Linux Audio

Check our new training course

Loading...
Note: File does not exist in v6.13.7.
  1/******************************************************************************
  2 * ieee80211.c
  3 *
  4 * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
  5 * Linux device driver for RTL8192SU
  6 *
  7 * This program is free software; you can redistribute it and/or modify it
  8 * under the terms of version 2 of the GNU General Public License as
  9 * published by the Free Software Foundation.
 10 *
 11 * This program is distributed in the hope that it will be useful, but WITHOUT
 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 13 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
 14 * more details.
 15 *
 16 * You should have received a copy of the GNU General Public License along with
 17 * this program; if not, write to the Free Software Foundation, Inc.,
 18 * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
 19 *
 20 * Modifications for inclusion into the Linux staging tree are
 21 * Copyright(c) 2010 Larry Finger. All rights reserved.
 22 *
 23 * Contact information:
 24 * WLAN FAE <wlanfae@realtek.com>.
 25 * Larry Finger <Larry.Finger@lwfinger.net>
 26 *
 27 ******************************************************************************/
 28
 29#define _IEEE80211_C
 30
 31#include "drv_types.h"
 32#include "ieee80211.h"
 33#include "wifi.h"
 34#include "osdep_service.h"
 35#include "wlan_bssdef.h"
 36
 37static const u8 WPA_OUI_TYPE[] = {0x00, 0x50, 0xf2, 1};
 38static const u8 WPA_CIPHER_SUITE_NONE[] = {0x00, 0x50, 0xf2, 0};
 39static const u8 WPA_CIPHER_SUITE_WEP40[] = {0x00, 0x50, 0xf2, 1};
 40static const u8 WPA_CIPHER_SUITE_TKIP[] = {0x00, 0x50, 0xf2, 2};
 41static const u8 WPA_CIPHER_SUITE_CCMP[] = {0x00, 0x50, 0xf2, 4};
 42static const u8 WPA_CIPHER_SUITE_WEP104[] = {0x00, 0x50, 0xf2, 5};
 43
 44static const u8 RSN_CIPHER_SUITE_NONE[] = {0x00, 0x0f, 0xac, 0};
 45static const u8 RSN_CIPHER_SUITE_WEP40[] = {0x00, 0x0f, 0xac, 1};
 46static const u8 RSN_CIPHER_SUITE_TKIP[] = {0x00, 0x0f, 0xac, 2};
 47static const u8 RSN_CIPHER_SUITE_CCMP[] = {0x00, 0x0f, 0xac, 4};
 48static const u8 RSN_CIPHER_SUITE_WEP104[] = {0x00, 0x0f, 0xac, 5};
 49
 50/*-----------------------------------------------------------
 51 * for adhoc-master to generate ie and provide supported-rate to fw
 52 *-----------------------------------------------------------
 53 */
 54
 55static u8 WIFI_CCKRATES[] =  {
 56	(IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK),
 57	(IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK),
 58	(IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK),
 59	(IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK)
 60};
 61
 62static u8 WIFI_OFDMRATES[] = {
 63	(IEEE80211_OFDM_RATE_6MB),
 64	(IEEE80211_OFDM_RATE_9MB),
 65	(IEEE80211_OFDM_RATE_12MB),
 66	(IEEE80211_OFDM_RATE_18MB),
 67	(IEEE80211_OFDM_RATE_24MB),
 68	(IEEE80211_OFDM_RATE_36MB),
 69	(IEEE80211_OFDM_RATE_48MB),
 70	(IEEE80211_OFDM_RATE_54MB)
 71};
 72
 73uint r8712_is_cckrates_included(u8 *rate)
 74{
 75	u32 i = 0;
 76
 77	while (rate[i] != 0) {
 78		if ((((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) ||
 79		    (((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22))
 80			return true;
 81		i++;
 82	}
 83	return false;
 84}
 85
 86uint r8712_is_cckratesonly_included(u8 *rate)
 87{
 88	u32 i = 0;
 89
 90	while (rate[i] != 0) {
 91		if ((((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) &&
 92		    (((rate[i]) & 0x7f) != 11)  && (((rate[i]) & 0x7f) != 22))
 93			return false;
 94		i++;
 95	}
 96	return true;
 97}
 98
 99/* r8712_set_ie will update frame length */
100u8 *r8712_set_ie(u8 *pbuf, sint index, uint len, u8 *source, uint *frlen)
101{
102	*pbuf = (u8)index;
103	*(pbuf + 1) = (u8)len;
104	if (len > 0)
105		memcpy((void *)(pbuf + 2), (void *)source, len);
106	*frlen = *frlen + (len + 2);
107	return pbuf + len + 2;
108}
109
110/* ---------------------------------------------------------------------------
111 * index: the information element id index, limit is the limit for search
112 * ---------------------------------------------------------------------------
113 */
114u8 *r8712_get_ie(u8 *pbuf, sint index, sint *len, sint limit)
115{
116	sint tmp, i;
117	u8 *p;
118
119	if (limit < 1)
120		return NULL;
121	p = pbuf;
122	i = 0;
123	*len = 0;
124	while (1) {
125		if (*p == index) {
126			*len = *(p + 1);
127			return p;
128		}
129		tmp = *(p + 1);
130		p += (tmp + 2);
131		i += (tmp + 2);
132		if (i >= limit)
133			break;
134	}
135	return NULL;
136}
137
138static void set_supported_rate(u8 *rates, uint mode)
139{
140	memset(rates, 0, NDIS_802_11_LENGTH_RATES_EX);
141	switch (mode) {
142	case WIRELESS_11B:
143		memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
144		break;
145	case WIRELESS_11G:
146	case WIRELESS_11A:
147		memcpy(rates, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN);
148		break;
149	case WIRELESS_11BG:
150		memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
151		memcpy(rates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES,
152			IEEE80211_NUM_OFDM_RATESLEN);
153		break;
154	}
155}
156
157static uint r8712_get_rateset_len(u8 *rateset)
158{
159	uint i = 0;
160
161	while (1) {
162		if ((rateset[i]) == 0)
163			break;
164		if (i > 12)
165			break;
166		i++;
167	}
168	return i;
169}
170
171int r8712_generate_ie(struct registry_priv *pregistrypriv)
172{
173	int sz = 0, rateLen;
174	struct wlan_bssid_ex *pdev_network = &pregistrypriv->dev_network;
175	u8 *ie = pdev_network->IEs;
176
177	/*timestamp will be inserted by hardware*/
178	sz += 8;
179	ie += sz;
180	/*beacon interval : 2bytes*/
181	*(u16 *)ie = cpu_to_le16((u16)pdev_network->Configuration.BeaconPeriod);
182	sz += 2;
183	ie += 2;
184	/*capability info*/
185	*(u16 *)ie = 0;
186	*(u16 *)ie |= cpu_to_le16(cap_IBSS);
187	if (pregistrypriv->preamble == PREAMBLE_SHORT)
188		*(u16 *)ie |= cpu_to_le16(cap_ShortPremble);
189	if (pdev_network->Privacy)
190		*(u16 *)ie |= cpu_to_le16(cap_Privacy);
191	sz += 2;
192	ie += 2;
193	/*SSID*/
194	ie = r8712_set_ie(ie, _SSID_IE_, pdev_network->Ssid.SsidLength,
195		    pdev_network->Ssid.Ssid, &sz);
196	/*supported rates*/
197	set_supported_rate(pdev_network->rates, pregistrypriv->wireless_mode);
198	rateLen = r8712_get_rateset_len(pdev_network->rates);
199	if (rateLen > 8) {
200		ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_, 8,
201			    pdev_network->rates, &sz);
202		ie = r8712_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rateLen - 8),
203			    (pdev_network->rates + 8), &sz);
204	} else
205		ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_,
206			    rateLen, pdev_network->rates, &sz);
207	/*DS parameter set*/
208	ie = r8712_set_ie(ie, _DSSET_IE_, 1,
209		    (u8 *)&(pdev_network->Configuration.DSConfig), &sz);
210	/*IBSS Parameter Set*/
211	ie = r8712_set_ie(ie, _IBSS_PARA_IE_, 2,
212		    (u8 *)&(pdev_network->Configuration.ATIMWindow), &sz);
213	return sz;
214}
215
216unsigned char *r8712_get_wpa_ie(unsigned char *pie, int *wpa_ie_len, int limit)
217{
218	int len;
219	u16 val16;
220	unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01};
221	u8 *pbuf = pie;
222
223	while (1) {
224		pbuf = r8712_get_ie(pbuf, _WPA_IE_ID_, &len, limit);
225		if (pbuf) {
226			/*check if oui matches...*/
227			if (memcmp((pbuf + 2), wpa_oui_type,
228			    sizeof(wpa_oui_type)))
229				goto check_next_ie;
230			/*check version...*/
231			memcpy((u8 *)&val16, (pbuf + 6), sizeof(val16));
232			val16 = le16_to_cpu(val16);
233			if (val16 != 0x0001)
234				goto check_next_ie;
235			*wpa_ie_len = *(pbuf + 1);
236			return pbuf;
237		}
238		*wpa_ie_len = 0;
239		return NULL;
240check_next_ie:
241		limit = limit - (pbuf - pie) - 2 - len;
242		if (limit <= 0)
243			break;
244		pbuf += (2 + len);
245	}
246	*wpa_ie_len = 0;
247	return NULL;
248}
249
250unsigned char *r8712_get_wpa2_ie(unsigned char *pie, int *rsn_ie_len, int limit)
251{
252	return r8712_get_ie(pie, _WPA2_IE_ID_, rsn_ie_len, limit);
253}
254
255static int r8712_get_wpa_cipher_suite(u8 *s)
256{
257	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN))
258		return WPA_CIPHER_NONE;
259	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN))
260		return WPA_CIPHER_WEP40;
261	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN))
262		return WPA_CIPHER_TKIP;
263	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN))
264		return WPA_CIPHER_CCMP;
265	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN))
266		return WPA_CIPHER_WEP104;
267	return 0;
268}
269
270static int r8712_get_wpa2_cipher_suite(u8 *s)
271{
272	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN))
273		return WPA_CIPHER_NONE;
274	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN))
275		return WPA_CIPHER_WEP40;
276	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN))
277		return WPA_CIPHER_TKIP;
278	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN))
279		return WPA_CIPHER_CCMP;
280	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN))
281		return WPA_CIPHER_WEP104;
282	return 0;
283}
284
285int r8712_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher,
286		 int *pairwise_cipher)
287{
288	int i;
289	int left, count;
290	u8 *pos;
291
292	if (wpa_ie_len <= 0) {
293		/* No WPA IE - fail silently */
294		return _FAIL;
295	}
296	if ((*wpa_ie != _WPA_IE_ID_) || (*(wpa_ie + 1) != (u8)(wpa_ie_len - 2))
297	     || (memcmp(wpa_ie + 2, (void *)WPA_OUI_TYPE, WPA_SELECTOR_LEN)))
298		return _FAIL;
299	pos = wpa_ie;
300	pos += 8;
301	left = wpa_ie_len - 8;
302	/*group_cipher*/
303	if (left >= WPA_SELECTOR_LEN) {
304		*group_cipher = r8712_get_wpa_cipher_suite(pos);
305		pos += WPA_SELECTOR_LEN;
306		left -= WPA_SELECTOR_LEN;
307	} else if (left > 0) {
308		return _FAIL;
309	}
310	/*pairwise_cipher*/
311	if (left >= 2) {
312		count = le16_to_cpu(*(u16 *)pos);
313		pos += 2;
314		left -= 2;
315		if (count == 0 || left < count * WPA_SELECTOR_LEN)
316			return _FAIL;
317		for (i = 0; i < count; i++) {
318			*pairwise_cipher |= r8712_get_wpa_cipher_suite(pos);
319			pos += WPA_SELECTOR_LEN;
320			left -= WPA_SELECTOR_LEN;
321		}
322	} else if (left == 1) {
323		return _FAIL;
324	}
325	return _SUCCESS;
326}
327
328int r8712_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher,
329		  int *pairwise_cipher)
330{
331	int i;
332	int left, count;
333	u8 *pos;
334
335	if (rsn_ie_len <= 0) {
336		/* No RSN IE - fail silently */
337		return _FAIL;
338	}
339	if ((*rsn_ie != _WPA2_IE_ID_) ||
340	    (*(rsn_ie + 1) != (u8)(rsn_ie_len - 2)))
341		return _FAIL;
342	pos = rsn_ie;
343	pos += 4;
344	left = rsn_ie_len - 4;
345	/*group_cipher*/
346	if (left >= RSN_SELECTOR_LEN) {
347		*group_cipher = r8712_get_wpa2_cipher_suite(pos);
348		pos += RSN_SELECTOR_LEN;
349		left -= RSN_SELECTOR_LEN;
350	} else if (left > 0) {
351		return _FAIL;
352	}
353	/*pairwise_cipher*/
354	if (left >= 2) {
355		count = le16_to_cpu(*(u16 *)pos);
356		pos += 2;
357		left -= 2;
358		if (count == 0 || left < count * RSN_SELECTOR_LEN)
359			return _FAIL;
360		for (i = 0; i < count; i++) {
361			*pairwise_cipher |= r8712_get_wpa2_cipher_suite(pos);
362			pos += RSN_SELECTOR_LEN;
363			left -= RSN_SELECTOR_LEN;
364		}
365	} else if (left == 1) {
366		return _FAIL;
367	}
368	return _SUCCESS;
369}
370
371int r8712_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len,
372	       u8 *wpa_ie, u16 *wpa_len)
373{
374	u8 authmode;
375	u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01};
376	uint cnt;
377
378	/*Search required WPA or WPA2 IE and copy to sec_ie[ ]*/
379	cnt = _TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_;
380	while (cnt < in_len) {
381		authmode = in_ie[cnt];
382		if ((authmode == _WPA_IE_ID_) &&
383		    (!memcmp(&in_ie[cnt + 2], &wpa_oui[0], 4))) {
384			memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
385			*wpa_len = in_ie[cnt + 1] + 2;
386			cnt += in_ie[cnt + 1] + 2;  /*get next */
387		} else {
388			if (authmode == _WPA2_IE_ID_) {
389				memcpy(rsn_ie, &in_ie[cnt],
390					in_ie[cnt + 1] + 2);
391				*rsn_len = in_ie[cnt + 1] + 2;
392				cnt += in_ie[cnt + 1] + 2;  /*get next*/
393			} else {
394				cnt += in_ie[cnt + 1] + 2;   /*get next*/
395			}
396		}
397	}
398	return *rsn_len + *wpa_len;
399}
400
401int r8712_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen)
402{
403	int match;
404	uint cnt;
405	u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
406
407	cnt = 12;
408	match = false;
409	while (cnt < in_len) {
410		eid = in_ie[cnt];
411		if ((eid == _WPA_IE_ID_) &&
412		    (!memcmp(&in_ie[cnt + 2], wps_oui, 4))) {
413			memcpy(wps_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
414			*wps_ielen = in_ie[cnt + 1] + 2;
415			cnt += in_ie[cnt + 1] + 2;
416			match = true;
417			break;
418		}
419			cnt += in_ie[cnt + 1] + 2; /* goto next */
420	}
421	return match;
422}