1 /****************************************************************************** 2 * ieee80211.c 3 * 4 * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved. 5 * Linux device driver for RTL8192SU 6 * 7 * This program is free software; you can redistribute it and/or modify it 8 * under the terms of version 2 of the GNU General Public License as 9 * published by the Free Software Foundation. 10 * 11 * This program is distributed in the hope that it will be useful, but WITHOUT 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for 14 * more details. 15 * 16 * Modifications for inclusion into the Linux staging tree are 17 * Copyright(c) 2010 Larry Finger. All rights reserved. 18 * 19 * Contact information: 20 * WLAN FAE <wlanfae@realtek.com>. 21 * Larry Finger <Larry.Finger@lwfinger.net> 22 * 23 ******************************************************************************/ 24 25 #define _IEEE80211_C 26 27 #include "drv_types.h" 28 #include "ieee80211.h" 29 #include "wifi.h" 30 #include "osdep_service.h" 31 #include "wlan_bssdef.h" 32 33 static const u8 WPA_OUI_TYPE[] = {0x00, 0x50, 0xf2, 1}; 34 static const u8 WPA_CIPHER_SUITE_NONE[] = {0x00, 0x50, 0xf2, 0}; 35 static const u8 WPA_CIPHER_SUITE_WEP40[] = {0x00, 0x50, 0xf2, 1}; 36 static const u8 WPA_CIPHER_SUITE_TKIP[] = {0x00, 0x50, 0xf2, 2}; 37 static const u8 WPA_CIPHER_SUITE_CCMP[] = {0x00, 0x50, 0xf2, 4}; 38 static const u8 WPA_CIPHER_SUITE_WEP104[] = {0x00, 0x50, 0xf2, 5}; 39 40 static const u8 RSN_CIPHER_SUITE_NONE[] = {0x00, 0x0f, 0xac, 0}; 41 static const u8 RSN_CIPHER_SUITE_WEP40[] = {0x00, 0x0f, 0xac, 1}; 42 static const u8 RSN_CIPHER_SUITE_TKIP[] = {0x00, 0x0f, 0xac, 2}; 43 static const u8 RSN_CIPHER_SUITE_CCMP[] = {0x00, 0x0f, 0xac, 4}; 44 static const u8 RSN_CIPHER_SUITE_WEP104[] = {0x00, 0x0f, 0xac, 5}; 45 46 /*----------------------------------------------------------- 47 * for adhoc-master to generate ie and provide supported-rate to fw 48 *----------------------------------------------------------- 49 */ 50 51 static u8 WIFI_CCKRATES[] = { 52 (IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK), 53 (IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK), 54 (IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK), 55 (IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK) 56 }; 57 58 static u8 WIFI_OFDMRATES[] = { 59 (IEEE80211_OFDM_RATE_6MB), 60 (IEEE80211_OFDM_RATE_9MB), 61 (IEEE80211_OFDM_RATE_12MB), 62 (IEEE80211_OFDM_RATE_18MB), 63 (IEEE80211_OFDM_RATE_24MB), 64 (IEEE80211_OFDM_RATE_36MB), 65 (IEEE80211_OFDM_RATE_48MB), 66 (IEEE80211_OFDM_RATE_54MB) 67 }; 68 69 uint r8712_is_cckrates_included(u8 *rate) 70 { 71 u32 i = 0; 72 73 while (rate[i] != 0) { 74 if ((((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) || 75 (((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22)) 76 return true; 77 i++; 78 } 79 return false; 80 } 81 82 uint r8712_is_cckratesonly_included(u8 *rate) 83 { 84 u32 i = 0; 85 86 while (rate[i] != 0) { 87 if ((((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) && 88 (((rate[i]) & 0x7f) != 11) && (((rate[i]) & 0x7f) != 22)) 89 return false; 90 i++; 91 } 92 return true; 93 } 94 95 /* r8712_set_ie will update frame length */ 96 u8 *r8712_set_ie(u8 *pbuf, sint index, uint len, u8 *source, uint *frlen) 97 { 98 *pbuf = (u8)index; 99 *(pbuf + 1) = (u8)len; 100 if (len > 0) 101 memcpy((void *)(pbuf + 2), (void *)source, len); 102 *frlen = *frlen + (len + 2); 103 return pbuf + len + 2; 104 } 105 106 /* --------------------------------------------------------------------------- 107 * index: the information element id index, limit is the limit for search 108 * --------------------------------------------------------------------------- 109 */ 110 u8 *r8712_get_ie(u8 *pbuf, sint index, sint *len, sint limit) 111 { 112 sint tmp, i; 113 u8 *p; 114 115 if (limit < 1) 116 return NULL; 117 p = pbuf; 118 i = 0; 119 *len = 0; 120 while (1) { 121 if (*p == index) { 122 *len = *(p + 1); 123 return p; 124 } 125 tmp = *(p + 1); 126 p += (tmp + 2); 127 i += (tmp + 2); 128 if (i >= limit) 129 break; 130 } 131 return NULL; 132 } 133 134 static void set_supported_rate(u8 *rates, uint mode) 135 { 136 memset(rates, 0, NDIS_802_11_LENGTH_RATES_EX); 137 switch (mode) { 138 case WIRELESS_11B: 139 memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN); 140 break; 141 case WIRELESS_11G: 142 case WIRELESS_11A: 143 memcpy(rates, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN); 144 break; 145 case WIRELESS_11BG: 146 memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN); 147 memcpy(rates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES, 148 IEEE80211_NUM_OFDM_RATESLEN); 149 break; 150 } 151 } 152 153 static uint r8712_get_rateset_len(u8 *rateset) 154 { 155 uint i = 0; 156 157 while (1) { 158 if ((rateset[i]) == 0) 159 break; 160 if (i > 12) 161 break; 162 i++; 163 } 164 return i; 165 } 166 167 int r8712_generate_ie(struct registry_priv *pregistrypriv) 168 { 169 int sz = 0, rate_len; 170 struct wlan_bssid_ex *pdev_network = &pregistrypriv->dev_network; 171 u8 *ie = pdev_network->IEs; 172 173 /*timestamp will be inserted by hardware*/ 174 sz += 8; 175 ie += sz; 176 /*beacon interval : 2bytes*/ 177 *(__le16 *)ie = cpu_to_le16((u16)pdev_network->Configuration.BeaconPeriod); 178 sz += 2; 179 ie += 2; 180 /*capability info*/ 181 *(u16 *)ie = 0; 182 *(__le16 *)ie |= cpu_to_le16(cap_IBSS); 183 if (pregistrypriv->preamble == PREAMBLE_SHORT) 184 *(__le16 *)ie |= cpu_to_le16(cap_ShortPremble); 185 if (pdev_network->Privacy) 186 *(__le16 *)ie |= cpu_to_le16(cap_Privacy); 187 sz += 2; 188 ie += 2; 189 /*SSID*/ 190 ie = r8712_set_ie(ie, _SSID_IE_, pdev_network->Ssid.SsidLength, 191 pdev_network->Ssid.Ssid, &sz); 192 /*supported rates*/ 193 set_supported_rate(pdev_network->rates, pregistrypriv->wireless_mode); 194 rate_len = r8712_get_rateset_len(pdev_network->rates); 195 if (rate_len > 8) { 196 ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_, 8, 197 pdev_network->rates, &sz); 198 ie = r8712_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rate_len - 8), 199 (pdev_network->rates + 8), &sz); 200 } else { 201 ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_, 202 rate_len, pdev_network->rates, &sz); 203 } 204 /*DS parameter set*/ 205 ie = r8712_set_ie(ie, _DSSET_IE_, 1, 206 (u8 *)&pdev_network->Configuration.DSConfig, &sz); 207 /*IBSS Parameter Set*/ 208 ie = r8712_set_ie(ie, _IBSS_PARA_IE_, 2, 209 (u8 *)&pdev_network->Configuration.ATIMWindow, &sz); 210 return sz; 211 } 212 213 unsigned char *r8712_get_wpa_ie(unsigned char *pie, int *wpa_ie_len, int limit) 214 { 215 int len; 216 u16 val16; 217 unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01}; 218 u8 *pbuf = pie; 219 220 while (1) { 221 pbuf = r8712_get_ie(pbuf, _WPA_IE_ID_, &len, limit); 222 if (pbuf) { 223 /*check if oui matches...*/ 224 if (memcmp((pbuf + 2), wpa_oui_type, sizeof(wpa_oui_type))) 225 goto check_next_ie; 226 /*check version...*/ 227 memcpy((u8 *)&val16, (pbuf + 6), sizeof(val16)); 228 le16_to_cpus(&val16); 229 if (val16 != 0x0001) 230 goto check_next_ie; 231 *wpa_ie_len = *(pbuf + 1); 232 return pbuf; 233 } 234 *wpa_ie_len = 0; 235 return NULL; 236 check_next_ie: 237 limit = limit - (pbuf - pie) - 2 - len; 238 if (limit <= 0) 239 break; 240 pbuf += (2 + len); 241 } 242 *wpa_ie_len = 0; 243 return NULL; 244 } 245 246 unsigned char *r8712_get_wpa2_ie(unsigned char *pie, int *rsn_ie_len, int limit) 247 { 248 return r8712_get_ie(pie, _WPA2_IE_ID_, rsn_ie_len, limit); 249 } 250 251 static int r8712_get_wpa_cipher_suite(u8 *s) 252 { 253 if (!memcmp(s, (void *)WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN)) 254 return WPA_CIPHER_NONE; 255 if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN)) 256 return WPA_CIPHER_WEP40; 257 if (!memcmp(s, (void *)WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN)) 258 return WPA_CIPHER_TKIP; 259 if (!memcmp(s, (void *)WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN)) 260 return WPA_CIPHER_CCMP; 261 if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN)) 262 return WPA_CIPHER_WEP104; 263 return 0; 264 } 265 266 static int r8712_get_wpa2_cipher_suite(u8 *s) 267 { 268 if (!memcmp(s, (void *)RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN)) 269 return WPA_CIPHER_NONE; 270 if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN)) 271 return WPA_CIPHER_WEP40; 272 if (!memcmp(s, (void *)RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN)) 273 return WPA_CIPHER_TKIP; 274 if (!memcmp(s, (void *)RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN)) 275 return WPA_CIPHER_CCMP; 276 if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN)) 277 return WPA_CIPHER_WEP104; 278 return 0; 279 } 280 281 int r8712_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher, 282 int *pairwise_cipher) 283 { 284 int i; 285 int left, count; 286 u8 *pos; 287 288 if (wpa_ie_len <= 0) { 289 /* No WPA IE - fail silently */ 290 return _FAIL; 291 } 292 if ((*wpa_ie != _WPA_IE_ID_) || 293 (*(wpa_ie + 1) != (u8)(wpa_ie_len - 2)) || 294 (memcmp(wpa_ie + 2, (void *)WPA_OUI_TYPE, WPA_SELECTOR_LEN))) 295 return _FAIL; 296 pos = wpa_ie; 297 pos += 8; 298 left = wpa_ie_len - 8; 299 /*group_cipher*/ 300 if (left >= WPA_SELECTOR_LEN) { 301 *group_cipher = r8712_get_wpa_cipher_suite(pos); 302 pos += WPA_SELECTOR_LEN; 303 left -= WPA_SELECTOR_LEN; 304 } else if (left > 0) { 305 return _FAIL; 306 } 307 /*pairwise_cipher*/ 308 if (left >= 2) { 309 count = le16_to_cpu(*(__le16 *)pos); 310 pos += 2; 311 left -= 2; 312 if (count == 0 || left < count * WPA_SELECTOR_LEN) 313 return _FAIL; 314 for (i = 0; i < count; i++) { 315 *pairwise_cipher |= r8712_get_wpa_cipher_suite(pos); 316 pos += WPA_SELECTOR_LEN; 317 left -= WPA_SELECTOR_LEN; 318 } 319 } else if (left == 1) { 320 return _FAIL; 321 } 322 return _SUCCESS; 323 } 324 325 int r8712_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher, 326 int *pairwise_cipher) 327 { 328 int i; 329 int left, count; 330 u8 *pos; 331 332 if (rsn_ie_len <= 0) { 333 /* No RSN IE - fail silently */ 334 return _FAIL; 335 } 336 if ((*rsn_ie != _WPA2_IE_ID_) || 337 (*(rsn_ie + 1) != (u8)(rsn_ie_len - 2))) 338 return _FAIL; 339 pos = rsn_ie; 340 pos += 4; 341 left = rsn_ie_len - 4; 342 /*group_cipher*/ 343 if (left >= RSN_SELECTOR_LEN) { 344 *group_cipher = r8712_get_wpa2_cipher_suite(pos); 345 pos += RSN_SELECTOR_LEN; 346 left -= RSN_SELECTOR_LEN; 347 } else if (left > 0) { 348 return _FAIL; 349 } 350 /*pairwise_cipher*/ 351 if (left >= 2) { 352 count = le16_to_cpu(*(__le16 *)pos); 353 pos += 2; 354 left -= 2; 355 if (count == 0 || left < count * RSN_SELECTOR_LEN) 356 return _FAIL; 357 for (i = 0; i < count; i++) { 358 *pairwise_cipher |= r8712_get_wpa2_cipher_suite(pos); 359 pos += RSN_SELECTOR_LEN; 360 left -= RSN_SELECTOR_LEN; 361 } 362 } else if (left == 1) { 363 return _FAIL; 364 } 365 return _SUCCESS; 366 } 367 368 int r8712_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len, 369 u8 *wpa_ie, u16 *wpa_len) 370 { 371 u8 authmode; 372 u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01}; 373 uint cnt; 374 375 /*Search required WPA or WPA2 IE and copy to sec_ie[ ]*/ 376 cnt = _TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_; 377 while (cnt < in_len) { 378 authmode = in_ie[cnt]; 379 if ((authmode == _WPA_IE_ID_) && 380 (!memcmp(&in_ie[cnt + 2], &wpa_oui[0], 4))) { 381 memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt + 1] + 2); 382 *wpa_len = in_ie[cnt + 1] + 2; 383 cnt += in_ie[cnt + 1] + 2; /*get next */ 384 } else { 385 if (authmode == _WPA2_IE_ID_) { 386 memcpy(rsn_ie, &in_ie[cnt], 387 in_ie[cnt + 1] + 2); 388 *rsn_len = in_ie[cnt + 1] + 2; 389 cnt += in_ie[cnt + 1] + 2; /*get next*/ 390 } else { 391 cnt += in_ie[cnt + 1] + 2; /*get next*/ 392 } 393 } 394 } 395 return *rsn_len + *wpa_len; 396 } 397 398 int r8712_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen) 399 { 400 int match; 401 uint cnt; 402 u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04}; 403 404 cnt = 12; 405 match = false; 406 while (cnt < in_len) { 407 eid = in_ie[cnt]; 408 if ((eid == _WPA_IE_ID_) && 409 (!memcmp(&in_ie[cnt + 2], wps_oui, 4))) { 410 memcpy(wps_ie, &in_ie[cnt], in_ie[cnt + 1] + 2); 411 *wps_ielen = in_ie[cnt + 1] + 2; 412 cnt += in_ie[cnt + 1] + 2; 413 match = true; 414 break; 415 } 416 cnt += in_ie[cnt + 1] + 2; /* goto next */ 417 } 418 return match; 419 } 420