1/******************************************************************************
2 * mlme_linux.c
3 *
4 * Copyright(c) 2007 - 2010 Realtek Corporation. All rights reserved.
5 * Linux device driver for RTL8192SU
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms of version 2 of the GNU General Public License as
9 * published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope that it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
14 * more details.
15 *
16 * You should have received a copy of the GNU General Public License along with
17 * this program; if not, write to the Free Software Foundation, Inc.,
18 * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
19 *
20 * Modifications for inclusion into the Linux staging tree are
21 * Copyright(c) 2010 Larry Finger. All rights reserved.
22 *
23 * Contact information:
24 * WLAN FAE <wlanfae@realtek.com>.
25 * Larry Finger <Larry.Finger@lwfinger.net>
26 *
27 ******************************************************************************/
28
29#define _MLME_OSDEP_C_
30
31#include "osdep_service.h"
32#include "drv_types.h"
33#include "mlme_osdep.h"
34
35static void sitesurvey_ctrl_handler(unsigned long data)
36{
37	struct _adapter *adapter = (struct _adapter *)data;
38
39	_r8712_sitesurvey_ctrl_handler(adapter);
40	mod_timer(&adapter->mlmepriv.sitesurveyctrl.sitesurvey_ctrl_timer,
41		  jiffies + msecs_to_jiffies(3000));
42}
43
44static void join_timeout_handler (unsigned long data)
45{
46	struct _adapter *adapter = (struct _adapter *)data;
47
48	_r8712_join_timeout_handler(adapter);
49}
50
51static void _scan_timeout_handler (unsigned long data)
52{
53	struct _adapter *adapter = (struct _adapter *)data;
54
55	r8712_scan_timeout_handler(adapter);
56}
57
58static void dhcp_timeout_handler (unsigned long data)
59{
60	struct _adapter *adapter = (struct _adapter *)data;
61
62	_r8712_dhcp_timeout_handler(adapter);
63}
64
65static void wdg_timeout_handler (unsigned long data)
66{
67	struct _adapter *adapter = (struct _adapter *)data;
68
69	_r8712_wdg_timeout_handler(adapter);
70
71	mod_timer(&adapter->mlmepriv.wdg_timer,
72		  jiffies + msecs_to_jiffies(2000));
73}
74
75void r8712_init_mlme_timer(struct _adapter *padapter)
76{
77	struct	mlme_priv *pmlmepriv = &padapter->mlmepriv;
78
79	setup_timer(&pmlmepriv->assoc_timer, join_timeout_handler,
80		    (unsigned long)padapter);
81	setup_timer(&pmlmepriv->sitesurveyctrl.sitesurvey_ctrl_timer,
82		    sitesurvey_ctrl_handler,
83		    (unsigned long)padapter);
84	setup_timer(&pmlmepriv->scan_to_timer, _scan_timeout_handler,
85		    (unsigned long)padapter);
86	setup_timer(&pmlmepriv->dhcp_timer, dhcp_timeout_handler,
87		    (unsigned long)padapter);
88	setup_timer(&pmlmepriv->wdg_timer, wdg_timeout_handler,
89		    (unsigned long)padapter);
90}
91
92void r8712_os_indicate_connect(struct _adapter *adapter)
93{
94	r8712_indicate_wx_assoc_event(adapter);
95	netif_carrier_on(adapter->pnetdev);
96}
97
98static struct RT_PMKID_LIST   backupPMKIDList[NUM_PMKID_CACHE];
99void r8712_os_indicate_disconnect(struct _adapter *adapter)
100{
101	u8 backupPMKIDIndex = 0;
102	u8 backupTKIPCountermeasure = 0x00;
103
104	r8712_indicate_wx_disassoc_event(adapter);
105	netif_carrier_off(adapter->pnetdev);
106	if (adapter->securitypriv.AuthAlgrthm == 2) { /*/802.1x*/
107		/* We have to backup the PMK information for WiFi PMK Caching
108		 * test item. Backup the btkip_countermeasure information.
109		 * When the countermeasure is trigger, the driver have to
110		 * disconnect with AP for 60 seconds.
111		 */
112
113		memcpy(&backupPMKIDList[0], &adapter->securitypriv.
114			PMKIDList[0], sizeof(struct RT_PMKID_LIST) *
115			NUM_PMKID_CACHE);
116		backupPMKIDIndex = adapter->securitypriv.PMKIDIndex;
117		backupTKIPCountermeasure = adapter->securitypriv.
118					   btkip_countermeasure;
119		memset((unsigned char *)&adapter->securitypriv, 0,
120			 sizeof(struct security_priv));
121		setup_timer(&adapter->securitypriv.tkip_timer,
122			    r8712_use_tkipkey_handler,
123			    (unsigned long)adapter);
124		/* Restore the PMK information to securitypriv structure
125		 * for the following connection. */
126		memcpy(&adapter->securitypriv.PMKIDList[0],
127			&backupPMKIDList[0],
128			sizeof(struct RT_PMKID_LIST) * NUM_PMKID_CACHE);
129		adapter->securitypriv.PMKIDIndex = backupPMKIDIndex;
130		adapter->securitypriv.btkip_countermeasure =
131					 backupTKIPCountermeasure;
132	} else { /*reset values in securitypriv*/
133		struct security_priv *psec_priv = &adapter->securitypriv;
134
135		psec_priv->AuthAlgrthm = 0; /*open system*/
136		psec_priv->PrivacyAlgrthm = _NO_PRIVACY_;
137		psec_priv->PrivacyKeyIndex = 0;
138		psec_priv->XGrpPrivacy = _NO_PRIVACY_;
139		psec_priv->XGrpKeyid = 1;
140		psec_priv->ndisauthtype = Ndis802_11AuthModeOpen;
141		psec_priv->ndisencryptstatus = Ndis802_11WEPDisabled;
142		psec_priv->wps_phase = false;
143	}
144}
145
146void r8712_report_sec_ie(struct _adapter *adapter, u8 authmode, u8 *sec_ie)
147{
148	uint len;
149	u8 *buff, *p, i;
150	union iwreq_data wrqu;
151
152	buff = NULL;
153	if (authmode == _WPA_IE_ID_) {
154		buff = kzalloc(IW_CUSTOM_MAX, GFP_ATOMIC);
155		if (buff == NULL)
156			return;
157		p = buff;
158		p += sprintf(p, "ASSOCINFO(ReqIEs=");
159		len = sec_ie[1] + 2;
160		len =  (len < IW_CUSTOM_MAX) ? len : IW_CUSTOM_MAX - 1;
161		for (i = 0; i < len; i++)
162			p += sprintf(p, "%02x", sec_ie[i]);
163		p += sprintf(p, ")");
164		memset(&wrqu, 0, sizeof(wrqu));
165		wrqu.data.length = p-buff;
166		wrqu.data.length = (wrqu.data.length < IW_CUSTOM_MAX) ?
167				   wrqu.data.length : IW_CUSTOM_MAX;
168		wireless_send_event(adapter->pnetdev, IWEVCUSTOM, &wrqu, buff);
169		kfree(buff);
170	}
171}
172