rsn.c 86 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606
  1. /*
  2. ** Id: //Department/DaVinci/BRANCHES/MT6620_WIFI_DRIVER_V2_3/mgmt/rsn.c#3
  3. */
  4. /*! \file "rsn.c"
  5. \brief This file including the 802.11i, wpa and wpa2(rsn) related function.
  6. This file provided the macros and functions library support the wpa/rsn ie parsing,
  7. cipher and AKM check to help the AP seleced deciding, tkip mic error handler and rsn PMKID support.
  8. */
  9. /*
  10. ** Log: rsn.c
  11. **
  12. ** 08 13 2013 terry.wu
  13. ** [BORA00002207] [MT6630 Wi-Fi] TXM & MQM Implementation
  14. ** Remove unused code
  15. **
  16. ** 07 30 2013 wh.su
  17. ** [BORA00002446] [MT6630] [Wi-Fi] [Driver] Update the security function code
  18. ** update some debug code
  19. **
  20. ** 07 23 2013 wh.su
  21. ** [BORA00002446] [MT6630] [Wi-Fi] [Driver] Update the security function code
  22. ** Modify some security code for 11w and p2p
  23. **
  24. ** 07 23 2013 wh.su
  25. ** [BORA00002446] [MT6630] [Wi-Fi] [Driver] Update the security function code
  26. ** Sync the latest jb2.mp 11w code as draft version
  27. ** Not the CM bit for avoid wapi 1x drop at re-key
  28. **
  29. ** 07 01 2013 wh.su
  30. ** [BORA00002446] [MT6630] [Wi-Fi] [Driver] Update the security function code
  31. ** Add some debug code, fixed some compiling warning
  32. **
  33. ** 03 12 2013 tsaiyuan.hsu
  34. ** [BORA00002222] MT6630 unified MAC RXM
  35. ** add rx data and management processing.
  36. **
  37. ** 03 08 2013 wh.su
  38. ** [BORA00002446] [MT6630] [Wi-Fi] [Driver] Update the security function code
  39. ** Remove non-used compiling flag and code
  40. **
  41. ** 02 19 2013 cp.wu
  42. ** [BORA00002227] [MT6630 Wi-Fi][Driver] Update for Makefile and HIFSYS modifications
  43. ** take use of GET_BSS_INFO_BY_INDEX() and MAX_BSS_INDEX macros
  44. ** for correctly indexing of BSS-INFO pointers
  45. **
  46. ** 01 22 2013 cp.wu
  47. ** [BORA00002253] [MT6630 Wi-Fi][Driver][Firmware] Add NLO and timeout mechanism to SCN module
  48. ** modification for ucBssIndex migration
  49. **
  50. ** 09 17 2012 cm.chang
  51. ** [BORA00002149] [MT6630 Wi-Fi] Initial software development
  52. ** Duplicate source from MT6620 v2.3 driver branch
  53. ** (Davinci label: MT6620_WIFI_Driver_V2_3_120913_1942_As_MT6630_Base)
  54. **
  55. ** 08 24 2012 cp.wu
  56. ** [WCXRP00001269] [MT6620 Wi-Fi][Driver] cfg80211 porting merge back to DaVinci
  57. ** .
  58. **
  59. ** 08 24 2012 cp.wu
  60. ** [WCXRP00001269] [MT6620 Wi-Fi][Driver] cfg80211 porting merge back to DaVinci
  61. ** cfg80211 support merge back from ALPS.JB to DaVinci - MT6620 Driver v2.3 branch.
  62. *
  63. * 07 17 2012 yuche.tsai
  64. * NULL
  65. * Compile no error before trial run.
  66. *
  67. * 03 09 2012 chinglan.wang
  68. * NULL
  69. * Fix the condition error.
  70. *
  71. * 03 02 2012 terry.wu
  72. * NULL
  73. * Snc CFG80211 modification for ICS migration from branch 2.2.
  74. *
  75. * 03 02 2012 terry.wu
  76. * NULL
  77. * Sync CFG80211 modification from branch 2,2.
  78. *
  79. * 11 11 2011 wh.su
  80. * [WCXRP00001078] [MT6620 Wi-Fi][Driver] Adding the mediatek log improment support : XLOG
  81. * modify the xlog related code.
  82. *
  83. * 11 10 2011 wh.su
  84. * [WCXRP00001078] [MT6620 Wi-Fi][Driver] Adding the mediatek log improment support : XLOG
  85. * change the debug module level.
  86. *
  87. * 10 12 2011 wh.su
  88. * [WCXRP00001036] [MT6620 Wi-Fi][Driver][FW] Adding the 802.11w code for MFP
  89. * adding the 802.11w related function and define .
  90. *
  91. * 03 17 2011 chinglan.wang
  92. * [WCXRP00000570] [MT6620 Wi-Fi][Driver] Add Wi-Fi Protected Setup v2.0 feature
  93. * .
  94. *
  95. * 02 09 2011 wh.su
  96. * [WCXRP00000432] [MT6620 Wi-Fi][Driver] Add STA privacy check at hotspot mode
  97. * adding the code for check STA privacy bit at AP mode, .
  98. *
  99. * 12 24 2010 chinglan.wang
  100. * NULL
  101. * [MT6620][Wi-Fi] Modify the key management in the driver for WPS function.
  102. *
  103. * 12 13 2010 cp.wu
  104. * [WCXRP00000260] [MT6620 Wi-Fi][Driver][Firmware] Create V1.1 branch for both firmware and driver
  105. * create branch for Wi-Fi driver v1.1
  106. *
  107. * 11 05 2010 wh.su
  108. * [WCXRP00000165] [MT6620 Wi-Fi] [Pre-authentication] Assoc req rsn ie use wrong pmkid value
  109. * fixed the.pmkid value mismatch issue
  110. *
  111. * 11 03 2010 wh.su
  112. * [WCXRP00000124] [MT6620 Wi-Fi] [Driver] Support the dissolve P2P Group
  113. * Refine the HT rate disallow TKIP pairwise cipher .
  114. *
  115. * 10 04 2010 cp.wu
  116. * [WCXRP00000077] [MT6620 Wi-Fi][Driver][FW] Eliminate use of ENUM_NETWORK_TYPE_T
  117. * and replaced by ENUM_NETWORK_TYPE_INDEX_T only
  118. * remove ENUM_NETWORK_TYPE_T definitions
  119. *
  120. * 09 29 2010 yuche.tsai
  121. * NULL
  122. * Fix compile error, remove unused pointer in rsnGenerateRSNIE().
  123. *
  124. * 09 28 2010 wh.su
  125. * NULL
  126. * [WCXRP00000069][MT6620 Wi-Fi][Driver] Fix some code for phase 1 P2P Demo.
  127. *
  128. * 09 24 2010 wh.su
  129. * NULL
  130. * [WCXRP00005002][MT6620 Wi-Fi][Driver] Eliminate Linux Compile Warning.
  131. *
  132. * 09 06 2010 wh.su
  133. * NULL
  134. * let the p2p can set the privacy bit at beacon and rsn ie at assoc req at key handshake state.
  135. *
  136. * 08 30 2010 wh.su
  137. * NULL
  138. * remove non-used code.
  139. *
  140. * 08 19 2010 wh.su
  141. * NULL
  142. * adding the tx pkt call back handle for countermeasure.
  143. *
  144. * 07 24 2010 wh.su
  145. *
  146. * .support the Wi-Fi RSN
  147. *
  148. * 07 08 2010 cp.wu
  149. *
  150. * [WPD00003833] [MT6620 and MT5931] Driver migration - move to new repository.
  151. *
  152. * 06 21 2010 wh.su
  153. * [WPD00003840][MT6620 5931] Security migration
  154. * modify some code for concurrent network.
  155. *
  156. * 06 21 2010 cp.wu
  157. * [WPD00003833][MT6620 and MT5931] Driver migration
  158. * [WPD00003833][MT6620 and MT5931] Driver migration
  159. * enable RX management frame handling.
  160. *
  161. * 06 19 2010 wh.su
  162. * [WPD00003840][MT6620 5931] Security migration
  163. * consdier the concurrent network setting.
  164. *
  165. * 06 18 2010 wh.su
  166. * [WPD00003840][MT6620 5931] Security migration
  167. * [WPD00003840] [MT6620 5931] Security migration
  168. * migration from firmware.
  169. *
  170. * 05 27 2010 wh.su
  171. * [BORA00000637][MT6620 Wi-Fi] [Bug] WPA2 pre-authentication timer not correctly initialize
  172. * not indicate pmkid candidate while no new one scanned.
  173. *
  174. * 04 29 2010 wh.su
  175. * [BORA00000637][MT6620 Wi-Fi] [Bug] WPA2 pre-authentication timer not correctly initialize
  176. * adjsut the pre-authentication code.
  177. *
  178. * 03 03 2010 wh.su
  179. * [BORA00000637][MT6620 Wi-Fi] [Bug] WPA2 pre-authentication timer not correctly initialize
  180. * move the AIS specific variable for security to AIS specific structure.
  181. *
  182. * 03 03 2010 wh.su
  183. * [BORA00000637][MT6620 Wi-Fi] [Bug] WPA2 pre-authentication timer not correctly initialize
  184. * Fixed the pre-authentication timer not correctly init issue,
  185. * and modify the security related callback function prototype.
  186. *
  187. * 01 27 2010 wh.su
  188. * [BORA00000476][Wi-Fi][firmware] Add the security module initialize code
  189. * add and fixed some security function.
  190. *
  191. * 12 18 2009 cm.chang
  192. * [BORA00000018]Integrate WIFI part into BORA for the 1st time
  193. * .
  194. *
  195. * Dec 8 2009 mtk01088
  196. * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
  197. * change the name
  198. *
  199. * Dec 7 2009 mtk01088
  200. * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
  201. * using the Rx0 port to indicate event
  202. *
  203. * Dec 4 2009 mtk01088
  204. * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
  205. * refine the code for generate the WPA/RSN IE for assoc req
  206. *
  207. * Dec 3 2009 mtk01088
  208. * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
  209. * adjust code for pmkid event
  210. *
  211. * Dec 1 2009 mtk01088
  212. * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
  213. * adding the code for event (mic error and pmkid indicate) and do some function rename
  214. *
  215. * Nov 23 2009 mtk01088
  216. * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
  217. * adding some security function
  218. *
  219. * Nov 19 2009 mtk01088
  220. * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
  221. * adding some security feature, including pmkid
  222. *
  223. * Nov 18 2009 mtk01088
  224. * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
  225. *
  226. **
  227. */
  228. /*******************************************************************************
  229. * C O M P I L E R F L A G S
  230. ********************************************************************************
  231. */
  232. /*******************************************************************************
  233. * E X T E R N A L R E F E R E N C E S
  234. ********************************************************************************
  235. */
  236. #include "precomp.h"
  237. /*******************************************************************************
  238. * C O N S T A N T S
  239. ********************************************************************************
  240. */
  241. /*******************************************************************************
  242. * D A T A T Y P E S
  243. ********************************************************************************
  244. */
  245. /*******************************************************************************
  246. * P U B L I C D A T A
  247. ********************************************************************************
  248. */
  249. /*******************************************************************************
  250. * P R I V A T E D A T A
  251. ********************************************************************************
  252. */
  253. /*******************************************************************************
  254. * M A C R O S
  255. ********************************************************************************
  256. */
  257. /*******************************************************************************
  258. * F U N C T I O N D E C L A R A T I O N S
  259. ********************************************************************************
  260. */
  261. /*******************************************************************************
  262. * F U N C T I O N S
  263. ********************************************************************************
  264. */
  265. /*----------------------------------------------------------------------------*/
  266. /*!
  267. * \brief This routine is called to parse RSN IE.
  268. *
  269. * \param[in] prInfoElem Pointer to the RSN IE
  270. * \param[out] prRsnInfo Pointer to the BSSDescription structure to store the
  271. ** RSN information from the given RSN IE
  272. *
  273. * \retval TRUE - Succeeded
  274. * \retval FALSE - Failed
  275. */
  276. /*----------------------------------------------------------------------------*/
  277. BOOLEAN rsnParseRsnIE(IN P_ADAPTER_T prAdapter, IN P_RSN_INFO_ELEM_T prInfoElem, OUT P_RSN_INFO_T prRsnInfo)
  278. {
  279. UINT_32 i;
  280. INT_32 u4RemainRsnIeLen;
  281. UINT_16 u2Version;
  282. UINT_16 u2Cap = 0;
  283. UINT_32 u4GroupSuite = RSN_CIPHER_SUITE_CCMP;
  284. UINT_16 u2PairSuiteCount = 0;
  285. UINT_16 u2AuthSuiteCount = 0;
  286. PUINT_8 pucPairSuite = NULL;
  287. PUINT_8 pucAuthSuite = NULL;
  288. PUINT_8 cp;
  289. DEBUGFUNC("rsnParseRsnIE");
  290. ASSERT(prInfoElem);
  291. ASSERT(prRsnInfo);
  292. /* Verify the length of the RSN IE. */
  293. if (prInfoElem->ucLength < 2) {
  294. DBGLOG(RSN, TRACE, "RSN IE length too short (length=%d)\n", prInfoElem->ucLength);
  295. return FALSE;
  296. }
  297. /* Check RSN version: currently, we only support version 1. */
  298. WLAN_GET_FIELD_16(&prInfoElem->u2Version, &u2Version);
  299. if (u2Version != 1) {
  300. DBGLOG(RSN, TRACE, "Unsupported RSN IE version: %d\n", u2Version);
  301. return FALSE;
  302. }
  303. cp = (PUCHAR)&prInfoElem->u4GroupKeyCipherSuite;
  304. u4RemainRsnIeLen = (INT_32) prInfoElem->ucLength - 2;
  305. do {
  306. if (u4RemainRsnIeLen == 0)
  307. break;
  308. /* Parse the Group Key Cipher Suite field. */
  309. if (u4RemainRsnIeLen < 4) {
  310. DBGLOG(RSN, TRACE,
  311. "Fail to parse RSN IE in group cipher suite (IE len: %d)\n", prInfoElem->ucLength);
  312. return FALSE;
  313. }
  314. WLAN_GET_FIELD_32(cp, &u4GroupSuite);
  315. cp += 4;
  316. u4RemainRsnIeLen -= 4;
  317. if (u4RemainRsnIeLen == 0)
  318. break;
  319. /* Parse the Pairwise Key Cipher Suite Count field. */
  320. if (u4RemainRsnIeLen < 2) {
  321. DBGLOG(RSN, TRACE,
  322. "Fail to parse RSN IE in pairwise cipher suite count (IE len: %d)\n",
  323. prInfoElem->ucLength);
  324. return FALSE;
  325. }
  326. WLAN_GET_FIELD_16(cp, &u2PairSuiteCount);
  327. cp += 2;
  328. u4RemainRsnIeLen -= 2;
  329. /* Parse the Pairwise Key Cipher Suite List field. */
  330. i = (UINT_32) u2PairSuiteCount * 4;
  331. if (u4RemainRsnIeLen < (INT_32) i) {
  332. DBGLOG(RSN, TRACE,
  333. "Fail to parse RSN IE in pairwise cipher suite list (IE len: %d)\n",
  334. prInfoElem->ucLength);
  335. return FALSE;
  336. }
  337. pucPairSuite = cp;
  338. cp += i;
  339. u4RemainRsnIeLen -= (INT_32) i;
  340. if (u4RemainRsnIeLen == 0)
  341. break;
  342. /* Parse the Authentication and Key Management Cipher Suite Count field. */
  343. if (u4RemainRsnIeLen < 2) {
  344. DBGLOG(RSN, TRACE,
  345. "Fail to parse RSN IE in auth & key mgt suite count (IE len: %d)\n",
  346. prInfoElem->ucLength);
  347. return FALSE;
  348. }
  349. WLAN_GET_FIELD_16(cp, &u2AuthSuiteCount);
  350. cp += 2;
  351. u4RemainRsnIeLen -= 2;
  352. /* Parse the Authentication and Key Management Cipher Suite List
  353. field. */
  354. i = (UINT_32) u2AuthSuiteCount * 4;
  355. if (u4RemainRsnIeLen < (INT_32) i) {
  356. DBGLOG(RSN, TRACE,
  357. "Fail to parse RSN IE in auth & key mgt suite list (IE len: %d)\n",
  358. prInfoElem->ucLength);
  359. return FALSE;
  360. }
  361. pucAuthSuite = cp;
  362. cp += i;
  363. u4RemainRsnIeLen -= (INT_32) i;
  364. if (u4RemainRsnIeLen == 0)
  365. break;
  366. /* Parse the RSN u2Capabilities field. */
  367. if (u4RemainRsnIeLen < 2) {
  368. DBGLOG(RSN, TRACE,
  369. "Fail to parse RSN IE in RSN capabilities (IE len: %d)\n", prInfoElem->ucLength);
  370. return FALSE;
  371. }
  372. WLAN_GET_FIELD_16(cp, &u2Cap);
  373. } while (FALSE);
  374. /* Save the RSN information for the BSS. */
  375. prRsnInfo->ucElemId = ELEM_ID_RSN;
  376. prRsnInfo->u2Version = u2Version;
  377. prRsnInfo->u4GroupKeyCipherSuite = u4GroupSuite;
  378. DBGLOG(RSN, LOUD, "RSN: version %d, group key cipher suite %02x-%02x-%02x-%02x\n",
  379. u2Version, (UCHAR) (u4GroupSuite & 0x000000FF),
  380. (UCHAR) ((u4GroupSuite >> 8) & 0x000000FF),
  381. (UCHAR) ((u4GroupSuite >> 16) & 0x000000FF), (UCHAR) ((u4GroupSuite >> 24) & 0x000000FF));
  382. if (pucPairSuite) {
  383. /* The information about the pairwise key cipher suites is present. */
  384. if (u2PairSuiteCount > MAX_NUM_SUPPORTED_CIPHER_SUITES)
  385. u2PairSuiteCount = MAX_NUM_SUPPORTED_CIPHER_SUITES;
  386. prRsnInfo->u4PairwiseKeyCipherSuiteCount = (UINT_32) u2PairSuiteCount;
  387. for (i = 0; i < (UINT_32) u2PairSuiteCount; i++) {
  388. WLAN_GET_FIELD_32(pucPairSuite, &prRsnInfo->au4PairwiseKeyCipherSuite[i]);
  389. pucPairSuite += 4;
  390. DBGLOG(RSN, LOUD,
  391. "RSN: pairwise key cipher suite [%d]: %02x-%02x-%02x-%02x\n",
  392. (UINT_8) i,
  393. (UCHAR) (prRsnInfo->au4PairwiseKeyCipherSuite[i] & 0x000000FF),
  394. (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[i] >> 8) & 0x000000FF),
  395. (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[i] >> 16) & 0x000000FF),
  396. (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[i] >> 24) & 0x000000FF));
  397. }
  398. } else {
  399. /* The information about the pairwise key cipher suites is not present.
  400. Use the default chipher suite for RSN: CCMP. */
  401. prRsnInfo->u4PairwiseKeyCipherSuiteCount = 1;
  402. prRsnInfo->au4PairwiseKeyCipherSuite[0] = RSN_CIPHER_SUITE_CCMP;
  403. DBGLOG(RSN, LOUD,
  404. "RSN: pairwise key cipher suite: %02x-%02x-%02x-%02x (default)\n",
  405. (UCHAR) (prRsnInfo->au4PairwiseKeyCipherSuite[0] & 0x000000FF),
  406. (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[0] >> 8) & 0x000000FF),
  407. (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[0] >> 16) & 0x000000FF),
  408. (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[0] >> 24) & 0x000000FF));
  409. }
  410. if (pucAuthSuite) {
  411. /* The information about the authentication and key management suites
  412. is present. */
  413. if (u2AuthSuiteCount > MAX_NUM_SUPPORTED_AKM_SUITES)
  414. u2AuthSuiteCount = MAX_NUM_SUPPORTED_AKM_SUITES;
  415. prRsnInfo->u4AuthKeyMgtSuiteCount = (UINT_32) u2AuthSuiteCount;
  416. for (i = 0; i < (UINT_32) u2AuthSuiteCount; i++) {
  417. WLAN_GET_FIELD_32(pucAuthSuite, &prRsnInfo->au4AuthKeyMgtSuite[i]);
  418. pucAuthSuite += 4;
  419. DBGLOG(RSN, LOUD, "RSN: AKM suite [%d]: %02x-%02x-%02x-%02x\n",
  420. (UINT_8) i,
  421. (UCHAR) (prRsnInfo->au4AuthKeyMgtSuite[i] & 0x000000FF),
  422. (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[i] >> 8) & 0x000000FF),
  423. (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[i] >> 16) & 0x000000FF),
  424. (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[i] >> 24) & 0x000000FF));
  425. }
  426. } else {
  427. /* The information about the authentication and key management suites
  428. is not present. Use the default AKM suite for RSN. */
  429. prRsnInfo->u4AuthKeyMgtSuiteCount = 1;
  430. prRsnInfo->au4AuthKeyMgtSuite[0] = RSN_AKM_SUITE_802_1X;
  431. DBGLOG(RSN, LOUD, "RSN: AKM suite: %02x-%02x-%02x-%02x (default)\n",
  432. (UCHAR) (prRsnInfo->au4AuthKeyMgtSuite[0] & 0x000000FF),
  433. (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[0] >> 8) & 0x000000FF),
  434. (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[0] >> 16) & 0x000000FF),
  435. (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[0] >> 24) & 0x000000FF));
  436. }
  437. prRsnInfo->u2RsnCap = u2Cap;
  438. prRsnInfo->fgRsnCapPresent = TRUE;
  439. DBGLOG(RSN, LOUD, "RSN cap: 0x%04x\n", prRsnInfo->u2RsnCap);
  440. return TRUE;
  441. } /* rsnParseRsnIE */
  442. /*----------------------------------------------------------------------------*/
  443. /*!
  444. * \brief This routine is called to parse WPA IE.
  445. *
  446. * \param[in] prInfoElem Pointer to the WPA IE.
  447. * \param[out] prWpaInfo Pointer to the BSSDescription structure to store the
  448. * WPA information from the given WPA IE.
  449. *
  450. * \retval TRUE Succeeded.
  451. * \retval FALSE Failed.
  452. */
  453. /*----------------------------------------------------------------------------*/
  454. BOOLEAN rsnParseWpaIE(IN P_ADAPTER_T prAdapter, IN P_WPA_INFO_ELEM_T prInfoElem, OUT P_RSN_INFO_T prWpaInfo)
  455. {
  456. UINT_32 i;
  457. INT_32 u4RemainWpaIeLen;
  458. UINT_16 u2Version;
  459. UINT_16 u2Cap = 0;
  460. UINT_32 u4GroupSuite = WPA_CIPHER_SUITE_TKIP;
  461. UINT_16 u2PairSuiteCount = 0;
  462. UINT_16 u2AuthSuiteCount = 0;
  463. PUCHAR pucPairSuite = NULL;
  464. PUCHAR pucAuthSuite = NULL;
  465. PUCHAR cp;
  466. BOOLEAN fgCapPresent = FALSE;
  467. DEBUGFUNC("rsnParseWpaIE");
  468. ASSERT(prInfoElem);
  469. ASSERT(prWpaInfo);
  470. /* Verify the length of the WPA IE. */
  471. if (prInfoElem->ucLength < 6) {
  472. DBGLOG(RSN, TRACE, "WPA IE length too short (length=%d)\n", prInfoElem->ucLength);
  473. return FALSE;
  474. }
  475. /* Check WPA version: currently, we only support version 1. */
  476. WLAN_GET_FIELD_16(&prInfoElem->u2Version, &u2Version);
  477. if (u2Version != 1) {
  478. DBGLOG(RSN, TRACE, "Unsupported WPA IE version: %d\n", u2Version);
  479. return FALSE;
  480. }
  481. cp = (PUCHAR) &prInfoElem->u4GroupKeyCipherSuite;
  482. u4RemainWpaIeLen = (INT_32) prInfoElem->ucLength - 6;
  483. do {
  484. if (u4RemainWpaIeLen == 0)
  485. break;
  486. /* WPA_OUI : 4
  487. Version : 2
  488. GroupSuite : 4
  489. PairwiseCount: 2
  490. PairwiseSuite: 4 * pairSuiteCount
  491. AuthCount : 2
  492. AuthSuite : 4 * authSuiteCount
  493. Cap : 2 */
  494. /* Parse the Group Key Cipher Suite field. */
  495. if (u4RemainWpaIeLen < 4) {
  496. DBGLOG(RSN, TRACE,
  497. "Fail to parse WPA IE in group cipher suite (IE len: %d)\n", prInfoElem->ucLength);
  498. return FALSE;
  499. }
  500. WLAN_GET_FIELD_32(cp, &u4GroupSuite);
  501. cp += 4;
  502. u4RemainWpaIeLen -= 4;
  503. if (u4RemainWpaIeLen == 0)
  504. break;
  505. /* Parse the Pairwise Key Cipher Suite Count field. */
  506. if (u4RemainWpaIeLen < 2) {
  507. DBGLOG(RSN, TRACE,
  508. "Fail to parse WPA IE in pairwise cipher suite count (IE len: %d)\n",
  509. prInfoElem->ucLength);
  510. return FALSE;
  511. }
  512. WLAN_GET_FIELD_16(cp, &u2PairSuiteCount);
  513. cp += 2;
  514. u4RemainWpaIeLen -= 2;
  515. /* Parse the Pairwise Key Cipher Suite List field. */
  516. i = (UINT_32) u2PairSuiteCount * 4;
  517. if (u4RemainWpaIeLen < (INT_32) i) {
  518. DBGLOG(RSN, TRACE,
  519. "Fail to parse WPA IE in pairwise cipher suite list (IE len: %d)\n",
  520. prInfoElem->ucLength);
  521. return FALSE;
  522. }
  523. pucPairSuite = cp;
  524. cp += i;
  525. u4RemainWpaIeLen -= (INT_32) i;
  526. if (u4RemainWpaIeLen == 0)
  527. break;
  528. /* Parse the Authentication and Key Management Cipher Suite Count
  529. field. */
  530. if (u4RemainWpaIeLen < 2) {
  531. DBGLOG(RSN, TRACE,
  532. "Fail to parse WPA IE in auth & key mgt suite count (IE len: %d)\n",
  533. prInfoElem->ucLength);
  534. return FALSE;
  535. }
  536. WLAN_GET_FIELD_16(cp, &u2AuthSuiteCount);
  537. cp += 2;
  538. u4RemainWpaIeLen -= 2;
  539. /* Parse the Authentication and Key Management Cipher Suite List
  540. field. */
  541. i = (UINT_32) u2AuthSuiteCount * 4;
  542. if (u4RemainWpaIeLen < (INT_32) i) {
  543. DBGLOG(RSN, TRACE,
  544. "Fail to parse WPA IE in auth & key mgt suite list (IE len: %d)\n",
  545. prInfoElem->ucLength);
  546. return FALSE;
  547. }
  548. pucAuthSuite = cp;
  549. cp += i;
  550. u4RemainWpaIeLen -= (INT_32) i;
  551. if (u4RemainWpaIeLen == 0)
  552. break;
  553. /* Parse the WPA u2Capabilities field. */
  554. if (u4RemainWpaIeLen < 2) {
  555. DBGLOG(RSN, TRACE,
  556. "Fail to parse WPA IE in WPA capabilities (IE len: %d)\n", prInfoElem->ucLength);
  557. return FALSE;
  558. }
  559. fgCapPresent = TRUE;
  560. WLAN_GET_FIELD_16(cp, &u2Cap);
  561. u4RemainWpaIeLen -= 2;
  562. } while (FALSE);
  563. /* Save the WPA information for the BSS. */
  564. prWpaInfo->ucElemId = ELEM_ID_WPA;
  565. prWpaInfo->u2Version = u2Version;
  566. prWpaInfo->u4GroupKeyCipherSuite = u4GroupSuite;
  567. DBGLOG(RSN, LOUD, "WPA: version %d, group key cipher suite %02x-%02x-%02x-%02x\n",
  568. u2Version, (UCHAR) (u4GroupSuite & 0x000000FF),
  569. (UCHAR) ((u4GroupSuite >> 8) & 0x000000FF),
  570. (UCHAR) ((u4GroupSuite >> 16) & 0x000000FF), (UCHAR) ((u4GroupSuite >> 24) & 0x000000FF));
  571. if (pucPairSuite) {
  572. /* The information about the pairwise key cipher suites is present. */
  573. if (u2PairSuiteCount > MAX_NUM_SUPPORTED_CIPHER_SUITES)
  574. u2PairSuiteCount = MAX_NUM_SUPPORTED_CIPHER_SUITES;
  575. prWpaInfo->u4PairwiseKeyCipherSuiteCount = (UINT_32) u2PairSuiteCount;
  576. for (i = 0; i < (UINT_32) u2PairSuiteCount; i++) {
  577. WLAN_GET_FIELD_32(pucPairSuite, &prWpaInfo->au4PairwiseKeyCipherSuite[i]);
  578. pucPairSuite += 4;
  579. DBGLOG(RSN, LOUD,
  580. "WPA: pairwise key cipher suite [%d]: %02x-%02x-%02x-%02x\n",
  581. (UINT_8) i,
  582. (UCHAR) (prWpaInfo->au4PairwiseKeyCipherSuite[i] & 0x000000FF),
  583. (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[i] >> 8) & 0x000000FF),
  584. (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[i] >> 16) & 0x000000FF),
  585. (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[i] >> 24) & 0x000000FF));
  586. }
  587. } else {
  588. /* The information about the pairwise key cipher suites is not present.
  589. Use the default chipher suite for WPA: TKIP. */
  590. prWpaInfo->u4PairwiseKeyCipherSuiteCount = 1;
  591. prWpaInfo->au4PairwiseKeyCipherSuite[0] = WPA_CIPHER_SUITE_TKIP;
  592. DBGLOG(RSN, LOUD,
  593. "WPA: pairwise key cipher suite: %02x-%02x-%02x-%02x (default)\n",
  594. (UCHAR) (prWpaInfo->au4PairwiseKeyCipherSuite[0] & 0x000000FF),
  595. (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[0] >> 8) & 0x000000FF),
  596. (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[0] >> 16) & 0x000000FF),
  597. (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[0] >> 24) & 0x000000FF));
  598. }
  599. if (pucAuthSuite) {
  600. /* The information about the authentication and key management suites
  601. is present. */
  602. if (u2AuthSuiteCount > MAX_NUM_SUPPORTED_AKM_SUITES)
  603. u2AuthSuiteCount = MAX_NUM_SUPPORTED_AKM_SUITES;
  604. prWpaInfo->u4AuthKeyMgtSuiteCount = (UINT_32) u2AuthSuiteCount;
  605. for (i = 0; i < (UINT_32) u2AuthSuiteCount; i++) {
  606. WLAN_GET_FIELD_32(pucAuthSuite, &prWpaInfo->au4AuthKeyMgtSuite[i]);
  607. pucAuthSuite += 4;
  608. DBGLOG(RSN, LOUD, "WPA: AKM suite [%d]: %02x-%02x-%02x-%02x\n",
  609. (UINT_8) i,
  610. (UCHAR) (prWpaInfo->au4AuthKeyMgtSuite[i] & 0x000000FF),
  611. (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[i] >> 8) & 0x000000FF),
  612. (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[i] >> 16) & 0x000000FF),
  613. (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[i] >> 24) & 0x000000FF));
  614. }
  615. } else {
  616. /* The information about the authentication and key management suites
  617. is not present. Use the default AKM suite for WPA. */
  618. prWpaInfo->u4AuthKeyMgtSuiteCount = 1;
  619. prWpaInfo->au4AuthKeyMgtSuite[0] = WPA_AKM_SUITE_802_1X;
  620. DBGLOG(RSN, LOUD, "WPA: AKM suite: %02x-%02x-%02x-%02x (default)\n",
  621. (UCHAR) (prWpaInfo->au4AuthKeyMgtSuite[0] & 0x000000FF),
  622. (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[0] >> 8) & 0x000000FF),
  623. (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[0] >> 16) & 0x000000FF),
  624. (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[0] >> 24) & 0x000000FF));
  625. }
  626. if (fgCapPresent) {
  627. prWpaInfo->fgRsnCapPresent = TRUE;
  628. prWpaInfo->u2RsnCap = u2Cap;
  629. DBGLOG(RSN, LOUD, "WPA: RSN cap: 0x%04x\n", prWpaInfo->u2RsnCap);
  630. } else {
  631. prWpaInfo->fgRsnCapPresent = FALSE;
  632. prWpaInfo->u2RsnCap = 0;
  633. }
  634. return TRUE;
  635. } /* rsnParseWpaIE */
  636. /*----------------------------------------------------------------------------*/
  637. /*!
  638. * \brief This routine is called to search the desired pairwise
  639. * cipher suite from the MIB Pairwise Cipher Suite
  640. * configuration table.
  641. *
  642. * \param[in] u4Cipher The desired pairwise cipher suite to be searched
  643. * \param[out] pu4Index Pointer to the index of the desired pairwise cipher in
  644. * the table
  645. *
  646. * \retval TRUE - The desired pairwise cipher suite is found in the table.
  647. * \retval FALSE - The desired pairwise cipher suite is not found in the
  648. * table.
  649. */
  650. /*----------------------------------------------------------------------------*/
  651. BOOLEAN rsnSearchSupportedCipher(IN P_ADAPTER_T prAdapter, IN UINT_32 u4Cipher, OUT PUINT_32 pu4Index)
  652. {
  653. UINT_8 i;
  654. P_DOT11_RSNA_CONFIG_PAIRWISE_CIPHERS_ENTRY prEntry;
  655. DEBUGFUNC("rsnSearchSupportedCipher");
  656. ASSERT(pu4Index);
  657. for (i = 0; i < MAX_NUM_SUPPORTED_CIPHER_SUITES; i++) {
  658. prEntry = &prAdapter->rMib.dot11RSNAConfigPairwiseCiphersTable[i];
  659. if (prEntry->dot11RSNAConfigPairwiseCipher ==
  660. u4Cipher && prEntry->dot11RSNAConfigPairwiseCipherEnabled) {
  661. *pu4Index = i;
  662. return TRUE;
  663. }
  664. }
  665. return FALSE;
  666. } /* rsnSearchSupportedCipher */
  667. /*----------------------------------------------------------------------------*/
  668. /*!
  669. * \brief Whether BSS RSN is matched from upper layer set.
  670. *
  671. * \param[in] prAdapter Pointer to the Adapter structure, BSS RSN Information
  672. *
  673. * \retval BOOLEAN
  674. */
  675. /*----------------------------------------------------------------------------*/
  676. BOOLEAN rsnIsSuitableBSS(IN P_ADAPTER_T prAdapter, IN P_RSN_INFO_T prBssRsnInfo)
  677. {
  678. UINT_8 i = 0;
  679. DEBUGFUNC("rsnIsSuitableBSS");
  680. do {
  681. if ((prAdapter->rWifiVar.rConnSettings.rRsnInfo.u4GroupKeyCipherSuite & 0x000000FF) !=
  682. GET_SELECTOR_TYPE(prBssRsnInfo->u4GroupKeyCipherSuite)) {
  683. DBGLOG(RSN, TRACE, "Break by GroupKeyCipherSuite\n");
  684. break;
  685. }
  686. for (i = 0; i < prBssRsnInfo->u4PairwiseKeyCipherSuiteCount; i++) {
  687. if (((prAdapter->rWifiVar.rConnSettings.rRsnInfo.au4PairwiseKeyCipherSuite[0] & 0x000000FF) !=
  688. GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[i]))
  689. && (i == prBssRsnInfo->u4PairwiseKeyCipherSuiteCount - 1)) {
  690. DBGLOG(RSN, TRACE, "Break by PairwiseKeyCipherSuite\n");
  691. break;
  692. }
  693. }
  694. for (i = 0; i < prBssRsnInfo->u4AuthKeyMgtSuiteCount; i++) {
  695. if (((prAdapter->rWifiVar.rConnSettings.rRsnInfo.au4AuthKeyMgtSuite[0] & 0x000000FF) !=
  696. GET_SELECTOR_TYPE(prBssRsnInfo->au4AuthKeyMgtSuite[0]))
  697. && (i == prBssRsnInfo->u4AuthKeyMgtSuiteCount - 1)) {
  698. DBGLOG(RSN, TRACE, "Break by AuthKeyMgtSuite\n");
  699. break;
  700. }
  701. }
  702. return TRUE;
  703. } while (FALSE);
  704. return FALSE;
  705. }
  706. /*----------------------------------------------------------------------------*/
  707. /*!
  708. *
  709. * \brief This routine is called to search the desired
  710. * authentication and key management (AKM) suite from the
  711. * MIB Authentication and Key Management Suites table.
  712. *
  713. * \param[in] u4AkmSuite The desired AKM suite to be searched
  714. * \param[out] pu4Index Pointer to the index of the desired AKM suite in the
  715. * table
  716. *
  717. * \retval TRUE The desired AKM suite is found in the table.
  718. * \retval FALSE The desired AKM suite is not found in the table.
  719. *
  720. * \note
  721. */
  722. /*----------------------------------------------------------------------------*/
  723. BOOLEAN rsnSearchAKMSuite(IN P_ADAPTER_T prAdapter, IN UINT_32 u4AkmSuite, OUT PUINT_32 pu4Index)
  724. {
  725. UINT_8 i;
  726. P_DOT11_RSNA_CONFIG_AUTHENTICATION_SUITES_ENTRY prEntry;
  727. DEBUGFUNC("rsnSearchAKMSuite");
  728. ASSERT(pu4Index);
  729. for (i = 0; i < MAX_NUM_SUPPORTED_AKM_SUITES; i++) {
  730. prEntry = &prAdapter->rMib.dot11RSNAConfigAuthenticationSuitesTable[i];
  731. if (prEntry->dot11RSNAConfigAuthenticationSuite == u4AkmSuite &&
  732. prEntry->dot11RSNAConfigAuthenticationSuiteEnabled) {
  733. *pu4Index = i;
  734. return TRUE;
  735. }
  736. }
  737. return FALSE;
  738. } /* rsnSearchAKMSuite */
  739. /*----------------------------------------------------------------------------*/
  740. /*!
  741. * \brief This routine is called to perform RSNA or TSN policy
  742. * selection for a given BSS.
  743. *
  744. * \param[in] prBss Pointer to the BSS description
  745. *
  746. * \retval TRUE - The RSNA/TSN policy selection for the given BSS is
  747. * successful. The selected pairwise and group cipher suites
  748. * are returned in the BSS description.
  749. * \retval FALSE - The RSNA/TSN policy selection for the given BSS is failed.
  750. * The driver shall not attempt to join the given BSS.
  751. *
  752. * \note The Encrypt status matched score will save to bss for final ap select.
  753. */
  754. /*----------------------------------------------------------------------------*/
  755. BOOLEAN rsnPerformPolicySelection(IN P_ADAPTER_T prAdapter, IN P_BSS_DESC_T prBss)
  756. {
  757. #if CFG_SUPPORT_802_11W
  758. INT_32 i;
  759. UINT_32 j;
  760. #else
  761. UINT_32 i, j;
  762. #endif
  763. BOOLEAN fgSuiteSupported;
  764. UINT_32 u4PairwiseCipher = 0;
  765. UINT_32 u4GroupCipher = 0;
  766. UINT_32 u4AkmSuite = 0;
  767. P_RSN_INFO_T prBssRsnInfo;
  768. UINT_8 ucBssIndex;
  769. BOOLEAN fgIsWpsActive = (BOOLEAN) FALSE;
  770. DEBUGFUNC("rsnPerformPolicySelection");
  771. ASSERT(prBss);
  772. DBGLOG(RSN, TRACE, "rsnPerformPolicySelection\n");
  773. /* Todo:: */
  774. ucBssIndex = prAdapter->prAisBssInfo->ucBssIndex;
  775. prBss->u4RsnSelectedPairwiseCipher = 0;
  776. prBss->u4RsnSelectedGroupCipher = 0;
  777. prBss->u4RsnSelectedAKMSuite = 0;
  778. prBss->ucEncLevel = 0;
  779. #if CFG_SUPPORT_WPS
  780. fgIsWpsActive = kalWSCGetActiveState(prAdapter->prGlueInfo);
  781. /* CR1640, disable the AP select privacy check */
  782. if (fgIsWpsActive &&
  783. (prAdapter->rWifiVar.rConnSettings.eAuthMode < AUTH_MODE_WPA) &&
  784. (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_INFRA)) {
  785. DBGLOG(RSN, INFO, "-- Skip the Protected BSS check\n");
  786. return TRUE;
  787. }
  788. #endif
  789. /* Protection is not required in this BSS. */
  790. if ((prBss->u2CapInfo & CAP_INFO_PRIVACY) == 0) {
  791. if (secEnabledInAis(prAdapter) == FALSE) {
  792. DBGLOG(RSN, INFO, "-- No Protected BSS\n");
  793. } else {
  794. DBGLOG(RSN, INFO, "-- Protected BSS\n");
  795. return FALSE;
  796. }
  797. return TRUE;
  798. }
  799. /* Protection is required in this BSS. */
  800. if ((prBss->u2CapInfo & CAP_INFO_PRIVACY) != 0) {
  801. if (secEnabledInAis(prAdapter) == FALSE) {
  802. DBGLOG(RSN, INFO, "-- Protected BSS\n");
  803. return FALSE;
  804. }
  805. }
  806. if (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA ||
  807. prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA_PSK ||
  808. prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA_NONE) {
  809. if (prBss->fgIEWPA) {
  810. prBssRsnInfo = &prBss->rWPAInfo;
  811. } else {
  812. DBGLOG(RSN, INFO, "WPA Information Element does not exist.\n");
  813. return FALSE;
  814. }
  815. } else if (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA2 ||
  816. prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA2_PSK) {
  817. if (prBss->fgIERSN) {
  818. prBssRsnInfo = &prBss->rRSNInfo;
  819. } else {
  820. DBGLOG(RSN, INFO, "RSN Information Element does not exist.\n");
  821. return FALSE;
  822. }
  823. } else if (prAdapter->rWifiVar.rConnSettings.eEncStatus != ENUM_ENCRYPTION1_ENABLED) {
  824. /* If the driver is configured to use WEP only, ignore this BSS. */
  825. DBGLOG(RSN, INFO, "-- Not WEP-only legacy BSS\n");
  826. return FALSE;
  827. } else if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION1_ENABLED) {
  828. /* If the driver is configured to use WEP only, use this BSS. */
  829. DBGLOG(RSN, INFO, "-- WEP-only legacy BSS\n");
  830. return TRUE;
  831. }
  832. if (!rsnIsSuitableBSS(prAdapter, prBssRsnInfo)) {
  833. DBGLOG(RSN, INFO, "RSN info check no matched\n");
  834. return FALSE;
  835. }
  836. if (prBssRsnInfo->u4PairwiseKeyCipherSuiteCount == 1 &&
  837. GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[0]) == CIPHER_SUITE_NONE) {
  838. /* Since the pairwise cipher use the same cipher suite as the group
  839. cipher in the BSS, we check the group cipher suite against the
  840. current encryption status. */
  841. fgSuiteSupported = FALSE;
  842. switch (prBssRsnInfo->u4GroupKeyCipherSuite) {
  843. case WPA_CIPHER_SUITE_CCMP:
  844. case RSN_CIPHER_SUITE_CCMP:
  845. if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION3_ENABLED)
  846. fgSuiteSupported = TRUE;
  847. break;
  848. case WPA_CIPHER_SUITE_TKIP:
  849. case RSN_CIPHER_SUITE_TKIP:
  850. if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION2_ENABLED)
  851. fgSuiteSupported = TRUE;
  852. break;
  853. case WPA_CIPHER_SUITE_WEP40:
  854. case WPA_CIPHER_SUITE_WEP104:
  855. if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION1_ENABLED)
  856. fgSuiteSupported = TRUE;
  857. break;
  858. }
  859. if (fgSuiteSupported) {
  860. u4PairwiseCipher = WPA_CIPHER_SUITE_NONE;
  861. u4GroupCipher = prBssRsnInfo->u4GroupKeyCipherSuite;
  862. }
  863. #if DBG
  864. else {
  865. DBGLOG(RSN, TRACE,
  866. "Inproper encryption status %d for group-key-only BSS\n",
  867. prAdapter->rWifiVar.rConnSettings.eEncStatus);
  868. }
  869. #endif
  870. } else {
  871. fgSuiteSupported = FALSE;
  872. DBGLOG(RSN, TRACE,
  873. "eEncStatus %d %lu 0x%lx\n", prAdapter->rWifiVar.rConnSettings.eEncStatus,
  874. prBssRsnInfo->u4PairwiseKeyCipherSuiteCount, prBssRsnInfo->au4PairwiseKeyCipherSuite[0]);
  875. /* Select pairwise/group ciphers */
  876. switch (prAdapter->rWifiVar.rConnSettings.eEncStatus) {
  877. case ENUM_ENCRYPTION3_ENABLED:
  878. for (i = 0; i < prBssRsnInfo->u4PairwiseKeyCipherSuiteCount; i++) {
  879. if (GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[i])
  880. == CIPHER_SUITE_CCMP) {
  881. u4PairwiseCipher = prBssRsnInfo->au4PairwiseKeyCipherSuite[i];
  882. }
  883. }
  884. u4GroupCipher = prBssRsnInfo->u4GroupKeyCipherSuite;
  885. break;
  886. case ENUM_ENCRYPTION2_ENABLED:
  887. for (i = 0; i < prBssRsnInfo->u4PairwiseKeyCipherSuiteCount; i++) {
  888. if (GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[i])
  889. == CIPHER_SUITE_TKIP) {
  890. u4PairwiseCipher = prBssRsnInfo->au4PairwiseKeyCipherSuite[i];
  891. }
  892. }
  893. if (GET_SELECTOR_TYPE(prBssRsnInfo->u4GroupKeyCipherSuite) == CIPHER_SUITE_CCMP) {
  894. /* ToDo:: DBGLOG */
  895. DBGLOG(RSN, TRACE, "Cannot join CCMP BSS\n");
  896. } else
  897. u4GroupCipher = prBssRsnInfo->u4GroupKeyCipherSuite;
  898. break;
  899. case ENUM_ENCRYPTION1_ENABLED:
  900. for (i = 0; i < prBssRsnInfo->u4PairwiseKeyCipherSuiteCount; i++) {
  901. if (GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[i])
  902. == CIPHER_SUITE_WEP40 ||
  903. GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[i])
  904. == CIPHER_SUITE_WEP104) {
  905. u4PairwiseCipher = prBssRsnInfo->au4PairwiseKeyCipherSuite[i];
  906. }
  907. }
  908. if (GET_SELECTOR_TYPE(prBssRsnInfo->u4GroupKeyCipherSuite) ==
  909. CIPHER_SUITE_CCMP ||
  910. GET_SELECTOR_TYPE(prBssRsnInfo->u4GroupKeyCipherSuite) == CIPHER_SUITE_TKIP) {
  911. DBGLOG(RSN, TRACE, "Cannot join CCMP/TKIP BSS\n");
  912. } else {
  913. u4GroupCipher = prBssRsnInfo->u4GroupKeyCipherSuite;
  914. }
  915. break;
  916. default:
  917. break;
  918. }
  919. }
  920. /* Exception handler */
  921. /* If we cannot find proper pairwise and group cipher suites to join the
  922. BSS, do not check the supported AKM suites. */
  923. if (u4PairwiseCipher == 0 || u4GroupCipher == 0) {
  924. DBGLOG(RSN, TRACE, "Failed to select pairwise/group cipher (0x%08lx/0x%08lx)\n",
  925. u4PairwiseCipher, u4GroupCipher);
  926. return FALSE;
  927. }
  928. #if CFG_ENABLE_WIFI_DIRECT
  929. if ((prAdapter->fgIsP2PRegistered) &&
  930. (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P)) {
  931. if (u4PairwiseCipher != RSN_CIPHER_SUITE_CCMP ||
  932. u4GroupCipher != RSN_CIPHER_SUITE_CCMP || u4AkmSuite != RSN_AKM_SUITE_PSK) {
  933. DBGLOG(RSN, TRACE,
  934. "Failed to select pairwise/group cipher for P2P network (0x%08lx/0x%08lx)\n",
  935. u4PairwiseCipher, u4GroupCipher);
  936. return FALSE;
  937. }
  938. }
  939. #endif
  940. #if CFG_ENABLE_BT_OVER_WIFI
  941. if (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_BOW) {
  942. if (u4PairwiseCipher != RSN_CIPHER_SUITE_CCMP ||
  943. u4GroupCipher != RSN_CIPHER_SUITE_CCMP || u4AkmSuite != RSN_AKM_SUITE_PSK) {
  944. /* Todo:: Nothing */
  945. }
  946. DBGLOG(RSN, TRACE,
  947. "Failed to select pairwise/group cipher for BT over Wi-Fi network (0x%08lx/0x%08lx)\n",
  948. u4PairwiseCipher, u4GroupCipher);
  949. return FALSE;
  950. }
  951. #endif
  952. /* Verify if selected pairwisse cipher is supported */
  953. fgSuiteSupported = rsnSearchSupportedCipher(prAdapter, u4PairwiseCipher, &i);
  954. /* Verify if selected group cipher is supported */
  955. if (fgSuiteSupported)
  956. fgSuiteSupported = rsnSearchSupportedCipher(prAdapter, u4GroupCipher, &i);
  957. if (!fgSuiteSupported) {
  958. DBGLOG(RSN, TRACE,
  959. "Failed to support selected pairwise/group cipher (0x%08lx/0x%08lx)\n",
  960. u4PairwiseCipher, u4GroupCipher);
  961. return FALSE;
  962. }
  963. /* Select AKM */
  964. /* If the driver cannot support any authentication suites advertised in
  965. the given BSS, we fail to perform RSNA policy selection. */
  966. /* Attempt to find any overlapping supported AKM suite. */
  967. #if CFG_SUPPORT_802_11W
  968. if (i != 0)
  969. for (i = (prBssRsnInfo->u4AuthKeyMgtSuiteCount - 1); i >= 0; i--) {
  970. #else
  971. for (i = 0; i < prBssRsnInfo->u4AuthKeyMgtSuiteCount; i++) {
  972. #endif
  973. if (rsnSearchAKMSuite(prAdapter, prBssRsnInfo->au4AuthKeyMgtSuite[i], &j)) {
  974. u4AkmSuite = prBssRsnInfo->au4AuthKeyMgtSuite[i];
  975. break;
  976. }
  977. }
  978. if (u4AkmSuite == 0) {
  979. DBGLOG(RSN, TRACE, "Cannot support any AKM suites\n");
  980. return FALSE;
  981. }
  982. DBGLOG(RSN, TRACE,
  983. "Selected pairwise/group cipher: %02x-%02x-%02x-%02x/%02x-%02x-%02x-%02x\n",
  984. (UINT_8) (u4PairwiseCipher & 0x000000FF),
  985. (UINT_8) ((u4PairwiseCipher >> 8) & 0x000000FF),
  986. (UINT_8) ((u4PairwiseCipher >> 16) & 0x000000FF),
  987. (UINT_8) ((u4PairwiseCipher >> 24) & 0x000000FF),
  988. (UINT_8) (u4GroupCipher & 0x000000FF), (UINT_8) ((u4GroupCipher >> 8) & 0x000000FF),
  989. (UINT_8) ((u4GroupCipher >> 16) & 0x000000FF), (UINT_8) ((u4GroupCipher >> 24) & 0x000000FF));
  990. DBGLOG(RSN, TRACE, "Selected AKM suite: %02x-%02x-%02x-%02x\n",
  991. (UINT_8) (u4AkmSuite & 0x000000FF),
  992. (UINT_8) ((u4AkmSuite >> 8) & 0x000000FF),
  993. (UINT_8) ((u4AkmSuite >> 16) & 0x000000FF), (UINT_8) ((u4AkmSuite >> 24) & 0x000000FF));
  994. #if CFG_SUPPORT_802_11W
  995. DBGLOG(RSN, TRACE, "[MFP] MFP setting = %lu\n ", kalGetMfpSetting(prAdapter->prGlueInfo));
  996. if (kalGetMfpSetting(prAdapter->prGlueInfo) == RSN_AUTH_MFP_REQUIRED) {
  997. if (!prBssRsnInfo->fgRsnCapPresent) {
  998. DBGLOG(RSN, TRACE, "[MFP] Skip RSN IE, No MFP Required Capability.\n");
  999. return FALSE;
  1000. } else if (!(prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPC)) {
  1001. DBGLOG(RSN, TRACE, "[MFP] Skip RSN IE, No MFP Required\n");
  1002. return FALSE;
  1003. }
  1004. prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE;
  1005. } else if (kalGetMfpSetting(prAdapter->prGlueInfo) == RSN_AUTH_MFP_OPTIONAL) {
  1006. if (prBssRsnInfo->u2RsnCap && ((prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPR) ||
  1007. (prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPC))) {
  1008. prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE;
  1009. } else {
  1010. prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = FALSE;
  1011. }
  1012. } else {
  1013. if (prBssRsnInfo->fgRsnCapPresent && prBssRsnInfo->u2RsnCap) {
  1014. if (/* (prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPR) || */
  1015. (prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPC)) {
  1016. prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE;
  1017. prAdapter->prGlueInfo->rWpaInfo.u4Mfp = RSN_AUTH_MFP_OPTIONAL;
  1018. }
  1019. /* else if ((prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPC) && */
  1020. /* !(prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPR)) { */
  1021. /* prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE; */
  1022. /* prAdapter->prGlueInfo->rWpaInfo.u4Mfp = RSN_AUTH_MFP_OPTIONAL; */
  1023. /* } */
  1024. else
  1025. prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = FALSE;
  1026. }
  1027. if (prBssRsnInfo->fgRsnCapPresent && (prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPR)) {
  1028. if (prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection == FALSE) {
  1029. DBGLOG(RSN, INFO, "[MFP] Skip RSN IE, No MFP Required Capability\n");
  1030. return FALSE;
  1031. }
  1032. }
  1033. }
  1034. DBGLOG(RSN, TRACE,
  1035. "[MFP] fgMgmtProtection = %d\n ", prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection);
  1036. prAdapter->rWifiVar.rAisSpecificBssInfo.fgAPApplyPmfReq = FALSE;
  1037. if (prBssRsnInfo->fgRsnCapPresent && (prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPR))
  1038. prAdapter->rWifiVar.rAisSpecificBssInfo.fgAPApplyPmfReq = TRUE;
  1039. #endif
  1040. if (GET_SELECTOR_TYPE(u4GroupCipher) == CIPHER_SUITE_CCMP) {
  1041. prBss->ucEncLevel = 3;
  1042. } else if (GET_SELECTOR_TYPE(u4GroupCipher) == CIPHER_SUITE_TKIP) {
  1043. prBss->ucEncLevel = 2;
  1044. } else if (GET_SELECTOR_TYPE(u4GroupCipher) == CIPHER_SUITE_WEP40 ||
  1045. GET_SELECTOR_TYPE(u4GroupCipher) == CIPHER_SUITE_WEP104) {
  1046. prBss->ucEncLevel = 1;
  1047. } else {
  1048. ASSERT(FALSE);
  1049. }
  1050. prBss->u4RsnSelectedPairwiseCipher = u4PairwiseCipher;
  1051. prBss->u4RsnSelectedGroupCipher = u4GroupCipher;
  1052. prBss->u4RsnSelectedAKMSuite = u4AkmSuite;
  1053. return TRUE;
  1054. } /* rsnPerformPolicySelection */
  1055. /*----------------------------------------------------------------------------*/
  1056. /*!
  1057. * \brief This routine is called to generate WPA IE for beacon frame.
  1058. *
  1059. * \param[in] pucIeStartAddr Pointer to put the generated WPA IE.
  1060. *
  1061. * \return The append WPA-None IE length
  1062. * \note
  1063. * Called by: JOIN module, compose beacon IE
  1064. */
  1065. /*----------------------------------------------------------------------------*/
  1066. VOID rsnGenerateWpaNoneIE(IN P_ADAPTER_T prAdapter, IN P_MSDU_INFO_T prMsduInfo)
  1067. {
  1068. UINT_32 i;
  1069. P_WPA_INFO_ELEM_T prWpaIE;
  1070. UINT_32 u4Suite;
  1071. UINT_16 u2SuiteCount;
  1072. PUINT_8 cp, cp2;
  1073. UINT_8 ucExpendedLen = 0;
  1074. PUINT_8 pucBuffer;
  1075. UINT_8 ucBssIndex;
  1076. DEBUGFUNC("rsnGenerateWpaNoneIE");
  1077. ASSERT(prMsduInfo);
  1078. if (prAdapter->rWifiVar.rConnSettings.eAuthMode != AUTH_MODE_WPA_NONE)
  1079. return;
  1080. ucBssIndex = prMsduInfo->ucBssIndex;
  1081. if (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType != NETWORK_TYPE_AIS)
  1082. return;
  1083. pucBuffer = (PUINT_8) ((ULONG) prMsduInfo->prPacket + (ULONG) prMsduInfo->u2FrameLength);
  1084. ASSERT(pucBuffer);
  1085. prWpaIE = (P_WPA_INFO_ELEM_T) (pucBuffer);
  1086. /* Start to construct a WPA IE. */
  1087. /* Fill the Element ID field. */
  1088. prWpaIE->ucElemId = ELEM_ID_WPA;
  1089. /* Fill the OUI and OUI Type fields. */
  1090. prWpaIE->aucOui[0] = 0x00;
  1091. prWpaIE->aucOui[1] = 0x50;
  1092. prWpaIE->aucOui[2] = 0xF2;
  1093. prWpaIE->ucOuiType = VENDOR_OUI_TYPE_WPA;
  1094. /* Fill the Version field. */
  1095. WLAN_SET_FIELD_16(&prWpaIE->u2Version, 1); /* version 1 */
  1096. ucExpendedLen = 6;
  1097. /* Fill the Pairwise Key Cipher Suite List field. */
  1098. u2SuiteCount = 0;
  1099. cp = (PUINT_8) &prWpaIE->aucPairwiseKeyCipherSuite1[0];
  1100. if (rsnSearchSupportedCipher(prAdapter, WPA_CIPHER_SUITE_CCMP, &i))
  1101. u4Suite = WPA_CIPHER_SUITE_CCMP;
  1102. else if (rsnSearchSupportedCipher(prAdapter, WPA_CIPHER_SUITE_TKIP, &i))
  1103. u4Suite = WPA_CIPHER_SUITE_TKIP;
  1104. else if (rsnSearchSupportedCipher(prAdapter, WPA_CIPHER_SUITE_WEP104, &i))
  1105. u4Suite = WPA_CIPHER_SUITE_WEP104;
  1106. else if (rsnSearchSupportedCipher(prAdapter, WPA_CIPHER_SUITE_WEP40, &i))
  1107. u4Suite = WPA_CIPHER_SUITE_WEP40;
  1108. else
  1109. u4Suite = WPA_CIPHER_SUITE_TKIP;
  1110. WLAN_SET_FIELD_32(cp, u4Suite);
  1111. u2SuiteCount++;
  1112. ucExpendedLen += 4;
  1113. cp += 4;
  1114. /* Fill the Group Key Cipher Suite field as the same in pair-wise key. */
  1115. WLAN_SET_FIELD_32(&prWpaIE->u4GroupKeyCipherSuite, u4Suite);
  1116. ucExpendedLen += 4;
  1117. /* Fill the Pairwise Key Cipher Suite Count field. */
  1118. WLAN_SET_FIELD_16(&prWpaIE->u2PairwiseKeyCipherSuiteCount, u2SuiteCount);
  1119. ucExpendedLen += 2;
  1120. cp2 = cp;
  1121. /* Fill the Authentication and Key Management Suite List field. */
  1122. u2SuiteCount = 0;
  1123. cp += 2;
  1124. if (rsnSearchAKMSuite(prAdapter, WPA_AKM_SUITE_802_1X, &i))
  1125. u4Suite = WPA_AKM_SUITE_802_1X;
  1126. else if (rsnSearchAKMSuite(prAdapter, WPA_AKM_SUITE_PSK, &i))
  1127. u4Suite = WPA_AKM_SUITE_PSK;
  1128. else
  1129. u4Suite = WPA_AKM_SUITE_NONE;
  1130. /* This shall be the only available value for current implementation */
  1131. ASSERT(u4Suite == WPA_AKM_SUITE_NONE);
  1132. WLAN_SET_FIELD_32(cp, u4Suite);
  1133. u2SuiteCount++;
  1134. ucExpendedLen += 4;
  1135. cp += 4;
  1136. /* Fill the Authentication and Key Management Suite Count field. */
  1137. WLAN_SET_FIELD_16(cp2, u2SuiteCount);
  1138. ucExpendedLen += 2;
  1139. /* Fill the Length field. */
  1140. prWpaIE->ucLength = (UINT_8) ucExpendedLen;
  1141. /* Increment the total IE length for the Element ID and Length fields. */
  1142. prMsduInfo->u2FrameLength += IE_SIZE(pucBuffer);
  1143. } /* rsnGenerateWpaNoneIE */
  1144. /*----------------------------------------------------------------------------*/
  1145. /*!
  1146. *
  1147. * \brief This routine is called to generate WPA IE for
  1148. * associate request frame.
  1149. *
  1150. * \param[in] prCurrentBss The Selected BSS description
  1151. *
  1152. * \retval The append WPA IE length
  1153. *
  1154. * \note
  1155. * Called by: AIS module, Associate request
  1156. */
  1157. /*----------------------------------------------------------------------------*/
  1158. VOID rsnGenerateWPAIE(IN P_ADAPTER_T prAdapter, IN P_MSDU_INFO_T prMsduInfo)
  1159. {
  1160. PUCHAR cp;
  1161. PUINT_8 pucBuffer;
  1162. UINT_8 ucBssIndex;
  1163. P_P2P_SPECIFIC_BSS_INFO_T prP2pSpecificBssInfo;
  1164. DEBUGFUNC("rsnGenerateWPAIE");
  1165. ASSERT(prMsduInfo);
  1166. pucBuffer = (PUINT_8) ((ULONG) prMsduInfo->prPacket + (ULONG) prMsduInfo->u2FrameLength);
  1167. ASSERT(pucBuffer);
  1168. ucBssIndex = prMsduInfo->ucBssIndex;
  1169. prP2pSpecificBssInfo = prAdapter->rWifiVar.prP2pSpecificBssInfo;
  1170. /* if (eNetworkId != NETWORK_TYPE_AIS_INDEX) */
  1171. /* return; */
  1172. #if CFG_ENABLE_WIFI_DIRECT
  1173. if ((1 /* prCurrentBss->fgIEWPA */ &&
  1174. ((prAdapter->fgIsP2PRegistered) &&
  1175. (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P) &&
  1176. (kalP2PGetTkipCipher(prAdapter->prGlueInfo)))) ||
  1177. ((prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA) ||
  1178. (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA_PSK))) {
  1179. #else
  1180. if ((1 /* prCurrentBss->fgIEWPA */ &&
  1181. ((prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA) ||
  1182. (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA_PSK)))) {
  1183. #endif
  1184. if (prAdapter->fgIsP2PRegistered && prP2pSpecificBssInfo && (prP2pSpecificBssInfo->u2WpaIeLen != 0)) {
  1185. kalMemCopy(pucBuffer, prP2pSpecificBssInfo->aucWpaIeBuffer, prP2pSpecificBssInfo->u2WpaIeLen);
  1186. prMsduInfo->u2FrameLength += prP2pSpecificBssInfo->u2WpaIeLen;
  1187. return;
  1188. }
  1189. /* Construct a WPA IE for association request frame. */
  1190. WPA_IE(pucBuffer)->ucElemId = ELEM_ID_WPA;
  1191. WPA_IE(pucBuffer)->ucLength = ELEM_ID_WPA_LEN_FIXED;
  1192. WPA_IE(pucBuffer)->aucOui[0] = 0x00;
  1193. WPA_IE(pucBuffer)->aucOui[1] = 0x50;
  1194. WPA_IE(pucBuffer)->aucOui[2] = 0xF2;
  1195. WPA_IE(pucBuffer)->ucOuiType = VENDOR_OUI_TYPE_WPA;
  1196. WLAN_SET_FIELD_16(&WPA_IE(pucBuffer)->u2Version, 1);
  1197. #if CFG_ENABLE_WIFI_DIRECT
  1198. if (prAdapter->fgIsP2PRegistered
  1199. && GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P) {
  1200. WLAN_SET_FIELD_32(&WPA_IE(pucBuffer)->u4GroupKeyCipherSuite, WPA_CIPHER_SUITE_TKIP);
  1201. } else
  1202. #endif
  1203. WLAN_SET_FIELD_32(&WPA_IE(pucBuffer)->u4GroupKeyCipherSuite,
  1204. prAdapter->prAisBssInfo->u4RsnSelectedGroupCipher);
  1205. cp = (PUCHAR) &WPA_IE(pucBuffer)->aucPairwiseKeyCipherSuite1[0];
  1206. WLAN_SET_FIELD_16(&WPA_IE(pucBuffer)->u2PairwiseKeyCipherSuiteCount, 1);
  1207. #if CFG_ENABLE_WIFI_DIRECT
  1208. if (prAdapter->fgIsP2PRegistered
  1209. && GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P) {
  1210. WLAN_SET_FIELD_32(cp, WPA_CIPHER_SUITE_TKIP);
  1211. } else
  1212. #endif
  1213. WLAN_SET_FIELD_32(cp, prAdapter->prAisBssInfo->u4RsnSelectedPairwiseCipher);
  1214. cp += 4;
  1215. WLAN_SET_FIELD_16(cp, 1);
  1216. cp += 2;
  1217. #if CFG_ENABLE_WIFI_DIRECT
  1218. if (prAdapter->fgIsP2PRegistered
  1219. && GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P) {
  1220. WLAN_SET_FIELD_32(cp, WPA_AKM_SUITE_PSK);
  1221. } else
  1222. #endif
  1223. WLAN_SET_FIELD_32(cp, prAdapter->prAisBssInfo->u4RsnSelectedAKMSuite);
  1224. cp += 4;
  1225. WPA_IE(pucBuffer)->ucLength = ELEM_ID_WPA_LEN_FIXED;
  1226. prMsduInfo->u2FrameLength += IE_SIZE(pucBuffer);
  1227. }
  1228. } /* rsnGenerateWPAIE */
  1229. /*----------------------------------------------------------------------------*/
  1230. /*!
  1231. *
  1232. * \brief This routine is called to generate RSN IE for
  1233. * associate request frame.
  1234. *
  1235. * \param[in] prMsduInfo The Selected BSS description
  1236. *
  1237. * \retval The append RSN IE length
  1238. *
  1239. * \note
  1240. * Called by: AIS module, P2P module, BOW module Associate request
  1241. */
  1242. /*----------------------------------------------------------------------------*/
  1243. VOID rsnGenerateRSNIE(IN P_ADAPTER_T prAdapter, IN P_MSDU_INFO_T prMsduInfo)
  1244. {
  1245. UINT_32 u4Entry;
  1246. PUCHAR cp;
  1247. /* UINT_8 ucExpendedLen = 0; */
  1248. PUINT_8 pucBuffer;
  1249. UINT_8 ucBssIndex;
  1250. P_STA_RECORD_T prStaRec;
  1251. DEBUGFUNC("rsnGenerateRSNIE");
  1252. ASSERT(prMsduInfo);
  1253. pucBuffer = (PUINT_8) ((ULONG) prMsduInfo->prPacket + (ULONG) prMsduInfo->u2FrameLength);
  1254. ASSERT(pucBuffer);
  1255. /* Todo:: network id */
  1256. ucBssIndex = prMsduInfo->ucBssIndex;
  1257. if (
  1258. #if CFG_ENABLE_WIFI_DIRECT
  1259. ((prAdapter->fgIsP2PRegistered) &&
  1260. (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P)
  1261. && (kalP2PGetCcmpCipher(prAdapter->prGlueInfo))) ||
  1262. #endif
  1263. #if CFG_ENABLE_BT_OVER_WIFI
  1264. (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_BOW)
  1265. ||
  1266. #endif
  1267. (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType ==
  1268. NETWORK_TYPE_AIS /* prCurrentBss->fgIERSN */ &&
  1269. ((prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA2)
  1270. || (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA2_PSK)))) {
  1271. /* Construct a RSN IE for association request frame. */
  1272. RSN_IE(pucBuffer)->ucElemId = ELEM_ID_RSN;
  1273. RSN_IE(pucBuffer)->ucLength = ELEM_ID_RSN_LEN_FIXED;
  1274. WLAN_SET_FIELD_16(&RSN_IE(pucBuffer)->u2Version, 1); /* Version */
  1275. WLAN_SET_FIELD_32(&RSN_IE(pucBuffer)->u4GroupKeyCipherSuite,
  1276. GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u4RsnSelectedGroupCipher); /* Group key suite */
  1277. cp = (PUCHAR) &RSN_IE(pucBuffer)->aucPairwiseKeyCipherSuite1[0];
  1278. WLAN_SET_FIELD_16(&RSN_IE(pucBuffer)->u2PairwiseKeyCipherSuiteCount, 1);
  1279. WLAN_SET_FIELD_32(cp, GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u4RsnSelectedPairwiseCipher);
  1280. cp += 4;
  1281. WLAN_SET_FIELD_16(cp, 1); /* AKM suite count */
  1282. cp += 2;
  1283. /* AKM suite */
  1284. WLAN_SET_FIELD_32(cp, GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u4RsnSelectedAKMSuite);
  1285. cp += 4;
  1286. #if CFG_SUPPORT_802_11W
  1287. /* Capabilities */
  1288. WLAN_SET_FIELD_16(cp, GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u2RsnSelectedCapInfo);
  1289. DBGLOG(RSN, TRACE,
  1290. "Gen RSN IE = %x\n", GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u2RsnSelectedCapInfo);
  1291. if (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_AIS
  1292. && prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection) {
  1293. if (kalGetMfpSetting(prAdapter->prGlueInfo) == RSN_AUTH_MFP_REQUIRED
  1294. /* prAdapter->rWifiVar.rAisSpecificBssInfo.fgAPApplyPmfReq */) {
  1295. WLAN_SET_FIELD_16(cp, ELEM_WPA_CAP_MFPC | ELEM_WPA_CAP_MFPR); /* Capabilities */
  1296. DBGLOG(RSN, TRACE, "RSN_AUTH_MFP_NO - MFPC & MFPR\n");
  1297. } else {
  1298. WLAN_SET_FIELD_16(cp, ELEM_WPA_CAP_MFPC); /* Capabilities */
  1299. DBGLOG(RSN, TRACE, "RSN_AUTH_MFP_NO - MFPC\n");
  1300. }
  1301. }
  1302. #else
  1303. /* Capabilities */
  1304. WLAN_SET_FIELD_16(cp, GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u2RsnSelectedCapInfo);
  1305. #endif
  1306. cp += 2;
  1307. if (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_AIS)
  1308. prStaRec = cnmGetStaRecByIndex(prAdapter, prMsduInfo->ucStaRecIndex);
  1309. if (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_AIS
  1310. && rsnSearchPmkidEntry(prAdapter, prStaRec->aucMacAddr, &u4Entry)) {
  1311. /* DBGLOG(RSN, TRACE, ("Add Pmk at assoc req\n")); */
  1312. /* DBGLOG(RSN, TRACE, ("addr " MACSTR" PMKID "MACSTR"\n", */
  1313. /* MAC2STR(prAdapter->rWifiVar.rAisSpecificBssInfo.arPmkidCache[u4Entry].rBssidInfo.arBSSID),
  1314. * MAC2STR(prAdapter->rWifiVar.rAisSpecificBssInfo.
  1315. * arPmkidCache[u4Entry].rBssidInfo.arPMKID))); */
  1316. if (prAdapter->rWifiVar.rAisSpecificBssInfo.arPmkidCache[u4Entry].fgPmkidExist) {
  1317. RSN_IE(pucBuffer)->ucLength = 38;
  1318. WLAN_SET_FIELD_16(cp, 1); /* PMKID count */
  1319. cp += 2;
  1320. DBGLOG(RSN, TRACE,
  1321. "BSSID " MACSTR " ind=%lu\n", MAC2STR(prStaRec->aucMacAddr), u4Entry);
  1322. /*
  1323. DBGLOG(RSN, TRACE,
  1324. "use PMKID " MACSTR "\n",
  1325. MAC2STR(prAdapter->rWifiVar.rAisSpecificBssInfo.
  1326. arPmkidCache[u4Entry].rBssidInfo.arPMKID));
  1327. */
  1328. kalMemCopy(cp,
  1329. (PVOID) prAdapter->rWifiVar.rAisSpecificBssInfo.
  1330. arPmkidCache[u4Entry].rBssidInfo.arPMKID, sizeof(PARAM_PMKID_VALUE));
  1331. /* ucExpendedLen = 40; */
  1332. } else {
  1333. WLAN_SET_FIELD_16(cp, 0); /* PMKID count */
  1334. /* ucExpendedLen = ELEM_ID_RSN_LEN_FIXED + 2; */
  1335. #if CFG_SUPPORT_802_11W
  1336. cp += 2;
  1337. RSN_IE(pucBuffer)->ucLength += 2;
  1338. #endif
  1339. }
  1340. } else {
  1341. WLAN_SET_FIELD_16(cp, 0); /* PMKID count */
  1342. /* ucExpendedLen = ELEM_ID_RSN_LEN_FIXED + 2; */
  1343. #if CFG_SUPPORT_802_11W
  1344. if ((GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_AIS)
  1345. && prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection
  1346. && (kalGetMfpSetting(prAdapter->prGlueInfo) != RSN_AUTH_MFP_DISABLED)
  1347. /* (mgmt_group_cipher == WPA_CIPHER_AES_128_CMAC) */
  1348. ) {
  1349. cp += 2;
  1350. RSN_IE(pucBuffer)->ucLength += 2;
  1351. }
  1352. #endif
  1353. }
  1354. #if CFG_SUPPORT_802_11W
  1355. if ((GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_AIS)
  1356. && prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection &&
  1357. (kalGetMfpSetting(prAdapter->prGlueInfo) != RSN_AUTH_MFP_DISABLED)
  1358. /* (mgmt_group_cipher == WPA_CIPHER_AES_128_CMAC) */) {
  1359. WLAN_SET_FIELD_32(cp, RSN_CIPHER_SUITE_AES_128_CMAC);
  1360. cp += 4;
  1361. RSN_IE(pucBuffer)->ucLength += 4;
  1362. }
  1363. #endif
  1364. prMsduInfo->u2FrameLength += IE_SIZE(pucBuffer);
  1365. }
  1366. } /* rsnGenerateRSNIE */
  1367. /*----------------------------------------------------------------------------*/
  1368. /*!
  1369. * \brief Parse the given IE buffer and check if it is WFA IE and return Type and
  1370. * SubType for further process.
  1371. *
  1372. * \param[in] pucBuf Pointer to the buffer of WFA Information Element.
  1373. * \param[out] pucOuiType Pointer to the storage of OUI Type.
  1374. * \param[out] pu2SubTypeVersion Pointer to the storage of OUI SubType and Version.
  1375. * \retval TRUE Parse IE ok
  1376. * \retval FALSE Parse IE fail
  1377. */
  1378. /*----------------------------------------------------------------------------*/
  1379. BOOLEAN
  1380. rsnParseCheckForWFAInfoElem(IN P_ADAPTER_T prAdapter,
  1381. IN PUINT_8 pucBuf, OUT PUINT_8 pucOuiType, OUT PUINT_16 pu2SubTypeVersion)
  1382. {
  1383. UINT_8 aucWfaOui[] = VENDOR_OUI_WFA;
  1384. P_IE_WFA_T prWfaIE;
  1385. ASSERT(pucBuf);
  1386. ASSERT(pucOuiType);
  1387. ASSERT(pu2SubTypeVersion);
  1388. prWfaIE = (P_IE_WFA_T) pucBuf;
  1389. do {
  1390. if (IE_LEN(pucBuf) <= ELEM_MIN_LEN_WFA_OUI_TYPE_SUBTYPE) {
  1391. break;
  1392. } else if (prWfaIE->aucOui[0] != aucWfaOui[0] ||
  1393. prWfaIE->aucOui[1] != aucWfaOui[1] || prWfaIE->aucOui[2] != aucWfaOui[2]) {
  1394. break;
  1395. }
  1396. *pucOuiType = prWfaIE->ucOuiType;
  1397. WLAN_GET_FIELD_16(&prWfaIE->aucOuiSubTypeVersion[0], pu2SubTypeVersion);
  1398. return TRUE;
  1399. } while (FALSE);
  1400. return FALSE;
  1401. } /* end of rsnParseCheckForWFAInfoElem() */
  1402. #if CFG_SUPPORT_AAA
  1403. /*----------------------------------------------------------------------------*/
  1404. /*!
  1405. * \brief Parse the given IE buffer and check if it is RSN IE with CCMP PSK
  1406. *
  1407. * \param[in] prAdapter Pointer to Adapter
  1408. * \param[in] prSwRfb Pointer to the rx buffer
  1409. * \param[in] pIE Pointer rthe buffer of Information Element.
  1410. * \param[out] prStatusCode Pointer to the return status code.
  1411. * \retval none
  1412. */
  1413. /*----------------------------------------------------------------------------*/
  1414. void rsnParserCheckForRSNCCMPPSK(P_ADAPTER_T prAdapter, P_RSN_INFO_ELEM_T prIe, PUINT_16 pu2StatusCode)
  1415. {
  1416. RSN_INFO_T rRsnIe;
  1417. ASSERT(prAdapter);
  1418. ASSERT(prIe);
  1419. ASSERT(pu2StatusCode);
  1420. *pu2StatusCode = STATUS_CODE_INVALID_INFO_ELEMENT;
  1421. if (rsnParseRsnIE(prAdapter, prIe, &rRsnIe)) {
  1422. if ((rRsnIe.u4PairwiseKeyCipherSuiteCount != 1)
  1423. || (rRsnIe.au4PairwiseKeyCipherSuite[0] != RSN_CIPHER_SUITE_CCMP)) {
  1424. *pu2StatusCode = STATUS_CODE_INVALID_PAIRWISE_CIPHER;
  1425. return;
  1426. }
  1427. if (rRsnIe.u4GroupKeyCipherSuite != RSN_CIPHER_SUITE_CCMP) {
  1428. *pu2StatusCode = STATUS_CODE_INVALID_GROUP_CIPHER;
  1429. return;
  1430. }
  1431. if ((rRsnIe.u4AuthKeyMgtSuiteCount != 1)
  1432. || (rRsnIe.au4AuthKeyMgtSuite[0] != RSN_AKM_SUITE_PSK)) {
  1433. *pu2StatusCode = STATUS_CODE_INVALID_AKMP;
  1434. return;
  1435. }
  1436. DBGLOG(RSN, TRACE, "RSN with CCMP-PSK\n");
  1437. *pu2StatusCode = WLAN_STATUS_SUCCESS;
  1438. }
  1439. }
  1440. #endif
  1441. /*----------------------------------------------------------------------------*/
  1442. /*!
  1443. * \brief This routine is called to generate an authentication event to NDIS.
  1444. *
  1445. * \param[in] u4Flags Authentication event: \n
  1446. * PARAM_AUTH_REQUEST_REAUTH 0x01 \n
  1447. * PARAM_AUTH_REQUEST_KEYUPDATE 0x02 \n
  1448. * PARAM_AUTH_REQUEST_PAIRWISE_ERROR 0x06 \n
  1449. * PARAM_AUTH_REQUEST_GROUP_ERROR 0x0E \n
  1450. *
  1451. * \return (none)
  1452. */
  1453. /*----------------------------------------------------------------------------*/
  1454. VOID rsnGenMicErrorEvent(IN P_ADAPTER_T prAdapter, IN BOOLEAN fgFlags)
  1455. {
  1456. P_PARAM_AUTH_EVENT_T prAuthEvent;
  1457. DEBUGFUNC("rsnGenMicErrorEvent");
  1458. prAuthEvent = (P_PARAM_AUTH_EVENT_T) prAdapter->aucIndicationEventBuffer;
  1459. /* Status type: Authentication Event */
  1460. prAuthEvent->rStatus.eStatusType = ENUM_STATUS_TYPE_AUTHENTICATION;
  1461. /* Authentication request */
  1462. prAuthEvent->arRequest[0].u4Length = sizeof(PARAM_AUTH_REQUEST_T);
  1463. kalMemCopy((PVOID) prAuthEvent->arRequest[0].arBssid, (PVOID) prAdapter->prAisBssInfo->aucBSSID, MAC_ADDR_LEN);
  1464. if (fgFlags == TRUE)
  1465. prAuthEvent->arRequest[0].u4Flags = PARAM_AUTH_REQUEST_GROUP_ERROR;
  1466. else
  1467. prAuthEvent->arRequest[0].u4Flags = PARAM_AUTH_REQUEST_PAIRWISE_ERROR;
  1468. kalIndicateStatusAndComplete(prAdapter->prGlueInfo,
  1469. WLAN_STATUS_MEDIA_SPECIFIC_INDICATION,
  1470. (PVOID) prAuthEvent,
  1471. sizeof(PARAM_STATUS_INDICATION_T) + sizeof(PARAM_AUTH_REQUEST_T));
  1472. } /* rsnGenMicErrorEvent */
  1473. /*----------------------------------------------------------------------------*/
  1474. /*!
  1475. * \brief This routine is called to handle TKIP MIC failures.
  1476. *
  1477. * \param[in] adapter_p Pointer to the adapter object data area.
  1478. * \param[in] prSta Pointer to the STA which occur MIC Error
  1479. * \param[in] fgErrorKeyType type of error key
  1480. *
  1481. * \retval none
  1482. */
  1483. /*----------------------------------------------------------------------------*/
  1484. VOID rsnTkipHandleMICFailure(IN P_ADAPTER_T prAdapter, IN P_STA_RECORD_T prSta, IN BOOLEAN fgErrorKeyType)
  1485. {
  1486. /* UINT_32 u4RsnaCurrentMICFailTime; */
  1487. /* P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo; */
  1488. DEBUGFUNC("rsnTkipHandleMICFailure");
  1489. ASSERT(prAdapter);
  1490. #if 1
  1491. rsnGenMicErrorEvent(prAdapter, /* prSta, */ fgErrorKeyType);
  1492. /* Generate authentication request event. */
  1493. DBGLOG(RSN, INFO, "Generate TKIP MIC error event (type: 0%d)\n", fgErrorKeyType);
  1494. #else
  1495. ASSERT(prSta);
  1496. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  1497. /* Record the MIC error occur time. */
  1498. GET_CURRENT_SYSTIME(&u4RsnaCurrentMICFailTime);
  1499. /* Generate authentication request event. */
  1500. DBGLOG(RSN, INFO, "Generate TKIP MIC error event (type: 0%d)\n", fgErrorKeyType);
  1501. /* If less than 60 seconds have passed since a previous TKIP MIC failure,
  1502. disassociate from the AP and wait for 60 seconds before (re)associating
  1503. with the same AP. */
  1504. if (prAisSpecBssInfo->u4RsnaLastMICFailTime != 0 &&
  1505. !CHECK_FOR_TIMEOUT(u4RsnaCurrentMICFailTime,
  1506. prAisSpecBssInfo->u4RsnaLastMICFailTime, SEC_TO_SYSTIME(TKIP_COUNTERMEASURE_SEC))) {
  1507. /* If less than 60 seconds expired since last MIC error, we have to
  1508. block traffic. */
  1509. DBGLOG(RSN, INFO, "Start blocking traffic!\n");
  1510. rsnGenMicErrorEvent(prAdapter, /* prSta, */ fgErrorKeyType);
  1511. secFsmEventStartCounterMeasure(prAdapter, prSta);
  1512. } else {
  1513. rsnGenMicErrorEvent(prAdapter, /* prSta, */ fgErrorKeyType);
  1514. DBGLOG(RSN, INFO, "First TKIP MIC error!\n");
  1515. }
  1516. COPY_SYSTIME(prAisSpecBssInfo->u4RsnaLastMICFailTime, u4RsnaCurrentMICFailTime);
  1517. #endif
  1518. } /* rsnTkipHandleMICFailure */
  1519. /*----------------------------------------------------------------------------*/
  1520. /*!
  1521. * \brief This function is called to select a list of BSSID from
  1522. * the scan results for PMKID candidate list.
  1523. *
  1524. * \param[in] prBssDesc the BSS Desc at scan result list
  1525. * \param[out] pu4CandidateCount Pointer to the number of selected candidates.
  1526. * It is set to zero if no BSSID matches our requirement.
  1527. *
  1528. * \retval none
  1529. */
  1530. /*----------------------------------------------------------------------------*/
  1531. VOID rsnSelectPmkidCandidateList(IN P_ADAPTER_T prAdapter, IN P_BSS_DESC_T prBssDesc)
  1532. {
  1533. P_CONNECTION_SETTINGS_T prConnSettings;
  1534. P_BSS_INFO_T prAisBssInfo;
  1535. DEBUGFUNC("rsnSelectPmkidCandidateList");
  1536. ASSERT(prBssDesc);
  1537. prConnSettings = &prAdapter->rWifiVar.rConnSettings;
  1538. prAisBssInfo = prAdapter->prAisBssInfo;
  1539. /* Search a BSS with the same SSID from the given BSS description set. */
  1540. /* DBGLOG(RSN, TRACE, ("Check scan result ["MACSTR"]\n", */
  1541. /* MAC2STR(prBssDesc->aucBSSID))); */
  1542. if (UNEQUAL_SSID(prBssDesc->aucSSID, prBssDesc->ucSSIDLen,
  1543. prConnSettings->aucSSID, prConnSettings->ucSSIDLen)) {
  1544. DBGLOG(RSN, TRACE, "-- SSID not matched\n");
  1545. return;
  1546. }
  1547. #if 0
  1548. if ((prBssDesc->u2BSSBasicRateSet &
  1549. ~(rPhyAttributes[prAisBssInfo->ePhyType].u2SupportedRateSet)) || prBssDesc->fgIsUnknownBssBasicRate) {
  1550. DBGLOG(RSN, TRACE, "-- Rate set not matched\n");
  1551. return;
  1552. }
  1553. if (/* prBssDesc->u4RsnSelectedPairwiseCipher != prAisBssInfo->u4RsnSelectedPairwiseCipher || */
  1554. prBssDesc->u4RsnSelectedGroupCipher != prAisBssInfo->u4RsnSelectedGroupCipher /*||
  1555. prBssDesc->u4RsnSelectedAKMSuite != prAisBssInfo->u4RsnSelectedAKMSuite */) {
  1556. DBGLOG(RSN, TRACE, "-- Encrypt status not matched for PMKID\n");
  1557. return;
  1558. }
  1559. #endif
  1560. rsnUpdatePmkidCandidateList(prAdapter, prBssDesc);
  1561. } /* rsnSelectPmkidCandidateList */
  1562. /*----------------------------------------------------------------------------*/
  1563. /*!
  1564. * \brief This function is called to select a list of BSSID from
  1565. * the scan results for PMKID candidate list.
  1566. *
  1567. * \param[in] prBssDesc the BSS DESC at scan result list
  1568. *
  1569. * \retval none
  1570. */
  1571. /*----------------------------------------------------------------------------*/
  1572. VOID rsnUpdatePmkidCandidateList(IN P_ADAPTER_T prAdapter, IN P_BSS_DESC_T prBssDesc)
  1573. {
  1574. UINT_32 i;
  1575. P_CONNECTION_SETTINGS_T prConnSettings;
  1576. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  1577. DEBUGFUNC("rsnUpdatePmkidCandidateList");
  1578. ASSERT(prBssDesc);
  1579. prConnSettings = &prAdapter->rWifiVar.rConnSettings;
  1580. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  1581. if (UNEQUAL_SSID(prBssDesc->aucSSID, prBssDesc->ucSSIDLen,
  1582. prConnSettings->aucSSID, prConnSettings->ucSSIDLen)) {
  1583. DBGLOG(RSN, TRACE, "-- SSID not matched\n");
  1584. return;
  1585. }
  1586. for (i = 0; i < CFG_MAX_PMKID_CACHE; i++) {
  1587. if (EQUAL_MAC_ADDR(prBssDesc->aucBSSID, prAisSpecBssInfo->arPmkidCandicate[i].aucBssid))
  1588. return;
  1589. }
  1590. /* If the number of selected BSSID exceed MAX_NUM_PMKID_CACHE(16),
  1591. then we only store MAX_NUM_PMKID_CACHE(16) in PMKID cache */
  1592. if ((prAisSpecBssInfo->u4PmkidCandicateCount + 1) > CFG_MAX_PMKID_CACHE)
  1593. prAisSpecBssInfo->u4PmkidCandicateCount--;
  1594. i = prAisSpecBssInfo->u4PmkidCandicateCount;
  1595. COPY_MAC_ADDR((PVOID) prAisSpecBssInfo->arPmkidCandicate[i].aucBssid, (PVOID) prBssDesc->aucBSSID);
  1596. if (prBssDesc->u2RsnCap & MASK_RSNIE_CAP_PREAUTH) {
  1597. prAisSpecBssInfo->arPmkidCandicate[i].u4PreAuthFlags = 1;
  1598. DBGLOG(RSN, TRACE, "Add " MACSTR " with pre-auth to candidate list\n",
  1599. MAC2STR(prAisSpecBssInfo->arPmkidCandicate[i].aucBssid));
  1600. } else {
  1601. prAisSpecBssInfo->arPmkidCandicate[i].u4PreAuthFlags = 0;
  1602. DBGLOG(RSN, TRACE, "Add " MACSTR " without pre-auth to candidate list\n",
  1603. MAC2STR(prAisSpecBssInfo->arPmkidCandicate[i].aucBssid));
  1604. }
  1605. prAisSpecBssInfo->u4PmkidCandicateCount++;
  1606. } /* rsnUpdatePmkidCandidateList */
  1607. /*----------------------------------------------------------------------------*/
  1608. /*!
  1609. * \brief This routine is called to search the desired entry in
  1610. * PMKID cache according to the BSSID
  1611. *
  1612. * \param[in] pucBssid Pointer to the BSSID
  1613. * \param[out] pu4EntryIndex Pointer to place the found entry index
  1614. *
  1615. * \retval TRUE, if found one entry for specified BSSID
  1616. * \retval FALSE, if not found
  1617. */
  1618. /*----------------------------------------------------------------------------*/
  1619. BOOLEAN rsnSearchPmkidEntry(IN P_ADAPTER_T prAdapter, IN PUINT_8 pucBssid, OUT PUINT_32 pu4EntryIndex)
  1620. {
  1621. UINT_32 i;
  1622. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  1623. DEBUGFUNC("rsnSearchPmkidEntry");
  1624. ASSERT(pucBssid);
  1625. ASSERT(pu4EntryIndex);
  1626. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  1627. if (prAisSpecBssInfo->u4PmkidCacheCount > CFG_MAX_PMKID_CACHE)
  1628. return FALSE;
  1629. ASSERT(prAisSpecBssInfo->u4PmkidCacheCount <= CFG_MAX_PMKID_CACHE);
  1630. /* Search for desired BSSID */
  1631. for (i = 0; i < prAisSpecBssInfo->u4PmkidCacheCount; i++) {
  1632. if (!kalMemCmp(prAisSpecBssInfo->arPmkidCache[i].rBssidInfo.arBSSID, pucBssid, MAC_ADDR_LEN))
  1633. break;
  1634. }
  1635. /* If desired BSSID is found, then set the PMKID */
  1636. if (i < prAisSpecBssInfo->u4PmkidCacheCount) {
  1637. *pu4EntryIndex = i;
  1638. return TRUE;
  1639. }
  1640. return FALSE;
  1641. } /* rsnSearchPmkidEntry */
  1642. /*----------------------------------------------------------------------------*/
  1643. /*!
  1644. * \brief This routine is called to check if there is difference
  1645. * between PMKID candicate list and PMKID cache. If there
  1646. * is new candicate that no cache entry is available, then
  1647. * add a new entry for the new candicate in the PMKID cache
  1648. * and set the PMKID indication flag to TRUE.
  1649. *
  1650. * \retval TRUE, if new member in the PMKID candicate list
  1651. * \retval FALSe, if no new member in the PMKID candicate list
  1652. */
  1653. /*----------------------------------------------------------------------------*/
  1654. BOOLEAN rsnCheckPmkidCandicate(IN P_ADAPTER_T prAdapter)
  1655. {
  1656. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  1657. UINT_32 i; /* Index for PMKID candicate */
  1658. UINT_32 j; /* Indix for PMKID cache */
  1659. BOOLEAN status = FALSE;
  1660. DEBUGFUNC("rsnCheckPmkidCandicate");
  1661. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  1662. /* Check for each candicate */
  1663. for (i = 0; i < prAisSpecBssInfo->u4PmkidCandicateCount; i++) {
  1664. for (j = 0; j < prAisSpecBssInfo->u4PmkidCacheCount; j++) {
  1665. if (!kalMemCmp(prAisSpecBssInfo->arPmkidCache[j].rBssidInfo.arBSSID,
  1666. prAisSpecBssInfo->arPmkidCandicate[i].aucBssid, MAC_ADDR_LEN)) {
  1667. /* DBGLOG(RSN, TRACE, (MACSTR" at PMKID cache!!\n",
  1668. * MAC2STR(prAisSpecBssInfo->arPmkidCandicate[i].aucBssid))); */
  1669. break;
  1670. }
  1671. }
  1672. /* No entry found in PMKID cache for the candicate, add new one */
  1673. if (j == prAisSpecBssInfo->u4PmkidCacheCount
  1674. && prAisSpecBssInfo->u4PmkidCacheCount < CFG_MAX_PMKID_CACHE) {
  1675. DBGLOG(RSN, TRACE,
  1676. "Add " MACSTR " to PMKID cache!!\n",
  1677. MAC2STR(prAisSpecBssInfo->arPmkidCandicate[i].aucBssid));
  1678. kalMemCopy((PVOID) prAisSpecBssInfo->
  1679. arPmkidCache[prAisSpecBssInfo->u4PmkidCacheCount].rBssidInfo.arBSSID,
  1680. (PVOID) prAisSpecBssInfo->arPmkidCandicate[i].aucBssid, MAC_ADDR_LEN);
  1681. prAisSpecBssInfo->arPmkidCache[prAisSpecBssInfo->u4PmkidCacheCount].fgPmkidExist = FALSE;
  1682. prAisSpecBssInfo->u4PmkidCacheCount++;
  1683. status = TRUE;
  1684. }
  1685. }
  1686. return status;
  1687. } /* rsnCheckPmkidCandicate */
  1688. /*----------------------------------------------------------------------------*/
  1689. /*!
  1690. * \brief This function is called to wait a duration to indicate the pre-auth AP candicate
  1691. *
  1692. * \return (none)
  1693. */
  1694. /*----------------------------------------------------------------------------*/
  1695. VOID rsnIndicatePmkidCand(IN P_ADAPTER_T prAdapter, IN ULONG ulParamPtr)
  1696. {
  1697. DBGLOG(RSN, EVENT, "Security - Time to indicate the PMKID cand.\n");
  1698. /* If the authentication mode is WPA2 and indication PMKID flag
  1699. is available, then we indicate the PMKID candidate list to NDIS and
  1700. clear the flag, indicatePMKID */
  1701. if (prAdapter->prAisBssInfo->eConnectionState == PARAM_MEDIA_STATE_CONNECTED &&
  1702. prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA2) {
  1703. rsnGeneratePmkidIndication(prAdapter);
  1704. }
  1705. } /* end of rsnIndicatePmkidCand() */
  1706. /*----------------------------------------------------------------------------*/
  1707. /*!
  1708. * \brief This routine is called to check the BSS Desc at scan result
  1709. * with pre-auth cap at wpa2 mode. If there
  1710. * is candicate that no cache entry is available, then
  1711. * add a new entry for the new candicate in the PMKID cache
  1712. * and set the PMKID indication flag to TRUE.
  1713. *
  1714. * \param[in] prBss The BSS Desc at scan result
  1715. *
  1716. * \return none
  1717. */
  1718. /*----------------------------------------------------------------------------*/
  1719. VOID rsnCheckPmkidCache(IN P_ADAPTER_T prAdapter, IN P_BSS_DESC_T prBss)
  1720. {
  1721. P_BSS_INFO_T prAisBssInfo;
  1722. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  1723. P_CONNECTION_SETTINGS_T prConnSettings;
  1724. DEBUGFUNC("rsnCheckPmkidCandicate");
  1725. ASSERT(prBss);
  1726. prConnSettings = &prAdapter->rWifiVar.rConnSettings;
  1727. prAisBssInfo = prAdapter->prAisBssInfo;
  1728. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  1729. if ((prAisBssInfo->eConnectionState == PARAM_MEDIA_STATE_CONNECTED) &&
  1730. (prConnSettings->eAuthMode == AUTH_MODE_WPA2)) {
  1731. rsnSelectPmkidCandidateList(prAdapter, prBss);
  1732. /* Set indication flag of PMKID to TRUE, and then connHandleNetworkConnection()
  1733. will indicate this later */
  1734. if (rsnCheckPmkidCandicate(prAdapter)) {
  1735. DBGLOG(RSN, TRACE, "Prepare a timer to indicate candidate PMKID Candidate\n");
  1736. cnmTimerStopTimer(prAdapter, &prAisSpecBssInfo->rPreauthenticationTimer);
  1737. cnmTimerStartTimer(prAdapter, &prAisSpecBssInfo->rPreauthenticationTimer,
  1738. SEC_TO_MSEC(WAIT_TIME_IND_PMKID_CANDICATE_SEC));
  1739. }
  1740. }
  1741. }
  1742. /*----------------------------------------------------------------------------*/
  1743. /*!
  1744. * \brief This routine is called to generate an PMKID candidate list
  1745. * indication to NDIS.
  1746. *
  1747. * \param[in] prAdapter Pointer to the adapter object data area.
  1748. * \param[in] u4Flags PMKID candidate list event:
  1749. * PARAM_PMKID_CANDIDATE_PREAUTH_ENABLED 0x01
  1750. *
  1751. * \retval none
  1752. */
  1753. /*----------------------------------------------------------------------------*/
  1754. VOID rsnGeneratePmkidIndication(IN P_ADAPTER_T prAdapter)
  1755. {
  1756. P_PARAM_STATUS_INDICATION_T prStatusEvent;
  1757. P_PARAM_PMKID_CANDIDATE_LIST_T prPmkidEvent;
  1758. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecificBssInfo;
  1759. UINT_8 i, j = 0, count = 0;
  1760. UINT_32 u4LenOfUsedBuffer;
  1761. DEBUGFUNC("rsnGeneratePmkidIndication");
  1762. ASSERT(prAdapter);
  1763. prStatusEvent = (P_PARAM_STATUS_INDICATION_T) prAdapter->aucIndicationEventBuffer;
  1764. /* Status type: PMKID Candidatelist Event */
  1765. prStatusEvent->eStatusType = ENUM_STATUS_TYPE_CANDIDATE_LIST;
  1766. ASSERT(prStatusEvent);
  1767. prPmkidEvent = (P_PARAM_PMKID_CANDIDATE_LIST_T) (&prStatusEvent->eStatusType + 1);
  1768. ASSERT(prPmkidEvent);
  1769. prAisSpecificBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  1770. ASSERT(prAisSpecificBssInfo);
  1771. for (i = 0; i < prAisSpecificBssInfo->u4PmkidCandicateCount; i++) {
  1772. for (j = 0; j < prAisSpecificBssInfo->u4PmkidCacheCount; j++) {
  1773. if (EQUAL_MAC_ADDR(prAisSpecificBssInfo->arPmkidCache[j].rBssidInfo.arBSSID,
  1774. prAisSpecificBssInfo->arPmkidCandicate[i].aucBssid) &&
  1775. (prAisSpecificBssInfo->arPmkidCache[j].fgPmkidExist == TRUE)) {
  1776. break;
  1777. }
  1778. }
  1779. if (count >= CFG_MAX_PMKID_CACHE)
  1780. break;
  1781. if (j == prAisSpecificBssInfo->u4PmkidCacheCount) {
  1782. kalMemCopy((PVOID) prPmkidEvent->arCandidateList[count].arBSSID,
  1783. (PVOID) prAisSpecificBssInfo->arPmkidCandicate[i].aucBssid, PARAM_MAC_ADDR_LEN);
  1784. prPmkidEvent->arCandidateList[count].u4Flags =
  1785. prAisSpecificBssInfo->arPmkidCandicate[i].u4PreAuthFlags;
  1786. DBGLOG(RSN, TRACE,
  1787. MACSTR " %lu\n",
  1788. MAC2STR(prPmkidEvent->arCandidateList[count].arBSSID),
  1789. prPmkidEvent->arCandidateList[count].u4Flags);
  1790. count++;
  1791. }
  1792. }
  1793. /* PMKID Candidate List */
  1794. prPmkidEvent->u4Version = 1;
  1795. prPmkidEvent->u4NumCandidates = count;
  1796. DBGLOG(RSN, TRACE, "rsnGeneratePmkidIndication #%lu\n", prPmkidEvent->u4NumCandidates);
  1797. u4LenOfUsedBuffer = sizeof(ENUM_STATUS_TYPE_T) + (2 * sizeof(UINT_32)) +
  1798. (count * sizeof(PARAM_PMKID_CANDIDATE_T));
  1799. /* dumpMemory8((PUINT_8)prAdapter->aucIndicationEventBuffer, u4LenOfUsedBuffer); */
  1800. kalIndicateStatusAndComplete(prAdapter->prGlueInfo,
  1801. WLAN_STATUS_MEDIA_SPECIFIC_INDICATION,
  1802. (PVOID) prAdapter->aucIndicationEventBuffer, u4LenOfUsedBuffer);
  1803. } /* rsnGeneratePmkidIndication */
  1804. #if CFG_SUPPORT_WPS2
  1805. /*----------------------------------------------------------------------------*/
  1806. /*!
  1807. *
  1808. * \brief This routine is called to generate WSC IE for
  1809. * associate request frame.
  1810. *
  1811. * \param[in] prCurrentBss The Selected BSS description
  1812. *
  1813. * \retval The append WSC IE length
  1814. *
  1815. * \note
  1816. * Called by: AIS module, Associate request
  1817. */
  1818. /*----------------------------------------------------------------------------*/
  1819. VOID rsnGenerateWSCIE(IN P_ADAPTER_T prAdapter, IN P_MSDU_INFO_T prMsduInfo)
  1820. {
  1821. PUINT_8 pucBuffer;
  1822. ASSERT(prAdapter);
  1823. ASSERT(prMsduInfo);
  1824. if (prMsduInfo->ucBssIndex != prAdapter->prAisBssInfo->ucBssIndex)
  1825. return;
  1826. pucBuffer = (PUINT_8) ((ULONG) prMsduInfo->prPacket + (ULONG) prMsduInfo->u2FrameLength);
  1827. /* ASSOC INFO IE ID: 221 :0xDD */
  1828. if (prAdapter->prGlueInfo->u2WSCAssocInfoIELen) {
  1829. kalMemCopy(pucBuffer, &prAdapter->prGlueInfo->aucWSCAssocInfoIE,
  1830. prAdapter->prGlueInfo->u2WSCAssocInfoIELen);
  1831. prMsduInfo->u2FrameLength += prAdapter->prGlueInfo->u2WSCAssocInfoIELen;
  1832. }
  1833. }
  1834. #endif
  1835. #if CFG_SUPPORT_802_11W
  1836. /*----------------------------------------------------------------------------*/
  1837. /*!
  1838. * \brief to check if the Bip Key installed or not
  1839. *
  1840. * \param[in]
  1841. * prAdapter
  1842. *
  1843. * \return
  1844. * TRUE
  1845. * FALSE
  1846. */
  1847. /*----------------------------------------------------------------------------*/
  1848. UINT_32 rsnCheckBipKeyInstalled(IN P_ADAPTER_T prAdapter, IN P_STA_RECORD_T prStaRec)
  1849. {
  1850. if (prStaRec
  1851. && GET_BSS_INFO_BY_INDEX(prAdapter, prStaRec->ucBssIndex)->eNetworkType == (UINT_8) NETWORK_TYPE_AIS)
  1852. return prAdapter->rWifiVar.rAisSpecificBssInfo.fgBipKeyInstalled;
  1853. else
  1854. return FALSE;
  1855. }
  1856. /*----------------------------------------------------------------------------*/
  1857. /*!
  1858. *
  1859. * \brief This routine is called to check the Sa query timeout.
  1860. *
  1861. *
  1862. * \note
  1863. * Called by: AIS module, Handle by Sa Quert timeout
  1864. */
  1865. /*----------------------------------------------------------------------------*/
  1866. UINT_8 rsnCheckSaQueryTimeout(IN P_ADAPTER_T prAdapter)
  1867. {
  1868. P_AIS_SPECIFIC_BSS_INFO_T prBssSpecInfo;
  1869. UINT_32 now;
  1870. prBssSpecInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  1871. ASSERT(prBssSpecInfo);
  1872. GET_CURRENT_SYSTIME(&now);
  1873. if (CHECK_FOR_TIMEOUT(now, prBssSpecInfo->u4SaQueryStart, TU_TO_MSEC(1000))) {
  1874. DBGLOG(RSN, INFO, "association SA Query timed out\n");
  1875. prBssSpecInfo->ucSaQueryTimedOut = 1;
  1876. kalMemFree(prBssSpecInfo->pucSaQueryTransId, VIR_MEM_TYPE,
  1877. prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN);
  1878. prBssSpecInfo->pucSaQueryTransId = NULL;
  1879. prBssSpecInfo->u4SaQueryCount = 0;
  1880. cnmTimerStopTimer(prAdapter, &prBssSpecInfo->rSaQueryTimer);
  1881. #if 1
  1882. if (prAdapter->prAisBssInfo->eConnectionState ==
  1883. PARAM_MEDIA_STATE_CONNECTED /* STA_STATE_3 == prStaRec->ucStaState */) {
  1884. P_MSG_AIS_ABORT_T prAisAbortMsg;
  1885. prAisAbortMsg =
  1886. (P_MSG_AIS_ABORT_T) cnmMemAlloc(prAdapter, RAM_TYPE_MSG, sizeof(MSG_AIS_ABORT_T));
  1887. if (!prAisAbortMsg)
  1888. return 0;
  1889. prAisAbortMsg->rMsgHdr.eMsgId = MID_SAA_AIS_FSM_ABORT;
  1890. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_DISASSOCIATED;
  1891. prAisAbortMsg->fgDelayIndication = FALSE;
  1892. mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prAisAbortMsg, MSG_SEND_METHOD_BUF);
  1893. }
  1894. #else
  1895. /* Re-connect */
  1896. kalIndicateStatusAndComplete(prAdapter->prGlueInfo, WLAN_STATUS_MEDIA_DISCONNECT, NULL, 0);
  1897. #endif
  1898. return 1;
  1899. }
  1900. return 0;
  1901. }
  1902. /*----------------------------------------------------------------------------*/
  1903. /*!
  1904. *
  1905. * \brief This routine is called to start the 802.11w sa query timer.
  1906. *
  1907. *
  1908. * \note
  1909. * Called by: AIS module, Handle Rx mgmt request
  1910. */
  1911. /*----------------------------------------------------------------------------*/
  1912. void rsnStartSaQueryTimer(IN P_ADAPTER_T prAdapter, IN ULONG ulParamPtr)
  1913. {
  1914. P_BSS_INFO_T prBssInfo;
  1915. P_AIS_SPECIFIC_BSS_INFO_T prBssSpecInfo;
  1916. P_MSDU_INFO_T prMsduInfo;
  1917. P_ACTION_SA_QUERY_FRAME prTxFrame;
  1918. UINT_16 u2PayloadLen;
  1919. PUINT_8 pucTmp = NULL;
  1920. UINT_8 ucTransId[ACTION_SA_QUERY_TR_ID_LEN];
  1921. prBssInfo = prAdapter->prAisBssInfo;
  1922. ASSERT(prBssInfo);
  1923. prBssSpecInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  1924. ASSERT(prBssSpecInfo);
  1925. DBGLOG(RSN, INFO, "MFP: Start Sa Query\n");
  1926. if (prBssInfo->prStaRecOfAP == NULL) {
  1927. DBGLOG(RSN, INFO, "MFP: unassociated AP!\n");
  1928. return;
  1929. }
  1930. if (prBssSpecInfo->u4SaQueryCount > 0 && rsnCheckSaQueryTimeout(prAdapter)) {
  1931. DBGLOG(RSN, INFO, "MFP: u4SaQueryCount count =%lu\n", prBssSpecInfo->u4SaQueryCount);
  1932. return;
  1933. }
  1934. prMsduInfo = (P_MSDU_INFO_T) cnmMgtPktAlloc(prAdapter, MAC_TX_RESERVED_FIELD + PUBLIC_ACTION_MAX_LEN);
  1935. if (!prMsduInfo)
  1936. return;
  1937. prTxFrame = (P_ACTION_SA_QUERY_FRAME)
  1938. ((ULONG) (prMsduInfo->prPacket) + MAC_TX_RESERVED_FIELD);
  1939. prTxFrame->u2FrameCtrl = MAC_FRAME_ACTION;
  1940. if (rsnCheckBipKeyInstalled(prAdapter, prBssInfo->prStaRecOfAP))
  1941. prTxFrame->u2FrameCtrl |= MASK_FC_PROTECTED_FRAME;
  1942. COPY_MAC_ADDR(prTxFrame->aucDestAddr, prBssInfo->aucBSSID);
  1943. COPY_MAC_ADDR(prTxFrame->aucSrcAddr, prBssInfo->aucOwnMacAddr);
  1944. COPY_MAC_ADDR(prTxFrame->aucBSSID, prBssInfo->aucBSSID);
  1945. prTxFrame->ucCategory = CATEGORY_SA_QUERY_ACTION;
  1946. prTxFrame->ucAction = ACTION_SA_QUERY_REQUEST;
  1947. if (prBssSpecInfo->u4SaQueryCount == 0)
  1948. GET_CURRENT_SYSTIME(&prBssSpecInfo->u4SaQueryStart);
  1949. if (prBssSpecInfo->u4SaQueryCount) {
  1950. pucTmp = kalMemAlloc(prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN, VIR_MEM_TYPE);
  1951. if (!pucTmp) {
  1952. DBGLOG(RSN, INFO, "MFP: Fail to alloc tmp buffer for backup sa query id\n");
  1953. cnmMgtPktFree(prAdapter, prMsduInfo);
  1954. return;
  1955. }
  1956. kalMemCopy(pucTmp, prBssSpecInfo->pucSaQueryTransId,
  1957. prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN);
  1958. }
  1959. kalMemFree(prBssSpecInfo->pucSaQueryTransId, VIR_MEM_TYPE,
  1960. prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN);
  1961. ucTransId[0] = (UINT_8) (kalRandomNumber() & 0xFF);
  1962. ucTransId[1] = (UINT_8) (kalRandomNumber() & 0xFF);
  1963. kalMemCopy(prTxFrame->ucTransId, ucTransId, ACTION_SA_QUERY_TR_ID_LEN);
  1964. prBssSpecInfo->u4SaQueryCount++;
  1965. prBssSpecInfo->pucSaQueryTransId =
  1966. kalMemAlloc(prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN, VIR_MEM_TYPE);
  1967. if (!prBssSpecInfo->pucSaQueryTransId) {
  1968. kalMemFree(pucTmp, VIR_MEM_TYPE, (prBssSpecInfo->u4SaQueryCount - 1) * ACTION_SA_QUERY_TR_ID_LEN);
  1969. DBGLOG(RSN, INFO, "MFP: Fail to alloc buffer for sa query id list\n");
  1970. cnmMgtPktFree(prAdapter, prMsduInfo);
  1971. return;
  1972. }
  1973. if (pucTmp) {
  1974. kalMemCopy(prBssSpecInfo->pucSaQueryTransId, pucTmp,
  1975. (prBssSpecInfo->u4SaQueryCount - 1) * ACTION_SA_QUERY_TR_ID_LEN);
  1976. kalMemCopy(&prBssSpecInfo->pucSaQueryTransId[(prBssSpecInfo->u4SaQueryCount -
  1977. 1) * ACTION_SA_QUERY_TR_ID_LEN], ucTransId,
  1978. ACTION_SA_QUERY_TR_ID_LEN);
  1979. kalMemFree(pucTmp, VIR_MEM_TYPE, (prBssSpecInfo->u4SaQueryCount - 1) * ACTION_SA_QUERY_TR_ID_LEN);
  1980. } else {
  1981. kalMemCopy(prBssSpecInfo->pucSaQueryTransId, ucTransId, ACTION_SA_QUERY_TR_ID_LEN);
  1982. }
  1983. u2PayloadLen = 2 + ACTION_SA_QUERY_TR_ID_LEN;
  1984. /* 4 <3> Update information of MSDU_INFO_T */
  1985. TX_SET_MMPDU(prAdapter,
  1986. prMsduInfo,
  1987. prBssInfo->prStaRecOfAP->ucBssIndex,
  1988. prBssInfo->prStaRecOfAP->ucIndex,
  1989. WLAN_MAC_MGMT_HEADER_LEN, WLAN_MAC_MGMT_HEADER_LEN + u2PayloadLen, NULL, MSDU_RATE_MODE_AUTO);
  1990. if (rsnCheckBipKeyInstalled(prAdapter, prBssInfo->prStaRecOfAP)) {
  1991. DBGLOG(RSN, INFO, "Set MSDU_OPT_PROTECTED_FRAME\n");
  1992. nicTxConfigPktOption(prMsduInfo, MSDU_OPT_PROTECTED_FRAME, TRUE);
  1993. }
  1994. /* 4 Enqueue the frame to send this action frame. */
  1995. nicTxEnqueueMsdu(prAdapter, prMsduInfo);
  1996. DBGLOG(RSN, INFO, "Set SA Query timer %lu (%d Tu)\n", prBssSpecInfo->u4SaQueryCount, 201);
  1997. cnmTimerStartTimer(prAdapter, &prBssSpecInfo->rSaQueryTimer, TU_TO_MSEC(201));
  1998. }
  1999. /*----------------------------------------------------------------------------*/
  2000. /*!
  2001. *
  2002. * \brief This routine is called to start the 802.11w sa query.
  2003. *
  2004. *
  2005. * \note
  2006. * Called by: AIS module, Handle Rx mgmt request
  2007. */
  2008. /*----------------------------------------------------------------------------*/
  2009. void rsnStartSaQuery(IN P_ADAPTER_T prAdapter)
  2010. {
  2011. P_AIS_SPECIFIC_BSS_INFO_T prBssSpecInfo;
  2012. prBssSpecInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  2013. ASSERT(prBssSpecInfo);
  2014. if (prBssSpecInfo->u4SaQueryCount == 0)
  2015. rsnStartSaQueryTimer(prAdapter, (ULONG) NULL);
  2016. }
  2017. /*----------------------------------------------------------------------------*/
  2018. /*!
  2019. *
  2020. * \brief This routine is called to stop the 802.11w sa query.
  2021. *
  2022. *
  2023. * \note
  2024. * Called by: AIS module, Handle Rx mgmt request
  2025. */
  2026. /*----------------------------------------------------------------------------*/
  2027. void rsnStopSaQuery(IN P_ADAPTER_T prAdapter)
  2028. {
  2029. P_AIS_SPECIFIC_BSS_INFO_T prBssSpecInfo;
  2030. prBssSpecInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  2031. ASSERT(prBssSpecInfo);
  2032. cnmTimerStopTimer(prAdapter, &prBssSpecInfo->rSaQueryTimer);
  2033. kalMemFree(prBssSpecInfo->pucSaQueryTransId, VIR_MEM_TYPE,
  2034. prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN);
  2035. prBssSpecInfo->pucSaQueryTransId = NULL;
  2036. prBssSpecInfo->u4SaQueryCount = 0;
  2037. }
  2038. /*----------------------------------------------------------------------------*/
  2039. /*!
  2040. *
  2041. * \brief This routine is called to process the 802.11w sa query action frame.
  2042. *
  2043. *
  2044. * \note
  2045. * Called by: AIS module, Handle Rx mgmt request
  2046. */
  2047. /*----------------------------------------------------------------------------*/
  2048. void rsnSaQueryRequest(IN P_ADAPTER_T prAdapter, IN P_SW_RFB_T prSwRfb)
  2049. {
  2050. P_BSS_INFO_T prBssInfo;
  2051. P_MSDU_INFO_T prMsduInfo;
  2052. P_ACTION_SA_QUERY_FRAME prRxFrame = NULL;
  2053. UINT_16 u2PayloadLen;
  2054. P_STA_RECORD_T prStaRec;
  2055. P_ACTION_SA_QUERY_FRAME prTxFrame;
  2056. prBssInfo = prAdapter->prAisBssInfo;
  2057. ASSERT(prBssInfo);
  2058. if (!prSwRfb)
  2059. return;
  2060. prRxFrame = (P_ACTION_SA_QUERY_FRAME) prSwRfb->pvHeader;
  2061. if (!prRxFrame)
  2062. return;
  2063. prStaRec = cnmGetStaRecByIndex(prAdapter, prSwRfb->ucStaRecIdx);
  2064. if (!prStaRec) /* Todo:: for not AIS check */
  2065. return;
  2066. DBGLOG(RSN, INFO, "IEEE 802.11: Received SA Query Request from " MACSTR "\n",
  2067. MAC2STR(prStaRec->aucMacAddr));
  2068. DBGLOG_MEM8(RSN, INFO, prRxFrame->ucTransId, ACTION_SA_QUERY_TR_ID_LEN);
  2069. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_DISCONNECTED) {
  2070. DBGLOG(RSN, INFO, "IEEE 802.11: Ignore SA Query Request from unassociated STA " MACSTR "\n",
  2071. MAC2STR(prStaRec->aucMacAddr));
  2072. return;
  2073. }
  2074. DBGLOG(RSN, INFO, "IEEE 802.11: Sending SA Query Response to " MACSTR "\n", MAC2STR(prStaRec->aucMacAddr));
  2075. prMsduInfo = (P_MSDU_INFO_T) cnmMgtPktAlloc(prAdapter, MAC_TX_RESERVED_FIELD + PUBLIC_ACTION_MAX_LEN);
  2076. if (!prMsduInfo)
  2077. return;
  2078. prTxFrame = (P_ACTION_SA_QUERY_FRAME)
  2079. ((ULONG) (prMsduInfo->prPacket) + MAC_TX_RESERVED_FIELD);
  2080. prTxFrame->u2FrameCtrl = MAC_FRAME_ACTION;
  2081. if (rsnCheckBipKeyInstalled(prAdapter, prBssInfo->prStaRecOfAP))
  2082. prTxFrame->u2FrameCtrl |= MASK_FC_PROTECTED_FRAME;
  2083. COPY_MAC_ADDR(prTxFrame->aucDestAddr, prBssInfo->aucBSSID);
  2084. COPY_MAC_ADDR(prTxFrame->aucSrcAddr, prBssInfo->aucOwnMacAddr);
  2085. COPY_MAC_ADDR(prTxFrame->aucBSSID, prBssInfo->aucBSSID);
  2086. prTxFrame->ucCategory = CATEGORY_SA_QUERY_ACTION;
  2087. prTxFrame->ucAction = ACTION_SA_QUERY_RESPONSE;
  2088. kalMemCopy(prTxFrame->ucTransId, prRxFrame->ucTransId, ACTION_SA_QUERY_TR_ID_LEN);
  2089. u2PayloadLen = 2 + ACTION_SA_QUERY_TR_ID_LEN;
  2090. /* 4 <3> Update information of MSDU_INFO_T */
  2091. TX_SET_MMPDU(prAdapter,
  2092. prMsduInfo,
  2093. prBssInfo->prStaRecOfAP->ucBssIndex,
  2094. prBssInfo->prStaRecOfAP->ucIndex,
  2095. WLAN_MAC_MGMT_HEADER_LEN, WLAN_MAC_MGMT_HEADER_LEN + u2PayloadLen, NULL, MSDU_RATE_MODE_AUTO);
  2096. if (rsnCheckBipKeyInstalled(prAdapter, prBssInfo->prStaRecOfAP)) {
  2097. DBGLOG(RSN, INFO, "Set MSDU_OPT_PROTECTED_FRAME\n");
  2098. nicTxConfigPktOption(prMsduInfo, MSDU_OPT_PROTECTED_FRAME, TRUE);
  2099. }
  2100. #if 0
  2101. /* 4 Update information of MSDU_INFO_T */
  2102. prMsduInfo->ucPacketType = HIF_TX_PACKET_TYPE_MGMT; /* Management frame */
  2103. prMsduInfo->ucStaRecIndex = prBssInfo->prStaRecOfAP->ucIndex;
  2104. prMsduInfo->ucNetworkType = prBssInfo->ucNetTypeIndex;
  2105. prMsduInfo->ucMacHeaderLength = WLAN_MAC_MGMT_HEADER_LEN;
  2106. prMsduInfo->fgIs802_1x = FALSE;
  2107. prMsduInfo->fgIs802_11 = TRUE;
  2108. prMsduInfo->u2FrameLength = WLAN_MAC_MGMT_HEADER_LEN + u2PayloadLen;
  2109. prMsduInfo->ucPID = nicAssignPID(prAdapter);
  2110. prMsduInfo->pfTxDoneHandler = NULL;
  2111. prMsduInfo->fgIsBasicRate = FALSE;
  2112. #endif
  2113. /* 4 Enqueue the frame to send this action frame. */
  2114. nicTxEnqueueMsdu(prAdapter, prMsduInfo);
  2115. }
  2116. /*----------------------------------------------------------------------------*/
  2117. /*!
  2118. *
  2119. * \brief This routine is called to process the 802.11w sa query action frame.
  2120. *
  2121. *
  2122. * \note
  2123. * Called by: AIS module, Handle Rx mgmt request
  2124. */
  2125. /*----------------------------------------------------------------------------*/
  2126. void rsnSaQueryAction(IN P_ADAPTER_T prAdapter, IN P_SW_RFB_T prSwRfb)
  2127. {
  2128. P_AIS_SPECIFIC_BSS_INFO_T prBssSpecInfo;
  2129. P_ACTION_SA_QUERY_FRAME prRxFrame;
  2130. P_STA_RECORD_T prStaRec;
  2131. UINT_32 i;
  2132. prBssSpecInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  2133. ASSERT(prBssSpecInfo);
  2134. prRxFrame = (P_ACTION_SA_QUERY_FRAME) prSwRfb->pvHeader;
  2135. prStaRec = cnmGetStaRecByIndex(prAdapter, prSwRfb->ucStaRecIdx);
  2136. if (!prStaRec)
  2137. return;
  2138. if (prSwRfb->u2PacketLen < ACTION_SA_QUERY_TR_ID_LEN) {
  2139. DBGLOG(RSN, INFO, "IEEE 802.11: Too short SA Query Action frame (len=%lu)\n",
  2140. (unsigned long)prSwRfb->u2PacketLen);
  2141. return;
  2142. }
  2143. if (prRxFrame->ucAction == ACTION_SA_QUERY_REQUEST) {
  2144. rsnSaQueryRequest(prAdapter, prSwRfb);
  2145. return;
  2146. }
  2147. if (prRxFrame->ucAction != ACTION_SA_QUERY_RESPONSE) {
  2148. DBGLOG(RSN, INFO, "IEEE 802.11: Unexpected SA Query " "Action %d\n", prRxFrame->ucAction);
  2149. return;
  2150. }
  2151. DBGLOG(RSN, INFO, "IEEE 802.11: Received SA Query Response from " MACSTR "\n", MAC2STR(prStaRec->aucMacAddr));
  2152. DBGLOG_MEM8(RSN, INFO, prRxFrame->ucTransId, ACTION_SA_QUERY_TR_ID_LEN);
  2153. /* MLME-SAQuery.confirm */
  2154. for (i = 0; i < prBssSpecInfo->u4SaQueryCount; i++) {
  2155. if (kalMemCmp(prBssSpecInfo->pucSaQueryTransId +
  2156. i * ACTION_SA_QUERY_TR_ID_LEN, prRxFrame->ucTransId, ACTION_SA_QUERY_TR_ID_LEN) == 0)
  2157. break;
  2158. }
  2159. if (i >= prBssSpecInfo->u4SaQueryCount) {
  2160. DBGLOG(RSN, INFO, "IEEE 802.11: No matching SA Query " "transaction identifier found\n");
  2161. return;
  2162. }
  2163. DBGLOG(RSN, INFO, "Reply to pending SA Query received\n");
  2164. rsnStopSaQuery(prAdapter);
  2165. }
  2166. #endif
  2167. #if CFG_SUPPORT_AAA
  2168. #define WPS_DEV_OUI_WFA 0x0050f204
  2169. #define ATTR_RESPONSE_TYPE 0x103b
  2170. #define ATTR_VERSION 0x104a
  2171. #define ATTR_VENDOR_EXT 0x1049
  2172. #define WPS_VENDOR_ID_WFA 14122
  2173. VOID rsnGenerateWSCIEForAssocRsp(P_ADAPTER_T prAdapter, P_MSDU_INFO_T prMsduInfo)
  2174. {
  2175. P_IE_HDR_T PucIE;
  2176. PUINT_8 puc;
  2177. P_WIFI_VAR_T prWifiVar = NULL;
  2178. ASSERT(prAdapter);
  2179. ASSERT(prMsduInfo);
  2180. ASSERT(IS_NET_ACTIVE(prAdapter, prMsduInfo->ucBssIndex));
  2181. prWifiVar = &(prAdapter->rWifiVar);
  2182. ASSERT(prWifiVar);
  2183. if (!prWifiVar->ucApWpsMode) /* Todo::Only at WPS certification ? */
  2184. return;
  2185. DBGLOG(RSN, TRACE, "WPS: Building WPS IE for (Re)Association Response");
  2186. PucIE = (P_IE_HDR_T) (((PUINT_8) prMsduInfo->prPacket) + prMsduInfo->u2FrameLength);
  2187. PucIE->ucId = ELEM_ID_VENDOR;
  2188. puc = PucIE->aucInfo;
  2189. WLAN_SET_FIELD_BE32(puc, WPS_DEV_OUI_WFA);
  2190. puc += 4;
  2191. WLAN_SET_FIELD_BE16(puc, ATTR_VERSION);
  2192. puc += 2;
  2193. WLAN_SET_FIELD_BE16(puc, 1);
  2194. puc += 2;
  2195. *puc = 0x10;
  2196. puc++;
  2197. WLAN_SET_FIELD_BE16(puc, ATTR_RESPONSE_TYPE);
  2198. puc += 2;
  2199. WLAN_SET_FIELD_BE16(puc, 1);
  2200. puc += 2;
  2201. *puc = 0x3;
  2202. puc++;
  2203. WLAN_SET_FIELD_BE16(puc, ATTR_VENDOR_EXT);
  2204. puc += 2;
  2205. WLAN_SET_FIELD_BE16(puc, 6);
  2206. puc += 2;
  2207. WLAN_SET_FIELD_BE24(puc, 14122);
  2208. puc += 3;
  2209. *puc = 0x00; /* Version 2 */
  2210. puc++;
  2211. *puc = 0x01;
  2212. puc++;
  2213. *puc = 0x20; /* WPS2.0 */
  2214. puc++;
  2215. PucIE->ucLength = puc - PucIE->aucInfo;
  2216. prMsduInfo->u2FrameLength += IE_SIZE(PucIE);
  2217. }
  2218. #endif