_ctl_filt));
290 tx_ctl_filt.bypass = 1;
291 tx_ctl_filt.match_type = EG_CTL_COMPARE_ETHER_TYPE;
292 tx_ctl_filt.match_mask = 0xffff;
293 tx_ctl_filt.ether_type_da_range = 0x888e;
294 ret = nss_macsec_secy_tx_ctl_filt_set(drv->secy_id, 0, &tx_ctl_filt);
296 wpa_printf(MSG_ERROR, "nss_macsec_secy_tx_ctl_filt_set: FAIL");
300 static void __macsec_drv_deinit(struct macsec_qca_data *drv)
302 nss_macsec_secy_en_set(drv->secy_id, FALSE);
303 nss_macsec_secy_rx_sc_del_all(drv->secy_id);
304 nss_macsec_secy_tx_sc_del_all(drv->secy_id);
308 static void * macsec_qca_init(void *ctx, const char *ifname)
310 struct macsec_qca_data *drv;
313 drv = os_zalloc(sizeof(*drv));
316 os_strlcpy(drv->ifname, ifname, sizeof(drv->ifname));
319 /* Board specific settings */
320 if (os_memcmp("eth2", drv->ifname, 4) == 0)
322 else if (os_memcmp("eth3", drv->ifname, 4) == 0)
328 drv->pf_sock = socket(PF_PACKET, SOCK_DGRAM, 0);
329 if (drv->pf_sock < 0)
330 wpa_printf(MSG_ERROR, "socket(PF_PACKET): %s", strerror(errno));
331 #else /* __linux__ */
333 #endif /* __linux__ */
335 if (macsec_qca_get_ifflags(ifname, &flags) == 0 &&
337 macsec_qca_set_ifflags(ifname, flags | IFF_UP) == 0) {
341 if (macsec_qca_multicast_membership(drv->pf_sock,
342 if_nametoindex(drv->ifname),
343 pae_group_addr, 1) == 0) {
344 wpa_printf(MSG_DEBUG,
345 "%s: Added multicast membership with packet socket",
348 } else if (macsec_qca_multi(ifname, pae_group_addr, 1) == 0) {
349 wpa_printf(MSG_DEBUG,
350 "%s: Added multicast membership with SIOCADDMULTI",
353 } else if (macsec_qca_get_ifflags(ifname, &flags) < 0) {
354 wpa_printf(MSG_INFO, "%s: Could not get interface flags",
358 } else if (flags & IFF_ALLMULTI) {
359 wpa_printf(MSG_DEBUG,
360 "%s: Interface is already configured for multicast",
362 } else if (macsec_qca_set_ifflags(ifname, flags | IFF_ALLMULTI) < 0) {
363 wpa_printf(MSG_INFO, "%s: Failed to enable allmulti",
368 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode", __func__);
369 drv->iff_allmulti = 1;
371 #if defined(__FreeBSD__) || defined(__DragonFly__) || defined(__FreeBSD_kernel__)
374 wpa_printf(MSG_DEBUG, "%s: waiting for link to become active",
376 while (macsec_qca_get_ifstatus(ifname, &status) == 0 &&
380 #endif /* defined(__FreeBSD__) || defined(__DragonFly__) || defined(FreeBSD_kernel__) */
386 static void macsec_qca_deinit(void *priv)
388 struct macsec_qca_data *drv = priv;
391 if (drv->membership &&
392 macsec_qca_multicast_membership(drv->pf_sock,
393 if_nametoindex(drv->ifname),
394 pae_group_addr, 0) < 0) {
395 wpa_printf(MSG_DEBUG,
396 "%s: Failed to remove PAE multicast group (PACKET)",
401 macsec_qca_multi(drv->ifname, pae_group_addr, 0) < 0) {
402 wpa_printf(MSG_DEBUG,
403 "%s: Failed to remove PAE multicast group (SIOCDELMULTI)",
407 if (drv->iff_allmulti &&
408 (macsec_qca_get_ifflags(drv->ifname, &flags) < 0 ||
409 macsec_qca_set_ifflags(drv->ifname, flags & ~IFF_ALLMULTI) < 0)) {
410 wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode",
415 macsec_qca_get_ifflags(drv->ifname, &flags) == 0 &&
417 macsec_qca_set_ifflags(drv->ifname, flags & ~IFF_UP) < 0) {
418 wpa_printf(MSG_DEBUG, "%s: Failed to set the interface down",
422 if (drv->pf_sock != -1)
429 static int macsec_qca_macsec_init(void *priv, struct macsec_init_params *params)
431 struct macsec_qca_data *drv = priv;
433 drv->always_include_sci = params->always_include_sci;
434 drv->use_es = params->use_es;
435 drv->use_scb = params->use_scb;
437 wpa_printf(MSG_DEBUG, "%s: es=%d, scb=%d, sci=%d",
438 __func__, drv->use_es, drv->use_scb,
439 drv->always_include_sci);
441 __macsec_drv_init(drv);
447 static int macsec_qca_macsec_deinit(void *priv)
449 struct macsec_qca_data *drv = priv;
451 wpa_printf(MSG_DEBUG, "%s", __func__);
453 __macsec_drv_deinit(drv);
459 static int macsec_qca_enable_protect_frames(void *priv, Boolean enabled)
461 struct macsec_qca_data *drv = priv;
464 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
466 drv->protect_frames = enabled;
472 static int macsec_qca_set_replay_protect(void *priv, Boolean enabled,
475 struct macsec_qca_data *drv = priv;
478 wpa_printf(MSG_DEBUG, "%s: enabled=%d, win=%u",
479 __func__, enabled, window);
481 drv->replay_protect = enabled;
482 drv->replay_window = window;
488 static int macsec_qca_set_current_cipher_suite(void *priv, const u8 *cs,
491 u8 default_cs_id[] = CS_ID_GCM_AES_128;
493 if (cs_len != CS_ID_LEN ||
494 os_memcmp(cs, default_cs_id, cs_len) != 0) {
495 wpa_hexdump(MSG_ERROR, "macsec: NOT supported CipherSuite",
500 /* Support default Cipher Suite 0080020001000001 (GCM-AES-128) */
501 wpa_printf(MSG_DEBUG, "%s: default support aes-gcm-128", __func__);
507 static int macsec_qca_enable_controlled_port(void *priv, Boolean enabled)
509 struct macsec_qca_data *drv = priv;
512 wpa_printf(MSG_DEBUG, "%s: enable=%d", __func__, enabled);
514 ret += nss_macsec_secy_controlled_port_en_set(drv->secy_id, enabled);
520 static int macsec_qca_get_receive_lowest_pn(void *priv, u32 channel, u8 an,
523 struct macsec_qca_data *drv = priv;
526 bool enabled = FALSE;
529 ret += nss_macsec_secy_rx_sa_next_pn_get(drv->secy_id, channel, an,
531 ret += nss_macsec_secy_rx_sc_replay_protect_get(drv->secy_id, channel,
533 ret += nss_macsec_secy_rx_sc_anti_replay_window_get(drv->secy_id,
537 *lowest_pn = (next_pn > win) ? (next_pn - win) : 1;
539 *lowest_pn = next_pn;
541 wpa_printf(MSG_DEBUG, "%s: lpn=0x%x", __func__, *lowest_pn);
547 static int macsec_qca_get_transmit_next_pn(void *priv, u32 channel, u8 an,
550 struct macsec_qca_data *drv = priv;
553 ret += nss_macsec_secy_tx_sa_next_pn_get(drv->secy_id, channel, an,
556 wpa_printf(MSG_DEBUG, "%s: npn=0x%x", __func__, *next_pn);
562 int macsec_qca_set_transmit_next_pn(void *priv, u32 channel, u8 an, u32 next_pn)
564 struct macsec_qca_data *drv = priv;
567 ret += nss_macsec_secy_tx_sa_next_pn_set(drv->secy_id, channel, an,
570 wpa_printf(MSG_INFO, "%s: npn=0x%x", __func__, next_pn);
576 static int macsec_qca_get_available_receive_sc(void *priv, u32 *channel)
578 struct macsec_qca_data *drv = priv;
583 for (sc_ch = 0; sc_ch < MAXSC; sc_ch++) {
584 ret = nss_macsec_secy_rx_sc_in_used_get(drv->secy_id, sc_ch,
591 wpa_printf(MSG_DEBUG, "%s: channel=%d",
597 wpa_printf(MSG_DEBUG, "%s: no available channel", __func__);
603 static int macsec_qca_create_receive_sc(void *priv, u32 channel,
604 const u8 *sci_addr, u16 sci_port,
605 unsigned int conf_offset,
608 struct macsec_qca_data *drv = priv;
610 fal_rx_prc_lut_t entry;
611 fal_rx_sc_validate_frame_e vf;
612 enum validate_frames validate_frames = validation;
614 wpa_printf(MSG_DEBUG, "%s: channel=%d", __func__, channel);
617 os_memset(&entry, 0, sizeof(entry));
619 os_memcpy(entry.sci, sci_addr, ETH_ALEN);
620 entry.sci[6] = (sci_port >> 8) & 0xf;
621 entry.sci[7] = sci_port & 0xf;
622 entry.sci_mask = 0xf;
625 entry.channel = channel;
626 entry.action = FAL_RX_PRC_ACTION_PROCESS;
627 entry.offset = conf_offset;
629 /* rx validate frame */
630 if (validate_frames == Strict)
631 vf = FAL_RX_SC_VALIDATE_FRAME_STRICT;
632 else if (validate_frames == Checked)
633 vf = FAL_RX_SC_VALIDATE_FRAME_CHECK;
635 vf = FAL_RX_SC_VALIDATE_FRAME_DISABLED;
637 ret += nss_macsec_secy_rx_prc_lut_set(drv->secy_id, channel, &entry);
638 ret += nss_macsec_secy_rx_sc_create(drv->secy_id, channel);
639 ret += nss_macsec_secy_rx_sc_validate_frame_set(drv->secy_id, channel,
641 ret += nss_macsec_secy_rx_sc_replay_protect_set(drv->secy_id, channel,
642 drv->replay_protect);
643 ret += nss_macsec_secy_rx_sc_anti_replay_window_set(drv->secy_id,
651 static int macsec_qca_delete_receive_sc(void *priv, u32 channel)
653 struct macsec_qca_data *drv = priv;
655 fal_rx_prc_lut_t entry;
657 wpa_printf(MSG_DEBUG, "%s: channel=%d", __func__, channel);
660 os_memset(&entry, 0, sizeof(entry));
662 ret += nss_macsec_secy_rx_sc_del(drv->secy_id, channel);
663 ret += nss_macsec_secy_rx_prc_lut_set(drv->secy_id, channel, &entry);
669 static int macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an,
670 u32 lowest_pn, const u8 *sak)
672 struct macsec_qca_data *drv = priv;
677 wpa_printf(MSG_DEBUG, "%s, channel=%d, an=%d, lpn=0x%x",
678 __func__, channel, an, lowest_pn);
680 os_memset(&rx_sak, 0, sizeof(rx_sak));
681 for (i = 0; i < 16; i++)
682 rx_sak.sak[i] = sak[15 - i];
684 ret += nss_macsec_secy_rx_sa_create(drv->secy_id, channel, an);
685 ret += nss_macsec_secy_rx_sak_set(drv->secy_id, channel, an, &rx_sak);
691 static int macsec_qca_enable_receive_sa(void *priv, u32 channel, u8 an)
693 struct macsec_qca_data *drv = priv;
696 wpa_printf(MSG_DEBUG, "%s: channel=%d, an=%d", __func__, channel, an);
698 ret += nss_macsec_secy_rx_sa_en_set(drv->secy_id, channel, an, TRUE);
704 static int macsec_qca_disable_receive_sa(void *priv, u32 channel, u8 an)
706 struct macsec_qca_data *drv = priv;
709 wpa_printf(MSG_DEBUG, "%s: channel=%d, an=%d", __func__, channel, an);
711 ret += nss_macsec_secy_rx_sa_en_set(drv->secy_id, channel, an, FALSE);
717 static int macsec_qca_get_available_transmit_sc(void *priv, u32 *channel)
719 struct macsec_qca_data *drv = priv;
724 for (sc_ch = 0; sc_ch < MAXSC; sc_ch++) {
725 ret = nss_macsec_secy_tx_sc_in_used_get(drv->secy_id, sc_ch,
732 wpa_printf(MSG_DEBUG, "%s: channel=%d",
738 wpa_printf(MSG_DEBUG, "%s: no avaiable channel", __func__);
744 static int macsec_qca_create_transmit_sc(void *priv, u32 channel,
745 const u8 *sci_addr, u16 sci_port,
746 unsigned int conf_offset)
748 struct macsec_qca_data *drv = priv;
750 fal_tx_class_lut_t entry;
751 u8 psci[ETH_ALEN + 2];
753 wpa_printf(MSG_DEBUG, "%s: channel=%d", __func__, channel);
756 os_memset(&entry, 0, sizeof(entry));
759 entry.action = FAL_TX_CLASS_ACTION_FORWARD;
760 entry.channel = channel;
762 os_memcpy(psci, sci_addr, ETH_ALEN);
763 psci[6] = (sci_port >> 8) & 0xf;
764 psci[7] = sci_port & 0xf;
766 ret += nss_macsec_secy_tx_class_lut_set(drv->secy_id, channel, &entry);
767 ret += nss_macsec_secy_tx_sc_create(drv->secy_id, channel, psci, 8);
768 ret += nss_macsec_secy_tx_sc_protect_set(drv->secy_id, channel,
769 drv->protect_frames);
770 ret += nss_macsec_secy_tx_sc_confidentiality_offset_set(drv->secy_id,
778 static int macsec_qca_delete_transmit_sc(void *priv, u32 channel)
780 struct macsec_qca_data *drv = priv;
782 fal_tx_class_lut_t entry;
784 wpa_printf(MSG_DEBUG, "%s: channel=%d", __func__, channel);
787 os_memset(&entry, 0, sizeof(entry));
789 ret += nss_macsec_secy_tx_class_lut_set(drv->secy_id, channel, &entry);
790 ret += nss_macsec_secy_tx_sc_del(drv->secy_id, channel);
796 static int macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an,
797 u32 next_pn, Boolean confidentiality,
800 struct macsec_qca_data *drv = priv;
806 wpa_printf(MSG_DEBUG,
807 "%s: channel=%d, an=%d, next_pn=0x%x, confidentiality=%d",
808 __func__, channel, an, next_pn, confidentiality);
810 if (drv->always_include_sci)
812 else if (drv->use_es)
814 else if (drv->use_scb)
818 tci |= TCI_E | TCI_C;
820 os_memset(&tx_sak, 0, sizeof(tx_sak));
821 for (i = 0; i < 16; i++)
822 tx_sak.sak[i] = sak[15 - i];
824 ret += nss_macsec_secy_tx_sa_next_pn_set(drv->secy_id, channel, an,
826 ret += nss_macsec_secy_tx_sak_set(drv->secy_id, channel, an, &tx_sak);
827 ret += nss_macsec_secy_tx_sc_tci_7_2_set(drv->secy_id, channel,
829 ret += nss_macsec_secy_tx_sc_an_set(drv->secy_id, channel, an);
835 static int macsec_qca_enable_transmit_sa(void *priv, u32 channel, u8 an)
837 struct macsec_qca_data *drv = priv;
840 wpa_printf(MSG_DEBUG, "%s: channel=%d, an=%d", __func__, channel, an);
842 ret += nss_macsec_secy_tx_sa_en_set(drv->secy_id, channel, an, TRUE);
848 static int macsec_qca_disable_transmit_sa(void *priv, u32 channel, u8 an)
850 struct macsec_qca_data *drv = priv;
853 wpa_printf(MSG_DEBUG, "%s: channel=%d, an=%d", __func__, channel, an);
855 ret += nss_macsec_secy_tx_sa_en_set(drv->secy_id, channel, an, FALSE);
861 const struct wpa_driver_ops wpa_driver_macsec_qca_ops = {
862 .name = "macsec_qca",
863 .desc = "QCA MACsec Ethernet driver",
864 .get_ssid = macsec_qca_get_ssid,
865 .get_bssid = macsec_qca_get_bssid,
866 .get_capa = macsec_qca_get_capa,
867 .init = macsec_qca_init,
868 .deinit = macsec_qca_deinit,
870 .macsec_init = macsec_qca_macsec_init,
871 .macsec_deinit = macsec_qca_macsec_deinit,
872 .enable_protect_frames = macsec_qca_enable_protect_frames,
873 .set_replay_protect = macsec_qca_set_replay_protect,
874 .set_current_cipher_suite = macsec_qca_set_current_cipher_suite,
875 .enable_controlled_port = macsec_qca_enable_controlled_port,
876 .get_receive_lowest_pn = macsec_qca_get_receive_lowest_pn,
877 .get_transmit_next_pn = macsec_qca_get_transmit_next_pn,
878 .set_transmit_next_pn = macsec_qca_set_transmit_next_pn,
879 .get_available_receive_sc = macsec_qca_get_available_receive_sc,
880 .create_receive_sc = macsec_qca_create_receive_sc,
881 .delete_receive_sc = macsec_qca_delete_receive_sc,
882 .create_receive_sa = macsec_qca_create_receive_sa,
883 .enable_receive_sa = macsec_qca_enable_receive_sa,
884 .disable_receive_sa = macsec_qca_disable_receive_sa,
885 .get_available_transmit_sc = macsec_qca_get_available_transmit_sc,
886 .create_transmit_sc = macsec_qca_create_transmit_sc,
887 .delete_transmit_sc = macsec_qca_delete_transmit_sc,
888 .create_transmit_sa = macsec_qca_create_transmit_sa,
889 .enable_transmit_sa = macsec_qca_enable_transmit_sa,
890 .disable_transmit_sa = macsec_qca_disable_transmit_sa,