audit: complex interfield comparison helper
[linux-2.6/linux-acpi-2.6/ibm-acpi-2.6.git] / drivers / staging / rtl8192e / rtllib_softmac.c
blob1637f1110991fa8003e831daea9c525b32588fb8
1 /* IEEE 802.11 SoftMAC layer
2 * Copyright (c) 2005 Andrea Merello <andreamrl@tiscali.it>
4 * Mostly extracted from the rtl8180-sa2400 driver for the
5 * in-kernel generic ieee802.11 stack.
7 * Few lines might be stolen from other part of the rtllib
8 * stack. Copyright who own it's copyright
10 * WPA code stolen from the ipw2200 driver.
11 * Copyright who own it's copyright.
13 * released under the GPL
17 #include "rtllib.h"
19 #include <linux/random.h>
20 #include <linux/delay.h>
21 #include <linux/uaccess.h>
22 #include "dot11d.h"
24 short rtllib_is_54g(struct rtllib_network *net)
26 return (net->rates_ex_len > 0) || (net->rates_len > 4);
29 short rtllib_is_shortslot(const struct rtllib_network *net)
31 return net->capability & WLAN_CAPABILITY_SHORT_SLOT_TIME;
34 /* returns the total length needed for pleacing the RATE MFIE
35 * tag and the EXTENDED RATE MFIE tag if needed.
36 * It encludes two bytes per tag for the tag itself and its len
38 static unsigned int rtllib_MFIE_rate_len(struct rtllib_device *ieee)
40 unsigned int rate_len = 0;
42 if (ieee->modulation & RTLLIB_CCK_MODULATION)
43 rate_len = RTLLIB_CCK_RATE_LEN + 2;
45 if (ieee->modulation & RTLLIB_OFDM_MODULATION)
47 rate_len += RTLLIB_OFDM_RATE_LEN + 2;
49 return rate_len;
52 /* pleace the MFIE rate, tag to the memory (double) poined.
53 * Then it updates the pointer so that
54 * it points after the new MFIE tag added.
56 static void rtllib_MFIE_Brate(struct rtllib_device *ieee, u8 **tag_p)
58 u8 *tag = *tag_p;
60 if (ieee->modulation & RTLLIB_CCK_MODULATION) {
61 *tag++ = MFIE_TYPE_RATES;
62 *tag++ = 4;
63 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_CCK_RATE_1MB;
64 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_CCK_RATE_2MB;
65 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_CCK_RATE_5MB;
66 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_CCK_RATE_11MB;
69 /* We may add an option for custom rates that specific HW
70 * might support */
71 *tag_p = tag;
74 static void rtllib_MFIE_Grate(struct rtllib_device *ieee, u8 **tag_p)
76 u8 *tag = *tag_p;
78 if (ieee->modulation & RTLLIB_OFDM_MODULATION) {
79 *tag++ = MFIE_TYPE_RATES_EX;
80 *tag++ = 8;
81 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_OFDM_RATE_6MB;
82 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_OFDM_RATE_9MB;
83 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_OFDM_RATE_12MB;
84 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_OFDM_RATE_18MB;
85 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_OFDM_RATE_24MB;
86 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_OFDM_RATE_36MB;
87 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_OFDM_RATE_48MB;
88 *tag++ = RTLLIB_BASIC_RATE_MASK | RTLLIB_OFDM_RATE_54MB;
90 /* We may add an option for custom rates that specific HW might
91 * support */
92 *tag_p = tag;
95 static void rtllib_WMM_Info(struct rtllib_device *ieee, u8 **tag_p)
97 u8 *tag = *tag_p;
99 *tag++ = MFIE_TYPE_GENERIC;
100 *tag++ = 7;
101 *tag++ = 0x00;
102 *tag++ = 0x50;
103 *tag++ = 0xf2;
104 *tag++ = 0x02;
105 *tag++ = 0x00;
106 *tag++ = 0x01;
107 *tag++ = MAX_SP_Len;
108 *tag_p = tag;
111 void rtllib_TURBO_Info(struct rtllib_device *ieee, u8 **tag_p)
113 u8 *tag = *tag_p;
115 *tag++ = MFIE_TYPE_GENERIC;
116 *tag++ = 7;
117 *tag++ = 0x00;
118 *tag++ = 0xe0;
119 *tag++ = 0x4c;
120 *tag++ = 0x01;
121 *tag++ = 0x02;
122 *tag++ = 0x11;
123 *tag++ = 0x00;
125 *tag_p = tag;
126 printk(KERN_ALERT "This is enable turbo mode IE process\n");
129 static void enqueue_mgmt(struct rtllib_device *ieee, struct sk_buff *skb)
131 int nh;
132 nh = (ieee->mgmt_queue_head + 1) % MGMT_QUEUE_NUM;
135 * if the queue is full but we have newer frames then
136 * just overwrites the oldest.
138 * if (nh == ieee->mgmt_queue_tail)
139 * return -1;
141 ieee->mgmt_queue_head = nh;
142 ieee->mgmt_queue_ring[nh] = skb;
146 static struct sk_buff *dequeue_mgmt(struct rtllib_device *ieee)
148 struct sk_buff *ret;
150 if (ieee->mgmt_queue_tail == ieee->mgmt_queue_head)
151 return NULL;
153 ret = ieee->mgmt_queue_ring[ieee->mgmt_queue_tail];
155 ieee->mgmt_queue_tail =
156 (ieee->mgmt_queue_tail+1) % MGMT_QUEUE_NUM;
158 return ret;
161 static void init_mgmt_queue(struct rtllib_device *ieee)
163 ieee->mgmt_queue_tail = ieee->mgmt_queue_head = 0;
168 MgntQuery_TxRateExcludeCCKRates(struct rtllib_device *ieee)
170 u16 i;
171 u8 QueryRate = 0;
172 u8 BasicRate;
175 for (i = 0; i < ieee->current_network.rates_len; i++) {
176 BasicRate = ieee->current_network.rates[i]&0x7F;
177 if (!rtllib_is_cck_rate(BasicRate)) {
178 if (QueryRate == 0) {
179 QueryRate = BasicRate;
180 } else {
181 if (BasicRate < QueryRate)
182 QueryRate = BasicRate;
187 if (QueryRate == 0) {
188 QueryRate = 12;
189 printk(KERN_INFO "No BasicRate found!!\n");
191 return QueryRate;
194 u8 MgntQuery_MgntFrameTxRate(struct rtllib_device *ieee)
196 struct rt_hi_throughput *pHTInfo = ieee->pHTInfo;
197 u8 rate;
199 if (pHTInfo->IOTAction & HT_IOT_ACT_MGNT_USE_CCK_6M)
200 rate = 0x0c;
201 else
202 rate = ieee->basic_rate & 0x7f;
204 if (rate == 0) {
205 if (ieee->mode == IEEE_A ||
206 ieee->mode == IEEE_N_5G ||
207 (ieee->mode == IEEE_N_24G && !pHTInfo->bCurSuppCCK))
208 rate = 0x0c;
209 else
210 rate = 0x02;
213 return rate;
216 inline void softmac_mgmt_xmit(struct sk_buff *skb, struct rtllib_device *ieee)
218 unsigned long flags;
219 short single = ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE;
220 struct rtllib_hdr_3addr *header =
221 (struct rtllib_hdr_3addr *) skb->data;
223 struct cb_desc *tcb_desc = (struct cb_desc *)(skb->cb + 8);
224 spin_lock_irqsave(&ieee->lock, flags);
226 /* called with 2nd param 0, no mgmt lock required */
227 rtllib_sta_wakeup(ieee, 0);
229 if (header->frame_ctl == RTLLIB_STYPE_BEACON)
230 tcb_desc->queue_index = BEACON_QUEUE;
231 else
232 tcb_desc->queue_index = MGNT_QUEUE;
234 if (ieee->disable_mgnt_queue)
235 tcb_desc->queue_index = HIGH_QUEUE;
237 tcb_desc->data_rate = MgntQuery_MgntFrameTxRate(ieee);
238 tcb_desc->RATRIndex = 7;
239 tcb_desc->bTxDisableRateFallBack = 1;
240 tcb_desc->bTxUseDriverAssingedRate = 1;
241 if (single) {
242 if (ieee->queue_stop) {
243 enqueue_mgmt(ieee, skb);
244 } else {
245 header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0]<<4);
247 if (ieee->seq_ctrl[0] == 0xFFF)
248 ieee->seq_ctrl[0] = 0;
249 else
250 ieee->seq_ctrl[0]++;
252 /* avoid watchdog triggers */
253 ieee->softmac_data_hard_start_xmit(skb, ieee->dev,
254 ieee->basic_rate);
257 spin_unlock_irqrestore(&ieee->lock, flags);
258 } else {
259 spin_unlock_irqrestore(&ieee->lock, flags);
260 spin_lock_irqsave(&ieee->mgmt_tx_lock, flags);
262 header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
264 if (ieee->seq_ctrl[0] == 0xFFF)
265 ieee->seq_ctrl[0] = 0;
266 else
267 ieee->seq_ctrl[0]++;
269 /* check wether the managed packet queued greater than 5 */
270 if (!ieee->check_nic_enough_desc(ieee->dev, tcb_desc->queue_index) ||
271 (skb_queue_len(&ieee->skb_waitQ[tcb_desc->queue_index]) != 0) ||
272 (ieee->queue_stop)) {
273 /* insert the skb packet to the management queue */
274 /* as for the completion function, it does not need
275 * to check it any more.
276 * */
277 printk(KERN_INFO "%s():insert to waitqueue, queue_index"
278 ":%d!\n", __func__, tcb_desc->queue_index);
279 skb_queue_tail(&ieee->skb_waitQ[tcb_desc->queue_index],
280 skb);
281 } else {
282 ieee->softmac_hard_start_xmit(skb, ieee->dev);
284 spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags);
288 inline void softmac_ps_mgmt_xmit(struct sk_buff *skb,
289 struct rtllib_device *ieee)
291 short single = ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE;
292 struct rtllib_hdr_3addr *header =
293 (struct rtllib_hdr_3addr *) skb->data;
294 u16 fc, type, stype;
295 struct cb_desc *tcb_desc = (struct cb_desc *)(skb->cb + 8);
297 fc = header->frame_ctl;
298 type = WLAN_FC_GET_TYPE(fc);
299 stype = WLAN_FC_GET_STYPE(fc);
302 if (stype != RTLLIB_STYPE_PSPOLL)
303 tcb_desc->queue_index = MGNT_QUEUE;
304 else
305 tcb_desc->queue_index = HIGH_QUEUE;
307 if (ieee->disable_mgnt_queue)
308 tcb_desc->queue_index = HIGH_QUEUE;
311 tcb_desc->data_rate = MgntQuery_MgntFrameTxRate(ieee);
312 tcb_desc->RATRIndex = 7;
313 tcb_desc->bTxDisableRateFallBack = 1;
314 tcb_desc->bTxUseDriverAssingedRate = 1;
315 if (single) {
316 if (type != RTLLIB_FTYPE_CTL) {
317 header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
319 if (ieee->seq_ctrl[0] == 0xFFF)
320 ieee->seq_ctrl[0] = 0;
321 else
322 ieee->seq_ctrl[0]++;
325 /* avoid watchdog triggers */
326 ieee->softmac_data_hard_start_xmit(skb, ieee->dev,
327 ieee->basic_rate);
329 } else {
330 if (type != RTLLIB_FTYPE_CTL) {
331 header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
333 if (ieee->seq_ctrl[0] == 0xFFF)
334 ieee->seq_ctrl[0] = 0;
335 else
336 ieee->seq_ctrl[0]++;
338 ieee->softmac_hard_start_xmit(skb, ieee->dev);
343 inline struct sk_buff *rtllib_probe_req(struct rtllib_device *ieee)
345 unsigned int len, rate_len;
346 u8 *tag;
347 struct sk_buff *skb;
348 struct rtllib_probe_request *req;
350 len = ieee->current_network.ssid_len;
352 rate_len = rtllib_MFIE_rate_len(ieee);
354 skb = dev_alloc_skb(sizeof(struct rtllib_probe_request) +
355 2 + len + rate_len + ieee->tx_headroom);
357 if (!skb)
358 return NULL;
360 skb_reserve(skb, ieee->tx_headroom);
362 req = (struct rtllib_probe_request *) skb_put(skb,
363 sizeof(struct rtllib_probe_request));
364 req->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_PROBE_REQ);
365 req->header.duration_id = 0;
367 memset(req->header.addr1, 0xff, ETH_ALEN);
368 memcpy(req->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
369 memset(req->header.addr3, 0xff, ETH_ALEN);
371 tag = (u8 *) skb_put(skb, len + 2 + rate_len);
373 *tag++ = MFIE_TYPE_SSID;
374 *tag++ = len;
375 memcpy(tag, ieee->current_network.ssid, len);
376 tag += len;
378 rtllib_MFIE_Brate(ieee, &tag);
379 rtllib_MFIE_Grate(ieee, &tag);
381 return skb;
384 struct sk_buff *rtllib_get_beacon_(struct rtllib_device *ieee);
386 static void rtllib_send_beacon(struct rtllib_device *ieee)
388 struct sk_buff *skb;
389 if (!ieee->ieee_up)
390 return;
391 skb = rtllib_get_beacon_(ieee);
393 if (skb) {
394 softmac_mgmt_xmit(skb, ieee);
395 ieee->softmac_stats.tx_beacons++;
398 if (ieee->beacon_txing && ieee->ieee_up)
399 mod_timer(&ieee->beacon_timer, jiffies +
400 (MSECS(ieee->current_network.beacon_interval - 5)));
404 static void rtllib_send_beacon_cb(unsigned long _ieee)
406 struct rtllib_device *ieee =
407 (struct rtllib_device *) _ieee;
408 unsigned long flags;
410 spin_lock_irqsave(&ieee->beacon_lock, flags);
411 rtllib_send_beacon(ieee);
412 spin_unlock_irqrestore(&ieee->beacon_lock, flags);
416 * Description:
417 * Enable network monitor mode, all rx packets will be received.
419 void rtllib_EnableNetMonitorMode(struct net_device *dev,
420 bool bInitState)
422 struct rtllib_device *ieee = netdev_priv_rsl(dev);
424 printk(KERN_INFO "========>Enter Monitor Mode\n");
426 ieee->AllowAllDestAddrHandler(dev, true, !bInitState);
431 * Description:
432 * Disable network network monitor mode, only packets destinated to
433 * us will be received.
435 void rtllib_DisableNetMonitorMode(struct net_device *dev,
436 bool bInitState)
438 struct rtllib_device *ieee = netdev_priv_rsl(dev);
440 printk(KERN_INFO "========>Exit Monitor Mode\n");
442 ieee->AllowAllDestAddrHandler(dev, false, !bInitState);
447 * Description:
448 * This enables the specialized promiscuous mode required by Intel.
449 * In this mode, Intel intends to hear traffics from/to other STAs in the
450 * same BSS. Therefore we don't have to disable checking BSSID and we only need
451 * to allow all dest. BUT: if we enable checking BSSID then we can't recv
452 * packets from other STA.
454 void rtllib_EnableIntelPromiscuousMode(struct net_device *dev,
455 bool bInitState)
457 bool bFilterOutNonAssociatedBSSID = false;
459 struct rtllib_device *ieee = netdev_priv_rsl(dev);
461 printk(KERN_INFO "========>Enter Intel Promiscuous Mode\n");
463 ieee->AllowAllDestAddrHandler(dev, true, !bInitState);
464 ieee->SetHwRegHandler(dev, HW_VAR_CECHK_BSSID,
465 (u8 *)&bFilterOutNonAssociatedBSSID);
467 ieee->bNetPromiscuousMode = true;
469 EXPORT_SYMBOL(rtllib_EnableIntelPromiscuousMode);
473 * Description:
474 * This disables the specialized promiscuous mode required by Intel.
475 * See MgntEnableIntelPromiscuousMode for detail.
477 void rtllib_DisableIntelPromiscuousMode(struct net_device *dev,
478 bool bInitState)
480 bool bFilterOutNonAssociatedBSSID = true;
482 struct rtllib_device *ieee = netdev_priv_rsl(dev);
484 printk(KERN_INFO "========>Exit Intel Promiscuous Mode\n");
486 ieee->AllowAllDestAddrHandler(dev, false, !bInitState);
487 ieee->SetHwRegHandler(dev, HW_VAR_CECHK_BSSID,
488 (u8 *)&bFilterOutNonAssociatedBSSID);
490 ieee->bNetPromiscuousMode = false;
492 EXPORT_SYMBOL(rtllib_DisableIntelPromiscuousMode);
494 static void rtllib_send_probe(struct rtllib_device *ieee, u8 is_mesh)
496 struct sk_buff *skb;
497 skb = rtllib_probe_req(ieee);
498 if (skb) {
499 softmac_mgmt_xmit(skb, ieee);
500 ieee->softmac_stats.tx_probe_rq++;
505 void rtllib_send_probe_requests(struct rtllib_device *ieee, u8 is_mesh)
507 if (ieee->active_scan && (ieee->softmac_features &
508 IEEE_SOFTMAC_PROBERQ)) {
509 rtllib_send_probe(ieee, 0);
510 rtllib_send_probe(ieee, 0);
514 static void rtllib_softmac_hint11d_wq(void *data)
518 void rtllib_update_active_chan_map(struct rtllib_device *ieee)
520 memcpy(ieee->active_channel_map, GET_DOT11D_INFO(ieee)->channel_map,
521 MAX_CHANNEL_NUMBER+1);
524 /* this performs syncro scan blocking the caller until all channels
525 * in the allowed channel map has been checked.
527 void rtllib_softmac_scan_syncro(struct rtllib_device *ieee, u8 is_mesh)
529 union iwreq_data wrqu;
530 short ch = 0;
532 rtllib_update_active_chan_map(ieee);
534 ieee->be_scan_inprogress = true;
536 down(&ieee->scan_sem);
538 while (1) {
539 do {
540 ch++;
541 if (ch > MAX_CHANNEL_NUMBER)
542 goto out; /* scan completed */
543 } while (!ieee->active_channel_map[ch]);
545 /* this fuction can be called in two situations
546 * 1- We have switched to ad-hoc mode and we are
547 * performing a complete syncro scan before conclude
548 * there are no interesting cell and to create a
549 * new one. In this case the link state is
550 * RTLLIB_NOLINK until we found an interesting cell.
551 * If so the ieee8021_new_net, called by the RX path
552 * will set the state to RTLLIB_LINKED, so we stop
553 * scanning
554 * 2- We are linked and the root uses run iwlist scan.
555 * So we switch to RTLLIB_LINKED_SCANNING to remember
556 * that we are still logically linked (not interested in
557 * new network events, despite for updating the net list,
558 * but we are temporarly 'unlinked' as the driver shall
559 * not filter RX frames and the channel is changing.
560 * So the only situation in witch are interested is to check
561 * if the state become LINKED because of the #1 situation
564 if (ieee->state == RTLLIB_LINKED)
565 goto out;
566 if (ieee->sync_scan_hurryup) {
567 printk(KERN_INFO "============>sync_scan_hurryup out\n");
568 goto out;
571 ieee->set_chan(ieee->dev, ch);
572 if (ieee->active_channel_map[ch] == 1)
573 rtllib_send_probe_requests(ieee, 0);
575 /* this prevent excessive time wait when we
576 * need to wait for a syncro scan to end..
578 msleep_interruptible_rsl(RTLLIB_SOFTMAC_SCAN_TIME);
580 out:
581 ieee->actscanning = false;
582 ieee->sync_scan_hurryup = 0;
584 if (ieee->state >= RTLLIB_LINKED) {
585 if (IS_DOT11D_ENABLE(ieee))
586 DOT11D_ScanComplete(ieee);
588 up(&ieee->scan_sem);
590 ieee->be_scan_inprogress = false;
592 memset(&wrqu, 0, sizeof(wrqu));
593 wireless_send_event(ieee->dev, SIOCGIWSCAN, &wrqu, NULL);
596 static void rtllib_softmac_scan_wq(void *data)
598 struct rtllib_device *ieee = container_of_dwork_rsl(data,
599 struct rtllib_device, softmac_scan_wq);
600 u8 last_channel = ieee->current_network.channel;
602 rtllib_update_active_chan_map(ieee);
604 if (!ieee->ieee_up)
605 return;
606 if (rtllib_act_scanning(ieee, true) == true)
607 return;
609 down(&ieee->scan_sem);
611 if (ieee->eRFPowerState == eRfOff) {
612 printk(KERN_INFO "======>%s():rf state is eRfOff, return\n",
613 __func__);
614 goto out1;
617 do {
618 ieee->current_network.channel =
619 (ieee->current_network.channel + 1) %
620 MAX_CHANNEL_NUMBER;
621 if (ieee->scan_watch_dog++ > MAX_CHANNEL_NUMBER) {
622 if (!ieee->active_channel_map[ieee->current_network.channel])
623 ieee->current_network.channel = 6;
624 goto out; /* no good chans */
626 } while (!ieee->active_channel_map[ieee->current_network.channel]);
628 if (ieee->scanning_continue == 0)
629 goto out;
631 ieee->set_chan(ieee->dev, ieee->current_network.channel);
633 if (ieee->active_channel_map[ieee->current_network.channel] == 1)
634 rtllib_send_probe_requests(ieee, 0);
636 queue_delayed_work_rsl(ieee->wq, &ieee->softmac_scan_wq,
637 MSECS(RTLLIB_SOFTMAC_SCAN_TIME));
639 up(&ieee->scan_sem);
640 return;
642 out:
643 if (IS_DOT11D_ENABLE(ieee))
644 DOT11D_ScanComplete(ieee);
645 ieee->current_network.channel = last_channel;
647 out1:
648 ieee->actscanning = false;
649 ieee->scan_watch_dog = 0;
650 ieee->scanning_continue = 0;
651 up(&ieee->scan_sem);
656 static void rtllib_beacons_start(struct rtllib_device *ieee)
658 unsigned long flags;
659 spin_lock_irqsave(&ieee->beacon_lock, flags);
661 ieee->beacon_txing = 1;
662 rtllib_send_beacon(ieee);
664 spin_unlock_irqrestore(&ieee->beacon_lock, flags);
667 static void rtllib_beacons_stop(struct rtllib_device *ieee)
669 unsigned long flags;
671 spin_lock_irqsave(&ieee->beacon_lock, flags);
673 ieee->beacon_txing = 0;
674 del_timer_sync(&ieee->beacon_timer);
676 spin_unlock_irqrestore(&ieee->beacon_lock, flags);
681 void rtllib_stop_send_beacons(struct rtllib_device *ieee)
683 if (ieee->stop_send_beacons)
684 ieee->stop_send_beacons(ieee->dev);
685 if (ieee->softmac_features & IEEE_SOFTMAC_BEACONS)
686 rtllib_beacons_stop(ieee);
688 EXPORT_SYMBOL(rtllib_stop_send_beacons);
691 void rtllib_start_send_beacons(struct rtllib_device *ieee)
693 if (ieee->start_send_beacons)
694 ieee->start_send_beacons(ieee->dev);
695 if (ieee->softmac_features & IEEE_SOFTMAC_BEACONS)
696 rtllib_beacons_start(ieee);
698 EXPORT_SYMBOL(rtllib_start_send_beacons);
701 static void rtllib_softmac_stop_scan(struct rtllib_device *ieee)
703 down(&ieee->scan_sem);
704 ieee->scan_watch_dog = 0;
705 if (ieee->scanning_continue == 1) {
706 ieee->scanning_continue = 0;
707 ieee->actscanning = 0;
709 cancel_delayed_work(&ieee->softmac_scan_wq);
712 up(&ieee->scan_sem);
715 void rtllib_stop_scan(struct rtllib_device *ieee)
717 if (ieee->softmac_features & IEEE_SOFTMAC_SCAN) {
718 rtllib_softmac_stop_scan(ieee);
719 } else {
720 if (ieee->rtllib_stop_hw_scan)
721 ieee->rtllib_stop_hw_scan(ieee->dev);
724 EXPORT_SYMBOL(rtllib_stop_scan);
726 void rtllib_stop_scan_syncro(struct rtllib_device *ieee)
728 if (ieee->softmac_features & IEEE_SOFTMAC_SCAN) {
729 ieee->sync_scan_hurryup = 1;
730 } else {
731 if (ieee->rtllib_stop_hw_scan)
732 ieee->rtllib_stop_hw_scan(ieee->dev);
735 EXPORT_SYMBOL(rtllib_stop_scan_syncro);
737 bool rtllib_act_scanning(struct rtllib_device *ieee, bool sync_scan)
739 if (ieee->softmac_features & IEEE_SOFTMAC_SCAN) {
740 if (sync_scan)
741 return ieee->be_scan_inprogress;
742 else
743 return ieee->actscanning || ieee->be_scan_inprogress;
744 } else {
745 return test_bit(STATUS_SCANNING, &ieee->status);
748 EXPORT_SYMBOL(rtllib_act_scanning);
750 /* called with ieee->lock held */
751 static void rtllib_start_scan(struct rtllib_device *ieee)
753 RT_TRACE(COMP_DBG, "===>%s()\n", __func__);
754 if (ieee->rtllib_ips_leave_wq != NULL)
755 ieee->rtllib_ips_leave_wq(ieee->dev);
757 if (IS_DOT11D_ENABLE(ieee)) {
758 if (IS_COUNTRY_IE_VALID(ieee))
759 RESET_CIE_WATCHDOG(ieee);
761 if (ieee->softmac_features & IEEE_SOFTMAC_SCAN) {
762 if (ieee->scanning_continue == 0) {
763 ieee->actscanning = true;
764 ieee->scanning_continue = 1;
765 queue_delayed_work_rsl(ieee->wq,
766 &ieee->softmac_scan_wq, 0);
768 } else {
769 if (ieee->rtllib_start_hw_scan)
770 ieee->rtllib_start_hw_scan(ieee->dev);
774 /* called with wx_sem held */
775 void rtllib_start_scan_syncro(struct rtllib_device *ieee, u8 is_mesh)
777 if (IS_DOT11D_ENABLE(ieee)) {
778 if (IS_COUNTRY_IE_VALID(ieee))
779 RESET_CIE_WATCHDOG(ieee);
781 ieee->sync_scan_hurryup = 0;
782 if (ieee->softmac_features & IEEE_SOFTMAC_SCAN) {
783 rtllib_softmac_scan_syncro(ieee, is_mesh);
784 } else {
785 if (ieee->rtllib_start_hw_scan)
786 ieee->rtllib_start_hw_scan(ieee->dev);
789 EXPORT_SYMBOL(rtllib_start_scan_syncro);
791 inline struct sk_buff *rtllib_authentication_req(struct rtllib_network *beacon,
792 struct rtllib_device *ieee, int challengelen, u8 *daddr)
794 struct sk_buff *skb;
795 struct rtllib_authentication *auth;
796 int len = 0;
797 len = sizeof(struct rtllib_authentication) + challengelen +
798 ieee->tx_headroom + 4;
799 skb = dev_alloc_skb(len);
801 if (!skb)
802 return NULL;
804 skb_reserve(skb, ieee->tx_headroom);
806 auth = (struct rtllib_authentication *)
807 skb_put(skb, sizeof(struct rtllib_authentication));
809 auth->header.frame_ctl = RTLLIB_STYPE_AUTH;
810 if (challengelen)
811 auth->header.frame_ctl |= RTLLIB_FCTL_WEP;
813 auth->header.duration_id = 0x013a;
814 memcpy(auth->header.addr1, beacon->bssid, ETH_ALEN);
815 memcpy(auth->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
816 memcpy(auth->header.addr3, beacon->bssid, ETH_ALEN);
817 if (ieee->auth_mode == 0)
818 auth->algorithm = WLAN_AUTH_OPEN;
819 else if (ieee->auth_mode == 1)
820 auth->algorithm = WLAN_AUTH_SHARED_KEY;
821 else if (ieee->auth_mode == 2)
822 auth->algorithm = WLAN_AUTH_OPEN;
823 auth->transaction = cpu_to_le16(ieee->associate_seq);
824 ieee->associate_seq++;
826 auth->status = cpu_to_le16(WLAN_STATUS_SUCCESS);
828 return skb;
831 static struct sk_buff *rtllib_probe_resp(struct rtllib_device *ieee, u8 *dest)
833 u8 *tag;
834 int beacon_size;
835 struct rtllib_probe_response *beacon_buf;
836 struct sk_buff *skb = NULL;
837 int encrypt;
838 int atim_len, erp_len;
839 struct lib80211_crypt_data *crypt;
841 char *ssid = ieee->current_network.ssid;
842 int ssid_len = ieee->current_network.ssid_len;
843 int rate_len = ieee->current_network.rates_len+2;
844 int rate_ex_len = ieee->current_network.rates_ex_len;
845 int wpa_ie_len = ieee->wpa_ie_len;
846 u8 erpinfo_content = 0;
848 u8 *tmp_ht_cap_buf = NULL;
849 u8 tmp_ht_cap_len = 0;
850 u8 *tmp_ht_info_buf = NULL;
851 u8 tmp_ht_info_len = 0;
852 struct rt_hi_throughput *pHTInfo = ieee->pHTInfo;
853 u8 *tmp_generic_ie_buf = NULL;
854 u8 tmp_generic_ie_len = 0;
856 if (rate_ex_len > 0)
857 rate_ex_len += 2;
859 if (ieee->current_network.capability & WLAN_CAPABILITY_IBSS)
860 atim_len = 4;
861 else
862 atim_len = 0;
864 if ((ieee->current_network.mode == IEEE_G) ||
865 (ieee->current_network.mode == IEEE_N_24G &&
866 ieee->pHTInfo->bCurSuppCCK)) {
867 erp_len = 3;
868 erpinfo_content = 0;
869 if (ieee->current_network.buseprotection)
870 erpinfo_content |= ERP_UseProtection;
871 } else
872 erp_len = 0;
874 crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx];
875 encrypt = ieee->host_encrypt && crypt && crypt->ops &&
876 ((0 == strcmp(crypt->ops->name, "R-WEP") || wpa_ie_len));
877 if (ieee->pHTInfo->bCurrentHTSupport) {
878 tmp_ht_cap_buf = (u8 *) &(ieee->pHTInfo->SelfHTCap);
879 tmp_ht_cap_len = sizeof(ieee->pHTInfo->SelfHTCap);
880 tmp_ht_info_buf = (u8 *) &(ieee->pHTInfo->SelfHTInfo);
881 tmp_ht_info_len = sizeof(ieee->pHTInfo->SelfHTInfo);
882 HTConstructCapabilityElement(ieee, tmp_ht_cap_buf,
883 &tmp_ht_cap_len, encrypt, false);
884 HTConstructInfoElement(ieee, tmp_ht_info_buf, &tmp_ht_info_len,
885 encrypt);
887 if (pHTInfo->bRegRT2RTAggregation) {
888 tmp_generic_ie_buf = ieee->pHTInfo->szRT2RTAggBuffer;
889 tmp_generic_ie_len =
890 sizeof(ieee->pHTInfo->szRT2RTAggBuffer);
891 HTConstructRT2RTAggElement(ieee, tmp_generic_ie_buf,
892 &tmp_generic_ie_len);
896 beacon_size = sizeof(struct rtllib_probe_response)+2+
897 ssid_len + 3 + rate_len + rate_ex_len + atim_len + erp_len
898 + wpa_ie_len + ieee->tx_headroom;
899 skb = dev_alloc_skb(beacon_size);
900 if (!skb)
901 return NULL;
903 skb_reserve(skb, ieee->tx_headroom);
905 beacon_buf = (struct rtllib_probe_response *) skb_put(skb,
906 (beacon_size - ieee->tx_headroom));
907 memcpy(beacon_buf->header.addr1, dest, ETH_ALEN);
908 memcpy(beacon_buf->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
909 memcpy(beacon_buf->header.addr3, ieee->current_network.bssid, ETH_ALEN);
911 beacon_buf->header.duration_id = 0;
912 beacon_buf->beacon_interval =
913 cpu_to_le16(ieee->current_network.beacon_interval);
914 beacon_buf->capability =
915 cpu_to_le16(ieee->current_network.capability &
916 WLAN_CAPABILITY_IBSS);
917 beacon_buf->capability |=
918 cpu_to_le16(ieee->current_network.capability &
919 WLAN_CAPABILITY_SHORT_PREAMBLE);
921 if (ieee->short_slot && (ieee->current_network.capability &
922 WLAN_CAPABILITY_SHORT_SLOT_TIME))
923 cpu_to_le16((beacon_buf->capability |=
924 WLAN_CAPABILITY_SHORT_SLOT_TIME));
926 crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx];
927 if (encrypt)
928 beacon_buf->capability |= cpu_to_le16(WLAN_CAPABILITY_PRIVACY);
931 beacon_buf->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_PROBE_RESP);
932 beacon_buf->info_element[0].id = MFIE_TYPE_SSID;
933 beacon_buf->info_element[0].len = ssid_len;
935 tag = (u8 *) beacon_buf->info_element[0].data;
937 memcpy(tag, ssid, ssid_len);
939 tag += ssid_len;
941 *(tag++) = MFIE_TYPE_RATES;
942 *(tag++) = rate_len-2;
943 memcpy(tag, ieee->current_network.rates, rate_len-2);
944 tag += rate_len-2;
946 *(tag++) = MFIE_TYPE_DS_SET;
947 *(tag++) = 1;
948 *(tag++) = ieee->current_network.channel;
950 if (atim_len) {
951 u16 val16;
952 *(tag++) = MFIE_TYPE_IBSS_SET;
953 *(tag++) = 2;
954 val16 = cpu_to_le16(ieee->current_network.atim_window);
955 memcpy((u8 *)tag, (u8 *)&val16, 2);
956 tag += 2;
959 if (erp_len) {
960 *(tag++) = MFIE_TYPE_ERP;
961 *(tag++) = 1;
962 *(tag++) = erpinfo_content;
964 if (rate_ex_len) {
965 *(tag++) = MFIE_TYPE_RATES_EX;
966 *(tag++) = rate_ex_len-2;
967 memcpy(tag, ieee->current_network.rates_ex, rate_ex_len-2);
968 tag += rate_ex_len-2;
971 if (wpa_ie_len) {
972 if (ieee->iw_mode == IW_MODE_ADHOC)
973 memcpy(&ieee->wpa_ie[14], &ieee->wpa_ie[8], 4);
974 memcpy(tag, ieee->wpa_ie, ieee->wpa_ie_len);
975 tag += ieee->wpa_ie_len;
977 return skb;
980 static struct sk_buff *rtllib_assoc_resp(struct rtllib_device *ieee, u8 *dest)
982 struct sk_buff *skb;
983 u8 *tag;
985 struct lib80211_crypt_data *crypt;
986 struct rtllib_assoc_response_frame *assoc;
987 short encrypt;
989 unsigned int rate_len = rtllib_MFIE_rate_len(ieee);
990 int len = sizeof(struct rtllib_assoc_response_frame) + rate_len +
991 ieee->tx_headroom;
993 skb = dev_alloc_skb(len);
995 if (!skb)
996 return NULL;
998 skb_reserve(skb, ieee->tx_headroom);
1000 assoc = (struct rtllib_assoc_response_frame *)
1001 skb_put(skb, sizeof(struct rtllib_assoc_response_frame));
1003 assoc->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_ASSOC_RESP);
1004 memcpy(assoc->header.addr1, dest, ETH_ALEN);
1005 memcpy(assoc->header.addr3, ieee->dev->dev_addr, ETH_ALEN);
1006 memcpy(assoc->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
1007 assoc->capability = cpu_to_le16(ieee->iw_mode == IW_MODE_MASTER ?
1008 WLAN_CAPABILITY_ESS : WLAN_CAPABILITY_IBSS);
1011 if (ieee->short_slot)
1012 assoc->capability |=
1013 cpu_to_le16(WLAN_CAPABILITY_SHORT_SLOT_TIME);
1015 if (ieee->host_encrypt)
1016 crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx];
1017 else
1018 crypt = NULL;
1020 encrypt = (crypt && crypt->ops);
1022 if (encrypt)
1023 assoc->capability |= cpu_to_le16(WLAN_CAPABILITY_PRIVACY);
1025 assoc->status = 0;
1026 assoc->aid = cpu_to_le16(ieee->assoc_id);
1027 if (ieee->assoc_id == 0x2007)
1028 ieee->assoc_id = 0;
1029 else
1030 ieee->assoc_id++;
1032 tag = (u8 *) skb_put(skb, rate_len);
1033 rtllib_MFIE_Brate(ieee, &tag);
1034 rtllib_MFIE_Grate(ieee, &tag);
1036 return skb;
1039 static struct sk_buff *rtllib_auth_resp(struct rtllib_device *ieee, int status,
1040 u8 *dest)
1042 struct sk_buff *skb = NULL;
1043 struct rtllib_authentication *auth;
1044 int len = ieee->tx_headroom + sizeof(struct rtllib_authentication) + 1;
1045 skb = dev_alloc_skb(len);
1046 if (!skb)
1047 return NULL;
1049 skb->len = sizeof(struct rtllib_authentication);
1051 skb_reserve(skb, ieee->tx_headroom);
1053 auth = (struct rtllib_authentication *)
1054 skb_put(skb, sizeof(struct rtllib_authentication));
1056 auth->status = cpu_to_le16(status);
1057 auth->transaction = cpu_to_le16(2);
1058 auth->algorithm = cpu_to_le16(WLAN_AUTH_OPEN);
1060 memcpy(auth->header.addr3, ieee->dev->dev_addr, ETH_ALEN);
1061 memcpy(auth->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
1062 memcpy(auth->header.addr1, dest, ETH_ALEN);
1063 auth->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_AUTH);
1064 return skb;
1069 static struct sk_buff *rtllib_null_func(struct rtllib_device *ieee, short pwr)
1071 struct sk_buff *skb;
1072 struct rtllib_hdr_3addr *hdr;
1074 skb = dev_alloc_skb(sizeof(struct rtllib_hdr_3addr)+ieee->tx_headroom);
1075 if (!skb)
1076 return NULL;
1078 skb_reserve(skb, ieee->tx_headroom);
1080 hdr = (struct rtllib_hdr_3addr *)skb_put(skb,
1081 sizeof(struct rtllib_hdr_3addr));
1083 memcpy(hdr->addr1, ieee->current_network.bssid, ETH_ALEN);
1084 memcpy(hdr->addr2, ieee->dev->dev_addr, ETH_ALEN);
1085 memcpy(hdr->addr3, ieee->current_network.bssid, ETH_ALEN);
1087 hdr->frame_ctl = cpu_to_le16(RTLLIB_FTYPE_DATA |
1088 RTLLIB_STYPE_NULLFUNC | RTLLIB_FCTL_TODS |
1089 (pwr ? RTLLIB_FCTL_PM : 0));
1091 return skb;
1096 static struct sk_buff *rtllib_pspoll_func(struct rtllib_device *ieee)
1098 struct sk_buff *skb;
1099 struct rtllib_pspoll_hdr *hdr;
1101 skb = dev_alloc_skb(sizeof(struct rtllib_pspoll_hdr)+ieee->tx_headroom);
1102 if (!skb)
1103 return NULL;
1105 skb_reserve(skb, ieee->tx_headroom);
1107 hdr = (struct rtllib_pspoll_hdr *)skb_put(skb,
1108 sizeof(struct rtllib_pspoll_hdr));
1110 memcpy(hdr->bssid, ieee->current_network.bssid, ETH_ALEN);
1111 memcpy(hdr->ta, ieee->dev->dev_addr, ETH_ALEN);
1113 hdr->aid = cpu_to_le16(ieee->assoc_id | 0xc000);
1114 hdr->frame_ctl = cpu_to_le16(RTLLIB_FTYPE_CTL | RTLLIB_STYPE_PSPOLL |
1115 RTLLIB_FCTL_PM);
1117 return skb;
1121 static void rtllib_resp_to_assoc_rq(struct rtllib_device *ieee, u8 *dest)
1123 struct sk_buff *buf = rtllib_assoc_resp(ieee, dest);
1125 if (buf)
1126 softmac_mgmt_xmit(buf, ieee);
1130 static void rtllib_resp_to_auth(struct rtllib_device *ieee, int s, u8 *dest)
1132 struct sk_buff *buf = rtllib_auth_resp(ieee, s, dest);
1134 if (buf)
1135 softmac_mgmt_xmit(buf, ieee);
1139 static void rtllib_resp_to_probe(struct rtllib_device *ieee, u8 *dest)
1142 struct sk_buff *buf = rtllib_probe_resp(ieee, dest);
1143 if (buf)
1144 softmac_mgmt_xmit(buf, ieee);
1148 inline int SecIsInPMKIDList(struct rtllib_device *ieee, u8 *bssid)
1150 int i = 0;
1152 do {
1153 if ((ieee->PMKIDList[i].bUsed) &&
1154 (memcmp(ieee->PMKIDList[i].Bssid, bssid, ETH_ALEN) == 0))
1155 break;
1156 else
1157 i++;
1158 } while (i < NUM_PMKID_CACHE);
1160 if (i == NUM_PMKID_CACHE)
1161 i = -1;
1162 return i;
1165 inline struct sk_buff *rtllib_association_req(struct rtllib_network *beacon,
1166 struct rtllib_device *ieee)
1168 struct sk_buff *skb;
1169 struct rtllib_assoc_request_frame *hdr;
1170 u8 *tag, *ies;
1171 int i;
1172 u8 *ht_cap_buf = NULL;
1173 u8 ht_cap_len = 0;
1174 u8 *realtek_ie_buf = NULL;
1175 u8 realtek_ie_len = 0;
1176 int wpa_ie_len = ieee->wpa_ie_len;
1177 int wps_ie_len = ieee->wps_ie_len;
1178 unsigned int ckip_ie_len = 0;
1179 unsigned int ccxrm_ie_len = 0;
1180 unsigned int cxvernum_ie_len = 0;
1181 struct lib80211_crypt_data *crypt;
1182 int encrypt;
1183 int PMKCacheIdx;
1185 unsigned int rate_len = (beacon->rates_len ?
1186 (beacon->rates_len + 2) : 0) +
1187 (beacon->rates_ex_len ? (beacon->rates_ex_len) +
1188 2 : 0);
1190 unsigned int wmm_info_len = beacon->qos_data.supported ? 9 : 0;
1191 unsigned int turbo_info_len = beacon->Turbo_Enable ? 9 : 0;
1193 int len = 0;
1194 crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx];
1195 if (crypt != NULL)
1196 encrypt = ieee->host_encrypt && crypt && crypt->ops &&
1197 ((0 == strcmp(crypt->ops->name, "R-WEP") ||
1198 wpa_ie_len));
1199 else
1200 encrypt = 0;
1202 if ((ieee->rtllib_ap_sec_type &&
1203 (ieee->rtllib_ap_sec_type(ieee) & SEC_ALG_TKIP)) ||
1204 (ieee->bForcedBgMode == true)) {
1205 ieee->pHTInfo->bEnableHT = 0;
1206 ieee->mode = WIRELESS_MODE_G;
1209 if (ieee->pHTInfo->bCurrentHTSupport && ieee->pHTInfo->bEnableHT) {
1210 ht_cap_buf = (u8 *)&(ieee->pHTInfo->SelfHTCap);
1211 ht_cap_len = sizeof(ieee->pHTInfo->SelfHTCap);
1212 HTConstructCapabilityElement(ieee, ht_cap_buf, &ht_cap_len,
1213 encrypt, true);
1214 if (ieee->pHTInfo->bCurrentRT2RTAggregation) {
1215 realtek_ie_buf = ieee->pHTInfo->szRT2RTAggBuffer;
1216 realtek_ie_len =
1217 sizeof(ieee->pHTInfo->szRT2RTAggBuffer);
1218 HTConstructRT2RTAggElement(ieee, realtek_ie_buf,
1219 &realtek_ie_len);
1223 if (beacon->bCkipSupported)
1224 ckip_ie_len = 30+2;
1225 if (beacon->bCcxRmEnable)
1226 ccxrm_ie_len = 6+2;
1227 if (beacon->BssCcxVerNumber >= 2)
1228 cxvernum_ie_len = 5+2;
1230 PMKCacheIdx = SecIsInPMKIDList(ieee, ieee->current_network.bssid);
1231 if (PMKCacheIdx >= 0) {
1232 wpa_ie_len += 18;
1233 printk(KERN_INFO "[PMK cache]: WPA2 IE length: %x\n",
1234 wpa_ie_len);
1236 len = sizeof(struct rtllib_assoc_request_frame) + 2
1237 + beacon->ssid_len
1238 + rate_len
1239 + wpa_ie_len
1240 + wps_ie_len
1241 + wmm_info_len
1242 + turbo_info_len
1243 + ht_cap_len
1244 + realtek_ie_len
1245 + ckip_ie_len
1246 + ccxrm_ie_len
1247 + cxvernum_ie_len
1248 + ieee->tx_headroom;
1250 skb = dev_alloc_skb(len);
1252 if (!skb)
1253 return NULL;
1255 skb_reserve(skb, ieee->tx_headroom);
1257 hdr = (struct rtllib_assoc_request_frame *)
1258 skb_put(skb, sizeof(struct rtllib_assoc_request_frame) + 2);
1261 hdr->header.frame_ctl = RTLLIB_STYPE_ASSOC_REQ;
1262 hdr->header.duration_id = 37;
1263 memcpy(hdr->header.addr1, beacon->bssid, ETH_ALEN);
1264 memcpy(hdr->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
1265 memcpy(hdr->header.addr3, beacon->bssid, ETH_ALEN);
1267 memcpy(ieee->ap_mac_addr, beacon->bssid, ETH_ALEN);
1269 hdr->capability = cpu_to_le16(WLAN_CAPABILITY_ESS);
1270 if (beacon->capability & WLAN_CAPABILITY_PRIVACY)
1271 hdr->capability |= cpu_to_le16(WLAN_CAPABILITY_PRIVACY);
1273 if (beacon->capability & WLAN_CAPABILITY_SHORT_PREAMBLE)
1274 hdr->capability |= cpu_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE);
1276 if (ieee->short_slot &&
1277 (beacon->capability&WLAN_CAPABILITY_SHORT_SLOT_TIME))
1278 hdr->capability |= cpu_to_le16(WLAN_CAPABILITY_SHORT_SLOT_TIME);
1281 hdr->listen_interval = beacon->listen_interval;
1283 hdr->info_element[0].id = MFIE_TYPE_SSID;
1285 hdr->info_element[0].len = beacon->ssid_len;
1286 tag = skb_put(skb, beacon->ssid_len);
1287 memcpy(tag, beacon->ssid, beacon->ssid_len);
1289 tag = skb_put(skb, rate_len);
1291 if (beacon->rates_len) {
1292 *tag++ = MFIE_TYPE_RATES;
1293 *tag++ = beacon->rates_len;
1294 for (i = 0; i < beacon->rates_len; i++)
1295 *tag++ = beacon->rates[i];
1298 if (beacon->rates_ex_len) {
1299 *tag++ = MFIE_TYPE_RATES_EX;
1300 *tag++ = beacon->rates_ex_len;
1301 for (i = 0; i < beacon->rates_ex_len; i++)
1302 *tag++ = beacon->rates_ex[i];
1305 if (beacon->bCkipSupported) {
1306 static u8 AironetIeOui[] = {0x00, 0x01, 0x66};
1307 u8 CcxAironetBuf[30];
1308 struct octet_string osCcxAironetIE;
1310 memset(CcxAironetBuf, 0, 30);
1311 osCcxAironetIE.Octet = CcxAironetBuf;
1312 osCcxAironetIE.Length = sizeof(CcxAironetBuf);
1313 memcpy(osCcxAironetIE.Octet, AironetIeOui,
1314 sizeof(AironetIeOui));
1316 osCcxAironetIE.Octet[IE_CISCO_FLAG_POSITION] |=
1317 (SUPPORT_CKIP_PK|SUPPORT_CKIP_MIC);
1318 tag = skb_put(skb, ckip_ie_len);
1319 *tag++ = MFIE_TYPE_AIRONET;
1320 *tag++ = osCcxAironetIE.Length;
1321 memcpy(tag, osCcxAironetIE.Octet, osCcxAironetIE.Length);
1322 tag += osCcxAironetIE.Length;
1325 if (beacon->bCcxRmEnable) {
1326 static u8 CcxRmCapBuf[] = {0x00, 0x40, 0x96, 0x01, 0x01, 0x00};
1327 struct octet_string osCcxRmCap;
1329 osCcxRmCap.Octet = CcxRmCapBuf;
1330 osCcxRmCap.Length = sizeof(CcxRmCapBuf);
1331 tag = skb_put(skb, ccxrm_ie_len);
1332 *tag++ = MFIE_TYPE_GENERIC;
1333 *tag++ = osCcxRmCap.Length;
1334 memcpy(tag, osCcxRmCap.Octet, osCcxRmCap.Length);
1335 tag += osCcxRmCap.Length;
1338 if (beacon->BssCcxVerNumber >= 2) {
1339 u8 CcxVerNumBuf[] = {0x00, 0x40, 0x96, 0x03, 0x00};
1340 struct octet_string osCcxVerNum;
1341 CcxVerNumBuf[4] = beacon->BssCcxVerNumber;
1342 osCcxVerNum.Octet = CcxVerNumBuf;
1343 osCcxVerNum.Length = sizeof(CcxVerNumBuf);
1344 tag = skb_put(skb, cxvernum_ie_len);
1345 *tag++ = MFIE_TYPE_GENERIC;
1346 *tag++ = osCcxVerNum.Length;
1347 memcpy(tag, osCcxVerNum.Octet, osCcxVerNum.Length);
1348 tag += osCcxVerNum.Length;
1350 if (ieee->pHTInfo->bCurrentHTSupport && ieee->pHTInfo->bEnableHT) {
1351 if (ieee->pHTInfo->ePeerHTSpecVer != HT_SPEC_VER_EWC) {
1352 tag = skb_put(skb, ht_cap_len);
1353 *tag++ = MFIE_TYPE_HT_CAP;
1354 *tag++ = ht_cap_len - 2;
1355 memcpy(tag, ht_cap_buf, ht_cap_len - 2);
1356 tag += ht_cap_len - 2;
1360 if (wpa_ie_len) {
1361 tag = skb_put(skb, ieee->wpa_ie_len);
1362 memcpy(tag, ieee->wpa_ie, ieee->wpa_ie_len);
1364 if (PMKCacheIdx >= 0) {
1365 tag = skb_put(skb, 18);
1366 *tag = 1;
1367 *(tag + 1) = 0;
1368 memcpy((tag + 2), &ieee->PMKIDList[PMKCacheIdx].PMKID,
1369 16);
1372 if (wmm_info_len) {
1373 tag = skb_put(skb, wmm_info_len);
1374 rtllib_WMM_Info(ieee, &tag);
1377 if (wps_ie_len && ieee->wps_ie) {
1378 tag = skb_put(skb, wps_ie_len);
1379 memcpy(tag, ieee->wps_ie, wps_ie_len);
1382 tag = skb_put(skb, turbo_info_len);
1383 if (turbo_info_len)
1384 rtllib_TURBO_Info(ieee, &tag);
1386 if (ieee->pHTInfo->bCurrentHTSupport && ieee->pHTInfo->bEnableHT) {
1387 if (ieee->pHTInfo->ePeerHTSpecVer == HT_SPEC_VER_EWC) {
1388 tag = skb_put(skb, ht_cap_len);
1389 *tag++ = MFIE_TYPE_GENERIC;
1390 *tag++ = ht_cap_len - 2;
1391 memcpy(tag, ht_cap_buf, ht_cap_len - 2);
1392 tag += ht_cap_len - 2;
1395 if (ieee->pHTInfo->bCurrentRT2RTAggregation) {
1396 tag = skb_put(skb, realtek_ie_len);
1397 *tag++ = MFIE_TYPE_GENERIC;
1398 *tag++ = realtek_ie_len - 2;
1399 memcpy(tag, realtek_ie_buf, realtek_ie_len - 2);
1403 kfree(ieee->assocreq_ies);
1404 ieee->assocreq_ies = NULL;
1405 ies = &(hdr->info_element[0].id);
1406 ieee->assocreq_ies_len = (skb->data + skb->len) - ies;
1407 ieee->assocreq_ies = kmalloc(ieee->assocreq_ies_len, GFP_ATOMIC);
1408 if (ieee->assocreq_ies)
1409 memcpy(ieee->assocreq_ies, ies, ieee->assocreq_ies_len);
1410 else {
1411 printk(KERN_INFO "%s()Warning: can't alloc memory for assocreq"
1412 "_ies\n", __func__);
1413 ieee->assocreq_ies_len = 0;
1415 return skb;
1418 void rtllib_associate_abort(struct rtllib_device *ieee)
1421 unsigned long flags;
1422 spin_lock_irqsave(&ieee->lock, flags);
1424 ieee->associate_seq++;
1426 /* don't scan, and avoid to have the RX path possibily
1427 * try again to associate. Even do not react to AUTH or
1428 * ASSOC response. Just wait for the retry wq to be scheduled.
1429 * Here we will check if there are good nets to associate
1430 * with, so we retry or just get back to NO_LINK and scanning
1432 if (ieee->state == RTLLIB_ASSOCIATING_AUTHENTICATING) {
1433 RTLLIB_DEBUG_MGMT("Authentication failed\n");
1434 ieee->softmac_stats.no_auth_rs++;
1435 } else {
1436 RTLLIB_DEBUG_MGMT("Association failed\n");
1437 ieee->softmac_stats.no_ass_rs++;
1440 ieee->state = RTLLIB_ASSOCIATING_RETRY;
1442 queue_delayed_work_rsl(ieee->wq, &ieee->associate_retry_wq,
1443 RTLLIB_SOFTMAC_ASSOC_RETRY_TIME);
1445 spin_unlock_irqrestore(&ieee->lock, flags);
1448 static void rtllib_associate_abort_cb(unsigned long dev)
1450 rtllib_associate_abort((struct rtllib_device *) dev);
1453 static void rtllib_associate_step1(struct rtllib_device *ieee, u8 * daddr)
1455 struct rtllib_network *beacon = &ieee->current_network;
1456 struct sk_buff *skb;
1458 RTLLIB_DEBUG_MGMT("Stopping scan\n");
1460 ieee->softmac_stats.tx_auth_rq++;
1462 skb = rtllib_authentication_req(beacon, ieee, 0, daddr);
1464 if (!skb)
1465 rtllib_associate_abort(ieee);
1466 else {
1467 ieee->state = RTLLIB_ASSOCIATING_AUTHENTICATING ;
1468 RTLLIB_DEBUG_MGMT("Sending authentication request\n");
1469 softmac_mgmt_xmit(skb, ieee);
1470 if (!timer_pending(&ieee->associate_timer)) {
1471 ieee->associate_timer.expires = jiffies + (HZ / 2);
1472 add_timer(&ieee->associate_timer);
1477 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, int chlen)
1479 u8 *c;
1480 struct sk_buff *skb;
1481 struct rtllib_network *beacon = &ieee->current_network;
1483 ieee->associate_seq++;
1484 ieee->softmac_stats.tx_auth_rq++;
1486 skb = rtllib_authentication_req(beacon, ieee, chlen + 2, beacon->bssid);
1488 if (!skb)
1489 rtllib_associate_abort(ieee);
1490 else {
1491 c = skb_put(skb, chlen+2);
1492 *(c++) = MFIE_TYPE_CHALLENGE;
1493 *(c++) = chlen;
1494 memcpy(c, challenge, chlen);
1496 RTLLIB_DEBUG_MGMT("Sending authentication challenge "
1497 "response\n");
1499 rtllib_encrypt_fragment(ieee, skb,
1500 sizeof(struct rtllib_hdr_3addr));
1502 softmac_mgmt_xmit(skb, ieee);
1503 mod_timer(&ieee->associate_timer, jiffies + (HZ/2));
1505 kfree(challenge);
1508 static void rtllib_associate_step2(struct rtllib_device *ieee)
1510 struct sk_buff *skb;
1511 struct rtllib_network *beacon = &ieee->current_network;
1513 del_timer_sync(&ieee->associate_timer);
1515 RTLLIB_DEBUG_MGMT("Sending association request\n");
1517 ieee->softmac_stats.tx_ass_rq++;
1518 skb = rtllib_association_req(beacon, ieee);
1519 if (!skb)
1520 rtllib_associate_abort(ieee);
1521 else {
1522 softmac_mgmt_xmit(skb, ieee);
1523 mod_timer(&ieee->associate_timer, jiffies + (HZ/2));
1527 #define CANCELLED 2
1528 static void rtllib_associate_complete_wq(void *data)
1530 struct rtllib_device *ieee = (struct rtllib_device *)
1531 container_of_work_rsl(data,
1532 struct rtllib_device,
1533 associate_complete_wq);
1534 struct rt_pwr_save_ctrl *pPSC = (struct rt_pwr_save_ctrl *)
1535 (&(ieee->PowerSaveControl));
1536 printk(KERN_INFO "Associated successfully\n");
1537 if (ieee->is_silent_reset == 0) {
1538 printk(KERN_INFO "normal associate\n");
1539 notify_wx_assoc_event(ieee);
1542 netif_carrier_on(ieee->dev);
1543 ieee->is_roaming = false;
1544 if (rtllib_is_54g(&ieee->current_network) &&
1545 (ieee->modulation & RTLLIB_OFDM_MODULATION)) {
1546 ieee->rate = 108;
1547 printk(KERN_INFO"Using G rates:%d\n", ieee->rate);
1548 } else {
1549 ieee->rate = 22;
1550 ieee->SetWirelessMode(ieee->dev, IEEE_B);
1551 printk(KERN_INFO"Using B rates:%d\n", ieee->rate);
1553 if (ieee->pHTInfo->bCurrentHTSupport && ieee->pHTInfo->bEnableHT) {
1554 printk(KERN_INFO "Successfully associated, ht enabled\n");
1555 HTOnAssocRsp(ieee);
1556 } else {
1557 printk(KERN_INFO "Successfully associated, ht not "
1558 "enabled(%d, %d)\n",
1559 ieee->pHTInfo->bCurrentHTSupport,
1560 ieee->pHTInfo->bEnableHT);
1561 memset(ieee->dot11HTOperationalRateSet, 0, 16);
1563 ieee->LinkDetectInfo.SlotNum = 2 * (1 +
1564 ieee->current_network.beacon_interval /
1565 500);
1566 if (ieee->LinkDetectInfo.NumRecvBcnInPeriod == 0 ||
1567 ieee->LinkDetectInfo.NumRecvDataInPeriod == 0) {
1568 ieee->LinkDetectInfo.NumRecvBcnInPeriod = 1;
1569 ieee->LinkDetectInfo.NumRecvDataInPeriod = 1;
1571 pPSC->LpsIdleCount = 0;
1572 ieee->link_change(ieee->dev);
1574 if (ieee->is_silent_reset == 1) {
1575 printk(KERN_INFO "silent reset associate\n");
1576 ieee->is_silent_reset = 0;
1579 if (ieee->data_hard_resume)
1580 ieee->data_hard_resume(ieee->dev);
1584 static void rtllib_sta_send_associnfo(struct rtllib_device *ieee)
1588 static void rtllib_associate_complete(struct rtllib_device *ieee)
1590 del_timer_sync(&ieee->associate_timer);
1592 ieee->state = RTLLIB_LINKED;
1593 rtllib_sta_send_associnfo(ieee);
1595 queue_work_rsl(ieee->wq, &ieee->associate_complete_wq);
1598 static void rtllib_associate_procedure_wq(void *data)
1600 struct rtllib_device *ieee = container_of_dwork_rsl(data,
1601 struct rtllib_device,
1602 associate_procedure_wq);
1603 rtllib_stop_scan_syncro(ieee);
1604 if (ieee->rtllib_ips_leave != NULL)
1605 ieee->rtllib_ips_leave(ieee->dev);
1606 down(&ieee->wx_sem);
1608 if (ieee->data_hard_stop)
1609 ieee->data_hard_stop(ieee->dev);
1611 rtllib_stop_scan(ieee);
1612 RT_TRACE(COMP_DBG, "===>%s(), chan:%d\n", __func__,
1613 ieee->current_network.channel);
1614 HTSetConnectBwMode(ieee, HT_CHANNEL_WIDTH_20, HT_EXTCHNL_OFFSET_NO_EXT);
1615 if (ieee->eRFPowerState == eRfOff) {
1616 RT_TRACE(COMP_DBG, "=============>%s():Rf state is eRfOff,"
1617 " schedule ipsleave wq again,return\n", __func__);
1618 if (ieee->rtllib_ips_leave_wq != NULL)
1619 ieee->rtllib_ips_leave_wq(ieee->dev);
1620 up(&ieee->wx_sem);
1621 return;
1623 ieee->associate_seq = 1;
1625 rtllib_associate_step1(ieee, ieee->current_network.bssid);
1627 up(&ieee->wx_sem);
1630 inline void rtllib_softmac_new_net(struct rtllib_device *ieee,
1631 struct rtllib_network *net)
1633 u8 tmp_ssid[IW_ESSID_MAX_SIZE + 1];
1634 int tmp_ssid_len = 0;
1636 short apset, ssidset, ssidbroad, apmatch, ssidmatch;
1638 /* we are interested in new new only if we are not associated
1639 * and we are not associating / authenticating
1641 if (ieee->state != RTLLIB_NOLINK)
1642 return;
1644 if ((ieee->iw_mode == IW_MODE_INFRA) && !(net->capability &
1645 WLAN_CAPABILITY_ESS))
1646 return;
1648 if ((ieee->iw_mode == IW_MODE_ADHOC) && !(net->capability &
1649 WLAN_CAPABILITY_IBSS))
1650 return;
1652 if ((ieee->iw_mode == IW_MODE_ADHOC) &&
1653 (net->channel > ieee->ibss_maxjoin_chal))
1654 return;
1655 if (ieee->iw_mode == IW_MODE_INFRA || ieee->iw_mode == IW_MODE_ADHOC) {
1656 /* if the user specified the AP MAC, we need also the essid
1657 * This could be obtained by beacons or, if the network does not
1658 * broadcast it, it can be put manually.
1660 apset = ieee->wap_set;
1661 ssidset = ieee->ssid_set;
1662 ssidbroad = !(net->ssid_len == 0 || net->ssid[0] == '\0');
1663 apmatch = (memcmp(ieee->current_network.bssid, net->bssid,
1664 ETH_ALEN) == 0);
1665 if (!ssidbroad) {
1666 ssidmatch = (ieee->current_network.ssid_len ==
1667 net->hidden_ssid_len) &&
1668 (!strncmp(ieee->current_network.ssid,
1669 net->hidden_ssid, net->hidden_ssid_len));
1670 if (net->hidden_ssid_len > 0) {
1671 strncpy(net->ssid, net->hidden_ssid,
1672 net->hidden_ssid_len);
1673 net->ssid_len = net->hidden_ssid_len;
1674 ssidbroad = 1;
1676 } else
1677 ssidmatch =
1678 (ieee->current_network.ssid_len == net->ssid_len) &&
1679 (!strncmp(ieee->current_network.ssid, net->ssid,
1680 net->ssid_len));
1682 /* if the user set the AP check if match.
1683 * if the network does not broadcast essid we check the
1684 * user supplyed ANY essid
1685 * if the network does broadcast and the user does not set
1686 * essid it is OK
1687 * if the network does broadcast and the user did set essid
1688 * check if essid match
1689 * if the ap is not set, check that the user set the bssid
1690 * and the network does bradcast and that those two bssid match
1692 if ((apset && apmatch &&
1693 ((ssidset && ssidbroad && ssidmatch) ||
1694 (ssidbroad && !ssidset) || (!ssidbroad && ssidset))) ||
1695 (!apset && ssidset && ssidbroad && ssidmatch) ||
1696 (ieee->is_roaming && ssidset && ssidbroad && ssidmatch)) {
1697 /* if the essid is hidden replace it with the
1698 * essid provided by the user.
1700 if (!ssidbroad) {
1701 strncpy(tmp_ssid, ieee->current_network.ssid,
1702 IW_ESSID_MAX_SIZE);
1703 tmp_ssid_len = ieee->current_network.ssid_len;
1705 memcpy(&ieee->current_network, net,
1706 sizeof(struct rtllib_network));
1707 if (!ssidbroad) {
1708 strncpy(ieee->current_network.ssid, tmp_ssid,
1709 IW_ESSID_MAX_SIZE);
1710 ieee->current_network.ssid_len = tmp_ssid_len;
1712 printk(KERN_INFO"Linking with %s,channel:%d, qos:%d, "
1713 "myHT:%d, networkHT:%d, mode:%x cur_net.flags"
1714 ":0x%x\n", ieee->current_network.ssid,
1715 ieee->current_network.channel,
1716 ieee->current_network.qos_data.supported,
1717 ieee->pHTInfo->bEnableHT,
1718 ieee->current_network.bssht.bdSupportHT,
1719 ieee->current_network.mode,
1720 ieee->current_network.flags);
1722 if ((rtllib_act_scanning(ieee, false)) &&
1723 !(ieee->softmac_features & IEEE_SOFTMAC_SCAN))
1724 rtllib_stop_scan_syncro(ieee);
1726 ieee->hwscan_ch_bk = ieee->current_network.channel;
1727 HTResetIOTSetting(ieee->pHTInfo);
1728 ieee->wmm_acm = 0;
1729 if (ieee->iw_mode == IW_MODE_INFRA) {
1730 /* Join the network for the first time */
1731 ieee->AsocRetryCount = 0;
1732 if ((ieee->current_network.qos_data.supported == 1) &&
1733 ieee->current_network.bssht.bdSupportHT)
1734 HTResetSelfAndSavePeerSetting(ieee,
1735 &(ieee->current_network));
1736 else
1737 ieee->pHTInfo->bCurrentHTSupport =
1738 false;
1740 ieee->state = RTLLIB_ASSOCIATING;
1741 if (ieee->LedControlHandler != NULL)
1742 ieee->LedControlHandler(ieee->dev,
1743 LED_CTL_START_TO_LINK);
1744 queue_delayed_work_rsl(ieee->wq,
1745 &ieee->associate_procedure_wq, 0);
1746 } else {
1747 if (rtllib_is_54g(&ieee->current_network) &&
1748 (ieee->modulation & RTLLIB_OFDM_MODULATION)) {
1749 ieee->rate = 108;
1750 ieee->SetWirelessMode(ieee->dev, IEEE_G);
1751 printk(KERN_INFO"Using G rates\n");
1752 } else {
1753 ieee->rate = 22;
1754 ieee->SetWirelessMode(ieee->dev, IEEE_B);
1755 printk(KERN_INFO"Using B rates\n");
1757 memset(ieee->dot11HTOperationalRateSet, 0, 16);
1758 ieee->state = RTLLIB_LINKED;
1764 void rtllib_softmac_check_all_nets(struct rtllib_device *ieee)
1766 unsigned long flags;
1767 struct rtllib_network *target;
1769 spin_lock_irqsave(&ieee->lock, flags);
1771 list_for_each_entry(target, &ieee->network_list, list) {
1773 /* if the state become different that NOLINK means
1774 * we had found what we are searching for
1777 if (ieee->state != RTLLIB_NOLINK)
1778 break;
1780 if (ieee->scan_age == 0 || time_after(target->last_scanned +
1781 ieee->scan_age, jiffies))
1782 rtllib_softmac_new_net(ieee, target);
1784 spin_unlock_irqrestore(&ieee->lock, flags);
1787 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen)
1789 struct rtllib_authentication *a;
1790 u8 *t;
1791 if (skb->len < (sizeof(struct rtllib_authentication) -
1792 sizeof(struct rtllib_info_element))) {
1793 RTLLIB_DEBUG_MGMT("invalid len in auth resp: %d\n", skb->len);
1794 return 0xcafe;
1796 *challenge = NULL;
1797 a = (struct rtllib_authentication *) skb->data;
1798 if (skb->len > (sizeof(struct rtllib_authentication) + 3)) {
1799 t = skb->data + sizeof(struct rtllib_authentication);
1801 if (*(t++) == MFIE_TYPE_CHALLENGE) {
1802 *chlen = *(t++);
1803 *challenge = kmalloc(*chlen, GFP_ATOMIC);
1804 memcpy(*challenge, t, *chlen); /*TODO - check here*/
1807 return cpu_to_le16(a->status);
1810 static int auth_rq_parse(struct sk_buff *skb, u8 *dest)
1812 struct rtllib_authentication *a;
1814 if (skb->len < (sizeof(struct rtllib_authentication) -
1815 sizeof(struct rtllib_info_element))) {
1816 RTLLIB_DEBUG_MGMT("invalid len in auth request: %d\n",
1817 skb->len);
1818 return -1;
1820 a = (struct rtllib_authentication *) skb->data;
1822 memcpy(dest, a->header.addr2, ETH_ALEN);
1824 if (le16_to_cpu(a->algorithm) != WLAN_AUTH_OPEN)
1825 return WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG;
1827 return WLAN_STATUS_SUCCESS;
1830 static short probe_rq_parse(struct rtllib_device *ieee, struct sk_buff *skb,
1831 u8 *src)
1833 u8 *tag;
1834 u8 *skbend;
1835 u8 *ssid = NULL;
1836 u8 ssidlen = 0;
1837 struct rtllib_hdr_3addr *header =
1838 (struct rtllib_hdr_3addr *) skb->data;
1839 bool bssid_match;
1841 if (skb->len < sizeof(struct rtllib_hdr_3addr))
1842 return -1; /* corrupted */
1844 bssid_match =
1845 (memcmp(header->addr3, ieee->current_network.bssid, ETH_ALEN) != 0) &&
1846 (memcmp(header->addr3, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) != 0);
1847 if (bssid_match)
1848 return -1;
1850 memcpy(src, header->addr2, ETH_ALEN);
1852 skbend = (u8 *)skb->data + skb->len;
1854 tag = skb->data + sizeof(struct rtllib_hdr_3addr);
1856 while (tag + 1 < skbend) {
1857 if (*tag == 0) {
1858 ssid = tag + 2;
1859 ssidlen = *(tag + 1);
1860 break;
1862 tag++; /* point to the len field */
1863 tag = tag + *(tag); /* point to the last data byte of the tag */
1864 tag++; /* point to the next tag */
1867 if (ssidlen == 0)
1868 return 1;
1870 if (!ssid)
1871 return 1; /* ssid not found in tagged param */
1873 return !strncmp(ssid, ieee->current_network.ssid, ssidlen);
1876 static int assoc_rq_parse(struct sk_buff *skb, u8 *dest)
1878 struct rtllib_assoc_request_frame *a;
1880 if (skb->len < (sizeof(struct rtllib_assoc_request_frame) -
1881 sizeof(struct rtllib_info_element))) {
1883 RTLLIB_DEBUG_MGMT("invalid len in auth request:%d\n", skb->len);
1884 return -1;
1887 a = (struct rtllib_assoc_request_frame *) skb->data;
1889 memcpy(dest, a->header.addr2, ETH_ALEN);
1891 return 0;
1894 static inline u16 assoc_parse(struct rtllib_device *ieee, struct sk_buff *skb,
1895 int *aid)
1897 struct rtllib_assoc_response_frame *response_head;
1898 u16 status_code;
1900 if (skb->len < sizeof(struct rtllib_assoc_response_frame)) {
1901 RTLLIB_DEBUG_MGMT("invalid len in auth resp: %d\n", skb->len);
1902 return 0xcafe;
1905 response_head = (struct rtllib_assoc_response_frame *) skb->data;
1906 *aid = le16_to_cpu(response_head->aid) & 0x3fff;
1908 status_code = le16_to_cpu(response_head->status);
1909 if ((status_code == WLAN_STATUS_ASSOC_DENIED_RATES ||
1910 status_code == WLAN_STATUS_CAPS_UNSUPPORTED) &&
1911 ((ieee->mode == IEEE_G) &&
1912 (ieee->current_network.mode == IEEE_N_24G) &&
1913 (ieee->AsocRetryCount++ < (RT_ASOC_RETRY_LIMIT-1)))) {
1914 ieee->pHTInfo->IOTAction |= HT_IOT_ACT_PURE_N_MODE;
1915 } else {
1916 ieee->AsocRetryCount = 0;
1919 return le16_to_cpu(response_head->status);
1922 void rtllib_rx_probe_rq(struct rtllib_device *ieee, struct sk_buff *skb)
1924 u8 dest[ETH_ALEN];
1925 ieee->softmac_stats.rx_probe_rq++;
1926 if (probe_rq_parse(ieee, skb, dest) > 0) {
1927 ieee->softmac_stats.tx_probe_rs++;
1928 rtllib_resp_to_probe(ieee, dest);
1932 static inline void rtllib_rx_auth_rq(struct rtllib_device *ieee,
1933 struct sk_buff *skb)
1935 u8 dest[ETH_ALEN];
1936 int status;
1937 ieee->softmac_stats.rx_auth_rq++;
1939 status = auth_rq_parse(skb, dest);
1940 if (status != -1)
1941 rtllib_resp_to_auth(ieee, status, dest);
1944 static inline void rtllib_rx_assoc_rq(struct rtllib_device *ieee,
1945 struct sk_buff *skb)
1948 u8 dest[ETH_ALEN];
1950 ieee->softmac_stats.rx_ass_rq++;
1951 if (assoc_rq_parse(skb, dest) != -1)
1952 rtllib_resp_to_assoc_rq(ieee, dest);
1954 printk(KERN_INFO"New client associated: %pM\n", dest);
1957 void rtllib_sta_ps_send_null_frame(struct rtllib_device *ieee, short pwr)
1960 struct sk_buff *buf = rtllib_null_func(ieee, pwr);
1962 if (buf)
1963 softmac_ps_mgmt_xmit(buf, ieee);
1965 EXPORT_SYMBOL(rtllib_sta_ps_send_null_frame);
1967 void rtllib_sta_ps_send_pspoll_frame(struct rtllib_device *ieee)
1969 struct sk_buff *buf = rtllib_pspoll_func(ieee);
1971 if (buf)
1972 softmac_ps_mgmt_xmit(buf, ieee);
1975 static short rtllib_sta_ps_sleep(struct rtllib_device *ieee, u64 *time)
1977 int timeout = ieee->ps_timeout;
1978 u8 dtim;
1979 struct rt_pwr_save_ctrl *pPSC = (struct rt_pwr_save_ctrl *)
1980 (&(ieee->PowerSaveControl));
1982 if (ieee->LPSDelayCnt) {
1983 ieee->LPSDelayCnt--;
1984 return 0;
1987 dtim = ieee->current_network.dtim_data;
1988 if (!(dtim & RTLLIB_DTIM_VALID))
1989 return 0;
1990 timeout = ieee->current_network.beacon_interval;
1991 ieee->current_network.dtim_data = RTLLIB_DTIM_INVALID;
1992 /* there's no need to nofity AP that I find you buffered
1993 * with broadcast packet */
1994 if (dtim & (RTLLIB_DTIM_UCAST & ieee->ps))
1995 return 2;
1997 if (!time_after(jiffies, ieee->dev->trans_start + MSECS(timeout)))
1998 return 0;
1999 if (!time_after(jiffies, ieee->last_rx_ps_time + MSECS(timeout)))
2000 return 0;
2001 if ((ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE) &&
2002 (ieee->mgmt_queue_tail != ieee->mgmt_queue_head))
2003 return 0;
2005 if (time) {
2006 if (ieee->bAwakePktSent == true) {
2007 pPSC->LPSAwakeIntvl = 1;
2008 } else {
2009 u8 MaxPeriod = 1;
2011 if (pPSC->LPSAwakeIntvl == 0)
2012 pPSC->LPSAwakeIntvl = 1;
2013 if (pPSC->RegMaxLPSAwakeIntvl == 0)
2014 MaxPeriod = 1;
2015 else if (pPSC->RegMaxLPSAwakeIntvl == 0xFF)
2016 MaxPeriod = ieee->current_network.dtim_period;
2017 else
2018 MaxPeriod = pPSC->RegMaxLPSAwakeIntvl;
2019 pPSC->LPSAwakeIntvl = (pPSC->LPSAwakeIntvl >=
2020 MaxPeriod) ? MaxPeriod :
2021 (pPSC->LPSAwakeIntvl + 1);
2024 u8 LPSAwakeIntvl_tmp = 0;
2025 u8 period = ieee->current_network.dtim_period;
2026 u8 count = ieee->current_network.tim.tim_count;
2027 if (count == 0) {
2028 if (pPSC->LPSAwakeIntvl > period)
2029 LPSAwakeIntvl_tmp = period +
2030 (pPSC->LPSAwakeIntvl -
2031 period) -
2032 ((pPSC->LPSAwakeIntvl-period) %
2033 period);
2034 else
2035 LPSAwakeIntvl_tmp = pPSC->LPSAwakeIntvl;
2037 } else {
2038 if (pPSC->LPSAwakeIntvl >
2039 ieee->current_network.tim.tim_count)
2040 LPSAwakeIntvl_tmp = count +
2041 (pPSC->LPSAwakeIntvl - count) -
2042 ((pPSC->LPSAwakeIntvl-count)%period);
2043 else
2044 LPSAwakeIntvl_tmp = pPSC->LPSAwakeIntvl;
2047 *time = ieee->current_network.last_dtim_sta_time
2048 + MSECS(ieee->current_network.beacon_interval *
2049 LPSAwakeIntvl_tmp);
2053 return 1;
2058 static inline void rtllib_sta_ps(struct rtllib_device *ieee)
2060 u64 time;
2061 short sleep;
2062 unsigned long flags, flags2;
2064 spin_lock_irqsave(&ieee->lock, flags);
2066 if ((ieee->ps == RTLLIB_PS_DISABLED ||
2067 ieee->iw_mode != IW_MODE_INFRA ||
2068 ieee->state != RTLLIB_LINKED)) {
2069 RT_TRACE(COMP_DBG, "=====>%s(): no need to ps,wake up!! "
2070 "ieee->ps is %d, ieee->iw_mode is %d, ieee->state"
2071 " is %d\n", __func__, ieee->ps, ieee->iw_mode,
2072 ieee->state);
2073 spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
2074 rtllib_sta_wakeup(ieee, 1);
2076 spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
2078 sleep = rtllib_sta_ps_sleep(ieee, &time);
2079 /* 2 wake, 1 sleep, 0 do nothing */
2080 if (sleep == 0)
2081 goto out;
2082 if (sleep == 1) {
2083 if (ieee->sta_sleep == LPS_IS_SLEEP) {
2084 ieee->enter_sleep_state(ieee->dev, time);
2085 } else if (ieee->sta_sleep == LPS_IS_WAKE) {
2086 spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
2088 if (ieee->ps_is_queue_empty(ieee->dev)) {
2089 ieee->sta_sleep = LPS_WAIT_NULL_DATA_SEND;
2090 ieee->ack_tx_to_ieee = 1;
2091 rtllib_sta_ps_send_null_frame(ieee, 1);
2092 ieee->ps_time = time;
2094 spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
2098 ieee->bAwakePktSent = false;
2100 } else if (sleep == 2) {
2101 spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
2103 rtllib_sta_wakeup(ieee, 1);
2105 spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
2108 out:
2109 spin_unlock_irqrestore(&ieee->lock, flags);
2113 void rtllib_sta_wakeup(struct rtllib_device *ieee, short nl)
2115 if (ieee->sta_sleep == LPS_IS_WAKE) {
2116 if (nl) {
2117 if (ieee->pHTInfo->IOTAction &
2118 HT_IOT_ACT_NULL_DATA_POWER_SAVING) {
2119 ieee->ack_tx_to_ieee = 1;
2120 rtllib_sta_ps_send_null_frame(ieee, 0);
2121 } else {
2122 ieee->ack_tx_to_ieee = 1;
2123 rtllib_sta_ps_send_pspoll_frame(ieee);
2126 return;
2130 if (ieee->sta_sleep == LPS_IS_SLEEP)
2131 ieee->sta_wake_up(ieee->dev);
2132 if (nl) {
2133 if (ieee->pHTInfo->IOTAction &
2134 HT_IOT_ACT_NULL_DATA_POWER_SAVING) {
2135 ieee->ack_tx_to_ieee = 1;
2136 rtllib_sta_ps_send_null_frame(ieee, 0);
2137 } else {
2138 ieee->ack_tx_to_ieee = 1;
2139 ieee->polling = true;
2140 rtllib_sta_ps_send_pspoll_frame(ieee);
2143 } else {
2144 ieee->sta_sleep = LPS_IS_WAKE;
2145 ieee->polling = false;
2149 void rtllib_ps_tx_ack(struct rtllib_device *ieee, short success)
2151 unsigned long flags, flags2;
2153 spin_lock_irqsave(&ieee->lock, flags);
2155 if (ieee->sta_sleep == LPS_WAIT_NULL_DATA_SEND) {
2156 /* Null frame with PS bit set */
2157 if (success) {
2158 ieee->sta_sleep = LPS_IS_SLEEP;
2159 ieee->enter_sleep_state(ieee->dev, ieee->ps_time);
2161 /* if the card report not success we can't be sure the AP
2162 * has not RXed so we can't assume the AP believe us awake
2164 } else {/* 21112005 - tx again null without PS bit if lost */
2166 if ((ieee->sta_sleep == LPS_IS_WAKE) && !success) {
2167 spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
2168 if (ieee->pHTInfo->IOTAction &
2169 HT_IOT_ACT_NULL_DATA_POWER_SAVING)
2170 rtllib_sta_ps_send_null_frame(ieee, 0);
2171 else
2172 rtllib_sta_ps_send_pspoll_frame(ieee);
2173 spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
2176 spin_unlock_irqrestore(&ieee->lock, flags);
2178 EXPORT_SYMBOL(rtllib_ps_tx_ack);
2180 static void rtllib_process_action(struct rtllib_device *ieee, struct sk_buff *skb)
2182 struct rtllib_hdr_3addr *header = (struct rtllib_hdr_3addr *) skb->data;
2183 u8 *act = rtllib_get_payload((struct rtllib_hdr *)header);
2184 u8 category = 0;
2186 if (act == NULL) {
2187 RTLLIB_DEBUG(RTLLIB_DL_ERR, "error to get payload of "
2188 "action frame\n");
2189 return;
2192 category = *act;
2193 act++;
2194 switch (category) {
2195 case ACT_CAT_BA:
2196 switch (*act) {
2197 case ACT_ADDBAREQ:
2198 rtllib_rx_ADDBAReq(ieee, skb);
2199 break;
2200 case ACT_ADDBARSP:
2201 rtllib_rx_ADDBARsp(ieee, skb);
2202 break;
2203 case ACT_DELBA:
2204 rtllib_rx_DELBA(ieee, skb);
2205 break;
2207 break;
2208 default:
2209 break;
2211 return;
2214 inline int rtllib_rx_assoc_resp(struct rtllib_device *ieee, struct sk_buff *skb,
2215 struct rtllib_rx_stats *rx_stats)
2217 u16 errcode;
2218 int aid;
2219 u8 *ies;
2220 struct rtllib_assoc_response_frame *assoc_resp;
2221 struct rtllib_hdr_3addr *header = (struct rtllib_hdr_3addr *) skb->data;
2223 RTLLIB_DEBUG_MGMT("received [RE]ASSOCIATION RESPONSE (%d)\n",
2224 WLAN_FC_GET_STYPE(header->frame_ctl));
2226 if ((ieee->softmac_features & IEEE_SOFTMAC_ASSOCIATE) &&
2227 ieee->state == RTLLIB_ASSOCIATING_AUTHENTICATED &&
2228 (ieee->iw_mode == IW_MODE_INFRA)) {
2229 errcode = assoc_parse(ieee, skb, &aid);
2230 if (0 == errcode) {
2231 struct rtllib_network *network =
2232 kzalloc(sizeof(struct rtllib_network),
2233 GFP_ATOMIC);
2235 if (!network)
2236 return 1;
2237 memset(network, 0, sizeof(*network));
2238 ieee->state = RTLLIB_LINKED;
2239 ieee->assoc_id = aid;
2240 ieee->softmac_stats.rx_ass_ok++;
2241 /* station support qos */
2242 /* Let the register setting default with Legacy station */
2243 assoc_resp = (struct rtllib_assoc_response_frame *)skb->data;
2244 if (ieee->current_network.qos_data.supported == 1) {
2245 if (rtllib_parse_info_param(ieee, assoc_resp->info_element,
2246 rx_stats->len - sizeof(*assoc_resp),
2247 network, rx_stats)) {
2248 kfree(network);
2249 return 1;
2250 } else {
2251 memcpy(ieee->pHTInfo->PeerHTCapBuf,
2252 network->bssht.bdHTCapBuf,
2253 network->bssht.bdHTCapLen);
2254 memcpy(ieee->pHTInfo->PeerHTInfoBuf,
2255 network->bssht.bdHTInfoBuf,
2256 network->bssht.bdHTInfoLen);
2258 if (ieee->handle_assoc_response != NULL)
2259 ieee->handle_assoc_response(ieee->dev,
2260 (struct rtllib_assoc_response_frame *)header,
2261 network);
2262 kfree(network);
2265 kfree(ieee->assocresp_ies);
2266 ieee->assocresp_ies = NULL;
2267 ies = &(assoc_resp->info_element[0].id);
2268 ieee->assocresp_ies_len = (skb->data + skb->len) - ies;
2269 ieee->assocresp_ies = kmalloc(ieee->assocresp_ies_len,
2270 GFP_ATOMIC);
2271 if (ieee->assocresp_ies)
2272 memcpy(ieee->assocresp_ies, ies,
2273 ieee->assocresp_ies_len);
2274 else {
2275 printk(KERN_INFO "%s()Warning: can't alloc "
2276 "memory for assocresp_ies\n", __func__);
2277 ieee->assocresp_ies_len = 0;
2279 rtllib_associate_complete(ieee);
2280 } else {
2281 /* aid could not been allocated */
2282 ieee->softmac_stats.rx_ass_err++;
2283 printk(KERN_INFO "Association response status code 0x%x\n",
2284 errcode);
2285 RTLLIB_DEBUG_MGMT(
2286 "Association response status code 0x%x\n",
2287 errcode);
2288 if (ieee->AsocRetryCount < RT_ASOC_RETRY_LIMIT)
2289 queue_delayed_work_rsl(ieee->wq,
2290 &ieee->associate_procedure_wq, 0);
2291 else
2292 rtllib_associate_abort(ieee);
2295 return 0;
2298 inline int rtllib_rx_auth(struct rtllib_device *ieee, struct sk_buff *skb,
2299 struct rtllib_rx_stats *rx_stats)
2301 u16 errcode;
2302 u8 *challenge;
2303 int chlen = 0;
2304 bool bSupportNmode = true, bHalfSupportNmode = false;
2306 if (ieee->softmac_features & IEEE_SOFTMAC_ASSOCIATE) {
2307 if (ieee->state == RTLLIB_ASSOCIATING_AUTHENTICATING &&
2308 (ieee->iw_mode == IW_MODE_INFRA)) {
2309 RTLLIB_DEBUG_MGMT("Received authentication response");
2311 errcode = auth_parse(skb, &challenge, &chlen);
2312 if (0 == errcode) {
2313 if (ieee->open_wep || !challenge) {
2314 ieee->state = RTLLIB_ASSOCIATING_AUTHENTICATED;
2315 ieee->softmac_stats.rx_auth_rs_ok++;
2316 if (!(ieee->pHTInfo->IOTAction &
2317 HT_IOT_ACT_PURE_N_MODE)) {
2318 if (!ieee->GetNmodeSupportBySecCfg(ieee->dev)) {
2319 if (IsHTHalfNmodeAPs(ieee)) {
2320 bSupportNmode = true;
2321 bHalfSupportNmode = true;
2322 } else {
2323 bSupportNmode = false;
2324 bHalfSupportNmode = false;
2328 /* Dummy wirless mode setting to avoid
2329 * encryption issue */
2330 if (bSupportNmode) {
2331 ieee->SetWirelessMode(ieee->dev,
2332 ieee->current_network.mode);
2333 } else {
2334 /*TODO*/
2335 ieee->SetWirelessMode(ieee->dev,
2336 IEEE_G);
2339 if (ieee->current_network.mode ==
2340 IEEE_N_24G &&
2341 bHalfSupportNmode == true) {
2342 printk(KERN_INFO "======>enter "
2343 "half N mode\n");
2344 ieee->bHalfWirelessN24GMode =
2345 true;
2346 } else
2347 ieee->bHalfWirelessN24GMode =
2348 false;
2350 rtllib_associate_step2(ieee);
2351 } else {
2352 rtllib_auth_challenge(ieee, challenge,
2353 chlen);
2355 } else {
2356 ieee->softmac_stats.rx_auth_rs_err++;
2357 RTLLIB_DEBUG_MGMT("Authentication respose"
2358 " status code 0x%x", errcode);
2360 printk(KERN_INFO "Authentication respose "
2361 "status code 0x%x", errcode);
2362 rtllib_associate_abort(ieee);
2365 } else if (ieee->iw_mode == IW_MODE_MASTER) {
2366 rtllib_rx_auth_rq(ieee, skb);
2369 return 0;
2372 inline int rtllib_rx_deauth(struct rtllib_device *ieee, struct sk_buff *skb)
2374 struct rtllib_hdr_3addr *header = (struct rtllib_hdr_3addr *) skb->data;
2376 if (memcmp(header->addr3, ieee->current_network.bssid, ETH_ALEN) != 0)
2377 return 0;
2379 /* FIXME for now repeat all the association procedure
2380 * both for disassociation and deauthentication
2382 if ((ieee->softmac_features & IEEE_SOFTMAC_ASSOCIATE) &&
2383 ieee->state == RTLLIB_LINKED &&
2384 (ieee->iw_mode == IW_MODE_INFRA)) {
2385 printk(KERN_INFO "==========>received disassoc/deauth(%x) "
2386 "frame, reason code:%x\n",
2387 WLAN_FC_GET_STYPE(header->frame_ctl),
2388 ((struct rtllib_disassoc *)skb->data)->reason);
2389 ieee->state = RTLLIB_ASSOCIATING;
2390 ieee->softmac_stats.reassoc++;
2391 ieee->is_roaming = true;
2392 ieee->LinkDetectInfo.bBusyTraffic = false;
2393 rtllib_disassociate(ieee);
2394 RemovePeerTS(ieee, header->addr2);
2395 if (ieee->LedControlHandler != NULL)
2396 ieee->LedControlHandler(ieee->dev,
2397 LED_CTL_START_TO_LINK);
2399 if (!(ieee->rtllib_ap_sec_type(ieee) &
2400 (SEC_ALG_CCMP|SEC_ALG_TKIP)))
2401 queue_delayed_work_rsl(ieee->wq,
2402 &ieee->associate_procedure_wq, 5);
2404 return 0;
2407 inline int rtllib_rx_frame_softmac(struct rtllib_device *ieee,
2408 struct sk_buff *skb,
2409 struct rtllib_rx_stats *rx_stats, u16 type,
2410 u16 stype)
2412 struct rtllib_hdr_3addr *header = (struct rtllib_hdr_3addr *) skb->data;
2414 if (!ieee->proto_started)
2415 return 0;
2417 switch (WLAN_FC_GET_STYPE(header->frame_ctl)) {
2418 case RTLLIB_STYPE_ASSOC_RESP:
2419 case RTLLIB_STYPE_REASSOC_RESP:
2420 if (rtllib_rx_assoc_resp(ieee, skb, rx_stats) == 1)
2421 return 1;
2422 break;
2423 case RTLLIB_STYPE_ASSOC_REQ:
2424 case RTLLIB_STYPE_REASSOC_REQ:
2425 if ((ieee->softmac_features & IEEE_SOFTMAC_ASSOCIATE) &&
2426 ieee->iw_mode == IW_MODE_MASTER)
2427 rtllib_rx_assoc_rq(ieee, skb);
2428 break;
2429 case RTLLIB_STYPE_AUTH:
2430 rtllib_rx_auth(ieee, skb, rx_stats);
2431 break;
2432 case RTLLIB_STYPE_DISASSOC:
2433 case RTLLIB_STYPE_DEAUTH:
2434 rtllib_rx_deauth(ieee, skb);
2435 break;
2436 case RTLLIB_STYPE_MANAGE_ACT:
2437 rtllib_process_action(ieee, skb);
2438 break;
2439 default:
2440 return -1;
2441 break;
2443 return 0;
2446 /* following are for a simplier TX queue management.
2447 * Instead of using netif_[stop/wake]_queue the driver
2448 * will uses these two function (plus a reset one), that
2449 * will internally uses the kernel netif_* and takes
2450 * care of the ieee802.11 fragmentation.
2451 * So the driver receives a fragment per time and might
2452 * call the stop function when it want without take care
2453 * to have enought room to TX an entire packet.
2454 * This might be useful if each fragment need it's own
2455 * descriptor, thus just keep a total free memory > than
2456 * the max fragmentation treshold is not enought.. If the
2457 * ieee802.11 stack passed a TXB struct then you needed
2458 * to keep N free descriptors where
2459 * N = MAX_PACKET_SIZE / MIN_FRAG_TRESHOLD
2460 * In this way you need just one and the 802.11 stack
2461 * will take care of buffering fragments and pass them to
2462 * to the driver later, when it wakes the queue.
2464 void rtllib_softmac_xmit(struct rtllib_txb *txb, struct rtllib_device *ieee)
2467 unsigned int queue_index = txb->queue_index;
2468 unsigned long flags;
2469 int i;
2470 struct cb_desc *tcb_desc = NULL;
2471 unsigned long queue_len = 0;
2473 spin_lock_irqsave(&ieee->lock, flags);
2475 /* called with 2nd parm 0, no tx mgmt lock required */
2476 rtllib_sta_wakeup(ieee, 0);
2478 /* update the tx status */
2479 tcb_desc = (struct cb_desc *)(txb->fragments[0]->cb +
2480 MAX_DEV_ADDR_SIZE);
2481 if (tcb_desc->bMulticast)
2482 ieee->stats.multicast++;
2484 /* if xmit available, just xmit it immediately, else just insert it to
2485 * the wait queue */
2486 for (i = 0; i < txb->nr_frags; i++) {
2487 queue_len = skb_queue_len(&ieee->skb_waitQ[queue_index]);
2488 if ((queue_len != 0) ||\
2489 (!ieee->check_nic_enough_desc(ieee->dev, queue_index)) ||
2490 (ieee->queue_stop)) {
2491 /* insert the skb packet to the wait queue */
2492 /* as for the completion function, it does not need
2493 * to check it any more.
2494 * */
2495 if (queue_len < 200)
2496 skb_queue_tail(&ieee->skb_waitQ[queue_index],
2497 txb->fragments[i]);
2498 else
2499 kfree_skb(txb->fragments[i]);
2500 } else {
2501 ieee->softmac_data_hard_start_xmit(
2502 txb->fragments[i],
2503 ieee->dev, ieee->rate);
2507 rtllib_txb_free(txb);
2509 spin_unlock_irqrestore(&ieee->lock, flags);
2513 /* called with ieee->lock acquired */
2514 static void rtllib_resume_tx(struct rtllib_device *ieee)
2516 int i;
2517 for (i = ieee->tx_pending.frag; i < ieee->tx_pending.txb->nr_frags;
2518 i++) {
2520 if (ieee->queue_stop) {
2521 ieee->tx_pending.frag = i;
2522 return;
2523 } else {
2525 ieee->softmac_data_hard_start_xmit(
2526 ieee->tx_pending.txb->fragments[i],
2527 ieee->dev, ieee->rate);
2528 ieee->stats.tx_packets++;
2532 rtllib_txb_free(ieee->tx_pending.txb);
2533 ieee->tx_pending.txb = NULL;
2537 void rtllib_reset_queue(struct rtllib_device *ieee)
2539 unsigned long flags;
2541 spin_lock_irqsave(&ieee->lock, flags);
2542 init_mgmt_queue(ieee);
2543 if (ieee->tx_pending.txb) {
2544 rtllib_txb_free(ieee->tx_pending.txb);
2545 ieee->tx_pending.txb = NULL;
2547 ieee->queue_stop = 0;
2548 spin_unlock_irqrestore(&ieee->lock, flags);
2551 EXPORT_SYMBOL(rtllib_reset_queue);
2553 void rtllib_wake_queue(struct rtllib_device *ieee)
2556 unsigned long flags;
2557 struct sk_buff *skb;
2558 struct rtllib_hdr_3addr *header;
2560 spin_lock_irqsave(&ieee->lock, flags);
2561 if (!ieee->queue_stop)
2562 goto exit;
2564 ieee->queue_stop = 0;
2566 if (ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE) {
2567 while (!ieee->queue_stop && (skb = dequeue_mgmt(ieee))) {
2569 header = (struct rtllib_hdr_3addr *) skb->data;
2571 header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
2573 if (ieee->seq_ctrl[0] == 0xFFF)
2574 ieee->seq_ctrl[0] = 0;
2575 else
2576 ieee->seq_ctrl[0]++;
2578 ieee->softmac_data_hard_start_xmit(skb, ieee->dev,
2579 ieee->basic_rate);
2582 if (!ieee->queue_stop && ieee->tx_pending.txb)
2583 rtllib_resume_tx(ieee);
2585 if (!ieee->queue_stop && netif_queue_stopped(ieee->dev)) {
2586 ieee->softmac_stats.swtxawake++;
2587 netif_wake_queue(ieee->dev);
2590 exit:
2591 spin_unlock_irqrestore(&ieee->lock, flags);
2595 void rtllib_stop_queue(struct rtllib_device *ieee)
2598 if (!netif_queue_stopped(ieee->dev)) {
2599 netif_stop_queue(ieee->dev);
2600 ieee->softmac_stats.swtxstop++;
2602 ieee->queue_stop = 1;
2606 void rtllib_stop_all_queues(struct rtllib_device *ieee)
2608 unsigned int i;
2609 for (i = 0; i < ieee->dev->num_tx_queues; i++)
2610 netdev_get_tx_queue(ieee->dev, i)->trans_start = jiffies;
2612 netif_tx_stop_all_queues(ieee->dev);
2615 void rtllib_wake_all_queues(struct rtllib_device *ieee)
2617 netif_tx_wake_all_queues(ieee->dev);
2620 inline void rtllib_randomize_cell(struct rtllib_device *ieee)
2623 get_random_bytes(ieee->current_network.bssid, ETH_ALEN);
2625 /* an IBSS cell address must have the two less significant
2626 * bits of the first byte = 2
2628 ieee->current_network.bssid[0] &= ~0x01;
2629 ieee->current_network.bssid[0] |= 0x02;
2632 /* called in user context only */
2633 void rtllib_start_master_bss(struct rtllib_device *ieee)
2635 ieee->assoc_id = 1;
2637 if (ieee->current_network.ssid_len == 0) {
2638 strncpy(ieee->current_network.ssid,
2639 RTLLIB_DEFAULT_TX_ESSID,
2640 IW_ESSID_MAX_SIZE);
2642 ieee->current_network.ssid_len =
2643 strlen(RTLLIB_DEFAULT_TX_ESSID);
2644 ieee->ssid_set = 1;
2647 memcpy(ieee->current_network.bssid, ieee->dev->dev_addr, ETH_ALEN);
2649 ieee->set_chan(ieee->dev, ieee->current_network.channel);
2650 ieee->state = RTLLIB_LINKED;
2651 ieee->link_change(ieee->dev);
2652 notify_wx_assoc_event(ieee);
2654 if (ieee->data_hard_resume)
2655 ieee->data_hard_resume(ieee->dev);
2657 netif_carrier_on(ieee->dev);
2660 static void rtllib_start_monitor_mode(struct rtllib_device *ieee)
2662 /* reset hardware status */
2663 if (ieee->raw_tx) {
2664 if (ieee->data_hard_resume)
2665 ieee->data_hard_resume(ieee->dev);
2667 netif_carrier_on(ieee->dev);
2671 static void rtllib_start_ibss_wq(void *data)
2673 struct rtllib_device *ieee = container_of_dwork_rsl(data,
2674 struct rtllib_device, start_ibss_wq);
2675 /* iwconfig mode ad-hoc will schedule this and return
2676 * on the other hand this will block further iwconfig SET
2677 * operations because of the wx_sem hold.
2678 * Anyway some most set operations set a flag to speed-up
2679 * (abort) this wq (when syncro scanning) before sleeping
2680 * on the semaphore
2682 if (!ieee->proto_started) {
2683 printk(KERN_INFO "==========oh driver down return\n");
2684 return;
2686 down(&ieee->wx_sem);
2688 if (ieee->current_network.ssid_len == 0) {
2689 strcpy(ieee->current_network.ssid, RTLLIB_DEFAULT_TX_ESSID);
2690 ieee->current_network.ssid_len = strlen(RTLLIB_DEFAULT_TX_ESSID);
2691 ieee->ssid_set = 1;
2694 ieee->state = RTLLIB_NOLINK;
2695 ieee->mode = IEEE_G;
2696 /* check if we have this cell in our network list */
2697 rtllib_softmac_check_all_nets(ieee);
2700 /* if not then the state is not linked. Maybe the user swithced to
2701 * ad-hoc mode just after being in monitor mode, or just after
2702 * being very few time in managed mode (so the card have had no
2703 * time to scan all the chans..) or we have just run up the iface
2704 * after setting ad-hoc mode. So we have to give another try..
2705 * Here, in ibss mode, should be safe to do this without extra care
2706 * (in bss mode we had to make sure no-one tryed to associate when
2707 * we had just checked the ieee->state and we was going to start the
2708 * scan) beacause in ibss mode the rtllib_new_net function, when
2709 * finds a good net, just set the ieee->state to RTLLIB_LINKED,
2710 * so, at worst, we waste a bit of time to initiate an unneeded syncro
2711 * scan, that will stop at the first round because it sees the state
2712 * associated.
2714 if (ieee->state == RTLLIB_NOLINK)
2715 rtllib_start_scan_syncro(ieee, 0);
2717 /* the network definitively is not here.. create a new cell */
2718 if (ieee->state == RTLLIB_NOLINK) {
2719 printk(KERN_INFO "creating new IBSS cell\n");
2720 ieee->current_network.channel = ieee->IbssStartChnl;
2721 if (!ieee->wap_set)
2722 rtllib_randomize_cell(ieee);
2724 if (ieee->modulation & RTLLIB_CCK_MODULATION) {
2726 ieee->current_network.rates_len = 4;
2728 ieee->current_network.rates[0] =
2729 RTLLIB_BASIC_RATE_MASK | RTLLIB_CCK_RATE_1MB;
2730 ieee->current_network.rates[1] =
2731 RTLLIB_BASIC_RATE_MASK | RTLLIB_CCK_RATE_2MB;
2732 ieee->current_network.rates[2] =
2733 RTLLIB_BASIC_RATE_MASK | RTLLIB_CCK_RATE_5MB;
2734 ieee->current_network.rates[3] =
2735 RTLLIB_BASIC_RATE_MASK | RTLLIB_CCK_RATE_11MB;
2737 } else
2738 ieee->current_network.rates_len = 0;
2740 if (ieee->modulation & RTLLIB_OFDM_MODULATION) {
2741 ieee->current_network.rates_ex_len = 8;
2743 ieee->current_network.rates_ex[0] =
2744 RTLLIB_OFDM_RATE_6MB;
2745 ieee->current_network.rates_ex[1] =
2746 RTLLIB_OFDM_RATE_9MB;
2747 ieee->current_network.rates_ex[2] =
2748 RTLLIB_OFDM_RATE_12MB;
2749 ieee->current_network.rates_ex[3] =
2750 RTLLIB_OFDM_RATE_18MB;
2751 ieee->current_network.rates_ex[4] =
2752 RTLLIB_OFDM_RATE_24MB;
2753 ieee->current_network.rates_ex[5] =
2754 RTLLIB_OFDM_RATE_36MB;
2755 ieee->current_network.rates_ex[6] =
2756 RTLLIB_OFDM_RATE_48MB;
2757 ieee->current_network.rates_ex[7] =
2758 RTLLIB_OFDM_RATE_54MB;
2760 ieee->rate = 108;
2761 } else {
2762 ieee->current_network.rates_ex_len = 0;
2763 ieee->rate = 22;
2766 ieee->current_network.qos_data.supported = 0;
2767 ieee->SetWirelessMode(ieee->dev, IEEE_G);
2768 ieee->current_network.mode = ieee->mode;
2769 ieee->current_network.atim_window = 0;
2770 ieee->current_network.capability = WLAN_CAPABILITY_IBSS;
2773 printk(KERN_INFO "%s(): ieee->mode = %d\n", __func__, ieee->mode);
2774 if ((ieee->mode == IEEE_N_24G) || (ieee->mode == IEEE_N_5G))
2775 HTUseDefaultSetting(ieee);
2776 else
2777 ieee->pHTInfo->bCurrentHTSupport = false;
2779 ieee->SetHwRegHandler(ieee->dev, HW_VAR_MEDIA_STATUS,
2780 (u8 *)(&ieee->state));
2782 ieee->state = RTLLIB_LINKED;
2783 ieee->link_change(ieee->dev);
2785 HTSetConnectBwMode(ieee, HT_CHANNEL_WIDTH_20, HT_EXTCHNL_OFFSET_NO_EXT);
2786 if (ieee->LedControlHandler != NULL)
2787 ieee->LedControlHandler(ieee->dev, LED_CTL_LINK);
2789 rtllib_start_send_beacons(ieee);
2791 notify_wx_assoc_event(ieee);
2793 if (ieee->data_hard_resume)
2794 ieee->data_hard_resume(ieee->dev);
2796 netif_carrier_on(ieee->dev);
2798 up(&ieee->wx_sem);
2801 inline void rtllib_start_ibss(struct rtllib_device *ieee)
2803 queue_delayed_work_rsl(ieee->wq, &ieee->start_ibss_wq, MSECS(150));
2806 /* this is called only in user context, with wx_sem held */
2807 void rtllib_start_bss(struct rtllib_device *ieee)
2809 unsigned long flags;
2810 if (IS_DOT11D_ENABLE(ieee) && !IS_COUNTRY_IE_VALID(ieee)) {
2811 if (!ieee->bGlobalDomain)
2812 return;
2814 /* check if we have already found the net we
2815 * are interested in (if any).
2816 * if not (we are disassociated and we are not
2817 * in associating / authenticating phase) start the background scanning.
2819 rtllib_softmac_check_all_nets(ieee);
2821 /* ensure no-one start an associating process (thus setting
2822 * the ieee->state to rtllib_ASSOCIATING) while we
2823 * have just cheked it and we are going to enable scan.
2824 * The rtllib_new_net function is always called with
2825 * lock held (from both rtllib_softmac_check_all_nets and
2826 * the rx path), so we cannot be in the middle of such function
2828 spin_lock_irqsave(&ieee->lock, flags);
2830 if (ieee->state == RTLLIB_NOLINK)
2831 rtllib_start_scan(ieee);
2832 spin_unlock_irqrestore(&ieee->lock, flags);
2835 static void rtllib_link_change_wq(void *data)
2837 struct rtllib_device *ieee = container_of_dwork_rsl(data,
2838 struct rtllib_device, link_change_wq);
2839 ieee->link_change(ieee->dev);
2841 /* called only in userspace context */
2842 void rtllib_disassociate(struct rtllib_device *ieee)
2844 netif_carrier_off(ieee->dev);
2845 if (ieee->softmac_features & IEEE_SOFTMAC_TX_QUEUE)
2846 rtllib_reset_queue(ieee);
2848 if (ieee->data_hard_stop)
2849 ieee->data_hard_stop(ieee->dev);
2850 if (IS_DOT11D_ENABLE(ieee))
2851 Dot11d_Reset(ieee);
2852 ieee->state = RTLLIB_NOLINK;
2853 ieee->is_set_key = false;
2854 ieee->wap_set = 0;
2856 queue_delayed_work_rsl(ieee->wq, &ieee->link_change_wq, 0);
2858 notify_wx_assoc_event(ieee);
2861 static void rtllib_associate_retry_wq(void *data)
2863 struct rtllib_device *ieee = container_of_dwork_rsl(data,
2864 struct rtllib_device, associate_retry_wq);
2865 unsigned long flags;
2867 down(&ieee->wx_sem);
2868 if (!ieee->proto_started)
2869 goto exit;
2871 if (ieee->state != RTLLIB_ASSOCIATING_RETRY)
2872 goto exit;
2874 /* until we do not set the state to RTLLIB_NOLINK
2875 * there are no possibility to have someone else trying
2876 * to start an association procdure (we get here with
2877 * ieee->state = RTLLIB_ASSOCIATING).
2878 * When we set the state to RTLLIB_NOLINK it is possible
2879 * that the RX path run an attempt to associate, but
2880 * both rtllib_softmac_check_all_nets and the
2881 * RX path works with ieee->lock held so there are no
2882 * problems. If we are still disassociated then start a scan.
2883 * the lock here is necessary to ensure no one try to start
2884 * an association procedure when we have just checked the
2885 * state and we are going to start the scan.
2887 ieee->beinretry = true;
2888 ieee->state = RTLLIB_NOLINK;
2890 rtllib_softmac_check_all_nets(ieee);
2892 spin_lock_irqsave(&ieee->lock, flags);
2894 if (ieee->state == RTLLIB_NOLINK)
2895 rtllib_start_scan(ieee);
2896 spin_unlock_irqrestore(&ieee->lock, flags);
2898 ieee->beinretry = false;
2899 exit:
2900 up(&ieee->wx_sem);
2903 struct sk_buff *rtllib_get_beacon_(struct rtllib_device *ieee)
2905 u8 broadcast_addr[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
2907 struct sk_buff *skb;
2908 struct rtllib_probe_response *b;
2909 skb = rtllib_probe_resp(ieee, broadcast_addr);
2911 if (!skb)
2912 return NULL;
2914 b = (struct rtllib_probe_response *) skb->data;
2915 b->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_BEACON);
2917 return skb;
2921 struct sk_buff *rtllib_get_beacon(struct rtllib_device *ieee)
2923 struct sk_buff *skb;
2924 struct rtllib_probe_response *b;
2926 skb = rtllib_get_beacon_(ieee);
2927 if (!skb)
2928 return NULL;
2930 b = (struct rtllib_probe_response *) skb->data;
2931 b->header.seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
2933 if (ieee->seq_ctrl[0] == 0xFFF)
2934 ieee->seq_ctrl[0] = 0;
2935 else
2936 ieee->seq_ctrl[0]++;
2938 return skb;
2940 EXPORT_SYMBOL(rtllib_get_beacon);
2942 void rtllib_softmac_stop_protocol(struct rtllib_device *ieee, u8 mesh_flag,
2943 u8 shutdown)
2945 rtllib_stop_scan_syncro(ieee);
2946 down(&ieee->wx_sem);
2947 rtllib_stop_protocol(ieee, shutdown);
2948 up(&ieee->wx_sem);
2950 EXPORT_SYMBOL(rtllib_softmac_stop_protocol);
2953 void rtllib_stop_protocol(struct rtllib_device *ieee, u8 shutdown)
2955 if (!ieee->proto_started)
2956 return;
2958 if (shutdown) {
2959 ieee->proto_started = 0;
2960 ieee->proto_stoppping = 1;
2961 if (ieee->rtllib_ips_leave != NULL)
2962 ieee->rtllib_ips_leave(ieee->dev);
2965 rtllib_stop_send_beacons(ieee);
2966 del_timer_sync(&ieee->associate_timer);
2967 cancel_delayed_work(&ieee->associate_retry_wq);
2968 cancel_delayed_work(&ieee->start_ibss_wq);
2969 cancel_delayed_work(&ieee->link_change_wq);
2970 rtllib_stop_scan(ieee);
2972 if (ieee->state <= RTLLIB_ASSOCIATING_AUTHENTICATED)
2973 ieee->state = RTLLIB_NOLINK;
2975 if (ieee->state == RTLLIB_LINKED) {
2976 if (ieee->iw_mode == IW_MODE_INFRA)
2977 SendDisassociation(ieee, 1, deauth_lv_ss);
2978 rtllib_disassociate(ieee);
2981 if (shutdown) {
2982 RemoveAllTS(ieee);
2983 ieee->proto_stoppping = 0;
2985 kfree(ieee->assocreq_ies);
2986 ieee->assocreq_ies = NULL;
2987 ieee->assocreq_ies_len = 0;
2988 kfree(ieee->assocresp_ies);
2989 ieee->assocresp_ies = NULL;
2990 ieee->assocresp_ies_len = 0;
2993 void rtllib_softmac_start_protocol(struct rtllib_device *ieee, u8 mesh_flag)
2995 down(&ieee->wx_sem);
2996 rtllib_start_protocol(ieee);
2997 up(&ieee->wx_sem);
2999 EXPORT_SYMBOL(rtllib_softmac_start_protocol);
3001 void rtllib_start_protocol(struct rtllib_device *ieee)
3003 short ch = 0;
3004 int i = 0;
3006 rtllib_update_active_chan_map(ieee);
3008 if (ieee->proto_started)
3009 return;
3011 ieee->proto_started = 1;
3013 if (ieee->current_network.channel == 0) {
3014 do {
3015 ch++;
3016 if (ch > MAX_CHANNEL_NUMBER)
3017 return; /* no channel found */
3018 } while (!ieee->active_channel_map[ch]);
3019 ieee->current_network.channel = ch;
3022 if (ieee->current_network.beacon_interval == 0)
3023 ieee->current_network.beacon_interval = 100;
3025 for (i = 0; i < 17; i++) {
3026 ieee->last_rxseq_num[i] = -1;
3027 ieee->last_rxfrag_num[i] = -1;
3028 ieee->last_packet_time[i] = 0;
3031 if (ieee->UpdateBeaconInterruptHandler)
3032 ieee->UpdateBeaconInterruptHandler(ieee->dev, false);
3034 ieee->wmm_acm = 0;
3035 /* if the user set the MAC of the ad-hoc cell and then
3036 * switch to managed mode, shall we make sure that association
3037 * attempts does not fail just because the user provide the essid
3038 * and the nic is still checking for the AP MAC ??
3040 if (ieee->iw_mode == IW_MODE_INFRA) {
3041 rtllib_start_bss(ieee);
3042 } else if (ieee->iw_mode == IW_MODE_ADHOC) {
3043 if (ieee->UpdateBeaconInterruptHandler)
3044 ieee->UpdateBeaconInterruptHandler(ieee->dev, true);
3046 rtllib_start_ibss(ieee);
3048 } else if (ieee->iw_mode == IW_MODE_MASTER) {
3049 rtllib_start_master_bss(ieee);
3050 } else if (ieee->iw_mode == IW_MODE_MONITOR) {
3051 rtllib_start_monitor_mode(ieee);
3055 void rtllib_softmac_init(struct rtllib_device *ieee)
3057 int i;
3058 memset(&ieee->current_network, 0, sizeof(struct rtllib_network));
3060 ieee->state = RTLLIB_NOLINK;
3061 for (i = 0; i < 5; i++)
3062 ieee->seq_ctrl[i] = 0;
3063 ieee->pDot11dInfo = kzalloc(sizeof(struct rt_dot11d_info), GFP_ATOMIC);
3064 if (!ieee->pDot11dInfo)
3065 RTLLIB_DEBUG(RTLLIB_DL_ERR, "can't alloc memory for DOT11D\n");
3066 ieee->LinkDetectInfo.SlotIndex = 0;
3067 ieee->LinkDetectInfo.SlotNum = 2;
3068 ieee->LinkDetectInfo.NumRecvBcnInPeriod = 0;
3069 ieee->LinkDetectInfo.NumRecvDataInPeriod = 0;
3070 ieee->LinkDetectInfo.NumTxOkInPeriod = 0;
3071 ieee->LinkDetectInfo.NumRxOkInPeriod = 0;
3072 ieee->LinkDetectInfo.NumRxUnicastOkInPeriod = 0;
3073 ieee->bIsAggregateFrame = false;
3074 ieee->assoc_id = 0;
3075 ieee->queue_stop = 0;
3076 ieee->scanning_continue = 0;
3077 ieee->softmac_features = 0;
3078 ieee->wap_set = 0;
3079 ieee->ssid_set = 0;
3080 ieee->proto_started = 0;
3081 ieee->proto_stoppping = 0;
3082 ieee->basic_rate = RTLLIB_DEFAULT_BASIC_RATE;
3083 ieee->rate = 22;
3084 ieee->ps = RTLLIB_PS_DISABLED;
3085 ieee->sta_sleep = LPS_IS_WAKE;
3087 ieee->Regdot11HTOperationalRateSet[0] = 0xff;
3088 ieee->Regdot11HTOperationalRateSet[1] = 0xff;
3089 ieee->Regdot11HTOperationalRateSet[4] = 0x01;
3091 ieee->Regdot11TxHTOperationalRateSet[0] = 0xff;
3092 ieee->Regdot11TxHTOperationalRateSet[1] = 0xff;
3093 ieee->Regdot11TxHTOperationalRateSet[4] = 0x01;
3095 ieee->FirstIe_InScan = false;
3096 ieee->actscanning = false;
3097 ieee->beinretry = false;
3098 ieee->is_set_key = false;
3099 init_mgmt_queue(ieee);
3101 ieee->sta_edca_param[0] = 0x0000A403;
3102 ieee->sta_edca_param[1] = 0x0000A427;
3103 ieee->sta_edca_param[2] = 0x005E4342;
3104 ieee->sta_edca_param[3] = 0x002F3262;
3105 ieee->aggregation = true;
3106 ieee->enable_rx_imm_BA = 1;
3107 ieee->tx_pending.txb = NULL;
3109 _setup_timer(&ieee->associate_timer,
3110 rtllib_associate_abort_cb,
3111 (unsigned long) ieee);
3113 _setup_timer(&ieee->beacon_timer,
3114 rtllib_send_beacon_cb,
3115 (unsigned long) ieee);
3118 ieee->wq = create_workqueue(DRV_NAME);
3120 INIT_DELAYED_WORK_RSL(&ieee->link_change_wq,
3121 (void *)rtllib_link_change_wq, ieee);
3122 INIT_DELAYED_WORK_RSL(&ieee->start_ibss_wq,
3123 (void *)rtllib_start_ibss_wq, ieee);
3124 INIT_WORK_RSL(&ieee->associate_complete_wq,
3125 (void *)rtllib_associate_complete_wq, ieee);
3126 INIT_DELAYED_WORK_RSL(&ieee->associate_procedure_wq,
3127 (void *)rtllib_associate_procedure_wq, ieee);
3128 INIT_DELAYED_WORK_RSL(&ieee->softmac_scan_wq,
3129 (void *)rtllib_softmac_scan_wq, ieee);
3130 INIT_DELAYED_WORK_RSL(&ieee->softmac_hint11d_wq,
3131 (void *)rtllib_softmac_hint11d_wq, ieee);
3132 INIT_DELAYED_WORK_RSL(&ieee->associate_retry_wq,
3133 (void *)rtllib_associate_retry_wq, ieee);
3134 INIT_WORK_RSL(&ieee->wx_sync_scan_wq, (void *)rtllib_wx_sync_scan_wq,
3135 ieee);
3137 sema_init(&ieee->wx_sem, 1);
3138 sema_init(&ieee->scan_sem, 1);
3139 sema_init(&ieee->ips_sem, 1);
3141 spin_lock_init(&ieee->mgmt_tx_lock);
3142 spin_lock_init(&ieee->beacon_lock);
3144 tasklet_init(&ieee->ps_task,
3145 (void(*)(unsigned long)) rtllib_sta_ps,
3146 (unsigned long)ieee);
3150 void rtllib_softmac_free(struct rtllib_device *ieee)
3152 down(&ieee->wx_sem);
3153 kfree(ieee->pDot11dInfo);
3154 ieee->pDot11dInfo = NULL;
3155 del_timer_sync(&ieee->associate_timer);
3157 cancel_delayed_work(&ieee->associate_retry_wq);
3158 destroy_workqueue(ieee->wq);
3159 up(&ieee->wx_sem);
3162 /********************************************************
3163 * Start of WPA code. *
3164 * this is stolen from the ipw2200 driver *
3165 ********************************************************/
3168 static int rtllib_wpa_enable(struct rtllib_device *ieee, int value)
3170 /* This is called when wpa_supplicant loads and closes the driver
3171 * interface. */
3172 printk(KERN_INFO "%s WPA\n", value ? "enabling" : "disabling");
3173 ieee->wpa_enabled = value;
3174 memset(ieee->ap_mac_addr, 0, 6);
3175 return 0;
3179 static void rtllib_wpa_assoc_frame(struct rtllib_device *ieee, char *wpa_ie,
3180 int wpa_ie_len)
3182 /* make sure WPA is enabled */
3183 rtllib_wpa_enable(ieee, 1);
3185 rtllib_disassociate(ieee);
3189 static int rtllib_wpa_mlme(struct rtllib_device *ieee, int command, int reason)
3192 int ret = 0;
3194 switch (command) {
3195 case IEEE_MLME_STA_DEAUTH:
3196 break;
3198 case IEEE_MLME_STA_DISASSOC:
3199 rtllib_disassociate(ieee);
3200 break;
3202 default:
3203 printk(KERN_INFO "Unknown MLME request: %d\n", command);
3204 ret = -EOPNOTSUPP;
3207 return ret;
3211 static int rtllib_wpa_set_wpa_ie(struct rtllib_device *ieee,
3212 struct ieee_param *param, int plen)
3214 u8 *buf;
3216 if (param->u.wpa_ie.len > MAX_WPA_IE_LEN ||
3217 (param->u.wpa_ie.len && param->u.wpa_ie.data == NULL))
3218 return -EINVAL;
3220 if (param->u.wpa_ie.len) {
3221 buf = kmemdup(param->u.wpa_ie.data, param->u.wpa_ie.len,
3222 GFP_KERNEL);
3223 if (buf == NULL)
3224 return -ENOMEM;
3226 kfree(ieee->wpa_ie);
3227 ieee->wpa_ie = buf;
3228 ieee->wpa_ie_len = param->u.wpa_ie.len;
3229 } else {
3230 kfree(ieee->wpa_ie);
3231 ieee->wpa_ie = NULL;
3232 ieee->wpa_ie_len = 0;
3235 rtllib_wpa_assoc_frame(ieee, ieee->wpa_ie, ieee->wpa_ie_len);
3236 return 0;
3239 #define AUTH_ALG_OPEN_SYSTEM 0x1
3240 #define AUTH_ALG_SHARED_KEY 0x2
3241 #define AUTH_ALG_LEAP 0x4
3242 static int rtllib_wpa_set_auth_algs(struct rtllib_device *ieee, int value)
3245 struct rtllib_security sec = {
3246 .flags = SEC_AUTH_MODE,
3248 int ret = 0;
3250 if (value & AUTH_ALG_SHARED_KEY) {
3251 sec.auth_mode = WLAN_AUTH_SHARED_KEY;
3252 ieee->open_wep = 0;
3253 ieee->auth_mode = 1;
3254 } else if (value & AUTH_ALG_OPEN_SYSTEM) {
3255 sec.auth_mode = WLAN_AUTH_OPEN;
3256 ieee->open_wep = 1;
3257 ieee->auth_mode = 0;
3258 } else if (value & AUTH_ALG_LEAP) {
3259 sec.auth_mode = WLAN_AUTH_LEAP >> 6;
3260 ieee->open_wep = 1;
3261 ieee->auth_mode = 2;
3265 if (ieee->set_security)
3266 ieee->set_security(ieee->dev, &sec);
3268 return ret;
3271 static int rtllib_wpa_set_param(struct rtllib_device *ieee, u8 name, u32 value)
3273 int ret = 0;
3274 unsigned long flags;
3276 switch (name) {
3277 case IEEE_PARAM_WPA_ENABLED:
3278 ret = rtllib_wpa_enable(ieee, value);
3279 break;
3281 case IEEE_PARAM_TKIP_COUNTERMEASURES:
3282 ieee->tkip_countermeasures = value;
3283 break;
3285 case IEEE_PARAM_DROP_UNENCRYPTED:
3287 /* HACK:
3289 * wpa_supplicant calls set_wpa_enabled when the driver
3290 * is loaded and unloaded, regardless of if WPA is being
3291 * used. No other calls are made which can be used to
3292 * determine if encryption will be used or not prior to
3293 * association being expected. If encryption is not being
3294 * used, drop_unencrypted is set to false, else true -- we
3295 * can use this to determine if the CAP_PRIVACY_ON bit should
3296 * be set.
3298 struct rtllib_security sec = {
3299 .flags = SEC_ENABLED,
3300 .enabled = value,
3302 ieee->drop_unencrypted = value;
3303 /* We only change SEC_LEVEL for open mode. Others
3304 * are set by ipw_wpa_set_encryption.
3306 if (!value) {
3307 sec.flags |= SEC_LEVEL;
3308 sec.level = SEC_LEVEL_0;
3309 } else {
3310 sec.flags |= SEC_LEVEL;
3311 sec.level = SEC_LEVEL_1;
3313 if (ieee->set_security)
3314 ieee->set_security(ieee->dev, &sec);
3315 break;
3318 case IEEE_PARAM_PRIVACY_INVOKED:
3319 ieee->privacy_invoked = value;
3320 break;
3322 case IEEE_PARAM_AUTH_ALGS:
3323 ret = rtllib_wpa_set_auth_algs(ieee, value);
3324 break;
3326 case IEEE_PARAM_IEEE_802_1X:
3327 ieee->ieee802_1x = value;
3328 break;
3329 case IEEE_PARAM_WPAX_SELECT:
3330 spin_lock_irqsave(&ieee->wpax_suitlist_lock, flags);
3331 spin_unlock_irqrestore(&ieee->wpax_suitlist_lock, flags);
3332 break;
3334 default:
3335 printk(KERN_INFO "Unknown WPA param: %d\n", name);
3336 ret = -EOPNOTSUPP;
3339 return ret;
3342 /* implementation borrowed from hostap driver */
3343 static int rtllib_wpa_set_encryption(struct rtllib_device *ieee,
3344 struct ieee_param *param, int param_len,
3345 u8 is_mesh)
3347 int ret = 0;
3348 struct lib80211_crypto_ops *ops;
3349 struct lib80211_crypt_data **crypt;
3351 struct rtllib_security sec = {
3352 .flags = 0,
3355 param->u.crypt.err = 0;
3356 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
3358 if (param_len !=
3359 (int) ((char *) param->u.crypt.key - (char *) param) +
3360 param->u.crypt.key_len) {
3361 printk(KERN_INFO "Len mismatch %d, %d\n", param_len,
3362 param->u.crypt.key_len);
3363 return -EINVAL;
3365 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
3366 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
3367 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
3368 if (param->u.crypt.idx >= NUM_WEP_KEYS)
3369 return -EINVAL;
3370 crypt = &ieee->crypt_info.crypt[param->u.crypt.idx];
3371 } else {
3372 return -EINVAL;
3375 if (strcmp(param->u.crypt.alg, "none") == 0) {
3376 if (crypt) {
3377 sec.enabled = 0;
3378 sec.level = SEC_LEVEL_0;
3379 sec.flags |= SEC_ENABLED | SEC_LEVEL;
3380 lib80211_crypt_delayed_deinit(&ieee->crypt_info, crypt);
3382 goto done;
3384 sec.enabled = 1;
3385 sec.flags |= SEC_ENABLED;
3387 /* IPW HW cannot build TKIP MIC, host decryption still needed. */
3388 if (!(ieee->host_encrypt || ieee->host_decrypt) &&
3389 strcmp(param->u.crypt.alg, "R-TKIP"))
3390 goto skip_host_crypt;
3392 ops = lib80211_get_crypto_ops(param->u.crypt.alg);
3393 if (ops == NULL && strcmp(param->u.crypt.alg, "R-WEP") == 0) {
3394 request_module("rtllib_crypt_wep");
3395 ops = lib80211_get_crypto_ops(param->u.crypt.alg);
3396 } else if (ops == NULL && strcmp(param->u.crypt.alg, "R-TKIP") == 0) {
3397 request_module("rtllib_crypt_tkip");
3398 ops = lib80211_get_crypto_ops(param->u.crypt.alg);
3399 } else if (ops == NULL && strcmp(param->u.crypt.alg, "R-CCMP") == 0) {
3400 request_module("rtllib_crypt_ccmp");
3401 ops = lib80211_get_crypto_ops(param->u.crypt.alg);
3403 if (ops == NULL) {
3404 printk(KERN_INFO "unknown crypto alg '%s'\n",
3405 param->u.crypt.alg);
3406 param->u.crypt.err = IEEE_CRYPT_ERR_UNKNOWN_ALG;
3407 ret = -EINVAL;
3408 goto done;
3410 if (*crypt == NULL || (*crypt)->ops != ops) {
3411 struct lib80211_crypt_data *new_crypt;
3413 lib80211_crypt_delayed_deinit(&ieee->crypt_info, crypt);
3415 new_crypt = (struct lib80211_crypt_data *)
3416 kmalloc(sizeof(*new_crypt), GFP_KERNEL);
3417 if (new_crypt == NULL) {
3418 ret = -ENOMEM;
3419 goto done;
3421 memset(new_crypt, 0, sizeof(struct lib80211_crypt_data));
3422 new_crypt->ops = ops;
3423 if (new_crypt->ops)
3424 new_crypt->priv =
3425 new_crypt->ops->init(param->u.crypt.idx);
3427 if (new_crypt->priv == NULL) {
3428 kfree(new_crypt);
3429 param->u.crypt.err = IEEE_CRYPT_ERR_CRYPT_INIT_FAILED;
3430 ret = -EINVAL;
3431 goto done;
3434 *crypt = new_crypt;
3437 if (param->u.crypt.key_len > 0 && (*crypt)->ops->set_key &&
3438 (*crypt)->ops->set_key(param->u.crypt.key,
3439 param->u.crypt.key_len, param->u.crypt.seq,
3440 (*crypt)->priv) < 0) {
3441 printk(KERN_INFO "key setting failed\n");
3442 param->u.crypt.err = IEEE_CRYPT_ERR_KEY_SET_FAILED;
3443 ret = -EINVAL;
3444 goto done;
3447 skip_host_crypt:
3448 if (param->u.crypt.set_tx) {
3449 ieee->crypt_info.tx_keyidx = param->u.crypt.idx;
3450 sec.active_key = param->u.crypt.idx;
3451 sec.flags |= SEC_ACTIVE_KEY;
3452 } else
3453 sec.flags &= ~SEC_ACTIVE_KEY;
3455 if (param->u.crypt.alg != NULL) {
3456 memcpy(sec.keys[param->u.crypt.idx],
3457 param->u.crypt.key,
3458 param->u.crypt.key_len);
3459 sec.key_sizes[param->u.crypt.idx] = param->u.crypt.key_len;
3460 sec.flags |= (1 << param->u.crypt.idx);
3462 if (strcmp(param->u.crypt.alg, "R-WEP") == 0) {
3463 sec.flags |= SEC_LEVEL;
3464 sec.level = SEC_LEVEL_1;
3465 } else if (strcmp(param->u.crypt.alg, "R-TKIP") == 0) {
3466 sec.flags |= SEC_LEVEL;
3467 sec.level = SEC_LEVEL_2;
3468 } else if (strcmp(param->u.crypt.alg, "R-CCMP") == 0) {
3469 sec.flags |= SEC_LEVEL;
3470 sec.level = SEC_LEVEL_3;
3473 done:
3474 if (ieee->set_security)
3475 ieee->set_security(ieee->dev, &sec);
3477 /* Do not reset port if card is in Managed mode since resetting will
3478 * generate new IEEE 802.11 authentication which may end up in looping
3479 * with IEEE 802.1X. If your hardware requires a reset after WEP
3480 * configuration (for example... Prism2), implement the reset_port in
3481 * the callbacks structures used to initialize the 802.11 stack. */
3482 if (ieee->reset_on_keychange &&
3483 ieee->iw_mode != IW_MODE_INFRA &&
3484 ieee->reset_port &&
3485 ieee->reset_port(ieee->dev)) {
3486 printk(KERN_INFO "reset_port failed\n");
3487 param->u.crypt.err = IEEE_CRYPT_ERR_CARD_CONF_FAILED;
3488 return -EINVAL;
3491 return ret;
3494 inline struct sk_buff *rtllib_disauth_skb(struct rtllib_network *beacon,
3495 struct rtllib_device *ieee, u16 asRsn)
3497 struct sk_buff *skb;
3498 struct rtllib_disauth *disauth;
3499 int len = sizeof(struct rtllib_disauth) + ieee->tx_headroom;
3501 skb = dev_alloc_skb(len);
3502 if (!skb)
3503 return NULL;
3505 skb_reserve(skb, ieee->tx_headroom);
3507 disauth = (struct rtllib_disauth *) skb_put(skb,
3508 sizeof(struct rtllib_disauth));
3509 disauth->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_DEAUTH);
3510 disauth->header.duration_id = 0;
3512 memcpy(disauth->header.addr1, beacon->bssid, ETH_ALEN);
3513 memcpy(disauth->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
3514 memcpy(disauth->header.addr3, beacon->bssid, ETH_ALEN);
3516 disauth->reason = cpu_to_le16(asRsn);
3517 return skb;
3520 inline struct sk_buff *rtllib_disassociate_skb(struct rtllib_network *beacon,
3521 struct rtllib_device *ieee, u16 asRsn)
3523 struct sk_buff *skb;
3524 struct rtllib_disassoc *disass;
3525 int len = sizeof(struct rtllib_disassoc) + ieee->tx_headroom;
3526 skb = dev_alloc_skb(len);
3528 if (!skb)
3529 return NULL;
3531 skb_reserve(skb, ieee->tx_headroom);
3533 disass = (struct rtllib_disassoc *) skb_put(skb,
3534 sizeof(struct rtllib_disassoc));
3535 disass->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_DISASSOC);
3536 disass->header.duration_id = 0;
3538 memcpy(disass->header.addr1, beacon->bssid, ETH_ALEN);
3539 memcpy(disass->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
3540 memcpy(disass->header.addr3, beacon->bssid, ETH_ALEN);
3542 disass->reason = cpu_to_le16(asRsn);
3543 return skb;
3546 void SendDisassociation(struct rtllib_device *ieee, bool deauth, u16 asRsn)
3548 struct rtllib_network *beacon = &ieee->current_network;
3549 struct sk_buff *skb;
3551 if (deauth)
3552 skb = rtllib_disauth_skb(beacon, ieee, asRsn);
3553 else
3554 skb = rtllib_disassociate_skb(beacon, ieee, asRsn);
3556 if (skb)
3557 softmac_mgmt_xmit(skb, ieee);
3560 u8 rtllib_ap_sec_type(struct rtllib_device *ieee)
3562 static u8 ccmp_ie[4] = {0x00, 0x50, 0xf2, 0x04};
3563 static u8 ccmp_rsn_ie[4] = {0x00, 0x0f, 0xac, 0x04};
3564 int wpa_ie_len = ieee->wpa_ie_len;
3565 struct lib80211_crypt_data *crypt;
3566 int encrypt;
3568 crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx];
3569 encrypt = (ieee->current_network.capability & WLAN_CAPABILITY_PRIVACY)
3570 || (ieee->host_encrypt && crypt && crypt->ops &&
3571 (0 == strcmp(crypt->ops->name, "R-WEP")));
3573 /* simply judge */
3574 if (encrypt && (wpa_ie_len == 0)) {
3575 return SEC_ALG_WEP;
3576 } else if ((wpa_ie_len != 0)) {
3577 if (((ieee->wpa_ie[0] == 0xdd) &&
3578 (!memcmp(&(ieee->wpa_ie[14]), ccmp_ie, 4))) ||
3579 ((ieee->wpa_ie[0] == 0x30) &&
3580 (!memcmp(&ieee->wpa_ie[10], ccmp_rsn_ie, 4))))
3581 return SEC_ALG_CCMP;
3582 else
3583 return SEC_ALG_TKIP;
3584 } else {
3585 return SEC_ALG_NONE;
3589 int rtllib_wpa_supplicant_ioctl(struct rtllib_device *ieee, struct iw_point *p,
3590 u8 is_mesh)
3592 struct ieee_param *param;
3593 int ret = 0;
3595 down(&ieee->wx_sem);
3597 if (p->length < sizeof(struct ieee_param) || !p->pointer) {
3598 ret = -EINVAL;
3599 goto out;
3602 param = kmalloc(p->length, GFP_KERNEL);
3603 if (param == NULL) {
3604 ret = -ENOMEM;
3605 goto out;
3607 if (copy_from_user(param, p->pointer, p->length)) {
3608 kfree(param);
3609 ret = -EFAULT;
3610 goto out;
3613 switch (param->cmd) {
3614 case IEEE_CMD_SET_WPA_PARAM:
3615 ret = rtllib_wpa_set_param(ieee, param->u.wpa_param.name,
3616 param->u.wpa_param.value);
3617 break;
3619 case IEEE_CMD_SET_WPA_IE:
3620 ret = rtllib_wpa_set_wpa_ie(ieee, param, p->length);
3621 break;
3623 case IEEE_CMD_SET_ENCRYPTION:
3624 ret = rtllib_wpa_set_encryption(ieee, param, p->length, 0);
3625 break;
3627 case IEEE_CMD_MLME:
3628 ret = rtllib_wpa_mlme(ieee, param->u.mlme.command,
3629 param->u.mlme.reason_code);
3630 break;
3632 default:
3633 printk(KERN_INFO "Unknown WPA supplicant request: %d\n",
3634 param->cmd);
3635 ret = -EOPNOTSUPP;
3636 break;
3639 if (ret == 0 && copy_to_user(p->pointer, param, p->length))
3640 ret = -EFAULT;
3642 kfree(param);
3643 out:
3644 up(&ieee->wx_sem);
3646 return ret;
3648 EXPORT_SYMBOL(rtllib_wpa_supplicant_ioctl);
3650 void rtllib_MgntDisconnectIBSS(struct rtllib_device *rtllib)
3652 u8 OpMode;
3653 u8 i;
3654 bool bFilterOutNonAssociatedBSSID = false;
3656 rtllib->state = RTLLIB_NOLINK;
3658 for (i = 0; i < 6; i++)
3659 rtllib->current_network.bssid[i] = 0x55;
3661 rtllib->OpMode = RT_OP_MODE_NO_LINK;
3662 rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_BSSID,
3663 rtllib->current_network.bssid);
3664 OpMode = RT_OP_MODE_NO_LINK;
3665 rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_MEDIA_STATUS, &OpMode);
3666 rtllib_stop_send_beacons(rtllib);
3668 bFilterOutNonAssociatedBSSID = false;
3669 rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_CECHK_BSSID,
3670 (u8 *)(&bFilterOutNonAssociatedBSSID));
3671 notify_wx_assoc_event(rtllib);
3675 void rtllib_MlmeDisassociateRequest(struct rtllib_device *rtllib, u8 *asSta,
3676 u8 asRsn)
3678 u8 i;
3679 u8 OpMode;
3681 RemovePeerTS(rtllib, asSta);
3684 if (memcpy(rtllib->current_network.bssid, asSta, 6) == NULL) {
3685 rtllib->state = RTLLIB_NOLINK;
3687 for (i = 0; i < 6; i++)
3688 rtllib->current_network.bssid[i] = 0x22;
3689 OpMode = RT_OP_MODE_NO_LINK;
3690 rtllib->OpMode = RT_OP_MODE_NO_LINK;
3691 rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_MEDIA_STATUS,
3692 (u8 *)(&OpMode));
3693 rtllib_disassociate(rtllib);
3695 rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_BSSID,
3696 rtllib->current_network.bssid);
3702 void
3703 rtllib_MgntDisconnectAP(
3704 struct rtllib_device *rtllib,
3705 u8 asRsn
3708 bool bFilterOutNonAssociatedBSSID = false;
3710 bFilterOutNonAssociatedBSSID = false;
3711 rtllib->SetHwRegHandler(rtllib->dev, HW_VAR_CECHK_BSSID,
3712 (u8 *)(&bFilterOutNonAssociatedBSSID));
3713 rtllib_MlmeDisassociateRequest(rtllib, rtllib->current_network.bssid,
3714 asRsn);
3716 rtllib->state = RTLLIB_NOLINK;
3719 bool rtllib_MgntDisconnect(struct rtllib_device *rtllib, u8 asRsn)
3721 if (rtllib->ps != RTLLIB_PS_DISABLED)
3722 rtllib->sta_wake_up(rtllib->dev);
3724 if (rtllib->state == RTLLIB_LINKED) {
3725 if (rtllib->iw_mode == IW_MODE_ADHOC)
3726 rtllib_MgntDisconnectIBSS(rtllib);
3727 if (rtllib->iw_mode == IW_MODE_INFRA)
3728 rtllib_MgntDisconnectAP(rtllib, asRsn);
3732 return true;
3734 EXPORT_SYMBOL(rtllib_MgntDisconnect);
3736 void notify_wx_assoc_event(struct rtllib_device *ieee)
3738 union iwreq_data wrqu;
3740 if (ieee->cannot_notify)
3741 return;
3743 wrqu.ap_addr.sa_family = ARPHRD_ETHER;
3744 if (ieee->state == RTLLIB_LINKED)
3745 memcpy(wrqu.ap_addr.sa_data, ieee->current_network.bssid,
3746 ETH_ALEN);
3747 else {
3749 printk(KERN_INFO "%s(): Tell user space disconnected\n",
3750 __func__);
3751 memset(wrqu.ap_addr.sa_data, 0, ETH_ALEN);
3753 wireless_send_event(ieee->dev, SIOCGIWAP, &wrqu, NULL);
3755 EXPORT_SYMBOL(notify_wx_assoc_event);