assoc.c 50.6 KB
Newer Older
1 2
/* Copyright (C) 2006, Red Hat, Inc. */

3
#include <linux/types.h>
4
#include <linux/etherdevice.h>
J
Johannes Berg 已提交
5 6
#include <linux/ieee80211.h>
#include <linux/if_arp.h>
7
#include <net/lib80211.h>
8 9 10 11

#include "assoc.h"
#include "decl.h"
#include "host.h"
12
#include "scan.h"
13
#include "cmd.h"
14

15
static int lbs_adhoc_post(struct lbs_private *priv, struct cmd_header *resp);
16

17 18 19 20
static const u8 bssid_any[ETH_ALEN]  __attribute__ ((aligned (2))) =
	{ 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
static const u8 bssid_off[ETH_ALEN]  __attribute__ ((aligned (2))) =
	{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
21

22 23 24
/* The firmware needs the following bits masked out of the beacon-derived
 * capability field when associating/joining to a BSS:
 *  9 (QoS), 11 (APSD), 12 (unused), 14 (unused), 15 (unused)
25 26 27 28
 */
#define CAPINFO_MASK	(~(0xda00))


29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104
/**
 *  @brief This function finds common rates between rates and card rates.
 *
 * It will fill common rates in rates as output if found.
 *
 * NOTE: Setting the MSB of the basic rates need to be taken
 *   care, either before or after calling this function
 *
 *  @param priv     A pointer to struct lbs_private structure
 *  @param rates       the buffer which keeps input and output
 *  @param rates_size  the size of rate1 buffer; new size of buffer on return
 *
 *  @return            0 on success, or -1 on error
 */
static int get_common_rates(struct lbs_private *priv,
	u8 *rates,
	u16 *rates_size)
{
	u8 *card_rates = lbs_bg_rates;
	size_t num_card_rates = sizeof(lbs_bg_rates);
	int ret = 0, i, j;
	u8 tmp[30];
	size_t tmp_size = 0;

	/* For each rate in card_rates that exists in rate1, copy to tmp */
	for (i = 0; card_rates[i] && (i < num_card_rates); i++) {
		for (j = 0; rates[j] && (j < *rates_size); j++) {
			if (rates[j] == card_rates[i])
				tmp[tmp_size++] = card_rates[i];
		}
	}

	lbs_deb_hex(LBS_DEB_JOIN, "AP rates    ", rates, *rates_size);
	lbs_deb_hex(LBS_DEB_JOIN, "card rates  ", card_rates, num_card_rates);
	lbs_deb_hex(LBS_DEB_JOIN, "common rates", tmp, tmp_size);
	lbs_deb_join("TX data rate 0x%02x\n", priv->cur_rate);

	if (!priv->enablehwauto) {
		for (i = 0; i < tmp_size; i++) {
			if (tmp[i] == priv->cur_rate)
				goto done;
		}
		lbs_pr_alert("Previously set fixed data rate %#x isn't "
		       "compatible with the network.\n", priv->cur_rate);
		ret = -1;
		goto done;
	}
	ret = 0;

done:
	memset(rates, 0, *rates_size);
	*rates_size = min_t(int, tmp_size, *rates_size);
	memcpy(rates, tmp, *rates_size);
	return ret;
}


/**
 *  @brief Sets the MSB on basic rates as the firmware requires
 *
 * Scan through an array and set the MSB for basic data rates.
 *
 *  @param rates     buffer of data rates
 *  @param len       size of buffer
 */
static void lbs_set_basic_rate_flags(u8 *rates, size_t len)
{
	int i;

	for (i = 0; i < len; i++) {
		if (rates[i] == 0x02 || rates[i] == 0x04 ||
		    rates[i] == 0x0b || rates[i] == 0x16)
			rates[i] |= 0x80;
	}
}

105

106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151
static u8 iw_auth_to_ieee_auth(u8 auth)
{
	if (auth == IW_AUTH_ALG_OPEN_SYSTEM)
		return 0x00;
	else if (auth == IW_AUTH_ALG_SHARED_KEY)
		return 0x01;
	else if (auth == IW_AUTH_ALG_LEAP)
		return 0x80;

	lbs_deb_join("%s: invalid auth alg 0x%X\n", __func__, auth);
	return 0;
}

/**
 *  @brief This function prepares the authenticate command.  AUTHENTICATE only
 *  sets the authentication suite for future associations, as the firmware
 *  handles authentication internally during the ASSOCIATE command.
 *
 *  @param priv      A pointer to struct lbs_private structure
 *  @param bssid     The peer BSSID with which to authenticate
 *  @param auth      The authentication mode to use (from wireless.h)
 *
 *  @return         0 or -1
 */
static int lbs_set_authentication(struct lbs_private *priv, u8 bssid[6], u8 auth)
{
	struct cmd_ds_802_11_authenticate cmd;
	int ret = -1;
	DECLARE_MAC_BUF(mac);

	lbs_deb_enter(LBS_DEB_JOIN);

	cmd.hdr.size = cpu_to_le16(sizeof(cmd));
	memcpy(cmd.bssid, bssid, ETH_ALEN);

	cmd.authtype = iw_auth_to_ieee_auth(auth);

	lbs_deb_join("AUTH_CMD: BSSID %s, auth 0x%x\n",
		print_mac(mac, bssid), cmd.authtype);

	ret = lbs_cmd_with_response(priv, CMD_802_11_AUTHENTICATE, &cmd);

	lbs_deb_leave_args(LBS_DEB_JOIN, "ret %d", ret);
	return ret;
}

152 153 154 155
/**
 *  @brief Associate to a specific BSS discovered in a scan
 *
 *  @param priv      A pointer to struct lbs_private structure
156
 *  @param assoc_req The association request describing the BSS to associate with
157 158 159 160 161 162 163
 *
 *  @return          0-success, otherwise fail
 */
static int lbs_associate(struct lbs_private *priv,
	struct assoc_request *assoc_req)
{
	int ret;
164
	u8 preamble = RADIO_PREAMBLE_LONG;
165 166 167

	lbs_deb_enter(LBS_DEB_ASSOC);

168 169 170 171 172 173 174 175 176
	/* FW v9 and higher indicate authentication suites as a TLV in the
	 * association command, not as a separate authentication command.
	 */
	if (priv->fwrelease < 0x09000000) {
		ret = lbs_set_authentication(priv, assoc_req->bss.bssid,
					     priv->secinfo.auth_mode);
		if (ret)
			goto out;
	}
177

178
	/* Use short preamble only when both the BSS and firmware support it */
179 180
	if ((priv->capability & WLAN_CAPABILITY_SHORT_PREAMBLE) &&
	    (assoc_req->bss.capability & WLAN_CAPABILITY_SHORT_PREAMBLE))
181
		preamble = RADIO_PREAMBLE_SHORT;
182

183 184 185
	ret = lbs_set_radio(priv, preamble, 1);
	if (ret)
		goto out;
186 187 188 189

	ret = lbs_prepare_and_send_command(priv, CMD_802_11_ASSOCIATE,
				    0, CMD_OPTION_WAITFORRSP, 0, assoc_req);

190
out:
191 192 193 194 195 196 197 198
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
	return ret;
}

/**
 *  @brief Join an adhoc network found in a previous scan
 *
 *  @param priv         A pointer to struct lbs_private structure
199
 *  @param assoc_req    The association request describing the BSS to join
200
 *
201
 *  @return             0 on success, error on failure
202
 */
203
static int lbs_adhoc_join(struct lbs_private *priv,
204 205
	struct assoc_request *assoc_req)
{
206
	struct cmd_ds_802_11_ad_hoc_join cmd;
207
	struct bss_descriptor *bss = &assoc_req->bss;
208
	u8 preamble = RADIO_PREAMBLE_LONG;
209
	DECLARE_SSID_BUF(ssid);
210 211
	u16 ratesize = 0;
	int ret = 0;
212 213

	lbs_deb_enter(LBS_DEB_ASSOC);
214 215

	lbs_deb_join("current SSID '%s', ssid length %u\n",
216
		print_ssid(ssid, priv->curbssparams.ssid,
217 218 219
		priv->curbssparams.ssid_len),
		priv->curbssparams.ssid_len);
	lbs_deb_join("requested ssid '%s', ssid length %u\n",
220
		print_ssid(ssid, bss->ssid, bss->ssid_len),
221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245
		bss->ssid_len);

	/* check if the requested SSID is already joined */
	if (priv->curbssparams.ssid_len &&
	    !lbs_ssid_cmp(priv->curbssparams.ssid,
			priv->curbssparams.ssid_len,
			bss->ssid, bss->ssid_len) &&
	    (priv->mode == IW_MODE_ADHOC) &&
	    (priv->connect_status == LBS_CONNECTED)) {
		union iwreq_data wrqu;

		lbs_deb_join("ADHOC_J_CMD: New ad-hoc SSID is the same as "
			"current, not attempting to re-join");

		/* Send the re-association event though, because the association
		 * request really was successful, even if just a null-op.
		 */
		memset(&wrqu, 0, sizeof(wrqu));
		memcpy(wrqu.ap_addr.sa_data, priv->curbssparams.bssid,
		       ETH_ALEN);
		wrqu.ap_addr.sa_family = ARPHRD_ETHER;
		wireless_send_event(priv->dev, SIOCGIWAP, &wrqu, NULL);
		goto out;
	}

246 247 248
	/* Use short preamble only when both the BSS and firmware support it */
	if ((priv->capability & WLAN_CAPABILITY_SHORT_PREAMBLE) &&
	    (bss->capability & WLAN_CAPABILITY_SHORT_PREAMBLE)) {
249
		lbs_deb_join("AdhocJoin: Short preamble\n");
250
		preamble = RADIO_PREAMBLE_SHORT;
251 252
	}

253 254 255
	ret = lbs_set_radio(priv, preamble, 1);
	if (ret)
		goto out;
256 257 258 259 260

	lbs_deb_join("AdhocJoin: channel = %d\n", assoc_req->channel);
	lbs_deb_join("AdhocJoin: band = %c\n", assoc_req->band);

	priv->adhoccreate = 0;
261
	priv->curbssparams.channel = bss->channel;
262

263 264 265 266 267 268 269 270 271 272
	/* Build the join command */
	memset(&cmd, 0, sizeof(cmd));
	cmd.hdr.size = cpu_to_le16(sizeof(cmd));

	cmd.bss.type = CMD_BSS_TYPE_IBSS;
	cmd.bss.beaconperiod = cpu_to_le16(bss->beaconperiod);

	memcpy(&cmd.bss.bssid, &bss->bssid, ETH_ALEN);
	memcpy(&cmd.bss.ssid, &bss->ssid, bss->ssid_len);

273
	memcpy(&cmd.bss.ds, &bss->phy.ds, sizeof(struct ieee_ie_ds_param_set));
274

275 276
	memcpy(&cmd.bss.ibss, &bss->ss.ibss,
	       sizeof(struct ieee_ie_ibss_param_set));
277 278 279 280 281 282

	cmd.bss.capability = cpu_to_le16(bss->capability & CAPINFO_MASK);
	lbs_deb_join("ADHOC_J_CMD: tmpcap=%4X CAPINFO_MASK=%4X\n",
	       bss->capability, CAPINFO_MASK);

	/* information on BSSID descriptor passed to FW */
J
Johannes Berg 已提交
283 284
	lbs_deb_join("ADHOC_J_CMD: BSSID = %pM, SSID = '%s'\n",
			cmd.bss.bssid, cmd.bss.ssid);
285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312

	/* Only v8 and below support setting these */
	if (priv->fwrelease < 0x09000000) {
		/* failtimeout */
		cmd.failtimeout = cpu_to_le16(MRVDRV_ASSOCIATION_TIME_OUT);
		/* probedelay */
		cmd.probedelay = cpu_to_le16(CMD_SCAN_PROBE_DELAY_TIME);
	}

	/* Copy Data rates from the rates recorded in scan response */
	memset(cmd.bss.rates, 0, sizeof(cmd.bss.rates));
	ratesize = min_t(u16, sizeof(cmd.bss.rates), MAX_RATES);
	memcpy(cmd.bss.rates, bss->rates, ratesize);
	if (get_common_rates(priv, cmd.bss.rates, &ratesize)) {
		lbs_deb_join("ADHOC_JOIN: get_common_rates returned error.\n");
		ret = -1;
		goto out;
	}

	/* Copy the ad-hoc creation rates into Current BSS state structure */
	memset(&priv->curbssparams.rates, 0, sizeof(priv->curbssparams.rates));
	memcpy(&priv->curbssparams.rates, cmd.bss.rates, ratesize);

	/* Set MSB on basic rates as the firmware requires, but _after_
	 * copying to current bss rates.
	 */
	lbs_set_basic_rate_flags(cmd.bss.rates, ratesize);

313
	cmd.bss.ibss.atimwindow = bss->atimwindow;
314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341

	if (assoc_req->secinfo.wep_enabled) {
		u16 tmp = le16_to_cpu(cmd.bss.capability);
		tmp |= WLAN_CAPABILITY_PRIVACY;
		cmd.bss.capability = cpu_to_le16(tmp);
	}

	if (priv->psmode == LBS802_11POWERMODEMAX_PSP) {
		__le32 local_ps_mode = cpu_to_le32(LBS802_11POWERMODECAM);

		/* wake up first */
		ret = lbs_prepare_and_send_command(priv, CMD_802_11_PS_MODE,
						   CMD_ACT_SET, 0, 0,
						   &local_ps_mode);
		if (ret) {
			ret = -1;
			goto out;
		}
	}

	if (lbs_parse_dnld_countryinfo_11d(priv, bss)) {
		ret = -1;
		goto out;
	}

	ret = lbs_cmd_with_response(priv, CMD_802_11_AD_HOC_JOIN, &cmd);
	if (ret == 0)
		ret = lbs_adhoc_post(priv, (struct cmd_header *) &cmd);
342 343

out:
344
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
345 346 347 348 349 350 351
	return ret;
}

/**
 *  @brief Start an Adhoc Network
 *
 *  @param priv         A pointer to struct lbs_private structure
352
 *  @param assoc_req    The association request describing the BSS to start
353 354
 *
 *  @return             0 on success, error on failure
355
 */
356
static int lbs_adhoc_start(struct lbs_private *priv,
357 358
	struct assoc_request *assoc_req)
{
359
	struct cmd_ds_802_11_ad_hoc_start cmd;
360
	u8 preamble = RADIO_PREAMBLE_LONG;
361 362 363
	size_t ratesize = 0;
	u16 tmpcap = 0;
	int ret = 0;
364
	DECLARE_SSID_BUF(ssid);
365 366

	lbs_deb_enter(LBS_DEB_ASSOC);
367 368

	if (priv->capability & WLAN_CAPABILITY_SHORT_PREAMBLE) {
369
		lbs_deb_join("ADHOC_START: Will use short preamble\n");
370
		preamble = RADIO_PREAMBLE_SHORT;
371 372
	}

373 374 375
	ret = lbs_set_radio(priv, preamble, 1);
	if (ret)
		goto out;
376

377 378 379
	/* Build the start command */
	memset(&cmd, 0, sizeof(cmd));
	cmd.hdr.size = cpu_to_le16(sizeof(cmd));
380

381 382 383
	memcpy(cmd.ssid, assoc_req->ssid, assoc_req->ssid_len);

	lbs_deb_join("ADHOC_START: SSID '%s', ssid length %u\n",
384
		print_ssid(ssid, assoc_req->ssid, assoc_req->ssid_len),
385 386 387 388 389 390 391 392 393 394 395
		assoc_req->ssid_len);

	cmd.bsstype = CMD_BSS_TYPE_IBSS;

	if (priv->beacon_period == 0)
		priv->beacon_period = MRVDRV_BEACON_INTERVAL;
	cmd.beaconperiod = cpu_to_le16(priv->beacon_period);

	WARN_ON(!assoc_req->channel);

	/* set Physical parameter set */
396 397
	cmd.ds.header.id = WLAN_EID_DS_PARAMS;
	cmd.ds.header.len = 1;
398
	cmd.ds.channel = assoc_req->channel;
399 400

	/* set IBSS parameter set */
401 402
	cmd.ibss.header.id = WLAN_EID_IBSS_PARAMS;
	cmd.ibss.header.len = 2;
403
	cmd.ibss.atimwindow = cpu_to_le16(0);
404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448

	/* set capability info */
	tmpcap = WLAN_CAPABILITY_IBSS;
	if (assoc_req->secinfo.wep_enabled) {
		lbs_deb_join("ADHOC_START: WEP enabled, setting privacy on\n");
		tmpcap |= WLAN_CAPABILITY_PRIVACY;
	} else
		lbs_deb_join("ADHOC_START: WEP disabled, setting privacy off\n");

	cmd.capability = cpu_to_le16(tmpcap);

	/* Only v8 and below support setting probe delay */
	if (priv->fwrelease < 0x09000000)
		cmd.probedelay = cpu_to_le16(CMD_SCAN_PROBE_DELAY_TIME);

	ratesize = min(sizeof(cmd.rates), sizeof(lbs_bg_rates));
	memcpy(cmd.rates, lbs_bg_rates, ratesize);

	/* Copy the ad-hoc creating rates into Current BSS state structure */
	memset(&priv->curbssparams.rates, 0, sizeof(priv->curbssparams.rates));
	memcpy(&priv->curbssparams.rates, &cmd.rates, ratesize);

	/* Set MSB on basic rates as the firmware requires, but _after_
	 * copying to current bss rates.
	 */
	lbs_set_basic_rate_flags(cmd.rates, ratesize);

	lbs_deb_join("ADHOC_START: rates=%02x %02x %02x %02x\n",
	       cmd.rates[0], cmd.rates[1], cmd.rates[2], cmd.rates[3]);

	if (lbs_create_dnld_countryinfo_11d(priv)) {
		lbs_deb_join("ADHOC_START: dnld_countryinfo_11d failed\n");
		ret = -1;
		goto out;
	}

	lbs_deb_join("ADHOC_START: Starting Ad-Hoc BSS on channel %d, band %d\n",
		     assoc_req->channel, assoc_req->band);

	priv->adhoccreate = 1;
	priv->mode = IW_MODE_ADHOC;

	ret = lbs_cmd_with_response(priv, CMD_802_11_AD_HOC_START, &cmd);
	if (ret == 0)
		ret = lbs_adhoc_post(priv, (struct cmd_header *) &cmd);
449

450 451
out:
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
452 453 454
	return ret;
}

455 456 457 458 459 460 461
/**
 *  @brief Stop and Ad-Hoc network and exit Ad-Hoc mode
 *
 *  @param priv         A pointer to struct lbs_private structure
 *  @return             0 on success, or an error
 */
int lbs_adhoc_stop(struct lbs_private *priv)
462
{
463 464 465 466 467 468 469 470 471 472 473 474 475 476 477
	struct cmd_ds_802_11_ad_hoc_stop cmd;
	int ret;

	lbs_deb_enter(LBS_DEB_JOIN);

	memset(&cmd, 0, sizeof (cmd));
	cmd.hdr.size = cpu_to_le16 (sizeof (cmd));

	ret = lbs_cmd_with_response(priv, CMD_802_11_AD_HOC_STOP, &cmd);

	/* Clean up everything even if there was an error */
	lbs_mac_event_disconnected(priv);

	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
	return ret;
478
}
479

480 481 482 483 484
static inline int match_bss_no_security(struct lbs_802_11_security *secinfo,
					struct bss_descriptor *match_bss)
{
	if (!secinfo->wep_enabled  && !secinfo->WPAenabled
	    && !secinfo->WPA2enabled
J
Johannes Berg 已提交
485 486
	    && match_bss->wpa_ie[0] != WLAN_EID_GENERIC
	    && match_bss->rsn_ie[0] != WLAN_EID_RSN
487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507
	    && !(match_bss->capability & WLAN_CAPABILITY_PRIVACY))
		return 1;
	else
		return 0;
}

static inline int match_bss_static_wep(struct lbs_802_11_security *secinfo,
				       struct bss_descriptor *match_bss)
{
	if (secinfo->wep_enabled && !secinfo->WPAenabled
	    && !secinfo->WPA2enabled
	    && (match_bss->capability & WLAN_CAPABILITY_PRIVACY))
		return 1;
	else
		return 0;
}

static inline int match_bss_wpa(struct lbs_802_11_security *secinfo,
				struct bss_descriptor *match_bss)
{
	if (!secinfo->wep_enabled && secinfo->WPAenabled
J
Johannes Berg 已提交
508
	    && (match_bss->wpa_ie[0] == WLAN_EID_GENERIC)
509 510 511 512 513 514 515 516 517 518 519 520
	    /* privacy bit may NOT be set in some APs like LinkSys WRT54G
	    && (match_bss->capability & WLAN_CAPABILITY_PRIVACY) */
	   )
		return 1;
	else
		return 0;
}

static inline int match_bss_wpa2(struct lbs_802_11_security *secinfo,
				 struct bss_descriptor *match_bss)
{
	if (!secinfo->wep_enabled && secinfo->WPA2enabled &&
J
Johannes Berg 已提交
521
	    (match_bss->rsn_ie[0] == WLAN_EID_RSN)
522 523 524 525 526 527 528 529 530 531 532 533 534
	    /* privacy bit may NOT be set in some APs like LinkSys WRT54G
	    (match_bss->capability & WLAN_CAPABILITY_PRIVACY) */
	   )
		return 1;
	else
		return 0;
}

static inline int match_bss_dynamic_wep(struct lbs_802_11_security *secinfo,
					struct bss_descriptor *match_bss)
{
	if (!secinfo->wep_enabled && !secinfo->WPAenabled
	    && !secinfo->WPA2enabled
J
Johannes Berg 已提交
535 536
	    && (match_bss->wpa_ie[0] != WLAN_EID_GENERIC)
	    && (match_bss->rsn_ie[0] != WLAN_EID_RSN)
537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745
	    && (match_bss->capability & WLAN_CAPABILITY_PRIVACY))
		return 1;
	else
		return 0;
}

/**
 *  @brief Check if a scanned network compatible with the driver settings
 *
 *   WEP     WPA     WPA2    ad-hoc  encrypt                      Network
 * enabled enabled  enabled   AES     mode   privacy  WPA  WPA2  Compatible
 *    0       0        0       0      NONE      0      0    0   yes No security
 *    1       0        0       0      NONE      1      0    0   yes Static WEP
 *    0       1        0       0       x        1x     1    x   yes WPA
 *    0       0        1       0       x        1x     x    1   yes WPA2
 *    0       0        0       1      NONE      1      0    0   yes Ad-hoc AES
 *    0       0        0       0     !=NONE     1      0    0   yes Dynamic WEP
 *
 *
 *  @param priv A pointer to struct lbs_private
 *  @param index   Index in scantable to check against current driver settings
 *  @param mode    Network mode: Infrastructure or IBSS
 *
 *  @return        Index in scantable, or error code if negative
 */
static int is_network_compatible(struct lbs_private *priv,
				 struct bss_descriptor *bss, uint8_t mode)
{
	int matched = 0;

	lbs_deb_enter(LBS_DEB_SCAN);

	if (bss->mode != mode)
		goto done;

	matched = match_bss_no_security(&priv->secinfo, bss);
	if (matched)
		goto done;
	matched = match_bss_static_wep(&priv->secinfo, bss);
	if (matched)
		goto done;
	matched = match_bss_wpa(&priv->secinfo, bss);
	if (matched) {
		lbs_deb_scan("is_network_compatible() WPA: wpa_ie 0x%x "
			     "wpa2_ie 0x%x WEP %s WPA %s WPA2 %s "
			     "privacy 0x%x\n", bss->wpa_ie[0], bss->rsn_ie[0],
			     priv->secinfo.wep_enabled ? "e" : "d",
			     priv->secinfo.WPAenabled ? "e" : "d",
			     priv->secinfo.WPA2enabled ? "e" : "d",
			     (bss->capability & WLAN_CAPABILITY_PRIVACY));
		goto done;
	}
	matched = match_bss_wpa2(&priv->secinfo, bss);
	if (matched) {
		lbs_deb_scan("is_network_compatible() WPA2: wpa_ie 0x%x "
			     "wpa2_ie 0x%x WEP %s WPA %s WPA2 %s "
			     "privacy 0x%x\n", bss->wpa_ie[0], bss->rsn_ie[0],
			     priv->secinfo.wep_enabled ? "e" : "d",
			     priv->secinfo.WPAenabled ? "e" : "d",
			     priv->secinfo.WPA2enabled ? "e" : "d",
			     (bss->capability & WLAN_CAPABILITY_PRIVACY));
		goto done;
	}
	matched = match_bss_dynamic_wep(&priv->secinfo, bss);
	if (matched) {
		lbs_deb_scan("is_network_compatible() dynamic WEP: "
			     "wpa_ie 0x%x wpa2_ie 0x%x privacy 0x%x\n",
			     bss->wpa_ie[0], bss->rsn_ie[0],
			     (bss->capability & WLAN_CAPABILITY_PRIVACY));
		goto done;
	}

	/* bss security settings don't match those configured on card */
	lbs_deb_scan("is_network_compatible() FAILED: wpa_ie 0x%x "
		     "wpa2_ie 0x%x WEP %s WPA %s WPA2 %s privacy 0x%x\n",
		     bss->wpa_ie[0], bss->rsn_ie[0],
		     priv->secinfo.wep_enabled ? "e" : "d",
		     priv->secinfo.WPAenabled ? "e" : "d",
		     priv->secinfo.WPA2enabled ? "e" : "d",
		     (bss->capability & WLAN_CAPABILITY_PRIVACY));

done:
	lbs_deb_leave_args(LBS_DEB_SCAN, "matched: %d", matched);
	return matched;
}

/**
 *  @brief This function finds a specific compatible BSSID in the scan list
 *
 *  Used in association code
 *
 *  @param priv  A pointer to struct lbs_private
 *  @param bssid    BSSID to find in the scan list
 *  @param mode     Network mode: Infrastructure or IBSS
 *
 *  @return         index in BSSID list, or error return code (< 0)
 */
static struct bss_descriptor *lbs_find_bssid_in_list(struct lbs_private *priv,
					      uint8_t *bssid, uint8_t mode)
{
	struct bss_descriptor *iter_bss;
	struct bss_descriptor *found_bss = NULL;

	lbs_deb_enter(LBS_DEB_SCAN);

	if (!bssid)
		goto out;

	lbs_deb_hex(LBS_DEB_SCAN, "looking for", bssid, ETH_ALEN);

	/* Look through the scan table for a compatible match.  The loop will
	 *   continue past a matched bssid that is not compatible in case there
	 *   is an AP with multiple SSIDs assigned to the same BSSID
	 */
	mutex_lock(&priv->lock);
	list_for_each_entry(iter_bss, &priv->network_list, list) {
		if (compare_ether_addr(iter_bss->bssid, bssid))
			continue; /* bssid doesn't match */
		switch (mode) {
		case IW_MODE_INFRA:
		case IW_MODE_ADHOC:
			if (!is_network_compatible(priv, iter_bss, mode))
				break;
			found_bss = iter_bss;
			break;
		default:
			found_bss = iter_bss;
			break;
		}
	}
	mutex_unlock(&priv->lock);

out:
	lbs_deb_leave_args(LBS_DEB_SCAN, "found_bss %p", found_bss);
	return found_bss;
}

/**
 *  @brief This function finds ssid in ssid list.
 *
 *  Used in association code
 *
 *  @param priv  A pointer to struct lbs_private
 *  @param ssid     SSID to find in the list
 *  @param bssid    BSSID to qualify the SSID selection (if provided)
 *  @param mode     Network mode: Infrastructure or IBSS
 *
 *  @return         index in BSSID list
 */
static struct bss_descriptor *lbs_find_ssid_in_list(struct lbs_private *priv,
					     uint8_t *ssid, uint8_t ssid_len,
					     uint8_t *bssid, uint8_t mode,
					     int channel)
{
	u32 bestrssi = 0;
	struct bss_descriptor *iter_bss = NULL;
	struct bss_descriptor *found_bss = NULL;
	struct bss_descriptor *tmp_oldest = NULL;

	lbs_deb_enter(LBS_DEB_SCAN);

	mutex_lock(&priv->lock);

	list_for_each_entry(iter_bss, &priv->network_list, list) {
		if (!tmp_oldest ||
		    (iter_bss->last_scanned < tmp_oldest->last_scanned))
			tmp_oldest = iter_bss;

		if (lbs_ssid_cmp(iter_bss->ssid, iter_bss->ssid_len,
				 ssid, ssid_len) != 0)
			continue; /* ssid doesn't match */
		if (bssid && compare_ether_addr(iter_bss->bssid, bssid) != 0)
			continue; /* bssid doesn't match */
		if ((channel > 0) && (iter_bss->channel != channel))
			continue; /* channel doesn't match */

		switch (mode) {
		case IW_MODE_INFRA:
		case IW_MODE_ADHOC:
			if (!is_network_compatible(priv, iter_bss, mode))
				break;

			if (bssid) {
				/* Found requested BSSID */
				found_bss = iter_bss;
				goto out;
			}

			if (SCAN_RSSI(iter_bss->rssi) > bestrssi) {
				bestrssi = SCAN_RSSI(iter_bss->rssi);
				found_bss = iter_bss;
			}
			break;
		case IW_MODE_AUTO:
		default:
			if (SCAN_RSSI(iter_bss->rssi) > bestrssi) {
				bestrssi = SCAN_RSSI(iter_bss->rssi);
				found_bss = iter_bss;
			}
			break;
		}
	}

out:
	mutex_unlock(&priv->lock);
	lbs_deb_leave_args(LBS_DEB_SCAN, "found_bss %p", found_bss);
	return found_bss;
}

746
static int assoc_helper_essid(struct lbs_private *priv,
747 748 749
                              struct assoc_request * assoc_req)
{
	int ret = 0;
750
	struct bss_descriptor * bss;
751
	int channel = -1;
752
	DECLARE_SSID_BUF(ssid);
753

754
	lbs_deb_enter(LBS_DEB_ASSOC);
755

756 757 758 759
	/* FIXME: take channel into account when picking SSIDs if a channel
	 * is set.
	 */

760 761 762
	if (test_bit(ASSOC_FLAG_CHANNEL, &assoc_req->flags))
		channel = assoc_req->channel;

763
	lbs_deb_assoc("SSID '%s' requested\n",
764
	              print_ssid(ssid, assoc_req->ssid, assoc_req->ssid_len));
765
	if (assoc_req->mode == IW_MODE_INFRA) {
766
		lbs_send_specific_ssid_scan(priv, assoc_req->ssid,
767
			assoc_req->ssid_len);
768

769
		bss = lbs_find_ssid_in_list(priv, assoc_req->ssid,
770
				assoc_req->ssid_len, NULL, IW_MODE_INFRA, channel);
771
		if (bss != NULL) {
772
			memcpy(&assoc_req->bss, bss, sizeof(struct bss_descriptor));
773
			ret = lbs_associate(priv, assoc_req);
774
		} else {
775
			lbs_deb_assoc("SSID not found; cannot associate\n");
776
		}
777
	} else if (assoc_req->mode == IW_MODE_ADHOC) {
778 779 780
		/* Scan for the network, do not save previous results.  Stale
		 *   scan data will cause us to join a non-existant adhoc network
		 */
781
		lbs_send_specific_ssid_scan(priv, assoc_req->ssid,
782
			assoc_req->ssid_len);
783 784

		/* Search for the requested SSID in the scan table */
785
		bss = lbs_find_ssid_in_list(priv, assoc_req->ssid,
786
				assoc_req->ssid_len, NULL, IW_MODE_ADHOC, channel);
787
		if (bss != NULL) {
788
			lbs_deb_assoc("SSID found, will join\n");
789
			memcpy(&assoc_req->bss, bss, sizeof(struct bss_descriptor));
790
			lbs_adhoc_join(priv, assoc_req);
791 792
		} else {
			/* else send START command */
793
			lbs_deb_assoc("SSID not found, creating adhoc network\n");
794
			memcpy(&assoc_req->bss.ssid, &assoc_req->ssid,
795 796
				IW_ESSID_MAX_SIZE);
			assoc_req->bss.ssid_len = assoc_req->ssid_len;
797
			lbs_adhoc_start(priv, assoc_req);
798 799 800
		}
	}

801
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
802 803 804 805
	return ret;
}


806
static int assoc_helper_bssid(struct lbs_private *priv,
807 808
                              struct assoc_request * assoc_req)
{
809 810
	int ret = 0;
	struct bss_descriptor * bss;
811

J
Johannes Berg 已提交
812
	lbs_deb_enter_args(LBS_DEB_ASSOC, "BSSID %pM", assoc_req->bssid);
813 814

	/* Search for index position in list for requested MAC */
815
	bss = lbs_find_bssid_in_list(priv, assoc_req->bssid,
816
			    assoc_req->mode);
817
	if (bss == NULL) {
J
Johannes Berg 已提交
818 819
		lbs_deb_assoc("ASSOC: WAP: BSSID %pM not found, "
			"cannot associate.\n", assoc_req->bssid);
820 821 822
		goto out;
	}

823
	memcpy(&assoc_req->bss, bss, sizeof(struct bss_descriptor));
824
	if (assoc_req->mode == IW_MODE_INFRA) {
825 826
		ret = lbs_associate(priv, assoc_req);
		lbs_deb_assoc("ASSOC: lbs_associate(bssid) returned %d\n", ret);
827
	} else if (assoc_req->mode == IW_MODE_ADHOC) {
828
		lbs_adhoc_join(priv, assoc_req);
829 830 831
	}

out:
832
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
833 834 835 836
	return ret;
}


837
static int assoc_helper_associate(struct lbs_private *priv,
838 839 840 841
                                  struct assoc_request * assoc_req)
{
	int ret = 0, done = 0;

842 843
	lbs_deb_enter(LBS_DEB_ASSOC);

844 845 846
	/* If we're given and 'any' BSSID, try associating based on SSID */

	if (test_bit(ASSOC_FLAG_BSSID, &assoc_req->flags)) {
847 848
		if (compare_ether_addr(bssid_any, assoc_req->bssid)
		    && compare_ether_addr(bssid_off, assoc_req->bssid)) {
849 850 851 852 853 854 855 856 857
			ret = assoc_helper_bssid(priv, assoc_req);
			done = 1;
		}
	}

	if (!done && test_bit(ASSOC_FLAG_SSID, &assoc_req->flags)) {
		ret = assoc_helper_essid(priv, assoc_req);
	}

858
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
859 860 861 862
	return ret;
}


863
static int assoc_helper_mode(struct lbs_private *priv,
864 865 866 867
                             struct assoc_request * assoc_req)
{
	int ret = 0;

868
	lbs_deb_enter(LBS_DEB_ASSOC);
869

870
	if (assoc_req->mode == priv->mode)
871
		goto done;
872

873
	if (assoc_req->mode == IW_MODE_INFRA) {
874
		if (priv->psstate != PS_STATE_FULL_POWER)
875
			lbs_ps_wakeup(priv, CMD_OPTION_WAITFORRSP);
876
		priv->psmode = LBS802_11POWERMODECAM;
877 878
	}

879
	priv->mode = assoc_req->mode;
880
	ret = lbs_set_snmp_mib(priv, SNMP_MIB_OID_BSS_TYPE, assoc_req->mode);
881

882 883
done:
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
884 885 886
	return ret;
}

887
static int assoc_helper_channel(struct lbs_private *priv,
888 889 890 891 892 893
                                struct assoc_request * assoc_req)
{
	int ret = 0;

	lbs_deb_enter(LBS_DEB_ASSOC);

894
	ret = lbs_update_channel(priv);
895
	if (ret) {
896
		lbs_deb_assoc("ASSOC: channel: error getting channel.\n");
897
		goto done;
898 899
	}

900
	if (assoc_req->channel == priv->curbssparams.channel)
901 902
		goto done;

903
	if (priv->mesh_dev) {
904 905 906
		/* Change mesh channel first; 21.p21 firmware won't let
		   you change channel otherwise (even though it'll return
		   an error to this */
907 908
		lbs_mesh_config(priv, CMD_ACT_MESH_CONFIG_STOP,
				assoc_req->channel);
909 910
	}

911
	lbs_deb_assoc("ASSOC: channel: %d -> %d\n",
912
		      priv->curbssparams.channel, assoc_req->channel);
913

914 915
	ret = lbs_set_channel(priv, assoc_req->channel);
	if (ret < 0)
916
		lbs_deb_assoc("ASSOC: channel: error setting channel.\n");
917

918 919 920
	/* FIXME: shouldn't need to grab the channel _again_ after setting
	 * it since the firmware is supposed to return the new channel, but
	 * whatever... */
921
	ret = lbs_update_channel(priv);
922
	if (ret) {
923
		lbs_deb_assoc("ASSOC: channel: error getting channel.\n");
924 925
		goto done;
	}
926

927
	if (assoc_req->channel != priv->curbssparams.channel) {
928
		lbs_deb_assoc("ASSOC: channel: failed to update channel to %d\n",
929
		              assoc_req->channel);
930
		goto restore_mesh;
931 932 933 934 935 936 937 938 939 940 941 942
	}

	if (   assoc_req->secinfo.wep_enabled
	    &&   (assoc_req->wep_keys[0].len
	       || assoc_req->wep_keys[1].len
	       || assoc_req->wep_keys[2].len
	       || assoc_req->wep_keys[3].len)) {
		/* Make sure WEP keys are re-sent to firmware */
		set_bit(ASSOC_FLAG_WEP_KEYS, &assoc_req->flags);
	}

	/* Must restart/rejoin adhoc networks after channel change */
943
 	set_bit(ASSOC_FLAG_SSID, &assoc_req->flags);
944

945 946
 restore_mesh:
	if (priv->mesh_dev)
947 948
		lbs_mesh_config(priv, CMD_ACT_MESH_CONFIG_START,
				priv->curbssparams.channel);
949 950

 done:
951 952 953 954 955
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
	return ret;
}


956
static int assoc_helper_wep_keys(struct lbs_private *priv,
957
				 struct assoc_request *assoc_req)
958 959 960 961
{
	int i;
	int ret = 0;

962
	lbs_deb_enter(LBS_DEB_ASSOC);
963 964

	/* Set or remove WEP keys */
965 966 967 968 969
	if (assoc_req->wep_keys[0].len || assoc_req->wep_keys[1].len ||
	    assoc_req->wep_keys[2].len || assoc_req->wep_keys[3].len)
		ret = lbs_cmd_802_11_set_wep(priv, CMD_ACT_ADD, assoc_req);
	else
		ret = lbs_cmd_802_11_set_wep(priv, CMD_ACT_REMOVE, assoc_req);
970 971 972 973 974

	if (ret)
		goto out;

	/* enable/disable the MAC's WEP packet filter */
975
	if (assoc_req->secinfo.wep_enabled)
976
		priv->mac_control |= CMD_ACT_MAC_WEP_ENABLE;
977
	else
978
		priv->mac_control &= ~CMD_ACT_MAC_WEP_ENABLE;
979

980
	lbs_set_mac_control(priv);
981

982
	mutex_lock(&priv->lock);
983

984
	/* Copy WEP keys into priv wep key fields */
985
	for (i = 0; i < 4; i++) {
986
		memcpy(&priv->wep_keys[i], &assoc_req->wep_keys[i],
987
		       sizeof(struct enc_key));
988
	}
989
	priv->wep_tx_keyidx = assoc_req->wep_tx_keyidx;
990

991
	mutex_unlock(&priv->lock);
992 993

out:
994
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
995 996 997
	return ret;
}

998
static int assoc_helper_secinfo(struct lbs_private *priv,
999 1000 1001
                                struct assoc_request * assoc_req)
{
	int ret = 0;
1002 1003
	uint16_t do_wpa;
	uint16_t rsn = 0;
1004

1005
	lbs_deb_enter(LBS_DEB_ASSOC);
1006

1007
	memcpy(&priv->secinfo, &assoc_req->secinfo,
1008
		sizeof(struct lbs_802_11_security));
1009

1010
	lbs_set_mac_control(priv);
1011

1012 1013 1014 1015 1016 1017
	/* If RSN is already enabled, don't try to enable it again, since
	 * ENABLE_RSN resets internal state machines and will clobber the
	 * 4-way WPA handshake.
	 */

	/* Get RSN enabled/disabled */
1018
	ret = lbs_cmd_802_11_enable_rsn(priv, CMD_ACT_GET, &rsn);
1019
	if (ret) {
1020
		lbs_deb_assoc("Failed to get RSN status: %d\n", ret);
1021 1022 1023 1024
		goto out;
	}

	/* Don't re-enable RSN if it's already enabled */
1025
	do_wpa = assoc_req->secinfo.WPAenabled || assoc_req->secinfo.WPA2enabled;
1026 1027 1028 1029
	if (do_wpa == rsn)
		goto out;

	/* Set RSN enabled/disabled */
1030
	ret = lbs_cmd_802_11_enable_rsn(priv, CMD_ACT_SET, &do_wpa);
1031 1032

out:
1033
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
1034 1035 1036 1037
	return ret;
}


1038
static int assoc_helper_wpa_keys(struct lbs_private *priv,
1039 1040 1041
                                 struct assoc_request * assoc_req)
{
	int ret = 0;
1042
	unsigned int flags = assoc_req->flags;
1043

1044
	lbs_deb_enter(LBS_DEB_ASSOC);
1045

1046 1047 1048 1049
	/* Work around older firmware bug where WPA unicast and multicast
	 * keys must be set independently.  Seen in SDIO parts with firmware
	 * version 5.0.11p0.
	 */
1050

1051 1052
	if (test_bit(ASSOC_FLAG_WPA_UCAST_KEY, &assoc_req->flags)) {
		clear_bit(ASSOC_FLAG_WPA_MCAST_KEY, &assoc_req->flags);
1053
		ret = lbs_cmd_802_11_key_material(priv, CMD_ACT_SET, assoc_req);
1054 1055 1056 1057 1058 1059 1060 1061 1062
		assoc_req->flags = flags;
	}

	if (ret)
		goto out;

	if (test_bit(ASSOC_FLAG_WPA_MCAST_KEY, &assoc_req->flags)) {
		clear_bit(ASSOC_FLAG_WPA_UCAST_KEY, &assoc_req->flags);

1063
		ret = lbs_cmd_802_11_key_material(priv, CMD_ACT_SET, assoc_req);
1064 1065 1066 1067
		assoc_req->flags = flags;
	}

out:
1068
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
1069 1070 1071 1072
	return ret;
}


1073
static int assoc_helper_wpa_ie(struct lbs_private *priv,
1074 1075 1076 1077
                               struct assoc_request * assoc_req)
{
	int ret = 0;

1078
	lbs_deb_enter(LBS_DEB_ASSOC);
1079 1080

	if (assoc_req->secinfo.WPAenabled || assoc_req->secinfo.WPA2enabled) {
1081 1082
		memcpy(&priv->wpa_ie, &assoc_req->wpa_ie, assoc_req->wpa_ie_len);
		priv->wpa_ie_len = assoc_req->wpa_ie_len;
1083
	} else {
1084 1085
		memset(&priv->wpa_ie, 0, MAX_WPA_IE_LEN);
		priv->wpa_ie_len = 0;
1086 1087
	}

1088
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
1089 1090 1091 1092
	return ret;
}


1093
static int should_deauth_infrastructure(struct lbs_private *priv,
1094 1095
                                        struct assoc_request * assoc_req)
{
1096 1097
	int ret = 0;

1098
	if (priv->connect_status != LBS_CONNECTED)
1099 1100
		return 0;

1101
	lbs_deb_enter(LBS_DEB_ASSOC);
1102
	if (test_bit(ASSOC_FLAG_SSID, &assoc_req->flags)) {
1103 1104 1105
		lbs_deb_assoc("Deauthenticating due to new SSID\n");
		ret = 1;
		goto out;
1106 1107 1108
	}

	if (test_bit(ASSOC_FLAG_SECINFO, &assoc_req->flags)) {
1109
		if (priv->secinfo.auth_mode != assoc_req->secinfo.auth_mode) {
1110 1111 1112
			lbs_deb_assoc("Deauthenticating due to new security\n");
			ret = 1;
			goto out;
1113 1114 1115 1116
		}
	}

	if (test_bit(ASSOC_FLAG_BSSID, &assoc_req->flags)) {
1117 1118 1119
		lbs_deb_assoc("Deauthenticating due to new BSSID\n");
		ret = 1;
		goto out;
1120 1121
	}

1122
	if (test_bit(ASSOC_FLAG_CHANNEL, &assoc_req->flags)) {
1123 1124 1125
		lbs_deb_assoc("Deauthenticating due to channel switch\n");
		ret = 1;
		goto out;
1126 1127
	}

1128 1129
	/* FIXME: deal with 'auto' mode somehow */
	if (test_bit(ASSOC_FLAG_MODE, &assoc_req->flags)) {
1130 1131 1132 1133 1134 1135
		if (assoc_req->mode != IW_MODE_INFRA) {
			lbs_deb_assoc("Deauthenticating due to leaving "
				"infra mode\n");
			ret = 1;
			goto out;
		}
1136 1137
	}

1138 1139
out:
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
1140
	return ret;
1141 1142 1143
}


1144
static int should_stop_adhoc(struct lbs_private *priv,
1145 1146
                             struct assoc_request * assoc_req)
{
1147 1148
	lbs_deb_enter(LBS_DEB_ASSOC);

1149
	if (priv->connect_status != LBS_CONNECTED)
1150 1151
		return 0;

1152 1153
	if (lbs_ssid_cmp(priv->curbssparams.ssid,
	                      priv->curbssparams.ssid_len,
1154
	                      assoc_req->ssid, assoc_req->ssid_len) != 0)
1155 1156 1157 1158
		return 1;

	/* FIXME: deal with 'auto' mode somehow */
	if (test_bit(ASSOC_FLAG_MODE, &assoc_req->flags)) {
1159
		if (assoc_req->mode != IW_MODE_ADHOC)
1160 1161 1162
			return 1;
	}

1163
	if (test_bit(ASSOC_FLAG_CHANNEL, &assoc_req->flags)) {
1164
		if (assoc_req->channel != priv->curbssparams.channel)
1165 1166 1167
			return 1;
	}

1168
	lbs_deb_leave(LBS_DEB_ASSOC);
1169 1170 1171 1172
	return 0;
}


1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257
/**
 *  @brief This function finds the best SSID in the Scan List
 *
 *  Search the scan table for the best SSID that also matches the current
 *   adapter network preference (infrastructure or adhoc)
 *
 *  @param priv  A pointer to struct lbs_private
 *
 *  @return         index in BSSID list
 */
static struct bss_descriptor *lbs_find_best_ssid_in_list(
	struct lbs_private *priv, uint8_t mode)
{
	uint8_t bestrssi = 0;
	struct bss_descriptor *iter_bss;
	struct bss_descriptor *best_bss = NULL;

	lbs_deb_enter(LBS_DEB_SCAN);

	mutex_lock(&priv->lock);

	list_for_each_entry(iter_bss, &priv->network_list, list) {
		switch (mode) {
		case IW_MODE_INFRA:
		case IW_MODE_ADHOC:
			if (!is_network_compatible(priv, iter_bss, mode))
				break;
			if (SCAN_RSSI(iter_bss->rssi) <= bestrssi)
				break;
			bestrssi = SCAN_RSSI(iter_bss->rssi);
			best_bss = iter_bss;
			break;
		case IW_MODE_AUTO:
		default:
			if (SCAN_RSSI(iter_bss->rssi) <= bestrssi)
				break;
			bestrssi = SCAN_RSSI(iter_bss->rssi);
			best_bss = iter_bss;
			break;
		}
	}

	mutex_unlock(&priv->lock);
	lbs_deb_leave_args(LBS_DEB_SCAN, "best_bss %p", best_bss);
	return best_bss;
}

/**
 *  @brief Find the best AP
 *
 *  Used from association worker.
 *
 *  @param priv         A pointer to struct lbs_private structure
 *  @param pSSID        A pointer to AP's ssid
 *
 *  @return             0--success, otherwise--fail
 */
static int lbs_find_best_network_ssid(struct lbs_private *priv,
	uint8_t *out_ssid, uint8_t *out_ssid_len, uint8_t preferred_mode,
	uint8_t *out_mode)
{
	int ret = -1;
	struct bss_descriptor *found;

	lbs_deb_enter(LBS_DEB_SCAN);

	priv->scan_ssid_len = 0;
	lbs_scan_networks(priv, 1);
	if (priv->surpriseremoved)
		goto out;

	found = lbs_find_best_ssid_in_list(priv, preferred_mode);
	if (found && (found->ssid_len > 0)) {
		memcpy(out_ssid, &found->ssid, IW_ESSID_MAX_SIZE);
		*out_ssid_len = found->ssid_len;
		*out_mode = found->mode;
		ret = 0;
	}

out:
	lbs_deb_leave_args(LBS_DEB_SCAN, "ret %d", ret);
	return ret;
}


1258
void lbs_association_worker(struct work_struct *work)
1259
{
1260 1261
	struct lbs_private *priv = container_of(work, struct lbs_private,
		assoc_work.work);
1262 1263 1264
	struct assoc_request * assoc_req = NULL;
	int ret = 0;
	int find_any_ssid = 0;
1265
	DECLARE_SSID_BUF(ssid);
1266

1267
	lbs_deb_enter(LBS_DEB_ASSOC);
1268

1269 1270 1271 1272 1273
	mutex_lock(&priv->lock);
	assoc_req = priv->pending_assoc_req;
	priv->pending_assoc_req = NULL;
	priv->in_progress_assoc_req = assoc_req;
	mutex_unlock(&priv->lock);
1274

1275 1276
	if (!assoc_req)
		goto done;
1277

1278 1279 1280 1281 1282 1283 1284
	lbs_deb_assoc(
		"Association Request:\n"
		"    flags:     0x%08lx\n"
		"    SSID:      '%s'\n"
		"    chann:     %d\n"
		"    band:      %d\n"
		"    mode:      %d\n"
J
Johannes Berg 已提交
1285
		"    BSSID:     %pM\n"
1286 1287 1288
		"    secinfo:  %s%s%s\n"
		"    auth_mode: %d\n",
		assoc_req->flags,
1289
		print_ssid(ssid, assoc_req->ssid, assoc_req->ssid_len),
1290
		assoc_req->channel, assoc_req->band, assoc_req->mode,
J
Johannes Berg 已提交
1291
		assoc_req->bssid,
1292 1293 1294 1295
		assoc_req->secinfo.WPAenabled ? " WPA" : "",
		assoc_req->secinfo.WPA2enabled ? " WPA2" : "",
		assoc_req->secinfo.wep_enabled ? " WEP" : "",
		assoc_req->secinfo.auth_mode);
1296 1297 1298

	/* If 'any' SSID was specified, find an SSID to associate with */
	if (test_bit(ASSOC_FLAG_SSID, &assoc_req->flags)
1299
	    && !assoc_req->ssid_len)
1300 1301 1302 1303
		find_any_ssid = 1;

	/* But don't use 'any' SSID if there's a valid locked BSSID to use */
	if (test_bit(ASSOC_FLAG_BSSID, &assoc_req->flags)) {
1304 1305
		if (compare_ether_addr(assoc_req->bssid, bssid_any)
		    && compare_ether_addr(assoc_req->bssid, bssid_off))
1306 1307 1308 1309
			find_any_ssid = 0;
	}

	if (find_any_ssid) {
1310
		u8 new_mode = assoc_req->mode;
1311

1312
		ret = lbs_find_best_network_ssid(priv, assoc_req->ssid,
1313
				&assoc_req->ssid_len, assoc_req->mode, &new_mode);
1314
		if (ret) {
1315
			lbs_deb_assoc("Could not find best network\n");
1316 1317 1318 1319 1320
			ret = -ENETUNREACH;
			goto out;
		}

		/* Ensure we switch to the mode of the AP */
1321
		if (assoc_req->mode == IW_MODE_AUTO) {
1322 1323 1324 1325 1326 1327 1328 1329 1330
			set_bit(ASSOC_FLAG_MODE, &assoc_req->flags);
			assoc_req->mode = new_mode;
		}
	}

	/*
	 * Check if the attributes being changing require deauthentication
	 * from the currently associated infrastructure access point.
	 */
1331 1332
	if (priv->mode == IW_MODE_INFRA) {
		if (should_deauth_infrastructure(priv, assoc_req)) {
1333 1334 1335
			ret = lbs_cmd_80211_deauthenticate(priv,
							   priv->curbssparams.bssid,
							   WLAN_REASON_DEAUTH_LEAVING);
1336
			if (ret) {
1337
				lbs_deb_assoc("Deauthentication due to new "
1338 1339 1340 1341
					"configuration request failed: %d\n",
					ret);
			}
		}
1342 1343
	} else if (priv->mode == IW_MODE_ADHOC) {
		if (should_stop_adhoc(priv, assoc_req)) {
1344
			ret = lbs_adhoc_stop(priv);
1345
			if (ret) {
1346
				lbs_deb_assoc("Teardown of AdHoc network due to "
1347 1348 1349 1350 1351 1352 1353 1354 1355 1356
					"new configuration request failed: %d\n",
					ret);
			}

		}
	}

	/* Send the various configuration bits to the firmware */
	if (test_bit(ASSOC_FLAG_MODE, &assoc_req->flags)) {
		ret = assoc_helper_mode(priv, assoc_req);
1357
		if (ret)
1358 1359 1360
			goto out;
	}

1361 1362
	if (test_bit(ASSOC_FLAG_CHANNEL, &assoc_req->flags)) {
		ret = assoc_helper_channel(priv, assoc_req);
1363
		if (ret)
1364 1365 1366
			goto out;
	}

1367 1368 1369
	if (   test_bit(ASSOC_FLAG_WEP_KEYS, &assoc_req->flags)
	    || test_bit(ASSOC_FLAG_WEP_TX_KEYIDX, &assoc_req->flags)) {
		ret = assoc_helper_wep_keys(priv, assoc_req);
1370
		if (ret)
1371 1372 1373 1374 1375
			goto out;
	}

	if (test_bit(ASSOC_FLAG_SECINFO, &assoc_req->flags)) {
		ret = assoc_helper_secinfo(priv, assoc_req);
1376
		if (ret)
1377 1378 1379 1380 1381
			goto out;
	}

	if (test_bit(ASSOC_FLAG_WPA_IE, &assoc_req->flags)) {
		ret = assoc_helper_wpa_ie(priv, assoc_req);
1382
		if (ret)
1383 1384 1385 1386 1387 1388
			goto out;
	}

	if (test_bit(ASSOC_FLAG_WPA_MCAST_KEY, &assoc_req->flags)
	    || test_bit(ASSOC_FLAG_WPA_UCAST_KEY, &assoc_req->flags)) {
		ret = assoc_helper_wpa_keys(priv, assoc_req);
1389
		if (ret)
1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401
			goto out;
	}

	/* SSID/BSSID should be the _last_ config option set, because they
	 * trigger the association attempt.
	 */
	if (test_bit(ASSOC_FLAG_BSSID, &assoc_req->flags)
	    || test_bit(ASSOC_FLAG_SSID, &assoc_req->flags)) {
		int success = 1;

		ret = assoc_helper_associate(priv, assoc_req);
		if (ret) {
1402
			lbs_deb_assoc("ASSOC: association unsuccessful: %d\n",
1403 1404 1405 1406
				ret);
			success = 0;
		}

1407
		if (priv->connect_status != LBS_CONNECTED) {
1408 1409
			lbs_deb_assoc("ASSOC: association unsuccessful, "
				"not connected\n");
1410 1411 1412 1413
			success = 0;
		}

		if (success) {
J
Johannes Berg 已提交
1414 1415
			lbs_deb_assoc("associated to %pM\n",
				priv->curbssparams.bssid);
1416
			lbs_prepare_and_send_command(priv,
1417 1418
				CMD_802_11_RSSI,
				0, CMD_OPTION_WAITFORRSP, 0, NULL);
1419 1420 1421 1422 1423 1424 1425
		} else {
			ret = -1;
		}
	}

out:
	if (ret) {
1426
		lbs_deb_assoc("ASSOC: reconfiguration attempt unsuccessful: %d\n",
1427 1428
			ret);
	}
1429

1430 1431 1432
	mutex_lock(&priv->lock);
	priv->in_progress_assoc_req = NULL;
	mutex_unlock(&priv->lock);
1433
	kfree(assoc_req);
1434 1435 1436

done:
	lbs_deb_leave(LBS_DEB_ASSOC);
1437 1438 1439 1440 1441 1442
}


/*
 * Caller MUST hold any necessary locks
 */
1443
struct assoc_request *lbs_get_association_request(struct lbs_private *priv)
1444 1445 1446
{
	struct assoc_request * assoc_req;

1447
	lbs_deb_enter(LBS_DEB_ASSOC);
1448 1449
	if (!priv->pending_assoc_req) {
		priv->pending_assoc_req = kzalloc(sizeof(struct assoc_request),
1450
		                                     GFP_KERNEL);
1451
		if (!priv->pending_assoc_req) {
1452 1453 1454 1455 1456 1457 1458 1459 1460
			lbs_pr_info("Not enough memory to allocate association"
				" request!\n");
			return NULL;
		}
	}

	/* Copy current configuration attributes to the association request,
	 * but don't overwrite any that are already set.
	 */
1461
	assoc_req = priv->pending_assoc_req;
1462
	if (!test_bit(ASSOC_FLAG_SSID, &assoc_req->flags)) {
1463
		memcpy(&assoc_req->ssid, &priv->curbssparams.ssid,
1464
		       IW_ESSID_MAX_SIZE);
1465
		assoc_req->ssid_len = priv->curbssparams.ssid_len;
1466 1467 1468
	}

	if (!test_bit(ASSOC_FLAG_CHANNEL, &assoc_req->flags))
1469
		assoc_req->channel = priv->curbssparams.channel;
1470

1471
	if (!test_bit(ASSOC_FLAG_BAND, &assoc_req->flags))
1472
		assoc_req->band = priv->curbssparams.band;
1473

1474
	if (!test_bit(ASSOC_FLAG_MODE, &assoc_req->flags))
1475
		assoc_req->mode = priv->mode;
1476 1477

	if (!test_bit(ASSOC_FLAG_BSSID, &assoc_req->flags)) {
1478
		memcpy(&assoc_req->bssid, priv->curbssparams.bssid,
1479 1480 1481 1482 1483 1484
			ETH_ALEN);
	}

	if (!test_bit(ASSOC_FLAG_WEP_KEYS, &assoc_req->flags)) {
		int i;
		for (i = 0; i < 4; i++) {
1485
			memcpy(&assoc_req->wep_keys[i], &priv->wep_keys[i],
1486
				sizeof(struct enc_key));
1487 1488 1489 1490
		}
	}

	if (!test_bit(ASSOC_FLAG_WEP_TX_KEYIDX, &assoc_req->flags))
1491
		assoc_req->wep_tx_keyidx = priv->wep_tx_keyidx;
1492 1493

	if (!test_bit(ASSOC_FLAG_WPA_MCAST_KEY, &assoc_req->flags)) {
1494
		memcpy(&assoc_req->wpa_mcast_key, &priv->wpa_mcast_key,
1495
			sizeof(struct enc_key));
1496 1497 1498
	}

	if (!test_bit(ASSOC_FLAG_WPA_UCAST_KEY, &assoc_req->flags)) {
1499
		memcpy(&assoc_req->wpa_unicast_key, &priv->wpa_unicast_key,
1500
			sizeof(struct enc_key));
1501 1502 1503
	}

	if (!test_bit(ASSOC_FLAG_SECINFO, &assoc_req->flags)) {
1504
		memcpy(&assoc_req->secinfo, &priv->secinfo,
1505
			sizeof(struct lbs_802_11_security));
1506 1507 1508
	}

	if (!test_bit(ASSOC_FLAG_WPA_IE, &assoc_req->flags)) {
1509
		memcpy(&assoc_req->wpa_ie, &priv->wpa_ie,
1510
			MAX_WPA_IE_LEN);
1511
		assoc_req->wpa_ie_len = priv->wpa_ie_len;
1512 1513
	}

1514
	lbs_deb_leave(LBS_DEB_ASSOC);
1515 1516
	return assoc_req;
}
1517 1518


1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529
/**
 *  @brief Deauthenticate from a specific BSS
 *
 *  @param priv        A pointer to struct lbs_private structure
 *  @param bssid       The specific BSS to deauthenticate from
 *  @param reason      The 802.11 sec. 7.3.1.7 Reason Code for deauthenticating
 *
 *  @return            0 on success, error on failure
 */
int lbs_cmd_80211_deauthenticate(struct lbs_private *priv, u8 bssid[ETH_ALEN],
				 u16 reason)
1530
{
1531 1532
	struct cmd_ds_802_11_deauthenticate cmd;
	int ret;
1533 1534 1535

	lbs_deb_enter(LBS_DEB_JOIN);

1536 1537 1538 1539
	memset(&cmd, 0, sizeof(cmd));
	cmd.hdr.size = cpu_to_le16(sizeof(cmd));
	memcpy(cmd.macaddr, &bssid[0], ETH_ALEN);
	cmd.reasoncode = cpu_to_le16(reason);
1540

1541
	ret = lbs_cmd_with_response(priv, CMD_802_11_DEAUTHENTICATE, &cmd);
1542

1543 1544 1545 1546
	/* Clean up everything even if there was an error; can't assume that
	 * we're still authenticated to the AP after trying to deauth.
	 */
	lbs_mac_event_disconnected(priv);
1547 1548

	lbs_deb_leave(LBS_DEB_JOIN);
1549
	return ret;
1550 1551 1552 1553 1554 1555 1556 1557 1558 1559
}

int lbs_cmd_80211_associate(struct lbs_private *priv,
			      struct cmd_ds_command *cmd, void *pdata_buf)
{
	struct cmd_ds_802_11_associate *passo = &cmd->params.associate;
	int ret = 0;
	struct assoc_request *assoc_req = pdata_buf;
	struct bss_descriptor *bss = &assoc_req->bss;
	u8 *pos;
1560
	u16 tmpcap, tmplen, tmpauth;
1561 1562 1563 1564 1565
	struct mrvl_ie_ssid_param_set *ssid;
	struct mrvl_ie_ds_param_set *ds;
	struct mrvl_ie_cf_param_set *cf;
	struct mrvl_ie_rates_param_set *rates;
	struct mrvl_ie_rsn_param_set *rsn;
1566
	struct mrvl_ie_auth_type *auth;
1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589

	lbs_deb_enter(LBS_DEB_ASSOC);

	pos = (u8 *) passo;

	if (!priv) {
		ret = -1;
		goto done;
	}

	cmd->command = cpu_to_le16(CMD_802_11_ASSOCIATE);

	memcpy(passo->peerstaaddr, bss->bssid, sizeof(passo->peerstaaddr));
	pos += sizeof(passo->peerstaaddr);

	/* set the listen interval */
	passo->listeninterval = cpu_to_le16(MRVDRV_DEFAULT_LISTEN_INTERVAL);

	pos += sizeof(passo->capability);
	pos += sizeof(passo->listeninterval);
	pos += sizeof(passo->bcnperiod);
	pos += sizeof(passo->dtimperiod);

1590
	ssid = (struct mrvl_ie_ssid_param_set *) pos;
1591 1592 1593 1594 1595 1596
	ssid->header.type = cpu_to_le16(TLV_TYPE_SSID);
	tmplen = bss->ssid_len;
	ssid->header.len = cpu_to_le16(tmplen);
	memcpy(ssid->ssid, bss->ssid, tmplen);
	pos += sizeof(ssid->header) + tmplen;

1597
	ds = (struct mrvl_ie_ds_param_set *) pos;
1598 1599 1600 1601 1602
	ds->header.type = cpu_to_le16(TLV_TYPE_PHY_DS);
	ds->header.len = cpu_to_le16(1);
	ds->channel = bss->phy.ds.channel;
	pos += sizeof(ds->header) + 1;

1603
	cf = (struct mrvl_ie_cf_param_set *) pos;
1604 1605 1606 1607 1608
	cf->header.type = cpu_to_le16(TLV_TYPE_CF);
	tmplen = sizeof(*cf) - sizeof (cf->header);
	cf->header.len = cpu_to_le16(tmplen);
	/* IE payload should be zeroed, firmware fills it in for us */
	pos += sizeof(*cf);
1609

1610
	rates = (struct mrvl_ie_rates_param_set *) pos;
1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630
	rates->header.type = cpu_to_le16(TLV_TYPE_RATES);
	memcpy(&rates->rates, &bss->rates, MAX_RATES);
	tmplen = MAX_RATES;
	if (get_common_rates(priv, rates->rates, &tmplen)) {
		ret = -1;
		goto done;
	}
	pos += sizeof(rates->header) + tmplen;
	rates->header.len = cpu_to_le16(tmplen);
	lbs_deb_assoc("ASSOC_CMD: num rates %u\n", tmplen);

	/* Copy the infra. association rates into Current BSS state structure */
	memset(&priv->curbssparams.rates, 0, sizeof(priv->curbssparams.rates));
	memcpy(&priv->curbssparams.rates, &rates->rates, tmplen);

	/* Set MSB on basic rates as the firmware requires, but _after_
	 * copying to current bss rates.
	 */
	lbs_set_basic_rate_flags(rates->rates, tmplen);

1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645
	/* Firmware v9+ indicate authentication suites as a TLV */
	if (priv->fwrelease >= 0x09000000) {
		DECLARE_MAC_BUF(mac);

		auth = (struct mrvl_ie_auth_type *) pos;
		auth->header.type = cpu_to_le16(TLV_TYPE_AUTH_TYPE);
		auth->header.len = cpu_to_le16(2);
		tmpauth = iw_auth_to_ieee_auth(priv->secinfo.auth_mode);
		auth->auth = cpu_to_le16(tmpauth);
		pos += sizeof(auth->header) + 2;

		lbs_deb_join("AUTH_CMD: BSSID %s, auth 0x%x\n",
			print_mac(mac, bss->bssid), priv->secinfo.auth_mode);
	}

1646
	if (assoc_req->secinfo.WPAenabled || assoc_req->secinfo.WPA2enabled) {
1647
		rsn = (struct mrvl_ie_rsn_param_set *) pos;
1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658
		/* WPA_IE or WPA2_IE */
		rsn->header.type = cpu_to_le16((u16) assoc_req->wpa_ie[0]);
		tmplen = (u16) assoc_req->wpa_ie[1];
		rsn->header.len = cpu_to_le16(tmplen);
		memcpy(rsn->rsnie, &assoc_req->wpa_ie[2], tmplen);
		lbs_deb_hex(LBS_DEB_JOIN, "ASSOC_CMD: RSN IE", (u8 *) rsn,
			sizeof(rsn->header) + tmplen);
		pos += sizeof(rsn->header) + tmplen;
	}

	/* update curbssparams */
1659
	priv->curbssparams.channel = bss->phy.ds.channel;
1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684

	if (lbs_parse_dnld_countryinfo_11d(priv, bss)) {
		ret = -1;
		goto done;
	}

	cmd->size = cpu_to_le16((u16) (pos - (u8 *) passo) + S_DS_GEN);

	/* set the capability info */
	tmpcap = (bss->capability & CAPINFO_MASK);
	if (bss->mode == IW_MODE_INFRA)
		tmpcap |= WLAN_CAPABILITY_ESS;
	passo->capability = cpu_to_le16(tmpcap);
	lbs_deb_assoc("ASSOC_CMD: capability 0x%04x\n", tmpcap);

done:
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
	return ret;
}

int lbs_ret_80211_associate(struct lbs_private *priv,
			      struct cmd_ds_command *resp)
{
	int ret = 0;
	union iwreq_data wrqu;
1685
	struct ieee_assoc_response *passocrsp;
1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697
	struct bss_descriptor *bss;
	u16 status_code;

	lbs_deb_enter(LBS_DEB_ASSOC);

	if (!priv->in_progress_assoc_req) {
		lbs_deb_assoc("ASSOC_RESP: no in-progress assoc request\n");
		ret = -1;
		goto done;
	}
	bss = &priv->in_progress_assoc_req->bss;

1698
	passocrsp = (struct ieee_assoc_response *) &resp->params;
1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780

	/*
	 * Older FW versions map the IEEE 802.11 Status Code in the association
	 * response to the following values returned in passocrsp->statuscode:
	 *
	 *    IEEE Status Code                Marvell Status Code
	 *    0                       ->      0x0000 ASSOC_RESULT_SUCCESS
	 *    13                      ->      0x0004 ASSOC_RESULT_AUTH_REFUSED
	 *    14                      ->      0x0004 ASSOC_RESULT_AUTH_REFUSED
	 *    15                      ->      0x0004 ASSOC_RESULT_AUTH_REFUSED
	 *    16                      ->      0x0004 ASSOC_RESULT_AUTH_REFUSED
	 *    others                  ->      0x0003 ASSOC_RESULT_REFUSED
	 *
	 * Other response codes:
	 *    0x0001 -> ASSOC_RESULT_INVALID_PARAMETERS (unused)
	 *    0x0002 -> ASSOC_RESULT_TIMEOUT (internal timer expired waiting for
	 *                                    association response from the AP)
	 */

	status_code = le16_to_cpu(passocrsp->statuscode);
	switch (status_code) {
	case 0x00:
		break;
	case 0x01:
		lbs_deb_assoc("ASSOC_RESP: invalid parameters\n");
		break;
	case 0x02:
		lbs_deb_assoc("ASSOC_RESP: internal timer "
			"expired while waiting for the AP\n");
		break;
	case 0x03:
		lbs_deb_assoc("ASSOC_RESP: association "
			"refused by AP\n");
		break;
	case 0x04:
		lbs_deb_assoc("ASSOC_RESP: authentication "
			"refused by AP\n");
		break;
	default:
		lbs_deb_assoc("ASSOC_RESP: failure reason 0x%02x "
			" unknown\n", status_code);
		break;
	}

	if (status_code) {
		lbs_mac_event_disconnected(priv);
		ret = -1;
		goto done;
	}

	lbs_deb_hex(LBS_DEB_ASSOC, "ASSOC_RESP", (void *)&resp->params,
		le16_to_cpu(resp->size) - S_DS_GEN);

	/* Send a Media Connected event, according to the Spec */
	priv->connect_status = LBS_CONNECTED;

	/* Update current SSID and BSSID */
	memcpy(&priv->curbssparams.ssid, &bss->ssid, IW_ESSID_MAX_SIZE);
	priv->curbssparams.ssid_len = bss->ssid_len;
	memcpy(priv->curbssparams.bssid, bss->bssid, ETH_ALEN);

	priv->SNR[TYPE_RXPD][TYPE_AVG] = 0;
	priv->NF[TYPE_RXPD][TYPE_AVG] = 0;

	memset(priv->rawSNR, 0x00, sizeof(priv->rawSNR));
	memset(priv->rawNF, 0x00, sizeof(priv->rawNF));
	priv->nextSNRNF = 0;
	priv->numSNRNF = 0;

	netif_carrier_on(priv->dev);
	if (!priv->tx_pending_len)
		netif_wake_queue(priv->dev);

	memcpy(wrqu.ap_addr.sa_data, priv->curbssparams.bssid, ETH_ALEN);
	wrqu.ap_addr.sa_family = ARPHRD_ETHER;
	wireless_send_event(priv->dev, SIOCGIWAP, &wrqu, NULL);

done:
	lbs_deb_leave_args(LBS_DEB_ASSOC, "ret %d", ret);
	return ret;
}

1781
static int lbs_adhoc_post(struct lbs_private *priv, struct cmd_header *resp)
1782 1783 1784 1785
{
	int ret = 0;
	u16 command = le16_to_cpu(resp->command);
	u16 result = le16_to_cpu(resp->result);
1786
	struct cmd_ds_802_11_ad_hoc_result *adhoc_resp;
1787 1788
	union iwreq_data wrqu;
	struct bss_descriptor *bss;
1789
	DECLARE_SSID_BUF(ssid);
1790 1791 1792

	lbs_deb_enter(LBS_DEB_JOIN);

1793
	adhoc_resp = (struct cmd_ds_802_11_ad_hoc_result *) resp;
1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806

	if (!priv->in_progress_assoc_req) {
		lbs_deb_join("ADHOC_RESP: no in-progress association "
			"request\n");
		ret = -1;
		goto done;
	}
	bss = &priv->in_progress_assoc_req->bss;

	/*
	 * Join result code 0 --> SUCCESS
	 */
	if (result) {
1807
		lbs_deb_join("ADHOC_RESP: failed (result 0x%X)\n", result);
1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818
		if (priv->connect_status == LBS_CONNECTED)
			lbs_mac_event_disconnected(priv);
		ret = -1;
		goto done;
	}

	/* Send a Media Connected event, according to the Spec */
	priv->connect_status = LBS_CONNECTED;

	if (command == CMD_RET(CMD_802_11_AD_HOC_START)) {
		/* Update the created network descriptor with the new BSSID */
1819
		memcpy(bss->bssid, adhoc_resp->bssid, ETH_ALEN);
1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837
	}

	/* Set the BSSID from the joined/started descriptor */
	memcpy(&priv->curbssparams.bssid, bss->bssid, ETH_ALEN);

	/* Set the new SSID to current SSID */
	memcpy(&priv->curbssparams.ssid, &bss->ssid, IW_ESSID_MAX_SIZE);
	priv->curbssparams.ssid_len = bss->ssid_len;

	netif_carrier_on(priv->dev);
	if (!priv->tx_pending_len)
		netif_wake_queue(priv->dev);

	memset(&wrqu, 0, sizeof(wrqu));
	memcpy(wrqu.ap_addr.sa_data, priv->curbssparams.bssid, ETH_ALEN);
	wrqu.ap_addr.sa_family = ARPHRD_ETHER;
	wireless_send_event(priv->dev, SIOCGIWAP, &wrqu, NULL);

J
Johannes Berg 已提交
1838
	lbs_deb_join("ADHOC_RESP: Joined/started '%s', BSSID %pM, channel %d\n",
1839
		     print_ssid(ssid, bss->ssid, bss->ssid_len),
J
Johannes Berg 已提交
1840
		     priv->curbssparams.bssid,
1841
		     priv->curbssparams.channel);
1842 1843 1844 1845 1846 1847

done:
	lbs_deb_leave_args(LBS_DEB_JOIN, "ret %d", ret);
	return ret;
}