1 /******************************************************************************
2  * ieee80211.c
3  *
4  * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
5  * Linux device driver for RTL8192SU
6  *
7  * This program is free software; you can redistribute it and/or modify it
8  * under the terms of version 2 of the GNU General Public License as
9  * published by the Free Software Foundation.
10  *
11  * This program is distributed in the hope that it will be useful, but WITHOUT
12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
14  * more details.
15  *
16  * Modifications for inclusion into the Linux staging tree are
17  * Copyright(c) 2010 Larry Finger. All rights reserved.
18  *
19  * Contact information:
20  * WLAN FAE <wlanfae@realtek.com>.
21  * Larry Finger <Larry.Finger@lwfinger.net>
22  *
23  ******************************************************************************/
24 
25 #define _IEEE80211_C
26 
27 #include "drv_types.h"
28 #include "ieee80211.h"
29 #include "wifi.h"
30 #include "osdep_service.h"
31 #include "wlan_bssdef.h"
32 
33 static const u8 WPA_OUI_TYPE[] = {0x00, 0x50, 0xf2, 1};
34 static const u8 WPA_CIPHER_SUITE_NONE[] = {0x00, 0x50, 0xf2, 0};
35 static const u8 WPA_CIPHER_SUITE_WEP40[] = {0x00, 0x50, 0xf2, 1};
36 static const u8 WPA_CIPHER_SUITE_TKIP[] = {0x00, 0x50, 0xf2, 2};
37 static const u8 WPA_CIPHER_SUITE_CCMP[] = {0x00, 0x50, 0xf2, 4};
38 static const u8 WPA_CIPHER_SUITE_WEP104[] = {0x00, 0x50, 0xf2, 5};
39 
40 static const u8 RSN_CIPHER_SUITE_NONE[] = {0x00, 0x0f, 0xac, 0};
41 static const u8 RSN_CIPHER_SUITE_WEP40[] = {0x00, 0x0f, 0xac, 1};
42 static const u8 RSN_CIPHER_SUITE_TKIP[] = {0x00, 0x0f, 0xac, 2};
43 static const u8 RSN_CIPHER_SUITE_CCMP[] = {0x00, 0x0f, 0xac, 4};
44 static const u8 RSN_CIPHER_SUITE_WEP104[] = {0x00, 0x0f, 0xac, 5};
45 
46 /*-----------------------------------------------------------
47  * for adhoc-master to generate ie and provide supported-rate to fw
48  *-----------------------------------------------------------
49  */
50 
51 static u8 WIFI_CCKRATES[] =  {
52 	(IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK),
53 	(IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK),
54 	(IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK),
55 	(IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK)
56 };
57 
58 static u8 WIFI_OFDMRATES[] = {
59 	(IEEE80211_OFDM_RATE_6MB),
60 	(IEEE80211_OFDM_RATE_9MB),
61 	(IEEE80211_OFDM_RATE_12MB),
62 	(IEEE80211_OFDM_RATE_18MB),
63 	(IEEE80211_OFDM_RATE_24MB),
64 	(IEEE80211_OFDM_RATE_36MB),
65 	(IEEE80211_OFDM_RATE_48MB),
66 	(IEEE80211_OFDM_RATE_54MB)
67 };
68 
69 uint r8712_is_cckrates_included(u8 *rate)
70 {
71 	u32 i = 0;
72 
73 	while (rate[i] != 0) {
74 		if ((((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) ||
75 		    (((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22))
76 			return true;
77 		i++;
78 	}
79 	return false;
80 }
81 
82 uint r8712_is_cckratesonly_included(u8 *rate)
83 {
84 	u32 i = 0;
85 
86 	while (rate[i] != 0) {
87 		if ((((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) &&
88 		    (((rate[i]) & 0x7f) != 11)  && (((rate[i]) & 0x7f) != 22))
89 			return false;
90 		i++;
91 	}
92 	return true;
93 }
94 
95 /* r8712_set_ie will update frame length */
96 u8 *r8712_set_ie(u8 *pbuf, sint index, uint len, u8 *source, uint *frlen)
97 {
98 	*pbuf = (u8)index;
99 	*(pbuf + 1) = (u8)len;
100 	if (len > 0)
101 		memcpy((void *)(pbuf + 2), (void *)source, len);
102 	*frlen = *frlen + (len + 2);
103 	return pbuf + len + 2;
104 }
105 
106 /* ---------------------------------------------------------------------------
107  * index: the information element id index, limit is the limit for search
108  * ---------------------------------------------------------------------------
109  */
110 u8 *r8712_get_ie(u8 *pbuf, sint index, sint *len, sint limit)
111 {
112 	sint tmp, i;
113 	u8 *p;
114 
115 	if (limit < 1)
116 		return NULL;
117 	p = pbuf;
118 	i = 0;
119 	*len = 0;
120 	while (1) {
121 		if (*p == index) {
122 			*len = *(p + 1);
123 			return p;
124 		}
125 		tmp = *(p + 1);
126 		p += (tmp + 2);
127 		i += (tmp + 2);
128 		if (i >= limit)
129 			break;
130 	}
131 	return NULL;
132 }
133 
134 static void set_supported_rate(u8 *rates, uint mode)
135 {
136 	memset(rates, 0, NDIS_802_11_LENGTH_RATES_EX);
137 	switch (mode) {
138 	case WIRELESS_11B:
139 		memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
140 		break;
141 	case WIRELESS_11G:
142 	case WIRELESS_11A:
143 		memcpy(rates, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN);
144 		break;
145 	case WIRELESS_11BG:
146 		memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
147 		memcpy(rates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES,
148 		       IEEE80211_NUM_OFDM_RATESLEN);
149 		break;
150 	}
151 }
152 
153 static uint r8712_get_rateset_len(u8 *rateset)
154 {
155 	uint i = 0;
156 
157 	while (1) {
158 		if ((rateset[i]) == 0)
159 			break;
160 		if (i > 12)
161 			break;
162 		i++;
163 	}
164 	return i;
165 }
166 
167 int r8712_generate_ie(struct registry_priv *pregistrypriv)
168 {
169 	int sz = 0, rate_len;
170 	struct wlan_bssid_ex *pdev_network = &pregistrypriv->dev_network;
171 	u8 *ie = pdev_network->IEs;
172 
173 	/*timestamp will be inserted by hardware*/
174 	sz += 8;
175 	ie += sz;
176 	/*beacon interval : 2bytes*/
177 	*(__le16 *)ie = cpu_to_le16((u16)pdev_network->Configuration.BeaconPeriod);
178 	sz += 2;
179 	ie += 2;
180 	/*capability info*/
181 	*(u16 *)ie = 0;
182 	*(__le16 *)ie |= cpu_to_le16(cap_IBSS);
183 	if (pregistrypriv->preamble == PREAMBLE_SHORT)
184 		*(__le16 *)ie |= cpu_to_le16(cap_ShortPremble);
185 	if (pdev_network->Privacy)
186 		*(__le16 *)ie |= cpu_to_le16(cap_Privacy);
187 	sz += 2;
188 	ie += 2;
189 	/*SSID*/
190 	ie = r8712_set_ie(ie, _SSID_IE_, pdev_network->Ssid.SsidLength,
191 			  pdev_network->Ssid.Ssid, &sz);
192 	/*supported rates*/
193 	set_supported_rate(pdev_network->rates, pregistrypriv->wireless_mode);
194 	rate_len = r8712_get_rateset_len(pdev_network->rates);
195 	if (rate_len > 8) {
196 		ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_, 8,
197 				  pdev_network->rates, &sz);
198 		ie = r8712_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rate_len - 8),
199 				  (pdev_network->rates + 8), &sz);
200 	} else {
201 		ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_,
202 				  rate_len, pdev_network->rates, &sz);
203 	}
204 	/*DS parameter set*/
205 	ie = r8712_set_ie(ie, _DSSET_IE_, 1,
206 			  (u8 *)&pdev_network->Configuration.DSConfig, &sz);
207 	/*IBSS Parameter Set*/
208 	ie = r8712_set_ie(ie, _IBSS_PARA_IE_, 2,
209 			  (u8 *)&pdev_network->Configuration.ATIMWindow, &sz);
210 	return sz;
211 }
212 
213 unsigned char *r8712_get_wpa_ie(unsigned char *pie, int *wpa_ie_len, int limit)
214 {
215 	int len;
216 	u16 val16;
217 	unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01};
218 	u8 *pbuf = pie;
219 
220 	while (1) {
221 		pbuf = r8712_get_ie(pbuf, _WPA_IE_ID_, &len, limit);
222 		if (pbuf) {
223 			/*check if oui matches...*/
224 			if (memcmp((pbuf + 2), wpa_oui_type, sizeof(wpa_oui_type)))
225 				goto check_next_ie;
226 			/*check version...*/
227 			memcpy((u8 *)&val16, (pbuf + 6), sizeof(val16));
228 			le16_to_cpus(&val16);
229 			if (val16 != 0x0001)
230 				goto check_next_ie;
231 			*wpa_ie_len = *(pbuf + 1);
232 			return pbuf;
233 		}
234 		*wpa_ie_len = 0;
235 		return NULL;
236 check_next_ie:
237 		limit = limit - (pbuf - pie) - 2 - len;
238 		if (limit <= 0)
239 			break;
240 		pbuf += (2 + len);
241 	}
242 	*wpa_ie_len = 0;
243 	return NULL;
244 }
245 
246 unsigned char *r8712_get_wpa2_ie(unsigned char *pie, int *rsn_ie_len, int limit)
247 {
248 	return r8712_get_ie(pie, _WPA2_IE_ID_, rsn_ie_len, limit);
249 }
250 
251 static int r8712_get_wpa_cipher_suite(u8 *s)
252 {
253 	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN))
254 		return WPA_CIPHER_NONE;
255 	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN))
256 		return WPA_CIPHER_WEP40;
257 	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN))
258 		return WPA_CIPHER_TKIP;
259 	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN))
260 		return WPA_CIPHER_CCMP;
261 	if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN))
262 		return WPA_CIPHER_WEP104;
263 	return 0;
264 }
265 
266 static int r8712_get_wpa2_cipher_suite(u8 *s)
267 {
268 	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN))
269 		return WPA_CIPHER_NONE;
270 	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN))
271 		return WPA_CIPHER_WEP40;
272 	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN))
273 		return WPA_CIPHER_TKIP;
274 	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN))
275 		return WPA_CIPHER_CCMP;
276 	if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN))
277 		return WPA_CIPHER_WEP104;
278 	return 0;
279 }
280 
281 int r8712_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher,
282 		       int *pairwise_cipher)
283 {
284 	int i;
285 	int left, count;
286 	u8 *pos;
287 
288 	if (wpa_ie_len <= 0) {
289 		/* No WPA IE - fail silently */
290 		return _FAIL;
291 	}
292 	if ((*wpa_ie != _WPA_IE_ID_) ||
293 	    (*(wpa_ie + 1) != (u8)(wpa_ie_len - 2)) ||
294 	    (memcmp(wpa_ie + 2, (void *)WPA_OUI_TYPE, WPA_SELECTOR_LEN)))
295 		return _FAIL;
296 	pos = wpa_ie;
297 	pos += 8;
298 	left = wpa_ie_len - 8;
299 	/*group_cipher*/
300 	if (left >= WPA_SELECTOR_LEN) {
301 		*group_cipher = r8712_get_wpa_cipher_suite(pos);
302 		pos += WPA_SELECTOR_LEN;
303 		left -= WPA_SELECTOR_LEN;
304 	} else if (left > 0) {
305 		return _FAIL;
306 	}
307 	/*pairwise_cipher*/
308 	if (left >= 2) {
309 		count = le16_to_cpu(*(__le16 *)pos);
310 		pos += 2;
311 		left -= 2;
312 		if (count == 0 || left < count * WPA_SELECTOR_LEN)
313 			return _FAIL;
314 		for (i = 0; i < count; i++) {
315 			*pairwise_cipher |= r8712_get_wpa_cipher_suite(pos);
316 			pos += WPA_SELECTOR_LEN;
317 			left -= WPA_SELECTOR_LEN;
318 		}
319 	} else if (left == 1) {
320 		return _FAIL;
321 	}
322 	return _SUCCESS;
323 }
324 
325 int r8712_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher,
326 			int *pairwise_cipher)
327 {
328 	int i;
329 	int left, count;
330 	u8 *pos;
331 
332 	if (rsn_ie_len <= 0) {
333 		/* No RSN IE - fail silently */
334 		return _FAIL;
335 	}
336 	if ((*rsn_ie != _WPA2_IE_ID_) ||
337 	    (*(rsn_ie + 1) != (u8)(rsn_ie_len - 2)))
338 		return _FAIL;
339 	pos = rsn_ie;
340 	pos += 4;
341 	left = rsn_ie_len - 4;
342 	/*group_cipher*/
343 	if (left >= RSN_SELECTOR_LEN) {
344 		*group_cipher = r8712_get_wpa2_cipher_suite(pos);
345 		pos += RSN_SELECTOR_LEN;
346 		left -= RSN_SELECTOR_LEN;
347 	} else if (left > 0) {
348 		return _FAIL;
349 	}
350 	/*pairwise_cipher*/
351 	if (left >= 2) {
352 		count = le16_to_cpu(*(__le16 *)pos);
353 		pos += 2;
354 		left -= 2;
355 		if (count == 0 || left < count * RSN_SELECTOR_LEN)
356 			return _FAIL;
357 		for (i = 0; i < count; i++) {
358 			*pairwise_cipher |= r8712_get_wpa2_cipher_suite(pos);
359 			pos += RSN_SELECTOR_LEN;
360 			left -= RSN_SELECTOR_LEN;
361 		}
362 	} else if (left == 1) {
363 		return _FAIL;
364 	}
365 	return _SUCCESS;
366 }
367 
368 int r8712_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len,
369 		     u8 *wpa_ie, u16 *wpa_len)
370 {
371 	u8 authmode;
372 	u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01};
373 	uint cnt;
374 
375 	/*Search required WPA or WPA2 IE and copy to sec_ie[ ]*/
376 	cnt = _TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_;
377 	while (cnt < in_len) {
378 		authmode = in_ie[cnt];
379 		if ((authmode == _WPA_IE_ID_) &&
380 		    (!memcmp(&in_ie[cnt + 2], &wpa_oui[0], 4))) {
381 			memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
382 			*wpa_len = in_ie[cnt + 1] + 2;
383 			cnt += in_ie[cnt + 1] + 2;  /*get next */
384 		} else {
385 			if (authmode == _WPA2_IE_ID_) {
386 				memcpy(rsn_ie, &in_ie[cnt],
387 				       in_ie[cnt + 1] + 2);
388 				*rsn_len = in_ie[cnt + 1] + 2;
389 				cnt += in_ie[cnt + 1] + 2;  /*get next*/
390 			} else {
391 				cnt += in_ie[cnt + 1] + 2;   /*get next*/
392 			}
393 		}
394 	}
395 	return *rsn_len + *wpa_len;
396 }
397 
398 int r8712_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen)
399 {
400 	int match;
401 	uint cnt;
402 	u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
403 
404 	cnt = 12;
405 	match = false;
406 	while (cnt < in_len) {
407 		eid = in_ie[cnt];
408 		if ((eid == _WPA_IE_ID_) &&
409 		    (!memcmp(&in_ie[cnt + 2], wps_oui, 4))) {
410 			memcpy(wps_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
411 			*wps_ielen = in_ie[cnt + 1] + 2;
412 			cnt += in_ie[cnt + 1] + 2;
413 			match = true;
414 			break;
415 		}
416 			cnt += in_ie[cnt + 1] + 2; /* goto next */
417 	}
418 	return match;
419 }
420