diff options
author | Roman Yeryomin <roman@advem.lv> | 2012-09-13 00:40:35 +0300 |
---|---|---|
committer | Roman Yeryomin <roman@advem.lv> | 2012-12-03 00:13:21 +0200 |
commit | 5deb3317cb51ac52de922bb55f8492624018906d (patch) | |
tree | c2fbe6346699d9bb0f2100490c3029519bb8fde8 /target/linux/realtek/files/drivers/net/wireless/rtl8192cd/8192cd_tkip.c | |
parent | 0239d37124f9184b478a42de8a7fa1bc85a6a6fe (diff) |
Add realtek target files
Signed-off-by: Roman Yeryomin <roman@advem.lv>
Diffstat (limited to 'target/linux/realtek/files/drivers/net/wireless/rtl8192cd/8192cd_tkip.c')
-rw-r--r-- | target/linux/realtek/files/drivers/net/wireless/rtl8192cd/8192cd_tkip.c | 1352 |
1 files changed, 1352 insertions, 0 deletions
diff --git a/target/linux/realtek/files/drivers/net/wireless/rtl8192cd/8192cd_tkip.c b/target/linux/realtek/files/drivers/net/wireless/rtl8192cd/8192cd_tkip.c new file mode 100644 index 000000000..bd95bd153 --- /dev/null +++ b/target/linux/realtek/files/drivers/net/wireless/rtl8192cd/8192cd_tkip.c @@ -0,0 +1,1352 @@ +/* + * Software TKIP encryption/descryption routines + * + * $Id: 8192cd_tkip.c,v 1.4.4.2 2010/09/30 05:27:28 button Exp $ + * + * Copyright (c) 2009 Realtek Semiconductor Corp. + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. + */ + +#define _8192CD_TKIP_C_ + +#ifdef __KERNEL__ +#include <linux/module.h> +#include <asm/byteorder.h> +#endif + +#include "./8192cd_cfg.h" + +#ifndef __KERNEL__ +#include "./sys-support.h" +#endif + +#include "./8192cd.h" +#include "./ieee802_mib.h" +#include "./8192cd_util.h" +#include "./8192cd_headers.h" +#include "./8192cd_debug.h" + +#ifdef __LINUX_2_6__ +/*avoid mutli defined*/ +#ifdef swap +#undef swap +#endif +#endif + +#define MAX_MESSAGE_LENGTH 2048 + +#define rotr(n,x) (((x) >> ((int)(n))) | ((x) << (32 - (int)(n)))) +#define rotl(n,x) (((x) << ((int)(n))) | ((x) >> (32 - (int)(n)))) + +#define block_function(l,r) { \ + r = r ^ rotl(17,l); \ + l = (l + r); \ + r ^= ((l & 0xff00ff00) >> 8) | ((l & 0x00ff00ff) << 8); \ + l = (l + r); \ + r = r ^ rotl(3,l); \ + l = (l + r); \ + r = r ^ rotr(2,l); \ + l = (l + r); \ +} + +void debug_out(unsigned char *label, unsigned char *data, int data_length) +{ + int i,j; + int num_blocks; + int block_remainder; + + num_blocks = data_length >> 4; + block_remainder = data_length & 15; + + if (label) { + printk("%s\n", label); + } + + if (data==NULL || data_length==0) + return; + + for (i=0; i<num_blocks; i++) + { + printk("\t"); + for (j=0; j<16; j++) + { + printk("%02x ", data[j + (i<<4)]); + } + printk("\n"); + } + + if (block_remainder > 0) + { + printk("\t"); + for (j=0; j<block_remainder; j++) + { + printk("%02x ", data[j+(num_blocks<<4)]); + } + printk("\n"); + } +} + + +#if 0 +static __inline__ unsigned long int rotr(int bits, unsigned long int a) +{ + unsigned long int c,d,e,f,g; + c = (0x0001 << bits)-1; + d = ~c; + + e = (a & d) >> bits; + f = (a & c) << (32 - bits); + + g = e | f; + + return (g & 0xffffffff ); +} + + +static __inline__ unsigned long int rotl(int bits, unsigned long int a) +{ + unsigned long int c,d,e,f,g; + c = (0x0001 << (32-bits))-1; + d = ~c; + + e = (a & c) << bits; + f = (a & d) >> (32 - bits); + + g = e | f; + + return (g & 0xffffffff ); +} + + +static __inline__ unsigned long int xswap(unsigned long int in) +{ + unsigned long int a,b,c,d,out; + + a = in & 0xff; + b = (in >> 8) & 0xff; + c = (in >> 16) & 0xff; + d = (in >> 24) & 0xff; + + out = 0; + out |= c << 24; + out |= d << 16; + out |= a << 8; + out |= b; + + return out; +} + + +static __inline__ void block_function( + unsigned long int l, + unsigned long int r, + unsigned long int *l_out, + unsigned long int *r_out) +{ + r = r ^ rotl(17,l); + l = (l + r); + r = r ^ xswap(l); + l = (l + r); + r = r ^ rotl(3,l); + l = (l + r); + r = r ^ rotr(2,l); + l = (l + r); + *l_out = l; + *r_out = r; +} +#endif + + +void michael( + struct rtl8192cd_priv *priv, + unsigned char *key, + unsigned char *hdr, + unsigned char *llc, + unsigned char *message, + int message_length, + unsigned char *mic, int tx) +{ +// unsigned long int l_out, r_out; + register unsigned long int l,r; + register unsigned long int k0,k1; + register unsigned long int m; + register unsigned char a,b,c,d; + + int num_blocks; + int block; + + num_blocks = message_length >> 2; + + k0 = key[0] + (key[1] << 8) + (key[2] << 16) + (key[3] << 24); + k1 = key[4] + (key[5] << 8) + (key[6] << 16) + (key[7] << 24); + + l = k0; + r = k1; + + //in the beginning, perform the first 16 bytes from hdr... + if (hdr) + { + for (block = 0; block < 4; block++) + { + a = hdr[block<<2]; + b = hdr[1+(block<<2)]; + c = hdr[2+(block<<2)]; + d = hdr[3+(block<<2)]; + m = a + (b << 8) + (c << 16) + (d << 24); + l = l ^ m; +#if 0 + block_function(l,r,&l_out,&r_out); + l = l_out; + r = r_out; +#endif + block_function(l,r); + } + + num_blocks -= 4; + } + + if (llc) + { + for (block = 0; block < 2; block++) + { + a = llc[block<<2]; + b = llc[1+(block<<2)]; + c = llc[2+(block<<2)]; + d = llc[3+(block<<2)]; + m = a + (b << 8) + (c << 16) + (d << 24); + l = l ^ m; +#if 0 + block_function(l,r,&l_out,&r_out); + l = l_out; + r = r_out; +#endif + block_function(l,r); + } + + num_blocks -= 2; + } + + if ((priv->pshare->have_hw_mic) && + !(priv->pmib->dot11StationConfigEntry.swTkipMic)) + { + if (tx) + rtl_cache_sync_wback(priv, (unsigned int)message, (num_blocks*4), PCI_DMA_TODEVICE); + + *(volatile unsigned int *)GDMACNR = 0; + *(volatile unsigned int *)GDMACNR = GDMA_ENABLE; + *(volatile unsigned int *)GDMAIMR = 0; + *(volatile unsigned int *)GDMAISR = 0xffffffff; + *(volatile unsigned int *)GDMAICVL = (l); + *(volatile unsigned int *)GDMAICVR = (r); + *(volatile unsigned int *)GDMASBP0 = virt_to_bus(message); + *(volatile unsigned int *)GDMASBL0 = GDMA_LDB|(num_blocks*4); + *(volatile unsigned int *)GDMADBP0 = 0; + *(volatile unsigned int *)GDMADBL0 = 0; + *(volatile unsigned int *)GDMACNR = GDMA_ENABLE|GDMA_POLL|GDMA_MIC|internalUsedGDMACNR; + } + else + { + for (block = 0; block < num_blocks; block++) + { + a = message[block<<2]; + b = message[1+(block<<2)]; + c = message[2+(block<<2)]; + d = message[3+(block<<2)]; + m = a + (b << 8) + (c << 16) + (d << 24); + l = l ^ m; +#if 0 + block_function(l,r,&l_out,&r_out); + l = l_out; + r = r_out; +#endif + block_function(l,r); + } + + mic[0] = (unsigned char)(l & 0xff); + mic[1] = (unsigned char)((l >> 8) & 0xff); + mic[2] = (unsigned char)((l >> 16) & 0xff); + mic[3] = (unsigned char)((l >> 24) & 0xff); + mic[4] = (unsigned char)(r & 0xff); + mic[5] = (unsigned char)((r >> 8) & 0xff); + mic[6] = (unsigned char)((r >> 16) & 0xff); + mic[7] = (unsigned char)((r >> 24) & 0xff); + } +} + + +/*----------------------------------------------------------------------------- + below is for key mixing function +------------------------------------------------------------------------------*/ + +/* The Sbox can be reduced to two 16 bit wide tables, each with 256 entries.*/ +/* The second table is the same as the first but with the upper and lower */ +/* bytes swapped. To allow an endian tolerant implementation, the byte */ +/* halves have been expressed independently here. */ +unsigned char Tkip_Sbox_Lower[256] = +{ + 0xA5,0x84,0x99,0x8D,0x0D,0xBD,0xB1,0x54, + 0x50,0x03,0xA9,0x7D,0x19,0x62,0xE6,0x9A, + 0x45,0x9D,0x40,0x87,0x15,0xEB,0xC9,0x0B, + 0xEC,0x67,0xFD,0xEA,0xBF,0xF7,0x96,0x5B, + 0xC2,0x1C,0xAE,0x6A,0x5A,0x41,0x02,0x4F, + 0x5C,0xF4,0x34,0x08,0x93,0x73,0x53,0x3F, + 0x0C,0x52,0x65,0x5E,0x28,0xA1,0x0F,0xB5, + 0x09,0x36,0x9B,0x3D,0x26,0x69,0xCD,0x9F, + 0x1B,0x9E,0x74,0x2E,0x2D,0xB2,0xEE,0xFB, + 0xF6,0x4D,0x61,0xCE,0x7B,0x3E,0x71,0x97, + 0xF5,0x68,0x00,0x2C,0x60,0x1F,0xC8,0xED, + 0xBE,0x46,0xD9,0x4B,0xDE,0xD4,0xE8,0x4A, + 0x6B,0x2A,0xE5,0x16,0xC5,0xD7,0x55,0x94, + 0xCF,0x10,0x06,0x81,0xF0,0x44,0xBA,0xE3, + 0xF3,0xFE,0xC0,0x8A,0xAD,0xBC,0x48,0x04, + 0xDF,0xC1,0x75,0x63,0x30,0x1A,0x0E,0x6D, + 0x4C,0x14,0x35,0x2F,0xE1,0xA2,0xCC,0x39, + 0x57,0xF2,0x82,0x47,0xAC,0xE7,0x2B,0x95, + 0xA0,0x98,0xD1,0x7F,0x66,0x7E,0xAB,0x83, + 0xCA,0x29,0xD3,0x3C,0x79,0xE2,0x1D,0x76, + 0x3B,0x56,0x4E,0x1E,0xDB,0x0A,0x6C,0xE4, + 0x5D,0x6E,0xEF,0xA6,0xA8,0xA4,0x37,0x8B, + 0x32,0x43,0x59,0xB7,0x8C,0x64,0xD2,0xE0, + 0xB4,0xFA,0x07,0x25,0xAF,0x8E,0xE9,0x18, + 0xD5,0x88,0x6F,0x72,0x24,0xF1,0xC7,0x51, + 0x23,0x7C,0x9C,0x21,0xDD,0xDC,0x86,0x85, + 0x90,0x42,0xC4,0xAA,0xD8,0x05,0x01,0x12, + 0xA3,0x5F,0xF9,0xD0,0x91,0x58,0x27,0xB9, + 0x38,0x13,0xB3,0x33,0xBB,0x70,0x89,0xA7, + 0xB6,0x22,0x92,0x20,0x49,0xFF,0x78,0x7A, + 0x8F,0xF8,0x80,0x17,0xDA,0x31,0xC6,0xB8, + 0xC3,0xB0,0x77,0x11,0xCB,0xFC,0xD6,0x3A +}; + +unsigned char Tkip_Sbox_Upper[256] = +{ + 0xC6,0xF8,0xEE,0xF6,0xFF,0xD6,0xDE,0x91, + 0x60,0x02,0xCE,0x56,0xE7,0xB5,0x4D,0xEC, + 0x8F,0x1F,0x89,0xFA,0xEF,0xB2,0x8E,0xFB, + 0x41,0xB3,0x5F,0x45,0x23,0x53,0xE4,0x9B, + 0x75,0xE1,0x3D,0x4C,0x6C,0x7E,0xF5,0x83, + 0x68,0x51,0xD1,0xF9,0xE2,0xAB,0x62,0x2A, + 0x08,0x95,0x46,0x9D,0x30,0x37,0x0A,0x2F, + 0x0E,0x24,0x1B,0xDF,0xCD,0x4E,0x7F,0xEA, + 0x12,0x1D,0x58,0x34,0x36,0xDC,0xB4,0x5B, + 0xA4,0x76,0xB7,0x7D,0x52,0xDD,0x5E,0x13, + 0xA6,0xB9,0x00,0xC1,0x40,0xE3,0x79,0xB6, + 0xD4,0x8D,0x67,0x72,0x94,0x98,0xB0,0x85, + 0xBB,0xC5,0x4F,0xED,0x86,0x9A,0x66,0x11, + 0x8A,0xE9,0x04,0xFE,0xA0,0x78,0x25,0x4B, + 0xA2,0x5D,0x80,0x05,0x3F,0x21,0x70,0xF1, + 0x63,0x77,0xAF,0x42,0x20,0xE5,0xFD,0xBF, + 0x81,0x18,0x26,0xC3,0xBE,0x35,0x88,0x2E, + 0x93,0x55,0xFC,0x7A,0xC8,0xBA,0x32,0xE6, + 0xC0,0x19,0x9E,0xA3,0x44,0x54,0x3B,0x0B, + 0x8C,0xC7,0x6B,0x28,0xA7,0xBC,0x16,0xAD, + 0xDB,0x64,0x74,0x14,0x92,0x0C,0x48,0xB8, + 0x9F,0xBD,0x43,0xC4,0x39,0x31,0xD3,0xF2, + 0xD5,0x8B,0x6E,0xDA,0x01,0xB1,0x9C,0x49, + 0xD8,0xAC,0xF3,0xCF,0xCA,0xF4,0x47,0x10, + 0x6F,0xF0,0x4A,0x5C,0x38,0x57,0x73,0x97, + 0xCB,0xA1,0xE8,0x3E,0x96,0x61,0x0D,0x0F, + 0xE0,0x7C,0x71,0xCC,0x90,0x06,0xF7,0x1C, + 0xC2,0x6A,0xAE,0x69,0x17,0x99,0x3A,0x27, + 0xD9,0xEB,0x2B,0x22,0xD2,0xA9,0x07,0x33, + 0x2D,0x3C,0x15,0xC9,0x87,0xAA,0x50,0xA5, + 0x03,0x59,0x09,0x1A,0x65,0xD7,0x84,0xD0, + 0x82,0x29,0x5A,0x1E,0x7B,0xA8,0x6D,0x2C +}; + +#ifdef _USE_DRAM_ +unsigned char *pTkip_Sbox_Lower, *pTkip_Sbox_Upper; +#endif + +/*****************************/ +/**** Function Prototypes ****/ +/*****************************/ + +unsigned int tkip_sbox(unsigned int index); +static __inline__ unsigned int rotr1(unsigned int a); + +/* Mixes key from TA, TK and TSC */ +// key: TTK (16 bytes), ta (transmitted address) +void mix_key( + unsigned char *key, + unsigned char *ta, + unsigned long int pnl, /* Least significant 16 bits of PN */ + unsigned long int pnh, /* Most significant 32 bits of PN */ + unsigned char *rc4key); + + +/************************************************************/ +/* tkip_sbox() */ +/* Returns a 16 bit value from a 64K entry table. The Table */ +/* is synthesized from two 256 entry byte wide tables. */ +/************************************************************/ +unsigned int tkip_sbox(unsigned int index) +{ + unsigned int index_low; + unsigned int index_high; + unsigned int left, right; + + index_low = (index & 255); + index_high = ((index >> 8) & 255); + +#if defined(_USE_DRAM_) + left = ((int)pTkip_Sbox_Lower[index_low]) + (((int)pTkip_Sbox_Upper[index_low]) << 8); + right = ((int)pTkip_Sbox_Upper[index_high]) + (((int)pTkip_Sbox_Lower[index_high]) << 8); +#else + left = Tkip_Sbox_Lower[index_low] + (Tkip_Sbox_Upper[index_low] << 8); + right = Tkip_Sbox_Upper[index_high] + (Tkip_Sbox_Lower[index_high] << 8); +#endif + + return (left ^ right); +} + + +static __inline__ unsigned int rotr1(unsigned int a) +{ + unsigned int b; + + if ((a & 0x01) == 0x01) + { + b = (a >> 1) | 0x8000; + } + else + { + b = (a >> 1) & 0x7fff; + } + b = b & 0xffff; + return b; +} + + +/****************************************************/ +/* mix_key() */ +/* Takes a key, PN and TK. Calculates an RC4 key. */ +/****************************************************/ +void mix_key( + unsigned char *key, + unsigned char *ta, + unsigned long int pnl, /* Least significant 16 bits of PN */ + unsigned long int pnh, /* Most significant 32 bits of PN */ + unsigned char *rc4key) +{ + unsigned int p1k[5]; + /* 16 bit numbers */ + unsigned int tsc0; + unsigned int tsc1; + unsigned int tsc2; + + unsigned int ppk0; + unsigned int ppk1; + unsigned int ppk2; + unsigned int ppk3; + unsigned int ppk4; + unsigned int ppk5; + + int i; + int j; + + tsc0 = (unsigned int)((pnh >> 16) & 0xffff); /* tsc0 is most significant */ + tsc1 = (unsigned int)(pnh & 0xffff); + tsc2 = (unsigned int)(pnl & 0xffff); /* tsc2 is least significant */ + + /* Phase 1, step 1 */ + p1k[0] = tsc1; + p1k[1] = tsc0; + p1k[2] = (unsigned int)(ta[0] + (ta[1]<< 8)); + p1k[3] = (unsigned int)(ta[2] + (ta[3]<< 8)); + p1k[4] = (unsigned int)(ta[4] + (ta[5]<< 8)); + + /* Phase 1, step 2 */ + for (i=0; i<8; i++) + { + j = (i & 1) << 1; + p1k[0] = (p1k[0] + tkip_sbox( (p1k[4] ^ ((key[1+j] << 8) + key[j])) & 0xffff )) & 0xffff; + p1k[1] = (p1k[1] + tkip_sbox( (p1k[0] ^ ((key[5+j] << 8) + key[4+j])) & 0xffff )) & 0xffff; + p1k[2] = (p1k[2] + tkip_sbox( (p1k[1] ^ ((key[9+j] << 8) + key[8+j])) & 0xffff )) & 0xffff; + p1k[3] = (p1k[3] + tkip_sbox( (p1k[2] ^ ((key[13+j]<< 8) + key[12+j])) & 0xffff )) & 0xffff; + p1k[4] = (p1k[4] + tkip_sbox( (p1k[3] ^ (((key[1+j]<< 8) + key[j]))) & 0xffff )) & 0xffff; + p1k[4] = (p1k[4] + i) & 0xffff; + } + + /* Phase 2, Step 1 */ + ppk0 = p1k[0]; + ppk1 = p1k[1]; + ppk2 = p1k[2]; + ppk3 = p1k[3]; + ppk4 = p1k[4]; + ppk5 = (p1k[4] + tsc2) & (65536-1); + + /* Phase2, Step 2 */ + ppk0 = ppk0 + tkip_sbox( (ppk5 ^ ((key[1]<<8) + key[0])) & 0xffff); + ppk1 = ppk1 + tkip_sbox( (ppk0 ^ ((key[3]<<8) + key[2])) & 0xffff); + ppk2 = ppk2 + tkip_sbox( (ppk1 ^ ((key[5]<<8) + key[4])) & 0xffff); + ppk3 = ppk3 + tkip_sbox( (ppk2 ^ ((key[7]<<8) + key[6])) & 0xffff); + ppk4 = ppk4 + tkip_sbox( (ppk3 ^ ((key[9]<<8) + key[8])) & 0xffff); + ppk5 = ppk5 + tkip_sbox( (ppk4 ^ ((key[11]<<8) + key[10])) & 0xffff); + + ppk0 = ppk0 + rotr1(ppk5 ^ ((key[13]<<8) + key[12])); + ppk1 = ppk1 + rotr1(ppk0 ^ ((key[15]<<8) + key[14])); + ppk2 = ppk2 + rotr1(ppk1); + ppk3 = ppk3 + rotr1(ppk2); + ppk4 = ppk4 + rotr1(ppk3); + ppk5 = ppk5 + rotr1(ppk4); + + /* Phase 2, Step 3 */ + rc4key[0] = (tsc2 >> 8) & 255; + rc4key[1] = (((tsc2 >> 8) & 255) | 0x20) & 0x7f; + rc4key[2] = tsc2 & 255; + rc4key[3] = ((ppk5 ^ ((key[1]<<8) + key[0])) >> 1) & 255; + + rc4key[4] = ppk0 & 255; + rc4key[5] = (ppk0 >> 8) & 255; + + rc4key[6] = ppk1 & 255; + rc4key[7] = (ppk1 >> 8) & 255; + + rc4key[8] = ppk2 & 255; + rc4key[9] = (ppk2 >> 8) & 255; + + rc4key[10] = ppk3 & 255; + rc4key[11] = (ppk3 >> 8) & 255; + + rc4key[12] = ppk4 & 255; + rc4key[13] = (ppk4 >> 8) & 255; + + rc4key[14] = ppk5 & 255; + rc4key[15] = (ppk5 >> 8) & 255; +} + + +void rc4( + unsigned char *key, + int key_length, + int cipherstream_length, + unsigned char *cipherstream); + +void rc4_encrypt( + unsigned char *key, + int key_length, + unsigned char *data, + int data_length, + unsigned char *ciphertext); + + +void xor_block(int length, unsigned char *a, unsigned char *b, unsigned char *out) +{ + int i; + for (i=0;i<length; i++) + { + out[i] = a[i] ^ b[i]; + } +} + + +static __inline__ void swap(unsigned char *a, unsigned char *b) +{ + unsigned char tmp; + + tmp = *a; + *a = *b; + *b = tmp; +} + + +#ifdef _USE_DRAM_ +unsigned char *en_cipherstream; +unsigned char *rc4sbox, *rc4kbox; +#else +//__DRAM_IN_865X +unsigned char en_cipherstream[MAX_MESSAGE_LENGTH+1]; +#endif + + +void rc4( + unsigned char *key, + int key_length, + int cipherstream_length, + unsigned char *cipherstream) +{ + int i, j, x; + +#ifdef _USE_DRAM_ + unsigned char *s = rc4sbox; + unsigned char *k = rc4kbox; +#else + unsigned char s[256]; + unsigned char k[256]; +#endif + + /* Create Key Stream */ + for (i=0; i<256; i++) + k[i] = key[i % key_length]; + + /* Initialize SBOX */ + for (j=0; j<256; j++) + s[j] = j; + + /* Seed the SBOX */ + i = 0; + for (j=0; j<256; j++) + { + i = (i + s[j] + k[j]) & 255; + swap(&s[j], &s[i]); + } + + /* Generate the cipherstream */ + j = 0; + i = 0; + + for (x=0; x<cipherstream_length; x++) + { + j = (j + 1) & 255; + i = (i + s[j]) & 255; + swap(&s[j], &s[i]); + cipherstream[x] = s[(s[j] + s[i]) & 255]; + }; +} + + +/****************************************/ +/* rc4_encrypt() */ +/****************************************/ +void rc4_encrypt( + unsigned char *key, + int key_length, + unsigned char *data, + int data_length, + unsigned char *ciphertext) +{ + rc4(key, key_length, data_length, en_cipherstream); + + xor_block(data_length, en_cipherstream, data, ciphertext); +} + + +void rc4_frag_encrypt( + unsigned char *frag1, unsigned int frag1_len, + unsigned char *frag2, unsigned int frag2_len, + unsigned char *frag3, unsigned int frag3_len, + unsigned char *cipher) +{ + unsigned int i; + + for(i=0; i<frag1_len; i++) + frag1[i] = cipher[i] ^ frag1[i]; + for(i=0; i<frag2_len; i++) + frag2[i] = cipher[i+frag1_len] ^ frag2[i]; + for(i=0; i<frag3_len; i++) + frag3[i] = cipher[i+frag1_len+frag2_len] ^ frag3[i]; +} + + +#define REVERSE_BIT(val8)\ + (unsigned char)( ((val8<<7)&0x80) | ((val8<<5)&0x40) | ((val8<<3)&0x20) | ((val8<<1)&0x10) | \ + ((val8>>1)&0x08) | ((val8>>3)&0x04) | ((val8>>5)&0x02) | ((val8>>7)&0x01) ) +#define CRC32_POLY 0x04c11db7 + +static unsigned long crc32_table[256]; + +void init_crc32_table(void) +{ + int i, j; + unsigned long c; + unsigned char *p=(unsigned char *)&c, *p1; + unsigned char k; + + c = 0x12340000; + + for (i = 0; i < 256; ++i) + { + k = REVERSE_BIT( (unsigned char)(i) ); + for (c = ((unsigned long)k) << 24, j = 8; j > 0; --j){ + c = (c & 0x80000000) ? ((c << 1) ^ CRC32_POLY) : (c << 1); + } + p1 = (unsigned char *)&crc32_table[i]; + + p1[0] = REVERSE_BIT(p[3]); + p1[1] = REVERSE_BIT(p[2]); + p1[2] = REVERSE_BIT(p[1]); + p1[3] = REVERSE_BIT(p[0]); + } +} + + +unsigned long crc32(unsigned char *buf, int len) +{ + unsigned char *p; + unsigned long crc; + + crc = 0xffffffff; /* preload shift register, per CRC-32 spec */ + + for (p = buf; len > 0; ++p, --len) { + crc = crc32_table[(crc ^ *p) & 0xff] ^ (crc >> 8); + } + + return ~crc; /* transmit complement, per CRC-32 spec */ +} + + +unsigned long crc32_frag(unsigned long crc, unsigned char *buf, int len) +{ + unsigned char *p; + + for (p = buf; len > 0; ++p, --len) { + crc = crc32_table[(crc ^ *p) & 0xff] ^ (crc >> 8); + } + + return ~crc; /* transmit complement, per CRC-32 spec */ +} + +#if 0 +void appendICV(unsigned char *src, unsigned int len, unsigned char *dest) +{ + unsigned char CRC[4]; + + *((unsigned long *)CRC) = crc32(src,len); + *(unsigned char *)dest=*((unsigned char *)CRC+3); + *(unsigned char *)(dest+1)=*((unsigned char *)CRC+2); + *(unsigned char *)(dest+2)=*((unsigned char *)CRC+1); + *(unsigned char *)(dest+3)=*((unsigned char *)CRC); +} +#endif + + +void tkip_icv(unsigned char *picv, unsigned char *frag1, unsigned int frag1_len, + unsigned char *frag2,unsigned int frag2_len) +{ + unsigned long *pcrc; + unsigned long crc= 0xffffffff; + + pcrc = &crc; + if (frag1) + crc = crc32_frag(crc, frag1, frag1_len); + else + crc = ~crc; + if (frag2) + crc = crc32_frag(~crc, frag2, frag2_len); + +#if defined(_LITTLE_ENDIAN_) + *(unsigned char *)picv=*((unsigned char *)pcrc); + *(unsigned char *)(picv+1)=*((unsigned char *)pcrc+1); + *(unsigned char *)(picv+2)=*((unsigned char *)pcrc+2); + *(unsigned char *)(picv+3)=*((unsigned char *)pcrc+3); +#else + *(unsigned char *)picv=*((unsigned char *)pcrc+3); + *(unsigned char *)(picv+1)=*((unsigned char *)pcrc+2); + *(unsigned char *)(picv+2)=*((unsigned char *)pcrc+1); + *(unsigned char *)(picv+3)=*((unsigned char *)pcrc); +#endif +} + + +#ifdef _USE_DRAM_ +unsigned char *tx_cipherstream; +#else +__DRAM_IN_865X unsigned char tx_cipherstream[MAX_MESSAGE_LENGTH+1]; +#endif + +/*----------------------------------------------------------------------------- + TKIP Flow +1. Key Mixing (TTK key(128 bits), TA(48 bits), pnl(16 bits), pnh(32 bits) + ==>rc4 key +2. Using rc4 key to generate Ciphertext/Cipherstream. +3. Most of the time, we used frag1 to points to llc, frag2 to points to mpdu, + and frag3 to points to icv +------------------------------------------------------------------------------*/ +void tkip_encrypt( + struct rtl8192cd_priv *priv, unsigned char *pwlhdr, unsigned int hdrlen, + unsigned char *frag1, unsigned int frag1_len, + unsigned char *frag2, unsigned int frag2_len, + unsigned char *frag3, unsigned int frag3_len) +{ + unsigned char *ttkey = NULL; + unsigned char rc4key[16]; + union PN48 *ptsc48 = NULL; + unsigned short pnl; // 16 LSB + unsigned int pnh; // 32 MSB + unsigned int keyid = 0; + unsigned char *iv = pwlhdr + hdrlen; + struct stat_info *pstat = NULL; + unsigned char *ta = GET_MY_HWADDR; + unsigned char *ra; +#ifdef WDS + unsigned int to_fr_ds = (GetToDs(pwlhdr) << 1) | GetFrDs(pwlhdr); +#endif + + DEBUG_TRACE; + + ra = GetAddr1Ptr(pwlhdr); + pstat = get_stainfo(priv, ra); + +#ifdef WDS + if ( (to_fr_ds == 3) && pstat && (pstat->state & WIFI_WDS)) { + ttkey = GET_UNICAST_ENCRYP_KEY; + ptsc48 = GET_UNICAST_ENCRYP_PN; + keyid = pstat->keyid; + goto do_tkip_encrypt; + } +#endif + + if (OPMODE & WIFI_AP_STATE) + { + if (IS_MCAST(ra)) + { + ttkey = GET_GROUP_ENCRYP_KEY; + ptsc48 = GET_GROUP_ENCRYP_PN; + keyid = 1; + } + else + { + if (pstat == NULL) { + DEBUG_ERR("tx tkip pstat == NULL\n"); + return; + } + ttkey = GET_UNICAST_ENCRYP_KEY; + ptsc48 = GET_UNICAST_ENCRYP_PN; + keyid = 0; + } + } +#ifdef CLIENT_MODE + else if (OPMODE & WIFI_STATION_STATE) + { + if (pstat == NULL) { + DEBUG_ERR("tx tkip pstat == NULL\n"); + return; + } + ttkey = GET_UNICAST_ENCRYP_KEY; + ptsc48 = GET_UNICAST_ENCRYP_PN; + keyid = 0; + } + else if (OPMODE & WIFI_ADHOC_STATE) + { + ttkey = GET_GROUP_ENCRYP_KEY; + ptsc48 = GET_GROUP_ENCRYP_PN; + keyid = 0; + } +#endif + + if ((ttkey == NULL) || (ptsc48 == NULL)) { + DEBUG_ERR("no encrypt key for TKIP due to ttkey=NULL or ptsc48=NULL\n"); + return; + } + +#ifdef WDS +do_tkip_encrypt: +#endif + pnl = get_pnl(ptsc48); + pnh = get_pnh(ptsc48); + + // below is for key mixing! + mix_key(ttkey, ta, pnl, pnh, rc4key); + + //okay, use rc4_encrypt go generate ciphertext. + rc4(rc4key, 16, (frag1_len + frag2_len + frag3_len), tx_cipherstream); + + // now, using cipherstream to xor all the plaintext! + rc4_frag_encrypt(frag1, frag1_len, frag2, frag2_len, frag3, frag3_len, tx_cipherstream); + + // Wa-oh...finally, let's fill in the IV field... + iv[0] = ptsc48->_byte_.TSC1; + iv[1] = (iv[0] | 0x20) & 0x7f; + iv[2] = ptsc48->_byte_.TSC0; + iv[3] = 0x20 | (keyid << 6); + iv[4] = ptsc48->_byte_.TSC2; + iv[5] = ptsc48->_byte_.TSC3; + iv[6] = ptsc48->_byte_.TSC4; + iv[7] = ptsc48->_byte_.TSC5; + + if (ptsc48->val48 == 0xffffffffffffULL) + ptsc48->val48 = 0; + else + ptsc48->val48++; +} + + +unsigned int tkip_decrypt(struct rtl8192cd_priv *priv, struct rx_frinfo *pfrinfo, unsigned int fr_len) +{ + union TSC48 tsc48; + unsigned char *da; + unsigned char *sa; + unsigned char *ta; + unsigned int keylen=0, hdr_len, pnh, crc; + unsigned short pnl; + unsigned char *ttkey = NULL; + unsigned char rc4key[16]; + unsigned char *pframe; + struct stat_info *pstat = NULL; + + pframe = get_pframe(pfrinfo); + da = pfrinfo->da; + sa = pfrinfo->sa; + hdr_len = pfrinfo->hdr_len; + + ta = GetAddr2Ptr(pframe); + pstat = get_stainfo(priv, ta); + + if (pstat) { +#ifdef WDS + if ((pfrinfo->to_fr_ds == 3) && (pstat->state & WIFI_WDS)) { + keylen = GET_UNICAST_ENCRYP_KEYLEN; + ttkey = GET_UNICAST_ENCRYP_KEY; + goto do_tkip_decrypt; + } +#endif + } + + if (OPMODE & WIFI_AP_STATE) + { + if (pstat == NULL) { + DEBUG_WARN("rx tkip pstat == NULL\n"); + return FALSE; + } + keylen = GET_UNICAST_ENCRYP_KEYLEN; + ttkey = GET_UNICAST_ENCRYP_KEY; + } +#ifdef CLIENT_MODE + else if (OPMODE & WIFI_STATION_STATE) + { + if (IS_MCAST(da)) + { + keylen = GET_GROUP_ENCRYP_KEYLEN; + ttkey = GET_GROUP_ENCRYP_KEY; + } + else + { + if (pstat == NULL) { + DEBUG_WARN("rx tkip pstat == NULL\n"); + return FALSE; + } + keylen = GET_UNICAST_ENCRYP_KEYLEN; + ttkey = GET_UNICAST_ENCRYP_KEY; + } + } + else if (OPMODE & WIFI_ADHOC_STATE) + { + keylen = GET_GROUP_ENCRYP_KEYLEN; + ttkey = GET_GROUP_ENCRYP_KEY; + } +#endif + + if (keylen == 0) { + DEBUG_ERR("no descrypt key for TKIP due to keylen=0\n"); + return FALSE; + } +#ifdef WDS +do_tkip_decrypt: +#endif + tsc48._byte_.TSC1 = *(pframe + hdr_len + 0); + tsc48._byte_.TSC0 = *(pframe + hdr_len + 2); + tsc48._byte_.TSC2 = *(pframe + hdr_len + 4); + tsc48._byte_.TSC3 = *(pframe + hdr_len + 5); + tsc48._byte_.TSC4 = *(pframe + hdr_len + 6); + tsc48._byte_.TSC5 = *(pframe + hdr_len + 7); + pnl = get_pnl((union PN48 *)&tsc48); + pnh = get_pnh((union PN48 *)&tsc48); + + mix_key(ttkey, ta, pnl, pnh, rc4key); + + rc4_encrypt(rc4key, 16, pframe + hdr_len + 8, fr_len - hdr_len - 8, pframe + hdr_len + 8); + + // now, let's check if icv is correct! + crc = crc32(pframe + hdr_len + 8, fr_len - hdr_len - 8 - 4); + + crc = le32_to_cpu(crc); //crc is big endian located in the payload + if (memcmp((void *)&crc, (void *)(pframe + fr_len -4), 4)) + { + DEBUG_ERR("crc error!crc=%08X, vs %02X%02X%02X%02X\n", crc, + *(pframe + fr_len -4), + *(pframe + fr_len -3), + *(pframe + fr_len -2), + *(pframe + fr_len -1)); + return FALSE; + } + else + return TRUE; +} + + +void wep_encrypt(struct rtl8192cd_priv *priv, unsigned char *pwlhdr, unsigned int hdrlen, + unsigned char *frag1, unsigned int frag1_len, + unsigned char *frag2, unsigned int frag2_len, + unsigned char *frag3, unsigned int frag3_len, + int type) +{ + unsigned char *ra; + unsigned char *ttkey = NULL; + unsigned char rc4key[16]; + unsigned int keyid = 0; + unsigned char *iv = pwlhdr + hdrlen; + struct stat_info *pstat = NULL; + unsigned long *piv; + int keylen; +#ifdef WDS + unsigned int to_fr_ds = (GetToDs(pwlhdr) << 1) | GetFrDs(pwlhdr); +#endif + + DEBUG_TRACE; + + ra = GetAddr1Ptr(pwlhdr); + pstat = get_stainfo(priv, ra); + + if (pstat) { +#ifdef WDS + if ((to_fr_ds == 3) && (pstat->state & WIFI_WDS)) { +#ifdef CONFIG_RTL8186_KB + keyid = priv->pmib->dot1180211AuthEntry.dot11PrivacyKeyIndex; + ttkey = priv->pmib->dot11DefaultKeysTable.keytype[keyid&3].skey; +#else + ttkey = GET_UNICAST_ENCRYP_KEY; + keyid = pstat->keyid; +#endif + goto do_encrypt; + } +#endif + } + + if (priv->pmib->dot118021xAuthEntry.dot118021xAlgrthm) // 1x enabled, get key from mapping table + { + if (OPMODE & WIFI_AP_STATE) + { + if (IS_MCAST(ra)) + { + ttkey = GET_GROUP_ENCRYP_KEY; + keyid = 0; + } + else + { + if (pstat == NULL) { + DEBUG_ERR("tx wep pstat == NULL\n"); + return; + } + ttkey = GET_UNICAST_ENCRYP_KEY; + keyid = 3; + } + } +#ifdef CLIENT_MODE + else if (OPMODE & WIFI_STATION_STATE) + { + if (pstat == NULL) { + DEBUG_ERR("tx wep pstat == NULL\n"); + return; + } + ttkey = GET_UNICAST_ENCRYP_KEY; + keyid = 3; + } + else if (OPMODE & WIFI_ADHOC_STATE) + { + ttkey = GET_GROUP_ENCRYP_KEY; + keyid = 0; + } +#endif + } + else + { + keyid = priv->pmib->dot1180211AuthEntry.dot11PrivacyKeyIndex; + ttkey = priv->pmib->dot11DefaultKeysTable.keytype[keyid&3].skey; + } + +#ifdef WDS +do_encrypt: +#endif + + piv = (unsigned long *)GET_GROUP_ENCRYP_PN; + if (type == _WEP_40_PRIVACY_) + keylen = 8; + else + keylen = 16; + + *((unsigned long *)iv) = (htonl(*piv) << 8) | ((unsigned char) ((keyid&0x03)<<6)); + *piv = *piv + 1; + + memcpy(rc4key, iv, 3); + memcpy(&rc4key[3], ttkey, keylen-3); + +#ifdef _DEBUG_RTL8192CD_ +{ + char tmpbuf[400], tmp1[100]; + int i; + + tmp1[0] = '\0'; + memcpy(&tmp1[1], iv, 3); + sprintf(tmpbuf, "wep encrypt: iv=%d, keyid=%d, type=%s, key=", + (int)ntohl(*((unsigned long *)tmp1)), keyid, + (type==_WEP_40_PRIVACY_ ? "64b" : "128b")); + + for (i=0; i<keylen-3; i++) { + sprintf(tmp1, "%02x", ttkey[i]); + strcat(tmpbuf, tmp1); + if (i+1 != keylen-3) + strcat(tmpbuf, ":"); + else + strcat(tmpbuf, "\n"); + } + DEBUG_INFO("%s", tmpbuf); +} +#endif + + //okay, use rc4_encrypt go generate ciphertext. + rc4(rc4key, keylen, (frag1_len + frag2_len + frag3_len), tx_cipherstream); + + // now, using cipherstream to xor all the plaintext! + rc4_frag_encrypt(frag1, frag1_len, frag2, frag2_len, frag3, frag3_len, tx_cipherstream); +} + + +unsigned int wep_decrypt(struct rtl8192cd_priv *priv, struct rx_frinfo *pfrinfo, + unsigned int fr_len, int type, int using_keymap) +{ + unsigned char *ta; + unsigned int keylen, hdr_len, crc; + unsigned char *ttkey = NULL; + unsigned char iv[4]; + unsigned char rc4key[16]; + unsigned char *pframe; + struct stat_info *pstat = NULL; + + DEBUG_TRACE; + + pframe = get_pframe(pfrinfo); + ta = GetAddr2Ptr(pframe); + + hdr_len = pfrinfo->hdr_len; + memcpy(iv, pframe+hdr_len, sizeof(iv)); + + if (type == _WEP_40_PRIVACY_) + keylen = 8; + else + keylen = 16; + + pstat = get_stainfo(priv, ta); + + if (pstat) { +#ifdef WDS + if ((pfrinfo->to_fr_ds == 3) && (pstat->state & WIFI_WDS)) { + ttkey = GET_UNICAST_ENCRYP_KEY; + goto do_decrypt; + } +#endif + } + + if (priv->pmib->dot118021xAuthEntry.dot118021xAlgrthm) // 1x enabled, get key from mapping table + { + if (OPMODE & WIFI_AP_STATE) + { + if (using_keymap) { + if (pstat == NULL) { + DEBUG_ERR("rx wep pstat == NULL\n"); + return FALSE; + } + ttkey = GET_UNICAST_ENCRYP_KEY; + } + else if ((iv[3] & 0xC0) == 0) // key id=0, use group key + ttkey = GET_GROUP_ENCRYP_KEY; + else if ((iv[3] & 0xC0) == 0xC0) + { + if (pstat == NULL) { + DEBUG_ERR("rx wep pstat == NULL\n"); + return FALSE; + } + ttkey = GET_UNICAST_ENCRYP_KEY; + } + else + { + DEBUG_ERR("rx wep keyid != 0 and 3 \n"); + return FALSE; + } + } +#ifdef CLIENT_MODE + else if (OPMODE & WIFI_STATION_STATE) { + if ((iv[3] & 0xC0) == 0) // key id=0, use group key + ttkey = GET_GROUP_ENCRYP_KEY; + else if ((iv[3] & 0xC0) == 0xC0) + { + if (pstat == NULL) { + DEBUG_ERR("rx wep pstat == NULL\n"); + return FALSE; + } + ttkey = GET_UNICAST_ENCRYP_KEY; + } + else + { + DEBUG_ERR("rx wep keyid != 0 and 3 \n"); + return FALSE; + } + } + else if (OPMODE & WIFI_ADHOC_STATE) + ttkey = GET_GROUP_ENCRYP_KEY; +#endif + } + else // default key + ttkey = priv->pmib->dot11DefaultKeysTable.keytype[(iv[3]>>6) & 3].skey; + +#ifdef WDS +do_decrypt: +#endif + + memcpy(rc4key, iv, 3); + memcpy(&rc4key[3], ttkey, keylen-3); + +#ifdef _DEBUG_RTL8192CD_ +{ + char tmpbuf[400], tmp1[100]; + int i; + + tmp1[0] = '\0'; + memcpy(&tmp1[1], iv, 3); + sprintf(tmpbuf, "wep decript: iv=%d, keyid=%d, type=%s, key=", + (int)ntohl(*((unsigned long *)tmp1)), (int)((iv[3]>>6)&3), + (type==_WEP_40_PRIVACY_ ? "64b" : "128b")); + + for (i=0; i<keylen-3; i++) { + sprintf(tmp1, "%02x", ttkey[i]); + strcat(tmpbuf, tmp1); + if (i+1 != keylen-3) + strcat(tmpbuf, ":"); + else + strcat(tmpbuf, "\n"); + } + DEBUG_INFO("%s", tmpbuf); +} +#endif + + rc4_encrypt(rc4key, keylen, pframe+hdr_len+4, fr_len-hdr_len-4, pframe+hdr_len+4); + + // now, let's check if icv is correct! + crc = crc32(pframe+hdr_len+4, fr_len-hdr_len-4-4); + + crc = le32_to_cpu(crc); //crc is big endian located in the payload + if (memcmp((void *)&crc, (void *)(pframe + fr_len -4), 4)) { + DEBUG_ERR("crc error!crc=%08X, vs %02X%02X%02X%02X\n", crc, + *(pframe + fr_len -4), + *(pframe + fr_len -3), + *(pframe + fr_len -2), + *(pframe + fr_len -1)); + return FALSE; + } + else + return TRUE; +} + + +int tkip_rx_mic(struct rtl8192cd_priv *priv, unsigned char *pframe, unsigned char *da, + unsigned char *sa, unsigned char priority, unsigned char *pbuf, unsigned int len, + unsigned char *tkipmic, int no_wait) +{ + // now check what's the mic key we should apply... + + unsigned char *mickey = NULL; + unsigned int keylen = 0; + struct stat_info *pstat; + unsigned char hdr[16], *ta; + unsigned int num_blocks; + + ta = GetAddr2Ptr(pframe); + pstat = get_stainfo(priv, ta); + + if (OPMODE & WIFI_AP_STATE) + { +#ifdef WDS + unsigned int to_fr_ds = (GetToDs(pframe) << 1) | GetFrDs(pframe); +#endif + + if (pstat == NULL) { + DEBUG_ERR("rx mic pstat == NULL\n"); + return FALSE; + } + + keylen = GET_UNICAST_MIC_KEYLEN; +#ifdef WDS + if ( to_fr_ds==3 && (pstat->state & WIFI_WDS)) +#ifdef __DRAYTEK_OS__ + mickey = GET_UNICAST_TKIP_MIC2_KEY; +#else + mickey = GET_UNICAST_TKIP_MIC1_KEY; +#endif + else +#endif + mickey = GET_UNICAST_TKIP_MIC2_KEY; + } +#ifdef CLIENT_MODE + else if (OPMODE & WIFI_STATION_STATE) + { + if (IS_MCAST(da)) + { + keylen = GET_GROUP_MIC_KEYLEN; + mickey = GET_GROUP_TKIP_MIC1_KEY; + } + else + { + if (pstat == NULL) { + DEBUG_ERR("rx mic pstat == NULL\n"); + return FALSE; + } + + keylen = GET_UNICAST_MIC_KEYLEN; + mickey = GET_UNICAST_TKIP_MIC1_KEY; + } + } + else if (OPMODE & WIFI_ADHOC_STATE) + { + keylen = GET_GROUP_MIC_KEYLEN; + mickey = GET_GROUP_TKIP_MIC1_KEY; + } +#endif + + if (keylen == 0) + { + DEBUG_ERR("no mic padding for TKIP due to keylen=0\n"); + return FALSE; + } + memcpy((void *)hdr, (void *)da, WLAN_ADDR_LEN); + memcpy((void *)(hdr + WLAN_ADDR_LEN), (void *)sa, WLAN_ADDR_LEN); + hdr[12] = priority; + hdr[13] = hdr[14] = hdr[15] = 0; + + pbuf[len] = 0x5a; /* Insert padding */ + pbuf[len+1] = 0x00; + pbuf[len+2] = 0x00; + pbuf[len+3] = 0x00; + pbuf[len+4] = 0x00; + pbuf[len+5] = 0x00; + pbuf[len+6] = 0x00; + pbuf[len+7] = 0x00; + + num_blocks = (16 + len + 5)/4; // 8 is for snap_llc length = 8 + if ((16 + len + 5) & (4-1)) + num_blocks++; + + if ((priv->pshare->have_hw_mic) && + !(priv->pmib->dot11StationConfigEntry.swTkipMic)) + { + register unsigned long int l,r; + + michael(priv, mickey, hdr, pbuf, pbuf+8, (num_blocks << 2), tkipmic, 0); + + if (no_wait) + return FALSE; + + do { + delay_us(60); + } while ((*(volatile unsigned int *)GDMAISR & GDMA_COMPIP) == 0); + + l = *(volatile unsigned int *)GDMAICVL; + r = *(volatile unsigned int *)GDMAICVR; + + tkipmic[0] = (unsigned char)(l & 0xff); + tkipmic[1] = (unsigned char)((l >> 8) & 0xff); + tkipmic[2] = (unsigned char)((l >> 16) & 0xff); + tkipmic[3] = (unsigned char)((l >> 24) & 0xff); + tkipmic[4] = (unsigned char)(r & 0xff); + tkipmic[5] = (unsigned char)((r >> 8) & 0xff); + tkipmic[6] = (unsigned char)((r >> 16) & 0xff); + tkipmic[7] = (unsigned char)((r >> 24) & 0xff); + } + else + michael(priv, mickey, hdr, pbuf, pbuf+8, (num_blocks << 2), tkipmic, 0); + + return TRUE; +} + |