// SPDX-License-Identifier: GPL-2.0
|
/******************************************************************************
|
* ieee80211.c
|
*
|
* Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
|
* Linux device driver for RTL8192SU
|
*
|
* Modifications for inclusion into the Linux staging tree are
|
* Copyright(c) 2010 Larry Finger. All rights reserved.
|
*
|
* Contact information:
|
* WLAN FAE <wlanfae@realtek.com>.
|
* Larry Finger <Larry.Finger@lwfinger.net>
|
*
|
******************************************************************************/
|
|
#define _IEEE80211_C
|
|
#include "drv_types.h"
|
#include "ieee80211.h"
|
#include "wifi.h"
|
#include "osdep_service.h"
|
#include "wlan_bssdef.h"
|
|
static const u8 WPA_OUI_TYPE[] = {0x00, 0x50, 0xf2, 1};
|
static const u8 WPA_CIPHER_SUITE_NONE[] = {0x00, 0x50, 0xf2, 0};
|
static const u8 WPA_CIPHER_SUITE_WEP40[] = {0x00, 0x50, 0xf2, 1};
|
static const u8 WPA_CIPHER_SUITE_TKIP[] = {0x00, 0x50, 0xf2, 2};
|
static const u8 WPA_CIPHER_SUITE_CCMP[] = {0x00, 0x50, 0xf2, 4};
|
static const u8 WPA_CIPHER_SUITE_WEP104[] = {0x00, 0x50, 0xf2, 5};
|
|
static const u8 RSN_CIPHER_SUITE_NONE[] = {0x00, 0x0f, 0xac, 0};
|
static const u8 RSN_CIPHER_SUITE_WEP40[] = {0x00, 0x0f, 0xac, 1};
|
static const u8 RSN_CIPHER_SUITE_TKIP[] = {0x00, 0x0f, 0xac, 2};
|
static const u8 RSN_CIPHER_SUITE_CCMP[] = {0x00, 0x0f, 0xac, 4};
|
static const u8 RSN_CIPHER_SUITE_WEP104[] = {0x00, 0x0f, 0xac, 5};
|
|
/*-----------------------------------------------------------
|
* for adhoc-master to generate ie and provide supported-rate to fw
|
*-----------------------------------------------------------
|
*/
|
|
static u8 WIFI_CCKRATES[] = {
|
(IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK),
|
(IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK),
|
(IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK),
|
(IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK)
|
};
|
|
static u8 WIFI_OFDMRATES[] = {
|
(IEEE80211_OFDM_RATE_6MB),
|
(IEEE80211_OFDM_RATE_9MB),
|
(IEEE80211_OFDM_RATE_12MB),
|
(IEEE80211_OFDM_RATE_18MB),
|
(IEEE80211_OFDM_RATE_24MB),
|
(IEEE80211_OFDM_RATE_36MB),
|
(IEEE80211_OFDM_RATE_48MB),
|
(IEEE80211_OFDM_RATE_54MB)
|
};
|
|
uint r8712_is_cckrates_included(u8 *rate)
|
{
|
u32 i = 0;
|
|
while (rate[i] != 0) {
|
if ((((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) ||
|
(((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22))
|
return true;
|
i++;
|
}
|
return false;
|
}
|
|
uint r8712_is_cckratesonly_included(u8 *rate)
|
{
|
u32 i = 0;
|
|
while (rate[i] != 0) {
|
if ((((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) &&
|
(((rate[i]) & 0x7f) != 11) && (((rate[i]) & 0x7f) != 22))
|
return false;
|
i++;
|
}
|
return true;
|
}
|
|
/* r8712_set_ie will update frame length */
|
u8 *r8712_set_ie(u8 *pbuf, sint index, uint len, u8 *source, uint *frlen)
|
{
|
*pbuf = (u8)index;
|
*(pbuf + 1) = (u8)len;
|
if (len > 0)
|
memcpy((void *)(pbuf + 2), (void *)source, len);
|
*frlen = *frlen + (len + 2);
|
return pbuf + len + 2;
|
}
|
|
/* ---------------------------------------------------------------------------
|
* index: the information element id index, limit is the limit for search
|
* ---------------------------------------------------------------------------
|
*/
|
u8 *r8712_get_ie(u8 *pbuf, sint index, uint *len, sint limit)
|
{
|
sint tmp, i;
|
u8 *p;
|
|
if (limit < 1)
|
return NULL;
|
p = pbuf;
|
i = 0;
|
*len = 0;
|
while (1) {
|
if (*p == index) {
|
*len = *(p + 1);
|
return p;
|
}
|
tmp = *(p + 1);
|
p += (tmp + 2);
|
i += (tmp + 2);
|
if (i >= limit)
|
break;
|
}
|
return NULL;
|
}
|
|
static void set_supported_rate(u8 *rates, uint mode)
|
{
|
memset(rates, 0, NDIS_802_11_LENGTH_RATES_EX);
|
switch (mode) {
|
case WIRELESS_11B:
|
memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
|
break;
|
case WIRELESS_11G:
|
case WIRELESS_11A:
|
memcpy(rates, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN);
|
break;
|
case WIRELESS_11BG:
|
memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
|
memcpy(rates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES,
|
IEEE80211_NUM_OFDM_RATESLEN);
|
break;
|
}
|
}
|
|
static uint r8712_get_rateset_len(u8 *rateset)
|
{
|
uint i = 0;
|
|
while (1) {
|
if ((rateset[i]) == 0)
|
break;
|
if (i > 12)
|
break;
|
i++;
|
}
|
return i;
|
}
|
|
int r8712_generate_ie(struct registry_priv *registrypriv)
|
{
|
int rate_len;
|
uint sz = 0;
|
struct wlan_bssid_ex *dev_network = ®istrypriv->dev_network;
|
u8 *ie = dev_network->IEs;
|
u16 beaconPeriod = (u16)dev_network->Configuration.BeaconPeriod;
|
|
/*timestamp will be inserted by hardware*/
|
sz += 8;
|
ie += sz;
|
/*beacon interval : 2bytes*/
|
*(__le16 *)ie = cpu_to_le16(beaconPeriod);
|
sz += 2;
|
ie += 2;
|
/*capability info*/
|
*(u16 *)ie = 0;
|
*(__le16 *)ie |= cpu_to_le16(cap_IBSS);
|
if (registrypriv->preamble == PREAMBLE_SHORT)
|
*(__le16 *)ie |= cpu_to_le16(cap_ShortPremble);
|
if (dev_network->Privacy)
|
*(__le16 *)ie |= cpu_to_le16(cap_Privacy);
|
sz += 2;
|
ie += 2;
|
/*SSID*/
|
ie = r8712_set_ie(ie, WLAN_EID_SSID, dev_network->Ssid.SsidLength,
|
dev_network->Ssid.Ssid, &sz);
|
/*supported rates*/
|
set_supported_rate(dev_network->rates, registrypriv->wireless_mode);
|
rate_len = r8712_get_rateset_len(dev_network->rates);
|
if (rate_len > 8) {
|
ie = r8712_set_ie(ie, WLAN_EID_SUPP_RATES, 8,
|
dev_network->rates, &sz);
|
ie = r8712_set_ie(ie, WLAN_EID_EXT_SUPP_RATES, (rate_len - 8),
|
(dev_network->rates + 8), &sz);
|
} else {
|
ie = r8712_set_ie(ie, WLAN_EID_SUPP_RATES,
|
rate_len, dev_network->rates, &sz);
|
}
|
/*DS parameter set*/
|
ie = r8712_set_ie(ie, WLAN_EID_DS_PARAMS, 1,
|
(u8 *)&dev_network->Configuration.DSConfig, &sz);
|
/*IBSS Parameter Set*/
|
ie = r8712_set_ie(ie, WLAN_EID_IBSS_PARAMS, 2,
|
(u8 *)&dev_network->Configuration.ATIMWindow, &sz);
|
return sz;
|
}
|
|
unsigned char *r8712_get_wpa_ie(unsigned char *ie, uint *wpa_ie_len, int limit)
|
{
|
u32 len;
|
u16 val16;
|
unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01};
|
u8 *buf = ie;
|
|
while (1) {
|
buf = r8712_get_ie(buf, _WPA_IE_ID_, &len, limit);
|
if (buf) {
|
/*check if oui matches...*/
|
if (memcmp((buf + 2), wpa_oui_type,
|
sizeof(wpa_oui_type)))
|
goto check_next_ie;
|
/*check version...*/
|
memcpy((u8 *)&val16, (buf + 6), sizeof(val16));
|
le16_to_cpus(&val16);
|
if (val16 != 0x0001)
|
goto check_next_ie;
|
*wpa_ie_len = *(buf + 1);
|
return buf;
|
}
|
*wpa_ie_len = 0;
|
return NULL;
|
check_next_ie:
|
limit = limit - (buf - ie) - 2 - len;
|
if (limit <= 0)
|
break;
|
buf += (2 + len);
|
}
|
*wpa_ie_len = 0;
|
return NULL;
|
}
|
|
unsigned char *r8712_get_wpa2_ie(unsigned char *pie, uint *rsn_ie_len,
|
int limit)
|
{
|
return r8712_get_ie(pie, _WPA2_IE_ID_, rsn_ie_len, limit);
|
}
|
|
static int r8712_get_wpa_cipher_suite(u8 *s)
|
{
|
if (!memcmp(s, (void *)WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN))
|
return WPA_CIPHER_NONE;
|
if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN))
|
return WPA_CIPHER_WEP40;
|
if (!memcmp(s, (void *)WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN))
|
return WPA_CIPHER_TKIP;
|
if (!memcmp(s, (void *)WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN))
|
return WPA_CIPHER_CCMP;
|
if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN))
|
return WPA_CIPHER_WEP104;
|
return 0;
|
}
|
|
static int r8712_get_wpa2_cipher_suite(u8 *s)
|
{
|
if (!memcmp(s, (void *)RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN))
|
return WPA_CIPHER_NONE;
|
if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN))
|
return WPA_CIPHER_WEP40;
|
if (!memcmp(s, (void *)RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN))
|
return WPA_CIPHER_TKIP;
|
if (!memcmp(s, (void *)RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN))
|
return WPA_CIPHER_CCMP;
|
if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN))
|
return WPA_CIPHER_WEP104;
|
return 0;
|
}
|
|
int r8712_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher,
|
int *pairwise_cipher)
|
{
|
int i;
|
int left, count;
|
u8 *pos;
|
|
if (wpa_ie_len <= 0) {
|
/* No WPA IE - fail silently */
|
return -EINVAL;
|
}
|
if ((*wpa_ie != _WPA_IE_ID_) ||
|
(*(wpa_ie + 1) != (u8)(wpa_ie_len - 2)) ||
|
(memcmp(wpa_ie + 2, (void *)WPA_OUI_TYPE, WPA_SELECTOR_LEN)))
|
return -EINVAL;
|
pos = wpa_ie;
|
pos += 8;
|
left = wpa_ie_len - 8;
|
/*group_cipher*/
|
if (left >= WPA_SELECTOR_LEN) {
|
*group_cipher = r8712_get_wpa_cipher_suite(pos);
|
pos += WPA_SELECTOR_LEN;
|
left -= WPA_SELECTOR_LEN;
|
} else if (left > 0) {
|
return -EINVAL;
|
}
|
/*pairwise_cipher*/
|
if (left >= 2) {
|
count = le16_to_cpu(*(__le16 *)pos);
|
pos += 2;
|
left -= 2;
|
if (count == 0 || left < count * WPA_SELECTOR_LEN)
|
return -EINVAL;
|
for (i = 0; i < count; i++) {
|
*pairwise_cipher |= r8712_get_wpa_cipher_suite(pos);
|
pos += WPA_SELECTOR_LEN;
|
left -= WPA_SELECTOR_LEN;
|
}
|
} else if (left == 1) {
|
return -EINVAL;
|
}
|
return 0;
|
}
|
|
int r8712_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher,
|
int *pairwise_cipher)
|
{
|
int i;
|
int left, count;
|
u8 *pos;
|
|
if (rsn_ie_len <= 0) {
|
/* No RSN IE - fail silently */
|
return -EINVAL;
|
}
|
if ((*rsn_ie != _WPA2_IE_ID_) ||
|
(*(rsn_ie + 1) != (u8)(rsn_ie_len - 2)))
|
return -EINVAL;
|
pos = rsn_ie;
|
pos += 4;
|
left = rsn_ie_len - 4;
|
/*group_cipher*/
|
if (left >= RSN_SELECTOR_LEN) {
|
*group_cipher = r8712_get_wpa2_cipher_suite(pos);
|
pos += RSN_SELECTOR_LEN;
|
left -= RSN_SELECTOR_LEN;
|
} else if (left > 0) {
|
return -EINVAL;
|
}
|
/*pairwise_cipher*/
|
if (left >= 2) {
|
count = le16_to_cpu(*(__le16 *)pos);
|
pos += 2;
|
left -= 2;
|
if (count == 0 || left < count * RSN_SELECTOR_LEN)
|
return -EINVAL;
|
for (i = 0; i < count; i++) {
|
*pairwise_cipher |= r8712_get_wpa2_cipher_suite(pos);
|
pos += RSN_SELECTOR_LEN;
|
left -= RSN_SELECTOR_LEN;
|
}
|
} else if (left == 1) {
|
return -EINVAL;
|
}
|
return 0;
|
}
|
|
int r8712_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len,
|
u8 *wpa_ie, u16 *wpa_len)
|
{
|
u8 authmode;
|
u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01};
|
uint cnt;
|
|
/*Search required WPA or WPA2 IE and copy to sec_ie[ ]*/
|
cnt = _TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_;
|
while (cnt < in_len) {
|
authmode = in_ie[cnt];
|
if ((authmode == _WPA_IE_ID_) &&
|
(!memcmp(&in_ie[cnt + 2], &wpa_oui[0], 4))) {
|
memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
|
*wpa_len = in_ie[cnt + 1] + 2;
|
cnt += in_ie[cnt + 1] + 2; /*get next */
|
} else {
|
if (authmode == _WPA2_IE_ID_) {
|
memcpy(rsn_ie, &in_ie[cnt],
|
in_ie[cnt + 1] + 2);
|
*rsn_len = in_ie[cnt + 1] + 2;
|
cnt += in_ie[cnt + 1] + 2; /*get next*/
|
} else {
|
cnt += in_ie[cnt + 1] + 2; /*get next*/
|
}
|
}
|
}
|
return *rsn_len + *wpa_len;
|
}
|
|
int r8712_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen)
|
{
|
int match;
|
uint cnt;
|
u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
|
|
cnt = 12;
|
match = false;
|
while (cnt < in_len) {
|
eid = in_ie[cnt];
|
if ((eid == _WPA_IE_ID_) &&
|
(!memcmp(&in_ie[cnt + 2], wps_oui, 4))) {
|
memcpy(wps_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
|
*wps_ielen = in_ie[cnt + 1] + 2;
|
cnt += in_ie[cnt + 1] + 2;
|
match = true;
|
break;
|
}
|
cnt += in_ie[cnt + 1] + 2; /* goto next */
|
}
|
return match;
|
}
|