diff options
Diffstat (limited to 'drivers/staging/rtl8723au/os_dep/mlme_linux.c')
-rw-r--r-- | drivers/staging/rtl8723au/os_dep/mlme_linux.c | 187 |
1 files changed, 187 insertions, 0 deletions
diff --git a/drivers/staging/rtl8723au/os_dep/mlme_linux.c b/drivers/staging/rtl8723au/os_dep/mlme_linux.c new file mode 100644 index 000000000000..b30d4d37556a --- /dev/null +++ b/drivers/staging/rtl8723au/os_dep/mlme_linux.c @@ -0,0 +1,187 @@ +/****************************************************************************** + * + * Copyright(c) 2007 - 2011 Realtek Corporation. All rights reserved. + * + * This program is free software; you can redistribute it and/or modify it + * under the terms of version 2 of the GNU General Public License as + * published by the Free Software Foundation. + * + * This program is distributed in the hope that it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for + * more details. + * + ******************************************************************************/ + +#define _MLME_OSDEP_C_ + +#include <osdep_service.h> +#include <drv_types.h> +#include <mlme_osdep.h> +#include <rtw_ioctl_set.h> + +void rtw_os_indicate_connect23a(struct rtw_adapter *adapter) +{ + rtw_cfg80211_indicate_connect(adapter); + + netif_carrier_on(adapter->pnetdev); + + if (adapter->pid[2] != 0) + rtw_signal_process(adapter->pid[2], SIGALRM); +} + +void rtw_os_indicate_scan_done23a(struct rtw_adapter *padapter, bool aborted) +{ + rtw_cfg80211_indicate_scan_done(wdev_to_priv(padapter->rtw_wdev), + aborted); +} + +static struct rt_pmkid_list backupPMKIDList[NUM_PMKID_CACHE]; + +void rtw_reset_securitypriv23a(struct rtw_adapter *adapter) +{ + u8 backupPMKIDIndex = 0; + u8 backupTKIPCountermeasure = 0x00; + unsigned long backupTKIPcountermeasure_time = 0; + + if (adapter->securitypriv.dot11AuthAlgrthm == + dot11AuthAlgrthm_8021X) { /* 802.1x */ + /* We have to backup the PMK information for WiFi PMK + * Caching test item. + * Backup the btkip_countermeasure information. + * When the countermeasure is trigger, the driver have to + * disconnect with AP for 60 seconds. + */ + memset(&backupPMKIDList[0], 0x00, sizeof(struct rt_pmkid_list) * + NUM_PMKID_CACHE); + + memcpy(&backupPMKIDList[0], &adapter->securitypriv.PMKIDList[0], + sizeof(struct rt_pmkid_list) * NUM_PMKID_CACHE); + backupPMKIDIndex = adapter->securitypriv.PMKIDIndex; + backupTKIPCountermeasure = adapter->securitypriv.btkip_countermeasure; + backupTKIPcountermeasure_time = adapter->securitypriv.btkip_countermeasure_time; + + memset((unsigned char *)&adapter->securitypriv, 0, + sizeof (struct security_priv)); + /* Restore the PMK information to securitypriv structure + * for the following connection. + */ + memcpy(&adapter->securitypriv.PMKIDList[0], &backupPMKIDList[0], + sizeof(struct rt_pmkid_list) * NUM_PMKID_CACHE); + adapter->securitypriv.PMKIDIndex = backupPMKIDIndex; + adapter->securitypriv.btkip_countermeasure = backupTKIPCountermeasure; + adapter->securitypriv.btkip_countermeasure_time = backupTKIPcountermeasure_time; + + adapter->securitypriv.ndisauthtype = Ndis802_11AuthModeOpen; + adapter->securitypriv.ndisencryptstatus = Ndis802_11WEPDisabled; + } else { /* reset values in securitypriv */ + struct security_priv *psec_priv = &adapter->securitypriv; + + /* open system */ + psec_priv->dot11AuthAlgrthm = dot11AuthAlgrthm_Open; + psec_priv->dot11PrivacyAlgrthm = _NO_PRIVACY_; + psec_priv->dot11PrivacyKeyIndex = 0; + + psec_priv->dot118021XGrpPrivacy = _NO_PRIVACY_; + psec_priv->dot118021XGrpKeyid = 1; + + psec_priv->ndisauthtype = Ndis802_11AuthModeOpen; + psec_priv->ndisencryptstatus = Ndis802_11WEPDisabled; + } +} + +void rtw_os_indicate_disconnect23a(struct rtw_adapter *adapter) +{ + /* Do it first for tx broadcast pkt after disconnection issue! */ + netif_carrier_off(adapter->pnetdev); + + rtw_cfg80211_indicate_disconnect(adapter); + + rtw_reset_securitypriv23a(adapter); +} + +void rtw_report_sec_ie23a(struct rtw_adapter *adapter, u8 authmode, u8 *sec_ie) +{ + uint len; + u8 *buff, *p, i; + union iwreq_data wrqu; + + RT_TRACE(_module_mlme_osdep_c_, _drv_info_, + ("+rtw_report_sec_ie23a, authmode =%d\n", authmode)); + + buff = NULL; + if (authmode == _WPA_IE_ID_) { + RT_TRACE(_module_mlme_osdep_c_, _drv_info_, + ("rtw_report_sec_ie23a, authmode =%d\n", authmode)); + + buff = kzalloc(IW_CUSTOM_MAX, GFP_KERNEL); + if (!buff) + return; + p = buff; + + p += sprintf(p, "ASSOCINFO(ReqIEs ="); + + len = sec_ie[1]+2; + len = (len < IW_CUSTOM_MAX) ? len : IW_CUSTOM_MAX; + + for (i = 0; i < len; i++) + p += sprintf(p, "%02x", sec_ie[i]); + + p += sprintf(p, ")"); + + memset(&wrqu, 0, sizeof(wrqu)); + + wrqu.data.length = p-buff; + + wrqu.data.length = (wrqu.data.length < IW_CUSTOM_MAX) ? + wrqu.data.length : IW_CUSTOM_MAX; + + kfree(buff); + } +} + +#ifdef CONFIG_8723AU_AP_MODE +void rtw_indicate_sta_assoc_event23a(struct rtw_adapter *padapter, + struct sta_info *psta) +{ + struct sta_priv *pstapriv = &padapter->stapriv; + union iwreq_data wrqu; + + if (psta == NULL) + return; + + if (psta->aid > NUM_STA) + return; + + if (pstapriv->sta_aid[psta->aid - 1] != psta) + return; + + wrqu.addr.sa_family = ARPHRD_ETHER; + + memcpy(wrqu.addr.sa_data, psta->hwaddr, ETH_ALEN); + + DBG_8723A("+rtw_indicate_sta_assoc_event23a\n"); +} + +void rtw_indicate_sta_disassoc_event23a(struct rtw_adapter *padapter, + struct sta_info *psta) +{ + struct sta_priv *pstapriv = &padapter->stapriv; + union iwreq_data wrqu; + + if (psta == NULL) + return; + + if (psta->aid > NUM_STA) + return; + + if (pstapriv->sta_aid[psta->aid - 1] != psta) + return; + + wrqu.addr.sa_family = ARPHRD_ETHER; + + memcpy(wrqu.addr.sa_data, psta->hwaddr, ETH_ALEN); + + DBG_8723A("+rtw_indicate_sta_disassoc_event23a\n"); +} +#endif |