| /****************************************************************************** |
| * |
| * Copyright(c) 2007 - 2011 Realtek Corporation. All rights reserved. |
| * |
| * This program is free software; you can redistribute it and/or modify it |
| * under the terms of version 2 of the GNU General Public License as |
| * published by the Free Software Foundation. |
| * |
| * This program is distributed in the hope that it will be useful, but WITHOUT |
| * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
| * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for |
| * more details. |
| * |
| ******************************************************************************/ |
| |
| #define _MLME_OSDEP_C_ |
| |
| #include <osdep_service.h> |
| #include <drv_types.h> |
| #include <mlme_osdep.h> |
| #include <rtw_ioctl_set.h> |
| |
| void rtw_os_indicate_connect23a(struct rtw_adapter *adapter) |
| { |
| rtw_cfg80211_indicate_connect(adapter); |
| |
| netif_carrier_on(adapter->pnetdev); |
| |
| if (adapter->pid[2] != 0) |
| rtw_signal_process(adapter->pid[2], SIGALRM); |
| } |
| |
| void rtw_os_indicate_scan_done23a(struct rtw_adapter *padapter, bool aborted) |
| { |
| rtw_cfg80211_indicate_scan_done(wdev_to_priv(padapter->rtw_wdev), |
| aborted); |
| } |
| |
| static struct rt_pmkid_list backupPMKIDList[NUM_PMKID_CACHE]; |
| |
| void rtw_reset_securitypriv23a(struct rtw_adapter *adapter) |
| { |
| u8 backupPMKIDIndex = 0; |
| u8 backupTKIPCountermeasure = 0x00; |
| unsigned long backupTKIPcountermeasure_time = 0; |
| |
| if (adapter->securitypriv.dot11AuthAlgrthm == |
| dot11AuthAlgrthm_8021X) { /* 802.1x */ |
| /* We have to backup the PMK information for WiFi PMK |
| * Caching test item. |
| * Backup the btkip_countermeasure information. |
| * When the countermeasure is trigger, the driver have to |
| * disconnect with AP for 60 seconds. |
| */ |
| memset(&backupPMKIDList[0], 0x00, sizeof(struct rt_pmkid_list) * |
| NUM_PMKID_CACHE); |
| |
| memcpy(&backupPMKIDList[0], &adapter->securitypriv.PMKIDList[0], |
| sizeof(struct rt_pmkid_list) * NUM_PMKID_CACHE); |
| backupPMKIDIndex = adapter->securitypriv.PMKIDIndex; |
| backupTKIPCountermeasure = adapter->securitypriv.btkip_countermeasure; |
| backupTKIPcountermeasure_time = adapter->securitypriv.btkip_countermeasure_time; |
| |
| memset((unsigned char *)&adapter->securitypriv, 0, |
| sizeof (struct security_priv)); |
| /* Restore the PMK information to securitypriv structure |
| * for the following connection. |
| */ |
| memcpy(&adapter->securitypriv.PMKIDList[0], &backupPMKIDList[0], |
| sizeof(struct rt_pmkid_list) * NUM_PMKID_CACHE); |
| adapter->securitypriv.PMKIDIndex = backupPMKIDIndex; |
| adapter->securitypriv.btkip_countermeasure = backupTKIPCountermeasure; |
| adapter->securitypriv.btkip_countermeasure_time = backupTKIPcountermeasure_time; |
| |
| adapter->securitypriv.ndisauthtype = Ndis802_11AuthModeOpen; |
| adapter->securitypriv.ndisencryptstatus = Ndis802_11WEPDisabled; |
| } else { /* reset values in securitypriv */ |
| struct security_priv *psec_priv = &adapter->securitypriv; |
| |
| /* open system */ |
| psec_priv->dot11AuthAlgrthm = dot11AuthAlgrthm_Open; |
| psec_priv->dot11PrivacyAlgrthm = _NO_PRIVACY_; |
| psec_priv->dot11PrivacyKeyIndex = 0; |
| |
| psec_priv->dot118021XGrpPrivacy = _NO_PRIVACY_; |
| psec_priv->dot118021XGrpKeyid = 1; |
| |
| psec_priv->ndisauthtype = Ndis802_11AuthModeOpen; |
| psec_priv->ndisencryptstatus = Ndis802_11WEPDisabled; |
| } |
| } |
| |
| void rtw_os_indicate_disconnect23a(struct rtw_adapter *adapter) |
| { |
| /* Do it first for tx broadcast pkt after disconnection issue! */ |
| netif_carrier_off(adapter->pnetdev); |
| |
| rtw_cfg80211_indicate_disconnect(adapter); |
| |
| rtw_reset_securitypriv23a(adapter); |
| } |
| |
| void rtw_report_sec_ie23a(struct rtw_adapter *adapter, u8 authmode, u8 *sec_ie) |
| { |
| uint len; |
| u8 *buff, *p, i; |
| union iwreq_data wrqu; |
| |
| RT_TRACE(_module_mlme_osdep_c_, _drv_info_, |
| ("+rtw_report_sec_ie23a, authmode =%d\n", authmode)); |
| |
| buff = NULL; |
| if (authmode == _WPA_IE_ID_) { |
| RT_TRACE(_module_mlme_osdep_c_, _drv_info_, |
| ("rtw_report_sec_ie23a, authmode =%d\n", authmode)); |
| |
| buff = kzalloc(IW_CUSTOM_MAX, GFP_KERNEL); |
| if (!buff) |
| return; |
| p = buff; |
| |
| p += sprintf(p, "ASSOCINFO(ReqIEs ="); |
| |
| len = sec_ie[1]+2; |
| len = (len < IW_CUSTOM_MAX) ? len : IW_CUSTOM_MAX; |
| |
| for (i = 0; i < len; i++) |
| p += sprintf(p, "%02x", sec_ie[i]); |
| |
| p += sprintf(p, ")"); |
| |
| memset(&wrqu, 0, sizeof(wrqu)); |
| |
| wrqu.data.length = p-buff; |
| |
| wrqu.data.length = (wrqu.data.length < IW_CUSTOM_MAX) ? |
| wrqu.data.length : IW_CUSTOM_MAX; |
| |
| kfree(buff); |
| } |
| } |
| |
| #ifdef CONFIG_8723AU_AP_MODE |
| void rtw_indicate_sta_assoc_event23a(struct rtw_adapter *padapter, |
| struct sta_info *psta) |
| { |
| struct sta_priv *pstapriv = &padapter->stapriv; |
| union iwreq_data wrqu; |
| |
| if (psta == NULL) |
| return; |
| |
| if (psta->aid > NUM_STA) |
| return; |
| |
| if (pstapriv->sta_aid[psta->aid - 1] != psta) |
| return; |
| |
| wrqu.addr.sa_family = ARPHRD_ETHER; |
| |
| memcpy(wrqu.addr.sa_data, psta->hwaddr, ETH_ALEN); |
| |
| DBG_8723A("+rtw_indicate_sta_assoc_event23a\n"); |
| } |
| |
| void rtw_indicate_sta_disassoc_event23a(struct rtw_adapter *padapter, |
| struct sta_info *psta) |
| { |
| struct sta_priv *pstapriv = &padapter->stapriv; |
| union iwreq_data wrqu; |
| |
| if (psta == NULL) |
| return; |
| |
| if (psta->aid > NUM_STA) |
| return; |
| |
| if (pstapriv->sta_aid[psta->aid - 1] != psta) |
| return; |
| |
| wrqu.addr.sa_family = ARPHRD_ETHER; |
| |
| memcpy(wrqu.addr.sa_data, psta->hwaddr, ETH_ALEN); |
| |
| DBG_8723A("+rtw_indicate_sta_disassoc_event23a\n"); |
| } |
| #endif |