1 /****************************************************************************** 2 * mlme_linux.c 3 * 4 * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved. 5 * Linux device driver for RTL8192SU 6 * 7 * This program is free software; you can redistribute it and/or modify it 8 * under the terms of version 2 of the GNU General Public License as 9 * published by the Free Software Foundation. 10 * 11 * This program is distributed in the hope that it will be useful, but WITHOUT 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for 14 * more details. 15 * 16 * You should have received a copy of the GNU General Public License along with 17 * this program; if not, write to the Free Software Foundation, Inc., 18 * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA 19 * 20 * Modifications for inclusion into the Linux staging tree are 21 * Copyright(c) 2010 Larry Finger. All rights reserved. 22 * 23 * Contact information: 24 * WLAN FAE <wlanfae@realtek.com>. 25 * Larry Finger <Larry.Finger@lwfinger.net> 26 * 27 ******************************************************************************/ 28 29 #define _MLME_OSDEP_C_ 30 31 #include "osdep_service.h" 32 #include "drv_types.h" 33 #include "mlme_osdep.h" 34 35 static void sitesurvey_ctrl_handler(unsigned long data) 36 { 37 struct _adapter *adapter = (struct _adapter *)data; 38 39 _r8712_sitesurvey_ctrl_handler(adapter); 40 mod_timer(&adapter->mlmepriv.sitesurveyctrl.sitesurvey_ctrl_timer, 41 jiffies + msecs_to_jiffies(3000)); 42 } 43 44 static void join_timeout_handler (unsigned long data) 45 { 46 struct _adapter *adapter = (struct _adapter *)data; 47 48 _r8712_join_timeout_handler(adapter); 49 } 50 51 static void _scan_timeout_handler (unsigned long data) 52 { 53 struct _adapter *adapter = (struct _adapter *)data; 54 55 r8712_scan_timeout_handler(adapter); 56 } 57 58 static void dhcp_timeout_handler (unsigned long data) 59 { 60 struct _adapter *adapter = (struct _adapter *)data; 61 62 _r8712_dhcp_timeout_handler(adapter); 63 } 64 65 static void wdg_timeout_handler (unsigned long data) 66 { 67 struct _adapter *adapter = (struct _adapter *)data; 68 69 _r8712_wdg_timeout_handler(adapter); 70 71 mod_timer(&adapter->mlmepriv.wdg_timer, 72 jiffies + msecs_to_jiffies(2000)); 73 } 74 75 void r8712_init_mlme_timer(struct _adapter *padapter) 76 { 77 struct mlme_priv *pmlmepriv = &padapter->mlmepriv; 78 79 setup_timer(&pmlmepriv->assoc_timer, join_timeout_handler, 80 (unsigned long)padapter); 81 setup_timer(&pmlmepriv->sitesurveyctrl.sitesurvey_ctrl_timer, 82 sitesurvey_ctrl_handler, 83 (unsigned long)padapter); 84 setup_timer(&pmlmepriv->scan_to_timer, _scan_timeout_handler, 85 (unsigned long)padapter); 86 setup_timer(&pmlmepriv->dhcp_timer, dhcp_timeout_handler, 87 (unsigned long)padapter); 88 setup_timer(&pmlmepriv->wdg_timer, wdg_timeout_handler, 89 (unsigned long)padapter); 90 } 91 92 void r8712_os_indicate_connect(struct _adapter *adapter) 93 { 94 r8712_indicate_wx_assoc_event(adapter); 95 netif_carrier_on(adapter->pnetdev); 96 } 97 98 static struct RT_PMKID_LIST backupPMKIDList[NUM_PMKID_CACHE]; 99 void r8712_os_indicate_disconnect(struct _adapter *adapter) 100 { 101 u8 backupPMKIDIndex = 0; 102 u8 backupTKIPCountermeasure = 0x00; 103 104 r8712_indicate_wx_disassoc_event(adapter); 105 netif_carrier_off(adapter->pnetdev); 106 if (adapter->securitypriv.AuthAlgrthm == 2) { /*/802.1x*/ 107 /* We have to backup the PMK information for WiFi PMK Caching 108 * test item. Backup the btkip_countermeasure information. 109 * When the countermeasure is trigger, the driver have to 110 * disconnect with AP for 60 seconds. 111 */ 112 113 memcpy(&backupPMKIDList[0], &adapter->securitypriv. 114 PMKIDList[0], sizeof(struct RT_PMKID_LIST) * 115 NUM_PMKID_CACHE); 116 backupPMKIDIndex = adapter->securitypriv.PMKIDIndex; 117 backupTKIPCountermeasure = adapter->securitypriv. 118 btkip_countermeasure; 119 memset((unsigned char *)&adapter->securitypriv, 0, 120 sizeof(struct security_priv)); 121 setup_timer(&adapter->securitypriv.tkip_timer, 122 r8712_use_tkipkey_handler, 123 (unsigned long)adapter); 124 /* Restore the PMK information to securitypriv structure 125 * for the following connection. 126 */ 127 memcpy(&adapter->securitypriv.PMKIDList[0], 128 &backupPMKIDList[0], 129 sizeof(struct RT_PMKID_LIST) * NUM_PMKID_CACHE); 130 adapter->securitypriv.PMKIDIndex = backupPMKIDIndex; 131 adapter->securitypriv.btkip_countermeasure = 132 backupTKIPCountermeasure; 133 } else { /*reset values in securitypriv*/ 134 struct security_priv *psec_priv = &adapter->securitypriv; 135 136 psec_priv->AuthAlgrthm = 0; /*open system*/ 137 psec_priv->PrivacyAlgrthm = _NO_PRIVACY_; 138 psec_priv->PrivacyKeyIndex = 0; 139 psec_priv->XGrpPrivacy = _NO_PRIVACY_; 140 psec_priv->XGrpKeyid = 1; 141 psec_priv->ndisauthtype = Ndis802_11AuthModeOpen; 142 psec_priv->ndisencryptstatus = Ndis802_11WEPDisabled; 143 psec_priv->wps_phase = false; 144 } 145 } 146 147 void r8712_report_sec_ie(struct _adapter *adapter, u8 authmode, u8 *sec_ie) 148 { 149 uint len; 150 u8 *buff, *p, i; 151 union iwreq_data wrqu; 152 153 buff = NULL; 154 if (authmode == _WPA_IE_ID_) { 155 buff = kzalloc(IW_CUSTOM_MAX, GFP_ATOMIC); 156 if (!buff) 157 return; 158 p = buff; 159 p += sprintf(p, "ASSOCINFO(ReqIEs="); 160 len = sec_ie[1] + 2; 161 len = (len < IW_CUSTOM_MAX) ? len : IW_CUSTOM_MAX - 1; 162 for (i = 0; i < len; i++) 163 p += sprintf(p, "%02x", sec_ie[i]); 164 p += sprintf(p, ")"); 165 memset(&wrqu, 0, sizeof(wrqu)); 166 wrqu.data.length = p - buff; 167 wrqu.data.length = (wrqu.data.length < IW_CUSTOM_MAX) ? 168 wrqu.data.length : IW_CUSTOM_MAX; 169 wireless_send_event(adapter->pnetdev, IWEVCUSTOM, &wrqu, buff); 170 kfree(buff); 171 } 172 } 173