Linux Kernel  3.7.1
 All Data Structures Namespaces Files Functions Variables Typedefs Enumerations Enumerator Macros Groups Pages
rtllib_softmac.c
Go to the documentation of this file.
1 /* IEEE 802.11 SoftMAC layer
2  * Copyright (c) 2005 Andrea Merello <[email protected]>
3  *
4  * Mostly extracted from the rtl8180-sa2400 driver for the
5  * in-kernel generic ieee802.11 stack.
6  *
7  * Few lines might be stolen from other part of the rtllib
8  * stack. Copyright who own it's copyright
9  *
10  * WPA code stolen from the ipw2200 driver.
11  * Copyright who own it's copyright.
12  *
13  * released under the GPL
14  */
15 
16 
17 #include "rtllib.h"
18 
19 #include <linux/random.h>
20 #include <linux/delay.h>
21 #include <linux/uaccess.h>
22 #include <linux/etherdevice.h>
23 #include "dot11d.h"
24 
26 {
27  return (net->rates_ex_len > 0) || (net->rates_len > 4);
28 }
29 
31 {
33 }
34 
35 /* returns the total length needed for placing the RATE MFIE
36  * tag and the EXTENDED RATE MFIE tag if needed.
37  * It encludes two bytes per tag for the tag itself and its len
38  */
39 static unsigned int rtllib_MFIE_rate_len(struct rtllib_device *ieee)
40 {
41  unsigned int rate_len = 0;
42 
44  rate_len = RTLLIB_CCK_RATE_LEN + 2;
45 
47 
48  rate_len += RTLLIB_OFDM_RATE_LEN + 2;
49 
50  return rate_len;
51 }
52 
53 /* place the MFIE rate, tag to the memory (double) pointed.
54  * Then it updates the pointer so that
55  * it points after the new MFIE tag added.
56  */
57 static void rtllib_MFIE_Brate(struct rtllib_device *ieee, u8 **tag_p)
58 {
59  u8 *tag = *tag_p;
60 
61  if (ieee->modulation & RTLLIB_CCK_MODULATION) {
62  *tag++ = MFIE_TYPE_RATES;
63  *tag++ = 4;
68  }
69 
70  /* We may add an option for custom rates that specific HW
71  * might support */
72  *tag_p = tag;
73 }
74 
75 static void rtllib_MFIE_Grate(struct rtllib_device *ieee, u8 **tag_p)
76 {
77  u8 *tag = *tag_p;
78 
79  if (ieee->modulation & RTLLIB_OFDM_MODULATION) {
80  *tag++ = MFIE_TYPE_RATES_EX;
81  *tag++ = 8;
90  }
91  /* We may add an option for custom rates that specific HW might
92  * support */
93  *tag_p = tag;
94 }
95 
96 static void rtllib_WMM_Info(struct rtllib_device *ieee, u8 **tag_p)
97 {
98  u8 *tag = *tag_p;
99 
100  *tag++ = MFIE_TYPE_GENERIC;
101  *tag++ = 7;
102  *tag++ = 0x00;
103  *tag++ = 0x50;
104  *tag++ = 0xf2;
105  *tag++ = 0x02;
106  *tag++ = 0x00;
107  *tag++ = 0x01;
108  *tag++ = MAX_SP_Len;
109  *tag_p = tag;
110 }
111 
112 void rtllib_TURBO_Info(struct rtllib_device *ieee, u8 **tag_p)
113 {
114  u8 *tag = *tag_p;
115 
116  *tag++ = MFIE_TYPE_GENERIC;
117  *tag++ = 7;
118  *tag++ = 0x00;
119  *tag++ = 0xe0;
120  *tag++ = 0x4c;
121  *tag++ = 0x01;
122  *tag++ = 0x02;
123  *tag++ = 0x11;
124  *tag++ = 0x00;
125 
126  *tag_p = tag;
127  printk(KERN_ALERT "This is enable turbo mode IE process\n");
128 }
129 
130 static void enqueue_mgmt(struct rtllib_device *ieee, struct sk_buff *skb)
131 {
132  int nh;
133  nh = (ieee->mgmt_queue_head + 1) % MGMT_QUEUE_NUM;
134 
135 /*
136  * if the queue is full but we have newer frames then
137  * just overwrites the oldest.
138  *
139  * if (nh == ieee->mgmt_queue_tail)
140  * return -1;
141  */
142  ieee->mgmt_queue_head = nh;
143  ieee->mgmt_queue_ring[nh] = skb;
144 
145 }
146 
147 static struct sk_buff *dequeue_mgmt(struct rtllib_device *ieee)
148 {
149  struct sk_buff *ret;
150 
151  if (ieee->mgmt_queue_tail == ieee->mgmt_queue_head)
152  return NULL;
153 
154  ret = ieee->mgmt_queue_ring[ieee->mgmt_queue_tail];
155 
156  ieee->mgmt_queue_tail =
157  (ieee->mgmt_queue_tail+1) % MGMT_QUEUE_NUM;
158 
159  return ret;
160 }
161 
162 static void init_mgmt_queue(struct rtllib_device *ieee)
163 {
164  ieee->mgmt_queue_tail = ieee->mgmt_queue_head = 0;
165 }
166 
167 
168 u8
170 {
171  u16 i;
172  u8 QueryRate = 0;
173  u8 BasicRate;
174 
175 
176  for (i = 0; i < ieee->current_network.rates_len; i++) {
177  BasicRate = ieee->current_network.rates[i]&0x7F;
178  if (!rtllib_is_cck_rate(BasicRate)) {
179  if (QueryRate == 0) {
180  QueryRate = BasicRate;
181  } else {
182  if (BasicRate < QueryRate)
183  QueryRate = BasicRate;
184  }
185  }
186  }
187 
188  if (QueryRate == 0) {
189  QueryRate = 12;
190  printk(KERN_INFO "No BasicRate found!!\n");
191  }
192  return QueryRate;
193 }
194 
196 {
197  struct rt_hi_throughput *pHTInfo = ieee->pHTInfo;
198  u8 rate;
199 
200  if (pHTInfo->IOTAction & HT_IOT_ACT_MGNT_USE_CCK_6M)
201  rate = 0x0c;
202  else
203  rate = ieee->basic_rate & 0x7f;
204 
205  if (rate == 0) {
206  if (ieee->mode == IEEE_A ||
207  ieee->mode == IEEE_N_5G ||
208  (ieee->mode == IEEE_N_24G && !pHTInfo->bCurSuppCCK))
209  rate = 0x0c;
210  else
211  rate = 0x02;
212  }
213 
214  return rate;
215 }
216 
217 inline void softmac_mgmt_xmit(struct sk_buff *skb, struct rtllib_device *ieee)
218 {
219  unsigned long flags;
220  short single = ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE;
221  struct rtllib_hdr_3addr *header =
222  (struct rtllib_hdr_3addr *) skb->data;
223 
224  struct cb_desc *tcb_desc = (struct cb_desc *)(skb->cb + 8);
225  spin_lock_irqsave(&ieee->lock, flags);
226 
227  /* called with 2nd param 0, no mgmt lock required */
228  rtllib_sta_wakeup(ieee, 0);
229 
230  if (header->frame_ctl == RTLLIB_STYPE_BEACON)
231  tcb_desc->queue_index = BEACON_QUEUE;
232  else
233  tcb_desc->queue_index = MGNT_QUEUE;
234 
235  if (ieee->disable_mgnt_queue)
236  tcb_desc->queue_index = HIGH_QUEUE;
237 
238  tcb_desc->data_rate = MgntQuery_MgntFrameTxRate(ieee);
239  tcb_desc->RATRIndex = 7;
240  tcb_desc->bTxDisableRateFallBack = 1;
241  tcb_desc->bTxUseDriverAssingedRate = 1;
242  if (single) {
243  if (ieee->queue_stop) {
244  enqueue_mgmt(ieee, skb);
245  } else {
246  header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0]<<4);
247 
248  if (ieee->seq_ctrl[0] == 0xFFF)
249  ieee->seq_ctrl[0] = 0;
250  else
251  ieee->seq_ctrl[0]++;
252 
253  /* avoid watchdog triggers */
254  ieee->softmac_data_hard_start_xmit(skb, ieee->dev,
255  ieee->basic_rate);
256  }
257 
258  spin_unlock_irqrestore(&ieee->lock, flags);
259  } else {
260  spin_unlock_irqrestore(&ieee->lock, flags);
261  spin_lock_irqsave(&ieee->mgmt_tx_lock, flags);
262 
263  header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
264 
265  if (ieee->seq_ctrl[0] == 0xFFF)
266  ieee->seq_ctrl[0] = 0;
267  else
268  ieee->seq_ctrl[0]++;
269 
270  /* check whether the managed packet queued greater than 5 */
271  if (!ieee->check_nic_enough_desc(ieee->dev, tcb_desc->queue_index) ||
272  (skb_queue_len(&ieee->skb_waitQ[tcb_desc->queue_index]) != 0) ||
273  (ieee->queue_stop)) {
274  /* insert the skb packet to the management queue */
275  /* as for the completion function, it does not need
276  * to check it any more.
277  * */
278  printk(KERN_INFO "%s():insert to waitqueue, queue_index"
279  ":%d!\n", __func__, tcb_desc->queue_index);
280  skb_queue_tail(&ieee->skb_waitQ[tcb_desc->queue_index],
281  skb);
282  } else {
283  ieee->softmac_hard_start_xmit(skb, ieee->dev);
284  }
285  spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags);
286  }
287 }
288 
289 inline void softmac_ps_mgmt_xmit(struct sk_buff *skb,
290  struct rtllib_device *ieee)
291 {
292  short single = ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE;
293  struct rtllib_hdr_3addr *header =
294  (struct rtllib_hdr_3addr *) skb->data;
295  u16 fc, type, stype;
296  struct cb_desc *tcb_desc = (struct cb_desc *)(skb->cb + 8);
297 
298  fc = header->frame_ctl;
299  type = WLAN_FC_GET_TYPE(fc);
300  stype = WLAN_FC_GET_STYPE(fc);
301 
302 
303  if (stype != RTLLIB_STYPE_PSPOLL)
304  tcb_desc->queue_index = MGNT_QUEUE;
305  else
306  tcb_desc->queue_index = HIGH_QUEUE;
307 
308  if (ieee->disable_mgnt_queue)
309  tcb_desc->queue_index = HIGH_QUEUE;
310 
311 
312  tcb_desc->data_rate = MgntQuery_MgntFrameTxRate(ieee);
313  tcb_desc->RATRIndex = 7;
314  tcb_desc->bTxDisableRateFallBack = 1;
315  tcb_desc->bTxUseDriverAssingedRate = 1;
316  if (single) {
317  if (type != RTLLIB_FTYPE_CTL) {
318  header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
319 
320  if (ieee->seq_ctrl[0] == 0xFFF)
321  ieee->seq_ctrl[0] = 0;
322  else
323  ieee->seq_ctrl[0]++;
324 
325  }
326  /* avoid watchdog triggers */
327  ieee->softmac_data_hard_start_xmit(skb, ieee->dev,
328  ieee->basic_rate);
329 
330  } else {
331  if (type != RTLLIB_FTYPE_CTL) {
332  header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
333 
334  if (ieee->seq_ctrl[0] == 0xFFF)
335  ieee->seq_ctrl[0] = 0;
336  else
337  ieee->seq_ctrl[0]++;
338  }
339  ieee->softmac_hard_start_xmit(skb, ieee->dev);
340 
341  }
342 }
343 
344 inline struct sk_buff *rtllib_probe_req(struct rtllib_device *ieee)
345 {
346  unsigned int len, rate_len;
347  u8 *tag;
348  struct sk_buff *skb;
349  struct rtllib_probe_request *req;
350 
351  len = ieee->current_network.ssid_len;
352 
353  rate_len = rtllib_MFIE_rate_len(ieee);
354 
355  skb = dev_alloc_skb(sizeof(struct rtllib_probe_request) +
356  2 + len + rate_len + ieee->tx_headroom);
357 
358  if (!skb)
359  return NULL;
360 
361  skb_reserve(skb, ieee->tx_headroom);
362 
363  req = (struct rtllib_probe_request *) skb_put(skb,
364  sizeof(struct rtllib_probe_request));
365  req->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_PROBE_REQ);
366  req->header.duration_id = 0;
367 
368  memset(req->header.addr1, 0xff, ETH_ALEN);
369  memcpy(req->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
370  memset(req->header.addr3, 0xff, ETH_ALEN);
371 
372  tag = (u8 *) skb_put(skb, len + 2 + rate_len);
373 
374  *tag++ = MFIE_TYPE_SSID;
375  *tag++ = len;
376  memcpy(tag, ieee->current_network.ssid, len);
377  tag += len;
378 
379  rtllib_MFIE_Brate(ieee, &tag);
380  rtllib_MFIE_Grate(ieee, &tag);
381 
382  return skb;
383 }
384 
385 struct sk_buff *rtllib_get_beacon_(struct rtllib_device *ieee);
386 
387 static void rtllib_send_beacon(struct rtllib_device *ieee)
388 {
389  struct sk_buff *skb;
390  if (!ieee->ieee_up)
391  return;
392  skb = rtllib_get_beacon_(ieee);
393 
394  if (skb) {
395  softmac_mgmt_xmit(skb, ieee);
396  ieee->softmac_stats.tx_beacons++;
397  }
398 
399  if (ieee->beacon_txing && ieee->ieee_up)
400  mod_timer(&ieee->beacon_timer, jiffies +
401  (MSECS(ieee->current_network.beacon_interval - 5)));
402 }
403 
404 
405 static void rtllib_send_beacon_cb(unsigned long _ieee)
406 {
407  struct rtllib_device *ieee =
408  (struct rtllib_device *) _ieee;
409  unsigned long flags;
410 
411  spin_lock_irqsave(&ieee->beacon_lock, flags);
412  rtllib_send_beacon(ieee);
413  spin_unlock_irqrestore(&ieee->beacon_lock, flags);
414 }
415 
416 /*
417  * Description:
418  * Enable network monitor mode, all rx packets will be received.
419  */
421  bool bInitState)
422 {
423  struct rtllib_device *ieee = netdev_priv_rsl(dev);
424 
425  printk(KERN_INFO "========>Enter Monitor Mode\n");
426 
427  ieee->AllowAllDestAddrHandler(dev, true, !bInitState);
428 }
429 
430 
431 /*
432  * Description:
433  * Disable network network monitor mode, only packets destinated to
434  * us will be received.
435  */
437  bool bInitState)
438 {
439  struct rtllib_device *ieee = netdev_priv_rsl(dev);
440 
441  printk(KERN_INFO "========>Exit Monitor Mode\n");
442 
443  ieee->AllowAllDestAddrHandler(dev, false, !bInitState);
444 }
445 
446 
447 /*
448  * Description:
449  * This enables the specialized promiscuous mode required by Intel.
450  * In this mode, Intel intends to hear traffics from/to other STAs in the
451  * same BSS. Therefore we don't have to disable checking BSSID and we only need
452  * to allow all dest. BUT: if we enable checking BSSID then we can't recv
453  * packets from other STA.
454  */
456  bool bInitState)
457 {
458  bool bFilterOutNonAssociatedBSSID = false;
459 
460  struct rtllib_device *ieee = netdev_priv_rsl(dev);
461 
462  printk(KERN_INFO "========>Enter Intel Promiscuous Mode\n");
463 
464  ieee->AllowAllDestAddrHandler(dev, true, !bInitState);
466  (u8 *)&bFilterOutNonAssociatedBSSID);
467 
468  ieee->bNetPromiscuousMode = true;
469 }
471 
472 
473 /*
474  * Description:
475  * This disables the specialized promiscuous mode required by Intel.
476  * See MgntEnableIntelPromiscuousMode for detail.
477  */
479  bool bInitState)
480 {
481  bool bFilterOutNonAssociatedBSSID = true;
482 
483  struct rtllib_device *ieee = netdev_priv_rsl(dev);
484 
485  printk(KERN_INFO "========>Exit Intel Promiscuous Mode\n");
486 
487  ieee->AllowAllDestAddrHandler(dev, false, !bInitState);
489  (u8 *)&bFilterOutNonAssociatedBSSID);
490 
491  ieee->bNetPromiscuousMode = false;
492 }
494 
495 static void rtllib_send_probe(struct rtllib_device *ieee, u8 is_mesh)
496 {
497  struct sk_buff *skb;
498  skb = rtllib_probe_req(ieee);
499  if (skb) {
500  softmac_mgmt_xmit(skb, ieee);
501  ieee->softmac_stats.tx_probe_rq++;
502  }
503 }
504 
505 
506 void rtllib_send_probe_requests(struct rtllib_device *ieee, u8 is_mesh)
507 {
508  if (ieee->active_scan && (ieee->softmac_features &
510  rtllib_send_probe(ieee, 0);
511  rtllib_send_probe(ieee, 0);
512  }
513 }
514 
515 static void rtllib_softmac_hint11d_wq(void *data)
516 {
517 }
518 
520 {
521  memcpy(ieee->active_channel_map, GET_DOT11D_INFO(ieee)->channel_map,
523 }
524 
525 /* this performs syncro scan blocking the caller until all channels
526  * in the allowed channel map has been checked.
527  */
528 void rtllib_softmac_scan_syncro(struct rtllib_device *ieee, u8 is_mesh)
529 {
530  union iwreq_data wrqu;
531  short ch = 0;
532 
534 
535  ieee->be_scan_inprogress = true;
536 
537  down(&ieee->scan_sem);
538 
539  while (1) {
540  do {
541  ch++;
542  if (ch > MAX_CHANNEL_NUMBER)
543  goto out; /* scan completed */
544  } while (!ieee->active_channel_map[ch]);
545 
546  /* this fuction can be called in two situations
547  * 1- We have switched to ad-hoc mode and we are
548  * performing a complete syncro scan before conclude
549  * there are no interesting cell and to create a
550  * new one. In this case the link state is
551  * RTLLIB_NOLINK until we found an interesting cell.
552  * If so the ieee8021_new_net, called by the RX path
553  * will set the state to RTLLIB_LINKED, so we stop
554  * scanning
555  * 2- We are linked and the root uses run iwlist scan.
556  * So we switch to RTLLIB_LINKED_SCANNING to remember
557  * that we are still logically linked (not interested in
558  * new network events, despite for updating the net list,
559  * but we are temporarly 'unlinked' as the driver shall
560  * not filter RX frames and the channel is changing.
561  * So the only situation in which are interested is to check
562  * if the state become LINKED because of the #1 situation
563  */
564 
565  if (ieee->state == RTLLIB_LINKED)
566  goto out;
567  if (ieee->sync_scan_hurryup) {
568  printk(KERN_INFO "============>sync_scan_hurryup out\n");
569  goto out;
570  }
571 
572  ieee->set_chan(ieee->dev, ch);
573  if (ieee->active_channel_map[ch] == 1)
575 
576  /* this prevent excessive time wait when we
577  * need to wait for a syncro scan to end..
578  */
580  }
581 out:
582  ieee->actscanning = false;
583  ieee->sync_scan_hurryup = 0;
584 
585  if (ieee->state >= RTLLIB_LINKED) {
586  if (IS_DOT11D_ENABLE(ieee))
587  DOT11D_ScanComplete(ieee);
588  }
589  up(&ieee->scan_sem);
590 
591  ieee->be_scan_inprogress = false;
592 
593  memset(&wrqu, 0, sizeof(wrqu));
594  wireless_send_event(ieee->dev, SIOCGIWSCAN, &wrqu, NULL);
595 }
596 
597 static void rtllib_softmac_scan_wq(void *data)
598 {
599  struct rtllib_device *ieee = container_of_dwork_rsl(data,
601  u8 last_channel = ieee->current_network.channel;
602 
604 
605  if (!ieee->ieee_up)
606  return;
607  if (rtllib_act_scanning(ieee, true) == true)
608  return;
609 
610  down(&ieee->scan_sem);
611 
612  if (ieee->eRFPowerState == eRfOff) {
613  printk(KERN_INFO "======>%s():rf state is eRfOff, return\n",
614  __func__);
615  goto out1;
616  }
617 
618  do {
619  ieee->current_network.channel =
620  (ieee->current_network.channel + 1) %
622  if (ieee->scan_watch_dog++ > MAX_CHANNEL_NUMBER) {
623  if (!ieee->active_channel_map[ieee->current_network.channel])
624  ieee->current_network.channel = 6;
625  goto out; /* no good chans */
626  }
627  } while (!ieee->active_channel_map[ieee->current_network.channel]);
628 
629  if (ieee->scanning_continue == 0)
630  goto out;
631 
632  ieee->set_chan(ieee->dev, ieee->current_network.channel);
633 
634  if (ieee->active_channel_map[ieee->current_network.channel] == 1)
636 
639 
640  up(&ieee->scan_sem);
641  return;
642 
643 out:
644  if (IS_DOT11D_ENABLE(ieee))
645  DOT11D_ScanComplete(ieee);
646  ieee->current_network.channel = last_channel;
647 
648 out1:
649  ieee->actscanning = false;
650  ieee->scan_watch_dog = 0;
651  ieee->scanning_continue = 0;
652  up(&ieee->scan_sem);
653 }
654 
655 
656 
657 static void rtllib_beacons_start(struct rtllib_device *ieee)
658 {
659  unsigned long flags;
660  spin_lock_irqsave(&ieee->beacon_lock, flags);
661 
662  ieee->beacon_txing = 1;
663  rtllib_send_beacon(ieee);
664 
665  spin_unlock_irqrestore(&ieee->beacon_lock, flags);
666 }
667 
668 static void rtllib_beacons_stop(struct rtllib_device *ieee)
669 {
670  unsigned long flags;
671 
672  spin_lock_irqsave(&ieee->beacon_lock, flags);
673 
674  ieee->beacon_txing = 0;
676 
677  spin_unlock_irqrestore(&ieee->beacon_lock, flags);
678 
679 }
680 
681 
683 {
684  if (ieee->stop_send_beacons)
685  ieee->stop_send_beacons(ieee->dev);
687  rtllib_beacons_stop(ieee);
688 }
690 
691 
693 {
694  if (ieee->start_send_beacons)
695  ieee->start_send_beacons(ieee->dev);
697  rtllib_beacons_start(ieee);
698 }
700 
701 
702 static void rtllib_softmac_stop_scan(struct rtllib_device *ieee)
703 {
704  down(&ieee->scan_sem);
705  ieee->scan_watch_dog = 0;
706  if (ieee->scanning_continue == 1) {
707  ieee->scanning_continue = 0;
708  ieee->actscanning = 0;
709 
711  }
712 
713  up(&ieee->scan_sem);
714 }
715 
716 void rtllib_stop_scan(struct rtllib_device *ieee)
717 {
718  if (ieee->softmac_features & IEEE_SOFTMAC_SCAN) {
719  rtllib_softmac_stop_scan(ieee);
720  } else {
721  if (ieee->rtllib_stop_hw_scan)
722  ieee->rtllib_stop_hw_scan(ieee->dev);
723  }
724 }
726 
728 {
729  if (ieee->softmac_features & IEEE_SOFTMAC_SCAN) {
730  ieee->sync_scan_hurryup = 1;
731  } else {
732  if (ieee->rtllib_stop_hw_scan)
733  ieee->rtllib_stop_hw_scan(ieee->dev);
734  }
735 }
737 
738 bool rtllib_act_scanning(struct rtllib_device *ieee, bool sync_scan)
739 {
740  if (ieee->softmac_features & IEEE_SOFTMAC_SCAN) {
741  if (sync_scan)
742  return ieee->be_scan_inprogress;
743  else
744  return ieee->actscanning || ieee->be_scan_inprogress;
745  } else {
746  return test_bit(STATUS_SCANNING, &ieee->status);
747  }
748 }
750 
751 /* called with ieee->lock held */
752 static void rtllib_start_scan(struct rtllib_device *ieee)
753 {
754  RT_TRACE(COMP_DBG, "===>%s()\n", __func__);
755  if (ieee->rtllib_ips_leave_wq != NULL)
756  ieee->rtllib_ips_leave_wq(ieee->dev);
757 
758  if (IS_DOT11D_ENABLE(ieee)) {
759  if (IS_COUNTRY_IE_VALID(ieee))
760  RESET_CIE_WATCHDOG(ieee);
761  }
762  if (ieee->softmac_features & IEEE_SOFTMAC_SCAN) {
763  if (ieee->scanning_continue == 0) {
764  ieee->actscanning = true;
765  ieee->scanning_continue = 1;
767  &ieee->softmac_scan_wq, 0);
768  }
769  } else {
770  if (ieee->rtllib_start_hw_scan)
771  ieee->rtllib_start_hw_scan(ieee->dev);
772  }
773 }
774 
775 /* called with wx_sem held */
776 void rtllib_start_scan_syncro(struct rtllib_device *ieee, u8 is_mesh)
777 {
778  if (IS_DOT11D_ENABLE(ieee)) {
779  if (IS_COUNTRY_IE_VALID(ieee))
780  RESET_CIE_WATCHDOG(ieee);
781  }
782  ieee->sync_scan_hurryup = 0;
783  if (ieee->softmac_features & IEEE_SOFTMAC_SCAN) {
784  rtllib_softmac_scan_syncro(ieee, is_mesh);
785  } else {
786  if (ieee->rtllib_start_hw_scan)
787  ieee->rtllib_start_hw_scan(ieee->dev);
788  }
789 }
791 
793  struct rtllib_device *ieee, int challengelen, u8 *daddr)
794 {
795  struct sk_buff *skb;
796  struct rtllib_authentication *auth;
797  int len = 0;
798  len = sizeof(struct rtllib_authentication) + challengelen +
799  ieee->tx_headroom + 4;
800  skb = dev_alloc_skb(len);
801 
802  if (!skb)
803  return NULL;
804 
805  skb_reserve(skb, ieee->tx_headroom);
806 
807  auth = (struct rtllib_authentication *)
808  skb_put(skb, sizeof(struct rtllib_authentication));
809 
810  auth->header.frame_ctl = RTLLIB_STYPE_AUTH;
811  if (challengelen)
812  auth->header.frame_ctl |= RTLLIB_FCTL_WEP;
813 
814  auth->header.duration_id = 0x013a;
815  memcpy(auth->header.addr1, beacon->bssid, ETH_ALEN);
816  memcpy(auth->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
817  memcpy(auth->header.addr3, beacon->bssid, ETH_ALEN);
818  if (ieee->auth_mode == 0)
819  auth->algorithm = WLAN_AUTH_OPEN;
820  else if (ieee->auth_mode == 1)
822  else if (ieee->auth_mode == 2)
823  auth->algorithm = WLAN_AUTH_OPEN;
824  auth->transaction = cpu_to_le16(ieee->associate_seq);
825  ieee->associate_seq++;
826 
828 
829  return skb;
830 }
831 
832 static struct sk_buff *rtllib_probe_resp(struct rtllib_device *ieee, u8 *dest)
833 {
834  u8 *tag;
835  int beacon_size;
836  struct rtllib_probe_response *beacon_buf;
837  struct sk_buff *skb = NULL;
838  int encrypt;
839  int atim_len, erp_len;
840  struct lib80211_crypt_data *crypt;
841 
842  char *ssid = ieee->current_network.ssid;
843  int ssid_len = ieee->current_network.ssid_len;
844  int rate_len = ieee->current_network.rates_len+2;
845  int rate_ex_len = ieee->current_network.rates_ex_len;
846  int wpa_ie_len = ieee->wpa_ie_len;
847  u8 erpinfo_content = 0;
848 
849  u8 *tmp_ht_cap_buf = NULL;
850  u8 tmp_ht_cap_len = 0;
851  u8 *tmp_ht_info_buf = NULL;
852  u8 tmp_ht_info_len = 0;
853  struct rt_hi_throughput *pHTInfo = ieee->pHTInfo;
854  u8 *tmp_generic_ie_buf = NULL;
855  u8 tmp_generic_ie_len = 0;
856 
857  if (rate_ex_len > 0)
858  rate_ex_len += 2;
859 
860  if (ieee->current_network.capability & WLAN_CAPABILITY_IBSS)
861  atim_len = 4;
862  else
863  atim_len = 0;
864 
865  if ((ieee->current_network.mode == IEEE_G) ||
866  (ieee->current_network.mode == IEEE_N_24G &&
867  ieee->pHTInfo->bCurSuppCCK)) {
868  erp_len = 3;
869  erpinfo_content = 0;
870  if (ieee->current_network.buseprotection)
871  erpinfo_content |= ERP_UseProtection;
872  } else
873  erp_len = 0;
874 
875  crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx];
876  encrypt = ieee->host_encrypt && crypt && crypt->ops &&
877  ((0 == strcmp(crypt->ops->name, "R-WEP") || wpa_ie_len));
878  if (ieee->pHTInfo->bCurrentHTSupport) {
879  tmp_ht_cap_buf = (u8 *) &(ieee->pHTInfo->SelfHTCap);
880  tmp_ht_cap_len = sizeof(ieee->pHTInfo->SelfHTCap);
881  tmp_ht_info_buf = (u8 *) &(ieee->pHTInfo->SelfHTInfo);
882  tmp_ht_info_len = sizeof(ieee->pHTInfo->SelfHTInfo);
883  HTConstructCapabilityElement(ieee, tmp_ht_cap_buf,
884  &tmp_ht_cap_len, encrypt, false);
885  HTConstructInfoElement(ieee, tmp_ht_info_buf, &tmp_ht_info_len,
886  encrypt);
887 
888  if (pHTInfo->bRegRT2RTAggregation) {
889  tmp_generic_ie_buf = ieee->pHTInfo->szRT2RTAggBuffer;
890  tmp_generic_ie_len =
891  sizeof(ieee->pHTInfo->szRT2RTAggBuffer);
892  HTConstructRT2RTAggElement(ieee, tmp_generic_ie_buf,
893  &tmp_generic_ie_len);
894  }
895  }
896 
897  beacon_size = sizeof(struct rtllib_probe_response)+2+
898  ssid_len + 3 + rate_len + rate_ex_len + atim_len + erp_len
899  + wpa_ie_len + ieee->tx_headroom;
900  skb = dev_alloc_skb(beacon_size);
901  if (!skb)
902  return NULL;
903 
904  skb_reserve(skb, ieee->tx_headroom);
905 
906  beacon_buf = (struct rtllib_probe_response *) skb_put(skb,
907  (beacon_size - ieee->tx_headroom));
908  memcpy(beacon_buf->header.addr1, dest, ETH_ALEN);
909  memcpy(beacon_buf->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
910  memcpy(beacon_buf->header.addr3, ieee->current_network.bssid, ETH_ALEN);
911 
912  beacon_buf->header.duration_id = 0;
913  beacon_buf->beacon_interval =
914  cpu_to_le16(ieee->current_network.beacon_interval);
915  beacon_buf->capability =
916  cpu_to_le16(ieee->current_network.capability &
918  beacon_buf->capability |=
919  cpu_to_le16(ieee->current_network.capability &
921 
922  if (ieee->short_slot && (ieee->current_network.capability &
924  cpu_to_le16((beacon_buf->capability |=
926 
927  crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx];
928  if (encrypt)
930 
931 
932  beacon_buf->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_PROBE_RESP);
933  beacon_buf->info_element[0].id = MFIE_TYPE_SSID;
934  beacon_buf->info_element[0].len = ssid_len;
935 
936  tag = (u8 *) beacon_buf->info_element[0].data;
937 
938  memcpy(tag, ssid, ssid_len);
939 
940  tag += ssid_len;
941 
942  *(tag++) = MFIE_TYPE_RATES;
943  *(tag++) = rate_len-2;
944  memcpy(tag, ieee->current_network.rates, rate_len-2);
945  tag += rate_len-2;
946 
947  *(tag++) = MFIE_TYPE_DS_SET;
948  *(tag++) = 1;
949  *(tag++) = ieee->current_network.channel;
950 
951  if (atim_len) {
952  u16 val16;
953  *(tag++) = MFIE_TYPE_IBSS_SET;
954  *(tag++) = 2;
955  val16 = cpu_to_le16(ieee->current_network.atim_window);
956  memcpy((u8 *)tag, (u8 *)&val16, 2);
957  tag += 2;
958  }
959 
960  if (erp_len) {
961  *(tag++) = MFIE_TYPE_ERP;
962  *(tag++) = 1;
963  *(tag++) = erpinfo_content;
964  }
965  if (rate_ex_len) {
966  *(tag++) = MFIE_TYPE_RATES_EX;
967  *(tag++) = rate_ex_len-2;
968  memcpy(tag, ieee->current_network.rates_ex, rate_ex_len-2);
969  tag += rate_ex_len-2;
970  }
971 
972  if (wpa_ie_len) {
973  if (ieee->iw_mode == IW_MODE_ADHOC)
974  memcpy(&ieee->wpa_ie[14], &ieee->wpa_ie[8], 4);
975  memcpy(tag, ieee->wpa_ie, ieee->wpa_ie_len);
976  tag += ieee->wpa_ie_len;
977  }
978  return skb;
979 }
980 
981 static struct sk_buff *rtllib_assoc_resp(struct rtllib_device *ieee, u8 *dest)
982 {
983  struct sk_buff *skb;
984  u8 *tag;
985 
986  struct lib80211_crypt_data *crypt;
987  struct rtllib_assoc_response_frame *assoc;
988  short encrypt;
989 
990  unsigned int rate_len = rtllib_MFIE_rate_len(ieee);
991  int len = sizeof(struct rtllib_assoc_response_frame) + rate_len +
992  ieee->tx_headroom;
993 
994  skb = dev_alloc_skb(len);
995 
996  if (!skb)
997  return NULL;
998 
999  skb_reserve(skb, ieee->tx_headroom);
1000 
1001  assoc = (struct rtllib_assoc_response_frame *)
1002  skb_put(skb, sizeof(struct rtllib_assoc_response_frame));
1003 
1004  assoc->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_ASSOC_RESP);
1005  memcpy(assoc->header.addr1, dest, ETH_ALEN);
1006  memcpy(assoc->header.addr3, ieee->dev->dev_addr, ETH_ALEN);
1007  memcpy(assoc->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
1008  assoc->capability = cpu_to_le16(ieee->iw_mode == IW_MODE_MASTER ?
1010 
1011 
1012  if (ieee->short_slot)
1013  assoc->capability |=
1015 
1016  if (ieee->host_encrypt)
1017  crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx];
1018  else
1019  crypt = NULL;
1020 
1021  encrypt = (crypt && crypt->ops);
1022 
1023  if (encrypt)
1025 
1026  assoc->status = 0;
1027  assoc->aid = cpu_to_le16(ieee->assoc_id);
1028  if (ieee->assoc_id == 0x2007)
1029  ieee->assoc_id = 0;
1030  else
1031  ieee->assoc_id++;
1032 
1033  tag = (u8 *) skb_put(skb, rate_len);
1034  rtllib_MFIE_Brate(ieee, &tag);
1035  rtllib_MFIE_Grate(ieee, &tag);
1036 
1037  return skb;
1038 }
1039 
1040 static struct sk_buff *rtllib_auth_resp(struct rtllib_device *ieee, int status,
1041  u8 *dest)
1042 {
1043  struct sk_buff *skb = NULL;
1044  struct rtllib_authentication *auth;
1045  int len = ieee->tx_headroom + sizeof(struct rtllib_authentication) + 1;
1046  skb = dev_alloc_skb(len);
1047  if (!skb)
1048  return NULL;
1049 
1050  skb->len = sizeof(struct rtllib_authentication);
1051 
1052  skb_reserve(skb, ieee->tx_headroom);
1053 
1054  auth = (struct rtllib_authentication *)
1055  skb_put(skb, sizeof(struct rtllib_authentication));
1056 
1057  auth->status = cpu_to_le16(status);
1058  auth->transaction = cpu_to_le16(2);
1060 
1061  memcpy(auth->header.addr3, ieee->dev->dev_addr, ETH_ALEN);
1062  memcpy(auth->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
1063  memcpy(auth->header.addr1, dest, ETH_ALEN);
1064  auth->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_AUTH);
1065  return skb;
1066 
1067 
1068 }
1069 
1070 static struct sk_buff *rtllib_null_func(struct rtllib_device *ieee, short pwr)
1071 {
1072  struct sk_buff *skb;
1073  struct rtllib_hdr_3addr *hdr;
1074 
1075  skb = dev_alloc_skb(sizeof(struct rtllib_hdr_3addr)+ieee->tx_headroom);
1076  if (!skb)
1077  return NULL;
1078 
1079  skb_reserve(skb, ieee->tx_headroom);
1080 
1081  hdr = (struct rtllib_hdr_3addr *)skb_put(skb,
1082  sizeof(struct rtllib_hdr_3addr));
1083 
1084  memcpy(hdr->addr1, ieee->current_network.bssid, ETH_ALEN);
1085  memcpy(hdr->addr2, ieee->dev->dev_addr, ETH_ALEN);
1086  memcpy(hdr->addr3, ieee->current_network.bssid, ETH_ALEN);
1087 
1090  (pwr ? RTLLIB_FCTL_PM : 0));
1091 
1092  return skb;
1093 
1094 
1095 }
1096 
1097 static struct sk_buff *rtllib_pspoll_func(struct rtllib_device *ieee)
1098 {
1099  struct sk_buff *skb;
1100  struct rtllib_pspoll_hdr *hdr;
1101 
1102  skb = dev_alloc_skb(sizeof(struct rtllib_pspoll_hdr)+ieee->tx_headroom);
1103  if (!skb)
1104  return NULL;
1105 
1106  skb_reserve(skb, ieee->tx_headroom);
1107 
1108  hdr = (struct rtllib_pspoll_hdr *)skb_put(skb,
1109  sizeof(struct rtllib_pspoll_hdr));
1110 
1111  memcpy(hdr->bssid, ieee->current_network.bssid, ETH_ALEN);
1112  memcpy(hdr->ta, ieee->dev->dev_addr, ETH_ALEN);
1113 
1114  hdr->aid = cpu_to_le16(ieee->assoc_id | 0xc000);
1116  RTLLIB_FCTL_PM);
1117 
1118  return skb;
1119 
1120 }
1121 
1122 static void rtllib_resp_to_assoc_rq(struct rtllib_device *ieee, u8 *dest)
1123 {
1124  struct sk_buff *buf = rtllib_assoc_resp(ieee, dest);
1125 
1126  if (buf)
1127  softmac_mgmt_xmit(buf, ieee);
1128 }
1129 
1130 
1131 static void rtllib_resp_to_auth(struct rtllib_device *ieee, int s, u8 *dest)
1132 {
1133  struct sk_buff *buf = rtllib_auth_resp(ieee, s, dest);
1134 
1135  if (buf)
1136  softmac_mgmt_xmit(buf, ieee);
1137 }
1138 
1139 
1140 static void rtllib_resp_to_probe(struct rtllib_device *ieee, u8 *dest)
1141 {
1142 
1143  struct sk_buff *buf = rtllib_probe_resp(ieee, dest);
1144  if (buf)
1145  softmac_mgmt_xmit(buf, ieee);
1146 }
1147 
1148 
1149 inline int SecIsInPMKIDList(struct rtllib_device *ieee, u8 *bssid)
1150 {
1151  int i = 0;
1152 
1153  do {
1154  if ((ieee->PMKIDList[i].bUsed) &&
1155  (memcmp(ieee->PMKIDList[i].Bssid, bssid, ETH_ALEN) == 0))
1156  break;
1157  else
1158  i++;
1159  } while (i < NUM_PMKID_CACHE);
1160 
1161  if (i == NUM_PMKID_CACHE)
1162  i = -1;
1163  return i;
1164 }
1165 
1167  struct rtllib_device *ieee)
1168 {
1169  struct sk_buff *skb;
1171  u8 *tag, *ies;
1172  int i;
1173  u8 *ht_cap_buf = NULL;
1174  u8 ht_cap_len = 0;
1175  u8 *realtek_ie_buf = NULL;
1176  u8 realtek_ie_len = 0;
1177  int wpa_ie_len = ieee->wpa_ie_len;
1178  int wps_ie_len = ieee->wps_ie_len;
1179  unsigned int ckip_ie_len = 0;
1180  unsigned int ccxrm_ie_len = 0;
1181  unsigned int cxvernum_ie_len = 0;
1182  struct lib80211_crypt_data *crypt;
1183  int encrypt;
1184  int PMKCacheIdx;
1185 
1186  unsigned int rate_len = (beacon->rates_len ?
1187  (beacon->rates_len + 2) : 0) +
1188  (beacon->rates_ex_len ? (beacon->rates_ex_len) +
1189  2 : 0);
1190 
1191  unsigned int wmm_info_len = beacon->qos_data.supported ? 9 : 0;
1192  unsigned int turbo_info_len = beacon->Turbo_Enable ? 9 : 0;
1193 
1194  int len = 0;
1195  crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx];
1196  if (crypt != NULL)
1197  encrypt = ieee->host_encrypt && crypt && crypt->ops &&
1198  ((0 == strcmp(crypt->ops->name, "R-WEP") ||
1199  wpa_ie_len));
1200  else
1201  encrypt = 0;
1202 
1203  if ((ieee->rtllib_ap_sec_type &&
1204  (ieee->rtllib_ap_sec_type(ieee) & SEC_ALG_TKIP)) ||
1205  (ieee->bForcedBgMode == true)) {
1206  ieee->pHTInfo->bEnableHT = 0;
1207  ieee->mode = WIRELESS_MODE_G;
1208  }
1209 
1210  if (ieee->pHTInfo->bCurrentHTSupport && ieee->pHTInfo->bEnableHT) {
1211  ht_cap_buf = (u8 *)&(ieee->pHTInfo->SelfHTCap);
1212  ht_cap_len = sizeof(ieee->pHTInfo->SelfHTCap);
1213  HTConstructCapabilityElement(ieee, ht_cap_buf, &ht_cap_len,
1214  encrypt, true);
1215  if (ieee->pHTInfo->bCurrentRT2RTAggregation) {
1216  realtek_ie_buf = ieee->pHTInfo->szRT2RTAggBuffer;
1217  realtek_ie_len =
1218  sizeof(ieee->pHTInfo->szRT2RTAggBuffer);
1219  HTConstructRT2RTAggElement(ieee, realtek_ie_buf,
1220  &realtek_ie_len);
1221  }
1222  }
1223 
1224  if (beacon->bCkipSupported)
1225  ckip_ie_len = 30+2;
1226  if (beacon->bCcxRmEnable)
1227  ccxrm_ie_len = 6+2;
1228  if (beacon->BssCcxVerNumber >= 2)
1229  cxvernum_ie_len = 5+2;
1230 
1231  PMKCacheIdx = SecIsInPMKIDList(ieee, ieee->current_network.bssid);
1232  if (PMKCacheIdx >= 0) {
1233  wpa_ie_len += 18;
1234  printk(KERN_INFO "[PMK cache]: WPA2 IE length: %x\n",
1235  wpa_ie_len);
1236  }
1237  len = sizeof(struct rtllib_assoc_request_frame) + 2
1238  + beacon->ssid_len
1239  + rate_len
1240  + wpa_ie_len
1241  + wps_ie_len
1242  + wmm_info_len
1243  + turbo_info_len
1244  + ht_cap_len
1245  + realtek_ie_len
1246  + ckip_ie_len
1247  + ccxrm_ie_len
1248  + cxvernum_ie_len
1249  + ieee->tx_headroom;
1250 
1251  skb = dev_alloc_skb(len);
1252 
1253  if (!skb)
1254  return NULL;
1255 
1256  skb_reserve(skb, ieee->tx_headroom);
1257 
1258  hdr = (struct rtllib_assoc_request_frame *)
1259  skb_put(skb, sizeof(struct rtllib_assoc_request_frame) + 2);
1260 
1261 
1262  hdr->header.frame_ctl = RTLLIB_STYPE_ASSOC_REQ;
1263  hdr->header.duration_id = 37;
1264  memcpy(hdr->header.addr1, beacon->bssid, ETH_ALEN);
1265  memcpy(hdr->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
1266  memcpy(hdr->header.addr3, beacon->bssid, ETH_ALEN);
1267 
1268  memcpy(ieee->ap_mac_addr, beacon->bssid, ETH_ALEN);
1269 
1271  if (beacon->capability & WLAN_CAPABILITY_PRIVACY)
1273 
1276 
1277  if (ieee->short_slot &&
1280 
1281 
1282  hdr->listen_interval = beacon->listen_interval;
1283 
1284  hdr->info_element[0].id = MFIE_TYPE_SSID;
1285 
1286  hdr->info_element[0].len = beacon->ssid_len;
1287  tag = skb_put(skb, beacon->ssid_len);
1288  memcpy(tag, beacon->ssid, beacon->ssid_len);
1289 
1290  tag = skb_put(skb, rate_len);
1291 
1292  if (beacon->rates_len) {
1293  *tag++ = MFIE_TYPE_RATES;
1294  *tag++ = beacon->rates_len;
1295  for (i = 0; i < beacon->rates_len; i++)
1296  *tag++ = beacon->rates[i];
1297  }
1298 
1299  if (beacon->rates_ex_len) {
1300  *tag++ = MFIE_TYPE_RATES_EX;
1301  *tag++ = beacon->rates_ex_len;
1302  for (i = 0; i < beacon->rates_ex_len; i++)
1303  *tag++ = beacon->rates_ex[i];
1304  }
1305 
1306  if (beacon->bCkipSupported) {
1307  static u8 AironetIeOui[] = {0x00, 0x01, 0x66};
1308  u8 CcxAironetBuf[30];
1309  struct octet_string osCcxAironetIE;
1310 
1311  memset(CcxAironetBuf, 0, 30);
1312  osCcxAironetIE.Octet = CcxAironetBuf;
1313  osCcxAironetIE.Length = sizeof(CcxAironetBuf);
1314  memcpy(osCcxAironetIE.Octet, AironetIeOui,
1315  sizeof(AironetIeOui));
1316 
1317  osCcxAironetIE.Octet[IE_CISCO_FLAG_POSITION] |=
1319  tag = skb_put(skb, ckip_ie_len);
1320  *tag++ = MFIE_TYPE_AIRONET;
1321  *tag++ = osCcxAironetIE.Length;
1322  memcpy(tag, osCcxAironetIE.Octet, osCcxAironetIE.Length);
1323  tag += osCcxAironetIE.Length;
1324  }
1325 
1326  if (beacon->bCcxRmEnable) {
1327  static u8 CcxRmCapBuf[] = {0x00, 0x40, 0x96, 0x01, 0x01, 0x00};
1328  struct octet_string osCcxRmCap;
1329 
1330  osCcxRmCap.Octet = CcxRmCapBuf;
1331  osCcxRmCap.Length = sizeof(CcxRmCapBuf);
1332  tag = skb_put(skb, ccxrm_ie_len);
1333  *tag++ = MFIE_TYPE_GENERIC;
1334  *tag++ = osCcxRmCap.Length;
1335  memcpy(tag, osCcxRmCap.Octet, osCcxRmCap.Length);
1336  tag += osCcxRmCap.Length;
1337  }
1338 
1339  if (beacon->BssCcxVerNumber >= 2) {
1340  u8 CcxVerNumBuf[] = {0x00, 0x40, 0x96, 0x03, 0x00};
1341  struct octet_string osCcxVerNum;
1342  CcxVerNumBuf[4] = beacon->BssCcxVerNumber;
1343  osCcxVerNum.Octet = CcxVerNumBuf;
1344  osCcxVerNum.Length = sizeof(CcxVerNumBuf);
1345  tag = skb_put(skb, cxvernum_ie_len);
1346  *tag++ = MFIE_TYPE_GENERIC;
1347  *tag++ = osCcxVerNum.Length;
1348  memcpy(tag, osCcxVerNum.Octet, osCcxVerNum.Length);
1349  tag += osCcxVerNum.Length;
1350  }
1351  if (ieee->pHTInfo->bCurrentHTSupport && ieee->pHTInfo->bEnableHT) {
1352  if (ieee->pHTInfo->ePeerHTSpecVer != HT_SPEC_VER_EWC) {
1353  tag = skb_put(skb, ht_cap_len);
1354  *tag++ = MFIE_TYPE_HT_CAP;
1355  *tag++ = ht_cap_len - 2;
1356  memcpy(tag, ht_cap_buf, ht_cap_len - 2);
1357  tag += ht_cap_len - 2;
1358  }
1359  }
1360 
1361  if (wpa_ie_len) {
1362  tag = skb_put(skb, ieee->wpa_ie_len);
1363  memcpy(tag, ieee->wpa_ie, ieee->wpa_ie_len);
1364 
1365  if (PMKCacheIdx >= 0) {
1366  tag = skb_put(skb, 18);
1367  *tag = 1;
1368  *(tag + 1) = 0;
1369  memcpy((tag + 2), &ieee->PMKIDList[PMKCacheIdx].PMKID,
1370  16);
1371  }
1372  }
1373  if (wmm_info_len) {
1374  tag = skb_put(skb, wmm_info_len);
1375  rtllib_WMM_Info(ieee, &tag);
1376  }
1377 
1378  if (wps_ie_len && ieee->wps_ie) {
1379  tag = skb_put(skb, wps_ie_len);
1380  memcpy(tag, ieee->wps_ie, wps_ie_len);
1381  }
1382 
1383  tag = skb_put(skb, turbo_info_len);
1384  if (turbo_info_len)
1385  rtllib_TURBO_Info(ieee, &tag);
1386 
1387  if (ieee->pHTInfo->bCurrentHTSupport && ieee->pHTInfo->bEnableHT) {
1388  if (ieee->pHTInfo->ePeerHTSpecVer == HT_SPEC_VER_EWC) {
1389  tag = skb_put(skb, ht_cap_len);
1390  *tag++ = MFIE_TYPE_GENERIC;
1391  *tag++ = ht_cap_len - 2;
1392  memcpy(tag, ht_cap_buf, ht_cap_len - 2);
1393  tag += ht_cap_len - 2;
1394  }
1395 
1396  if (ieee->pHTInfo->bCurrentRT2RTAggregation) {
1397  tag = skb_put(skb, realtek_ie_len);
1398  *tag++ = MFIE_TYPE_GENERIC;
1399  *tag++ = realtek_ie_len - 2;
1400  memcpy(tag, realtek_ie_buf, realtek_ie_len - 2);
1401  }
1402  }
1403 
1404  kfree(ieee->assocreq_ies);
1405  ieee->assocreq_ies = NULL;
1406  ies = &(hdr->info_element[0].id);
1407  ieee->assocreq_ies_len = (skb->data + skb->len) - ies;
1408  ieee->assocreq_ies = kmalloc(ieee->assocreq_ies_len, GFP_ATOMIC);
1409  if (ieee->assocreq_ies)
1410  memcpy(ieee->assocreq_ies, ies, ieee->assocreq_ies_len);
1411  else {
1412  printk(KERN_INFO "%s()Warning: can't alloc memory for assocreq"
1413  "_ies\n", __func__);
1414  ieee->assocreq_ies_len = 0;
1415  }
1416  return skb;
1417 }
1418 
1420 {
1421 
1422  unsigned long flags;
1423  spin_lock_irqsave(&ieee->lock, flags);
1424 
1425  ieee->associate_seq++;
1426 
1427  /* don't scan, and avoid to have the RX path possibily
1428  * try again to associate. Even do not react to AUTH or
1429  * ASSOC response. Just wait for the retry wq to be scheduled.
1430  * Here we will check if there are good nets to associate
1431  * with, so we retry or just get back to NO_LINK and scanning
1432  */
1434  RTLLIB_DEBUG_MGMT("Authentication failed\n");
1435  ieee->softmac_stats.no_auth_rs++;
1436  } else {
1437  RTLLIB_DEBUG_MGMT("Association failed\n");
1438  ieee->softmac_stats.no_ass_rs++;
1439  }
1440 
1442 
1445 
1446  spin_unlock_irqrestore(&ieee->lock, flags);
1447 }
1448 
1449 static void rtllib_associate_abort_cb(unsigned long dev)
1450 {
1451  rtllib_associate_abort((struct rtllib_device *) dev);
1452 }
1453 
1454 static void rtllib_associate_step1(struct rtllib_device *ieee, u8 * daddr)
1455 {
1456  struct rtllib_network *beacon = &ieee->current_network;
1457  struct sk_buff *skb;
1458 
1459  RTLLIB_DEBUG_MGMT("Stopping scan\n");
1460 
1461  ieee->softmac_stats.tx_auth_rq++;
1462 
1463  skb = rtllib_authentication_req(beacon, ieee, 0, daddr);
1464 
1465  if (!skb)
1466  rtllib_associate_abort(ieee);
1467  else {
1469  RTLLIB_DEBUG_MGMT("Sending authentication request\n");
1470  softmac_mgmt_xmit(skb, ieee);
1471  if (!timer_pending(&ieee->associate_timer)) {
1472  ieee->associate_timer.expires = jiffies + (HZ / 2);
1473  add_timer(&ieee->associate_timer);
1474  }
1475  }
1476 }
1477 
1478 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, int chlen)
1479 {
1480  u8 *c;
1481  struct sk_buff *skb;
1482  struct rtllib_network *beacon = &ieee->current_network;
1483 
1484  ieee->associate_seq++;
1485  ieee->softmac_stats.tx_auth_rq++;
1486 
1487  skb = rtllib_authentication_req(beacon, ieee, chlen + 2, beacon->bssid);
1488 
1489  if (!skb)
1490  rtllib_associate_abort(ieee);
1491  else {
1492  c = skb_put(skb, chlen+2);
1493  *(c++) = MFIE_TYPE_CHALLENGE;
1494  *(c++) = chlen;
1495  memcpy(c, challenge, chlen);
1496 
1497  RTLLIB_DEBUG_MGMT("Sending authentication challenge "
1498  "response\n");
1499 
1500  rtllib_encrypt_fragment(ieee, skb,
1501  sizeof(struct rtllib_hdr_3addr));
1502 
1503  softmac_mgmt_xmit(skb, ieee);
1504  mod_timer(&ieee->associate_timer, jiffies + (HZ/2));
1505  }
1506  kfree(challenge);
1507 }
1508 
1509 static void rtllib_associate_step2(struct rtllib_device *ieee)
1510 {
1511  struct sk_buff *skb;
1512  struct rtllib_network *beacon = &ieee->current_network;
1513 
1515 
1516  RTLLIB_DEBUG_MGMT("Sending association request\n");
1517 
1518  ieee->softmac_stats.tx_ass_rq++;
1519  skb = rtllib_association_req(beacon, ieee);
1520  if (!skb)
1521  rtllib_associate_abort(ieee);
1522  else {
1523  softmac_mgmt_xmit(skb, ieee);
1524  mod_timer(&ieee->associate_timer, jiffies + (HZ/2));
1525  }
1526 }
1527 
1528 #define CANCELLED 2
1529 static void rtllib_associate_complete_wq(void *data)
1530 {
1531  struct rtllib_device *ieee = (struct rtllib_device *)
1532  container_of_work_rsl(data,
1533  struct rtllib_device,
1535  struct rt_pwr_save_ctrl *pPSC = (struct rt_pwr_save_ctrl *)
1536  (&(ieee->PowerSaveControl));
1537  printk(KERN_INFO "Associated successfully\n");
1538  if (ieee->is_silent_reset == 0) {
1539  printk(KERN_INFO "normal associate\n");
1540  notify_wx_assoc_event(ieee);
1541  }
1542 
1543  netif_carrier_on(ieee->dev);
1544  ieee->is_roaming = false;
1545  if (rtllib_is_54g(&ieee->current_network) &&
1546  (ieee->modulation & RTLLIB_OFDM_MODULATION)) {
1547  ieee->rate = 108;
1548  printk(KERN_INFO"Using G rates:%d\n", ieee->rate);
1549  } else {
1550  ieee->rate = 22;
1551  ieee->SetWirelessMode(ieee->dev, IEEE_B);
1552  printk(KERN_INFO"Using B rates:%d\n", ieee->rate);
1553  }
1554  if (ieee->pHTInfo->bCurrentHTSupport && ieee->pHTInfo->bEnableHT) {
1555  printk(KERN_INFO "Successfully associated, ht enabled\n");
1556  HTOnAssocRsp(ieee);
1557  } else {
1558  printk(KERN_INFO "Successfully associated, ht not "
1559  "enabled(%d, %d)\n",
1560  ieee->pHTInfo->bCurrentHTSupport,
1561  ieee->pHTInfo->bEnableHT);
1562  memset(ieee->dot11HTOperationalRateSet, 0, 16);
1563  }
1564  ieee->LinkDetectInfo.SlotNum = 2 * (1 +
1565  ieee->current_network.beacon_interval /
1566  500);
1567  if (ieee->LinkDetectInfo.NumRecvBcnInPeriod == 0 ||
1568  ieee->LinkDetectInfo.NumRecvDataInPeriod == 0) {
1569  ieee->LinkDetectInfo.NumRecvBcnInPeriod = 1;
1570  ieee->LinkDetectInfo.NumRecvDataInPeriod = 1;
1571  }
1572  pPSC->LpsIdleCount = 0;
1573  ieee->link_change(ieee->dev);
1574 
1575  if (ieee->is_silent_reset == 1) {
1576  printk(KERN_INFO "silent reset associate\n");
1577  ieee->is_silent_reset = 0;
1578  }
1579 
1580  if (ieee->data_hard_resume)
1581  ieee->data_hard_resume(ieee->dev);
1582 
1583 }
1584 
1585 static void rtllib_sta_send_associnfo(struct rtllib_device *ieee)
1586 {
1587 }
1588 
1589 static void rtllib_associate_complete(struct rtllib_device *ieee)
1590 {
1592 
1593  ieee->state = RTLLIB_LINKED;
1594  rtllib_sta_send_associnfo(ieee);
1595 
1596  queue_work_rsl(ieee->wq, &ieee->associate_complete_wq);
1597 }
1598 
1599 static void rtllib_associate_procedure_wq(void *data)
1600 {
1601  struct rtllib_device *ieee = container_of_dwork_rsl(data,
1602  struct rtllib_device,
1605  if (ieee->rtllib_ips_leave != NULL)
1606  ieee->rtllib_ips_leave(ieee->dev);
1607  down(&ieee->wx_sem);
1608 
1609  if (ieee->data_hard_stop)
1610  ieee->data_hard_stop(ieee->dev);
1611 
1612  rtllib_stop_scan(ieee);
1613  RT_TRACE(COMP_DBG, "===>%s(), chan:%d\n", __func__,
1614  ieee->current_network.channel);
1616  if (ieee->eRFPowerState == eRfOff) {
1617  RT_TRACE(COMP_DBG, "=============>%s():Rf state is eRfOff,"
1618  " schedule ipsleave wq again,return\n", __func__);
1619  if (ieee->rtllib_ips_leave_wq != NULL)
1620  ieee->rtllib_ips_leave_wq(ieee->dev);
1621  up(&ieee->wx_sem);
1622  return;
1623  }
1624  ieee->associate_seq = 1;
1625 
1626  rtllib_associate_step1(ieee, ieee->current_network.bssid);
1627 
1628  up(&ieee->wx_sem);
1629 }
1630 
1631 inline void rtllib_softmac_new_net(struct rtllib_device *ieee,
1632  struct rtllib_network *net)
1633 {
1634  u8 tmp_ssid[IW_ESSID_MAX_SIZE + 1];
1635  int tmp_ssid_len = 0;
1636 
1637  short apset, ssidset, ssidbroad, apmatch, ssidmatch;
1638 
1639  /* we are interested in new new only if we are not associated
1640  * and we are not associating / authenticating
1641  */
1642  if (ieee->state != RTLLIB_NOLINK)
1643  return;
1644 
1645  if ((ieee->iw_mode == IW_MODE_INFRA) && !(net->capability &
1647  return;
1648 
1649  if ((ieee->iw_mode == IW_MODE_ADHOC) && !(net->capability &
1651  return;
1652 
1653  if ((ieee->iw_mode == IW_MODE_ADHOC) &&
1654  (net->channel > ieee->ibss_maxjoin_chal))
1655  return;
1656  if (ieee->iw_mode == IW_MODE_INFRA || ieee->iw_mode == IW_MODE_ADHOC) {
1657  /* if the user specified the AP MAC, we need also the essid
1658  * This could be obtained by beacons or, if the network does not
1659  * broadcast it, it can be put manually.
1660  */
1661  apset = ieee->wap_set;
1662  ssidset = ieee->ssid_set;
1663  ssidbroad = !(net->ssid_len == 0 || net->ssid[0] == '\0');
1664  apmatch = (memcmp(ieee->current_network.bssid, net->bssid,
1665  ETH_ALEN) == 0);
1666  if (!ssidbroad) {
1667  ssidmatch = (ieee->current_network.ssid_len ==
1668  net->hidden_ssid_len) &&
1669  (!strncmp(ieee->current_network.ssid,
1670  net->hidden_ssid, net->hidden_ssid_len));
1671  if (net->hidden_ssid_len > 0) {
1672  strncpy(net->ssid, net->hidden_ssid,
1673  net->hidden_ssid_len);
1674  net->ssid_len = net->hidden_ssid_len;
1675  ssidbroad = 1;
1676  }
1677  } else
1678  ssidmatch =
1679  (ieee->current_network.ssid_len == net->ssid_len) &&
1680  (!strncmp(ieee->current_network.ssid, net->ssid,
1681  net->ssid_len));
1682 
1683  /* if the user set the AP check if match.
1684  * if the network does not broadcast essid we check the
1685  * user supplied ANY essid
1686  * if the network does broadcast and the user does not set
1687  * essid it is OK
1688  * if the network does broadcast and the user did set essid
1689  * check if essid match
1690  * if the ap is not set, check that the user set the bssid
1691  * and the network does broadcast and that those two bssid match
1692  */
1693  if ((apset && apmatch &&
1694  ((ssidset && ssidbroad && ssidmatch) ||
1695  (ssidbroad && !ssidset) || (!ssidbroad && ssidset))) ||
1696  (!apset && ssidset && ssidbroad && ssidmatch) ||
1697  (ieee->is_roaming && ssidset && ssidbroad && ssidmatch)) {
1698  /* if the essid is hidden replace it with the
1699  * essid provided by the user.
1700  */
1701  if (!ssidbroad) {
1702  strncpy(tmp_ssid, ieee->current_network.ssid,
1704  tmp_ssid_len = ieee->current_network.ssid_len;
1705  }
1706  memcpy(&ieee->current_network, net,
1707  sizeof(struct rtllib_network));
1708  if (!ssidbroad) {
1709  strncpy(ieee->current_network.ssid, tmp_ssid,
1711  ieee->current_network.ssid_len = tmp_ssid_len;
1712  }
1713  printk(KERN_INFO"Linking with %s,channel:%d, qos:%d, "
1714  "myHT:%d, networkHT:%d, mode:%x cur_net.flags"
1715  ":0x%x\n", ieee->current_network.ssid,
1716  ieee->current_network.channel,
1717  ieee->current_network.qos_data.supported,
1718  ieee->pHTInfo->bEnableHT,
1719  ieee->current_network.bssht.bdSupportHT,
1720  ieee->current_network.mode,
1721  ieee->current_network.flags);
1722 
1723  if ((rtllib_act_scanning(ieee, false)) &&
1726 
1727  ieee->hwscan_ch_bk = ieee->current_network.channel;
1728  HTResetIOTSetting(ieee->pHTInfo);
1729  ieee->wmm_acm = 0;
1730  if (ieee->iw_mode == IW_MODE_INFRA) {
1731  /* Join the network for the first time */
1732  ieee->AsocRetryCount = 0;
1733  if ((ieee->current_network.qos_data.supported == 1) &&
1734  ieee->current_network.bssht.bdSupportHT)
1736  &(ieee->current_network));
1737  else
1738  ieee->pHTInfo->bCurrentHTSupport =
1739  false;
1740 
1741  ieee->state = RTLLIB_ASSOCIATING;
1742  if (ieee->LedControlHandler != NULL)
1743  ieee->LedControlHandler(ieee->dev,
1745  queue_delayed_work_rsl(ieee->wq,
1746  &ieee->associate_procedure_wq, 0);
1747  } else {
1748  if (rtllib_is_54g(&ieee->current_network) &&
1749  (ieee->modulation & RTLLIB_OFDM_MODULATION)) {
1750  ieee->rate = 108;
1751  ieee->SetWirelessMode(ieee->dev, IEEE_G);
1752  printk(KERN_INFO"Using G rates\n");
1753  } else {
1754  ieee->rate = 22;
1755  ieee->SetWirelessMode(ieee->dev, IEEE_B);
1756  printk(KERN_INFO"Using B rates\n");
1757  }
1758  memset(ieee->dot11HTOperationalRateSet, 0, 16);
1759  ieee->state = RTLLIB_LINKED;
1760  }
1761  }
1762  }
1763 }
1764 
1766 {
1767  unsigned long flags;
1768  struct rtllib_network *target;
1769 
1770  spin_lock_irqsave(&ieee->lock, flags);
1771 
1772  list_for_each_entry(target, &ieee->network_list, list) {
1773 
1774  /* if the state become different that NOLINK means
1775  * we had found what we are searching for
1776  */
1777 
1778  if (ieee->state != RTLLIB_NOLINK)
1779  break;
1780 
1781  if (ieee->scan_age == 0 || time_after(target->last_scanned +
1782  ieee->scan_age, jiffies))
1783  rtllib_softmac_new_net(ieee, target);
1784  }
1785  spin_unlock_irqrestore(&ieee->lock, flags);
1786 }
1787 
1788 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen)
1789 {
1790  struct rtllib_authentication *a;
1791  u8 *t;
1792  if (skb->len < (sizeof(struct rtllib_authentication) -
1793  sizeof(struct rtllib_info_element))) {
1794  RTLLIB_DEBUG_MGMT("invalid len in auth resp: %d\n", skb->len);
1795  return 0xcafe;
1796  }
1797  *challenge = NULL;
1798  a = (struct rtllib_authentication *) skb->data;
1799  if (skb->len > (sizeof(struct rtllib_authentication) + 3)) {
1800  t = skb->data + sizeof(struct rtllib_authentication);
1801 
1802  if (*(t++) == MFIE_TYPE_CHALLENGE) {
1803  *chlen = *(t++);
1804  *challenge = kmalloc(*chlen, GFP_ATOMIC);
1805  memcpy(*challenge, t, *chlen); /*TODO - check here*/
1806  }
1807  }
1808  return cpu_to_le16(a->status);
1809 }
1810 
1811 static int auth_rq_parse(struct sk_buff *skb, u8 *dest)
1812 {
1813  struct rtllib_authentication *a;
1814 
1815  if (skb->len < (sizeof(struct rtllib_authentication) -
1816  sizeof(struct rtllib_info_element))) {
1817  RTLLIB_DEBUG_MGMT("invalid len in auth request: %d\n",
1818  skb->len);
1819  return -1;
1820  }
1821  a = (struct rtllib_authentication *) skb->data;
1822 
1823  memcpy(dest, a->header.addr2, ETH_ALEN);
1824 
1827 
1828  return WLAN_STATUS_SUCCESS;
1829 }
1830 
1831 static short probe_rq_parse(struct rtllib_device *ieee, struct sk_buff *skb,
1832  u8 *src)
1833 {
1834  u8 *tag;
1835  u8 *skbend;
1836  u8 *ssid = NULL;
1837  u8 ssidlen = 0;
1838  struct rtllib_hdr_3addr *header =
1839  (struct rtllib_hdr_3addr *) skb->data;
1840  bool bssid_match;
1841 
1842  if (skb->len < sizeof(struct rtllib_hdr_3addr))
1843  return -1; /* corrupted */
1844 
1845  bssid_match =
1846  (memcmp(header->addr3, ieee->current_network.bssid, ETH_ALEN) != 0) &&
1847  (!is_broadcast_ether_addr(header->addr3));
1848  if (bssid_match)
1849  return -1;
1850 
1851  memcpy(src, header->addr2, ETH_ALEN);
1852 
1853  skbend = (u8 *)skb->data + skb->len;
1854 
1855  tag = skb->data + sizeof(struct rtllib_hdr_3addr);
1856 
1857  while (tag + 1 < skbend) {
1858  if (*tag == 0) {
1859  ssid = tag + 2;
1860  ssidlen = *(tag + 1);
1861  break;
1862  }
1863  tag++; /* point to the len field */
1864  tag = tag + *(tag); /* point to the last data byte of the tag */
1865  tag++; /* point to the next tag */
1866  }
1867 
1868  if (ssidlen == 0)
1869  return 1;
1870 
1871  if (!ssid)
1872  return 1; /* ssid not found in tagged param */
1873 
1874  return !strncmp(ssid, ieee->current_network.ssid, ssidlen);
1875 }
1876 
1877 static int assoc_rq_parse(struct sk_buff *skb, u8 *dest)
1878 {
1879  struct rtllib_assoc_request_frame *a;
1880 
1881  if (skb->len < (sizeof(struct rtllib_assoc_request_frame) -
1882  sizeof(struct rtllib_info_element))) {
1883 
1884  RTLLIB_DEBUG_MGMT("invalid len in auth request:%d\n", skb->len);
1885  return -1;
1886  }
1887 
1888  a = (struct rtllib_assoc_request_frame *) skb->data;
1889 
1890  memcpy(dest, a->header.addr2, ETH_ALEN);
1891 
1892  return 0;
1893 }
1894 
1895 static inline u16 assoc_parse(struct rtllib_device *ieee, struct sk_buff *skb,
1896  int *aid)
1897 {
1898  struct rtllib_assoc_response_frame *response_head;
1899  u16 status_code;
1900 
1901  if (skb->len < sizeof(struct rtllib_assoc_response_frame)) {
1902  RTLLIB_DEBUG_MGMT("invalid len in auth resp: %d\n", skb->len);
1903  return 0xcafe;
1904  }
1905 
1906  response_head = (struct rtllib_assoc_response_frame *) skb->data;
1907  *aid = le16_to_cpu(response_head->aid) & 0x3fff;
1908 
1909  status_code = le16_to_cpu(response_head->status);
1910  if ((status_code == WLAN_STATUS_ASSOC_DENIED_RATES ||
1911  status_code == WLAN_STATUS_CAPS_UNSUPPORTED) &&
1912  ((ieee->mode == IEEE_G) &&
1913  (ieee->current_network.mode == IEEE_N_24G) &&
1914  (ieee->AsocRetryCount++ < (RT_ASOC_RETRY_LIMIT-1)))) {
1915  ieee->pHTInfo->IOTAction |= HT_IOT_ACT_PURE_N_MODE;
1916  } else {
1917  ieee->AsocRetryCount = 0;
1918  }
1919 
1920  return le16_to_cpu(response_head->status);
1921 }
1922 
1923 void rtllib_rx_probe_rq(struct rtllib_device *ieee, struct sk_buff *skb)
1924 {
1925  u8 dest[ETH_ALEN];
1926  ieee->softmac_stats.rx_probe_rq++;
1927  if (probe_rq_parse(ieee, skb, dest) > 0) {
1928  ieee->softmac_stats.tx_probe_rs++;
1929  rtllib_resp_to_probe(ieee, dest);
1930  }
1931 }
1932 
1933 static inline void rtllib_rx_auth_rq(struct rtllib_device *ieee,
1934  struct sk_buff *skb)
1935 {
1936  u8 dest[ETH_ALEN];
1937  int status;
1938  ieee->softmac_stats.rx_auth_rq++;
1939 
1940  status = auth_rq_parse(skb, dest);
1941  if (status != -1)
1942  rtllib_resp_to_auth(ieee, status, dest);
1943 }
1944 
1945 static inline void rtllib_rx_assoc_rq(struct rtllib_device *ieee,
1946  struct sk_buff *skb)
1947 {
1948 
1949  u8 dest[ETH_ALEN];
1950 
1951  ieee->softmac_stats.rx_ass_rq++;
1952  if (assoc_rq_parse(skb, dest) != -1)
1953  rtllib_resp_to_assoc_rq(ieee, dest);
1954 
1955  printk(KERN_INFO"New client associated: %pM\n", dest);
1956 }
1957 
1958 void rtllib_sta_ps_send_null_frame(struct rtllib_device *ieee, short pwr)
1959 {
1960 
1961  struct sk_buff *buf = rtllib_null_func(ieee, pwr);
1962 
1963  if (buf)
1964  softmac_ps_mgmt_xmit(buf, ieee);
1965 }
1967 
1969 {
1970  struct sk_buff *buf = rtllib_pspoll_func(ieee);
1971 
1972  if (buf)
1973  softmac_ps_mgmt_xmit(buf, ieee);
1974 }
1975 
1976 static short rtllib_sta_ps_sleep(struct rtllib_device *ieee, u64 *time)
1977 {
1978  int timeout = ieee->ps_timeout;
1979  u8 dtim;
1980  struct rt_pwr_save_ctrl *pPSC = (struct rt_pwr_save_ctrl *)
1981  (&(ieee->PowerSaveControl));
1982 
1983  if (ieee->LPSDelayCnt) {
1984  ieee->LPSDelayCnt--;
1985  return 0;
1986  }
1987 
1988  dtim = ieee->current_network.dtim_data;
1989  if (!(dtim & RTLLIB_DTIM_VALID))
1990  return 0;
1991  timeout = ieee->current_network.beacon_interval;
1992  ieee->current_network.dtim_data = RTLLIB_DTIM_INVALID;
1993  /* there's no need to nofity AP that I find you buffered
1994  * with broadcast packet */
1995  if (dtim & (RTLLIB_DTIM_UCAST & ieee->ps))
1996  return 2;
1997 
1998  if (!time_after(jiffies, ieee->dev->trans_start + MSECS(timeout)))
1999  return 0;
2000  if (!time_after(jiffies, ieee->last_rx_ps_time + MSECS(timeout)))
2001  return 0;
2003  (ieee->mgmt_queue_tail != ieee->mgmt_queue_head))
2004  return 0;
2005 
2006  if (time) {
2007  if (ieee->bAwakePktSent == true) {
2008  pPSC->LPSAwakeIntvl = 1;
2009  } else {
2010  u8 MaxPeriod = 1;
2011 
2012  if (pPSC->LPSAwakeIntvl == 0)
2013  pPSC->LPSAwakeIntvl = 1;
2014  if (pPSC->RegMaxLPSAwakeIntvl == 0)
2015  MaxPeriod = 1;
2016  else if (pPSC->RegMaxLPSAwakeIntvl == 0xFF)
2017  MaxPeriod = ieee->current_network.dtim_period;
2018  else
2019  MaxPeriod = pPSC->RegMaxLPSAwakeIntvl;
2020  pPSC->LPSAwakeIntvl = (pPSC->LPSAwakeIntvl >=
2021  MaxPeriod) ? MaxPeriod :
2022  (pPSC->LPSAwakeIntvl + 1);
2023  }
2024  {
2025  u8 LPSAwakeIntvl_tmp = 0;
2026  u8 period = ieee->current_network.dtim_period;
2027  u8 count = ieee->current_network.tim.tim_count;
2028  if (count == 0) {
2029  if (pPSC->LPSAwakeIntvl > period)
2030  LPSAwakeIntvl_tmp = period +
2031  (pPSC->LPSAwakeIntvl -
2032  period) -
2033  ((pPSC->LPSAwakeIntvl-period) %
2034  period);
2035  else
2036  LPSAwakeIntvl_tmp = pPSC->LPSAwakeIntvl;
2037 
2038  } else {
2039  if (pPSC->LPSAwakeIntvl >
2040  ieee->current_network.tim.tim_count)
2041  LPSAwakeIntvl_tmp = count +
2042  (pPSC->LPSAwakeIntvl - count) -
2043  ((pPSC->LPSAwakeIntvl-count)%period);
2044  else
2045  LPSAwakeIntvl_tmp = pPSC->LPSAwakeIntvl;
2046  }
2047 
2048  *time = ieee->current_network.last_dtim_sta_time
2049  + MSECS(ieee->current_network.beacon_interval *
2050  LPSAwakeIntvl_tmp);
2051  }
2052  }
2053 
2054  return 1;
2055 
2056 
2057 }
2058 
2059 static inline void rtllib_sta_ps(struct rtllib_device *ieee)
2060 {
2061  u64 time;
2062  short sleep;
2063  unsigned long flags, flags2;
2064 
2065  spin_lock_irqsave(&ieee->lock, flags);
2066 
2067  if ((ieee->ps == RTLLIB_PS_DISABLED ||
2068  ieee->iw_mode != IW_MODE_INFRA ||
2069  ieee->state != RTLLIB_LINKED)) {
2070  RT_TRACE(COMP_DBG, "=====>%s(): no need to ps,wake up!! "
2071  "ieee->ps is %d, ieee->iw_mode is %d, ieee->state"
2072  " is %d\n", __func__, ieee->ps, ieee->iw_mode,
2073  ieee->state);
2074  spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
2075  rtllib_sta_wakeup(ieee, 1);
2076 
2077  spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
2078  }
2079  sleep = rtllib_sta_ps_sleep(ieee, &time);
2080  /* 2 wake, 1 sleep, 0 do nothing */
2081  if (sleep == 0)
2082  goto out;
2083  if (sleep == 1) {
2084  if (ieee->sta_sleep == LPS_IS_SLEEP) {
2085  ieee->enter_sleep_state(ieee->dev, time);
2086  } else if (ieee->sta_sleep == LPS_IS_WAKE) {
2087  spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
2088 
2089  if (ieee->ps_is_queue_empty(ieee->dev)) {
2091  ieee->ack_tx_to_ieee = 1;
2093  ieee->ps_time = time;
2094  }
2095  spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
2096 
2097  }
2098 
2099  ieee->bAwakePktSent = false;
2100 
2101  } else if (sleep == 2) {
2102  spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
2103 
2104  rtllib_sta_wakeup(ieee, 1);
2105 
2106  spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
2107  }
2108 
2109 out:
2110  spin_unlock_irqrestore(&ieee->lock, flags);
2111 
2112 }
2113 
2114 void rtllib_sta_wakeup(struct rtllib_device *ieee, short nl)
2115 {
2116  if (ieee->sta_sleep == LPS_IS_WAKE) {
2117  if (nl) {
2118  if (ieee->pHTInfo->IOTAction &
2120  ieee->ack_tx_to_ieee = 1;
2122  } else {
2123  ieee->ack_tx_to_ieee = 1;
2125  }
2126  }
2127  return;
2128 
2129  }
2130 
2131  if (ieee->sta_sleep == LPS_IS_SLEEP)
2132  ieee->sta_wake_up(ieee->dev);
2133  if (nl) {
2134  if (ieee->pHTInfo->IOTAction &
2136  ieee->ack_tx_to_ieee = 1;
2138  } else {
2139  ieee->ack_tx_to_ieee = 1;
2140  ieee->polling = true;
2142  }
2143 
2144  } else {
2145  ieee->sta_sleep = LPS_IS_WAKE;
2146  ieee->polling = false;
2147  }
2148 }
2149 
2150 void rtllib_ps_tx_ack(struct rtllib_device *ieee, short success)
2151 {
2152  unsigned long flags, flags2;
2153 
2154  spin_lock_irqsave(&ieee->lock, flags);
2155 
2156  if (ieee->sta_sleep == LPS_WAIT_NULL_DATA_SEND) {
2157  /* Null frame with PS bit set */
2158  if (success) {
2159  ieee->sta_sleep = LPS_IS_SLEEP;
2160  ieee->enter_sleep_state(ieee->dev, ieee->ps_time);
2161  }
2162  /* if the card report not success we can't be sure the AP
2163  * has not RXed so we can't assume the AP believe us awake
2164  */
2165  } else {/* 21112005 - tx again null without PS bit if lost */
2166 
2167  if ((ieee->sta_sleep == LPS_IS_WAKE) && !success) {
2168  spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
2169  if (ieee->pHTInfo->IOTAction &
2172  else
2174  spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
2175  }
2176  }
2177  spin_unlock_irqrestore(&ieee->lock, flags);
2178 }
2180 
2181 static void rtllib_process_action(struct rtllib_device *ieee, struct sk_buff *skb)
2182 {
2183  struct rtllib_hdr_3addr *header = (struct rtllib_hdr_3addr *) skb->data;
2184  u8 *act = rtllib_get_payload((struct rtllib_hdr *)header);
2185  u8 category = 0;
2186 
2187  if (act == NULL) {
2188  RTLLIB_DEBUG(RTLLIB_DL_ERR, "error to get payload of "
2189  "action frame\n");
2190  return;
2191  }
2192 
2193  category = *act;
2194  act++;
2195  switch (category) {
2196  case ACT_CAT_BA:
2197  switch (*act) {
2198  case ACT_ADDBAREQ:
2199  rtllib_rx_ADDBAReq(ieee, skb);
2200  break;
2201  case ACT_ADDBARSP:
2202  rtllib_rx_ADDBARsp(ieee, skb);
2203  break;
2204  case ACT_DELBA:
2205  rtllib_rx_DELBA(ieee, skb);
2206  break;
2207  }
2208  break;
2209  default:
2210  break;
2211  }
2212  return;
2213 }
2214 
2215 inline int rtllib_rx_assoc_resp(struct rtllib_device *ieee, struct sk_buff *skb,
2216  struct rtllib_rx_stats *rx_stats)
2217 {
2218  u16 errcode;
2219  int aid;
2220  u8 *ies;
2221  struct rtllib_assoc_response_frame *assoc_resp;
2222  struct rtllib_hdr_3addr *header = (struct rtllib_hdr_3addr *) skb->data;
2223 
2224  RTLLIB_DEBUG_MGMT("received [RE]ASSOCIATION RESPONSE (%d)\n",
2225  WLAN_FC_GET_STYPE(header->frame_ctl));
2226 
2227  if ((ieee->softmac_features & IEEE_SOFTMAC_ASSOCIATE) &&
2229  (ieee->iw_mode == IW_MODE_INFRA)) {
2230  errcode = assoc_parse(ieee, skb, &aid);
2231  if (0 == errcode) {
2232  struct rtllib_network *network =
2233  kzalloc(sizeof(struct rtllib_network),
2234  GFP_ATOMIC);
2235 
2236  if (!network)
2237  return 1;
2238  ieee->state = RTLLIB_LINKED;
2239  ieee->assoc_id = aid;
2240  ieee->softmac_stats.rx_ass_ok++;
2241  /* station support qos */
2242  /* Let the register setting default with Legacy station */
2243  assoc_resp = (struct rtllib_assoc_response_frame *)skb->data;
2244  if (ieee->current_network.qos_data.supported == 1) {
2245  if (rtllib_parse_info_param(ieee, assoc_resp->info_element,
2246  rx_stats->len - sizeof(*assoc_resp),
2247  network, rx_stats)) {
2248  kfree(network);
2249  return 1;
2250  } else {
2251  memcpy(ieee->pHTInfo->PeerHTCapBuf,
2252  network->bssht.bdHTCapBuf,
2253  network->bssht.bdHTCapLen);
2254  memcpy(ieee->pHTInfo->PeerHTInfoBuf,
2255  network->bssht.bdHTInfoBuf,
2256  network->bssht.bdHTInfoLen);
2257  }
2258  if (ieee->handle_assoc_response != NULL)
2259  ieee->handle_assoc_response(ieee->dev,
2260  (struct rtllib_assoc_response_frame *)header,
2261  network);
2262  }
2263  kfree(network);
2264 
2265  kfree(ieee->assocresp_ies);
2266  ieee->assocresp_ies = NULL;
2267  ies = &(assoc_resp->info_element[0].id);
2268  ieee->assocresp_ies_len = (skb->data + skb->len) - ies;
2269  ieee->assocresp_ies = kmalloc(ieee->assocresp_ies_len,
2270  GFP_ATOMIC);
2271  if (ieee->assocresp_ies)
2272  memcpy(ieee->assocresp_ies, ies,
2273  ieee->assocresp_ies_len);
2274  else {
2275  printk(KERN_INFO "%s()Warning: can't alloc "
2276  "memory for assocresp_ies\n", __func__);
2277  ieee->assocresp_ies_len = 0;
2278  }
2279  rtllib_associate_complete(ieee);
2280  } else {
2281  /* aid could not been allocated */
2282  ieee->softmac_stats.rx_ass_err++;
2283  printk(KERN_INFO "Association response status code 0x%x\n",
2284  errcode);
2286  "Association response status code 0x%x\n",
2287  errcode);
2288  if (ieee->AsocRetryCount < RT_ASOC_RETRY_LIMIT)
2289  queue_delayed_work_rsl(ieee->wq,
2290  &ieee->associate_procedure_wq, 0);
2291  else
2292  rtllib_associate_abort(ieee);
2293  }
2294  }
2295  return 0;
2296 }
2297 
2298 inline int rtllib_rx_auth(struct rtllib_device *ieee, struct sk_buff *skb,
2299  struct rtllib_rx_stats *rx_stats)
2300 {
2301  u16 errcode;
2302  u8 *challenge;
2303  int chlen = 0;
2304  bool bSupportNmode = true, bHalfSupportNmode = false;
2305 
2308  (ieee->iw_mode == IW_MODE_INFRA)) {
2309  RTLLIB_DEBUG_MGMT("Received authentication response");
2310 
2311  errcode = auth_parse(skb, &challenge, &chlen);
2312  if (0 == errcode) {
2313  if (ieee->open_wep || !challenge) {
2315  ieee->softmac_stats.rx_auth_rs_ok++;
2316  if (!(ieee->pHTInfo->IOTAction &
2318  if (!ieee->GetNmodeSupportBySecCfg(ieee->dev)) {
2319  if (IsHTHalfNmodeAPs(ieee)) {
2320  bSupportNmode = true;
2321  bHalfSupportNmode = true;
2322  } else {
2323  bSupportNmode = false;
2324  bHalfSupportNmode = false;
2325  }
2326  }
2327  }
2328  /* Dummy wirless mode setting to avoid
2329  * encryption issue */
2330  if (bSupportNmode) {
2331  ieee->SetWirelessMode(ieee->dev,
2332  ieee->current_network.mode);
2333  } else {
2334  /*TODO*/
2335  ieee->SetWirelessMode(ieee->dev,
2336  IEEE_G);
2337  }
2338 
2339  if (ieee->current_network.mode ==
2340  IEEE_N_24G &&
2341  bHalfSupportNmode == true) {
2342  printk(KERN_INFO "======>enter "
2343  "half N mode\n");
2344  ieee->bHalfWirelessN24GMode =
2345  true;
2346  } else
2347  ieee->bHalfWirelessN24GMode =
2348  false;
2349 
2350  rtllib_associate_step2(ieee);
2351  } else {
2352  rtllib_auth_challenge(ieee, challenge,
2353  chlen);
2354  }
2355  } else {
2356  ieee->softmac_stats.rx_auth_rs_err++;
2357  RTLLIB_DEBUG_MGMT("Authentication respose"
2358  " status code 0x%x", errcode);
2359 
2360  printk(KERN_INFO "Authentication respose "
2361  "status code 0x%x", errcode);
2362  rtllib_associate_abort(ieee);
2363  }
2364 
2365  } else if (ieee->iw_mode == IW_MODE_MASTER) {
2366  rtllib_rx_auth_rq(ieee, skb);
2367  }
2368  }
2369  return 0;
2370 }
2371 
2372 inline int rtllib_rx_deauth(struct rtllib_device *ieee, struct sk_buff *skb)
2373 {
2374  struct rtllib_hdr_3addr *header = (struct rtllib_hdr_3addr *) skb->data;
2375 
2376  if (memcmp(header->addr3, ieee->current_network.bssid, ETH_ALEN) != 0)
2377  return 0;
2378 
2379  /* FIXME for now repeat all the association procedure
2380  * both for disassociation and deauthentication
2381  */
2382  if ((ieee->softmac_features & IEEE_SOFTMAC_ASSOCIATE) &&
2383  ieee->state == RTLLIB_LINKED &&
2384  (ieee->iw_mode == IW_MODE_INFRA)) {
2385  printk(KERN_INFO "==========>received disassoc/deauth(%x) "
2386  "frame, reason code:%x\n",
2387  WLAN_FC_GET_STYPE(header->frame_ctl),
2388  ((struct rtllib_disassoc *)skb->data)->reason);
2389  ieee->state = RTLLIB_ASSOCIATING;
2390  ieee->softmac_stats.reassoc++;
2391  ieee->is_roaming = true;
2392  ieee->LinkDetectInfo.bBusyTraffic = false;
2393  rtllib_disassociate(ieee);
2394  RemovePeerTS(ieee, header->addr2);
2395  if (ieee->LedControlHandler != NULL)
2396  ieee->LedControlHandler(ieee->dev,
2398 
2399  if (!(ieee->rtllib_ap_sec_type(ieee) &
2401  queue_delayed_work_rsl(ieee->wq,
2402  &ieee->associate_procedure_wq, 5);
2403  }
2404  return 0;
2405 }
2406 
2407 inline int rtllib_rx_frame_softmac(struct rtllib_device *ieee,
2408  struct sk_buff *skb,
2409  struct rtllib_rx_stats *rx_stats, u16 type,
2410  u16 stype)
2411 {
2412  struct rtllib_hdr_3addr *header = (struct rtllib_hdr_3addr *) skb->data;
2413 
2414  if (!ieee->proto_started)
2415  return 0;
2416 
2417  switch (WLAN_FC_GET_STYPE(header->frame_ctl)) {
2420  if (rtllib_rx_assoc_resp(ieee, skb, rx_stats) == 1)
2421  return 1;
2422  break;
2425  if ((ieee->softmac_features & IEEE_SOFTMAC_ASSOCIATE) &&
2426  ieee->iw_mode == IW_MODE_MASTER)
2427  rtllib_rx_assoc_rq(ieee, skb);
2428  break;
2429  case RTLLIB_STYPE_AUTH:
2430  rtllib_rx_auth(ieee, skb, rx_stats);
2431  break;
2432  case RTLLIB_STYPE_DISASSOC:
2433  case RTLLIB_STYPE_DEAUTH:
2434  rtllib_rx_deauth(ieee, skb);
2435  break;
2437  rtllib_process_action(ieee, skb);
2438  break;
2439  default:
2440  return -1;
2441  break;
2442  }
2443  return 0;
2444 }
2445 
2446 /* following are for a simpler TX queue management.
2447  * Instead of using netif_[stop/wake]_queue the driver
2448  * will use these two functions (plus a reset one), that
2449  * will internally use the kernel netif_* and takes
2450  * care of the ieee802.11 fragmentation.
2451  * So the driver receives a fragment per time and might
2452  * call the stop function when it wants to not
2453  * have enough room to TX an entire packet.
2454  * This might be useful if each fragment needs it's own
2455  * descriptor, thus just keep a total free memory > than
2456  * the max fragmentation threshold is not enough.. If the
2457  * ieee802.11 stack passed a TXB struct then you need
2458  * to keep N free descriptors where
2459  * N = MAX_PACKET_SIZE / MIN_FRAG_TRESHOLD
2460  * In this way you need just one and the 802.11 stack
2461  * will take care of buffering fragments and pass them to
2462  * to the driver later, when it wakes the queue.
2463  */
2464 void rtllib_softmac_xmit(struct rtllib_txb *txb, struct rtllib_device *ieee)
2465 {
2466 
2467  unsigned int queue_index = txb->queue_index;
2468  unsigned long flags;
2469  int i;
2470  struct cb_desc *tcb_desc = NULL;
2471  unsigned long queue_len = 0;
2472 
2473  spin_lock_irqsave(&ieee->lock, flags);
2474 
2475  /* called with 2nd parm 0, no tx mgmt lock required */
2476  rtllib_sta_wakeup(ieee, 0);
2477 
2478  /* update the tx status */
2479  tcb_desc = (struct cb_desc *)(txb->fragments[0]->cb +
2481  if (tcb_desc->bMulticast)
2482  ieee->stats.multicast++;
2483 
2484  /* if xmit available, just xmit it immediately, else just insert it to
2485  * the wait queue */
2486  for (i = 0; i < txb->nr_frags; i++) {
2487  queue_len = skb_queue_len(&ieee->skb_waitQ[queue_index]);
2488  if ((queue_len != 0) ||\
2489  (!ieee->check_nic_enough_desc(ieee->dev, queue_index)) ||
2490  (ieee->queue_stop)) {
2491  /* insert the skb packet to the wait queue */
2492  /* as for the completion function, it does not need
2493  * to check it any more.
2494  * */
2495  if (queue_len < 200)
2496  skb_queue_tail(&ieee->skb_waitQ[queue_index],
2497  txb->fragments[i]);
2498  else
2499  kfree_skb(txb->fragments[i]);
2500  } else {
2502  txb->fragments[i],
2503  ieee->dev, ieee->rate);
2504  }
2505  }
2506 
2507  rtllib_txb_free(txb);
2508 
2509  spin_unlock_irqrestore(&ieee->lock, flags);
2510 
2511 }
2512 
2513 /* called with ieee->lock acquired */
2514 static void rtllib_resume_tx(struct rtllib_device *ieee)
2515 {
2516  int i;
2517  for (i = ieee->tx_pending.frag; i < ieee->tx_pending.txb->nr_frags;
2518  i++) {
2519 
2520  if (ieee->queue_stop) {
2521  ieee->tx_pending.frag = i;
2522  return;
2523  } else {
2524 
2526  ieee->tx_pending.txb->fragments[i],
2527  ieee->dev, ieee->rate);
2528  ieee->stats.tx_packets++;
2529  }
2530  }
2531 
2532  rtllib_txb_free(ieee->tx_pending.txb);
2533  ieee->tx_pending.txb = NULL;
2534 }
2535 
2536 
2538 {
2539  unsigned long flags;
2540 
2541  spin_lock_irqsave(&ieee->lock, flags);
2542  init_mgmt_queue(ieee);
2543  if (ieee->tx_pending.txb) {
2544  rtllib_txb_free(ieee->tx_pending.txb);
2545  ieee->tx_pending.txb = NULL;
2546  }
2547  ieee->queue_stop = 0;
2548  spin_unlock_irqrestore(&ieee->lock, flags);
2549 
2550 }
2552 
2554 {
2555 
2556  unsigned long flags;
2557  struct sk_buff *skb;
2558  struct rtllib_hdr_3addr *header;
2559 
2560  spin_lock_irqsave(&ieee->lock, flags);
2561  if (!ieee->queue_stop)
2562  goto exit;
2563 
2564  ieee->queue_stop = 0;
2565 
2567  while (!ieee->queue_stop && (skb = dequeue_mgmt(ieee))) {
2568 
2569  header = (struct rtllib_hdr_3addr *) skb->data;
2570 
2571  header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
2572 
2573  if (ieee->seq_ctrl[0] == 0xFFF)
2574  ieee->seq_ctrl[0] = 0;
2575  else
2576  ieee->seq_ctrl[0]++;
2577 
2578  ieee->softmac_data_hard_start_xmit(skb, ieee->dev,
2579  ieee->basic_rate);
2580  }
2581  }
2582  if (!ieee->queue_stop && ieee->tx_pending.txb)
2583  rtllib_resume_tx(ieee);
2584 
2585  if (!ieee->queue_stop && netif_queue_stopped(ieee->dev)) {
2586  ieee->softmac_stats.swtxawake++;
2587  netif_wake_queue(ieee->dev);
2588  }
2589 
2590 exit:
2591  spin_unlock_irqrestore(&ieee->lock, flags);
2592 }
2593 
2594 
2596 {
2597 
2598  if (!netif_queue_stopped(ieee->dev)) {
2599  netif_stop_queue(ieee->dev);
2600  ieee->softmac_stats.swtxstop++;
2601  }
2602  ieee->queue_stop = 1;
2603 
2604 }
2605 
2607 {
2608  unsigned int i;
2609  for (i = 0; i < ieee->dev->num_tx_queues; i++)
2610  netdev_get_tx_queue(ieee->dev, i)->trans_start = jiffies;
2611 
2612  netif_tx_stop_all_queues(ieee->dev);
2613 }
2614 
2616 {
2617  netif_tx_wake_all_queues(ieee->dev);
2618 }
2619 
2620 inline void rtllib_randomize_cell(struct rtllib_device *ieee)
2621 {
2622 
2623  random_ether_addr(ieee->current_network.bssid);
2624 }
2625 
2626 /* called in user context only */
2628 {
2629  ieee->assoc_id = 1;
2630 
2631  if (ieee->current_network.ssid_len == 0) {
2632  strncpy(ieee->current_network.ssid,
2635 
2636  ieee->current_network.ssid_len =
2638  ieee->ssid_set = 1;
2639  }
2640 
2641  memcpy(ieee->current_network.bssid, ieee->dev->dev_addr, ETH_ALEN);
2642 
2643  ieee->set_chan(ieee->dev, ieee->current_network.channel);
2644  ieee->state = RTLLIB_LINKED;
2645  ieee->link_change(ieee->dev);
2646  notify_wx_assoc_event(ieee);
2647 
2648  if (ieee->data_hard_resume)
2649  ieee->data_hard_resume(ieee->dev);
2650 
2651  netif_carrier_on(ieee->dev);
2652 }
2653 
2654 static void rtllib_start_monitor_mode(struct rtllib_device *ieee)
2655 {
2656  /* reset hardware status */
2657  if (ieee->raw_tx) {
2658  if (ieee->data_hard_resume)
2659  ieee->data_hard_resume(ieee->dev);
2660 
2661  netif_carrier_on(ieee->dev);
2662  }
2663 }
2664 
2665 static void rtllib_start_ibss_wq(void *data)
2666 {
2667  struct rtllib_device *ieee = container_of_dwork_rsl(data,
2668  struct rtllib_device, start_ibss_wq);
2669  /* iwconfig mode ad-hoc will schedule this and return
2670  * on the other hand this will block further iwconfig SET
2671  * operations because of the wx_sem hold.
2672  * Anyway some most set operations set a flag to speed-up
2673  * (abort) this wq (when syncro scanning) before sleeping
2674  * on the semaphore
2675  */
2676  if (!ieee->proto_started) {
2677  printk(KERN_INFO "==========oh driver down return\n");
2678  return;
2679  }
2680  down(&ieee->wx_sem);
2681 
2682  if (ieee->current_network.ssid_len == 0) {
2685  ieee->ssid_set = 1;
2686  }
2687 
2688  ieee->state = RTLLIB_NOLINK;
2689  ieee->mode = IEEE_G;
2690  /* check if we have this cell in our network list */
2692 
2693 
2694  /* if not then the state is not linked. Maybe the user switched to
2695  * ad-hoc mode just after being in monitor mode, or just after
2696  * being very few time in managed mode (so the card have had no
2697  * time to scan all the chans..) or we have just run up the iface
2698  * after setting ad-hoc mode. So we have to give another try..
2699  * Here, in ibss mode, should be safe to do this without extra care
2700  * (in bss mode we had to make sure no-one tried to associate when
2701  * we had just checked the ieee->state and we was going to start the
2702  * scan) because in ibss mode the rtllib_new_net function, when
2703  * finds a good net, just set the ieee->state to RTLLIB_LINKED,
2704  * so, at worst, we waste a bit of time to initiate an unneeded syncro
2705  * scan, that will stop at the first round because it sees the state
2706  * associated.
2707  */
2708  if (ieee->state == RTLLIB_NOLINK)
2709  rtllib_start_scan_syncro(ieee, 0);
2710 
2711  /* the network definitively is not here.. create a new cell */
2712  if (ieee->state == RTLLIB_NOLINK) {
2713  printk(KERN_INFO "creating new IBSS cell\n");
2714  ieee->current_network.channel = ieee->IbssStartChnl;
2715  if (!ieee->wap_set)
2716  rtllib_randomize_cell(ieee);
2717 
2718  if (ieee->modulation & RTLLIB_CCK_MODULATION) {
2719 
2720  ieee->current_network.rates_len = 4;
2721 
2722  ieee->current_network.rates[0] =
2724  ieee->current_network.rates[1] =
2726  ieee->current_network.rates[2] =
2728  ieee->current_network.rates[3] =
2730 
2731  } else
2732  ieee->current_network.rates_len = 0;
2733 
2734  if (ieee->modulation & RTLLIB_OFDM_MODULATION) {
2735  ieee->current_network.rates_ex_len = 8;
2736 
2737  ieee->current_network.rates_ex[0] =
2739  ieee->current_network.rates_ex[1] =
2741  ieee->current_network.rates_ex[2] =
2743  ieee->current_network.rates_ex[3] =
2745  ieee->current_network.rates_ex[4] =
2747  ieee->current_network.rates_ex[5] =
2749  ieee->current_network.rates_ex[6] =
2751  ieee->current_network.rates_ex[7] =
2753 
2754  ieee->rate = 108;
2755  } else {
2756  ieee->current_network.rates_ex_len = 0;
2757  ieee->rate = 22;
2758  }
2759 
2760  ieee->current_network.qos_data.supported = 0;
2761  ieee->SetWirelessMode(ieee->dev, IEEE_G);
2762  ieee->current_network.mode = ieee->mode;
2763  ieee->current_network.atim_window = 0;
2764  ieee->current_network.capability = WLAN_CAPABILITY_IBSS;
2765  }
2766 
2767  printk(KERN_INFO "%s(): ieee->mode = %d\n", __func__, ieee->mode);
2768  if ((ieee->mode == IEEE_N_24G) || (ieee->mode == IEEE_N_5G))
2769  HTUseDefaultSetting(ieee);
2770  else
2771  ieee->pHTInfo->bCurrentHTSupport = false;
2772 
2774  (u8 *)(&ieee->state));
2775 
2776  ieee->state = RTLLIB_LINKED;
2777  ieee->link_change(ieee->dev);
2778 
2780  if (ieee->LedControlHandler != NULL)
2781  ieee->LedControlHandler(ieee->dev, LED_CTL_LINK);
2782 
2784 
2785  notify_wx_assoc_event(ieee);
2786 
2787  if (ieee->data_hard_resume)
2788  ieee->data_hard_resume(ieee->dev);
2789 
2790  netif_carrier_on(ieee->dev);
2791 
2792  up(&ieee->wx_sem);
2793 }
2794 
2795 inline void rtllib_start_ibss(struct rtllib_device *ieee)
2796 {
2797  queue_delayed_work_rsl(ieee->wq, &ieee->start_ibss_wq, MSECS(150));
2798 }
2799 
2800 /* this is called only in user context, with wx_sem held */
2802 {
2803  unsigned long flags;
2804  if (IS_DOT11D_ENABLE(ieee) && !IS_COUNTRY_IE_VALID(ieee)) {
2805  if (!ieee->bGlobalDomain)
2806  return;
2807  }
2808  /* check if we have already found the net we
2809  * are interested in (if any).
2810  * if not (we are disassociated and we are not
2811  * in associating / authenticating phase) start the background scanning.
2812  */
2814 
2815  /* ensure no-one start an associating process (thus setting
2816  * the ieee->state to rtllib_ASSOCIATING) while we
2817  * have just checked it and we are going to enable scan.
2818  * The rtllib_new_net function is always called with
2819  * lock held (from both rtllib_softmac_check_all_nets and
2820  * the rx path), so we cannot be in the middle of such function
2821  */
2822  spin_lock_irqsave(&ieee->lock, flags);
2823 
2824  if (ieee->state == RTLLIB_NOLINK)
2825  rtllib_start_scan(ieee);
2826  spin_unlock_irqrestore(&ieee->lock, flags);
2827 }
2828 
2829 static void rtllib_link_change_wq(void *data)
2830 {
2831  struct rtllib_device *ieee = container_of_dwork_rsl(data,
2832  struct rtllib_device, link_change_wq);
2833  ieee->link_change(ieee->dev);
2834 }
2835 /* called only in userspace context */
2837 {
2838  netif_carrier_off(ieee->dev);
2840  rtllib_reset_queue(ieee);
2841 
2842  if (ieee->data_hard_stop)
2843  ieee->data_hard_stop(ieee->dev);
2844  if (IS_DOT11D_ENABLE(ieee))
2845  Dot11d_Reset(ieee);
2846  ieee->state = RTLLIB_NOLINK;
2847  ieee->is_set_key = false;
2848  ieee->wap_set = 0;
2849 
2850  queue_delayed_work_rsl(ieee->wq, &ieee->link_change_wq, 0);
2851 
2852  notify_wx_assoc_event(ieee);
2853 }
2854 
2855 static void rtllib_associate_retry_wq(void *data)
2856 {
2857  struct rtllib_device *ieee = container_of_dwork_rsl(data,
2859  unsigned long flags;
2860 
2861  down(&ieee->wx_sem);
2862  if (!ieee->proto_started)
2863  goto exit;
2864 
2865  if (ieee->state != RTLLIB_ASSOCIATING_RETRY)
2866  goto exit;
2867 
2868  /* until we do not set the state to RTLLIB_NOLINK
2869  * there are no possibility to have someone else trying
2870  * to start an association procedure (we get here with
2871  * ieee->state = RTLLIB_ASSOCIATING).
2872  * When we set the state to RTLLIB_NOLINK it is possible
2873  * that the RX path run an attempt to associate, but
2874  * both rtllib_softmac_check_all_nets and the
2875  * RX path works with ieee->lock held so there are no
2876  * problems. If we are still disassociated then start a scan.
2877  * the lock here is necessary to ensure no one try to start
2878  * an association procedure when we have just checked the
2879  * state and we are going to start the scan.
2880  */
2881  ieee->beinretry = true;
2882  ieee->state = RTLLIB_NOLINK;
2883 
2885 
2886  spin_lock_irqsave(&ieee->lock, flags);
2887 
2888  if (ieee->state == RTLLIB_NOLINK)
2889  rtllib_start_scan(ieee);
2890  spin_unlock_irqrestore(&ieee->lock, flags);
2891 
2892  ieee->beinretry = false;
2893 exit:
2894  up(&ieee->wx_sem);
2895 }
2896 
2898 {
2899  u8 broadcast_addr[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
2900 
2901  struct sk_buff *skb;
2902  struct rtllib_probe_response *b;
2903  skb = rtllib_probe_resp(ieee, broadcast_addr);
2904 
2905  if (!skb)
2906  return NULL;
2907 
2908  b = (struct rtllib_probe_response *) skb->data;
2909  b->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_BEACON);
2910 
2911  return skb;
2912 
2913 }
2914 
2916 {
2917  struct sk_buff *skb;
2918  struct rtllib_probe_response *b;
2919 
2920  skb = rtllib_get_beacon_(ieee);
2921  if (!skb)
2922  return NULL;
2923 
2924  b = (struct rtllib_probe_response *) skb->data;
2925  b->header.seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
2926 
2927  if (ieee->seq_ctrl[0] == 0xFFF)
2928  ieee->seq_ctrl[0] = 0;
2929  else
2930  ieee->seq_ctrl[0]++;
2931 
2932  return skb;
2933 }
2935 
2936 void rtllib_softmac_stop_protocol(struct rtllib_device *ieee, u8 mesh_flag,
2937  u8 shutdown)
2938 {
2940  down(&ieee->wx_sem);
2941  rtllib_stop_protocol(ieee, shutdown);
2942  up(&ieee->wx_sem);
2943 }
2945 
2946 
2947 void rtllib_stop_protocol(struct rtllib_device *ieee, u8 shutdown)
2948 {
2949  if (!ieee->proto_started)
2950  return;
2951 
2952  if (shutdown) {
2953  ieee->proto_started = 0;
2954  ieee->proto_stoppping = 1;
2955  if (ieee->rtllib_ips_leave != NULL)
2956  ieee->rtllib_ips_leave(ieee->dev);
2957  }
2958 
2964  rtllib_stop_scan(ieee);
2965 
2967  ieee->state = RTLLIB_NOLINK;
2968 
2969  if (ieee->state == RTLLIB_LINKED) {
2970  if (ieee->iw_mode == IW_MODE_INFRA)
2971  SendDisassociation(ieee, 1, deauth_lv_ss);
2972  rtllib_disassociate(ieee);
2973  }
2974 
2975  if (shutdown) {
2976  RemoveAllTS(ieee);
2977  ieee->proto_stoppping = 0;
2978  }
2979  kfree(ieee->assocreq_ies);
2980  ieee->assocreq_ies = NULL;
2981  ieee->assocreq_ies_len = 0;
2982  kfree(ieee->assocresp_ies);
2983  ieee->assocresp_ies = NULL;
2984  ieee->assocresp_ies_len = 0;
2985 }
2986 
2987 void rtllib_softmac_start_protocol(struct rtllib_device *ieee, u8 mesh_flag)
2988 {
2989  down(&ieee->wx_sem);
2990  rtllib_start_protocol(ieee);
2991  up(&ieee->wx_sem);
2992 }
2994 
2996 {
2997  short ch = 0;
2998  int i = 0;
2999 
3001 
3002  if (ieee->proto_started)
3003  return;
3004 
3005  ieee->proto_started = 1;
3006 
3007  if (ieee->current_network.channel == 0) {
3008  do {
3009  ch++;
3010  if (ch > MAX_CHANNEL_NUMBER)
3011  return; /* no channel found */
3012  } while (!ieee->active_channel_map[ch]);
3013  ieee->current_network.channel = ch;
3014  }
3015 
3016  if (ieee->current_network.beacon_interval == 0)
3017  ieee->current_network.beacon_interval = 100;
3018 
3019  for (i = 0; i < 17; i++) {
3020  ieee->last_rxseq_num[i] = -1;
3021  ieee->last_rxfrag_num[i] = -1;
3022  ieee->last_packet_time[i] = 0;
3023  }
3024 
3025  if (ieee->UpdateBeaconInterruptHandler)
3026  ieee->UpdateBeaconInterruptHandler(ieee->dev, false);
3027 
3028  ieee->wmm_acm = 0;
3029  /* if the user set the MAC of the ad-hoc cell and then
3030  * switch to managed mode, shall we make sure that association
3031  * attempts does not fail just because the user provide the essid
3032  * and the nic is still checking for the AP MAC ??
3033  */
3034  if (ieee->iw_mode == IW_MODE_INFRA) {
3035  rtllib_start_bss(ieee);
3036  } else if (ieee->iw_mode == IW_MODE_ADHOC) {
3037  if (ieee->UpdateBeaconInterruptHandler)
3038  ieee->UpdateBeaconInterruptHandler(ieee->dev, true);
3039 
3040  rtllib_start_ibss(ieee);
3041 
3042  } else if (ieee->iw_mode == IW_MODE_MASTER) {
3044  } else if (ieee->iw_mode == IW_MODE_MONITOR) {
3045  rtllib_start_monitor_mode(ieee);
3046  }
3047 }
3048 
3050 {
3051  int i;
3052  memset(&ieee->current_network, 0, sizeof(struct rtllib_network));
3053 
3054  ieee->state = RTLLIB_NOLINK;
3055  for (i = 0; i < 5; i++)
3056  ieee->seq_ctrl[i] = 0;
3057  ieee->pDot11dInfo = kzalloc(sizeof(struct rt_dot11d_info), GFP_ATOMIC);
3058  if (!ieee->pDot11dInfo)
3059  RTLLIB_DEBUG(RTLLIB_DL_ERR, "can't alloc memory for DOT11D\n");
3060  ieee->LinkDetectInfo.SlotIndex = 0;
3061  ieee->LinkDetectInfo.SlotNum = 2;
3062  ieee->LinkDetectInfo.NumRecvBcnInPeriod = 0;
3063  ieee->LinkDetectInfo.NumRecvDataInPeriod = 0;
3064  ieee->LinkDetectInfo.NumTxOkInPeriod = 0;
3065  ieee->LinkDetectInfo.NumRxOkInPeriod = 0;
3066  ieee->LinkDetectInfo.NumRxUnicastOkInPeriod = 0;
3067  ieee->bIsAggregateFrame = false;
3068  ieee->assoc_id = 0;
3069  ieee->queue_stop = 0;
3070  ieee->scanning_continue = 0;
3071  ieee->softmac_features = 0;
3072  ieee->wap_set = 0;
3073  ieee->ssid_set = 0;
3074  ieee->proto_started = 0;
3075  ieee->proto_stoppping = 0;
3077  ieee->rate = 22;
3078  ieee->ps = RTLLIB_PS_DISABLED;
3079  ieee->sta_sleep = LPS_IS_WAKE;
3080 
3081  ieee->Regdot11HTOperationalRateSet[0] = 0xff;
3082  ieee->Regdot11HTOperationalRateSet[1] = 0xff;
3083  ieee->Regdot11HTOperationalRateSet[4] = 0x01;
3084 
3085  ieee->Regdot11TxHTOperationalRateSet[0] = 0xff;
3086  ieee->Regdot11TxHTOperationalRateSet[1] = 0xff;
3087  ieee->Regdot11TxHTOperationalRateSet[4] = 0x01;
3088 
3089  ieee->FirstIe_InScan = false;
3090  ieee->actscanning = false;
3091  ieee->beinretry = false;
3092  ieee->is_set_key = false;
3093  init_mgmt_queue(ieee);
3094 
3095  ieee->sta_edca_param[0] = 0x0000A403;
3096  ieee->sta_edca_param[1] = 0x0000A427;
3097  ieee->sta_edca_param[2] = 0x005E4342;
3098  ieee->sta_edca_param[3] = 0x002F3262;
3099  ieee->aggregation = true;
3100  ieee->enable_rx_imm_BA = 1;
3101  ieee->tx_pending.txb = NULL;
3102 
3104  rtllib_associate_abort_cb,
3105  (unsigned long) ieee);
3106 
3107  _setup_timer(&ieee->beacon_timer,
3108  rtllib_send_beacon_cb,
3109  (unsigned long) ieee);
3110 
3111 
3112  ieee->wq = create_workqueue(DRV_NAME);
3113 
3114  INIT_DELAYED_WORK_RSL(&ieee->link_change_wq,
3115  (void *)rtllib_link_change_wq, ieee);
3116  INIT_DELAYED_WORK_RSL(&ieee->start_ibss_wq,
3117  (void *)rtllib_start_ibss_wq, ieee);
3118  INIT_WORK_RSL(&ieee->associate_complete_wq,
3119  (void *)rtllib_associate_complete_wq, ieee);
3120  INIT_DELAYED_WORK_RSL(&ieee->associate_procedure_wq,
3121  (void *)rtllib_associate_procedure_wq, ieee);
3122  INIT_DELAYED_WORK_RSL(&ieee->softmac_scan_wq,
3123  (void *)rtllib_softmac_scan_wq, ieee);
3124  INIT_DELAYED_WORK_RSL(&ieee->softmac_hint11d_wq,
3125  (void *)rtllib_softmac_hint11d_wq, ieee);
3126  INIT_DELAYED_WORK_RSL(&ieee->associate_retry_wq,
3127  (void *)rtllib_associate_retry_wq, ieee);
3128  INIT_WORK_RSL(&ieee->wx_sync_scan_wq, (void *)rtllib_wx_sync_scan_wq,
3129  ieee);
3130 
3131  sema_init(&ieee->wx_sem, 1);
3132  sema_init(&ieee->scan_sem, 1);
3133  sema_init(&ieee->ips_sem, 1);
3134 
3135  spin_lock_init(&ieee->mgmt_tx_lock);
3136  spin_lock_init(&ieee->beacon_lock);
3137 
3138  tasklet_init(&ieee->ps_task,
3139  (void(*)(unsigned long)) rtllib_sta_ps,
3140  (unsigned long)ieee);
3141 
3142 }
3143 
3145 {
3146  down(&ieee->wx_sem);
3147  kfree(ieee->pDot11dInfo);
3148  ieee->pDot11dInfo = NULL;
3150 
3152  destroy_workqueue(ieee->wq);
3153  up(&ieee->wx_sem);
3154 }
3155 
3156 /********************************************************
3157  * Start of WPA code. *
3158  * this is stolen from the ipw2200 driver *
3159  ********************************************************/
3160 
3161 
3162 static int rtllib_wpa_enable(struct rtllib_device *ieee, int value)
3163 {
3164  /* This is called when wpa_supplicant loads and closes the driver
3165  * interface. */
3166  printk(KERN_INFO "%s WPA\n", value ? "enabling" : "disabling");
3167  ieee->wpa_enabled = value;
3168  memset(ieee->ap_mac_addr, 0, 6);
3169  return 0;
3170 }
3171 
3172 
3173 static void rtllib_wpa_assoc_frame(struct rtllib_device *ieee, char *wpa_ie,
3174  int wpa_ie_len)
3175 {
3176  /* make sure WPA is enabled */
3177  rtllib_wpa_enable(ieee, 1);
3178 
3179  rtllib_disassociate(ieee);
3180 }
3181 
3182 
3183 static int rtllib_wpa_mlme(struct rtllib_device *ieee, int command, int reason)
3184 {
3185 
3186  int ret = 0;
3187 
3188  switch (command) {
3189  case IEEE_MLME_STA_DEAUTH:
3190  break;
3191 
3193  rtllib_disassociate(ieee);
3194  break;
3195 
3196  default:
3197  printk(KERN_INFO "Unknown MLME request: %d\n", command);
3198  ret = -EOPNOTSUPP;
3199  }
3200 
3201  return ret;
3202 }
3203 
3204 
3205 static int rtllib_wpa_set_wpa_ie(struct rtllib_device *ieee,
3206  struct ieee_param *param, int plen)
3207 {
3208  u8 *buf;
3209 
3210  if (param->u.wpa_ie.len > MAX_WPA_IE_LEN ||
3211  (param->u.wpa_ie.len && param->u.wpa_ie.data == NULL))
3212  return -EINVAL;
3213 
3214  if (param->u.wpa_ie.len) {
3215  buf = kmemdup(param->u.wpa_ie.data, param->u.wpa_ie.len,
3216  GFP_KERNEL);
3217  if (buf == NULL)
3218  return -ENOMEM;
3219 
3220  kfree(ieee->wpa_ie);
3221  ieee->wpa_ie = buf;
3222  ieee->wpa_ie_len = param->u.wpa_ie.len;
3223  } else {
3224  kfree(ieee->wpa_ie);
3225  ieee->wpa_ie = NULL;
3226  ieee->wpa_ie_len = 0;
3227  }
3228 
3229  rtllib_wpa_assoc_frame(ieee, ieee->wpa_ie, ieee->wpa_ie_len);
3230  return 0;
3231 }
3232 
3233 #define AUTH_ALG_OPEN_SYSTEM 0x1
3234 #define AUTH_ALG_SHARED_KEY 0x2
3235 #define AUTH_ALG_LEAP 0x4
3236 static int rtllib_wpa_set_auth_algs(struct rtllib_device *ieee, int value)
3237 {
3238 
3239  struct rtllib_security sec = {
3240  .flags = SEC_AUTH_MODE,
3241  };
3242  int ret = 0;
3243 
3244  if (value & AUTH_ALG_SHARED_KEY) {
3246  ieee->open_wep = 0;
3247  ieee->auth_mode = 1;
3248  } else if (value & AUTH_ALG_OPEN_SYSTEM) {
3249  sec.auth_mode = WLAN_AUTH_OPEN;
3250  ieee->open_wep = 1;
3251  ieee->auth_mode = 0;
3252  } else if (value & AUTH_ALG_LEAP) {
3253  sec.auth_mode = WLAN_AUTH_LEAP >> 6;
3254  ieee->open_wep = 1;
3255  ieee->auth_mode = 2;
3256  }
3257 
3258 
3259  if (ieee->set_security)
3260  ieee->set_security(ieee->dev, &sec);
3261 
3262  return ret;
3263 }
3264 
3265 static int rtllib_wpa_set_param(struct rtllib_device *ieee, u8 name, u32 value)
3266 {
3267  int ret = 0;
3268  unsigned long flags;
3269 
3270  switch (name) {
3272  ret = rtllib_wpa_enable(ieee, value);
3273  break;
3274 
3276  ieee->tkip_countermeasures = value;
3277  break;
3278 
3280  {
3281  /* HACK:
3282  *
3283  * wpa_supplicant calls set_wpa_enabled when the driver
3284  * is loaded and unloaded, regardless of if WPA is being
3285  * used. No other calls are made which can be used to
3286  * determine if encryption will be used or not prior to
3287  * association being expected. If encryption is not being
3288  * used, drop_unencrypted is set to false, else true -- we
3289  * can use this to determine if the CAP_PRIVACY_ON bit should
3290  * be set.
3291  */
3292  struct rtllib_security sec = {
3293  .flags = SEC_ENABLED,
3294  .enabled = value,
3295  };
3296  ieee->drop_unencrypted = value;
3297  /* We only change SEC_LEVEL for open mode. Others
3298  * are set by ipw_wpa_set_encryption.
3299  */
3300  if (!value) {
3301  sec.flags |= SEC_LEVEL;
3302  sec.level = SEC_LEVEL_0;
3303  } else {
3304  sec.flags |= SEC_LEVEL;
3305  sec.level = SEC_LEVEL_1;
3306  }
3307  if (ieee->set_security)
3308  ieee->set_security(ieee->dev, &sec);
3309  break;
3310  }
3311 
3313  ieee->privacy_invoked = value;
3314  break;
3315 
3316  case IEEE_PARAM_AUTH_ALGS:
3317  ret = rtllib_wpa_set_auth_algs(ieee, value);
3318  break;
3319 
3321  ieee->ieee802_1x = value;
3322  break;
3324  spin_lock_irqsave(&ieee->wpax_suitlist_lock, flags);
3325  spin_unlock_irqrestore(&ieee->wpax_suitlist_lock, flags);
3326  break;
3327 
3328  default:
3329  printk(KERN_INFO "Unknown WPA param: %d\n", name);
3330  ret = -EOPNOTSUPP;
3331  }
3332 
3333  return ret;
3334 }
3335 
3336 /* implementation borrowed from hostap driver */
3337 static int rtllib_wpa_set_encryption(struct rtllib_device *ieee,
3338  struct ieee_param *param, int param_len,
3339  u8 is_mesh)
3340 {
3341  int ret = 0;
3342  struct lib80211_crypto_ops *ops;
3343  struct lib80211_crypt_data **crypt;
3344 
3345  struct rtllib_security sec = {
3346  .flags = 0,
3347  };
3348 
3349  param->u.crypt.err = 0;
3350  param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
3351 
3352  if (param_len !=
3353  (int) ((char *) param->u.crypt.key - (char *) param) +
3354  param->u.crypt.key_len) {
3355  printk(KERN_INFO "Len mismatch %d, %d\n", param_len,
3356  param->u.crypt.key_len);
3357  return -EINVAL;
3358  }
3359  if (is_broadcast_ether_addr(param->sta_addr)) {
3360  if (param->u.crypt.idx >= NUM_WEP_KEYS)
3361  return -EINVAL;
3362  crypt = &ieee->crypt_info.crypt[param->u.crypt.idx];
3363  } else {
3364  return -EINVAL;
3365  }
3366 
3367  if (strcmp(param->u.crypt.alg, "none") == 0) {
3368  if (crypt) {
3369  sec.enabled = 0;
3370  sec.level = SEC_LEVEL_0;
3371  sec.flags |= SEC_ENABLED | SEC_LEVEL;
3373  }
3374  goto done;
3375  }
3376  sec.enabled = 1;
3377  sec.flags |= SEC_ENABLED;
3378 
3379  /* IPW HW cannot build TKIP MIC, host decryption still needed. */
3380  if (!(ieee->host_encrypt || ieee->host_decrypt) &&
3381  strcmp(param->u.crypt.alg, "R-TKIP"))
3382  goto skip_host_crypt;
3383 
3384  ops = lib80211_get_crypto_ops(param->u.crypt.alg);
3385  if (ops == NULL && strcmp(param->u.crypt.alg, "R-WEP") == 0) {
3386  request_module("rtllib_crypt_wep");
3387  ops = lib80211_get_crypto_ops(param->u.crypt.alg);
3388  } else if (ops == NULL && strcmp(param->u.crypt.alg, "R-TKIP") == 0) {
3389  request_module("rtllib_crypt_tkip");
3390  ops = lib80211_get_crypto_ops(param->u.crypt.alg);
3391  } else if (ops == NULL && strcmp(param->u.crypt.alg, "R-CCMP") == 0) {
3392  request_module("rtllib_crypt_ccmp");
3393  ops = lib80211_get_crypto_ops(param->u.crypt.alg);
3394  }
3395  if (ops == NULL) {
3396  printk(KERN_INFO "unknown crypto alg '%s'\n",
3397  param->u.crypt.alg);
3398  param->u.crypt.err = IEEE_CRYPT_ERR_UNKNOWN_ALG;
3399  ret = -EINVAL;
3400  goto done;
3401  }
3402  if (*crypt == NULL || (*crypt)->ops != ops) {
3403  struct lib80211_crypt_data *new_crypt;
3404 
3406 
3407  new_crypt = kmalloc(sizeof(*new_crypt), GFP_KERNEL);
3408  if (new_crypt == NULL) {
3409  ret = -ENOMEM;
3410  goto done;
3411  }
3412  memset(new_crypt, 0, sizeof(struct lib80211_crypt_data));
3413  new_crypt->ops = ops;
3414  if (new_crypt->ops)
3415  new_crypt->priv =
3416  new_crypt->ops->init(param->u.crypt.idx);
3417 
3418  if (new_crypt->priv == NULL) {
3419  kfree(new_crypt);
3421  ret = -EINVAL;
3422  goto done;
3423  }
3424 
3425  *crypt = new_crypt;
3426  }
3427 
3428  if (param->u.crypt.key_len > 0 && (*crypt)->ops->set_key &&
3429  (*crypt)->ops->set_key(param->u.crypt.key,
3430  param->u.crypt.key_len, param->u.crypt.seq,
3431  (*crypt)->priv) < 0) {
3432  printk(KERN_INFO "key setting failed\n");
3433  param->u.crypt.err = IEEE_CRYPT_ERR_KEY_SET_FAILED;
3434  ret = -EINVAL;
3435  goto done;
3436  }
3437 
3438  skip_host_crypt:
3439  if (param->u.crypt.set_tx) {
3440  ieee->crypt_info.tx_keyidx = param->u.crypt.idx;
3441  sec.active_key = param->u.crypt.idx;
3442  sec.flags |= SEC_ACTIVE_KEY;
3443  } else
3444  sec.flags &= ~SEC_ACTIVE_KEY;
3445 
3446  if (param->u.crypt.alg != NULL) {
3447  memcpy(sec.keys[param->u.crypt.idx],
3448  param->u.crypt.key,
3449  param->u.crypt.key_len);
3450  sec.key_sizes[param->u.crypt.idx] = param->u.crypt.key_len;
3451  sec.flags |= (1 << param->u.crypt.idx);
3452 
3453  if (strcmp(param->u.crypt.alg, "R-WEP") == 0) {
3454  sec.flags |= SEC_LEVEL;
3455  sec.level = SEC_LEVEL_1;
3456  } else if (strcmp(param->u.crypt.alg, "R-TKIP") == 0) {
3457  sec.flags |= SEC_LEVEL;
3458  sec.level = SEC_LEVEL_2;
3459  } else if (strcmp(param->u.crypt.alg, "R-CCMP") == 0) {
3460  sec.flags |= SEC_LEVEL;
3461  sec.level = SEC_LEVEL_3;
3462  }
3463  }
3464  done:
3465  if (ieee->set_security)
3466  ieee->set_security(ieee->dev, &sec);
3467 
3468  /* Do not reset port if card is in Managed mode since resetting will
3469  * generate new IEEE 802.11 authentication which may end up in looping
3470  * with IEEE 802.1X. If your hardware requires a reset after WEP
3471  * configuration (for example... Prism2), implement the reset_port in
3472  * the callbacks structures used to initialize the 802.11 stack. */
3473  if (ieee->reset_on_keychange &&
3474  ieee->iw_mode != IW_MODE_INFRA &&
3475  ieee->reset_port &&
3476  ieee->reset_port(ieee->dev)) {
3477  printk(KERN_INFO "reset_port failed\n");
3479  return -EINVAL;
3480  }
3481 
3482  return ret;
3483 }
3484 
3485 inline struct sk_buff *rtllib_disauth_skb(struct rtllib_network *beacon,
3486  struct rtllib_device *ieee, u16 asRsn)
3487 {
3488  struct sk_buff *skb;
3489  struct rtllib_disauth *disauth;
3490  int len = sizeof(struct rtllib_disauth) + ieee->tx_headroom;
3491 
3492  skb = dev_alloc_skb(len);
3493  if (!skb)
3494  return NULL;
3495 
3496  skb_reserve(skb, ieee->tx_headroom);
3497 
3498  disauth = (struct rtllib_disauth *) skb_put(skb,
3499  sizeof(struct rtllib_disauth));
3500  disauth->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_DEAUTH);
3501  disauth->header.duration_id = 0;
3502 
3503  memcpy(disauth->header.addr1, beacon->bssid, ETH_ALEN);
3504  memcpy(disauth->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
3505  memcpy(disauth->header.addr3, beacon->bssid, ETH_ALEN);
3506 
3507  disauth->reason = cpu_to_le16(asRsn);
3508  return skb;
3509 }
3510 
3511 inline struct sk_buff *rtllib_disassociate_skb(struct rtllib_network *beacon,
3512  struct rtllib_device *ieee, u16 asRsn)
3513 {
3514  struct sk_buff *skb;
3515  struct rtllib_disassoc *disass;
3516  int len = sizeof(struct rtllib_disassoc) + ieee->tx_headroom;
3517  skb = dev_alloc_skb(len);
3518 
3519  if (!skb)
3520  return NULL;
3521 
3522  skb_reserve(skb, ieee->tx_headroom);
3523 
3524  disass = (struct rtllib_disassoc *) skb_put(skb,
3525  sizeof(struct rtllib_disassoc));
3526  disass->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_DISASSOC);
3527  disass->header.duration_id = 0;
3528 
3529  memcpy(disass->header.addr1, beacon->bssid, ETH_ALEN);
3530  memcpy(disass->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
3531  memcpy(disass->header.addr3, beacon->bssid, ETH_ALEN);
3532 
3533  disass->reason = cpu_to_le16(asRsn);
3534  return skb;
3535 }
3536 
3537 void SendDisassociation(struct rtllib_device *ieee, bool deauth, u16 asRsn)
3538 {
3539  struct rtllib_network *beacon = &ieee->current_network;
3540  struct sk_buff *skb;
3541 
3542  if (deauth)
3543  skb = rtllib_disauth_skb(beacon, ieee, asRsn);
3544  else
3545  skb = rtllib_disassociate_skb(beacon, ieee, asRsn);
3546 
3547  if (skb)
3548  softmac_mgmt_xmit(skb, ieee);
3549 }
3550 
3552 {
3553  static u8 ccmp_ie[4] = {0x00, 0x50, 0xf2, 0x04};
3554  static u8 ccmp_rsn_ie[4] = {0x00, 0x0f, 0xac, 0x04};
3555  int wpa_ie_len = ieee->wpa_ie_len;
3556  struct lib80211_crypt_data *crypt;
3557  int encrypt;
3558 
3559  crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx];
3560  encrypt = (ieee->current_network.capability & WLAN_CAPABILITY_PRIVACY)
3561  || (ieee->host_encrypt && crypt && crypt->ops &&
3562  (0 == strcmp(crypt->ops->name, "R-WEP")));
3563 
3564  /* simply judge */
3565  if (encrypt && (wpa_ie_len == 0)) {
3566  return SEC_ALG_WEP;
3567  } else if ((wpa_ie_len != 0)) {
3568  if (((ieee->wpa_ie[0] == 0xdd) &&
3569  (!memcmp(&(ieee->wpa_ie[14]), ccmp_ie, 4))) ||
3570  ((ieee->wpa_ie[0] == 0x30) &&
3571  (!memcmp(&ieee->wpa_ie[10], ccmp_rsn_ie, 4))))
3572  return SEC_ALG_CCMP;
3573  else
3574  return SEC_ALG_TKIP;
3575  } else {
3576  return SEC_ALG_NONE;
3577  }
3578 }
3579 
3581  u8 is_mesh)
3582 {
3583  struct ieee_param *param;
3584  int ret = 0;
3585 
3586  down(&ieee->wx_sem);
3587 
3588  if (p->length < sizeof(struct ieee_param) || !p->pointer) {
3589  ret = -EINVAL;
3590  goto out;
3591  }
3592 
3593  param = kmalloc(p->length, GFP_KERNEL);
3594  if (param == NULL) {
3595  ret = -ENOMEM;
3596  goto out;
3597  }
3598  if (copy_from_user(param, p->pointer, p->length)) {
3599  kfree(param);
3600  ret = -EFAULT;
3601  goto out;
3602  }
3603 
3604  switch (param->cmd) {
3606  ret = rtllib_wpa_set_param(ieee, param->u.wpa_param.name,
3607  param->u.wpa_param.value);
3608  break;
3609 
3610  case IEEE_CMD_SET_WPA_IE:
3611  ret = rtllib_wpa_set_wpa_ie(ieee, param, p->length);
3612  break;
3613 
3615  ret = rtllib_wpa_set_encryption(ieee, param, p->length, 0);
3616  break;
3617 
3618  case IEEE_CMD_MLME:
3619  ret = rtllib_wpa_mlme(ieee, param->u.mlme.command,
3620  param->u.mlme.reason_code);
3621  break;
3622 
3623  default:
3624  printk(KERN_INFO "Unknown WPA supplicant request: %d\n",
3625  param->cmd);
3626  ret = -EOPNOTSUPP;
3627  break;
3628  }
3629 
3630  if (ret == 0 && copy_to_user(p->pointer, param, p->length))
3631  ret = -EFAULT;
3632 
3633  kfree(param);
3634 out:
3635  up(&ieee->wx_sem);
3636 
3637  return ret;
3638 }
3640 
3642 {
3643  u8 OpMode;
3644  u8 i;
3645  bool bFilterOutNonAssociatedBSSID = false;
3646 
3647  rtllib->state = RTLLIB_NOLINK;
3648 
3649  for (i = 0; i < 6; i++)
3650  rtllib->current_network.bssid[i] = 0x55;
3651 
3652  rtllib->OpMode = RT_OP_MODE_NO_LINK;
3653  rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_BSSID,
3654  rtllib->current_network.bssid);
3655  OpMode = RT_OP_MODE_NO_LINK;
3656  rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_MEDIA_STATUS, &OpMode);
3657  rtllib_stop_send_beacons(rtllib);
3658 
3659  bFilterOutNonAssociatedBSSID = false;
3660  rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_CECHK_BSSID,
3661  (u8 *)(&bFilterOutNonAssociatedBSSID));
3662  notify_wx_assoc_event(rtllib);
3663 
3664 }
3665 
3667  u8 asRsn)
3668 {
3669  u8 i;
3670  u8 OpMode;
3671 
3672  RemovePeerTS(rtllib, asSta);
3673 
3674  if (memcmp(rtllib->current_network.bssid, asSta, 6) == 0) {
3675  rtllib->state = RTLLIB_NOLINK;
3676 
3677  for (i = 0; i < 6; i++)
3678  rtllib->current_network.bssid[i] = 0x22;
3679  OpMode = RT_OP_MODE_NO_LINK;
3680  rtllib->OpMode = RT_OP_MODE_NO_LINK;
3681  rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_MEDIA_STATUS,
3682  (u8 *)(&OpMode));
3683  rtllib_disassociate(rtllib);
3684 
3685  rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_BSSID,
3686  rtllib->current_network.bssid);
3687 
3688  }
3689 
3690 }
3691 
3692 void
3694  struct rtllib_device *rtllib,
3695  u8 asRsn
3696 )
3697 {
3698  bool bFilterOutNonAssociatedBSSID = false;
3699 
3700  bFilterOutNonAssociatedBSSID = false;
3701  rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_CECHK_BSSID,
3702  (u8 *)(&bFilterOutNonAssociatedBSSID));
3703  rtllib_MlmeDisassociateRequest(rtllib, rtllib->current_network.bssid,
3704  asRsn);
3705 
3706  rtllib->state = RTLLIB_NOLINK;
3707 }
3708 
3709 bool rtllib_MgntDisconnect(struct rtllib_device *rtllib, u8 asRsn)
3710 {
3711  if (rtllib->ps != RTLLIB_PS_DISABLED)
3712  rtllib->sta_wake_up(rtllib->dev);
3713 
3714  if (rtllib->state == RTLLIB_LINKED) {
3715  if (rtllib->iw_mode == IW_MODE_ADHOC)
3716  rtllib_MgntDisconnectIBSS(rtllib);
3717  if (rtllib->iw_mode == IW_MODE_INFRA)
3718  rtllib_MgntDisconnectAP(rtllib, asRsn);
3719 
3720  }
3721 
3722  return true;
3723 }
3725 
3727 {
3728  union iwreq_data wrqu;
3729 
3730  if (ieee->cannot_notify)
3731  return;
3732 
3733  wrqu.ap_addr.sa_family = ARPHRD_ETHER;
3734  if (ieee->state == RTLLIB_LINKED)
3735  memcpy(wrqu.ap_addr.sa_data, ieee->current_network.bssid,
3736  ETH_ALEN);
3737  else {
3738 
3739  printk(KERN_INFO "%s(): Tell user space disconnected\n",
3740  __func__);
3741  memset(wrqu.ap_addr.sa_data, 0, ETH_ALEN);
3742  }
3743  wireless_send_event(ieee->dev, SIOCGIWAP, &wrqu, NULL);
3744 }