]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - drivers/staging/wlan-ng/prism2sta.c
Fix common misspellings
[mirror_ubuntu-bionic-kernel.git] / drivers / staging / wlan-ng / prism2sta.c
CommitLineData
00b3ed16
GKH
1/* src/prism2/driver/prism2sta.c
2*
3* Implements the station functionality for prism2
4*
5* Copyright (C) 1999 AbsoluteValue Systems, Inc. All Rights Reserved.
6* --------------------------------------------------------------------
7*
8* linux-wlan
9*
10* The contents of this file are subject to the Mozilla Public
11* License Version 1.1 (the "License"); you may not use this file
12* except in compliance with the License. You may obtain a copy of
13* the License at http://www.mozilla.org/MPL/
14*
15* Software distributed under the License is distributed on an "AS
16* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
17* implied. See the License for the specific language governing
18* rights and limitations under the License.
19*
20* Alternatively, the contents of this file may be used under the
21* terms of the GNU Public License version 2 (the "GPL"), in which
22* case the provisions of the GPL are applicable instead of the
23* above. If you wish to allow the use of your version of this file
24* only under the terms of the GPL and not to allow others to use
25* your version of this file under the MPL, indicate your decision
26* by deleting the provisions above and replace them with the notice
27* and other provisions required by the GPL. If you do not delete
28* the provisions above, a recipient may use your version of this
29* file under either the MPL or the GPL.
30*
31* --------------------------------------------------------------------
32*
33* Inquiries regarding the linux-wlan Open Source project can be
34* made directly to:
35*
36* AbsoluteValue Systems Inc.
37* info@linux-wlan.com
38* http://www.linux-wlan.com
39*
40* --------------------------------------------------------------------
41*
42* Portions of the development of this software were funded by
43* Intersil Corporation as part of PRISM(R) chipset product development.
44*
45* --------------------------------------------------------------------
46*
47* This file implements the module and linux pcmcia routines for the
48* prism2 driver.
49*
50* --------------------------------------------------------------------
51*/
52
00b3ed16 53#include <linux/version.h>
00b3ed16 54#include <linux/module.h>
00b3ed16 55#include <linux/moduleparam.h>
00b3ed16
GKH
56#include <linux/kernel.h>
57#include <linux/sched.h>
58#include <linux/types.h>
59#include <linux/init.h>
60#include <linux/slab.h>
61#include <linux/wireless.h>
62#include <linux/netdevice.h>
00b3ed16 63#include <linux/workqueue.h>
ae26230b 64#include <linux/byteorder/generic.h>
a7cf7bae 65#include <linux/ctype.h>
00b3ed16 66
ef1a0ed7 67#include <linux/io.h>
00b3ed16
GKH
68#include <linux/delay.h>
69#include <asm/byteorder.h>
70#include <linux/if_arp.h>
28b17a4b 71#include <linux/if_ether.h>
7f6e0e44 72#include <linux/bitops.h>
00b3ed16 73
00b3ed16
GKH
74#include "p80211types.h"
75#include "p80211hdr.h"
76#include "p80211mgmt.h"
77#include "p80211conv.h"
78#include "p80211msg.h"
79#include "p80211netdev.h"
80#include "p80211req.h"
81#include "p80211metadef.h"
82#include "p80211metastruct.h"
83#include "hfa384x.h"
84#include "prism2mgmt.h"
85
16910554
MM
86/* Create a string of printable chars from something that might not be */
87/* It's recommended that the str be 4*len + 1 bytes long */
88#define wlan_mkprintstr(buf, buflen, str, strlen) \
89{ \
90 int i = 0; \
91 int j = 0; \
92 memset(str, 0, (strlen)); \
93 for (i = 0; i < (buflen); i++) { \
f3422882 94 if (isprint((buf)[i])) { \
16910554
MM
95 (str)[j] = (buf)[i]; \
96 j++; \
97 } else { \
98 (str)[j] = '\\'; \
99 (str)[j+1] = 'x'; \
cfa54896
AS
100 (str)[j+2] = hex_asc_hi((buf)[i]); \
101 (str)[j+3] = hex_asc_lo((buf)[i]); \
16910554
MM
102 j += 4; \
103 } \
104 } \
105}
00b3ed16 106
e02c69b8 107static char *dev_info = "prism2_usb";
00b3ed16
GKH
108static wlandevice_t *create_wlan(void);
109
f3422882
MM
110int prism2_reset_holdtime = 30; /* Reset hold time in ms */
111int prism2_reset_settletime = 100; /* Reset settle time in ms */
00b3ed16 112
297f06ce 113static int prism2_doreset; /* Do a reset at init? */
00b3ed16 114
f3422882 115module_param(prism2_doreset, int, 0644);
00b3ed16
GKH
116MODULE_PARM_DESC(prism2_doreset, "Issue a reset on initialization");
117
f3422882
MM
118module_param(prism2_reset_holdtime, int, 0644);
119MODULE_PARM_DESC(prism2_reset_holdtime, "reset hold time in ms");
120module_param(prism2_reset_settletime, int, 0644);
121MODULE_PARM_DESC(prism2_reset_settletime, "reset settle time in ms");
00b3ed16 122
00b3ed16
GKH
123MODULE_LICENSE("Dual MPL/GPL");
124
cb3126e6
KR
125void prism2_connect_result(wlandevice_t *wlandev, u8 failed);
126void prism2_disconnected(wlandevice_t *wlandev);
127void prism2_roamed(wlandevice_t *wlandev);
128
297f06ce
MT
129static int prism2sta_open(wlandevice_t *wlandev);
130static int prism2sta_close(wlandevice_t *wlandev);
131static void prism2sta_reset(wlandevice_t *wlandev);
132static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
93df38e5 133 union p80211_hdr *p80211_hdr,
51e4896a 134 struct p80211_metawep *p80211_wep);
3d049431 135static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg);
297f06ce
MT
136static int prism2sta_getcardinfo(wlandevice_t *wlandev);
137static int prism2sta_globalsetup(wlandevice_t *wlandev);
138static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev);
139
140static void prism2sta_inf_handover(wlandevice_t *wlandev,
141 hfa384x_InfFrame_t *inf);
142static void prism2sta_inf_tallies(wlandevice_t *wlandev,
143 hfa384x_InfFrame_t *inf);
144static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
145 hfa384x_InfFrame_t *inf);
146static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
147 hfa384x_InfFrame_t *inf);
148static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
149 hfa384x_InfFrame_t *inf);
150static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
151 hfa384x_InfFrame_t *inf);
152static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
153 hfa384x_InfFrame_t *inf);
154static void prism2sta_inf_authreq(wlandevice_t *wlandev,
155 hfa384x_InfFrame_t *inf);
156static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
157 hfa384x_InfFrame_t *inf);
158static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
159 hfa384x_InfFrame_t *inf);
00b3ed16
GKH
160
161/*----------------------------------------------------------------
162* prism2sta_open
163*
164* WLAN device open method. Called from p80211netdev when kernel
165* device open (start) method is called in response to the
166* SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
167* from clear to set.
168*
169* Arguments:
170* wlandev wlan device structure
171*
172* Returns:
173* 0 success
174* >0 f/w reported error
175* <0 driver reported error
176*
177* Side effects:
178*
179* Call context:
180* process thread
181----------------------------------------------------------------*/
297f06ce 182static int prism2sta_open(wlandevice_t *wlandev)
00b3ed16 183{
00b3ed16
GKH
184 /* We don't currently have to do anything else.
185 * The setup of the MAC should be subsequently completed via
186 * the mlme commands.
187 * Higher layers know we're ready from dev->start==1 and
188 * dev->tbusy==0. Our rx path knows to pass up received/
189 * frames because of dev->flags&IFF_UP is true.
190 */
191
00b3ed16
GKH
192 return 0;
193}
194
00b3ed16
GKH
195/*----------------------------------------------------------------
196* prism2sta_close
197*
198* WLAN device close method. Called from p80211netdev when kernel
199* device close method is called in response to the
200* SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
201* from set to clear.
202*
203* Arguments:
204* wlandev wlan device structure
205*
206* Returns:
207* 0 success
208* >0 f/w reported error
209* <0 driver reported error
210*
211* Side effects:
212*
213* Call context:
214* process thread
215----------------------------------------------------------------*/
297f06ce 216static int prism2sta_close(wlandevice_t *wlandev)
00b3ed16 217{
00b3ed16
GKH
218 /* We don't currently have to do anything else.
219 * Higher layers know we're not ready from dev->start==0 and
220 * dev->tbusy==1. Our rx path knows to not pass up received
221 * frames because of dev->flags&IFF_UP is false.
222 */
223
00b3ed16
GKH
224 return 0;
225}
226
00b3ed16
GKH
227/*----------------------------------------------------------------
228* prism2sta_reset
229*
230* Not currently implented.
231*
232* Arguments:
233* wlandev wlan device structure
234* none
235*
236* Returns:
237* nothing
238*
239* Side effects:
240*
241* Call context:
242* process thread
243----------------------------------------------------------------*/
297f06ce 244static void prism2sta_reset(wlandevice_t *wlandev)
00b3ed16 245{
00b3ed16
GKH
246 return;
247}
248
00b3ed16
GKH
249/*----------------------------------------------------------------
250* prism2sta_txframe
251*
252* Takes a frame from p80211 and queues it for transmission.
253*
254* Arguments:
255* wlandev wlan device structure
256* pb packet buffer struct. Contains an 802.11
257* data frame.
258* p80211_hdr points to the 802.11 header for the packet.
259* Returns:
260* 0 Success and more buffs available
261* 1 Success but no more buffs
262* 2 Allocation failure
263* 4 Buffer full or queue busy
264*
265* Side effects:
266*
267* Call context:
268* process thread
269----------------------------------------------------------------*/
297f06ce 270static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
93df38e5 271 union p80211_hdr *p80211_hdr,
51e4896a 272 struct p80211_metawep *p80211_wep)
00b3ed16 273{
f3422882
MM
274 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
275 int result;
00b3ed16
GKH
276
277 /* If necessary, set the 802.11 WEP bit */
f3422882
MM
278 if ((wlandev->hostwep & (HOSTWEP_PRIVACYINVOKED | HOSTWEP_ENCRYPT)) ==
279 HOSTWEP_PRIVACYINVOKED) {
ae26230b 280 p80211_hdr->a3.fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1));
00b3ed16
GKH
281 }
282
283 result = hfa384x_drvr_txframe(hw, skb, p80211_hdr, p80211_wep);
284
00b3ed16
GKH
285 return result;
286}
287
00b3ed16
GKH
288/*----------------------------------------------------------------
289* prism2sta_mlmerequest
290*
291* wlan command message handler. All we do here is pass the message
292* over to the prism2sta_mgmt_handler.
293*
294* Arguments:
295* wlandev wlan device structure
296* msg wlan command message
297* Returns:
298* 0 success
299* <0 successful acceptance of message, but we're
300* waiting for an async process to finish before
301* we're done with the msg. When the asynch
302* process is done, we'll call the p80211
303* function p80211req_confirm() .
304* >0 An error occurred while we were handling
305* the message.
306*
307* Side effects:
308*
309* Call context:
310* process thread
311----------------------------------------------------------------*/
3d049431 312static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg)
00b3ed16 313{
f3422882 314 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
00b3ed16
GKH
315
316 int result = 0;
00b3ed16 317
f3422882
MM
318 switch (msg->msgcode) {
319 case DIDmsg_dot11req_mibget:
a7cf7bae 320 pr_debug("Received mibget request\n");
00b3ed16
GKH
321 result = prism2mgmt_mibset_mibget(wlandev, msg);
322 break;
f3422882 323 case DIDmsg_dot11req_mibset:
a7cf7bae 324 pr_debug("Received mibset request\n");
00b3ed16
GKH
325 result = prism2mgmt_mibset_mibget(wlandev, msg);
326 break;
f3422882 327 case DIDmsg_dot11req_scan:
a7cf7bae 328 pr_debug("Received scan request\n");
00b3ed16
GKH
329 result = prism2mgmt_scan(wlandev, msg);
330 break;
f3422882 331 case DIDmsg_dot11req_scan_results:
a7cf7bae 332 pr_debug("Received scan_results request\n");
00b3ed16
GKH
333 result = prism2mgmt_scan_results(wlandev, msg);
334 break;
f3422882 335 case DIDmsg_dot11req_start:
a7cf7bae 336 pr_debug("Received mlme start request\n");
00b3ed16
GKH
337 result = prism2mgmt_start(wlandev, msg);
338 break;
f3422882
MM
339 /*
340 * Prism2 specific messages
341 */
342 case DIDmsg_p2req_readpda:
a7cf7bae 343 pr_debug("Received mlme readpda request\n");
00b3ed16
GKH
344 result = prism2mgmt_readpda(wlandev, msg);
345 break;
f3422882 346 case DIDmsg_p2req_ramdl_state:
a7cf7bae 347 pr_debug("Received mlme ramdl_state request\n");
00b3ed16
GKH
348 result = prism2mgmt_ramdl_state(wlandev, msg);
349 break;
f3422882 350 case DIDmsg_p2req_ramdl_write:
a7cf7bae 351 pr_debug("Received mlme ramdl_write request\n");
00b3ed16
GKH
352 result = prism2mgmt_ramdl_write(wlandev, msg);
353 break;
f3422882 354 case DIDmsg_p2req_flashdl_state:
a7cf7bae 355 pr_debug("Received mlme flashdl_state request\n");
00b3ed16
GKH
356 result = prism2mgmt_flashdl_state(wlandev, msg);
357 break;
f3422882 358 case DIDmsg_p2req_flashdl_write:
a7cf7bae 359 pr_debug("Received mlme flashdl_write request\n");
00b3ed16
GKH
360 result = prism2mgmt_flashdl_write(wlandev, msg);
361 break;
f3422882
MM
362 /*
363 * Linux specific messages
364 */
365 case DIDmsg_lnxreq_hostwep:
366 break; /* ignore me. */
367 case DIDmsg_lnxreq_ifstate:
00b3ed16 368 {
b6bb56e6 369 struct p80211msg_lnxreq_ifstate *ifstatemsg;
f3422882 370 pr_debug("Received mlme ifstate request\n");
b6bb56e6 371 ifstatemsg = (struct p80211msg_lnxreq_ifstate *) msg;
f3422882
MM
372 result =
373 prism2sta_ifstate(wlandev,
374 ifstatemsg->ifstate.data);
375 ifstatemsg->resultcode.status =
376 P80211ENUM_msgitem_status_data_ok;
377 ifstatemsg->resultcode.data = result;
378 result = 0;
00b3ed16 379 }
f3422882
MM
380 break;
381 case DIDmsg_lnxreq_wlansniff:
382 pr_debug("Received mlme wlansniff request\n");
383 result = prism2mgmt_wlansniff(wlandev, msg);
384 break;
385 case DIDmsg_lnxreq_autojoin:
a7cf7bae 386 pr_debug("Received mlme autojoin request\n");
00b3ed16
GKH
387 result = prism2mgmt_autojoin(wlandev, msg);
388 break;
f3422882 389 case DIDmsg_lnxreq_commsquality:{
b6bb56e6 390 struct p80211msg_lnxreq_commsquality *qualmsg;
00b3ed16 391
f3422882 392 pr_debug("Received commsquality request\n");
00b3ed16 393
b6bb56e6 394 qualmsg = (struct p80211msg_lnxreq_commsquality *) msg;
00b3ed16 395
f3422882
MM
396 qualmsg->link.status =
397 P80211ENUM_msgitem_status_data_ok;
398 qualmsg->level.status =
399 P80211ENUM_msgitem_status_data_ok;
400 qualmsg->noise.status =
401 P80211ENUM_msgitem_status_data_ok;
00b3ed16 402
75f49e07
MT
403 qualmsg->link.data = le16_to_cpu(hw->qual.CQ_currBSS);
404 qualmsg->level.data = le16_to_cpu(hw->qual.ASL_currBSS);
405 qualmsg->noise.data = le16_to_cpu(hw->qual.ANL_currFC);
cb3126e6 406 qualmsg->txrate.data = hw->txrate;
00b3ed16 407
f3422882
MM
408 break;
409 }
00b3ed16 410 default:
f3422882
MM
411 printk(KERN_WARNING "Unknown mgmt request message 0x%08x",
412 msg->msgcode);
00b3ed16
GKH
413 break;
414 }
415
00b3ed16
GKH
416 return result;
417}
418
00b3ed16
GKH
419/*----------------------------------------------------------------
420* prism2sta_ifstate
421*
422* Interface state. This is the primary WLAN interface enable/disable
423* handler. Following the driver/load/deviceprobe sequence, this
424* function must be called with a state of "enable" before any other
425* commands will be accepted.
426*
427* Arguments:
428* wlandev wlan device structure
429* msgp ptr to msg buffer
430*
431* Returns:
f9bd6495 432* A p80211 message resultcode value.
00b3ed16
GKH
433*
434* Side effects:
435*
436* Call context:
437* process thread (usually)
438* interrupt
439----------------------------------------------------------------*/
297f06ce 440u32 prism2sta_ifstate(wlandevice_t *wlandev, u32 ifstate)
00b3ed16 441{
f3422882
MM
442 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
443 u32 result;
00b3ed16
GKH
444
445 result = P80211ENUM_resultcode_implementation_failure;
446
a7cf7bae 447 pr_debug("Current MSD state(%d), requesting(%d)\n",
75f49e07 448 wlandev->msdstate, ifstate);
f3422882 449 switch (ifstate) {
00b3ed16
GKH
450 case P80211ENUM_ifstate_fwload:
451 switch (wlandev->msdstate) {
452 case WLAN_MSD_HWPRESENT:
453 wlandev->msdstate = WLAN_MSD_FWLOAD_PENDING;
454 /*
455 * Initialize the device+driver sufficiently
456 * for firmware loading.
457 */
297f06ce
MT
458 result = hfa384x_drvr_start(hw);
459 if (result) {
edbd606c 460 printk(KERN_ERR
f3422882
MM
461 "hfa384x_drvr_start() failed,"
462 "result=%d\n", (int)result);
00b3ed16 463 result =
f9bd6495 464 P80211ENUM_resultcode_implementation_failure;
00b3ed16
GKH
465 wlandev->msdstate = WLAN_MSD_HWPRESENT;
466 break;
467 }
00b3ed16
GKH
468 wlandev->msdstate = WLAN_MSD_FWLOAD;
469 result = P80211ENUM_resultcode_success;
470 break;
471 case WLAN_MSD_FWLOAD:
472 hfa384x_cmd_initialize(hw);
473 result = P80211ENUM_resultcode_success;
474 break;
475 case WLAN_MSD_RUNNING:
9b9556ec 476 printk(KERN_WARNING
f3422882
MM
477 "Cannot enter fwload state from enable state,"
478 "you must disable first.\n");
00b3ed16
GKH
479 result = P80211ENUM_resultcode_invalid_parameters;
480 break;
481 case WLAN_MSD_HWFAIL:
482 default:
483 /* probe() had a problem or the msdstate contains
484 * an unrecognized value, there's nothing we can do.
485 */
486 result = P80211ENUM_resultcode_implementation_failure;
487 break;
488 }
489 break;
490 case P80211ENUM_ifstate_enable:
491 switch (wlandev->msdstate) {
492 case WLAN_MSD_HWPRESENT:
493 case WLAN_MSD_FWLOAD:
494 wlandev->msdstate = WLAN_MSD_RUNNING_PENDING;
495 /* Initialize the device+driver for full
496 * operation. Note that this might me an FWLOAD to
497 * to RUNNING transition so we must not do a chip
498 * or board level reset. Note that on failure,
499 * the MSD state is set to HWPRESENT because we
500 * can't make any assumptions about the state
501 * of the hardware or a previous firmware load.
502 */
297f06ce
MT
503 result = hfa384x_drvr_start(hw);
504 if (result) {
edbd606c 505 printk(KERN_ERR
f3422882
MM
506 "hfa384x_drvr_start() failed,"
507 "result=%d\n", (int)result);
00b3ed16 508 result =
f9bd6495 509 P80211ENUM_resultcode_implementation_failure;
00b3ed16
GKH
510 wlandev->msdstate = WLAN_MSD_HWPRESENT;
511 break;
512 }
513
297f06ce
MT
514 result = prism2sta_getcardinfo(wlandev);
515 if (result) {
edbd606c 516 printk(KERN_ERR
f3422882
MM
517 "prism2sta_getcardinfo() failed,"
518 "result=%d\n", (int)result);
00b3ed16 519 result =
f9bd6495 520 P80211ENUM_resultcode_implementation_failure;
00b3ed16
GKH
521 hfa384x_drvr_stop(hw);
522 wlandev->msdstate = WLAN_MSD_HWPRESENT;
523 break;
524 }
297f06ce
MT
525 result = prism2sta_globalsetup(wlandev);
526 if (result) {
edbd606c 527 printk(KERN_ERR
f3422882
MM
528 "prism2sta_globalsetup() failed,"
529 "result=%d\n", (int)result);
00b3ed16 530 result =
f9bd6495 531 P80211ENUM_resultcode_implementation_failure;
00b3ed16
GKH
532 hfa384x_drvr_stop(hw);
533 wlandev->msdstate = WLAN_MSD_HWPRESENT;
534 break;
535 }
536 wlandev->msdstate = WLAN_MSD_RUNNING;
537 hw->join_ap = 0;
538 hw->join_retries = 60;
539 result = P80211ENUM_resultcode_success;
540 break;
541 case WLAN_MSD_RUNNING:
f3422882 542 /* Do nothing, we're already in this state. */
00b3ed16
GKH
543 result = P80211ENUM_resultcode_success;
544 break;
545 case WLAN_MSD_HWFAIL:
546 default:
547 /* probe() had a problem or the msdstate contains
548 * an unrecognized value, there's nothing we can do.
549 */
550 result = P80211ENUM_resultcode_implementation_failure;
551 break;
552 }
553 break;
554 case P80211ENUM_ifstate_disable:
555 switch (wlandev->msdstate) {
556 case WLAN_MSD_HWPRESENT:
f3422882 557 /* Do nothing, we're already in this state. */
00b3ed16
GKH
558 result = P80211ENUM_resultcode_success;
559 break;
560 case WLAN_MSD_FWLOAD:
561 case WLAN_MSD_RUNNING:
562 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
563 /*
564 * TODO: Shut down the MAC completely. Here a chip
565 * or board level reset is probably called for.
566 * After a "disable" _all_ results are lost, even
567 * those from a fwload.
568 */
569 if (!wlandev->hwremoved)
570 netif_carrier_off(wlandev->netdev);
571
572 hfa384x_drvr_stop(hw);
573
574 wlandev->macmode = WLAN_MACMODE_NONE;
575 wlandev->msdstate = WLAN_MSD_HWPRESENT;
576 result = P80211ENUM_resultcode_success;
577 break;
578 case WLAN_MSD_HWFAIL:
579 default:
580 /* probe() had a problem or the msdstate contains
581 * an unrecognized value, there's nothing we can do.
582 */
583 result = P80211ENUM_resultcode_implementation_failure;
584 break;
585 }
586 break;
587 default:
588 result = P80211ENUM_resultcode_invalid_parameters;
589 break;
590 }
591
00b3ed16
GKH
592 return result;
593}
594
00b3ed16
GKH
595/*----------------------------------------------------------------
596* prism2sta_getcardinfo
597*
598* Collect the NICID, firmware version and any other identifiers
599* we'd like to have in host-side data structures.
600*
601* Arguments:
602* wlandev wlan device structure
603*
604* Returns:
605* 0 success
606* >0 f/w reported error
607* <0 driver reported error
608*
609* Side effects:
610*
611* Call context:
612* Either.
613----------------------------------------------------------------*/
297f06ce 614static int prism2sta_getcardinfo(wlandevice_t *wlandev)
00b3ed16 615{
f3422882
MM
616 int result = 0;
617 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
618 u16 temp;
619 u8 snum[HFA384x_RID_NICSERIALNUMBER_LEN];
620 char pstr[(HFA384x_RID_NICSERIALNUMBER_LEN * 4) + 1];
00b3ed16 621
00b3ed16
GKH
622 /* Collect version and compatibility info */
623 /* Some are critical, some are not */
624 /* NIC identity */
625 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICIDENTITY,
f3422882
MM
626 &hw->ident_nic,
627 sizeof(hfa384x_compident_t));
628 if (result) {
edbd606c 629 printk(KERN_ERR "Failed to retrieve NICIDENTITY\n");
00b3ed16
GKH
630 goto failed;
631 }
632
633 /* get all the nic id fields in host byte order */
18c7f792
MM
634 hw->ident_nic.id = le16_to_cpu(hw->ident_nic.id);
635 hw->ident_nic.variant = le16_to_cpu(hw->ident_nic.variant);
636 hw->ident_nic.major = le16_to_cpu(hw->ident_nic.major);
637 hw->ident_nic.minor = le16_to_cpu(hw->ident_nic.minor);
00b3ed16 638
f3422882
MM
639 printk(KERN_INFO "ident: nic h/w: id=0x%02x %d.%d.%d\n",
640 hw->ident_nic.id, hw->ident_nic.major,
641 hw->ident_nic.minor, hw->ident_nic.variant);
00b3ed16
GKH
642
643 /* Primary f/w identity */
644 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRIIDENTITY,
f3422882
MM
645 &hw->ident_pri_fw,
646 sizeof(hfa384x_compident_t));
647 if (result) {
edbd606c 648 printk(KERN_ERR "Failed to retrieve PRIIDENTITY\n");
00b3ed16
GKH
649 goto failed;
650 }
651
652 /* get all the private fw id fields in host byte order */
18c7f792
MM
653 hw->ident_pri_fw.id = le16_to_cpu(hw->ident_pri_fw.id);
654 hw->ident_pri_fw.variant = le16_to_cpu(hw->ident_pri_fw.variant);
655 hw->ident_pri_fw.major = le16_to_cpu(hw->ident_pri_fw.major);
656 hw->ident_pri_fw.minor = le16_to_cpu(hw->ident_pri_fw.minor);
00b3ed16 657
f3422882
MM
658 printk(KERN_INFO "ident: pri f/w: id=0x%02x %d.%d.%d\n",
659 hw->ident_pri_fw.id, hw->ident_pri_fw.major,
660 hw->ident_pri_fw.minor, hw->ident_pri_fw.variant);
00b3ed16
GKH
661
662 /* Station (Secondary?) f/w identity */
663 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STAIDENTITY,
f3422882
MM
664 &hw->ident_sta_fw,
665 sizeof(hfa384x_compident_t));
666 if (result) {
edbd606c 667 printk(KERN_ERR "Failed to retrieve STAIDENTITY\n");
00b3ed16
GKH
668 goto failed;
669 }
670
671 if (hw->ident_nic.id < 0x8000) {
f3422882
MM
672 printk(KERN_ERR
673 "FATAL: Card is not an Intersil Prism2/2.5/3\n");
00b3ed16
GKH
674 result = -1;
675 goto failed;
676 }
677
678 /* get all the station fw id fields in host byte order */
18c7f792
MM
679 hw->ident_sta_fw.id = le16_to_cpu(hw->ident_sta_fw.id);
680 hw->ident_sta_fw.variant = le16_to_cpu(hw->ident_sta_fw.variant);
681 hw->ident_sta_fw.major = le16_to_cpu(hw->ident_sta_fw.major);
682 hw->ident_sta_fw.minor = le16_to_cpu(hw->ident_sta_fw.minor);
00b3ed16
GKH
683
684 /* strip out the 'special' variant bits */
7f6e0e44 685 hw->mm_mods = hw->ident_sta_fw.variant & (BIT(14) | BIT(15));
f3422882 686 hw->ident_sta_fw.variant &= ~((u16) (BIT(14) | BIT(15)));
00b3ed16 687
f3422882 688 if (hw->ident_sta_fw.id == 0x1f) {
350f2f4b 689 printk(KERN_INFO
f3422882
MM
690 "ident: sta f/w: id=0x%02x %d.%d.%d\n",
691 hw->ident_sta_fw.id, hw->ident_sta_fw.major,
692 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
00b3ed16 693 } else {
350f2f4b 694 printk(KERN_INFO
f3422882
MM
695 "ident: ap f/w: id=0x%02x %d.%d.%d\n",
696 hw->ident_sta_fw.id, hw->ident_sta_fw.major,
697 hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
edbd606c 698 printk(KERN_ERR "Unsupported Tertiary AP firmeare loaded!\n");
5db8dcc9 699 goto failed;
00b3ed16
GKH
700 }
701
702 /* Compatibility range, Modem supplier */
703 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_MFISUPRANGE,
f3422882
MM
704 &hw->cap_sup_mfi,
705 sizeof(hfa384x_caplevel_t));
706 if (result) {
edbd606c 707 printk(KERN_ERR "Failed to retrieve MFISUPRANGE\n");
00b3ed16
GKH
708 goto failed;
709 }
710
711 /* get all the Compatibility range, modem interface supplier
f3422882 712 fields in byte order */
18c7f792
MM
713 hw->cap_sup_mfi.role = le16_to_cpu(hw->cap_sup_mfi.role);
714 hw->cap_sup_mfi.id = le16_to_cpu(hw->cap_sup_mfi.id);
715 hw->cap_sup_mfi.variant = le16_to_cpu(hw->cap_sup_mfi.variant);
716 hw->cap_sup_mfi.bottom = le16_to_cpu(hw->cap_sup_mfi.bottom);
717 hw->cap_sup_mfi.top = le16_to_cpu(hw->cap_sup_mfi.top);
00b3ed16 718
350f2f4b 719 printk(KERN_INFO
f3422882
MM
720 "MFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
721 hw->cap_sup_mfi.role, hw->cap_sup_mfi.id,
722 hw->cap_sup_mfi.variant, hw->cap_sup_mfi.bottom,
723 hw->cap_sup_mfi.top);
00b3ed16
GKH
724
725 /* Compatibility range, Controller supplier */
726 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CFISUPRANGE,
f3422882
MM
727 &hw->cap_sup_cfi,
728 sizeof(hfa384x_caplevel_t));
729 if (result) {
edbd606c 730 printk(KERN_ERR "Failed to retrieve CFISUPRANGE\n");
00b3ed16
GKH
731 goto failed;
732 }
733
734 /* get all the Compatibility range, controller interface supplier
f3422882 735 fields in byte order */
18c7f792
MM
736 hw->cap_sup_cfi.role = le16_to_cpu(hw->cap_sup_cfi.role);
737 hw->cap_sup_cfi.id = le16_to_cpu(hw->cap_sup_cfi.id);
738 hw->cap_sup_cfi.variant = le16_to_cpu(hw->cap_sup_cfi.variant);
739 hw->cap_sup_cfi.bottom = le16_to_cpu(hw->cap_sup_cfi.bottom);
740 hw->cap_sup_cfi.top = le16_to_cpu(hw->cap_sup_cfi.top);
00b3ed16 741
350f2f4b 742 printk(KERN_INFO
f3422882
MM
743 "CFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
744 hw->cap_sup_cfi.role, hw->cap_sup_cfi.id,
745 hw->cap_sup_cfi.variant, hw->cap_sup_cfi.bottom,
746 hw->cap_sup_cfi.top);
00b3ed16
GKH
747
748 /* Compatibility range, Primary f/w supplier */
749 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRISUPRANGE,
f3422882
MM
750 &hw->cap_sup_pri,
751 sizeof(hfa384x_caplevel_t));
752 if (result) {
edbd606c 753 printk(KERN_ERR "Failed to retrieve PRISUPRANGE\n");
00b3ed16
GKH
754 goto failed;
755 }
756
757 /* get all the Compatibility range, primary firmware supplier
f3422882 758 fields in byte order */
18c7f792
MM
759 hw->cap_sup_pri.role = le16_to_cpu(hw->cap_sup_pri.role);
760 hw->cap_sup_pri.id = le16_to_cpu(hw->cap_sup_pri.id);
761 hw->cap_sup_pri.variant = le16_to_cpu(hw->cap_sup_pri.variant);
762 hw->cap_sup_pri.bottom = le16_to_cpu(hw->cap_sup_pri.bottom);
763 hw->cap_sup_pri.top = le16_to_cpu(hw->cap_sup_pri.top);
00b3ed16 764
350f2f4b 765 printk(KERN_INFO
f3422882
MM
766 "PRI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
767 hw->cap_sup_pri.role, hw->cap_sup_pri.id,
768 hw->cap_sup_pri.variant, hw->cap_sup_pri.bottom,
769 hw->cap_sup_pri.top);
00b3ed16
GKH
770
771 /* Compatibility range, Station f/w supplier */
772 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STASUPRANGE,
f3422882
MM
773 &hw->cap_sup_sta,
774 sizeof(hfa384x_caplevel_t));
775 if (result) {
edbd606c 776 printk(KERN_ERR "Failed to retrieve STASUPRANGE\n");
00b3ed16
GKH
777 goto failed;
778 }
779
780 /* get all the Compatibility range, station firmware supplier
f3422882 781 fields in byte order */
18c7f792
MM
782 hw->cap_sup_sta.role = le16_to_cpu(hw->cap_sup_sta.role);
783 hw->cap_sup_sta.id = le16_to_cpu(hw->cap_sup_sta.id);
784 hw->cap_sup_sta.variant = le16_to_cpu(hw->cap_sup_sta.variant);
785 hw->cap_sup_sta.bottom = le16_to_cpu(hw->cap_sup_sta.bottom);
786 hw->cap_sup_sta.top = le16_to_cpu(hw->cap_sup_sta.top);
00b3ed16 787
f3422882 788 if (hw->cap_sup_sta.id == 0x04) {
350f2f4b 789 printk(KERN_INFO
f3422882
MM
790 "STA:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
791 hw->cap_sup_sta.role, hw->cap_sup_sta.id,
792 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
793 hw->cap_sup_sta.top);
00b3ed16 794 } else {
350f2f4b 795 printk(KERN_INFO
f3422882
MM
796 "AP:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
797 hw->cap_sup_sta.role, hw->cap_sup_sta.id,
798 hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
799 hw->cap_sup_sta.top);
00b3ed16
GKH
800 }
801
802 /* Compatibility range, primary f/w actor, CFI supplier */
803 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRI_CFIACTRANGES,
f3422882
MM
804 &hw->cap_act_pri_cfi,
805 sizeof(hfa384x_caplevel_t));
806 if (result) {
edbd606c 807 printk(KERN_ERR "Failed to retrieve PRI_CFIACTRANGES\n");
00b3ed16
GKH
808 goto failed;
809 }
810
811 /* get all the Compatibility range, primary f/w actor, CFI supplier
f3422882 812 fields in byte order */
18c7f792
MM
813 hw->cap_act_pri_cfi.role = le16_to_cpu(hw->cap_act_pri_cfi.role);
814 hw->cap_act_pri_cfi.id = le16_to_cpu(hw->cap_act_pri_cfi.id);
75f49e07
MT
815 hw->cap_act_pri_cfi.variant = le16_to_cpu(hw->cap_act_pri_cfi.variant);
816 hw->cap_act_pri_cfi.bottom = le16_to_cpu(hw->cap_act_pri_cfi.bottom);
18c7f792 817 hw->cap_act_pri_cfi.top = le16_to_cpu(hw->cap_act_pri_cfi.top);
00b3ed16 818
350f2f4b 819 printk(KERN_INFO
f3422882
MM
820 "PRI-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
821 hw->cap_act_pri_cfi.role, hw->cap_act_pri_cfi.id,
822 hw->cap_act_pri_cfi.variant, hw->cap_act_pri_cfi.bottom,
823 hw->cap_act_pri_cfi.top);
00b3ed16
GKH
824
825 /* Compatibility range, sta f/w actor, CFI supplier */
826 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_CFIACTRANGES,
f3422882
MM
827 &hw->cap_act_sta_cfi,
828 sizeof(hfa384x_caplevel_t));
829 if (result) {
edbd606c 830 printk(KERN_ERR "Failed to retrieve STA_CFIACTRANGES\n");
00b3ed16
GKH
831 goto failed;
832 }
833
834 /* get all the Compatibility range, station f/w actor, CFI supplier
f3422882 835 fields in byte order */
18c7f792
MM
836 hw->cap_act_sta_cfi.role = le16_to_cpu(hw->cap_act_sta_cfi.role);
837 hw->cap_act_sta_cfi.id = le16_to_cpu(hw->cap_act_sta_cfi.id);
75f49e07
MT
838 hw->cap_act_sta_cfi.variant = le16_to_cpu(hw->cap_act_sta_cfi.variant);
839 hw->cap_act_sta_cfi.bottom = le16_to_cpu(hw->cap_act_sta_cfi.bottom);
18c7f792 840 hw->cap_act_sta_cfi.top = le16_to_cpu(hw->cap_act_sta_cfi.top);
00b3ed16 841
350f2f4b 842 printk(KERN_INFO
f3422882
MM
843 "STA-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
844 hw->cap_act_sta_cfi.role, hw->cap_act_sta_cfi.id,
845 hw->cap_act_sta_cfi.variant, hw->cap_act_sta_cfi.bottom,
846 hw->cap_act_sta_cfi.top);
00b3ed16
GKH
847
848 /* Compatibility range, sta f/w actor, MFI supplier */
849 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_MFIACTRANGES,
f3422882
MM
850 &hw->cap_act_sta_mfi,
851 sizeof(hfa384x_caplevel_t));
852 if (result) {
edbd606c 853 printk(KERN_ERR "Failed to retrieve STA_MFIACTRANGES\n");
00b3ed16
GKH
854 goto failed;
855 }
856
857 /* get all the Compatibility range, station f/w actor, MFI supplier
f3422882 858 fields in byte order */
18c7f792
MM
859 hw->cap_act_sta_mfi.role = le16_to_cpu(hw->cap_act_sta_mfi.role);
860 hw->cap_act_sta_mfi.id = le16_to_cpu(hw->cap_act_sta_mfi.id);
75f49e07
MT
861 hw->cap_act_sta_mfi.variant = le16_to_cpu(hw->cap_act_sta_mfi.variant);
862 hw->cap_act_sta_mfi.bottom = le16_to_cpu(hw->cap_act_sta_mfi.bottom);
18c7f792 863 hw->cap_act_sta_mfi.top = le16_to_cpu(hw->cap_act_sta_mfi.top);
00b3ed16 864
350f2f4b 865 printk(KERN_INFO
f3422882
MM
866 "STA-MFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
867 hw->cap_act_sta_mfi.role, hw->cap_act_sta_mfi.id,
868 hw->cap_act_sta_mfi.variant, hw->cap_act_sta_mfi.bottom,
869 hw->cap_act_sta_mfi.top);
00b3ed16
GKH
870
871 /* Serial Number */
872 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICSERIALNUMBER,
f3422882
MM
873 snum, HFA384x_RID_NICSERIALNUMBER_LEN);
874 if (!result) {
00b3ed16
GKH
875 wlan_mkprintstr(snum, HFA384x_RID_NICSERIALNUMBER_LEN,
876 pstr, sizeof(pstr));
350f2f4b 877 printk(KERN_INFO "Prism2 card SN: %s\n", pstr);
00b3ed16 878 } else {
edbd606c 879 printk(KERN_ERR "Failed to retrieve Prism2 Card SN\n");
00b3ed16
GKH
880 goto failed;
881 }
882
883 /* Collect the MAC address */
884 result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CNFOWNMACADDR,
f3422882
MM
885 wlandev->netdev->dev_addr, ETH_ALEN);
886 if (result != 0) {
edbd606c 887 printk(KERN_ERR "Failed to retrieve mac address\n");
00b3ed16
GKH
888 goto failed;
889 }
890
891 /* short preamble is always implemented */
892 wlandev->nsdcaps |= P80211_NSDCAP_SHORT_PREAMBLE;
893
894 /* find out if hardware wep is implemented */
895 hfa384x_drvr_getconfig16(hw, HFA384x_RID_PRIVACYOPTIMP, &temp);
896 if (temp)
897 wlandev->nsdcaps |= P80211_NSDCAP_HARDWAREWEP;
898
899 /* get the dBm Scaling constant */
900 hfa384x_drvr_getconfig16(hw, HFA384x_RID_CNFDBMADJUST, &temp);
901 hw->dbmadjust = temp;
902
903 /* Only enable scan by default on newer firmware */
f3422882
MM
904 if (HFA384x_FIRMWARE_VERSION(hw->ident_sta_fw.major,
905 hw->ident_sta_fw.minor,
906 hw->ident_sta_fw.variant) <
907 HFA384x_FIRMWARE_VERSION(1, 5, 5)) {
00b3ed16
GKH
908 wlandev->nsdcaps |= P80211_NSDCAP_NOSCAN;
909 }
910
911 /* TODO: Set any internally managed config items */
912
913 goto done;
914failed:
edbd606c 915 printk(KERN_ERR "Failed, result=%d\n", result);
00b3ed16 916done:
00b3ed16
GKH
917 return result;
918}
919
00b3ed16
GKH
920/*----------------------------------------------------------------
921* prism2sta_globalsetup
922*
923* Set any global RIDs that we want to set at device activation.
924*
925* Arguments:
926* wlandev wlan device structure
927*
928* Returns:
929* 0 success
930* >0 f/w reported error
931* <0 driver reported error
932*
933* Side effects:
934*
935* Call context:
936* process thread
937----------------------------------------------------------------*/
297f06ce 938static int prism2sta_globalsetup(wlandevice_t *wlandev)
00b3ed16 939{
f3422882 940 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
00b3ed16
GKH
941
942 /* Set the maximum frame size */
943 return hfa384x_drvr_setconfig16(hw, HFA384x_RID_CNFMAXDATALEN,
f3422882 944 WLAN_DATA_MAXLEN);
00b3ed16
GKH
945}
946
297f06ce 947static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev)
00b3ed16
GKH
948{
949 int result = 0;
f3422882 950 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
00b3ed16 951
f3422882 952 u16 promisc;
00b3ed16 953
00b3ed16 954 /* If we're not ready, what's the point? */
f3422882 955 if (hw->state != HFA384x_STATE_RUNNING)
00b3ed16
GKH
956 goto exit;
957
f3422882 958 if ((dev->flags & (IFF_PROMISC | IFF_ALLMULTI)) != 0)
00b3ed16
GKH
959 promisc = P80211ENUM_truth_true;
960 else
961 promisc = P80211ENUM_truth_false;
962
f3422882
MM
963 result =
964 hfa384x_drvr_setconfig16_async(hw, HFA384x_RID_PROMISCMODE,
965 promisc);
966exit:
00b3ed16
GKH
967 return result;
968}
969
970/*----------------------------------------------------------------
971* prism2sta_inf_handover
972*
973* Handles the receipt of a Handover info frame. Should only be present
974* in APs only.
975*
976* Arguments:
977* wlandev wlan device structure
978* inf ptr to info frame (contents in hfa384x order)
979*
980* Returns:
981* nothing
982*
983* Side effects:
984*
985* Call context:
986* interrupt
987----------------------------------------------------------------*/
297f06ce
MT
988static void prism2sta_inf_handover(wlandevice_t *wlandev,
989 hfa384x_InfFrame_t *inf)
00b3ed16 990{
a7cf7bae 991 pr_debug("received infoframe:HANDOVER (unhandled)\n");
00b3ed16
GKH
992 return;
993}
994
00b3ed16
GKH
995/*----------------------------------------------------------------
996* prism2sta_inf_tallies
997*
998* Handles the receipt of a CommTallies info frame.
999*
1000* Arguments:
1001* wlandev wlan device structure
1002* inf ptr to info frame (contents in hfa384x order)
1003*
1004* Returns:
1005* nothing
1006*
1007* Side effects:
1008*
1009* Call context:
1010* interrupt
1011----------------------------------------------------------------*/
297f06ce
MT
1012static void prism2sta_inf_tallies(wlandevice_t *wlandev,
1013 hfa384x_InfFrame_t *inf)
00b3ed16 1014{
f3422882
MM
1015 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1016 u16 *src16;
1017 u32 *dst;
1018 u32 *src32;
1019 int i;
1020 int cnt;
00b3ed16 1021
00b3ed16 1022 /*
f3422882
MM
1023 ** Determine if these are 16-bit or 32-bit tallies, based on the
1024 ** record length of the info record.
1025 */
00b3ed16 1026
aaad4303 1027 cnt = sizeof(hfa384x_CommTallies32_t) / sizeof(u32);
00b3ed16 1028 if (inf->framelen > 22) {
5dd8acc8
SK
1029 dst = (u32 *) &hw->tallies;
1030 src32 = (u32 *) &inf->info.commtallies32;
00b3ed16 1031 for (i = 0; i < cnt; i++, dst++, src32++)
18c7f792 1032 *dst += le32_to_cpu(*src32);
00b3ed16 1033 } else {
5dd8acc8
SK
1034 dst = (u32 *) &hw->tallies;
1035 src16 = (u16 *) &inf->info.commtallies16;
00b3ed16 1036 for (i = 0; i < cnt; i++, dst++, src16++)
18c7f792 1037 *dst += le16_to_cpu(*src16);
00b3ed16
GKH
1038 }
1039
00b3ed16
GKH
1040 return;
1041}
1042
1043/*----------------------------------------------------------------
1044* prism2sta_inf_scanresults
1045*
1046* Handles the receipt of a Scan Results info frame.
1047*
1048* Arguments:
1049* wlandev wlan device structure
1050* inf ptr to info frame (contents in hfa384x order)
1051*
1052* Returns:
1053* nothing
1054*
1055* Side effects:
1056*
1057* Call context:
1058* interrupt
1059----------------------------------------------------------------*/
297f06ce
MT
1060static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
1061 hfa384x_InfFrame_t *inf)
00b3ed16
GKH
1062{
1063
f3422882
MM
1064 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1065 int nbss;
1066 hfa384x_ScanResult_t *sr = &(inf->info.scanresult);
1067 int i;
1068 hfa384x_JoinRequest_data_t joinreq;
1069 int result;
00b3ed16
GKH
1070
1071 /* Get the number of results, first in bytes, then in results */
aaad4303 1072 nbss = (inf->framelen * sizeof(u16)) -
f3422882 1073 sizeof(inf->infotype) - sizeof(inf->info.scanresult.scanreason);
00b3ed16
GKH
1074 nbss /= sizeof(hfa384x_ScanResultSub_t);
1075
1076 /* Print em */
a7cf7bae 1077 pr_debug("rx scanresults, reason=%d, nbss=%d:\n",
75f49e07 1078 inf->info.scanresult.scanreason, nbss);
f3422882 1079 for (i = 0; i < nbss; i++) {
a7cf7bae 1080 pr_debug("chid=%d anl=%d sl=%d bcnint=%d\n",
75f49e07
MT
1081 sr->result[i].chid,
1082 sr->result[i].anl,
1083 sr->result[i].sl, sr->result[i].bcnint);
a7cf7bae 1084 pr_debug(" capinfo=0x%04x proberesp_rate=%d\n",
75f49e07 1085 sr->result[i].capinfo, sr->result[i].proberesp_rate);
00b3ed16
GKH
1086 }
1087 /* issue a join request */
1088 joinreq.channel = sr->result[0].chid;
f3422882
MM
1089 memcpy(joinreq.bssid, sr->result[0].bssid, WLAN_BSSID_LEN);
1090 result = hfa384x_drvr_setconfig(hw,
1091 HFA384x_RID_JOINREQUEST,
1092 &joinreq, HFA384x_RID_JOINREQUEST_LEN);
00b3ed16 1093 if (result) {
f3422882
MM
1094 printk(KERN_ERR "setconfig(joinreq) failed, result=%d\n",
1095 result);
00b3ed16
GKH
1096 }
1097
00b3ed16
GKH
1098 return;
1099}
1100
1101/*----------------------------------------------------------------
1102* prism2sta_inf_hostscanresults
1103*
1104* Handles the receipt of a Scan Results info frame.
1105*
1106* Arguments:
1107* wlandev wlan device structure
1108* inf ptr to info frame (contents in hfa384x order)
1109*
1110* Returns:
1111* nothing
1112*
1113* Side effects:
1114*
1115* Call context:
1116* interrupt
1117----------------------------------------------------------------*/
297f06ce
MT
1118static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
1119 hfa384x_InfFrame_t *inf)
00b3ed16 1120{
f3422882
MM
1121 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1122 int nbss;
00b3ed16
GKH
1123
1124 nbss = (inf->framelen - 3) / 32;
a7cf7bae 1125 pr_debug("Received %d hostscan results\n", nbss);
00b3ed16
GKH
1126
1127 if (nbss > 32)
1128 nbss = 32;
1129
7c98f718 1130 kfree(hw->scanresults);
00b3ed16
GKH
1131
1132 hw->scanresults = kmalloc(sizeof(hfa384x_InfFrame_t), GFP_ATOMIC);
1133 memcpy(hw->scanresults, inf, sizeof(hfa384x_InfFrame_t));
1134
1135 if (nbss == 0)
1136 nbss = -1;
1137
f3422882
MM
1138 /* Notify/wake the sleeping caller. */
1139 hw->scanflag = nbss;
1140 wake_up_interruptible(&hw->cmdq);
00b3ed16
GKH
1141};
1142
1143/*----------------------------------------------------------------
1144* prism2sta_inf_chinforesults
1145*
1146* Handles the receipt of a Channel Info Results info frame.
1147*
1148* Arguments:
1149* wlandev wlan device structure
1150* inf ptr to info frame (contents in hfa384x order)
1151*
1152* Returns:
1153* nothing
1154*
1155* Side effects:
1156*
1157* Call context:
1158* interrupt
1159----------------------------------------------------------------*/
297f06ce
MT
1160static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
1161 hfa384x_InfFrame_t *inf)
00b3ed16 1162{
f3422882
MM
1163 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1164 unsigned int i, n;
00b3ed16 1165
00b3ed16 1166 hw->channel_info.results.scanchannels =
18c7f792 1167 le16_to_cpu(inf->info.chinforesult.scanchannels);
f3422882
MM
1168
1169 for (i = 0, n = 0; i < HFA384x_CHINFORESULT_MAX; i++) {
1170 if (hw->channel_info.results.scanchannels & (1 << i)) {
1171 int channel =
75f49e07
MT
1172 le16_to_cpu(inf->info.chinforesult.result[n].chid) -
1173 1;
f3422882
MM
1174 hfa384x_ChInfoResultSub_t *chinforesult =
1175 &hw->channel_info.results.result[channel];
1176 chinforesult->chid = channel;
1177 chinforesult->anl =
75f49e07 1178 le16_to_cpu(inf->info.chinforesult.result[n].anl);
f3422882 1179 chinforesult->pnl =
75f49e07 1180 le16_to_cpu(inf->info.chinforesult.result[n].pnl);
f3422882 1181 chinforesult->active =
18c7f792 1182 le16_to_cpu(inf->info.chinforesult.result[n].
75f49e07 1183 active);
f9bd6495
CT
1184 pr_debug
1185 ("chinfo: channel %d, %s level (avg/peak)=%d/%d dB, pcf %d\n",
75f49e07
MT
1186 channel + 1,
1187 chinforesult->
1188 active & HFA384x_CHINFORESULT_BSSACTIVE ? "signal"
1189 : "noise", chinforesult->anl, chinforesult->pnl,
1190 chinforesult->
1191 active & HFA384x_CHINFORESULT_PCFACTIVE ? 1 : 0);
00b3ed16
GKH
1192 n++;
1193 }
1194 }
1195 atomic_set(&hw->channel_info.done, 2);
1196
1197 hw->channel_info.count = n;
00b3ed16
GKH
1198 return;
1199}
1200
1201void prism2sta_processing_defer(struct work_struct *data)
1202{
f3422882
MM
1203 hfa384x_t *hw = container_of(data, struct hfa384x, link_bh);
1204 wlandevice_t *wlandev = hw->wlandev;
00b3ed16 1205 hfa384x_bytestr32_t ssid;
f3422882 1206 int result;
00b3ed16 1207
00b3ed16
GKH
1208 /* First let's process the auth frames */
1209 {
f3422882 1210 struct sk_buff *skb;
00b3ed16
GKH
1211 hfa384x_InfFrame_t *inf;
1212
f3422882 1213 while ((skb = skb_dequeue(&hw->authq))) {
00b3ed16
GKH
1214 inf = (hfa384x_InfFrame_t *) skb->data;
1215 prism2sta_inf_authreq_defer(wlandev, inf);
1216 }
1217
1218 }
1219
1220 /* Now let's handle the linkstatus stuff */
1221 if (hw->link_status == hw->link_status_new)
1222 goto failed;
1223
1224 hw->link_status = hw->link_status_new;
1225
f3422882 1226 switch (hw->link_status) {
00b3ed16
GKH
1227 case HFA384x_LINK_NOTCONNECTED:
1228 /* I'm currently assuming that this is the initial link
1229 * state. It should only be possible immediately
1230 * following an Enable command.
1231 * Response:
1232 * Block Transmits, Ignore receives of data frames
1233 */
1234 netif_carrier_off(wlandev->netdev);
1235
350f2f4b 1236 printk(KERN_INFO "linkstatus=NOTCONNECTED (unhandled)\n");
00b3ed16
GKH
1237 break;
1238
1239 case HFA384x_LINK_CONNECTED:
1240 /* This one indicates a successful scan/join/auth/assoc.
1241 * When we have the full MLME complement, this event will
1242 * signify successful completion of both mlme_authenticate
1243 * and mlme_associate. State management will get a little
1244 * ugly here.
1245 * Response:
1246 * Indicate authentication and/or association
1247 * Enable Transmits, Receives and pass up data frames
1248 */
1249
1250 netif_carrier_on(wlandev->netdev);
1251
f9bd6495
CT
1252 /* If we are joining a specific AP, set our
1253 * state and reset retries
1254 */
f3422882 1255 if (hw->join_ap == 1)
00b3ed16
GKH
1256 hw->join_ap = 2;
1257 hw->join_retries = 60;
1258
1259 /* Don't call this in monitor mode */
f3422882
MM
1260 if (wlandev->netdev->type == ARPHRD_ETHER) {
1261 u16 portstatus;
00b3ed16 1262
350f2f4b 1263 printk(KERN_INFO "linkstatus=CONNECTED\n");
00b3ed16
GKH
1264
1265 /* For non-usb devices, we can use the sync versions */
1266 /* Collect the BSSID, and set state to allow tx */
1267
1268 result = hfa384x_drvr_getconfig(hw,
f9bd6495
CT
1269 HFA384x_RID_CURRENTBSSID,
1270 wlandev->bssid,
1271 WLAN_BSSID_LEN);
f3422882 1272 if (result) {
75f49e07
MT
1273 pr_debug
1274 ("getconfig(0x%02x) failed, result = %d\n",
1275 HFA384x_RID_CURRENTBSSID, result);
00b3ed16
GKH
1276 goto failed;
1277 }
1278
1279 result = hfa384x_drvr_getconfig(hw,
1280 HFA384x_RID_CURRENTSSID,
1281 &ssid, sizeof(ssid));
f3422882 1282 if (result) {
75f49e07
MT
1283 pr_debug
1284 ("getconfig(0x%02x) failed, result = %d\n",
1285 HFA384x_RID_CURRENTSSID, result);
00b3ed16
GKH
1286 goto failed;
1287 }
5dd8acc8 1288 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
75f49e07
MT
1289 (p80211pstrd_t *) &
1290 wlandev->ssid);
00b3ed16
GKH
1291
1292 /* Collect the port status */
1293 result = hfa384x_drvr_getconfig16(hw,
f9bd6495
CT
1294 HFA384x_RID_PORTSTATUS,
1295 &portstatus);
f3422882 1296 if (result) {
75f49e07
MT
1297 pr_debug
1298 ("getconfig(0x%02x) failed, result = %d\n",
1299 HFA384x_RID_PORTSTATUS, result);
00b3ed16
GKH
1300 goto failed;
1301 }
1302 wlandev->macmode =
f3422882
MM
1303 (portstatus == HFA384x_PSTATUS_CONN_IBSS) ?
1304 WLAN_MACMODE_IBSS_STA : WLAN_MACMODE_ESS_STA;
00b3ed16 1305
cb3126e6
KR
1306 /* signal back up to cfg80211 layer */
1307 prism2_connect_result(wlandev, P80211ENUM_truth_false);
1308
00b3ed16
GKH
1309 /* Get the ball rolling on the comms quality stuff */
1310 prism2sta_commsqual_defer(&hw->commsqual_bh);
1311 }
1312 break;
1313
1314 case HFA384x_LINK_DISCONNECTED:
1315 /* This one indicates that our association is gone. We've
1316 * lost connection with the AP and/or been disassociated.
1317 * This indicates that the MAC has completely cleared it's
1318 * associated state. We * should send a deauth indication
1319 * (implying disassoc) up * to the MLME.
1320 * Response:
1321 * Indicate Deauthentication
1322 * Block Transmits, Ignore receives of data frames
1323 */
cb3126e6 1324 if (wlandev->netdev->type == ARPHRD_ETHER)
f3422882 1325 printk(KERN_INFO
cb3126e6 1326 "linkstatus=DISCONNECTED (unhandled)\n");
00b3ed16
GKH
1327 wlandev->macmode = WLAN_MACMODE_NONE;
1328
1329 netif_carrier_off(wlandev->netdev);
1330
cb3126e6
KR
1331 /* signal back up to cfg80211 layer */
1332 prism2_disconnected(wlandev);
1333
00b3ed16
GKH
1334 break;
1335
1336 case HFA384x_LINK_AP_CHANGE:
1337 /* This one indicates that the MAC has decided to and
1338 * successfully completed a change to another AP. We
1339 * should probably implement a reassociation indication
1340 * in response to this one. I'm thinking that the the
1341 * p80211 layer needs to be notified in case of
1342 * buffering/queueing issues. User mode also needs to be
1343 * notified so that any BSS dependent elements can be
1344 * updated.
1345 * associated state. We * should send a deauth indication
1346 * (implying disassoc) up * to the MLME.
1347 * Response:
1348 * Indicate Reassociation
1349 * Enable Transmits, Receives and pass up data frames
1350 */
350f2f4b 1351 printk(KERN_INFO "linkstatus=AP_CHANGE\n");
00b3ed16
GKH
1352
1353 result = hfa384x_drvr_getconfig(hw,
1354 HFA384x_RID_CURRENTBSSID,
1355 wlandev->bssid, WLAN_BSSID_LEN);
f3422882 1356 if (result) {
75f49e07
MT
1357 pr_debug("getconfig(0x%02x) failed, result = %d\n",
1358 HFA384x_RID_CURRENTBSSID, result);
00b3ed16
GKH
1359 goto failed;
1360 }
1361
1362 result = hfa384x_drvr_getconfig(hw,
1363 HFA384x_RID_CURRENTSSID,
1364 &ssid, sizeof(ssid));
f3422882 1365 if (result) {
75f49e07
MT
1366 pr_debug("getconfig(0x%02x) failed, result = %d\n",
1367 HFA384x_RID_CURRENTSSID, result);
00b3ed16
GKH
1368 goto failed;
1369 }
5dd8acc8
SK
1370 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
1371 (p80211pstrd_t *) &wlandev->ssid);
00b3ed16
GKH
1372
1373 hw->link_status = HFA384x_LINK_CONNECTED;
1374 netif_carrier_on(wlandev->netdev);
1375
cb3126e6
KR
1376 /* signal back up to cfg80211 layer */
1377 prism2_roamed(wlandev);
1378
00b3ed16
GKH
1379 break;
1380
1381 case HFA384x_LINK_AP_OUTOFRANGE:
1382 /* This one indicates that the MAC has decided that the
1383 * AP is out of range, but hasn't found a better candidate
1384 * so the MAC maintains its "associated" state in case
1385 * we get back in range. We should block transmits and
1386 * receives in this state. Do we need an indication here?
1387 * Probably not since a polling user-mode element would
1388 * get this status from from p2PortStatus(FD40). What about
1389 * p80211?
1390 * Response:
1391 * Block Transmits, Ignore receives of data frames
1392 */
350f2f4b 1393 printk(KERN_INFO "linkstatus=AP_OUTOFRANGE (unhandled)\n");
00b3ed16
GKH
1394
1395 netif_carrier_off(wlandev->netdev);
1396
1397 break;
1398
1399 case HFA384x_LINK_AP_INRANGE:
1400 /* This one indicates that the MAC has decided that the
1401 * AP is back in range. We continue working with our
1402 * existing association.
1403 * Response:
1404 * Enable Transmits, Receives and pass up data frames
1405 */
350f2f4b 1406 printk(KERN_INFO "linkstatus=AP_INRANGE\n");
00b3ed16
GKH
1407
1408 hw->link_status = HFA384x_LINK_CONNECTED;
1409 netif_carrier_on(wlandev->netdev);
1410
1411 break;
1412
1413 case HFA384x_LINK_ASSOCFAIL:
1414 /* This one is actually a peer to CONNECTED. We've
1415 * requested a join for a given SSID and optionally BSSID.
1416 * We can use this one to indicate authentication and
1417 * association failures. The trick is going to be
1418 * 1) identifying the failure, and 2) state management.
1419 * Response:
1420 * Disable Transmits, Ignore receives of data frames
1421 */
f3422882
MM
1422 if (hw->join_ap && --hw->join_retries > 0) {
1423 hfa384x_JoinRequest_data_t joinreq;
00b3ed16
GKH
1424 joinreq = hw->joinreq;
1425 /* Send the join request */
f3422882
MM
1426 hfa384x_drvr_setconfig(hw,
1427 HFA384x_RID_JOINREQUEST,
1428 &joinreq,
1429 HFA384x_RID_JOINREQUEST_LEN);
1430 printk(KERN_INFO
1431 "linkstatus=ASSOCFAIL (re-submitting join)\n");
00b3ed16 1432 } else {
350f2f4b 1433 printk(KERN_INFO "linkstatus=ASSOCFAIL (unhandled)\n");
00b3ed16
GKH
1434 }
1435
1436 netif_carrier_off(wlandev->netdev);
1437
cb3126e6
KR
1438 /* signal back up to cfg80211 layer */
1439 prism2_connect_result(wlandev, P80211ENUM_truth_true);
1440
00b3ed16
GKH
1441 break;
1442
1443 default:
1444 /* This is bad, IO port problems? */
9b9556ec 1445 printk(KERN_WARNING
f3422882 1446 "unknown linkstatus=0x%02x\n", hw->link_status);
00b3ed16
GKH
1447 goto failed;
1448 break;
1449 }
1450
1451 wlandev->linkstatus = (hw->link_status == HFA384x_LINK_CONNECTED);
00b3ed16 1452
f3422882
MM
1453failed:
1454 return;
00b3ed16
GKH
1455}
1456
1457/*----------------------------------------------------------------
1458* prism2sta_inf_linkstatus
1459*
1460* Handles the receipt of a Link Status info frame.
1461*
1462* Arguments:
1463* wlandev wlan device structure
1464* inf ptr to info frame (contents in hfa384x order)
1465*
1466* Returns:
1467* nothing
1468*
1469* Side effects:
1470*
1471* Call context:
1472* interrupt
1473----------------------------------------------------------------*/
297f06ce
MT
1474static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
1475 hfa384x_InfFrame_t *inf)
00b3ed16 1476{
f3422882 1477 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
00b3ed16 1478
18c7f792 1479 hw->link_status_new = le16_to_cpu(inf->info.linkstatus.linkstatus);
00b3ed16
GKH
1480
1481 schedule_work(&hw->link_bh);
1482
00b3ed16
GKH
1483 return;
1484}
1485
1486/*----------------------------------------------------------------
1487* prism2sta_inf_assocstatus
1488*
1489* Handles the receipt of an Association Status info frame. Should
1490* be present in APs only.
1491*
1492* Arguments:
1493* wlandev wlan device structure
1494* inf ptr to info frame (contents in hfa384x order)
1495*
1496* Returns:
1497* nothing
1498*
1499* Side effects:
1500*
1501* Call context:
1502* interrupt
1503----------------------------------------------------------------*/
297f06ce
MT
1504static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
1505 hfa384x_InfFrame_t *inf)
00b3ed16 1506{
f3422882
MM
1507 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1508 hfa384x_AssocStatus_t rec;
1509 int i;
00b3ed16 1510
00b3ed16 1511 memcpy(&rec, &inf->info.assocstatus, sizeof(rec));
18c7f792
MM
1512 rec.assocstatus = le16_to_cpu(rec.assocstatus);
1513 rec.reason = le16_to_cpu(rec.reason);
00b3ed16
GKH
1514
1515 /*
f9bd6495
CT
1516 ** Find the address in the list of authenticated stations.
1517 ** If it wasn't found, then this address has not been previously
1518 ** authenticated and something weird has happened if this is
1519 ** anything other than an "authentication failed" message.
1520 ** If the address was found, then set the "associated" flag for
1521 ** that station, based on whether the station is associating or
1522 ** losing its association. Something weird has also happened
1523 ** if we find the address in the list of authenticated stations
1524 ** but we are getting an "authentication failed" message.
f3422882 1525 */
00b3ed16
GKH
1526
1527 for (i = 0; i < hw->authlist.cnt; i++)
28b17a4b 1528 if (memcmp(rec.sta_addr, hw->authlist.addr[i], ETH_ALEN) == 0)
00b3ed16
GKH
1529 break;
1530
1531 if (i >= hw->authlist.cnt) {
1532 if (rec.assocstatus != HFA384x_ASSOCSTATUS_AUTHFAIL)
f3422882 1533 printk(KERN_WARNING
f9bd6495 1534 "assocstatus info frame received for non-authenticated station.\n");
00b3ed16
GKH
1535 } else {
1536 hw->authlist.assoc[i] =
f3422882
MM
1537 (rec.assocstatus == HFA384x_ASSOCSTATUS_STAASSOC ||
1538 rec.assocstatus == HFA384x_ASSOCSTATUS_REASSOC);
00b3ed16
GKH
1539
1540 if (rec.assocstatus == HFA384x_ASSOCSTATUS_AUTHFAIL)
f3422882 1541 printk(KERN_WARNING
f9bd6495 1542"authfail assocstatus info frame received for authenticated station.\n");
00b3ed16
GKH
1543 }
1544
00b3ed16
GKH
1545 return;
1546}
1547
1548/*----------------------------------------------------------------
1549* prism2sta_inf_authreq
1550*
1551* Handles the receipt of an Authentication Request info frame. Should
1552* be present in APs only.
1553*
1554* Arguments:
1555* wlandev wlan device structure
1556* inf ptr to info frame (contents in hfa384x order)
1557*
1558* Returns:
1559* nothing
1560*
1561* Side effects:
1562*
1563* Call context:
1564* interrupt
1565*
1566----------------------------------------------------------------*/
297f06ce
MT
1567static void prism2sta_inf_authreq(wlandevice_t *wlandev,
1568 hfa384x_InfFrame_t *inf)
00b3ed16 1569{
f3422882 1570 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
00b3ed16
GKH
1571 struct sk_buff *skb;
1572
00b3ed16
GKH
1573 skb = dev_alloc_skb(sizeof(*inf));
1574 if (skb) {
1575 skb_put(skb, sizeof(*inf));
1576 memcpy(skb->data, inf, sizeof(*inf));
1577 skb_queue_tail(&hw->authq, skb);
1578 schedule_work(&hw->link_bh);
1579 }
00b3ed16
GKH
1580}
1581
297f06ce
MT
1582static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
1583 hfa384x_InfFrame_t *inf)
00b3ed16 1584{
f3422882
MM
1585 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1586 hfa384x_authenticateStation_data_t rec;
00b3ed16 1587
f3422882
MM
1588 int i, added, result, cnt;
1589 u8 *addr;
00b3ed16 1590
00b3ed16 1591 /*
f3422882
MM
1592 ** Build the AuthenticateStation record. Initialize it for denying
1593 ** authentication.
1594 */
00b3ed16 1595
28b17a4b 1596 memcpy(rec.address, inf->info.authreq.sta_addr, ETH_ALEN);
00b3ed16
GKH
1597 rec.status = P80211ENUM_status_unspec_failure;
1598
1599 /*
f3422882
MM
1600 ** Authenticate based on the access mode.
1601 */
00b3ed16
GKH
1602
1603 switch (hw->accessmode) {
f3422882 1604 case WLAN_ACCESS_NONE:
00b3ed16 1605
f3422882
MM
1606 /*
1607 ** Deny all new authentications. However, if a station
1608 ** is ALREADY authenticated, then accept it.
1609 */
00b3ed16 1610
f3422882
MM
1611 for (i = 0; i < hw->authlist.cnt; i++)
1612 if (memcmp(rec.address, hw->authlist.addr[i],
1613 ETH_ALEN) == 0) {
1614 rec.status = P80211ENUM_status_successful;
1615 break;
1616 }
00b3ed16 1617
f3422882 1618 break;
00b3ed16 1619
f3422882 1620 case WLAN_ACCESS_ALL:
00b3ed16 1621
f3422882
MM
1622 /*
1623 ** Allow all authentications.
1624 */
00b3ed16 1625
f3422882
MM
1626 rec.status = P80211ENUM_status_successful;
1627 break;
00b3ed16 1628
f3422882 1629 case WLAN_ACCESS_ALLOW:
00b3ed16 1630
f3422882
MM
1631 /*
1632 ** Only allow the authentication if the MAC address
1633 ** is in the list of allowed addresses.
1634 **
1635 ** Since this is the interrupt handler, we may be here
1636 ** while the access list is in the middle of being
1637 ** updated. Choose the list which is currently okay.
1638 ** See "prism2mib_priv_accessallow()" for details.
1639 */
1640
1641 if (hw->allow.modify == 0) {
1642 cnt = hw->allow.cnt;
1643 addr = hw->allow.addr[0];
1644 } else {
1645 cnt = hw->allow.cnt1;
1646 addr = hw->allow.addr1[0];
1647 }
1648
1649 for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1650 if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1651 rec.status = P80211ENUM_status_successful;
1652 break;
00b3ed16
GKH
1653 }
1654
f3422882 1655 break;
00b3ed16 1656
f3422882 1657 case WLAN_ACCESS_DENY:
00b3ed16 1658
f3422882
MM
1659 /*
1660 ** Allow the authentication UNLESS the MAC address is
1661 ** in the list of denied addresses.
1662 **
1663 ** Since this is the interrupt handler, we may be here
1664 ** while the access list is in the middle of being
1665 ** updated. Choose the list which is currently okay.
1666 ** See "prism2mib_priv_accessdeny()" for details.
1667 */
00b3ed16 1668
f3422882
MM
1669 if (hw->deny.modify == 0) {
1670 cnt = hw->deny.cnt;
1671 addr = hw->deny.addr[0];
1672 } else {
1673 cnt = hw->deny.cnt1;
1674 addr = hw->deny.addr1[0];
1675 }
00b3ed16 1676
f3422882 1677 rec.status = P80211ENUM_status_successful;
00b3ed16 1678
f3422882
MM
1679 for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1680 if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1681 rec.status = P80211ENUM_status_unspec_failure;
1682 break;
1683 }
00b3ed16 1684
f3422882 1685 break;
00b3ed16
GKH
1686 }
1687
1688 /*
f9bd6495
CT
1689 ** If the authentication is okay, then add the MAC address to the
1690 ** list of authenticated stations. Don't add the address if it
1691 ** is already in the list. (802.11b does not seem to disallow
1692 ** a station from issuing an authentication request when the
1693 ** station is already authenticated. Does this sort of thing
1694 ** ever happen? We might as well do the check just in case.)
f3422882 1695 */
00b3ed16
GKH
1696
1697 added = 0;
1698
1699 if (rec.status == P80211ENUM_status_successful) {
1700 for (i = 0; i < hw->authlist.cnt; i++)
f3422882
MM
1701 if (memcmp(rec.address, hw->authlist.addr[i], ETH_ALEN)
1702 == 0)
00b3ed16
GKH
1703 break;
1704
1705 if (i >= hw->authlist.cnt) {
1706 if (hw->authlist.cnt >= WLAN_AUTH_MAX) {
1707 rec.status = P80211ENUM_status_ap_full;
1708 } else {
1709 memcpy(hw->authlist.addr[hw->authlist.cnt],
f3422882 1710 rec.address, ETH_ALEN);
00b3ed16
GKH
1711 hw->authlist.cnt++;
1712 added = 1;
1713 }
1714 }
1715 }
1716
1717 /*
f3422882
MM
1718 ** Send back the results of the authentication. If this doesn't work,
1719 ** then make sure to remove the address from the authenticated list if
1720 ** it was added.
1721 */
00b3ed16 1722
18c7f792 1723 rec.status = cpu_to_le16(rec.status);
00b3ed16
GKH
1724 rec.algorithm = inf->info.authreq.algorithm;
1725
1726 result = hfa384x_drvr_setconfig(hw, HFA384x_RID_AUTHENTICATESTA,
f3422882 1727 &rec, sizeof(rec));
00b3ed16 1728 if (result) {
f3422882
MM
1729 if (added)
1730 hw->authlist.cnt--;
1731 printk(KERN_ERR
1732 "setconfig(authenticatestation) failed, result=%d\n",
1733 result);
00b3ed16 1734 }
00b3ed16
GKH
1735 return;
1736}
1737
00b3ed16
GKH
1738/*----------------------------------------------------------------
1739* prism2sta_inf_psusercnt
1740*
1741* Handles the receipt of a PowerSaveUserCount info frame. Should
1742* be present in APs only.
1743*
1744* Arguments:
1745* wlandev wlan device structure
1746* inf ptr to info frame (contents in hfa384x order)
1747*
1748* Returns:
1749* nothing
1750*
1751* Side effects:
1752*
1753* Call context:
1754* interrupt
1755----------------------------------------------------------------*/
297f06ce
MT
1756static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
1757 hfa384x_InfFrame_t *inf)
00b3ed16 1758{
f3422882 1759 hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
00b3ed16 1760
18c7f792 1761 hw->psusercount = le16_to_cpu(inf->info.psusercnt.usercnt);
00b3ed16 1762
00b3ed16
GKH
1763 return;
1764}
1765
00b3ed16
GKH
1766/*----------------------------------------------------------------
1767* prism2sta_ev_info
1768*
1769* Handles the Info event.
1770*
1771* Arguments:
1772* wlandev wlan device structure
1773* inf ptr to a generic info frame
1774*
1775* Returns:
1776* nothing
1777*
1778* Side effects:
1779*
1780* Call context:
1781* interrupt
1782----------------------------------------------------------------*/
297f06ce 1783void prism2sta_ev_info(wlandevice_t *wlandev, hfa384x_InfFrame_t *inf)
00b3ed16 1784{
18c7f792 1785 inf->infotype = le16_to_cpu(inf->infotype);
00b3ed16 1786 /* Dispatch */
f3422882
MM
1787 switch (inf->infotype) {
1788 case HFA384x_IT_HANDOVERADDR:
1789 prism2sta_inf_handover(wlandev, inf);
1790 break;
1791 case HFA384x_IT_COMMTALLIES:
1792 prism2sta_inf_tallies(wlandev, inf);
1793 break;
1794 case HFA384x_IT_HOSTSCANRESULTS:
1795 prism2sta_inf_hostscanresults(wlandev, inf);
1796 break;
1797 case HFA384x_IT_SCANRESULTS:
1798 prism2sta_inf_scanresults(wlandev, inf);
1799 break;
1800 case HFA384x_IT_CHINFORESULTS:
1801 prism2sta_inf_chinforesults(wlandev, inf);
1802 break;
1803 case HFA384x_IT_LINKSTATUS:
1804 prism2sta_inf_linkstatus(wlandev, inf);
1805 break;
1806 case HFA384x_IT_ASSOCSTATUS:
1807 prism2sta_inf_assocstatus(wlandev, inf);
1808 break;
1809 case HFA384x_IT_AUTHREQ:
1810 prism2sta_inf_authreq(wlandev, inf);
1811 break;
1812 case HFA384x_IT_PSUSERCNT:
1813 prism2sta_inf_psusercnt(wlandev, inf);
1814 break;
1815 case HFA384x_IT_KEYIDCHANGED:
1816 printk(KERN_WARNING "Unhandled IT_KEYIDCHANGED\n");
1817 break;
1818 case HFA384x_IT_ASSOCREQ:
1819 printk(KERN_WARNING "Unhandled IT_ASSOCREQ\n");
1820 break;
1821 case HFA384x_IT_MICFAILURE:
1822 printk(KERN_WARNING "Unhandled IT_MICFAILURE\n");
1823 break;
1824 default:
1825 printk(KERN_WARNING
1826 "Unknown info type=0x%02x\n", inf->infotype);
1827 break;
00b3ed16 1828 }
00b3ed16
GKH
1829 return;
1830}
1831
00b3ed16
GKH
1832/*----------------------------------------------------------------
1833* prism2sta_ev_txexc
1834*
1835* Handles the TxExc event. A Transmit Exception event indicates
1836* that the MAC's TX process was unsuccessful - so the packet did
1837* not get transmitted.
1838*
1839* Arguments:
1840* wlandev wlan device structure
1841* status tx frame status word
1842*
1843* Returns:
1844* nothing
1845*
1846* Side effects:
1847*
1848* Call context:
1849* interrupt
1850----------------------------------------------------------------*/
297f06ce 1851void prism2sta_ev_txexc(wlandevice_t *wlandev, u16 status)
00b3ed16 1852{
a7cf7bae 1853 pr_debug("TxExc status=0x%x.\n", status);
00b3ed16 1854
00b3ed16
GKH
1855 return;
1856}
1857
00b3ed16
GKH
1858/*----------------------------------------------------------------
1859* prism2sta_ev_tx
1860*
1861* Handles the Tx event.
1862*
1863* Arguments:
1864* wlandev wlan device structure
1865* status tx frame status word
1866* Returns:
1867* nothing
1868*
1869* Side effects:
1870*
1871* Call context:
1872* interrupt
1873----------------------------------------------------------------*/
297f06ce 1874void prism2sta_ev_tx(wlandevice_t *wlandev, u16 status)
00b3ed16 1875{
a7cf7bae 1876 pr_debug("Tx Complete, status=0x%04x\n", status);
00b3ed16
GKH
1877 /* update linux network stats */
1878 wlandev->linux_stats.tx_packets++;
00b3ed16
GKH
1879 return;
1880}
1881
00b3ed16
GKH
1882/*----------------------------------------------------------------
1883* prism2sta_ev_rx
1884*
1885* Handles the Rx event.
1886*
1887* Arguments:
1888* wlandev wlan device structure
1889*
1890* Returns:
1891* nothing
1892*
1893* Side effects:
1894*
1895* Call context:
1896* interrupt
1897----------------------------------------------------------------*/
297f06ce 1898void prism2sta_ev_rx(wlandevice_t *wlandev, struct sk_buff *skb)
00b3ed16 1899{
00b3ed16 1900 p80211netdev_rx(wlandev, skb);
00b3ed16
GKH
1901 return;
1902}
1903
1904/*----------------------------------------------------------------
1905* prism2sta_ev_alloc
1906*
1907* Handles the Alloc event.
1908*
1909* Arguments:
1910* wlandev wlan device structure
1911*
1912* Returns:
1913* nothing
1914*
1915* Side effects:
1916*
1917* Call context:
1918* interrupt
1919----------------------------------------------------------------*/
297f06ce 1920void prism2sta_ev_alloc(wlandevice_t *wlandev)
00b3ed16 1921{
cbec30c4 1922 netif_wake_queue(wlandev->netdev);
00b3ed16
GKH
1923 return;
1924}
1925
00b3ed16
GKH
1926/*----------------------------------------------------------------
1927* create_wlan
1928*
1929* Called at module init time. This creates the wlandevice_t structure
1930* and initializes it with relevant bits.
1931*
1932* Arguments:
1933* none
1934*
1935* Returns:
1936* the created wlandevice_t structure.
1937*
1938* Side effects:
f9bd6495 1939* also allocates the priv/hw structures.
00b3ed16
GKH
1940*
1941* Call context:
1942* process thread
1943*
1944----------------------------------------------------------------*/
1945static wlandevice_t *create_wlan(void)
1946{
f3422882
MM
1947 wlandevice_t *wlandev = NULL;
1948 hfa384x_t *hw = NULL;
00b3ed16 1949
f3422882
MM
1950 /* Alloc our structures */
1951 wlandev = kmalloc(sizeof(wlandevice_t), GFP_KERNEL);
1952 hw = kmalloc(sizeof(hfa384x_t), GFP_KERNEL);
00b3ed16
GKH
1953
1954 if (!wlandev || !hw) {
edbd606c 1955 printk(KERN_ERR "%s: Memory allocation failure.\n", dev_info);
7c98f718
MM
1956 kfree(wlandev);
1957 kfree(hw);
00b3ed16
GKH
1958 return NULL;
1959 }
1960
1961 /* Clear all the structs */
1962 memset(wlandev, 0, sizeof(wlandevice_t));
1963 memset(hw, 0, sizeof(hfa384x_t));
1964
1965 /* Initialize the network device object. */
1966 wlandev->nsdname = dev_info;
1967 wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
1968 wlandev->priv = hw;
1969 wlandev->open = prism2sta_open;
1970 wlandev->close = prism2sta_close;
1971 wlandev->reset = prism2sta_reset;
00b3ed16
GKH
1972 wlandev->txframe = prism2sta_txframe;
1973 wlandev->mlmerequest = prism2sta_mlmerequest;
1974 wlandev->set_multicast_list = prism2sta_setmulticast;
1975 wlandev->tx_timeout = hfa384x_tx_timeout;
1976
f3422882 1977 wlandev->nsdcaps = P80211_NSDCAP_HWFRAGMENT | P80211_NSDCAP_AUTOJOIN;
00b3ed16 1978
25985edc 1979 /* Initialize the device private data structure. */
f3422882 1980 hw->dot11_desired_bss_type = 1;
00b3ed16
GKH
1981
1982 return wlandev;
1983}
1984
00b3ed16
GKH
1985void prism2sta_commsqual_defer(struct work_struct *data)
1986{
f3422882
MM
1987 hfa384x_t *hw = container_of(data, struct hfa384x, commsqual_bh);
1988 wlandevice_t *wlandev = hw->wlandev;
00b3ed16 1989 hfa384x_bytestr32_t ssid;
b6bb56e6
EH
1990 struct p80211msg_dot11req_mibget msg;
1991 p80211item_uint32_t *mibitem = (p80211item_uint32_t *)
1992 &msg.mibattribute.data;
00b3ed16
GKH
1993 int result = 0;
1994
00b3ed16
GKH
1995 if (hw->wlandev->hwremoved)
1996 goto done;
1997
1998 /* we don't care if we're in AP mode */
1999 if ((wlandev->macmode == WLAN_MACMODE_NONE) ||
2000 (wlandev->macmode == WLAN_MACMODE_ESS_AP)) {
2001 goto done;
2002 }
2003
2004 /* It only makes sense to poll these in non-IBSS */
2005 if (wlandev->macmode != WLAN_MACMODE_IBSS_STA) {
f9bd6495
CT
2006 result = hfa384x_drvr_getconfig(
2007 hw, HFA384x_RID_DBMCOMMSQUALITY,
2008 &hw->qual, HFA384x_RID_DBMCOMMSQUALITY_LEN);
00b3ed16
GKH
2009
2010 if (result) {
edbd606c 2011 printk(KERN_ERR "error fetching commsqual\n");
00b3ed16
GKH
2012 goto done;
2013 }
2014
a7cf7bae 2015 pr_debug("commsqual %d %d %d\n",
75f49e07
MT
2016 le16_to_cpu(hw->qual.CQ_currBSS),
2017 le16_to_cpu(hw->qual.ASL_currBSS),
2018 le16_to_cpu(hw->qual.ANL_currFC));
00b3ed16
GKH
2019 }
2020
cb3126e6
KR
2021 /* Get the signal rate */
2022 msg.msgcode = DIDmsg_dot11req_mibget;
2023 mibitem->did = DIDmib_p2_p2MAC_p2CurrentTxRate;
b6bb56e6 2024 result = p80211req_dorequest(wlandev, (u8 *) &msg);
cb3126e6
KR
2025
2026 if (result) {
2027 pr_debug("get signal rate failed, result = %d\n",
2028 result);
2029 goto done;
2030 }
2031
2032 switch (mibitem->data) {
2033 case HFA384x_RATEBIT_1:
2034 hw->txrate = 10;
2035 break;
2036 case HFA384x_RATEBIT_2:
2037 hw->txrate = 20;
2038 break;
2039 case HFA384x_RATEBIT_5dot5:
2040 hw->txrate = 55;
2041 break;
2042 case HFA384x_RATEBIT_11:
2043 hw->txrate = 110;
2044 break;
2045 default:
2046 pr_debug("Bad ratebit (%d)\n", mibitem->data);
2047 }
2048
00b3ed16
GKH
2049 /* Lastly, we need to make sure the BSSID didn't change on us */
2050 result = hfa384x_drvr_getconfig(hw,
2051 HFA384x_RID_CURRENTBSSID,
2052 wlandev->bssid, WLAN_BSSID_LEN);
f3422882 2053 if (result) {
75f49e07
MT
2054 pr_debug("getconfig(0x%02x) failed, result = %d\n",
2055 HFA384x_RID_CURRENTBSSID, result);
00b3ed16
GKH
2056 goto done;
2057 }
2058
2059 result = hfa384x_drvr_getconfig(hw,
2060 HFA384x_RID_CURRENTSSID,
2061 &ssid, sizeof(ssid));
f3422882 2062 if (result) {
75f49e07
MT
2063 pr_debug("getconfig(0x%02x) failed, result = %d\n",
2064 HFA384x_RID_CURRENTSSID, result);
00b3ed16
GKH
2065 goto done;
2066 }
5dd8acc8
SK
2067 prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
2068 (p80211pstrd_t *) &wlandev->ssid);
00b3ed16
GKH
2069
2070 /* Reschedule timer */
2071 mod_timer(&hw->commsqual_timer, jiffies + HZ);
2072
f3422882 2073done:
8a251b55 2074 ;
00b3ed16
GKH
2075}
2076
2077void prism2sta_commsqual_timer(unsigned long data)
2078{
f3422882 2079 hfa384x_t *hw = (hfa384x_t *) data;
00b3ed16 2080
00b3ed16 2081 schedule_work(&hw->commsqual_bh);
00b3ed16 2082}