2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2002 Intersil Americas Inc.
|
|
|
|
* (C) 2003,2004 Aurelien Alleaume <slts@free.fr>
|
|
|
|
* (C) 2003 Herbert Valerio Riedel <hvr@gnu.org>
|
|
|
|
* (C) 2003 Luis R. Rodriguez <mcgrof@ruslug.rutgers.edu>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2009-10-07 21:09:06 +08:00
|
|
|
#include <linux/capability.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/if_arp.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 16:04:11 +08:00
|
|
|
#include <linux/slab.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/pci.h>
|
|
|
|
|
|
|
|
#include <asm/uaccess.h>
|
|
|
|
|
|
|
|
#include "prismcompat.h"
|
|
|
|
#include "isl_ioctl.h"
|
|
|
|
#include "islpci_mgt.h"
|
|
|
|
#include "isl_oid.h" /* additional types and defs for isl38xx fw */
|
|
|
|
#include "oid_mgt.h"
|
|
|
|
|
|
|
|
#include <net/iw_handler.h> /* New driver API */
|
|
|
|
|
2006-07-18 09:21:47 +08:00
|
|
|
#define KEY_SIZE_WEP104 13 /* 104/128-bit WEP keys */
|
|
|
|
#define KEY_SIZE_WEP40 5 /* 40/64-bit WEP keys */
|
|
|
|
/* KEY_SIZE_TKIP should match isl_oid.h, struct obj_key.key[] size */
|
|
|
|
#define KEY_SIZE_TKIP 32 /* TKIP keys */
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-07-18 09:21:47 +08:00
|
|
|
static void prism54_wpa_bss_ie_add(islpci_private *priv, u8 *bssid,
|
2005-04-17 06:20:36 +08:00
|
|
|
u8 *wpa_ie, size_t wpa_ie_len);
|
2006-07-18 09:21:47 +08:00
|
|
|
static size_t prism54_wpa_bss_ie_get(islpci_private *priv, u8 *bssid, u8 *wpa_ie);
|
2005-04-17 06:20:36 +08:00
|
|
|
static int prism54_set_wpa(struct net_device *, struct iw_request_info *,
|
|
|
|
__u32 *, char *);
|
|
|
|
|
2006-08-30 09:19:23 +08:00
|
|
|
/* In 500 kbps */
|
|
|
|
static const unsigned char scan_rate_list[] = { 2, 4, 11, 22,
|
|
|
|
12, 18, 24, 36,
|
|
|
|
48, 72, 96, 108 };
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* prism54_mib_mode_helper - MIB change mode helper function
|
|
|
|
* @mib: the &struct islpci_mib object to modify
|
|
|
|
* @iw_mode: new mode (%IW_MODE_*)
|
2006-10-08 12:38:15 +08:00
|
|
|
*
|
2005-04-17 06:20:36 +08:00
|
|
|
* This is a helper function, hence it does not lock. Make sure
|
2006-10-08 12:38:15 +08:00
|
|
|
* caller deals with locking *if* necessary. This function sets the
|
|
|
|
* mode-dependent mib values and does the mapping of the Linux
|
|
|
|
* Wireless API modes to Device firmware modes. It also checks for
|
|
|
|
* correct valid Linux wireless modes.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
|
|
|
static int
|
|
|
|
prism54_mib_mode_helper(islpci_private *priv, u32 iw_mode)
|
|
|
|
{
|
|
|
|
u32 config = INL_CONFIG_MANUALRUN;
|
|
|
|
u32 mode, bsstype;
|
|
|
|
|
|
|
|
/* For now, just catch early the Repeater and Secondary modes here */
|
|
|
|
if (iw_mode == IW_MODE_REPEAT || iw_mode == IW_MODE_SECOND) {
|
|
|
|
printk(KERN_DEBUG
|
|
|
|
"%s(): Sorry, Repeater mode and Secondary mode "
|
2008-07-29 14:01:34 +08:00
|
|
|
"are not yet supported by this driver.\n", __func__);
|
2005-04-17 06:20:36 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
priv->iw_mode = iw_mode;
|
|
|
|
|
|
|
|
switch (iw_mode) {
|
|
|
|
case IW_MODE_AUTO:
|
|
|
|
mode = INL_MODE_CLIENT;
|
|
|
|
bsstype = DOT11_BSSTYPE_ANY;
|
|
|
|
break;
|
|
|
|
case IW_MODE_ADHOC:
|
|
|
|
mode = INL_MODE_CLIENT;
|
|
|
|
bsstype = DOT11_BSSTYPE_IBSS;
|
|
|
|
break;
|
|
|
|
case IW_MODE_INFRA:
|
|
|
|
mode = INL_MODE_CLIENT;
|
|
|
|
bsstype = DOT11_BSSTYPE_INFRA;
|
|
|
|
break;
|
|
|
|
case IW_MODE_MASTER:
|
|
|
|
mode = INL_MODE_AP;
|
|
|
|
bsstype = DOT11_BSSTYPE_INFRA;
|
|
|
|
break;
|
|
|
|
case IW_MODE_MONITOR:
|
|
|
|
mode = INL_MODE_PROMISCUOUS;
|
|
|
|
bsstype = DOT11_BSSTYPE_ANY;
|
|
|
|
config |= INL_CONFIG_RXANNEX;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (init_wds)
|
|
|
|
config |= INL_CONFIG_WDS;
|
|
|
|
mgt_set(priv, DOT11_OID_BSSTYPE, &bsstype);
|
|
|
|
mgt_set(priv, OID_INL_CONFIG, &config);
|
|
|
|
mgt_set(priv, OID_INL_MODE, &mode);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* prism54_mib_init - fill MIB cache with defaults
|
|
|
|
*
|
|
|
|
* this function initializes the struct given as @mib with defaults,
|
|
|
|
* of which many are retrieved from the global module parameter
|
2006-10-08 12:38:15 +08:00
|
|
|
* variables.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
prism54_mib_init(islpci_private *priv)
|
|
|
|
{
|
|
|
|
u32 channel, authen, wep, filter, dot1x, mlme, conformance, power, mode;
|
|
|
|
struct obj_buffer psm_buffer = {
|
|
|
|
.size = PSM_BUFFER_SIZE,
|
|
|
|
.addr = priv->device_psm_buffer
|
|
|
|
};
|
|
|
|
|
|
|
|
channel = CARD_DEFAULT_CHANNEL;
|
|
|
|
authen = CARD_DEFAULT_AUTHEN;
|
|
|
|
wep = CARD_DEFAULT_WEP;
|
|
|
|
filter = CARD_DEFAULT_FILTER; /* (0) Do not filter un-encrypted data */
|
2006-10-08 12:38:15 +08:00
|
|
|
dot1x = CARD_DEFAULT_DOT1X;
|
2005-04-17 06:20:36 +08:00
|
|
|
mlme = CARD_DEFAULT_MLME_MODE;
|
|
|
|
conformance = CARD_DEFAULT_CONFORMANCE;
|
|
|
|
power = 127;
|
|
|
|
mode = CARD_DEFAULT_IW_MODE;
|
|
|
|
|
|
|
|
mgt_set(priv, DOT11_OID_CHANNEL, &channel);
|
|
|
|
mgt_set(priv, DOT11_OID_AUTHENABLE, &authen);
|
|
|
|
mgt_set(priv, DOT11_OID_PRIVACYINVOKED, &wep);
|
|
|
|
mgt_set(priv, DOT11_OID_PSMBUFFER, &psm_buffer);
|
|
|
|
mgt_set(priv, DOT11_OID_EXUNENCRYPTED, &filter);
|
|
|
|
mgt_set(priv, DOT11_OID_DOT1XENABLE, &dot1x);
|
|
|
|
mgt_set(priv, DOT11_OID_MLMEAUTOLEVEL, &mlme);
|
|
|
|
mgt_set(priv, OID_INL_DOT11D_CONFORMANCE, &conformance);
|
|
|
|
mgt_set(priv, OID_INL_OUTPUTPOWER, &power);
|
|
|
|
|
|
|
|
/* This sets all of the mode-dependent values */
|
|
|
|
prism54_mib_mode_helper(priv, mode);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* this will be executed outside of atomic context thanks to
|
|
|
|
* schedule_work(), thus we can as well use sleeping semaphore
|
|
|
|
* locking */
|
|
|
|
void
|
2006-11-22 22:57:56 +08:00
|
|
|
prism54_update_stats(struct work_struct *work)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2006-11-22 22:57:56 +08:00
|
|
|
islpci_private *priv = container_of(work, islpci_private, stats_work);
|
2005-04-17 06:20:36 +08:00
|
|
|
char *data;
|
|
|
|
int j;
|
|
|
|
struct obj_bss bss, *bss2;
|
|
|
|
union oid_res_t r;
|
|
|
|
|
2008-02-16 03:56:59 +08:00
|
|
|
mutex_lock(&priv->stats_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* Noise floor.
|
|
|
|
* I'm not sure if the unit is dBm.
|
|
|
|
* Note : If we are not connected, this value seems to be irrelevant. */
|
|
|
|
|
|
|
|
mgt_get_request(priv, DOT11_OID_NOISEFLOOR, 0, NULL, &r);
|
|
|
|
priv->local_iwstatistics.qual.noise = r.u;
|
|
|
|
|
|
|
|
/* Get the rssi of the link. To do this we need to retrieve a bss. */
|
|
|
|
|
|
|
|
/* First get the MAC address of the AP we are associated with. */
|
|
|
|
mgt_get_request(priv, DOT11_OID_BSSID, 0, NULL, &r);
|
|
|
|
data = r.ptr;
|
|
|
|
|
|
|
|
/* copy this MAC to the bss */
|
|
|
|
memcpy(bss.address, data, 6);
|
|
|
|
kfree(data);
|
|
|
|
|
|
|
|
/* now ask for the corresponding bss */
|
|
|
|
j = mgt_get_request(priv, DOT11_OID_BSSFIND, 0, (void *) &bss, &r);
|
|
|
|
bss2 = r.ptr;
|
|
|
|
/* report the rssi and use it to calculate
|
|
|
|
* link quality through a signal-noise
|
|
|
|
* ratio */
|
|
|
|
priv->local_iwstatistics.qual.level = bss2->rssi;
|
|
|
|
priv->local_iwstatistics.qual.qual =
|
|
|
|
bss2->rssi - priv->iwstatistics.qual.noise;
|
|
|
|
|
|
|
|
kfree(bss2);
|
|
|
|
|
|
|
|
/* report that the stats are new */
|
|
|
|
priv->local_iwstatistics.qual.updated = 0x7;
|
|
|
|
|
|
|
|
/* Rx : unable to decrypt the MPDU */
|
|
|
|
mgt_get_request(priv, DOT11_OID_PRIVRXFAILED, 0, NULL, &r);
|
|
|
|
priv->local_iwstatistics.discard.code = r.u;
|
|
|
|
|
|
|
|
/* Tx : Max MAC retries num reached */
|
|
|
|
mgt_get_request(priv, DOT11_OID_MPDUTXFAILED, 0, NULL, &r);
|
|
|
|
priv->local_iwstatistics.discard.retries = r.u;
|
|
|
|
|
2008-02-16 03:56:59 +08:00
|
|
|
mutex_unlock(&priv->stats_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
struct iw_statistics *
|
|
|
|
prism54_get_wireless_stats(struct net_device *ndev)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
|
|
|
|
/* If the stats are being updated return old data */
|
2008-03-27 03:21:33 +08:00
|
|
|
if (mutex_trylock(&priv->stats_lock)) {
|
2005-04-17 06:20:36 +08:00
|
|
|
memcpy(&priv->iwstatistics, &priv->local_iwstatistics,
|
|
|
|
sizeof (struct iw_statistics));
|
|
|
|
/* They won't be marked updated for the next time */
|
|
|
|
priv->local_iwstatistics.qual.updated = 0;
|
2008-02-16 03:56:59 +08:00
|
|
|
mutex_unlock(&priv->stats_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
} else
|
|
|
|
priv->iwstatistics.qual.updated = 0;
|
|
|
|
|
2006-10-08 12:38:15 +08:00
|
|
|
/* Update our wireless stats, but do not schedule to often
|
2005-04-17 06:20:36 +08:00
|
|
|
* (max 1 HZ) */
|
|
|
|
if ((priv->stats_timestamp == 0) ||
|
|
|
|
time_after(jiffies, priv->stats_timestamp + 1 * HZ)) {
|
|
|
|
schedule_work(&priv->stats_work);
|
|
|
|
priv->stats_timestamp = jiffies;
|
|
|
|
}
|
|
|
|
|
|
|
|
return &priv->iwstatistics;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_commit(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
char *cwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
|
|
|
|
/* simply re-set the last set SSID, this should commit most stuff */
|
|
|
|
|
|
|
|
/* Commit in Monitor mode is not necessary, also setting essid
|
|
|
|
* in Monitor mode does not make sense and isn't allowed for this
|
|
|
|
* device's firmware */
|
|
|
|
if (priv->iw_mode != IW_MODE_MONITOR)
|
|
|
|
return mgt_set_request(priv, DOT11_OID_SSID, 0, NULL);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_name(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
char *cwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
char *capabilities;
|
|
|
|
union oid_res_t r;
|
|
|
|
int rvalue;
|
|
|
|
|
|
|
|
if (islpci_get_state(priv) < PRV_STATE_INIT) {
|
|
|
|
strncpy(cwrq, "NOT READY!", IFNAMSIZ);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
rvalue = mgt_get_request(priv, OID_INL_PHYCAPABILITIES, 0, NULL, &r);
|
|
|
|
|
|
|
|
switch (r.u) {
|
|
|
|
case INL_PHYCAP_5000MHZ:
|
|
|
|
capabilities = "IEEE 802.11a/b/g";
|
|
|
|
break;
|
|
|
|
case INL_PHYCAP_FAA:
|
|
|
|
capabilities = "IEEE 802.11b/g - FAA Support";
|
|
|
|
break;
|
|
|
|
case INL_PHYCAP_2400MHZ:
|
|
|
|
default:
|
|
|
|
capabilities = "IEEE 802.11b/g"; /* Default */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
strncpy(cwrq, capabilities, IFNAMSIZ);
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_freq(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_freq *fwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
int rvalue;
|
|
|
|
u32 c;
|
|
|
|
|
|
|
|
if (fwrq->m < 1000)
|
|
|
|
/* we have a channel number */
|
|
|
|
c = fwrq->m;
|
|
|
|
else
|
|
|
|
c = (fwrq->e == 1) ? channel_of_freq(fwrq->m / 100000) : 0;
|
|
|
|
|
|
|
|
rvalue = c ? mgt_set_request(priv, DOT11_OID_CHANNEL, 0, &c) : -EINVAL;
|
|
|
|
|
|
|
|
/* Call commit handler */
|
|
|
|
return (rvalue ? rvalue : -EINPROGRESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_freq(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_freq *fwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
union oid_res_t r;
|
|
|
|
int rvalue;
|
|
|
|
|
|
|
|
rvalue = mgt_get_request(priv, DOT11_OID_CHANNEL, 0, NULL, &r);
|
|
|
|
fwrq->i = r.u;
|
|
|
|
rvalue |= mgt_get_request(priv, DOT11_OID_FREQUENCY, 0, NULL, &r);
|
|
|
|
fwrq->m = r.u;
|
|
|
|
fwrq->e = 3;
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_mode(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
__u32 * uwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
u32 mlmeautolevel = CARD_DEFAULT_MLME_MODE;
|
|
|
|
|
|
|
|
/* Let's see if the user passed a valid Linux Wireless mode */
|
|
|
|
if (*uwrq > IW_MODE_MONITOR || *uwrq < IW_MODE_AUTO) {
|
|
|
|
printk(KERN_DEBUG
|
|
|
|
"%s: %s() You passed a non-valid init_mode.\n",
|
2008-07-29 14:01:34 +08:00
|
|
|
priv->ndev->name, __func__);
|
2005-04-17 06:20:36 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
down_write(&priv->mib_sem);
|
|
|
|
|
|
|
|
if (prism54_mib_mode_helper(priv, *uwrq)) {
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* the ACL code needs an intermediate mlmeautolevel. The wpa stuff an
|
|
|
|
* extended one.
|
|
|
|
*/
|
|
|
|
if ((*uwrq == IW_MODE_MASTER) && (priv->acl.policy != MAC_POLICY_OPEN))
|
|
|
|
mlmeautolevel = DOT11_MLME_INTERMEDIATE;
|
|
|
|
if (priv->wpa)
|
|
|
|
mlmeautolevel = DOT11_MLME_EXTENDED;
|
|
|
|
|
|
|
|
mgt_set(priv, DOT11_OID_MLMEAUTOLEVEL, &mlmeautolevel);
|
|
|
|
|
|
|
|
if (mgt_commit(priv)) {
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
priv->ndev->type = (priv->iw_mode == IW_MODE_MONITOR)
|
|
|
|
? priv->monitor_type : ARPHRD_ETHER;
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Use mib cache */
|
|
|
|
static int
|
|
|
|
prism54_get_mode(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
__u32 * uwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
|
|
|
|
BUG_ON((priv->iw_mode < IW_MODE_AUTO) || (priv->iw_mode >
|
|
|
|
IW_MODE_MONITOR));
|
|
|
|
*uwrq = priv->iw_mode;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* we use DOT11_OID_EDTHRESHOLD. From what I guess the card will not try to
|
|
|
|
* emit data if (sensitivity > rssi - noise) (in dBm).
|
|
|
|
* prism54_set_sens does not seem to work.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_sens(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
u32 sens;
|
|
|
|
|
|
|
|
/* by default the card sets this to 20. */
|
|
|
|
sens = vwrq->disabled ? 20 : vwrq->value;
|
|
|
|
|
|
|
|
return mgt_set_request(priv, DOT11_OID_EDTHRESHOLD, 0, &sens);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_sens(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
union oid_res_t r;
|
|
|
|
int rvalue;
|
|
|
|
|
|
|
|
rvalue = mgt_get_request(priv, DOT11_OID_EDTHRESHOLD, 0, NULL, &r);
|
|
|
|
|
|
|
|
vwrq->value = r.u;
|
|
|
|
vwrq->disabled = (vwrq->value == 0);
|
|
|
|
vwrq->fixed = 1;
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_range(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
struct iw_range *range = (struct iw_range *) extra;
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
u8 *data;
|
|
|
|
int i, m, rvalue;
|
|
|
|
struct obj_frequencies *freq;
|
|
|
|
union oid_res_t r;
|
|
|
|
|
|
|
|
memset(range, 0, sizeof (struct iw_range));
|
|
|
|
dwrq->length = sizeof (struct iw_range);
|
|
|
|
|
|
|
|
/* set the wireless extension version number */
|
|
|
|
range->we_version_source = SUPPORTED_WIRELESS_EXT;
|
|
|
|
range->we_version_compiled = WIRELESS_EXT;
|
|
|
|
|
|
|
|
/* Now the encoding capabilities */
|
|
|
|
range->num_encoding_sizes = 3;
|
|
|
|
/* 64(40) bits WEP */
|
|
|
|
range->encoding_size[0] = 5;
|
|
|
|
/* 128(104) bits WEP */
|
|
|
|
range->encoding_size[1] = 13;
|
|
|
|
/* 256 bits for WPA-PSK */
|
|
|
|
range->encoding_size[2] = 32;
|
|
|
|
/* 4 keys are allowed */
|
|
|
|
range->max_encoding_tokens = 4;
|
|
|
|
|
|
|
|
/* we don't know the quality range... */
|
|
|
|
range->max_qual.level = 0;
|
|
|
|
range->max_qual.noise = 0;
|
|
|
|
range->max_qual.qual = 0;
|
|
|
|
/* these value describe an average quality. Needs more tweaking... */
|
|
|
|
range->avg_qual.level = -80; /* -80 dBm */
|
|
|
|
range->avg_qual.noise = 0; /* don't know what to put here */
|
|
|
|
range->avg_qual.qual = 0;
|
|
|
|
|
|
|
|
range->sensitivity = 200;
|
|
|
|
|
|
|
|
/* retry limit capabilities */
|
|
|
|
range->retry_capa = IW_RETRY_LIMIT | IW_RETRY_LIFETIME;
|
|
|
|
range->retry_flags = IW_RETRY_LIMIT;
|
|
|
|
range->r_time_flags = IW_RETRY_LIFETIME;
|
|
|
|
|
|
|
|
/* I don't know the range. Put stupid things here */
|
|
|
|
range->min_retry = 1;
|
|
|
|
range->max_retry = 65535;
|
|
|
|
range->min_r_time = 1024;
|
|
|
|
range->max_r_time = 65535 * 1024;
|
|
|
|
|
|
|
|
/* txpower is supported in dBm's */
|
|
|
|
range->txpower_capa = IW_TXPOW_DBM;
|
|
|
|
|
|
|
|
/* Event capability (kernel + driver) */
|
|
|
|
range->event_capa[0] = (IW_EVENT_CAPA_K_0 |
|
|
|
|
IW_EVENT_CAPA_MASK(SIOCGIWTHRSPY) |
|
|
|
|
IW_EVENT_CAPA_MASK(SIOCGIWAP));
|
|
|
|
range->event_capa[1] = IW_EVENT_CAPA_K_1;
|
|
|
|
range->event_capa[4] = IW_EVENT_CAPA_MASK(IWEVCUSTOM);
|
|
|
|
|
2006-07-18 09:21:47 +08:00
|
|
|
range->enc_capa = IW_ENC_CAPA_WPA | IW_ENC_CAPA_WPA2 |
|
|
|
|
IW_ENC_CAPA_CIPHER_TKIP;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
if (islpci_get_state(priv) < PRV_STATE_INIT)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Request the device for the supported frequencies
|
|
|
|
* not really relevant since some devices will report the 5 GHz band
|
|
|
|
* frequencies even if they don't support them.
|
|
|
|
*/
|
|
|
|
rvalue =
|
|
|
|
mgt_get_request(priv, DOT11_OID_SUPPORTEDFREQUENCIES, 0, NULL, &r);
|
|
|
|
freq = r.ptr;
|
|
|
|
|
|
|
|
range->num_channels = freq->nr;
|
|
|
|
range->num_frequency = freq->nr;
|
|
|
|
|
|
|
|
m = min(IW_MAX_FREQUENCIES, (int) freq->nr);
|
|
|
|
for (i = 0; i < m; i++) {
|
|
|
|
range->freq[i].m = freq->mhz[i];
|
|
|
|
range->freq[i].e = 6;
|
|
|
|
range->freq[i].i = channel_of_freq(freq->mhz[i]);
|
|
|
|
}
|
|
|
|
kfree(freq);
|
|
|
|
|
|
|
|
rvalue |= mgt_get_request(priv, DOT11_OID_SUPPORTEDRATES, 0, NULL, &r);
|
|
|
|
data = r.ptr;
|
|
|
|
|
|
|
|
/* We got an array of char. It is NULL terminated. */
|
|
|
|
i = 0;
|
|
|
|
while ((i < IW_MAX_BITRATES) && (*data != 0)) {
|
|
|
|
/* the result must be in bps. The card gives us 500Kbps */
|
|
|
|
range->bitrate[i] = *data * 500000;
|
|
|
|
i++;
|
|
|
|
data++;
|
|
|
|
}
|
|
|
|
range->num_bitrates = i;
|
|
|
|
kfree(r.ptr);
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set AP address*/
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_wap(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct sockaddr *awrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
char bssid[6];
|
|
|
|
int rvalue;
|
|
|
|
|
|
|
|
if (awrq->sa_family != ARPHRD_ETHER)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/* prepare the structure for the set object */
|
|
|
|
memcpy(&bssid[0], awrq->sa_data, 6);
|
|
|
|
|
|
|
|
/* set the bssid -- does this make sense when in AP mode? */
|
|
|
|
rvalue = mgt_set_request(priv, DOT11_OID_BSSID, 0, &bssid);
|
|
|
|
|
|
|
|
return (rvalue ? rvalue : -EINPROGRESS); /* Call commit handler */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* get AP address*/
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_wap(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct sockaddr *awrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
union oid_res_t r;
|
|
|
|
int rvalue;
|
|
|
|
|
|
|
|
rvalue = mgt_get_request(priv, DOT11_OID_BSSID, 0, NULL, &r);
|
|
|
|
memcpy(awrq->sa_data, r.ptr, 6);
|
|
|
|
awrq->sa_family = ARPHRD_ETHER;
|
|
|
|
kfree(r.ptr);
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_scan(struct net_device *dev, struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
/* hehe the device does this automagicaly */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* a little helper that will translate our data into a card independent
|
|
|
|
* format that the Wireless Tools will understand. This was inspired by
|
|
|
|
* the "Aironet driver for 4500 and 4800 series cards" (GPL)
|
|
|
|
*/
|
|
|
|
|
|
|
|
static char *
|
2008-06-17 09:50:49 +08:00
|
|
|
prism54_translate_bss(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
char *current_ev, char *end_buf, struct obj_bss *bss,
|
|
|
|
char noise)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct iw_event iwe; /* Temporary buffer */
|
|
|
|
short cap;
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
2006-07-18 09:21:47 +08:00
|
|
|
u8 wpa_ie[MAX_WPA_IE_LEN];
|
|
|
|
size_t wpa_ie_len;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* The first entry must be the MAC address */
|
|
|
|
memcpy(iwe.u.ap_addr.sa_data, bss->address, 6);
|
|
|
|
iwe.u.ap_addr.sa_family = ARPHRD_ETHER;
|
|
|
|
iwe.cmd = SIOCGIWAP;
|
2008-06-17 09:50:49 +08:00
|
|
|
current_ev = iwe_stream_add_event(info, current_ev, end_buf,
|
|
|
|
&iwe, IW_EV_ADDR_LEN);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* The following entries will be displayed in the same order we give them */
|
|
|
|
|
|
|
|
/* The ESSID. */
|
|
|
|
iwe.u.data.length = bss->ssid.length;
|
|
|
|
iwe.u.data.flags = 1;
|
|
|
|
iwe.cmd = SIOCGIWESSID;
|
2008-06-17 09:50:49 +08:00
|
|
|
current_ev = iwe_stream_add_point(info, current_ev, end_buf,
|
2005-04-17 06:20:36 +08:00
|
|
|
&iwe, bss->ssid.octets);
|
|
|
|
|
|
|
|
/* Capabilities */
|
|
|
|
#define CAP_ESS 0x01
|
|
|
|
#define CAP_IBSS 0x02
|
|
|
|
#define CAP_CRYPT 0x10
|
|
|
|
|
|
|
|
/* Mode */
|
|
|
|
cap = bss->capinfo;
|
|
|
|
iwe.u.mode = 0;
|
|
|
|
if (cap & CAP_ESS)
|
|
|
|
iwe.u.mode = IW_MODE_MASTER;
|
|
|
|
else if (cap & CAP_IBSS)
|
|
|
|
iwe.u.mode = IW_MODE_ADHOC;
|
|
|
|
iwe.cmd = SIOCGIWMODE;
|
|
|
|
if (iwe.u.mode)
|
2008-06-17 09:50:49 +08:00
|
|
|
current_ev = iwe_stream_add_event(info, current_ev, end_buf,
|
|
|
|
&iwe, IW_EV_UINT_LEN);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* Encryption capability */
|
|
|
|
if (cap & CAP_CRYPT)
|
|
|
|
iwe.u.data.flags = IW_ENCODE_ENABLED | IW_ENCODE_NOKEY;
|
|
|
|
else
|
|
|
|
iwe.u.data.flags = IW_ENCODE_DISABLED;
|
|
|
|
iwe.u.data.length = 0;
|
|
|
|
iwe.cmd = SIOCGIWENCODE;
|
2008-06-17 09:50:49 +08:00
|
|
|
current_ev = iwe_stream_add_point(info, current_ev, end_buf,
|
|
|
|
&iwe, NULL);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* Add frequency. (short) bss->channel is the frequency in MHz */
|
|
|
|
iwe.u.freq.m = bss->channel;
|
|
|
|
iwe.u.freq.e = 6;
|
|
|
|
iwe.cmd = SIOCGIWFREQ;
|
2008-06-17 09:50:49 +08:00
|
|
|
current_ev = iwe_stream_add_event(info, current_ev, end_buf,
|
|
|
|
&iwe, IW_EV_FREQ_LEN);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* Add quality statistics */
|
|
|
|
iwe.u.qual.level = bss->rssi;
|
|
|
|
iwe.u.qual.noise = noise;
|
|
|
|
/* do a simple SNR for quality */
|
|
|
|
iwe.u.qual.qual = bss->rssi - noise;
|
|
|
|
iwe.cmd = IWEVQUAL;
|
2008-06-17 09:50:49 +08:00
|
|
|
current_ev = iwe_stream_add_event(info, current_ev, end_buf,
|
|
|
|
&iwe, IW_EV_QUAL_LEN);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-07-18 09:21:47 +08:00
|
|
|
/* Add WPA/RSN Information Element, if any */
|
|
|
|
wpa_ie_len = prism54_wpa_bss_ie_get(priv, bss->address, wpa_ie);
|
|
|
|
if (wpa_ie_len > 0) {
|
|
|
|
iwe.cmd = IWEVGENIE;
|
|
|
|
iwe.u.data.length = min(wpa_ie_len, (size_t)MAX_WPA_IE_LEN);
|
2008-06-17 09:50:49 +08:00
|
|
|
current_ev = iwe_stream_add_point(info, current_ev, end_buf,
|
|
|
|
&iwe, wpa_ie);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2006-08-30 09:19:23 +08:00
|
|
|
/* Do the bitrates */
|
|
|
|
{
|
2008-06-17 09:50:49 +08:00
|
|
|
char *current_val = current_ev + iwe_stream_lcp_len(info);
|
2006-08-30 09:19:23 +08:00
|
|
|
int i;
|
|
|
|
int mask;
|
|
|
|
|
|
|
|
iwe.cmd = SIOCGIWRATE;
|
|
|
|
/* Those two flags are ignored... */
|
|
|
|
iwe.u.bitrate.fixed = iwe.u.bitrate.disabled = 0;
|
|
|
|
|
|
|
|
/* Parse the bitmask */
|
|
|
|
mask = 0x1;
|
|
|
|
for(i = 0; i < sizeof(scan_rate_list); i++) {
|
|
|
|
if(bss->rates & mask) {
|
|
|
|
iwe.u.bitrate.value = (scan_rate_list[i] * 500000);
|
2008-06-17 09:50:49 +08:00
|
|
|
current_val = iwe_stream_add_value(
|
|
|
|
info, current_ev, current_val,
|
|
|
|
end_buf, &iwe, IW_EV_PARAM_LEN);
|
2006-08-30 09:19:23 +08:00
|
|
|
}
|
|
|
|
mask <<= 1;
|
|
|
|
}
|
|
|
|
/* Check if we added any event */
|
2008-06-17 09:50:49 +08:00
|
|
|
if ((current_val - current_ev) > iwe_stream_lcp_len(info))
|
2006-08-30 09:19:23 +08:00
|
|
|
current_ev = current_val;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
return current_ev;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_scan(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
int i, rvalue;
|
|
|
|
struct obj_bsslist *bsslist;
|
|
|
|
u32 noise = 0;
|
|
|
|
char *current_ev = extra;
|
|
|
|
union oid_res_t r;
|
|
|
|
|
|
|
|
if (islpci_get_state(priv) < PRV_STATE_INIT) {
|
|
|
|
/* device is not ready, fail gently */
|
|
|
|
dwrq->length = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* first get the noise value. We will use it to report the link quality */
|
|
|
|
rvalue = mgt_get_request(priv, DOT11_OID_NOISEFLOOR, 0, NULL, &r);
|
|
|
|
noise = r.u;
|
|
|
|
|
|
|
|
/* Ask the device for a list of known bss.
|
|
|
|
* The old API, using SIOCGIWAPLIST, had a hard limit of IW_MAX_AP=64.
|
|
|
|
* The new API, using SIOCGIWSCAN, is only limited by the buffer size.
|
|
|
|
* WE-14->WE-16, the buffer is limited to IW_SCAN_MAX_DATA bytes.
|
|
|
|
* Starting with WE-17, the buffer can be as big as needed.
|
|
|
|
* But the device won't repport anything if you change the value
|
|
|
|
* of IWMAX_BSS=24. */
|
2006-10-08 12:38:15 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
rvalue |= mgt_get_request(priv, DOT11_OID_BSSLIST, 0, NULL, &r);
|
|
|
|
bsslist = r.ptr;
|
|
|
|
|
|
|
|
/* ok now, scan the list and translate its info */
|
|
|
|
for (i = 0; i < (int) bsslist->nr; i++) {
|
2008-06-17 09:50:49 +08:00
|
|
|
current_ev = prism54_translate_bss(ndev, info, current_ev,
|
2005-04-17 06:20:36 +08:00
|
|
|
extra + dwrq->length,
|
|
|
|
&(bsslist->bsslist[i]),
|
|
|
|
noise);
|
2005-09-24 16:05:52 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* Check if there is space for one more entry */
|
|
|
|
if((extra + dwrq->length - current_ev) <= IW_EV_ADDR_LEN) {
|
|
|
|
/* Ask user space to try again with a bigger buffer */
|
|
|
|
rvalue = -E2BIG;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
kfree(bsslist);
|
|
|
|
dwrq->length = (current_ev - extra);
|
|
|
|
dwrq->flags = 0; /* todo */
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_essid(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct obj_ssid essid;
|
|
|
|
|
|
|
|
memset(essid.octets, 0, 33);
|
|
|
|
|
|
|
|
/* Check if we were asked for `any' */
|
|
|
|
if (dwrq->flags && dwrq->length) {
|
2006-08-30 09:03:23 +08:00
|
|
|
if (dwrq->length > 32)
|
2005-04-17 06:20:36 +08:00
|
|
|
return -E2BIG;
|
2006-08-30 09:03:23 +08:00
|
|
|
essid.length = dwrq->length;
|
2005-04-17 06:20:36 +08:00
|
|
|
memcpy(essid.octets, extra, dwrq->length);
|
|
|
|
} else
|
|
|
|
essid.length = 0;
|
|
|
|
|
|
|
|
if (priv->iw_mode != IW_MODE_MONITOR)
|
|
|
|
return mgt_set_request(priv, DOT11_OID_SSID, 0, &essid);
|
|
|
|
|
|
|
|
/* If in monitor mode, just save to mib */
|
|
|
|
mgt_set(priv, DOT11_OID_SSID, &essid);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_essid(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct obj_ssid *essid;
|
|
|
|
union oid_res_t r;
|
|
|
|
int rvalue;
|
|
|
|
|
|
|
|
rvalue = mgt_get_request(priv, DOT11_OID_SSID, 0, NULL, &r);
|
|
|
|
essid = r.ptr;
|
|
|
|
|
|
|
|
if (essid->length) {
|
|
|
|
dwrq->flags = 1; /* set ESSID to ON for Wireless Extensions */
|
2006-03-28 17:56:53 +08:00
|
|
|
/* if it is too big, trunk it */
|
2006-02-01 19:42:28 +08:00
|
|
|
dwrq->length = min((u8)IW_ESSID_MAX_SIZE, essid->length);
|
2005-04-17 06:20:36 +08:00
|
|
|
} else {
|
|
|
|
dwrq->flags = 0;
|
|
|
|
dwrq->length = 0;
|
|
|
|
}
|
2011-11-21 22:47:13 +08:00
|
|
|
essid->octets[dwrq->length] = '\0';
|
2005-04-17 06:20:36 +08:00
|
|
|
memcpy(extra, essid->octets, dwrq->length);
|
|
|
|
kfree(essid);
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
2006-10-08 12:38:15 +08:00
|
|
|
/* Provides no functionality, just completes the ioctl. In essence this is a
|
2005-04-17 06:20:36 +08:00
|
|
|
* just a cosmetic ioctl.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
prism54_set_nick(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
|
|
|
|
if (dwrq->length > IW_ESSID_MAX_SIZE)
|
|
|
|
return -E2BIG;
|
|
|
|
|
|
|
|
down_write(&priv->mib_sem);
|
|
|
|
memset(priv->nickname, 0, sizeof (priv->nickname));
|
|
|
|
memcpy(priv->nickname, extra, dwrq->length);
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_nick(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
|
|
|
|
dwrq->length = 0;
|
|
|
|
|
|
|
|
down_read(&priv->mib_sem);
|
2006-08-30 09:03:23 +08:00
|
|
|
dwrq->length = strlen(priv->nickname);
|
2005-04-17 06:20:36 +08:00
|
|
|
memcpy(extra, priv->nickname, dwrq->length);
|
|
|
|
up_read(&priv->mib_sem);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set the allowed Bitrates */
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_rate(struct net_device *ndev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
u32 rate, profile;
|
|
|
|
char *data;
|
|
|
|
int ret, i;
|
|
|
|
union oid_res_t r;
|
|
|
|
|
|
|
|
if (vwrq->value == -1) {
|
|
|
|
/* auto mode. No limit. */
|
|
|
|
profile = 1;
|
|
|
|
return mgt_set_request(priv, DOT11_OID_PROFILES, 0, &profile);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_SUPPORTEDRATES, 0, NULL, &r);
|
|
|
|
if (ret) {
|
|
|
|
kfree(r.ptr);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
rate = (u32) (vwrq->value / 500000);
|
|
|
|
data = r.ptr;
|
|
|
|
i = 0;
|
|
|
|
|
|
|
|
while (data[i]) {
|
|
|
|
if (rate && (data[i] == rate)) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (vwrq->value == i) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
data[i] |= 0x80;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!data[i]) {
|
|
|
|
kfree(r.ptr);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
data[i] |= 0x80;
|
|
|
|
data[i + 1] = 0;
|
|
|
|
|
|
|
|
/* Now, check if we want a fixed or auto value */
|
|
|
|
if (vwrq->fixed) {
|
|
|
|
data[0] = data[i];
|
|
|
|
data[1] = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
i = 0;
|
|
|
|
printk("prism54 rate: ");
|
|
|
|
while(data[i]) {
|
|
|
|
printk("%u ", data[i]);
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
printk("0\n");
|
|
|
|
*/
|
|
|
|
profile = -1;
|
|
|
|
ret = mgt_set_request(priv, DOT11_OID_PROFILES, 0, &profile);
|
|
|
|
ret |= mgt_set_request(priv, DOT11_OID_EXTENDEDRATES, 0, data);
|
|
|
|
ret |= mgt_set_request(priv, DOT11_OID_RATES, 0, data);
|
|
|
|
|
|
|
|
kfree(r.ptr);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get the current bit rate */
|
|
|
|
static int
|
|
|
|
prism54_get_rate(struct net_device *ndev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
int rvalue;
|
|
|
|
char *data;
|
|
|
|
union oid_res_t r;
|
|
|
|
|
|
|
|
/* Get the current bit rate */
|
|
|
|
if ((rvalue = mgt_get_request(priv, GEN_OID_LINKSTATE, 0, NULL, &r)))
|
|
|
|
return rvalue;
|
|
|
|
vwrq->value = r.u * 500000;
|
|
|
|
|
|
|
|
/* request the device for the enabled rates */
|
|
|
|
rvalue = mgt_get_request(priv, DOT11_OID_RATES, 0, NULL, &r);
|
|
|
|
if (rvalue) {
|
|
|
|
kfree(r.ptr);
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
data = r.ptr;
|
|
|
|
vwrq->fixed = (data[0] != 0) && (data[1] == 0);
|
|
|
|
kfree(r.ptr);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_rts(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
|
|
|
|
return mgt_set_request(priv, DOT11_OID_RTSTHRESH, 0, &vwrq->value);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_rts(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
union oid_res_t r;
|
|
|
|
int rvalue;
|
|
|
|
|
|
|
|
/* get the rts threshold */
|
|
|
|
rvalue = mgt_get_request(priv, DOT11_OID_RTSTHRESH, 0, NULL, &r);
|
|
|
|
vwrq->value = r.u;
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_frag(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
|
|
|
|
return mgt_set_request(priv, DOT11_OID_FRAGTHRESH, 0, &vwrq->value);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_frag(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
union oid_res_t r;
|
|
|
|
int rvalue;
|
|
|
|
|
|
|
|
rvalue = mgt_get_request(priv, DOT11_OID_FRAGTHRESH, 0, NULL, &r);
|
|
|
|
vwrq->value = r.u;
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Here we have (min,max) = max retries for (small frames, big frames). Where
|
|
|
|
* big frame <=> bigger than the rts threshold
|
|
|
|
* small frame <=> smaller than the rts threshold
|
|
|
|
* This is not really the behavior expected by the wireless tool but it seems
|
|
|
|
* to be a common behavior in other drivers.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_retry(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
u32 slimit = 0, llimit = 0; /* short and long limit */
|
|
|
|
u32 lifetime = 0;
|
|
|
|
int rvalue = 0;
|
|
|
|
|
|
|
|
if (vwrq->disabled)
|
|
|
|
/* we cannot disable this feature */
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (vwrq->flags & IW_RETRY_LIMIT) {
|
2006-08-30 09:03:23 +08:00
|
|
|
if (vwrq->flags & IW_RETRY_SHORT)
|
2005-04-17 06:20:36 +08:00
|
|
|
slimit = vwrq->value;
|
2006-08-30 09:03:23 +08:00
|
|
|
else if (vwrq->flags & IW_RETRY_LONG)
|
2005-04-17 06:20:36 +08:00
|
|
|
llimit = vwrq->value;
|
|
|
|
else {
|
|
|
|
/* we are asked to set both */
|
|
|
|
slimit = vwrq->value;
|
|
|
|
llimit = vwrq->value;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (vwrq->flags & IW_RETRY_LIFETIME)
|
|
|
|
/* Wireless tools use us unit while the device uses 1024 us unit */
|
|
|
|
lifetime = vwrq->value / 1024;
|
|
|
|
|
|
|
|
/* now set what is requested */
|
|
|
|
if (slimit)
|
|
|
|
rvalue =
|
|
|
|
mgt_set_request(priv, DOT11_OID_SHORTRETRIES, 0, &slimit);
|
|
|
|
if (llimit)
|
|
|
|
rvalue |=
|
|
|
|
mgt_set_request(priv, DOT11_OID_LONGRETRIES, 0, &llimit);
|
|
|
|
if (lifetime)
|
|
|
|
rvalue |=
|
|
|
|
mgt_set_request(priv, DOT11_OID_MAXTXLIFETIME, 0,
|
|
|
|
&lifetime);
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_retry(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
union oid_res_t r;
|
|
|
|
int rvalue = 0;
|
|
|
|
vwrq->disabled = 0; /* It cannot be disabled */
|
|
|
|
|
|
|
|
if ((vwrq->flags & IW_RETRY_TYPE) == IW_RETRY_LIFETIME) {
|
|
|
|
/* we are asked for the life time */
|
|
|
|
rvalue =
|
|
|
|
mgt_get_request(priv, DOT11_OID_MAXTXLIFETIME, 0, NULL, &r);
|
|
|
|
vwrq->value = r.u * 1024;
|
|
|
|
vwrq->flags = IW_RETRY_LIFETIME;
|
2006-08-30 09:03:23 +08:00
|
|
|
} else if ((vwrq->flags & IW_RETRY_LONG)) {
|
2005-04-17 06:20:36 +08:00
|
|
|
/* we are asked for the long retry limit */
|
|
|
|
rvalue |=
|
|
|
|
mgt_get_request(priv, DOT11_OID_LONGRETRIES, 0, NULL, &r);
|
|
|
|
vwrq->value = r.u;
|
2006-08-30 09:03:23 +08:00
|
|
|
vwrq->flags = IW_RETRY_LIMIT | IW_RETRY_LONG;
|
2005-04-17 06:20:36 +08:00
|
|
|
} else {
|
|
|
|
/* default. get the short retry limit */
|
|
|
|
rvalue |=
|
|
|
|
mgt_get_request(priv, DOT11_OID_SHORTRETRIES, 0, NULL, &r);
|
|
|
|
vwrq->value = r.u;
|
2006-08-30 09:03:23 +08:00
|
|
|
vwrq->flags = IW_RETRY_LIMIT | IW_RETRY_SHORT;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_encode(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
int rvalue = 0, force = 0;
|
|
|
|
int authen = DOT11_AUTH_OS, invoke = 0, exunencrypt = 0;
|
|
|
|
union oid_res_t r;
|
|
|
|
|
|
|
|
/* with the new API, it's impossible to get a NULL pointer.
|
|
|
|
* New version of iwconfig set the IW_ENCODE_NOKEY flag
|
|
|
|
* when no key is given, but older versions don't. */
|
|
|
|
|
|
|
|
if (dwrq->length > 0) {
|
|
|
|
/* we have a key to set */
|
|
|
|
int index = (dwrq->flags & IW_ENCODE_INDEX) - 1;
|
|
|
|
int current_index;
|
|
|
|
struct obj_key key = { DOT11_PRIV_WEP, 0, "" };
|
|
|
|
|
|
|
|
/* get the current key index */
|
|
|
|
rvalue = mgt_get_request(priv, DOT11_OID_DEFKEYID, 0, NULL, &r);
|
|
|
|
current_index = r.u;
|
|
|
|
/* Verify that the key is not marked as invalid */
|
|
|
|
if (!(dwrq->flags & IW_ENCODE_NOKEY)) {
|
2006-07-18 09:21:47 +08:00
|
|
|
if (dwrq->length > KEY_SIZE_TKIP) {
|
|
|
|
/* User-provided key data too big */
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
if (dwrq->length > KEY_SIZE_WEP104) {
|
|
|
|
/* WPA-PSK TKIP */
|
2005-04-17 06:20:36 +08:00
|
|
|
key.type = DOT11_PRIV_TKIP;
|
2006-07-18 09:21:47 +08:00
|
|
|
key.length = KEY_SIZE_TKIP;
|
|
|
|
} else if (dwrq->length > KEY_SIZE_WEP40) {
|
|
|
|
/* WEP 104/128 */
|
|
|
|
key.length = KEY_SIZE_WEP104;
|
|
|
|
} else {
|
|
|
|
/* WEP 40/64 */
|
|
|
|
key.length = KEY_SIZE_WEP40;
|
|
|
|
}
|
|
|
|
memset(key.key, 0, sizeof (key.key));
|
|
|
|
memcpy(key.key, extra, dwrq->length);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
if ((index < 0) || (index > 3))
|
|
|
|
/* no index provided use the current one */
|
|
|
|
index = current_index;
|
|
|
|
|
|
|
|
/* now send the key to the card */
|
|
|
|
rvalue |=
|
|
|
|
mgt_set_request(priv, DOT11_OID_DEFKEYX, index,
|
|
|
|
&key);
|
|
|
|
}
|
|
|
|
/*
|
2006-10-08 12:38:15 +08:00
|
|
|
* If a valid key is set, encryption should be enabled
|
2005-04-17 06:20:36 +08:00
|
|
|
* (user may turn it off later).
|
|
|
|
* This is also how "iwconfig ethX key on" works
|
|
|
|
*/
|
|
|
|
if ((index == current_index) && (key.length > 0))
|
|
|
|
force = 1;
|
|
|
|
} else {
|
|
|
|
int index = (dwrq->flags & IW_ENCODE_INDEX) - 1;
|
|
|
|
if ((index >= 0) && (index <= 3)) {
|
|
|
|
/* we want to set the key index */
|
|
|
|
rvalue |=
|
|
|
|
mgt_set_request(priv, DOT11_OID_DEFKEYID, 0,
|
|
|
|
&index);
|
|
|
|
} else {
|
2007-10-27 03:51:26 +08:00
|
|
|
if (!(dwrq->flags & IW_ENCODE_MODE)) {
|
2005-04-17 06:20:36 +08:00
|
|
|
/* we cannot do anything. Complain. */
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* now read the flags */
|
|
|
|
if (dwrq->flags & IW_ENCODE_DISABLED) {
|
2006-10-08 12:38:15 +08:00
|
|
|
/* Encoding disabled,
|
2005-04-17 06:20:36 +08:00
|
|
|
* authen = DOT11_AUTH_OS;
|
|
|
|
* invoke = 0;
|
|
|
|
* exunencrypt = 0; */
|
|
|
|
}
|
|
|
|
if (dwrq->flags & IW_ENCODE_OPEN)
|
|
|
|
/* Encode but accept non-encoded packets. No auth */
|
|
|
|
invoke = 1;
|
|
|
|
if ((dwrq->flags & IW_ENCODE_RESTRICTED) || force) {
|
|
|
|
/* Refuse non-encoded packets. Auth */
|
|
|
|
authen = DOT11_AUTH_BOTH;
|
|
|
|
invoke = 1;
|
|
|
|
exunencrypt = 1;
|
|
|
|
}
|
|
|
|
/* do the change if requested */
|
|
|
|
if ((dwrq->flags & IW_ENCODE_MODE) || force) {
|
|
|
|
rvalue |=
|
|
|
|
mgt_set_request(priv, DOT11_OID_AUTHENABLE, 0, &authen);
|
|
|
|
rvalue |=
|
|
|
|
mgt_set_request(priv, DOT11_OID_PRIVACYINVOKED, 0, &invoke);
|
|
|
|
rvalue |=
|
|
|
|
mgt_set_request(priv, DOT11_OID_EXUNENCRYPTED, 0,
|
|
|
|
&exunencrypt);
|
|
|
|
}
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_encode(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct obj_key *key;
|
|
|
|
u32 devindex, index = (dwrq->flags & IW_ENCODE_INDEX) - 1;
|
|
|
|
u32 authen = 0, invoke = 0, exunencrypt = 0;
|
|
|
|
int rvalue;
|
|
|
|
union oid_res_t r;
|
|
|
|
|
|
|
|
/* first get the flags */
|
|
|
|
rvalue = mgt_get_request(priv, DOT11_OID_AUTHENABLE, 0, NULL, &r);
|
|
|
|
authen = r.u;
|
|
|
|
rvalue |= mgt_get_request(priv, DOT11_OID_PRIVACYINVOKED, 0, NULL, &r);
|
|
|
|
invoke = r.u;
|
|
|
|
rvalue |= mgt_get_request(priv, DOT11_OID_EXUNENCRYPTED, 0, NULL, &r);
|
|
|
|
exunencrypt = r.u;
|
|
|
|
|
|
|
|
if (invoke && (authen == DOT11_AUTH_BOTH) && exunencrypt)
|
|
|
|
dwrq->flags = IW_ENCODE_RESTRICTED;
|
|
|
|
else if ((authen == DOT11_AUTH_OS) && !exunencrypt) {
|
|
|
|
if (invoke)
|
|
|
|
dwrq->flags = IW_ENCODE_OPEN;
|
|
|
|
else
|
|
|
|
dwrq->flags = IW_ENCODE_DISABLED;
|
|
|
|
} else
|
|
|
|
/* The card should not work in this state */
|
|
|
|
dwrq->flags = 0;
|
|
|
|
|
|
|
|
/* get the current device key index */
|
|
|
|
rvalue |= mgt_get_request(priv, DOT11_OID_DEFKEYID, 0, NULL, &r);
|
|
|
|
devindex = r.u;
|
|
|
|
/* Now get the key, return it */
|
2008-04-24 03:56:49 +08:00
|
|
|
if (index == -1 || index > 3)
|
2005-04-17 06:20:36 +08:00
|
|
|
/* no index provided, use the current one */
|
|
|
|
index = devindex;
|
|
|
|
rvalue |= mgt_get_request(priv, DOT11_OID_DEFKEYX, index, NULL, &r);
|
|
|
|
key = r.ptr;
|
|
|
|
dwrq->length = key->length;
|
|
|
|
memcpy(extra, key->key, dwrq->length);
|
|
|
|
kfree(key);
|
|
|
|
/* return the used key index */
|
|
|
|
dwrq->flags |= devindex + 1;
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_txpower(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
union oid_res_t r;
|
|
|
|
int rvalue;
|
|
|
|
|
|
|
|
rvalue = mgt_get_request(priv, OID_INL_OUTPUTPOWER, 0, NULL, &r);
|
|
|
|
/* intersil firmware operates in 0.25 dBm (1/4 dBm) */
|
|
|
|
vwrq->value = (s32) r.u / 4;
|
|
|
|
vwrq->fixed = 1;
|
|
|
|
/* radio is not turned of
|
2006-10-08 12:38:15 +08:00
|
|
|
* btw: how is possible to turn off only the radio
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
|
|
|
vwrq->disabled = 0;
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_txpower(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_param *vwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
s32 u = vwrq->value;
|
|
|
|
|
|
|
|
/* intersil firmware operates in 0.25 dBm (1/4) */
|
|
|
|
u *= 4;
|
|
|
|
if (vwrq->disabled) {
|
|
|
|
/* don't know how to disable radio */
|
|
|
|
printk(KERN_DEBUG
|
|
|
|
"%s: %s() disabling radio is not yet supported.\n",
|
2008-07-29 14:01:34 +08:00
|
|
|
priv->ndev->name, __func__);
|
2005-04-17 06:20:36 +08:00
|
|
|
return -ENOTSUPP;
|
|
|
|
} else if (vwrq->fixed)
|
|
|
|
/* currently only fixed value is supported */
|
|
|
|
return mgt_set_request(priv, OID_INL_OUTPUTPOWER, 0, &u);
|
|
|
|
else {
|
|
|
|
printk(KERN_DEBUG
|
|
|
|
"%s: %s() auto power will be implemented later.\n",
|
2008-07-29 14:01:34 +08:00
|
|
|
priv->ndev->name, __func__);
|
2005-04-17 06:20:36 +08:00
|
|
|
return -ENOTSUPP;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-07-18 09:21:47 +08:00
|
|
|
static int prism54_set_genie(struct net_device *ndev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
struct iw_point *data, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
int alen, ret = 0;
|
|
|
|
struct obj_attachment *attach;
|
|
|
|
|
|
|
|
if (data->length > MAX_WPA_IE_LEN ||
|
|
|
|
(data->length && extra == NULL))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
memcpy(priv->wpa_ie, extra, data->length);
|
|
|
|
priv->wpa_ie_len = data->length;
|
|
|
|
|
|
|
|
alen = sizeof(*attach) + priv->wpa_ie_len;
|
|
|
|
attach = kzalloc(alen, GFP_KERNEL);
|
|
|
|
if (attach == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
#define WLAN_FC_TYPE_MGMT 0
|
|
|
|
#define WLAN_FC_STYPE_ASSOC_REQ 0
|
|
|
|
#define WLAN_FC_STYPE_REASSOC_REQ 2
|
|
|
|
|
|
|
|
/* Note: endianness is covered by mgt_set_varlen */
|
|
|
|
attach->type = (WLAN_FC_TYPE_MGMT << 2) |
|
|
|
|
(WLAN_FC_STYPE_ASSOC_REQ << 4);
|
|
|
|
attach->id = -1;
|
|
|
|
attach->size = priv->wpa_ie_len;
|
|
|
|
memcpy(attach->data, extra, priv->wpa_ie_len);
|
|
|
|
|
|
|
|
ret = mgt_set_varlen(priv, DOT11_OID_ATTACHMENT, attach,
|
|
|
|
priv->wpa_ie_len);
|
|
|
|
if (ret == 0) {
|
|
|
|
attach->type = (WLAN_FC_TYPE_MGMT << 2) |
|
|
|
|
(WLAN_FC_STYPE_REASSOC_REQ << 4);
|
|
|
|
|
|
|
|
ret = mgt_set_varlen(priv, DOT11_OID_ATTACHMENT, attach,
|
|
|
|
priv->wpa_ie_len);
|
|
|
|
if (ret == 0)
|
|
|
|
printk(KERN_DEBUG "%s: WPA IE Attachment was set\n",
|
|
|
|
ndev->name);
|
|
|
|
}
|
|
|
|
|
|
|
|
kfree(attach);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int prism54_get_genie(struct net_device *ndev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
struct iw_point *data, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
int len = priv->wpa_ie_len;
|
|
|
|
|
|
|
|
if (len <= 0) {
|
|
|
|
data->length = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (data->length < len)
|
|
|
|
return -E2BIG;
|
|
|
|
|
|
|
|
data->length = len;
|
|
|
|
memcpy(extra, priv->wpa_ie, len);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int prism54_set_auth(struct net_device *ndev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
union iwreq_data *wrqu, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct iw_param *param = &wrqu->param;
|
|
|
|
u32 mlmelevel = 0, authen = 0, dot1x = 0;
|
|
|
|
u32 exunencrypt = 0, privinvoked = 0, wpa = 0;
|
|
|
|
u32 old_wpa;
|
|
|
|
int ret = 0;
|
|
|
|
union oid_res_t r;
|
|
|
|
|
|
|
|
if (islpci_get_state(priv) < PRV_STATE_INIT)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* first get the flags */
|
|
|
|
down_write(&priv->mib_sem);
|
|
|
|
wpa = old_wpa = priv->wpa;
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_AUTHENABLE, 0, NULL, &r);
|
|
|
|
authen = r.u;
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_PRIVACYINVOKED, 0, NULL, &r);
|
|
|
|
privinvoked = r.u;
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_EXUNENCRYPTED, 0, NULL, &r);
|
|
|
|
exunencrypt = r.u;
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_DOT1XENABLE, 0, NULL, &r);
|
|
|
|
dot1x = r.u;
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_MLMEAUTOLEVEL, 0, NULL, &r);
|
|
|
|
mlmelevel = r.u;
|
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
switch (param->flags & IW_AUTH_INDEX) {
|
|
|
|
case IW_AUTH_CIPHER_PAIRWISE:
|
|
|
|
case IW_AUTH_CIPHER_GROUP:
|
|
|
|
case IW_AUTH_KEY_MGMT:
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IW_AUTH_WPA_ENABLED:
|
|
|
|
/* Do the same thing as IW_AUTH_WPA_VERSION */
|
|
|
|
if (param->value) {
|
|
|
|
wpa = 1;
|
|
|
|
privinvoked = 1; /* For privacy invoked */
|
|
|
|
exunencrypt = 1; /* Filter out all unencrypted frames */
|
|
|
|
dot1x = 0x01; /* To enable eap filter */
|
|
|
|
mlmelevel = DOT11_MLME_EXTENDED;
|
|
|
|
authen = DOT11_AUTH_OS; /* Only WEP uses _SK and _BOTH */
|
|
|
|
} else {
|
|
|
|
wpa = 0;
|
|
|
|
privinvoked = 0;
|
|
|
|
exunencrypt = 0; /* Do not filter un-encrypted data */
|
|
|
|
dot1x = 0;
|
|
|
|
mlmelevel = DOT11_MLME_AUTO;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IW_AUTH_WPA_VERSION:
|
|
|
|
if (param->value & IW_AUTH_WPA_VERSION_DISABLED) {
|
|
|
|
wpa = 0;
|
|
|
|
privinvoked = 0;
|
|
|
|
exunencrypt = 0; /* Do not filter un-encrypted data */
|
|
|
|
dot1x = 0;
|
|
|
|
mlmelevel = DOT11_MLME_AUTO;
|
|
|
|
} else {
|
|
|
|
if (param->value & IW_AUTH_WPA_VERSION_WPA)
|
|
|
|
wpa = 1;
|
|
|
|
else if (param->value & IW_AUTH_WPA_VERSION_WPA2)
|
|
|
|
wpa = 2;
|
|
|
|
privinvoked = 1; /* For privacy invoked */
|
|
|
|
exunencrypt = 1; /* Filter out all unencrypted frames */
|
|
|
|
dot1x = 0x01; /* To enable eap filter */
|
|
|
|
mlmelevel = DOT11_MLME_EXTENDED;
|
|
|
|
authen = DOT11_AUTH_OS; /* Only WEP uses _SK and _BOTH */
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IW_AUTH_RX_UNENCRYPTED_EAPOL:
|
2007-02-14 03:00:22 +08:00
|
|
|
/* dot1x should be the opposite of RX_UNENCRYPTED_EAPOL;
|
|
|
|
* turn off dot1x when allowing receipt of unencrypted EAPOL
|
|
|
|
* frames, turn on dot1x when receipt should be disallowed
|
|
|
|
*/
|
|
|
|
dot1x = param->value ? 0 : 0x01;
|
2006-07-18 09:21:47 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
case IW_AUTH_PRIVACY_INVOKED:
|
|
|
|
privinvoked = param->value ? 1 : 0;
|
2007-02-14 03:00:22 +08:00
|
|
|
break;
|
2006-07-18 09:21:47 +08:00
|
|
|
|
|
|
|
case IW_AUTH_DROP_UNENCRYPTED:
|
|
|
|
exunencrypt = param->value ? 1 : 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IW_AUTH_80211_AUTH_ALG:
|
|
|
|
if (param->value & IW_AUTH_ALG_SHARED_KEY) {
|
|
|
|
/* Only WEP uses _SK and _BOTH */
|
|
|
|
if (wpa > 0) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
authen = DOT11_AUTH_SK;
|
|
|
|
} else if (param->value & IW_AUTH_ALG_OPEN_SYSTEM) {
|
|
|
|
authen = DOT11_AUTH_OS;
|
|
|
|
} else {
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set all the values */
|
|
|
|
down_write(&priv->mib_sem);
|
|
|
|
priv->wpa = wpa;
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
mgt_set_request(priv, DOT11_OID_AUTHENABLE, 0, &authen);
|
|
|
|
mgt_set_request(priv, DOT11_OID_PRIVACYINVOKED, 0, &privinvoked);
|
|
|
|
mgt_set_request(priv, DOT11_OID_EXUNENCRYPTED, 0, &exunencrypt);
|
|
|
|
mgt_set_request(priv, DOT11_OID_DOT1XENABLE, 0, &dot1x);
|
|
|
|
mgt_set_request(priv, DOT11_OID_MLMEAUTOLEVEL, 0, &mlmelevel);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int prism54_get_auth(struct net_device *ndev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
union iwreq_data *wrqu, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct iw_param *param = &wrqu->param;
|
|
|
|
u32 wpa = 0;
|
|
|
|
int ret = 0;
|
|
|
|
union oid_res_t r;
|
|
|
|
|
|
|
|
if (islpci_get_state(priv) < PRV_STATE_INIT)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* first get the flags */
|
|
|
|
down_write(&priv->mib_sem);
|
|
|
|
wpa = priv->wpa;
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
|
|
|
|
switch (param->flags & IW_AUTH_INDEX) {
|
|
|
|
case IW_AUTH_CIPHER_PAIRWISE:
|
|
|
|
case IW_AUTH_CIPHER_GROUP:
|
|
|
|
case IW_AUTH_KEY_MGMT:
|
|
|
|
/*
|
|
|
|
* wpa_supplicant will control these internally
|
|
|
|
*/
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IW_AUTH_WPA_VERSION:
|
|
|
|
switch (wpa) {
|
|
|
|
case 1:
|
|
|
|
param->value = IW_AUTH_WPA_VERSION_WPA;
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
param->value = IW_AUTH_WPA_VERSION_WPA2;
|
|
|
|
break;
|
|
|
|
case 0:
|
|
|
|
default:
|
|
|
|
param->value = IW_AUTH_WPA_VERSION_DISABLED;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IW_AUTH_DROP_UNENCRYPTED:
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_EXUNENCRYPTED, 0, NULL, &r);
|
|
|
|
if (ret >= 0)
|
|
|
|
param->value = r.u > 0 ? 1 : 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IW_AUTH_80211_AUTH_ALG:
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_AUTHENABLE, 0, NULL, &r);
|
|
|
|
if (ret >= 0) {
|
|
|
|
switch (r.u) {
|
|
|
|
case DOT11_AUTH_OS:
|
|
|
|
param->value = IW_AUTH_ALG_OPEN_SYSTEM;
|
|
|
|
break;
|
|
|
|
case DOT11_AUTH_BOTH:
|
|
|
|
case DOT11_AUTH_SK:
|
|
|
|
param->value = IW_AUTH_ALG_SHARED_KEY;
|
2013-01-14 04:03:42 +08:00
|
|
|
break;
|
2006-07-18 09:21:47 +08:00
|
|
|
case DOT11_AUTH_NONE:
|
|
|
|
default:
|
|
|
|
param->value = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IW_AUTH_WPA_ENABLED:
|
|
|
|
param->value = wpa > 0 ? 1 : 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IW_AUTH_RX_UNENCRYPTED_EAPOL:
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_DOT1XENABLE, 0, NULL, &r);
|
|
|
|
if (ret >= 0)
|
|
|
|
param->value = r.u > 0 ? 1 : 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IW_AUTH_PRIVACY_INVOKED:
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_PRIVACYINVOKED, 0, NULL, &r);
|
|
|
|
if (ret >= 0)
|
|
|
|
param->value = r.u > 0 ? 1 : 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int prism54_set_encodeext(struct net_device *ndev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
union iwreq_data *wrqu,
|
|
|
|
char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct iw_point *encoding = &wrqu->encoding;
|
|
|
|
struct iw_encode_ext *ext = (struct iw_encode_ext *)extra;
|
|
|
|
int idx, alg = ext->alg, set_key = 1;
|
|
|
|
union oid_res_t r;
|
|
|
|
int authen = DOT11_AUTH_OS, invoke = 0, exunencrypt = 0;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
if (islpci_get_state(priv) < PRV_STATE_INIT)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Determine and validate the key index */
|
|
|
|
idx = (encoding->flags & IW_ENCODE_INDEX) - 1;
|
|
|
|
if (idx) {
|
|
|
|
if (idx < 0 || idx > 3)
|
|
|
|
return -EINVAL;
|
|
|
|
} else {
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_DEFKEYID, 0, NULL, &r);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
idx = r.u;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (encoding->flags & IW_ENCODE_DISABLED)
|
|
|
|
alg = IW_ENCODE_ALG_NONE;
|
|
|
|
|
|
|
|
if (ext->ext_flags & IW_ENCODE_EXT_SET_TX_KEY) {
|
|
|
|
/* Only set transmit key index here, actual
|
|
|
|
* key is set below if needed.
|
|
|
|
*/
|
|
|
|
ret = mgt_set_request(priv, DOT11_OID_DEFKEYID, 0, &idx);
|
|
|
|
set_key = ext->key_len > 0 ? 1 : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (set_key) {
|
|
|
|
struct obj_key key = { DOT11_PRIV_WEP, 0, "" };
|
|
|
|
switch (alg) {
|
|
|
|
case IW_ENCODE_ALG_NONE:
|
|
|
|
break;
|
|
|
|
case IW_ENCODE_ALG_WEP:
|
|
|
|
if (ext->key_len > KEY_SIZE_WEP104) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (ext->key_len > KEY_SIZE_WEP40)
|
|
|
|
key.length = KEY_SIZE_WEP104;
|
|
|
|
else
|
|
|
|
key.length = KEY_SIZE_WEP40;
|
|
|
|
break;
|
|
|
|
case IW_ENCODE_ALG_TKIP:
|
|
|
|
if (ext->key_len > KEY_SIZE_TKIP) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
key.type = DOT11_PRIV_TKIP;
|
|
|
|
key.length = KEY_SIZE_TKIP;
|
2007-02-14 03:00:22 +08:00
|
|
|
break;
|
2006-07-18 09:21:47 +08:00
|
|
|
default:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (key.length) {
|
|
|
|
memset(key.key, 0, sizeof(key.key));
|
|
|
|
memcpy(key.key, ext->key, ext->key_len);
|
|
|
|
ret = mgt_set_request(priv, DOT11_OID_DEFKEYX, idx,
|
|
|
|
&key);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Read the flags */
|
|
|
|
if (encoding->flags & IW_ENCODE_DISABLED) {
|
|
|
|
/* Encoding disabled,
|
|
|
|
* authen = DOT11_AUTH_OS;
|
|
|
|
* invoke = 0;
|
|
|
|
* exunencrypt = 0; */
|
|
|
|
}
|
|
|
|
if (encoding->flags & IW_ENCODE_OPEN) {
|
|
|
|
/* Encode but accept non-encoded packets. No auth */
|
|
|
|
invoke = 1;
|
|
|
|
}
|
|
|
|
if (encoding->flags & IW_ENCODE_RESTRICTED) {
|
|
|
|
/* Refuse non-encoded packets. Auth */
|
|
|
|
authen = DOT11_AUTH_BOTH;
|
|
|
|
invoke = 1;
|
|
|
|
exunencrypt = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* do the change if requested */
|
|
|
|
if (encoding->flags & IW_ENCODE_MODE) {
|
|
|
|
ret = mgt_set_request(priv, DOT11_OID_AUTHENABLE, 0,
|
|
|
|
&authen);
|
|
|
|
ret = mgt_set_request(priv, DOT11_OID_PRIVACYINVOKED, 0,
|
|
|
|
&invoke);
|
|
|
|
ret = mgt_set_request(priv, DOT11_OID_EXUNENCRYPTED, 0,
|
|
|
|
&exunencrypt);
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int prism54_get_encodeext(struct net_device *ndev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
union iwreq_data *wrqu,
|
|
|
|
char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct iw_point *encoding = &wrqu->encoding;
|
|
|
|
struct iw_encode_ext *ext = (struct iw_encode_ext *)extra;
|
|
|
|
int idx, max_key_len;
|
|
|
|
union oid_res_t r;
|
|
|
|
int authen = DOT11_AUTH_OS, invoke = 0, exunencrypt = 0, wpa = 0;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
if (islpci_get_state(priv) < PRV_STATE_INIT)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* first get the flags */
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_AUTHENABLE, 0, NULL, &r);
|
|
|
|
authen = r.u;
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_PRIVACYINVOKED, 0, NULL, &r);
|
|
|
|
invoke = r.u;
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_EXUNENCRYPTED, 0, NULL, &r);
|
|
|
|
exunencrypt = r.u;
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
max_key_len = encoding->length - sizeof(*ext);
|
|
|
|
if (max_key_len < 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
idx = (encoding->flags & IW_ENCODE_INDEX) - 1;
|
|
|
|
if (idx) {
|
|
|
|
if (idx < 0 || idx > 3)
|
|
|
|
return -EINVAL;
|
|
|
|
} else {
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_DEFKEYID, 0, NULL, &r);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
idx = r.u;
|
|
|
|
}
|
|
|
|
|
|
|
|
encoding->flags = idx + 1;
|
|
|
|
memset(ext, 0, sizeof(*ext));
|
|
|
|
|
|
|
|
switch (authen) {
|
|
|
|
case DOT11_AUTH_BOTH:
|
|
|
|
case DOT11_AUTH_SK:
|
|
|
|
wrqu->encoding.flags |= IW_ENCODE_RESTRICTED;
|
|
|
|
case DOT11_AUTH_OS:
|
|
|
|
default:
|
|
|
|
wrqu->encoding.flags |= IW_ENCODE_OPEN;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
down_write(&priv->mib_sem);
|
|
|
|
wpa = priv->wpa;
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
|
|
|
|
if (authen == DOT11_AUTH_OS && !exunencrypt && !invoke && !wpa) {
|
|
|
|
/* No encryption */
|
|
|
|
ext->alg = IW_ENCODE_ALG_NONE;
|
|
|
|
ext->key_len = 0;
|
|
|
|
wrqu->encoding.flags |= IW_ENCODE_DISABLED;
|
|
|
|
} else {
|
|
|
|
struct obj_key *key;
|
|
|
|
|
|
|
|
ret = mgt_get_request(priv, DOT11_OID_DEFKEYX, idx, NULL, &r);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
key = r.ptr;
|
|
|
|
if (max_key_len < key->length) {
|
|
|
|
ret = -E2BIG;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
memcpy(ext->key, key->key, key->length);
|
|
|
|
ext->key_len = key->length;
|
|
|
|
|
|
|
|
switch (key->type) {
|
|
|
|
case DOT11_PRIV_TKIP:
|
|
|
|
ext->alg = IW_ENCODE_ALG_TKIP;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
case DOT11_PRIV_WEP:
|
|
|
|
ext->alg = IW_ENCODE_ALG_WEP;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
wrqu->encoding.flags |= IW_ENCODE_ENABLED;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static int
|
|
|
|
prism54_reset(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
__u32 * uwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_reset(netdev_priv(ndev), 0);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_oid(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
union oid_res_t r;
|
|
|
|
int rvalue;
|
|
|
|
enum oid_num_t n = dwrq->flags;
|
|
|
|
|
2007-08-04 01:37:16 +08:00
|
|
|
rvalue = mgt_get_request(netdev_priv(ndev), n, 0, NULL, &r);
|
2005-04-17 06:20:36 +08:00
|
|
|
dwrq->length = mgt_response_to_str(n, &r, extra);
|
|
|
|
if ((isl_oid[n].flags & OID_FLAG_TYPE) != OID_TYPE_U32)
|
|
|
|
kfree(r.ptr);
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_u32(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
__u32 * uwrq, char *extra)
|
|
|
|
{
|
|
|
|
u32 oid = uwrq[0], u = uwrq[1];
|
|
|
|
|
2007-08-04 01:37:16 +08:00
|
|
|
return mgt_set_request(netdev_priv(ndev), oid, 0, &u);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_raw(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
u32 oid = dwrq->flags;
|
|
|
|
|
2007-08-04 01:37:16 +08:00
|
|
|
return mgt_set_request(netdev_priv(ndev), oid, 0, extra);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
prism54_acl_init(struct islpci_acl *acl)
|
|
|
|
{
|
2008-02-16 03:56:48 +08:00
|
|
|
mutex_init(&acl->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
INIT_LIST_HEAD(&acl->mac_list);
|
|
|
|
acl->size = 0;
|
|
|
|
acl->policy = MAC_POLICY_OPEN;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
prism54_clear_mac(struct islpci_acl *acl)
|
|
|
|
{
|
|
|
|
struct list_head *ptr, *next;
|
|
|
|
struct mac_entry *entry;
|
|
|
|
|
2008-02-16 03:56:48 +08:00
|
|
|
mutex_lock(&acl->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
if (acl->size == 0) {
|
2008-02-16 03:56:48 +08:00
|
|
|
mutex_unlock(&acl->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (ptr = acl->mac_list.next, next = ptr->next;
|
|
|
|
ptr != &acl->mac_list; ptr = next, next = ptr->next) {
|
|
|
|
entry = list_entry(ptr, struct mac_entry, _list);
|
|
|
|
list_del(ptr);
|
|
|
|
kfree(entry);
|
|
|
|
}
|
|
|
|
acl->size = 0;
|
2008-02-16 03:56:48 +08:00
|
|
|
mutex_unlock(&acl->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
prism54_acl_clean(struct islpci_acl *acl)
|
|
|
|
{
|
|
|
|
prism54_clear_mac(acl);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_add_mac(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct sockaddr *awrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct islpci_acl *acl = &priv->acl;
|
|
|
|
struct mac_entry *entry;
|
|
|
|
struct sockaddr *addr = (struct sockaddr *) extra;
|
|
|
|
|
|
|
|
if (addr->sa_family != ARPHRD_ETHER)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
entry = kmalloc(sizeof (struct mac_entry), GFP_KERNEL);
|
|
|
|
if (entry == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
memcpy(entry->addr, addr->sa_data, ETH_ALEN);
|
|
|
|
|
2008-02-16 03:56:48 +08:00
|
|
|
if (mutex_lock_interruptible(&acl->lock)) {
|
2005-04-17 06:20:36 +08:00
|
|
|
kfree(entry);
|
|
|
|
return -ERESTARTSYS;
|
|
|
|
}
|
|
|
|
list_add_tail(&entry->_list, &acl->mac_list);
|
|
|
|
acl->size++;
|
2008-02-16 03:56:48 +08:00
|
|
|
mutex_unlock(&acl->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_del_mac(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct sockaddr *awrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct islpci_acl *acl = &priv->acl;
|
|
|
|
struct mac_entry *entry;
|
|
|
|
struct sockaddr *addr = (struct sockaddr *) extra;
|
|
|
|
|
|
|
|
if (addr->sa_family != ARPHRD_ETHER)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2008-02-16 03:56:48 +08:00
|
|
|
if (mutex_lock_interruptible(&acl->lock))
|
2005-04-17 06:20:36 +08:00
|
|
|
return -ERESTARTSYS;
|
2007-07-10 03:03:32 +08:00
|
|
|
list_for_each_entry(entry, &acl->mac_list, _list) {
|
2005-04-17 06:20:36 +08:00
|
|
|
if (memcmp(entry->addr, addr->sa_data, ETH_ALEN) == 0) {
|
2007-07-10 03:03:32 +08:00
|
|
|
list_del(&entry->_list);
|
2005-04-17 06:20:36 +08:00
|
|
|
acl->size--;
|
|
|
|
kfree(entry);
|
2008-02-16 03:56:48 +08:00
|
|
|
mutex_unlock(&acl->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2008-02-16 03:56:48 +08:00
|
|
|
mutex_unlock(&acl->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_mac(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct islpci_acl *acl = &priv->acl;
|
|
|
|
struct mac_entry *entry;
|
|
|
|
struct sockaddr *dst = (struct sockaddr *) extra;
|
|
|
|
|
|
|
|
dwrq->length = 0;
|
|
|
|
|
2008-02-16 03:56:48 +08:00
|
|
|
if (mutex_lock_interruptible(&acl->lock))
|
2005-04-17 06:20:36 +08:00
|
|
|
return -ERESTARTSYS;
|
|
|
|
|
2007-07-10 03:03:32 +08:00
|
|
|
list_for_each_entry(entry, &acl->mac_list, _list) {
|
2005-04-17 06:20:36 +08:00
|
|
|
memcpy(dst->sa_data, entry->addr, ETH_ALEN);
|
|
|
|
dst->sa_family = ARPHRD_ETHER;
|
|
|
|
dwrq->length++;
|
|
|
|
dst++;
|
|
|
|
}
|
2008-02-16 03:56:48 +08:00
|
|
|
mutex_unlock(&acl->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
tree-wide: fix assorted typos all over the place
That is "success", "unknown", "through", "performance", "[re|un]mapping"
, "access", "default", "reasonable", "[con]currently", "temperature"
, "channel", "[un]used", "application", "example","hierarchy", "therefore"
, "[over|under]flow", "contiguous", "threshold", "enough" and others.
Signed-off-by: André Goddard Rosa <andre.goddard@gmail.com>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
2009-11-14 23:09:05 +08:00
|
|
|
/* Setting policy also clears the MAC acl, even if we don't change the default
|
2005-04-17 06:20:36 +08:00
|
|
|
* policy
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_policy(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
__u32 * uwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct islpci_acl *acl = &priv->acl;
|
|
|
|
u32 mlmeautolevel;
|
|
|
|
|
|
|
|
prism54_clear_mac(acl);
|
|
|
|
|
|
|
|
if ((*uwrq < MAC_POLICY_OPEN) || (*uwrq > MAC_POLICY_REJECT))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
down_write(&priv->mib_sem);
|
|
|
|
|
|
|
|
acl->policy = *uwrq;
|
|
|
|
|
|
|
|
/* the ACL code needs an intermediate mlmeautolevel */
|
|
|
|
if ((priv->iw_mode == IW_MODE_MASTER) &&
|
|
|
|
(acl->policy != MAC_POLICY_OPEN))
|
|
|
|
mlmeautolevel = DOT11_MLME_INTERMEDIATE;
|
|
|
|
else
|
|
|
|
mlmeautolevel = CARD_DEFAULT_MLME_MODE;
|
|
|
|
if (priv->wpa)
|
|
|
|
mlmeautolevel = DOT11_MLME_EXTENDED;
|
|
|
|
mgt_set(priv, DOT11_OID_MLMEAUTOLEVEL, &mlmeautolevel);
|
|
|
|
/* restart the card with our new policy */
|
|
|
|
if (mgt_commit(priv)) {
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_policy(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
__u32 * uwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct islpci_acl *acl = &priv->acl;
|
|
|
|
|
|
|
|
*uwrq = acl->policy;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Return 1 only if client should be accepted. */
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_mac_accept(struct islpci_acl *acl, char *mac)
|
|
|
|
{
|
|
|
|
struct mac_entry *entry;
|
|
|
|
int res = 0;
|
|
|
|
|
2008-02-16 03:56:48 +08:00
|
|
|
if (mutex_lock_interruptible(&acl->lock))
|
2005-04-17 06:20:36 +08:00
|
|
|
return -ERESTARTSYS;
|
|
|
|
|
|
|
|
if (acl->policy == MAC_POLICY_OPEN) {
|
2008-02-16 03:56:48 +08:00
|
|
|
mutex_unlock(&acl->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2007-07-10 03:03:32 +08:00
|
|
|
list_for_each_entry(entry, &acl->mac_list, _list) {
|
2005-04-17 06:20:36 +08:00
|
|
|
if (memcmp(entry->addr, mac, ETH_ALEN) == 0) {
|
|
|
|
res = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
res = (acl->policy == MAC_POLICY_ACCEPT) ? !res : res;
|
2008-02-16 03:56:48 +08:00
|
|
|
mutex_unlock(&acl->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_kick_all(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *dwrq, char *extra)
|
|
|
|
{
|
|
|
|
struct obj_mlme *mlme;
|
|
|
|
int rvalue;
|
|
|
|
|
|
|
|
mlme = kmalloc(sizeof (struct obj_mlme), GFP_KERNEL);
|
|
|
|
if (mlme == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
/* Tell the card to kick every client */
|
|
|
|
mlme->id = 0;
|
|
|
|
rvalue =
|
|
|
|
mgt_set_request(netdev_priv(ndev), DOT11_OID_DISASSOCIATE, 0, mlme);
|
|
|
|
kfree(mlme);
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_kick_mac(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct sockaddr *awrq, char *extra)
|
|
|
|
{
|
|
|
|
struct obj_mlme *mlme;
|
|
|
|
struct sockaddr *addr = (struct sockaddr *) extra;
|
|
|
|
int rvalue;
|
|
|
|
|
|
|
|
if (addr->sa_family != ARPHRD_ETHER)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
mlme = kmalloc(sizeof (struct obj_mlme), GFP_KERNEL);
|
|
|
|
if (mlme == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
/* Tell the card to only kick the corresponding bastard */
|
|
|
|
memcpy(mlme->address, addr->sa_data, ETH_ALEN);
|
|
|
|
mlme->id = -1;
|
|
|
|
rvalue =
|
|
|
|
mgt_set_request(netdev_priv(ndev), DOT11_OID_DISASSOCIATE, 0, mlme);
|
|
|
|
|
|
|
|
kfree(mlme);
|
|
|
|
|
|
|
|
return rvalue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Translate a TRAP oid into a wireless event. Called in islpci_mgt_receive. */
|
|
|
|
|
|
|
|
static void
|
|
|
|
format_event(islpci_private *priv, char *dest, const char *str,
|
|
|
|
const struct obj_mlme *mlme, u16 *length, int error)
|
|
|
|
{
|
|
|
|
int n = snprintf(dest, IW_CUSTOM_MAX,
|
2008-10-28 06:59:26 +08:00
|
|
|
"%s %s %pM %s (%2.2X)",
|
2005-04-17 06:20:36 +08:00
|
|
|
str,
|
|
|
|
((priv->iw_mode == IW_MODE_MASTER) ? "from" : "to"),
|
2008-10-28 06:59:26 +08:00
|
|
|
mlme->address,
|
2005-04-17 06:20:36 +08:00
|
|
|
(error ? (mlme->code ? " : REJECTED " : " : ACCEPTED ")
|
|
|
|
: ""), mlme->code);
|
|
|
|
BUG_ON(n > IW_CUSTOM_MAX);
|
|
|
|
*length = n;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
send_formatted_event(islpci_private *priv, const char *str,
|
|
|
|
const struct obj_mlme *mlme, int error)
|
|
|
|
{
|
|
|
|
union iwreq_data wrqu;
|
|
|
|
char *memptr;
|
|
|
|
|
|
|
|
memptr = kmalloc(IW_CUSTOM_MAX, GFP_KERNEL);
|
|
|
|
if (!memptr)
|
|
|
|
return;
|
|
|
|
wrqu.data.pointer = memptr;
|
|
|
|
wrqu.data.length = 0;
|
|
|
|
format_event(priv, memptr, str, mlme, &wrqu.data.length,
|
|
|
|
error);
|
|
|
|
wireless_send_event(priv->ndev, IWEVCUSTOM, &wrqu, memptr);
|
|
|
|
kfree(memptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
send_simple_event(islpci_private *priv, const char *str)
|
|
|
|
{
|
|
|
|
union iwreq_data wrqu;
|
|
|
|
char *memptr;
|
|
|
|
int n = strlen(str);
|
|
|
|
|
|
|
|
memptr = kmalloc(IW_CUSTOM_MAX, GFP_KERNEL);
|
|
|
|
if (!memptr)
|
|
|
|
return;
|
2010-07-10 16:53:38 +08:00
|
|
|
BUG_ON(n >= IW_CUSTOM_MAX);
|
2005-04-17 06:20:36 +08:00
|
|
|
wrqu.data.pointer = memptr;
|
|
|
|
wrqu.data.length = n;
|
|
|
|
strcpy(memptr, str);
|
|
|
|
wireless_send_event(priv->ndev, IWEVCUSTOM, &wrqu, memptr);
|
|
|
|
kfree(memptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
link_changed(struct net_device *ndev, u32 bitrate)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
|
|
|
|
if (bitrate) {
|
2008-04-02 03:17:36 +08:00
|
|
|
netif_carrier_on(ndev);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (priv->iw_mode == IW_MODE_INFRA) {
|
|
|
|
union iwreq_data uwrq;
|
|
|
|
prism54_get_wap(ndev, NULL, (struct sockaddr *) &uwrq,
|
|
|
|
NULL);
|
|
|
|
wireless_send_event(ndev, SIOCGIWAP, &uwrq, NULL);
|
|
|
|
} else
|
|
|
|
send_simple_event(netdev_priv(ndev),
|
|
|
|
"Link established");
|
2008-04-02 03:17:36 +08:00
|
|
|
} else {
|
|
|
|
netif_carrier_off(ndev);
|
2005-04-17 06:20:36 +08:00
|
|
|
send_simple_event(netdev_priv(ndev), "Link lost");
|
2008-04-02 03:17:36 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Beacon/ProbeResp payload header */
|
|
|
|
struct ieee80211_beacon_phdr {
|
|
|
|
u8 timestamp[8];
|
|
|
|
u16 beacon_int;
|
|
|
|
u16 capab_info;
|
2010-06-03 02:10:09 +08:00
|
|
|
} __packed;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
#define WLAN_EID_GENERIC 0xdd
|
|
|
|
static u8 wpa_oid[4] = { 0x00, 0x50, 0xf2, 1 };
|
|
|
|
|
|
|
|
static void
|
2006-07-18 09:21:47 +08:00
|
|
|
prism54_wpa_bss_ie_add(islpci_private *priv, u8 *bssid,
|
|
|
|
u8 *wpa_ie, size_t wpa_ie_len)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct list_head *ptr;
|
|
|
|
struct islpci_bss_wpa_ie *bss = NULL;
|
|
|
|
|
|
|
|
if (wpa_ie_len > MAX_WPA_IE_LEN)
|
|
|
|
wpa_ie_len = MAX_WPA_IE_LEN;
|
|
|
|
|
2008-02-16 03:57:07 +08:00
|
|
|
mutex_lock(&priv->wpa_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* try to use existing entry */
|
|
|
|
list_for_each(ptr, &priv->bss_wpa_list) {
|
|
|
|
bss = list_entry(ptr, struct islpci_bss_wpa_ie, list);
|
|
|
|
if (memcmp(bss->bssid, bssid, ETH_ALEN) == 0) {
|
|
|
|
list_move(&bss->list, &priv->bss_wpa_list);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
bss = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bss == NULL) {
|
|
|
|
/* add a new BSS entry; if max number of entries is already
|
|
|
|
* reached, replace the least recently updated */
|
|
|
|
if (priv->num_bss_wpa >= MAX_BSS_WPA_IE_COUNT) {
|
|
|
|
bss = list_entry(priv->bss_wpa_list.prev,
|
|
|
|
struct islpci_bss_wpa_ie, list);
|
|
|
|
list_del(&bss->list);
|
|
|
|
} else {
|
2006-12-02 19:35:20 +08:00
|
|
|
bss = kzalloc(sizeof (*bss), GFP_ATOMIC);
|
|
|
|
if (bss != NULL)
|
2005-04-17 06:20:36 +08:00
|
|
|
priv->num_bss_wpa++;
|
|
|
|
}
|
|
|
|
if (bss != NULL) {
|
|
|
|
memcpy(bss->bssid, bssid, ETH_ALEN);
|
|
|
|
list_add(&bss->list, &priv->bss_wpa_list);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bss != NULL) {
|
|
|
|
memcpy(bss->wpa_ie, wpa_ie, wpa_ie_len);
|
|
|
|
bss->wpa_ie_len = wpa_ie_len;
|
|
|
|
bss->last_update = jiffies;
|
|
|
|
} else {
|
2007-10-04 08:59:30 +08:00
|
|
|
printk(KERN_DEBUG "Failed to add BSS WPA entry for "
|
2008-10-28 06:59:26 +08:00
|
|
|
"%pM\n", bssid);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* expire old entries from WPA list */
|
|
|
|
while (priv->num_bss_wpa > 0) {
|
|
|
|
bss = list_entry(priv->bss_wpa_list.prev,
|
|
|
|
struct islpci_bss_wpa_ie, list);
|
|
|
|
if (!time_after(jiffies, bss->last_update + 60 * HZ))
|
|
|
|
break;
|
|
|
|
|
|
|
|
list_del(&bss->list);
|
|
|
|
priv->num_bss_wpa--;
|
|
|
|
kfree(bss);
|
|
|
|
}
|
|
|
|
|
2008-02-16 03:57:07 +08:00
|
|
|
mutex_unlock(&priv->wpa_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static size_t
|
2006-07-18 09:21:47 +08:00
|
|
|
prism54_wpa_bss_ie_get(islpci_private *priv, u8 *bssid, u8 *wpa_ie)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct list_head *ptr;
|
|
|
|
struct islpci_bss_wpa_ie *bss = NULL;
|
|
|
|
size_t len = 0;
|
|
|
|
|
2008-02-16 03:57:07 +08:00
|
|
|
mutex_lock(&priv->wpa_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
list_for_each(ptr, &priv->bss_wpa_list) {
|
|
|
|
bss = list_entry(ptr, struct islpci_bss_wpa_ie, list);
|
|
|
|
if (memcmp(bss->bssid, bssid, ETH_ALEN) == 0)
|
|
|
|
break;
|
|
|
|
bss = NULL;
|
|
|
|
}
|
|
|
|
if (bss) {
|
|
|
|
len = bss->wpa_ie_len;
|
|
|
|
memcpy(wpa_ie, bss->wpa_ie, len);
|
|
|
|
}
|
2008-02-16 03:57:07 +08:00
|
|
|
mutex_unlock(&priv->wpa_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2006-07-18 09:21:47 +08:00
|
|
|
prism54_wpa_bss_ie_init(islpci_private *priv)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
INIT_LIST_HEAD(&priv->bss_wpa_list);
|
2008-02-16 03:57:07 +08:00
|
|
|
mutex_init(&priv->wpa_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2006-07-18 09:21:47 +08:00
|
|
|
prism54_wpa_bss_ie_clean(islpci_private *priv)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2007-07-10 03:03:32 +08:00
|
|
|
struct islpci_bss_wpa_ie *bss, *n;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-07-10 03:03:32 +08:00
|
|
|
list_for_each_entry_safe(bss, n, &priv->bss_wpa_list, list) {
|
2005-04-17 06:20:36 +08:00
|
|
|
kfree(bss);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
prism54_process_bss_data(islpci_private *priv, u32 oid, u8 *addr,
|
|
|
|
u8 *payload, size_t len)
|
|
|
|
{
|
|
|
|
struct ieee80211_beacon_phdr *hdr;
|
|
|
|
u8 *pos, *end;
|
|
|
|
|
|
|
|
if (!priv->wpa)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdr = (struct ieee80211_beacon_phdr *) payload;
|
|
|
|
pos = (u8 *) (hdr + 1);
|
|
|
|
end = payload + len;
|
|
|
|
while (pos < end) {
|
|
|
|
if (pos + 2 + pos[1] > end) {
|
|
|
|
printk(KERN_DEBUG "Parsing Beacon/ProbeResp failed "
|
2008-10-28 06:59:26 +08:00
|
|
|
"for %pM\n", addr);
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (pos[0] == WLAN_EID_GENERIC && pos[1] >= 4 &&
|
|
|
|
memcmp(pos + 2, wpa_oid, 4) == 0) {
|
2006-07-18 09:21:47 +08:00
|
|
|
prism54_wpa_bss_ie_add(priv, addr, pos, pos[1] + 2);
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
pos += 2 + pos[1];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
handle_request(islpci_private *priv, struct obj_mlme *mlme, enum oid_num_t oid)
|
|
|
|
{
|
|
|
|
if (((mlme->state == DOT11_STATE_AUTHING) ||
|
|
|
|
(mlme->state == DOT11_STATE_ASSOCING))
|
|
|
|
&& mgt_mlme_answer(priv)) {
|
|
|
|
/* Someone is requesting auth and we must respond. Just send back
|
|
|
|
* the trap with error code set accordingly.
|
|
|
|
*/
|
|
|
|
mlme->code = prism54_mac_accept(&priv->acl,
|
|
|
|
mlme->address) ? 0 : 1;
|
|
|
|
mgt_set_request(priv, oid, 0, mlme);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_process_trap_helper(islpci_private *priv, enum oid_num_t oid,
|
|
|
|
char *data)
|
|
|
|
{
|
|
|
|
struct obj_mlme *mlme = (struct obj_mlme *) data;
|
|
|
|
struct obj_mlmeex *mlmeex = (struct obj_mlmeex *) data;
|
|
|
|
struct obj_mlmeex *confirm;
|
|
|
|
u8 wpa_ie[MAX_WPA_IE_LEN];
|
|
|
|
int wpa_ie_len;
|
|
|
|
size_t len = 0; /* u16, better? */
|
|
|
|
u8 *payload = NULL, *pos = NULL;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* I think all trapable objects are listed here.
|
|
|
|
* Some oids have a EX version. The difference is that they are emitted
|
|
|
|
* in DOT11_MLME_EXTENDED mode (set with DOT11_OID_MLMEAUTOLEVEL)
|
|
|
|
* with more info.
|
|
|
|
* The few events already defined by the wireless tools are not really
|
|
|
|
* suited. We use the more flexible custom event facility.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (oid >= DOT11_OID_BEACON) {
|
|
|
|
len = mlmeex->size;
|
|
|
|
payload = pos = mlmeex->data;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* I fear prism54_process_bss_data won't work with big endian data */
|
|
|
|
if ((oid == DOT11_OID_BEACON) || (oid == DOT11_OID_PROBE))
|
|
|
|
prism54_process_bss_data(priv, oid, mlmeex->address,
|
|
|
|
payload, len);
|
|
|
|
|
|
|
|
mgt_le_to_cpu(isl_oid[oid].flags & OID_FLAG_TYPE, (void *) mlme);
|
|
|
|
|
|
|
|
switch (oid) {
|
|
|
|
|
|
|
|
case GEN_OID_LINKSTATE:
|
|
|
|
link_changed(priv->ndev, (u32) *data);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_MICFAILURE:
|
|
|
|
send_simple_event(priv, "Mic failure");
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_DEAUTHENTICATE:
|
|
|
|
send_formatted_event(priv, "DeAuthenticate request", mlme, 0);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_AUTHENTICATE:
|
|
|
|
handle_request(priv, mlme, oid);
|
|
|
|
send_formatted_event(priv, "Authenticate request", mlme, 1);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_DISASSOCIATE:
|
|
|
|
send_formatted_event(priv, "Disassociate request", mlme, 0);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_ASSOCIATE:
|
|
|
|
handle_request(priv, mlme, oid);
|
|
|
|
send_formatted_event(priv, "Associate request", mlme, 1);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_REASSOCIATE:
|
|
|
|
handle_request(priv, mlme, oid);
|
|
|
|
send_formatted_event(priv, "ReAssociate request", mlme, 1);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_BEACON:
|
|
|
|
send_formatted_event(priv,
|
tree-wide: fix assorted typos all over the place
That is "success", "unknown", "through", "performance", "[re|un]mapping"
, "access", "default", "reasonable", "[con]currently", "temperature"
, "channel", "[un]used", "application", "example","hierarchy", "therefore"
, "[over|under]flow", "contiguous", "threshold", "enough" and others.
Signed-off-by: André Goddard Rosa <andre.goddard@gmail.com>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
2009-11-14 23:09:05 +08:00
|
|
|
"Received a beacon from an unknown AP",
|
2005-04-17 06:20:36 +08:00
|
|
|
mlme, 0);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_PROBE:
|
|
|
|
/* we received a probe from a client. */
|
|
|
|
send_formatted_event(priv, "Received a probe from client", mlme,
|
|
|
|
0);
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* Note : "mlme" is actually a "struct obj_mlmeex *" here, but this
|
|
|
|
* is backward compatible layout-wise with "struct obj_mlme".
|
|
|
|
*/
|
|
|
|
|
|
|
|
case DOT11_OID_DEAUTHENTICATEEX:
|
|
|
|
send_formatted_event(priv, "DeAuthenticate request", mlme, 0);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_AUTHENTICATEEX:
|
|
|
|
handle_request(priv, mlme, oid);
|
|
|
|
send_formatted_event(priv, "Authenticate request (ex)", mlme, 1);
|
|
|
|
|
2006-10-08 12:38:15 +08:00
|
|
|
if (priv->iw_mode != IW_MODE_MASTER
|
2005-04-17 06:20:36 +08:00
|
|
|
&& mlmeex->state != DOT11_STATE_AUTHING)
|
|
|
|
break;
|
|
|
|
|
|
|
|
confirm = kmalloc(sizeof(struct obj_mlmeex) + 6, GFP_ATOMIC);
|
|
|
|
|
2006-10-08 12:38:15 +08:00
|
|
|
if (!confirm)
|
2005-04-17 06:20:36 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
memcpy(&confirm->address, mlmeex->address, ETH_ALEN);
|
2008-10-28 06:59:26 +08:00
|
|
|
printk(KERN_DEBUG "Authenticate from: address:\t%pM\n",
|
|
|
|
mlmeex->address);
|
2005-04-17 06:20:36 +08:00
|
|
|
confirm->id = -1; /* or mlmeex->id ? */
|
|
|
|
confirm->state = 0; /* not used */
|
|
|
|
confirm->code = 0;
|
|
|
|
confirm->size = 6;
|
|
|
|
confirm->data[0] = 0x00;
|
|
|
|
confirm->data[1] = 0x00;
|
|
|
|
confirm->data[2] = 0x02;
|
|
|
|
confirm->data[3] = 0x00;
|
|
|
|
confirm->data[4] = 0x00;
|
|
|
|
confirm->data[5] = 0x00;
|
|
|
|
|
|
|
|
ret = mgt_set_varlen(priv, DOT11_OID_ASSOCIATEEX, confirm, 6);
|
|
|
|
|
|
|
|
kfree(confirm);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_DISASSOCIATEEX:
|
|
|
|
send_formatted_event(priv, "Disassociate request (ex)", mlme, 0);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_ASSOCIATEEX:
|
|
|
|
handle_request(priv, mlme, oid);
|
|
|
|
send_formatted_event(priv, "Associate request (ex)", mlme, 1);
|
|
|
|
|
2006-10-08 12:38:15 +08:00
|
|
|
if (priv->iw_mode != IW_MODE_MASTER
|
2006-07-18 09:21:47 +08:00
|
|
|
&& mlmeex->state != DOT11_STATE_ASSOCING)
|
2005-04-17 06:20:36 +08:00
|
|
|
break;
|
2006-10-08 12:38:15 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
confirm = kmalloc(sizeof(struct obj_mlmeex), GFP_ATOMIC);
|
|
|
|
|
|
|
|
if (!confirm)
|
|
|
|
break;
|
|
|
|
|
|
|
|
memcpy(&confirm->address, mlmeex->address, ETH_ALEN);
|
|
|
|
|
|
|
|
confirm->id = ((struct obj_mlmeex *)mlme)->id;
|
|
|
|
confirm->state = 0; /* not used */
|
|
|
|
confirm->code = 0;
|
|
|
|
|
2006-07-18 09:21:47 +08:00
|
|
|
wpa_ie_len = prism54_wpa_bss_ie_get(priv, mlmeex->address, wpa_ie);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
if (!wpa_ie_len) {
|
2008-10-28 06:59:26 +08:00
|
|
|
printk(KERN_DEBUG "No WPA IE found from address:\t%pM\n",
|
|
|
|
mlmeex->address);
|
2005-04-17 06:20:36 +08:00
|
|
|
kfree(confirm);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
confirm->size = wpa_ie_len;
|
|
|
|
memcpy(&confirm->data, wpa_ie, wpa_ie_len);
|
|
|
|
|
|
|
|
mgt_set_varlen(priv, oid, confirm, wpa_ie_len);
|
|
|
|
|
|
|
|
kfree(confirm);
|
2006-10-08 12:38:15 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DOT11_OID_REASSOCIATEEX:
|
|
|
|
handle_request(priv, mlme, oid);
|
|
|
|
send_formatted_event(priv, "Reassociate request (ex)", mlme, 1);
|
|
|
|
|
2006-10-08 12:38:15 +08:00
|
|
|
if (priv->iw_mode != IW_MODE_MASTER
|
2005-04-17 06:20:36 +08:00
|
|
|
&& mlmeex->state != DOT11_STATE_ASSOCING)
|
|
|
|
break;
|
|
|
|
|
|
|
|
confirm = kmalloc(sizeof(struct obj_mlmeex), GFP_ATOMIC);
|
|
|
|
|
|
|
|
if (!confirm)
|
|
|
|
break;
|
|
|
|
|
|
|
|
memcpy(&confirm->address, mlmeex->address, ETH_ALEN);
|
|
|
|
|
|
|
|
confirm->id = mlmeex->id;
|
|
|
|
confirm->state = 0; /* not used */
|
|
|
|
confirm->code = 0;
|
|
|
|
|
2006-07-18 09:21:47 +08:00
|
|
|
wpa_ie_len = prism54_wpa_bss_ie_get(priv, mlmeex->address, wpa_ie);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
if (!wpa_ie_len) {
|
2008-10-28 06:59:26 +08:00
|
|
|
printk(KERN_DEBUG "No WPA IE found from address:\t%pM\n",
|
|
|
|
mlmeex->address);
|
2005-04-17 06:20:36 +08:00
|
|
|
kfree(confirm);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2006-10-08 12:38:15 +08:00
|
|
|
confirm->size = wpa_ie_len;
|
2005-04-17 06:20:36 +08:00
|
|
|
memcpy(&confirm->data, wpa_ie, wpa_ie_len);
|
|
|
|
|
|
|
|
mgt_set_varlen(priv, oid, confirm, wpa_ie_len);
|
|
|
|
|
|
|
|
kfree(confirm);
|
2006-10-08 12:38:15 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Process a device trap. This is called via schedule_work(), outside of
|
|
|
|
* interrupt context, no locks held.
|
|
|
|
*/
|
|
|
|
void
|
2006-11-22 22:57:56 +08:00
|
|
|
prism54_process_trap(struct work_struct *work)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2006-11-22 22:57:56 +08:00
|
|
|
struct islpci_mgmtframe *frame =
|
|
|
|
container_of(work, struct islpci_mgmtframe, ws);
|
2005-04-17 06:20:36 +08:00
|
|
|
struct net_device *ndev = frame->ndev;
|
|
|
|
enum oid_num_t n = mgt_oidtonum(frame->header->oid);
|
|
|
|
|
|
|
|
if (n != OID_NUM_LAST)
|
|
|
|
prism54_process_trap_helper(netdev_priv(ndev), n, frame->data);
|
|
|
|
islpci_mgt_release(frame);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
prism54_set_mac_address(struct net_device *ndev, void *addr)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (ndev->addr_len != 6)
|
|
|
|
return -EINVAL;
|
|
|
|
ret = mgt_set_request(priv, GEN_OID_MACADDRESS, 0,
|
|
|
|
&((struct sockaddr *) addr)->sa_data);
|
|
|
|
if (!ret)
|
|
|
|
memcpy(priv->ndev->dev_addr,
|
|
|
|
&((struct sockaddr *) addr)->sa_data, 6);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define PRISM54_SET_WPA SIOCIWFIRSTPRIV+12
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_wpa(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
__u32 * uwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
u32 mlme, authen, dot1x, filter, wep;
|
|
|
|
|
|
|
|
if (islpci_get_state(priv) < PRV_STATE_INIT)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
wep = 1; /* For privacy invoked */
|
|
|
|
filter = 1; /* Filter out all unencrypted frames */
|
|
|
|
dot1x = 0x01; /* To enable eap filter */
|
|
|
|
mlme = DOT11_MLME_EXTENDED;
|
|
|
|
authen = DOT11_AUTH_OS; /* Only WEP uses _SK and _BOTH */
|
|
|
|
|
|
|
|
down_write(&priv->mib_sem);
|
|
|
|
priv->wpa = *uwrq;
|
|
|
|
|
|
|
|
switch (priv->wpa) {
|
|
|
|
default:
|
|
|
|
case 0: /* Clears/disables WPA and friends */
|
|
|
|
wep = 0;
|
|
|
|
filter = 0; /* Do not filter un-encrypted data */
|
|
|
|
dot1x = 0;
|
|
|
|
mlme = DOT11_MLME_AUTO;
|
|
|
|
printk("%s: Disabling WPA\n", ndev->name);
|
|
|
|
break;
|
2006-10-08 12:38:15 +08:00
|
|
|
case 2:
|
2005-04-17 06:20:36 +08:00
|
|
|
case 1: /* WPA */
|
|
|
|
printk("%s: Enabling WPA\n", ndev->name);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
|
|
|
|
mgt_set_request(priv, DOT11_OID_AUTHENABLE, 0, &authen);
|
|
|
|
mgt_set_request(priv, DOT11_OID_PRIVACYINVOKED, 0, &wep);
|
|
|
|
mgt_set_request(priv, DOT11_OID_EXUNENCRYPTED, 0, &filter);
|
|
|
|
mgt_set_request(priv, DOT11_OID_DOT1XENABLE, 0, &dot1x);
|
|
|
|
mgt_set_request(priv, DOT11_OID_MLMEAUTOLEVEL, 0, &mlme);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_wpa(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
__u32 * uwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
*uwrq = priv->wpa;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_prismhdr(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
__u32 * uwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
priv->monitor_type =
|
|
|
|
(*uwrq ? ARPHRD_IEEE80211_PRISM : ARPHRD_IEEE80211);
|
|
|
|
if (priv->iw_mode == IW_MODE_MONITOR)
|
|
|
|
priv->ndev->type = priv->monitor_type;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_get_prismhdr(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
__u32 * uwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
*uwrq = (priv->monitor_type == ARPHRD_IEEE80211_PRISM);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_debug_oid(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
__u32 * uwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
|
|
|
|
priv->priv_oid = *uwrq;
|
|
|
|
printk("%s: oid 0x%08X\n", ndev->name, *uwrq);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_debug_get_oid(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *data, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct islpci_mgmtframe *response;
|
|
|
|
int ret = -EIO;
|
|
|
|
|
|
|
|
printk("%s: get_oid 0x%08X\n", ndev->name, priv->priv_oid);
|
|
|
|
data->length = 0;
|
|
|
|
|
|
|
|
if (islpci_get_state(priv) >= PRV_STATE_INIT) {
|
|
|
|
ret =
|
|
|
|
islpci_mgt_transaction(priv->ndev, PIMFOR_OP_GET,
|
|
|
|
priv->priv_oid, extra, 256,
|
|
|
|
&response);
|
|
|
|
printk("%s: ret: %i\n", ndev->name, ret);
|
|
|
|
if (ret || !response
|
|
|
|
|| response->header->operation == PIMFOR_OP_ERROR) {
|
|
|
|
if (response) {
|
|
|
|
islpci_mgt_release(response);
|
|
|
|
}
|
|
|
|
printk("%s: EIO\n", ndev->name);
|
|
|
|
ret = -EIO;
|
|
|
|
}
|
|
|
|
if (!ret) {
|
|
|
|
data->length = response->header->length;
|
|
|
|
memcpy(extra, response->data, data->length);
|
|
|
|
islpci_mgt_release(response);
|
|
|
|
printk("%s: len: %i\n", ndev->name, data->length);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_debug_set_oid(struct net_device *ndev, struct iw_request_info *info,
|
|
|
|
struct iw_point *data, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
|
|
|
struct islpci_mgmtframe *response;
|
|
|
|
int ret = 0, response_op = PIMFOR_OP_ERROR;
|
|
|
|
|
|
|
|
printk("%s: set_oid 0x%08X\tlen: %d\n", ndev->name, priv->priv_oid,
|
|
|
|
data->length);
|
|
|
|
|
|
|
|
if (islpci_get_state(priv) >= PRV_STATE_INIT) {
|
|
|
|
ret =
|
|
|
|
islpci_mgt_transaction(priv->ndev, PIMFOR_OP_SET,
|
|
|
|
priv->priv_oid, extra, data->length,
|
|
|
|
&response);
|
|
|
|
printk("%s: ret: %i\n", ndev->name, ret);
|
|
|
|
if (ret || !response
|
|
|
|
|| response->header->operation == PIMFOR_OP_ERROR) {
|
|
|
|
if (response) {
|
|
|
|
islpci_mgt_release(response);
|
|
|
|
}
|
|
|
|
printk("%s: EIO\n", ndev->name);
|
|
|
|
ret = -EIO;
|
|
|
|
}
|
|
|
|
if (!ret) {
|
|
|
|
response_op = response->header->operation;
|
|
|
|
printk("%s: response_op: %i\n", ndev->name,
|
|
|
|
response_op);
|
|
|
|
islpci_mgt_release(response);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return (ret ? ret : -EINPROGRESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
prism54_set_spy(struct net_device *ndev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
union iwreq_data *uwrq, char *extra)
|
|
|
|
{
|
|
|
|
islpci_private *priv = netdev_priv(ndev);
|
2009-02-14 19:50:45 +08:00
|
|
|
u32 u;
|
|
|
|
enum oid_num_t oid = OID_INL_CONFIG;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
down_write(&priv->mib_sem);
|
|
|
|
mgt_get(priv, OID_INL_CONFIG, &u);
|
|
|
|
|
|
|
|
if ((uwrq->data.length == 0) && (priv->spy_data.spy_number > 0))
|
|
|
|
/* disable spy */
|
|
|
|
u &= ~INL_CONFIG_RXANNEX;
|
|
|
|
else if ((uwrq->data.length > 0) && (priv->spy_data.spy_number == 0))
|
|
|
|
/* enable spy */
|
|
|
|
u |= INL_CONFIG_RXANNEX;
|
|
|
|
|
|
|
|
mgt_set(priv, OID_INL_CONFIG, &u);
|
|
|
|
mgt_commit_list(priv, &oid, 1);
|
|
|
|
up_write(&priv->mib_sem);
|
|
|
|
|
|
|
|
return iw_handler_set_spy(ndev, info, uwrq, extra);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const iw_handler prism54_handler[] = {
|
|
|
|
(iw_handler) prism54_commit, /* SIOCSIWCOMMIT */
|
|
|
|
(iw_handler) prism54_get_name, /* SIOCGIWNAME */
|
|
|
|
(iw_handler) NULL, /* SIOCSIWNWID */
|
|
|
|
(iw_handler) NULL, /* SIOCGIWNWID */
|
|
|
|
(iw_handler) prism54_set_freq, /* SIOCSIWFREQ */
|
|
|
|
(iw_handler) prism54_get_freq, /* SIOCGIWFREQ */
|
|
|
|
(iw_handler) prism54_set_mode, /* SIOCSIWMODE */
|
|
|
|
(iw_handler) prism54_get_mode, /* SIOCGIWMODE */
|
|
|
|
(iw_handler) prism54_set_sens, /* SIOCSIWSENS */
|
|
|
|
(iw_handler) prism54_get_sens, /* SIOCGIWSENS */
|
|
|
|
(iw_handler) NULL, /* SIOCSIWRANGE */
|
|
|
|
(iw_handler) prism54_get_range, /* SIOCGIWRANGE */
|
|
|
|
(iw_handler) NULL, /* SIOCSIWPRIV */
|
|
|
|
(iw_handler) NULL, /* SIOCGIWPRIV */
|
|
|
|
(iw_handler) NULL, /* SIOCSIWSTATS */
|
|
|
|
(iw_handler) NULL, /* SIOCGIWSTATS */
|
|
|
|
prism54_set_spy, /* SIOCSIWSPY */
|
|
|
|
iw_handler_get_spy, /* SIOCGIWSPY */
|
|
|
|
iw_handler_set_thrspy, /* SIOCSIWTHRSPY */
|
|
|
|
iw_handler_get_thrspy, /* SIOCGIWTHRSPY */
|
|
|
|
(iw_handler) prism54_set_wap, /* SIOCSIWAP */
|
|
|
|
(iw_handler) prism54_get_wap, /* SIOCGIWAP */
|
|
|
|
(iw_handler) NULL, /* -- hole -- */
|
2007-05-09 13:18:01 +08:00
|
|
|
(iw_handler) NULL, /* SIOCGIWAPLIST deprecated */
|
2005-04-17 06:20:36 +08:00
|
|
|
(iw_handler) prism54_set_scan, /* SIOCSIWSCAN */
|
|
|
|
(iw_handler) prism54_get_scan, /* SIOCGIWSCAN */
|
|
|
|
(iw_handler) prism54_set_essid, /* SIOCSIWESSID */
|
|
|
|
(iw_handler) prism54_get_essid, /* SIOCGIWESSID */
|
|
|
|
(iw_handler) prism54_set_nick, /* SIOCSIWNICKN */
|
|
|
|
(iw_handler) prism54_get_nick, /* SIOCGIWNICKN */
|
|
|
|
(iw_handler) NULL, /* -- hole -- */
|
|
|
|
(iw_handler) NULL, /* -- hole -- */
|
|
|
|
(iw_handler) prism54_set_rate, /* SIOCSIWRATE */
|
|
|
|
(iw_handler) prism54_get_rate, /* SIOCGIWRATE */
|
|
|
|
(iw_handler) prism54_set_rts, /* SIOCSIWRTS */
|
|
|
|
(iw_handler) prism54_get_rts, /* SIOCGIWRTS */
|
|
|
|
(iw_handler) prism54_set_frag, /* SIOCSIWFRAG */
|
|
|
|
(iw_handler) prism54_get_frag, /* SIOCGIWFRAG */
|
|
|
|
(iw_handler) prism54_set_txpower, /* SIOCSIWTXPOW */
|
|
|
|
(iw_handler) prism54_get_txpower, /* SIOCGIWTXPOW */
|
|
|
|
(iw_handler) prism54_set_retry, /* SIOCSIWRETRY */
|
|
|
|
(iw_handler) prism54_get_retry, /* SIOCGIWRETRY */
|
|
|
|
(iw_handler) prism54_set_encode, /* SIOCSIWENCODE */
|
|
|
|
(iw_handler) prism54_get_encode, /* SIOCGIWENCODE */
|
|
|
|
(iw_handler) NULL, /* SIOCSIWPOWER */
|
|
|
|
(iw_handler) NULL, /* SIOCGIWPOWER */
|
2006-07-18 09:21:47 +08:00
|
|
|
NULL, /* -- hole -- */
|
|
|
|
NULL, /* -- hole -- */
|
|
|
|
(iw_handler) prism54_set_genie, /* SIOCSIWGENIE */
|
|
|
|
(iw_handler) prism54_get_genie, /* SIOCGIWGENIE */
|
|
|
|
(iw_handler) prism54_set_auth, /* SIOCSIWAUTH */
|
|
|
|
(iw_handler) prism54_get_auth, /* SIOCGIWAUTH */
|
|
|
|
(iw_handler) prism54_set_encodeext, /* SIOCSIWENCODEEXT */
|
|
|
|
(iw_handler) prism54_get_encodeext, /* SIOCGIWENCODEEXT */
|
|
|
|
NULL, /* SIOCSIWPMKSA */
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/* The low order bit identify a SET (0) or a GET (1) ioctl. */
|
|
|
|
|
|
|
|
#define PRISM54_RESET SIOCIWFIRSTPRIV
|
|
|
|
#define PRISM54_GET_POLICY SIOCIWFIRSTPRIV+1
|
|
|
|
#define PRISM54_SET_POLICY SIOCIWFIRSTPRIV+2
|
|
|
|
#define PRISM54_GET_MAC SIOCIWFIRSTPRIV+3
|
|
|
|
#define PRISM54_ADD_MAC SIOCIWFIRSTPRIV+4
|
|
|
|
|
|
|
|
#define PRISM54_DEL_MAC SIOCIWFIRSTPRIV+6
|
|
|
|
|
|
|
|
#define PRISM54_KICK_MAC SIOCIWFIRSTPRIV+8
|
|
|
|
|
|
|
|
#define PRISM54_KICK_ALL SIOCIWFIRSTPRIV+10
|
|
|
|
|
|
|
|
#define PRISM54_GET_WPA SIOCIWFIRSTPRIV+11
|
|
|
|
#define PRISM54_SET_WPA SIOCIWFIRSTPRIV+12
|
|
|
|
|
|
|
|
#define PRISM54_DBG_OID SIOCIWFIRSTPRIV+14
|
|
|
|
#define PRISM54_DBG_GET_OID SIOCIWFIRSTPRIV+15
|
|
|
|
#define PRISM54_DBG_SET_OID SIOCIWFIRSTPRIV+16
|
|
|
|
|
|
|
|
#define PRISM54_GET_OID SIOCIWFIRSTPRIV+17
|
|
|
|
#define PRISM54_SET_OID_U32 SIOCIWFIRSTPRIV+18
|
|
|
|
#define PRISM54_SET_OID_STR SIOCIWFIRSTPRIV+20
|
|
|
|
#define PRISM54_SET_OID_ADDR SIOCIWFIRSTPRIV+22
|
|
|
|
|
|
|
|
#define PRISM54_GET_PRISMHDR SIOCIWFIRSTPRIV+23
|
|
|
|
#define PRISM54_SET_PRISMHDR SIOCIWFIRSTPRIV+24
|
|
|
|
|
|
|
|
#define IWPRIV_SET_U32(n,x) { n, IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "s_"x }
|
|
|
|
#define IWPRIV_SET_SSID(n,x) { n, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | 1, 0, "s_"x }
|
|
|
|
#define IWPRIV_SET_ADDR(n,x) { n, IW_PRIV_TYPE_ADDR | IW_PRIV_SIZE_FIXED | 1, 0, "s_"x }
|
|
|
|
#define IWPRIV_GET(n,x) { n, 0, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | PRIV_STR_SIZE, "g_"x }
|
|
|
|
|
|
|
|
#define IWPRIV_U32(n,x) IWPRIV_SET_U32(n,x), IWPRIV_GET(n,x)
|
|
|
|
#define IWPRIV_SSID(n,x) IWPRIV_SET_SSID(n,x), IWPRIV_GET(n,x)
|
|
|
|
#define IWPRIV_ADDR(n,x) IWPRIV_SET_ADDR(n,x), IWPRIV_GET(n,x)
|
|
|
|
|
|
|
|
/* Note : limited to 128 private ioctls (wireless tools 26) */
|
|
|
|
|
|
|
|
static const struct iw_priv_args prism54_private_args[] = {
|
|
|
|
/*{ cmd, set_args, get_args, name } */
|
|
|
|
{PRISM54_RESET, 0, 0, "reset"},
|
|
|
|
{PRISM54_GET_PRISMHDR, 0, IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1,
|
|
|
|
"get_prismhdr"},
|
|
|
|
{PRISM54_SET_PRISMHDR, IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0,
|
|
|
|
"set_prismhdr"},
|
|
|
|
{PRISM54_GET_POLICY, 0, IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1,
|
|
|
|
"getPolicy"},
|
|
|
|
{PRISM54_SET_POLICY, IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0,
|
|
|
|
"setPolicy"},
|
|
|
|
{PRISM54_GET_MAC, 0, IW_PRIV_TYPE_ADDR | 64, "getMac"},
|
|
|
|
{PRISM54_ADD_MAC, IW_PRIV_TYPE_ADDR | IW_PRIV_SIZE_FIXED | 1, 0,
|
|
|
|
"addMac"},
|
|
|
|
{PRISM54_DEL_MAC, IW_PRIV_TYPE_ADDR | IW_PRIV_SIZE_FIXED | 1, 0,
|
|
|
|
"delMac"},
|
|
|
|
{PRISM54_KICK_MAC, IW_PRIV_TYPE_ADDR | IW_PRIV_SIZE_FIXED | 1, 0,
|
|
|
|
"kickMac"},
|
|
|
|
{PRISM54_KICK_ALL, 0, 0, "kickAll"},
|
|
|
|
{PRISM54_GET_WPA, 0, IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1,
|
|
|
|
"get_wpa"},
|
|
|
|
{PRISM54_SET_WPA, IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0,
|
|
|
|
"set_wpa"},
|
|
|
|
{PRISM54_DBG_OID, IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0,
|
|
|
|
"dbg_oid"},
|
|
|
|
{PRISM54_DBG_GET_OID, 0, IW_PRIV_TYPE_BYTE | 256, "dbg_get_oid"},
|
|
|
|
{PRISM54_DBG_SET_OID, IW_PRIV_TYPE_BYTE | 256, 0, "dbg_set_oid"},
|
|
|
|
/* --- sub-ioctls handlers --- */
|
|
|
|
{PRISM54_GET_OID,
|
|
|
|
0, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | PRIV_STR_SIZE, ""},
|
|
|
|
{PRISM54_SET_OID_U32,
|
|
|
|
IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, ""},
|
|
|
|
{PRISM54_SET_OID_STR,
|
|
|
|
IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | 1, 0, ""},
|
|
|
|
{PRISM54_SET_OID_ADDR,
|
|
|
|
IW_PRIV_TYPE_ADDR | IW_PRIV_SIZE_FIXED | 1, 0, ""},
|
|
|
|
/* --- sub-ioctls definitions --- */
|
|
|
|
IWPRIV_ADDR(GEN_OID_MACADDRESS, "addr"),
|
|
|
|
IWPRIV_GET(GEN_OID_LINKSTATE, "linkstate"),
|
|
|
|
IWPRIV_U32(DOT11_OID_BSSTYPE, "bsstype"),
|
|
|
|
IWPRIV_ADDR(DOT11_OID_BSSID, "bssid"),
|
|
|
|
IWPRIV_U32(DOT11_OID_STATE, "state"),
|
|
|
|
IWPRIV_U32(DOT11_OID_AID, "aid"),
|
|
|
|
|
|
|
|
IWPRIV_SSID(DOT11_OID_SSIDOVERRIDE, "ssidoverride"),
|
|
|
|
|
|
|
|
IWPRIV_U32(DOT11_OID_MEDIUMLIMIT, "medlimit"),
|
|
|
|
IWPRIV_U32(DOT11_OID_BEACONPERIOD, "beacon"),
|
|
|
|
IWPRIV_U32(DOT11_OID_DTIMPERIOD, "dtimperiod"),
|
|
|
|
|
|
|
|
IWPRIV_U32(DOT11_OID_AUTHENABLE, "authenable"),
|
|
|
|
IWPRIV_U32(DOT11_OID_PRIVACYINVOKED, "privinvok"),
|
|
|
|
IWPRIV_U32(DOT11_OID_EXUNENCRYPTED, "exunencrypt"),
|
|
|
|
|
|
|
|
IWPRIV_U32(DOT11_OID_REKEYTHRESHOLD, "rekeythresh"),
|
|
|
|
|
|
|
|
IWPRIV_U32(DOT11_OID_MAXTXLIFETIME, "maxtxlife"),
|
|
|
|
IWPRIV_U32(DOT11_OID_MAXRXLIFETIME, "maxrxlife"),
|
|
|
|
IWPRIV_U32(DOT11_OID_ALOFT_FIXEDRATE, "fixedrate"),
|
|
|
|
IWPRIV_U32(DOT11_OID_MAXFRAMEBURST, "frameburst"),
|
|
|
|
IWPRIV_U32(DOT11_OID_PSM, "psm"),
|
|
|
|
|
|
|
|
IWPRIV_U32(DOT11_OID_BRIDGELOCAL, "bridge"),
|
|
|
|
IWPRIV_U32(DOT11_OID_CLIENTS, "clients"),
|
|
|
|
IWPRIV_U32(DOT11_OID_CLIENTSASSOCIATED, "clientassoc"),
|
|
|
|
IWPRIV_U32(DOT11_OID_DOT1XENABLE, "dot1xenable"),
|
|
|
|
IWPRIV_U32(DOT11_OID_ANTENNARX, "rxant"),
|
|
|
|
IWPRIV_U32(DOT11_OID_ANTENNATX, "txant"),
|
|
|
|
IWPRIV_U32(DOT11_OID_ANTENNADIVERSITY, "antdivers"),
|
|
|
|
IWPRIV_U32(DOT11_OID_EDTHRESHOLD, "edthresh"),
|
|
|
|
IWPRIV_U32(DOT11_OID_PREAMBLESETTINGS, "preamble"),
|
|
|
|
IWPRIV_GET(DOT11_OID_RATES, "rates"),
|
|
|
|
IWPRIV_U32(DOT11_OID_OUTPUTPOWER, ".11outpower"),
|
|
|
|
IWPRIV_GET(DOT11_OID_SUPPORTEDRATES, "supprates"),
|
|
|
|
IWPRIV_GET(DOT11_OID_SUPPORTEDFREQUENCIES, "suppfreq"),
|
|
|
|
|
|
|
|
IWPRIV_U32(DOT11_OID_NOISEFLOOR, "noisefloor"),
|
|
|
|
IWPRIV_GET(DOT11_OID_FREQUENCYACTIVITY, "freqactivity"),
|
|
|
|
IWPRIV_U32(DOT11_OID_NONERPPROTECTION, "nonerpprotec"),
|
|
|
|
IWPRIV_U32(DOT11_OID_PROFILES, "profile"),
|
|
|
|
IWPRIV_GET(DOT11_OID_EXTENDEDRATES, "extrates"),
|
|
|
|
IWPRIV_U32(DOT11_OID_MLMEAUTOLEVEL, "mlmelevel"),
|
|
|
|
|
|
|
|
IWPRIV_GET(DOT11_OID_BSSS, "bsss"),
|
|
|
|
IWPRIV_GET(DOT11_OID_BSSLIST, "bsslist"),
|
|
|
|
IWPRIV_U32(OID_INL_MODE, "mode"),
|
|
|
|
IWPRIV_U32(OID_INL_CONFIG, "config"),
|
|
|
|
IWPRIV_U32(OID_INL_DOT11D_CONFORMANCE, ".11dconform"),
|
|
|
|
IWPRIV_GET(OID_INL_PHYCAPABILITIES, "phycapa"),
|
|
|
|
IWPRIV_U32(OID_INL_OUTPUTPOWER, "outpower"),
|
|
|
|
};
|
|
|
|
|
|
|
|
static const iw_handler prism54_private_handler[] = {
|
|
|
|
(iw_handler) prism54_reset,
|
|
|
|
(iw_handler) prism54_get_policy,
|
|
|
|
(iw_handler) prism54_set_policy,
|
|
|
|
(iw_handler) prism54_get_mac,
|
|
|
|
(iw_handler) prism54_add_mac,
|
|
|
|
(iw_handler) NULL,
|
|
|
|
(iw_handler) prism54_del_mac,
|
|
|
|
(iw_handler) NULL,
|
|
|
|
(iw_handler) prism54_kick_mac,
|
|
|
|
(iw_handler) NULL,
|
|
|
|
(iw_handler) prism54_kick_all,
|
|
|
|
(iw_handler) prism54_get_wpa,
|
|
|
|
(iw_handler) prism54_set_wpa,
|
|
|
|
(iw_handler) NULL,
|
|
|
|
(iw_handler) prism54_debug_oid,
|
|
|
|
(iw_handler) prism54_debug_get_oid,
|
|
|
|
(iw_handler) prism54_debug_set_oid,
|
|
|
|
(iw_handler) prism54_get_oid,
|
|
|
|
(iw_handler) prism54_set_u32,
|
|
|
|
(iw_handler) NULL,
|
|
|
|
(iw_handler) prism54_set_raw,
|
|
|
|
(iw_handler) NULL,
|
|
|
|
(iw_handler) prism54_set_raw,
|
|
|
|
(iw_handler) prism54_get_prismhdr,
|
|
|
|
(iw_handler) prism54_set_prismhdr,
|
|
|
|
};
|
|
|
|
|
|
|
|
const struct iw_handler_def prism54_handler_def = {
|
2007-09-02 18:30:18 +08:00
|
|
|
.num_standard = ARRAY_SIZE(prism54_handler),
|
|
|
|
.num_private = ARRAY_SIZE(prism54_private_handler),
|
|
|
|
.num_private_args = ARRAY_SIZE(prism54_private_args),
|
2005-04-17 06:20:36 +08:00
|
|
|
.standard = (iw_handler *) prism54_handler,
|
|
|
|
.private = (iw_handler *) prism54_private_handler,
|
|
|
|
.private_args = (struct iw_priv_args *) prism54_private_args,
|
2005-09-03 02:42:56 +08:00
|
|
|
.get_wireless_stats = prism54_get_wireless_stats,
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|