1 /******************************************************************************
2  * mlme_linux.c
3  *
4  * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
5  * Linux device driver for RTL8192SU
6  *
7  * This program is free software; you can redistribute it and/or modify it
8  * under the terms of version 2 of the GNU General Public License as
9  * published by the Free Software Foundation.
10  *
11  * This program is distributed in the hope that it will be useful, but WITHOUT
12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
14  * more details.
15  *
16  * You should have received a copy of the GNU General Public License along with
17  * this program; if not, write to the Free Software Foundation, Inc.,
18  * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
19  *
20  * Modifications for inclusion into the Linux staging tree are
21  * Copyright(c) 2010 Larry Finger. All rights reserved.
22  *
23  * Contact information:
24  * WLAN FAE <wlanfae@realtek.com>.
25  * Larry Finger <Larry.Finger@lwfinger.net>
26  *
27  ******************************************************************************/
28 
29 #define _MLME_OSDEP_C_
30 
31 #include "osdep_service.h"
32 #include "drv_types.h"
33 #include "mlme_osdep.h"
34 
35 static void sitesurvey_ctrl_handler(struct timer_list *t)
36 {
37 	struct _adapter *adapter =
38 		from_timer(adapter, t,
39 			   mlmepriv.sitesurveyctrl.sitesurvey_ctrl_timer);
40 
41 	_r8712_sitesurvey_ctrl_handler(adapter);
42 	mod_timer(&adapter->mlmepriv.sitesurveyctrl.sitesurvey_ctrl_timer,
43 		  jiffies + msecs_to_jiffies(3000));
44 }
45 
46 static void join_timeout_handler (struct timer_list *t)
47 {
48 	struct _adapter *adapter =
49 		from_timer(adapter, t, mlmepriv.assoc_timer);
50 
51 	_r8712_join_timeout_handler(adapter);
52 }
53 
54 static void _scan_timeout_handler (struct timer_list *t)
55 {
56 	struct _adapter *adapter =
57 		from_timer(adapter, t, mlmepriv.scan_to_timer);
58 
59 	r8712_scan_timeout_handler(adapter);
60 }
61 
62 static void dhcp_timeout_handler (struct timer_list *t)
63 {
64 	struct _adapter *adapter =
65 		from_timer(adapter, t, mlmepriv.dhcp_timer);
66 
67 	_r8712_dhcp_timeout_handler(adapter);
68 }
69 
70 static void wdg_timeout_handler (struct timer_list *t)
71 {
72 	struct _adapter *adapter =
73 		from_timer(adapter, t, mlmepriv.wdg_timer);
74 
75 	_r8712_wdg_timeout_handler(adapter);
76 
77 	mod_timer(&adapter->mlmepriv.wdg_timer,
78 		  jiffies + msecs_to_jiffies(2000));
79 }
80 
81 void r8712_init_mlme_timer(struct _adapter *padapter)
82 {
83 	struct	mlme_priv *pmlmepriv = &padapter->mlmepriv;
84 
85 	timer_setup(&pmlmepriv->assoc_timer, join_timeout_handler, 0);
86 	timer_setup(&pmlmepriv->sitesurveyctrl.sitesurvey_ctrl_timer,
87 		    sitesurvey_ctrl_handler, 0);
88 	timer_setup(&pmlmepriv->scan_to_timer, _scan_timeout_handler, 0);
89 	timer_setup(&pmlmepriv->dhcp_timer, dhcp_timeout_handler, 0);
90 	timer_setup(&pmlmepriv->wdg_timer, wdg_timeout_handler, 0);
91 }
92 
93 void r8712_os_indicate_connect(struct _adapter *adapter)
94 {
95 	r8712_indicate_wx_assoc_event(adapter);
96 	netif_carrier_on(adapter->pnetdev);
97 }
98 
99 static struct RT_PMKID_LIST   backupPMKIDList[NUM_PMKID_CACHE];
100 void r8712_os_indicate_disconnect(struct _adapter *adapter)
101 {
102 	u8 backupPMKIDIndex = 0;
103 	u8 backupTKIPCountermeasure = 0x00;
104 
105 	r8712_indicate_wx_disassoc_event(adapter);
106 	netif_carrier_off(adapter->pnetdev);
107 	if (adapter->securitypriv.AuthAlgrthm == 2) { /*/802.1x*/
108 		/* We have to backup the PMK information for WiFi PMK Caching
109 		 * test item. Backup the btkip_countermeasure information.
110 		 * When the countermeasure is trigger, the driver have to
111 		 * disconnect with AP for 60 seconds.
112 		 */
113 
114 		memcpy(&backupPMKIDList[0],
115 		       &adapter->securitypriv.PMKIDList[0],
116 		       sizeof(struct RT_PMKID_LIST) * NUM_PMKID_CACHE);
117 		backupPMKIDIndex = adapter->securitypriv.PMKIDIndex;
118 		backupTKIPCountermeasure =
119 			adapter->securitypriv.btkip_countermeasure;
120 		memset((unsigned char *)&adapter->securitypriv, 0,
121 		       sizeof(struct security_priv));
122 		timer_setup(&adapter->securitypriv.tkip_timer,
123 			    r8712_use_tkipkey_handler, 0);
124 		/* Restore the PMK information to securitypriv structure
125 		 * for the following connection.
126 		 */
127 		memcpy(&adapter->securitypriv.PMKIDList[0],
128 		       &backupPMKIDList[0],
129 		       sizeof(struct RT_PMKID_LIST) * NUM_PMKID_CACHE);
130 		adapter->securitypriv.PMKIDIndex = backupPMKIDIndex;
131 		adapter->securitypriv.btkip_countermeasure =
132 					 backupTKIPCountermeasure;
133 	} else { /*reset values in securitypriv*/
134 		struct security_priv *psec_priv = &adapter->securitypriv;
135 
136 		psec_priv->AuthAlgrthm = 0; /*open system*/
137 		psec_priv->PrivacyAlgrthm = _NO_PRIVACY_;
138 		psec_priv->PrivacyKeyIndex = 0;
139 		psec_priv->XGrpPrivacy = _NO_PRIVACY_;
140 		psec_priv->XGrpKeyid = 1;
141 		psec_priv->ndisauthtype = Ndis802_11AuthModeOpen;
142 		psec_priv->ndisencryptstatus = Ndis802_11WEPDisabled;
143 		psec_priv->wps_phase = false;
144 	}
145 }
146 
147 void r8712_report_sec_ie(struct _adapter *adapter, u8 authmode, u8 *sec_ie)
148 {
149 	uint len;
150 	u8 *buff, *p, i;
151 	union iwreq_data wrqu;
152 
153 	buff = NULL;
154 	if (authmode == _WPA_IE_ID_) {
155 		buff = kzalloc(IW_CUSTOM_MAX, GFP_ATOMIC);
156 		if (!buff)
157 			return;
158 		p = buff;
159 		p += sprintf(p, "ASSOCINFO(ReqIEs=");
160 		len = sec_ie[1] + 2;
161 		len =  (len < IW_CUSTOM_MAX) ? len : IW_CUSTOM_MAX - 1;
162 		for (i = 0; i < len; i++)
163 			p += sprintf(p, "%02x", sec_ie[i]);
164 		p += sprintf(p, ")");
165 		memset(&wrqu, 0, sizeof(wrqu));
166 		wrqu.data.length = p - buff;
167 		wrqu.data.length = (wrqu.data.length < IW_CUSTOM_MAX) ?
168 				   wrqu.data.length : IW_CUSTOM_MAX;
169 		wireless_send_event(adapter->pnetdev, IWEVCUSTOM, &wrqu, buff);
170 		kfree(buff);
171 	}
172 }
173