1 /******************************************************************************
3 * Copyright(c) 2007 - 2011 Realtek Corporation. All rights reserved.
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of version 2 of the GNU General Public License as
7 * published by the Free Software Foundation.
9 * This program is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * You should have received a copy of the GNU General Public License along with
15 * this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
19 ******************************************************************************/
22 #include <drv_types.h>
23 #include <ieee80211.h>
25 #include <osdep_service.h>
26 #include <wlan_bssdef.h>
28 u8 RTW_WPA_OUI_TYPE[] = { 0x00, 0x50, 0xf2, 1 };
29 u16 RTW_WPA_VERSION = 1;
30 u8 WPA_AUTH_KEY_MGMT_NONE[] = { 0x00, 0x50, 0xf2, 0 };
31 u8 WPA_AUTH_KEY_MGMT_UNSPEC_802_1X[] = { 0x00, 0x50, 0xf2, 1 };
32 u8 WPA_AUTH_KEY_MGMT_PSK_OVER_802_1X[] = { 0x00, 0x50, 0xf2, 2 };
33 u8 WPA_CIPHER_SUITE_NONE[] = { 0x00, 0x50, 0xf2, 0 };
34 u8 WPA_CIPHER_SUITE_WEP40[] = { 0x00, 0x50, 0xf2, 1 };
35 u8 WPA_CIPHER_SUITE_TKIP[] = { 0x00, 0x50, 0xf2, 2 };
36 u8 WPA_CIPHER_SUITE_WRAP[] = { 0x00, 0x50, 0xf2, 3 };
37 u8 WPA_CIPHER_SUITE_CCMP[] = { 0x00, 0x50, 0xf2, 4 };
38 u8 WPA_CIPHER_SUITE_WEP104[] = { 0x00, 0x50, 0xf2, 5 };
40 u16 RSN_VERSION_BSD = 1;
41 u8 RSN_AUTH_KEY_MGMT_UNSPEC_802_1X[] = { 0x00, 0x0f, 0xac, 1 };
42 u8 RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X[] = { 0x00, 0x0f, 0xac, 2 };
43 u8 RSN_CIPHER_SUITE_NONE[] = { 0x00, 0x0f, 0xac, 0 };
44 u8 RSN_CIPHER_SUITE_WEP40[] = { 0x00, 0x0f, 0xac, 1 };
45 u8 RSN_CIPHER_SUITE_TKIP[] = { 0x00, 0x0f, 0xac, 2 };
46 u8 RSN_CIPHER_SUITE_WRAP[] = { 0x00, 0x0f, 0xac, 3 };
47 u8 RSN_CIPHER_SUITE_CCMP[] = { 0x00, 0x0f, 0xac, 4 };
48 u8 RSN_CIPHER_SUITE_WEP104[] = { 0x00, 0x0f, 0xac, 5 };
50 /* for adhoc-master to generate ie and provide supported-rate to fw */
53 static u8 WIFI_CCKRATES[] =
54 {(IEEE80211_CCK_RATE_1MB | IEEE80211_BASIC_RATE_MASK),
55 (IEEE80211_CCK_RATE_2MB | IEEE80211_BASIC_RATE_MASK),
56 (IEEE80211_CCK_RATE_5MB | IEEE80211_BASIC_RATE_MASK),
57 (IEEE80211_CCK_RATE_11MB | IEEE80211_BASIC_RATE_MASK)};
59 static u8 WIFI_OFDMRATES[] =
60 {(IEEE80211_OFDM_RATE_6MB),
61 (IEEE80211_OFDM_RATE_9MB),
62 (IEEE80211_OFDM_RATE_12MB),
63 (IEEE80211_OFDM_RATE_18MB),
64 (IEEE80211_OFDM_RATE_24MB),
65 IEEE80211_OFDM_RATE_36MB,
66 IEEE80211_OFDM_RATE_48MB,
67 IEEE80211_OFDM_RATE_54MB};
69 int rtw_get_bit_value_from_ieee_value(u8 val)
71 unsigned char dot11_rate_table[]={2,4,11,22,12,18,24,36,48,72,96,108,0}; /* last element must be zero!! */
74 while(dot11_rate_table[i] != 0) {
75 if (dot11_rate_table[i] == val)
82 uint rtw_is_cckrates_included(u8 *rate)
88 if ( (((rate[i]) & 0x7f) == 2) || (((rate[i]) & 0x7f) == 4) ||
89 (((rate[i]) & 0x7f) == 11) || (((rate[i]) & 0x7f) == 22) )
97 uint rtw_is_cckratesonly_included(u8 *rate)
103 if ( (((rate[i]) & 0x7f) != 2) && (((rate[i]) & 0x7f) != 4) &&
104 (((rate[i]) & 0x7f) != 11) && (((rate[i]) & 0x7f) != 22) )
114 int rtw_check_network_type(unsigned char *rate, int ratelen, int channel)
118 if ((rtw_is_cckrates_included(rate)) == _TRUE)
119 return WIRELESS_INVALID;
123 else /* could be pure B, pure G, or B/G */
125 if ((rtw_is_cckratesonly_included(rate)) == _TRUE)
127 else if((rtw_is_cckrates_included(rate)) == _TRUE)
128 return WIRELESS_11BG;
134 u8 *rtw_set_fixed_ie(unsigned char *pbuf, unsigned int len, unsigned char *source,
137 memcpy((void *)pbuf, (void *)source, len);
138 *frlen = *frlen + len;
142 /* rtw_set_ie will update frame length */
149 uint *frlen /* frame length */
155 *(pbuf + 1) = (u8)len;
158 memcpy((void *)(pbuf + 2), (void *)source, len);
160 *frlen = *frlen + (len + 2);
163 return (pbuf + len + 2);
166 inline u8 *rtw_set_ie_ch_switch(u8 *buf, u32 *buf_len, u8 ch_switch_mode,
167 u8 new_ch, u8 ch_switch_cnt)
171 ie_data[0] = ch_switch_mode;
173 ie_data[2] = ch_switch_cnt;
174 return rtw_set_ie(buf, WLAN_EID_CHANNEL_SWITCH, 3, ie_data, buf_len);
177 inline u8 secondary_ch_offset_to_hal_ch_offset(u8 ch_offset)
179 if (ch_offset == SCN)
180 return HAL_PRIME_CHNL_OFFSET_DONT_CARE;
181 else if(ch_offset == SCA)
182 return HAL_PRIME_CHNL_OFFSET_UPPER;
183 else if(ch_offset == SCB)
184 return HAL_PRIME_CHNL_OFFSET_LOWER;
186 return HAL_PRIME_CHNL_OFFSET_DONT_CARE;
189 inline u8 hal_ch_offset_to_secondary_ch_offset(u8 ch_offset)
191 if (ch_offset == HAL_PRIME_CHNL_OFFSET_DONT_CARE)
193 else if(ch_offset == HAL_PRIME_CHNL_OFFSET_LOWER)
195 else if(ch_offset == HAL_PRIME_CHNL_OFFSET_UPPER)
201 inline u8 *rtw_set_ie_secondary_ch_offset(u8 *buf, u32 *buf_len, u8 secondary_ch_offset)
203 return rtw_set_ie(buf, WLAN_EID_SECONDARY_CHANNEL_OFFSET, 1, &secondary_ch_offset, buf_len);
206 inline u8 *rtw_set_ie_mesh_ch_switch_parm(u8 *buf, u32 *buf_len, u8 ttl,
207 u8 flags, u16 reason, u16 precedence)
213 RTW_PUT_LE16((u8*)&ie_data[2], reason);
214 RTW_PUT_LE16((u8*)&ie_data[4], precedence);
216 return rtw_set_ie(buf, 0x118, 6, ie_data, buf_len);
219 /*----------------------------------------------------------------------------
220 index: the information element id index, limit is the limit for search
221 -----------------------------------------------------------------------------*/
222 u8 *rtw_get_ie(u8 *pbuf, sint index, sint *len, sint limit)
256 * rtw_get_ie_ex - Search specific IE from a series of IEs
257 * @in_ie: Address of IEs to search
258 * @in_len: Length limit from in_ie
259 * @eid: Element ID to match
261 * @oui_len: OUI length
262 * @ie: If not NULL and the specific IE is found, the IE will be copied to the buf starting from the specific IE
263 * @ielen: If not NULL and the specific IE is found, will set to the length of the entire IE
265 * Returns: The address of the specific IE found, or NULL
267 u8 *rtw_get_ie_ex(u8 *in_ie, uint in_len, u8 eid, u8 *oui, u8 oui_len, u8 *ie, uint *ielen)
270 u8 *target_ie = NULL;
275 if(!in_ie || in_len<=0)
283 && ( !oui || _rtw_memcmp(&in_ie[cnt+2], oui, oui_len) == _TRUE))
285 target_ie = &in_ie[cnt];
288 memcpy(ie, &in_ie[cnt], in_ie[cnt+1]+2);
291 *ielen = in_ie[cnt+1]+2;
297 cnt+=in_ie[cnt+1]+2; /* goto next */
306 * rtw_ies_remove_ie - Find matching IEs and remove
307 * @ies: Address of IEs to search
308 * @ies_len: Pointer of length of ies, will update to new length
309 * @offset: The offset to start scarch
310 * @eid: Element ID to match
312 * @oui_len: OUI length
314 * Returns: _SUCCESS: ies is updated, _FAIL: not updated
316 int rtw_ies_remove_ie(u8 *ies, uint *ies_len, uint offset, u8 eid, u8 *oui, u8 oui_len)
324 if(!ies || !ies_len || *ies_len <= offset)
327 start = ies + offset;
328 search_len = *ies_len - offset;
331 target_ie = rtw_get_ie_ex(start, search_len, eid, oui, oui_len, NULL, &target_ielen);
332 if (target_ie && target_ielen) {
333 u8 buf[MAX_IE_SZ] = {0};
334 u8 *remain_ies = target_ie + target_ielen;
335 uint remain_len = search_len - (remain_ies - start);
337 memcpy(buf, remain_ies, remain_len);
338 memcpy(target_ie, buf, remain_len);
339 *ies_len = *ies_len - target_ielen;
343 search_len = remain_len;
352 void rtw_set_supported_rate(u8* SupportedRates, uint mode)
356 _rtw_memset(SupportedRates, 0, NDIS_802_11_LENGTH_RATES_EX);
361 memcpy(SupportedRates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
367 case WIRELESS_11A_5N:/* Todo: no basic rate for ofdm ? */
368 memcpy(SupportedRates, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN);
372 case WIRELESS_11G_24N:
373 case WIRELESS_11_24N:
374 case WIRELESS_11BG_24N:
375 memcpy(SupportedRates, WIFI_CCKRATES, IEEE80211_CCK_RATE_LEN);
376 memcpy(SupportedRates + IEEE80211_CCK_RATE_LEN, WIFI_OFDMRATES, IEEE80211_NUM_OFDM_RATESLEN);
383 uint rtw_get_rateset_len(u8 *rateset)
389 if ((rateset[i]) == 0)
401 int rtw_generate_ie(struct registry_priv *pregistrypriv)
405 WLAN_BSSID_EX* pdev_network = &pregistrypriv->dev_network;
406 u8* ie = pdev_network->IEs;
410 /* timestamp will be inserted by hardware */
414 /* beacon interval : 2bytes */
415 *(u16*)ie = cpu_to_le16((u16)pdev_network->Configuration.BeaconPeriod);/* BCN_INTERVAL; */
419 /* capability info */
422 *(u16*)ie |= cpu_to_le16(cap_IBSS);
424 if(pregistrypriv->preamble == PREAMBLE_SHORT)
425 *(u16*)ie |= cpu_to_le16(cap_ShortPremble);
427 if (pdev_network->Privacy)
428 *(u16*)ie |= cpu_to_le16(cap_Privacy);
434 ie = rtw_set_ie(ie, _SSID_IE_, pdev_network->Ssid.SsidLength, pdev_network->Ssid.Ssid, &sz);
436 /* supported rates */
437 if(pregistrypriv->wireless_mode == WIRELESS_11ABGN)
439 if(pdev_network->Configuration.DSConfig > 14)
440 wireless_mode = WIRELESS_11A_5N;
442 wireless_mode = WIRELESS_11BG_24N;
446 wireless_mode = pregistrypriv->wireless_mode;
449 rtw_set_supported_rate(pdev_network->SupportedRates, wireless_mode) ;
451 rateLen = rtw_get_rateset_len(pdev_network->SupportedRates);
455 ie = rtw_set_ie(ie, _SUPPORTEDRATES_IE_, 8, pdev_network->SupportedRates, &sz);
456 /* ie = rtw_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rateLen - 8), (pdev_network->SupportedRates + 8), &sz); */
460 ie = rtw_set_ie(ie, _SUPPORTEDRATES_IE_, rateLen, pdev_network->SupportedRates, &sz);
463 /* DS parameter set */
464 ie = rtw_set_ie(ie, _DSSET_IE_, 1, (u8 *)&(pdev_network->Configuration.DSConfig), &sz);
466 /* IBSS Parameter Set */
468 ie = rtw_set_ie(ie, _IBSS_PARA_IE_, 2, (u8 *)&(pdev_network->Configuration.ATIMWindow), &sz);
472 ie = rtw_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rateLen - 8), (pdev_network->SupportedRates + 8), &sz);
477 /* return _SUCCESS; */
482 unsigned char *rtw_get_wpa_ie(unsigned char *pie, int *wpa_ie_len, int limit)
486 unsigned char wpa_oui_type[] = {0x00, 0x50, 0xf2, 0x01};
488 int limit_new = limit;
492 pbuf = rtw_get_ie(pbuf, _WPA_IE_ID_, &len, limit_new);
496 /* check if oui matches... */
497 if (_rtw_memcmp((pbuf + 2), wpa_oui_type, sizeof (wpa_oui_type)) == _FALSE) {
502 /* check version... */
503 memcpy((u8 *)&val16, (pbuf + 6), sizeof(val16));
505 val16 = le16_to_cpu(val16);
509 *wpa_ie_len = *(pbuf + 1);
522 limit_new = limit - (pbuf - pie) - 2 - len;
536 unsigned char *rtw_get_wpa2_ie(unsigned char *pie, int *rsn_ie_len, int limit)
539 return rtw_get_ie(pie, _WPA2_IE_ID_,rsn_ie_len, limit);
542 int rtw_get_wpa_cipher_suite(u8 *s)
544 if (_rtw_memcmp(s, WPA_CIPHER_SUITE_NONE, WPA_SELECTOR_LEN) == _TRUE)
545 return WPA_CIPHER_NONE;
546 if (_rtw_memcmp(s, WPA_CIPHER_SUITE_WEP40, WPA_SELECTOR_LEN) == _TRUE)
547 return WPA_CIPHER_WEP40;
548 if (_rtw_memcmp(s, WPA_CIPHER_SUITE_TKIP, WPA_SELECTOR_LEN) == _TRUE)
549 return WPA_CIPHER_TKIP;
550 if (_rtw_memcmp(s, WPA_CIPHER_SUITE_CCMP, WPA_SELECTOR_LEN) == _TRUE)
551 return WPA_CIPHER_CCMP;
552 if (_rtw_memcmp(s, WPA_CIPHER_SUITE_WEP104, WPA_SELECTOR_LEN) == _TRUE)
553 return WPA_CIPHER_WEP104;
558 int rtw_get_wpa2_cipher_suite(u8 *s)
560 if (_rtw_memcmp(s, RSN_CIPHER_SUITE_NONE, RSN_SELECTOR_LEN) == _TRUE)
561 return WPA_CIPHER_NONE;
562 if (_rtw_memcmp(s, RSN_CIPHER_SUITE_WEP40, RSN_SELECTOR_LEN) == _TRUE)
563 return WPA_CIPHER_WEP40;
564 if (_rtw_memcmp(s, RSN_CIPHER_SUITE_TKIP, RSN_SELECTOR_LEN) == _TRUE)
565 return WPA_CIPHER_TKIP;
566 if (_rtw_memcmp(s, RSN_CIPHER_SUITE_CCMP, RSN_SELECTOR_LEN) == _TRUE)
567 return WPA_CIPHER_CCMP;
568 if (_rtw_memcmp(s, RSN_CIPHER_SUITE_WEP104, RSN_SELECTOR_LEN) == _TRUE)
569 return WPA_CIPHER_WEP104;
574 int rtw_parse_wpa_ie(u8* wpa_ie, int wpa_ie_len, int *group_cipher, int *pairwise_cipher, int *is_8021x)
579 u8 SUITE_1X[4] = {0x00, 0x50, 0xf2, 1};
581 if (wpa_ie_len <= 0) {
582 /* No WPA IE - fail silently */
586 if ((*wpa_ie != _WPA_IE_ID_) || (*(wpa_ie+1) != (u8)(wpa_ie_len - 2)) ||
587 (_rtw_memcmp(wpa_ie+2, RTW_WPA_OUI_TYPE, WPA_SELECTOR_LEN) != _TRUE) )
595 left = wpa_ie_len - 8;
598 if (left >= WPA_SELECTOR_LEN) {
600 *group_cipher = rtw_get_wpa_cipher_suite(pos);
602 pos += WPA_SELECTOR_LEN;
603 left -= WPA_SELECTOR_LEN;
608 RT_TRACE(_module_rtl871x_mlme_c_,_drv_err_,("%s: ie length mismatch, %u too much", __FUNCTION__, left));
613 /* pairwise_cipher */
616 /* count = le16_to_cpu(*(u16*)pos); */
617 count = RTW_GET_LE16(pos);
621 if (count == 0 || left < count * WPA_SELECTOR_LEN) {
622 RT_TRACE(_module_rtl871x_mlme_c_,_drv_err_,("%s: ie count botch (pairwise), "
623 "count %u left %u", __FUNCTION__, count, left));
627 for (i = 0; i < count; i++)
629 *pairwise_cipher |= rtw_get_wpa_cipher_suite(pos);
631 pos += WPA_SELECTOR_LEN;
632 left -= WPA_SELECTOR_LEN;
638 RT_TRACE(_module_rtl871x_mlme_c_,_drv_err_,("%s: ie too short (for key mgmt)", __FUNCTION__));
645 if (_rtw_memcmp(pos, SUITE_1X, 4) == 1) {
646 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("%s : there has 802.1x auth\n", __FUNCTION__));
655 int rtw_parse_wpa2_ie(u8* rsn_ie, int rsn_ie_len, int *group_cipher, int *pairwise_cipher, int *is_8021x)
660 u8 SUITE_1X[4] = {0x00,0x0f, 0xac, 0x01};
662 if (rsn_ie_len <= 0) {
663 /* No RSN IE - fail silently */
667 if ((*rsn_ie!= _WPA2_IE_ID_) || (*(rsn_ie+1) != (u8)(rsn_ie_len - 2)))
674 left = rsn_ie_len - 4;
677 if (left >= RSN_SELECTOR_LEN) {
679 *group_cipher = rtw_get_wpa2_cipher_suite(pos);
681 pos += RSN_SELECTOR_LEN;
682 left -= RSN_SELECTOR_LEN;
684 } else if (left > 0) {
685 RT_TRACE(_module_rtl871x_mlme_c_,_drv_err_,("%s: ie length mismatch, %u too much", __FUNCTION__, left));
689 /* pairwise_cipher */
692 /* count = le16_to_cpu(*(u16*)pos); */
693 count = RTW_GET_LE16(pos);
697 if (count == 0 || left < count * RSN_SELECTOR_LEN) {
698 RT_TRACE(_module_rtl871x_mlme_c_,_drv_err_,("%s: ie count botch (pairwise), "
699 "count %u left %u", __FUNCTION__, count, left));
703 for (i = 0; i < count; i++)
705 *pairwise_cipher |= rtw_get_wpa2_cipher_suite(pos);
707 pos += RSN_SELECTOR_LEN;
708 left -= RSN_SELECTOR_LEN;
714 RT_TRACE(_module_rtl871x_mlme_c_,_drv_err_,("%s: ie too short (for key mgmt)", __FUNCTION__));
722 if (_rtw_memcmp(pos, SUITE_1X, 4) == 1) {
723 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("%s (): there has 802.1x auth\n", __FUNCTION__));
732 #ifdef CONFIG_WAPI_SUPPORT
733 int rtw_get_wapi_ie(u8 *in_ie,uint in_len,u8 *wapi_ie,u16 *wapi_len)
737 u8 wapi_oui1[4]={0x0,0x14,0x72,0x01};
738 u8 wapi_oui2[4]={0x0,0x14,0x72,0x02};
741 cnt = (_TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_);
746 /* if(authmode==_WAPI_IE_) */
747 if(authmode==_WAPI_IE_ && (_rtw_memcmp(&in_ie[cnt+6], wapi_oui1,4)==_TRUE ||
748 _rtw_memcmp(&in_ie[cnt+6], wapi_oui2,4)==_TRUE))
751 memcpy(wapi_ie, &in_ie[cnt],in_ie[cnt+1]+2);
753 for(i=0;i<(in_ie[cnt+1]+2);i=i+8){
754 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("\n %2x,%2x,%2x,%2x,%2x,%2x,%2x,%2x\n",
755 wapi_ie[i],wapi_ie[i+1],wapi_ie[i+2],wapi_ie[i+3],wapi_ie[i+4],
756 wapi_ie[i+5],wapi_ie[i+6],wapi_ie[i+7]));
760 *wapi_len=in_ie[cnt+1]+2;
761 cnt+=in_ie[cnt+1]+2; /* get next */
765 cnt+=in_ie[cnt+1]+2; /* get next */
774 int rtw_get_sec_ie(u8 *in_ie,uint in_len,u8 *rsn_ie,u16 *rsn_len,u8 *wpa_ie,u16 *wpa_len)
776 u8 authmode, sec_idx, i;
777 u8 wpa_oui[4]={0x0,0x50,0xf2,0x01};
782 /* Search required WPA or WPA2 IE and copy to sec_ie[ ] */
784 cnt = (_TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_);
792 if((authmode==_WPA_IE_ID_)&&(_rtw_memcmp(&in_ie[cnt+2], &wpa_oui[0],4)==_TRUE))
794 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("\n rtw_get_wpa_ie: sec_idx=%d in_ie[cnt+1]+2=%d\n",sec_idx,in_ie[cnt+1]+2));
797 memcpy(wpa_ie, &in_ie[cnt],in_ie[cnt+1]+2);
799 for(i=0;i<(in_ie[cnt+1]+2);i=i+8){
800 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("\n %2x,%2x,%2x,%2x,%2x,%2x,%2x,%2x\n",
801 wpa_ie[i],wpa_ie[i+1],wpa_ie[i+2],wpa_ie[i+3],wpa_ie[i+4],
802 wpa_ie[i+5],wpa_ie[i+6],wpa_ie[i+7]));
806 *wpa_len=in_ie[cnt+1]+2;
807 cnt+=in_ie[cnt+1]+2; /* get next */
811 if(authmode==_WPA2_IE_ID_)
813 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("\n get_rsn_ie: sec_idx=%d in_ie[cnt+1]+2=%d\n",sec_idx,in_ie[cnt+1]+2));
816 memcpy(rsn_ie, &in_ie[cnt],in_ie[cnt+1]+2);
818 for(i=0;i<(in_ie[cnt+1]+2);i=i+8){
819 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("\n %2x,%2x,%2x,%2x,%2x,%2x,%2x,%2x\n",
820 rsn_ie[i],rsn_ie[i+1],rsn_ie[i+2],rsn_ie[i+3],rsn_ie[i+4],
821 rsn_ie[i+5],rsn_ie[i+6],rsn_ie[i+7]));
825 *rsn_len=in_ie[cnt+1]+2;
826 cnt+=in_ie[cnt+1]+2; /* get next */
830 cnt+=in_ie[cnt+1]+2; /* get next */
838 return (*rsn_len+*wpa_len);
841 u8 rtw_is_wps_ie(u8 *ie_ptr, uint *wps_ielen)
844 u8 eid, wps_oui[4]={0x0,0x50,0xf2,0x04};
846 if(ie_ptr == NULL) return match;
850 if((eid==_WPA_IE_ID_)&&(_rtw_memcmp(&ie_ptr[2], wps_oui, 4)==_TRUE))
852 /* DBG_8723A("==> found WPS_IE.....\n"); */
853 *wps_ielen = ie_ptr[1]+2;
860 * rtw_get_wps_ie - Search WPS IE from a series of IEs
861 * @in_ie: Address of IEs to search
862 * @in_len: Length limit from in_ie
863 * @wps_ie: If not NULL and WPS IE is found, WPS IE will be copied to the buf starting from wps_ie
864 * @wps_ielen: If not NULL and WPS IE is found, will set to the length of the entire WPS IE
866 * Returns: The address of the WPS IE found, or NULL
868 u8 *rtw_get_wps_ie(u8 *in_ie, uint in_len, u8 *wps_ie, uint *wps_ielen)
872 u8 eid, wps_oui[4]={0x0,0x50,0xf2,0x04};
877 if(!in_ie || in_len<=0)
886 if((eid==_WPA_IE_ID_)&&(_rtw_memcmp(&in_ie[cnt+2], wps_oui, 4)==_TRUE))
888 wpsie_ptr = &in_ie[cnt];
891 memcpy(wps_ie, &in_ie[cnt], in_ie[cnt+1]+2);
894 *wps_ielen = in_ie[cnt+1]+2;
902 cnt+=in_ie[cnt+1]+2; /* goto next */
911 * rtw_get_wps_attr - Search a specific WPS attribute from a given WPS IE
912 * @wps_ie: Address of WPS IE to search
913 * @wps_ielen: Length limit from wps_ie
914 * @target_attr_id: The attribute ID of WPS attribute to search
915 * @buf_attr: If not NULL and the WPS attribute is found, WPS attribute will be copied to the buf starting from buf_attr
916 * @len_attr: If not NULL and the WPS attribute is found, will set to the length of the entire WPS attribute
918 * Returns: the address of the specific WPS attribute found, or NULL
920 u8 *rtw_get_wps_attr(u8 *wps_ie, uint wps_ielen, u16 target_attr_id ,u8 *buf_attr, u32 *len_attr)
923 u8 * target_attr_ptr = NULL;
924 u8 wps_oui[4]={0x00,0x50,0xF2,0x04};
929 if ( ( wps_ie[0] != _VENDOR_SPECIFIC_IE_ ) ||
930 ( _rtw_memcmp( wps_ie + 2, wps_oui , 4 ) != _TRUE ) )
935 /* 6 = 1(Element ID) + 1(Length) + 4(WPS OUI) */
936 attr_ptr = wps_ie + 6; /* goto first attr */
938 while(attr_ptr - wps_ie < wps_ielen)
940 /* 4 = 2(Attribute ID) + 2(Length) */
941 u16 attr_id = RTW_GET_BE16(attr_ptr);
942 u16 attr_data_len = RTW_GET_BE16(attr_ptr + 2);
943 u16 attr_len = attr_data_len + 4;
945 /* DBG_8723A("%s attr_ptr:%p, id:%u, length:%u\n", __FUNCTION__, attr_ptr, attr_id, attr_data_len); */
946 if( attr_id == target_attr_id )
948 target_attr_ptr = attr_ptr;
951 memcpy(buf_attr, attr_ptr, attr_len);
954 *len_attr = attr_len;
960 attr_ptr += attr_len; /* goto next */
965 return target_attr_ptr;
969 * rtw_get_wps_attr_content - Search a specific WPS attribute content from a given WPS IE
970 * @wps_ie: Address of WPS IE to search
971 * @wps_ielen: Length limit from wps_ie
972 * @target_attr_id: The attribute ID of WPS attribute to search
973 * @buf_content: If not NULL and the WPS attribute is found, WPS attribute content will be copied to the buf starting from buf_content
974 * @len_content: If not NULL and the WPS attribute is found, will set to the length of the WPS attribute content
976 * Returns: the address of the specific WPS attribute content found, or NULL
978 u8 *rtw_get_wps_attr_content(u8 *wps_ie, uint wps_ielen, u16 target_attr_id ,u8 *buf_content, uint *len_content)
986 attr_ptr = rtw_get_wps_attr(wps_ie, wps_ielen, target_attr_id, NULL, &attr_len);
988 if(attr_ptr && attr_len)
991 memcpy(buf_content, attr_ptr+4, attr_len-4);
994 *len_content = attr_len-4;
1002 static int rtw_ieee802_11_parse_vendor_specific(u8 *pos, uint elen,
1003 struct rtw_ieee802_11_elems *elems,
1008 /* first 3 bytes in vendor specific information element are the IEEE
1009 * OUI of the vendor. The following byte is used a vendor specific
1013 DBG_8723A("short vendor specific "
1014 "information element ignored (len=%lu)\n",
1015 (unsigned long) elen);
1020 oui = RTW_GET_BE24(pos);
1023 /* Microsoft/Wi-Fi information elements are further typed and
1027 /* Microsoft OUI (00:50:F2) with OUI Type 1:
1028 * real WPA information element */
1029 elems->wpa_ie = pos;
1030 elems->wpa_ie_len = elen;
1032 case WME_OUI_TYPE: /* this is a Wi-Fi WME info. element */
1034 DBG_8723A("short WME "
1035 "information element ignored "
1037 (unsigned long) elen);
1041 case WME_OUI_SUBTYPE_INFORMATION_ELEMENT:
1042 case WME_OUI_SUBTYPE_PARAMETER_ELEMENT:
1044 elems->wme_len = elen;
1046 case WME_OUI_SUBTYPE_TSPEC_ELEMENT:
1047 elems->wme_tspec = pos;
1048 elems->wme_tspec_len = elen;
1051 DBG_8723A("unknown WME "
1052 "information element ignored "
1053 "(subtype=%d len=%lu)\n",
1054 pos[4], (unsigned long) elen);
1059 /* Wi-Fi Protected Setup (WPS) IE */
1060 elems->wps_ie = pos;
1061 elems->wps_ie_len = elen;
1064 DBG_8723A("Unknown Microsoft "
1065 "information element ignored "
1066 "(type=%d len=%lu)\n",
1067 pos[3], (unsigned long) elen);
1074 case VENDOR_HT_CAPAB_OUI_TYPE:
1075 elems->vendor_ht_cap = pos;
1076 elems->vendor_ht_cap_len = elen;
1079 DBG_8723A("Unknown Broadcom "
1080 "information element ignored "
1081 "(type=%d len=%lu)\n",
1082 pos[3], (unsigned long) elen);
1088 DBG_8723A("unknown vendor specific information "
1089 "element ignored (vendor OUI %02x:%02x:%02x "
1091 pos[0], pos[1], pos[2], (unsigned long) elen);
1099 * ieee802_11_parse_elems - Parse information elements in management frames
1100 * @start: Pointer to the start of IEs
1101 * @len: Length of IE buffer in octets
1102 * @elems: Data structure for parsed elements
1103 * @show_errors: Whether to show parsing errors in debug log
1104 * Returns: Parsing result
1106 ParseRes rtw_ieee802_11_parse_elems(u8 *start, uint len,
1107 struct rtw_ieee802_11_elems *elems,
1114 _rtw_memset(elems, 0, sizeof(*elems));
1125 DBG_8723A("IEEE 802.11 element "
1126 "parse failed (id=%d elen=%d "
1128 id, elen, (unsigned long) left);
1136 elems->ssid_len = elen;
1138 case WLAN_EID_SUPP_RATES:
1139 elems->supp_rates = pos;
1140 elems->supp_rates_len = elen;
1142 case WLAN_EID_FH_PARAMS:
1143 elems->fh_params = pos;
1144 elems->fh_params_len = elen;
1146 case WLAN_EID_DS_PARAMS:
1147 elems->ds_params = pos;
1148 elems->ds_params_len = elen;
1150 case WLAN_EID_CF_PARAMS:
1151 elems->cf_params = pos;
1152 elems->cf_params_len = elen;
1156 elems->tim_len = elen;
1158 case WLAN_EID_IBSS_PARAMS:
1159 elems->ibss_params = pos;
1160 elems->ibss_params_len = elen;
1162 case WLAN_EID_CHALLENGE:
1163 elems->challenge = pos;
1164 elems->challenge_len = elen;
1166 case WLAN_EID_ERP_INFO:
1167 elems->erp_info = pos;
1168 elems->erp_info_len = elen;
1170 case WLAN_EID_EXT_SUPP_RATES:
1171 elems->ext_supp_rates = pos;
1172 elems->ext_supp_rates_len = elen;
1174 case WLAN_EID_VENDOR_SPECIFIC:
1175 if (rtw_ieee802_11_parse_vendor_specific(pos, elen,
1181 elems->rsn_ie = pos;
1182 elems->rsn_ie_len = elen;
1184 case WLAN_EID_PWR_CAPABILITY:
1185 elems->power_cap = pos;
1186 elems->power_cap_len = elen;
1188 case WLAN_EID_SUPPORTED_CHANNELS:
1189 elems->supp_channels = pos;
1190 elems->supp_channels_len = elen;
1192 case WLAN_EID_MOBILITY_DOMAIN:
1194 elems->mdie_len = elen;
1196 case WLAN_EID_FAST_BSS_TRANSITION:
1198 elems->ftie_len = elen;
1200 case WLAN_EID_TIMEOUT_INTERVAL:
1201 elems->timeout_int = pos;
1202 elems->timeout_int_len = elen;
1204 case WLAN_EID_HT_CAP:
1205 elems->ht_capabilities = pos;
1206 elems->ht_capabilities_len = elen;
1208 case WLAN_EID_HT_OPERATION:
1209 elems->ht_operation = pos;
1210 elems->ht_operation_len = elen;
1216 DBG_8723A("IEEE 802.11 element parse "
1217 "ignored unknown element (id=%d elen=%d)\n",
1229 return unknown ? ParseUnknown : ParseOK;
1232 static u8 key_char2num(u8 ch);
1233 static u8 key_char2num(u8 ch)
1235 if((ch>='0')&&(ch<='9'))
1237 else if ((ch>='a')&&(ch<='f'))
1238 return ch - 'a' + 10;
1239 else if ((ch>='A')&&(ch<='F'))
1240 return ch - 'A' + 10;
1245 u8 str_2char2num(u8 hch, u8 lch);
1246 u8 str_2char2num(u8 hch, u8 lch)
1248 return ((key_char2num(hch) * 10 ) + key_char2num(lch));
1251 u8 key_2char2num(u8 hch, u8 lch);
1252 u8 key_2char2num(u8 hch, u8 lch)
1254 return ((key_char2num(hch) << 4) | key_char2num(lch));
1257 u8 convert_ip_addr(u8 hch, u8 mch, u8 lch)
1259 return ((key_char2num(hch) * 100) + (key_char2num(mch) * 10 ) + key_char2num(lch));
1262 extern char* rtw_initmac;
1263 void rtw_macaddr_cfg(u8 *mac_addr)
1266 if(mac_addr == NULL) return;
1269 { /* Users specify the mac address */
1272 for( jj = 0, kk = 0; jj < ETH_ALEN; jj++, kk += 3 )
1274 mac[jj] = key_2char2num(rtw_initmac[kk], rtw_initmac[kk+ 1]);
1276 memcpy(mac_addr, mac, ETH_ALEN);
1279 { /* Use the mac address stored in the Efuse */
1280 memcpy(mac, mac_addr, ETH_ALEN);
1283 if (((mac[0]==0xff) &&(mac[1]==0xff) && (mac[2]==0xff) &&
1284 (mac[3]==0xff) && (mac[4]==0xff) &&(mac[5]==0xff)) ||
1285 ((mac[0]==0x0) && (mac[1]==0x0) && (mac[2]==0x0) &&
1286 (mac[3]==0x0) && (mac[4]==0x0) &&(mac[5]==0x0)))
1294 /* use default mac addresss */
1295 memcpy(mac_addr, mac, ETH_ALEN);
1296 DBG_8723A("MAC Address from efuse error, assign default one !!!\n");
1299 DBG_8723A("rtw_macaddr_cfg MAC Address = "MAC_FMT"\n", MAC_ARG(mac_addr));
1302 void dump_ies(u8 *buf, u32 buf_len) {
1306 while(pos-buf<=buf_len){
1310 DBG_8723A("%s ID:%u, LEN:%u\n", __FUNCTION__, id, len);
1312 dump_p2p_ie(pos, len);
1314 dump_wps_ie(pos, len);
1320 void dump_wps_ie(u8 *ie, u32 ie_len) {
1328 wps_ie = rtw_get_wps_ie(ie, ie_len, NULL, &wps_ielen);
1329 if(wps_ie != ie || wps_ielen == 0)
1333 while(pos-ie < ie_len){
1334 id = RTW_GET_BE16(pos);
1335 len = RTW_GET_BE16(pos + 2);
1337 DBG_8723A("%s ID:0x%04x, LEN:%u\n", __FUNCTION__, id, len);
1344 void dump_p2p_ie(u8 *ie, u32 ie_len) {
1352 p2p_ie = rtw_get_p2p_ie(ie, ie_len, NULL, &p2p_ielen);
1353 if(p2p_ie != ie || p2p_ielen == 0)
1357 while(pos-ie < ie_len){
1359 len = RTW_GET_LE16(pos+1);
1361 DBG_8723A("%s ID:%u, LEN:%u\n", __FUNCTION__, id, len);
1368 * rtw_get_p2p_ie - Search P2P IE from a series of IEs
1369 * @in_ie: Address of IEs to search
1370 * @in_len: Length limit from in_ie
1371 * @p2p_ie: If not NULL and P2P IE is found, P2P IE will be copied to the buf starting from p2p_ie
1372 * @p2p_ielen: If not NULL and P2P IE is found, will set to the length of the entire P2P IE
1374 * Returns: The address of the P2P IE found, or NULL
1376 u8 *rtw_get_p2p_ie(u8 *in_ie, int in_len, u8 *p2p_ie, uint *p2p_ielen)
1380 u8 eid, p2p_oui[4]={0x50,0x6F,0x9A,0x09};
1382 if ( p2p_ielen != NULL )
1388 if ((in_len < 0) || (cnt > MAX_IE_SZ)) {
1392 if( ( eid == _VENDOR_SPECIFIC_IE_ ) && ( _rtw_memcmp( &in_ie[cnt+2], p2p_oui, 4) == _TRUE ) )
1394 p2p_ie_ptr = in_ie + cnt;
1396 if ( p2p_ie != NULL )
1398 memcpy(p2p_ie, &in_ie[ cnt ], in_ie[ cnt + 1 ] + 2 );
1401 if ( p2p_ielen != NULL )
1403 *p2p_ielen = in_ie[ cnt + 1 ] + 2;
1412 cnt += in_ie[ cnt + 1 ] +2; /* goto next */
1421 * rtw_get_p2p_attr - Search a specific P2P attribute from a given P2P IE
1422 * @p2p_ie: Address of P2P IE to search
1423 * @p2p_ielen: Length limit from p2p_ie
1424 * @target_attr_id: The attribute ID of P2P attribute to search
1425 * @buf_attr: If not NULL and the P2P attribute is found, P2P attribute will be copied to the buf starting from buf_attr
1426 * @len_attr: If not NULL and the P2P attribute is found, will set to the length of the entire P2P attribute
1428 * Returns: the address of the specific WPS attribute found, or NULL
1430 u8 *rtw_get_p2p_attr(u8 *p2p_ie, uint p2p_ielen, u8 target_attr_id ,u8 *buf_attr, u32 *len_attr)
1432 u8 *attr_ptr = NULL;
1433 u8 *target_attr_ptr = NULL;
1434 u8 p2p_oui[4]={0x50,0x6F,0x9A,0x09};
1439 if ( !p2p_ie || ( p2p_ie[0] != _VENDOR_SPECIFIC_IE_ ) ||
1440 ( _rtw_memcmp( p2p_ie + 2, p2p_oui , 4 ) != _TRUE ) )
1445 /* 6 = 1(Element ID) + 1(Length) + 3 (OUI) + 1(OUI Type) */
1446 attr_ptr = p2p_ie + 6; /* goto first attr */
1448 while(attr_ptr - p2p_ie < p2p_ielen)
1450 /* 3 = 1(Attribute ID) + 2(Length) */
1451 u8 attr_id = *attr_ptr;
1452 u16 attr_data_len = RTW_GET_LE16(attr_ptr + 1);
1453 u16 attr_len = attr_data_len + 3;
1455 /* DBG_8723A("%s attr_ptr:%p, id:%u, length:%u\n", __FUNCTION__, attr_ptr, attr_id, attr_data_len); */
1456 if( attr_id == target_attr_id )
1458 target_attr_ptr = attr_ptr;
1461 memcpy(buf_attr, attr_ptr, attr_len);
1464 *len_attr = attr_len;
1470 attr_ptr += attr_len; /* goto next */
1475 return target_attr_ptr;
1479 * rtw_get_p2p_attr_content - Search a specific P2P attribute content from a given P2P IE
1480 * @p2p_ie: Address of P2P IE to search
1481 * @p2p_ielen: Length limit from p2p_ie
1482 * @target_attr_id: The attribute ID of P2P attribute to search
1483 * @buf_content: If not NULL and the P2P attribute is found, P2P attribute content will be copied to the buf starting from buf_content
1484 * @len_content: If not NULL and the P2P attribute is found, will set to the length of the P2P attribute content
1486 * Returns: the address of the specific P2P attribute content found, or NULL
1488 u8 *rtw_get_p2p_attr_content(u8 *p2p_ie, uint p2p_ielen, u8 target_attr_id ,u8 *buf_content, uint *len_content)
1496 attr_ptr = rtw_get_p2p_attr(p2p_ie, p2p_ielen, target_attr_id, NULL, &attr_len);
1498 if(attr_ptr && attr_len)
1501 memcpy(buf_content, attr_ptr+3, attr_len-3);
1504 *len_content = attr_len-3;
1512 u32 rtw_set_p2p_attr_content(u8 *pbuf, u8 attr_id, u16 attr_len, u8 *pdata_attr)
1518 /* u16*)(pbuf + 1) = cpu_to_le16(attr_len); */
1519 RTW_PUT_LE16(pbuf + 1, attr_len);
1522 memcpy(pbuf + 3, pdata_attr, attr_len);
1524 a_len = attr_len + 3;
1529 static uint rtw_p2p_attr_remove(u8 *ie, uint ielen_ori, u8 attr_id)
1532 u32 target_attr_len;
1533 uint ielen = ielen_ori;
1537 target_attr=rtw_get_p2p_attr(ie, ielen, attr_id, NULL, &target_attr_len);
1538 if(target_attr && target_attr_len)
1540 u8 *next_attr = target_attr+target_attr_len;
1541 uint remain_len = ielen-(next_attr-ie);
1542 /* dump_ies(ie, ielen); */
1544 DBG_8723A("[%d] ie:%p, ielen:%u\n"
1545 "target_attr:%p, target_attr_len:%u\n"
1546 "next_attr:%p, remain_len:%u\n"
1549 , target_attr, target_attr_len
1550 , next_attr, remain_len
1554 _rtw_memset(target_attr, 0, target_attr_len);
1555 memcpy(target_attr, next_attr, remain_len);
1556 _rtw_memset(target_attr+remain_len, 0, target_attr_len);
1557 *(ie+1) -= target_attr_len;
1558 ielen-=target_attr_len;
1563 /* dump_ies(ie, ielen); */
1571 void rtw_WLAN_BSSID_EX_remove_p2p_attr(WLAN_BSSID_EX *bss_ex, u8 attr_id)
1574 uint p2p_ielen, p2p_ielen_ori;
1577 if( (p2p_ie=rtw_get_p2p_ie(bss_ex->IEs+_FIXED_IE_LENGTH_, bss_ex->IELength-_FIXED_IE_LENGTH_, NULL, &p2p_ielen_ori)) )
1580 if(rtw_get_p2p_attr(p2p_ie, p2p_ielen_ori, attr_id, NULL, NULL)) {
1581 DBG_8723A("rtw_get_p2p_attr: GOT P2P_ATTR:%u!!!!!!!!\n", attr_id);
1582 dump_ies(bss_ex->IEs+_FIXED_IE_LENGTH_, bss_ex->IELength-_FIXED_IE_LENGTH_);
1586 p2p_ielen=rtw_p2p_attr_remove(p2p_ie, p2p_ielen_ori, attr_id);
1587 if(p2p_ielen != p2p_ielen_ori) {
1589 u8 *next_ie_ori = p2p_ie+p2p_ielen_ori;
1590 u8 *next_ie = p2p_ie+p2p_ielen;
1591 uint remain_len = bss_ex->IELength-(next_ie_ori-bss_ex->IEs);
1593 memcpy(next_ie, next_ie_ori, remain_len);
1594 _rtw_memset(next_ie+remain_len, 0, p2p_ielen_ori-p2p_ielen);
1595 bss_ex->IELength -= p2p_ielen_ori-p2p_ielen;
1598 DBG_8723A("remove P2P_ATTR:%u!\n", attr_id);
1599 dump_ies(bss_ex->IEs+_FIXED_IE_LENGTH_, bss_ex->IELength-_FIXED_IE_LENGTH_);
1605 #endif /* CONFIG_P2P */
1608 int rtw_get_wfd_ie(u8 *in_ie, int in_len, u8 *wfd_ie, uint *wfd_ielen)
1612 u8 eid, wfd_oui[4]={0x50,0x6F,0x9A,0x0A};
1625 if( ( eid == _VENDOR_SPECIFIC_IE_ ) && ( _rtw_memcmp( &in_ie[cnt+2], wfd_oui, 4) == _TRUE ) )
1627 if ( wfd_ie != NULL )
1629 memcpy(wfd_ie, &in_ie[ cnt ], in_ie[ cnt + 1 ] + 2 );
1634 if ( wfd_ielen != NULL )
1640 if ( wfd_ielen != NULL )
1642 *wfd_ielen = in_ie[ cnt + 1 ] + 2;
1645 cnt += in_ie[ cnt + 1 ] + 2;
1652 cnt += in_ie[ cnt + 1 ] +2; /* goto next */
1657 if ( match == _TRUE )
1665 /* attr_content: The output buffer, contains the "body field" of WFD attribute. */
1666 /* attr_contentlen: The data length of the "body field" of WFD attribute. */
1667 int rtw_get_wfd_attr_content(u8 *wfd_ie, uint wfd_ielen, u8 target_attr_id ,u8 *attr_content, uint *attr_contentlen)
1671 u8 attr_id, wfd_oui[4]={0x50,0x6F,0x9A,0x0A};
1675 if ( ( wfd_ie[ 0 ] != _VENDOR_SPECIFIC_IE_ ) ||
1676 ( _rtw_memcmp( wfd_ie + 2, wfd_oui , 4 ) != _TRUE ) )
1681 /* 1 ( WFD IE ) + 1 ( Length ) + 3 ( OUI ) + 1 ( OUI Type ) */
1683 while( cnt < wfd_ielen )
1685 u16 attrlen = RTW_GET_BE16(wfd_ie + cnt + 1);
1687 attr_id = wfd_ie[cnt];
1688 if( attr_id == target_attr_id )
1690 /* 3 -> 1 byte for attribute ID field, 2 bytes for length field */
1692 memcpy(attr_content, &wfd_ie[ cnt + 3 ], attrlen );
1695 *attr_contentlen = attrlen;
1704 cnt += attrlen + 3; /* goto next */
1711 #endif /* CONFIG_WFD */
1713 /* Baron adds to avoid FreeBSD warning */
1714 int ieee80211_is_empty_essid(const char *essid, int essid_len)
1716 /* Single white space is for Linksys APs */
1717 if (essid_len == 1 && essid[0] == ' ')
1720 /* Otherwise, if the entire essid is 0, we assume it is hidden */
1723 if (essid[essid_len] != '\0')
1730 int ieee80211_get_hdrlen(u16 fc)
1734 switch (WLAN_FC_GET_TYPE(fc)) {
1735 case RTW_IEEE80211_FTYPE_DATA:
1736 if (fc & RTW_IEEE80211_STYPE_QOS_DATA)
1738 if ((fc & RTW_IEEE80211_FCTL_FROMDS) && (fc & RTW_IEEE80211_FCTL_TODS))
1739 hdrlen += 6; /* Addr4 */
1741 case RTW_IEEE80211_FTYPE_CTL:
1742 switch (WLAN_FC_GET_STYPE(fc)) {
1743 case RTW_IEEE80211_STYPE_CTS:
1744 case RTW_IEEE80211_STYPE_ACK:
1757 int rtw_get_cipher_info(struct wlan_network *pnetwork)
1760 unsigned char *pbuf;
1761 int group_cipher = 0, pairwise_cipher = 0, is8021x = 0;
1763 pbuf = rtw_get_wpa_ie(&pnetwork->network.IEs[12], &wpa_ielen, pnetwork->network.IELength-12);
1765 if(pbuf && (wpa_ielen>0)) {
1766 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("rtw_get_cipher_info: wpa_ielen: %d", wpa_ielen));
1767 if (_SUCCESS == rtw_parse_wpa_ie(pbuf, wpa_ielen+2, &group_cipher, &pairwise_cipher, &is8021x)) {
1769 pnetwork->BcnInfo.pairwise_cipher = pairwise_cipher;
1770 pnetwork->BcnInfo.group_cipher = group_cipher;
1771 pnetwork->BcnInfo.is_8021x = is8021x;
1772 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("%s: pnetwork->pairwise_cipher: %d, is_8021x is %d",
1773 __func__, pnetwork->BcnInfo.pairwise_cipher, pnetwork->BcnInfo.is_8021x));
1778 pbuf = rtw_get_wpa2_ie(&pnetwork->network.IEs[12], &wpa_ielen, pnetwork->network.IELength-12);
1780 if(pbuf && (wpa_ielen>0)) {
1781 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("get RSN IE\n"));
1782 if (_SUCCESS == rtw_parse_wpa2_ie(pbuf, wpa_ielen+2, &group_cipher, &pairwise_cipher, &is8021x)) {
1783 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("get RSN IE OK!!!\n"));
1784 pnetwork->BcnInfo.pairwise_cipher = pairwise_cipher;
1785 pnetwork->BcnInfo.group_cipher = group_cipher;
1786 pnetwork->BcnInfo.is_8021x = is8021x;
1787 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("%s: pnetwork->pairwise_cipher: %d,"
1788 "pnetwork->group_cipher is %d, is_8021x is %d", __func__, pnetwork->BcnInfo.pairwise_cipher,
1789 pnetwork->BcnInfo.group_cipher,pnetwork->BcnInfo.is_8021x));
1798 void rtw_get_bcn_info(struct wlan_network *pnetwork)
1800 unsigned short cap = 0;
1802 /* u8 wpa_ie[255],rsn_ie[255]; */
1803 u16 wpa_len=0,rsn_len=0;
1804 struct HT_info_element *pht_info = NULL;
1805 struct rtw_ieee80211_ht_cap *pht_cap = NULL;
1809 memcpy((u8 *)&cap, rtw_get_capability_from_ie(pnetwork->network.IEs), 2);
1810 cap = le16_to_cpu(cap);
1811 if (cap & WLAN_CAPABILITY_PRIVACY) {
1813 pnetwork->network.Privacy = 1;
1815 pnetwork->BcnInfo.encryp_protocol = ENCRYP_PROTOCOL_OPENSYS;
1817 rtw_get_sec_ie(pnetwork->network.IEs ,pnetwork->network.IELength,NULL,&rsn_len,NULL,&wpa_len);
1818 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("rtw_get_bcn_info: ssid=%s\n",pnetwork->network.Ssid.Ssid));
1819 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("rtw_get_bcn_info: wpa_len=%d rsn_len=%d\n",wpa_len,rsn_len));
1820 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("rtw_get_bcn_info: ssid=%s\n",pnetwork->network.Ssid.Ssid));
1821 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("rtw_get_bcn_info: wpa_len=%d rsn_len=%d\n",wpa_len,rsn_len));
1824 pnetwork->BcnInfo.encryp_protocol = ENCRYP_PROTOCOL_WPA2;
1825 } else if (wpa_len > 0) {
1826 pnetwork->BcnInfo.encryp_protocol = ENCRYP_PROTOCOL_WPA;
1829 pnetwork->BcnInfo.encryp_protocol = ENCRYP_PROTOCOL_WEP;
1831 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("rtw_get_bcn_info: pnetwork->encryp_protocol is %x\n",
1832 pnetwork->BcnInfo.encryp_protocol));
1833 RT_TRACE(_module_rtl871x_mlme_c_,_drv_info_,("rtw_get_bcn_info: pnetwork->encryp_protocol is %x\n",
1834 pnetwork->BcnInfo.encryp_protocol));
1835 rtw_get_cipher_info(pnetwork);
1837 /* get bwmode and ch_offset */
1838 /* parsing HT_CAP_IE */
1839 p = rtw_get_ie(pnetwork->network.IEs + _FIXED_IE_LENGTH_, _HT_CAPABILITY_IE_, &len, pnetwork->network.IELength - _FIXED_IE_LENGTH_);
1841 pht_cap = (struct rtw_ieee80211_ht_cap *)(p + 2);
1842 pnetwork->BcnInfo.ht_cap_info = pht_cap->cap_info;
1844 pnetwork->BcnInfo.ht_cap_info = 0;
1846 /* parsing HT_INFO_IE */
1847 p = rtw_get_ie(pnetwork->network.IEs + _FIXED_IE_LENGTH_, _HT_ADD_INFO_IE_, &len, pnetwork->network.IELength - _FIXED_IE_LENGTH_);
1849 pht_info = (struct HT_info_element *)(p + 2);
1850 pnetwork->BcnInfo.ht_info_infos_0 = pht_info->infos[0];
1852 pnetwork->BcnInfo.ht_info_infos_0 = 0;
1856 /* show MCS rate, unit: 100Kbps */
1857 u16 rtw_mcs_rate(u8 rf_type, u8 bw_40MHz, u8 short_GI_20, u8 short_GI_40, unsigned char * MCS_rate)
1861 if(rf_type == RF_1T1R)
1863 if(MCS_rate[0] & BIT(7))
1864 max_rate = (bw_40MHz) ? ((short_GI_40)?1500:1350):((short_GI_20)?722:650);
1865 else if(MCS_rate[0] & BIT(6))
1866 max_rate = (bw_40MHz) ? ((short_GI_40)?1350:1215):((short_GI_20)?650:585);
1867 else if(MCS_rate[0] & BIT(5))
1868 max_rate = (bw_40MHz) ? ((short_GI_40)?1200:1080):((short_GI_20)?578:520);
1869 else if(MCS_rate[0] & BIT(4))
1870 max_rate = (bw_40MHz) ? ((short_GI_40)?900:810):((short_GI_20)?433:390);
1871 else if(MCS_rate[0] & BIT(3))
1872 max_rate = (bw_40MHz) ? ((short_GI_40)?600:540):((short_GI_20)?289:260);
1873 else if(MCS_rate[0] & BIT(2))
1874 max_rate = (bw_40MHz) ? ((short_GI_40)?450:405):((short_GI_20)?217:195);
1875 else if(MCS_rate[0] & BIT(1))
1876 max_rate = (bw_40MHz) ? ((short_GI_40)?300:270):((short_GI_20)?144:130);
1877 else if(MCS_rate[0] & BIT(0))
1878 max_rate = (bw_40MHz) ? ((short_GI_40)?150:135):((short_GI_20)?72:65);
1884 if(MCS_rate[1] & BIT(7))
1885 max_rate = (bw_40MHz) ? ((short_GI_40)?3000:2700):((short_GI_20)?1444:1300);
1886 else if(MCS_rate[1] & BIT(6))
1887 max_rate = (bw_40MHz) ? ((short_GI_40)?2700:2430):((short_GI_20)?1300:1170);
1888 else if(MCS_rate[1] & BIT(5))
1889 max_rate = (bw_40MHz) ? ((short_GI_40)?2400:2160):((short_GI_20)?1156:1040);
1890 else if(MCS_rate[1] & BIT(4))
1891 max_rate = (bw_40MHz) ? ((short_GI_40)?1800:1620):((short_GI_20)?867:780);
1892 else if(MCS_rate[1] & BIT(3))
1893 max_rate = (bw_40MHz) ? ((short_GI_40)?1200:1080):((short_GI_20)?578:520);
1894 else if(MCS_rate[1] & BIT(2))
1895 max_rate = (bw_40MHz) ? ((short_GI_40)?900:810):((short_GI_20)?433:390);
1896 else if(MCS_rate[1] & BIT(1))
1897 max_rate = (bw_40MHz) ? ((short_GI_40)?600:540):((short_GI_20)?289:260);
1898 else if(MCS_rate[1] & BIT(0))
1899 max_rate = (bw_40MHz) ? ((short_GI_40)?300:270):((short_GI_20)?144:130);
1903 if(MCS_rate[0] & BIT(7))
1904 max_rate = (bw_40MHz) ? ((short_GI_40)?1500:1350):((short_GI_20)?722:650);
1905 else if(MCS_rate[0] & BIT(6))
1906 max_rate = (bw_40MHz) ? ((short_GI_40)?1350:1215):((short_GI_20)?650:585);
1907 else if(MCS_rate[0] & BIT(5))
1908 max_rate = (bw_40MHz) ? ((short_GI_40)?1200:1080):((short_GI_20)?578:520);
1909 else if(MCS_rate[0] & BIT(4))
1910 max_rate = (bw_40MHz) ? ((short_GI_40)?900:810):((short_GI_20)?433:390);
1911 else if(MCS_rate[0] & BIT(3))
1912 max_rate = (bw_40MHz) ? ((short_GI_40)?600:540):((short_GI_20)?289:260);
1913 else if(MCS_rate[0] & BIT(2))
1914 max_rate = (bw_40MHz) ? ((short_GI_40)?450:405):((short_GI_20)?217:195);
1915 else if(MCS_rate[0] & BIT(1))
1916 max_rate = (bw_40MHz) ? ((short_GI_40)?300:270):((short_GI_20)?144:130);
1917 else if(MCS_rate[0] & BIT(0))
1918 max_rate = (bw_40MHz) ? ((short_GI_40)?150:135):((short_GI_20)?72:65);
1924 int rtw_action_frame_parse(const u8 *frame, u32 frame_len, u8* category, u8 *action)
1926 const u8 *frame_body = frame + sizeof(struct rtw_ieee80211_hdr_3addr);
1930 fc = le16_to_cpu(((struct rtw_ieee80211_hdr_3addr *)frame)->frame_ctl);
1932 if ((fc & (RTW_IEEE80211_FCTL_FTYPE|RTW_IEEE80211_FCTL_STYPE))
1933 != (RTW_IEEE80211_FTYPE_MGMT|RTW_IEEE80211_STYPE_ACTION)
1942 case RTW_WLAN_CATEGORY_P2P: /* vendor-specific */
1956 static const char *_action_public_str[] = {
1957 "ACT_PUB_BSSCOEXIST",
1958 "ACT_PUB_DSE_ENABLE",
1959 "ACT_PUB_DSE_DEENABLE",
1960 "ACT_PUB_DSE_REG_LOCATION",
1961 "ACT_PUB_EXT_CHL_SWITCH",
1962 "ACT_PUB_DSE_MSR_REQ",
1963 "ACT_PUB_DSE_MSR_RPRT",
1965 "ACT_PUB_DSE_PWR_CONSTRAINT",
1967 "ACT_PUB_GAS_INITIAL_REQ",
1968 "ACT_PUB_GAS_INITIAL_RSP",
1969 "ACT_PUB_GAS_COMEBACK_REQ",
1970 "ACT_PUB_GAS_COMEBACK_RSP",
1971 "ACT_PUB_TDLS_DISCOVERY_RSP",
1972 "ACT_PUB_LOCATION_TRACK",
1976 const char *action_public_str(u8 action)
1978 action = (action >= ACT_PUBLIC_MAX) ? ACT_PUBLIC_MAX : action;
1979 return _action_public_str[action];