blob: fbbb3088284f4237b7171b3096b3a029af78d213 [file] [log] [blame]
/******************************************************************************
*
* This file is provided under a dual license. When you use or
* distribute this software, you may choose to be licensed under
* version 2 of the GNU General Public License ("GPLv2 License")
* or BSD License.
*
* GPLv2 License
*
* Copyright(C) 2016 MediaTek Inc.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of version 2 of the GNU General Public License as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
* See http://www.gnu.org/licenses/gpl-2.0.html for more details.
*
* BSD LICENSE
*
* Copyright(C) 2016 MediaTek Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
* * Neither the name of the copyright holder nor the names of its
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
*****************************************************************************/
/*
** Id: //Department/DaVinci/BRANCHES/MT6620_WIFI_DRIVER_V2_3/mgmt/wapi.c#1
*/
/*! \file "wapi.c"
* \brief This file including the WAPI related function.
*
* This file provided the macros and functions library support the wapi ie parsing,
* cipher and AKM check to help the AP seleced deciding.
*/
/*******************************************************************************
* C O M P I L E R F L A G S
********************************************************************************
*/
/*******************************************************************************
* E X T E R N A L R E F E R E N C E S
********************************************************************************
*/
#include "precomp.h"
#if CFG_SUPPORT_WAPI
/*******************************************************************************
* C O N S T A N T S
********************************************************************************
*/
/*******************************************************************************
* D A T A T Y P E S
********************************************************************************
*/
/*******************************************************************************
* P U B L I C D A T A
********************************************************************************
*/
/*******************************************************************************
* P R I V A T E D A T A
********************************************************************************
*/
/*******************************************************************************
* M A C R O S
********************************************************************************
*/
/*******************************************************************************
* F U N C T I O N D E C L A R A T I O N S
********************************************************************************
*/
/*******************************************************************************
* F U N C T I O N S
********************************************************************************
*/
/*----------------------------------------------------------------------------*/
/*!
*
* \brief This routine is called to generate WPA IE for
* associate request frame.
*
* \param[in] prCurrentBss The Selected BSS description
*
* \retval The append WPA IE length
*
* \note
* Called by: AIS module, Associate request
*/
/*----------------------------------------------------------------------------*/
VOID wapiGenerateWAPIIE(IN P_ADAPTER_T prAdapter, IN P_MSDU_INFO_T prMsduInfo)
{
PUINT_8 pucBuffer;
ASSERT(prAdapter);
ASSERT(prMsduInfo);
if (prMsduInfo->ucBssIndex != prAdapter->prAisBssInfo->ucBssIndex)
return;
pucBuffer = (PUINT_8) ((ULONG) prMsduInfo->prPacket + (ULONG) prMsduInfo->u2FrameLength);
/* ASSOC INFO IE ID: 68 :0x44 */
if (/* prWlanInfo->fgWapiMode && */ prAdapter->prGlueInfo->u2WapiAssocInfoIESz) {
kalMemCopy(pucBuffer, &prAdapter->prGlueInfo->aucWapiAssocInfoIEs,
prAdapter->prGlueInfo->u2WapiAssocInfoIESz);
prMsduInfo->u2FrameLength += prAdapter->prGlueInfo->u2WapiAssocInfoIESz;
}
}
/*----------------------------------------------------------------------------*/
/*!
* \brief This routine is called to parse WAPI IE.
*
* \param[in] prInfoElem Pointer to the RSN IE
* \param[out] prRsnInfo Pointer to the BSSDescription structure to store the
** WAPI information from the given WAPI IE
*
* \retval TRUE - Succeeded
* \retval FALSE - Failed
*/
/*----------------------------------------------------------------------------*/
BOOLEAN wapiParseWapiIE(IN P_WAPI_INFO_ELEM_T prInfoElem, OUT P_WAPI_INFO_T prWapiInfo)
{
UINT_32 i;
INT_32 u4RemainWapiIeLen;
UINT_16 u2Version;
UINT_16 u2Cap = 0;
UINT_32 u4GroupSuite = WAPI_CIPHER_SUITE_WPI;
UINT_16 u2PairSuiteCount = 0;
UINT_16 u2AuthSuiteCount = 0;
PUCHAR pucPairSuite = NULL;
PUCHAR pucAuthSuite = NULL;
PUCHAR cp;
DEBUGFUNC("wapiParseWapiIE");
ASSERT(prInfoElem);
ASSERT(prWapiInfo);
/* Verify the length of the WAPI IE. */
if (prInfoElem->ucLength < 6) {
DBGLOG(SEC, TRACE, "WAPI IE length too short (length=%d)\n", prInfoElem->ucLength);
return FALSE;
}
/* Check WAPI version: currently, we only support version 1. */
WLAN_GET_FIELD_16(&prInfoElem->u2Version, &u2Version);
if (u2Version != 1) {
DBGLOG(SEC, TRACE, "Unsupported WAPI IE version: %d\n", u2Version);
return FALSE;
}
cp = (PUCHAR) &prInfoElem->u2AuthKeyMgtSuiteCount;
u4RemainWapiIeLen = (INT_32) prInfoElem->ucLength - 2;
do {
if (u4RemainWapiIeLen == 0)
break;
/*
* AuthCount : 2
* AuthSuite : 4 * authSuiteCount
* PairwiseCount: 2
* PairwiseSuite: 4 * pairSuiteCount
* GroupSuite : 4
* Cap : 2
*/
/* Parse the Authentication and Key Management Cipher Suite Count field. */
if (u4RemainWapiIeLen < 2) {
DBGLOG(SEC, TRACE,
"Fail to parse WAPI IE in auth & key mgt suite count (IE len: %d)\n",
prInfoElem->ucLength);
return FALSE;
}
WLAN_GET_FIELD_16(cp, &u2AuthSuiteCount);
cp += 2;
u4RemainWapiIeLen -= 2;
/* Parse the Authentication and Key Management Cipher Suite List field. */
i = (UINT_32) u2AuthSuiteCount * 4;
if (u4RemainWapiIeLen < (INT_32) i) {
DBGLOG(SEC, TRACE,
"Fail to parse WAPI IE in auth & key mgt suite list (IE len: %d)\n",
prInfoElem->ucLength);
return FALSE;
}
pucAuthSuite = cp;
cp += i;
u4RemainWapiIeLen -= (INT_32) i;
if (u4RemainWapiIeLen == 0)
break;
/* Parse the Pairwise Key Cipher Suite Count field. */
if (u4RemainWapiIeLen < 2) {
DBGLOG(SEC, TRACE,
"Fail to parse WAPI IE in pairwise cipher suite count (IE len: %d)\n",
prInfoElem->ucLength);
return FALSE;
}
WLAN_GET_FIELD_16(cp, &u2PairSuiteCount);
cp += 2;
u4RemainWapiIeLen -= 2;
/* Parse the Pairwise Key Cipher Suite List field. */
i = (UINT_32) u2PairSuiteCount * 4;
if (u4RemainWapiIeLen < (INT_32) i) {
DBGLOG(SEC, TRACE,
"Fail to parse WAPI IE in pairwise cipher suite list (IE len: %d)\n",
prInfoElem->ucLength);
return FALSE;
}
pucPairSuite = cp;
cp += i;
u4RemainWapiIeLen -= (INT_32) i;
/* Parse the Group Key Cipher Suite field. */
if (u4RemainWapiIeLen < 4) {
DBGLOG(SEC, TRACE,
"Fail to parse WAPI IE in group cipher suite (IE len: %d)\n", prInfoElem->ucLength);
return FALSE;
}
WLAN_GET_FIELD_32(cp, &u4GroupSuite);
cp += 4;
u4RemainWapiIeLen -= 4;
/* Parse the WAPI u2Capabilities field. */
if (u4RemainWapiIeLen < 2) {
DBGLOG(SEC, TRACE,
"Fail to parse WAPI IE in WAPI capabilities (IE len: %d)\n", prInfoElem->ucLength);
return FALSE;
}
WLAN_GET_FIELD_16(cp, &u2Cap);
u4RemainWapiIeLen -= 2;
/* Todo:: BKID support */
} while (FALSE);
/* Save the WAPI information for the BSS. */
prWapiInfo->ucElemId = ELEM_ID_WAPI;
prWapiInfo->u2Version = u2Version;
prWapiInfo->u4GroupKeyCipherSuite = u4GroupSuite;
DBGLOG(SEC, LOUD, "WAPI: version %d, group key cipher suite %02x-%02x-%02x-%02x\n",
u2Version, (UCHAR) (u4GroupSuite & 0x000000FF),
(UCHAR) ((u4GroupSuite >> 8) & 0x000000FF),
(UCHAR) ((u4GroupSuite >> 16) & 0x000000FF), (UCHAR) ((u4GroupSuite >> 24) & 0x000000FF));
if (pucPairSuite) {
/* The information about the pairwise key cipher suites is present. */
if (u2PairSuiteCount > MAX_NUM_SUPPORTED_WAPI_CIPHER_SUITES)
u2PairSuiteCount = MAX_NUM_SUPPORTED_WAPI_CIPHER_SUITES;
prWapiInfo->u4PairwiseKeyCipherSuiteCount = (UINT_32) u2PairSuiteCount;
for (i = 0; i < (UINT_32) u2PairSuiteCount; i++) {
WLAN_GET_FIELD_32(pucPairSuite, &prWapiInfo->au4PairwiseKeyCipherSuite[i]);
pucPairSuite += 4;
DBGLOG(SEC, LOUD,
"WAPI: pairwise key cipher suite [%d]: %02x-%02x-%02x-%02x\n",
(UINT_8) i,
(UCHAR) (prWapiInfo->au4PairwiseKeyCipherSuite[i] & 0x000000FF),
(UCHAR) ((prWapiInfo->au4PairwiseKeyCipherSuite[i] >> 8) & 0x000000FF),
(UCHAR) ((prWapiInfo->au4PairwiseKeyCipherSuite[i] >> 16) & 0x000000FF),
(UCHAR) ((prWapiInfo->au4PairwiseKeyCipherSuite[i] >> 24) & 0x000000FF));
}
} else {
/* The information about the pairwise key cipher suites is not present.
* Use the default chipher suite for WAPI: WPI.
*/
prWapiInfo->u4PairwiseKeyCipherSuiteCount = 1;
prWapiInfo->au4PairwiseKeyCipherSuite[0] = WAPI_CIPHER_SUITE_WPI;
DBGLOG(SEC, LOUD,
"WAPI: pairwise key cipher suite: %02x-%02x-%02x-%02x (default)\n",
(UCHAR) (prWapiInfo->au4PairwiseKeyCipherSuite[0] & 0x000000FF),
(UCHAR) ((prWapiInfo->au4PairwiseKeyCipherSuite[0] >> 8) & 0x000000FF),
(UCHAR) ((prWapiInfo->au4PairwiseKeyCipherSuite[0] >> 16) & 0x000000FF),
(UCHAR) ((prWapiInfo->au4PairwiseKeyCipherSuite[0] >> 24) & 0x000000FF));
}
if (pucAuthSuite) {
/* The information about the authentication and key management suites
* is present.
*/
if (u2AuthSuiteCount > MAX_NUM_SUPPORTED_WAPI_AKM_SUITES)
u2AuthSuiteCount = MAX_NUM_SUPPORTED_WAPI_AKM_SUITES;
prWapiInfo->u4AuthKeyMgtSuiteCount = (UINT_32) u2AuthSuiteCount;
for (i = 0; i < (UINT_32) u2AuthSuiteCount; i++) {
WLAN_GET_FIELD_32(pucAuthSuite, &prWapiInfo->au4AuthKeyMgtSuite[i]);
pucAuthSuite += 4;
DBGLOG(SEC, LOUD, "WAPI: AKM suite [%d]: %02x-%02x-%02x-%02x\n",
(UINT_8) i,
(UCHAR) (prWapiInfo->au4AuthKeyMgtSuite[i] & 0x000000FF),
(UCHAR) ((prWapiInfo->au4AuthKeyMgtSuite[i] >> 8) & 0x000000FF),
(UCHAR) ((prWapiInfo->au4AuthKeyMgtSuite[i] >> 16) & 0x000000FF),
(UCHAR) ((prWapiInfo->au4AuthKeyMgtSuite[i] >> 24) & 0x000000FF));
}
} else {
/* The information about the authentication and key management suites
* is not present. Use the default AKM suite for WAPI.
*/
prWapiInfo->u4AuthKeyMgtSuiteCount = 1;
prWapiInfo->au4AuthKeyMgtSuite[0] = WAPI_AKM_SUITE_802_1X;
DBGLOG(SEC, LOUD, "WAPI: AKM suite: %02x-%02x-%02x-%02x (default)\n",
(UCHAR) (prWapiInfo->au4AuthKeyMgtSuite[0] & 0x000000FF),
(UCHAR) ((prWapiInfo->au4AuthKeyMgtSuite[0] >> 8) & 0x000000FF),
(UCHAR) ((prWapiInfo->au4AuthKeyMgtSuite[0] >> 16) & 0x000000FF),
(UCHAR) ((prWapiInfo->au4AuthKeyMgtSuite[0] >> 24) & 0x000000FF));
}
prWapiInfo->u2WapiCap = u2Cap;
DBGLOG(SEC, LOUD, "WAPI: cap: 0x%04x\n", prWapiInfo->u2WapiCap);
return TRUE;
} /* wapiParseWapiIE */
/*----------------------------------------------------------------------------*/
/*!
* \brief This routine is called to perform WAPI policy selection for a given BSS.
*
* \param[in] prAdapter Pointer to the adapter object data area.
* \param[in] prBss Pointer to the BSS description
*
* \retval TRUE - The WAPI policy selection for the given BSS is
* successful. The selected pairwise and group cipher suites
* are returned in the BSS description.
* \retval FALSE - The WAPI policy selection for the given BSS is failed.
* The driver shall not attempt to join the given BSS.
*
* \note The Encrypt status matched score will save to bss for final ap select.
*/
/*----------------------------------------------------------------------------*/
BOOLEAN wapiPerformPolicySelection(IN P_ADAPTER_T prAdapter, IN P_BSS_DESC_T prBss)
{
UINT_32 i;
UINT_32 u4PairwiseCipher = 0;
UINT_32 u4GroupCipher = 0;
UINT_32 u4AkmSuite = 0;
P_WAPI_INFO_T prBssWapiInfo;
P_WLAN_INFO_T prWlanInfo;
DEBUGFUNC("wapiPerformPolicySelection");
ASSERT(prBss);
/* Notice!!!! WAPI AP not set the privacy bit for WAI and WAI-PSK at WZC configuration mode */
prWlanInfo = &prAdapter->rWlanInfo;
if (prBss->fgIEWAPI) {
prBssWapiInfo = &prBss->rIEWAPI;
} else {
if (prAdapter->rWifiVar.rConnSettings.fgWapiMode == FALSE) {
DBGLOG(SEC, TRACE, "-- No Protected BSS\n");
return TRUE;
}
DBGLOG(SEC, TRACE, "WAPI Information Element does not exist.\n");
return FALSE;
}
/* Select pairwise/group ciphers */
for (i = 0; i < prBssWapiInfo->u4PairwiseKeyCipherSuiteCount; i++) {
if (prBssWapiInfo->au4PairwiseKeyCipherSuite[i] ==
prAdapter->rWifiVar.rConnSettings.u4WapiSelectedPairwiseCipher) {
u4PairwiseCipher = prBssWapiInfo->au4PairwiseKeyCipherSuite[i];
}
}
if (prBssWapiInfo->u4GroupKeyCipherSuite == prAdapter->rWifiVar.rConnSettings.u4WapiSelectedGroupCipher)
u4GroupCipher = prBssWapiInfo->u4GroupKeyCipherSuite;
/* Exception handler */
/* If we cannot find proper pairwise and group cipher suites to join the
* BSS, do not check the supported AKM suites.
*/
if (u4PairwiseCipher == 0 || u4GroupCipher == 0) {
DBGLOG(SEC, TRACE, "Failed to select pairwise/group cipher (0x%08lx/0x%08lx)\n",
u4PairwiseCipher, u4GroupCipher);
return FALSE;
}
/* Select AKM */
/* If the driver cannot support any authentication suites advertised in
* the given BSS, we fail to perform RSNA policy selection.
*/
/* Attempt to find any overlapping supported AKM suite. */
for (i = 0; i < prBssWapiInfo->u4AuthKeyMgtSuiteCount; i++) {
if (prBssWapiInfo->au4AuthKeyMgtSuite[i] == prAdapter->rWifiVar.rConnSettings.u4WapiSelectedAKMSuite) {
u4AkmSuite = prBssWapiInfo->au4AuthKeyMgtSuite[i];
break;
}
}
if (u4AkmSuite == 0) {
DBGLOG(SEC, TRACE, "Cannot support any AKM suites\n");
return FALSE;
}
DBGLOG(SEC, TRACE,
"Selected pairwise/group cipher: %02x-%02x-%02x-%02x/%02x-%02x-%02x-%02x\n",
(UINT_8) (u4PairwiseCipher & 0x000000FF),
(UINT_8) ((u4PairwiseCipher >> 8) & 0x000000FF),
(UINT_8) ((u4PairwiseCipher >> 16) & 0x000000FF),
(UINT_8) ((u4PairwiseCipher >> 24) & 0x000000FF),
(UINT_8) (u4GroupCipher & 0x000000FF), (UINT_8) ((u4GroupCipher >> 8) & 0x000000FF),
(UINT_8) ((u4GroupCipher >> 16) & 0x000000FF), (UINT_8) ((u4GroupCipher >> 24) & 0x000000FF));
DBGLOG(SEC, TRACE, "Selected AKM suite: %02x-%02x-%02x-%02x\n",
(UINT_8) (u4AkmSuite & 0x000000FF),
(UINT_8) ((u4AkmSuite >> 8) & 0x000000FF),
(UINT_8) ((u4AkmSuite >> 16) & 0x000000FF), (UINT_8) ((u4AkmSuite >> 24) & 0x000000FF));
return TRUE;
} /* wapiPerformPolicySelection */
#if 0
/*----------------------------------------------------------------------------*/
/*!
* \brief This routine is use for wapi mode, to update the current wpi tx idx ? 0 :1 .
*
* \param[in] prStaRec Pointer to the Sta record
* \param[out] ucWlanIdx The Rx status->wlanidx field
*
* \retval TRUE - Succeeded
* \retval FALSE - Failed
*/
/*----------------------------------------------------------------------------*/
BOOLEAN wapiUpdateTxKeyIdx(IN P_STA_RECORD_T prStaRec, IN UINT_8 ucWlanIdx)
{
UINT_8 ucKeyId;
if ((ucWlanIdx & BITS(0, 3)) == CIPHER_SUITE_WPI) {
ucKeyId = ((ucWlanIdx & BITS(4, 5)) >> 4);
if (ucKeyId != g_prWifiVar->rAisSpecificBssInfo.ucWpiActivedPWKey) {
DBGLOG(RSN, STATE,
"Change wapi key index from %d->%d\n",
g_prWifiVar->rAisSpecificBssInfo.ucWpiActivedPWKey, ucKeyId);
g_prWifiVar->rAisSpecificBssInfo.ucWpiActivedPWKey = ucKeyId;
prStaRec->ucWlanIndex =
(ucKeyId ==
WTBL_AIS_BSSID_WAPI_IDX_0) ? WTBL_AIS_BSSID_WAPI_IDX_0 : WTBL_AIS_BSSID_WAPI_IDX_1;
}
}
}
#endif
#endif