Fix common misspellings
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / drivers / staging / rtl8187se / ieee80211 / ieee80211_softmac.c
CommitLineData
c8d86be3
GKH
1/* IEEE 802.11 SoftMAC layer
2 * Copyright (c) 2005 Andrea Merello <andreamrl@tiscali.it>
3 *
4 * Mostly extracted from the rtl8180-sa2400 driver for the
5 * in-kernel generic ieee802.11 stack.
6 *
7 * Few lines might be stolen from other part of the ieee80211
8 * stack. Copyright who own it's copyright
9 *
10 * WPA code stolen from the ipw2200 driver.
11 * Copyright who own it's copyright.
12 *
13 * released under the GPL
14 */
15
16
17#include "ieee80211.h"
18
19#include <linux/random.h>
20#include <linux/delay.h>
5a0e3ad6 21#include <linux/slab.h>
c8d86be3
GKH
22#include <linux/version.h>
23#include <asm/uaccess.h>
24
c8d86be3 25#include "dot11d.h"
c8d86be3
GKH
26u8 rsn_authen_cipher_suite[16][4] = {
27 {0x00,0x0F,0xAC,0x00}, //Use group key, //Reserved
28 {0x00,0x0F,0xAC,0x01}, //WEP-40 //RSNA default
29 {0x00,0x0F,0xAC,0x02}, //TKIP //NONE //{used just as default}
30 {0x00,0x0F,0xAC,0x03}, //WRAP-historical
31 {0x00,0x0F,0xAC,0x04}, //CCMP
32 {0x00,0x0F,0xAC,0x05}, //WEP-104
33};
34
35short ieee80211_is_54g(struct ieee80211_network net)
36{
37 return ((net.rates_ex_len > 0) || (net.rates_len > 4));
38}
39
40short ieee80211_is_shortslot(struct ieee80211_network net)
41{
42 return (net.capability & WLAN_CAPABILITY_SHORT_SLOT);
43}
44
45/* returns the total length needed for pleacing the RATE MFIE
46 * tag and the EXTENDED RATE MFIE tag if needed.
47 * It encludes two bytes per tag for the tag itself and its len
48 */
49unsigned int ieee80211_MFIE_rate_len(struct ieee80211_device *ieee)
50{
51 unsigned int rate_len = 0;
52
53 if (ieee->modulation & IEEE80211_CCK_MODULATION)
54 rate_len = IEEE80211_CCK_RATE_LEN + 2;
55
56 if (ieee->modulation & IEEE80211_OFDM_MODULATION)
57
58 rate_len += IEEE80211_OFDM_RATE_LEN + 2;
59
60 return rate_len;
61}
62
63/* pleace the MFIE rate, tag to the memory (double) poined.
64 * Then it updates the pointer so that
65 * it points after the new MFIE tag added.
66 */
67void ieee80211_MFIE_Brate(struct ieee80211_device *ieee, u8 **tag_p)
68{
69 u8 *tag = *tag_p;
70
71 if (ieee->modulation & IEEE80211_CCK_MODULATION){
72 *tag++ = MFIE_TYPE_RATES;
73 *tag++ = 4;
74 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_CCK_RATE_1MB;
75 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_CCK_RATE_2MB;
76 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_CCK_RATE_5MB;
77 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_CCK_RATE_11MB;
78 }
79
80 /* We may add an option for custom rates that specific HW might support */
81 *tag_p = tag;
82}
83
84void ieee80211_MFIE_Grate(struct ieee80211_device *ieee, u8 **tag_p)
85{
86 u8 *tag = *tag_p;
87
88 if (ieee->modulation & IEEE80211_OFDM_MODULATION){
89
90 *tag++ = MFIE_TYPE_RATES_EX;
91 *tag++ = 8;
92 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_6MB;
93 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_9MB;
94 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_12MB;
95 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_18MB;
96 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_24MB;
97 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_36MB;
98 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_48MB;
99 *tag++ = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_54MB;
100
101 }
102
103 /* We may add an option for custom rates that specific HW might support */
104 *tag_p = tag;
105}
106
107
108void ieee80211_WMM_Info(struct ieee80211_device *ieee, u8 **tag_p) {
109 u8 *tag = *tag_p;
110
111 *tag++ = MFIE_TYPE_GENERIC; //0
112 *tag++ = 7;
113 *tag++ = 0x00;
114 *tag++ = 0x50;
115 *tag++ = 0xf2;
116 *tag++ = 0x02;//5
117 *tag++ = 0x00;
118 *tag++ = 0x01;
119#ifdef SUPPORT_USPD
120 if(ieee->current_network.wmm_info & 0x80) {
121 *tag++ = 0x0f|MAX_SP_Len;
122 } else {
123 *tag++ = MAX_SP_Len;
124 }
125#else
126 *tag++ = MAX_SP_Len;
127#endif
128 *tag_p = tag;
129}
130
c8d86be3
GKH
131void ieee80211_TURBO_Info(struct ieee80211_device *ieee, u8 **tag_p) {
132 u8 *tag = *tag_p;
133
134 *tag++ = MFIE_TYPE_GENERIC; //0
135 *tag++ = 7;
136 *tag++ = 0x00;
137 *tag++ = 0xe0;
138 *tag++ = 0x4c;
139 *tag++ = 0x01;//5
140 *tag++ = 0x02;
141 *tag++ = 0x11;
142 *tag++ = 0x00;
143
144 *tag_p = tag;
145 printk(KERN_ALERT "This is enable turbo mode IE process\n");
146}
c8d86be3
GKH
147
148void enqueue_mgmt(struct ieee80211_device *ieee, struct sk_buff *skb)
149{
150 int nh;
151 nh = (ieee->mgmt_queue_head +1) % MGMT_QUEUE_NUM;
152
153/*
154 * if the queue is full but we have newer frames then
155 * just overwrites the oldest.
156 *
157 * if (nh == ieee->mgmt_queue_tail)
158 * return -1;
159 */
160 ieee->mgmt_queue_head = nh;
161 ieee->mgmt_queue_ring[nh] = skb;
162
163 //return 0;
164}
165
166struct sk_buff *dequeue_mgmt(struct ieee80211_device *ieee)
167{
168 struct sk_buff *ret;
169
170 if(ieee->mgmt_queue_tail == ieee->mgmt_queue_head)
171 return NULL;
172
173 ret = ieee->mgmt_queue_ring[ieee->mgmt_queue_tail];
174
175 ieee->mgmt_queue_tail =
176 (ieee->mgmt_queue_tail+1) % MGMT_QUEUE_NUM;
177
178 return ret;
179}
180
181void init_mgmt_queue(struct ieee80211_device *ieee)
182{
183 ieee->mgmt_queue_tail = ieee->mgmt_queue_head = 0;
184}
185
186
187void ieee80211_sta_wakeup(struct ieee80211_device *ieee, short nl);
188
189inline void softmac_mgmt_xmit(struct sk_buff *skb, struct ieee80211_device *ieee)
190{
191 unsigned long flags;
192 short single = ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE;
193 struct ieee80211_hdr_3addr *header=
194 (struct ieee80211_hdr_3addr *) skb->data;
195
196
197 spin_lock_irqsave(&ieee->lock, flags);
198
199 /* called with 2nd param 0, no mgmt lock required */
200 ieee80211_sta_wakeup(ieee,0);
201
202 if(single){
203 if(ieee->queue_stop){
204
205 enqueue_mgmt(ieee,skb);
206 }else{
b6b1ac69 207 header->seq_ctrl = cpu_to_le16(ieee->seq_ctrl[0]<<4);
c8d86be3
GKH
208
209 if (ieee->seq_ctrl[0] == 0xFFF)
210 ieee->seq_ctrl[0] = 0;
211 else
212 ieee->seq_ctrl[0]++;
213
214 /* avoid watchdog triggers */
215 ieee->dev->trans_start = jiffies;
216 ieee->softmac_data_hard_start_xmit(skb,ieee->dev,ieee->basic_rate);
217 }
218
219 spin_unlock_irqrestore(&ieee->lock, flags);
220 }else{
221 spin_unlock_irqrestore(&ieee->lock, flags);
222 spin_lock_irqsave(&ieee->mgmt_tx_lock, flags);
223
b6b1ac69 224 header->seq_ctrl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
c8d86be3
GKH
225
226 if (ieee->seq_ctrl[0] == 0xFFF)
227 ieee->seq_ctrl[0] = 0;
228 else
229 ieee->seq_ctrl[0]++;
230
231 /* avoid watchdog triggers */
232 ieee->dev->trans_start = jiffies;
233 ieee->softmac_hard_start_xmit(skb,ieee->dev);
234
235 spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags);
236 }
237}
238
239
240inline void softmac_ps_mgmt_xmit(struct sk_buff *skb, struct ieee80211_device *ieee)
241{
242
243 short single = ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE;
244 struct ieee80211_hdr_3addr *header =
245 (struct ieee80211_hdr_3addr *) skb->data;
246
247
248 if(single){
249
b6b1ac69 250 header->seq_ctrl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
c8d86be3
GKH
251
252 if (ieee->seq_ctrl[0] == 0xFFF)
253 ieee->seq_ctrl[0] = 0;
254 else
255 ieee->seq_ctrl[0]++;
256
257 /* avoid watchdog triggers */
258 ieee->dev->trans_start = jiffies;
259 ieee->softmac_data_hard_start_xmit(skb,ieee->dev,ieee->basic_rate);
260
261 }else{
262
b6b1ac69 263 header->seq_ctrl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
c8d86be3
GKH
264
265 if (ieee->seq_ctrl[0] == 0xFFF)
266 ieee->seq_ctrl[0] = 0;
267 else
268 ieee->seq_ctrl[0]++;
269
270 /* avoid watchdog triggers */
271 ieee->dev->trans_start = jiffies;
272 ieee->softmac_hard_start_xmit(skb,ieee->dev);
273
274 }
275// dev_kfree_skb_any(skb);//edit by thomas
276}
277//by amy for power save
278inline struct sk_buff *ieee80211_disassociate_skb(
279 struct ieee80211_network *beacon,
280 struct ieee80211_device *ieee,
281 u8 asRsn)
282{
283 struct sk_buff *skb;
284 struct ieee80211_disassoc_frame *disass;
285
286 skb = dev_alloc_skb(sizeof(struct ieee80211_disassoc_frame));
287 if (!skb)
288 return NULL;
289
290 disass = (struct ieee80211_disassoc_frame *) skb_put(skb,sizeof(struct ieee80211_disassoc_frame));
b6b1ac69 291 disass->header.frame_control = cpu_to_le16(IEEE80211_STYPE_DISASSOC);
c8d86be3
GKH
292 disass->header.duration_id = 0;
293
294 memcpy(disass->header.addr1, beacon->bssid, ETH_ALEN);
295 memcpy(disass->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
296 memcpy(disass->header.addr3, beacon->bssid, ETH_ALEN);
297
298 disass->reasoncode = asRsn;
299 return skb;
300}
301void
302SendDisassociation(
303 struct ieee80211_device *ieee,
304 u8* asSta,
305 u8 asRsn
306)
307{
308 struct ieee80211_network *beacon = &ieee->current_network;
309 struct sk_buff *skb;
310 skb = ieee80211_disassociate_skb(beacon,ieee,asRsn);
311 if (skb){
312 softmac_mgmt_xmit(skb, ieee);
313 //dev_kfree_skb_any(skb);//edit by thomas
314 }
315}
316
317//by amy for power save
318inline struct sk_buff *ieee80211_probe_req(struct ieee80211_device *ieee)
319{
320 unsigned int len,rate_len;
321 u8 *tag;
322 struct sk_buff *skb;
323 struct ieee80211_probe_request *req;
324
c8d86be3
GKH
325 len = ieee->current_network.ssid_len;
326
327 rate_len = ieee80211_MFIE_rate_len(ieee);
328
c8d86be3
GKH
329 skb = dev_alloc_skb(sizeof(struct ieee80211_probe_request) +
330 2 + len + rate_len);
c8d86be3
GKH
331 if (!skb)
332 return NULL;
333
334 req = (struct ieee80211_probe_request *) skb_put(skb,sizeof(struct ieee80211_probe_request));
335 req->header.frame_ctl = cpu_to_le16(IEEE80211_STYPE_PROBE_REQ);
336 req->header.duration_id = 0; //FIXME: is this OK ?
337
338 memset(req->header.addr1, 0xff, ETH_ALEN);
339 memcpy(req->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
340 memset(req->header.addr3, 0xff, ETH_ALEN);
341
342 tag = (u8 *) skb_put(skb,len+2+rate_len);
343
344 *tag++ = MFIE_TYPE_SSID;
345 *tag++ = len;
346 memcpy(tag, ieee->current_network.ssid, len);
347 tag += len;
348 ieee80211_MFIE_Brate(ieee,&tag);
349 ieee80211_MFIE_Grate(ieee,&tag);
350
c8d86be3
GKH
351 return skb;
352}
353
354struct sk_buff *ieee80211_get_beacon_(struct ieee80211_device *ieee);
355
c8d86be3
GKH
356void ext_ieee80211_send_beacon_wq(struct ieee80211_device *ieee)
357{
c8d86be3
GKH
358 struct sk_buff *skb;
359
360 //unsigned long flags;
361
362 skb = ieee80211_get_beacon_(ieee);
363
364 if (skb){
365 softmac_mgmt_xmit(skb, ieee);
366 ieee->softmac_stats.tx_beacons++;
367 dev_kfree_skb_any(skb);//edit by thomas
368 }
369
370
371 //printk(KERN_WARNING "[1] beacon sending!\n");
372 ieee->beacon_timer.expires = jiffies +
373 (MSECS( ieee->current_network.beacon_interval -5));
374
375 //spin_lock_irqsave(&ieee->beacon_lock,flags);
376 if(ieee->beacon_txing)
377 add_timer(&ieee->beacon_timer);
378 //spin_unlock_irqrestore(&ieee->beacon_lock,flags);
379}
380
381void ieee80211_send_beacon(struct ieee80211_device *ieee)
382{
383 struct sk_buff *skb;
384
385 //unsigned long flags;
386
387 skb = ieee80211_get_beacon_(ieee);
388
389 if (skb){
390 softmac_mgmt_xmit(skb, ieee);
391 ieee->softmac_stats.tx_beacons++;
392 dev_kfree_skb_any(skb);//edit by thomas
393 }
394
395 //printk(KERN_WARNING "[1] beacon sending!\n");
396 ieee->beacon_timer.expires = jiffies +
397 (MSECS( ieee->current_network.beacon_interval -5));
398
399 //spin_lock_irqsave(&ieee->beacon_lock,flags);
400 if(ieee->beacon_txing)
401 add_timer(&ieee->beacon_timer);
402 //spin_unlock_irqrestore(&ieee->beacon_lock,flags);
403}
404
405
406void ieee80211_send_beacon_cb(unsigned long _ieee)
407{
408 struct ieee80211_device *ieee =
409 (struct ieee80211_device *) _ieee;
410 unsigned long flags;
411
412 spin_lock_irqsave(&ieee->beacon_lock, flags);
413 ieee80211_send_beacon(ieee);
414 spin_unlock_irqrestore(&ieee->beacon_lock, flags);
415}
416
c8d86be3
GKH
417void ieee80211_send_probe(struct ieee80211_device *ieee)
418{
419 struct sk_buff *skb;
420
c8d86be3
GKH
421 skb = ieee80211_probe_req(ieee);
422 if (skb){
423 softmac_mgmt_xmit(skb, ieee);
424 ieee->softmac_stats.tx_probe_rq++;
425 //dev_kfree_skb_any(skb);//edit by thomas
426 }
427}
428
429void ieee80211_send_probe_requests(struct ieee80211_device *ieee)
430{
431 if (ieee->active_scan && (ieee->softmac_features & IEEE_SOFTMAC_PROBERQ)){
432 ieee80211_send_probe(ieee);
433 ieee80211_send_probe(ieee);
434 }
435}
436
437/* this performs syncro scan blocking the caller until all channels
438 * in the allowed channel map has been checked.
439 */
440void ieee80211_softmac_scan_syncro(struct ieee80211_device *ieee)
441{
442 short ch = 0;
c8d86be3
GKH
443 u8 channel_map[MAX_CHANNEL_NUMBER+1];
444 memcpy(channel_map, GET_DOT11D_INFO(ieee)->channel_map, MAX_CHANNEL_NUMBER+1);
c8d86be3
GKH
445 down(&ieee->scan_sem);
446// printk("==================> Sync scan\n");
c8d86be3
GKH
447
448 while(1)
449 {
450
451 do{
452 ch++;
453 if (ch > MAX_CHANNEL_NUMBER)
454 goto out; /* scan completed */
455
c8d86be3 456 }while(!channel_map[ch]);
39831861 457 /* this function can be called in two situations
c8d86be3
GKH
458 * 1- We have switched to ad-hoc mode and we are
459 * performing a complete syncro scan before conclude
460 * there are no interesting cell and to create a
461 * new one. In this case the link state is
462 * IEEE80211_NOLINK until we found an interesting cell.
463 * If so the ieee8021_new_net, called by the RX path
464 * will set the state to IEEE80211_LINKED, so we stop
465 * scanning
466 * 2- We are linked and the root uses run iwlist scan.
467 * So we switch to IEEE80211_LINKED_SCANNING to remember
468 * that we are still logically linked (not interested in
469 * new network events, despite for updating the net list,
470 * but we are temporarly 'unlinked' as the driver shall
471 * not filter RX frames and the channel is changing.
472 * So the only situation in witch are interested is to check
473 * if the state become LINKED because of the #1 situation
474 */
475
476 if (ieee->state == IEEE80211_LINKED)
477 goto out;
478
479 ieee->set_chan(ieee->dev, ch);
480// printk("=====>channel=%d ",ch);
c8d86be3 481 if(channel_map[ch] == 1)
c8d86be3
GKH
482 {
483// printk("====send probe request\n");
484 ieee80211_send_probe_requests(ieee);
485 }
486 /* this prevent excessive time wait when we
487 * need to wait for a syncro scan to end..
488 */
489 if (ieee->sync_scan_hurryup)
490 goto out;
491
492
493 msleep_interruptible_rtl(IEEE80211_SOFTMAC_SCAN_TIME);
494
495 }
496out:
497 ieee->sync_scan_hurryup = 0;
498 up(&ieee->scan_sem);
c8d86be3
GKH
499 if(IS_DOT11D_ENABLE(ieee))
500 DOT11D_ScanComplete(ieee);
c8d86be3
GKH
501}
502
503void ieee80211_softmac_ips_scan_syncro(struct ieee80211_device *ieee)
504{
505 int ch;
506 unsigned int watch_dog = 0;
c8d86be3
GKH
507 u8 channel_map[MAX_CHANNEL_NUMBER+1];
508 memcpy(channel_map, GET_DOT11D_INFO(ieee)->channel_map, MAX_CHANNEL_NUMBER+1);
c8d86be3
GKH
509 down(&ieee->scan_sem);
510 ch = ieee->current_network.channel;
511// if(ieee->sync_scan_hurryup)
512// {
513
514// printk("stop scan sync\n");
515// goto out;
516// }
517// printk("=======hh===============>ips scan\n");
518 while(1)
519 {
39831861 520 /* this function can be called in two situations
c8d86be3
GKH
521 * 1- We have switched to ad-hoc mode and we are
522 * performing a complete syncro scan before conclude
523 * there are no interesting cell and to create a
524 * new one. In this case the link state is
525 * IEEE80211_NOLINK until we found an interesting cell.
526 * If so the ieee8021_new_net, called by the RX path
527 * will set the state to IEEE80211_LINKED, so we stop
528 * scanning
529 * 2- We are linked and the root uses run iwlist scan.
530 * So we switch to IEEE80211_LINKED_SCANNING to remember
531 * that we are still logically linked (not interested in
532 * new network events, despite for updating the net list,
533 * but we are temporarly 'unlinked' as the driver shall
534 * not filter RX frames and the channel is changing.
535 * So the only situation in witch are interested is to check
536 * if the state become LINKED because of the #1 situation
537 */
538 if (ieee->state == IEEE80211_LINKED)
539 {
540 goto out;
541 }
c8d86be3 542 if(channel_map[ieee->current_network.channel] > 0)
c8d86be3
GKH
543 {
544 ieee->set_chan(ieee->dev, ieee->current_network.channel);
545// printk("======>channel=%d ",ieee->current_network.channel);
546 }
c8d86be3 547 if(channel_map[ieee->current_network.channel] == 1)
c8d86be3
GKH
548 {
549// printk("====send probe request\n");
550 ieee80211_send_probe_requests(ieee);
551 }
552 /* this prevent excessive time wait when we
553 * need to wait for a syncro scan to end..
554 */
555// if (ieee->sync_scan_hurryup)
556// goto out;
557
558 msleep_interruptible_rtl(IEEE80211_SOFTMAC_SCAN_TIME);
559
560 do{
561 if (watch_dog++ >= MAX_CHANNEL_NUMBER)
562 // if (++watch_dog >= 15);//MAX_CHANNEL_NUMBER) //YJ,modified,080630
563 goto out; /* scan completed */
564
565 ieee->current_network.channel = (ieee->current_network.channel + 1)%MAX_CHANNEL_NUMBER;
c8d86be3 566 }while(!channel_map[ieee->current_network.channel]);
c8d86be3
GKH
567 }
568out:
569 //ieee->sync_scan_hurryup = 0;
570 //ieee->set_chan(ieee->dev, ch);
571 //ieee->current_network.channel = ch;
572 ieee->actscanning = false;
573 up(&ieee->scan_sem);
c8d86be3
GKH
574 if(IS_DOT11D_ENABLE(ieee))
575 DOT11D_ScanComplete(ieee);
c8d86be3
GKH
576}
577
c8d86be3
GKH
578void ieee80211_softmac_scan_wq(struct work_struct *work)
579{
bf6aede7 580 struct delayed_work *dwork = to_delayed_work(work);
c8d86be3 581 struct ieee80211_device *ieee = container_of(dwork, struct ieee80211_device, softmac_scan_wq);
c8d86be3 582 static short watchdog = 0;
c8d86be3
GKH
583 u8 channel_map[MAX_CHANNEL_NUMBER+1];
584 memcpy(channel_map, GET_DOT11D_INFO(ieee)->channel_map, MAX_CHANNEL_NUMBER+1);
c8d86be3 585// printk("ieee80211_softmac_scan_wq ENABLE_IPS\n");
d599edca 586// printk("in %s\n",__func__);
c8d86be3
GKH
587 down(&ieee->scan_sem);
588
589 do{
590 ieee->current_network.channel =
591 (ieee->current_network.channel + 1) % MAX_CHANNEL_NUMBER;
592 if (watchdog++ > MAX_CHANNEL_NUMBER)
593 goto out; /* no good chans */
594
c8d86be3 595 }while(!channel_map[ieee->current_network.channel]);
c8d86be3
GKH
596
597 //printk("current_network.channel:%d\n", ieee->current_network.channel);
598 if (ieee->scanning == 0 )
599 {
600 printk("error out, scanning = 0\n");
601 goto out;
602 }
603 ieee->set_chan(ieee->dev, ieee->current_network.channel);
c8d86be3 604 if(channel_map[ieee->current_network.channel] == 1)
c8d86be3
GKH
605 ieee80211_send_probe_requests(ieee);
606
607 queue_delayed_work(ieee->wq, &ieee->softmac_scan_wq, IEEE80211_SOFTMAC_SCAN_TIME);
608 up(&ieee->scan_sem);
609 return;
610out:
611 ieee->actscanning = false;
612 watchdog = 0;
613 ieee->scanning = 0;
614 up(&ieee->scan_sem);
615
c8d86be3
GKH
616 if(IS_DOT11D_ENABLE(ieee))
617 DOT11D_ScanComplete(ieee);
c8d86be3
GKH
618 return;
619}
c8d86be3
GKH
620
621void ieee80211_beacons_start(struct ieee80211_device *ieee)
622{
623 unsigned long flags;
624
625 spin_lock_irqsave(&ieee->beacon_lock,flags);
626
627 ieee->beacon_txing = 1;
628 ieee80211_send_beacon(ieee);
629
630 spin_unlock_irqrestore(&ieee->beacon_lock,flags);
631}
632
633void ieee80211_beacons_stop(struct ieee80211_device *ieee)
634{
635 unsigned long flags;
636
637 spin_lock_irqsave(&ieee->beacon_lock,flags);
638
639 ieee->beacon_txing = 0;
640 del_timer_sync(&ieee->beacon_timer);
641
642 spin_unlock_irqrestore(&ieee->beacon_lock,flags);
643
644}
645
646
647void ieee80211_stop_send_beacons(struct ieee80211_device *ieee)
648{
649 if(ieee->stop_send_beacons)
650 ieee->stop_send_beacons(ieee->dev);
651 if (ieee->softmac_features & IEEE_SOFTMAC_BEACONS)
652 ieee80211_beacons_stop(ieee);
653}
654
655
656void ieee80211_start_send_beacons(struct ieee80211_device *ieee)
657{
658 if(ieee->start_send_beacons)
659 ieee->start_send_beacons(ieee->dev);
660 if(ieee->softmac_features & IEEE_SOFTMAC_BEACONS)
661 ieee80211_beacons_start(ieee);
662}
663
664
665void ieee80211_softmac_stop_scan(struct ieee80211_device *ieee)
666{
667// unsigned long flags;
668
669 //ieee->sync_scan_hurryup = 1;
670
671 down(&ieee->scan_sem);
672// spin_lock_irqsave(&ieee->lock, flags);
673
674 if (ieee->scanning == 1){
675 ieee->scanning = 0;
676 //del_timer_sync(&ieee->scan_timer);
677 cancel_delayed_work(&ieee->softmac_scan_wq);
678 }
679
680// spin_unlock_irqrestore(&ieee->lock, flags);
681 up(&ieee->scan_sem);
682}
683
684void ieee80211_stop_scan(struct ieee80211_device *ieee)
685{
686 if (ieee->softmac_features & IEEE_SOFTMAC_SCAN)
687 ieee80211_softmac_stop_scan(ieee);
688 else
689 ieee->stop_scan(ieee->dev);
690}
691
692/* called with ieee->lock held */
df574b8e 693void ieee80211_rtl_start_scan(struct ieee80211_device *ieee)
c8d86be3 694{
c8d86be3
GKH
695 if(IS_DOT11D_ENABLE(ieee) )
696 {
697 if(IS_COUNTRY_IE_VALID(ieee))
698 {
699 RESET_CIE_WATCHDOG(ieee);
700 }
701 }
c8d86be3
GKH
702 if (ieee->softmac_features & IEEE_SOFTMAC_SCAN){
703 if (ieee->scanning == 0)
704 {
705 ieee->scanning = 1;
706 //ieee80211_softmac_scan(ieee);
707 // queue_work(ieee->wq, &ieee->softmac_scan_wq);
708 //care this,1203,2007,by lawrence
709#if 1
710 queue_delayed_work(ieee->wq, &ieee->softmac_scan_wq,0);
711#endif
712 }
713 }else
714 ieee->start_scan(ieee->dev);
715
716}
717
718/* called with wx_sem held */
719void ieee80211_start_scan_syncro(struct ieee80211_device *ieee)
720{
c8d86be3
GKH
721 if(IS_DOT11D_ENABLE(ieee) )
722 {
723 if(IS_COUNTRY_IE_VALID(ieee))
724 {
725 RESET_CIE_WATCHDOG(ieee);
726 }
727 }
c8d86be3
GKH
728 ieee->sync_scan_hurryup = 0;
729
730 if (ieee->softmac_features & IEEE_SOFTMAC_SCAN)
731 ieee80211_softmac_scan_syncro(ieee);
732 else
733 ieee->scan_syncro(ieee->dev);
734
735}
736
737inline struct sk_buff *ieee80211_authentication_req(struct ieee80211_network *beacon,
738 struct ieee80211_device *ieee, int challengelen)
739{
740 struct sk_buff *skb;
741 struct ieee80211_authentication *auth;
742
743 skb = dev_alloc_skb(sizeof(struct ieee80211_authentication) + challengelen);
744
745 if (!skb) return NULL;
746
747 auth = (struct ieee80211_authentication *)
748 skb_put(skb, sizeof(struct ieee80211_authentication));
749
750 auth->header.frame_ctl = IEEE80211_STYPE_AUTH;
751 if (challengelen) auth->header.frame_ctl |= IEEE80211_FCTL_WEP;
752
753 auth->header.duration_id = 0x013a; //FIXME
754
755 memcpy(auth->header.addr1, beacon->bssid, ETH_ALEN);
756 memcpy(auth->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
757 memcpy(auth->header.addr3, beacon->bssid, ETH_ALEN);
758
759 auth->algorithm = ieee->open_wep ? WLAN_AUTH_OPEN : WLAN_AUTH_SHARED_KEY;
760
761 auth->transaction = cpu_to_le16(ieee->associate_seq);
762 ieee->associate_seq++;
763
764 auth->status = cpu_to_le16(WLAN_STATUS_SUCCESS);
765
766 return skb;
767
768}
769
770static struct sk_buff* ieee80211_probe_resp(struct ieee80211_device *ieee, u8 *dest)
771{
772 u8 *tag;
773 int beacon_size;
774 struct ieee80211_probe_response *beacon_buf;
775 struct sk_buff *skb;
776 int encrypt;
777 int atim_len,erp_len;
778 struct ieee80211_crypt_data* crypt;
779
780 char *ssid = ieee->current_network.ssid;
781 int ssid_len = ieee->current_network.ssid_len;
782 int rate_len = ieee->current_network.rates_len+2;
783 int rate_ex_len = ieee->current_network.rates_ex_len;
784 int wpa_ie_len = ieee->wpa_ie_len;
785 if(rate_ex_len > 0) rate_ex_len+=2;
786
787 if(ieee->current_network.capability & WLAN_CAPABILITY_IBSS)
788 atim_len = 4;
789 else
790 atim_len = 0;
791
792 if(ieee80211_is_54g(ieee->current_network))
793 erp_len = 3;
794 else
795 erp_len = 0;
796
797 beacon_size = sizeof(struct ieee80211_probe_response)+
798 ssid_len
799 +3 //channel
800 +rate_len
801 +rate_ex_len
802 +atim_len
803 +wpa_ie_len
804 +erp_len;
805
806 skb = dev_alloc_skb(beacon_size);
807
808 if (!skb)
809 return NULL;
810
811 beacon_buf = (struct ieee80211_probe_response*) skb_put(skb, beacon_size);
812
813 memcpy (beacon_buf->header.addr1, dest,ETH_ALEN);
814 memcpy (beacon_buf->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
815 memcpy (beacon_buf->header.addr3, ieee->current_network.bssid, ETH_ALEN);
816
817 beacon_buf->header.duration_id = 0; //FIXME
818 beacon_buf->beacon_interval =
819 cpu_to_le16(ieee->current_network.beacon_interval);
820 beacon_buf->capability =
821 cpu_to_le16(ieee->current_network.capability & WLAN_CAPABILITY_IBSS);
822
823 if(ieee->short_slot && (ieee->current_network.capability & WLAN_CAPABILITY_SHORT_SLOT))
824 cpu_to_le16((beacon_buf->capability |= WLAN_CAPABILITY_SHORT_SLOT));
825
826 crypt = ieee->crypt[ieee->tx_keyidx];
827
828 encrypt = ieee->host_encrypt && crypt && crypt->ops &&
829 ((0 == strcmp(crypt->ops->name, "WEP")) || wpa_ie_len);
830
831 if (encrypt)
832 beacon_buf->capability |= cpu_to_le16(WLAN_CAPABILITY_PRIVACY);
833
834
835 beacon_buf->header.frame_ctl = cpu_to_le16(IEEE80211_STYPE_PROBE_RESP);
836
837 beacon_buf->info_element.id = MFIE_TYPE_SSID;
838 beacon_buf->info_element.len = ssid_len;
839
840 tag = (u8*) beacon_buf->info_element.data;
841
842 memcpy(tag, ssid, ssid_len);
843
844 tag += ssid_len;
845
846 *(tag++) = MFIE_TYPE_RATES;
847 *(tag++) = rate_len-2;
848 memcpy(tag,ieee->current_network.rates,rate_len-2);
849 tag+=rate_len-2;
850
851 *(tag++) = MFIE_TYPE_DS_SET;
852 *(tag++) = 1;
853 *(tag++) = ieee->current_network.channel;
854
855 if(atim_len){
856 *(tag++) = MFIE_TYPE_IBSS_SET;
857 *(tag++) = 2;
858 *((u16*)(tag)) = cpu_to_le16(ieee->current_network.atim_window);
859 tag+=2;
860 }
861
862 if(erp_len){
863 *(tag++) = MFIE_TYPE_ERP;
864 *(tag++) = 1;
865 *(tag++) = 0;
866 }
867
868 if(rate_ex_len){
869 *(tag++) = MFIE_TYPE_RATES_EX;
870 *(tag++) = rate_ex_len-2;
871 memcpy(tag,ieee->current_network.rates_ex,rate_ex_len-2);
872 tag+=rate_ex_len-2;
873 }
874
875 if (wpa_ie_len)
876 {
877 if (ieee->iw_mode == IW_MODE_ADHOC)
878 {//as Windows will set pairwise key same as the group key which is not allowed in Linux, so set this for IOT issue. WB 2008.07.07
879 memcpy(&ieee->wpa_ie[14], &ieee->wpa_ie[8], 4);
880 }
881
882 memcpy(tag, ieee->wpa_ie, ieee->wpa_ie_len);
883 }
884
885 skb->dev = ieee->dev;
886 return skb;
887}
c8d86be3
GKH
888
889struct sk_buff* ieee80211_assoc_resp(struct ieee80211_device *ieee, u8 *dest)
890{
891 struct sk_buff *skb;
892 u8* tag;
893
894 struct ieee80211_crypt_data* crypt;
895 struct ieee80211_assoc_response_frame *assoc;
896 short encrypt;
897
898 unsigned int rate_len = ieee80211_MFIE_rate_len(ieee);
899 int len = sizeof(struct ieee80211_assoc_response_frame) + rate_len;
900
901 skb = dev_alloc_skb(len);
902
903 if (!skb)
904 return NULL;
905
906 assoc = (struct ieee80211_assoc_response_frame *)
907 skb_put(skb,sizeof(struct ieee80211_assoc_response_frame));
908
b6b1ac69 909 assoc->header.frame_control = cpu_to_le16(IEEE80211_STYPE_ASSOC_RESP);
c8d86be3
GKH
910 memcpy(assoc->header.addr1, dest,ETH_ALEN);
911 memcpy(assoc->header.addr3, ieee->dev->dev_addr, ETH_ALEN);
912 memcpy(assoc->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
913 assoc->capability = cpu_to_le16(ieee->iw_mode == IW_MODE_MASTER ?
914 WLAN_CAPABILITY_BSS : WLAN_CAPABILITY_IBSS);
915
916
917 if(ieee->short_slot)
918 assoc->capability |= cpu_to_le16(WLAN_CAPABILITY_SHORT_SLOT);
919
920 if (ieee->host_encrypt)
921 crypt = ieee->crypt[ieee->tx_keyidx];
922 else crypt = NULL;
923
924 encrypt = ( crypt && crypt->ops);
925
926 if (encrypt)
927 assoc->capability |= cpu_to_le16(WLAN_CAPABILITY_PRIVACY);
928
929 assoc->status = 0;
930 assoc->aid = cpu_to_le16(ieee->assoc_id);
931 if (ieee->assoc_id == 0x2007) ieee->assoc_id=0;
932 else ieee->assoc_id++;
933
934 tag = (u8*) skb_put(skb, rate_len);
935
936 ieee80211_MFIE_Brate(ieee, &tag);
937 ieee80211_MFIE_Grate(ieee, &tag);
938
939 return skb;
940}
941
942struct sk_buff* ieee80211_auth_resp(struct ieee80211_device *ieee,int status, u8 *dest)
943{
944 struct sk_buff *skb;
945 struct ieee80211_authentication *auth;
946
947 skb = dev_alloc_skb(sizeof(struct ieee80211_authentication)+1);
948
949 if (!skb)
950 return NULL;
951
952 skb->len = sizeof(struct ieee80211_authentication);
953
954 auth = (struct ieee80211_authentication *)skb->data;
955
956 auth->status = cpu_to_le16(status);
957 auth->transaction = cpu_to_le16(2);
958 auth->algorithm = cpu_to_le16(WLAN_AUTH_OPEN);
959
c8d86be3 960 memcpy(auth->header.addr3, ieee->dev->dev_addr, ETH_ALEN);
c8d86be3
GKH
961 memcpy(auth->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
962 memcpy(auth->header.addr1, dest, ETH_ALEN);
963 auth->header.frame_ctl = cpu_to_le16(IEEE80211_STYPE_AUTH);
964 return skb;
965
966
967}
968
969struct sk_buff* ieee80211_null_func(struct ieee80211_device *ieee,short pwr)
970{
971 struct sk_buff *skb;
972 struct ieee80211_hdr_3addr* hdr;
973
974 skb = dev_alloc_skb(sizeof(struct ieee80211_hdr_3addr));
975
976 if (!skb)
977 return NULL;
978
979 hdr = (struct ieee80211_hdr_3addr*)skb_put(skb,sizeof(struct ieee80211_hdr_3addr));
980
981 memcpy(hdr->addr1, ieee->current_network.bssid, ETH_ALEN);
982 memcpy(hdr->addr2, ieee->dev->dev_addr, ETH_ALEN);
983 memcpy(hdr->addr3, ieee->current_network.bssid, ETH_ALEN);
984
b6b1ac69 985 hdr->frame_control = cpu_to_le16(IEEE80211_FTYPE_DATA |
c8d86be3
GKH
986 IEEE80211_STYPE_NULLFUNC | IEEE80211_FCTL_TODS |
987 (pwr ? IEEE80211_FCTL_PM:0));
988
989 return skb;
990
991
992}
993
994
995void ieee80211_resp_to_assoc_rq(struct ieee80211_device *ieee, u8* dest)
996{
997 struct sk_buff *buf = ieee80211_assoc_resp(ieee, dest);
998
999 if (buf){
1000 softmac_mgmt_xmit(buf, ieee);
1001 dev_kfree_skb_any(buf);//edit by thomas
1002 }
1003}
1004
1005
1006void ieee80211_resp_to_auth(struct ieee80211_device *ieee, int s, u8* dest)
1007{
1008 struct sk_buff *buf = ieee80211_auth_resp(ieee, s, dest);
1009
1010 if (buf){
1011 softmac_mgmt_xmit(buf, ieee);
1012 dev_kfree_skb_any(buf);//edit by thomas
1013 }
1014}
1015
1016
1017void ieee80211_resp_to_probe(struct ieee80211_device *ieee, u8 *dest)
1018{
1019
1020 struct sk_buff *buf = ieee80211_probe_resp(ieee, dest);
1021
1022 if (buf) {
1023 softmac_mgmt_xmit(buf, ieee);
1024 dev_kfree_skb_any(buf);//edit by thomas
1025 }
1026}
1027
1028
1029inline struct sk_buff *ieee80211_association_req(struct ieee80211_network *beacon,struct ieee80211_device *ieee)
1030{
1031 struct sk_buff *skb;
1032 //unsigned long flags;
1033
1034 struct ieee80211_assoc_request_frame *hdr;
1035 u8 *tag;
1036 //short info_addr = 0;
1037 //int i;
1038 //u16 suite_count = 0;
1039 //u8 suit_select = 0;
1040 unsigned int wpa_len = beacon->wpa_ie_len;
1041 //struct net_device *dev = ieee->dev;
1042 //union iwreq_data wrqu;
1043 //u8 *buff;
1044 //u8 *p;
1045#if 1
1046 // for testing purpose
1047 unsigned int rsn_len = beacon->rsn_ie_len;
1048#else
1049 unsigned int rsn_len = beacon->rsn_ie_len - 4;
1050#endif
1051 unsigned int rate_len = ieee80211_MFIE_rate_len(ieee);
1052 unsigned int wmm_info_len = beacon->QoS_Enable?9:0;
c8d86be3 1053 unsigned int turbo_info_len = beacon->Turbo_Enable?9:0;
c8d86be3
GKH
1054
1055 u8 encry_proto = ieee->wpax_type_notify & 0xff;
1056 //u8 pairwise_type = (ieee->wpax_type_notify >> 8) & 0xff;
1057 //u8 authen_type = (ieee->wpax_type_notify >> 16) & 0xff;
1058
1059 int len = 0;
1060
1061 //[0] Notify type of encryption: WPA/WPA2
1062 //[1] pair wise type
1063 //[2] authen type
1064 if(ieee->wpax_type_set) {
1065 if (IEEE_PROTO_WPA == encry_proto) {
1066 rsn_len = 0;
1067 } else if (IEEE_PROTO_RSN == encry_proto) {
1068 wpa_len = 0;
1069 }
1070 }
c8d86be3
GKH
1071 len = sizeof(struct ieee80211_assoc_request_frame)+
1072 + beacon->ssid_len//essid tagged val
1073 + rate_len//rates tagged val
1074 + wpa_len
1075 + rsn_len
1076 + wmm_info_len
1077 + turbo_info_len;
c8d86be3 1078
c8d86be3
GKH
1079 skb = dev_alloc_skb(len);
1080
1081 if (!skb)
1082 return NULL;
1083
1084 hdr = (struct ieee80211_assoc_request_frame *)
1085 skb_put(skb, sizeof(struct ieee80211_assoc_request_frame));
1086
1087
b6b1ac69 1088 hdr->header.frame_control = IEEE80211_STYPE_ASSOC_REQ;
c8d86be3
GKH
1089 hdr->header.duration_id= 37; //FIXME
1090 memcpy(hdr->header.addr1, beacon->bssid, ETH_ALEN);
1091 memcpy(hdr->header.addr2, ieee->dev->dev_addr, ETH_ALEN);
1092 memcpy(hdr->header.addr3, beacon->bssid, ETH_ALEN);
1093 memcpy(ieee->ap_mac_addr, beacon->bssid, ETH_ALEN);//for HW security, John
1094
1095 hdr->capability = cpu_to_le16(WLAN_CAPABILITY_BSS);
1096 if (beacon->capability & WLAN_CAPABILITY_PRIVACY )
1097 hdr->capability |= cpu_to_le16(WLAN_CAPABILITY_PRIVACY);
1098 if (beacon->capability & WLAN_CAPABILITY_SHORT_PREAMBLE)
1099 hdr->capability |= cpu_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE);
1100
1101 if(ieee->short_slot)
1102 hdr->capability |= cpu_to_le16(WLAN_CAPABILITY_SHORT_SLOT);
1103
c8d86be3
GKH
1104 hdr->listen_interval = 0xa; //FIXME
1105
1106 hdr->info_element.id = MFIE_TYPE_SSID;
1107
1108 hdr->info_element.len = beacon->ssid_len;
1109 tag = skb_put(skb, beacon->ssid_len);
1110 memcpy(tag, beacon->ssid, beacon->ssid_len);
1111
1112 tag = skb_put(skb, rate_len);
1113
1114 ieee80211_MFIE_Brate(ieee, &tag);
1115 ieee80211_MFIE_Grate(ieee, &tag);
1116
1117 //add rsn==0 condition for ap's mix security mode(wpa+wpa2), john2007.8.9
1118 //choose AES encryption as default algorithm while using mixed mode
c8d86be3 1119
c8d86be3
GKH
1120 tag = skb_put(skb,ieee->wpa_ie_len);
1121 memcpy(tag,ieee->wpa_ie,ieee->wpa_ie_len);
5521a513 1122
c8d86be3
GKH
1123 tag = skb_put(skb,wmm_info_len);
1124 if(wmm_info_len) {
1125 ieee80211_WMM_Info(ieee, &tag);
1126 }
c8d86be3
GKH
1127 tag = skb_put(skb,turbo_info_len);
1128 if(turbo_info_len) {
1129 ieee80211_TURBO_Info(ieee, &tag);
1130 }
c8d86be3 1131
c8d86be3
GKH
1132 return skb;
1133}
1134
1135void ieee80211_associate_abort(struct ieee80211_device *ieee)
1136{
1137
1138 unsigned long flags;
1139 spin_lock_irqsave(&ieee->lock, flags);
1140
1141 ieee->associate_seq++;
1142
1143 /* don't scan, and avoid to have the RX path possibily
1144 * try again to associate. Even do not react to AUTH or
1145 * ASSOC response. Just wait for the retry wq to be scheduled.
1146 * Here we will check if there are good nets to associate
1147 * with, so we retry or just get back to NO_LINK and scanning
1148 */
1149 if (ieee->state == IEEE80211_ASSOCIATING_AUTHENTICATING){
1150 IEEE80211_DEBUG_MGMT("Authentication failed\n");
1151 ieee->softmac_stats.no_auth_rs++;
1152 }else{
1153 IEEE80211_DEBUG_MGMT("Association failed\n");
1154 ieee->softmac_stats.no_ass_rs++;
1155 }
1156
1157 ieee->state = IEEE80211_ASSOCIATING_RETRY;
1158
1159 queue_delayed_work(ieee->wq, &ieee->associate_retry_wq,IEEE80211_SOFTMAC_ASSOC_RETRY_TIME);
1160
1161 spin_unlock_irqrestore(&ieee->lock, flags);
1162}
1163
1164void ieee80211_associate_abort_cb(unsigned long dev)
1165{
1166 ieee80211_associate_abort((struct ieee80211_device *) dev);
1167}
1168
1169
1170void ieee80211_associate_step1(struct ieee80211_device *ieee)
1171{
1172 struct ieee80211_network *beacon = &ieee->current_network;
1173 struct sk_buff *skb;
1174
1175 IEEE80211_DEBUG_MGMT("Stopping scan\n");
1176 ieee->softmac_stats.tx_auth_rq++;
1177 skb=ieee80211_authentication_req(beacon, ieee, 0);
c8d86be3
GKH
1178 if (!skb){
1179
1180 ieee80211_associate_abort(ieee);
1181 }
1182 else{
1183 ieee->state = IEEE80211_ASSOCIATING_AUTHENTICATING ;
1184 IEEE80211_DEBUG_MGMT("Sending authentication request\n");
1185 //printk("---Sending authentication request\n");
1186 softmac_mgmt_xmit(skb, ieee);
1187 //BUGON when you try to add_timer twice, using mod_timer may be better, john0709
1188 if(!timer_pending(&ieee->associate_timer)){
1189 ieee->associate_timer.expires = jiffies + (HZ / 2);
1190 add_timer(&ieee->associate_timer);
1191 }
1192 //If call dev_kfree_skb_any,a warning will ocur....
1193 //KERNEL: assertion (!atomic_read(&skb->users)) failed at net/core/dev.c (1708)
1194 //So ... 1204 by lawrence.
d599edca 1195 //printk("\nIn %s,line %d call kfree skb.",__func__,__LINE__);
c8d86be3
GKH
1196 //dev_kfree_skb_any(skb);//edit by thomas
1197 }
1198}
1199
df574b8e 1200void ieee80211_rtl_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen)
c8d86be3
GKH
1201{
1202 u8 *c;
1203 struct sk_buff *skb;
1204 struct ieee80211_network *beacon = &ieee->current_network;
1205// int hlen = sizeof(struct ieee80211_authentication);
1206 del_timer_sync(&ieee->associate_timer);
1207 ieee->associate_seq++;
1208 ieee->softmac_stats.tx_auth_rq++;
1209
1210 skb = ieee80211_authentication_req(beacon, ieee, chlen+2);
1211 if (!skb)
1212 ieee80211_associate_abort(ieee);
1213 else{
1214 c = skb_put(skb, chlen+2);
1215 *(c++) = MFIE_TYPE_CHALLENGE;
1216 *(c++) = chlen;
1217 memcpy(c, challenge, chlen);
1218
1219 IEEE80211_DEBUG_MGMT("Sending authentication challenge response\n");
1220
1221 ieee80211_encrypt_fragment(ieee, skb, sizeof(struct ieee80211_hdr_3addr ));
1222
1223 softmac_mgmt_xmit(skb, ieee);
1224 if (!timer_pending(&ieee->associate_timer)){
1225 //printk("=========>add timer again, to crash\n");
1226 ieee->associate_timer.expires = jiffies + (HZ / 2);
1227 add_timer(&ieee->associate_timer);
1228 }
1229 dev_kfree_skb_any(skb);//edit by thomas
1230 }
1231 kfree(challenge);
1232}
1233
c8d86be3
GKH
1234void ieee80211_associate_step2(struct ieee80211_device *ieee)
1235{
1236 struct sk_buff* skb;
1237 struct ieee80211_network *beacon = &ieee->current_network;
1238
1239 del_timer_sync(&ieee->associate_timer);
1240
1241 IEEE80211_DEBUG_MGMT("Sending association request\n");
1242 ieee->softmac_stats.tx_ass_rq++;
1243 skb=ieee80211_association_req(beacon, ieee);
1244 if (!skb)
1245 ieee80211_associate_abort(ieee);
1246 else{
1247 softmac_mgmt_xmit(skb, ieee);
1248 if (!timer_pending(&ieee->associate_timer)){
1249 ieee->associate_timer.expires = jiffies + (HZ / 2);
1250 add_timer(&ieee->associate_timer);
1251 }
1252 //dev_kfree_skb_any(skb);//edit by thomas
1253 }
1254}
1255
c8d86be3
GKH
1256void ieee80211_associate_complete_wq(struct work_struct *work)
1257{
1258 struct ieee80211_device *ieee = container_of(work, struct ieee80211_device, associate_complete_wq);
0370453f 1259
c8d86be3
GKH
1260 printk(KERN_INFO "Associated successfully\n");
1261 if(ieee80211_is_54g(ieee->current_network) &&
1262 (ieee->modulation & IEEE80211_OFDM_MODULATION)){
1263
1264 ieee->rate = 540;
1265 printk(KERN_INFO"Using G rates\n");
1266 }else{
1267 ieee->rate = 110;
1268 printk(KERN_INFO"Using B rates\n");
1269 }
1270 ieee->link_change(ieee->dev);
1271 notify_wx_assoc_event(ieee);
1272 if (ieee->data_hard_resume)
1273 ieee->data_hard_resume(ieee->dev);
1274 netif_carrier_on(ieee->dev);
1275}
1276
1277void ieee80211_associate_complete(struct ieee80211_device *ieee)
1278{
1279 int i;
1280 del_timer_sync(&ieee->associate_timer);
1281
1282 for(i = 0; i < 6; i++) {
1283 //ieee->seq_ctrl[i] = 0;
1284 }
1285 ieee->state = IEEE80211_LINKED;
1286 IEEE80211_DEBUG_MGMT("Successfully associated\n");
1287
1288 queue_work(ieee->wq, &ieee->associate_complete_wq);
1289}
1290
c8d86be3
GKH
1291void ieee80211_associate_procedure_wq(struct work_struct *work)
1292{
1293 struct ieee80211_device *ieee = container_of(work, struct ieee80211_device, associate_procedure_wq);
0370453f 1294
c8d86be3
GKH
1295 ieee->sync_scan_hurryup = 1;
1296 down(&ieee->wx_sem);
1297
1298 if (ieee->data_hard_stop)
1299 ieee->data_hard_stop(ieee->dev);
1300
1301 ieee80211_stop_scan(ieee);
1302 ieee->set_chan(ieee->dev, ieee->current_network.channel);
1303
1304 ieee->associate_seq = 1;
1305 ieee80211_associate_step1(ieee);
1306
1307 up(&ieee->wx_sem);
1308}
c8d86be3
GKH
1309
1310inline void ieee80211_softmac_new_net(struct ieee80211_device *ieee, struct ieee80211_network *net)
1311{
1312 u8 tmp_ssid[IW_ESSID_MAX_SIZE+1];
1313 int tmp_ssid_len = 0;
1314
1315 short apset,ssidset,ssidbroad,apmatch,ssidmatch;
1316
1317 /* we are interested in new new only if we are not associated
1318 * and we are not associating / authenticating
1319 */
1320 if (ieee->state != IEEE80211_NOLINK)
1321 return;
1322
1323 if ((ieee->iw_mode == IW_MODE_INFRA) && !(net->capability & WLAN_CAPABILITY_BSS))
1324 return;
1325
1326 if ((ieee->iw_mode == IW_MODE_ADHOC) && !(net->capability & WLAN_CAPABILITY_IBSS))
1327 return;
1328
1329
1330 if (ieee->iw_mode == IW_MODE_INFRA || ieee->iw_mode == IW_MODE_ADHOC){
1331 /* if the user specified the AP MAC, we need also the essid
1332 * This could be obtained by beacons or, if the network does not
1333 * broadcast it, it can be put manually.
1334 */
1335 apset = ieee->wap_set;//(memcmp(ieee->current_network.bssid, zero,ETH_ALEN)!=0 );
1336 ssidset = ieee->ssid_set;//ieee->current_network.ssid[0] != '\0';
1337 ssidbroad = !(net->ssid_len == 0 || net->ssid[0]== '\0');
1338 apmatch = (memcmp(ieee->current_network.bssid, net->bssid, ETH_ALEN)==0);
1339
1340 if(ieee->current_network.ssid_len != net->ssid_len)
1341 ssidmatch = 0;
1342 else
1343 ssidmatch = (0==strncmp(ieee->current_network.ssid, net->ssid, net->ssid_len));
1344
1345 //printk("cur: %s, %d, net:%s, %d\n", ieee->current_network.ssid, ieee->current_network.ssid_len, net->ssid, net->ssid_len);
1346 //printk("apset=%d apmatch=%d ssidset=%d ssidbroad=%d ssidmatch=%d\n",apset,apmatch,ssidset,ssidbroad,ssidmatch);
1347
1348 if ( /* if the user set the AP check if match.
1349 * if the network does not broadcast essid we check the user supplyed ANY essid
1350 * if the network does broadcast and the user does not set essid it is OK
1351 * if the network does broadcast and the user did set essid chech if essid match
1352 */
1353 ( apset && apmatch &&
1354 ((ssidset && ssidbroad && ssidmatch) || (ssidbroad && !ssidset) || (!ssidbroad && ssidset)) ) ||
1355 /* if the ap is not set, check that the user set the bssid
1356 * and the network does bradcast and that those two bssid matches
1357 */
1358 (!apset && ssidset && ssidbroad && ssidmatch)
1359 ){
1360
1361
1362 /* if the essid is hidden replace it with the
1363 * essid provided by the user.
1364 */
1365 if (!ssidbroad){
1366 strncpy(tmp_ssid, ieee->current_network.ssid, IW_ESSID_MAX_SIZE);
1367 tmp_ssid_len = ieee->current_network.ssid_len;
1368 }
1369 memcpy(&ieee->current_network, net, sizeof(struct ieee80211_network));
1370
1371 if (!ssidbroad){
1372 strncpy(ieee->current_network.ssid, tmp_ssid, IW_ESSID_MAX_SIZE);
1373 ieee->current_network.ssid_len = tmp_ssid_len;
1374 }
1375 printk(KERN_INFO"Linking with %s: channel is %d\n",ieee->current_network.ssid,ieee->current_network.channel);
1376
1377 if (ieee->iw_mode == IW_MODE_INFRA){
1378 ieee->state = IEEE80211_ASSOCIATING;
1379 ieee->beinretry = false;
1380 queue_work(ieee->wq, &ieee->associate_procedure_wq);
1381 }else{
1382 if(ieee80211_is_54g(ieee->current_network) &&
1383 (ieee->modulation & IEEE80211_OFDM_MODULATION)){
1384 ieee->rate = 540;
1385 printk(KERN_INFO"Using G rates\n");
1386 }else{
1387 ieee->rate = 110;
1388 printk(KERN_INFO"Using B rates\n");
1389 }
1390 ieee->state = IEEE80211_LINKED;
1391 ieee->beinretry = false;
1392 }
1393
1394 }
1395 }
1396
1397}
1398
1399void ieee80211_softmac_check_all_nets(struct ieee80211_device *ieee)
1400{
1401 unsigned long flags;
1402 struct ieee80211_network *target;
1403
1404 spin_lock_irqsave(&ieee->lock, flags);
1405 list_for_each_entry(target, &ieee->network_list, list) {
1406
1407 /* if the state become different that NOLINK means
1408 * we had found what we are searching for
1409 */
1410
1411 if (ieee->state != IEEE80211_NOLINK)
1412 break;
1413
1414 if (ieee->scan_age == 0 || time_after(target->last_scanned + ieee->scan_age, jiffies))
1415 ieee80211_softmac_new_net(ieee, target);
1416 }
1417
1418 spin_unlock_irqrestore(&ieee->lock, flags);
1419
1420}
1421
1422
1423static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen)
1424{
1425 struct ieee80211_authentication *a;
1426 u8 *t;
1427 if (skb->len < (sizeof(struct ieee80211_authentication)-sizeof(struct ieee80211_info_element))){
1428 IEEE80211_DEBUG_MGMT("invalid len in auth resp: %d\n",skb->len);
1429 return 0xcafe;
1430 }
1431 *challenge = NULL;
1432 a = (struct ieee80211_authentication*) skb->data;
1433 if(skb->len > (sizeof(struct ieee80211_authentication) +3)){
1434 t = skb->data + sizeof(struct ieee80211_authentication);
1435
1436 if(*(t++) == MFIE_TYPE_CHALLENGE){
1437 *chlen = *(t++);
0875abf8
XW
1438 *challenge = kmemdup(t, *chlen, GFP_ATOMIC);
1439 if (!*challenge)
1440 return -ENOMEM;
c8d86be3
GKH
1441 }
1442 }
1443
1444 return cpu_to_le16(a->status);
1445
1446}
1447
1448
1449int auth_rq_parse(struct sk_buff *skb,u8* dest)
1450{
1451 struct ieee80211_authentication *a;
1452
1453 if (skb->len < (sizeof(struct ieee80211_authentication)-sizeof(struct ieee80211_info_element))){
1454 IEEE80211_DEBUG_MGMT("invalid len in auth request: %d\n",skb->len);
1455 return -1;
1456 }
1457 a = (struct ieee80211_authentication*) skb->data;
1458
1459 memcpy(dest,a->header.addr2, ETH_ALEN);
1460
1461 if (le16_to_cpu(a->algorithm) != WLAN_AUTH_OPEN)
1462 return WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG;
1463
1464 return WLAN_STATUS_SUCCESS;
1465}
1466
1467static short probe_rq_parse(struct ieee80211_device *ieee, struct sk_buff *skb, u8 *src)
1468{
1469 u8 *tag;
1470 u8 *skbend;
1471 u8 *ssid=NULL;
1472 u8 ssidlen = 0;
1473
1474 struct ieee80211_hdr_3addr *header =
1475 (struct ieee80211_hdr_3addr *) skb->data;
1476
1477 if (skb->len < sizeof (struct ieee80211_hdr_3addr ))
1478 return -1; /* corrupted */
1479
1480 memcpy(src,header->addr2, ETH_ALEN);
1481
1482 skbend = (u8*)skb->data + skb->len;
1483
1484 tag = skb->data + sizeof (struct ieee80211_hdr_3addr );
1485
1486 while (tag+1 < skbend){
1487 if (*tag == 0){
1488 ssid = tag+2;
1489 ssidlen = *(tag+1);
1490 break;
1491 }
1492 tag++; /* point to the len field */
1493 tag = tag + *(tag); /* point to the last data byte of the tag */
1494 tag++; /* point to the next tag */
1495 }
1496
1497 //IEEE80211DMESG("Card MAC address is "MACSTR, MAC2STR(src));
1498 if (ssidlen == 0) return 1;
1499
1500 if (!ssid) return 1; /* ssid not found in tagged param */
1501 return (!strncmp(ssid, ieee->current_network.ssid, ssidlen));
1502
1503}
1504
1505int assoc_rq_parse(struct sk_buff *skb,u8* dest)
1506{
1507 struct ieee80211_assoc_request_frame *a;
1508
1509 if (skb->len < (sizeof(struct ieee80211_assoc_request_frame) -
1510 sizeof(struct ieee80211_info_element))) {
1511
1512 IEEE80211_DEBUG_MGMT("invalid len in auth request:%d \n", skb->len);
1513 return -1;
1514 }
1515
1516 a = (struct ieee80211_assoc_request_frame*) skb->data;
1517
1518 memcpy(dest,a->header.addr2,ETH_ALEN);
1519
1520 return 0;
1521}
1522
1523static inline u16 assoc_parse(struct sk_buff *skb, int *aid)
1524{
1525 struct ieee80211_assoc_response_frame *a;
1526 if (skb->len < sizeof(struct ieee80211_assoc_response_frame)){
1527 IEEE80211_DEBUG_MGMT("invalid len in auth resp: %d\n", skb->len);
1528 return 0xcafe;
1529 }
1530
1531 a = (struct ieee80211_assoc_response_frame*) skb->data;
1532 *aid = le16_to_cpu(a->aid) & 0x3fff;
1533 return le16_to_cpu(a->status);
1534}
1535
1536static inline void
1537ieee80211_rx_probe_rq(struct ieee80211_device *ieee, struct sk_buff *skb)
1538{
1539 u8 dest[ETH_ALEN];
1540
1541 //IEEE80211DMESG("Rx probe");
1542 ieee->softmac_stats.rx_probe_rq++;
1543 //DMESG("Dest is "MACSTR, MAC2STR(dest));
1544 if (probe_rq_parse(ieee, skb, dest)){
1545 //IEEE80211DMESG("Was for me!");
1546 ieee->softmac_stats.tx_probe_rs++;
1547 ieee80211_resp_to_probe(ieee, dest);
1548 }
1549}
1550
1551inline void
1552ieee80211_rx_auth_rq(struct ieee80211_device *ieee, struct sk_buff *skb)
1553{
1554 u8 dest[ETH_ALEN];
1555 int status;
1556 //IEEE80211DMESG("Rx probe");
1557 ieee->softmac_stats.rx_auth_rq++;
1558
53756de3
JP
1559 status = auth_rq_parse(skb, dest);
1560 if (status != -1) {
c8d86be3
GKH
1561 ieee80211_resp_to_auth(ieee, status, dest);
1562 }
1563 //DMESG("Dest is "MACSTR, MAC2STR(dest));
1564
1565}
1566
1567 inline void
1568ieee80211_rx_assoc_rq(struct ieee80211_device *ieee, struct sk_buff *skb)
1569{
1570
1571 u8 dest[ETH_ALEN];
1572 //unsigned long flags;
1573
1574 ieee->softmac_stats.rx_ass_rq++;
1575 if (assoc_rq_parse(skb,dest) != -1){
1576 ieee80211_resp_to_assoc_rq(ieee, dest);
1577 }
1578
0ee9f67c 1579 printk(KERN_INFO"New client associated: %pM\n", dest);
c8d86be3
GKH
1580}
1581
1582
1583
1584void ieee80211_sta_ps_send_null_frame(struct ieee80211_device *ieee, short pwr)
1585{
1586
1587 struct sk_buff *buf = ieee80211_null_func(ieee, pwr);
1588
1589 if (buf)
1590 softmac_ps_mgmt_xmit(buf, ieee);
1591
1592}
1593
1594
1595short ieee80211_sta_ps_sleep(struct ieee80211_device *ieee, u32 *time_h, u32 *time_l)
1596{
c8d86be3 1597 int timeout = 0;
5521a513 1598
c8d86be3
GKH
1599 u8 dtim;
1600 /*if(ieee->ps == IEEE80211_PS_DISABLED ||
1601 ieee->iw_mode != IW_MODE_INFRA ||
1602 ieee->state != IEEE80211_LINKED)
1603
1604 return 0;
1605 */
1606 dtim = ieee->current_network.dtim_data;
1607 //printk("DTIM\n");
1608
1609 if(!(dtim & IEEE80211_DTIM_VALID))
1610 return 0;
1611 else
1612 timeout = ieee->current_network.beacon_interval;
1613
1614 //printk("VALID\n");
1615 ieee->current_network.dtim_data = IEEE80211_DTIM_INVALID;
1616
1617 if(dtim & ((IEEE80211_DTIM_UCAST | IEEE80211_DTIM_MBCAST)& ieee->ps))
1618 return 2;
1619
1620 if(!time_after(jiffies, ieee->dev->trans_start + MSECS(timeout)))
1621 return 0;
1622
1623 if(!time_after(jiffies, ieee->last_rx_ps_time + MSECS(timeout)))
1624 return 0;
1625
1626 if((ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE ) &&
1627 (ieee->mgmt_queue_tail != ieee->mgmt_queue_head))
1628 return 0;
5521a513 1629
c8d86be3
GKH
1630 if(time_l){
1631 *time_l = ieee->current_network.last_dtim_sta_time[0]
1632 + MSECS((ieee->current_network.beacon_interval));
1633 //* ieee->current_network.dtim_period));
1634 //printk("beacon_interval:%x, dtim_period:%x, totol to Msecs:%x, HZ:%x\n", ieee->current_network.beacon_interval, ieee->current_network.dtim_period, MSECS(((ieee->current_network.beacon_interval * ieee->current_network.dtim_period))), HZ);
1635 }
1636
c8d86be3
GKH
1637 if(time_h){
1638 *time_h = ieee->current_network.last_dtim_sta_time[1];
1639 if(time_l && *time_l < ieee->current_network.last_dtim_sta_time[0])
1640 *time_h += 1;
1641 }
1642
1643 return 1;
1644
1645
1646}
1647
1648inline void ieee80211_sta_ps(struct ieee80211_device *ieee)
1649{
1650
1651 u32 th,tl;
1652 short sleep;
1653
1654 unsigned long flags,flags2;
1655
1656 spin_lock_irqsave(&ieee->lock, flags);
1657
1658 if((ieee->ps == IEEE80211_PS_DISABLED ||
1659
1660 ieee->iw_mode != IW_MODE_INFRA ||
1661 ieee->state != IEEE80211_LINKED)){
1662
1663 //#warning CHECK_LOCK_HERE
1664 spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
1665
1666 ieee80211_sta_wakeup(ieee, 1);
1667
1668 spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
1669 }
1670
1671 sleep = ieee80211_sta_ps_sleep(ieee,&th, &tl);
d599edca 1672// printk("===>%s,%d[2 wake, 1 sleep, 0 do nothing], ieee->sta_sleep = %d\n",__func__, sleep,ieee->sta_sleep);
c8d86be3
GKH
1673 /* 2 wake, 1 sleep, 0 do nothing */
1674 if(sleep == 0)
1675 goto out;
1676
1677 if(sleep == 1){
1678
1679 if(ieee->sta_sleep == 1)
1680 ieee->enter_sleep_state(ieee->dev,th,tl);
1681
1682 else if(ieee->sta_sleep == 0){
1683 // printk("send null 1\n");
1684 spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
1685
1686 if(ieee->ps_is_queue_empty(ieee->dev)){
1687
1688
1689 ieee->sta_sleep = 2;
1690
1691 ieee->ps_request_tx_ack(ieee->dev);
1692
1693 ieee80211_sta_ps_send_null_frame(ieee,1);
1694
1695 ieee->ps_th = th;
1696 ieee->ps_tl = tl;
1697 }
1698 spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
1699
1700 }
1701
1702
1703 }else if(sleep == 2){
1704//#warning CHECK_LOCK_HERE
1705 spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
1706
1707 // printk("send wakeup packet\n");
1708 ieee80211_sta_wakeup(ieee,1);
1709
1710 spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
1711 }
1712
1713out:
1714 spin_unlock_irqrestore(&ieee->lock, flags);
1715
1716}
1717
1718void ieee80211_sta_wakeup(struct ieee80211_device *ieee, short nl)
1719{
1720 if(ieee->sta_sleep == 0){
1721 if(nl){
1722 // printk("Warning: driver is probably failing to report TX ps error\n");
1723 ieee->ps_request_tx_ack(ieee->dev);
1724 ieee80211_sta_ps_send_null_frame(ieee, 0);
1725 }
1726 return;
1727
1728 }
1729
1730 if(ieee->sta_sleep == 1)
1731 ieee->sta_wake_up(ieee->dev);
1732
1733 ieee->sta_sleep = 0;
1734
1735 if(nl){
1736 ieee->ps_request_tx_ack(ieee->dev);
1737 ieee80211_sta_ps_send_null_frame(ieee, 0);
1738 }
1739}
1740
1741void ieee80211_ps_tx_ack(struct ieee80211_device *ieee, short success)
1742{
1743 unsigned long flags,flags2;
1744
1745 spin_lock_irqsave(&ieee->lock, flags);
1746 if(ieee->sta_sleep == 2){
1747 /* Null frame with PS bit set */
1748 if(success){
1749
d599edca 1750 // printk("==================> %s::enter sleep state\n",__func__);
c8d86be3
GKH
1751 ieee->sta_sleep = 1;
1752 ieee->enter_sleep_state(ieee->dev,ieee->ps_th,ieee->ps_tl);
1753 }
1754 /* if the card report not success we can't be sure the AP
1755 * has not RXed so we can't assume the AP believe us awake
1756 */
1757 }
1758 /* 21112005 - tx again null without PS bit if lost */
1759 else {
1760
1761 if((ieee->sta_sleep == 0) && !success){
1762 spin_lock_irqsave(&ieee->mgmt_tx_lock, flags2);
1763 ieee80211_sta_ps_send_null_frame(ieee, 0);
1764 spin_unlock_irqrestore(&ieee->mgmt_tx_lock, flags2);
1765 }
1766 }
1767 spin_unlock_irqrestore(&ieee->lock, flags);
1768}
1769
1770inline int
1771ieee80211_rx_frame_softmac(struct ieee80211_device *ieee, struct sk_buff *skb,
1772 struct ieee80211_rx_stats *rx_stats, u16 type,
1773 u16 stype)
1774{
1775 struct ieee80211_hdr_3addr *header = (struct ieee80211_hdr_3addr *) skb->data;
1776 u16 errcode;
1777 u8* challenge=NULL;
1778 int chlen=0;
1779 int aid=0;
1780 struct ieee80211_assoc_response_frame *assoc_resp;
1781 struct ieee80211_info_element *info_element;
1782
1783 if(!ieee->proto_started)
1784 return 0;
1785
1786 if(ieee->sta_sleep || (ieee->ps != IEEE80211_PS_DISABLED &&
1787 ieee->iw_mode == IW_MODE_INFRA &&
1788 ieee->state == IEEE80211_LINKED))
1789
1790 tasklet_schedule(&ieee->ps_task);
1791
b6b1ac69
LF
1792 if (WLAN_FC_GET_STYPE(header->frame_control) != IEEE80211_STYPE_PROBE_RESP &&
1793 WLAN_FC_GET_STYPE(header->frame_control) != IEEE80211_STYPE_BEACON)
c8d86be3
GKH
1794 ieee->last_rx_ps_time = jiffies;
1795
b6b1ac69 1796 switch (WLAN_FC_GET_STYPE(header->frame_control)) {
c8d86be3
GKH
1797
1798 case IEEE80211_STYPE_ASSOC_RESP:
1799 case IEEE80211_STYPE_REASSOC_RESP:
1800
1801 IEEE80211_DEBUG_MGMT("received [RE]ASSOCIATION RESPONSE (%d)\n",
1802 WLAN_FC_GET_STYPE(header->frame_ctl));
1803 if ((ieee->softmac_features & IEEE_SOFTMAC_ASSOCIATE) &&
1804 ieee->state == IEEE80211_ASSOCIATING_AUTHENTICATED &&
1805 ieee->iw_mode == IW_MODE_INFRA){
1806 if (0 == (errcode=assoc_parse(skb, &aid))){
1807 u16 left;
1808
1809 ieee->state=IEEE80211_LINKED;
1810 ieee->assoc_id = aid;
1811 ieee->softmac_stats.rx_ass_ok++;
1812
1813 //printk(KERN_WARNING "nic_type = %s", (rx_stats->nic_type == 1)?"rtl8187":"rtl8187B");
1814 if(1 == rx_stats->nic_type) //card type is 8187
1815 {
1816 goto associate_complete;
1817 }
1818 assoc_resp = (struct ieee80211_assoc_response_frame*)skb->data;
1819 info_element = &assoc_resp->info_element;
1820 left = skb->len - ((void*)info_element - (void*)assoc_resp);
1821
1822 while (left >= sizeof(struct ieee80211_info_element_hdr)) {
1823 if (sizeof(struct ieee80211_info_element_hdr) + info_element->len > left) {
1824 printk(KERN_WARNING "[re]associate reeponse error!");
1825 return 1;
1826 }
1827 switch (info_element->id) {
1828 case MFIE_TYPE_GENERIC:
1829 IEEE80211_DEBUG_SCAN("MFIE_TYPE_GENERIC: %d bytes\n", info_element->len);
1830 if (info_element->len >= 8 &&
1831 info_element->data[0] == 0x00 &&
1832 info_element->data[1] == 0x50 &&
1833 info_element->data[2] == 0xf2 &&
1834 info_element->data[3] == 0x02 &&
1835 info_element->data[4] == 0x01) {
1836 // Not care about version at present.
1837 //WMM Parameter Element
1838 memcpy(ieee->current_network.wmm_param,(u8*)(info_element->data\
1839 + 8),(info_element->len - 8));
1840
1841 if (((ieee->current_network.wmm_info^info_element->data[6])& \
1842 0x0f)||(!ieee->init_wmmparam_flag)) {
bbc9a991 1843 // refresh parameter element for current network
c8d86be3
GKH
1844 // update the register parameter for hardware
1845 ieee->init_wmmparam_flag = 1;
1846 queue_work(ieee->wq, &ieee->wmm_param_update_wq);
1847
1848 }
1849 //update info_element for current network
1850 ieee->current_network.wmm_info = info_element->data[6];
1851 }
1852 break;
1853 default:
1854 //nothing to do at present!!!
1855 break;
1856 }
1857
1858 left -= sizeof(struct ieee80211_info_element_hdr) +
1859 info_element->len;
1860 info_element = (struct ieee80211_info_element *)
1861 &info_element->data[info_element->len];
1862 }
1863 if(!ieee->init_wmmparam_flag) //legacy AP, reset the AC_xx_param register
1864 {
1865 queue_work(ieee->wq,&ieee->wmm_param_update_wq);
1866 ieee->init_wmmparam_flag = 1;//indicate AC_xx_param upated since last associate
1867 }
1868associate_complete:
1869 ieee80211_associate_complete(ieee);
1870 }else{
1871 ieee->softmac_stats.rx_ass_err++;
1872 IEEE80211_DEBUG_MGMT(
1873 "Association response status code 0x%x\n",
1874 errcode);
1875 ieee80211_associate_abort(ieee);
1876 }
1877 }
c8d86be3
GKH
1878 break;
1879
1880 case IEEE80211_STYPE_ASSOC_REQ:
1881 case IEEE80211_STYPE_REASSOC_REQ:
1882
1883 if ((ieee->softmac_features & IEEE_SOFTMAC_ASSOCIATE) &&
1884 ieee->iw_mode == IW_MODE_MASTER)
1885
1886 ieee80211_rx_assoc_rq(ieee, skb);
c8d86be3
GKH
1887 break;
1888
1889 case IEEE80211_STYPE_AUTH:
1890
c8d86be3
GKH
1891 if (ieee->softmac_features & IEEE_SOFTMAC_ASSOCIATE){
1892 if (ieee->state == IEEE80211_ASSOCIATING_AUTHENTICATING &&
1893 ieee->iw_mode == IW_MODE_INFRA){
1894
1895 IEEE80211_DEBUG_MGMT("Received authentication response");
1896
1897 if (0 == (errcode=auth_parse(skb, &challenge, &chlen))){
1898 if(ieee->open_wep || !challenge){
1899 ieee->state = IEEE80211_ASSOCIATING_AUTHENTICATED;
1900 ieee->softmac_stats.rx_auth_rs_ok++;
1901
1902 ieee80211_associate_step2(ieee);
1903 }else{
df574b8e 1904 ieee80211_rtl_auth_challenge(ieee, challenge, chlen);
c8d86be3
GKH
1905 }
1906 }else{
1907 ieee->softmac_stats.rx_auth_rs_err++;
1908 IEEE80211_DEBUG_MGMT("Authentication respose status code 0x%x",errcode);
1909 ieee80211_associate_abort(ieee);
1910 }
1911
1912 }else if (ieee->iw_mode == IW_MODE_MASTER){
1913 ieee80211_rx_auth_rq(ieee, skb);
1914 }
1915 }
1916 break;
1917
1918 case IEEE80211_STYPE_PROBE_REQ:
1919
1920 if ((ieee->softmac_features & IEEE_SOFTMAC_PROBERS) &&
1921 ((ieee->iw_mode == IW_MODE_ADHOC ||
1922 ieee->iw_mode == IW_MODE_MASTER) &&
1923 ieee->state == IEEE80211_LINKED))
1924
1925 ieee80211_rx_probe_rq(ieee, skb);
1926 break;
1927
1928 case IEEE80211_STYPE_DISASSOC:
1929 case IEEE80211_STYPE_DEAUTH:
c8d86be3
GKH
1930 /* FIXME for now repeat all the association procedure
1931 * both for disassociation and deauthentication
1932 */
1933 if ((ieee->softmac_features & IEEE_SOFTMAC_ASSOCIATE) &&
1934 (ieee->state == IEEE80211_LINKED) &&
1935 (ieee->iw_mode == IW_MODE_INFRA) &&
1936 (!memcmp(header->addr2,ieee->current_network.bssid,ETH_ALEN))){
1937 ieee->state = IEEE80211_ASSOCIATING;
1938 ieee->softmac_stats.reassoc++;
1939
1940 //notify_wx_assoc_event(ieee); //YJ,del,080828, do not notify os here
1941 queue_work(ieee->wq, &ieee->associate_procedure_wq);
1942 }
1943
1944 break;
1945
1946 default:
1947 return -1;
1948 break;
1949 }
1950
1951 //dev_kfree_skb_any(skb);
1952 return 0;
1953}
1954
1955
1956
25985edc 1957/* following are for a simpler TX queue management.
c8d86be3
GKH
1958 * Instead of using netif_[stop/wake]_queue the driver
1959 * will uses these two function (plus a reset one), that
1960 * will internally uses the kernel netif_* and takes
1961 * care of the ieee802.11 fragmentation.
1962 * So the driver receives a fragment per time and might
1963 * call the stop function when it want without take care
bbc9a991 1964 * to have enough room to TX an entire packet.
c8d86be3
GKH
1965 * This might be useful if each fragment need it's own
1966 * descriptor, thus just keep a total free memory > than
bbc9a991 1967 * the max fragmentation threshold is not enough.. If the
c8d86be3
GKH
1968 * ieee802.11 stack passed a TXB struct then you needed
1969 * to keep N free descriptors where
1970 * N = MAX_PACKET_SIZE / MIN_FRAG_TRESHOLD
1971 * In this way you need just one and the 802.11 stack
1972 * will take care of buffering fragments and pass them to
1973 * to the driver later, when it wakes the queue.
1974 */
1975
1976void ieee80211_softmac_xmit(struct ieee80211_txb *txb, struct ieee80211_device *ieee)
1977{
1978
1979
1980 unsigned long flags;
1981 int i;
c8d86be3
GKH
1982
1983 spin_lock_irqsave(&ieee->lock,flags);
c8d86be3 1984
c8d86be3
GKH
1985 /* called with 2nd parm 0, no tx mgmt lock required */
1986 ieee80211_sta_wakeup(ieee,0);
1987
1988 for(i = 0; i < txb->nr_frags; i++) {
1989
1990 if (ieee->queue_stop){
1991 ieee->tx_pending.txb = txb;
1992 ieee->tx_pending.frag = i;
1993 goto exit;
1994 }else{
1995 ieee->softmac_data_hard_start_xmit(
1996 txb->fragments[i],
c8d86be3 1997 ieee->dev,ieee->rate);
c8d86be3
GKH
1998 //(i+1)<txb->nr_frags);
1999 ieee->stats.tx_packets++;
2000 ieee->stats.tx_bytes += txb->fragments[i]->len;
2001 ieee->dev->trans_start = jiffies;
2002 }
2003 }
2004
2005 ieee80211_txb_free(txb);
2006
2007 exit:
2008 spin_unlock_irqrestore(&ieee->lock,flags);
2009
2010}
2011
2012/* called with ieee->lock acquired */
2013void ieee80211_resume_tx(struct ieee80211_device *ieee)
2014{
2015 int i;
2016 for(i = ieee->tx_pending.frag; i < ieee->tx_pending.txb->nr_frags; i++) {
2017
2018 if (ieee->queue_stop){
2019 ieee->tx_pending.frag = i;
2020 return;
2021 }else{
2022
2023 ieee->softmac_data_hard_start_xmit(
2024 ieee->tx_pending.txb->fragments[i],
2025 ieee->dev,ieee->rate);
2026 //(i+1)<ieee->tx_pending.txb->nr_frags);
2027 ieee->stats.tx_packets++;
2028 ieee->dev->trans_start = jiffies;
2029 }
2030 }
2031
2032
2033 ieee80211_txb_free(ieee->tx_pending.txb);
2034 ieee->tx_pending.txb = NULL;
2035}
2036
2037
2038void ieee80211_reset_queue(struct ieee80211_device *ieee)
2039{
2040 unsigned long flags;
2041
2042 spin_lock_irqsave(&ieee->lock,flags);
2043 init_mgmt_queue(ieee);
2044 if (ieee->tx_pending.txb){
2045 ieee80211_txb_free(ieee->tx_pending.txb);
2046 ieee->tx_pending.txb = NULL;
2047 }
2048 ieee->queue_stop = 0;
2049 spin_unlock_irqrestore(&ieee->lock,flags);
2050
2051}
2052
df574b8e 2053void ieee80211_rtl_wake_queue(struct ieee80211_device *ieee)
c8d86be3
GKH
2054{
2055
2056 unsigned long flags;
2057 struct sk_buff *skb;
2058 struct ieee80211_hdr_3addr *header;
2059
2060 spin_lock_irqsave(&ieee->lock,flags);
2061 if (! ieee->queue_stop) goto exit;
2062
2063 ieee->queue_stop = 0;
2064
2065 if(ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE){
2066 while (!ieee->queue_stop && (skb = dequeue_mgmt(ieee))){
2067
2068 header = (struct ieee80211_hdr_3addr *) skb->data;
2069
b6b1ac69 2070 header->seq_ctrl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
c8d86be3
GKH
2071
2072 if (ieee->seq_ctrl[0] == 0xFFF)
2073 ieee->seq_ctrl[0] = 0;
2074 else
2075 ieee->seq_ctrl[0]++;
2076
2077 //printk(KERN_ALERT "ieee80211_wake_queue \n");
2078 ieee->softmac_data_hard_start_xmit(skb,ieee->dev,ieee->basic_rate);
2079 dev_kfree_skb_any(skb);//edit by thomas
2080 }
2081 }
2082 if (!ieee->queue_stop && ieee->tx_pending.txb)
2083 ieee80211_resume_tx(ieee);
2084
2085 if (!ieee->queue_stop && netif_queue_stopped(ieee->dev)){
2086 ieee->softmac_stats.swtxawake++;
2087 netif_wake_queue(ieee->dev);
2088 }
2089
2090exit :
2091 spin_unlock_irqrestore(&ieee->lock,flags);
2092}
2093
2094
df574b8e 2095void ieee80211_rtl_stop_queue(struct ieee80211_device *ieee)
c8d86be3
GKH
2096{
2097 //unsigned long flags;
2098 //spin_lock_irqsave(&ieee->lock,flags);
2099
2100 if (! netif_queue_stopped(ieee->dev)){
2101 netif_stop_queue(ieee->dev);
2102 ieee->softmac_stats.swtxstop++;
2103 }
2104 ieee->queue_stop = 1;
2105 //spin_unlock_irqrestore(&ieee->lock,flags);
2106
2107}
2108
2109
2110inline void ieee80211_randomize_cell(struct ieee80211_device *ieee)
2111{
2112
2113 get_random_bytes(ieee->current_network.bssid, ETH_ALEN);
2114
2115 /* an IBSS cell address must have the two less significant
2116 * bits of the first byte = 2
2117 */
2118 ieee->current_network.bssid[0] &= ~0x01;
2119 ieee->current_network.bssid[0] |= 0x02;
2120}
2121
2122/* called in user context only */
2123void ieee80211_start_master_bss(struct ieee80211_device *ieee)
2124{
2125 ieee->assoc_id = 1;
2126
2127 if (ieee->current_network.ssid_len == 0){
2128 strncpy(ieee->current_network.ssid,
2129 IEEE80211_DEFAULT_TX_ESSID,
2130 IW_ESSID_MAX_SIZE);
2131
2132 ieee->current_network.ssid_len = strlen(IEEE80211_DEFAULT_TX_ESSID);
2133 ieee->ssid_set = 1;
2134 }
2135
2136 memcpy(ieee->current_network.bssid, ieee->dev->dev_addr, ETH_ALEN);
2137
2138 ieee->set_chan(ieee->dev, ieee->current_network.channel);
2139 ieee->state = IEEE80211_LINKED;
2140 ieee->link_change(ieee->dev);
2141 notify_wx_assoc_event(ieee);
2142
2143 if (ieee->data_hard_resume)
2144 ieee->data_hard_resume(ieee->dev);
2145
2146 netif_carrier_on(ieee->dev);
2147}
2148
2149void ieee80211_start_monitor_mode(struct ieee80211_device *ieee)
2150{
2151 if(ieee->raw_tx){
2152
2153 if (ieee->data_hard_resume)
2154 ieee->data_hard_resume(ieee->dev);
2155
2156 netif_carrier_on(ieee->dev);
2157 }
2158}
0370453f 2159
c8d86be3
GKH
2160void ieee80211_start_ibss_wq(struct work_struct *work)
2161{
bf6aede7 2162 struct delayed_work *dwork = to_delayed_work(work);
c8d86be3 2163 struct ieee80211_device *ieee = container_of(dwork, struct ieee80211_device, start_ibss_wq);
c8d86be3
GKH
2164
2165 /* iwconfig mode ad-hoc will schedule this and return
2166 * on the other hand this will block further iwconfig SET
2167 * operations because of the wx_sem hold.
2168 * Anyway some most set operations set a flag to speed-up
2169 * (abort) this wq (when syncro scanning) before sleeping
2170 * on the semaphore
2171 */
2172
2173 down(&ieee->wx_sem);
2174
2175
2176 if (ieee->current_network.ssid_len == 0){
2177 strcpy(ieee->current_network.ssid,IEEE80211_DEFAULT_TX_ESSID);
2178 ieee->current_network.ssid_len = strlen(IEEE80211_DEFAULT_TX_ESSID);
2179 ieee->ssid_set = 1;
2180 }
2181
2182 /* check if we have this cell in our network list */
2183 ieee80211_softmac_check_all_nets(ieee);
2184
c8d86be3
GKH
2185 if(ieee->state == IEEE80211_NOLINK)
2186 ieee->current_network.channel = 10;
c8d86be3
GKH
2187 /* if not then the state is not linked. Maybe the user swithced to
2188 * ad-hoc mode just after being in monitor mode, or just after
2189 * being very few time in managed mode (so the card have had no
2190 * time to scan all the chans..) or we have just run up the iface
2191 * after setting ad-hoc mode. So we have to give another try..
2192 * Here, in ibss mode, should be safe to do this without extra care
2193 * (in bss mode we had to make sure no-one tryed to associate when
2194 * we had just checked the ieee->state and we was going to start the
2195 * scan) beacause in ibss mode the ieee80211_new_net function, when
2196 * finds a good net, just set the ieee->state to IEEE80211_LINKED,
2197 * so, at worst, we waste a bit of time to initiate an unneeded syncro
2198 * scan, that will stop at the first round because it sees the state
2199 * associated.
2200 */
2201 if (ieee->state == IEEE80211_NOLINK)
2202 ieee80211_start_scan_syncro(ieee);
2203
2204 /* the network definitively is not here.. create a new cell */
2205 if (ieee->state == IEEE80211_NOLINK){
2206 printk("creating new IBSS cell\n");
2207 if(!ieee->wap_set)
2208 ieee80211_randomize_cell(ieee);
2209
2210 if(ieee->modulation & IEEE80211_CCK_MODULATION){
2211
2212 ieee->current_network.rates_len = 4;
2213
2214 ieee->current_network.rates[0] = IEEE80211_BASIC_RATE_MASK | IEEE80211_CCK_RATE_1MB;
2215 ieee->current_network.rates[1] = IEEE80211_BASIC_RATE_MASK | IEEE80211_CCK_RATE_2MB;
2216 ieee->current_network.rates[2] = IEEE80211_BASIC_RATE_MASK | IEEE80211_CCK_RATE_5MB;
2217 ieee->current_network.rates[3] = IEEE80211_BASIC_RATE_MASK | IEEE80211_CCK_RATE_11MB;
2218
2219 }else
2220 ieee->current_network.rates_len = 0;
2221
2222 if(ieee->modulation & IEEE80211_OFDM_MODULATION){
2223 ieee->current_network.rates_ex_len = 8;
2224
2225 ieee->current_network.rates_ex[0] = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_6MB;
2226 ieee->current_network.rates_ex[1] = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_9MB;
2227 ieee->current_network.rates_ex[2] = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_12MB;
2228 ieee->current_network.rates_ex[3] = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_18MB;
2229 ieee->current_network.rates_ex[4] = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_24MB;
2230 ieee->current_network.rates_ex[5] = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_36MB;
2231 ieee->current_network.rates_ex[6] = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_48MB;
2232 ieee->current_network.rates_ex[7] = IEEE80211_BASIC_RATE_MASK | IEEE80211_OFDM_RATE_54MB;
2233
2234 ieee->rate = 540;
2235 }else{
2236 ieee->current_network.rates_ex_len = 0;
2237 ieee->rate = 110;
2238 }
2239
2240 // By default, WMM function will be disabled in IBSS mode
2241 ieee->current_network.QoS_Enable = 0;
2242
2243 ieee->current_network.atim_window = 0;
2244 ieee->current_network.capability = WLAN_CAPABILITY_IBSS;
2245 if(ieee->short_slot)
2246 ieee->current_network.capability |= WLAN_CAPABILITY_SHORT_SLOT;
2247
2248 }
2249
2250 ieee->state = IEEE80211_LINKED;
2251 ieee->set_chan(ieee->dev, ieee->current_network.channel);
2252 ieee->link_change(ieee->dev);
2253
2254 notify_wx_assoc_event(ieee);
2255
2256 ieee80211_start_send_beacons(ieee);
2257 printk(KERN_WARNING "after sending beacon packet!\n");
2258
2259 if (ieee->data_hard_resume)
2260 ieee->data_hard_resume(ieee->dev);
2261
2262 netif_carrier_on(ieee->dev);
2263
2264 up(&ieee->wx_sem);
2265}
2266inline void ieee80211_start_ibss(struct ieee80211_device *ieee)
2267{
2268 queue_delayed_work(ieee->wq, &ieee->start_ibss_wq, 100);
2269}
2270
2271/* this is called only in user context, with wx_sem held */
2272void ieee80211_start_bss(struct ieee80211_device *ieee)
2273{
2274 unsigned long flags;
c8d86be3
GKH
2275 //
2276 // Ref: 802.11d 11.1.3.3
2277 // STA shall not start a BSS unless properly formed Beacon frame including a Country IE.
2278 //
2279 if(IS_DOT11D_ENABLE(ieee) && !IS_COUNTRY_IE_VALID(ieee))
2280 {
2281 if(! ieee->bGlobalDomain)
2282 {
2283 return;
2284 }
2285 }
c8d86be3
GKH
2286 /* check if we have already found the net we
2287 * are interested in (if any).
2288 * if not (we are disassociated and we are not
2289 * in associating / authenticating phase) start the background scanning.
2290 */
2291 ieee80211_softmac_check_all_nets(ieee);
2292
2293 /* ensure no-one start an associating process (thus setting
2294 * the ieee->state to ieee80211_ASSOCIATING) while we
2295 * have just cheked it and we are going to enable scan.
2296 * The ieee80211_new_net function is always called with
2297 * lock held (from both ieee80211_softmac_check_all_nets and
2298 * the rx path), so we cannot be in the middle of such function
2299 */
2300 spin_lock_irqsave(&ieee->lock, flags);
2301
2302//#ifdef ENABLE_IPS
2303// printk("start bss ENABLE_IPS\n");
2304//#else
2305 if (ieee->state == IEEE80211_NOLINK){
2306 ieee->actscanning = true;
df574b8e 2307 ieee80211_rtl_start_scan(ieee);
c8d86be3
GKH
2308 }
2309//#endif
2310 spin_unlock_irqrestore(&ieee->lock, flags);
2311}
2312
2313/* called only in userspace context */
2314void ieee80211_disassociate(struct ieee80211_device *ieee)
2315{
2316 netif_carrier_off(ieee->dev);
2317
2318 if (ieee->softmac_features & IEEE_SOFTMAC_TX_QUEUE)
2319 ieee80211_reset_queue(ieee);
2320
2321 if (ieee->data_hard_stop)
2322 ieee->data_hard_stop(ieee->dev);
2323
c8d86be3
GKH
2324 if(IS_DOT11D_ENABLE(ieee))
2325 Dot11d_Reset(ieee);
592010bb 2326
c8d86be3 2327 ieee->link_change(ieee->dev);
592010bb
SO
2328 if (ieee->state == IEEE80211_LINKED)
2329 notify_wx_assoc_event(ieee);
2330 ieee->state = IEEE80211_NOLINK;
c8d86be3
GKH
2331
2332}
c8d86be3
GKH
2333void ieee80211_associate_retry_wq(struct work_struct *work)
2334{
bf6aede7 2335 struct delayed_work *dwork = to_delayed_work(work);
c8d86be3 2336 struct ieee80211_device *ieee = container_of(dwork, struct ieee80211_device, associate_retry_wq);
c8d86be3
GKH
2337 unsigned long flags;
2338 down(&ieee->wx_sem);
2339 if(!ieee->proto_started)
2340 goto exit;
2341 if(ieee->state != IEEE80211_ASSOCIATING_RETRY)
2342 goto exit;
2343 /* until we do not set the state to IEEE80211_NOLINK
2344 * there are no possibility to have someone else trying
2345 * to start an association procdure (we get here with
2346 * ieee->state = IEEE80211_ASSOCIATING).
2347 * When we set the state to IEEE80211_NOLINK it is possible
2348 * that the RX path run an attempt to associate, but
2349 * both ieee80211_softmac_check_all_nets and the
2350 * RX path works with ieee->lock held so there are no
2351 * problems. If we are still disassociated then start a scan.
2352 * the lock here is necessary to ensure no one try to start
2353 * an association procedure when we have just checked the
2354 * state and we are going to start the scan.
2355 */
2356 ieee->state = IEEE80211_NOLINK;
2357 ieee->beinretry = true;
2358 ieee80211_softmac_check_all_nets(ieee);
2359
2360 spin_lock_irqsave(&ieee->lock, flags);
2361
2362 if(ieee->state == IEEE80211_NOLINK){
2363 ieee->beinretry = false;
2364 ieee->actscanning = true;
df574b8e 2365 ieee80211_rtl_start_scan(ieee);
c8d86be3
GKH
2366 }
2367 //YJ,add,080828, notify os here
2368 if(ieee->state == IEEE80211_NOLINK)
2369 {
2370 notify_wx_assoc_event(ieee);
2371 }
2372 //YJ,add,080828,end
2373 spin_unlock_irqrestore(&ieee->lock, flags);
2374
2375exit:
2376 up(&ieee->wx_sem);
2377}
2378
2379struct sk_buff *ieee80211_get_beacon_(struct ieee80211_device *ieee)
2380{
2381 u8 broadcast_addr[] = {0xff,0xff,0xff,0xff,0xff,0xff};
2382
2383 struct sk_buff *skb = NULL;
2384 struct ieee80211_probe_response *b;
2385
c8d86be3 2386 skb = ieee80211_probe_resp(ieee, broadcast_addr);
c8d86be3
GKH
2387 if (!skb)
2388 return NULL;
2389
2390 b = (struct ieee80211_probe_response *) skb->data;
2391 b->header.frame_ctl = cpu_to_le16(IEEE80211_STYPE_BEACON);
2392
2393 return skb;
2394
2395}
2396
2397struct sk_buff *ieee80211_get_beacon(struct ieee80211_device *ieee)
2398{
2399 struct sk_buff *skb;
2400 struct ieee80211_probe_response *b;
2401
2402 skb = ieee80211_get_beacon_(ieee);
2403 if(!skb)
2404 return NULL;
2405
2406 b = (struct ieee80211_probe_response *) skb->data;
2407 b->header.seq_ctrl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
2408
2409 if (ieee->seq_ctrl[0] == 0xFFF)
2410 ieee->seq_ctrl[0] = 0;
2411 else
2412 ieee->seq_ctrl[0]++;
2413
2414 return skb;
2415}
2416
2417void ieee80211_softmac_stop_protocol(struct ieee80211_device *ieee)
2418{
2419 ieee->sync_scan_hurryup = 1;
2420 down(&ieee->wx_sem);
2421 ieee80211_stop_protocol(ieee);
2422 up(&ieee->wx_sem);
2423}
2424
2425
2426void ieee80211_stop_protocol(struct ieee80211_device *ieee)
2427{
2428 if (!ieee->proto_started)
2429 return;
2430
2431 ieee->proto_started = 0;
2432
c8d86be3
GKH
2433 ieee80211_stop_send_beacons(ieee);
2434 if((ieee->iw_mode == IW_MODE_INFRA)&&(ieee->state == IEEE80211_LINKED)) {
2435 SendDisassociation(ieee,NULL,WLAN_REASON_DISASSOC_STA_HAS_LEFT);
2436 }
2437 del_timer_sync(&ieee->associate_timer);
2438 cancel_delayed_work(&ieee->associate_retry_wq);
2439 cancel_delayed_work(&ieee->start_ibss_wq);
2440 ieee80211_stop_scan(ieee);
2441
2442 ieee80211_disassociate(ieee);
2443}
2444
2445void ieee80211_softmac_start_protocol(struct ieee80211_device *ieee)
2446{
2447 ieee->sync_scan_hurryup = 0;
2448 down(&ieee->wx_sem);
2449 ieee80211_start_protocol(ieee);
2450 up(&ieee->wx_sem);
2451}
2452
2453void ieee80211_start_protocol(struct ieee80211_device *ieee)
2454{
2455 short ch = 0;
2456 int i = 0;
2457
2458 if (ieee->proto_started)
2459 return;
2460
2461 ieee->proto_started = 1;
2462
2463 if (ieee->current_network.channel == 0){
2464 do{
2465 ch++;
2466 if (ch > MAX_CHANNEL_NUMBER)
2467 return; /* no channel found */
2468
c8d86be3 2469 }while(!GET_DOT11D_INFO(ieee)->channel_map[ch]);
c8d86be3
GKH
2470
2471 ieee->current_network.channel = ch;
2472 }
2473
2474 if (ieee->current_network.beacon_interval == 0)
2475 ieee->current_network.beacon_interval = 100;
2476 ieee->set_chan(ieee->dev,ieee->current_network.channel);
2477
2478 for(i = 0; i < 17; i++) {
2479 ieee->last_rxseq_num[i] = -1;
2480 ieee->last_rxfrag_num[i] = -1;
2481 ieee->last_packet_time[i] = 0;
2482 }
2483
2484 ieee->init_wmmparam_flag = 0;//reinitialize AC_xx_PARAM registers.
2485
2486
2487 /* if the user set the MAC of the ad-hoc cell and then
2488 * switch to managed mode, shall we make sure that association
2489 * attempts does not fail just because the user provide the essid
2490 * and the nic is still checking for the AP MAC ??
2491 */
2492 switch (ieee->iw_mode) {
2493 case IW_MODE_AUTO:
2494 ieee->iw_mode = IW_MODE_INFRA;
2495 //not set break here intentionly
2496 case IW_MODE_INFRA:
2497 ieee80211_start_bss(ieee);
2498 break;
2499
2500 case IW_MODE_ADHOC:
2501 ieee80211_start_ibss(ieee);
2502 break;
2503
2504 case IW_MODE_MASTER:
2505 ieee80211_start_master_bss(ieee);
2506 break;
2507
2508 case IW_MODE_MONITOR:
2509 ieee80211_start_monitor_mode(ieee);
2510 break;
2511
2512 default:
c8d86be3
GKH
2513 ieee->iw_mode = IW_MODE_INFRA;
2514 ieee80211_start_bss(ieee);
c8d86be3
GKH
2515 break;
2516 }
2517}
2518
2519
2520#define DRV_NAME "Ieee80211"
2521void ieee80211_softmac_init(struct ieee80211_device *ieee)
2522{
2523 int i;
2524 memset(&ieee->current_network, 0, sizeof(struct ieee80211_network));
2525
2526 ieee->state = IEEE80211_NOLINK;
2527 ieee->sync_scan_hurryup = 0;
2528 for(i = 0; i < 5; i++) {
2529 ieee->seq_ctrl[i] = 0;
2530 }
2531
2532 ieee->assoc_id = 0;
2533 ieee->queue_stop = 0;
2534 ieee->scanning = 0;
2535 ieee->softmac_features = 0; //so IEEE2100-like driver are happy
2536 ieee->wap_set = 0;
2537 ieee->ssid_set = 0;
2538 ieee->proto_started = 0;
2539 ieee->basic_rate = IEEE80211_DEFAULT_BASIC_RATE;
2540 ieee->rate = 3;
2541//#ifdef ENABLE_LPS
2542 ieee->ps = IEEE80211_PS_MBCAST|IEEE80211_PS_UNICAST;
2543//#else
2544// ieee->ps = IEEE80211_PS_DISABLED;
2545//#endif
2546 ieee->sta_sleep = 0;
2547//by amy
2548 ieee->bInactivePs = false;
2549 ieee->actscanning = false;
2550 ieee->ListenInterval = 2;
2551 ieee->NumRxDataInPeriod = 0; //YJ,add,080828
2552 ieee->NumRxBcnInPeriod = 0; //YJ,add,080828
2553 ieee->NumRxOkTotal = 0;//+by amy 080312
2554 ieee->NumRxUnicast = 0;//YJ,add,080828,for keep alive
2555 ieee->beinretry = false;
2556 ieee->bHwRadioOff = false;
2557//by amy
c8d86be3
GKH
2558
2559 init_mgmt_queue(ieee);
5521a513 2560
c8d86be3
GKH
2561 ieee->tx_pending.txb = NULL;
2562
2563 init_timer(&ieee->associate_timer);
2564 ieee->associate_timer.data = (unsigned long)ieee;
2565 ieee->associate_timer.function = ieee80211_associate_abort_cb;
2566
2567 init_timer(&ieee->beacon_timer);
2568 ieee->beacon_timer.data = (unsigned long) ieee;
2569 ieee->beacon_timer.function = ieee80211_send_beacon_cb;
2570
2571#ifdef PF_SYNCTHREAD
2572 ieee->wq = create_workqueue(DRV_NAME,0);
2573#else
2574 ieee->wq = create_workqueue(DRV_NAME);
2575#endif
c8d86be3
GKH
2576 INIT_DELAYED_WORK(&ieee->start_ibss_wq,(void*) ieee80211_start_ibss_wq);
2577 INIT_WORK(&ieee->associate_complete_wq,(void*) ieee80211_associate_complete_wq);
2578 INIT_WORK(&ieee->associate_procedure_wq,(void*) ieee80211_associate_procedure_wq);
2579 INIT_DELAYED_WORK(&ieee->softmac_scan_wq,(void*) ieee80211_softmac_scan_wq);
2580 INIT_DELAYED_WORK(&ieee->associate_retry_wq,(void*) ieee80211_associate_retry_wq);
2581 INIT_WORK(&ieee->wx_sync_scan_wq,(void*) ieee80211_wx_sync_scan_wq);
2582// INIT_WORK(&ieee->watch_dog_wq,(void*) ieee80211_watch_dog_wq);
0370453f 2583
c8d86be3
GKH
2584 sema_init(&ieee->wx_sem, 1);
2585 sema_init(&ieee->scan_sem, 1);
2586
2587 spin_lock_init(&ieee->mgmt_tx_lock);
2588 spin_lock_init(&ieee->beacon_lock);
2589
2590 tasklet_init(&ieee->ps_task,
2591 (void(*)(unsigned long)) ieee80211_sta_ps,
2592 (unsigned long)ieee);
c8d86be3 2593 ieee->pDot11dInfo = kmalloc(sizeof(RT_DOT11D_INFO), GFP_ATOMIC);
c8d86be3
GKH
2594}
2595
2596void ieee80211_softmac_free(struct ieee80211_device *ieee)
2597{
2598 down(&ieee->wx_sem);
2599
2600 del_timer_sync(&ieee->associate_timer);
2601 cancel_delayed_work(&ieee->associate_retry_wq);
2602
2603
2604 //add for RF power on power of by lizhaoming 080512
2605 cancel_delayed_work(&ieee->GPIOChangeRFWorkItem);
2606
c8d86be3 2607 destroy_workqueue(ieee->wq);
76be349c 2608 kfree(ieee->pDot11dInfo);
c8d86be3
GKH
2609 up(&ieee->wx_sem);
2610}
2611
2612/********************************************************
2613 * Start of WPA code. *
2614 * this is stolen from the ipw2200 driver *
2615 ********************************************************/
2616
2617
2618static int ieee80211_wpa_enable(struct ieee80211_device *ieee, int value)
2619{
2620 /* This is called when wpa_supplicant loads and closes the driver
2621 * interface. */
2622 printk("%s WPA\n",value ? "enabling" : "disabling");
2623 ieee->wpa_enabled = value;
2624 return 0;
2625}
2626
2627
2628void ieee80211_wpa_assoc_frame(struct ieee80211_device *ieee, char *wpa_ie, int wpa_ie_len)
2629{
2630 /* make sure WPA is enabled */
2631 ieee80211_wpa_enable(ieee, 1);
2632
2633 ieee80211_disassociate(ieee);
2634}
2635
2636
2637static int ieee80211_wpa_mlme(struct ieee80211_device *ieee, int command, int reason)
2638{
2639
2640 int ret = 0;
2641
2642 switch (command) {
2643 case IEEE_MLME_STA_DEAUTH:
2644 // silently ignore
2645 break;
2646
2647 case IEEE_MLME_STA_DISASSOC:
2648 ieee80211_disassociate(ieee);
2649 break;
2650
2651 default:
2652 printk("Unknown MLME request: %d\n", command);
2653 ret = -EOPNOTSUPP;
2654 }
2655
2656 return ret;
2657}
2658
2659
2660static int ieee80211_wpa_set_wpa_ie(struct ieee80211_device *ieee,
2661 struct ieee_param *param, int plen)
2662{
2663 u8 *buf;
2664
2665 if (param->u.wpa_ie.len > MAX_WPA_IE_LEN ||
2666 (param->u.wpa_ie.len && param->u.wpa_ie.data == NULL))
2667 return -EINVAL;
2668
2669 if (param->u.wpa_ie.len) {
94002c07
JL
2670 buf = kmemdup(param->u.wpa_ie.data, param->u.wpa_ie.len,
2671 GFP_KERNEL);
c8d86be3
GKH
2672 if (buf == NULL)
2673 return -ENOMEM;
2674
c8d86be3
GKH
2675 kfree(ieee->wpa_ie);
2676 ieee->wpa_ie = buf;
2677 ieee->wpa_ie_len = param->u.wpa_ie.len;
2678 } else {
2679 kfree(ieee->wpa_ie);
2680 ieee->wpa_ie = NULL;
2681 ieee->wpa_ie_len = 0;
2682 }
2683
2684 ieee80211_wpa_assoc_frame(ieee, ieee->wpa_ie, ieee->wpa_ie_len);
2685 return 0;
2686}
2687
2688#define AUTH_ALG_OPEN_SYSTEM 0x1
2689#define AUTH_ALG_SHARED_KEY 0x2
2690
2691static int ieee80211_wpa_set_auth_algs(struct ieee80211_device *ieee, int value)
2692{
2693
2694 struct ieee80211_security sec = {
2695 .flags = SEC_AUTH_MODE,
2696 };
2697 int ret = 0;
2698
2699 if (value & AUTH_ALG_SHARED_KEY) {
2700 sec.auth_mode = WLAN_AUTH_SHARED_KEY;
2701 ieee->open_wep = 0;
2702 } else {
2703 sec.auth_mode = WLAN_AUTH_OPEN;
2704 ieee->open_wep = 1;
2705 }
2706
2707 if (ieee->set_security)
2708 ieee->set_security(ieee->dev, &sec);
2709 else
2710 ret = -EOPNOTSUPP;
2711
2712 return ret;
2713}
2714
2715static int ieee80211_wpa_set_param(struct ieee80211_device *ieee, u8 name, u32 value)
2716{
2717 int ret=0;
2718 unsigned long flags;
2719
2720 switch (name) {
2721 case IEEE_PARAM_WPA_ENABLED:
2722 ret = ieee80211_wpa_enable(ieee, value);
2723 break;
2724
2725 case IEEE_PARAM_TKIP_COUNTERMEASURES:
2726 ieee->tkip_countermeasures=value;
2727 break;
2728
2729 case IEEE_PARAM_DROP_UNENCRYPTED: {
2730 /* HACK:
2731 *
2732 * wpa_supplicant calls set_wpa_enabled when the driver
2733 * is loaded and unloaded, regardless of if WPA is being
2734 * used. No other calls are made which can be used to
2735 * determine if encryption will be used or not prior to
2736 * association being expected. If encryption is not being
2737 * used, drop_unencrypted is set to false, else true -- we
2738 * can use this to determine if the CAP_PRIVACY_ON bit should
2739 * be set.
2740 */
2741 struct ieee80211_security sec = {
2742 .flags = SEC_ENABLED,
2743 .enabled = value,
2744 };
2745 ieee->drop_unencrypted = value;
2746 /* We only change SEC_LEVEL for open mode. Others
2747 * are set by ipw_wpa_set_encryption.
2748 */
2749 if (!value) {
2750 sec.flags |= SEC_LEVEL;
2751 sec.level = SEC_LEVEL_0;
2752 }
2753 else {
2754 sec.flags |= SEC_LEVEL;
2755 sec.level = SEC_LEVEL_1;
2756 }
2757 if (ieee->set_security)
2758 ieee->set_security(ieee->dev, &sec);
2759 break;
2760 }
2761
2762 case IEEE_PARAM_PRIVACY_INVOKED:
2763 ieee->privacy_invoked=value;
2764 break;
2765
2766 case IEEE_PARAM_AUTH_ALGS:
2767 ret = ieee80211_wpa_set_auth_algs(ieee, value);
2768 break;
2769
2770 case IEEE_PARAM_IEEE_802_1X:
2771 ieee->ieee802_1x=value;
2772 break;
2773 case IEEE_PARAM_WPAX_SELECT:
2774 // added for WPA2 mixed mode
2775 //printk(KERN_WARNING "------------------------>wpax value = %x\n", value);
2776 spin_lock_irqsave(&ieee->wpax_suitlist_lock,flags);
2777 ieee->wpax_type_set = 1;
2778 ieee->wpax_type_notify = value;
2779 spin_unlock_irqrestore(&ieee->wpax_suitlist_lock,flags);
2780 break;
2781
2782 default:
2783 printk("Unknown WPA param: %d\n",name);
2784 ret = -EOPNOTSUPP;
2785 }
2786
2787 return ret;
2788}
2789
2790/* implementation borrowed from hostap driver */
2791
2792static int ieee80211_wpa_set_encryption(struct ieee80211_device *ieee,
2793 struct ieee_param *param, int param_len)
2794{
2795 int ret = 0;
2796
2797 struct ieee80211_crypto_ops *ops;
2798 struct ieee80211_crypt_data **crypt;
2799
2800 struct ieee80211_security sec = {
2801 .flags = 0,
2802 };
2803
2804 param->u.crypt.err = 0;
2805 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
2806
2807 if (param_len !=
2808 (int) ((char *) param->u.crypt.key - (char *) param) +
2809 param->u.crypt.key_len) {
2810 printk("Len mismatch %d, %d\n", param_len,
2811 param->u.crypt.key_len);
2812 return -EINVAL;
2813 }
2814 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
2815 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
2816 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
2817 if (param->u.crypt.idx >= WEP_KEYS)
2818 return -EINVAL;
2819 crypt = &ieee->crypt[param->u.crypt.idx];
2820 } else {
2821 return -EINVAL;
2822 }
2823
2824 if (strcmp(param->u.crypt.alg, "none") == 0) {
2825 if (crypt) {
2826 sec.enabled = 0;
2827 // FIXME FIXME
2828 //sec.encrypt = 0;
2829 sec.level = SEC_LEVEL_0;
2830 sec.flags |= SEC_ENABLED | SEC_LEVEL;
2831 ieee80211_crypt_delayed_deinit(ieee, crypt);
2832 }
2833 goto done;
2834 }
2835 sec.enabled = 1;
2836// FIXME FIXME
2837// sec.encrypt = 1;
2838 sec.flags |= SEC_ENABLED;
2839
2840 /* IPW HW cannot build TKIP MIC, host decryption still needed. */
2841 if (!(ieee->host_encrypt || ieee->host_decrypt) &&
2842 strcmp(param->u.crypt.alg, "TKIP"))
2843 goto skip_host_crypt;
2844
2845 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
a010a337 2846 if (ops == NULL && strcmp(param->u.crypt.alg, "WEP") == 0)
c8d86be3 2847 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
a010a337 2848 else if (ops == NULL && strcmp(param->u.crypt.alg, "TKIP") == 0)
c8d86be3 2849 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
a010a337 2850 else if (ops == NULL && strcmp(param->u.crypt.alg, "CCMP") == 0)
c8d86be3 2851 ops = ieee80211_get_crypto_ops(param->u.crypt.alg);
c8d86be3
GKH
2852 if (ops == NULL) {
2853 printk("unknown crypto alg '%s'\n", param->u.crypt.alg);
2854 param->u.crypt.err = IEEE_CRYPT_ERR_UNKNOWN_ALG;
2855 ret = -EINVAL;
2856 goto done;
2857 }
2858
2859 if (*crypt == NULL || (*crypt)->ops != ops) {
2860 struct ieee80211_crypt_data *new_crypt;
2861
2862 ieee80211_crypt_delayed_deinit(ieee, crypt);
2863
32414878 2864 new_crypt = kmalloc(sizeof(*new_crypt), GFP_KERNEL);
c8d86be3
GKH
2865 if (new_crypt == NULL) {
2866 ret = -ENOMEM;
2867 goto done;
2868 }
2869 memset(new_crypt, 0, sizeof(struct ieee80211_crypt_data));
2870 new_crypt->ops = ops;
a010a337 2871 if (new_crypt->ops)
c8d86be3
GKH
2872 new_crypt->priv =
2873 new_crypt->ops->init(param->u.crypt.idx);
2874
2875 if (new_crypt->priv == NULL) {
2876 kfree(new_crypt);
2877 param->u.crypt.err = IEEE_CRYPT_ERR_CRYPT_INIT_FAILED;
2878 ret = -EINVAL;
2879 goto done;
2880 }
2881
2882 *crypt = new_crypt;
2883 }
2884
2885 if (param->u.crypt.key_len > 0 && (*crypt)->ops->set_key &&
2886 (*crypt)->ops->set_key(param->u.crypt.key,
2887 param->u.crypt.key_len, param->u.crypt.seq,
2888 (*crypt)->priv) < 0) {
2889 printk("key setting failed\n");
2890 param->u.crypt.err = IEEE_CRYPT_ERR_KEY_SET_FAILED;
2891 ret = -EINVAL;
2892 goto done;
2893 }
2894
2895 skip_host_crypt:
2896 if (param->u.crypt.set_tx) {
2897 ieee->tx_keyidx = param->u.crypt.idx;
2898 sec.active_key = param->u.crypt.idx;
2899 sec.flags |= SEC_ACTIVE_KEY;
2900 } else
2901 sec.flags &= ~SEC_ACTIVE_KEY;
2902
2903 if (param->u.crypt.alg != NULL) {
2904 memcpy(sec.keys[param->u.crypt.idx],
2905 param->u.crypt.key,
2906 param->u.crypt.key_len);
2907 sec.key_sizes[param->u.crypt.idx] = param->u.crypt.key_len;
2908 sec.flags |= (1 << param->u.crypt.idx);
2909
2910 if (strcmp(param->u.crypt.alg, "WEP") == 0) {
2911 sec.flags |= SEC_LEVEL;
2912 sec.level = SEC_LEVEL_1;
2913 } else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
2914 sec.flags |= SEC_LEVEL;
2915 sec.level = SEC_LEVEL_2;
2916 } else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
2917 sec.flags |= SEC_LEVEL;
2918 sec.level = SEC_LEVEL_3;
2919 }
2920 }
2921 done:
2922 if (ieee->set_security)
2923 ieee->set_security(ieee->dev, &sec);
2924
2925 /* Do not reset port if card is in Managed mode since resetting will
2926 * generate new IEEE 802.11 authentication which may end up in looping
2927 * with IEEE 802.1X. If your hardware requires a reset after WEP
2928 * configuration (for example... Prism2), implement the reset_port in
2929 * the callbacks structures used to initialize the 802.11 stack. */
2930 if (ieee->reset_on_keychange &&
2931 ieee->iw_mode != IW_MODE_INFRA &&
2932 ieee->reset_port &&
2933 ieee->reset_port(ieee->dev)) {
2934 printk("reset_port failed\n");
2935 param->u.crypt.err = IEEE_CRYPT_ERR_CARD_CONF_FAILED;
2936 return -EINVAL;
2937 }
2938
2939 return ret;
2940}
2941
2942int ieee80211_wpa_supplicant_ioctl(struct ieee80211_device *ieee, struct iw_point *p)
2943{
2944 struct ieee_param *param;
2945 int ret=0;
2946
2947 down(&ieee->wx_sem);
2948 //IEEE_DEBUG_INFO("wpa_supplicant: len=%d\n", p->length);
2949
2950 if (p->length < sizeof(struct ieee_param) || !p->pointer){
2951 ret = -EINVAL;
2952 goto out;
2953 }
2954
32414878 2955 param = kmalloc(p->length, GFP_KERNEL);
c8d86be3
GKH
2956 if (param == NULL){
2957 ret = -ENOMEM;
2958 goto out;
2959 }
2960 if (copy_from_user(param, p->pointer, p->length)) {
2961 kfree(param);
2962 ret = -EFAULT;
2963 goto out;
2964 }
2965
2966 switch (param->cmd) {
2967
2968 case IEEE_CMD_SET_WPA_PARAM:
2969 ret = ieee80211_wpa_set_param(ieee, param->u.wpa_param.name,
2970 param->u.wpa_param.value);
2971 break;
2972
2973 case IEEE_CMD_SET_WPA_IE:
2974 ret = ieee80211_wpa_set_wpa_ie(ieee, param, p->length);
2975 break;
2976
2977 case IEEE_CMD_SET_ENCRYPTION:
2978 ret = ieee80211_wpa_set_encryption(ieee, param, p->length);
2979 break;
2980
2981 case IEEE_CMD_MLME:
2982 ret = ieee80211_wpa_mlme(ieee, param->u.mlme.command,
2983 param->u.mlme.reason_code);
2984 break;
2985
2986 default:
2987 printk("Unknown WPA supplicant request: %d\n",param->cmd);
2988 ret = -EOPNOTSUPP;
2989 break;
2990 }
2991
2992 if (ret == 0 && copy_to_user(p->pointer, param, p->length))
2993 ret = -EFAULT;
2994
2995 kfree(param);
2996out:
2997 up(&ieee->wx_sem);
2998
2999 return ret;
3000}
3001
3002void notify_wx_assoc_event(struct ieee80211_device *ieee)
3003{
3004 union iwreq_data wrqu;
3005 wrqu.ap_addr.sa_family = ARPHRD_ETHER;
3006 if (ieee->state == IEEE80211_LINKED)
3007 memcpy(wrqu.ap_addr.sa_data, ieee->current_network.bssid, ETH_ALEN);
3008 else
3009 memset(wrqu.ap_addr.sa_data, 0, ETH_ALEN);
3010 wireless_send_event(ieee->dev, SIOCGIWAP, &wrqu, NULL);
3011}