1 // SPDX-License-Identifier: GPL-2.0
2 /******************************************************************************
3  *
4  * Copyright(c) 2007 - 2011 Realtek Corporation. All rights reserved.
5  *
6  ******************************************************************************/
7 
8 #include <drv_types.h>
9 #include <rtw_debug.h>
10 #include <linux/of.h>
11 #include <asm/unaligned.h>
12 
13 u8 RTW_WPA_OUI_TYPE[] = { 0x00, 0x50, 0xf2, 1 };
14 u16 RTW_WPA_VERSION = 1;
15 u8 WPA_AUTH_KEY_MGMT_NONE[] = { 0x00, 0x50, 0xf2, 0 };
16 u8 WPA_AUTH_KEY_MGMT_UNSPEC_802_1X[] = { 0x00, 0x50, 0xf2, 1 };
17 u8 WPA_AUTH_KEY_MGMT_PSK_OVER_802_1X[] = { 0x00, 0x50, 0xf2, 2 };
18 u8 WPA_CIPHER_SUITE_NONE[] = { 0x00, 0x50, 0xf2, 0 };
19 u8 WPA_CIPHER_SUITE_WEP40[] = { 0x00, 0x50, 0xf2, 1 };
20 u8 WPA_CIPHER_SUITE_TKIP[] = { 0x00, 0x50, 0xf2, 2 };
21 u8 WPA_CIPHER_SUITE_WRAP[] = { 0x00, 0x50, 0xf2, 3 };
22 u8 WPA_CIPHER_SUITE_CCMP[] = { 0x00, 0x50, 0xf2, 4 };
23 u8 WPA_CIPHER_SUITE_WEP104[] = { 0x00, 0x50, 0xf2, 5 };
24 
25 u16 RSN_VERSION_BSD = 1;
26 u8 RSN_AUTH_KEY_MGMT_UNSPEC_802_1X[] = { 0x00, 0x0f, 0xac, 1 };
27 u8 RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X[] = { 0x00, 0x0f, 0xac, 2 };
28 u8 RSN_CIPHER_SUITE_NONE[] = { 0x00, 0x0f, 0xac, 0 };
29 u8 RSN_CIPHER_SUITE_WEP40[] = { 0x00, 0x0f, 0xac, 1 };
30 u8 RSN_CIPHER_SUITE_TKIP[] = { 0x00, 0x0f, 0xac, 2 };
31 u8 RSN_CIPHER_SUITE_WRAP[] = { 0x00, 0x0f, 0xac, 3 };
32 u8 RSN_CIPHER_SUITE_CCMP[] = { 0x00, 0x0f, 0xac, 4 };
33 u8 RSN_CIPHER_SUITE_WEP104[] = { 0x00, 0x0f, 0xac, 5 };
34 /*  */
35 /*  for adhoc-master to generate ie and provide supported-rate to fw */
36 /*  */
37 
38 static u8 WIFI_CCKRATES[] = {
39 		(IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK),
40 		(IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK),
41 		(IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK),
42 		(IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK)
43 };
44 
45 static u8 WIFI_OFDMRATES[] = {
46 		(IEEE80211_OFDM_RATE_6MB),
47 		(IEEE80211_OFDM_RATE_9MB),
48 		(IEEE80211_OFDM_RATE_12MB),
49 		(IEEE80211_OFDM_RATE_18MB),
50 		(IEEE80211_OFDM_RATE_24MB),
51 		IEEE80211_OFDM_RATE_36MB,
52 		IEEE80211_OFDM_RATE_48MB,
53 		IEEE80211_OFDM_RATE_54MB
54 };
55 
56 int rtw_get_bit_value_from_ieee_value(u8 val)
57 {
58 	unsigned char dot11_rate_table[] = {2, 4, 11, 22, 12, 18, 24, 36, 48, 72, 96, 108, 0}; /*  last element must be zero!! */
59 	int i = 0;
60 
61 	while (dot11_rate_table[i] != 0) {
62 		if (dot11_rate_table[i] == val)
63 			return BIT(i);
64 		i++;
65 	}
66 	return 0;
67 }
68 
69 bool rtw_is_cckrates_included(u8 *rate)
70 {
71 	while (*rate) {
72 		u8 r = *rate & 0x7f;
73 
74 		if (r == 2 || r == 4 || r == 11 || r == 22)
75 			return true;
76 		rate++;
77 	}
78 
79 	return false;
80 }
81 
82 bool rtw_is_cckratesonly_included(u8 *rate)
83 {
84 	while (*rate) {
85 		u8 r = *rate & 0x7f;
86 
87 		if (r != 2 && r != 4 && r != 11 && r != 22)
88 			return false;
89 		rate++;
90 	}
91 
92 	return true;
93 }
94 
95 int rtw_check_network_type(unsigned char *rate, int ratelen, int channel)
96 {
97 	if (channel > 14) {
98 		return WIRELESS_INVALID;
99 	} else { /*  could be pure B, pure G, or B/G */
100 		if (rtw_is_cckratesonly_included(rate))
101 			return WIRELESS_11B;
102 		else if (rtw_is_cckrates_included(rate))
103 			return	WIRELESS_11BG;
104 		else
105 			return WIRELESS_11G;
106 	}
107 }
108 
109 u8 *rtw_set_fixed_ie(unsigned char *pbuf, unsigned int len, unsigned char *source,
110 				unsigned int *frlen)
111 {
112 	memcpy((void *)pbuf, (void *)source, len);
113 	*frlen = *frlen + len;
114 	return pbuf + len;
115 }
116 
117 /*  rtw_set_ie will update frame length */
118 u8 *rtw_set_ie(u8 *pbuf,
119 	       signed int index,
120 	       uint len,
121 	       u8 *source,
122 	       uint *frlen) /* frame length */
123 {
124 	*pbuf = (u8)index;
125 
126 	*(pbuf + 1) = (u8)len;
127 
128 	if (len > 0)
129 		memcpy((void *)(pbuf + 2), (void *)source, len);
130 
131 	*frlen = *frlen + (len + 2);
132 
133 	return pbuf + len + 2;
134 }
135 
136 /*----------------------------------------------------------------------------
137 index: the information element id index, limit is the limit for search
138 -----------------------------------------------------------------------------*/
139 u8 *rtw_get_ie(u8 *pbuf, signed int index, signed int *len, signed int limit)
140 {
141 	signed int tmp, i;
142 	u8 *p;
143 
144 	if (limit < 1)
145 		return NULL;
146 
147 	p = pbuf;
148 	i = 0;
149 	*len = 0;
150 	while (1) {
151 		if (*p == index) {
152 			*len = *(p + 1);
153 			return p;
154 		} else {
155 			tmp = *(p + 1);
156 			p += (tmp + 2);
157 			i += (tmp + 2);
158 		}
159 		if (i >= limit)
160 			break;
161 	}
162 	return NULL;
163 }
164 
165 /**
166  * rtw_get_ie_ex - Search specific IE from a series of IEs
167  * @in_ie: Address of IEs to search
168  * @in_len: Length limit from in_ie
169  * @eid: Element ID to match
170  * @oui: OUI to match
171  * @oui_len: OUI length
172  * @ie: If not NULL and the specific IE is found, the IE will be copied to the buf starting from the specific IE
173  * @ielen: If not NULL and the specific IE is found, will set to the length of the entire IE
174  *
175  * Returns: The address of the specific IE found, or NULL
176  */
177 u8 *rtw_get_ie_ex(u8 *in_ie, uint in_len, u8 eid, u8 *oui, u8 oui_len, u8 *ie, uint *ielen)
178 {
179 	uint cnt;
180 	u8 *target_ie = NULL;
181 
182 	if (ielen)
183 		*ielen = 0;
184 
185 	if (!in_ie || in_len <= 0)
186 		return target_ie;
187 
188 	cnt = 0;
189 
190 	while (cnt < in_len) {
191 		if (eid == in_ie[cnt]
192 			&& (!oui || !memcmp(&in_ie[cnt+2], oui, oui_len))) {
193 			target_ie = &in_ie[cnt];
194 
195 			if (ie)
196 				memcpy(ie, &in_ie[cnt], in_ie[cnt+1]+2);
197 
198 			if (ielen)
199 				*ielen = in_ie[cnt+1]+2;
200 
201 			break;
202 		} else {
203 			cnt += in_ie[cnt+1]+2; /* goto next */
204 		}
205 	}
206 
207 	return target_ie;
208 }
209 
210 /**
211  * rtw_ies_remove_ie - Find matching IEs and remove
212  * @ies: Address of IEs to search
213  * @ies_len: Pointer of length of ies, will update to new length
214  * @offset: The offset to start search
215  * @eid: Element ID to match
216  * @oui: OUI to match
217  * @oui_len: OUI length
218  *
219  * Returns: _SUCCESS: ies is updated, _FAIL: not updated
220  */
221 int rtw_ies_remove_ie(u8 *ies, uint *ies_len, uint offset, u8 eid, u8 *oui, u8 oui_len)
222 {
223 	int ret = _FAIL;
224 	u8 *target_ie;
225 	u32 target_ielen;
226 	u8 *start;
227 	uint search_len;
228 
229 	if (!ies || !ies_len || *ies_len <= offset)
230 		goto exit;
231 
232 	start = ies + offset;
233 	search_len = *ies_len - offset;
234 
235 	while (1) {
236 		target_ie = rtw_get_ie_ex(start, search_len, eid, oui, oui_len, NULL, &target_ielen);
237 		if (target_ie && target_ielen) {
238 			u8 *remain_ies = target_ie + target_ielen;
239 			uint remain_len = search_len - (remain_ies - start);
240 
241 			memcpy(target_ie, remain_ies, remain_len);
242 			*ies_len = *ies_len - target_ielen;
243 			ret = _SUCCESS;
244 
245 			start = target_ie;
246 			search_len = remain_len;
247 		} else {
248 			break;
249 		}
250 	}
251 exit:
252 	return ret;
253 }
254 
255 void rtw_set_supported_rate(u8 *supported_rates, uint mode)
256 {
257 	memset(supported_rates, 0, NDIS_802_11_LENGTH_RATES_EX);
258 
259 	switch (mode) {
260 	case WIRELESS_11B:
261 		memcpy(supported_rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
262 		break;
263 
264 	case WIRELESS_11G:
265 		memcpy(supported_rates, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN);
266 		break;
267 
268 	case WIRELESS_11BG:
269 	case WIRELESS_11G_24N:
270 	case WIRELESS_11_24N:
271 	case WIRELESS_11BG_24N:
272 		memcpy(supported_rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
273 		memcpy(supported_rates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN);
274 		break;
275 	}
276 }
277 
278 uint rtw_get_rateset_len(u8 *rateset)
279 {
280 	uint i;
281 
282 	for (i = 0; i < 13; i++)
283 		if (rateset[i] == 0)
284 			break;
285 	return i;
286 }
287 
288 int rtw_generate_ie(struct registry_priv *pregistrypriv)
289 {
290 	u8 wireless_mode;
291 	int	sz = 0, rateLen;
292 	struct wlan_bssid_ex *pdev_network = &pregistrypriv->dev_network;
293 	u8 *ie = pdev_network->ies;
294 
295 	/* timestamp will be inserted by hardware */
296 	sz += 8;
297 	ie += sz;
298 
299 	/* beacon interval : 2bytes */
300 	*(__le16 *)ie = cpu_to_le16((u16)pdev_network->configuration.beacon_period);/* BCN_INTERVAL; */
301 	sz += 2;
302 	ie += 2;
303 
304 	/* capability info */
305 	*(u16 *)ie = 0;
306 
307 	*(__le16 *)ie |= cpu_to_le16(WLAN_CAPABILITY_IBSS);
308 
309 	if (pregistrypriv->preamble == PREAMBLE_SHORT)
310 		*(__le16 *)ie |= cpu_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE);
311 
312 	if (pdev_network->privacy)
313 		*(__le16 *)ie |= cpu_to_le16(WLAN_CAPABILITY_PRIVACY);
314 
315 	sz += 2;
316 	ie += 2;
317 
318 	/* SSID */
319 	ie = rtw_set_ie(ie, WLAN_EID_SSID, pdev_network->ssid.ssid_length, pdev_network->ssid.ssid, &sz);
320 
321 	/* supported rates */
322 	wireless_mode = pregistrypriv->wireless_mode;
323 
324 	rtw_set_supported_rate(pdev_network->supported_rates, wireless_mode);
325 
326 	rateLen = rtw_get_rateset_len(pdev_network->supported_rates);
327 
328 	if (rateLen > 8) {
329 		ie = rtw_set_ie(ie, WLAN_EID_SUPP_RATES, 8, pdev_network->supported_rates, &sz);
330 		/* ie = rtw_set_ie(ie, WLAN_EID_EXT_SUPP_RATES, (rateLen - 8), (pdev_network->supported_rates + 8), &sz); */
331 	} else {
332 		ie = rtw_set_ie(ie, WLAN_EID_SUPP_RATES, rateLen, pdev_network->supported_rates, &sz);
333 	}
334 
335 	/* DS parameter set */
336 	ie = rtw_set_ie(ie, WLAN_EID_DS_PARAMS, 1, (u8 *)&(pdev_network->configuration.ds_config), &sz);
337 
338 	/* IBSS Parameter Set */
339 
340 	ie = rtw_set_ie(ie, WLAN_EID_IBSS_PARAMS, 2, (u8 *)&(pdev_network->configuration.atim_window), &sz);
341 
342 	if (rateLen > 8) {
343 		ie = rtw_set_ie(ie, WLAN_EID_EXT_SUPP_RATES, (rateLen - 8), (pdev_network->supported_rates + 8), &sz);
344 	}
345 
346 	/* HT Cap. */
347 	if ((pregistrypriv->wireless_mode & WIRELESS_11_24N) &&
348 	    (pregistrypriv->ht_enable == true)) {
349 		/* todo: */
350 	}
351 
352 	/* pdev_network->ie_length =  sz; update ie_length */
353 
354 	/* return _SUCCESS; */
355 
356 	return sz;
357 }
358 
359 unsigned char *rtw_get_wpa_ie(unsigned char *pie, int *wpa_ie_len, int limit)
360 {
361 	int len;
362 	u16 val16;
363 	unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01};
364 	u8 *pbuf = pie;
365 	int limit_new = limit;
366 	__le16 le_tmp;
367 
368 	while (1) {
369 		pbuf = rtw_get_ie(pbuf, WLAN_EID_VENDOR_SPECIFIC, &len, limit_new);
370 
371 		if (pbuf) {
372 			/* check if oui matches... */
373 			if (memcmp((pbuf + 2), wpa_oui_type, sizeof(wpa_oui_type))) {
374 				goto check_next_ie;
375 			}
376 
377 			/* check version... */
378 			memcpy((u8 *)&le_tmp, (pbuf + 6), sizeof(val16));
379 
380 			val16 = le16_to_cpu(le_tmp);
381 			if (val16 != 0x0001)
382 				goto check_next_ie;
383 
384 			*wpa_ie_len = *(pbuf + 1);
385 
386 			return pbuf;
387 
388 		} else {
389 			*wpa_ie_len = 0;
390 			return NULL;
391 		}
392 
393 check_next_ie:
394 
395 		limit_new = limit - (pbuf - pie) - 2 - len;
396 
397 		if (limit_new <= 0)
398 			break;
399 
400 		pbuf += (2 + len);
401 	}
402 
403 	*wpa_ie_len = 0;
404 
405 	return NULL;
406 }
407 
408 unsigned char *rtw_get_wpa2_ie(unsigned char *pie, int *rsn_ie_len, int limit)
409 {
410 	return rtw_get_ie(pie, WLAN_EID_RSN, rsn_ie_len, limit);
411 }
412 
413 int rtw_get_wpa_cipher_suite(u8 *s)
414 {
415 	if (!memcmp(s, WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN))
416 		return WPA_CIPHER_NONE;
417 	if (!memcmp(s, WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN))
418 		return WPA_CIPHER_WEP40;
419 	if (!memcmp(s, WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN))
420 		return WPA_CIPHER_TKIP;
421 	if (!memcmp(s, WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN))
422 		return WPA_CIPHER_CCMP;
423 	if (!memcmp(s, WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN))
424 		return WPA_CIPHER_WEP104;
425 
426 	return 0;
427 }
428 
429 int rtw_get_wpa2_cipher_suite(u8 *s)
430 {
431 	if (!memcmp(s, RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN))
432 		return WPA_CIPHER_NONE;
433 	if (!memcmp(s, RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN))
434 		return WPA_CIPHER_WEP40;
435 	if (!memcmp(s, RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN))
436 		return WPA_CIPHER_TKIP;
437 	if (!memcmp(s, RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN))
438 		return WPA_CIPHER_CCMP;
439 	if (!memcmp(s, RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN))
440 		return WPA_CIPHER_WEP104;
441 
442 	return 0;
443 }
444 
445 int rtw_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher, int *pairwise_cipher, int *is_8021x)
446 {
447 	int i, ret = _SUCCESS;
448 	int left, count;
449 	u8 *pos;
450 	u8 SUITE_1X[4] = {0x00, 0x50, 0xf2, 1};
451 
452 	if (wpa_ie_len <= 0) {
453 		/* No WPA IE - fail silently */
454 		return _FAIL;
455 	}
456 
457 	if ((*wpa_ie != WLAN_EID_VENDOR_SPECIFIC) || (*(wpa_ie+1) != (u8)(wpa_ie_len - 2)) ||
458 	   (memcmp(wpa_ie+2, RTW_WPA_OUI_TYPE, WPA_SELECTOR_LEN))) {
459 		return _FAIL;
460 	}
461 
462 	pos = wpa_ie;
463 
464 	pos += 8;
465 	left = wpa_ie_len - 8;
466 
467 	/* group_cipher */
468 	if (left >= WPA_SELECTOR_LEN) {
469 		*group_cipher = rtw_get_wpa_cipher_suite(pos);
470 
471 		pos += WPA_SELECTOR_LEN;
472 		left -= WPA_SELECTOR_LEN;
473 
474 	} else if (left > 0)
475 		return _FAIL;
476 
477 	/* pairwise_cipher */
478 	if (left >= 2) {
479 		/* count = le16_to_cpu(*(u16*)pos); */
480 		count = get_unaligned_le16(pos);
481 		pos += 2;
482 		left -= 2;
483 
484 		if (count == 0 || left < count * WPA_SELECTOR_LEN)
485 			return _FAIL;
486 
487 		for (i = 0; i < count; i++) {
488 			*pairwise_cipher |= rtw_get_wpa_cipher_suite(pos);
489 
490 			pos += WPA_SELECTOR_LEN;
491 			left -= WPA_SELECTOR_LEN;
492 		}
493 
494 	} else if (left == 1)
495 		return _FAIL;
496 
497 	if (is_8021x) {
498 		if (left >= 6) {
499 			pos += 2;
500 			if (!memcmp(pos, SUITE_1X, 4)) {
501 				*is_8021x = 1;
502 			}
503 		}
504 	}
505 
506 	return ret;
507 }
508 
509 int rtw_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher, int *pairwise_cipher, int *is_8021x)
510 {
511 	int i, ret = _SUCCESS;
512 	int left, count;
513 	u8 *pos;
514 	u8 SUITE_1X[4] = {0x00, 0x0f, 0xac, 0x01};
515 
516 	if (rsn_ie_len <= 0) {
517 		/* No RSN IE - fail silently */
518 		return _FAIL;
519 	}
520 
521 	if ((*rsn_ie != WLAN_EID_RSN) || (*(rsn_ie+1) != (u8)(rsn_ie_len - 2))) {
522 		return _FAIL;
523 	}
524 
525 	pos = rsn_ie;
526 	pos += 4;
527 	left = rsn_ie_len - 4;
528 
529 	/* group_cipher */
530 	if (left >= RSN_SELECTOR_LEN) {
531 		*group_cipher = rtw_get_wpa2_cipher_suite(pos);
532 
533 		pos += RSN_SELECTOR_LEN;
534 		left -= RSN_SELECTOR_LEN;
535 
536 	} else if (left > 0)
537 		return _FAIL;
538 
539 	/* pairwise_cipher */
540 	if (left >= 2) {
541 	  /* count = le16_to_cpu(*(u16*)pos); */
542 		count = get_unaligned_le16(pos);
543 		pos += 2;
544 		left -= 2;
545 
546 		if (count == 0 || left < count * RSN_SELECTOR_LEN)
547 			return _FAIL;
548 
549 		for (i = 0; i < count; i++) {
550 			*pairwise_cipher |= rtw_get_wpa2_cipher_suite(pos);
551 
552 			pos += RSN_SELECTOR_LEN;
553 			left -= RSN_SELECTOR_LEN;
554 		}
555 
556 	} else if (left == 1)
557 		return _FAIL;
558 
559 	if (is_8021x) {
560 		if (left >= 6) {
561 			pos += 2;
562 			if (!memcmp(pos, SUITE_1X, 4))
563 				*is_8021x = 1;
564 		}
565 	}
566 
567 	return ret;
568 }
569 
570 /* ifdef CONFIG_WAPI_SUPPORT */
571 int rtw_get_wapi_ie(u8 *in_ie, uint in_len, u8 *wapi_ie, u16 *wapi_len)
572 {
573 	int len = 0;
574 	u8 authmode;
575 	uint	cnt;
576 	u8 wapi_oui1[4] = {0x0, 0x14, 0x72, 0x01};
577 	u8 wapi_oui2[4] = {0x0, 0x14, 0x72, 0x02};
578 
579 	if (wapi_len)
580 		*wapi_len = 0;
581 
582 	if (!in_ie || in_len <= 0)
583 		return len;
584 
585 	cnt = (_TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_);
586 
587 	while (cnt < in_len) {
588 		authmode = in_ie[cnt];
589 
590 		/* if (authmode == WLAN_EID_BSS_AC_ACCESS_DELAY) */
591 		if (authmode == WLAN_EID_BSS_AC_ACCESS_DELAY && (!memcmp(&in_ie[cnt+6], wapi_oui1, 4) ||
592 					!memcmp(&in_ie[cnt+6], wapi_oui2, 4))) {
593 			if (wapi_ie)
594 				memcpy(wapi_ie, &in_ie[cnt], in_ie[cnt+1]+2);
595 
596 			if (wapi_len)
597 				*wapi_len = in_ie[cnt+1]+2;
598 
599 			cnt += in_ie[cnt+1]+2;  /* get next */
600 		} else {
601 			cnt += in_ie[cnt+1]+2;   /* get next */
602 		}
603 	}
604 
605 	if (wapi_len)
606 		len = *wapi_len;
607 
608 	return len;
609 }
610 /* endif */
611 
612 void rtw_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len, u8 *wpa_ie, u16 *wpa_len)
613 {
614 	u8 authmode;
615 	u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01};
616 	uint	cnt;
617 
618 	/* Search required WPA or WPA2 IE and copy to sec_ie[ ] */
619 
620 	cnt = (_TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_);
621 
622 	while (cnt < in_len) {
623 		authmode = in_ie[cnt];
624 
625 		if ((authmode == WLAN_EID_VENDOR_SPECIFIC) && (!memcmp(&in_ie[cnt+2], &wpa_oui[0], 4))) {
626 			if (wpa_ie)
627 				memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt+1]+2);
628 
629 			*wpa_len = in_ie[cnt + 1] + 2;
630 			cnt += in_ie[cnt + 1] + 2;  /* get next */
631 		} else {
632 			if (authmode == WLAN_EID_RSN) {
633 				if (rsn_ie)
634 					memcpy(rsn_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
635 
636 				*rsn_len = in_ie[cnt+1]+2;
637 				cnt += in_ie[cnt+1]+2;  /* get next */
638 			} else {
639 				cnt += in_ie[cnt+1]+2;   /* get next */
640 			}
641 		}
642 	}
643 }
644 
645 u8 rtw_is_wps_ie(u8 *ie_ptr, uint *wps_ielen)
646 {
647 	u8 match = false;
648 	u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
649 
650 	if (!ie_ptr)
651 		return match;
652 
653 	eid = ie_ptr[0];
654 
655 	if ((eid == WLAN_EID_VENDOR_SPECIFIC) && (!memcmp(&ie_ptr[2], wps_oui, 4))) {
656 		*wps_ielen = ie_ptr[1]+2;
657 		match = true;
658 	}
659 	return match;
660 }
661 
662 /**
663  * rtw_get_wps_ie - Search WPS IE from a series of IEs
664  * @in_ie: Address of IEs to search
665  * @in_len: Length limit from in_ie
666  * @wps_ie: If not NULL and WPS IE is found, WPS IE will be copied to the buf starting from wps_ie
667  * @wps_ielen: If not NULL and WPS IE is found, will set to the length of the entire WPS IE
668  *
669  * Returns: The address of the WPS IE found, or NULL
670  */
671 u8 *rtw_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen)
672 {
673 	uint cnt;
674 	u8 *wpsie_ptr = NULL;
675 	u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
676 
677 	if (wps_ielen)
678 		*wps_ielen = 0;
679 
680 	if (!in_ie || in_len <= 0)
681 		return wpsie_ptr;
682 
683 	cnt = 0;
684 
685 	while (cnt < in_len) {
686 		eid = in_ie[cnt];
687 
688 		if ((eid == WLAN_EID_VENDOR_SPECIFIC) && (!memcmp(&in_ie[cnt+2], wps_oui, 4))) {
689 			wpsie_ptr = &in_ie[cnt];
690 
691 			if (wps_ie)
692 				memcpy(wps_ie, &in_ie[cnt], in_ie[cnt+1]+2);
693 
694 			if (wps_ielen)
695 				*wps_ielen = in_ie[cnt+1]+2;
696 
697 			cnt += in_ie[cnt+1]+2;
698 
699 			break;
700 		} else {
701 			cnt += in_ie[cnt+1]+2; /* goto next */
702 		}
703 	}
704 
705 	return wpsie_ptr;
706 }
707 
708 /**
709  * rtw_get_wps_attr - Search a specific WPS attribute from a given WPS IE
710  * @wps_ie: Address of WPS IE to search
711  * @wps_ielen: Length limit from wps_ie
712  * @target_attr_id: The attribute ID of WPS attribute to search
713  * @buf_attr: If not NULL and the WPS attribute is found, WPS attribute will be copied to the buf starting from buf_attr
714  * @len_attr: If not NULL and the WPS attribute is found, will set to the length of the entire WPS attribute
715  *
716  * Returns: the address of the specific WPS attribute found, or NULL
717  */
718 u8 *rtw_get_wps_attr(u8 *wps_ie, uint wps_ielen, u16 target_attr_id, u8 *buf_attr, u32 *len_attr)
719 {
720 	u8 *attr_ptr = NULL;
721 	u8 *target_attr_ptr = NULL;
722 	u8 wps_oui[4] = {0x00, 0x50, 0xF2, 0x04};
723 
724 	if (len_attr)
725 		*len_attr = 0;
726 
727 	if ((wps_ie[0] != WLAN_EID_VENDOR_SPECIFIC) ||
728 		(memcmp(wps_ie + 2, wps_oui, 4))) {
729 		return attr_ptr;
730 	}
731 
732 	/*  6 = 1(Element ID) + 1(Length) + 4(WPS OUI) */
733 	attr_ptr = wps_ie + 6; /* goto first attr */
734 
735 	while (attr_ptr - wps_ie < wps_ielen) {
736 		/*  4 = 2(Attribute ID) + 2(Length) */
737 		u16 attr_id = get_unaligned_be16(attr_ptr);
738 		u16 attr_data_len = get_unaligned_be16(attr_ptr + 2);
739 		u16 attr_len = attr_data_len + 4;
740 
741 		if (attr_id == target_attr_id) {
742 			target_attr_ptr = attr_ptr;
743 
744 			if (buf_attr)
745 				memcpy(buf_attr, attr_ptr, attr_len);
746 
747 			if (len_attr)
748 				*len_attr = attr_len;
749 
750 			break;
751 		} else {
752 			attr_ptr += attr_len; /* goto next */
753 		}
754 	}
755 
756 	return target_attr_ptr;
757 }
758 
759 /**
760  * rtw_get_wps_attr_content - Search a specific WPS attribute content from a given WPS IE
761  * @wps_ie: Address of WPS IE to search
762  * @wps_ielen: Length limit from wps_ie
763  * @target_attr_id: The attribute ID of WPS attribute to search
764  * @buf_content: If not NULL and the WPS attribute is found, WPS attribute content will be copied to the buf starting from buf_content
765  * @len_content: If not NULL and the WPS attribute is found, will set to the length of the WPS attribute content
766  *
767  * Returns: the address of the specific WPS attribute content found, or NULL
768  */
769 u8 *rtw_get_wps_attr_content(u8 *wps_ie, uint wps_ielen, u16 target_attr_id, u8 *buf_content, uint *len_content)
770 {
771 	u8 *attr_ptr;
772 	u32 attr_len;
773 
774 	if (len_content)
775 		*len_content = 0;
776 
777 	attr_ptr = rtw_get_wps_attr(wps_ie, wps_ielen, target_attr_id, NULL, &attr_len);
778 
779 	if (attr_ptr && attr_len) {
780 		if (buf_content)
781 			memcpy(buf_content, attr_ptr+4, attr_len-4);
782 
783 		if (len_content)
784 			*len_content = attr_len-4;
785 
786 		return attr_ptr+4;
787 	}
788 
789 	return NULL;
790 }
791 
792 static int rtw_ieee802_11_parse_vendor_specific(u8 *pos, uint elen,
793 					    struct rtw_ieee802_11_elems *elems,
794 					    int show_errors)
795 {
796 	unsigned int oui;
797 
798 	/* first 3 bytes in vendor specific information element are the IEEE
799 	 * OUI of the vendor. The following byte is used a vendor specific
800 	 * sub-type. */
801 	if (elen < 4)
802 		return -1;
803 
804 	oui = get_unaligned_be24(pos);
805 	switch (oui) {
806 	case OUI_MICROSOFT:
807 		/* Microsoft/Wi-Fi information elements are further typed and
808 		 * subtyped */
809 		switch (pos[3]) {
810 		case 1:
811 			/* Microsoft OUI (00:50:F2) with OUI Type 1:
812 			 * real WPA information element */
813 			elems->wpa_ie = pos;
814 			elems->wpa_ie_len = elen;
815 			break;
816 		case WME_OUI_TYPE: /* this is a Wi-Fi WME info. element */
817 			if (elen < 5)
818 				return -1;
819 
820 			switch (pos[4]) {
821 			case WME_OUI_SUBTYPE_INFORMATION_ELEMENT:
822 			case WME_OUI_SUBTYPE_PARAMETER_ELEMENT:
823 				elems->wme = pos;
824 				elems->wme_len = elen;
825 				break;
826 			case WME_OUI_SUBTYPE_TSPEC_ELEMENT:
827 				elems->wme_tspec = pos;
828 				elems->wme_tspec_len = elen;
829 				break;
830 			default:
831 				return -1;
832 			}
833 			break;
834 		case 4:
835 			/* Wi-Fi Protected Setup (WPS) IE */
836 			elems->wps_ie = pos;
837 			elems->wps_ie_len = elen;
838 			break;
839 		default:
840 			return -1;
841 		}
842 		break;
843 
844 	case OUI_BROADCOM:
845 		switch (pos[3]) {
846 		case VENDOR_HT_CAPAB_OUI_TYPE:
847 			elems->vendor_ht_cap = pos;
848 			elems->vendor_ht_cap_len = elen;
849 			break;
850 		default:
851 			return -1;
852 		}
853 		break;
854 
855 	default:
856 		return -1;
857 	}
858 
859 	return 0;
860 }
861 
862 /**
863  * rtw_ieee802_11_parse_elems - Parse information elements in management frames
864  * @start: Pointer to the start of IEs
865  * @len: Length of IE buffer in octets
866  * @elems: Data structure for parsed elements
867  * @show_errors: Whether to show parsing errors in debug log
868  * Returns: Parsing result
869  */
870 enum ParseRes rtw_ieee802_11_parse_elems(u8 *start, uint len,
871 				struct rtw_ieee802_11_elems *elems,
872 				int show_errors)
873 {
874 	uint left = len;
875 	u8 *pos = start;
876 	int unknown = 0;
877 
878 	memset(elems, 0, sizeof(*elems));
879 
880 	while (left >= 2) {
881 		u8 id, elen;
882 
883 		id = *pos++;
884 		elen = *pos++;
885 		left -= 2;
886 
887 		if (elen > left)
888 			return ParseFailed;
889 
890 		switch (id) {
891 		case WLAN_EID_SSID:
892 			elems->ssid = pos;
893 			elems->ssid_len = elen;
894 			break;
895 		case WLAN_EID_SUPP_RATES:
896 			elems->supp_rates = pos;
897 			elems->supp_rates_len = elen;
898 			break;
899 		case WLAN_EID_FH_PARAMS:
900 			elems->fh_params = pos;
901 			elems->fh_params_len = elen;
902 			break;
903 		case WLAN_EID_DS_PARAMS:
904 			elems->ds_params = pos;
905 			elems->ds_params_len = elen;
906 			break;
907 		case WLAN_EID_CF_PARAMS:
908 			elems->cf_params = pos;
909 			elems->cf_params_len = elen;
910 			break;
911 		case WLAN_EID_TIM:
912 			elems->tim = pos;
913 			elems->tim_len = elen;
914 			break;
915 		case WLAN_EID_IBSS_PARAMS:
916 			elems->ibss_params = pos;
917 			elems->ibss_params_len = elen;
918 			break;
919 		case WLAN_EID_CHALLENGE:
920 			elems->challenge = pos;
921 			elems->challenge_len = elen;
922 			break;
923 		case WLAN_EID_ERP_INFO:
924 			elems->erp_info = pos;
925 			elems->erp_info_len = elen;
926 			break;
927 		case WLAN_EID_EXT_SUPP_RATES:
928 			elems->ext_supp_rates = pos;
929 			elems->ext_supp_rates_len = elen;
930 			break;
931 		case WLAN_EID_VENDOR_SPECIFIC:
932 			if (rtw_ieee802_11_parse_vendor_specific(pos, elen,
933 							     elems,
934 							     show_errors))
935 				unknown++;
936 			break;
937 		case WLAN_EID_RSN:
938 			elems->rsn_ie = pos;
939 			elems->rsn_ie_len = elen;
940 			break;
941 		case WLAN_EID_PWR_CAPABILITY:
942 			elems->power_cap = pos;
943 			elems->power_cap_len = elen;
944 			break;
945 		case WLAN_EID_SUPPORTED_CHANNELS:
946 			elems->supp_channels = pos;
947 			elems->supp_channels_len = elen;
948 			break;
949 		case WLAN_EID_MOBILITY_DOMAIN:
950 			elems->mdie = pos;
951 			elems->mdie_len = elen;
952 			break;
953 		case WLAN_EID_FAST_BSS_TRANSITION:
954 			elems->ftie = pos;
955 			elems->ftie_len = elen;
956 			break;
957 		case WLAN_EID_TIMEOUT_INTERVAL:
958 			elems->timeout_int = pos;
959 			elems->timeout_int_len = elen;
960 			break;
961 		case WLAN_EID_HT_CAPABILITY:
962 			elems->ht_capabilities = pos;
963 			elems->ht_capabilities_len = elen;
964 			break;
965 		case WLAN_EID_HT_OPERATION:
966 			elems->ht_operation = pos;
967 			elems->ht_operation_len = elen;
968 			break;
969 		case WLAN_EID_VHT_CAPABILITY:
970 			elems->vht_capabilities = pos;
971 			elems->vht_capabilities_len = elen;
972 			break;
973 		case WLAN_EID_VHT_OPERATION:
974 			elems->vht_operation = pos;
975 			elems->vht_operation_len = elen;
976 			break;
977 		case WLAN_EID_OPMODE_NOTIF:
978 			elems->vht_op_mode_notify = pos;
979 			elems->vht_op_mode_notify_len = elen;
980 			break;
981 		default:
982 			unknown++;
983 			break;
984 		}
985 
986 		left -= elen;
987 		pos += elen;
988 	}
989 
990 	if (left)
991 		return ParseFailed;
992 
993 	return unknown ? ParseUnknown : ParseOK;
994 }
995 
996 void rtw_macaddr_cfg(struct device *dev, u8 *mac_addr)
997 {
998 	u8 mac[ETH_ALEN];
999 	struct device_node *np = dev->of_node;
1000 	const unsigned char *addr;
1001 	int len;
1002 
1003 	if (!mac_addr)
1004 		return;
1005 
1006 	if (rtw_initmac && mac_pton(rtw_initmac, mac)) {
1007 		/* Users specify the mac address */
1008 		ether_addr_copy(mac_addr, mac);
1009 	} else {
1010 		/* Use the mac address stored in the Efuse */
1011 		ether_addr_copy(mac, mac_addr);
1012 	}
1013 
1014 	if (is_broadcast_ether_addr(mac) || is_zero_ether_addr(mac)) {
1015 		addr = of_get_property(np, "local-mac-address", &len);
1016 
1017 		if (addr && len == ETH_ALEN) {
1018 			ether_addr_copy(mac_addr, addr);
1019 		} else {
1020 			eth_random_addr(mac_addr);
1021 		}
1022 	}
1023 }
1024 
1025 static int rtw_get_cipher_info(struct wlan_network *pnetwork)
1026 {
1027 	u32 wpa_ielen;
1028 	unsigned char *pbuf;
1029 	int group_cipher = 0, pairwise_cipher = 0, is8021x = 0;
1030 	int ret = _FAIL;
1031 
1032 	pbuf = rtw_get_wpa_ie(&pnetwork->network.ies[12], &wpa_ielen, pnetwork->network.ie_length-12);
1033 
1034 	if (pbuf && (wpa_ielen > 0)) {
1035 		if (_SUCCESS == rtw_parse_wpa_ie(pbuf, wpa_ielen+2, &group_cipher, &pairwise_cipher, &is8021x)) {
1036 			pnetwork->bcn_info.pairwise_cipher = pairwise_cipher;
1037 			pnetwork->bcn_info.group_cipher = group_cipher;
1038 			pnetwork->bcn_info.is_8021x = is8021x;
1039 			ret = _SUCCESS;
1040 		}
1041 	} else {
1042 		pbuf = rtw_get_wpa2_ie(&pnetwork->network.ies[12], &wpa_ielen, pnetwork->network.ie_length-12);
1043 
1044 		if (pbuf && (wpa_ielen > 0)) {
1045 			if (_SUCCESS == rtw_parse_wpa2_ie(pbuf, wpa_ielen+2, &group_cipher, &pairwise_cipher, &is8021x)) {
1046 				pnetwork->bcn_info.pairwise_cipher = pairwise_cipher;
1047 				pnetwork->bcn_info.group_cipher = group_cipher;
1048 				pnetwork->bcn_info.is_8021x = is8021x;
1049 				ret = _SUCCESS;
1050 			}
1051 		}
1052 	}
1053 
1054 	return ret;
1055 }
1056 
1057 void rtw_get_bcn_info(struct wlan_network *pnetwork)
1058 {
1059 	unsigned short cap = 0;
1060 	u8 bencrypt = 0;
1061 	/* u8 wpa_ie[255], rsn_ie[255]; */
1062 	u16 wpa_len = 0, rsn_len = 0;
1063 	struct HT_info_element *pht_info = NULL;
1064 	struct ieee80211_ht_cap *pht_cap = NULL;
1065 	unsigned int		len;
1066 	unsigned char 	*p;
1067 	__le16 le_cap;
1068 
1069 	memcpy((u8 *)&le_cap, rtw_get_capability_from_ie(pnetwork->network.ies), 2);
1070 	cap = le16_to_cpu(le_cap);
1071 	if (cap & WLAN_CAPABILITY_PRIVACY) {
1072 		bencrypt = 1;
1073 		pnetwork->network.privacy = 1;
1074 	} else {
1075 		pnetwork->bcn_info.encryp_protocol = ENCRYP_PROTOCOL_OPENSYS;
1076 	}
1077 	rtw_get_sec_ie(pnetwork->network.ies, pnetwork->network.ie_length, NULL, &rsn_len, NULL, &wpa_len);
1078 
1079 	if (rsn_len > 0) {
1080 		pnetwork->bcn_info.encryp_protocol = ENCRYP_PROTOCOL_WPA2;
1081 	} else if (wpa_len > 0) {
1082 		pnetwork->bcn_info.encryp_protocol = ENCRYP_PROTOCOL_WPA;
1083 	} else {
1084 		if (bencrypt)
1085 			pnetwork->bcn_info.encryp_protocol = ENCRYP_PROTOCOL_WEP;
1086 	}
1087 	rtw_get_cipher_info(pnetwork);
1088 
1089 	/* get bwmode and ch_offset */
1090 	/* parsing HT_CAP_IE */
1091 	p = rtw_get_ie(pnetwork->network.ies + _FIXED_IE_LENGTH_, WLAN_EID_HT_CAPABILITY, &len, pnetwork->network.ie_length - _FIXED_IE_LENGTH_);
1092 	if (p && len > 0) {
1093 			pht_cap = (struct ieee80211_ht_cap *)(p + 2);
1094 			pnetwork->bcn_info.ht_cap_info = le16_to_cpu(pht_cap->cap_info);
1095 	} else {
1096 			pnetwork->bcn_info.ht_cap_info = 0;
1097 	}
1098 	/* parsing HT_INFO_IE */
1099 	p = rtw_get_ie(pnetwork->network.ies + _FIXED_IE_LENGTH_, WLAN_EID_HT_OPERATION, &len, pnetwork->network.ie_length - _FIXED_IE_LENGTH_);
1100 	if (p && len > 0) {
1101 			pht_info = (struct HT_info_element *)(p + 2);
1102 			pnetwork->bcn_info.ht_info_infos_0 = pht_info->infos[0];
1103 	} else {
1104 			pnetwork->bcn_info.ht_info_infos_0 = 0;
1105 	}
1106 }
1107 
1108 /* show MCS rate, unit: 100Kbps */
1109 u16 rtw_mcs_rate(u8 bw_40MHz, u8 short_GI, unsigned char *MCS_rate)
1110 {
1111 	u16 max_rate = 0;
1112 
1113 	if (MCS_rate[0] & BIT(7))
1114 		max_rate = (bw_40MHz) ? ((short_GI)?1500:1350):((short_GI)?722:650);
1115 	else if (MCS_rate[0] & BIT(6))
1116 		max_rate = (bw_40MHz) ? ((short_GI)?1350:1215):((short_GI)?650:585);
1117 	else if (MCS_rate[0] & BIT(5))
1118 		max_rate = (bw_40MHz) ? ((short_GI)?1200:1080):((short_GI)?578:520);
1119 	else if (MCS_rate[0] & BIT(4))
1120 		max_rate = (bw_40MHz) ? ((short_GI)?900:810):((short_GI)?433:390);
1121 	else if (MCS_rate[0] & BIT(3))
1122 		max_rate = (bw_40MHz) ? ((short_GI)?600:540):((short_GI)?289:260);
1123 	else if (MCS_rate[0] & BIT(2))
1124 		max_rate = (bw_40MHz) ? ((short_GI)?450:405):((short_GI)?217:195);
1125 	else if (MCS_rate[0] & BIT(1))
1126 		max_rate = (bw_40MHz) ? ((short_GI)?300:270):((short_GI)?144:130);
1127 	else if (MCS_rate[0] & BIT(0))
1128 		max_rate = (bw_40MHz) ? ((short_GI)?150:135):((short_GI)?72:65);
1129 
1130 	return max_rate;
1131 }
1132 
1133 int rtw_action_frame_parse(const u8 *frame, u32 frame_len, u8 *category, u8 *action)
1134 {
1135 	const u8 *frame_body = frame + sizeof(struct ieee80211_hdr_3addr);
1136 	u16 fc;
1137 	u8 c;
1138 	u8 a = ACT_PUBLIC_MAX;
1139 
1140 	fc = le16_to_cpu(((struct ieee80211_hdr_3addr *)frame)->frame_control);
1141 
1142 	if ((fc & (IEEE80211_FCTL_FTYPE|IEEE80211_FCTL_STYPE))
1143 		!= (IEEE80211_FTYPE_MGMT|IEEE80211_STYPE_ACTION)
1144 	) {
1145 		return false;
1146 	}
1147 
1148 	c = frame_body[0];
1149 
1150 	switch (c) {
1151 	case RTW_WLAN_CATEGORY_P2P: /* vendor-specific */
1152 		break;
1153 	default:
1154 		a = frame_body[1];
1155 	}
1156 
1157 	if (category)
1158 		*category = c;
1159 	if (action)
1160 		*action = a;
1161 
1162 	return true;
1163 }
1164 
1165 static const char *_action_public_str[] = {
1166 	"ACT_PUB_BSSCOEXIST",
1167 	"ACT_PUB_DSE_ENABLE",
1168 	"ACT_PUB_DSE_DEENABLE",
1169 	"ACT_PUB_DSE_REG_LOCATION",
1170 	"ACT_PUB_EXT_CHL_SWITCH",
1171 	"ACT_PUB_DSE_MSR_REQ",
1172 	"ACT_PUB_DSE_MSR_RPRT",
1173 	"ACT_PUB_MP",
1174 	"ACT_PUB_DSE_PWR_CONSTRAINT",
1175 	"ACT_PUB_VENDOR",
1176 	"ACT_PUB_GAS_INITIAL_REQ",
1177 	"ACT_PUB_GAS_INITIAL_RSP",
1178 	"ACT_PUB_GAS_COMEBACK_REQ",
1179 	"ACT_PUB_GAS_COMEBACK_RSP",
1180 	"ACT_PUB_TDLS_DISCOVERY_RSP",
1181 	"ACT_PUB_LOCATION_TRACK",
1182 	"ACT_PUB_RSVD",
1183 };
1184 
1185 const char *action_public_str(u8 action)
1186 {
1187 	action = (action >= ACT_PUBLIC_MAX) ? ACT_PUBLIC_MAX : action;
1188 	return _action_public_str[action];
1189 }
1190