1 /* Copyright (C) 2006, Red Hat, Inc. */
3 #include <linux/types.h>
4 #include <linux/etherdevice.h>
5 #include <linux/ieee80211.h>
6 #include <linux/if_arp.h>
7 #include <net/lib80211.h>
15 static const u8 bssid_any
[ETH_ALEN
] __attribute__ ((aligned (2))) =
16 { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
17 static const u8 bssid_off
[ETH_ALEN
] __attribute__ ((aligned (2))) =
18 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
20 /* The firmware needs the following bits masked out of the beacon-derived
21 * capability field when associating/joining to a BSS:
22 * 9 (QoS), 11 (APSD), 12 (unused), 14 (unused), 15 (unused)
24 #define CAPINFO_MASK (~(0xda00))
28 * @brief This function finds common rates between rates and card rates.
30 * It will fill common rates in rates as output if found.
32 * NOTE: Setting the MSB of the basic rates need to be taken
33 * care, either before or after calling this function
35 * @param priv A pointer to struct lbs_private structure
36 * @param rates the buffer which keeps input and output
37 * @param rates_size the size of rates buffer; new size of buffer on return,
38 * which will be less than or equal to original rates_size
40 * @return 0 on success, or -1 on error
42 static int get_common_rates(struct lbs_private
*priv
,
47 u8 intersection
[MAX_RATES
];
48 u16 intersection_size
;
51 intersection_size
= min_t(u16
, *rates_size
, ARRAY_SIZE(intersection
));
53 /* Allow each rate from 'rates' that is supported by the hardware */
54 for (i
= 0; i
< ARRAY_SIZE(lbs_bg_rates
) && lbs_bg_rates
[i
]; i
++) {
55 for (j
= 0; j
< intersection_size
&& rates
[j
]; j
++) {
56 if (rates
[j
] == lbs_bg_rates
[i
])
57 intersection
[num_rates
++] = rates
[j
];
61 lbs_deb_hex(LBS_DEB_JOIN
, "AP rates ", rates
, *rates_size
);
62 lbs_deb_hex(LBS_DEB_JOIN
, "card rates ", lbs_bg_rates
,
63 ARRAY_SIZE(lbs_bg_rates
));
64 lbs_deb_hex(LBS_DEB_JOIN
, "common rates", intersection
, num_rates
);
65 lbs_deb_join("TX data rate 0x%02x\n", priv
->cur_rate
);
67 if (!priv
->enablehwauto
) {
68 for (i
= 0; i
< num_rates
; i
++) {
69 if (intersection
[i
] == priv
->cur_rate
)
72 lbs_pr_alert("Previously set fixed data rate %#x isn't "
73 "compatible with the network.\n", priv
->cur_rate
);
78 memset(rates
, 0, *rates_size
);
79 *rates_size
= num_rates
;
80 memcpy(rates
, intersection
, num_rates
);
86 * @brief Sets the MSB on basic rates as the firmware requires
88 * Scan through an array and set the MSB for basic data rates.
90 * @param rates buffer of data rates
91 * @param len size of buffer
93 static void lbs_set_basic_rate_flags(u8
*rates
, size_t len
)
97 for (i
= 0; i
< len
; i
++) {
98 if (rates
[i
] == 0x02 || rates
[i
] == 0x04 ||
99 rates
[i
] == 0x0b || rates
[i
] == 0x16)
105 static u8
iw_auth_to_ieee_auth(u8 auth
)
107 if (auth
== IW_AUTH_ALG_OPEN_SYSTEM
)
109 else if (auth
== IW_AUTH_ALG_SHARED_KEY
)
111 else if (auth
== IW_AUTH_ALG_LEAP
)
114 lbs_deb_join("%s: invalid auth alg 0x%X\n", __func__
, auth
);
119 * @brief This function prepares the authenticate command. AUTHENTICATE only
120 * sets the authentication suite for future associations, as the firmware
121 * handles authentication internally during the ASSOCIATE command.
123 * @param priv A pointer to struct lbs_private structure
124 * @param bssid The peer BSSID with which to authenticate
125 * @param auth The authentication mode to use (from wireless.h)
129 static int lbs_set_authentication(struct lbs_private
*priv
, u8 bssid
[6], u8 auth
)
131 struct cmd_ds_802_11_authenticate cmd
;
134 lbs_deb_enter(LBS_DEB_JOIN
);
136 cmd
.hdr
.size
= cpu_to_le16(sizeof(cmd
));
137 memcpy(cmd
.bssid
, bssid
, ETH_ALEN
);
139 cmd
.authtype
= iw_auth_to_ieee_auth(auth
);
141 lbs_deb_join("AUTH_CMD: BSSID %pM, auth 0x%x\n", bssid
, cmd
.authtype
);
143 ret
= lbs_cmd_with_response(priv
, CMD_802_11_AUTHENTICATE
, &cmd
);
145 lbs_deb_leave_args(LBS_DEB_JOIN
, "ret %d", ret
);
150 static int lbs_assoc_post(struct lbs_private
*priv
,
151 struct cmd_ds_802_11_associate_response
*resp
)
154 union iwreq_data wrqu
;
155 struct bss_descriptor
*bss
;
158 lbs_deb_enter(LBS_DEB_ASSOC
);
160 if (!priv
->in_progress_assoc_req
) {
161 lbs_deb_assoc("ASSOC_RESP: no in-progress assoc request\n");
165 bss
= &priv
->in_progress_assoc_req
->bss
;
168 * Older FW versions map the IEEE 802.11 Status Code in the association
169 * response to the following values returned in resp->statuscode:
171 * IEEE Status Code Marvell Status Code
172 * 0 -> 0x0000 ASSOC_RESULT_SUCCESS
173 * 13 -> 0x0004 ASSOC_RESULT_AUTH_REFUSED
174 * 14 -> 0x0004 ASSOC_RESULT_AUTH_REFUSED
175 * 15 -> 0x0004 ASSOC_RESULT_AUTH_REFUSED
176 * 16 -> 0x0004 ASSOC_RESULT_AUTH_REFUSED
177 * others -> 0x0003 ASSOC_RESULT_REFUSED
179 * Other response codes:
180 * 0x0001 -> ASSOC_RESULT_INVALID_PARAMETERS (unused)
181 * 0x0002 -> ASSOC_RESULT_TIMEOUT (internal timer expired waiting for
182 * association response from the AP)
185 status_code
= le16_to_cpu(resp
->statuscode
);
186 if (priv
->fwrelease
< 0x09000000) {
187 switch (status_code
) {
191 lbs_deb_assoc("ASSOC_RESP: invalid parameters\n");
194 lbs_deb_assoc("ASSOC_RESP: internal timer "
195 "expired while waiting for the AP\n");
198 lbs_deb_assoc("ASSOC_RESP: association "
202 lbs_deb_assoc("ASSOC_RESP: authentication "
206 lbs_deb_assoc("ASSOC_RESP: failure reason 0x%02x "
207 " unknown\n", status_code
);
211 /* v9+ returns the AP's association response */
212 lbs_deb_assoc("ASSOC_RESP: failure reason 0x%02x\n", status_code
);
216 lbs_mac_event_disconnected(priv
);
221 lbs_deb_hex(LBS_DEB_ASSOC
, "ASSOC_RESP",
222 (void *) (resp
+ sizeof (resp
->hdr
)),
223 le16_to_cpu(resp
->hdr
.size
) - sizeof (resp
->hdr
));
225 /* Send a Media Connected event, according to the Spec */
226 priv
->connect_status
= LBS_CONNECTED
;
228 /* Update current SSID and BSSID */
229 memcpy(&priv
->curbssparams
.ssid
, &bss
->ssid
, IW_ESSID_MAX_SIZE
);
230 priv
->curbssparams
.ssid_len
= bss
->ssid_len
;
231 memcpy(priv
->curbssparams
.bssid
, bss
->bssid
, ETH_ALEN
);
233 priv
->SNR
[TYPE_RXPD
][TYPE_AVG
] = 0;
234 priv
->NF
[TYPE_RXPD
][TYPE_AVG
] = 0;
236 memset(priv
->rawSNR
, 0x00, sizeof(priv
->rawSNR
));
237 memset(priv
->rawNF
, 0x00, sizeof(priv
->rawNF
));
241 netif_carrier_on(priv
->dev
);
242 if (!priv
->tx_pending_len
)
243 netif_wake_queue(priv
->dev
);
245 memcpy(wrqu
.ap_addr
.sa_data
, priv
->curbssparams
.bssid
, ETH_ALEN
);
246 wrqu
.ap_addr
.sa_family
= ARPHRD_ETHER
;
247 wireless_send_event(priv
->dev
, SIOCGIWAP
, &wrqu
, NULL
);
250 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
255 * @brief This function prepares an association-class command.
257 * @param priv A pointer to struct lbs_private structure
258 * @param assoc_req The association request describing the BSS to associate
259 * or reassociate with
260 * @param command The actual command, either CMD_802_11_ASSOCIATE or
261 * CMD_802_11_REASSOCIATE
265 static int lbs_associate(struct lbs_private
*priv
,
266 struct assoc_request
*assoc_req
,
269 struct cmd_ds_802_11_associate cmd
;
271 struct bss_descriptor
*bss
= &assoc_req
->bss
;
272 u8
*pos
= &(cmd
.iebuf
[0]);
273 u16 tmpcap
, tmplen
, tmpauth
;
274 struct mrvl_ie_ssid_param_set
*ssid
;
275 struct mrvl_ie_ds_param_set
*ds
;
276 struct mrvl_ie_cf_param_set
*cf
;
277 struct mrvl_ie_rates_param_set
*rates
;
278 struct mrvl_ie_rsn_param_set
*rsn
;
279 struct mrvl_ie_auth_type
*auth
;
281 lbs_deb_enter(LBS_DEB_ASSOC
);
283 BUG_ON((command
!= CMD_802_11_ASSOCIATE
) &&
284 (command
!= CMD_802_11_REASSOCIATE
));
286 memset(&cmd
, 0, sizeof(cmd
));
287 cmd
.hdr
.command
= cpu_to_le16(command
);
289 /* Fill in static fields */
290 memcpy(cmd
.bssid
, bss
->bssid
, ETH_ALEN
);
291 cmd
.listeninterval
= cpu_to_le16(MRVDRV_DEFAULT_LISTEN_INTERVAL
);
293 /* Capability info */
294 tmpcap
= (bss
->capability
& CAPINFO_MASK
);
295 if (bss
->mode
== IW_MODE_INFRA
)
296 tmpcap
|= WLAN_CAPABILITY_ESS
;
297 cmd
.capability
= cpu_to_le16(tmpcap
);
298 lbs_deb_assoc("ASSOC_CMD: capability 0x%04x\n", tmpcap
);
301 ssid
= (struct mrvl_ie_ssid_param_set
*) pos
;
302 ssid
->header
.type
= cpu_to_le16(TLV_TYPE_SSID
);
303 tmplen
= bss
->ssid_len
;
304 ssid
->header
.len
= cpu_to_le16(tmplen
);
305 memcpy(ssid
->ssid
, bss
->ssid
, tmplen
);
306 pos
+= sizeof(ssid
->header
) + tmplen
;
308 ds
= (struct mrvl_ie_ds_param_set
*) pos
;
309 ds
->header
.type
= cpu_to_le16(TLV_TYPE_PHY_DS
);
310 ds
->header
.len
= cpu_to_le16(1);
311 ds
->channel
= bss
->phy
.ds
.channel
;
312 pos
+= sizeof(ds
->header
) + 1;
314 cf
= (struct mrvl_ie_cf_param_set
*) pos
;
315 cf
->header
.type
= cpu_to_le16(TLV_TYPE_CF
);
316 tmplen
= sizeof(*cf
) - sizeof (cf
->header
);
317 cf
->header
.len
= cpu_to_le16(tmplen
);
318 /* IE payload should be zeroed, firmware fills it in for us */
321 rates
= (struct mrvl_ie_rates_param_set
*) pos
;
322 rates
->header
.type
= cpu_to_le16(TLV_TYPE_RATES
);
323 tmplen
= min_t(u16
, ARRAY_SIZE(bss
->rates
), MAX_RATES
);
324 memcpy(&rates
->rates
, &bss
->rates
, tmplen
);
325 if (get_common_rates(priv
, rates
->rates
, &tmplen
)) {
329 pos
+= sizeof(rates
->header
) + tmplen
;
330 rates
->header
.len
= cpu_to_le16(tmplen
);
331 lbs_deb_assoc("ASSOC_CMD: num rates %u\n", tmplen
);
333 /* Copy the infra. association rates into Current BSS state structure */
334 memset(&priv
->curbssparams
.rates
, 0, sizeof(priv
->curbssparams
.rates
));
335 memcpy(&priv
->curbssparams
.rates
, &rates
->rates
, tmplen
);
337 /* Set MSB on basic rates as the firmware requires, but _after_
338 * copying to current bss rates.
340 lbs_set_basic_rate_flags(rates
->rates
, tmplen
);
342 /* Firmware v9+ indicate authentication suites as a TLV */
343 if (priv
->fwrelease
>= 0x09000000) {
344 auth
= (struct mrvl_ie_auth_type
*) pos
;
345 auth
->header
.type
= cpu_to_le16(TLV_TYPE_AUTH_TYPE
);
346 auth
->header
.len
= cpu_to_le16(2);
347 tmpauth
= iw_auth_to_ieee_auth(priv
->secinfo
.auth_mode
);
348 auth
->auth
= cpu_to_le16(tmpauth
);
349 pos
+= sizeof(auth
->header
) + 2;
351 lbs_deb_join("AUTH_CMD: BSSID %pM, auth 0x%x\n",
352 bss
->bssid
, priv
->secinfo
.auth_mode
);
356 if (assoc_req
->secinfo
.WPAenabled
|| assoc_req
->secinfo
.WPA2enabled
) {
357 rsn
= (struct mrvl_ie_rsn_param_set
*) pos
;
358 /* WPA_IE or WPA2_IE */
359 rsn
->header
.type
= cpu_to_le16((u16
) assoc_req
->wpa_ie
[0]);
360 tmplen
= (u16
) assoc_req
->wpa_ie
[1];
361 rsn
->header
.len
= cpu_to_le16(tmplen
);
362 memcpy(rsn
->rsnie
, &assoc_req
->wpa_ie
[2], tmplen
);
363 lbs_deb_hex(LBS_DEB_JOIN
, "ASSOC_CMD: WPA/RSN IE", (u8
*) rsn
,
364 sizeof(rsn
->header
) + tmplen
);
365 pos
+= sizeof(rsn
->header
) + tmplen
;
368 cmd
.hdr
.size
= cpu_to_le16((sizeof(cmd
) - sizeof(cmd
.iebuf
)) +
369 (u16
)(pos
- (u8
*) &cmd
.iebuf
));
371 /* update curbssparams */
372 priv
->curbssparams
.channel
= bss
->phy
.ds
.channel
;
374 if (lbs_parse_dnld_countryinfo_11d(priv
, bss
)) {
379 ret
= lbs_cmd_with_response(priv
, command
, &cmd
);
381 ret
= lbs_assoc_post(priv
,
382 (struct cmd_ds_802_11_associate_response
*) &cmd
);
386 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
391 * @brief Associate to a specific BSS discovered in a scan
393 * @param priv A pointer to struct lbs_private structure
394 * @param assoc_req The association request describing the BSS to associate with
396 * @return 0-success, otherwise fail
398 static int lbs_try_associate(struct lbs_private
*priv
,
399 struct assoc_request
*assoc_req
)
402 u8 preamble
= RADIO_PREAMBLE_LONG
;
404 lbs_deb_enter(LBS_DEB_ASSOC
);
406 /* FW v9 and higher indicate authentication suites as a TLV in the
407 * association command, not as a separate authentication command.
409 if (priv
->fwrelease
< 0x09000000) {
410 ret
= lbs_set_authentication(priv
, assoc_req
->bss
.bssid
,
411 priv
->secinfo
.auth_mode
);
416 /* Use short preamble only when both the BSS and firmware support it */
417 if ((priv
->capability
& WLAN_CAPABILITY_SHORT_PREAMBLE
) &&
418 (assoc_req
->bss
.capability
& WLAN_CAPABILITY_SHORT_PREAMBLE
))
419 preamble
= RADIO_PREAMBLE_SHORT
;
421 ret
= lbs_set_radio(priv
, preamble
, 1);
425 ret
= lbs_associate(priv
, assoc_req
, CMD_802_11_ASSOCIATE
);
428 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
432 static int lbs_adhoc_post(struct lbs_private
*priv
,
433 struct cmd_ds_802_11_ad_hoc_result
*resp
)
436 u16 command
= le16_to_cpu(resp
->hdr
.command
);
437 u16 result
= le16_to_cpu(resp
->hdr
.result
);
438 union iwreq_data wrqu
;
439 struct bss_descriptor
*bss
;
440 DECLARE_SSID_BUF(ssid
);
442 lbs_deb_enter(LBS_DEB_JOIN
);
444 if (!priv
->in_progress_assoc_req
) {
445 lbs_deb_join("ADHOC_RESP: no in-progress association "
450 bss
= &priv
->in_progress_assoc_req
->bss
;
453 * Join result code 0 --> SUCCESS
456 lbs_deb_join("ADHOC_RESP: failed (result 0x%X)\n", result
);
457 if (priv
->connect_status
== LBS_CONNECTED
)
458 lbs_mac_event_disconnected(priv
);
463 /* Send a Media Connected event, according to the Spec */
464 priv
->connect_status
= LBS_CONNECTED
;
466 if (command
== CMD_RET(CMD_802_11_AD_HOC_START
)) {
467 /* Update the created network descriptor with the new BSSID */
468 memcpy(bss
->bssid
, resp
->bssid
, ETH_ALEN
);
471 /* Set the BSSID from the joined/started descriptor */
472 memcpy(&priv
->curbssparams
.bssid
, bss
->bssid
, ETH_ALEN
);
474 /* Set the new SSID to current SSID */
475 memcpy(&priv
->curbssparams
.ssid
, &bss
->ssid
, IW_ESSID_MAX_SIZE
);
476 priv
->curbssparams
.ssid_len
= bss
->ssid_len
;
478 netif_carrier_on(priv
->dev
);
479 if (!priv
->tx_pending_len
)
480 netif_wake_queue(priv
->dev
);
482 memset(&wrqu
, 0, sizeof(wrqu
));
483 memcpy(wrqu
.ap_addr
.sa_data
, priv
->curbssparams
.bssid
, ETH_ALEN
);
484 wrqu
.ap_addr
.sa_family
= ARPHRD_ETHER
;
485 wireless_send_event(priv
->dev
, SIOCGIWAP
, &wrqu
, NULL
);
487 lbs_deb_join("ADHOC_RESP: Joined/started '%s', BSSID %pM, channel %d\n",
488 print_ssid(ssid
, bss
->ssid
, bss
->ssid_len
),
489 priv
->curbssparams
.bssid
,
490 priv
->curbssparams
.channel
);
493 lbs_deb_leave_args(LBS_DEB_JOIN
, "ret %d", ret
);
498 * @brief Join an adhoc network found in a previous scan
500 * @param priv A pointer to struct lbs_private structure
501 * @param assoc_req The association request describing the BSS to join
503 * @return 0 on success, error on failure
505 static int lbs_adhoc_join(struct lbs_private
*priv
,
506 struct assoc_request
*assoc_req
)
508 struct cmd_ds_802_11_ad_hoc_join cmd
;
509 struct bss_descriptor
*bss
= &assoc_req
->bss
;
510 u8 preamble
= RADIO_PREAMBLE_LONG
;
511 DECLARE_SSID_BUF(ssid
);
515 lbs_deb_enter(LBS_DEB_ASSOC
);
517 lbs_deb_join("current SSID '%s', ssid length %u\n",
518 print_ssid(ssid
, priv
->curbssparams
.ssid
,
519 priv
->curbssparams
.ssid_len
),
520 priv
->curbssparams
.ssid_len
);
521 lbs_deb_join("requested ssid '%s', ssid length %u\n",
522 print_ssid(ssid
, bss
->ssid
, bss
->ssid_len
),
525 /* check if the requested SSID is already joined */
526 if (priv
->curbssparams
.ssid_len
&&
527 !lbs_ssid_cmp(priv
->curbssparams
.ssid
,
528 priv
->curbssparams
.ssid_len
,
529 bss
->ssid
, bss
->ssid_len
) &&
530 (priv
->mode
== IW_MODE_ADHOC
) &&
531 (priv
->connect_status
== LBS_CONNECTED
)) {
532 union iwreq_data wrqu
;
534 lbs_deb_join("ADHOC_J_CMD: New ad-hoc SSID is the same as "
535 "current, not attempting to re-join");
537 /* Send the re-association event though, because the association
538 * request really was successful, even if just a null-op.
540 memset(&wrqu
, 0, sizeof(wrqu
));
541 memcpy(wrqu
.ap_addr
.sa_data
, priv
->curbssparams
.bssid
,
543 wrqu
.ap_addr
.sa_family
= ARPHRD_ETHER
;
544 wireless_send_event(priv
->dev
, SIOCGIWAP
, &wrqu
, NULL
);
548 /* Use short preamble only when both the BSS and firmware support it */
549 if ((priv
->capability
& WLAN_CAPABILITY_SHORT_PREAMBLE
) &&
550 (bss
->capability
& WLAN_CAPABILITY_SHORT_PREAMBLE
)) {
551 lbs_deb_join("AdhocJoin: Short preamble\n");
552 preamble
= RADIO_PREAMBLE_SHORT
;
555 ret
= lbs_set_radio(priv
, preamble
, 1);
559 lbs_deb_join("AdhocJoin: channel = %d\n", assoc_req
->channel
);
560 lbs_deb_join("AdhocJoin: band = %c\n", assoc_req
->band
);
562 priv
->adhoccreate
= 0;
563 priv
->curbssparams
.channel
= bss
->channel
;
565 /* Build the join command */
566 memset(&cmd
, 0, sizeof(cmd
));
567 cmd
.hdr
.size
= cpu_to_le16(sizeof(cmd
));
569 cmd
.bss
.type
= CMD_BSS_TYPE_IBSS
;
570 cmd
.bss
.beaconperiod
= cpu_to_le16(bss
->beaconperiod
);
572 memcpy(&cmd
.bss
.bssid
, &bss
->bssid
, ETH_ALEN
);
573 memcpy(&cmd
.bss
.ssid
, &bss
->ssid
, bss
->ssid_len
);
575 memcpy(&cmd
.bss
.ds
, &bss
->phy
.ds
, sizeof(struct ieee_ie_ds_param_set
));
577 memcpy(&cmd
.bss
.ibss
, &bss
->ss
.ibss
,
578 sizeof(struct ieee_ie_ibss_param_set
));
580 cmd
.bss
.capability
= cpu_to_le16(bss
->capability
& CAPINFO_MASK
);
581 lbs_deb_join("ADHOC_J_CMD: tmpcap=%4X CAPINFO_MASK=%4X\n",
582 bss
->capability
, CAPINFO_MASK
);
584 /* information on BSSID descriptor passed to FW */
585 lbs_deb_join("ADHOC_J_CMD: BSSID = %pM, SSID = '%s'\n",
586 cmd
.bss
.bssid
, cmd
.bss
.ssid
);
588 /* Only v8 and below support setting these */
589 if (priv
->fwrelease
< 0x09000000) {
591 cmd
.failtimeout
= cpu_to_le16(MRVDRV_ASSOCIATION_TIME_OUT
);
593 cmd
.probedelay
= cpu_to_le16(CMD_SCAN_PROBE_DELAY_TIME
);
596 /* Copy Data rates from the rates recorded in scan response */
597 memset(cmd
.bss
.rates
, 0, sizeof(cmd
.bss
.rates
));
598 ratesize
= min_t(u16
, ARRAY_SIZE(cmd
.bss
.rates
), ARRAY_SIZE (bss
->rates
));
599 memcpy(cmd
.bss
.rates
, bss
->rates
, ratesize
);
600 if (get_common_rates(priv
, cmd
.bss
.rates
, &ratesize
)) {
601 lbs_deb_join("ADHOC_JOIN: get_common_rates returned error.\n");
606 /* Copy the ad-hoc creation rates into Current BSS state structure */
607 memset(&priv
->curbssparams
.rates
, 0, sizeof(priv
->curbssparams
.rates
));
608 memcpy(&priv
->curbssparams
.rates
, cmd
.bss
.rates
, ratesize
);
610 /* Set MSB on basic rates as the firmware requires, but _after_
611 * copying to current bss rates.
613 lbs_set_basic_rate_flags(cmd
.bss
.rates
, ratesize
);
615 cmd
.bss
.ibss
.atimwindow
= bss
->atimwindow
;
617 if (assoc_req
->secinfo
.wep_enabled
) {
618 u16 tmp
= le16_to_cpu(cmd
.bss
.capability
);
619 tmp
|= WLAN_CAPABILITY_PRIVACY
;
620 cmd
.bss
.capability
= cpu_to_le16(tmp
);
623 if (priv
->psmode
== LBS802_11POWERMODEMAX_PSP
) {
624 __le32 local_ps_mode
= cpu_to_le32(LBS802_11POWERMODECAM
);
627 ret
= lbs_prepare_and_send_command(priv
, CMD_802_11_PS_MODE
,
636 if (lbs_parse_dnld_countryinfo_11d(priv
, bss
)) {
641 ret
= lbs_cmd_with_response(priv
, CMD_802_11_AD_HOC_JOIN
, &cmd
);
643 ret
= lbs_adhoc_post(priv
,
644 (struct cmd_ds_802_11_ad_hoc_result
*)&cmd
);
648 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
653 * @brief Start an Adhoc Network
655 * @param priv A pointer to struct lbs_private structure
656 * @param assoc_req The association request describing the BSS to start
658 * @return 0 on success, error on failure
660 static int lbs_adhoc_start(struct lbs_private
*priv
,
661 struct assoc_request
*assoc_req
)
663 struct cmd_ds_802_11_ad_hoc_start cmd
;
664 u8 preamble
= RADIO_PREAMBLE_LONG
;
668 DECLARE_SSID_BUF(ssid
);
670 lbs_deb_enter(LBS_DEB_ASSOC
);
672 if (priv
->capability
& WLAN_CAPABILITY_SHORT_PREAMBLE
) {
673 lbs_deb_join("ADHOC_START: Will use short preamble\n");
674 preamble
= RADIO_PREAMBLE_SHORT
;
677 ret
= lbs_set_radio(priv
, preamble
, 1);
681 /* Build the start command */
682 memset(&cmd
, 0, sizeof(cmd
));
683 cmd
.hdr
.size
= cpu_to_le16(sizeof(cmd
));
685 memcpy(cmd
.ssid
, assoc_req
->ssid
, assoc_req
->ssid_len
);
687 lbs_deb_join("ADHOC_START: SSID '%s', ssid length %u\n",
688 print_ssid(ssid
, assoc_req
->ssid
, assoc_req
->ssid_len
),
689 assoc_req
->ssid_len
);
691 cmd
.bsstype
= CMD_BSS_TYPE_IBSS
;
693 if (priv
->beacon_period
== 0)
694 priv
->beacon_period
= MRVDRV_BEACON_INTERVAL
;
695 cmd
.beaconperiod
= cpu_to_le16(priv
->beacon_period
);
697 WARN_ON(!assoc_req
->channel
);
699 /* set Physical parameter set */
700 cmd
.ds
.header
.id
= WLAN_EID_DS_PARAMS
;
701 cmd
.ds
.header
.len
= 1;
702 cmd
.ds
.channel
= assoc_req
->channel
;
704 /* set IBSS parameter set */
705 cmd
.ibss
.header
.id
= WLAN_EID_IBSS_PARAMS
;
706 cmd
.ibss
.header
.len
= 2;
707 cmd
.ibss
.atimwindow
= cpu_to_le16(0);
709 /* set capability info */
710 tmpcap
= WLAN_CAPABILITY_IBSS
;
711 if (assoc_req
->secinfo
.wep_enabled
||
712 assoc_req
->secinfo
.WPAenabled
||
713 assoc_req
->secinfo
.WPA2enabled
) {
714 lbs_deb_join("ADHOC_START: WEP/WPA enabled, privacy on\n");
715 tmpcap
|= WLAN_CAPABILITY_PRIVACY
;
717 lbs_deb_join("ADHOC_START: WEP disabled, privacy off\n");
719 cmd
.capability
= cpu_to_le16(tmpcap
);
721 /* Only v8 and below support setting probe delay */
722 if (priv
->fwrelease
< 0x09000000)
723 cmd
.probedelay
= cpu_to_le16(CMD_SCAN_PROBE_DELAY_TIME
);
725 ratesize
= min(sizeof(cmd
.rates
), sizeof(lbs_bg_rates
));
726 memcpy(cmd
.rates
, lbs_bg_rates
, ratesize
);
728 /* Copy the ad-hoc creating rates into Current BSS state structure */
729 memset(&priv
->curbssparams
.rates
, 0, sizeof(priv
->curbssparams
.rates
));
730 memcpy(&priv
->curbssparams
.rates
, &cmd
.rates
, ratesize
);
732 /* Set MSB on basic rates as the firmware requires, but _after_
733 * copying to current bss rates.
735 lbs_set_basic_rate_flags(cmd
.rates
, ratesize
);
737 lbs_deb_join("ADHOC_START: rates=%02x %02x %02x %02x\n",
738 cmd
.rates
[0], cmd
.rates
[1], cmd
.rates
[2], cmd
.rates
[3]);
740 if (lbs_create_dnld_countryinfo_11d(priv
)) {
741 lbs_deb_join("ADHOC_START: dnld_countryinfo_11d failed\n");
746 lbs_deb_join("ADHOC_START: Starting Ad-Hoc BSS on channel %d, band %d\n",
747 assoc_req
->channel
, assoc_req
->band
);
749 priv
->adhoccreate
= 1;
750 priv
->mode
= IW_MODE_ADHOC
;
752 ret
= lbs_cmd_with_response(priv
, CMD_802_11_AD_HOC_START
, &cmd
);
754 ret
= lbs_adhoc_post(priv
,
755 (struct cmd_ds_802_11_ad_hoc_result
*)&cmd
);
758 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
763 * @brief Stop and Ad-Hoc network and exit Ad-Hoc mode
765 * @param priv A pointer to struct lbs_private structure
766 * @return 0 on success, or an error
768 int lbs_adhoc_stop(struct lbs_private
*priv
)
770 struct cmd_ds_802_11_ad_hoc_stop cmd
;
773 lbs_deb_enter(LBS_DEB_JOIN
);
775 memset(&cmd
, 0, sizeof (cmd
));
776 cmd
.hdr
.size
= cpu_to_le16 (sizeof (cmd
));
778 ret
= lbs_cmd_with_response(priv
, CMD_802_11_AD_HOC_STOP
, &cmd
);
780 /* Clean up everything even if there was an error */
781 lbs_mac_event_disconnected(priv
);
783 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
787 static inline int match_bss_no_security(struct lbs_802_11_security
*secinfo
,
788 struct bss_descriptor
*match_bss
)
790 if (!secinfo
->wep_enabled
&& !secinfo
->WPAenabled
791 && !secinfo
->WPA2enabled
792 && match_bss
->wpa_ie
[0] != WLAN_EID_GENERIC
793 && match_bss
->rsn_ie
[0] != WLAN_EID_RSN
794 && !(match_bss
->capability
& WLAN_CAPABILITY_PRIVACY
))
800 static inline int match_bss_static_wep(struct lbs_802_11_security
*secinfo
,
801 struct bss_descriptor
*match_bss
)
803 if (secinfo
->wep_enabled
&& !secinfo
->WPAenabled
804 && !secinfo
->WPA2enabled
805 && (match_bss
->capability
& WLAN_CAPABILITY_PRIVACY
))
811 static inline int match_bss_wpa(struct lbs_802_11_security
*secinfo
,
812 struct bss_descriptor
*match_bss
)
814 if (!secinfo
->wep_enabled
&& secinfo
->WPAenabled
815 && (match_bss
->wpa_ie
[0] == WLAN_EID_GENERIC
)
816 /* privacy bit may NOT be set in some APs like LinkSys WRT54G
817 && (match_bss->capability & WLAN_CAPABILITY_PRIVACY) */
824 static inline int match_bss_wpa2(struct lbs_802_11_security
*secinfo
,
825 struct bss_descriptor
*match_bss
)
827 if (!secinfo
->wep_enabled
&& secinfo
->WPA2enabled
&&
828 (match_bss
->rsn_ie
[0] == WLAN_EID_RSN
)
829 /* privacy bit may NOT be set in some APs like LinkSys WRT54G
830 (match_bss->capability & WLAN_CAPABILITY_PRIVACY) */
837 static inline int match_bss_dynamic_wep(struct lbs_802_11_security
*secinfo
,
838 struct bss_descriptor
*match_bss
)
840 if (!secinfo
->wep_enabled
&& !secinfo
->WPAenabled
841 && !secinfo
->WPA2enabled
842 && (match_bss
->wpa_ie
[0] != WLAN_EID_GENERIC
)
843 && (match_bss
->rsn_ie
[0] != WLAN_EID_RSN
)
844 && (match_bss
->capability
& WLAN_CAPABILITY_PRIVACY
))
851 * @brief Check if a scanned network compatible with the driver settings
853 * WEP WPA WPA2 ad-hoc encrypt Network
854 * enabled enabled enabled AES mode privacy WPA WPA2 Compatible
855 * 0 0 0 0 NONE 0 0 0 yes No security
856 * 1 0 0 0 NONE 1 0 0 yes Static WEP
857 * 0 1 0 0 x 1x 1 x yes WPA
858 * 0 0 1 0 x 1x x 1 yes WPA2
859 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
860 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
863 * @param priv A pointer to struct lbs_private
864 * @param index Index in scantable to check against current driver settings
865 * @param mode Network mode: Infrastructure or IBSS
867 * @return Index in scantable, or error code if negative
869 static int is_network_compatible(struct lbs_private
*priv
,
870 struct bss_descriptor
*bss
, uint8_t mode
)
874 lbs_deb_enter(LBS_DEB_SCAN
);
876 if (bss
->mode
!= mode
)
879 matched
= match_bss_no_security(&priv
->secinfo
, bss
);
882 matched
= match_bss_static_wep(&priv
->secinfo
, bss
);
885 matched
= match_bss_wpa(&priv
->secinfo
, bss
);
887 lbs_deb_scan("is_network_compatible() WPA: wpa_ie 0x%x "
888 "wpa2_ie 0x%x WEP %s WPA %s WPA2 %s "
889 "privacy 0x%x\n", bss
->wpa_ie
[0], bss
->rsn_ie
[0],
890 priv
->secinfo
.wep_enabled
? "e" : "d",
891 priv
->secinfo
.WPAenabled
? "e" : "d",
892 priv
->secinfo
.WPA2enabled
? "e" : "d",
893 (bss
->capability
& WLAN_CAPABILITY_PRIVACY
));
896 matched
= match_bss_wpa2(&priv
->secinfo
, bss
);
898 lbs_deb_scan("is_network_compatible() WPA2: wpa_ie 0x%x "
899 "wpa2_ie 0x%x WEP %s WPA %s WPA2 %s "
900 "privacy 0x%x\n", bss
->wpa_ie
[0], bss
->rsn_ie
[0],
901 priv
->secinfo
.wep_enabled
? "e" : "d",
902 priv
->secinfo
.WPAenabled
? "e" : "d",
903 priv
->secinfo
.WPA2enabled
? "e" : "d",
904 (bss
->capability
& WLAN_CAPABILITY_PRIVACY
));
907 matched
= match_bss_dynamic_wep(&priv
->secinfo
, bss
);
909 lbs_deb_scan("is_network_compatible() dynamic WEP: "
910 "wpa_ie 0x%x wpa2_ie 0x%x privacy 0x%x\n",
911 bss
->wpa_ie
[0], bss
->rsn_ie
[0],
912 (bss
->capability
& WLAN_CAPABILITY_PRIVACY
));
916 /* bss security settings don't match those configured on card */
917 lbs_deb_scan("is_network_compatible() FAILED: wpa_ie 0x%x "
918 "wpa2_ie 0x%x WEP %s WPA %s WPA2 %s privacy 0x%x\n",
919 bss
->wpa_ie
[0], bss
->rsn_ie
[0],
920 priv
->secinfo
.wep_enabled
? "e" : "d",
921 priv
->secinfo
.WPAenabled
? "e" : "d",
922 priv
->secinfo
.WPA2enabled
? "e" : "d",
923 (bss
->capability
& WLAN_CAPABILITY_PRIVACY
));
926 lbs_deb_leave_args(LBS_DEB_SCAN
, "matched: %d", matched
);
931 * @brief This function finds a specific compatible BSSID in the scan list
933 * Used in association code
935 * @param priv A pointer to struct lbs_private
936 * @param bssid BSSID to find in the scan list
937 * @param mode Network mode: Infrastructure or IBSS
939 * @return index in BSSID list, or error return code (< 0)
941 static struct bss_descriptor
*lbs_find_bssid_in_list(struct lbs_private
*priv
,
942 uint8_t *bssid
, uint8_t mode
)
944 struct bss_descriptor
*iter_bss
;
945 struct bss_descriptor
*found_bss
= NULL
;
947 lbs_deb_enter(LBS_DEB_SCAN
);
952 lbs_deb_hex(LBS_DEB_SCAN
, "looking for", bssid
, ETH_ALEN
);
954 /* Look through the scan table for a compatible match. The loop will
955 * continue past a matched bssid that is not compatible in case there
956 * is an AP with multiple SSIDs assigned to the same BSSID
958 mutex_lock(&priv
->lock
);
959 list_for_each_entry(iter_bss
, &priv
->network_list
, list
) {
960 if (compare_ether_addr(iter_bss
->bssid
, bssid
))
961 continue; /* bssid doesn't match */
965 if (!is_network_compatible(priv
, iter_bss
, mode
))
967 found_bss
= iter_bss
;
970 found_bss
= iter_bss
;
974 mutex_unlock(&priv
->lock
);
977 lbs_deb_leave_args(LBS_DEB_SCAN
, "found_bss %p", found_bss
);
982 * @brief This function finds ssid in ssid list.
984 * Used in association code
986 * @param priv A pointer to struct lbs_private
987 * @param ssid SSID to find in the list
988 * @param bssid BSSID to qualify the SSID selection (if provided)
989 * @param mode Network mode: Infrastructure or IBSS
991 * @return index in BSSID list
993 static struct bss_descriptor
*lbs_find_ssid_in_list(struct lbs_private
*priv
,
994 uint8_t *ssid
, uint8_t ssid_len
,
995 uint8_t *bssid
, uint8_t mode
,
999 struct bss_descriptor
*iter_bss
= NULL
;
1000 struct bss_descriptor
*found_bss
= NULL
;
1001 struct bss_descriptor
*tmp_oldest
= NULL
;
1003 lbs_deb_enter(LBS_DEB_SCAN
);
1005 mutex_lock(&priv
->lock
);
1007 list_for_each_entry(iter_bss
, &priv
->network_list
, list
) {
1009 (iter_bss
->last_scanned
< tmp_oldest
->last_scanned
))
1010 tmp_oldest
= iter_bss
;
1012 if (lbs_ssid_cmp(iter_bss
->ssid
, iter_bss
->ssid_len
,
1013 ssid
, ssid_len
) != 0)
1014 continue; /* ssid doesn't match */
1015 if (bssid
&& compare_ether_addr(iter_bss
->bssid
, bssid
) != 0)
1016 continue; /* bssid doesn't match */
1017 if ((channel
> 0) && (iter_bss
->channel
!= channel
))
1018 continue; /* channel doesn't match */
1023 if (!is_network_compatible(priv
, iter_bss
, mode
))
1027 /* Found requested BSSID */
1028 found_bss
= iter_bss
;
1032 if (SCAN_RSSI(iter_bss
->rssi
) > bestrssi
) {
1033 bestrssi
= SCAN_RSSI(iter_bss
->rssi
);
1034 found_bss
= iter_bss
;
1039 if (SCAN_RSSI(iter_bss
->rssi
) > bestrssi
) {
1040 bestrssi
= SCAN_RSSI(iter_bss
->rssi
);
1041 found_bss
= iter_bss
;
1048 mutex_unlock(&priv
->lock
);
1049 lbs_deb_leave_args(LBS_DEB_SCAN
, "found_bss %p", found_bss
);
1053 static int assoc_helper_essid(struct lbs_private
*priv
,
1054 struct assoc_request
* assoc_req
)
1057 struct bss_descriptor
* bss
;
1059 DECLARE_SSID_BUF(ssid
);
1061 lbs_deb_enter(LBS_DEB_ASSOC
);
1063 /* FIXME: take channel into account when picking SSIDs if a channel
1067 if (test_bit(ASSOC_FLAG_CHANNEL
, &assoc_req
->flags
))
1068 channel
= assoc_req
->channel
;
1070 lbs_deb_assoc("SSID '%s' requested\n",
1071 print_ssid(ssid
, assoc_req
->ssid
, assoc_req
->ssid_len
));
1072 if (assoc_req
->mode
== IW_MODE_INFRA
) {
1073 lbs_send_specific_ssid_scan(priv
, assoc_req
->ssid
,
1074 assoc_req
->ssid_len
);
1076 bss
= lbs_find_ssid_in_list(priv
, assoc_req
->ssid
,
1077 assoc_req
->ssid_len
, NULL
, IW_MODE_INFRA
, channel
);
1079 memcpy(&assoc_req
->bss
, bss
, sizeof(struct bss_descriptor
));
1080 ret
= lbs_try_associate(priv
, assoc_req
);
1082 lbs_deb_assoc("SSID not found; cannot associate\n");
1084 } else if (assoc_req
->mode
== IW_MODE_ADHOC
) {
1085 /* Scan for the network, do not save previous results. Stale
1086 * scan data will cause us to join a non-existant adhoc network
1088 lbs_send_specific_ssid_scan(priv
, assoc_req
->ssid
,
1089 assoc_req
->ssid_len
);
1091 /* Search for the requested SSID in the scan table */
1092 bss
= lbs_find_ssid_in_list(priv
, assoc_req
->ssid
,
1093 assoc_req
->ssid_len
, NULL
, IW_MODE_ADHOC
, channel
);
1095 lbs_deb_assoc("SSID found, will join\n");
1096 memcpy(&assoc_req
->bss
, bss
, sizeof(struct bss_descriptor
));
1097 lbs_adhoc_join(priv
, assoc_req
);
1099 /* else send START command */
1100 lbs_deb_assoc("SSID not found, creating adhoc network\n");
1101 memcpy(&assoc_req
->bss
.ssid
, &assoc_req
->ssid
,
1103 assoc_req
->bss
.ssid_len
= assoc_req
->ssid_len
;
1104 lbs_adhoc_start(priv
, assoc_req
);
1108 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
1113 static int assoc_helper_bssid(struct lbs_private
*priv
,
1114 struct assoc_request
* assoc_req
)
1117 struct bss_descriptor
* bss
;
1119 lbs_deb_enter_args(LBS_DEB_ASSOC
, "BSSID %pM", assoc_req
->bssid
);
1121 /* Search for index position in list for requested MAC */
1122 bss
= lbs_find_bssid_in_list(priv
, assoc_req
->bssid
,
1125 lbs_deb_assoc("ASSOC: WAP: BSSID %pM not found, "
1126 "cannot associate.\n", assoc_req
->bssid
);
1130 memcpy(&assoc_req
->bss
, bss
, sizeof(struct bss_descriptor
));
1131 if (assoc_req
->mode
== IW_MODE_INFRA
) {
1132 ret
= lbs_try_associate(priv
, assoc_req
);
1133 lbs_deb_assoc("ASSOC: lbs_try_associate(bssid) returned %d\n",
1135 } else if (assoc_req
->mode
== IW_MODE_ADHOC
) {
1136 lbs_adhoc_join(priv
, assoc_req
);
1140 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
1145 static int assoc_helper_associate(struct lbs_private
*priv
,
1146 struct assoc_request
* assoc_req
)
1148 int ret
= 0, done
= 0;
1150 lbs_deb_enter(LBS_DEB_ASSOC
);
1152 /* If we're given and 'any' BSSID, try associating based on SSID */
1154 if (test_bit(ASSOC_FLAG_BSSID
, &assoc_req
->flags
)) {
1155 if (compare_ether_addr(bssid_any
, assoc_req
->bssid
)
1156 && compare_ether_addr(bssid_off
, assoc_req
->bssid
)) {
1157 ret
= assoc_helper_bssid(priv
, assoc_req
);
1162 if (!done
&& test_bit(ASSOC_FLAG_SSID
, &assoc_req
->flags
)) {
1163 ret
= assoc_helper_essid(priv
, assoc_req
);
1166 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
1171 static int assoc_helper_mode(struct lbs_private
*priv
,
1172 struct assoc_request
* assoc_req
)
1176 lbs_deb_enter(LBS_DEB_ASSOC
);
1178 if (assoc_req
->mode
== priv
->mode
)
1181 if (assoc_req
->mode
== IW_MODE_INFRA
) {
1182 if (priv
->psstate
!= PS_STATE_FULL_POWER
)
1183 lbs_ps_wakeup(priv
, CMD_OPTION_WAITFORRSP
);
1184 priv
->psmode
= LBS802_11POWERMODECAM
;
1187 priv
->mode
= assoc_req
->mode
;
1188 ret
= lbs_set_snmp_mib(priv
, SNMP_MIB_OID_BSS_TYPE
, assoc_req
->mode
);
1191 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
1195 static int assoc_helper_channel(struct lbs_private
*priv
,
1196 struct assoc_request
* assoc_req
)
1200 lbs_deb_enter(LBS_DEB_ASSOC
);
1202 ret
= lbs_update_channel(priv
);
1204 lbs_deb_assoc("ASSOC: channel: error getting channel.\n");
1208 if (assoc_req
->channel
== priv
->curbssparams
.channel
)
1211 if (priv
->mesh_dev
) {
1212 /* Change mesh channel first; 21.p21 firmware won't let
1213 you change channel otherwise (even though it'll return
1215 lbs_mesh_config(priv
, CMD_ACT_MESH_CONFIG_STOP
,
1216 assoc_req
->channel
);
1219 lbs_deb_assoc("ASSOC: channel: %d -> %d\n",
1220 priv
->curbssparams
.channel
, assoc_req
->channel
);
1222 ret
= lbs_set_channel(priv
, assoc_req
->channel
);
1224 lbs_deb_assoc("ASSOC: channel: error setting channel.\n");
1226 /* FIXME: shouldn't need to grab the channel _again_ after setting
1227 * it since the firmware is supposed to return the new channel, but
1229 ret
= lbs_update_channel(priv
);
1231 lbs_deb_assoc("ASSOC: channel: error getting channel.\n");
1235 if (assoc_req
->channel
!= priv
->curbssparams
.channel
) {
1236 lbs_deb_assoc("ASSOC: channel: failed to update channel to %d\n",
1237 assoc_req
->channel
);
1241 if ( assoc_req
->secinfo
.wep_enabled
1242 && (assoc_req
->wep_keys
[0].len
1243 || assoc_req
->wep_keys
[1].len
1244 || assoc_req
->wep_keys
[2].len
1245 || assoc_req
->wep_keys
[3].len
)) {
1246 /* Make sure WEP keys are re-sent to firmware */
1247 set_bit(ASSOC_FLAG_WEP_KEYS
, &assoc_req
->flags
);
1250 /* Must restart/rejoin adhoc networks after channel change */
1251 set_bit(ASSOC_FLAG_SSID
, &assoc_req
->flags
);
1255 lbs_mesh_config(priv
, CMD_ACT_MESH_CONFIG_START
,
1256 priv
->curbssparams
.channel
);
1259 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
1264 static int assoc_helper_wep_keys(struct lbs_private
*priv
,
1265 struct assoc_request
*assoc_req
)
1270 lbs_deb_enter(LBS_DEB_ASSOC
);
1272 /* Set or remove WEP keys */
1273 if (assoc_req
->wep_keys
[0].len
|| assoc_req
->wep_keys
[1].len
||
1274 assoc_req
->wep_keys
[2].len
|| assoc_req
->wep_keys
[3].len
)
1275 ret
= lbs_cmd_802_11_set_wep(priv
, CMD_ACT_ADD
, assoc_req
);
1277 ret
= lbs_cmd_802_11_set_wep(priv
, CMD_ACT_REMOVE
, assoc_req
);
1282 /* enable/disable the MAC's WEP packet filter */
1283 if (assoc_req
->secinfo
.wep_enabled
)
1284 priv
->mac_control
|= CMD_ACT_MAC_WEP_ENABLE
;
1286 priv
->mac_control
&= ~CMD_ACT_MAC_WEP_ENABLE
;
1288 lbs_set_mac_control(priv
);
1290 mutex_lock(&priv
->lock
);
1292 /* Copy WEP keys into priv wep key fields */
1293 for (i
= 0; i
< 4; i
++) {
1294 memcpy(&priv
->wep_keys
[i
], &assoc_req
->wep_keys
[i
],
1295 sizeof(struct enc_key
));
1297 priv
->wep_tx_keyidx
= assoc_req
->wep_tx_keyidx
;
1299 mutex_unlock(&priv
->lock
);
1302 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
1306 static int assoc_helper_secinfo(struct lbs_private
*priv
,
1307 struct assoc_request
* assoc_req
)
1313 lbs_deb_enter(LBS_DEB_ASSOC
);
1315 memcpy(&priv
->secinfo
, &assoc_req
->secinfo
,
1316 sizeof(struct lbs_802_11_security
));
1318 lbs_set_mac_control(priv
);
1320 /* If RSN is already enabled, don't try to enable it again, since
1321 * ENABLE_RSN resets internal state machines and will clobber the
1322 * 4-way WPA handshake.
1325 /* Get RSN enabled/disabled */
1326 ret
= lbs_cmd_802_11_enable_rsn(priv
, CMD_ACT_GET
, &rsn
);
1328 lbs_deb_assoc("Failed to get RSN status: %d\n", ret
);
1332 /* Don't re-enable RSN if it's already enabled */
1333 do_wpa
= assoc_req
->secinfo
.WPAenabled
|| assoc_req
->secinfo
.WPA2enabled
;
1337 /* Set RSN enabled/disabled */
1338 ret
= lbs_cmd_802_11_enable_rsn(priv
, CMD_ACT_SET
, &do_wpa
);
1341 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
1346 static int assoc_helper_wpa_keys(struct lbs_private
*priv
,
1347 struct assoc_request
* assoc_req
)
1350 unsigned int flags
= assoc_req
->flags
;
1352 lbs_deb_enter(LBS_DEB_ASSOC
);
1354 /* Work around older firmware bug where WPA unicast and multicast
1355 * keys must be set independently. Seen in SDIO parts with firmware
1359 if (test_bit(ASSOC_FLAG_WPA_UCAST_KEY
, &assoc_req
->flags
)) {
1360 clear_bit(ASSOC_FLAG_WPA_MCAST_KEY
, &assoc_req
->flags
);
1361 ret
= lbs_cmd_802_11_key_material(priv
, CMD_ACT_SET
, assoc_req
);
1362 assoc_req
->flags
= flags
;
1368 memcpy(&priv
->wpa_unicast_key
, &assoc_req
->wpa_unicast_key
,
1369 sizeof(struct enc_key
));
1371 if (test_bit(ASSOC_FLAG_WPA_MCAST_KEY
, &assoc_req
->flags
)) {
1372 clear_bit(ASSOC_FLAG_WPA_UCAST_KEY
, &assoc_req
->flags
);
1374 ret
= lbs_cmd_802_11_key_material(priv
, CMD_ACT_SET
, assoc_req
);
1375 assoc_req
->flags
= flags
;
1377 memcpy(&priv
->wpa_mcast_key
, &assoc_req
->wpa_mcast_key
,
1378 sizeof(struct enc_key
));
1382 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
1387 static int assoc_helper_wpa_ie(struct lbs_private
*priv
,
1388 struct assoc_request
* assoc_req
)
1392 lbs_deb_enter(LBS_DEB_ASSOC
);
1394 if (assoc_req
->secinfo
.WPAenabled
|| assoc_req
->secinfo
.WPA2enabled
) {
1395 memcpy(&priv
->wpa_ie
, &assoc_req
->wpa_ie
, assoc_req
->wpa_ie_len
);
1396 priv
->wpa_ie_len
= assoc_req
->wpa_ie_len
;
1398 memset(&priv
->wpa_ie
, 0, MAX_WPA_IE_LEN
);
1399 priv
->wpa_ie_len
= 0;
1402 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
1407 static int should_deauth_infrastructure(struct lbs_private
*priv
,
1408 struct assoc_request
* assoc_req
)
1412 if (priv
->connect_status
!= LBS_CONNECTED
)
1415 lbs_deb_enter(LBS_DEB_ASSOC
);
1416 if (test_bit(ASSOC_FLAG_SSID
, &assoc_req
->flags
)) {
1417 lbs_deb_assoc("Deauthenticating due to new SSID\n");
1422 if (test_bit(ASSOC_FLAG_SECINFO
, &assoc_req
->flags
)) {
1423 if (priv
->secinfo
.auth_mode
!= assoc_req
->secinfo
.auth_mode
) {
1424 lbs_deb_assoc("Deauthenticating due to new security\n");
1430 if (test_bit(ASSOC_FLAG_BSSID
, &assoc_req
->flags
)) {
1431 lbs_deb_assoc("Deauthenticating due to new BSSID\n");
1436 if (test_bit(ASSOC_FLAG_CHANNEL
, &assoc_req
->flags
)) {
1437 lbs_deb_assoc("Deauthenticating due to channel switch\n");
1442 /* FIXME: deal with 'auto' mode somehow */
1443 if (test_bit(ASSOC_FLAG_MODE
, &assoc_req
->flags
)) {
1444 if (assoc_req
->mode
!= IW_MODE_INFRA
) {
1445 lbs_deb_assoc("Deauthenticating due to leaving "
1453 lbs_deb_leave_args(LBS_DEB_ASSOC
, "ret %d", ret
);
1458 static int should_stop_adhoc(struct lbs_private
*priv
,
1459 struct assoc_request
* assoc_req
)
1461 lbs_deb_enter(LBS_DEB_ASSOC
);
1463 if (priv
->connect_status
!= LBS_CONNECTED
)
1466 if (lbs_ssid_cmp(priv
->curbssparams
.ssid
,
1467 priv
->curbssparams
.ssid_len
,
1468 assoc_req
->ssid
, assoc_req
->ssid_len
) != 0)
1471 /* FIXME: deal with 'auto' mode somehow */
1472 if (test_bit(ASSOC_FLAG_MODE
, &assoc_req
->flags
)) {
1473 if (assoc_req
->mode
!= IW_MODE_ADHOC
)
1477 if (test_bit(ASSOC_FLAG_CHANNEL
, &assoc_req
->flags
)) {
1478 if (assoc_req
->channel
!= priv
->curbssparams
.channel
)
1482 lbs_deb_leave(LBS_DEB_ASSOC
);
1488 * @brief This function finds the best SSID in the Scan List
1490 * Search the scan table for the best SSID that also matches the current
1491 * adapter network preference (infrastructure or adhoc)
1493 * @param priv A pointer to struct lbs_private
1495 * @return index in BSSID list
1497 static struct bss_descriptor
*lbs_find_best_ssid_in_list(
1498 struct lbs_private
*priv
, uint8_t mode
)
1500 uint8_t bestrssi
= 0;
1501 struct bss_descriptor
*iter_bss
;
1502 struct bss_descriptor
*best_bss
= NULL
;
1504 lbs_deb_enter(LBS_DEB_SCAN
);
1506 mutex_lock(&priv
->lock
);
1508 list_for_each_entry(iter_bss
, &priv
->network_list
, list
) {
1512 if (!is_network_compatible(priv
, iter_bss
, mode
))
1514 if (SCAN_RSSI(iter_bss
->rssi
) <= bestrssi
)
1516 bestrssi
= SCAN_RSSI(iter_bss
->rssi
);
1517 best_bss
= iter_bss
;
1521 if (SCAN_RSSI(iter_bss
->rssi
) <= bestrssi
)
1523 bestrssi
= SCAN_RSSI(iter_bss
->rssi
);
1524 best_bss
= iter_bss
;
1529 mutex_unlock(&priv
->lock
);
1530 lbs_deb_leave_args(LBS_DEB_SCAN
, "best_bss %p", best_bss
);
1535 * @brief Find the best AP
1537 * Used from association worker.
1539 * @param priv A pointer to struct lbs_private structure
1540 * @param pSSID A pointer to AP's ssid
1542 * @return 0--success, otherwise--fail
1544 static int lbs_find_best_network_ssid(struct lbs_private
*priv
,
1545 uint8_t *out_ssid
, uint8_t *out_ssid_len
, uint8_t preferred_mode
,
1549 struct bss_descriptor
*found
;
1551 lbs_deb_enter(LBS_DEB_SCAN
);
1553 priv
->scan_ssid_len
= 0;
1554 lbs_scan_networks(priv
, 1);
1555 if (priv
->surpriseremoved
)
1558 found
= lbs_find_best_ssid_in_list(priv
, preferred_mode
);
1559 if (found
&& (found
->ssid_len
> 0)) {
1560 memcpy(out_ssid
, &found
->ssid
, IW_ESSID_MAX_SIZE
);
1561 *out_ssid_len
= found
->ssid_len
;
1562 *out_mode
= found
->mode
;
1567 lbs_deb_leave_args(LBS_DEB_SCAN
, "ret %d", ret
);
1572 void lbs_association_worker(struct work_struct
*work
)
1574 struct lbs_private
*priv
= container_of(work
, struct lbs_private
,
1576 struct assoc_request
* assoc_req
= NULL
;
1578 int find_any_ssid
= 0;
1579 DECLARE_SSID_BUF(ssid
);
1581 lbs_deb_enter(LBS_DEB_ASSOC
);
1583 mutex_lock(&priv
->lock
);
1584 assoc_req
= priv
->pending_assoc_req
;
1585 priv
->pending_assoc_req
= NULL
;
1586 priv
->in_progress_assoc_req
= assoc_req
;
1587 mutex_unlock(&priv
->lock
);
1593 "Association Request:\n"
1600 " secinfo: %s%s%s\n"
1603 print_ssid(ssid
, assoc_req
->ssid
, assoc_req
->ssid_len
),
1604 assoc_req
->channel
, assoc_req
->band
, assoc_req
->mode
,
1606 assoc_req
->secinfo
.WPAenabled
? " WPA" : "",
1607 assoc_req
->secinfo
.WPA2enabled
? " WPA2" : "",
1608 assoc_req
->secinfo
.wep_enabled
? " WEP" : "",
1609 assoc_req
->secinfo
.auth_mode
);
1611 /* If 'any' SSID was specified, find an SSID to associate with */
1612 if (test_bit(ASSOC_FLAG_SSID
, &assoc_req
->flags
)
1613 && !assoc_req
->ssid_len
)
1616 /* But don't use 'any' SSID if there's a valid locked BSSID to use */
1617 if (test_bit(ASSOC_FLAG_BSSID
, &assoc_req
->flags
)) {
1618 if (compare_ether_addr(assoc_req
->bssid
, bssid_any
)
1619 && compare_ether_addr(assoc_req
->bssid
, bssid_off
))
1623 if (find_any_ssid
) {
1624 u8 new_mode
= assoc_req
->mode
;
1626 ret
= lbs_find_best_network_ssid(priv
, assoc_req
->ssid
,
1627 &assoc_req
->ssid_len
, assoc_req
->mode
, &new_mode
);
1629 lbs_deb_assoc("Could not find best network\n");
1634 /* Ensure we switch to the mode of the AP */
1635 if (assoc_req
->mode
== IW_MODE_AUTO
) {
1636 set_bit(ASSOC_FLAG_MODE
, &assoc_req
->flags
);
1637 assoc_req
->mode
= new_mode
;
1642 * Check if the attributes being changing require deauthentication
1643 * from the currently associated infrastructure access point.
1645 if (priv
->mode
== IW_MODE_INFRA
) {
1646 if (should_deauth_infrastructure(priv
, assoc_req
)) {
1647 ret
= lbs_cmd_80211_deauthenticate(priv
,
1648 priv
->curbssparams
.bssid
,
1649 WLAN_REASON_DEAUTH_LEAVING
);
1651 lbs_deb_assoc("Deauthentication due to new "
1652 "configuration request failed: %d\n",
1656 } else if (priv
->mode
== IW_MODE_ADHOC
) {
1657 if (should_stop_adhoc(priv
, assoc_req
)) {
1658 ret
= lbs_adhoc_stop(priv
);
1660 lbs_deb_assoc("Teardown of AdHoc network due to "
1661 "new configuration request failed: %d\n",
1668 /* Send the various configuration bits to the firmware */
1669 if (test_bit(ASSOC_FLAG_MODE
, &assoc_req
->flags
)) {
1670 ret
= assoc_helper_mode(priv
, assoc_req
);
1675 if (test_bit(ASSOC_FLAG_CHANNEL
, &assoc_req
->flags
)) {
1676 ret
= assoc_helper_channel(priv
, assoc_req
);
1681 if ( test_bit(ASSOC_FLAG_WEP_KEYS
, &assoc_req
->flags
)
1682 || test_bit(ASSOC_FLAG_WEP_TX_KEYIDX
, &assoc_req
->flags
)) {
1683 ret
= assoc_helper_wep_keys(priv
, assoc_req
);
1688 if (test_bit(ASSOC_FLAG_SECINFO
, &assoc_req
->flags
)) {
1689 ret
= assoc_helper_secinfo(priv
, assoc_req
);
1694 if (test_bit(ASSOC_FLAG_WPA_IE
, &assoc_req
->flags
)) {
1695 ret
= assoc_helper_wpa_ie(priv
, assoc_req
);
1700 if (test_bit(ASSOC_FLAG_WPA_MCAST_KEY
, &assoc_req
->flags
)
1701 || test_bit(ASSOC_FLAG_WPA_UCAST_KEY
, &assoc_req
->flags
)) {
1702 ret
= assoc_helper_wpa_keys(priv
, assoc_req
);
1707 /* SSID/BSSID should be the _last_ config option set, because they
1708 * trigger the association attempt.
1710 if (test_bit(ASSOC_FLAG_BSSID
, &assoc_req
->flags
)
1711 || test_bit(ASSOC_FLAG_SSID
, &assoc_req
->flags
)) {
1714 ret
= assoc_helper_associate(priv
, assoc_req
);
1716 lbs_deb_assoc("ASSOC: association unsuccessful: %d\n",
1721 if (priv
->connect_status
!= LBS_CONNECTED
) {
1722 lbs_deb_assoc("ASSOC: association unsuccessful, "
1728 lbs_deb_assoc("associated to %pM\n",
1729 priv
->curbssparams
.bssid
);
1730 lbs_prepare_and_send_command(priv
,
1732 0, CMD_OPTION_WAITFORRSP
, 0, NULL
);
1740 lbs_deb_assoc("ASSOC: reconfiguration attempt unsuccessful: %d\n",
1744 mutex_lock(&priv
->lock
);
1745 priv
->in_progress_assoc_req
= NULL
;
1746 mutex_unlock(&priv
->lock
);
1750 lbs_deb_leave(LBS_DEB_ASSOC
);
1755 * Caller MUST hold any necessary locks
1757 struct assoc_request
*lbs_get_association_request(struct lbs_private
*priv
)
1759 struct assoc_request
* assoc_req
;
1761 lbs_deb_enter(LBS_DEB_ASSOC
);
1762 if (!priv
->pending_assoc_req
) {
1763 priv
->pending_assoc_req
= kzalloc(sizeof(struct assoc_request
),
1765 if (!priv
->pending_assoc_req
) {
1766 lbs_pr_info("Not enough memory to allocate association"
1772 /* Copy current configuration attributes to the association request,
1773 * but don't overwrite any that are already set.
1775 assoc_req
= priv
->pending_assoc_req
;
1776 if (!test_bit(ASSOC_FLAG_SSID
, &assoc_req
->flags
)) {
1777 memcpy(&assoc_req
->ssid
, &priv
->curbssparams
.ssid
,
1779 assoc_req
->ssid_len
= priv
->curbssparams
.ssid_len
;
1782 if (!test_bit(ASSOC_FLAG_CHANNEL
, &assoc_req
->flags
))
1783 assoc_req
->channel
= priv
->curbssparams
.channel
;
1785 if (!test_bit(ASSOC_FLAG_BAND
, &assoc_req
->flags
))
1786 assoc_req
->band
= priv
->curbssparams
.band
;
1788 if (!test_bit(ASSOC_FLAG_MODE
, &assoc_req
->flags
))
1789 assoc_req
->mode
= priv
->mode
;
1791 if (!test_bit(ASSOC_FLAG_BSSID
, &assoc_req
->flags
)) {
1792 memcpy(&assoc_req
->bssid
, priv
->curbssparams
.bssid
,
1796 if (!test_bit(ASSOC_FLAG_WEP_KEYS
, &assoc_req
->flags
)) {
1798 for (i
= 0; i
< 4; i
++) {
1799 memcpy(&assoc_req
->wep_keys
[i
], &priv
->wep_keys
[i
],
1800 sizeof(struct enc_key
));
1804 if (!test_bit(ASSOC_FLAG_WEP_TX_KEYIDX
, &assoc_req
->flags
))
1805 assoc_req
->wep_tx_keyidx
= priv
->wep_tx_keyidx
;
1807 if (!test_bit(ASSOC_FLAG_WPA_MCAST_KEY
, &assoc_req
->flags
)) {
1808 memcpy(&assoc_req
->wpa_mcast_key
, &priv
->wpa_mcast_key
,
1809 sizeof(struct enc_key
));
1812 if (!test_bit(ASSOC_FLAG_WPA_UCAST_KEY
, &assoc_req
->flags
)) {
1813 memcpy(&assoc_req
->wpa_unicast_key
, &priv
->wpa_unicast_key
,
1814 sizeof(struct enc_key
));
1817 if (!test_bit(ASSOC_FLAG_SECINFO
, &assoc_req
->flags
)) {
1818 memcpy(&assoc_req
->secinfo
, &priv
->secinfo
,
1819 sizeof(struct lbs_802_11_security
));
1822 if (!test_bit(ASSOC_FLAG_WPA_IE
, &assoc_req
->flags
)) {
1823 memcpy(&assoc_req
->wpa_ie
, &priv
->wpa_ie
,
1825 assoc_req
->wpa_ie_len
= priv
->wpa_ie_len
;
1828 lbs_deb_leave(LBS_DEB_ASSOC
);
1834 * @brief Deauthenticate from a specific BSS
1836 * @param priv A pointer to struct lbs_private structure
1837 * @param bssid The specific BSS to deauthenticate from
1838 * @param reason The 802.11 sec. 7.3.1.7 Reason Code for deauthenticating
1840 * @return 0 on success, error on failure
1842 int lbs_cmd_80211_deauthenticate(struct lbs_private
*priv
, u8 bssid
[ETH_ALEN
],
1845 struct cmd_ds_802_11_deauthenticate cmd
;
1848 lbs_deb_enter(LBS_DEB_JOIN
);
1850 memset(&cmd
, 0, sizeof(cmd
));
1851 cmd
.hdr
.size
= cpu_to_le16(sizeof(cmd
));
1852 memcpy(cmd
.macaddr
, &bssid
[0], ETH_ALEN
);
1853 cmd
.reasoncode
= cpu_to_le16(reason
);
1855 ret
= lbs_cmd_with_response(priv
, CMD_802_11_DEAUTHENTICATE
, &cmd
);
1857 /* Clean up everything even if there was an error; can't assume that
1858 * we're still authenticated to the AP after trying to deauth.
1860 lbs_mac_event_disconnected(priv
);
1862 lbs_deb_leave(LBS_DEB_JOIN
);