1 /******************************************************************************
4 * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
5 * Linux device driver for RTL8192SU
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms of version 2 of the GNU General Public License as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
16 * You should have received a copy of the GNU General Public License along with
17 * this program; if not, write to the Free Software Foundation, Inc.,
18 * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
20 * Modifications for inclusion into the Linux staging tree are
21 * Copyright(c) 2010 Larry Finger. All rights reserved.
23 * Contact information:
27 ******************************************************************************/
29 #define _MLME_OSDEP_C_
31 #include "osdep_service.h"
32 #include "drv_types.h"
33 #include "mlme_osdep.h"
35 static void sitesurvey_ctrl_handler(unsigned long data)
37 struct _adapter *adapter = (struct _adapter *)data;
39 _r8712_sitesurvey_ctrl_handler(adapter);
40 mod_timer(&adapter->mlmepriv.sitesurveyctrl.sitesurvey_ctrl_timer,
41 jiffies + msecs_to_jiffies(3000));
44 static void join_timeout_handler (unsigned long data)
46 struct _adapter *adapter = (struct _adapter *)data;
48 _r8712_join_timeout_handler(adapter);
51 static void _scan_timeout_handler (unsigned long data)
53 struct _adapter *adapter = (struct _adapter *)data;
55 r8712_scan_timeout_handler(adapter);
58 static void dhcp_timeout_handler (unsigned long data)
60 struct _adapter *adapter = (struct _adapter *)data;
62 _r8712_dhcp_timeout_handler(adapter);
65 static void wdg_timeout_handler (unsigned long data)
67 struct _adapter *adapter = (struct _adapter *)data;
69 _r8712_wdg_timeout_handler(adapter);
71 mod_timer(&adapter->mlmepriv.wdg_timer,
72 jiffies + msecs_to_jiffies(2000));
75 void r8712_init_mlme_timer(struct _adapter *padapter)
77 struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
79 setup_timer(&pmlmepriv->assoc_timer, join_timeout_handler,
80 (unsigned long)padapter);
81 setup_timer(&pmlmepriv->sitesurveyctrl.sitesurvey_ctrl_timer,
82 sitesurvey_ctrl_handler,
83 (unsigned long)padapter);
84 setup_timer(&pmlmepriv->scan_to_timer, _scan_timeout_handler,
85 (unsigned long)padapter);
86 setup_timer(&pmlmepriv->dhcp_timer, dhcp_timeout_handler,
87 (unsigned long)padapter);
88 setup_timer(&pmlmepriv->wdg_timer, wdg_timeout_handler,
89 (unsigned long)padapter);
92 void r8712_os_indicate_connect(struct _adapter *adapter)
94 r8712_indicate_wx_assoc_event(adapter);
95 netif_carrier_on(adapter->pnetdev);
98 static struct RT_PMKID_LIST backupPMKIDList[NUM_PMKID_CACHE];
99 void r8712_os_indicate_disconnect(struct _adapter *adapter)
101 u8 backupPMKIDIndex = 0;
102 u8 backupTKIPCountermeasure = 0x00;
104 r8712_indicate_wx_disassoc_event(adapter);
105 netif_carrier_off(adapter->pnetdev);
106 if (adapter->securitypriv.AuthAlgrthm == 2) { /*/802.1x*/
107 /* We have to backup the PMK information for WiFi PMK Caching
108 * test item. Backup the btkip_countermeasure information.
109 * When the countermeasure is trigger, the driver have to
110 * disconnect with AP for 60 seconds.
113 memcpy(&backupPMKIDList[0], &adapter->securitypriv.
114 PMKIDList[0], sizeof(struct RT_PMKID_LIST) *
116 backupPMKIDIndex = adapter->securitypriv.PMKIDIndex;
117 backupTKIPCountermeasure = adapter->securitypriv.
118 btkip_countermeasure;
119 memset((unsigned char *)&adapter->securitypriv, 0,
120 sizeof(struct security_priv));
121 setup_timer(&adapter->securitypriv.tkip_timer,
122 r8712_use_tkipkey_handler,
123 (unsigned long)adapter);
124 /* Restore the PMK information to securitypriv structure
125 * for the following connection.
127 memcpy(&adapter->securitypriv.PMKIDList[0],
129 sizeof(struct RT_PMKID_LIST) * NUM_PMKID_CACHE);
130 adapter->securitypriv.PMKIDIndex = backupPMKIDIndex;
131 adapter->securitypriv.btkip_countermeasure =
132 backupTKIPCountermeasure;
133 } else { /*reset values in securitypriv*/
134 struct security_priv *psec_priv = &adapter->securitypriv;
136 psec_priv->AuthAlgrthm = 0; /*open system*/
137 psec_priv->PrivacyAlgrthm = _NO_PRIVACY_;
138 psec_priv->PrivacyKeyIndex = 0;
139 psec_priv->XGrpPrivacy = _NO_PRIVACY_;
140 psec_priv->XGrpKeyid = 1;
141 psec_priv->ndisauthtype = Ndis802_11AuthModeOpen;
142 psec_priv->ndisencryptstatus = Ndis802_11WEPDisabled;
143 psec_priv->wps_phase = false;
147 void r8712_report_sec_ie(struct _adapter *adapter, u8 authmode, u8 *sec_ie)
151 union iwreq_data wrqu;
154 if (authmode == _WPA_IE_ID_) {
155 buff = kzalloc(IW_CUSTOM_MAX, GFP_ATOMIC);
159 p += sprintf(p, "ASSOCINFO(ReqIEs=");
161 len = (len < IW_CUSTOM_MAX) ? len : IW_CUSTOM_MAX - 1;
162 for (i = 0; i < len; i++)
163 p += sprintf(p, "%02x", sec_ie[i]);
164 p += sprintf(p, ")");
165 memset(&wrqu, 0, sizeof(wrqu));
166 wrqu.data.length = p - buff;
167 wrqu.data.length = (wrqu.data.length < IW_CUSTOM_MAX) ?
168 wrqu.data.length : IW_CUSTOM_MAX;
169 wireless_send_event(adapter->pnetdev, IWEVCUSTOM, &wrqu, buff);