Linux Audio

Check our new training course

Loading...
v3.1
  1/******************************************************************************
  2 * ieee80211.c
  3 *
  4 * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
  5 * Linux device driver for RTL8192SU
  6 *
  7 * This program is free software; you can redistribute it and/or modify it
  8 * under the terms of version 2 of the GNU General Public License as
  9 * published by the Free Software Foundation.
 10 *
 11 * This program is distributed in the hope that it will be useful, but WITHOUT
 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 13 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
 14 * more details.
 15 *
 16 * You should have received a copy of the GNU General Public License along with
 17 * this program; if not, write to the Free Software Foundation, Inc.,
 18 * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
 19 *
 20 * Modifications for inclusion into the Linux staging tree are
 21 * Copyright(c) 2010 Larry Finger. All rights reserved.
 22 *
 23 * Contact information:
 24 * WLAN FAE <wlanfae@realtek.com>.
 25 * Larry Finger <Larry.Finger@lwfinger.net>
 26 *
 27 ******************************************************************************/
 28
 29#define _IEEE80211_C
 30
 31#include "drv_types.h"
 32#include "ieee80211.h"
 33#include "wifi.h"
 34#include "osdep_service.h"
 35#include "wlan_bssdef.h"
 36
 37static const u8 WPA_OUI_TYPE[] = {0x00, 0x50, 0xf2, 1};
 38static const u8 WPA_CIPHER_SUITE_NONE[] = {0x00, 0x50, 0xf2, 0};
 39static const u8 WPA_CIPHER_SUITE_WEP40[] = {0x00, 0x50, 0xf2, 1};
 40static const u8 WPA_CIPHER_SUITE_TKIP[] = {0x00, 0x50, 0xf2, 2};
 41static const u8 WPA_CIPHER_SUITE_CCMP[] = {0x00, 0x50, 0xf2, 4};
 42static const u8 WPA_CIPHER_SUITE_WEP104[] = {0x00, 0x50, 0xf2, 5};
 43
 44static const u8 RSN_CIPHER_SUITE_NONE[] = {0x00, 0x0f, 0xac, 0};
 45static const u8 RSN_CIPHER_SUITE_WEP40[] = {0x00, 0x0f, 0xac, 1};
 46static const u8 RSN_CIPHER_SUITE_TKIP[] = {0x00, 0x0f, 0xac, 2};
 47static const u8 RSN_CIPHER_SUITE_CCMP[] = {0x00, 0x0f, 0xac, 4};
 48static const u8 RSN_CIPHER_SUITE_WEP104[] = {0x00, 0x0f, 0xac, 5};
 49
 50/*-----------------------------------------------------------
 51 * for adhoc-master to generate ie and provide supported-rate to fw
 52 *-----------------------------------------------------------
 53 */
 54
 55static u8 WIFI_CCKRATES[] =  {
 56	(IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK),
 57	(IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK),
 58	(IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK),
 59	(IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK)
 60};
 61
 62static u8 WIFI_OFDMRATES[] = {
 63	(IEEE80211_OFDM_RATE_6MB),
 64	(IEEE80211_OFDM_RATE_9MB),
 65	(IEEE80211_OFDM_RATE_12MB),
 66	(IEEE80211_OFDM_RATE_18MB),
 67	(IEEE80211_OFDM_RATE_24MB),
 68	(IEEE80211_OFDM_RATE_36MB),
 69	(IEEE80211_OFDM_RATE_48MB),
 70	(IEEE80211_OFDM_RATE_54MB)
 71};
 72
 73uint r8712_is_cckrates_included(u8 *rate)
 74{
 75	u32 i = 0;
 76
 77	while (rate[i] != 0) {
 78		if ((((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) ||
 79		    (((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22))
 80			return true;
 81			i++;
 82		}
 83		return false;
 84}
 85
 86uint r8712_is_cckratesonly_included(u8 *rate)
 87{
 88	u32 i = 0;
 89
 90	while (rate[i] != 0) {
 91		if ((((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) &&
 92		    (((rate[i]) & 0x7f) != 11)  && (((rate[i]) & 0x7f) != 22))
 93			return false;
 94		i++;
 95	}
 96	return true;
 97}
 98
 99/* r8712_set_ie will update frame length */
100u8 *r8712_set_ie(u8 *pbuf, sint index, uint len, u8 *source, uint *frlen)
101{
102	*pbuf = (u8)index;
103	*(pbuf + 1) = (u8)len;
104	if (len > 0)
105		memcpy((void *)(pbuf + 2), (void *)source, len);
106	*frlen = *frlen + (len + 2);
107	return pbuf + len + 2;
108}
109
110/*----------------------------------------------------------------------------
111index: the information element id index, limit is the limit for search
112-----------------------------------------------------------------------------*/
113u8 *r8712_get_ie(u8 *pbuf, sint index, sint *len, sint limit)
114{
115	sint tmp, i;
116	u8 *p;
117
118	if (limit < 1)
119		return NULL;
120	p = pbuf;
121	i = 0;
122	*len = 0;
123	while (1) {
124		if (*p == index) {
125			*len = *(p + 1);
126			return p;
127		} else {
128			tmp = *(p + 1);
129			p += (tmp + 2);
130			i += (tmp + 2);
131		}
132		if (i >= limit)
133			break;
134	}
135	return NULL;
136}
137
138static void set_supported_rate(u8 *SupportedRates, uint mode)
139{
140	memset(SupportedRates, 0, NDIS_802_11_LENGTH_RATES_EX);
141	switch (mode) {
142	case WIRELESS_11B:
143		memcpy(SupportedRates, WIFI_CCKRATES,
144			IEEE80211_CCK_RATE_LEN);
145		break;
146	case WIRELESS_11G:
147	case WIRELESS_11A:
148		memcpy(SupportedRates, WIFI_OFDMRATES,
149			IEEE80211_NUM_OFDM_RATESLEN);
150		break;
151	case WIRELESS_11BG:
152		memcpy(SupportedRates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
153		memcpy(SupportedRates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES,
154			IEEE80211_NUM_OFDM_RATESLEN);
155		break;
156	}
157}
158
159static uint r8712_get_rateset_len(u8 *rateset)
160{
161	uint i = 0;
162
163	while (1) {
164		if ((rateset[i]) == 0)
165			break;
166		if (i > 12)
167			break;
168		i++;
169	}
170	return i;
171}
172
173int r8712_generate_ie(struct registry_priv *pregistrypriv,
174		      struct _adapter *padapter)
175{
176	int sz = 0, rateLen;
177	struct wlan_bssid_ex *pdev_network = &pregistrypriv->dev_network;
178	u8 *ie = pdev_network->IEs;
179	struct ieee80211_ht_cap ht_capie;
180	struct ieee80211_ht_addt_info ht_addt_info;
181	unsigned char WMM_IE[] = {0x00, 0x50, 0xf2, 0x02, 0x00, 0x01, 0x00};
182	struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
183	struct qos_priv *pqospriv = &pmlmepriv->qospriv;
184
185	/*timestamp will be inserted by hardware*/
186	sz += 8;
187	ie += sz;
188	/*beacon interval : 2bytes*/
189	*(u16 *)ie = cpu_to_le16((u16)pdev_network->Configuration.BeaconPeriod);
190	sz += 2;
191	ie += 2;
192	/*capability info*/
193	*(u16 *)ie = 0;
194	*(u16 *)ie |= cpu_to_le16(cap_IBSS);
195	if (pregistrypriv->preamble == PREAMBLE_SHORT)
196		*(u16 *)ie |= cpu_to_le16(cap_ShortPremble);
197	if (pdev_network->Privacy)
198		*(u16 *)ie |= cpu_to_le16(cap_Privacy);
199	sz += 2;
200	ie += 2;
201	/*SSID*/
202	ie = r8712_set_ie(ie, _SSID_IE_, pdev_network->Ssid.SsidLength,
203		    pdev_network->Ssid.Ssid, &sz);
204	/*supported rates*/
205	set_supported_rate(pdev_network->SupportedRates,
206			   pregistrypriv->wireless_mode);
207	rateLen = r8712_get_rateset_len(pdev_network->SupportedRates);
208	if (rateLen > 8) {
209		ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_, 8,
210			    pdev_network->SupportedRates, &sz);
211		ie = r8712_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rateLen - 8),
212			    (pdev_network->SupportedRates + 8), &sz);
213	} else
214		ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_,
215			    rateLen, pdev_network->SupportedRates, &sz);
216	/*DS parameter set*/
217	ie = r8712_set_ie(ie, _DSSET_IE_, 1,
218		    (u8 *)&(pdev_network->Configuration.DSConfig), &sz);
219	/*IBSS Parameter Set*/
220	ie = r8712_set_ie(ie, _IBSS_PARA_IE_, 2,
221		    (u8 *)&(pdev_network->Configuration.ATIMWindow), &sz);
222	if (pregistrypriv->ht_enable == 1) {
223		if (pqospriv->qos_option == 0) {
224			ie = r8712_set_ie(ie, _VENDOR_SPECIFIC_IE_,
225					   _WMM_IE_Length_, WMM_IE, &sz);
226			pqospriv->qos_option = 1;
227		}
228		memset(&ht_capie, 0, sizeof(struct ieee80211_ht_cap));
229		ht_capie.cap_info = IEEE80211_HT_CAP_SUP_WIDTH |
230				    IEEE80211_HT_CAP_SGI_20 |
231				    IEEE80211_HT_CAP_SGI_40 |
232				    IEEE80211_HT_CAP_TX_STBC |
233				    IEEE80211_HT_CAP_MAX_AMSDU |
234				    IEEE80211_HT_CAP_DSSSCCK40;
235		ht_capie.ampdu_params_info = (IEEE80211_HT_CAP_AMPDU_FACTOR &
236				0x03) | (IEEE80211_HT_CAP_AMPDU_DENSITY & 0x00);
237		ie = r8712_set_ie(ie, _HT_CAPABILITY_IE_,
238			    sizeof(struct ieee80211_ht_cap),
239			    (unsigned char *)&ht_capie, &sz);
240		/*add HT info ie*/
241		memset(&ht_addt_info, 0,
242			sizeof(struct ieee80211_ht_addt_info));
243		/*need to add the HT additional IEs*/
244		ht_addt_info.control_chan = pregistrypriv->channel;
245		ie = r8712_set_ie(ie, _HT_ADD_INFO_IE_,
246			    sizeof(struct ieee80211_ht_addt_info),
247			    (unsigned char *)&ht_addt_info, &sz);
248	}
249	return sz;
250}
251
252unsigned char *r8712_get_wpa_ie(unsigned char *pie, int *wpa_ie_len, int limit)
253{
254	int len;
255	u16 val16;
256	unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01};
257	u8 *pbuf = pie;
258
259	while (1) {
260		pbuf = r8712_get_ie(pbuf, _WPA_IE_ID_, &len, limit);
261		if (pbuf) {
262			/*check if oui matches...*/
263			if (memcmp((pbuf + 2), wpa_oui_type,
264			    sizeof(wpa_oui_type)))
265				goto check_next_ie;
266			/*check version...*/
267			memcpy((u8 *)&val16, (pbuf + 6), sizeof(val16));
268			val16 = le16_to_cpu(val16);
269			if (val16 != 0x0001)
270				goto check_next_ie;
271			*wpa_ie_len = *(pbuf + 1);
272			return pbuf;
273		} else {
274			*wpa_ie_len = 0;
275			return NULL;
276		}
277check_next_ie:
278		limit = limit - (pbuf - pie) - 2 - len;
279		if (limit <= 0)
280			break;
281		pbuf += (2 + len);
282	}
283	*wpa_ie_len = 0;
284	return NULL;
285}
286
287unsigned char *r8712_get_wpa2_ie(unsigned char *pie, int *rsn_ie_len, int limit)
288{
289	return r8712_get_ie(pie, _WPA2_IE_ID_, rsn_ie_len, limit);
290}
291
292static int r8712_get_wpa_cipher_suite(u8 *s)
293{
294	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN))
295		return WPA_CIPHER_NONE;
296	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN))
297		return WPA_CIPHER_WEP40;
298	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN))
299		return WPA_CIPHER_TKIP;
300	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN))
301		return WPA_CIPHER_CCMP;
302	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN))
303		return WPA_CIPHER_WEP104;
304	return 0;
305}
306
307static int r8712_get_wpa2_cipher_suite(u8 *s)
308{
309	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN))
310		return WPA_CIPHER_NONE;
311	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN))
312		return WPA_CIPHER_WEP40;
313	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN))
314		return WPA_CIPHER_TKIP;
315	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN))
316		return WPA_CIPHER_CCMP;
317	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN))
318		return WPA_CIPHER_WEP104;
319	return 0;
320}
321
322int r8712_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher,
323		 int *pairwise_cipher)
324{
325	int i, ret = _SUCCESS;
326	int left, count;
327	u8 *pos;
328
329	if (wpa_ie_len <= 0) {
330		/* No WPA IE - fail silently */
331		return _FAIL;
332	}
333	if ((*wpa_ie != _WPA_IE_ID_) || (*(wpa_ie + 1) != (u8)(wpa_ie_len - 2))
334	     || (memcmp(wpa_ie + 2, (void *)WPA_OUI_TYPE, WPA_SELECTOR_LEN)))
335		return _FAIL;
336	pos = wpa_ie;
337	pos += 8;
338	left = wpa_ie_len - 8;
339	/*group_cipher*/
340	if (left >= WPA_SELECTOR_LEN) {
341		*group_cipher = r8712_get_wpa_cipher_suite(pos);
342		pos += WPA_SELECTOR_LEN;
343		left -= WPA_SELECTOR_LEN;
344	} else if (left > 0)
345		return _FAIL;
346	/*pairwise_cipher*/
347	if (left >= 2) {
348		count = le16_to_cpu(*(u16 *)pos);
349		pos += 2;
350		left -= 2;
351		if (count == 0 || left < count * WPA_SELECTOR_LEN)
352			return _FAIL;
353		for (i = 0; i < count; i++) {
354			*pairwise_cipher |= r8712_get_wpa_cipher_suite(pos);
355			pos += WPA_SELECTOR_LEN;
356			left -= WPA_SELECTOR_LEN;
357		}
358	} else if (left == 1)
359		return _FAIL;
360	return ret;
361}
362
363int r8712_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher,
364		  int *pairwise_cipher)
365{
366	int i, ret = _SUCCESS;
367	int left, count;
368	u8 *pos;
369
370	if (rsn_ie_len <= 0) {
371		/* No RSN IE - fail silently */
372		return _FAIL;
373	}
374	if ((*rsn_ie != _WPA2_IE_ID_) || (*(rsn_ie+1) != (u8)(rsn_ie_len - 2)))
375		return _FAIL;
376	pos = rsn_ie;
377	pos += 4;
378	left = rsn_ie_len - 4;
379	/*group_cipher*/
380	if (left >= RSN_SELECTOR_LEN) {
381		*group_cipher = r8712_get_wpa2_cipher_suite(pos);
382		pos += RSN_SELECTOR_LEN;
383		left -= RSN_SELECTOR_LEN;
384	} else if (left > 0)
385		return _FAIL;
386	/*pairwise_cipher*/
387	if (left >= 2) {
388		count = le16_to_cpu(*(u16 *)pos);
389		pos += 2;
390		left -= 2;
391		if (count == 0 || left < count * RSN_SELECTOR_LEN)
392			return _FAIL;
393		for (i = 0; i < count; i++) {
394			*pairwise_cipher |= r8712_get_wpa2_cipher_suite(pos);
395			pos += RSN_SELECTOR_LEN;
396			left -= RSN_SELECTOR_LEN;
397		}
398	} else if (left == 1)
399		return _FAIL;
400	return ret;
401}
402
403int r8712_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len,
404	       u8 *wpa_ie, u16 *wpa_len)
405{
406	u8 authmode, sec_idx;
407	u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01};
408	uint cnt;
409
410	/*Search required WPA or WPA2 IE and copy to sec_ie[ ]*/
411	cnt = (_TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_);
412	sec_idx = 0;
413	while (cnt < in_len) {
414		authmode = in_ie[cnt];
415		if ((authmode == _WPA_IE_ID_) &&
416		    (!memcmp(&in_ie[cnt + 2], &wpa_oui[0], 4))) {
417			memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
418			*wpa_len = in_ie[cnt+1]+2;
419			cnt += in_ie[cnt + 1] + 2;  /*get next */
420		} else {
421			if (authmode == _WPA2_IE_ID_) {
422				memcpy(rsn_ie, &in_ie[cnt],
423					in_ie[cnt + 1] + 2);
424				*rsn_len = in_ie[cnt+1] + 2;
425				cnt += in_ie[cnt+1] + 2;  /*get next*/
426			} else
427				cnt += in_ie[cnt+1] + 2;   /*get next*/
428		}
429	}
430	return *rsn_len + *wpa_len;
431}
432
433int r8712_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen)
434{
435	int match;
436	uint cnt;
437	u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
438
439	cnt = 12;
440	match = false;
441	while (cnt < in_len) {
442		eid = in_ie[cnt];
443		if ((eid == _WPA_IE_ID_) &&
444		    (!memcmp(&in_ie[cnt+2], wps_oui, 4))) {
445			memcpy(wps_ie, &in_ie[cnt], in_ie[cnt+1]+2);
446			*wps_ielen = in_ie[cnt+1]+2;
447			cnt += in_ie[cnt+1]+2;
448			match = true;
449			break;
450		} else
451			cnt += in_ie[cnt+1]+2; /* goto next */
452	}
453	return match;
454}
v3.5.6
  1/******************************************************************************
  2 * ieee80211.c
  3 *
  4 * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
  5 * Linux device driver for RTL8192SU
  6 *
  7 * This program is free software; you can redistribute it and/or modify it
  8 * under the terms of version 2 of the GNU General Public License as
  9 * published by the Free Software Foundation.
 10 *
 11 * This program is distributed in the hope that it will be useful, but WITHOUT
 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 13 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
 14 * more details.
 15 *
 16 * You should have received a copy of the GNU General Public License along with
 17 * this program; if not, write to the Free Software Foundation, Inc.,
 18 * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
 19 *
 20 * Modifications for inclusion into the Linux staging tree are
 21 * Copyright(c) 2010 Larry Finger. All rights reserved.
 22 *
 23 * Contact information:
 24 * WLAN FAE <wlanfae@realtek.com>.
 25 * Larry Finger <Larry.Finger@lwfinger.net>
 26 *
 27 ******************************************************************************/
 28
 29#define _IEEE80211_C
 30
 31#include "drv_types.h"
 32#include "ieee80211.h"
 33#include "wifi.h"
 34#include "osdep_service.h"
 35#include "wlan_bssdef.h"
 36
 37static const u8 WPA_OUI_TYPE[] = {0x00, 0x50, 0xf2, 1};
 38static const u8 WPA_CIPHER_SUITE_NONE[] = {0x00, 0x50, 0xf2, 0};
 39static const u8 WPA_CIPHER_SUITE_WEP40[] = {0x00, 0x50, 0xf2, 1};
 40static const u8 WPA_CIPHER_SUITE_TKIP[] = {0x00, 0x50, 0xf2, 2};
 41static const u8 WPA_CIPHER_SUITE_CCMP[] = {0x00, 0x50, 0xf2, 4};
 42static const u8 WPA_CIPHER_SUITE_WEP104[] = {0x00, 0x50, 0xf2, 5};
 43
 44static const u8 RSN_CIPHER_SUITE_NONE[] = {0x00, 0x0f, 0xac, 0};
 45static const u8 RSN_CIPHER_SUITE_WEP40[] = {0x00, 0x0f, 0xac, 1};
 46static const u8 RSN_CIPHER_SUITE_TKIP[] = {0x00, 0x0f, 0xac, 2};
 47static const u8 RSN_CIPHER_SUITE_CCMP[] = {0x00, 0x0f, 0xac, 4};
 48static const u8 RSN_CIPHER_SUITE_WEP104[] = {0x00, 0x0f, 0xac, 5};
 49
 50/*-----------------------------------------------------------
 51 * for adhoc-master to generate ie and provide supported-rate to fw
 52 *-----------------------------------------------------------
 53 */
 54
 55static u8 WIFI_CCKRATES[] =  {
 56	(IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK),
 57	(IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK),
 58	(IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK),
 59	(IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK)
 60};
 61
 62static u8 WIFI_OFDMRATES[] = {
 63	(IEEE80211_OFDM_RATE_6MB),
 64	(IEEE80211_OFDM_RATE_9MB),
 65	(IEEE80211_OFDM_RATE_12MB),
 66	(IEEE80211_OFDM_RATE_18MB),
 67	(IEEE80211_OFDM_RATE_24MB),
 68	(IEEE80211_OFDM_RATE_36MB),
 69	(IEEE80211_OFDM_RATE_48MB),
 70	(IEEE80211_OFDM_RATE_54MB)
 71};
 72
 73uint r8712_is_cckrates_included(u8 *rate)
 74{
 75	u32 i = 0;
 76
 77	while (rate[i] != 0) {
 78		if ((((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) ||
 79		    (((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22))
 80			return true;
 81			i++;
 82		}
 83		return false;
 84}
 85
 86uint r8712_is_cckratesonly_included(u8 *rate)
 87{
 88	u32 i = 0;
 89
 90	while (rate[i] != 0) {
 91		if ((((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) &&
 92		    (((rate[i]) & 0x7f) != 11)  && (((rate[i]) & 0x7f) != 22))
 93			return false;
 94		i++;
 95	}
 96	return true;
 97}
 98
 99/* r8712_set_ie will update frame length */
100u8 *r8712_set_ie(u8 *pbuf, sint index, uint len, u8 *source, uint *frlen)
101{
102	*pbuf = (u8)index;
103	*(pbuf + 1) = (u8)len;
104	if (len > 0)
105		memcpy((void *)(pbuf + 2), (void *)source, len);
106	*frlen = *frlen + (len + 2);
107	return pbuf + len + 2;
108}
109
110/*----------------------------------------------------------------------------
111index: the information element id index, limit is the limit for search
112-----------------------------------------------------------------------------*/
113u8 *r8712_get_ie(u8 *pbuf, sint index, sint *len, sint limit)
114{
115	sint tmp, i;
116	u8 *p;
117
118	if (limit < 1)
119		return NULL;
120	p = pbuf;
121	i = 0;
122	*len = 0;
123	while (1) {
124		if (*p == index) {
125			*len = *(p + 1);
126			return p;
127		} else {
128			tmp = *(p + 1);
129			p += (tmp + 2);
130			i += (tmp + 2);
131		}
132		if (i >= limit)
133			break;
134	}
135	return NULL;
136}
137
138static void set_supported_rate(u8 *SupportedRates, uint mode)
139{
140	memset(SupportedRates, 0, NDIS_802_11_LENGTH_RATES_EX);
141	switch (mode) {
142	case WIRELESS_11B:
143		memcpy(SupportedRates, WIFI_CCKRATES,
144			IEEE80211_CCK_RATE_LEN);
145		break;
146	case WIRELESS_11G:
147	case WIRELESS_11A:
148		memcpy(SupportedRates, WIFI_OFDMRATES,
149			IEEE80211_NUM_OFDM_RATESLEN);
150		break;
151	case WIRELESS_11BG:
152		memcpy(SupportedRates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
153		memcpy(SupportedRates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES,
154			IEEE80211_NUM_OFDM_RATESLEN);
155		break;
156	}
157}
158
159static uint r8712_get_rateset_len(u8 *rateset)
160{
161	uint i = 0;
162
163	while (1) {
164		if ((rateset[i]) == 0)
165			break;
166		if (i > 12)
167			break;
168		i++;
169	}
170	return i;
171}
172
173int r8712_generate_ie(struct registry_priv *pregistrypriv)
 
174{
175	int sz = 0, rateLen;
176	struct wlan_bssid_ex *pdev_network = &pregistrypriv->dev_network;
177	u8 *ie = pdev_network->IEs;
 
 
 
 
 
178
179	/*timestamp will be inserted by hardware*/
180	sz += 8;
181	ie += sz;
182	/*beacon interval : 2bytes*/
183	*(u16 *)ie = cpu_to_le16((u16)pdev_network->Configuration.BeaconPeriod);
184	sz += 2;
185	ie += 2;
186	/*capability info*/
187	*(u16 *)ie = 0;
188	*(u16 *)ie |= cpu_to_le16(cap_IBSS);
189	if (pregistrypriv->preamble == PREAMBLE_SHORT)
190		*(u16 *)ie |= cpu_to_le16(cap_ShortPremble);
191	if (pdev_network->Privacy)
192		*(u16 *)ie |= cpu_to_le16(cap_Privacy);
193	sz += 2;
194	ie += 2;
195	/*SSID*/
196	ie = r8712_set_ie(ie, _SSID_IE_, pdev_network->Ssid.SsidLength,
197		    pdev_network->Ssid.Ssid, &sz);
198	/*supported rates*/
199	set_supported_rate(pdev_network->SupportedRates,
200			   pregistrypriv->wireless_mode);
201	rateLen = r8712_get_rateset_len(pdev_network->SupportedRates);
202	if (rateLen > 8) {
203		ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_, 8,
204			    pdev_network->SupportedRates, &sz);
205		ie = r8712_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rateLen - 8),
206			    (pdev_network->SupportedRates + 8), &sz);
207	} else
208		ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_,
209			    rateLen, pdev_network->SupportedRates, &sz);
210	/*DS parameter set*/
211	ie = r8712_set_ie(ie, _DSSET_IE_, 1,
212		    (u8 *)&(pdev_network->Configuration.DSConfig), &sz);
213	/*IBSS Parameter Set*/
214	ie = r8712_set_ie(ie, _IBSS_PARA_IE_, 2,
215		    (u8 *)&(pdev_network->Configuration.ATIMWindow), &sz);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
216	return sz;
217}
218
219unsigned char *r8712_get_wpa_ie(unsigned char *pie, int *wpa_ie_len, int limit)
220{
221	int len;
222	u16 val16;
223	unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01};
224	u8 *pbuf = pie;
225
226	while (1) {
227		pbuf = r8712_get_ie(pbuf, _WPA_IE_ID_, &len, limit);
228		if (pbuf) {
229			/*check if oui matches...*/
230			if (memcmp((pbuf + 2), wpa_oui_type,
231			    sizeof(wpa_oui_type)))
232				goto check_next_ie;
233			/*check version...*/
234			memcpy((u8 *)&val16, (pbuf + 6), sizeof(val16));
235			val16 = le16_to_cpu(val16);
236			if (val16 != 0x0001)
237				goto check_next_ie;
238			*wpa_ie_len = *(pbuf + 1);
239			return pbuf;
240		} else {
241			*wpa_ie_len = 0;
242			return NULL;
243		}
244check_next_ie:
245		limit = limit - (pbuf - pie) - 2 - len;
246		if (limit <= 0)
247			break;
248		pbuf += (2 + len);
249	}
250	*wpa_ie_len = 0;
251	return NULL;
252}
253
254unsigned char *r8712_get_wpa2_ie(unsigned char *pie, int *rsn_ie_len, int limit)
255{
256	return r8712_get_ie(pie, _WPA2_IE_ID_, rsn_ie_len, limit);
257}
258
259static int r8712_get_wpa_cipher_suite(u8 *s)
260{
261	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN))
262		return WPA_CIPHER_NONE;
263	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN))
264		return WPA_CIPHER_WEP40;
265	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN))
266		return WPA_CIPHER_TKIP;
267	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN))
268		return WPA_CIPHER_CCMP;
269	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN))
270		return WPA_CIPHER_WEP104;
271	return 0;
272}
273
274static int r8712_get_wpa2_cipher_suite(u8 *s)
275{
276	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN))
277		return WPA_CIPHER_NONE;
278	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN))
279		return WPA_CIPHER_WEP40;
280	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN))
281		return WPA_CIPHER_TKIP;
282	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN))
283		return WPA_CIPHER_CCMP;
284	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN))
285		return WPA_CIPHER_WEP104;
286	return 0;
287}
288
289int r8712_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher,
290		 int *pairwise_cipher)
291{
292	int i, ret = _SUCCESS;
293	int left, count;
294	u8 *pos;
295
296	if (wpa_ie_len <= 0) {
297		/* No WPA IE - fail silently */
298		return _FAIL;
299	}
300	if ((*wpa_ie != _WPA_IE_ID_) || (*(wpa_ie + 1) != (u8)(wpa_ie_len - 2))
301	     || (memcmp(wpa_ie + 2, (void *)WPA_OUI_TYPE, WPA_SELECTOR_LEN)))
302		return _FAIL;
303	pos = wpa_ie;
304	pos += 8;
305	left = wpa_ie_len - 8;
306	/*group_cipher*/
307	if (left >= WPA_SELECTOR_LEN) {
308		*group_cipher = r8712_get_wpa_cipher_suite(pos);
309		pos += WPA_SELECTOR_LEN;
310		left -= WPA_SELECTOR_LEN;
311	} else if (left > 0)
312		return _FAIL;
313	/*pairwise_cipher*/
314	if (left >= 2) {
315		count = le16_to_cpu(*(u16 *)pos);
316		pos += 2;
317		left -= 2;
318		if (count == 0 || left < count * WPA_SELECTOR_LEN)
319			return _FAIL;
320		for (i = 0; i < count; i++) {
321			*pairwise_cipher |= r8712_get_wpa_cipher_suite(pos);
322			pos += WPA_SELECTOR_LEN;
323			left -= WPA_SELECTOR_LEN;
324		}
325	} else if (left == 1)
326		return _FAIL;
327	return ret;
328}
329
330int r8712_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher,
331		  int *pairwise_cipher)
332{
333	int i, ret = _SUCCESS;
334	int left, count;
335	u8 *pos;
336
337	if (rsn_ie_len <= 0) {
338		/* No RSN IE - fail silently */
339		return _FAIL;
340	}
341	if ((*rsn_ie != _WPA2_IE_ID_) || (*(rsn_ie+1) != (u8)(rsn_ie_len - 2)))
342		return _FAIL;
343	pos = rsn_ie;
344	pos += 4;
345	left = rsn_ie_len - 4;
346	/*group_cipher*/
347	if (left >= RSN_SELECTOR_LEN) {
348		*group_cipher = r8712_get_wpa2_cipher_suite(pos);
349		pos += RSN_SELECTOR_LEN;
350		left -= RSN_SELECTOR_LEN;
351	} else if (left > 0)
352		return _FAIL;
353	/*pairwise_cipher*/
354	if (left >= 2) {
355		count = le16_to_cpu(*(u16 *)pos);
356		pos += 2;
357		left -= 2;
358		if (count == 0 || left < count * RSN_SELECTOR_LEN)
359			return _FAIL;
360		for (i = 0; i < count; i++) {
361			*pairwise_cipher |= r8712_get_wpa2_cipher_suite(pos);
362			pos += RSN_SELECTOR_LEN;
363			left -= RSN_SELECTOR_LEN;
364		}
365	} else if (left == 1)
366		return _FAIL;
367	return ret;
368}
369
370int r8712_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len,
371	       u8 *wpa_ie, u16 *wpa_len)
372{
373	u8 authmode, sec_idx;
374	u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01};
375	uint cnt;
376
377	/*Search required WPA or WPA2 IE and copy to sec_ie[ ]*/
378	cnt = (_TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_);
379	sec_idx = 0;
380	while (cnt < in_len) {
381		authmode = in_ie[cnt];
382		if ((authmode == _WPA_IE_ID_) &&
383		    (!memcmp(&in_ie[cnt + 2], &wpa_oui[0], 4))) {
384			memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
385			*wpa_len = in_ie[cnt+1]+2;
386			cnt += in_ie[cnt + 1] + 2;  /*get next */
387		} else {
388			if (authmode == _WPA2_IE_ID_) {
389				memcpy(rsn_ie, &in_ie[cnt],
390					in_ie[cnt + 1] + 2);
391				*rsn_len = in_ie[cnt+1] + 2;
392				cnt += in_ie[cnt+1] + 2;  /*get next*/
393			} else
394				cnt += in_ie[cnt+1] + 2;   /*get next*/
395		}
396	}
397	return *rsn_len + *wpa_len;
398}
399
400int r8712_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen)
401{
402	int match;
403	uint cnt;
404	u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
405
406	cnt = 12;
407	match = false;
408	while (cnt < in_len) {
409		eid = in_ie[cnt];
410		if ((eid == _WPA_IE_ID_) &&
411		    (!memcmp(&in_ie[cnt+2], wps_oui, 4))) {
412			memcpy(wps_ie, &in_ie[cnt], in_ie[cnt+1]+2);
413			*wps_ielen = in_ie[cnt+1]+2;
414			cnt += in_ie[cnt+1]+2;
415			match = true;
416			break;
417		} else
418			cnt += in_ie[cnt+1]+2; /* goto next */
419	}
420	return match;
421}