| /****************************************************************************** |
| * |
| * Copyright(c) 2007 - 2012 Realtek Corporation. All rights reserved. |
| * |
| * This program is free software; you can redistribute it and/or modify it |
| * under the terms of version 2 of the GNU General Public License as |
| * published by the Free Software Foundation. |
| * |
| * This program is distributed in the hope that it will be useful, but WITHOUT |
| * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
| * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for |
| * more details. |
| * |
| ******************************************************************************/ |
| #define _IOCTL_CFG80211_C_ |
| |
| #include <drv_types.h> |
| #include <rtw_debug.h> |
| #include <linux/jiffies.h> |
| |
| #include <rtw_wifi_regd.h> |
| |
| #define RTW_MAX_MGMT_TX_CNT (8) |
| |
| #define RTW_SCAN_IE_LEN_MAX 2304 |
| #define RTW_MAX_REMAIN_ON_CHANNEL_DURATION 5000 /* ms */ |
| #define RTW_MAX_NUM_PMKIDS 4 |
| |
| #define RTW_CH_MAX_2G_CHANNEL 14 /* Max channel in 2G band */ |
| |
| static const u32 rtw_cipher_suites[] = { |
| WLAN_CIPHER_SUITE_WEP40, |
| WLAN_CIPHER_SUITE_WEP104, |
| WLAN_CIPHER_SUITE_TKIP, |
| WLAN_CIPHER_SUITE_CCMP, |
| WLAN_CIPHER_SUITE_AES_CMAC, |
| }; |
| |
| #define RATETAB_ENT(_rate, _rateid, _flags) \ |
| { \ |
| .bitrate = (_rate), \ |
| .hw_value = (_rateid), \ |
| .flags = (_flags), \ |
| } |
| |
| #define CHAN2G(_channel, _freq, _flags) { \ |
| .band = NL80211_BAND_2GHZ, \ |
| .center_freq = (_freq), \ |
| .hw_value = (_channel), \ |
| .flags = (_flags), \ |
| .max_antenna_gain = 0, \ |
| .max_power = 30, \ |
| } |
| |
| /* if wowlan is not supported, kernel generate a disconnect at each suspend |
| * cf: /net/wireless/sysfs.c, so register a stub wowlan. |
| * Moreover wowlan has to be enabled via a the nl80211_set_wowlan callback. |
| * (from user space, e.g. iw phy0 wowlan enable) |
| */ |
| static const struct wiphy_wowlan_support wowlan_stub = { |
| .flags = WIPHY_WOWLAN_ANY, |
| .n_patterns = 0, |
| .pattern_max_len = 0, |
| .pattern_min_len = 0, |
| .max_pkt_offset = 0, |
| }; |
| |
| static struct ieee80211_rate rtw_rates[] = { |
| RATETAB_ENT(10, 0x1, 0), |
| RATETAB_ENT(20, 0x2, 0), |
| RATETAB_ENT(55, 0x4, 0), |
| RATETAB_ENT(110, 0x8, 0), |
| RATETAB_ENT(60, 0x10, 0), |
| RATETAB_ENT(90, 0x20, 0), |
| RATETAB_ENT(120, 0x40, 0), |
| RATETAB_ENT(180, 0x80, 0), |
| RATETAB_ENT(240, 0x100, 0), |
| RATETAB_ENT(360, 0x200, 0), |
| RATETAB_ENT(480, 0x400, 0), |
| RATETAB_ENT(540, 0x800, 0), |
| }; |
| |
| #define rtw_a_rates (rtw_rates + 4) |
| #define RTW_A_RATES_NUM 8 |
| #define rtw_g_rates (rtw_rates + 0) |
| #define RTW_G_RATES_NUM 12 |
| |
| #define RTW_2G_CHANNELS_NUM 14 |
| #define RTW_5G_CHANNELS_NUM 37 |
| |
| static struct ieee80211_channel rtw_2ghz_channels[] = { |
| CHAN2G(1, 2412, 0), |
| CHAN2G(2, 2417, 0), |
| CHAN2G(3, 2422, 0), |
| CHAN2G(4, 2427, 0), |
| CHAN2G(5, 2432, 0), |
| CHAN2G(6, 2437, 0), |
| CHAN2G(7, 2442, 0), |
| CHAN2G(8, 2447, 0), |
| CHAN2G(9, 2452, 0), |
| CHAN2G(10, 2457, 0), |
| CHAN2G(11, 2462, 0), |
| CHAN2G(12, 2467, 0), |
| CHAN2G(13, 2472, 0), |
| CHAN2G(14, 2484, 0), |
| }; |
| |
| static void rtw_2g_channels_init(struct ieee80211_channel *channels) |
| { |
| memcpy((void*)channels, (void*)rtw_2ghz_channels, |
| sizeof(struct ieee80211_channel)*RTW_2G_CHANNELS_NUM |
| ); |
| } |
| |
| static void rtw_2g_rates_init(struct ieee80211_rate *rates) |
| { |
| memcpy(rates, rtw_g_rates, |
| sizeof(struct ieee80211_rate)*RTW_G_RATES_NUM |
| ); |
| } |
| |
| static struct ieee80211_supported_band *rtw_spt_band_alloc( |
| enum nl80211_band band |
| ) |
| { |
| struct ieee80211_supported_band *spt_band = NULL; |
| int n_channels, n_bitrates; |
| |
| if (band == NL80211_BAND_2GHZ) |
| { |
| n_channels = RTW_2G_CHANNELS_NUM; |
| n_bitrates = RTW_G_RATES_NUM; |
| } |
| else |
| { |
| goto exit; |
| } |
| |
| spt_band = (struct ieee80211_supported_band *)rtw_zmalloc( |
| sizeof(struct ieee80211_supported_band) |
| + sizeof(struct ieee80211_channel)*n_channels |
| + sizeof(struct ieee80211_rate)*n_bitrates |
| ); |
| if (!spt_band) |
| goto exit; |
| |
| spt_band->channels = (struct ieee80211_channel*)(((u8 *)spt_band)+sizeof(struct ieee80211_supported_band)); |
| spt_band->bitrates = (struct ieee80211_rate*)(((u8 *)spt_band->channels)+sizeof(struct ieee80211_channel)*n_channels); |
| spt_band->band = band; |
| spt_band->n_channels = n_channels; |
| spt_band->n_bitrates = n_bitrates; |
| |
| if (band == NL80211_BAND_2GHZ) |
| { |
| rtw_2g_channels_init(spt_band->channels); |
| rtw_2g_rates_init(spt_band->bitrates); |
| } |
| |
| /* spt_band.ht_cap */ |
| |
| exit: |
| |
| return spt_band; |
| } |
| |
| static void rtw_spt_band_free(struct ieee80211_supported_band *spt_band) |
| { |
| u32 size = 0; |
| |
| if (!spt_band) |
| return; |
| |
| if (spt_band->band == NL80211_BAND_2GHZ) |
| { |
| size = sizeof(struct ieee80211_supported_band) |
| + sizeof(struct ieee80211_channel)*RTW_2G_CHANNELS_NUM |
| + sizeof(struct ieee80211_rate)*RTW_G_RATES_NUM; |
| } |
| kfree((u8 *)spt_band); |
| } |
| |
| static const struct ieee80211_txrx_stypes |
| rtw_cfg80211_default_mgmt_stypes[NUM_NL80211_IFTYPES] = { |
| [NL80211_IFTYPE_ADHOC] = { |
| .tx = 0xffff, |
| .rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
| }, |
| [NL80211_IFTYPE_STATION] = { |
| .tx = 0xffff, |
| .rx = BIT(IEEE80211_STYPE_ACTION >> 4) | |
| BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
| }, |
| [NL80211_IFTYPE_AP] = { |
| .tx = 0xffff, |
| .rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) | |
| BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) | |
| BIT(IEEE80211_STYPE_PROBE_REQ >> 4) | |
| BIT(IEEE80211_STYPE_DISASSOC >> 4) | |
| BIT(IEEE80211_STYPE_AUTH >> 4) | |
| BIT(IEEE80211_STYPE_DEAUTH >> 4) | |
| BIT(IEEE80211_STYPE_ACTION >> 4) |
| }, |
| [NL80211_IFTYPE_AP_VLAN] = { |
| /* copy AP */ |
| .tx = 0xffff, |
| .rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) | |
| BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) | |
| BIT(IEEE80211_STYPE_PROBE_REQ >> 4) | |
| BIT(IEEE80211_STYPE_DISASSOC >> 4) | |
| BIT(IEEE80211_STYPE_AUTH >> 4) | |
| BIT(IEEE80211_STYPE_DEAUTH >> 4) | |
| BIT(IEEE80211_STYPE_ACTION >> 4) |
| }, |
| [NL80211_IFTYPE_P2P_CLIENT] = { |
| .tx = 0xffff, |
| .rx = BIT(IEEE80211_STYPE_ACTION >> 4) | |
| BIT(IEEE80211_STYPE_PROBE_REQ >> 4) |
| }, |
| [NL80211_IFTYPE_P2P_GO] = { |
| .tx = 0xffff, |
| .rx = BIT(IEEE80211_STYPE_ASSOC_REQ >> 4) | |
| BIT(IEEE80211_STYPE_REASSOC_REQ >> 4) | |
| BIT(IEEE80211_STYPE_PROBE_REQ >> 4) | |
| BIT(IEEE80211_STYPE_DISASSOC >> 4) | |
| BIT(IEEE80211_STYPE_AUTH >> 4) | |
| BIT(IEEE80211_STYPE_DEAUTH >> 4) | |
| BIT(IEEE80211_STYPE_ACTION >> 4) |
| }, |
| }; |
| |
| static int rtw_ieee80211_channel_to_frequency(int chan, int band) |
| { |
| /* see 802.11 17.3.8.3.2 and Annex J |
| * there are overlapping channel numbers in 5GHz and 2GHz bands */ |
| if (band == NL80211_BAND_2GHZ) { |
| if (chan == 14) |
| return 2484; |
| else if (chan < 14) |
| return 2407 + chan * 5; |
| } |
| |
| return 0; /* not supported */ |
| } |
| |
| static u64 rtw_get_systime_us(void) |
| { |
| struct timespec ts; |
| get_monotonic_boottime(&ts); |
| return ((u64)ts.tv_sec*1000000) + ts.tv_nsec / 1000; |
| } |
| |
| #define MAX_BSSINFO_LEN 1000 |
| struct cfg80211_bss *rtw_cfg80211_inform_bss(struct adapter *padapter, struct wlan_network *pnetwork) |
| { |
| struct ieee80211_channel *notify_channel; |
| struct cfg80211_bss *bss = NULL; |
| /* struct ieee80211_supported_band *band; */ |
| u16 channel; |
| u32 freq; |
| u64 notify_timestamp; |
| u16 notify_capability; |
| u16 notify_interval; |
| u8 *notify_ie; |
| size_t notify_ielen; |
| s32 notify_signal; |
| u8 *buf = NULL, *pbuf; |
| size_t len, bssinf_len = 0; |
| struct ieee80211_hdr *pwlanhdr; |
| __le16 *fctrl; |
| u8 bc_addr[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff}; |
| |
| struct wireless_dev *wdev = padapter->rtw_wdev; |
| struct wiphy *wiphy = wdev->wiphy; |
| struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); |
| |
| |
| /* DBG_8192C("%s\n", __func__); */ |
| |
| bssinf_len = pnetwork->network.IELength+sizeof (struct ieee80211_hdr_3addr); |
| if (bssinf_len > MAX_BSSINFO_LEN) { |
| DBG_871X("%s IE Length too long > %d byte\n", __func__, MAX_BSSINFO_LEN); |
| goto exit; |
| } |
| |
| { |
| u16 wapi_len = 0; |
| |
| if (rtw_get_wapi_ie(pnetwork->network.IEs, pnetwork->network.IELength, NULL, &wapi_len)>0) |
| { |
| if (wapi_len > 0) |
| { |
| DBG_871X("%s, no support wapi!\n", __func__); |
| goto exit; |
| } |
| } |
| } |
| |
| /* To reduce PBC Overlap rate */ |
| /* spin_lock_bh(&pwdev_priv->scan_req_lock); */ |
| if (adapter_wdev_data(padapter)->scan_request != NULL) |
| { |
| u8 *psr = NULL, sr = 0; |
| struct ndis_802_11_ssid *pssid = &pnetwork->network.Ssid; |
| struct cfg80211_scan_request *request = adapter_wdev_data(padapter)->scan_request; |
| struct cfg80211_ssid *ssids = request->ssids; |
| u32 wpsielen = 0; |
| u8 *wpsie = NULL; |
| |
| wpsie = rtw_get_wps_ie(pnetwork->network.IEs+_FIXED_IE_LENGTH_, pnetwork->network.IELength-_FIXED_IE_LENGTH_, NULL, &wpsielen); |
| |
| if (wpsie && wpsielen>0) |
| psr = rtw_get_wps_attr_content(wpsie, wpsielen, WPS_ATTR_SELECTED_REGISTRAR, (u8 *)(&sr), NULL); |
| |
| if (sr != 0) |
| { |
| if (request->n_ssids == 1 && request->n_channels == 1) /* it means under processing WPS */ |
| { |
| DBG_8192C("ssid =%s, len =%d\n", pssid->Ssid, pssid->SsidLength); |
| |
| if (ssids[0].ssid_len == 0) { |
| } |
| else if (pssid->SsidLength == ssids[0].ssid_len && |
| !memcmp(pssid->Ssid, ssids[0].ssid, ssids[0].ssid_len)) |
| { |
| DBG_871X("%s, got sr and ssid match!\n", __func__); |
| } |
| else |
| { |
| if (psr != NULL) |
| *psr = 0; /* clear sr */ |
| } |
| } |
| } |
| } |
| /* spin_unlock_bh(&pwdev_priv->scan_req_lock); */ |
| |
| |
| channel = pnetwork->network.Configuration.DSConfig; |
| freq = rtw_ieee80211_channel_to_frequency(channel, NL80211_BAND_2GHZ); |
| |
| notify_channel = ieee80211_get_channel(wiphy, freq); |
| |
| notify_timestamp = rtw_get_systime_us(); |
| |
| notify_interval = le16_to_cpu(*(__le16 *)rtw_get_beacon_interval_from_ie(pnetwork->network.IEs)); |
| notify_capability = le16_to_cpu(*(__le16 *)rtw_get_capability_from_ie(pnetwork->network.IEs)); |
| |
| notify_ie = pnetwork->network.IEs+_FIXED_IE_LENGTH_; |
| notify_ielen = pnetwork->network.IELength-_FIXED_IE_LENGTH_; |
| |
| /* We've set wiphy's signal_type as CFG80211_SIGNAL_TYPE_MBM: signal strength in mBm (100*dBm) */ |
| if (check_fwstate(pmlmepriv, _FW_LINKED) == true && |
| is_same_network(&pmlmepriv->cur_network.network, &pnetwork->network, 0)) { |
| notify_signal = 100*translate_percentage_to_dbm(padapter->recvpriv.signal_strength);/* dbm */ |
| } else { |
| notify_signal = 100*translate_percentage_to_dbm(pnetwork->network.PhyInfo.SignalStrength);/* dbm */ |
| } |
| |
| buf = kzalloc(MAX_BSSINFO_LEN, GFP_ATOMIC); |
| if (!buf) |
| goto exit; |
| pbuf = buf; |
| |
| pwlanhdr = (struct ieee80211_hdr *)pbuf; |
| fctrl = &(pwlanhdr->frame_control); |
| *(fctrl) = 0; |
| |
| SetSeqNum(pwlanhdr, 0/*pmlmeext->mgnt_seq*/); |
| /* pmlmeext->mgnt_seq++; */ |
| |
| if (pnetwork->network.Reserved[0] == 1) { /* WIFI_BEACON */ |
| memcpy(pwlanhdr->addr1, bc_addr, ETH_ALEN); |
| SetFrameSubType(pbuf, WIFI_BEACON); |
| } else { |
| memcpy(pwlanhdr->addr1, myid(&(padapter->eeprompriv)), ETH_ALEN); |
| SetFrameSubType(pbuf, WIFI_PROBERSP); |
| } |
| |
| memcpy(pwlanhdr->addr2, pnetwork->network.MacAddress, ETH_ALEN); |
| memcpy(pwlanhdr->addr3, pnetwork->network.MacAddress, ETH_ALEN); |
| |
| |
| pbuf += sizeof(struct ieee80211_hdr_3addr); |
| len = sizeof (struct ieee80211_hdr_3addr); |
| |
| memcpy(pbuf, pnetwork->network.IEs, pnetwork->network.IELength); |
| len += pnetwork->network.IELength; |
| |
| *((__le64*)pbuf) = cpu_to_le64(notify_timestamp); |
| |
| bss = cfg80211_inform_bss_frame(wiphy, notify_channel, (struct ieee80211_mgmt *)buf, |
| len, notify_signal, GFP_ATOMIC); |
| |
| if (unlikely(!bss)) { |
| DBG_8192C(FUNC_ADPT_FMT" bss NULL\n", FUNC_ADPT_ARG(padapter)); |
| goto exit; |
| } |
| |
| cfg80211_put_bss(wiphy, bss); |
| kfree(buf); |
| |
| exit: |
| return bss; |
| |
| } |
| |
| /* |
| Check the given bss is valid by kernel API cfg80211_get_bss() |
| @padapter : the given adapter |
| |
| return true if bss is valid, false for not found. |
| */ |
| int rtw_cfg80211_check_bss(struct adapter *padapter) |
| { |
| struct wlan_bssid_ex *pnetwork = &(padapter->mlmeextpriv.mlmext_info.network); |
| struct cfg80211_bss *bss = NULL; |
| struct ieee80211_channel *notify_channel = NULL; |
| u32 freq; |
| |
| if (!(pnetwork) || !(padapter->rtw_wdev)) |
| return false; |
| |
| freq = rtw_ieee80211_channel_to_frequency(pnetwork->Configuration.DSConfig, NL80211_BAND_2GHZ); |
| |
| notify_channel = ieee80211_get_channel(padapter->rtw_wdev->wiphy, freq); |
| bss = cfg80211_get_bss(padapter->rtw_wdev->wiphy, notify_channel, |
| pnetwork->MacAddress, pnetwork->Ssid.Ssid, |
| pnetwork->Ssid.SsidLength, |
| WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS); |
| |
| cfg80211_put_bss(padapter->rtw_wdev->wiphy, bss); |
| |
| return (bss!= NULL); |
| } |
| |
| void rtw_cfg80211_ibss_indicate_connect(struct adapter *padapter) |
| { |
| struct mlme_priv *pmlmepriv = &padapter->mlmepriv; |
| struct wlan_network *cur_network = &(pmlmepriv->cur_network); |
| struct wireless_dev *pwdev = padapter->rtw_wdev; |
| struct wiphy *wiphy = pwdev->wiphy; |
| int freq = (int)cur_network->network.Configuration.DSConfig; |
| struct ieee80211_channel *chan; |
| |
| DBG_871X(FUNC_ADPT_FMT"\n", FUNC_ADPT_ARG(padapter)); |
| if (pwdev->iftype != NL80211_IFTYPE_ADHOC) |
| { |
| return; |
| } |
| |
| if (!rtw_cfg80211_check_bss(padapter)) { |
| struct wlan_bssid_ex *pnetwork = &(padapter->mlmeextpriv.mlmext_info.network); |
| struct wlan_network *scanned = pmlmepriv->cur_network_scanned; |
| |
| if (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) ==true) |
| { |
| |
| memcpy(&cur_network->network, pnetwork, sizeof(struct wlan_bssid_ex)); |
| if (!rtw_cfg80211_inform_bss(padapter, cur_network)) |
| DBG_871X(FUNC_ADPT_FMT" inform fail !!\n", FUNC_ADPT_ARG(padapter)); |
| else |
| DBG_871X(FUNC_ADPT_FMT" inform success !!\n", FUNC_ADPT_ARG(padapter)); |
| } |
| else |
| { |
| if (scanned == NULL) { |
| rtw_warn_on(1); |
| return; |
| } |
| if (!memcmp(&(scanned->network.Ssid), &(pnetwork->Ssid), sizeof(struct ndis_802_11_ssid)) |
| && !memcmp(scanned->network.MacAddress, pnetwork->MacAddress, sizeof(NDIS_802_11_MAC_ADDRESS)) |
| ) { |
| if (!rtw_cfg80211_inform_bss(padapter, scanned)) { |
| DBG_871X(FUNC_ADPT_FMT" inform fail !!\n", FUNC_ADPT_ARG(padapter)); |
| } else { |
| /* DBG_871X(FUNC_ADPT_FMT" inform success !!\n", FUNC_ADPT_ARG(padapter)); */ |
| } |
| } else { |
| DBG_871X("scanned & pnetwork compare fail\n"); |
| rtw_warn_on(1); |
| } |
| } |
| |
| if (!rtw_cfg80211_check_bss(padapter)) |
| DBG_871X_LEVEL(_drv_always_, FUNC_ADPT_FMT" BSS not found !!\n", FUNC_ADPT_ARG(padapter)); |
| } |
| /* notify cfg80211 that device joined an IBSS */ |
| chan = ieee80211_get_channel(wiphy, freq); |
| cfg80211_ibss_joined(padapter->pnetdev, cur_network->network.MacAddress, chan, GFP_ATOMIC); |
| } |
| |
| void rtw_cfg80211_indicate_connect(struct adapter *padapter) |
| { |
| struct mlme_priv *pmlmepriv = &padapter->mlmepriv; |
| struct wlan_network *cur_network = &(pmlmepriv->cur_network); |
| struct wireless_dev *pwdev = padapter->rtw_wdev; |
| |
| DBG_871X(FUNC_ADPT_FMT"\n", FUNC_ADPT_ARG(padapter)); |
| if (pwdev->iftype != NL80211_IFTYPE_STATION |
| && pwdev->iftype != NL80211_IFTYPE_P2P_CLIENT |
| ) { |
| return; |
| } |
| |
| if (check_fwstate(pmlmepriv, WIFI_AP_STATE) == true) |
| return; |
| |
| { |
| struct wlan_bssid_ex *pnetwork = &(padapter->mlmeextpriv.mlmext_info.network); |
| struct wlan_network *scanned = pmlmepriv->cur_network_scanned; |
| |
| /* DBG_871X(FUNC_ADPT_FMT" BSS not found\n", FUNC_ADPT_ARG(padapter)); */ |
| |
| if (scanned == NULL) { |
| rtw_warn_on(1); |
| goto check_bss; |
| } |
| |
| if (!memcmp(scanned->network.MacAddress, pnetwork->MacAddress, sizeof(NDIS_802_11_MAC_ADDRESS)) |
| && !memcmp(&(scanned->network.Ssid), &(pnetwork->Ssid), sizeof(struct ndis_802_11_ssid)) |
| ) { |
| if (!rtw_cfg80211_inform_bss(padapter, scanned)) { |
| DBG_871X(FUNC_ADPT_FMT" inform fail !!\n", FUNC_ADPT_ARG(padapter)); |
| } else { |
| /* DBG_871X(FUNC_ADPT_FMT" inform success !!\n", FUNC_ADPT_ARG(padapter)); */ |
| } |
| } else { |
| DBG_871X("scanned: %s("MAC_FMT"), cur: %s("MAC_FMT")\n", |
| scanned->network.Ssid.Ssid, MAC_ARG(scanned->network.MacAddress), |
| pnetwork->Ssid.Ssid, MAC_ARG(pnetwork->MacAddress) |
| ); |
| rtw_warn_on(1); |
| } |
| } |
| |
| check_bss: |
| if (!rtw_cfg80211_check_bss(padapter)) |
| DBG_871X_LEVEL(_drv_always_, FUNC_ADPT_FMT" BSS not found !!\n", FUNC_ADPT_ARG(padapter)); |
| |
| if (rtw_to_roam(padapter) > 0) { |
| struct wiphy *wiphy = pwdev->wiphy; |
| struct ieee80211_channel *notify_channel; |
| u32 freq; |
| u16 channel = cur_network->network.Configuration.DSConfig; |
| struct cfg80211_roam_info roam_info = {}; |
| |
| freq = rtw_ieee80211_channel_to_frequency(channel, NL80211_BAND_2GHZ); |
| |
| notify_channel = ieee80211_get_channel(wiphy, freq); |
| |
| DBG_871X(FUNC_ADPT_FMT" call cfg80211_roamed\n", FUNC_ADPT_ARG(padapter)); |
| roam_info.channel = notify_channel; |
| roam_info.bssid = cur_network->network.MacAddress; |
| roam_info.req_ie = |
| pmlmepriv->assoc_req+sizeof(struct ieee80211_hdr_3addr)+2; |
| roam_info.req_ie_len = |
| pmlmepriv->assoc_req_len-sizeof(struct ieee80211_hdr_3addr)-2; |
| roam_info.resp_ie = |
| pmlmepriv->assoc_rsp+sizeof(struct ieee80211_hdr_3addr)+6; |
| roam_info.resp_ie_len = |
| pmlmepriv->assoc_rsp_len-sizeof(struct ieee80211_hdr_3addr)-6; |
| cfg80211_roamed(padapter->pnetdev, &roam_info, GFP_ATOMIC); |
| } |
| else |
| { |
| cfg80211_connect_result(padapter->pnetdev, cur_network->network.MacAddress |
| , pmlmepriv->assoc_req+sizeof(struct ieee80211_hdr_3addr)+2 |
| , pmlmepriv->assoc_req_len-sizeof(struct ieee80211_hdr_3addr)-2 |
| , pmlmepriv->assoc_rsp+sizeof(struct ieee80211_hdr_3addr)+6 |
| , pmlmepriv->assoc_rsp_len-sizeof(struct ieee80211_hdr_3addr)-6 |
| , WLAN_STATUS_SUCCESS, GFP_ATOMIC); |
| } |
| } |
| |
| void rtw_cfg80211_indicate_disconnect(struct adapter *padapter) |
| { |
| struct mlme_priv *pmlmepriv = &padapter->mlmepriv; |
| struct wireless_dev *pwdev = padapter->rtw_wdev; |
| |
| DBG_871X(FUNC_ADPT_FMT"\n", FUNC_ADPT_ARG(padapter)); |
| |
| if (pwdev->iftype != NL80211_IFTYPE_STATION |
| && pwdev->iftype != NL80211_IFTYPE_P2P_CLIENT |
| ) { |
| return; |
| } |
| |
| if (check_fwstate(pmlmepriv, WIFI_AP_STATE) == true) |
| return; |
| |
| if (!padapter->mlmepriv.not_indic_disco) { |
| if (check_fwstate(&padapter->mlmepriv, _FW_LINKED)) { |
| cfg80211_disconnected(padapter->pnetdev, 0, |
| NULL, 0, true, GFP_ATOMIC); |
| } else { |
| cfg80211_connect_result(padapter->pnetdev, NULL, NULL, 0, NULL, 0, |
| WLAN_STATUS_UNSPECIFIED_FAILURE, GFP_ATOMIC/*GFP_KERNEL*/); |
| } |
| } |
| } |
| |
| |
| static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len) |
| { |
| int ret = 0; |
| u32 wep_key_idx, wep_key_len; |
| struct sta_info *psta = NULL, *pbcmc_sta = NULL; |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev); |
| struct mlme_priv *pmlmepriv = &padapter->mlmepriv; |
| struct security_priv* psecuritypriv =&(padapter->securitypriv); |
| struct sta_priv *pstapriv = &padapter->stapriv; |
| |
| DBG_8192C("%s\n", __func__); |
| |
| param->u.crypt.err = 0; |
| param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; |
| |
| if (param_len != sizeof(struct ieee_param) + param->u.crypt.key_len) |
| { |
| ret = -EINVAL; |
| goto exit; |
| } |
| |
| if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff && |
| param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff && |
| param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) |
| { |
| if (param->u.crypt.idx >= WEP_KEYS) |
| { |
| ret = -EINVAL; |
| goto exit; |
| } |
| } |
| else |
| { |
| psta = rtw_get_stainfo(pstapriv, param->sta_addr); |
| if (!psta) |
| { |
| /* ret = -EINVAL; */ |
| DBG_8192C("rtw_set_encryption(), sta has already been removed or never been added\n"); |
| goto exit; |
| } |
| } |
| |
| if (strcmp(param->u.crypt.alg, "none") == 0 && (psta == NULL)) |
| { |
| /* todo:clear default encryption keys */ |
| |
| DBG_8192C("clear default encryption keys, keyid =%d\n", param->u.crypt.idx); |
| |
| goto exit; |
| } |
| |
| |
| if (strcmp(param->u.crypt.alg, "WEP") == 0 && (psta == NULL)) |
| { |
| DBG_8192C("r871x_set_encryption, crypt.alg = WEP\n"); |
| |
| wep_key_idx = param->u.crypt.idx; |
| wep_key_len = param->u.crypt.key_len; |
| |
| DBG_8192C("r871x_set_encryption, wep_key_idx =%d, len =%d\n", wep_key_idx, wep_key_len); |
| |
| if ((wep_key_idx >= WEP_KEYS) || (wep_key_len<= 0)) |
| { |
| ret = -EINVAL; |
| goto exit; |
| } |
| |
| if (wep_key_len > 0) |
| { |
| wep_key_len = wep_key_len <= 5 ? 5 : 13; |
| } |
| |
| if (psecuritypriv->bWepDefaultKeyIdxSet == 0) |
| { |
| /* wep default key has not been set, so use this key index as default key. */ |
| |
| psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Auto; |
| psecuritypriv->ndisencryptstatus = Ndis802_11Encryption1Enabled; |
| psecuritypriv->dot11PrivacyAlgrthm = _WEP40_; |
| psecuritypriv->dot118021XGrpPrivacy = _WEP40_; |
| |
| if (wep_key_len == 13) |
| { |
| psecuritypriv->dot11PrivacyAlgrthm = _WEP104_; |
| psecuritypriv->dot118021XGrpPrivacy = _WEP104_; |
| } |
| |
| psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx; |
| } |
| |
| memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len); |
| |
| psecuritypriv->dot11DefKeylen[wep_key_idx] = wep_key_len; |
| |
| rtw_ap_set_wep_key(padapter, param->u.crypt.key, wep_key_len, wep_key_idx, 1); |
| |
| goto exit; |
| |
| } |
| |
| |
| if (!psta && check_fwstate(pmlmepriv, WIFI_AP_STATE)) /* group key */ |
| { |
| if (param->u.crypt.set_tx == 0) /* group key */ |
| { |
| if (strcmp(param->u.crypt.alg, "WEP") == 0) |
| { |
| DBG_8192C("%s, set group_key, WEP\n", __func__); |
| |
| memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len)); |
| |
| psecuritypriv->dot118021XGrpPrivacy = _WEP40_; |
| if (param->u.crypt.key_len == 13) |
| { |
| psecuritypriv->dot118021XGrpPrivacy = _WEP104_; |
| } |
| |
| } |
| else if (strcmp(param->u.crypt.alg, "TKIP") == 0) |
| { |
| DBG_8192C("%s, set group_key, TKIP\n", __func__); |
| |
| psecuritypriv->dot118021XGrpPrivacy = _TKIP_; |
| |
| memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len)); |
| |
| /* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */ |
| /* set mic key */ |
| memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8); |
| memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8); |
| |
| psecuritypriv->busetkipkey = true; |
| |
| } |
| else if (strcmp(param->u.crypt.alg, "CCMP") == 0) |
| { |
| DBG_8192C("%s, set group_key, CCMP\n", __func__); |
| |
| psecuritypriv->dot118021XGrpPrivacy = _AES_; |
| |
| memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len)); |
| } |
| else |
| { |
| DBG_8192C("%s, set group_key, none\n", __func__); |
| |
| psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_; |
| } |
| |
| psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx; |
| |
| psecuritypriv->binstallGrpkey = true; |
| |
| psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/* */ |
| |
| rtw_ap_set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx); |
| |
| pbcmc_sta =rtw_get_bcmc_stainfo(padapter); |
| if (pbcmc_sta) |
| { |
| pbcmc_sta->ieee8021x_blocked = false; |
| pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */ |
| } |
| |
| } |
| |
| goto exit; |
| |
| } |
| |
| if (psecuritypriv->dot11AuthAlgrthm == dot11AuthAlgrthm_8021X && psta) /* psk/802_1x */ |
| { |
| if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) |
| { |
| if (param->u.crypt.set_tx == 1) /* pairwise key */ |
| { |
| memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len)); |
| |
| if (strcmp(param->u.crypt.alg, "WEP") == 0) |
| { |
| DBG_8192C("%s, set pairwise key, WEP\n", __func__); |
| |
| psta->dot118021XPrivacy = _WEP40_; |
| if (param->u.crypt.key_len == 13) |
| { |
| psta->dot118021XPrivacy = _WEP104_; |
| } |
| } |
| else if (strcmp(param->u.crypt.alg, "TKIP") == 0) |
| { |
| DBG_8192C("%s, set pairwise key, TKIP\n", __func__); |
| |
| psta->dot118021XPrivacy = _TKIP_; |
| |
| /* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */ |
| /* set mic key */ |
| memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8); |
| memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8); |
| |
| psecuritypriv->busetkipkey = true; |
| |
| } |
| else if (strcmp(param->u.crypt.alg, "CCMP") == 0) |
| { |
| |
| DBG_8192C("%s, set pairwise key, CCMP\n", __func__); |
| |
| psta->dot118021XPrivacy = _AES_; |
| } |
| else |
| { |
| DBG_8192C("%s, set pairwise key, none\n", __func__); |
| |
| psta->dot118021XPrivacy = _NO_PRIVACY_; |
| } |
| |
| rtw_ap_set_pairwise_key(padapter, psta); |
| |
| psta->ieee8021x_blocked = false; |
| |
| psta->bpairwise_key_installed = true; |
| |
| } |
| else/* group key??? */ |
| { |
| if (strcmp(param->u.crypt.alg, "WEP") == 0) |
| { |
| memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len)); |
| |
| psecuritypriv->dot118021XGrpPrivacy = _WEP40_; |
| if (param->u.crypt.key_len == 13) |
| { |
| psecuritypriv->dot118021XGrpPrivacy = _WEP104_; |
| } |
| } |
| else if (strcmp(param->u.crypt.alg, "TKIP") == 0) |
| { |
| psecuritypriv->dot118021XGrpPrivacy = _TKIP_; |
| |
| memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len)); |
| |
| /* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */ |
| /* set mic key */ |
| memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8); |
| memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8); |
| |
| psecuritypriv->busetkipkey = true; |
| |
| } |
| else if (strcmp(param->u.crypt.alg, "CCMP") == 0) |
| { |
| psecuritypriv->dot118021XGrpPrivacy = _AES_; |
| |
| memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len)); |
| } |
| else |
| { |
| psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_; |
| } |
| |
| psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx; |
| |
| psecuritypriv->binstallGrpkey = true; |
| |
| psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/* */ |
| |
| rtw_ap_set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx); |
| |
| pbcmc_sta =rtw_get_bcmc_stainfo(padapter); |
| if (pbcmc_sta) |
| { |
| pbcmc_sta->ieee8021x_blocked = false; |
| pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */ |
| } |
| |
| } |
| |
| } |
| |
| } |
| |
| exit: |
| |
| return ret; |
| |
| } |
| |
| static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len) |
| { |
| int ret = 0; |
| u32 wep_key_idx, wep_key_len; |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev); |
| struct mlme_priv *pmlmepriv = &padapter->mlmepriv; |
| struct security_priv *psecuritypriv = &padapter->securitypriv; |
| |
| DBG_8192C("%s\n", __func__); |
| |
| param->u.crypt.err = 0; |
| param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; |
| |
| if (param_len < (u32) ((u8 *) param->u.crypt.key - (u8 *) param) + param->u.crypt.key_len) |
| { |
| ret = -EINVAL; |
| goto exit; |
| } |
| |
| if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff && |
| param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff && |
| param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) |
| { |
| if (param->u.crypt.idx >= WEP_KEYS |
| || param->u.crypt.idx >= BIP_MAX_KEYID |
| ) |
| { |
| ret = -EINVAL; |
| goto exit; |
| } |
| } else { |
| { |
| ret = -EINVAL; |
| goto exit; |
| } |
| } |
| |
| if (strcmp(param->u.crypt.alg, "WEP") == 0) |
| { |
| RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("wpa_set_encryption, crypt.alg = WEP\n")); |
| DBG_8192C("wpa_set_encryption, crypt.alg = WEP\n"); |
| |
| wep_key_idx = param->u.crypt.idx; |
| wep_key_len = param->u.crypt.key_len; |
| |
| if ((wep_key_idx >= WEP_KEYS) || (wep_key_len <= 0)) |
| { |
| ret = -EINVAL; |
| goto exit; |
| } |
| |
| if (psecuritypriv->bWepDefaultKeyIdxSet == 0) |
| { |
| /* wep default key has not been set, so use this key index as default key. */ |
| |
| wep_key_len = wep_key_len <= 5 ? 5 : 13; |
| |
| psecuritypriv->ndisencryptstatus = Ndis802_11Encryption1Enabled; |
| psecuritypriv->dot11PrivacyAlgrthm = _WEP40_; |
| psecuritypriv->dot118021XGrpPrivacy = _WEP40_; |
| |
| if (wep_key_len == 13) |
| { |
| psecuritypriv->dot11PrivacyAlgrthm = _WEP104_; |
| psecuritypriv->dot118021XGrpPrivacy = _WEP104_; |
| } |
| |
| psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx; |
| } |
| |
| memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len); |
| |
| psecuritypriv->dot11DefKeylen[wep_key_idx] = wep_key_len; |
| |
| rtw_set_key(padapter, psecuritypriv, wep_key_idx, 0, true); |
| |
| goto exit; |
| } |
| |
| if (padapter->securitypriv.dot11AuthAlgrthm == dot11AuthAlgrthm_8021X) /* 802_1x */ |
| { |
| struct sta_info * psta,*pbcmc_sta; |
| struct sta_priv * pstapriv = &padapter->stapriv; |
| |
| /* DBG_8192C("%s, : dot11AuthAlgrthm == dot11AuthAlgrthm_8021X\n", __func__); */ |
| |
| if (check_fwstate(pmlmepriv, WIFI_STATION_STATE | WIFI_MP_STATE) == true) /* sta mode */ |
| { |
| psta = rtw_get_stainfo(pstapriv, get_bssid(pmlmepriv)); |
| if (psta == NULL) { |
| /* DEBUG_ERR(("Set wpa_set_encryption: Obtain Sta_info fail\n")); */ |
| DBG_8192C("%s, : Obtain Sta_info fail\n", __func__); |
| } |
| else |
| { |
| /* Jeff: don't disable ieee8021x_blocked while clearing key */ |
| if (strcmp(param->u.crypt.alg, "none") != 0) |
| psta->ieee8021x_blocked = false; |
| |
| |
| if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled)|| |
| (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption3Enabled)) |
| { |
| psta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm; |
| } |
| |
| if (param->u.crypt.set_tx == 1)/* pairwise key */ |
| { |
| |
| DBG_8192C("%s, : param->u.crypt.set_tx == 1\n", __func__); |
| |
| memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len)); |
| |
| if (strcmp(param->u.crypt.alg, "TKIP") == 0)/* set mic key */ |
| { |
| /* DEBUG_ERR(("\nset key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len)); */ |
| memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8); |
| memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8); |
| |
| padapter->securitypriv.busetkipkey =false; |
| /* _set_timer(&padapter->securitypriv.tkip_timer, 50); */ |
| } |
| |
| /* DEBUG_ERR((" param->u.crypt.key_len =%d\n", param->u.crypt.key_len)); */ |
| DBG_871X(" ~~~~set sta key:unicastkey\n"); |
| |
| rtw_setstakey_cmd(padapter, psta, true, true); |
| } |
| else/* group key */ |
| { |
| if (strcmp(param->u.crypt.alg, "TKIP") == 0 || strcmp(param->u.crypt.alg, "CCMP") == 0) |
| { |
| memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len)); |
| memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey,&(param->u.crypt.key[16]), 8); |
| memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey,&(param->u.crypt.key[24]), 8); |
| padapter->securitypriv.binstallGrpkey = true; |
| /* DEBUG_ERR((" param->u.crypt.key_len =%d\n", param->u.crypt.key_len)); */ |
| DBG_871X(" ~~~~set sta key:groupkey\n"); |
| |
| padapter->securitypriv.dot118021XGrpKeyid = param->u.crypt.idx; |
| rtw_set_key(padapter,&padapter->securitypriv, param->u.crypt.idx, 1, true); |
| } |
| else if (strcmp(param->u.crypt.alg, "BIP") == 0) |
| { |
| /* DBG_871X("BIP key_len =%d , index =%d @@@@@@@@@@@@@@@@@@\n", param->u.crypt.key_len, param->u.crypt.idx); */ |
| /* save the IGTK key, length 16 bytes */ |
| memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len)); |
| /*DBG_871X("IGTK key below:\n"); |
| for (no = 0;no<16;no++) |
| printk(" %02x ", padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey[no]); |
| DBG_871X("\n");*/ |
| padapter->securitypriv.dot11wBIPKeyid = param->u.crypt.idx; |
| padapter->securitypriv.binstallBIPkey = true; |
| DBG_871X(" ~~~~set sta key:IGKT\n"); |
| } |
| } |
| } |
| |
| pbcmc_sta =rtw_get_bcmc_stainfo(padapter); |
| if (pbcmc_sta == NULL) |
| { |
| /* DEBUG_ERR(("Set OID_802_11_ADD_KEY: bcmc stainfo is null\n")); */ |
| } |
| else |
| { |
| /* Jeff: don't disable ieee8021x_blocked while clearing key */ |
| if (strcmp(param->u.crypt.alg, "none") != 0) |
| pbcmc_sta->ieee8021x_blocked = false; |
| |
| if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled)|| |
| (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption3Enabled)) |
| { |
| pbcmc_sta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm; |
| } |
| } |
| } |
| else if (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE)) /* adhoc mode */ |
| { |
| } |
| } |
| |
| exit: |
| |
| DBG_8192C("%s, ret =%d\n", __func__, ret); |
| |
| return ret; |
| } |
| |
| static int cfg80211_rtw_add_key(struct wiphy *wiphy, struct net_device *ndev, |
| u8 key_index, bool pairwise, const u8 *mac_addr, |
| struct key_params *params) |
| { |
| char *alg_name; |
| u32 param_len; |
| struct ieee_param *param = NULL; |
| int ret = 0; |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct mlme_priv *pmlmepriv = &padapter->mlmepriv; |
| |
| DBG_871X(FUNC_NDEV_FMT" adding key for %pM\n", FUNC_NDEV_ARG(ndev), mac_addr); |
| DBG_871X("cipher = 0x%x\n", params->cipher); |
| DBG_871X("key_len = 0x%x\n", params->key_len); |
| DBG_871X("seq_len = 0x%x\n", params->seq_len); |
| DBG_871X("key_index =%d\n", key_index); |
| DBG_871X("pairwise =%d\n", pairwise); |
| |
| param_len = sizeof(struct ieee_param) + params->key_len; |
| param = (struct ieee_param *)rtw_malloc(param_len); |
| if (param == NULL) |
| return -1; |
| |
| memset(param, 0, param_len); |
| |
| param->cmd = IEEE_CMD_SET_ENCRYPTION; |
| memset(param->sta_addr, 0xff, ETH_ALEN); |
| |
| switch (params->cipher) { |
| case IW_AUTH_CIPHER_NONE: |
| /* todo: remove key */ |
| /* remove = 1; */ |
| alg_name = "none"; |
| break; |
| case WLAN_CIPHER_SUITE_WEP40: |
| case WLAN_CIPHER_SUITE_WEP104: |
| alg_name = "WEP"; |
| break; |
| case WLAN_CIPHER_SUITE_TKIP: |
| alg_name = "TKIP"; |
| break; |
| case WLAN_CIPHER_SUITE_CCMP: |
| alg_name = "CCMP"; |
| break; |
| case WLAN_CIPHER_SUITE_AES_CMAC: |
| alg_name = "BIP"; |
| break; |
| default: |
| ret = -ENOTSUPP; |
| goto addkey_end; |
| } |
| |
| strncpy((char *)param->u.crypt.alg, alg_name, IEEE_CRYPT_ALG_NAME_LEN); |
| |
| |
| if (!mac_addr || is_broadcast_ether_addr(mac_addr)) |
| { |
| param->u.crypt.set_tx = 0; /* for wpa/wpa2 group key */ |
| } else { |
| param->u.crypt.set_tx = 1; /* for wpa/wpa2 pairwise key */ |
| } |
| |
| param->u.crypt.idx = key_index; |
| |
| if (params->seq_len && params->seq) |
| { |
| memcpy(param->u.crypt.seq, (u8 *)params->seq, params->seq_len); |
| } |
| |
| if (params->key_len && params->key) |
| { |
| param->u.crypt.key_len = params->key_len; |
| memcpy(param->u.crypt.key, (u8 *)params->key, params->key_len); |
| } |
| |
| if (check_fwstate(pmlmepriv, WIFI_STATION_STATE) == true) |
| { |
| ret = rtw_cfg80211_set_encryption(ndev, param, param_len); |
| } |
| else if (check_fwstate(pmlmepriv, WIFI_AP_STATE) == true) |
| { |
| if (mac_addr) |
| memcpy(param->sta_addr, (void*)mac_addr, ETH_ALEN); |
| |
| ret = rtw_cfg80211_ap_set_encryption(ndev, param, param_len); |
| } |
| else if (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE) == true |
| || check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) == true) |
| { |
| /* DBG_8192C("@@@@@@@@@@ fw_state = 0x%x, iftype =%d\n", pmlmepriv->fw_state, rtw_wdev->iftype); */ |
| ret = rtw_cfg80211_set_encryption(ndev, param, param_len); |
| } |
| else |
| { |
| DBG_8192C("error!\n"); |
| |
| } |
| |
| addkey_end: |
| kfree((u8 *)param); |
| |
| return ret; |
| |
| } |
| |
| static int cfg80211_rtw_get_key(struct wiphy *wiphy, struct net_device *ndev, |
| u8 key_index, bool pairwise, const u8 *mac_addr, |
| void *cookie, |
| void (*callback)(void *cookie, |
| struct key_params*)) |
| { |
| DBG_871X(FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| return 0; |
| } |
| |
| static int cfg80211_rtw_del_key(struct wiphy *wiphy, struct net_device *ndev, |
| u8 key_index, bool pairwise, const u8 *mac_addr) |
| { |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct security_priv *psecuritypriv = &padapter->securitypriv; |
| |
| DBG_871X(FUNC_NDEV_FMT" key_index =%d\n", FUNC_NDEV_ARG(ndev), key_index); |
| |
| if (key_index == psecuritypriv->dot11PrivacyKeyIndex) |
| { |
| /* clear the flag of wep default key set. */ |
| psecuritypriv->bWepDefaultKeyIdxSet = 0; |
| } |
| |
| return 0; |
| } |
| |
| static int cfg80211_rtw_set_default_key(struct wiphy *wiphy, |
| struct net_device *ndev, u8 key_index |
| , bool unicast, bool multicast |
| ) |
| { |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct security_priv *psecuritypriv = &padapter->securitypriv; |
| |
| DBG_871X(FUNC_NDEV_FMT" key_index =%d, unicast =%d, multicast =%d\n", |
| FUNC_NDEV_ARG(ndev), key_index, unicast, multicast); |
| |
| if ((key_index < WEP_KEYS) && ((psecuritypriv->dot11PrivacyAlgrthm == _WEP40_) || (psecuritypriv->dot11PrivacyAlgrthm == _WEP104_))) /* set wep default key */ |
| { |
| psecuritypriv->ndisencryptstatus = Ndis802_11Encryption1Enabled; |
| |
| psecuritypriv->dot11PrivacyKeyIndex = key_index; |
| |
| psecuritypriv->dot11PrivacyAlgrthm = _WEP40_; |
| psecuritypriv->dot118021XGrpPrivacy = _WEP40_; |
| if (psecuritypriv->dot11DefKeylen[key_index] == 13) |
| { |
| psecuritypriv->dot11PrivacyAlgrthm = _WEP104_; |
| psecuritypriv->dot118021XGrpPrivacy = _WEP104_; |
| } |
| |
| psecuritypriv->bWepDefaultKeyIdxSet = 1; /* set the flag to represent that wep default key has been set */ |
| } |
| |
| return 0; |
| |
| } |
| |
| static int cfg80211_rtw_get_station(struct wiphy *wiphy, |
| struct net_device *ndev, |
| const u8 *mac, |
| struct station_info *sinfo) |
| { |
| int ret = 0; |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct mlme_priv *pmlmepriv = &padapter->mlmepriv; |
| struct sta_info *psta = NULL; |
| struct sta_priv *pstapriv = &padapter->stapriv; |
| |
| sinfo->filled = 0; |
| |
| if (!mac) { |
| DBG_871X(FUNC_NDEV_FMT" mac ==%p\n", FUNC_NDEV_ARG(ndev), mac); |
| ret = -ENOENT; |
| goto exit; |
| } |
| |
| psta = rtw_get_stainfo(pstapriv, (u8 *)mac); |
| if (psta == NULL) { |
| DBG_8192C("%s, sta_info is null\n", __func__); |
| ret = -ENOENT; |
| goto exit; |
| } |
| |
| #ifdef DEBUG_CFG80211 |
| DBG_871X(FUNC_NDEV_FMT" mac ="MAC_FMT"\n", FUNC_NDEV_ARG(ndev), MAC_ARG(mac)); |
| #endif |
| |
| /* for infra./P2PClient mode */ |
| if (check_fwstate(pmlmepriv, WIFI_STATION_STATE) |
| && check_fwstate(pmlmepriv, _FW_LINKED) |
| ) |
| { |
| struct wlan_network *cur_network = &(pmlmepriv->cur_network); |
| |
| if (memcmp((u8 *)mac, cur_network->network.MacAddress, ETH_ALEN)) { |
| DBG_871X("%s, mismatch bssid ="MAC_FMT"\n", __func__, MAC_ARG(cur_network->network.MacAddress)); |
| ret = -ENOENT; |
| goto exit; |
| } |
| |
| sinfo->filled |= BIT(NL80211_STA_INFO_SIGNAL); |
| sinfo->signal = translate_percentage_to_dbm(padapter->recvpriv.signal_strength); |
| |
| sinfo->filled |= BIT(NL80211_STA_INFO_TX_BITRATE); |
| sinfo->txrate.legacy = rtw_get_cur_max_rate(padapter); |
| |
| sinfo->filled |= BIT(NL80211_STA_INFO_RX_PACKETS); |
| sinfo->rx_packets = sta_rx_data_pkts(psta); |
| |
| sinfo->filled |= BIT(NL80211_STA_INFO_TX_PACKETS); |
| sinfo->tx_packets = psta->sta_stats.tx_pkts; |
| |
| } |
| |
| /* for Ad-Hoc/AP mode */ |
| if ((check_fwstate(pmlmepriv, WIFI_ADHOC_STATE) |
| ||check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) |
| ||check_fwstate(pmlmepriv, WIFI_AP_STATE)) |
| && check_fwstate(pmlmepriv, _FW_LINKED) |
| ) |
| { |
| /* TODO: should acquire station info... */ |
| } |
| |
| exit: |
| return ret; |
| } |
| |
| extern int netdev_open(struct net_device *pnetdev); |
| |
| static int cfg80211_rtw_change_iface(struct wiphy *wiphy, |
| struct net_device *ndev, |
| enum nl80211_iftype type, |
| struct vif_params *params) |
| { |
| enum nl80211_iftype old_type; |
| enum NDIS_802_11_NETWORK_INFRASTRUCTURE networkType; |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct wireless_dev *rtw_wdev = padapter->rtw_wdev; |
| struct mlme_ext_priv *pmlmeext = &(padapter->mlmeextpriv); |
| int ret = 0; |
| u8 change = false; |
| |
| DBG_871X(FUNC_NDEV_FMT" type =%d\n", FUNC_NDEV_ARG(ndev), type); |
| |
| if (adapter_to_dvobj(padapter)->processing_dev_remove == true) |
| { |
| ret = -EPERM; |
| goto exit; |
| } |
| |
| { |
| DBG_871X(FUNC_NDEV_FMT" call netdev_open\n", FUNC_NDEV_ARG(ndev)); |
| if (netdev_open(ndev) != 0) { |
| DBG_871X(FUNC_NDEV_FMT" call netdev_open fail\n", FUNC_NDEV_ARG(ndev)); |
| ret = -EPERM; |
| goto exit; |
| } |
| } |
| |
| if (_FAIL == rtw_pwr_wakeup(padapter)) { |
| DBG_871X(FUNC_NDEV_FMT" call rtw_pwr_wakeup fail\n", FUNC_NDEV_ARG(ndev)); |
| ret = -EPERM; |
| goto exit; |
| } |
| |
| old_type = rtw_wdev->iftype; |
| DBG_871X(FUNC_NDEV_FMT" old_iftype =%d, new_iftype =%d\n", |
| FUNC_NDEV_ARG(ndev), old_type, type); |
| |
| if (old_type != type) |
| { |
| change = true; |
| pmlmeext->action_public_rxseq = 0xffff; |
| pmlmeext->action_public_dialog_token = 0xff; |
| } |
| |
| switch (type) { |
| case NL80211_IFTYPE_ADHOC: |
| networkType = Ndis802_11IBSS; |
| break; |
| case NL80211_IFTYPE_STATION: |
| networkType = Ndis802_11Infrastructure; |
| break; |
| case NL80211_IFTYPE_AP: |
| networkType = Ndis802_11APMode; |
| break; |
| default: |
| ret = -EOPNOTSUPP; |
| goto exit; |
| } |
| |
| rtw_wdev->iftype = type; |
| |
| if (rtw_set_802_11_infrastructure_mode(padapter, networkType) ==false) |
| { |
| rtw_wdev->iftype = old_type; |
| ret = -EPERM; |
| goto exit; |
| } |
| |
| rtw_setopmode_cmd(padapter, networkType, true); |
| |
| exit: |
| |
| DBG_871X(FUNC_NDEV_FMT" ret:%d\n", FUNC_NDEV_ARG(ndev), ret); |
| return ret; |
| } |
| |
| void rtw_cfg80211_indicate_scan_done(struct adapter *adapter, bool aborted) |
| { |
| struct rtw_wdev_priv *pwdev_priv = adapter_wdev_data(adapter); |
| struct cfg80211_scan_info info = { |
| .aborted = aborted |
| }; |
| |
| spin_lock_bh(&pwdev_priv->scan_req_lock); |
| if (pwdev_priv->scan_request != NULL) { |
| #ifdef DEBUG_CFG80211 |
| DBG_871X("%s with scan req\n", __func__); |
| #endif |
| |
| /* avoid WARN_ON(request != wiphy_to_dev(request->wiphy)->scan_req); */ |
| if (pwdev_priv->scan_request->wiphy != pwdev_priv->rtw_wdev->wiphy) |
| { |
| DBG_8192C("error wiphy compare\n"); |
| } |
| else |
| { |
| cfg80211_scan_done(pwdev_priv->scan_request, &info); |
| } |
| |
| pwdev_priv->scan_request = NULL; |
| } else { |
| #ifdef DEBUG_CFG80211 |
| DBG_871X("%s without scan req\n", __func__); |
| #endif |
| } |
| spin_unlock_bh(&pwdev_priv->scan_req_lock); |
| } |
| |
| void rtw_cfg80211_unlink_bss(struct adapter *padapter, struct wlan_network *pnetwork) |
| { |
| struct wireless_dev *pwdev = padapter->rtw_wdev; |
| struct wiphy *wiphy = pwdev->wiphy; |
| struct cfg80211_bss *bss = NULL; |
| struct wlan_bssid_ex select_network = pnetwork->network; |
| |
| bss = cfg80211_get_bss(wiphy, NULL/*notify_channel*/, |
| select_network.MacAddress, select_network.Ssid.Ssid, |
| select_network.Ssid.SsidLength, 0/*WLAN_CAPABILITY_ESS*/, |
| 0/*WLAN_CAPABILITY_ESS*/); |
| |
| if (bss) { |
| cfg80211_unlink_bss(wiphy, bss); |
| DBG_8192C("%s(): cfg80211_unlink %s!! () ", __func__, select_network.Ssid.Ssid); |
| cfg80211_put_bss(padapter->rtw_wdev->wiphy, bss); |
| } |
| return; |
| } |
| |
| void rtw_cfg80211_surveydone_event_callback(struct adapter *padapter) |
| { |
| struct list_head *plist, *phead; |
| struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); |
| struct __queue *queue = &(pmlmepriv->scanned_queue); |
| struct wlan_network *pnetwork = NULL; |
| |
| #ifdef DEBUG_CFG80211 |
| DBG_8192C("%s\n", __func__); |
| #endif |
| |
| spin_lock_bh(&(pmlmepriv->scanned_queue.lock)); |
| |
| phead = get_list_head(queue); |
| plist = get_next(phead); |
| |
| while (1) |
| { |
| if (phead == plist) |
| break; |
| |
| pnetwork = LIST_CONTAINOR(plist, struct wlan_network, list); |
| |
| /* report network only if the current channel set contains the channel to which this network belongs */ |
| if (rtw_ch_set_search_ch(padapter->mlmeextpriv.channel_set, pnetwork->network.Configuration.DSConfig) >= 0 |
| && rtw_mlme_band_check(padapter, pnetwork->network.Configuration.DSConfig) == true |
| && true == rtw_validate_ssid(&(pnetwork->network.Ssid)) |
| ) |
| { |
| /* ev =translate_scan(padapter, a, pnetwork, ev, stop); */ |
| rtw_cfg80211_inform_bss(padapter, pnetwork); |
| } |
| |
| plist = get_next(plist); |
| |
| } |
| |
| spin_unlock_bh(&(pmlmepriv->scanned_queue.lock)); |
| } |
| |
| static int rtw_cfg80211_set_probe_req_wpsp2pie(struct adapter *padapter, char *buf, int len) |
| { |
| int ret = 0; |
| uint wps_ielen = 0; |
| u8 *wps_ie; |
| struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); |
| |
| #ifdef DEBUG_CFG80211 |
| DBG_8192C("%s, ielen =%d\n", __func__, len); |
| #endif |
| |
| if (len>0) |
| { |
| if ((wps_ie = rtw_get_wps_ie(buf, len, NULL, &wps_ielen))) |
| { |
| #ifdef DEBUG_CFG80211 |
| DBG_8192C("probe_req_wps_ielen =%d\n", wps_ielen); |
| #endif |
| |
| if (pmlmepriv->wps_probe_req_ie) |
| { |
| pmlmepriv->wps_probe_req_ie_len = 0; |
| kfree(pmlmepriv->wps_probe_req_ie); |
| pmlmepriv->wps_probe_req_ie = NULL; |
| } |
| |
| pmlmepriv->wps_probe_req_ie = rtw_malloc(wps_ielen); |
| if (pmlmepriv->wps_probe_req_ie == NULL) { |
| DBG_8192C("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__); |
| return -EINVAL; |
| |
| } |
| memcpy(pmlmepriv->wps_probe_req_ie, wps_ie, wps_ielen); |
| pmlmepriv->wps_probe_req_ie_len = wps_ielen; |
| } |
| } |
| |
| return ret; |
| |
| } |
| |
| static int cfg80211_rtw_scan(struct wiphy *wiphy |
| , struct cfg80211_scan_request *request) |
| { |
| struct net_device *ndev = wdev_to_ndev(request->wdev); |
| int i; |
| u8 _status = false; |
| int ret = 0; |
| struct ndis_802_11_ssid ssid[RTW_SSID_SCAN_AMOUNT]; |
| struct rtw_ieee80211_channel ch[RTW_CHANNEL_SCAN_AMOUNT]; |
| u8 survey_times =3; |
| u8 survey_times_for_one_ch =6; |
| struct cfg80211_ssid *ssids = request->ssids; |
| int j = 0; |
| bool need_indicate_scan_done = false; |
| |
| struct adapter *padapter; |
| struct rtw_wdev_priv *pwdev_priv; |
| struct mlme_priv *pmlmepriv; |
| |
| if (ndev == NULL) { |
| ret = -EINVAL; |
| goto exit; |
| } |
| |
| padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| pwdev_priv = adapter_wdev_data(padapter); |
| pmlmepriv = &padapter->mlmepriv; |
| |
| /* ifdef DEBUG_CFG80211 */ |
| DBG_871X(FUNC_ADPT_FMT"\n", FUNC_ADPT_ARG(padapter)); |
| /* endif */ |
| |
| spin_lock_bh(&pwdev_priv->scan_req_lock); |
| pwdev_priv->scan_request = request; |
| spin_unlock_bh(&pwdev_priv->scan_req_lock); |
| |
| if (check_fwstate(pmlmepriv, WIFI_AP_STATE) == true) |
| { |
| #ifdef DEBUG_CFG80211 |
| DBG_871X("%s under WIFI_AP_STATE\n", __func__); |
| #endif |
| |
| if (check_fwstate(pmlmepriv, WIFI_UNDER_WPS|_FW_UNDER_SURVEY|_FW_UNDER_LINKING) == true) |
| { |
| DBG_8192C("%s, fwstate = 0x%x\n", __func__, pmlmepriv->fw_state); |
| |
| if (check_fwstate(pmlmepriv, WIFI_UNDER_WPS)) |
| { |
| DBG_8192C("AP mode process WPS\n"); |
| } |
| |
| need_indicate_scan_done = true; |
| goto check_need_indicate_scan_done; |
| } |
| } |
| |
| rtw_ps_deny(padapter, PS_DENY_SCAN); |
| if (_FAIL == rtw_pwr_wakeup(padapter)) { |
| need_indicate_scan_done = true; |
| goto check_need_indicate_scan_done; |
| } |
| |
| if (request->ie && request->ie_len>0) |
| { |
| rtw_cfg80211_set_probe_req_wpsp2pie(padapter, (u8 *)request->ie, request->ie_len); |
| } |
| |
| if (check_fwstate(pmlmepriv, _FW_UNDER_SURVEY) == true) { |
| DBG_8192C("%s, fwstate = 0x%x\n", __func__, pmlmepriv->fw_state); |
| need_indicate_scan_done = true; |
| goto check_need_indicate_scan_done; |
| } else if (check_fwstate(pmlmepriv, _FW_UNDER_LINKING) == true) { |
| DBG_8192C("%s, fwstate = 0x%x\n", __func__, pmlmepriv->fw_state); |
| ret = -EBUSY; |
| goto check_need_indicate_scan_done; |
| } |
| |
| if (pmlmepriv->LinkDetectInfo.bBusyTraffic == true) |
| { |
| static unsigned long lastscantime = 0; |
| unsigned long passtime; |
| |
| passtime = jiffies_to_msecs(jiffies - lastscantime); |
| lastscantime = jiffies; |
| if (passtime > 12000) |
| { |
| DBG_871X("%s: bBusyTraffic == true\n", __func__); |
| need_indicate_scan_done = true; |
| goto check_need_indicate_scan_done; |
| } |
| } |
| |
| if (rtw_is_scan_deny(padapter)) { |
| DBG_871X(FUNC_ADPT_FMT ": scan deny\n", FUNC_ADPT_ARG(padapter)); |
| need_indicate_scan_done = true; |
| goto check_need_indicate_scan_done; |
| } |
| |
| memset(ssid, 0, sizeof(struct ndis_802_11_ssid)*RTW_SSID_SCAN_AMOUNT); |
| /* parsing request ssids, n_ssids */ |
| for (i = 0; i < request->n_ssids && i < RTW_SSID_SCAN_AMOUNT; i++) { |
| #ifdef DEBUG_CFG80211 |
| DBG_8192C("ssid =%s, len =%d\n", ssids[i].ssid, ssids[i].ssid_len); |
| #endif |
| memcpy(ssid[i].Ssid, ssids[i].ssid, ssids[i].ssid_len); |
| ssid[i].SsidLength = ssids[i].ssid_len; |
| } |
| |
| /* parsing channels, n_channels */ |
| memset(ch, 0, sizeof(struct rtw_ieee80211_channel)*RTW_CHANNEL_SCAN_AMOUNT); |
| for (i = 0;i<request->n_channels && i<RTW_CHANNEL_SCAN_AMOUNT;i++) { |
| #ifdef DEBUG_CFG80211 |
| DBG_871X(FUNC_ADPT_FMT CHAN_FMT"\n", FUNC_ADPT_ARG(padapter), CHAN_ARG(request->channels[i])); |
| #endif |
| ch[i].hw_value = request->channels[i]->hw_value; |
| ch[i].flags = request->channels[i]->flags; |
| } |
| |
| spin_lock_bh(&pmlmepriv->lock); |
| if (request->n_channels == 1) { |
| for (i = 1;i<survey_times_for_one_ch;i++) |
| memcpy(&ch[i], &ch[0], sizeof(struct rtw_ieee80211_channel)); |
| _status = rtw_sitesurvey_cmd(padapter, ssid, RTW_SSID_SCAN_AMOUNT, ch, survey_times_for_one_ch); |
| } else if (request->n_channels <= 4) { |
| for (j =request->n_channels-1;j>= 0;j--) |
| for (i = 0;i<survey_times;i++) |
| { |
| memcpy(&ch[j*survey_times+i], &ch[j], sizeof(struct rtw_ieee80211_channel)); |
| } |
| _status = rtw_sitesurvey_cmd(padapter, ssid, RTW_SSID_SCAN_AMOUNT, ch, survey_times * request->n_channels); |
| } else { |
| _status = rtw_sitesurvey_cmd(padapter, ssid, RTW_SSID_SCAN_AMOUNT, NULL, 0); |
| } |
| spin_unlock_bh(&pmlmepriv->lock); |
| |
| |
| if (_status == false) |
| { |
| ret = -1; |
| } |
| |
| check_need_indicate_scan_done: |
| if (true == need_indicate_scan_done) |
| { |
| rtw_cfg80211_surveydone_event_callback(padapter); |
| rtw_cfg80211_indicate_scan_done(padapter, false); |
| } |
| |
| rtw_ps_deny_cancel(padapter, PS_DENY_SCAN); |
| |
| exit: |
| return ret; |
| |
| } |
| |
| static int cfg80211_rtw_set_wiphy_params(struct wiphy *wiphy, u32 changed) |
| { |
| DBG_8192C("%s\n", __func__); |
| return 0; |
| } |
| |
| |
| |
| static int rtw_cfg80211_set_wpa_version(struct security_priv *psecuritypriv, u32 wpa_version) |
| { |
| DBG_8192C("%s, wpa_version =%d\n", __func__, wpa_version); |
| |
| if (!wpa_version) { |
| psecuritypriv->ndisauthtype = Ndis802_11AuthModeOpen; |
| return 0; |
| } |
| |
| |
| if (wpa_version & (NL80211_WPA_VERSION_1 | NL80211_WPA_VERSION_2)) |
| { |
| psecuritypriv->ndisauthtype = Ndis802_11AuthModeWPAPSK; |
| } |
| |
| return 0; |
| |
| } |
| |
| static int rtw_cfg80211_set_auth_type(struct security_priv *psecuritypriv, |
| enum nl80211_auth_type sme_auth_type) |
| { |
| DBG_8192C("%s, nl80211_auth_type =%d\n", __func__, sme_auth_type); |
| |
| |
| switch (sme_auth_type) { |
| case NL80211_AUTHTYPE_AUTOMATIC: |
| |
| psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Auto; |
| |
| break; |
| case NL80211_AUTHTYPE_OPEN_SYSTEM: |
| |
| psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Open; |
| |
| if (psecuritypriv->ndisauthtype>Ndis802_11AuthModeWPA) |
| psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; |
| |
| break; |
| case NL80211_AUTHTYPE_SHARED_KEY: |
| |
| psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Shared; |
| |
| psecuritypriv->ndisencryptstatus = Ndis802_11Encryption1Enabled; |
| |
| |
| break; |
| default: |
| psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Open; |
| /* return -ENOTSUPP; */ |
| } |
| |
| return 0; |
| |
| } |
| |
| static int rtw_cfg80211_set_cipher(struct security_priv *psecuritypriv, u32 cipher, bool ucast) |
| { |
| u32 ndisencryptstatus = Ndis802_11EncryptionDisabled; |
| |
| u32 *profile_cipher = ucast ? &psecuritypriv->dot11PrivacyAlgrthm : |
| &psecuritypriv->dot118021XGrpPrivacy; |
| |
| DBG_8192C("%s, ucast =%d, cipher = 0x%x\n", __func__, ucast, cipher); |
| |
| |
| if (!cipher) { |
| *profile_cipher = _NO_PRIVACY_; |
| psecuritypriv->ndisencryptstatus = ndisencryptstatus; |
| return 0; |
| } |
| |
| switch (cipher) { |
| case IW_AUTH_CIPHER_NONE: |
| *profile_cipher = _NO_PRIVACY_; |
| ndisencryptstatus = Ndis802_11EncryptionDisabled; |
| break; |
| case WLAN_CIPHER_SUITE_WEP40: |
| *profile_cipher = _WEP40_; |
| ndisencryptstatus = Ndis802_11Encryption1Enabled; |
| break; |
| case WLAN_CIPHER_SUITE_WEP104: |
| *profile_cipher = _WEP104_; |
| ndisencryptstatus = Ndis802_11Encryption1Enabled; |
| break; |
| case WLAN_CIPHER_SUITE_TKIP: |
| *profile_cipher = _TKIP_; |
| ndisencryptstatus = Ndis802_11Encryption2Enabled; |
| break; |
| case WLAN_CIPHER_SUITE_CCMP: |
| *profile_cipher = _AES_; |
| ndisencryptstatus = Ndis802_11Encryption3Enabled; |
| break; |
| default: |
| DBG_8192C("Unsupported cipher: 0x%x\n", cipher); |
| return -ENOTSUPP; |
| } |
| |
| if (ucast) |
| { |
| psecuritypriv->ndisencryptstatus = ndisencryptstatus; |
| |
| /* if (psecuritypriv->dot11PrivacyAlgrthm >= _AES_) */ |
| /* psecuritypriv->ndisauthtype = Ndis802_11AuthModeWPA2PSK; */ |
| } |
| |
| return 0; |
| } |
| |
| static int rtw_cfg80211_set_key_mgt(struct security_priv *psecuritypriv, u32 key_mgt) |
| { |
| DBG_8192C("%s, key_mgt = 0x%x\n", __func__, key_mgt); |
| |
| if (key_mgt == WLAN_AKM_SUITE_8021X) |
| /* auth_type = UMAC_AUTH_TYPE_8021X; */ |
| psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; |
| else if (key_mgt == WLAN_AKM_SUITE_PSK) { |
| psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; |
| } |
| else { |
| DBG_8192C("Invalid key mgt: 0x%x\n", key_mgt); |
| /* return -EINVAL; */ |
| } |
| |
| return 0; |
| } |
| |
| static int rtw_cfg80211_set_wpa_ie(struct adapter *padapter, u8 *pie, size_t ielen) |
| { |
| u8 *buf = NULL, *pos = NULL; |
| int group_cipher = 0, pairwise_cipher = 0; |
| int ret = 0; |
| int wpa_ielen = 0; |
| int wpa2_ielen = 0; |
| u8 *pwpa, *pwpa2; |
| u8 null_addr[]= {0, 0, 0, 0, 0, 0}; |
| |
| if (pie == NULL || !ielen) { |
| /* Treat this as normal case, but need to clear WIFI_UNDER_WPS */ |
| _clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS); |
| goto exit; |
| } |
| |
| if (ielen > MAX_WPA_IE_LEN+MAX_WPS_IE_LEN+MAX_P2P_IE_LEN) { |
| ret = -EINVAL; |
| goto exit; |
| } |
| |
| buf = rtw_zmalloc(ielen); |
| if (buf == NULL) { |
| ret = -ENOMEM; |
| goto exit; |
| } |
| |
| memcpy(buf, pie , ielen); |
| |
| /* dump */ |
| { |
| int i; |
| DBG_8192C("set wpa_ie(length:%zu):\n", ielen); |
| for (i = 0;i<ielen;i =i+8) |
| DBG_8192C("0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x\n", buf[i], buf[i+1], buf[i+2], buf[i+3], buf[i+4], buf[i+5], buf[i+6], buf[i+7]); |
| } |
| |
| pos = buf; |
| if (ielen < RSN_HEADER_LEN) { |
| RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("Ie len too short %d\n", ielen)); |
| ret = -1; |
| goto exit; |
| } |
| |
| pwpa = rtw_get_wpa_ie(buf, &wpa_ielen, ielen); |
| if (pwpa && wpa_ielen>0) |
| { |
| if (rtw_parse_wpa_ie(pwpa, wpa_ielen+2, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) |
| { |
| padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; |
| padapter->securitypriv.ndisauthtype =Ndis802_11AuthModeWPAPSK; |
| memcpy(padapter->securitypriv.supplicant_ie, &pwpa[0], wpa_ielen+2); |
| |
| DBG_8192C("got wpa_ie, wpa_ielen:%u\n", wpa_ielen); |
| } |
| } |
| |
| pwpa2 = rtw_get_wpa2_ie(buf, &wpa2_ielen, ielen); |
| if (pwpa2 && wpa2_ielen>0) |
| { |
| if (rtw_parse_wpa2_ie(pwpa2, wpa2_ielen+2, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) |
| { |
| padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; |
| padapter->securitypriv.ndisauthtype =Ndis802_11AuthModeWPA2PSK; |
| memcpy(padapter->securitypriv.supplicant_ie, &pwpa2[0], wpa2_ielen+2); |
| |
| DBG_8192C("got wpa2_ie, wpa2_ielen:%u\n", wpa2_ielen); |
| } |
| } |
| |
| if (group_cipher == 0) |
| { |
| group_cipher = WPA_CIPHER_NONE; |
| } |
| if (pairwise_cipher == 0) |
| { |
| pairwise_cipher = WPA_CIPHER_NONE; |
| } |
| |
| switch (group_cipher) |
| { |
| case WPA_CIPHER_NONE: |
| padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_; |
| padapter->securitypriv.ndisencryptstatus =Ndis802_11EncryptionDisabled; |
| break; |
| case WPA_CIPHER_WEP40: |
| padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_; |
| padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; |
| break; |
| case WPA_CIPHER_TKIP: |
| padapter->securitypriv.dot118021XGrpPrivacy = _TKIP_; |
| padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled; |
| break; |
| case WPA_CIPHER_CCMP: |
| padapter->securitypriv.dot118021XGrpPrivacy = _AES_; |
| padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled; |
| break; |
| case WPA_CIPHER_WEP104: |
| padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_; |
| padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; |
| break; |
| } |
| |
| switch (pairwise_cipher) |
| { |
| case WPA_CIPHER_NONE: |
| padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_; |
| padapter->securitypriv.ndisencryptstatus =Ndis802_11EncryptionDisabled; |
| break; |
| case WPA_CIPHER_WEP40: |
| padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_; |
| padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; |
| break; |
| case WPA_CIPHER_TKIP: |
| padapter->securitypriv.dot11PrivacyAlgrthm = _TKIP_; |
| padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled; |
| break; |
| case WPA_CIPHER_CCMP: |
| padapter->securitypriv.dot11PrivacyAlgrthm = _AES_; |
| padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled; |
| break; |
| case WPA_CIPHER_WEP104: |
| padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_; |
| padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; |
| break; |
| } |
| |
| {/* handle wps_ie */ |
| uint wps_ielen; |
| u8 *wps_ie; |
| |
| wps_ie = rtw_get_wps_ie(buf, ielen, NULL, &wps_ielen); |
| if (wps_ie && wps_ielen > 0) { |
| DBG_8192C("got wps_ie, wps_ielen:%u\n", wps_ielen); |
| padapter->securitypriv.wps_ie_len = wps_ielen<MAX_WPS_IE_LEN?wps_ielen:MAX_WPS_IE_LEN; |
| memcpy(padapter->securitypriv.wps_ie, wps_ie, padapter->securitypriv.wps_ie_len); |
| set_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS); |
| } else { |
| _clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS); |
| } |
| } |
| |
| /* TKIP and AES disallow multicast packets until installing group key */ |
| if (padapter->securitypriv.dot11PrivacyAlgrthm == _TKIP_ |
| || padapter->securitypriv.dot11PrivacyAlgrthm == _TKIP_WTMIC_ |
| || padapter->securitypriv.dot11PrivacyAlgrthm == _AES_) |
| /* WPS open need to enable multicast */ |
| /* check_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS) == true) */ |
| rtw_hal_set_hwreg(padapter, HW_VAR_OFF_RCR_AM, null_addr); |
| |
| RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, |
| ("rtw_set_wpa_ie: pairwise_cipher = 0x%08x padapter->securitypriv.ndisencryptstatus =%d padapter->securitypriv.ndisauthtype =%d\n", |
| pairwise_cipher, padapter->securitypriv.ndisencryptstatus, padapter->securitypriv.ndisauthtype)); |
| |
| exit: |
| kfree(buf); |
| if (ret) |
| _clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS); |
| return ret; |
| } |
| |
| static int cfg80211_rtw_join_ibss(struct wiphy *wiphy, struct net_device *ndev, |
| struct cfg80211_ibss_params *params) |
| { |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct ndis_802_11_ssid ndis_ssid; |
| struct security_priv *psecuritypriv = &padapter->securitypriv; |
| struct mlme_priv *pmlmepriv = &padapter->mlmepriv; |
| int ret = 0; |
| |
| if (_FAIL == rtw_pwr_wakeup(padapter)) { |
| ret = -EPERM; |
| goto exit; |
| } |
| |
| if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) { |
| ret = -EPERM; |
| goto exit; |
| } |
| |
| if (!params->ssid || !params->ssid_len) |
| { |
| ret = -EINVAL; |
| goto exit; |
| } |
| |
| if (params->ssid_len > IW_ESSID_MAX_SIZE) { |
| |
| ret = -E2BIG; |
| goto exit; |
| } |
| |
| memset(&ndis_ssid, 0, sizeof(struct ndis_802_11_ssid)); |
| ndis_ssid.SsidLength = params->ssid_len; |
| memcpy(ndis_ssid.Ssid, (u8 *)params->ssid, params->ssid_len); |
| |
| /* DBG_8192C("ssid =%s, len =%zu\n", ndis_ssid.Ssid, params->ssid_len); */ |
| |
| psecuritypriv->ndisencryptstatus = Ndis802_11EncryptionDisabled; |
| psecuritypriv->dot11PrivacyAlgrthm = _NO_PRIVACY_; |
| psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_; |
| psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */ |
| psecuritypriv->ndisauthtype = Ndis802_11AuthModeOpen; |
| |
| ret = rtw_cfg80211_set_auth_type(psecuritypriv, NL80211_AUTHTYPE_OPEN_SYSTEM); |
| rtw_set_802_11_authentication_mode(padapter, psecuritypriv->ndisauthtype); |
| |
| if (rtw_set_802_11_ssid(padapter, &ndis_ssid) == false) |
| { |
| ret = -1; |
| goto exit; |
| } |
| |
| exit: |
| return ret; |
| } |
| |
| static int cfg80211_rtw_leave_ibss(struct wiphy *wiphy, struct net_device *ndev) |
| { |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct wireless_dev *rtw_wdev = padapter->rtw_wdev; |
| enum nl80211_iftype old_type; |
| int ret = 0; |
| |
| DBG_871X(FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| |
| padapter->mlmepriv.not_indic_disco = true; |
| |
| old_type = rtw_wdev->iftype; |
| |
| rtw_set_to_roam(padapter, 0); |
| |
| if (check_fwstate(&padapter->mlmepriv, _FW_LINKED)) |
| { |
| rtw_scan_abort(padapter); |
| LeaveAllPowerSaveMode(padapter); |
| |
| rtw_wdev->iftype = NL80211_IFTYPE_STATION; |
| |
| if (rtw_set_802_11_infrastructure_mode(padapter, Ndis802_11Infrastructure) ==false) |
| { |
| rtw_wdev->iftype = old_type; |
| ret = -EPERM; |
| goto leave_ibss; |
| } |
| rtw_setopmode_cmd(padapter, Ndis802_11Infrastructure, true); |
| } |
| |
| leave_ibss: |
| padapter->mlmepriv.not_indic_disco = false; |
| |
| return 0; |
| } |
| |
| static int cfg80211_rtw_connect(struct wiphy *wiphy, struct net_device *ndev, |
| struct cfg80211_connect_params *sme) |
| { |
| int ret = 0; |
| enum NDIS_802_11_AUTHENTICATION_MODE authmode; |
| struct ndis_802_11_ssid ndis_ssid; |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct mlme_priv *pmlmepriv = &padapter->mlmepriv; |
| struct security_priv *psecuritypriv = &padapter->securitypriv; |
| |
| padapter->mlmepriv.not_indic_disco = true; |
| |
| DBG_871X("=>"FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| DBG_871X("privacy =%d, key =%p, key_len =%d, key_idx =%d\n", |
| sme->privacy, sme->key, sme->key_len, sme->key_idx); |
| |
| |
| if (adapter_wdev_data(padapter)->block == true) |
| { |
| ret = -EBUSY; |
| DBG_871X("%s wdev_priv.block is set\n", __func__); |
| goto exit; |
| } |
| |
| rtw_ps_deny(padapter, PS_DENY_JOIN); |
| if (_FAIL == rtw_pwr_wakeup(padapter)) { |
| ret = -EPERM; |
| goto exit; |
| } |
| |
| if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) { |
| ret = -EPERM; |
| goto exit; |
| } |
| |
| if (!sme->ssid || !sme->ssid_len) |
| { |
| ret = -EINVAL; |
| goto exit; |
| } |
| |
| if (sme->ssid_len > IW_ESSID_MAX_SIZE) { |
| |
| ret = -E2BIG; |
| goto exit; |
| } |
| |
| memset(&ndis_ssid, 0, sizeof(struct ndis_802_11_ssid)); |
| ndis_ssid.SsidLength = sme->ssid_len; |
| memcpy(ndis_ssid.Ssid, (u8 *)sme->ssid, sme->ssid_len); |
| |
| DBG_8192C("ssid =%s, len =%zu\n", ndis_ssid.Ssid, sme->ssid_len); |
| |
| |
| if (sme->bssid) |
| DBG_8192C("bssid ="MAC_FMT"\n", MAC_ARG(sme->bssid)); |
| |
| |
| if (check_fwstate(pmlmepriv, _FW_UNDER_LINKING) == true) { |
| ret = -EBUSY; |
| DBG_8192C("%s, fw_state = 0x%x, goto exit\n", __func__, pmlmepriv->fw_state); |
| goto exit; |
| } |
| if (check_fwstate(pmlmepriv, _FW_UNDER_SURVEY) == true) { |
| rtw_scan_abort(padapter); |
| } |
| |
| psecuritypriv->ndisencryptstatus = Ndis802_11EncryptionDisabled; |
| psecuritypriv->dot11PrivacyAlgrthm = _NO_PRIVACY_; |
| psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_; |
| psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */ |
| psecuritypriv->ndisauthtype = Ndis802_11AuthModeOpen; |
| |
| ret = rtw_cfg80211_set_wpa_version(psecuritypriv, sme->crypto.wpa_versions); |
| if (ret < 0) |
| goto exit; |
| |
| ret = rtw_cfg80211_set_auth_type(psecuritypriv, sme->auth_type); |
| |
| if (ret < 0) |
| goto exit; |
| |
| DBG_8192C("%s, ie_len =%zu\n", __func__, sme->ie_len); |
| |
| ret = rtw_cfg80211_set_wpa_ie(padapter, (u8 *)sme->ie, sme->ie_len); |
| if (ret < 0) |
| goto exit; |
| |
| if (sme->crypto.n_ciphers_pairwise) { |
| ret = rtw_cfg80211_set_cipher(psecuritypriv, sme->crypto.ciphers_pairwise[0], true); |
| if (ret < 0) |
| goto exit; |
| } |
| |
| /* For WEP Shared auth */ |
| if ((psecuritypriv->dot11AuthAlgrthm == dot11AuthAlgrthm_Shared |
| || psecuritypriv->dot11AuthAlgrthm == dot11AuthAlgrthm_Auto) && sme->key |
| ) |
| { |
| u32 wep_key_idx, wep_key_len, wep_total_len; |
| struct ndis_802_11_wep *pwep = NULL; |
| DBG_871X("%s(): Shared/Auto WEP\n", __func__); |
| |
| wep_key_idx = sme->key_idx; |
| wep_key_len = sme->key_len; |
| |
| if (sme->key_idx > WEP_KEYS) { |
| ret = -EINVAL; |
| goto exit; |
| } |
| |
| if (wep_key_len > 0) |
| { |
| wep_key_len = wep_key_len <= 5 ? 5 : 13; |
| wep_total_len = wep_key_len + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial); |
| pwep =(struct ndis_802_11_wep *) rtw_malloc(wep_total_len); |
| if (pwep == NULL) { |
| DBG_871X(" wpa_set_encryption: pwep allocate fail !!!\n"); |
| ret = -ENOMEM; |
| goto exit; |
| } |
| |
| memset(pwep, 0, wep_total_len); |
| |
| pwep->KeyLength = wep_key_len; |
| pwep->Length = wep_total_len; |
| |
| if (wep_key_len == 13) |
| { |
| padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_; |
| padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_; |
| } |
| } |
| else { |
| ret = -EINVAL; |
| goto exit; |
| } |
| |
| pwep->KeyIndex = wep_key_idx; |
| pwep->KeyIndex |= 0x80000000; |
| |
| memcpy(pwep->KeyMaterial, (void *)sme->key, pwep->KeyLength); |
| |
| if (rtw_set_802_11_add_wep(padapter, pwep) == (u8)_FAIL) |
| { |
| ret = -EOPNOTSUPP ; |
| } |
| |
| kfree((u8 *)pwep); |
| |
| if (ret < 0) |
| goto exit; |
| } |
| |
| ret = rtw_cfg80211_set_cipher(psecuritypriv, sme->crypto.cipher_group, false); |
| if (ret < 0) |
| return ret; |
| |
| if (sme->crypto.n_akm_suites) { |
| ret = rtw_cfg80211_set_key_mgt(psecuritypriv, sme->crypto.akm_suites[0]); |
| if (ret < 0) |
| goto exit; |
| } |
| |
| authmode = psecuritypriv->ndisauthtype; |
| rtw_set_802_11_authentication_mode(padapter, authmode); |
| |
| /* rtw_set_802_11_encryption_mode(padapter, padapter->securitypriv.ndisencryptstatus); */ |
| |
| if (rtw_set_802_11_connect(padapter, (u8 *)sme->bssid, &ndis_ssid) == false) { |
| ret = -1; |
| goto exit; |
| } |
| |
| DBG_8192C("set ssid:dot11AuthAlgrthm =%d, dot11PrivacyAlgrthm =%d, dot118021XGrpPrivacy =%d\n", psecuritypriv->dot11AuthAlgrthm, psecuritypriv->dot11PrivacyAlgrthm, psecuritypriv->dot118021XGrpPrivacy); |
| |
| exit: |
| |
| rtw_ps_deny_cancel(padapter, PS_DENY_JOIN); |
| |
| DBG_8192C("<=%s, ret %d\n", __func__, ret); |
| |
| padapter->mlmepriv.not_indic_disco = false; |
| |
| return ret; |
| } |
| |
| static int cfg80211_rtw_disconnect(struct wiphy *wiphy, struct net_device *ndev, |
| u16 reason_code) |
| { |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| |
| DBG_871X(FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| |
| padapter->mlmepriv.not_indic_disco = true; |
| |
| rtw_set_to_roam(padapter, 0); |
| |
| rtw_scan_abort(padapter); |
| LeaveAllPowerSaveMode(padapter); |
| rtw_disassoc_cmd(padapter, 500, false); |
| |
| DBG_871X("%s...call rtw_indicate_disconnect\n", __func__); |
| |
| rtw_indicate_disconnect(padapter); |
| |
| rtw_free_assoc_resources(padapter, 1); |
| rtw_pwr_wakeup(padapter); |
| |
| padapter->mlmepriv.not_indic_disco = false; |
| |
| DBG_871X(FUNC_NDEV_FMT" return 0\n", FUNC_NDEV_ARG(ndev)); |
| return 0; |
| } |
| |
| static int cfg80211_rtw_set_txpower(struct wiphy *wiphy, |
| struct wireless_dev *wdev, |
| enum nl80211_tx_power_setting type, int mbm) |
| { |
| DBG_8192C("%s\n", __func__); |
| return 0; |
| } |
| |
| static int cfg80211_rtw_get_txpower(struct wiphy *wiphy, |
| struct wireless_dev *wdev, |
| int *dbm) |
| { |
| DBG_8192C("%s\n", __func__); |
| |
| *dbm = (12); |
| |
| return 0; |
| } |
| |
| inline bool rtw_cfg80211_pwr_mgmt(struct adapter *adapter) |
| { |
| struct rtw_wdev_priv *rtw_wdev_priv = adapter_wdev_data(adapter); |
| return rtw_wdev_priv->power_mgmt; |
| } |
| |
| static int cfg80211_rtw_set_power_mgmt(struct wiphy *wiphy, |
| struct net_device *ndev, |
| bool enabled, int timeout) |
| { |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct rtw_wdev_priv *rtw_wdev_priv = adapter_wdev_data(padapter); |
| |
| DBG_871X(FUNC_NDEV_FMT" enabled:%u, timeout:%d\n", FUNC_NDEV_ARG(ndev), |
| enabled, timeout); |
| |
| rtw_wdev_priv->power_mgmt = enabled; |
| |
| if (!enabled) |
| LPS_Leave(padapter, "CFG80211_PWRMGMT"); |
| |
| return 0; |
| } |
| |
| static int cfg80211_rtw_set_pmksa(struct wiphy *wiphy, |
| struct net_device *ndev, |
| struct cfg80211_pmksa *pmksa) |
| { |
| u8 index, blInserted = false; |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct security_priv *psecuritypriv = &padapter->securitypriv; |
| u8 strZeroMacAddress[ ETH_ALEN ] = { 0x00 }; |
| |
| DBG_871X(FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| |
| if (!memcmp((u8 *)pmksa->bssid, strZeroMacAddress, ETH_ALEN)) |
| { |
| return -EINVAL; |
| } |
| |
| blInserted = false; |
| |
| /* overwrite PMKID */ |
| for (index = 0 ; index<NUM_PMKID_CACHE; index++) |
| { |
| if (!memcmp(psecuritypriv->PMKIDList[index].Bssid, (u8 *)pmksa->bssid, ETH_ALEN)) |
| { /* BSSID is matched, the same AP => rewrite with new PMKID. */ |
| DBG_871X(FUNC_NDEV_FMT" BSSID exists in the PMKList.\n", FUNC_NDEV_ARG(ndev)); |
| |
| memcpy(psecuritypriv->PMKIDList[index].PMKID, (u8 *)pmksa->pmkid, WLAN_PMKID_LEN); |
| psecuritypriv->PMKIDList[index].bUsed = true; |
| psecuritypriv->PMKIDIndex = index+1; |
| blInserted = true; |
| break; |
| } |
| } |
| |
| if (!blInserted) |
| { |
| /* Find a new entry */ |
| DBG_871X(FUNC_NDEV_FMT" Use the new entry index = %d for this PMKID.\n", |
| FUNC_NDEV_ARG(ndev), psecuritypriv->PMKIDIndex); |
| |
| memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, (u8 *)pmksa->bssid, ETH_ALEN); |
| memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, (u8 *)pmksa->pmkid, WLAN_PMKID_LEN); |
| |
| psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].bUsed = true; |
| psecuritypriv->PMKIDIndex++ ; |
| if (psecuritypriv->PMKIDIndex == 16) |
| { |
| psecuritypriv->PMKIDIndex = 0; |
| } |
| } |
| |
| return 0; |
| } |
| |
| static int cfg80211_rtw_del_pmksa(struct wiphy *wiphy, |
| struct net_device *ndev, |
| struct cfg80211_pmksa *pmksa) |
| { |
| u8 index, bMatched = false; |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct security_priv *psecuritypriv = &padapter->securitypriv; |
| |
| DBG_871X(FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| |
| for (index = 0 ; index<NUM_PMKID_CACHE; index++) |
| { |
| if (!memcmp(psecuritypriv->PMKIDList[index].Bssid, (u8 *)pmksa->bssid, ETH_ALEN)) |
| { /* BSSID is matched, the same AP => Remove this PMKID information and reset it. */ |
| memset(psecuritypriv->PMKIDList[index].Bssid, 0x00, ETH_ALEN); |
| memset(psecuritypriv->PMKIDList[index].PMKID, 0x00, WLAN_PMKID_LEN); |
| psecuritypriv->PMKIDList[index].bUsed = false; |
| bMatched = true; |
| break; |
| } |
| } |
| |
| if (false == bMatched) |
| { |
| DBG_871X(FUNC_NDEV_FMT" do not have matched BSSID\n" |
| , FUNC_NDEV_ARG(ndev)); |
| return -EINVAL; |
| } |
| |
| return 0; |
| } |
| |
| static int cfg80211_rtw_flush_pmksa(struct wiphy *wiphy, |
| struct net_device *ndev) |
| { |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct security_priv *psecuritypriv = &padapter->securitypriv; |
| |
| DBG_871X(FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| |
| memset(&psecuritypriv->PMKIDList[ 0 ], 0x00, sizeof(RT_PMKID_LIST) * NUM_PMKID_CACHE); |
| psecuritypriv->PMKIDIndex = 0; |
| |
| return 0; |
| } |
| |
| void rtw_cfg80211_indicate_sta_assoc(struct adapter *padapter, u8 *pmgmt_frame, uint frame_len) |
| { |
| struct net_device *ndev = padapter->pnetdev; |
| |
| DBG_871X(FUNC_ADPT_FMT"\n", FUNC_ADPT_ARG(padapter)); |
| |
| { |
| struct station_info sinfo; |
| u8 ie_offset; |
| if (GetFrameSubType(pmgmt_frame) == WIFI_ASSOCREQ) |
| ie_offset = _ASOCREQ_IE_OFFSET_; |
| else /* WIFI_REASSOCREQ */ |
| ie_offset = _REASOCREQ_IE_OFFSET_; |
| |
| sinfo.filled = 0; |
| sinfo.assoc_req_ies = pmgmt_frame + WLAN_HDR_A3_LEN + ie_offset; |
| sinfo.assoc_req_ies_len = frame_len - WLAN_HDR_A3_LEN - ie_offset; |
| cfg80211_new_sta(ndev, GetAddr2Ptr(pmgmt_frame), &sinfo, GFP_ATOMIC); |
| } |
| } |
| |
| void rtw_cfg80211_indicate_sta_disassoc(struct adapter *padapter, unsigned char *da, unsigned short reason) |
| { |
| struct net_device *ndev = padapter->pnetdev; |
| |
| DBG_871X(FUNC_ADPT_FMT"\n", FUNC_ADPT_ARG(padapter)); |
| |
| cfg80211_del_sta(ndev, da, GFP_ATOMIC); |
| } |
| |
| static int rtw_cfg80211_monitor_if_open(struct net_device *ndev) |
| { |
| int ret = 0; |
| |
| DBG_8192C("%s\n", __func__); |
| |
| return ret; |
| } |
| |
| static int rtw_cfg80211_monitor_if_close(struct net_device *ndev) |
| { |
| int ret = 0; |
| |
| DBG_8192C("%s\n", __func__); |
| |
| return ret; |
| } |
| |
| static int rtw_cfg80211_monitor_if_xmit_entry(struct sk_buff *skb, struct net_device *ndev) |
| { |
| int ret = 0; |
| int rtap_len; |
| int qos_len = 0; |
| int dot11_hdr_len = 24; |
| int snap_len = 6; |
| unsigned char *pdata; |
| u16 frame_control; |
| unsigned char src_mac_addr[6]; |
| unsigned char dst_mac_addr[6]; |
| struct ieee80211_hdr *dot11_hdr; |
| struct ieee80211_radiotap_header *rtap_hdr; |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| |
| DBG_871X(FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| |
| if (!skb) |
| goto fail; |
| |
| rtw_mstat_update(MSTAT_TYPE_SKB, MSTAT_ALLOC_SUCCESS, skb->truesize); |
| |
| if (unlikely(skb->len < sizeof(struct ieee80211_radiotap_header))) |
| goto fail; |
| |
| rtap_hdr = (struct ieee80211_radiotap_header *)skb->data; |
| if (unlikely(rtap_hdr->it_version)) |
| goto fail; |
| |
| rtap_len = ieee80211_get_radiotap_len(skb->data); |
| if (unlikely(skb->len < rtap_len)) |
| goto fail; |
| |
| if (rtap_len != 14) |
| { |
| DBG_8192C("radiotap len (should be 14): %d\n", rtap_len); |
| goto fail; |
| } |
| |
| /* Skip the ratio tap header */ |
| skb_pull(skb, rtap_len); |
| |
| dot11_hdr = (struct ieee80211_hdr *)skb->data; |
| frame_control = le16_to_cpu(dot11_hdr->frame_control); |
| /* Check if the QoS bit is set */ |
| if ((frame_control & RTW_IEEE80211_FCTL_FTYPE) == RTW_IEEE80211_FTYPE_DATA) { |
| /* Check if this ia a Wireless Distribution System (WDS) frame |
| * which has 4 MAC addresses |
| */ |
| if (frame_control & 0x0080) |
| qos_len = 2; |
| if ((frame_control & 0x0300) == 0x0300) |
| dot11_hdr_len += 6; |
| |
| memcpy(dst_mac_addr, dot11_hdr->addr1, sizeof(dst_mac_addr)); |
| memcpy(src_mac_addr, dot11_hdr->addr2, sizeof(src_mac_addr)); |
| |
| /* Skip the 802.11 header, QoS (if any) and SNAP, but leave spaces for |
| * for two MAC addresses |
| */ |
| skb_pull(skb, dot11_hdr_len + qos_len + snap_len - sizeof(src_mac_addr) * 2); |
| pdata = (unsigned char*)skb->data; |
| memcpy(pdata, dst_mac_addr, sizeof(dst_mac_addr)); |
| memcpy(pdata + sizeof(dst_mac_addr), src_mac_addr, sizeof(src_mac_addr)); |
| |
| DBG_8192C("should be eapol packet\n"); |
| |
| /* Use the real net device to transmit the packet */ |
| ret = _rtw_xmit_entry(skb, padapter->pnetdev); |
| |
| return ret; |
| |
| } |
| else if ((frame_control & (RTW_IEEE80211_FCTL_FTYPE|RTW_IEEE80211_FCTL_STYPE)) |
| == (RTW_IEEE80211_FTYPE_MGMT|RTW_IEEE80211_STYPE_ACTION) |
| ) |
| { |
| /* only for action frames */ |
| struct xmit_frame *pmgntframe; |
| struct pkt_attrib *pattrib; |
| unsigned char *pframe; |
| /* u8 category, action, OUI_Subtype, dialogToken = 0; */ |
| /* unsigned char *frame_body; */ |
| struct ieee80211_hdr *pwlanhdr; |
| struct xmit_priv *pxmitpriv = &(padapter->xmitpriv); |
| struct mlme_ext_priv *pmlmeext = &(padapter->mlmeextpriv); |
| u8 *buf = skb->data; |
| u32 len = skb->len; |
| u8 category, action; |
| |
| if (rtw_action_frame_parse(buf, len, &category, &action) == false) { |
| DBG_8192C(FUNC_NDEV_FMT" frame_control:0x%x\n", FUNC_NDEV_ARG(ndev), |
| le16_to_cpu(((struct ieee80211_hdr_3addr *)buf)->frame_control)); |
| goto fail; |
| } |
| |
| DBG_8192C("RTW_Tx:da ="MAC_FMT" via "FUNC_NDEV_FMT"\n", |
| MAC_ARG(GetAddr1Ptr(buf)), FUNC_NDEV_ARG(ndev)); |
| if (category == RTW_WLAN_CATEGORY_PUBLIC) |
| DBG_871X("RTW_Tx:%s\n", action_public_str(action)); |
| else |
| DBG_871X("RTW_Tx:category(%u), action(%u)\n", category, action); |
| |
| /* starting alloc mgmt frame to dump it */ |
| if ((pmgntframe = alloc_mgtxmitframe(pxmitpriv)) == NULL) |
| { |
| goto fail; |
| } |
| |
| /* update attribute */ |
| pattrib = &pmgntframe->attrib; |
| update_mgntframe_attrib(padapter, pattrib); |
| pattrib->retry_ctrl = false; |
| |
| memset(pmgntframe->buf_addr, 0, WLANHDR_OFFSET + TXDESC_OFFSET); |
| |
| pframe = (u8 *)(pmgntframe->buf_addr) + TXDESC_OFFSET; |
| |
| memcpy(pframe, (void*)buf, len); |
| pattrib->pktlen = len; |
| |
| pwlanhdr = (struct ieee80211_hdr *)pframe; |
| /* update seq number */ |
| pmlmeext->mgnt_seq = GetSequence(pwlanhdr); |
| pattrib->seqnum = pmlmeext->mgnt_seq; |
| pmlmeext->mgnt_seq++; |
| |
| |
| pattrib->last_txcmdsz = pattrib->pktlen; |
| |
| dump_mgntframe(padapter, pmgntframe); |
| |
| } |
| else |
| { |
| DBG_8192C("frame_control = 0x%x\n", frame_control & (RTW_IEEE80211_FCTL_FTYPE|RTW_IEEE80211_FCTL_STYPE)); |
| } |
| |
| |
| fail: |
| |
| dev_kfree_skb_any(skb); |
| |
| return 0; |
| |
| } |
| |
| static int rtw_cfg80211_monitor_if_set_mac_address(struct net_device *ndev, void *addr) |
| { |
| int ret = 0; |
| |
| DBG_8192C("%s\n", __func__); |
| |
| return ret; |
| } |
| |
| static const struct net_device_ops rtw_cfg80211_monitor_if_ops = { |
| .ndo_open = rtw_cfg80211_monitor_if_open, |
| .ndo_stop = rtw_cfg80211_monitor_if_close, |
| .ndo_start_xmit = rtw_cfg80211_monitor_if_xmit_entry, |
| .ndo_set_mac_address = rtw_cfg80211_monitor_if_set_mac_address, |
| }; |
| |
| static int rtw_cfg80211_add_monitor_if (struct adapter *padapter, char *name, struct net_device **ndev) |
| { |
| int ret = 0; |
| struct net_device* mon_ndev = NULL; |
| struct wireless_dev* mon_wdev = NULL; |
| struct rtw_netdev_priv_indicator *pnpi; |
| struct rtw_wdev_priv *pwdev_priv = adapter_wdev_data(padapter); |
| |
| if (!name) { |
| DBG_871X(FUNC_ADPT_FMT" without specific name\n", FUNC_ADPT_ARG(padapter)); |
| ret = -EINVAL; |
| goto out; |
| } |
| |
| if (pwdev_priv->pmon_ndev) { |
| DBG_871X(FUNC_ADPT_FMT" monitor interface exist: "NDEV_FMT"\n", |
| FUNC_ADPT_ARG(padapter), NDEV_ARG(pwdev_priv->pmon_ndev)); |
| ret = -EBUSY; |
| goto out; |
| } |
| |
| mon_ndev = alloc_etherdev(sizeof(struct rtw_netdev_priv_indicator)); |
| if (!mon_ndev) { |
| DBG_871X(FUNC_ADPT_FMT" allocate ndev fail\n", FUNC_ADPT_ARG(padapter)); |
| ret = -ENOMEM; |
| goto out; |
| } |
| |
| mon_ndev->type = ARPHRD_IEEE80211_RADIOTAP; |
| strncpy(mon_ndev->name, name, IFNAMSIZ); |
| mon_ndev->name[IFNAMSIZ - 1] = 0; |
| mon_ndev->needs_free_netdev = true; |
| mon_ndev->priv_destructor = rtw_ndev_destructor; |
| |
| mon_ndev->netdev_ops = &rtw_cfg80211_monitor_if_ops; |
| |
| pnpi = netdev_priv(mon_ndev); |
| pnpi->priv = padapter; |
| pnpi->sizeof_priv = sizeof(struct adapter); |
| |
| /* wdev */ |
| mon_wdev = (struct wireless_dev *)rtw_zmalloc(sizeof(struct wireless_dev)); |
| if (!mon_wdev) { |
| DBG_871X(FUNC_ADPT_FMT" allocate mon_wdev fail\n", FUNC_ADPT_ARG(padapter)); |
| ret = -ENOMEM; |
| goto out; |
| } |
| |
| mon_wdev->wiphy = padapter->rtw_wdev->wiphy; |
| mon_wdev->netdev = mon_ndev; |
| mon_wdev->iftype = NL80211_IFTYPE_MONITOR; |
| mon_ndev->ieee80211_ptr = mon_wdev; |
| |
| ret = register_netdevice(mon_ndev); |
| if (ret) { |
| goto out; |
| } |
| |
| *ndev = pwdev_priv->pmon_ndev = mon_ndev; |
| memcpy(pwdev_priv->ifname_mon, name, IFNAMSIZ+1); |
| |
| out: |
| if (ret && mon_wdev) { |
| kfree((u8 *)mon_wdev); |
| mon_wdev = NULL; |
| } |
| |
| if (ret && mon_ndev) { |
| free_netdev(mon_ndev); |
| *ndev = mon_ndev = NULL; |
| } |
| |
| return ret; |
| } |
| |
| static struct wireless_dev * |
| cfg80211_rtw_add_virtual_intf( |
| struct wiphy *wiphy, |
| const char *name, |
| unsigned char name_assign_type, |
| enum nl80211_iftype type, struct vif_params *params) |
| { |
| int ret = 0; |
| struct net_device* ndev = NULL; |
| struct adapter *padapter = wiphy_to_adapter(wiphy); |
| |
| DBG_871X(FUNC_ADPT_FMT " wiphy:%s, name:%s, type:%d\n", |
| FUNC_ADPT_ARG(padapter), wiphy_name(wiphy), name, type); |
| |
| switch (type) { |
| case NL80211_IFTYPE_ADHOC: |
| case NL80211_IFTYPE_AP_VLAN: |
| case NL80211_IFTYPE_WDS: |
| case NL80211_IFTYPE_MESH_POINT: |
| ret = -ENODEV; |
| break; |
| case NL80211_IFTYPE_MONITOR: |
| ret = rtw_cfg80211_add_monitor_if(padapter, (char *)name, &ndev); |
| break; |
| case NL80211_IFTYPE_P2P_CLIENT: |
| case NL80211_IFTYPE_STATION: |
| ret = -ENODEV; |
| break; |
| case NL80211_IFTYPE_P2P_GO: |
| case NL80211_IFTYPE_AP: |
| ret = -ENODEV; |
| break; |
| default: |
| ret = -ENODEV; |
| DBG_871X("Unsupported interface type\n"); |
| break; |
| } |
| |
| DBG_871X(FUNC_ADPT_FMT" ndev:%p, ret:%d\n", FUNC_ADPT_ARG(padapter), ndev, ret); |
| |
| return ndev ? ndev->ieee80211_ptr : ERR_PTR(ret); |
| } |
| |
| static int cfg80211_rtw_del_virtual_intf(struct wiphy *wiphy, |
| struct wireless_dev *wdev |
| ) |
| { |
| struct net_device *ndev = wdev_to_ndev(wdev); |
| int ret = 0; |
| struct adapter *adapter; |
| struct rtw_wdev_priv *pwdev_priv; |
| |
| if (!ndev) { |
| ret = -EINVAL; |
| goto exit; |
| } |
| |
| adapter = (struct adapter *)rtw_netdev_priv(ndev); |
| pwdev_priv = adapter_wdev_data(adapter); |
| |
| unregister_netdevice(ndev); |
| |
| if (ndev == pwdev_priv->pmon_ndev) { |
| pwdev_priv->pmon_ndev = NULL; |
| pwdev_priv->ifname_mon[0] = '\0'; |
| DBG_871X(FUNC_NDEV_FMT" remove monitor interface\n", FUNC_NDEV_ARG(ndev)); |
| } |
| |
| exit: |
| return ret; |
| } |
| |
| static int rtw_add_beacon(struct adapter *adapter, const u8 *head, size_t head_len, const u8 *tail, size_t tail_len) |
| { |
| int ret = 0; |
| u8 *pbuf = NULL; |
| uint len, wps_ielen = 0; |
| struct mlme_priv *pmlmepriv = &(adapter->mlmepriv); |
| |
| DBG_8192C("%s beacon_head_len =%zu, beacon_tail_len =%zu\n", __func__, head_len, tail_len); |
| |
| if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true) |
| return -EINVAL; |
| |
| if (head_len<24) |
| return -EINVAL; |
| |
| pbuf = rtw_zmalloc(head_len+tail_len); |
| if (!pbuf) |
| return -ENOMEM; |
| |
| memcpy(pbuf, (void *)head+24, head_len-24);/* 24 =beacon header len. */ |
| memcpy(pbuf+head_len-24, (void *)tail, tail_len); |
| |
| len = head_len+tail_len-24; |
| |
| /* check wps ie if inclued */ |
| if (rtw_get_wps_ie(pbuf+_FIXED_IE_LENGTH_, len-_FIXED_IE_LENGTH_, NULL, &wps_ielen)) |
| DBG_8192C("add bcn, wps_ielen =%d\n", wps_ielen); |
| |
| /* pbss_network->IEs will not include p2p_ie, wfd ie */ |
| rtw_ies_remove_ie(pbuf, &len, _BEACON_IE_OFFSET_, _VENDOR_SPECIFIC_IE_, P2P_OUI, 4); |
| rtw_ies_remove_ie(pbuf, &len, _BEACON_IE_OFFSET_, _VENDOR_SPECIFIC_IE_, WFD_OUI, 4); |
| |
| if (rtw_check_beacon_data(adapter, pbuf, len) == _SUCCESS) |
| { |
| ret = 0; |
| } |
| else |
| { |
| ret = -EINVAL; |
| } |
| |
| |
| kfree(pbuf); |
| |
| return ret; |
| } |
| |
| static int cfg80211_rtw_start_ap(struct wiphy *wiphy, struct net_device *ndev, |
| struct cfg80211_ap_settings *settings) |
| { |
| int ret = 0; |
| struct adapter *adapter = (struct adapter *)rtw_netdev_priv(ndev); |
| |
| DBG_871X(FUNC_NDEV_FMT" hidden_ssid:%d, auth_type:%d\n", FUNC_NDEV_ARG(ndev), |
| settings->hidden_ssid, settings->auth_type); |
| |
| ret = rtw_add_beacon(adapter, settings->beacon.head, settings->beacon.head_len, |
| settings->beacon.tail, settings->beacon.tail_len); |
| |
| adapter->mlmeextpriv.mlmext_info.hidden_ssid_mode = settings->hidden_ssid; |
| |
| if (settings->ssid && settings->ssid_len) { |
| struct wlan_bssid_ex *pbss_network = &adapter->mlmepriv.cur_network.network; |
| struct wlan_bssid_ex *pbss_network_ext = &adapter->mlmeextpriv.mlmext_info.network; |
| |
| memcpy(pbss_network->Ssid.Ssid, (void *)settings->ssid, settings->ssid_len); |
| pbss_network->Ssid.SsidLength = settings->ssid_len; |
| memcpy(pbss_network_ext->Ssid.Ssid, (void *)settings->ssid, settings->ssid_len); |
| pbss_network_ext->Ssid.SsidLength = settings->ssid_len; |
| } |
| |
| return ret; |
| } |
| |
| static int cfg80211_rtw_change_beacon(struct wiphy *wiphy, struct net_device *ndev, |
| struct cfg80211_beacon_data *info) |
| { |
| int ret = 0; |
| struct adapter *adapter = (struct adapter *)rtw_netdev_priv(ndev); |
| |
| DBG_871X(FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| |
| ret = rtw_add_beacon(adapter, info->head, info->head_len, info->tail, info->tail_len); |
| |
| return ret; |
| } |
| |
| static int cfg80211_rtw_stop_ap(struct wiphy *wiphy, struct net_device *ndev) |
| { |
| DBG_871X(FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| return 0; |
| } |
| |
| static int cfg80211_rtw_add_station(struct wiphy *wiphy, struct net_device *ndev, |
| const u8 *mac, |
| struct station_parameters *params) |
| { |
| DBG_871X(FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| |
| return 0; |
| } |
| |
| static int cfg80211_rtw_del_station(struct wiphy *wiphy, struct net_device *ndev, |
| struct station_del_parameters *params) |
| { |
| int ret = 0; |
| struct list_head *phead, *plist; |
| u8 updated = false; |
| struct sta_info *psta = NULL; |
| struct adapter *padapter = (struct adapter *)rtw_netdev_priv(ndev); |
| struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); |
| struct sta_priv *pstapriv = &padapter->stapriv; |
| const u8 *mac = params->mac; |
| |
| DBG_871X("+"FUNC_NDEV_FMT"\n", FUNC_NDEV_ARG(ndev)); |
| |
| if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true) |
| { |
| DBG_8192C("%s, fw_state != FW_LINKED|WIFI_AP_STATE\n", __func__); |
| return -EINVAL; |
<
|