Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v3.1-rc2 454 lines 13 kB view raw
1/****************************************************************************** 2 * ieee80211.c 3 * 4 * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved. 5 * Linux device driver for RTL8192SU 6 * 7 * This program is free software; you can redistribute it and/or modify it 8 * under the terms of version 2 of the GNU General Public License as 9 * published by the Free Software Foundation. 10 * 11 * This program is distributed in the hope that it will be useful, but WITHOUT 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for 14 * more details. 15 * 16 * You should have received a copy of the GNU General Public License along with 17 * this program; if not, write to the Free Software Foundation, Inc., 18 * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA 19 * 20 * Modifications for inclusion into the Linux staging tree are 21 * Copyright(c) 2010 Larry Finger. All rights reserved. 22 * 23 * Contact information: 24 * WLAN FAE <wlanfae@realtek.com>. 25 * Larry Finger <Larry.Finger@lwfinger.net> 26 * 27 ******************************************************************************/ 28 29#define _IEEE80211_C 30 31#include "drv_types.h" 32#include "ieee80211.h" 33#include "wifi.h" 34#include "osdep_service.h" 35#include "wlan_bssdef.h" 36 37static const u8 WPA_OUI_TYPE[] = {0x00, 0x50, 0xf2, 1}; 38static const u8 WPA_CIPHER_SUITE_NONE[] = {0x00, 0x50, 0xf2, 0}; 39static const u8 WPA_CIPHER_SUITE_WEP40[] = {0x00, 0x50, 0xf2, 1}; 40static const u8 WPA_CIPHER_SUITE_TKIP[] = {0x00, 0x50, 0xf2, 2}; 41static const u8 WPA_CIPHER_SUITE_CCMP[] = {0x00, 0x50, 0xf2, 4}; 42static const u8 WPA_CIPHER_SUITE_WEP104[] = {0x00, 0x50, 0xf2, 5}; 43 44static const u8 RSN_CIPHER_SUITE_NONE[] = {0x00, 0x0f, 0xac, 0}; 45static const u8 RSN_CIPHER_SUITE_WEP40[] = {0x00, 0x0f, 0xac, 1}; 46static const u8 RSN_CIPHER_SUITE_TKIP[] = {0x00, 0x0f, 0xac, 2}; 47static const u8 RSN_CIPHER_SUITE_CCMP[] = {0x00, 0x0f, 0xac, 4}; 48static const u8 RSN_CIPHER_SUITE_WEP104[] = {0x00, 0x0f, 0xac, 5}; 49 50/*----------------------------------------------------------- 51 * for adhoc-master to generate ie and provide supported-rate to fw 52 *----------------------------------------------------------- 53 */ 54 55static u8 WIFI_CCKRATES[] = { 56 (IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK), 57 (IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK), 58 (IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK), 59 (IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK) 60}; 61 62static u8 WIFI_OFDMRATES[] = { 63 (IEEE80211_OFDM_RATE_6MB), 64 (IEEE80211_OFDM_RATE_9MB), 65 (IEEE80211_OFDM_RATE_12MB), 66 (IEEE80211_OFDM_RATE_18MB), 67 (IEEE80211_OFDM_RATE_24MB), 68 (IEEE80211_OFDM_RATE_36MB), 69 (IEEE80211_OFDM_RATE_48MB), 70 (IEEE80211_OFDM_RATE_54MB) 71}; 72 73uint r8712_is_cckrates_included(u8 *rate) 74{ 75 u32 i = 0; 76 77 while (rate[i] != 0) { 78 if ((((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) || 79 (((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22)) 80 return true; 81 i++; 82 } 83 return false; 84} 85 86uint r8712_is_cckratesonly_included(u8 *rate) 87{ 88 u32 i = 0; 89 90 while (rate[i] != 0) { 91 if ((((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) && 92 (((rate[i]) & 0x7f) != 11) && (((rate[i]) & 0x7f) != 22)) 93 return false; 94 i++; 95 } 96 return true; 97} 98 99/* r8712_set_ie will update frame length */ 100u8 *r8712_set_ie(u8 *pbuf, sint index, uint len, u8 *source, uint *frlen) 101{ 102 *pbuf = (u8)index; 103 *(pbuf + 1) = (u8)len; 104 if (len > 0) 105 memcpy((void *)(pbuf + 2), (void *)source, len); 106 *frlen = *frlen + (len + 2); 107 return pbuf + len + 2; 108} 109 110/*---------------------------------------------------------------------------- 111index: the information element id index, limit is the limit for search 112-----------------------------------------------------------------------------*/ 113u8 *r8712_get_ie(u8 *pbuf, sint index, sint *len, sint limit) 114{ 115 sint tmp, i; 116 u8 *p; 117 118 if (limit < 1) 119 return NULL; 120 p = pbuf; 121 i = 0; 122 *len = 0; 123 while (1) { 124 if (*p == index) { 125 *len = *(p + 1); 126 return p; 127 } else { 128 tmp = *(p + 1); 129 p += (tmp + 2); 130 i += (tmp + 2); 131 } 132 if (i >= limit) 133 break; 134 } 135 return NULL; 136} 137 138static void set_supported_rate(u8 *SupportedRates, uint mode) 139{ 140 memset(SupportedRates, 0, NDIS_802_11_LENGTH_RATES_EX); 141 switch (mode) { 142 case WIRELESS_11B: 143 memcpy(SupportedRates, WIFI_CCKRATES, 144 IEEE80211_CCK_RATE_LEN); 145 break; 146 case WIRELESS_11G: 147 case WIRELESS_11A: 148 memcpy(SupportedRates, WIFI_OFDMRATES, 149 IEEE80211_NUM_OFDM_RATESLEN); 150 break; 151 case WIRELESS_11BG: 152 memcpy(SupportedRates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN); 153 memcpy(SupportedRates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES, 154 IEEE80211_NUM_OFDM_RATESLEN); 155 break; 156 } 157} 158 159static uint r8712_get_rateset_len(u8 *rateset) 160{ 161 uint i = 0; 162 163 while (1) { 164 if ((rateset[i]) == 0) 165 break; 166 if (i > 12) 167 break; 168 i++; 169 } 170 return i; 171} 172 173int r8712_generate_ie(struct registry_priv *pregistrypriv, 174 struct _adapter *padapter) 175{ 176 int sz = 0, rateLen; 177 struct wlan_bssid_ex *pdev_network = &pregistrypriv->dev_network; 178 u8 *ie = pdev_network->IEs; 179 struct ieee80211_ht_cap ht_capie; 180 struct ieee80211_ht_addt_info ht_addt_info; 181 unsigned char WMM_IE[] = {0x00, 0x50, 0xf2, 0x02, 0x00, 0x01, 0x00}; 182 struct mlme_priv *pmlmepriv = &padapter->mlmepriv; 183 struct qos_priv *pqospriv = &pmlmepriv->qospriv; 184 185 /*timestamp will be inserted by hardware*/ 186 sz += 8; 187 ie += sz; 188 /*beacon interval : 2bytes*/ 189 *(u16 *)ie = cpu_to_le16((u16)pdev_network->Configuration.BeaconPeriod); 190 sz += 2; 191 ie += 2; 192 /*capability info*/ 193 *(u16 *)ie = 0; 194 *(u16 *)ie |= cpu_to_le16(cap_IBSS); 195 if (pregistrypriv->preamble == PREAMBLE_SHORT) 196 *(u16 *)ie |= cpu_to_le16(cap_ShortPremble); 197 if (pdev_network->Privacy) 198 *(u16 *)ie |= cpu_to_le16(cap_Privacy); 199 sz += 2; 200 ie += 2; 201 /*SSID*/ 202 ie = r8712_set_ie(ie, _SSID_IE_, pdev_network->Ssid.SsidLength, 203 pdev_network->Ssid.Ssid, &sz); 204 /*supported rates*/ 205 set_supported_rate(pdev_network->SupportedRates, 206 pregistrypriv->wireless_mode); 207 rateLen = r8712_get_rateset_len(pdev_network->SupportedRates); 208 if (rateLen > 8) { 209 ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_, 8, 210 pdev_network->SupportedRates, &sz); 211 ie = r8712_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rateLen - 8), 212 (pdev_network->SupportedRates + 8), &sz); 213 } else 214 ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_, 215 rateLen, pdev_network->SupportedRates, &sz); 216 /*DS parameter set*/ 217 ie = r8712_set_ie(ie, _DSSET_IE_, 1, 218 (u8 *)&(pdev_network->Configuration.DSConfig), &sz); 219 /*IBSS Parameter Set*/ 220 ie = r8712_set_ie(ie, _IBSS_PARA_IE_, 2, 221 (u8 *)&(pdev_network->Configuration.ATIMWindow), &sz); 222 if (pregistrypriv->ht_enable == 1) { 223 if (pqospriv->qos_option == 0) { 224 ie = r8712_set_ie(ie, _VENDOR_SPECIFIC_IE_, 225 _WMM_IE_Length_, WMM_IE, &sz); 226 pqospriv->qos_option = 1; 227 } 228 memset(&ht_capie, 0, sizeof(struct ieee80211_ht_cap)); 229 ht_capie.cap_info = IEEE80211_HT_CAP_SUP_WIDTH | 230 IEEE80211_HT_CAP_SGI_20 | 231 IEEE80211_HT_CAP_SGI_40 | 232 IEEE80211_HT_CAP_TX_STBC | 233 IEEE80211_HT_CAP_MAX_AMSDU | 234 IEEE80211_HT_CAP_DSSSCCK40; 235 ht_capie.ampdu_params_info = (IEEE80211_HT_CAP_AMPDU_FACTOR & 236 0x03) | (IEEE80211_HT_CAP_AMPDU_DENSITY & 0x00); 237 ie = r8712_set_ie(ie, _HT_CAPABILITY_IE_, 238 sizeof(struct ieee80211_ht_cap), 239 (unsigned char *)&ht_capie, &sz); 240 /*add HT info ie*/ 241 memset(&ht_addt_info, 0, 242 sizeof(struct ieee80211_ht_addt_info)); 243 /*need to add the HT additional IEs*/ 244 ht_addt_info.control_chan = pregistrypriv->channel; 245 ie = r8712_set_ie(ie, _HT_ADD_INFO_IE_, 246 sizeof(struct ieee80211_ht_addt_info), 247 (unsigned char *)&ht_addt_info, &sz); 248 } 249 return sz; 250} 251 252unsigned char *r8712_get_wpa_ie(unsigned char *pie, int *wpa_ie_len, int limit) 253{ 254 int len; 255 u16 val16; 256 unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01}; 257 u8 *pbuf = pie; 258 259 while (1) { 260 pbuf = r8712_get_ie(pbuf, _WPA_IE_ID_, &len, limit); 261 if (pbuf) { 262 /*check if oui matches...*/ 263 if (memcmp((pbuf + 2), wpa_oui_type, 264 sizeof(wpa_oui_type))) 265 goto check_next_ie; 266 /*check version...*/ 267 memcpy((u8 *)&val16, (pbuf + 6), sizeof(val16)); 268 val16 = le16_to_cpu(val16); 269 if (val16 != 0x0001) 270 goto check_next_ie; 271 *wpa_ie_len = *(pbuf + 1); 272 return pbuf; 273 } else { 274 *wpa_ie_len = 0; 275 return NULL; 276 } 277check_next_ie: 278 limit = limit - (pbuf - pie) - 2 - len; 279 if (limit <= 0) 280 break; 281 pbuf += (2 + len); 282 } 283 *wpa_ie_len = 0; 284 return NULL; 285} 286 287unsigned char *r8712_get_wpa2_ie(unsigned char *pie, int *rsn_ie_len, int limit) 288{ 289 return r8712_get_ie(pie, _WPA2_IE_ID_, rsn_ie_len, limit); 290} 291 292static int r8712_get_wpa_cipher_suite(u8 *s) 293{ 294 if (!memcmp(s, (void *)WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN)) 295 return WPA_CIPHER_NONE; 296 if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN)) 297 return WPA_CIPHER_WEP40; 298 if (!memcmp(s, (void *)WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN)) 299 return WPA_CIPHER_TKIP; 300 if (!memcmp(s, (void *)WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN)) 301 return WPA_CIPHER_CCMP; 302 if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN)) 303 return WPA_CIPHER_WEP104; 304 return 0; 305} 306 307static int r8712_get_wpa2_cipher_suite(u8 *s) 308{ 309 if (!memcmp(s, (void *)RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN)) 310 return WPA_CIPHER_NONE; 311 if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN)) 312 return WPA_CIPHER_WEP40; 313 if (!memcmp(s, (void *)RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN)) 314 return WPA_CIPHER_TKIP; 315 if (!memcmp(s, (void *)RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN)) 316 return WPA_CIPHER_CCMP; 317 if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN)) 318 return WPA_CIPHER_WEP104; 319 return 0; 320} 321 322int r8712_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher, 323 int *pairwise_cipher) 324{ 325 int i, ret = _SUCCESS; 326 int left, count; 327 u8 *pos; 328 329 if (wpa_ie_len <= 0) { 330 /* No WPA IE - fail silently */ 331 return _FAIL; 332 } 333 if ((*wpa_ie != _WPA_IE_ID_) || (*(wpa_ie + 1) != (u8)(wpa_ie_len - 2)) 334 || (memcmp(wpa_ie + 2, (void *)WPA_OUI_TYPE, WPA_SELECTOR_LEN))) 335 return _FAIL; 336 pos = wpa_ie; 337 pos += 8; 338 left = wpa_ie_len - 8; 339 /*group_cipher*/ 340 if (left >= WPA_SELECTOR_LEN) { 341 *group_cipher = r8712_get_wpa_cipher_suite(pos); 342 pos += WPA_SELECTOR_LEN; 343 left -= WPA_SELECTOR_LEN; 344 } else if (left > 0) 345 return _FAIL; 346 /*pairwise_cipher*/ 347 if (left >= 2) { 348 count = le16_to_cpu(*(u16 *)pos); 349 pos += 2; 350 left -= 2; 351 if (count == 0 || left < count * WPA_SELECTOR_LEN) 352 return _FAIL; 353 for (i = 0; i < count; i++) { 354 *pairwise_cipher |= r8712_get_wpa_cipher_suite(pos); 355 pos += WPA_SELECTOR_LEN; 356 left -= WPA_SELECTOR_LEN; 357 } 358 } else if (left == 1) 359 return _FAIL; 360 return ret; 361} 362 363int r8712_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher, 364 int *pairwise_cipher) 365{ 366 int i, ret = _SUCCESS; 367 int left, count; 368 u8 *pos; 369 370 if (rsn_ie_len <= 0) { 371 /* No RSN IE - fail silently */ 372 return _FAIL; 373 } 374 if ((*rsn_ie != _WPA2_IE_ID_) || (*(rsn_ie+1) != (u8)(rsn_ie_len - 2))) 375 return _FAIL; 376 pos = rsn_ie; 377 pos += 4; 378 left = rsn_ie_len - 4; 379 /*group_cipher*/ 380 if (left >= RSN_SELECTOR_LEN) { 381 *group_cipher = r8712_get_wpa2_cipher_suite(pos); 382 pos += RSN_SELECTOR_LEN; 383 left -= RSN_SELECTOR_LEN; 384 } else if (left > 0) 385 return _FAIL; 386 /*pairwise_cipher*/ 387 if (left >= 2) { 388 count = le16_to_cpu(*(u16 *)pos); 389 pos += 2; 390 left -= 2; 391 if (count == 0 || left < count * RSN_SELECTOR_LEN) 392 return _FAIL; 393 for (i = 0; i < count; i++) { 394 *pairwise_cipher |= r8712_get_wpa2_cipher_suite(pos); 395 pos += RSN_SELECTOR_LEN; 396 left -= RSN_SELECTOR_LEN; 397 } 398 } else if (left == 1) 399 return _FAIL; 400 return ret; 401} 402 403int r8712_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len, 404 u8 *wpa_ie, u16 *wpa_len) 405{ 406 u8 authmode, sec_idx; 407 u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01}; 408 uint cnt; 409 410 /*Search required WPA or WPA2 IE and copy to sec_ie[ ]*/ 411 cnt = (_TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_); 412 sec_idx = 0; 413 while (cnt < in_len) { 414 authmode = in_ie[cnt]; 415 if ((authmode == _WPA_IE_ID_) && 416 (!memcmp(&in_ie[cnt + 2], &wpa_oui[0], 4))) { 417 memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt + 1] + 2); 418 *wpa_len = in_ie[cnt+1]+2; 419 cnt += in_ie[cnt + 1] + 2; /*get next */ 420 } else { 421 if (authmode == _WPA2_IE_ID_) { 422 memcpy(rsn_ie, &in_ie[cnt], 423 in_ie[cnt + 1] + 2); 424 *rsn_len = in_ie[cnt+1] + 2; 425 cnt += in_ie[cnt+1] + 2; /*get next*/ 426 } else 427 cnt += in_ie[cnt+1] + 2; /*get next*/ 428 } 429 } 430 return *rsn_len + *wpa_len; 431} 432 433int r8712_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen) 434{ 435 int match; 436 uint cnt; 437 u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04}; 438 439 cnt = 12; 440 match = false; 441 while (cnt < in_len) { 442 eid = in_ie[cnt]; 443 if ((eid == _WPA_IE_ID_) && 444 (!memcmp(&in_ie[cnt+2], wps_oui, 4))) { 445 memcpy(wps_ie, &in_ie[cnt], in_ie[cnt+1]+2); 446 *wps_ielen = in_ie[cnt+1]+2; 447 cnt += in_ie[cnt+1]+2; 448 match = true; 449 break; 450 } else 451 cnt += in_ie[cnt+1]+2; /* goto next */ 452 } 453 return match; 454}