Add the rt linux 4.1.3-rt3 as base
[kvmfornfv.git] / kernel / drivers / staging / rtl8712 / mlme_linux.c
1 /******************************************************************************
2  * mlme_linux.c
3  *
4  * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
5  * Linux device driver for RTL8192SU
6  *
7  * This program is free software; you can redistribute it and/or modify it
8  * under the terms of version 2 of the GNU General Public License as
9  * published by the Free Software Foundation.
10  *
11  * This program is distributed in the hope that it will be useful, but WITHOUT
12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
14  * more details.
15  *
16  * You should have received a copy of the GNU General Public License along with
17  * this program; if not, write to the Free Software Foundation, Inc.,
18  * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
19  *
20  * Modifications for inclusion into the Linux staging tree are
21  * Copyright(c) 2010 Larry Finger. All rights reserved.
22  *
23  * Contact information:
24  * WLAN FAE <wlanfae@realtek.com>.
25  * Larry Finger <Larry.Finger@lwfinger.net>
26  *
27  ******************************************************************************/
28
29 #define _MLME_OSDEP_C_
30
31 #include "osdep_service.h"
32 #include "drv_types.h"
33 #include "mlme_osdep.h"
34
35 static void sitesurvey_ctrl_handler(unsigned long data)
36 {
37         struct _adapter *adapter = (struct _adapter *)data;
38
39         _r8712_sitesurvey_ctrl_handler(adapter);
40         mod_timer(&adapter->mlmepriv.sitesurveyctrl.sitesurvey_ctrl_timer,
41                   jiffies + msecs_to_jiffies(3000));
42 }
43
44 static void join_timeout_handler (unsigned long data)
45 {
46         struct _adapter *adapter = (struct _adapter *)data;
47
48         _r8712_join_timeout_handler(adapter);
49 }
50
51 static void _scan_timeout_handler (unsigned long data)
52 {
53         struct _adapter *adapter = (struct _adapter *)data;
54
55         r8712_scan_timeout_handler(adapter);
56 }
57
58 static void dhcp_timeout_handler (unsigned long data)
59 {
60         struct _adapter *adapter = (struct _adapter *)data;
61
62         _r8712_dhcp_timeout_handler(adapter);
63 }
64
65 static void wdg_timeout_handler (unsigned long data)
66 {
67         struct _adapter *adapter = (struct _adapter *)data;
68
69         _r8712_wdg_timeout_handler(adapter);
70
71         mod_timer(&adapter->mlmepriv.wdg_timer,
72                   jiffies + msecs_to_jiffies(2000));
73 }
74
75 void r8712_init_mlme_timer(struct _adapter *padapter)
76 {
77         struct  mlme_priv *pmlmepriv = &padapter->mlmepriv;
78
79         setup_timer(&pmlmepriv->assoc_timer, join_timeout_handler,
80                     (unsigned long)padapter);
81         setup_timer(&pmlmepriv->sitesurveyctrl.sitesurvey_ctrl_timer,
82                     sitesurvey_ctrl_handler,
83                     (unsigned long)padapter);
84         setup_timer(&pmlmepriv->scan_to_timer, _scan_timeout_handler,
85                     (unsigned long)padapter);
86         setup_timer(&pmlmepriv->dhcp_timer, dhcp_timeout_handler,
87                     (unsigned long)padapter);
88         setup_timer(&pmlmepriv->wdg_timer, wdg_timeout_handler,
89                     (unsigned long)padapter);
90 }
91
92 void r8712_os_indicate_connect(struct _adapter *adapter)
93 {
94         r8712_indicate_wx_assoc_event(adapter);
95         netif_carrier_on(adapter->pnetdev);
96 }
97
98 static struct RT_PMKID_LIST   backupPMKIDList[NUM_PMKID_CACHE];
99 void r8712_os_indicate_disconnect(struct _adapter *adapter)
100 {
101         u8 backupPMKIDIndex = 0;
102         u8 backupTKIPCountermeasure = 0x00;
103
104         r8712_indicate_wx_disassoc_event(adapter);
105         netif_carrier_off(adapter->pnetdev);
106         if (adapter->securitypriv.AuthAlgrthm == 2) { /*/802.1x*/
107                 /* We have to backup the PMK information for WiFi PMK Caching
108                  * test item. Backup the btkip_countermeasure information.
109                  * When the countermeasure is trigger, the driver have to
110                  * disconnect with AP for 60 seconds.
111                  */
112
113                 memcpy(&backupPMKIDList[0], &adapter->securitypriv.
114                         PMKIDList[0], sizeof(struct RT_PMKID_LIST) *
115                         NUM_PMKID_CACHE);
116                 backupPMKIDIndex = adapter->securitypriv.PMKIDIndex;
117                 backupTKIPCountermeasure = adapter->securitypriv.
118                                            btkip_countermeasure;
119                 memset((unsigned char *)&adapter->securitypriv, 0,
120                          sizeof(struct security_priv));
121                 setup_timer(&adapter->securitypriv.tkip_timer,
122                             r8712_use_tkipkey_handler,
123                             (unsigned long)adapter);
124                 /* Restore the PMK information to securitypriv structure
125                  * for the following connection. */
126                 memcpy(&adapter->securitypriv.PMKIDList[0],
127                         &backupPMKIDList[0],
128                         sizeof(struct RT_PMKID_LIST) * NUM_PMKID_CACHE);
129                 adapter->securitypriv.PMKIDIndex = backupPMKIDIndex;
130                 adapter->securitypriv.btkip_countermeasure =
131                                          backupTKIPCountermeasure;
132         } else { /*reset values in securitypriv*/
133                 struct security_priv *psec_priv = &adapter->securitypriv;
134
135                 psec_priv->AuthAlgrthm = 0; /*open system*/
136                 psec_priv->PrivacyAlgrthm = _NO_PRIVACY_;
137                 psec_priv->PrivacyKeyIndex = 0;
138                 psec_priv->XGrpPrivacy = _NO_PRIVACY_;
139                 psec_priv->XGrpKeyid = 1;
140                 psec_priv->ndisauthtype = Ndis802_11AuthModeOpen;
141                 psec_priv->ndisencryptstatus = Ndis802_11WEPDisabled;
142                 psec_priv->wps_phase = false;
143         }
144 }
145
146 void r8712_report_sec_ie(struct _adapter *adapter, u8 authmode, u8 *sec_ie)
147 {
148         uint len;
149         u8 *buff, *p, i;
150         union iwreq_data wrqu;
151
152         buff = NULL;
153         if (authmode == _WPA_IE_ID_) {
154                 buff = kzalloc(IW_CUSTOM_MAX, GFP_ATOMIC);
155                 if (buff == NULL)
156                         return;
157                 p = buff;
158                 p += sprintf(p, "ASSOCINFO(ReqIEs=");
159                 len = sec_ie[1] + 2;
160                 len =  (len < IW_CUSTOM_MAX) ? len : IW_CUSTOM_MAX - 1;
161                 for (i = 0; i < len; i++)
162                         p += sprintf(p, "%02x", sec_ie[i]);
163                 p += sprintf(p, ")");
164                 memset(&wrqu, 0, sizeof(wrqu));
165                 wrqu.data.length = p-buff;
166                 wrqu.data.length = (wrqu.data.length < IW_CUSTOM_MAX) ?
167                                    wrqu.data.length : IW_CUSTOM_MAX;
168                 wireless_send_event(adapter->pnetdev, IWEVCUSTOM, &wrqu, buff);
169                 kfree(buff);
170         }
171 }