1 // SPDX-License-Identifier: GPL-2.0
2 /******************************************************************************
4 * Copyright(c) 2007 - 2012 Realtek Corporation. All rights reserved.
6 ******************************************************************************/
8 #include <linux/etherdevice.h>
10 #include <rtw_debug.h>
12 #include <hal_btcoex.h>
13 #include <linux/jiffies.h>
14 #include <linux/kernel.h>
16 #define RTL_IOCTL_WPA_SUPPLICANT (SIOCIWFIRSTPRIV+30)
18 static int wpa_set_auth_algs(struct net_device *dev, u32 value)
20 struct adapter *padapter = rtw_netdev_priv(dev);
23 if ((value & IW_AUTH_ALG_SHARED_KEY) && (value & IW_AUTH_ALG_OPEN_SYSTEM)) {
24 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
25 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeAutoSwitch;
26 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Auto;
27 } else if (value & IW_AUTH_ALG_SHARED_KEY) {
28 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
30 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeShared;
31 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Shared;
32 } else if (value & IW_AUTH_ALG_OPEN_SYSTEM) {
33 /* padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled; */
34 if (padapter->securitypriv.ndisauthtype < Ndis802_11AuthModeWPAPSK) {
35 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeOpen;
36 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open;
46 static int wpa_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len)
50 u32 wep_key_idx, wep_key_len, wep_total_len;
51 struct ndis_802_11_wep *pwep = NULL;
52 struct adapter *padapter = rtw_netdev_priv(dev);
53 struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
54 struct security_priv *psecuritypriv = &padapter->securitypriv;
56 param->u.crypt.err = 0;
57 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
59 if (param_len < (u32)((u8 *)param->u.crypt.key - (u8 *)param) + param->u.crypt.key_len) {
64 if (param->sta_addr[0] != 0xff || param->sta_addr[1] != 0xff ||
65 param->sta_addr[2] != 0xff || param->sta_addr[3] != 0xff ||
66 param->sta_addr[4] != 0xff || param->sta_addr[5] != 0xff) {
71 if (strcmp(param->u.crypt.alg, "WEP") == 0)
72 max_idx = WEP_KEYS - 1;
74 max_idx = BIP_MAX_KEYID;
76 if (param->u.crypt.idx > max_idx) {
77 netdev_err(dev, "Error crypt.idx %d > %d\n", param->u.crypt.idx, max_idx);
82 if (strcmp(param->u.crypt.alg, "WEP") == 0) {
84 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
85 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
86 padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_;
88 wep_key_idx = param->u.crypt.idx;
89 wep_key_len = param->u.crypt.key_len;
91 if (wep_key_len > 0) {
92 wep_key_len = wep_key_len <= 5 ? 5 : 13;
93 wep_total_len = wep_key_len + FIELD_OFFSET(struct ndis_802_11_wep, key_material);
94 /* Allocate a full structure to avoid potentially running off the end. */
95 pwep = kzalloc(sizeof(*pwep), GFP_KERNEL);
101 pwep->key_length = wep_key_len;
102 pwep->length = wep_total_len;
104 if (wep_key_len == 13) {
105 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_;
106 padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_;
113 pwep->key_index = wep_key_idx;
114 pwep->key_index |= 0x80000000;
116 memcpy(pwep->key_material, param->u.crypt.key, pwep->key_length);
118 if (param->u.crypt.set_tx) {
119 if (rtw_set_802_11_add_wep(padapter, pwep) == (u8)_FAIL)
122 /* don't update "psecuritypriv->dot11PrivacyAlgrthm" and */
123 /* psecuritypriv->dot11PrivacyKeyIndex =keyid", but can rtw_set_key to fw/cam */
125 if (wep_key_idx >= WEP_KEYS) {
130 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->key_material, pwep->key_length);
131 psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->key_length;
132 rtw_set_key(padapter, psecuritypriv, wep_key_idx, 0, true);
138 if (padapter->securitypriv.dot11AuthAlgrthm == dot11AuthAlgrthm_8021X) { /* 802_1x */
139 struct sta_info *psta, *pbcmc_sta;
140 struct sta_priv *pstapriv = &padapter->stapriv;
142 if (check_fwstate(pmlmepriv, WIFI_STATION_STATE | WIFI_MP_STATE) == true) { /* sta mode */
143 psta = rtw_get_stainfo(pstapriv, get_bssid(pmlmepriv));
145 /* DEBUG_ERR(("Set wpa_set_encryption: Obtain Sta_info fail\n")); */
147 /* Jeff: don't disable ieee8021x_blocked while clearing key */
148 if (strcmp(param->u.crypt.alg, "none") != 0)
149 psta->ieee8021x_blocked = false;
151 if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled) ||
152 (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption3Enabled)) {
153 psta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm;
156 if (param->u.crypt.set_tx == 1) { /* pairwise key */
157 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
159 if (strcmp(param->u.crypt.alg, "TKIP") == 0) { /* set mic key */
160 /* DEBUG_ERR(("\nset key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len)); */
161 memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
162 memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
164 padapter->securitypriv.busetkipkey = false;
165 /* _set_timer(&padapter->securitypriv.tkip_timer, 50); */
168 rtw_setstakey_cmd(padapter, psta, true, true);
169 } else { /* group key */
170 if (strcmp(param->u.crypt.alg, "TKIP") == 0 || strcmp(param->u.crypt.alg, "CCMP") == 0) {
171 memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
172 /* only TKIP group key need to install this */
173 if (param->u.crypt.key_len > 16) {
174 memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
175 memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
177 padapter->securitypriv.binstallGrpkey = true;
179 padapter->securitypriv.dot118021XGrpKeyid = param->u.crypt.idx;
181 rtw_set_key(padapter, &padapter->securitypriv, param->u.crypt.idx, 1, true);
182 } else if (strcmp(param->u.crypt.alg, "BIP") == 0) {
183 /* printk("BIP key_len =%d , index =%d @@@@@@@@@@@@@@@@@@\n", param->u.crypt.key_len, param->u.crypt.idx); */
184 /* save the IGTK key, length 16 bytes */
185 memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
186 /*printk("IGTK key below:\n");
187 for (no = 0;no<16;no++)
188 printk(" %02x ", padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey[no]);
190 padapter->securitypriv.dot11wBIPKeyid = param->u.crypt.idx;
191 padapter->securitypriv.binstallBIPkey = true;
196 pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
198 /* DEBUG_ERR(("Set OID_802_11_ADD_KEY: bcmc stainfo is null\n")); */
200 /* Jeff: don't disable ieee8021x_blocked while clearing key */
201 if (strcmp(param->u.crypt.alg, "none") != 0)
202 pbcmc_sta->ieee8021x_blocked = false;
204 if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled) ||
205 (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption3Enabled)) {
206 pbcmc_sta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm;
209 } else if (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE)) {
220 static int rtw_set_wpa_ie(struct adapter *padapter, char *pie, unsigned short ielen)
223 int group_cipher = 0, pairwise_cipher = 0;
225 u8 null_addr[] = {0, 0, 0, 0, 0, 0};
227 if (ielen > MAX_WPA_IE_LEN || !pie) {
228 _clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS);
236 buf = rtw_zmalloc(ielen);
242 memcpy(buf, pie, ielen);
244 if (ielen < RSN_HEADER_LEN) {
249 if (rtw_parse_wpa_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
250 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
251 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK;
252 memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
255 if (rtw_parse_wpa2_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
256 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
257 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK;
258 memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
261 if (group_cipher == 0)
262 group_cipher = WPA_CIPHER_NONE;
263 if (pairwise_cipher == 0)
264 pairwise_cipher = WPA_CIPHER_NONE;
266 switch (group_cipher) {
267 case WPA_CIPHER_NONE:
268 padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
269 padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
271 case WPA_CIPHER_WEP40:
272 padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_;
273 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
275 case WPA_CIPHER_TKIP:
276 padapter->securitypriv.dot118021XGrpPrivacy = _TKIP_;
277 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
279 case WPA_CIPHER_CCMP:
280 padapter->securitypriv.dot118021XGrpPrivacy = _AES_;
281 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
283 case WPA_CIPHER_WEP104:
284 padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_;
285 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
289 switch (pairwise_cipher) {
290 case WPA_CIPHER_NONE:
291 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
292 padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
294 case WPA_CIPHER_WEP40:
295 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
296 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
298 case WPA_CIPHER_TKIP:
299 padapter->securitypriv.dot11PrivacyAlgrthm = _TKIP_;
300 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
302 case WPA_CIPHER_CCMP:
303 padapter->securitypriv.dot11PrivacyAlgrthm = _AES_;
304 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
306 case WPA_CIPHER_WEP104:
307 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_;
308 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
312 _clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS);
315 u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
317 while (cnt < ielen) {
320 if ((eid == WLAN_EID_VENDOR_SPECIFIC) && (!memcmp(&buf[cnt+2], wps_oui, 4))) {
321 padapter->securitypriv.wps_ie_len = ((buf[cnt+1]+2) < MAX_WPS_IE_LEN) ? (buf[cnt+1]+2):MAX_WPS_IE_LEN;
323 memcpy(padapter->securitypriv.wps_ie, &buf[cnt], padapter->securitypriv.wps_ie_len);
325 set_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS);
331 cnt += buf[cnt+1]+2; /* goto next */
337 /* TKIP and AES disallow multicast packets until installing group key */
338 if (padapter->securitypriv.dot11PrivacyAlgrthm == _TKIP_ ||
339 padapter->securitypriv.dot11PrivacyAlgrthm == _TKIP_WTMIC_ ||
340 padapter->securitypriv.dot11PrivacyAlgrthm == _AES_)
341 /* WPS open need to enable multicast */
342 /* check_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS) == true) */
343 rtw_hal_set_hwreg(padapter, HW_VAR_OFF_RCR_AM, null_addr);
352 static int wpa_set_param(struct net_device *dev, u8 name, u32 value)
355 struct adapter *padapter = rtw_netdev_priv(dev);
358 case IEEE_PARAM_WPA_ENABLED:
360 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; /* 802.1x */
362 /* ret = ieee80211_wpa_enable(ieee, value); */
364 switch ((value)&0xff) {
366 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK; /* WPA_PSK */
367 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
370 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK; /* WPA2_PSK */
371 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
377 case IEEE_PARAM_TKIP_COUNTERMEASURES:
378 /* ieee->tkip_countermeasures =value; */
381 case IEEE_PARAM_DROP_UNENCRYPTED:
385 * wpa_supplicant calls set_wpa_enabled when the driver
386 * is loaded and unloaded, regardless of if WPA is being
387 * used. No other calls are made which can be used to
388 * determine if encryption will be used or not prior to
389 * association being expected. If encryption is not being
390 * used, drop_unencrypted is set to false, else true -- we
391 * can use this to determine if the CAP_PRIVACY_ON bit should
397 case IEEE_PARAM_PRIVACY_INVOKED:
399 /* ieee->privacy_invoked =value; */
403 case IEEE_PARAM_AUTH_ALGS:
405 ret = wpa_set_auth_algs(dev, value);
409 case IEEE_PARAM_IEEE_802_1X:
411 /* ieee->ieee802_1x =value; */
415 case IEEE_PARAM_WPAX_SELECT:
417 /* added for WPA2 mixed mode */
419 spin_lock_irqsave(&ieee->wpax_suitlist_lock, flags);
420 ieee->wpax_type_set = 1;
421 ieee->wpax_type_notify = value;
422 spin_unlock_irqrestore(&ieee->wpax_suitlist_lock, flags);
442 static int wpa_mlme(struct net_device *dev, u32 command, u32 reason)
445 struct adapter *padapter = rtw_netdev_priv(dev);
448 case IEEE_MLME_STA_DEAUTH:
450 if (!rtw_set_802_11_disassociate(padapter))
455 case IEEE_MLME_STA_DISASSOC:
457 if (!rtw_set_802_11_disassociate(padapter))
471 static int wpa_supplicant_ioctl(struct net_device *dev, struct iw_point *p)
473 struct ieee_param *param;
476 /* down(&ieee->wx_sem); */
478 if (!p->pointer || p->length != sizeof(struct ieee_param))
481 param = rtw_malloc(p->length);
485 if (copy_from_user(param, p->pointer, p->length)) {
490 switch (param->cmd) {
492 case IEEE_CMD_SET_WPA_PARAM:
493 ret = wpa_set_param(dev, param->u.wpa_param.name, param->u.wpa_param.value);
496 case IEEE_CMD_SET_WPA_IE:
497 /* ret = wpa_set_wpa_ie(dev, param, p->length); */
498 ret = rtw_set_wpa_ie(rtw_netdev_priv(dev), (char *)param->u.wpa_ie.data, (u16)param->u.wpa_ie.len);
501 case IEEE_CMD_SET_ENCRYPTION:
502 ret = wpa_set_encryption(dev, param, p->length);
506 ret = wpa_mlme(dev, param->u.mlme.command, param->u.mlme.reason_code);
515 if (ret == 0 && copy_to_user(p->pointer, param, p->length))
520 /* up(&ieee->wx_sem); */
524 static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len)
527 u32 wep_key_idx, wep_key_len, wep_total_len;
528 struct ndis_802_11_wep *pwep = NULL;
529 struct sta_info *psta = NULL, *pbcmc_sta = NULL;
530 struct adapter *padapter = rtw_netdev_priv(dev);
531 struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
532 struct security_priv *psecuritypriv = &(padapter->securitypriv);
533 struct sta_priv *pstapriv = &padapter->stapriv;
534 char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey;
535 char *rxkey = padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey;
536 char *grpkey = psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey;
538 param->u.crypt.err = 0;
539 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
541 /* sizeof(struct ieee_param) = 64 bytes; */
542 /* if (param_len != (u32) ((u8 *) param->u.crypt.key - (u8 *) param) + param->u.crypt.key_len) */
543 if (param_len != sizeof(struct ieee_param) + param->u.crypt.key_len) {
548 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
549 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
550 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
551 if (param->u.crypt.idx >= WEP_KEYS) {
556 psta = rtw_get_stainfo(pstapriv, param->sta_addr);
562 if (strcmp(param->u.crypt.alg, "none") == 0 && !psta) {
563 /* todo:clear default encryption keys */
565 psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Open;
566 psecuritypriv->ndisencryptstatus = Ndis802_11EncryptionDisabled;
567 psecuritypriv->dot11PrivacyAlgrthm = _NO_PRIVACY_;
568 psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
574 if (strcmp(param->u.crypt.alg, "WEP") == 0 && !psta) {
575 wep_key_idx = param->u.crypt.idx;
576 wep_key_len = param->u.crypt.key_len;
578 if ((wep_key_idx >= WEP_KEYS) || (wep_key_len <= 0)) {
584 if (wep_key_len > 0) {
585 wep_key_len = wep_key_len <= 5 ? 5 : 13;
586 wep_total_len = wep_key_len + FIELD_OFFSET(struct ndis_802_11_wep, key_material);
587 /* Allocate a full structure to avoid potentially running off the end. */
588 pwep = kzalloc(sizeof(*pwep), GFP_KERNEL);
592 pwep->key_length = wep_key_len;
593 pwep->length = wep_total_len;
597 pwep->key_index = wep_key_idx;
599 memcpy(pwep->key_material, param->u.crypt.key, pwep->key_length);
601 if (param->u.crypt.set_tx) {
602 psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Auto;
603 psecuritypriv->ndisencryptstatus = Ndis802_11Encryption1Enabled;
604 psecuritypriv->dot11PrivacyAlgrthm = _WEP40_;
605 psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
607 if (pwep->key_length == 13) {
608 psecuritypriv->dot11PrivacyAlgrthm = _WEP104_;
609 psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
613 psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx;
615 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->key_material, pwep->key_length);
617 psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->key_length;
619 rtw_ap_set_wep_key(padapter, pwep->key_material, pwep->key_length, wep_key_idx, 1);
621 /* don't update "psecuritypriv->dot11PrivacyAlgrthm" and */
622 /* psecuritypriv->dot11PrivacyKeyIndex =keyid", but can rtw_set_key to cam */
624 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->key_material, pwep->key_length);
626 psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->key_length;
628 rtw_ap_set_wep_key(padapter, pwep->key_material, pwep->key_length, wep_key_idx, 0);
636 if (!psta && check_fwstate(pmlmepriv, WIFI_AP_STATE)) { /* group key */
637 if (param->u.crypt.set_tx == 1) {
638 if (strcmp(param->u.crypt.alg, "WEP") == 0) {
639 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
641 psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
642 if (param->u.crypt.key_len == 13)
643 psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
645 } else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
646 psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
648 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
650 /* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */
652 memcpy(txkey, &(param->u.crypt.key[16]), 8);
653 memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
655 psecuritypriv->busetkipkey = true;
658 else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
659 psecuritypriv->dot118021XGrpPrivacy = _AES_;
661 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
663 psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
666 psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx;
668 psecuritypriv->binstallGrpkey = true;
670 psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/* */
672 rtw_ap_set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx);
674 pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
676 pbcmc_sta->ieee8021x_blocked = false;
677 pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */
685 if (psecuritypriv->dot11AuthAlgrthm == dot11AuthAlgrthm_8021X && psta) { /* psk/802_1x */
686 if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) {
687 if (param->u.crypt.set_tx == 1) {
688 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
690 if (strcmp(param->u.crypt.alg, "WEP") == 0) {
691 psta->dot118021XPrivacy = _WEP40_;
692 if (param->u.crypt.key_len == 13)
693 psta->dot118021XPrivacy = _WEP104_;
694 } else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
695 psta->dot118021XPrivacy = _TKIP_;
697 /* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */
699 memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
700 memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
702 psecuritypriv->busetkipkey = true;
704 } else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
706 psta->dot118021XPrivacy = _AES_;
708 psta->dot118021XPrivacy = _NO_PRIVACY_;
711 rtw_ap_set_pairwise_key(padapter, psta);
713 psta->ieee8021x_blocked = false;
715 } else { /* group key??? */
716 if (strcmp(param->u.crypt.alg, "WEP") == 0) {
717 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
719 psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
720 if (param->u.crypt.key_len == 13)
721 psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
722 } else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
723 psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
725 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
727 /* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */
729 memcpy(txkey, &(param->u.crypt.key[16]), 8);
730 memcpy(rxkey, &(param->u.crypt.key[24]), 8);
732 psecuritypriv->busetkipkey = true;
734 } else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
735 psecuritypriv->dot118021XGrpPrivacy = _AES_;
737 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
739 psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
742 psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx;
744 psecuritypriv->binstallGrpkey = true;
746 psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/* */
748 rtw_ap_set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx);
750 pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
752 pbcmc_sta->ieee8021x_blocked = false;
753 pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */
766 static int rtw_set_beacon(struct net_device *dev, struct ieee_param *param, int len)
769 struct adapter *padapter = rtw_netdev_priv(dev);
770 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
771 struct sta_priv *pstapriv = &padapter->stapriv;
772 unsigned char *pbuf = param->u.bcn_ie.buf;
774 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
777 memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2);
779 if ((pstapriv->max_num_sta > NUM_STA) || (pstapriv->max_num_sta <= 0))
780 pstapriv->max_num_sta = NUM_STA;
783 if (rtw_check_beacon_data(padapter, pbuf, (len-12-2)) == _SUCCESS)/* 12 = param header, 2:no packed */
793 static void rtw_hostapd_sta_flush(struct net_device *dev)
796 /* struct list_head *phead, *plist; */
797 /* struct sta_info *psta = NULL; */
798 struct adapter *padapter = rtw_netdev_priv(dev);
799 /* struct sta_priv *pstapriv = &padapter->stapriv; */
801 flush_all_cam_entry(padapter); /* clear CAM */
803 rtw_sta_flush(padapter);
806 static int rtw_add_sta(struct net_device *dev, struct ieee_param *param)
809 struct sta_info *psta = NULL;
810 struct adapter *padapter = rtw_netdev_priv(dev);
811 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
812 struct sta_priv *pstapriv = &padapter->stapriv;
814 if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
817 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
818 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
819 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
824 psta = rtw_get_stainfo(pstapriv, param->sta_addr);
827 rtw_free_stainfo(padapter, psta);
832 /* psta = rtw_alloc_stainfo(pstapriv, param->sta_addr); */
833 psta = rtw_get_stainfo(pstapriv, param->sta_addr);
835 int flags = param->u.add_sta.flags;
837 psta->aid = param->u.add_sta.aid;/* aid = 1~2007 */
839 memcpy(psta->bssrateset, param->u.add_sta.tx_supp_rates, 16);
843 if (WLAN_STA_WME&flags)
844 psta->qos_option = 1;
846 psta->qos_option = 0;
848 if (pmlmepriv->qospriv.qos_option == 0)
849 psta->qos_option = 0;
851 /* chec 802.11n ht cap. */
852 if (WLAN_STA_HT&flags) {
853 psta->htpriv.ht_option = true;
854 psta->qos_option = 1;
855 memcpy((void *)&psta->htpriv.ht_cap, (void *)¶m->u.add_sta.ht_cap, sizeof(struct ieee80211_ht_cap));
857 psta->htpriv.ht_option = false;
860 if (pmlmepriv->htpriv.ht_option == false)
861 psta->htpriv.ht_option = false;
863 update_sta_info_apmode(padapter, psta);
874 static int rtw_del_sta(struct net_device *dev, struct ieee_param *param)
877 struct sta_info *psta = NULL;
878 struct adapter *padapter = rtw_netdev_priv(dev);
879 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
880 struct sta_priv *pstapriv = &padapter->stapriv;
882 if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
885 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
886 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
887 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
891 psta = rtw_get_stainfo(pstapriv, param->sta_addr);
895 spin_lock_bh(&pstapriv->asoc_list_lock);
896 if (list_empty(&psta->asoc_list) == false) {
897 list_del_init(&psta->asoc_list);
898 pstapriv->asoc_list_cnt--;
899 updated = ap_free_sta(padapter, psta, true, WLAN_REASON_DEAUTH_LEAVING);
902 spin_unlock_bh(&pstapriv->asoc_list_lock);
904 associated_clients_update(padapter, updated);
914 static int rtw_ioctl_get_sta_data(struct net_device *dev, struct ieee_param *param, int len)
917 struct sta_info *psta = NULL;
918 struct adapter *padapter = rtw_netdev_priv(dev);
919 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
920 struct sta_priv *pstapriv = &padapter->stapriv;
921 struct ieee_param_ex *param_ex = (struct ieee_param_ex *)param;
922 struct sta_data *psta_data = (struct sta_data *)param_ex->data;
924 if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
927 if (param_ex->sta_addr[0] == 0xff && param_ex->sta_addr[1] == 0xff &&
928 param_ex->sta_addr[2] == 0xff && param_ex->sta_addr[3] == 0xff &&
929 param_ex->sta_addr[4] == 0xff && param_ex->sta_addr[5] == 0xff) {
933 psta = rtw_get_stainfo(pstapriv, param_ex->sta_addr);
935 psta_data->aid = (u16)psta->aid;
936 psta_data->capability = psta->capability;
937 psta_data->flags = psta->flags;
941 no_short_slot_time_set : BIT(1)
942 no_short_preamble_set : BIT(2)
943 no_ht_gf_set : BIT(3)
945 ht_20mhz_set : BIT(5)
948 psta_data->sta_set = ((psta->nonerp_set) |
949 (psta->no_short_slot_time_set << 1) |
950 (psta->no_short_preamble_set << 2) |
951 (psta->no_ht_gf_set << 3) |
952 (psta->no_ht_set << 4) |
953 (psta->ht_20mhz_set << 5));
955 psta_data->tx_supp_rates_len = psta->bssratelen;
956 memcpy(psta_data->tx_supp_rates, psta->bssrateset, psta->bssratelen);
957 memcpy(&psta_data->ht_cap, &psta->htpriv.ht_cap, sizeof(struct ieee80211_ht_cap));
958 psta_data->rx_pkts = psta->sta_stats.rx_data_pkts;
959 psta_data->rx_bytes = psta->sta_stats.rx_bytes;
960 psta_data->rx_drops = psta->sta_stats.rx_drops;
962 psta_data->tx_pkts = psta->sta_stats.tx_pkts;
963 psta_data->tx_bytes = psta->sta_stats.tx_bytes;
964 psta_data->tx_drops = psta->sta_stats.tx_drops;
975 static int rtw_get_sta_wpaie(struct net_device *dev, struct ieee_param *param)
978 struct sta_info *psta = NULL;
979 struct adapter *padapter = rtw_netdev_priv(dev);
980 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
981 struct sta_priv *pstapriv = &padapter->stapriv;
983 if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
986 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
987 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
988 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
992 psta = rtw_get_stainfo(pstapriv, param->sta_addr);
994 if ((psta->wpa_ie[0] == WLAN_EID_RSN) || (psta->wpa_ie[0] == WLAN_EID_VENDOR_SPECIFIC)) {
998 wpa_ie_len = psta->wpa_ie[1];
1000 copy_len = ((wpa_ie_len+2) > sizeof(psta->wpa_ie)) ? (sizeof(psta->wpa_ie)):(wpa_ie_len+2);
1002 param->u.wpa_ie.len = copy_len;
1004 memcpy(param->u.wpa_ie.reserved, psta->wpa_ie, copy_len);
1014 static int rtw_set_wps_beacon(struct net_device *dev, struct ieee_param *param, int len)
1017 unsigned char wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
1018 struct adapter *padapter = rtw_netdev_priv(dev);
1019 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1020 struct mlme_ext_priv *pmlmeext = &(padapter->mlmeextpriv);
1023 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
1026 ie_len = len-12-2;/* 12 = param header, 2:no packed */
1029 kfree(pmlmepriv->wps_beacon_ie);
1030 pmlmepriv->wps_beacon_ie = NULL;
1033 pmlmepriv->wps_beacon_ie = rtw_malloc(ie_len);
1034 pmlmepriv->wps_beacon_ie_len = ie_len;
1035 if (!pmlmepriv->wps_beacon_ie)
1038 memcpy(pmlmepriv->wps_beacon_ie, param->u.bcn_ie.buf, ie_len);
1040 update_beacon(padapter, WLAN_EID_VENDOR_SPECIFIC, wps_oui, true);
1042 pmlmeext->bstart_bss = true;
1050 static int rtw_set_wps_probe_resp(struct net_device *dev, struct ieee_param *param, int len)
1053 struct adapter *padapter = rtw_netdev_priv(dev);
1054 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1057 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
1060 ie_len = len-12-2;/* 12 = param header, 2:no packed */
1063 kfree(pmlmepriv->wps_probe_resp_ie);
1064 pmlmepriv->wps_probe_resp_ie = NULL;
1067 pmlmepriv->wps_probe_resp_ie = rtw_malloc(ie_len);
1068 pmlmepriv->wps_probe_resp_ie_len = ie_len;
1069 if (!pmlmepriv->wps_probe_resp_ie)
1072 memcpy(pmlmepriv->wps_probe_resp_ie, param->u.bcn_ie.buf, ie_len);
1080 static int rtw_set_wps_assoc_resp(struct net_device *dev, struct ieee_param *param, int len)
1083 struct adapter *padapter = rtw_netdev_priv(dev);
1084 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1087 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
1090 ie_len = len-12-2;/* 12 = param header, 2:no packed */
1093 kfree(pmlmepriv->wps_assoc_resp_ie);
1094 pmlmepriv->wps_assoc_resp_ie = NULL;
1097 pmlmepriv->wps_assoc_resp_ie = rtw_malloc(ie_len);
1098 pmlmepriv->wps_assoc_resp_ie_len = ie_len;
1099 if (!pmlmepriv->wps_assoc_resp_ie)
1102 memcpy(pmlmepriv->wps_assoc_resp_ie, param->u.bcn_ie.buf, ie_len);
1110 static int rtw_set_hidden_ssid(struct net_device *dev, struct ieee_param *param, int len)
1113 struct adapter *adapter = rtw_netdev_priv(dev);
1114 struct mlme_priv *mlmepriv = &(adapter->mlmepriv);
1115 struct mlme_ext_priv *mlmeext = &(adapter->mlmeextpriv);
1116 struct mlme_ext_info *mlmeinfo = &(mlmeext->mlmext_info);
1119 char ssid[NDIS_802_11_LENGTH_SSID + 1];
1120 signed int ssid_len;
1121 u8 ignore_broadcast_ssid;
1123 if (check_fwstate(mlmepriv, WIFI_AP_STATE) != true)
1126 if (param->u.bcn_ie.reserved[0] != 0xea)
1129 mlmeinfo->hidden_ssid_mode = ignore_broadcast_ssid = param->u.bcn_ie.reserved[1];
1131 ie_len = len-12-2;/* 12 = param header, 2:no packed */
1132 ssid_ie = rtw_get_ie(param->u.bcn_ie.buf, WLAN_EID_SSID, &ssid_len, ie_len);
1134 if (ssid_ie && ssid_len > 0 && ssid_len <= NDIS_802_11_LENGTH_SSID) {
1135 struct wlan_bssid_ex *pbss_network = &mlmepriv->cur_network.network;
1136 struct wlan_bssid_ex *pbss_network_ext = &mlmeinfo->network;
1138 memcpy(ssid, ssid_ie+2, ssid_len);
1139 ssid[ssid_len] = 0x0;
1141 memcpy(pbss_network->ssid.ssid, (void *)ssid, ssid_len);
1142 pbss_network->ssid.ssid_length = ssid_len;
1143 memcpy(pbss_network_ext->ssid.ssid, (void *)ssid, ssid_len);
1144 pbss_network_ext->ssid.ssid_length = ssid_len;
1150 static int rtw_ioctl_acl_remove_sta(struct net_device *dev, struct ieee_param *param, int len)
1152 struct adapter *padapter = rtw_netdev_priv(dev);
1153 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1155 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
1158 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
1159 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
1160 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
1164 rtw_acl_remove_sta(padapter, param->sta_addr);
1169 static int rtw_ioctl_acl_add_sta(struct net_device *dev, struct ieee_param *param, int len)
1171 struct adapter *padapter = rtw_netdev_priv(dev);
1172 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1174 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
1177 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
1178 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
1179 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
1183 return rtw_acl_add_sta(padapter, param->sta_addr);
1187 static int rtw_ioctl_set_macaddr_acl(struct net_device *dev, struct ieee_param *param, int len)
1190 struct adapter *padapter = rtw_netdev_priv(dev);
1191 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1193 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
1196 rtw_set_macaddr_acl(padapter, param->u.mlme.command);
1201 static int rtw_hostapd_ioctl(struct net_device *dev, struct iw_point *p)
1203 struct ieee_param *param;
1205 struct adapter *padapter = rtw_netdev_priv(dev);
1208 * this function is expect to call in master mode, which allows no power saving
1209 * so, we just check hw_init_completed
1212 if (!padapter->hw_init_completed)
1215 if (!p->pointer || p->length != sizeof(*param))
1218 param = rtw_malloc(p->length);
1222 if (copy_from_user(param, p->pointer, p->length)) {
1227 switch (param->cmd) {
1228 case RTL871X_HOSTAPD_FLUSH:
1230 rtw_hostapd_sta_flush(dev);
1234 case RTL871X_HOSTAPD_ADD_STA:
1236 ret = rtw_add_sta(dev, param);
1240 case RTL871X_HOSTAPD_REMOVE_STA:
1242 ret = rtw_del_sta(dev, param);
1246 case RTL871X_HOSTAPD_SET_BEACON:
1248 ret = rtw_set_beacon(dev, param, p->length);
1252 case RTL871X_SET_ENCRYPTION:
1254 ret = rtw_set_encryption(dev, param, p->length);
1258 case RTL871X_HOSTAPD_GET_WPAIE_STA:
1260 ret = rtw_get_sta_wpaie(dev, param);
1264 case RTL871X_HOSTAPD_SET_WPS_BEACON:
1266 ret = rtw_set_wps_beacon(dev, param, p->length);
1270 case RTL871X_HOSTAPD_SET_WPS_PROBE_RESP:
1272 ret = rtw_set_wps_probe_resp(dev, param, p->length);
1276 case RTL871X_HOSTAPD_SET_WPS_ASSOC_RESP:
1278 ret = rtw_set_wps_assoc_resp(dev, param, p->length);
1282 case RTL871X_HOSTAPD_SET_HIDDEN_SSID:
1284 ret = rtw_set_hidden_ssid(dev, param, p->length);
1288 case RTL871X_HOSTAPD_GET_INFO_STA:
1290 ret = rtw_ioctl_get_sta_data(dev, param, p->length);
1294 case RTL871X_HOSTAPD_SET_MACADDR_ACL:
1296 ret = rtw_ioctl_set_macaddr_acl(dev, param, p->length);
1300 case RTL871X_HOSTAPD_ACL_ADD_STA:
1302 ret = rtw_ioctl_acl_add_sta(dev, param, p->length);
1306 case RTL871X_HOSTAPD_ACL_REMOVE_STA:
1308 ret = rtw_ioctl_acl_remove_sta(dev, param, p->length);
1318 if (ret == 0 && copy_to_user(p->pointer, param, p->length))
1325 /* copy from net/wireless/wext.c end */
1327 int rtw_ioctl(struct net_device *dev, struct ifreq *rq, int cmd)
1329 struct iwreq *wrq = (struct iwreq *)rq;
1333 case RTL_IOCTL_WPA_SUPPLICANT:
1334 ret = wpa_supplicant_ioctl(dev, &wrq->u.data);
1336 case RTL_IOCTL_HOSTAPD:
1337 ret = rtw_hostapd_ioctl(dev, &wrq->u.data);