Linux Audio

Check our new training course

Loading...
v4.17
 
  1/******************************************************************************
  2 * ieee80211.c
  3 *
  4 * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
  5 * Linux device driver for RTL8192SU
  6 *
  7 * This program is free software; you can redistribute it and/or modify it
  8 * under the terms of version 2 of the GNU General Public License as
  9 * published by the Free Software Foundation.
 10 *
 11 * This program is distributed in the hope that it will be useful, but WITHOUT
 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 13 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
 14 * more details.
 15 *
 16 * Modifications for inclusion into the Linux staging tree are
 17 * Copyright(c) 2010 Larry Finger. All rights reserved.
 18 *
 19 * Contact information:
 20 * WLAN FAE <wlanfae@realtek.com>.
 21 * Larry Finger <Larry.Finger@lwfinger.net>
 22 *
 23 ******************************************************************************/
 24
 25#define _IEEE80211_C
 26
 27#include "drv_types.h"
 28#include "ieee80211.h"
 29#include "wifi.h"
 30#include "osdep_service.h"
 31#include "wlan_bssdef.h"
 32
 33static const u8 WPA_OUI_TYPE[] = {0x00, 0x50, 0xf2, 1};
 34static const u8 WPA_CIPHER_SUITE_NONE[] = {0x00, 0x50, 0xf2, 0};
 35static const u8 WPA_CIPHER_SUITE_WEP40[] = {0x00, 0x50, 0xf2, 1};
 36static const u8 WPA_CIPHER_SUITE_TKIP[] = {0x00, 0x50, 0xf2, 2};
 37static const u8 WPA_CIPHER_SUITE_CCMP[] = {0x00, 0x50, 0xf2, 4};
 38static const u8 WPA_CIPHER_SUITE_WEP104[] = {0x00, 0x50, 0xf2, 5};
 39
 40static const u8 RSN_CIPHER_SUITE_NONE[] = {0x00, 0x0f, 0xac, 0};
 41static const u8 RSN_CIPHER_SUITE_WEP40[] = {0x00, 0x0f, 0xac, 1};
 42static const u8 RSN_CIPHER_SUITE_TKIP[] = {0x00, 0x0f, 0xac, 2};
 43static const u8 RSN_CIPHER_SUITE_CCMP[] = {0x00, 0x0f, 0xac, 4};
 44static const u8 RSN_CIPHER_SUITE_WEP104[] = {0x00, 0x0f, 0xac, 5};
 45
 46/*-----------------------------------------------------------
 47 * for adhoc-master to generate ie and provide supported-rate to fw
 48 *-----------------------------------------------------------
 49 */
 50
 51static u8 WIFI_CCKRATES[] =  {
 52	(IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK),
 53	(IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK),
 54	(IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK),
 55	(IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK)
 56};
 57
 58static u8 WIFI_OFDMRATES[] = {
 59	(IEEE80211_OFDM_RATE_6MB),
 60	(IEEE80211_OFDM_RATE_9MB),
 61	(IEEE80211_OFDM_RATE_12MB),
 62	(IEEE80211_OFDM_RATE_18MB),
 63	(IEEE80211_OFDM_RATE_24MB),
 64	(IEEE80211_OFDM_RATE_36MB),
 65	(IEEE80211_OFDM_RATE_48MB),
 66	(IEEE80211_OFDM_RATE_54MB)
 67};
 68
 69uint r8712_is_cckrates_included(u8 *rate)
 70{
 71	u32 i = 0;
 72
 73	while (rate[i] != 0) {
 74		if ((((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) ||
 75		    (((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22))
 76			return true;
 77		i++;
 78	}
 79	return false;
 80}
 81
 82uint r8712_is_cckratesonly_included(u8 *rate)
 83{
 84	u32 i = 0;
 85
 86	while (rate[i] != 0) {
 87		if ((((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) &&
 88		    (((rate[i]) & 0x7f) != 11)  && (((rate[i]) & 0x7f) != 22))
 89			return false;
 90		i++;
 91	}
 92	return true;
 93}
 94
 95/* r8712_set_ie will update frame length */
 96u8 *r8712_set_ie(u8 *pbuf, sint index, uint len, u8 *source, uint *frlen)
 97{
 98	*pbuf = (u8)index;
 99	*(pbuf + 1) = (u8)len;
100	if (len > 0)
101		memcpy((void *)(pbuf + 2), (void *)source, len);
102	*frlen = *frlen + (len + 2);
103	return pbuf + len + 2;
104}
105
106/* ---------------------------------------------------------------------------
107 * index: the information element id index, limit is the limit for search
108 * ---------------------------------------------------------------------------
109 */
110u8 *r8712_get_ie(u8 *pbuf, sint index, uint *len, sint limit)
111{
112	sint tmp, i;
113	u8 *p;
114
115	if (limit < 1)
116		return NULL;
117	p = pbuf;
118	i = 0;
119	*len = 0;
120	while (1) {
121		if (*p == index) {
122			*len = *(p + 1);
123			return p;
124		}
125		tmp = *(p + 1);
126		p += (tmp + 2);
127		i += (tmp + 2);
128		if (i >= limit)
129			break;
130	}
131	return NULL;
132}
133
134static void set_supported_rate(u8 *rates, uint mode)
135{
136	memset(rates, 0, NDIS_802_11_LENGTH_RATES_EX);
137	switch (mode) {
138	case WIRELESS_11B:
139		memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
140		break;
141	case WIRELESS_11G:
142	case WIRELESS_11A:
143		memcpy(rates, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN);
144		break;
145	case WIRELESS_11BG:
146		memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
147		memcpy(rates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES,
148		       IEEE80211_NUM_OFDM_RATESLEN);
149		break;
150	}
151}
152
153static uint r8712_get_rateset_len(u8 *rateset)
154{
155	uint i = 0;
156
157	while (1) {
158		if ((rateset[i]) == 0)
159			break;
160		if (i > 12)
161			break;
162		i++;
163	}
164	return i;
165}
166
167int r8712_generate_ie(struct registry_priv *pregistrypriv)
168{
169	int rate_len;
170	uint sz = 0;
171	struct wlan_bssid_ex *pdev_network = &pregistrypriv->dev_network;
172	u8 *ie = pdev_network->IEs;
173	u16 beaconPeriod = (u16)pdev_network->Configuration.BeaconPeriod;
174
175	/*timestamp will be inserted by hardware*/
176	sz += 8;
177	ie += sz;
178	/*beacon interval : 2bytes*/
179	*(__le16 *)ie = cpu_to_le16(beaconPeriod);
180	sz += 2;
181	ie += 2;
182	/*capability info*/
183	*(u16 *)ie = 0;
184	*(__le16 *)ie |= cpu_to_le16(cap_IBSS);
185	if (pregistrypriv->preamble == PREAMBLE_SHORT)
186		*(__le16 *)ie |= cpu_to_le16(cap_ShortPremble);
187	if (pdev_network->Privacy)
188		*(__le16 *)ie |= cpu_to_le16(cap_Privacy);
189	sz += 2;
190	ie += 2;
191	/*SSID*/
192	ie = r8712_set_ie(ie, _SSID_IE_, pdev_network->Ssid.SsidLength,
193			  pdev_network->Ssid.Ssid, &sz);
194	/*supported rates*/
195	set_supported_rate(pdev_network->rates, pregistrypriv->wireless_mode);
196	rate_len = r8712_get_rateset_len(pdev_network->rates);
197	if (rate_len > 8) {
198		ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_, 8,
199				  pdev_network->rates, &sz);
200		ie = r8712_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rate_len - 8),
201				  (pdev_network->rates + 8), &sz);
202	} else {
203		ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_,
204				  rate_len, pdev_network->rates, &sz);
205	}
206	/*DS parameter set*/
207	ie = r8712_set_ie(ie, _DSSET_IE_, 1,
208			  (u8 *)&pdev_network->Configuration.DSConfig, &sz);
209	/*IBSS Parameter Set*/
210	ie = r8712_set_ie(ie, _IBSS_PARA_IE_, 2,
211			  (u8 *)&pdev_network->Configuration.ATIMWindow, &sz);
212	return sz;
213}
214
215unsigned char *r8712_get_wpa_ie(unsigned char *pie, uint *wpa_ie_len, int limit)
216{
217	u32 len;
218	u16 val16;
219	unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01};
220	u8 *pbuf = pie;
221
222	while (1) {
223		pbuf = r8712_get_ie(pbuf, _WPA_IE_ID_, &len, limit);
224		if (pbuf) {
225			/*check if oui matches...*/
226			if (memcmp((pbuf + 2), wpa_oui_type,
227				   sizeof(wpa_oui_type)))
228				goto check_next_ie;
229			/*check version...*/
230			memcpy((u8 *)&val16, (pbuf + 6), sizeof(val16));
231			le16_to_cpus(&val16);
232			if (val16 != 0x0001)
233				goto check_next_ie;
234			*wpa_ie_len = *(pbuf + 1);
235			return pbuf;
236		}
237		*wpa_ie_len = 0;
238		return NULL;
239check_next_ie:
240		limit = limit - (pbuf - pie) - 2 - len;
241		if (limit <= 0)
242			break;
243		pbuf += (2 + len);
244	}
245	*wpa_ie_len = 0;
246	return NULL;
247}
248
249unsigned char *r8712_get_wpa2_ie(unsigned char *pie, uint *rsn_ie_len, int limit)
 
250{
251	return r8712_get_ie(pie, _WPA2_IE_ID_, rsn_ie_len, limit);
252}
253
254static int r8712_get_wpa_cipher_suite(u8 *s)
255{
256	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN))
257		return WPA_CIPHER_NONE;
258	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN))
259		return WPA_CIPHER_WEP40;
260	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN))
261		return WPA_CIPHER_TKIP;
262	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN))
263		return WPA_CIPHER_CCMP;
264	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN))
265		return WPA_CIPHER_WEP104;
266	return 0;
267}
268
269static int r8712_get_wpa2_cipher_suite(u8 *s)
270{
271	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN))
272		return WPA_CIPHER_NONE;
273	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN))
274		return WPA_CIPHER_WEP40;
275	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN))
276		return WPA_CIPHER_TKIP;
277	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN))
278		return WPA_CIPHER_CCMP;
279	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN))
280		return WPA_CIPHER_WEP104;
281	return 0;
282}
283
284int r8712_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher,
285		       int *pairwise_cipher)
286{
287	int i;
288	int left, count;
289	u8 *pos;
290
291	if (wpa_ie_len <= 0) {
292		/* No WPA IE - fail silently */
293		return _FAIL;
294	}
295	if ((*wpa_ie != _WPA_IE_ID_) ||
296	    (*(wpa_ie + 1) != (u8)(wpa_ie_len - 2)) ||
297	    (memcmp(wpa_ie + 2, (void *)WPA_OUI_TYPE, WPA_SELECTOR_LEN)))
298		return _FAIL;
299	pos = wpa_ie;
300	pos += 8;
301	left = wpa_ie_len - 8;
302	/*group_cipher*/
303	if (left >= WPA_SELECTOR_LEN) {
304		*group_cipher = r8712_get_wpa_cipher_suite(pos);
305		pos += WPA_SELECTOR_LEN;
306		left -= WPA_SELECTOR_LEN;
307	} else if (left > 0) {
308		return _FAIL;
309	}
310	/*pairwise_cipher*/
311	if (left >= 2) {
312		count = le16_to_cpu(*(__le16 *)pos);
313		pos += 2;
314		left -= 2;
315		if (count == 0 || left < count * WPA_SELECTOR_LEN)
316			return _FAIL;
317		for (i = 0; i < count; i++) {
318			*pairwise_cipher |= r8712_get_wpa_cipher_suite(pos);
319			pos += WPA_SELECTOR_LEN;
320			left -= WPA_SELECTOR_LEN;
321		}
322	} else if (left == 1) {
323		return _FAIL;
324	}
325	return _SUCCESS;
326}
327
328int r8712_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher,
329			int *pairwise_cipher)
330{
331	int i;
332	int left, count;
333	u8 *pos;
334
335	if (rsn_ie_len <= 0) {
336		/* No RSN IE - fail silently */
337		return _FAIL;
338	}
339	if ((*rsn_ie != _WPA2_IE_ID_) ||
340	    (*(rsn_ie + 1) != (u8)(rsn_ie_len - 2)))
341		return _FAIL;
342	pos = rsn_ie;
343	pos += 4;
344	left = rsn_ie_len - 4;
345	/*group_cipher*/
346	if (left >= RSN_SELECTOR_LEN) {
347		*group_cipher = r8712_get_wpa2_cipher_suite(pos);
348		pos += RSN_SELECTOR_LEN;
349		left -= RSN_SELECTOR_LEN;
350	} else if (left > 0) {
351		return _FAIL;
352	}
353	/*pairwise_cipher*/
354	if (left >= 2) {
355		count = le16_to_cpu(*(__le16 *)pos);
356		pos += 2;
357		left -= 2;
358		if (count == 0 || left < count * RSN_SELECTOR_LEN)
359			return _FAIL;
360		for (i = 0; i < count; i++) {
361			*pairwise_cipher |= r8712_get_wpa2_cipher_suite(pos);
362			pos += RSN_SELECTOR_LEN;
363			left -= RSN_SELECTOR_LEN;
364		}
365	} else if (left == 1) {
366		return _FAIL;
367	}
368	return _SUCCESS;
369}
370
371int r8712_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len,
372		     u8 *wpa_ie, u16 *wpa_len)
373{
374	u8 authmode;
375	u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01};
376	uint cnt;
377
378	/*Search required WPA or WPA2 IE and copy to sec_ie[ ]*/
379	cnt = _TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_;
380	while (cnt < in_len) {
381		authmode = in_ie[cnt];
382		if ((authmode == _WPA_IE_ID_) &&
383		    (!memcmp(&in_ie[cnt + 2], &wpa_oui[0], 4))) {
384			memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
385			*wpa_len = in_ie[cnt + 1] + 2;
386			cnt += in_ie[cnt + 1] + 2;  /*get next */
387		} else {
388			if (authmode == _WPA2_IE_ID_) {
389				memcpy(rsn_ie, &in_ie[cnt],
390				       in_ie[cnt + 1] + 2);
391				*rsn_len = in_ie[cnt + 1] + 2;
392				cnt += in_ie[cnt + 1] + 2;  /*get next*/
393			} else {
394				cnt += in_ie[cnt + 1] + 2;   /*get next*/
395			}
396		}
397	}
398	return *rsn_len + *wpa_len;
399}
400
401int r8712_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen)
402{
403	int match;
404	uint cnt;
405	u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
406
407	cnt = 12;
408	match = false;
409	while (cnt < in_len) {
410		eid = in_ie[cnt];
411		if ((eid == _WPA_IE_ID_) &&
412		    (!memcmp(&in_ie[cnt + 2], wps_oui, 4))) {
413			memcpy(wps_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
414			*wps_ielen = in_ie[cnt + 1] + 2;
415			cnt += in_ie[cnt + 1] + 2;
416			match = true;
417			break;
418		}
419			cnt += in_ie[cnt + 1] + 2; /* goto next */
420	}
421	return match;
422}
v6.2
  1// SPDX-License-Identifier: GPL-2.0
  2/******************************************************************************
  3 * ieee80211.c
  4 *
  5 * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
  6 * Linux device driver for RTL8192SU
  7 *
 
 
 
 
 
 
 
 
 
  8 * Modifications for inclusion into the Linux staging tree are
  9 * Copyright(c) 2010 Larry Finger. All rights reserved.
 10 *
 11 * Contact information:
 12 * WLAN FAE <wlanfae@realtek.com>.
 13 * Larry Finger <Larry.Finger@lwfinger.net>
 14 *
 15 ******************************************************************************/
 16
 17#define _IEEE80211_C
 18
 19#include "drv_types.h"
 20#include "ieee80211.h"
 21#include "wifi.h"
 22#include "osdep_service.h"
 23#include "wlan_bssdef.h"
 24
 25static const u8 WPA_OUI_TYPE[] = {0x00, 0x50, 0xf2, 1};
 26static const u8 WPA_CIPHER_SUITE_NONE[] = {0x00, 0x50, 0xf2, 0};
 27static const u8 WPA_CIPHER_SUITE_WEP40[] = {0x00, 0x50, 0xf2, 1};
 28static const u8 WPA_CIPHER_SUITE_TKIP[] = {0x00, 0x50, 0xf2, 2};
 29static const u8 WPA_CIPHER_SUITE_CCMP[] = {0x00, 0x50, 0xf2, 4};
 30static const u8 WPA_CIPHER_SUITE_WEP104[] = {0x00, 0x50, 0xf2, 5};
 31
 32static const u8 RSN_CIPHER_SUITE_NONE[] = {0x00, 0x0f, 0xac, 0};
 33static const u8 RSN_CIPHER_SUITE_WEP40[] = {0x00, 0x0f, 0xac, 1};
 34static const u8 RSN_CIPHER_SUITE_TKIP[] = {0x00, 0x0f, 0xac, 2};
 35static const u8 RSN_CIPHER_SUITE_CCMP[] = {0x00, 0x0f, 0xac, 4};
 36static const u8 RSN_CIPHER_SUITE_WEP104[] = {0x00, 0x0f, 0xac, 5};
 37
 38/*-----------------------------------------------------------
 39 * for adhoc-master to generate ie and provide supported-rate to fw
 40 *-----------------------------------------------------------
 41 */
 42
 43static u8 WIFI_CCKRATES[] =  {
 44	(IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK),
 45	(IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK),
 46	(IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK),
 47	(IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK)
 48};
 49
 50static u8 WIFI_OFDMRATES[] = {
 51	(IEEE80211_OFDM_RATE_6MB),
 52	(IEEE80211_OFDM_RATE_9MB),
 53	(IEEE80211_OFDM_RATE_12MB),
 54	(IEEE80211_OFDM_RATE_18MB),
 55	(IEEE80211_OFDM_RATE_24MB),
 56	(IEEE80211_OFDM_RATE_36MB),
 57	(IEEE80211_OFDM_RATE_48MB),
 58	(IEEE80211_OFDM_RATE_54MB)
 59};
 60
 61uint r8712_is_cckrates_included(u8 *rate)
 62{
 63	u32 i = 0;
 64
 65	while (rate[i] != 0) {
 66		if ((((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) ||
 67		    (((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22))
 68			return true;
 69		i++;
 70	}
 71	return false;
 72}
 73
 74uint r8712_is_cckratesonly_included(u8 *rate)
 75{
 76	u32 i = 0;
 77
 78	while (rate[i] != 0) {
 79		if ((((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) &&
 80		    (((rate[i]) & 0x7f) != 11)  && (((rate[i]) & 0x7f) != 22))
 81			return false;
 82		i++;
 83	}
 84	return true;
 85}
 86
 87/* r8712_set_ie will update frame length */
 88u8 *r8712_set_ie(u8 *pbuf, sint index, uint len, u8 *source, uint *frlen)
 89{
 90	*pbuf = (u8)index;
 91	*(pbuf + 1) = (u8)len;
 92	if (len > 0)
 93		memcpy((void *)(pbuf + 2), (void *)source, len);
 94	*frlen = *frlen + (len + 2);
 95	return pbuf + len + 2;
 96}
 97
 98/* ---------------------------------------------------------------------------
 99 * index: the information element id index, limit is the limit for search
100 * ---------------------------------------------------------------------------
101 */
102u8 *r8712_get_ie(u8 *pbuf, sint index, uint *len, sint limit)
103{
104	sint tmp, i;
105	u8 *p;
106
107	if (limit < 1)
108		return NULL;
109	p = pbuf;
110	i = 0;
111	*len = 0;
112	while (1) {
113		if (*p == index) {
114			*len = *(p + 1);
115			return p;
116		}
117		tmp = *(p + 1);
118		p += (tmp + 2);
119		i += (tmp + 2);
120		if (i >= limit)
121			break;
122	}
123	return NULL;
124}
125
126static void set_supported_rate(u8 *rates, uint mode)
127{
128	memset(rates, 0, NDIS_802_11_LENGTH_RATES_EX);
129	switch (mode) {
130	case WIRELESS_11B:
131		memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
132		break;
133	case WIRELESS_11G:
134	case WIRELESS_11A:
135		memcpy(rates, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN);
136		break;
137	case WIRELESS_11BG:
138		memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
139		memcpy(rates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES,
140		       IEEE80211_NUM_OFDM_RATESLEN);
141		break;
142	}
143}
144
145static uint r8712_get_rateset_len(u8 *rateset)
146{
147	uint i = 0;
148
149	while (1) {
150		if ((rateset[i]) == 0)
151			break;
152		if (i > 12)
153			break;
154		i++;
155	}
156	return i;
157}
158
159int r8712_generate_ie(struct registry_priv *registrypriv)
160{
161	int rate_len;
162	uint sz = 0;
163	struct wlan_bssid_ex *dev_network = &registrypriv->dev_network;
164	u8 *ie = dev_network->IEs;
165	u16 beacon_period = (u16)dev_network->Configuration.BeaconPeriod;
166
167	/*timestamp will be inserted by hardware*/
168	sz += 8;
169	ie += sz;
170	/*beacon interval : 2bytes*/
171	*(__le16 *)ie = cpu_to_le16(beacon_period);
172	sz += 2;
173	ie += 2;
174	/*capability info*/
175	*(u16 *)ie = 0;
176	*(__le16 *)ie |= cpu_to_le16(WLAN_CAPABILITY_IBSS);
177	if (registrypriv->preamble == PREAMBLE_SHORT)
178		*(__le16 *)ie |= cpu_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE);
179	if (dev_network->Privacy)
180		*(__le16 *)ie |= cpu_to_le16(WLAN_CAPABILITY_PRIVACY);
181	sz += 2;
182	ie += 2;
183	/*SSID*/
184	ie = r8712_set_ie(ie, WLAN_EID_SSID, dev_network->Ssid.SsidLength,
185			  dev_network->Ssid.Ssid, &sz);
186	/*supported rates*/
187	set_supported_rate(dev_network->rates, registrypriv->wireless_mode);
188	rate_len = r8712_get_rateset_len(dev_network->rates);
189	if (rate_len > 8) {
190		ie = r8712_set_ie(ie, WLAN_EID_SUPP_RATES, 8,
191				  dev_network->rates, &sz);
192		ie = r8712_set_ie(ie, WLAN_EID_EXT_SUPP_RATES, (rate_len - 8),
193				  (dev_network->rates + 8), &sz);
194	} else {
195		ie = r8712_set_ie(ie, WLAN_EID_SUPP_RATES,
196				  rate_len, dev_network->rates, &sz);
197	}
198	/*DS parameter set*/
199	ie = r8712_set_ie(ie, WLAN_EID_DS_PARAMS, 1,
200			  (u8 *)&dev_network->Configuration.DSConfig, &sz);
201	/*IBSS Parameter Set*/
202	ie = r8712_set_ie(ie, WLAN_EID_IBSS_PARAMS, 2,
203			  (u8 *)&dev_network->Configuration.ATIMWindow, &sz);
204	return sz;
205}
206
207unsigned char *r8712_get_wpa_ie(unsigned char *ie, uint *wpa_ie_len, int limit)
208{
209	u32 len;
210	u16 val16;
211	unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01};
212	u8 *buf = ie;
213
214	while (1) {
215		buf = r8712_get_ie(buf, _WPA_IE_ID_, &len, limit);
216		if (buf) {
217			/*check if oui matches...*/
218			if (memcmp((buf + 2), wpa_oui_type,
219				   sizeof(wpa_oui_type)))
220				goto check_next_ie;
221			/*check version...*/
222			memcpy((u8 *)&val16, (buf + 6), sizeof(val16));
223			le16_to_cpus(&val16);
224			if (val16 != 0x0001)
225				goto check_next_ie;
226			*wpa_ie_len = *(buf + 1);
227			return buf;
228		}
229		*wpa_ie_len = 0;
230		return NULL;
231check_next_ie:
232		limit = limit - (buf - ie) - 2 - len;
233		if (limit <= 0)
234			break;
235		buf += (2 + len);
236	}
237	*wpa_ie_len = 0;
238	return NULL;
239}
240
241unsigned char *r8712_get_wpa2_ie(unsigned char *pie, uint *rsn_ie_len,
242				 int limit)
243{
244	return r8712_get_ie(pie, _WPA2_IE_ID_, rsn_ie_len, limit);
245}
246
247static int r8712_get_wpa_cipher_suite(u8 *s)
248{
249	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN))
250		return WPA_CIPHER_NONE;
251	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN))
252		return WPA_CIPHER_WEP40;
253	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN))
254		return WPA_CIPHER_TKIP;
255	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN))
256		return WPA_CIPHER_CCMP;
257	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN))
258		return WPA_CIPHER_WEP104;
259	return 0;
260}
261
262static int r8712_get_wpa2_cipher_suite(u8 *s)
263{
264	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN))
265		return WPA_CIPHER_NONE;
266	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN))
267		return WPA_CIPHER_WEP40;
268	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN))
269		return WPA_CIPHER_TKIP;
270	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN))
271		return WPA_CIPHER_CCMP;
272	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN))
273		return WPA_CIPHER_WEP104;
274	return 0;
275}
276
277int r8712_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher,
278		       int *pairwise_cipher)
279{
280	int i;
281	int left, count;
282	u8 *pos;
283
284	if (wpa_ie_len <= 0) {
285		/* No WPA IE - fail silently */
286		return -EINVAL;
287	}
288	if ((*wpa_ie != _WPA_IE_ID_) ||
289	    (*(wpa_ie + 1) != (u8)(wpa_ie_len - 2)) ||
290	    (memcmp(wpa_ie + 2, (void *)WPA_OUI_TYPE, WPA_SELECTOR_LEN)))
291		return -EINVAL;
292	pos = wpa_ie;
293	pos += 8;
294	left = wpa_ie_len - 8;
295	/*group_cipher*/
296	if (left >= WPA_SELECTOR_LEN) {
297		*group_cipher = r8712_get_wpa_cipher_suite(pos);
298		pos += WPA_SELECTOR_LEN;
299		left -= WPA_SELECTOR_LEN;
300	} else if (left > 0) {
301		return -EINVAL;
302	}
303	/*pairwise_cipher*/
304	if (left >= 2) {
305		count = le16_to_cpu(*(__le16 *)pos);
306		pos += 2;
307		left -= 2;
308		if (count == 0 || left < count * WPA_SELECTOR_LEN)
309			return -EINVAL;
310		for (i = 0; i < count; i++) {
311			*pairwise_cipher |= r8712_get_wpa_cipher_suite(pos);
312			pos += WPA_SELECTOR_LEN;
313			left -= WPA_SELECTOR_LEN;
314		}
315	} else if (left == 1) {
316		return -EINVAL;
317	}
318	return 0;
319}
320
321int r8712_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher,
322			int *pairwise_cipher)
323{
324	int i;
325	int left, count;
326	u8 *pos;
327
328	if (rsn_ie_len <= 0) {
329		/* No RSN IE - fail silently */
330		return -EINVAL;
331	}
332	if ((*rsn_ie != _WPA2_IE_ID_) ||
333	    (*(rsn_ie + 1) != (u8)(rsn_ie_len - 2)))
334		return -EINVAL;
335	pos = rsn_ie;
336	pos += 4;
337	left = rsn_ie_len - 4;
338	/*group_cipher*/
339	if (left >= RSN_SELECTOR_LEN) {
340		*group_cipher = r8712_get_wpa2_cipher_suite(pos);
341		pos += RSN_SELECTOR_LEN;
342		left -= RSN_SELECTOR_LEN;
343	} else if (left > 0) {
344		return -EINVAL;
345	}
346	/*pairwise_cipher*/
347	if (left >= 2) {
348		count = le16_to_cpu(*(__le16 *)pos);
349		pos += 2;
350		left -= 2;
351		if (count == 0 || left < count * RSN_SELECTOR_LEN)
352			return -EINVAL;
353		for (i = 0; i < count; i++) {
354			*pairwise_cipher |= r8712_get_wpa2_cipher_suite(pos);
355			pos += RSN_SELECTOR_LEN;
356			left -= RSN_SELECTOR_LEN;
357		}
358	} else if (left == 1) {
359		return -EINVAL;
360	}
361	return 0;
362}
363
364int r8712_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len,
365		     u8 *wpa_ie, u16 *wpa_len)
366{
367	u8 authmode;
368	u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01};
369	uint cnt;
370
371	/*Search required WPA or WPA2 IE and copy to sec_ie[ ]*/
372	cnt = _TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_;
373	while (cnt < in_len) {
374		authmode = in_ie[cnt];
375		if ((authmode == _WPA_IE_ID_) &&
376		    (!memcmp(&in_ie[cnt + 2], &wpa_oui[0], 4))) {
377			memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
378			*wpa_len = in_ie[cnt + 1] + 2;
379			cnt += in_ie[cnt + 1] + 2;  /*get next */
380		} else {
381			if (authmode == _WPA2_IE_ID_) {
382				memcpy(rsn_ie, &in_ie[cnt],
383				       in_ie[cnt + 1] + 2);
384				*rsn_len = in_ie[cnt + 1] + 2;
385				cnt += in_ie[cnt + 1] + 2;  /*get next*/
386			} else {
387				cnt += in_ie[cnt + 1] + 2;   /*get next*/
388			}
389		}
390	}
391	return *rsn_len + *wpa_len;
392}
393
394int r8712_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen)
395{
396	int match;
397	uint cnt;
398	u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
399
400	cnt = 12;
401	match = false;
402	while (cnt < in_len) {
403		eid = in_ie[cnt];
404		if ((eid == _WPA_IE_ID_) &&
405		    (!memcmp(&in_ie[cnt + 2], wps_oui, 4))) {
406			memcpy(wps_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
407			*wps_ielen = in_ie[cnt + 1] + 2;
408			cnt += in_ie[cnt + 1] + 2;
409			match = true;
410			break;
411		}
412		cnt += in_ie[cnt + 1] + 2; /* goto next */
413	}
414	return match;
415}