Merge tag 'v4.3-rc2' into k.o/for-4.3-v1
[firefly-linux-kernel-4.4.55.git] / drivers / staging / rtl8712 / ieee80211.c
1 /******************************************************************************
2  * ieee80211.c
3  *
4  * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
5  * Linux device driver for RTL8192SU
6  *
7  * This program is free software; you can redistribute it and/or modify it
8  * under the terms of version 2 of the GNU General Public License as
9  * published by the Free Software Foundation.
10  *
11  * This program is distributed in the hope that it will be useful, but WITHOUT
12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
14  * more details.
15  *
16  * You should have received a copy of the GNU General Public License along with
17  * this program; if not, write to the Free Software Foundation, Inc.,
18  * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
19  *
20  * Modifications for inclusion into the Linux staging tree are
21  * Copyright(c) 2010 Larry Finger. All rights reserved.
22  *
23  * Contact information:
24  * WLAN FAE <wlanfae@realtek.com>.
25  * Larry Finger <Larry.Finger@lwfinger.net>
26  *
27  ******************************************************************************/
28
29 #define _IEEE80211_C
30
31 #include "drv_types.h"
32 #include "ieee80211.h"
33 #include "wifi.h"
34 #include "osdep_service.h"
35 #include "wlan_bssdef.h"
36
37 static const u8 WPA_OUI_TYPE[] = {0x00, 0x50, 0xf2, 1};
38 static const u8 WPA_CIPHER_SUITE_NONE[] = {0x00, 0x50, 0xf2, 0};
39 static const u8 WPA_CIPHER_SUITE_WEP40[] = {0x00, 0x50, 0xf2, 1};
40 static const u8 WPA_CIPHER_SUITE_TKIP[] = {0x00, 0x50, 0xf2, 2};
41 static const u8 WPA_CIPHER_SUITE_CCMP[] = {0x00, 0x50, 0xf2, 4};
42 static const u8 WPA_CIPHER_SUITE_WEP104[] = {0x00, 0x50, 0xf2, 5};
43
44 static const u8 RSN_CIPHER_SUITE_NONE[] = {0x00, 0x0f, 0xac, 0};
45 static const u8 RSN_CIPHER_SUITE_WEP40[] = {0x00, 0x0f, 0xac, 1};
46 static const u8 RSN_CIPHER_SUITE_TKIP[] = {0x00, 0x0f, 0xac, 2};
47 static const u8 RSN_CIPHER_SUITE_CCMP[] = {0x00, 0x0f, 0xac, 4};
48 static const u8 RSN_CIPHER_SUITE_WEP104[] = {0x00, 0x0f, 0xac, 5};
49
50 /*-----------------------------------------------------------
51  * for adhoc-master to generate ie and provide supported-rate to fw
52  *-----------------------------------------------------------
53  */
54
55 static u8 WIFI_CCKRATES[] =  {
56         (IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK),
57         (IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK),
58         (IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK),
59         (IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK)
60 };
61
62 static u8 WIFI_OFDMRATES[] = {
63         (IEEE80211_OFDM_RATE_6MB),
64         (IEEE80211_OFDM_RATE_9MB),
65         (IEEE80211_OFDM_RATE_12MB),
66         (IEEE80211_OFDM_RATE_18MB),
67         (IEEE80211_OFDM_RATE_24MB),
68         (IEEE80211_OFDM_RATE_36MB),
69         (IEEE80211_OFDM_RATE_48MB),
70         (IEEE80211_OFDM_RATE_54MB)
71 };
72
73 uint r8712_is_cckrates_included(u8 *rate)
74 {
75         u32 i = 0;
76
77         while (rate[i] != 0) {
78                 if ((((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) ||
79                     (((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22))
80                         return true;
81                 i++;
82         }
83         return false;
84 }
85
86 uint r8712_is_cckratesonly_included(u8 *rate)
87 {
88         u32 i = 0;
89
90         while (rate[i] != 0) {
91                 if ((((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) &&
92                     (((rate[i]) & 0x7f) != 11)  && (((rate[i]) & 0x7f) != 22))
93                         return false;
94                 i++;
95         }
96         return true;
97 }
98
99 /* r8712_set_ie will update frame length */
100 u8 *r8712_set_ie(u8 *pbuf, sint index, uint len, u8 *source, uint *frlen)
101 {
102         *pbuf = (u8)index;
103         *(pbuf + 1) = (u8)len;
104         if (len > 0)
105                 memcpy((void *)(pbuf + 2), (void *)source, len);
106         *frlen = *frlen + (len + 2);
107         return pbuf + len + 2;
108 }
109
110 /*----------------------------------------------------------------------------
111 index: the information element id index, limit is the limit for search
112 -----------------------------------------------------------------------------*/
113 u8 *r8712_get_ie(u8 *pbuf, sint index, sint *len, sint limit)
114 {
115         sint tmp, i;
116         u8 *p;
117
118         if (limit < 1)
119                 return NULL;
120         p = pbuf;
121         i = 0;
122         *len = 0;
123         while (1) {
124                 if (*p == index) {
125                         *len = *(p + 1);
126                         return p;
127                 }
128                 tmp = *(p + 1);
129                 p += (tmp + 2);
130                 i += (tmp + 2);
131                 if (i >= limit)
132                         break;
133         }
134         return NULL;
135 }
136
137 static void set_supported_rate(u8 *rates, uint mode)
138 {
139         memset(rates, 0, NDIS_802_11_LENGTH_RATES_EX);
140         switch (mode) {
141         case WIRELESS_11B:
142                 memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
143                 break;
144         case WIRELESS_11G:
145         case WIRELESS_11A:
146                 memcpy(rates, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN);
147                 break;
148         case WIRELESS_11BG:
149                 memcpy(rates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
150                 memcpy(rates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES,
151                         IEEE80211_NUM_OFDM_RATESLEN);
152                 break;
153         }
154 }
155
156 static uint r8712_get_rateset_len(u8 *rateset)
157 {
158         uint i = 0;
159
160         while (1) {
161                 if ((rateset[i]) == 0)
162                         break;
163                 if (i > 12)
164                         break;
165                 i++;
166         }
167         return i;
168 }
169
170 int r8712_generate_ie(struct registry_priv *pregistrypriv)
171 {
172         int sz = 0, rateLen;
173         struct wlan_bssid_ex *pdev_network = &pregistrypriv->dev_network;
174         u8 *ie = pdev_network->IEs;
175
176         /*timestamp will be inserted by hardware*/
177         sz += 8;
178         ie += sz;
179         /*beacon interval : 2bytes*/
180         *(u16 *)ie = cpu_to_le16((u16)pdev_network->Configuration.BeaconPeriod);
181         sz += 2;
182         ie += 2;
183         /*capability info*/
184         *(u16 *)ie = 0;
185         *(u16 *)ie |= cpu_to_le16(cap_IBSS);
186         if (pregistrypriv->preamble == PREAMBLE_SHORT)
187                 *(u16 *)ie |= cpu_to_le16(cap_ShortPremble);
188         if (pdev_network->Privacy)
189                 *(u16 *)ie |= cpu_to_le16(cap_Privacy);
190         sz += 2;
191         ie += 2;
192         /*SSID*/
193         ie = r8712_set_ie(ie, _SSID_IE_, pdev_network->Ssid.SsidLength,
194                     pdev_network->Ssid.Ssid, &sz);
195         /*supported rates*/
196         set_supported_rate(pdev_network->rates, pregistrypriv->wireless_mode);
197         rateLen = r8712_get_rateset_len(pdev_network->rates);
198         if (rateLen > 8) {
199                 ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_, 8,
200                             pdev_network->rates, &sz);
201                 ie = r8712_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rateLen - 8),
202                             (pdev_network->rates + 8), &sz);
203         } else
204                 ie = r8712_set_ie(ie, _SUPPORTEDRATES_IE_,
205                             rateLen, pdev_network->rates, &sz);
206         /*DS parameter set*/
207         ie = r8712_set_ie(ie, _DSSET_IE_, 1,
208                     (u8 *)&(pdev_network->Configuration.DSConfig), &sz);
209         /*IBSS Parameter Set*/
210         ie = r8712_set_ie(ie, _IBSS_PARA_IE_, 2,
211                     (u8 *)&(pdev_network->Configuration.ATIMWindow), &sz);
212         return sz;
213 }
214
215 unsigned char *r8712_get_wpa_ie(unsigned char *pie, int *wpa_ie_len, int limit)
216 {
217         int len;
218         u16 val16;
219         unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01};
220         u8 *pbuf = pie;
221
222         while (1) {
223                 pbuf = r8712_get_ie(pbuf, _WPA_IE_ID_, &len, limit);
224                 if (pbuf) {
225                         /*check if oui matches...*/
226                         if (memcmp((pbuf + 2), wpa_oui_type,
227                             sizeof(wpa_oui_type)))
228                                 goto check_next_ie;
229                         /*check version...*/
230                         memcpy((u8 *)&val16, (pbuf + 6), sizeof(val16));
231                         val16 = le16_to_cpu(val16);
232                         if (val16 != 0x0001)
233                                 goto check_next_ie;
234                         *wpa_ie_len = *(pbuf + 1);
235                         return pbuf;
236                 }
237                 *wpa_ie_len = 0;
238                 return NULL;
239 check_next_ie:
240                 limit = limit - (pbuf - pie) - 2 - len;
241                 if (limit <= 0)
242                         break;
243                 pbuf += (2 + len);
244         }
245         *wpa_ie_len = 0;
246         return NULL;
247 }
248
249 unsigned char *r8712_get_wpa2_ie(unsigned char *pie, int *rsn_ie_len, int limit)
250 {
251         return r8712_get_ie(pie, _WPA2_IE_ID_, rsn_ie_len, limit);
252 }
253
254 static int r8712_get_wpa_cipher_suite(u8 *s)
255 {
256         if (!memcmp(s, (void *)WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN))
257                 return WPA_CIPHER_NONE;
258         if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN))
259                 return WPA_CIPHER_WEP40;
260         if (!memcmp(s, (void *)WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN))
261                 return WPA_CIPHER_TKIP;
262         if (!memcmp(s, (void *)WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN))
263                 return WPA_CIPHER_CCMP;
264         if (!memcmp(s, (void *)WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN))
265                 return WPA_CIPHER_WEP104;
266         return 0;
267 }
268
269 static int r8712_get_wpa2_cipher_suite(u8 *s)
270 {
271         if (!memcmp(s, (void *)RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN))
272                 return WPA_CIPHER_NONE;
273         if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN))
274                 return WPA_CIPHER_WEP40;
275         if (!memcmp(s, (void *)RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN))
276                 return WPA_CIPHER_TKIP;
277         if (!memcmp(s, (void *)RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN))
278                 return WPA_CIPHER_CCMP;
279         if (!memcmp(s, (void *)RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN))
280                 return WPA_CIPHER_WEP104;
281         return 0;
282 }
283
284 int r8712_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher,
285                  int *pairwise_cipher)
286 {
287         int i;
288         int left, count;
289         u8 *pos;
290
291         if (wpa_ie_len <= 0) {
292                 /* No WPA IE - fail silently */
293                 return _FAIL;
294         }
295         if ((*wpa_ie != _WPA_IE_ID_) || (*(wpa_ie + 1) != (u8)(wpa_ie_len - 2))
296              || (memcmp(wpa_ie + 2, (void *)WPA_OUI_TYPE, WPA_SELECTOR_LEN)))
297                 return _FAIL;
298         pos = wpa_ie;
299         pos += 8;
300         left = wpa_ie_len - 8;
301         /*group_cipher*/
302         if (left >= WPA_SELECTOR_LEN) {
303                 *group_cipher = r8712_get_wpa_cipher_suite(pos);
304                 pos += WPA_SELECTOR_LEN;
305                 left -= WPA_SELECTOR_LEN;
306         } else if (left > 0)
307                 return _FAIL;
308         /*pairwise_cipher*/
309         if (left >= 2) {
310                 count = le16_to_cpu(*(u16 *)pos);
311                 pos += 2;
312                 left -= 2;
313                 if (count == 0 || left < count * WPA_SELECTOR_LEN)
314                         return _FAIL;
315                 for (i = 0; i < count; i++) {
316                         *pairwise_cipher |= r8712_get_wpa_cipher_suite(pos);
317                         pos += WPA_SELECTOR_LEN;
318                         left -= WPA_SELECTOR_LEN;
319                 }
320         } else if (left == 1)
321                 return _FAIL;
322         return _SUCCESS;
323 }
324
325 int r8712_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher,
326                   int *pairwise_cipher)
327 {
328         int i;
329         int left, count;
330         u8 *pos;
331
332         if (rsn_ie_len <= 0) {
333                 /* No RSN IE - fail silently */
334                 return _FAIL;
335         }
336         if ((*rsn_ie != _WPA2_IE_ID_) || (*(rsn_ie+1) != (u8)(rsn_ie_len - 2)))
337                 return _FAIL;
338         pos = rsn_ie;
339         pos += 4;
340         left = rsn_ie_len - 4;
341         /*group_cipher*/
342         if (left >= RSN_SELECTOR_LEN) {
343                 *group_cipher = r8712_get_wpa2_cipher_suite(pos);
344                 pos += RSN_SELECTOR_LEN;
345                 left -= RSN_SELECTOR_LEN;
346         } else if (left > 0)
347                 return _FAIL;
348         /*pairwise_cipher*/
349         if (left >= 2) {
350                 count = le16_to_cpu(*(u16 *)pos);
351                 pos += 2;
352                 left -= 2;
353                 if (count == 0 || left < count * RSN_SELECTOR_LEN)
354                         return _FAIL;
355                 for (i = 0; i < count; i++) {
356                         *pairwise_cipher |= r8712_get_wpa2_cipher_suite(pos);
357                         pos += RSN_SELECTOR_LEN;
358                         left -= RSN_SELECTOR_LEN;
359                 }
360         } else if (left == 1)
361                 return _FAIL;
362         return _SUCCESS;
363 }
364
365 int r8712_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len,
366                u8 *wpa_ie, u16 *wpa_len)
367 {
368         u8 authmode;
369         u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01};
370         uint cnt;
371
372         /*Search required WPA or WPA2 IE and copy to sec_ie[ ]*/
373         cnt = (_TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_);
374         while (cnt < in_len) {
375                 authmode = in_ie[cnt];
376                 if ((authmode == _WPA_IE_ID_) &&
377                     (!memcmp(&in_ie[cnt + 2], &wpa_oui[0], 4))) {
378                         memcpy(wpa_ie, &in_ie[cnt], in_ie[cnt + 1] + 2);
379                         *wpa_len = in_ie[cnt+1]+2;
380                         cnt += in_ie[cnt + 1] + 2;  /*get next */
381                 } else {
382                         if (authmode == _WPA2_IE_ID_) {
383                                 memcpy(rsn_ie, &in_ie[cnt],
384                                         in_ie[cnt + 1] + 2);
385                                 *rsn_len = in_ie[cnt+1] + 2;
386                                 cnt += in_ie[cnt+1] + 2;  /*get next*/
387                         } else
388                                 cnt += in_ie[cnt+1] + 2;   /*get next*/
389                 }
390         }
391         return *rsn_len + *wpa_len;
392 }
393
394 int r8712_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen)
395 {
396         int match;
397         uint cnt;
398         u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
399
400         cnt = 12;
401         match = false;
402         while (cnt < in_len) {
403                 eid = in_ie[cnt];
404                 if ((eid == _WPA_IE_ID_) &&
405                     (!memcmp(&in_ie[cnt+2], wps_oui, 4))) {
406                         memcpy(wps_ie, &in_ie[cnt], in_ie[cnt+1]+2);
407                         *wps_ielen = in_ie[cnt+1]+2;
408                         cnt += in_ie[cnt+1]+2;
409                         match = true;
410                         break;
411                 }
412                         cnt += in_ie[cnt+1]+2; /* goto next */
413         }
414         return match;
415 }