| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606 |
- /*
- ** Id: //Department/DaVinci/BRANCHES/MT6620_WIFI_DRIVER_V2_3/mgmt/rsn.c#3
- */
- /*! \file "rsn.c"
- \brief This file including the 802.11i, wpa and wpa2(rsn) related function.
- This file provided the macros and functions library support the wpa/rsn ie parsing,
- cipher and AKM check to help the AP seleced deciding, tkip mic error handler and rsn PMKID support.
- */
- /*
- ** Log: rsn.c
- **
- ** 08 13 2013 terry.wu
- ** [BORA00002207] [MT6630 Wi-Fi] TXM & MQM Implementation
- ** Remove unused code
- **
- ** 07 30 2013 wh.su
- ** [BORA00002446] [MT6630] [Wi-Fi] [Driver] Update the security function code
- ** update some debug code
- **
- ** 07 23 2013 wh.su
- ** [BORA00002446] [MT6630] [Wi-Fi] [Driver] Update the security function code
- ** Modify some security code for 11w and p2p
- **
- ** 07 23 2013 wh.su
- ** [BORA00002446] [MT6630] [Wi-Fi] [Driver] Update the security function code
- ** Sync the latest jb2.mp 11w code as draft version
- ** Not the CM bit for avoid wapi 1x drop at re-key
- **
- ** 07 01 2013 wh.su
- ** [BORA00002446] [MT6630] [Wi-Fi] [Driver] Update the security function code
- ** Add some debug code, fixed some compiling warning
- **
- ** 03 12 2013 tsaiyuan.hsu
- ** [BORA00002222] MT6630 unified MAC RXM
- ** add rx data and management processing.
- **
- ** 03 08 2013 wh.su
- ** [BORA00002446] [MT6630] [Wi-Fi] [Driver] Update the security function code
- ** Remove non-used compiling flag and code
- **
- ** 02 19 2013 cp.wu
- ** [BORA00002227] [MT6630 Wi-Fi][Driver] Update for Makefile and HIFSYS modifications
- ** take use of GET_BSS_INFO_BY_INDEX() and MAX_BSS_INDEX macros
- ** for correctly indexing of BSS-INFO pointers
- **
- ** 01 22 2013 cp.wu
- ** [BORA00002253] [MT6630 Wi-Fi][Driver][Firmware] Add NLO and timeout mechanism to SCN module
- ** modification for ucBssIndex migration
- **
- ** 09 17 2012 cm.chang
- ** [BORA00002149] [MT6630 Wi-Fi] Initial software development
- ** Duplicate source from MT6620 v2.3 driver branch
- ** (Davinci label: MT6620_WIFI_Driver_V2_3_120913_1942_As_MT6630_Base)
- **
- ** 08 24 2012 cp.wu
- ** [WCXRP00001269] [MT6620 Wi-Fi][Driver] cfg80211 porting merge back to DaVinci
- ** .
- **
- ** 08 24 2012 cp.wu
- ** [WCXRP00001269] [MT6620 Wi-Fi][Driver] cfg80211 porting merge back to DaVinci
- ** cfg80211 support merge back from ALPS.JB to DaVinci - MT6620 Driver v2.3 branch.
- *
- * 07 17 2012 yuche.tsai
- * NULL
- * Compile no error before trial run.
- *
- * 03 09 2012 chinglan.wang
- * NULL
- * Fix the condition error.
- *
- * 03 02 2012 terry.wu
- * NULL
- * Snc CFG80211 modification for ICS migration from branch 2.2.
- *
- * 03 02 2012 terry.wu
- * NULL
- * Sync CFG80211 modification from branch 2,2.
- *
- * 11 11 2011 wh.su
- * [WCXRP00001078] [MT6620 Wi-Fi][Driver] Adding the mediatek log improment support : XLOG
- * modify the xlog related code.
- *
- * 11 10 2011 wh.su
- * [WCXRP00001078] [MT6620 Wi-Fi][Driver] Adding the mediatek log improment support : XLOG
- * change the debug module level.
- *
- * 10 12 2011 wh.su
- * [WCXRP00001036] [MT6620 Wi-Fi][Driver][FW] Adding the 802.11w code for MFP
- * adding the 802.11w related function and define .
- *
- * 03 17 2011 chinglan.wang
- * [WCXRP00000570] [MT6620 Wi-Fi][Driver] Add Wi-Fi Protected Setup v2.0 feature
- * .
- *
- * 02 09 2011 wh.su
- * [WCXRP00000432] [MT6620 Wi-Fi][Driver] Add STA privacy check at hotspot mode
- * adding the code for check STA privacy bit at AP mode, .
- *
- * 12 24 2010 chinglan.wang
- * NULL
- * [MT6620][Wi-Fi] Modify the key management in the driver for WPS function.
- *
- * 12 13 2010 cp.wu
- * [WCXRP00000260] [MT6620 Wi-Fi][Driver][Firmware] Create V1.1 branch for both firmware and driver
- * create branch for Wi-Fi driver v1.1
- *
- * 11 05 2010 wh.su
- * [WCXRP00000165] [MT6620 Wi-Fi] [Pre-authentication] Assoc req rsn ie use wrong pmkid value
- * fixed the.pmkid value mismatch issue
- *
- * 11 03 2010 wh.su
- * [WCXRP00000124] [MT6620 Wi-Fi] [Driver] Support the dissolve P2P Group
- * Refine the HT rate disallow TKIP pairwise cipher .
- *
- * 10 04 2010 cp.wu
- * [WCXRP00000077] [MT6620 Wi-Fi][Driver][FW] Eliminate use of ENUM_NETWORK_TYPE_T
- * and replaced by ENUM_NETWORK_TYPE_INDEX_T only
- * remove ENUM_NETWORK_TYPE_T definitions
- *
- * 09 29 2010 yuche.tsai
- * NULL
- * Fix compile error, remove unused pointer in rsnGenerateRSNIE().
- *
- * 09 28 2010 wh.su
- * NULL
- * [WCXRP00000069][MT6620 Wi-Fi][Driver] Fix some code for phase 1 P2P Demo.
- *
- * 09 24 2010 wh.su
- * NULL
- * [WCXRP00005002][MT6620 Wi-Fi][Driver] Eliminate Linux Compile Warning.
- *
- * 09 06 2010 wh.su
- * NULL
- * let the p2p can set the privacy bit at beacon and rsn ie at assoc req at key handshake state.
- *
- * 08 30 2010 wh.su
- * NULL
- * remove non-used code.
- *
- * 08 19 2010 wh.su
- * NULL
- * adding the tx pkt call back handle for countermeasure.
- *
- * 07 24 2010 wh.su
- *
- * .support the Wi-Fi RSN
- *
- * 07 08 2010 cp.wu
- *
- * [WPD00003833] [MT6620 and MT5931] Driver migration - move to new repository.
- *
- * 06 21 2010 wh.su
- * [WPD00003840][MT6620 5931] Security migration
- * modify some code for concurrent network.
- *
- * 06 21 2010 cp.wu
- * [WPD00003833][MT6620 and MT5931] Driver migration
- * [WPD00003833][MT6620 and MT5931] Driver migration
- * enable RX management frame handling.
- *
- * 06 19 2010 wh.su
- * [WPD00003840][MT6620 5931] Security migration
- * consdier the concurrent network setting.
- *
- * 06 18 2010 wh.su
- * [WPD00003840][MT6620 5931] Security migration
- * [WPD00003840] [MT6620 5931] Security migration
- * migration from firmware.
- *
- * 05 27 2010 wh.su
- * [BORA00000637][MT6620 Wi-Fi] [Bug] WPA2 pre-authentication timer not correctly initialize
- * not indicate pmkid candidate while no new one scanned.
- *
- * 04 29 2010 wh.su
- * [BORA00000637][MT6620 Wi-Fi] [Bug] WPA2 pre-authentication timer not correctly initialize
- * adjsut the pre-authentication code.
- *
- * 03 03 2010 wh.su
- * [BORA00000637][MT6620 Wi-Fi] [Bug] WPA2 pre-authentication timer not correctly initialize
- * move the AIS specific variable for security to AIS specific structure.
- *
- * 03 03 2010 wh.su
- * [BORA00000637][MT6620 Wi-Fi] [Bug] WPA2 pre-authentication timer not correctly initialize
- * Fixed the pre-authentication timer not correctly init issue,
- * and modify the security related callback function prototype.
- *
- * 01 27 2010 wh.su
- * [BORA00000476][Wi-Fi][firmware] Add the security module initialize code
- * add and fixed some security function.
- *
- * 12 18 2009 cm.chang
- * [BORA00000018]Integrate WIFI part into BORA for the 1st time
- * .
- *
- * Dec 8 2009 mtk01088
- * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
- * change the name
- *
- * Dec 7 2009 mtk01088
- * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
- * using the Rx0 port to indicate event
- *
- * Dec 4 2009 mtk01088
- * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
- * refine the code for generate the WPA/RSN IE for assoc req
- *
- * Dec 3 2009 mtk01088
- * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
- * adjust code for pmkid event
- *
- * Dec 1 2009 mtk01088
- * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
- * adding the code for event (mic error and pmkid indicate) and do some function rename
- *
- * Nov 23 2009 mtk01088
- * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
- * adding some security function
- *
- * Nov 19 2009 mtk01088
- * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
- * adding some security feature, including pmkid
- *
- * Nov 18 2009 mtk01088
- * [BORA00000476] [Wi-Fi][firmware] Add the security module initialize code
- *
- **
- */
- /*******************************************************************************
- * C O M P I L E R F L A G S
- ********************************************************************************
- */
- /*******************************************************************************
- * E X T E R N A L R E F E R E N C E S
- ********************************************************************************
- */
- #include "precomp.h"
- /*******************************************************************************
- * C O N S T A N T S
- ********************************************************************************
- */
- /*******************************************************************************
- * D A T A T Y P E S
- ********************************************************************************
- */
- /*******************************************************************************
- * P U B L I C D A T A
- ********************************************************************************
- */
- /*******************************************************************************
- * P R I V A T E D A T A
- ********************************************************************************
- */
- /*******************************************************************************
- * M A C R O S
- ********************************************************************************
- */
- /*******************************************************************************
- * F U N C T I O N D E C L A R A T I O N S
- ********************************************************************************
- */
- /*******************************************************************************
- * F U N C T I O N S
- ********************************************************************************
- */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This routine is called to parse RSN IE.
- *
- * \param[in] prInfoElem Pointer to the RSN IE
- * \param[out] prRsnInfo Pointer to the BSSDescription structure to store the
- ** RSN information from the given RSN IE
- *
- * \retval TRUE - Succeeded
- * \retval FALSE - Failed
- */
- /*----------------------------------------------------------------------------*/
- BOOLEAN rsnParseRsnIE(IN P_ADAPTER_T prAdapter, IN P_RSN_INFO_ELEM_T prInfoElem, OUT P_RSN_INFO_T prRsnInfo)
- {
- UINT_32 i;
- INT_32 u4RemainRsnIeLen;
- UINT_16 u2Version;
- UINT_16 u2Cap = 0;
- UINT_32 u4GroupSuite = RSN_CIPHER_SUITE_CCMP;
- UINT_16 u2PairSuiteCount = 0;
- UINT_16 u2AuthSuiteCount = 0;
- PUINT_8 pucPairSuite = NULL;
- PUINT_8 pucAuthSuite = NULL;
- PUINT_8 cp;
- DEBUGFUNC("rsnParseRsnIE");
- ASSERT(prInfoElem);
- ASSERT(prRsnInfo);
- /* Verify the length of the RSN IE. */
- if (prInfoElem->ucLength < 2) {
- DBGLOG(RSN, TRACE, "RSN IE length too short (length=%d)\n", prInfoElem->ucLength);
- return FALSE;
- }
- /* Check RSN version: currently, we only support version 1. */
- WLAN_GET_FIELD_16(&prInfoElem->u2Version, &u2Version);
- if (u2Version != 1) {
- DBGLOG(RSN, TRACE, "Unsupported RSN IE version: %d\n", u2Version);
- return FALSE;
- }
- cp = (PUCHAR)&prInfoElem->u4GroupKeyCipherSuite;
- u4RemainRsnIeLen = (INT_32) prInfoElem->ucLength - 2;
- do {
- if (u4RemainRsnIeLen == 0)
- break;
- /* Parse the Group Key Cipher Suite field. */
- if (u4RemainRsnIeLen < 4) {
- DBGLOG(RSN, TRACE,
- "Fail to parse RSN IE in group cipher suite (IE len: %d)\n", prInfoElem->ucLength);
- return FALSE;
- }
- WLAN_GET_FIELD_32(cp, &u4GroupSuite);
- cp += 4;
- u4RemainRsnIeLen -= 4;
- if (u4RemainRsnIeLen == 0)
- break;
- /* Parse the Pairwise Key Cipher Suite Count field. */
- if (u4RemainRsnIeLen < 2) {
- DBGLOG(RSN, TRACE,
- "Fail to parse RSN IE in pairwise cipher suite count (IE len: %d)\n",
- prInfoElem->ucLength);
- return FALSE;
- }
- WLAN_GET_FIELD_16(cp, &u2PairSuiteCount);
- cp += 2;
- u4RemainRsnIeLen -= 2;
- /* Parse the Pairwise Key Cipher Suite List field. */
- i = (UINT_32) u2PairSuiteCount * 4;
- if (u4RemainRsnIeLen < (INT_32) i) {
- DBGLOG(RSN, TRACE,
- "Fail to parse RSN IE in pairwise cipher suite list (IE len: %d)\n",
- prInfoElem->ucLength);
- return FALSE;
- }
- pucPairSuite = cp;
- cp += i;
- u4RemainRsnIeLen -= (INT_32) i;
- if (u4RemainRsnIeLen == 0)
- break;
- /* Parse the Authentication and Key Management Cipher Suite Count field. */
- if (u4RemainRsnIeLen < 2) {
- DBGLOG(RSN, TRACE,
- "Fail to parse RSN IE in auth & key mgt suite count (IE len: %d)\n",
- prInfoElem->ucLength);
- return FALSE;
- }
- WLAN_GET_FIELD_16(cp, &u2AuthSuiteCount);
- cp += 2;
- u4RemainRsnIeLen -= 2;
- /* Parse the Authentication and Key Management Cipher Suite List
- field. */
- i = (UINT_32) u2AuthSuiteCount * 4;
- if (u4RemainRsnIeLen < (INT_32) i) {
- DBGLOG(RSN, TRACE,
- "Fail to parse RSN IE in auth & key mgt suite list (IE len: %d)\n",
- prInfoElem->ucLength);
- return FALSE;
- }
- pucAuthSuite = cp;
- cp += i;
- u4RemainRsnIeLen -= (INT_32) i;
- if (u4RemainRsnIeLen == 0)
- break;
- /* Parse the RSN u2Capabilities field. */
- if (u4RemainRsnIeLen < 2) {
- DBGLOG(RSN, TRACE,
- "Fail to parse RSN IE in RSN capabilities (IE len: %d)\n", prInfoElem->ucLength);
- return FALSE;
- }
- WLAN_GET_FIELD_16(cp, &u2Cap);
- } while (FALSE);
- /* Save the RSN information for the BSS. */
- prRsnInfo->ucElemId = ELEM_ID_RSN;
- prRsnInfo->u2Version = u2Version;
- prRsnInfo->u4GroupKeyCipherSuite = u4GroupSuite;
- DBGLOG(RSN, LOUD, "RSN: version %d, group key cipher suite %02x-%02x-%02x-%02x\n",
- u2Version, (UCHAR) (u4GroupSuite & 0x000000FF),
- (UCHAR) ((u4GroupSuite >> 8) & 0x000000FF),
- (UCHAR) ((u4GroupSuite >> 16) & 0x000000FF), (UCHAR) ((u4GroupSuite >> 24) & 0x000000FF));
- if (pucPairSuite) {
- /* The information about the pairwise key cipher suites is present. */
- if (u2PairSuiteCount > MAX_NUM_SUPPORTED_CIPHER_SUITES)
- u2PairSuiteCount = MAX_NUM_SUPPORTED_CIPHER_SUITES;
- prRsnInfo->u4PairwiseKeyCipherSuiteCount = (UINT_32) u2PairSuiteCount;
- for (i = 0; i < (UINT_32) u2PairSuiteCount; i++) {
- WLAN_GET_FIELD_32(pucPairSuite, &prRsnInfo->au4PairwiseKeyCipherSuite[i]);
- pucPairSuite += 4;
- DBGLOG(RSN, LOUD,
- "RSN: pairwise key cipher suite [%d]: %02x-%02x-%02x-%02x\n",
- (UINT_8) i,
- (UCHAR) (prRsnInfo->au4PairwiseKeyCipherSuite[i] & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[i] >> 8) & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[i] >> 16) & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[i] >> 24) & 0x000000FF));
- }
- } else {
- /* The information about the pairwise key cipher suites is not present.
- Use the default chipher suite for RSN: CCMP. */
- prRsnInfo->u4PairwiseKeyCipherSuiteCount = 1;
- prRsnInfo->au4PairwiseKeyCipherSuite[0] = RSN_CIPHER_SUITE_CCMP;
- DBGLOG(RSN, LOUD,
- "RSN: pairwise key cipher suite: %02x-%02x-%02x-%02x (default)\n",
- (UCHAR) (prRsnInfo->au4PairwiseKeyCipherSuite[0] & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[0] >> 8) & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[0] >> 16) & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4PairwiseKeyCipherSuite[0] >> 24) & 0x000000FF));
- }
- if (pucAuthSuite) {
- /* The information about the authentication and key management suites
- is present. */
- if (u2AuthSuiteCount > MAX_NUM_SUPPORTED_AKM_SUITES)
- u2AuthSuiteCount = MAX_NUM_SUPPORTED_AKM_SUITES;
- prRsnInfo->u4AuthKeyMgtSuiteCount = (UINT_32) u2AuthSuiteCount;
- for (i = 0; i < (UINT_32) u2AuthSuiteCount; i++) {
- WLAN_GET_FIELD_32(pucAuthSuite, &prRsnInfo->au4AuthKeyMgtSuite[i]);
- pucAuthSuite += 4;
- DBGLOG(RSN, LOUD, "RSN: AKM suite [%d]: %02x-%02x-%02x-%02x\n",
- (UINT_8) i,
- (UCHAR) (prRsnInfo->au4AuthKeyMgtSuite[i] & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[i] >> 8) & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[i] >> 16) & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[i] >> 24) & 0x000000FF));
- }
- } else {
- /* The information about the authentication and key management suites
- is not present. Use the default AKM suite for RSN. */
- prRsnInfo->u4AuthKeyMgtSuiteCount = 1;
- prRsnInfo->au4AuthKeyMgtSuite[0] = RSN_AKM_SUITE_802_1X;
- DBGLOG(RSN, LOUD, "RSN: AKM suite: %02x-%02x-%02x-%02x (default)\n",
- (UCHAR) (prRsnInfo->au4AuthKeyMgtSuite[0] & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[0] >> 8) & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[0] >> 16) & 0x000000FF),
- (UCHAR) ((prRsnInfo->au4AuthKeyMgtSuite[0] >> 24) & 0x000000FF));
- }
- prRsnInfo->u2RsnCap = u2Cap;
- prRsnInfo->fgRsnCapPresent = TRUE;
- DBGLOG(RSN, LOUD, "RSN cap: 0x%04x\n", prRsnInfo->u2RsnCap);
- return TRUE;
- } /* rsnParseRsnIE */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This routine is called to parse WPA IE.
- *
- * \param[in] prInfoElem Pointer to the WPA IE.
- * \param[out] prWpaInfo Pointer to the BSSDescription structure to store the
- * WPA information from the given WPA IE.
- *
- * \retval TRUE Succeeded.
- * \retval FALSE Failed.
- */
- /*----------------------------------------------------------------------------*/
- BOOLEAN rsnParseWpaIE(IN P_ADAPTER_T prAdapter, IN P_WPA_INFO_ELEM_T prInfoElem, OUT P_RSN_INFO_T prWpaInfo)
- {
- UINT_32 i;
- INT_32 u4RemainWpaIeLen;
- UINT_16 u2Version;
- UINT_16 u2Cap = 0;
- UINT_32 u4GroupSuite = WPA_CIPHER_SUITE_TKIP;
- UINT_16 u2PairSuiteCount = 0;
- UINT_16 u2AuthSuiteCount = 0;
- PUCHAR pucPairSuite = NULL;
- PUCHAR pucAuthSuite = NULL;
- PUCHAR cp;
- BOOLEAN fgCapPresent = FALSE;
- DEBUGFUNC("rsnParseWpaIE");
- ASSERT(prInfoElem);
- ASSERT(prWpaInfo);
- /* Verify the length of the WPA IE. */
- if (prInfoElem->ucLength < 6) {
- DBGLOG(RSN, TRACE, "WPA IE length too short (length=%d)\n", prInfoElem->ucLength);
- return FALSE;
- }
- /* Check WPA version: currently, we only support version 1. */
- WLAN_GET_FIELD_16(&prInfoElem->u2Version, &u2Version);
- if (u2Version != 1) {
- DBGLOG(RSN, TRACE, "Unsupported WPA IE version: %d\n", u2Version);
- return FALSE;
- }
- cp = (PUCHAR) &prInfoElem->u4GroupKeyCipherSuite;
- u4RemainWpaIeLen = (INT_32) prInfoElem->ucLength - 6;
- do {
- if (u4RemainWpaIeLen == 0)
- break;
- /* WPA_OUI : 4
- Version : 2
- GroupSuite : 4
- PairwiseCount: 2
- PairwiseSuite: 4 * pairSuiteCount
- AuthCount : 2
- AuthSuite : 4 * authSuiteCount
- Cap : 2 */
- /* Parse the Group Key Cipher Suite field. */
- if (u4RemainWpaIeLen < 4) {
- DBGLOG(RSN, TRACE,
- "Fail to parse WPA IE in group cipher suite (IE len: %d)\n", prInfoElem->ucLength);
- return FALSE;
- }
- WLAN_GET_FIELD_32(cp, &u4GroupSuite);
- cp += 4;
- u4RemainWpaIeLen -= 4;
- if (u4RemainWpaIeLen == 0)
- break;
- /* Parse the Pairwise Key Cipher Suite Count field. */
- if (u4RemainWpaIeLen < 2) {
- DBGLOG(RSN, TRACE,
- "Fail to parse WPA IE in pairwise cipher suite count (IE len: %d)\n",
- prInfoElem->ucLength);
- return FALSE;
- }
- WLAN_GET_FIELD_16(cp, &u2PairSuiteCount);
- cp += 2;
- u4RemainWpaIeLen -= 2;
- /* Parse the Pairwise Key Cipher Suite List field. */
- i = (UINT_32) u2PairSuiteCount * 4;
- if (u4RemainWpaIeLen < (INT_32) i) {
- DBGLOG(RSN, TRACE,
- "Fail to parse WPA IE in pairwise cipher suite list (IE len: %d)\n",
- prInfoElem->ucLength);
- return FALSE;
- }
- pucPairSuite = cp;
- cp += i;
- u4RemainWpaIeLen -= (INT_32) i;
- if (u4RemainWpaIeLen == 0)
- break;
- /* Parse the Authentication and Key Management Cipher Suite Count
- field. */
- if (u4RemainWpaIeLen < 2) {
- DBGLOG(RSN, TRACE,
- "Fail to parse WPA IE in auth & key mgt suite count (IE len: %d)\n",
- prInfoElem->ucLength);
- return FALSE;
- }
- WLAN_GET_FIELD_16(cp, &u2AuthSuiteCount);
- cp += 2;
- u4RemainWpaIeLen -= 2;
- /* Parse the Authentication and Key Management Cipher Suite List
- field. */
- i = (UINT_32) u2AuthSuiteCount * 4;
- if (u4RemainWpaIeLen < (INT_32) i) {
- DBGLOG(RSN, TRACE,
- "Fail to parse WPA IE in auth & key mgt suite list (IE len: %d)\n",
- prInfoElem->ucLength);
- return FALSE;
- }
- pucAuthSuite = cp;
- cp += i;
- u4RemainWpaIeLen -= (INT_32) i;
- if (u4RemainWpaIeLen == 0)
- break;
- /* Parse the WPA u2Capabilities field. */
- if (u4RemainWpaIeLen < 2) {
- DBGLOG(RSN, TRACE,
- "Fail to parse WPA IE in WPA capabilities (IE len: %d)\n", prInfoElem->ucLength);
- return FALSE;
- }
- fgCapPresent = TRUE;
- WLAN_GET_FIELD_16(cp, &u2Cap);
- u4RemainWpaIeLen -= 2;
- } while (FALSE);
- /* Save the WPA information for the BSS. */
- prWpaInfo->ucElemId = ELEM_ID_WPA;
- prWpaInfo->u2Version = u2Version;
- prWpaInfo->u4GroupKeyCipherSuite = u4GroupSuite;
- DBGLOG(RSN, LOUD, "WPA: version %d, group key cipher suite %02x-%02x-%02x-%02x\n",
- u2Version, (UCHAR) (u4GroupSuite & 0x000000FF),
- (UCHAR) ((u4GroupSuite >> 8) & 0x000000FF),
- (UCHAR) ((u4GroupSuite >> 16) & 0x000000FF), (UCHAR) ((u4GroupSuite >> 24) & 0x000000FF));
- if (pucPairSuite) {
- /* The information about the pairwise key cipher suites is present. */
- if (u2PairSuiteCount > MAX_NUM_SUPPORTED_CIPHER_SUITES)
- u2PairSuiteCount = MAX_NUM_SUPPORTED_CIPHER_SUITES;
- prWpaInfo->u4PairwiseKeyCipherSuiteCount = (UINT_32) u2PairSuiteCount;
- for (i = 0; i < (UINT_32) u2PairSuiteCount; i++) {
- WLAN_GET_FIELD_32(pucPairSuite, &prWpaInfo->au4PairwiseKeyCipherSuite[i]);
- pucPairSuite += 4;
- DBGLOG(RSN, LOUD,
- "WPA: pairwise key cipher suite [%d]: %02x-%02x-%02x-%02x\n",
- (UINT_8) i,
- (UCHAR) (prWpaInfo->au4PairwiseKeyCipherSuite[i] & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[i] >> 8) & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[i] >> 16) & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[i] >> 24) & 0x000000FF));
- }
- } else {
- /* The information about the pairwise key cipher suites is not present.
- Use the default chipher suite for WPA: TKIP. */
- prWpaInfo->u4PairwiseKeyCipherSuiteCount = 1;
- prWpaInfo->au4PairwiseKeyCipherSuite[0] = WPA_CIPHER_SUITE_TKIP;
- DBGLOG(RSN, LOUD,
- "WPA: pairwise key cipher suite: %02x-%02x-%02x-%02x (default)\n",
- (UCHAR) (prWpaInfo->au4PairwiseKeyCipherSuite[0] & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[0] >> 8) & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[0] >> 16) & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4PairwiseKeyCipherSuite[0] >> 24) & 0x000000FF));
- }
- if (pucAuthSuite) {
- /* The information about the authentication and key management suites
- is present. */
- if (u2AuthSuiteCount > MAX_NUM_SUPPORTED_AKM_SUITES)
- u2AuthSuiteCount = MAX_NUM_SUPPORTED_AKM_SUITES;
- prWpaInfo->u4AuthKeyMgtSuiteCount = (UINT_32) u2AuthSuiteCount;
- for (i = 0; i < (UINT_32) u2AuthSuiteCount; i++) {
- WLAN_GET_FIELD_32(pucAuthSuite, &prWpaInfo->au4AuthKeyMgtSuite[i]);
- pucAuthSuite += 4;
- DBGLOG(RSN, LOUD, "WPA: AKM suite [%d]: %02x-%02x-%02x-%02x\n",
- (UINT_8) i,
- (UCHAR) (prWpaInfo->au4AuthKeyMgtSuite[i] & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[i] >> 8) & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[i] >> 16) & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[i] >> 24) & 0x000000FF));
- }
- } else {
- /* The information about the authentication and key management suites
- is not present. Use the default AKM suite for WPA. */
- prWpaInfo->u4AuthKeyMgtSuiteCount = 1;
- prWpaInfo->au4AuthKeyMgtSuite[0] = WPA_AKM_SUITE_802_1X;
- DBGLOG(RSN, LOUD, "WPA: AKM suite: %02x-%02x-%02x-%02x (default)\n",
- (UCHAR) (prWpaInfo->au4AuthKeyMgtSuite[0] & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[0] >> 8) & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[0] >> 16) & 0x000000FF),
- (UCHAR) ((prWpaInfo->au4AuthKeyMgtSuite[0] >> 24) & 0x000000FF));
- }
- if (fgCapPresent) {
- prWpaInfo->fgRsnCapPresent = TRUE;
- prWpaInfo->u2RsnCap = u2Cap;
- DBGLOG(RSN, LOUD, "WPA: RSN cap: 0x%04x\n", prWpaInfo->u2RsnCap);
- } else {
- prWpaInfo->fgRsnCapPresent = FALSE;
- prWpaInfo->u2RsnCap = 0;
- }
- return TRUE;
- } /* rsnParseWpaIE */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This routine is called to search the desired pairwise
- * cipher suite from the MIB Pairwise Cipher Suite
- * configuration table.
- *
- * \param[in] u4Cipher The desired pairwise cipher suite to be searched
- * \param[out] pu4Index Pointer to the index of the desired pairwise cipher in
- * the table
- *
- * \retval TRUE - The desired pairwise cipher suite is found in the table.
- * \retval FALSE - The desired pairwise cipher suite is not found in the
- * table.
- */
- /*----------------------------------------------------------------------------*/
- BOOLEAN rsnSearchSupportedCipher(IN P_ADAPTER_T prAdapter, IN UINT_32 u4Cipher, OUT PUINT_32 pu4Index)
- {
- UINT_8 i;
- P_DOT11_RSNA_CONFIG_PAIRWISE_CIPHERS_ENTRY prEntry;
- DEBUGFUNC("rsnSearchSupportedCipher");
- ASSERT(pu4Index);
- for (i = 0; i < MAX_NUM_SUPPORTED_CIPHER_SUITES; i++) {
- prEntry = &prAdapter->rMib.dot11RSNAConfigPairwiseCiphersTable[i];
- if (prEntry->dot11RSNAConfigPairwiseCipher ==
- u4Cipher && prEntry->dot11RSNAConfigPairwiseCipherEnabled) {
- *pu4Index = i;
- return TRUE;
- }
- }
- return FALSE;
- } /* rsnSearchSupportedCipher */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief Whether BSS RSN is matched from upper layer set.
- *
- * \param[in] prAdapter Pointer to the Adapter structure, BSS RSN Information
- *
- * \retval BOOLEAN
- */
- /*----------------------------------------------------------------------------*/
- BOOLEAN rsnIsSuitableBSS(IN P_ADAPTER_T prAdapter, IN P_RSN_INFO_T prBssRsnInfo)
- {
- UINT_8 i = 0;
- DEBUGFUNC("rsnIsSuitableBSS");
- do {
- if ((prAdapter->rWifiVar.rConnSettings.rRsnInfo.u4GroupKeyCipherSuite & 0x000000FF) !=
- GET_SELECTOR_TYPE(prBssRsnInfo->u4GroupKeyCipherSuite)) {
- DBGLOG(RSN, TRACE, "Break by GroupKeyCipherSuite\n");
- break;
- }
- for (i = 0; i < prBssRsnInfo->u4PairwiseKeyCipherSuiteCount; i++) {
- if (((prAdapter->rWifiVar.rConnSettings.rRsnInfo.au4PairwiseKeyCipherSuite[0] & 0x000000FF) !=
- GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[i]))
- && (i == prBssRsnInfo->u4PairwiseKeyCipherSuiteCount - 1)) {
- DBGLOG(RSN, TRACE, "Break by PairwiseKeyCipherSuite\n");
- break;
- }
- }
- for (i = 0; i < prBssRsnInfo->u4AuthKeyMgtSuiteCount; i++) {
- if (((prAdapter->rWifiVar.rConnSettings.rRsnInfo.au4AuthKeyMgtSuite[0] & 0x000000FF) !=
- GET_SELECTOR_TYPE(prBssRsnInfo->au4AuthKeyMgtSuite[0]))
- && (i == prBssRsnInfo->u4AuthKeyMgtSuiteCount - 1)) {
- DBGLOG(RSN, TRACE, "Break by AuthKeyMgtSuite\n");
- break;
- }
- }
- return TRUE;
- } while (FALSE);
- return FALSE;
- }
- /*----------------------------------------------------------------------------*/
- /*!
- *
- * \brief This routine is called to search the desired
- * authentication and key management (AKM) suite from the
- * MIB Authentication and Key Management Suites table.
- *
- * \param[in] u4AkmSuite The desired AKM suite to be searched
- * \param[out] pu4Index Pointer to the index of the desired AKM suite in the
- * table
- *
- * \retval TRUE The desired AKM suite is found in the table.
- * \retval FALSE The desired AKM suite is not found in the table.
- *
- * \note
- */
- /*----------------------------------------------------------------------------*/
- BOOLEAN rsnSearchAKMSuite(IN P_ADAPTER_T prAdapter, IN UINT_32 u4AkmSuite, OUT PUINT_32 pu4Index)
- {
- UINT_8 i;
- P_DOT11_RSNA_CONFIG_AUTHENTICATION_SUITES_ENTRY prEntry;
- DEBUGFUNC("rsnSearchAKMSuite");
- ASSERT(pu4Index);
- for (i = 0; i < MAX_NUM_SUPPORTED_AKM_SUITES; i++) {
- prEntry = &prAdapter->rMib.dot11RSNAConfigAuthenticationSuitesTable[i];
- if (prEntry->dot11RSNAConfigAuthenticationSuite == u4AkmSuite &&
- prEntry->dot11RSNAConfigAuthenticationSuiteEnabled) {
- *pu4Index = i;
- return TRUE;
- }
- }
- return FALSE;
- } /* rsnSearchAKMSuite */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This routine is called to perform RSNA or TSN policy
- * selection for a given BSS.
- *
- * \param[in] prBss Pointer to the BSS description
- *
- * \retval TRUE - The RSNA/TSN policy selection for the given BSS is
- * successful. The selected pairwise and group cipher suites
- * are returned in the BSS description.
- * \retval FALSE - The RSNA/TSN policy selection for the given BSS is failed.
- * The driver shall not attempt to join the given BSS.
- *
- * \note The Encrypt status matched score will save to bss for final ap select.
- */
- /*----------------------------------------------------------------------------*/
- BOOLEAN rsnPerformPolicySelection(IN P_ADAPTER_T prAdapter, IN P_BSS_DESC_T prBss)
- {
- #if CFG_SUPPORT_802_11W
- INT_32 i;
- UINT_32 j;
- #else
- UINT_32 i, j;
- #endif
- BOOLEAN fgSuiteSupported;
- UINT_32 u4PairwiseCipher = 0;
- UINT_32 u4GroupCipher = 0;
- UINT_32 u4AkmSuite = 0;
- P_RSN_INFO_T prBssRsnInfo;
- UINT_8 ucBssIndex;
- BOOLEAN fgIsWpsActive = (BOOLEAN) FALSE;
- DEBUGFUNC("rsnPerformPolicySelection");
- ASSERT(prBss);
- DBGLOG(RSN, TRACE, "rsnPerformPolicySelection\n");
- /* Todo:: */
- ucBssIndex = prAdapter->prAisBssInfo->ucBssIndex;
- prBss->u4RsnSelectedPairwiseCipher = 0;
- prBss->u4RsnSelectedGroupCipher = 0;
- prBss->u4RsnSelectedAKMSuite = 0;
- prBss->ucEncLevel = 0;
- #if CFG_SUPPORT_WPS
- fgIsWpsActive = kalWSCGetActiveState(prAdapter->prGlueInfo);
- /* CR1640, disable the AP select privacy check */
- if (fgIsWpsActive &&
- (prAdapter->rWifiVar.rConnSettings.eAuthMode < AUTH_MODE_WPA) &&
- (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_INFRA)) {
- DBGLOG(RSN, INFO, "-- Skip the Protected BSS check\n");
- return TRUE;
- }
- #endif
- /* Protection is not required in this BSS. */
- if ((prBss->u2CapInfo & CAP_INFO_PRIVACY) == 0) {
- if (secEnabledInAis(prAdapter) == FALSE) {
- DBGLOG(RSN, INFO, "-- No Protected BSS\n");
- } else {
- DBGLOG(RSN, INFO, "-- Protected BSS\n");
- return FALSE;
- }
- return TRUE;
- }
- /* Protection is required in this BSS. */
- if ((prBss->u2CapInfo & CAP_INFO_PRIVACY) != 0) {
- if (secEnabledInAis(prAdapter) == FALSE) {
- DBGLOG(RSN, INFO, "-- Protected BSS\n");
- return FALSE;
- }
- }
- if (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA ||
- prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA_PSK ||
- prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA_NONE) {
- if (prBss->fgIEWPA) {
- prBssRsnInfo = &prBss->rWPAInfo;
- } else {
- DBGLOG(RSN, INFO, "WPA Information Element does not exist.\n");
- return FALSE;
- }
- } else if (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA2 ||
- prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA2_PSK) {
- if (prBss->fgIERSN) {
- prBssRsnInfo = &prBss->rRSNInfo;
- } else {
- DBGLOG(RSN, INFO, "RSN Information Element does not exist.\n");
- return FALSE;
- }
- } else if (prAdapter->rWifiVar.rConnSettings.eEncStatus != ENUM_ENCRYPTION1_ENABLED) {
- /* If the driver is configured to use WEP only, ignore this BSS. */
- DBGLOG(RSN, INFO, "-- Not WEP-only legacy BSS\n");
- return FALSE;
- } else if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION1_ENABLED) {
- /* If the driver is configured to use WEP only, use this BSS. */
- DBGLOG(RSN, INFO, "-- WEP-only legacy BSS\n");
- return TRUE;
- }
- if (!rsnIsSuitableBSS(prAdapter, prBssRsnInfo)) {
- DBGLOG(RSN, INFO, "RSN info check no matched\n");
- return FALSE;
- }
- if (prBssRsnInfo->u4PairwiseKeyCipherSuiteCount == 1 &&
- GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[0]) == CIPHER_SUITE_NONE) {
- /* Since the pairwise cipher use the same cipher suite as the group
- cipher in the BSS, we check the group cipher suite against the
- current encryption status. */
- fgSuiteSupported = FALSE;
- switch (prBssRsnInfo->u4GroupKeyCipherSuite) {
- case WPA_CIPHER_SUITE_CCMP:
- case RSN_CIPHER_SUITE_CCMP:
- if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION3_ENABLED)
- fgSuiteSupported = TRUE;
- break;
- case WPA_CIPHER_SUITE_TKIP:
- case RSN_CIPHER_SUITE_TKIP:
- if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION2_ENABLED)
- fgSuiteSupported = TRUE;
- break;
- case WPA_CIPHER_SUITE_WEP40:
- case WPA_CIPHER_SUITE_WEP104:
- if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION1_ENABLED)
- fgSuiteSupported = TRUE;
- break;
- }
- if (fgSuiteSupported) {
- u4PairwiseCipher = WPA_CIPHER_SUITE_NONE;
- u4GroupCipher = prBssRsnInfo->u4GroupKeyCipherSuite;
- }
- #if DBG
- else {
- DBGLOG(RSN, TRACE,
- "Inproper encryption status %d for group-key-only BSS\n",
- prAdapter->rWifiVar.rConnSettings.eEncStatus);
- }
- #endif
- } else {
- fgSuiteSupported = FALSE;
- DBGLOG(RSN, TRACE,
- "eEncStatus %d %lu 0x%lx\n", prAdapter->rWifiVar.rConnSettings.eEncStatus,
- prBssRsnInfo->u4PairwiseKeyCipherSuiteCount, prBssRsnInfo->au4PairwiseKeyCipherSuite[0]);
- /* Select pairwise/group ciphers */
- switch (prAdapter->rWifiVar.rConnSettings.eEncStatus) {
- case ENUM_ENCRYPTION3_ENABLED:
- for (i = 0; i < prBssRsnInfo->u4PairwiseKeyCipherSuiteCount; i++) {
- if (GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[i])
- == CIPHER_SUITE_CCMP) {
- u4PairwiseCipher = prBssRsnInfo->au4PairwiseKeyCipherSuite[i];
- }
- }
- u4GroupCipher = prBssRsnInfo->u4GroupKeyCipherSuite;
- break;
- case ENUM_ENCRYPTION2_ENABLED:
- for (i = 0; i < prBssRsnInfo->u4PairwiseKeyCipherSuiteCount; i++) {
- if (GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[i])
- == CIPHER_SUITE_TKIP) {
- u4PairwiseCipher = prBssRsnInfo->au4PairwiseKeyCipherSuite[i];
- }
- }
- if (GET_SELECTOR_TYPE(prBssRsnInfo->u4GroupKeyCipherSuite) == CIPHER_SUITE_CCMP) {
- /* ToDo:: DBGLOG */
- DBGLOG(RSN, TRACE, "Cannot join CCMP BSS\n");
- } else
- u4GroupCipher = prBssRsnInfo->u4GroupKeyCipherSuite;
- break;
- case ENUM_ENCRYPTION1_ENABLED:
- for (i = 0; i < prBssRsnInfo->u4PairwiseKeyCipherSuiteCount; i++) {
- if (GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[i])
- == CIPHER_SUITE_WEP40 ||
- GET_SELECTOR_TYPE(prBssRsnInfo->au4PairwiseKeyCipherSuite[i])
- == CIPHER_SUITE_WEP104) {
- u4PairwiseCipher = prBssRsnInfo->au4PairwiseKeyCipherSuite[i];
- }
- }
- if (GET_SELECTOR_TYPE(prBssRsnInfo->u4GroupKeyCipherSuite) ==
- CIPHER_SUITE_CCMP ||
- GET_SELECTOR_TYPE(prBssRsnInfo->u4GroupKeyCipherSuite) == CIPHER_SUITE_TKIP) {
- DBGLOG(RSN, TRACE, "Cannot join CCMP/TKIP BSS\n");
- } else {
- u4GroupCipher = prBssRsnInfo->u4GroupKeyCipherSuite;
- }
- break;
- default:
- break;
- }
- }
- /* Exception handler */
- /* If we cannot find proper pairwise and group cipher suites to join the
- BSS, do not check the supported AKM suites. */
- if (u4PairwiseCipher == 0 || u4GroupCipher == 0) {
- DBGLOG(RSN, TRACE, "Failed to select pairwise/group cipher (0x%08lx/0x%08lx)\n",
- u4PairwiseCipher, u4GroupCipher);
- return FALSE;
- }
- #if CFG_ENABLE_WIFI_DIRECT
- if ((prAdapter->fgIsP2PRegistered) &&
- (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P)) {
- if (u4PairwiseCipher != RSN_CIPHER_SUITE_CCMP ||
- u4GroupCipher != RSN_CIPHER_SUITE_CCMP || u4AkmSuite != RSN_AKM_SUITE_PSK) {
- DBGLOG(RSN, TRACE,
- "Failed to select pairwise/group cipher for P2P network (0x%08lx/0x%08lx)\n",
- u4PairwiseCipher, u4GroupCipher);
- return FALSE;
- }
- }
- #endif
- #if CFG_ENABLE_BT_OVER_WIFI
- if (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_BOW) {
- if (u4PairwiseCipher != RSN_CIPHER_SUITE_CCMP ||
- u4GroupCipher != RSN_CIPHER_SUITE_CCMP || u4AkmSuite != RSN_AKM_SUITE_PSK) {
- /* Todo:: Nothing */
- }
- DBGLOG(RSN, TRACE,
- "Failed to select pairwise/group cipher for BT over Wi-Fi network (0x%08lx/0x%08lx)\n",
- u4PairwiseCipher, u4GroupCipher);
- return FALSE;
- }
- #endif
- /* Verify if selected pairwisse cipher is supported */
- fgSuiteSupported = rsnSearchSupportedCipher(prAdapter, u4PairwiseCipher, &i);
- /* Verify if selected group cipher is supported */
- if (fgSuiteSupported)
- fgSuiteSupported = rsnSearchSupportedCipher(prAdapter, u4GroupCipher, &i);
- if (!fgSuiteSupported) {
- DBGLOG(RSN, TRACE,
- "Failed to support selected pairwise/group cipher (0x%08lx/0x%08lx)\n",
- u4PairwiseCipher, u4GroupCipher);
- return FALSE;
- }
- /* Select AKM */
- /* If the driver cannot support any authentication suites advertised in
- the given BSS, we fail to perform RSNA policy selection. */
- /* Attempt to find any overlapping supported AKM suite. */
- #if CFG_SUPPORT_802_11W
- if (i != 0)
- for (i = (prBssRsnInfo->u4AuthKeyMgtSuiteCount - 1); i >= 0; i--) {
- #else
- for (i = 0; i < prBssRsnInfo->u4AuthKeyMgtSuiteCount; i++) {
- #endif
- if (rsnSearchAKMSuite(prAdapter, prBssRsnInfo->au4AuthKeyMgtSuite[i], &j)) {
- u4AkmSuite = prBssRsnInfo->au4AuthKeyMgtSuite[i];
- break;
- }
- }
- if (u4AkmSuite == 0) {
- DBGLOG(RSN, TRACE, "Cannot support any AKM suites\n");
- return FALSE;
- }
- DBGLOG(RSN, TRACE,
- "Selected pairwise/group cipher: %02x-%02x-%02x-%02x/%02x-%02x-%02x-%02x\n",
- (UINT_8) (u4PairwiseCipher & 0x000000FF),
- (UINT_8) ((u4PairwiseCipher >> 8) & 0x000000FF),
- (UINT_8) ((u4PairwiseCipher >> 16) & 0x000000FF),
- (UINT_8) ((u4PairwiseCipher >> 24) & 0x000000FF),
- (UINT_8) (u4GroupCipher & 0x000000FF), (UINT_8) ((u4GroupCipher >> 8) & 0x000000FF),
- (UINT_8) ((u4GroupCipher >> 16) & 0x000000FF), (UINT_8) ((u4GroupCipher >> 24) & 0x000000FF));
- DBGLOG(RSN, TRACE, "Selected AKM suite: %02x-%02x-%02x-%02x\n",
- (UINT_8) (u4AkmSuite & 0x000000FF),
- (UINT_8) ((u4AkmSuite >> 8) & 0x000000FF),
- (UINT_8) ((u4AkmSuite >> 16) & 0x000000FF), (UINT_8) ((u4AkmSuite >> 24) & 0x000000FF));
- #if CFG_SUPPORT_802_11W
- DBGLOG(RSN, TRACE, "[MFP] MFP setting = %lu\n ", kalGetMfpSetting(prAdapter->prGlueInfo));
- if (kalGetMfpSetting(prAdapter->prGlueInfo) == RSN_AUTH_MFP_REQUIRED) {
- if (!prBssRsnInfo->fgRsnCapPresent) {
- DBGLOG(RSN, TRACE, "[MFP] Skip RSN IE, No MFP Required Capability.\n");
- return FALSE;
- } else if (!(prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPC)) {
- DBGLOG(RSN, TRACE, "[MFP] Skip RSN IE, No MFP Required\n");
- return FALSE;
- }
- prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE;
- } else if (kalGetMfpSetting(prAdapter->prGlueInfo) == RSN_AUTH_MFP_OPTIONAL) {
- if (prBssRsnInfo->u2RsnCap && ((prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPR) ||
- (prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPC))) {
- prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE;
- } else {
- prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = FALSE;
- }
- } else {
- if (prBssRsnInfo->fgRsnCapPresent && prBssRsnInfo->u2RsnCap) {
- if (/* (prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPR) || */
- (prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPC)) {
- prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE;
- prAdapter->prGlueInfo->rWpaInfo.u4Mfp = RSN_AUTH_MFP_OPTIONAL;
- }
- /* else if ((prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPC) && */
- /* !(prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPR)) { */
- /* prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE; */
- /* prAdapter->prGlueInfo->rWpaInfo.u4Mfp = RSN_AUTH_MFP_OPTIONAL; */
- /* } */
- else
- prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = FALSE;
- }
- if (prBssRsnInfo->fgRsnCapPresent && (prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPR)) {
- if (prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection == FALSE) {
- DBGLOG(RSN, INFO, "[MFP] Skip RSN IE, No MFP Required Capability\n");
- return FALSE;
- }
- }
- }
- DBGLOG(RSN, TRACE,
- "[MFP] fgMgmtProtection = %d\n ", prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection);
- prAdapter->rWifiVar.rAisSpecificBssInfo.fgAPApplyPmfReq = FALSE;
- if (prBssRsnInfo->fgRsnCapPresent && (prBssRsnInfo->u2RsnCap & ELEM_WPA_CAP_MFPR))
- prAdapter->rWifiVar.rAisSpecificBssInfo.fgAPApplyPmfReq = TRUE;
- #endif
- if (GET_SELECTOR_TYPE(u4GroupCipher) == CIPHER_SUITE_CCMP) {
- prBss->ucEncLevel = 3;
- } else if (GET_SELECTOR_TYPE(u4GroupCipher) == CIPHER_SUITE_TKIP) {
- prBss->ucEncLevel = 2;
- } else if (GET_SELECTOR_TYPE(u4GroupCipher) == CIPHER_SUITE_WEP40 ||
- GET_SELECTOR_TYPE(u4GroupCipher) == CIPHER_SUITE_WEP104) {
- prBss->ucEncLevel = 1;
- } else {
- ASSERT(FALSE);
- }
- prBss->u4RsnSelectedPairwiseCipher = u4PairwiseCipher;
- prBss->u4RsnSelectedGroupCipher = u4GroupCipher;
- prBss->u4RsnSelectedAKMSuite = u4AkmSuite;
- return TRUE;
- } /* rsnPerformPolicySelection */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This routine is called to generate WPA IE for beacon frame.
- *
- * \param[in] pucIeStartAddr Pointer to put the generated WPA IE.
- *
- * \return The append WPA-None IE length
- * \note
- * Called by: JOIN module, compose beacon IE
- */
- /*----------------------------------------------------------------------------*/
- VOID rsnGenerateWpaNoneIE(IN P_ADAPTER_T prAdapter, IN P_MSDU_INFO_T prMsduInfo)
- {
- UINT_32 i;
- P_WPA_INFO_ELEM_T prWpaIE;
- UINT_32 u4Suite;
- UINT_16 u2SuiteCount;
- PUINT_8 cp, cp2;
- UINT_8 ucExpendedLen = 0;
- PUINT_8 pucBuffer;
- UINT_8 ucBssIndex;
- DEBUGFUNC("rsnGenerateWpaNoneIE");
- ASSERT(prMsduInfo);
- if (prAdapter->rWifiVar.rConnSettings.eAuthMode != AUTH_MODE_WPA_NONE)
- return;
- ucBssIndex = prMsduInfo->ucBssIndex;
- if (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType != NETWORK_TYPE_AIS)
- return;
- pucBuffer = (PUINT_8) ((ULONG) prMsduInfo->prPacket + (ULONG) prMsduInfo->u2FrameLength);
- ASSERT(pucBuffer);
- prWpaIE = (P_WPA_INFO_ELEM_T) (pucBuffer);
- /* Start to construct a WPA IE. */
- /* Fill the Element ID field. */
- prWpaIE->ucElemId = ELEM_ID_WPA;
- /* Fill the OUI and OUI Type fields. */
- prWpaIE->aucOui[0] = 0x00;
- prWpaIE->aucOui[1] = 0x50;
- prWpaIE->aucOui[2] = 0xF2;
- prWpaIE->ucOuiType = VENDOR_OUI_TYPE_WPA;
- /* Fill the Version field. */
- WLAN_SET_FIELD_16(&prWpaIE->u2Version, 1); /* version 1 */
- ucExpendedLen = 6;
- /* Fill the Pairwise Key Cipher Suite List field. */
- u2SuiteCount = 0;
- cp = (PUINT_8) &prWpaIE->aucPairwiseKeyCipherSuite1[0];
- if (rsnSearchSupportedCipher(prAdapter, WPA_CIPHER_SUITE_CCMP, &i))
- u4Suite = WPA_CIPHER_SUITE_CCMP;
- else if (rsnSearchSupportedCipher(prAdapter, WPA_CIPHER_SUITE_TKIP, &i))
- u4Suite = WPA_CIPHER_SUITE_TKIP;
- else if (rsnSearchSupportedCipher(prAdapter, WPA_CIPHER_SUITE_WEP104, &i))
- u4Suite = WPA_CIPHER_SUITE_WEP104;
- else if (rsnSearchSupportedCipher(prAdapter, WPA_CIPHER_SUITE_WEP40, &i))
- u4Suite = WPA_CIPHER_SUITE_WEP40;
- else
- u4Suite = WPA_CIPHER_SUITE_TKIP;
- WLAN_SET_FIELD_32(cp, u4Suite);
- u2SuiteCount++;
- ucExpendedLen += 4;
- cp += 4;
- /* Fill the Group Key Cipher Suite field as the same in pair-wise key. */
- WLAN_SET_FIELD_32(&prWpaIE->u4GroupKeyCipherSuite, u4Suite);
- ucExpendedLen += 4;
- /* Fill the Pairwise Key Cipher Suite Count field. */
- WLAN_SET_FIELD_16(&prWpaIE->u2PairwiseKeyCipherSuiteCount, u2SuiteCount);
- ucExpendedLen += 2;
- cp2 = cp;
- /* Fill the Authentication and Key Management Suite List field. */
- u2SuiteCount = 0;
- cp += 2;
- if (rsnSearchAKMSuite(prAdapter, WPA_AKM_SUITE_802_1X, &i))
- u4Suite = WPA_AKM_SUITE_802_1X;
- else if (rsnSearchAKMSuite(prAdapter, WPA_AKM_SUITE_PSK, &i))
- u4Suite = WPA_AKM_SUITE_PSK;
- else
- u4Suite = WPA_AKM_SUITE_NONE;
- /* This shall be the only available value for current implementation */
- ASSERT(u4Suite == WPA_AKM_SUITE_NONE);
- WLAN_SET_FIELD_32(cp, u4Suite);
- u2SuiteCount++;
- ucExpendedLen += 4;
- cp += 4;
- /* Fill the Authentication and Key Management Suite Count field. */
- WLAN_SET_FIELD_16(cp2, u2SuiteCount);
- ucExpendedLen += 2;
- /* Fill the Length field. */
- prWpaIE->ucLength = (UINT_8) ucExpendedLen;
- /* Increment the total IE length for the Element ID and Length fields. */
- prMsduInfo->u2FrameLength += IE_SIZE(pucBuffer);
- } /* rsnGenerateWpaNoneIE */
- /*----------------------------------------------------------------------------*/
- /*!
- *
- * \brief This routine is called to generate WPA IE for
- * associate request frame.
- *
- * \param[in] prCurrentBss The Selected BSS description
- *
- * \retval The append WPA IE length
- *
- * \note
- * Called by: AIS module, Associate request
- */
- /*----------------------------------------------------------------------------*/
- VOID rsnGenerateWPAIE(IN P_ADAPTER_T prAdapter, IN P_MSDU_INFO_T prMsduInfo)
- {
- PUCHAR cp;
- PUINT_8 pucBuffer;
- UINT_8 ucBssIndex;
- P_P2P_SPECIFIC_BSS_INFO_T prP2pSpecificBssInfo;
- DEBUGFUNC("rsnGenerateWPAIE");
- ASSERT(prMsduInfo);
- pucBuffer = (PUINT_8) ((ULONG) prMsduInfo->prPacket + (ULONG) prMsduInfo->u2FrameLength);
- ASSERT(pucBuffer);
- ucBssIndex = prMsduInfo->ucBssIndex;
- prP2pSpecificBssInfo = prAdapter->rWifiVar.prP2pSpecificBssInfo;
- /* if (eNetworkId != NETWORK_TYPE_AIS_INDEX) */
- /* return; */
- #if CFG_ENABLE_WIFI_DIRECT
- if ((1 /* prCurrentBss->fgIEWPA */ &&
- ((prAdapter->fgIsP2PRegistered) &&
- (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P) &&
- (kalP2PGetTkipCipher(prAdapter->prGlueInfo)))) ||
- ((prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA) ||
- (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA_PSK))) {
- #else
- if ((1 /* prCurrentBss->fgIEWPA */ &&
- ((prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA) ||
- (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA_PSK)))) {
- #endif
- if (prAdapter->fgIsP2PRegistered && prP2pSpecificBssInfo && (prP2pSpecificBssInfo->u2WpaIeLen != 0)) {
- kalMemCopy(pucBuffer, prP2pSpecificBssInfo->aucWpaIeBuffer, prP2pSpecificBssInfo->u2WpaIeLen);
- prMsduInfo->u2FrameLength += prP2pSpecificBssInfo->u2WpaIeLen;
- return;
- }
- /* Construct a WPA IE for association request frame. */
- WPA_IE(pucBuffer)->ucElemId = ELEM_ID_WPA;
- WPA_IE(pucBuffer)->ucLength = ELEM_ID_WPA_LEN_FIXED;
- WPA_IE(pucBuffer)->aucOui[0] = 0x00;
- WPA_IE(pucBuffer)->aucOui[1] = 0x50;
- WPA_IE(pucBuffer)->aucOui[2] = 0xF2;
- WPA_IE(pucBuffer)->ucOuiType = VENDOR_OUI_TYPE_WPA;
- WLAN_SET_FIELD_16(&WPA_IE(pucBuffer)->u2Version, 1);
- #if CFG_ENABLE_WIFI_DIRECT
- if (prAdapter->fgIsP2PRegistered
- && GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P) {
- WLAN_SET_FIELD_32(&WPA_IE(pucBuffer)->u4GroupKeyCipherSuite, WPA_CIPHER_SUITE_TKIP);
- } else
- #endif
- WLAN_SET_FIELD_32(&WPA_IE(pucBuffer)->u4GroupKeyCipherSuite,
- prAdapter->prAisBssInfo->u4RsnSelectedGroupCipher);
- cp = (PUCHAR) &WPA_IE(pucBuffer)->aucPairwiseKeyCipherSuite1[0];
- WLAN_SET_FIELD_16(&WPA_IE(pucBuffer)->u2PairwiseKeyCipherSuiteCount, 1);
- #if CFG_ENABLE_WIFI_DIRECT
- if (prAdapter->fgIsP2PRegistered
- && GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P) {
- WLAN_SET_FIELD_32(cp, WPA_CIPHER_SUITE_TKIP);
- } else
- #endif
- WLAN_SET_FIELD_32(cp, prAdapter->prAisBssInfo->u4RsnSelectedPairwiseCipher);
- cp += 4;
- WLAN_SET_FIELD_16(cp, 1);
- cp += 2;
- #if CFG_ENABLE_WIFI_DIRECT
- if (prAdapter->fgIsP2PRegistered
- && GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P) {
- WLAN_SET_FIELD_32(cp, WPA_AKM_SUITE_PSK);
- } else
- #endif
- WLAN_SET_FIELD_32(cp, prAdapter->prAisBssInfo->u4RsnSelectedAKMSuite);
- cp += 4;
- WPA_IE(pucBuffer)->ucLength = ELEM_ID_WPA_LEN_FIXED;
- prMsduInfo->u2FrameLength += IE_SIZE(pucBuffer);
- }
- } /* rsnGenerateWPAIE */
- /*----------------------------------------------------------------------------*/
- /*!
- *
- * \brief This routine is called to generate RSN IE for
- * associate request frame.
- *
- * \param[in] prMsduInfo The Selected BSS description
- *
- * \retval The append RSN IE length
- *
- * \note
- * Called by: AIS module, P2P module, BOW module Associate request
- */
- /*----------------------------------------------------------------------------*/
- VOID rsnGenerateRSNIE(IN P_ADAPTER_T prAdapter, IN P_MSDU_INFO_T prMsduInfo)
- {
- UINT_32 u4Entry;
- PUCHAR cp;
- /* UINT_8 ucExpendedLen = 0; */
- PUINT_8 pucBuffer;
- UINT_8 ucBssIndex;
- P_STA_RECORD_T prStaRec;
- DEBUGFUNC("rsnGenerateRSNIE");
- ASSERT(prMsduInfo);
- pucBuffer = (PUINT_8) ((ULONG) prMsduInfo->prPacket + (ULONG) prMsduInfo->u2FrameLength);
- ASSERT(pucBuffer);
- /* Todo:: network id */
- ucBssIndex = prMsduInfo->ucBssIndex;
- if (
- #if CFG_ENABLE_WIFI_DIRECT
- ((prAdapter->fgIsP2PRegistered) &&
- (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_P2P)
- && (kalP2PGetCcmpCipher(prAdapter->prGlueInfo))) ||
- #endif
- #if CFG_ENABLE_BT_OVER_WIFI
- (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_BOW)
- ||
- #endif
- (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType ==
- NETWORK_TYPE_AIS /* prCurrentBss->fgIERSN */ &&
- ((prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA2)
- || (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA2_PSK)))) {
- /* Construct a RSN IE for association request frame. */
- RSN_IE(pucBuffer)->ucElemId = ELEM_ID_RSN;
- RSN_IE(pucBuffer)->ucLength = ELEM_ID_RSN_LEN_FIXED;
- WLAN_SET_FIELD_16(&RSN_IE(pucBuffer)->u2Version, 1); /* Version */
- WLAN_SET_FIELD_32(&RSN_IE(pucBuffer)->u4GroupKeyCipherSuite,
- GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u4RsnSelectedGroupCipher); /* Group key suite */
- cp = (PUCHAR) &RSN_IE(pucBuffer)->aucPairwiseKeyCipherSuite1[0];
- WLAN_SET_FIELD_16(&RSN_IE(pucBuffer)->u2PairwiseKeyCipherSuiteCount, 1);
- WLAN_SET_FIELD_32(cp, GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u4RsnSelectedPairwiseCipher);
- cp += 4;
- WLAN_SET_FIELD_16(cp, 1); /* AKM suite count */
- cp += 2;
- /* AKM suite */
- WLAN_SET_FIELD_32(cp, GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u4RsnSelectedAKMSuite);
- cp += 4;
- #if CFG_SUPPORT_802_11W
- /* Capabilities */
- WLAN_SET_FIELD_16(cp, GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u2RsnSelectedCapInfo);
- DBGLOG(RSN, TRACE,
- "Gen RSN IE = %x\n", GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u2RsnSelectedCapInfo);
- if (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_AIS
- && prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection) {
- if (kalGetMfpSetting(prAdapter->prGlueInfo) == RSN_AUTH_MFP_REQUIRED
- /* prAdapter->rWifiVar.rAisSpecificBssInfo.fgAPApplyPmfReq */) {
- WLAN_SET_FIELD_16(cp, ELEM_WPA_CAP_MFPC | ELEM_WPA_CAP_MFPR); /* Capabilities */
- DBGLOG(RSN, TRACE, "RSN_AUTH_MFP_NO - MFPC & MFPR\n");
- } else {
- WLAN_SET_FIELD_16(cp, ELEM_WPA_CAP_MFPC); /* Capabilities */
- DBGLOG(RSN, TRACE, "RSN_AUTH_MFP_NO - MFPC\n");
- }
- }
- #else
- /* Capabilities */
- WLAN_SET_FIELD_16(cp, GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->u2RsnSelectedCapInfo);
- #endif
- cp += 2;
- if (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_AIS)
- prStaRec = cnmGetStaRecByIndex(prAdapter, prMsduInfo->ucStaRecIndex);
- if (GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_AIS
- && rsnSearchPmkidEntry(prAdapter, prStaRec->aucMacAddr, &u4Entry)) {
- /* DBGLOG(RSN, TRACE, ("Add Pmk at assoc req\n")); */
- /* DBGLOG(RSN, TRACE, ("addr " MACSTR" PMKID "MACSTR"\n", */
- /* MAC2STR(prAdapter->rWifiVar.rAisSpecificBssInfo.arPmkidCache[u4Entry].rBssidInfo.arBSSID),
- * MAC2STR(prAdapter->rWifiVar.rAisSpecificBssInfo.
- * arPmkidCache[u4Entry].rBssidInfo.arPMKID))); */
- if (prAdapter->rWifiVar.rAisSpecificBssInfo.arPmkidCache[u4Entry].fgPmkidExist) {
- RSN_IE(pucBuffer)->ucLength = 38;
- WLAN_SET_FIELD_16(cp, 1); /* PMKID count */
- cp += 2;
- DBGLOG(RSN, TRACE,
- "BSSID " MACSTR " ind=%lu\n", MAC2STR(prStaRec->aucMacAddr), u4Entry);
- /*
- DBGLOG(RSN, TRACE,
- "use PMKID " MACSTR "\n",
- MAC2STR(prAdapter->rWifiVar.rAisSpecificBssInfo.
- arPmkidCache[u4Entry].rBssidInfo.arPMKID));
- */
- kalMemCopy(cp,
- (PVOID) prAdapter->rWifiVar.rAisSpecificBssInfo.
- arPmkidCache[u4Entry].rBssidInfo.arPMKID, sizeof(PARAM_PMKID_VALUE));
- /* ucExpendedLen = 40; */
- } else {
- WLAN_SET_FIELD_16(cp, 0); /* PMKID count */
- /* ucExpendedLen = ELEM_ID_RSN_LEN_FIXED + 2; */
- #if CFG_SUPPORT_802_11W
- cp += 2;
- RSN_IE(pucBuffer)->ucLength += 2;
- #endif
- }
- } else {
- WLAN_SET_FIELD_16(cp, 0); /* PMKID count */
- /* ucExpendedLen = ELEM_ID_RSN_LEN_FIXED + 2; */
- #if CFG_SUPPORT_802_11W
- if ((GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_AIS)
- && prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection
- && (kalGetMfpSetting(prAdapter->prGlueInfo) != RSN_AUTH_MFP_DISABLED)
- /* (mgmt_group_cipher == WPA_CIPHER_AES_128_CMAC) */
- ) {
- cp += 2;
- RSN_IE(pucBuffer)->ucLength += 2;
- }
- #endif
- }
- #if CFG_SUPPORT_802_11W
- if ((GET_BSS_INFO_BY_INDEX(prAdapter, ucBssIndex)->eNetworkType == NETWORK_TYPE_AIS)
- && prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection &&
- (kalGetMfpSetting(prAdapter->prGlueInfo) != RSN_AUTH_MFP_DISABLED)
- /* (mgmt_group_cipher == WPA_CIPHER_AES_128_CMAC) */) {
- WLAN_SET_FIELD_32(cp, RSN_CIPHER_SUITE_AES_128_CMAC);
- cp += 4;
- RSN_IE(pucBuffer)->ucLength += 4;
- }
- #endif
- prMsduInfo->u2FrameLength += IE_SIZE(pucBuffer);
- }
- } /* rsnGenerateRSNIE */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief Parse the given IE buffer and check if it is WFA IE and return Type and
- * SubType for further process.
- *
- * \param[in] pucBuf Pointer to the buffer of WFA Information Element.
- * \param[out] pucOuiType Pointer to the storage of OUI Type.
- * \param[out] pu2SubTypeVersion Pointer to the storage of OUI SubType and Version.
- * \retval TRUE Parse IE ok
- * \retval FALSE Parse IE fail
- */
- /*----------------------------------------------------------------------------*/
- BOOLEAN
- rsnParseCheckForWFAInfoElem(IN P_ADAPTER_T prAdapter,
- IN PUINT_8 pucBuf, OUT PUINT_8 pucOuiType, OUT PUINT_16 pu2SubTypeVersion)
- {
- UINT_8 aucWfaOui[] = VENDOR_OUI_WFA;
- P_IE_WFA_T prWfaIE;
- ASSERT(pucBuf);
- ASSERT(pucOuiType);
- ASSERT(pu2SubTypeVersion);
- prWfaIE = (P_IE_WFA_T) pucBuf;
- do {
- if (IE_LEN(pucBuf) <= ELEM_MIN_LEN_WFA_OUI_TYPE_SUBTYPE) {
- break;
- } else if (prWfaIE->aucOui[0] != aucWfaOui[0] ||
- prWfaIE->aucOui[1] != aucWfaOui[1] || prWfaIE->aucOui[2] != aucWfaOui[2]) {
- break;
- }
- *pucOuiType = prWfaIE->ucOuiType;
- WLAN_GET_FIELD_16(&prWfaIE->aucOuiSubTypeVersion[0], pu2SubTypeVersion);
- return TRUE;
- } while (FALSE);
- return FALSE;
- } /* end of rsnParseCheckForWFAInfoElem() */
- #if CFG_SUPPORT_AAA
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief Parse the given IE buffer and check if it is RSN IE with CCMP PSK
- *
- * \param[in] prAdapter Pointer to Adapter
- * \param[in] prSwRfb Pointer to the rx buffer
- * \param[in] pIE Pointer rthe buffer of Information Element.
- * \param[out] prStatusCode Pointer to the return status code.
- * \retval none
- */
- /*----------------------------------------------------------------------------*/
- void rsnParserCheckForRSNCCMPPSK(P_ADAPTER_T prAdapter, P_RSN_INFO_ELEM_T prIe, PUINT_16 pu2StatusCode)
- {
- RSN_INFO_T rRsnIe;
- ASSERT(prAdapter);
- ASSERT(prIe);
- ASSERT(pu2StatusCode);
- *pu2StatusCode = STATUS_CODE_INVALID_INFO_ELEMENT;
- if (rsnParseRsnIE(prAdapter, prIe, &rRsnIe)) {
- if ((rRsnIe.u4PairwiseKeyCipherSuiteCount != 1)
- || (rRsnIe.au4PairwiseKeyCipherSuite[0] != RSN_CIPHER_SUITE_CCMP)) {
- *pu2StatusCode = STATUS_CODE_INVALID_PAIRWISE_CIPHER;
- return;
- }
- if (rRsnIe.u4GroupKeyCipherSuite != RSN_CIPHER_SUITE_CCMP) {
- *pu2StatusCode = STATUS_CODE_INVALID_GROUP_CIPHER;
- return;
- }
- if ((rRsnIe.u4AuthKeyMgtSuiteCount != 1)
- || (rRsnIe.au4AuthKeyMgtSuite[0] != RSN_AKM_SUITE_PSK)) {
- *pu2StatusCode = STATUS_CODE_INVALID_AKMP;
- return;
- }
- DBGLOG(RSN, TRACE, "RSN with CCMP-PSK\n");
- *pu2StatusCode = WLAN_STATUS_SUCCESS;
- }
- }
- #endif
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This routine is called to generate an authentication event to NDIS.
- *
- * \param[in] u4Flags Authentication event: \n
- * PARAM_AUTH_REQUEST_REAUTH 0x01 \n
- * PARAM_AUTH_REQUEST_KEYUPDATE 0x02 \n
- * PARAM_AUTH_REQUEST_PAIRWISE_ERROR 0x06 \n
- * PARAM_AUTH_REQUEST_GROUP_ERROR 0x0E \n
- *
- * \return (none)
- */
- /*----------------------------------------------------------------------------*/
- VOID rsnGenMicErrorEvent(IN P_ADAPTER_T prAdapter, IN BOOLEAN fgFlags)
- {
- P_PARAM_AUTH_EVENT_T prAuthEvent;
- DEBUGFUNC("rsnGenMicErrorEvent");
- prAuthEvent = (P_PARAM_AUTH_EVENT_T) prAdapter->aucIndicationEventBuffer;
- /* Status type: Authentication Event */
- prAuthEvent->rStatus.eStatusType = ENUM_STATUS_TYPE_AUTHENTICATION;
- /* Authentication request */
- prAuthEvent->arRequest[0].u4Length = sizeof(PARAM_AUTH_REQUEST_T);
- kalMemCopy((PVOID) prAuthEvent->arRequest[0].arBssid, (PVOID) prAdapter->prAisBssInfo->aucBSSID, MAC_ADDR_LEN);
- if (fgFlags == TRUE)
- prAuthEvent->arRequest[0].u4Flags = PARAM_AUTH_REQUEST_GROUP_ERROR;
- else
- prAuthEvent->arRequest[0].u4Flags = PARAM_AUTH_REQUEST_PAIRWISE_ERROR;
- kalIndicateStatusAndComplete(prAdapter->prGlueInfo,
- WLAN_STATUS_MEDIA_SPECIFIC_INDICATION,
- (PVOID) prAuthEvent,
- sizeof(PARAM_STATUS_INDICATION_T) + sizeof(PARAM_AUTH_REQUEST_T));
- } /* rsnGenMicErrorEvent */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This routine is called to handle TKIP MIC failures.
- *
- * \param[in] adapter_p Pointer to the adapter object data area.
- * \param[in] prSta Pointer to the STA which occur MIC Error
- * \param[in] fgErrorKeyType type of error key
- *
- * \retval none
- */
- /*----------------------------------------------------------------------------*/
- VOID rsnTkipHandleMICFailure(IN P_ADAPTER_T prAdapter, IN P_STA_RECORD_T prSta, IN BOOLEAN fgErrorKeyType)
- {
- /* UINT_32 u4RsnaCurrentMICFailTime; */
- /* P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo; */
- DEBUGFUNC("rsnTkipHandleMICFailure");
- ASSERT(prAdapter);
- #if 1
- rsnGenMicErrorEvent(prAdapter, /* prSta, */ fgErrorKeyType);
- /* Generate authentication request event. */
- DBGLOG(RSN, INFO, "Generate TKIP MIC error event (type: 0%d)\n", fgErrorKeyType);
- #else
- ASSERT(prSta);
- prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
- /* Record the MIC error occur time. */
- GET_CURRENT_SYSTIME(&u4RsnaCurrentMICFailTime);
- /* Generate authentication request event. */
- DBGLOG(RSN, INFO, "Generate TKIP MIC error event (type: 0%d)\n", fgErrorKeyType);
- /* If less than 60 seconds have passed since a previous TKIP MIC failure,
- disassociate from the AP and wait for 60 seconds before (re)associating
- with the same AP. */
- if (prAisSpecBssInfo->u4RsnaLastMICFailTime != 0 &&
- !CHECK_FOR_TIMEOUT(u4RsnaCurrentMICFailTime,
- prAisSpecBssInfo->u4RsnaLastMICFailTime, SEC_TO_SYSTIME(TKIP_COUNTERMEASURE_SEC))) {
- /* If less than 60 seconds expired since last MIC error, we have to
- block traffic. */
- DBGLOG(RSN, INFO, "Start blocking traffic!\n");
- rsnGenMicErrorEvent(prAdapter, /* prSta, */ fgErrorKeyType);
- secFsmEventStartCounterMeasure(prAdapter, prSta);
- } else {
- rsnGenMicErrorEvent(prAdapter, /* prSta, */ fgErrorKeyType);
- DBGLOG(RSN, INFO, "First TKIP MIC error!\n");
- }
- COPY_SYSTIME(prAisSpecBssInfo->u4RsnaLastMICFailTime, u4RsnaCurrentMICFailTime);
- #endif
- } /* rsnTkipHandleMICFailure */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This function is called to select a list of BSSID from
- * the scan results for PMKID candidate list.
- *
- * \param[in] prBssDesc the BSS Desc at scan result list
- * \param[out] pu4CandidateCount Pointer to the number of selected candidates.
- * It is set to zero if no BSSID matches our requirement.
- *
- * \retval none
- */
- /*----------------------------------------------------------------------------*/
- VOID rsnSelectPmkidCandidateList(IN P_ADAPTER_T prAdapter, IN P_BSS_DESC_T prBssDesc)
- {
- P_CONNECTION_SETTINGS_T prConnSettings;
- P_BSS_INFO_T prAisBssInfo;
- DEBUGFUNC("rsnSelectPmkidCandidateList");
- ASSERT(prBssDesc);
- prConnSettings = &prAdapter->rWifiVar.rConnSettings;
- prAisBssInfo = prAdapter->prAisBssInfo;
- /* Search a BSS with the same SSID from the given BSS description set. */
- /* DBGLOG(RSN, TRACE, ("Check scan result ["MACSTR"]\n", */
- /* MAC2STR(prBssDesc->aucBSSID))); */
- if (UNEQUAL_SSID(prBssDesc->aucSSID, prBssDesc->ucSSIDLen,
- prConnSettings->aucSSID, prConnSettings->ucSSIDLen)) {
- DBGLOG(RSN, TRACE, "-- SSID not matched\n");
- return;
- }
- #if 0
- if ((prBssDesc->u2BSSBasicRateSet &
- ~(rPhyAttributes[prAisBssInfo->ePhyType].u2SupportedRateSet)) || prBssDesc->fgIsUnknownBssBasicRate) {
- DBGLOG(RSN, TRACE, "-- Rate set not matched\n");
- return;
- }
- if (/* prBssDesc->u4RsnSelectedPairwiseCipher != prAisBssInfo->u4RsnSelectedPairwiseCipher || */
- prBssDesc->u4RsnSelectedGroupCipher != prAisBssInfo->u4RsnSelectedGroupCipher /*||
- prBssDesc->u4RsnSelectedAKMSuite != prAisBssInfo->u4RsnSelectedAKMSuite */) {
- DBGLOG(RSN, TRACE, "-- Encrypt status not matched for PMKID\n");
- return;
- }
- #endif
- rsnUpdatePmkidCandidateList(prAdapter, prBssDesc);
- } /* rsnSelectPmkidCandidateList */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This function is called to select a list of BSSID from
- * the scan results for PMKID candidate list.
- *
- * \param[in] prBssDesc the BSS DESC at scan result list
- *
- * \retval none
- */
- /*----------------------------------------------------------------------------*/
- VOID rsnUpdatePmkidCandidateList(IN P_ADAPTER_T prAdapter, IN P_BSS_DESC_T prBssDesc)
- {
- UINT_32 i;
- P_CONNECTION_SETTINGS_T prConnSettings;
- P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
- DEBUGFUNC("rsnUpdatePmkidCandidateList");
- ASSERT(prBssDesc);
- prConnSettings = &prAdapter->rWifiVar.rConnSettings;
- prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
- if (UNEQUAL_SSID(prBssDesc->aucSSID, prBssDesc->ucSSIDLen,
- prConnSettings->aucSSID, prConnSettings->ucSSIDLen)) {
- DBGLOG(RSN, TRACE, "-- SSID not matched\n");
- return;
- }
- for (i = 0; i < CFG_MAX_PMKID_CACHE; i++) {
- if (EQUAL_MAC_ADDR(prBssDesc->aucBSSID, prAisSpecBssInfo->arPmkidCandicate[i].aucBssid))
- return;
- }
- /* If the number of selected BSSID exceed MAX_NUM_PMKID_CACHE(16),
- then we only store MAX_NUM_PMKID_CACHE(16) in PMKID cache */
- if ((prAisSpecBssInfo->u4PmkidCandicateCount + 1) > CFG_MAX_PMKID_CACHE)
- prAisSpecBssInfo->u4PmkidCandicateCount--;
- i = prAisSpecBssInfo->u4PmkidCandicateCount;
- COPY_MAC_ADDR((PVOID) prAisSpecBssInfo->arPmkidCandicate[i].aucBssid, (PVOID) prBssDesc->aucBSSID);
- if (prBssDesc->u2RsnCap & MASK_RSNIE_CAP_PREAUTH) {
- prAisSpecBssInfo->arPmkidCandicate[i].u4PreAuthFlags = 1;
- DBGLOG(RSN, TRACE, "Add " MACSTR " with pre-auth to candidate list\n",
- MAC2STR(prAisSpecBssInfo->arPmkidCandicate[i].aucBssid));
- } else {
- prAisSpecBssInfo->arPmkidCandicate[i].u4PreAuthFlags = 0;
- DBGLOG(RSN, TRACE, "Add " MACSTR " without pre-auth to candidate list\n",
- MAC2STR(prAisSpecBssInfo->arPmkidCandicate[i].aucBssid));
- }
- prAisSpecBssInfo->u4PmkidCandicateCount++;
- } /* rsnUpdatePmkidCandidateList */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This routine is called to search the desired entry in
- * PMKID cache according to the BSSID
- *
- * \param[in] pucBssid Pointer to the BSSID
- * \param[out] pu4EntryIndex Pointer to place the found entry index
- *
- * \retval TRUE, if found one entry for specified BSSID
- * \retval FALSE, if not found
- */
- /*----------------------------------------------------------------------------*/
- BOOLEAN rsnSearchPmkidEntry(IN P_ADAPTER_T prAdapter, IN PUINT_8 pucBssid, OUT PUINT_32 pu4EntryIndex)
- {
- UINT_32 i;
- P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
- DEBUGFUNC("rsnSearchPmkidEntry");
- ASSERT(pucBssid);
- ASSERT(pu4EntryIndex);
- prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
- if (prAisSpecBssInfo->u4PmkidCacheCount > CFG_MAX_PMKID_CACHE)
- return FALSE;
- ASSERT(prAisSpecBssInfo->u4PmkidCacheCount <= CFG_MAX_PMKID_CACHE);
- /* Search for desired BSSID */
- for (i = 0; i < prAisSpecBssInfo->u4PmkidCacheCount; i++) {
- if (!kalMemCmp(prAisSpecBssInfo->arPmkidCache[i].rBssidInfo.arBSSID, pucBssid, MAC_ADDR_LEN))
- break;
- }
- /* If desired BSSID is found, then set the PMKID */
- if (i < prAisSpecBssInfo->u4PmkidCacheCount) {
- *pu4EntryIndex = i;
- return TRUE;
- }
- return FALSE;
- } /* rsnSearchPmkidEntry */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This routine is called to check if there is difference
- * between PMKID candicate list and PMKID cache. If there
- * is new candicate that no cache entry is available, then
- * add a new entry for the new candicate in the PMKID cache
- * and set the PMKID indication flag to TRUE.
- *
- * \retval TRUE, if new member in the PMKID candicate list
- * \retval FALSe, if no new member in the PMKID candicate list
- */
- /*----------------------------------------------------------------------------*/
- BOOLEAN rsnCheckPmkidCandicate(IN P_ADAPTER_T prAdapter)
- {
- P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
- UINT_32 i; /* Index for PMKID candicate */
- UINT_32 j; /* Indix for PMKID cache */
- BOOLEAN status = FALSE;
- DEBUGFUNC("rsnCheckPmkidCandicate");
- prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
- /* Check for each candicate */
- for (i = 0; i < prAisSpecBssInfo->u4PmkidCandicateCount; i++) {
- for (j = 0; j < prAisSpecBssInfo->u4PmkidCacheCount; j++) {
- if (!kalMemCmp(prAisSpecBssInfo->arPmkidCache[j].rBssidInfo.arBSSID,
- prAisSpecBssInfo->arPmkidCandicate[i].aucBssid, MAC_ADDR_LEN)) {
- /* DBGLOG(RSN, TRACE, (MACSTR" at PMKID cache!!\n",
- * MAC2STR(prAisSpecBssInfo->arPmkidCandicate[i].aucBssid))); */
- break;
- }
- }
- /* No entry found in PMKID cache for the candicate, add new one */
- if (j == prAisSpecBssInfo->u4PmkidCacheCount
- && prAisSpecBssInfo->u4PmkidCacheCount < CFG_MAX_PMKID_CACHE) {
- DBGLOG(RSN, TRACE,
- "Add " MACSTR " to PMKID cache!!\n",
- MAC2STR(prAisSpecBssInfo->arPmkidCandicate[i].aucBssid));
- kalMemCopy((PVOID) prAisSpecBssInfo->
- arPmkidCache[prAisSpecBssInfo->u4PmkidCacheCount].rBssidInfo.arBSSID,
- (PVOID) prAisSpecBssInfo->arPmkidCandicate[i].aucBssid, MAC_ADDR_LEN);
- prAisSpecBssInfo->arPmkidCache[prAisSpecBssInfo->u4PmkidCacheCount].fgPmkidExist = FALSE;
- prAisSpecBssInfo->u4PmkidCacheCount++;
- status = TRUE;
- }
- }
- return status;
- } /* rsnCheckPmkidCandicate */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This function is called to wait a duration to indicate the pre-auth AP candicate
- *
- * \return (none)
- */
- /*----------------------------------------------------------------------------*/
- VOID rsnIndicatePmkidCand(IN P_ADAPTER_T prAdapter, IN ULONG ulParamPtr)
- {
- DBGLOG(RSN, EVENT, "Security - Time to indicate the PMKID cand.\n");
- /* If the authentication mode is WPA2 and indication PMKID flag
- is available, then we indicate the PMKID candidate list to NDIS and
- clear the flag, indicatePMKID */
- if (prAdapter->prAisBssInfo->eConnectionState == PARAM_MEDIA_STATE_CONNECTED &&
- prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA2) {
- rsnGeneratePmkidIndication(prAdapter);
- }
- } /* end of rsnIndicatePmkidCand() */
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This routine is called to check the BSS Desc at scan result
- * with pre-auth cap at wpa2 mode. If there
- * is candicate that no cache entry is available, then
- * add a new entry for the new candicate in the PMKID cache
- * and set the PMKID indication flag to TRUE.
- *
- * \param[in] prBss The BSS Desc at scan result
- *
- * \return none
- */
- /*----------------------------------------------------------------------------*/
- VOID rsnCheckPmkidCache(IN P_ADAPTER_T prAdapter, IN P_BSS_DESC_T prBss)
- {
- P_BSS_INFO_T prAisBssInfo;
- P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
- P_CONNECTION_SETTINGS_T prConnSettings;
- DEBUGFUNC("rsnCheckPmkidCandicate");
- ASSERT(prBss);
- prConnSettings = &prAdapter->rWifiVar.rConnSettings;
- prAisBssInfo = prAdapter->prAisBssInfo;
- prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
- if ((prAisBssInfo->eConnectionState == PARAM_MEDIA_STATE_CONNECTED) &&
- (prConnSettings->eAuthMode == AUTH_MODE_WPA2)) {
- rsnSelectPmkidCandidateList(prAdapter, prBss);
- /* Set indication flag of PMKID to TRUE, and then connHandleNetworkConnection()
- will indicate this later */
- if (rsnCheckPmkidCandicate(prAdapter)) {
- DBGLOG(RSN, TRACE, "Prepare a timer to indicate candidate PMKID Candidate\n");
- cnmTimerStopTimer(prAdapter, &prAisSpecBssInfo->rPreauthenticationTimer);
- cnmTimerStartTimer(prAdapter, &prAisSpecBssInfo->rPreauthenticationTimer,
- SEC_TO_MSEC(WAIT_TIME_IND_PMKID_CANDICATE_SEC));
- }
- }
- }
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief This routine is called to generate an PMKID candidate list
- * indication to NDIS.
- *
- * \param[in] prAdapter Pointer to the adapter object data area.
- * \param[in] u4Flags PMKID candidate list event:
- * PARAM_PMKID_CANDIDATE_PREAUTH_ENABLED 0x01
- *
- * \retval none
- */
- /*----------------------------------------------------------------------------*/
- VOID rsnGeneratePmkidIndication(IN P_ADAPTER_T prAdapter)
- {
- P_PARAM_STATUS_INDICATION_T prStatusEvent;
- P_PARAM_PMKID_CANDIDATE_LIST_T prPmkidEvent;
- P_AIS_SPECIFIC_BSS_INFO_T prAisSpecificBssInfo;
- UINT_8 i, j = 0, count = 0;
- UINT_32 u4LenOfUsedBuffer;
- DEBUGFUNC("rsnGeneratePmkidIndication");
- ASSERT(prAdapter);
- prStatusEvent = (P_PARAM_STATUS_INDICATION_T) prAdapter->aucIndicationEventBuffer;
- /* Status type: PMKID Candidatelist Event */
- prStatusEvent->eStatusType = ENUM_STATUS_TYPE_CANDIDATE_LIST;
- ASSERT(prStatusEvent);
- prPmkidEvent = (P_PARAM_PMKID_CANDIDATE_LIST_T) (&prStatusEvent->eStatusType + 1);
- ASSERT(prPmkidEvent);
- prAisSpecificBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
- ASSERT(prAisSpecificBssInfo);
- for (i = 0; i < prAisSpecificBssInfo->u4PmkidCandicateCount; i++) {
- for (j = 0; j < prAisSpecificBssInfo->u4PmkidCacheCount; j++) {
- if (EQUAL_MAC_ADDR(prAisSpecificBssInfo->arPmkidCache[j].rBssidInfo.arBSSID,
- prAisSpecificBssInfo->arPmkidCandicate[i].aucBssid) &&
- (prAisSpecificBssInfo->arPmkidCache[j].fgPmkidExist == TRUE)) {
- break;
- }
- }
- if (count >= CFG_MAX_PMKID_CACHE)
- break;
- if (j == prAisSpecificBssInfo->u4PmkidCacheCount) {
- kalMemCopy((PVOID) prPmkidEvent->arCandidateList[count].arBSSID,
- (PVOID) prAisSpecificBssInfo->arPmkidCandicate[i].aucBssid, PARAM_MAC_ADDR_LEN);
- prPmkidEvent->arCandidateList[count].u4Flags =
- prAisSpecificBssInfo->arPmkidCandicate[i].u4PreAuthFlags;
- DBGLOG(RSN, TRACE,
- MACSTR " %lu\n",
- MAC2STR(prPmkidEvent->arCandidateList[count].arBSSID),
- prPmkidEvent->arCandidateList[count].u4Flags);
- count++;
- }
- }
- /* PMKID Candidate List */
- prPmkidEvent->u4Version = 1;
- prPmkidEvent->u4NumCandidates = count;
- DBGLOG(RSN, TRACE, "rsnGeneratePmkidIndication #%lu\n", prPmkidEvent->u4NumCandidates);
- u4LenOfUsedBuffer = sizeof(ENUM_STATUS_TYPE_T) + (2 * sizeof(UINT_32)) +
- (count * sizeof(PARAM_PMKID_CANDIDATE_T));
- /* dumpMemory8((PUINT_8)prAdapter->aucIndicationEventBuffer, u4LenOfUsedBuffer); */
- kalIndicateStatusAndComplete(prAdapter->prGlueInfo,
- WLAN_STATUS_MEDIA_SPECIFIC_INDICATION,
- (PVOID) prAdapter->aucIndicationEventBuffer, u4LenOfUsedBuffer);
- } /* rsnGeneratePmkidIndication */
- #if CFG_SUPPORT_WPS2
- /*----------------------------------------------------------------------------*/
- /*!
- *
- * \brief This routine is called to generate WSC IE for
- * associate request frame.
- *
- * \param[in] prCurrentBss The Selected BSS description
- *
- * \retval The append WSC IE length
- *
- * \note
- * Called by: AIS module, Associate request
- */
- /*----------------------------------------------------------------------------*/
- VOID rsnGenerateWSCIE(IN P_ADAPTER_T prAdapter, IN P_MSDU_INFO_T prMsduInfo)
- {
- PUINT_8 pucBuffer;
- ASSERT(prAdapter);
- ASSERT(prMsduInfo);
- if (prMsduInfo->ucBssIndex != prAdapter->prAisBssInfo->ucBssIndex)
- return;
- pucBuffer = (PUINT_8) ((ULONG) prMsduInfo->prPacket + (ULONG) prMsduInfo->u2FrameLength);
- /* ASSOC INFO IE ID: 221 :0xDD */
- if (prAdapter->prGlueInfo->u2WSCAssocInfoIELen) {
- kalMemCopy(pucBuffer, &prAdapter->prGlueInfo->aucWSCAssocInfoIE,
- prAdapter->prGlueInfo->u2WSCAssocInfoIELen);
- prMsduInfo->u2FrameLength += prAdapter->prGlueInfo->u2WSCAssocInfoIELen;
- }
- }
- #endif
- #if CFG_SUPPORT_802_11W
- /*----------------------------------------------------------------------------*/
- /*!
- * \brief to check if the Bip Key installed or not
- *
- * \param[in]
- * prAdapter
- *
- * \return
- * TRUE
- * FALSE
- */
- /*----------------------------------------------------------------------------*/
- UINT_32 rsnCheckBipKeyInstalled(IN P_ADAPTER_T prAdapter, IN P_STA_RECORD_T prStaRec)
- {
- if (prStaRec
- && GET_BSS_INFO_BY_INDEX(prAdapter, prStaRec->ucBssIndex)->eNetworkType == (UINT_8) NETWORK_TYPE_AIS)
- return prAdapter->rWifiVar.rAisSpecificBssInfo.fgBipKeyInstalled;
- else
- return FALSE;
- }
- /*----------------------------------------------------------------------------*/
- /*!
- *
- * \brief This routine is called to check the Sa query timeout.
- *
- *
- * \note
- * Called by: AIS module, Handle by Sa Quert timeout
- */
- /*----------------------------------------------------------------------------*/
- UINT_8 rsnCheckSaQueryTimeout(IN P_ADAPTER_T prAdapter)
- {
- P_AIS_SPECIFIC_BSS_INFO_T prBssSpecInfo;
- UINT_32 now;
- prBssSpecInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
- ASSERT(prBssSpecInfo);
- GET_CURRENT_SYSTIME(&now);
- if (CHECK_FOR_TIMEOUT(now, prBssSpecInfo->u4SaQueryStart, TU_TO_MSEC(1000))) {
- DBGLOG(RSN, INFO, "association SA Query timed out\n");
- prBssSpecInfo->ucSaQueryTimedOut = 1;
- kalMemFree(prBssSpecInfo->pucSaQueryTransId, VIR_MEM_TYPE,
- prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN);
- prBssSpecInfo->pucSaQueryTransId = NULL;
- prBssSpecInfo->u4SaQueryCount = 0;
- cnmTimerStopTimer(prAdapter, &prBssSpecInfo->rSaQueryTimer);
- #if 1
- if (prAdapter->prAisBssInfo->eConnectionState ==
- PARAM_MEDIA_STATE_CONNECTED /* STA_STATE_3 == prStaRec->ucStaState */) {
- P_MSG_AIS_ABORT_T prAisAbortMsg;
- prAisAbortMsg =
- (P_MSG_AIS_ABORT_T) cnmMemAlloc(prAdapter, RAM_TYPE_MSG, sizeof(MSG_AIS_ABORT_T));
- if (!prAisAbortMsg)
- return 0;
- prAisAbortMsg->rMsgHdr.eMsgId = MID_SAA_AIS_FSM_ABORT;
- prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_DISASSOCIATED;
- prAisAbortMsg->fgDelayIndication = FALSE;
- mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prAisAbortMsg, MSG_SEND_METHOD_BUF);
- }
- #else
- /* Re-connect */
- kalIndicateStatusAndComplete(prAdapter->prGlueInfo, WLAN_STATUS_MEDIA_DISCONNECT, NULL, 0);
- #endif
- return 1;
- }
- return 0;
- }
- /*----------------------------------------------------------------------------*/
- /*!
- *
- * \brief This routine is called to start the 802.11w sa query timer.
- *
- *
- * \note
- * Called by: AIS module, Handle Rx mgmt request
- */
- /*----------------------------------------------------------------------------*/
- void rsnStartSaQueryTimer(IN P_ADAPTER_T prAdapter, IN ULONG ulParamPtr)
- {
- P_BSS_INFO_T prBssInfo;
- P_AIS_SPECIFIC_BSS_INFO_T prBssSpecInfo;
- P_MSDU_INFO_T prMsduInfo;
- P_ACTION_SA_QUERY_FRAME prTxFrame;
- UINT_16 u2PayloadLen;
- PUINT_8 pucTmp = NULL;
- UINT_8 ucTransId[ACTION_SA_QUERY_TR_ID_LEN];
- prBssInfo = prAdapter->prAisBssInfo;
- ASSERT(prBssInfo);
- prBssSpecInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
- ASSERT(prBssSpecInfo);
- DBGLOG(RSN, INFO, "MFP: Start Sa Query\n");
- if (prBssInfo->prStaRecOfAP == NULL) {
- DBGLOG(RSN, INFO, "MFP: unassociated AP!\n");
- return;
- }
- if (prBssSpecInfo->u4SaQueryCount > 0 && rsnCheckSaQueryTimeout(prAdapter)) {
- DBGLOG(RSN, INFO, "MFP: u4SaQueryCount count =%lu\n", prBssSpecInfo->u4SaQueryCount);
- return;
- }
- prMsduInfo = (P_MSDU_INFO_T) cnmMgtPktAlloc(prAdapter, MAC_TX_RESERVED_FIELD + PUBLIC_ACTION_MAX_LEN);
- if (!prMsduInfo)
- return;
- prTxFrame = (P_ACTION_SA_QUERY_FRAME)
- ((ULONG) (prMsduInfo->prPacket) + MAC_TX_RESERVED_FIELD);
- prTxFrame->u2FrameCtrl = MAC_FRAME_ACTION;
- if (rsnCheckBipKeyInstalled(prAdapter, prBssInfo->prStaRecOfAP))
- prTxFrame->u2FrameCtrl |= MASK_FC_PROTECTED_FRAME;
- COPY_MAC_ADDR(prTxFrame->aucDestAddr, prBssInfo->aucBSSID);
- COPY_MAC_ADDR(prTxFrame->aucSrcAddr, prBssInfo->aucOwnMacAddr);
- COPY_MAC_ADDR(prTxFrame->aucBSSID, prBssInfo->aucBSSID);
- prTxFrame->ucCategory = CATEGORY_SA_QUERY_ACTION;
- prTxFrame->ucAction = ACTION_SA_QUERY_REQUEST;
- if (prBssSpecInfo->u4SaQueryCount == 0)
- GET_CURRENT_SYSTIME(&prBssSpecInfo->u4SaQueryStart);
- if (prBssSpecInfo->u4SaQueryCount) {
- pucTmp = kalMemAlloc(prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN, VIR_MEM_TYPE);
- if (!pucTmp) {
- DBGLOG(RSN, INFO, "MFP: Fail to alloc tmp buffer for backup sa query id\n");
- cnmMgtPktFree(prAdapter, prMsduInfo);
- return;
- }
- kalMemCopy(pucTmp, prBssSpecInfo->pucSaQueryTransId,
- prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN);
- }
- kalMemFree(prBssSpecInfo->pucSaQueryTransId, VIR_MEM_TYPE,
- prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN);
- ucTransId[0] = (UINT_8) (kalRandomNumber() & 0xFF);
- ucTransId[1] = (UINT_8) (kalRandomNumber() & 0xFF);
- kalMemCopy(prTxFrame->ucTransId, ucTransId, ACTION_SA_QUERY_TR_ID_LEN);
- prBssSpecInfo->u4SaQueryCount++;
- prBssSpecInfo->pucSaQueryTransId =
- kalMemAlloc(prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN, VIR_MEM_TYPE);
- if (!prBssSpecInfo->pucSaQueryTransId) {
- kalMemFree(pucTmp, VIR_MEM_TYPE, (prBssSpecInfo->u4SaQueryCount - 1) * ACTION_SA_QUERY_TR_ID_LEN);
- DBGLOG(RSN, INFO, "MFP: Fail to alloc buffer for sa query id list\n");
- cnmMgtPktFree(prAdapter, prMsduInfo);
- return;
- }
- if (pucTmp) {
- kalMemCopy(prBssSpecInfo->pucSaQueryTransId, pucTmp,
- (prBssSpecInfo->u4SaQueryCount - 1) * ACTION_SA_QUERY_TR_ID_LEN);
- kalMemCopy(&prBssSpecInfo->pucSaQueryTransId[(prBssSpecInfo->u4SaQueryCount -
- 1) * ACTION_SA_QUERY_TR_ID_LEN], ucTransId,
- ACTION_SA_QUERY_TR_ID_LEN);
- kalMemFree(pucTmp, VIR_MEM_TYPE, (prBssSpecInfo->u4SaQueryCount - 1) * ACTION_SA_QUERY_TR_ID_LEN);
- } else {
- kalMemCopy(prBssSpecInfo->pucSaQueryTransId, ucTransId, ACTION_SA_QUERY_TR_ID_LEN);
- }
- u2PayloadLen = 2 + ACTION_SA_QUERY_TR_ID_LEN;
- /* 4 <3> Update information of MSDU_INFO_T */
- TX_SET_MMPDU(prAdapter,
- prMsduInfo,
- prBssInfo->prStaRecOfAP->ucBssIndex,
- prBssInfo->prStaRecOfAP->ucIndex,
- WLAN_MAC_MGMT_HEADER_LEN, WLAN_MAC_MGMT_HEADER_LEN + u2PayloadLen, NULL, MSDU_RATE_MODE_AUTO);
- if (rsnCheckBipKeyInstalled(prAdapter, prBssInfo->prStaRecOfAP)) {
- DBGLOG(RSN, INFO, "Set MSDU_OPT_PROTECTED_FRAME\n");
- nicTxConfigPktOption(prMsduInfo, MSDU_OPT_PROTECTED_FRAME, TRUE);
- }
- /* 4 Enqueue the frame to send this action frame. */
- nicTxEnqueueMsdu(prAdapter, prMsduInfo);
- DBGLOG(RSN, INFO, "Set SA Query timer %lu (%d Tu)\n", prBssSpecInfo->u4SaQueryCount, 201);
- cnmTimerStartTimer(prAdapter, &prBssSpecInfo->rSaQueryTimer, TU_TO_MSEC(201));
- }
- /*----------------------------------------------------------------------------*/
- /*!
- *
- * \brief This routine is called to start the 802.11w sa query.
- *
- *
- * \note
- * Called by: AIS module, Handle Rx mgmt request
- */
- /*----------------------------------------------------------------------------*/
- void rsnStartSaQuery(IN P_ADAPTER_T prAdapter)
- {
- P_AIS_SPECIFIC_BSS_INFO_T prBssSpecInfo;
- prBssSpecInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
- ASSERT(prBssSpecInfo);
- if (prBssSpecInfo->u4SaQueryCount == 0)
- rsnStartSaQueryTimer(prAdapter, (ULONG) NULL);
- }
- /*----------------------------------------------------------------------------*/
- /*!
- *
- * \brief This routine is called to stop the 802.11w sa query.
- *
- *
- * \note
- * Called by: AIS module, Handle Rx mgmt request
- */
- /*----------------------------------------------------------------------------*/
- void rsnStopSaQuery(IN P_ADAPTER_T prAdapter)
- {
- P_AIS_SPECIFIC_BSS_INFO_T prBssSpecInfo;
- prBssSpecInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
- ASSERT(prBssSpecInfo);
- cnmTimerStopTimer(prAdapter, &prBssSpecInfo->rSaQueryTimer);
- kalMemFree(prBssSpecInfo->pucSaQueryTransId, VIR_MEM_TYPE,
- prBssSpecInfo->u4SaQueryCount * ACTION_SA_QUERY_TR_ID_LEN);
- prBssSpecInfo->pucSaQueryTransId = NULL;
- prBssSpecInfo->u4SaQueryCount = 0;
- }
- /*----------------------------------------------------------------------------*/
- /*!
- *
- * \brief This routine is called to process the 802.11w sa query action frame.
- *
- *
- * \note
- * Called by: AIS module, Handle Rx mgmt request
- */
- /*----------------------------------------------------------------------------*/
- void rsnSaQueryRequest(IN P_ADAPTER_T prAdapter, IN P_SW_RFB_T prSwRfb)
- {
- P_BSS_INFO_T prBssInfo;
- P_MSDU_INFO_T prMsduInfo;
- P_ACTION_SA_QUERY_FRAME prRxFrame = NULL;
- UINT_16 u2PayloadLen;
- P_STA_RECORD_T prStaRec;
- P_ACTION_SA_QUERY_FRAME prTxFrame;
- prBssInfo = prAdapter->prAisBssInfo;
- ASSERT(prBssInfo);
- if (!prSwRfb)
- return;
- prRxFrame = (P_ACTION_SA_QUERY_FRAME) prSwRfb->pvHeader;
- if (!prRxFrame)
- return;
- prStaRec = cnmGetStaRecByIndex(prAdapter, prSwRfb->ucStaRecIdx);
- if (!prStaRec) /* Todo:: for not AIS check */
- return;
- DBGLOG(RSN, INFO, "IEEE 802.11: Received SA Query Request from " MACSTR "\n",
- MAC2STR(prStaRec->aucMacAddr));
- DBGLOG_MEM8(RSN, INFO, prRxFrame->ucTransId, ACTION_SA_QUERY_TR_ID_LEN);
- if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_DISCONNECTED) {
- DBGLOG(RSN, INFO, "IEEE 802.11: Ignore SA Query Request from unassociated STA " MACSTR "\n",
- MAC2STR(prStaRec->aucMacAddr));
- return;
- }
- DBGLOG(RSN, INFO, "IEEE 802.11: Sending SA Query Response to " MACSTR "\n", MAC2STR(prStaRec->aucMacAddr));
- prMsduInfo = (P_MSDU_INFO_T) cnmMgtPktAlloc(prAdapter, MAC_TX_RESERVED_FIELD + PUBLIC_ACTION_MAX_LEN);
- if (!prMsduInfo)
- return;
- prTxFrame = (P_ACTION_SA_QUERY_FRAME)
- ((ULONG) (prMsduInfo->prPacket) + MAC_TX_RESERVED_FIELD);
- prTxFrame->u2FrameCtrl = MAC_FRAME_ACTION;
- if (rsnCheckBipKeyInstalled(prAdapter, prBssInfo->prStaRecOfAP))
- prTxFrame->u2FrameCtrl |= MASK_FC_PROTECTED_FRAME;
- COPY_MAC_ADDR(prTxFrame->aucDestAddr, prBssInfo->aucBSSID);
- COPY_MAC_ADDR(prTxFrame->aucSrcAddr, prBssInfo->aucOwnMacAddr);
- COPY_MAC_ADDR(prTxFrame->aucBSSID, prBssInfo->aucBSSID);
- prTxFrame->ucCategory = CATEGORY_SA_QUERY_ACTION;
- prTxFrame->ucAction = ACTION_SA_QUERY_RESPONSE;
- kalMemCopy(prTxFrame->ucTransId, prRxFrame->ucTransId, ACTION_SA_QUERY_TR_ID_LEN);
- u2PayloadLen = 2 + ACTION_SA_QUERY_TR_ID_LEN;
- /* 4 <3> Update information of MSDU_INFO_T */
- TX_SET_MMPDU(prAdapter,
- prMsduInfo,
- prBssInfo->prStaRecOfAP->ucBssIndex,
- prBssInfo->prStaRecOfAP->ucIndex,
- WLAN_MAC_MGMT_HEADER_LEN, WLAN_MAC_MGMT_HEADER_LEN + u2PayloadLen, NULL, MSDU_RATE_MODE_AUTO);
- if (rsnCheckBipKeyInstalled(prAdapter, prBssInfo->prStaRecOfAP)) {
- DBGLOG(RSN, INFO, "Set MSDU_OPT_PROTECTED_FRAME\n");
- nicTxConfigPktOption(prMsduInfo, MSDU_OPT_PROTECTED_FRAME, TRUE);
- }
- #if 0
- /* 4 Update information of MSDU_INFO_T */
- prMsduInfo->ucPacketType = HIF_TX_PACKET_TYPE_MGMT; /* Management frame */
- prMsduInfo->ucStaRecIndex = prBssInfo->prStaRecOfAP->ucIndex;
- prMsduInfo->ucNetworkType = prBssInfo->ucNetTypeIndex;
- prMsduInfo->ucMacHeaderLength = WLAN_MAC_MGMT_HEADER_LEN;
- prMsduInfo->fgIs802_1x = FALSE;
- prMsduInfo->fgIs802_11 = TRUE;
- prMsduInfo->u2FrameLength = WLAN_MAC_MGMT_HEADER_LEN + u2PayloadLen;
- prMsduInfo->ucPID = nicAssignPID(prAdapter);
- prMsduInfo->pfTxDoneHandler = NULL;
- prMsduInfo->fgIsBasicRate = FALSE;
- #endif
- /* 4 Enqueue the frame to send this action frame. */
- nicTxEnqueueMsdu(prAdapter, prMsduInfo);
- }
- /*----------------------------------------------------------------------------*/
- /*!
- *
- * \brief This routine is called to process the 802.11w sa query action frame.
- *
- *
- * \note
- * Called by: AIS module, Handle Rx mgmt request
- */
- /*----------------------------------------------------------------------------*/
- void rsnSaQueryAction(IN P_ADAPTER_T prAdapter, IN P_SW_RFB_T prSwRfb)
- {
- P_AIS_SPECIFIC_BSS_INFO_T prBssSpecInfo;
- P_ACTION_SA_QUERY_FRAME prRxFrame;
- P_STA_RECORD_T prStaRec;
- UINT_32 i;
- prBssSpecInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
- ASSERT(prBssSpecInfo);
- prRxFrame = (P_ACTION_SA_QUERY_FRAME) prSwRfb->pvHeader;
- prStaRec = cnmGetStaRecByIndex(prAdapter, prSwRfb->ucStaRecIdx);
- if (!prStaRec)
- return;
- if (prSwRfb->u2PacketLen < ACTION_SA_QUERY_TR_ID_LEN) {
- DBGLOG(RSN, INFO, "IEEE 802.11: Too short SA Query Action frame (len=%lu)\n",
- (unsigned long)prSwRfb->u2PacketLen);
- return;
- }
- if (prRxFrame->ucAction == ACTION_SA_QUERY_REQUEST) {
- rsnSaQueryRequest(prAdapter, prSwRfb);
- return;
- }
- if (prRxFrame->ucAction != ACTION_SA_QUERY_RESPONSE) {
- DBGLOG(RSN, INFO, "IEEE 802.11: Unexpected SA Query " "Action %d\n", prRxFrame->ucAction);
- return;
- }
- DBGLOG(RSN, INFO, "IEEE 802.11: Received SA Query Response from " MACSTR "\n", MAC2STR(prStaRec->aucMacAddr));
- DBGLOG_MEM8(RSN, INFO, prRxFrame->ucTransId, ACTION_SA_QUERY_TR_ID_LEN);
- /* MLME-SAQuery.confirm */
- for (i = 0; i < prBssSpecInfo->u4SaQueryCount; i++) {
- if (kalMemCmp(prBssSpecInfo->pucSaQueryTransId +
- i * ACTION_SA_QUERY_TR_ID_LEN, prRxFrame->ucTransId, ACTION_SA_QUERY_TR_ID_LEN) == 0)
- break;
- }
- if (i >= prBssSpecInfo->u4SaQueryCount) {
- DBGLOG(RSN, INFO, "IEEE 802.11: No matching SA Query " "transaction identifier found\n");
- return;
- }
- DBGLOG(RSN, INFO, "Reply to pending SA Query received\n");
- rsnStopSaQuery(prAdapter);
- }
- #endif
- #if CFG_SUPPORT_AAA
- #define WPS_DEV_OUI_WFA 0x0050f204
- #define ATTR_RESPONSE_TYPE 0x103b
- #define ATTR_VERSION 0x104a
- #define ATTR_VENDOR_EXT 0x1049
- #define WPS_VENDOR_ID_WFA 14122
- VOID rsnGenerateWSCIEForAssocRsp(P_ADAPTER_T prAdapter, P_MSDU_INFO_T prMsduInfo)
- {
- P_IE_HDR_T PucIE;
- PUINT_8 puc;
- P_WIFI_VAR_T prWifiVar = NULL;
- ASSERT(prAdapter);
- ASSERT(prMsduInfo);
- ASSERT(IS_NET_ACTIVE(prAdapter, prMsduInfo->ucBssIndex));
- prWifiVar = &(prAdapter->rWifiVar);
- ASSERT(prWifiVar);
- if (!prWifiVar->ucApWpsMode) /* Todo::Only at WPS certification ? */
- return;
- DBGLOG(RSN, TRACE, "WPS: Building WPS IE for (Re)Association Response");
- PucIE = (P_IE_HDR_T) (((PUINT_8) prMsduInfo->prPacket) + prMsduInfo->u2FrameLength);
- PucIE->ucId = ELEM_ID_VENDOR;
- puc = PucIE->aucInfo;
- WLAN_SET_FIELD_BE32(puc, WPS_DEV_OUI_WFA);
- puc += 4;
- WLAN_SET_FIELD_BE16(puc, ATTR_VERSION);
- puc += 2;
- WLAN_SET_FIELD_BE16(puc, 1);
- puc += 2;
- *puc = 0x10;
- puc++;
- WLAN_SET_FIELD_BE16(puc, ATTR_RESPONSE_TYPE);
- puc += 2;
- WLAN_SET_FIELD_BE16(puc, 1);
- puc += 2;
- *puc = 0x3;
- puc++;
- WLAN_SET_FIELD_BE16(puc, ATTR_VENDOR_EXT);
- puc += 2;
- WLAN_SET_FIELD_BE16(puc, 6);
- puc += 2;
- WLAN_SET_FIELD_BE24(puc, 14122);
- puc += 3;
- *puc = 0x00; /* Version 2 */
- puc++;
- *puc = 0x01;
- puc++;
- *puc = 0x20; /* WPS2.0 */
- puc++;
- PucIE->ucLength = puc - PucIE->aucInfo;
- prMsduInfo->u2FrameLength += IE_SIZE(PucIE);
- }
- #endif
|