|
@@ -86,9 +86,6 @@
|
|
|
|
|
|
/*--------------------- Static Classes ----------------------------*/
|
|
|
|
|
|
-/*--------------------- Static Variables --------------------------*/
|
|
|
-static int msglevel = MSG_LEVEL_INFO;
|
|
|
-
|
|
|
/*--------------------- Static Functions --------------------------*/
|
|
|
//2008-8-4 <add> by chester
|
|
|
static bool ChannelExceedZoneType(
|
|
@@ -551,9 +548,9 @@ vMgrReAssocBeginSta(
|
|
|
/* send the frame */
|
|
|
*pStatus = csMgmt_xmit(pDevice, pTxPacket);
|
|
|
if (*pStatus != CMD_STATUS_PENDING)
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:Reassociation tx failed.\n");
|
|
|
+ pr_debug("Mgt:Reassociation tx failed\n");
|
|
|
else
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:Reassociation tx sending.\n");
|
|
|
+ pr_debug("Mgt:Reassociation tx sending\n");
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -718,8 +715,8 @@ s_vMgrRxAssocRequest(
|
|
|
if (!pMgmt->sNodeDBTable[uNodeIndex].bShortPreamble)
|
|
|
pDevice->bBarkerPreambleMd = true;
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "Associate AID= %d\n", wAssocAID);
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "MAC=%2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
|
|
|
+ pr_info("Associate AID= %d\n", wAssocAID);
|
|
|
+ pr_info("MAC=%2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
|
|
|
sFrame.pHdr->sA3.abyAddr2[0],
|
|
|
sFrame.pHdr->sA3.abyAddr2[1],
|
|
|
sFrame.pHdr->sA3.abyAddr2[2],
|
|
@@ -727,7 +724,7 @@ s_vMgrRxAssocRequest(
|
|
|
sFrame.pHdr->sA3.abyAddr2[4],
|
|
|
sFrame.pHdr->sA3.abyAddr2[5]
|
|
|
);
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "Max Support rate = %d\n",
|
|
|
+ pr_info("Max Support rate = %d\n",
|
|
|
pMgmt->sNodeDBTable[uNodeIndex].wMaxSuppRate);
|
|
|
} else {
|
|
|
/* TODO: received STA under state1 handle */
|
|
@@ -753,9 +750,9 @@ s_vMgrRxAssocRequest(
|
|
|
/* send the frame */
|
|
|
Status = csMgmt_xmit(pDevice, pTxPacket);
|
|
|
if (Status != CMD_STATUS_PENDING)
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:Assoc response tx failed\n");
|
|
|
+ pr_debug("Mgt:Assoc response tx failed\n");
|
|
|
else
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:Assoc response tx sending..\n");
|
|
|
+ pr_debug("Mgt:Assoc response tx sending..\n");
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -867,8 +864,8 @@ s_vMgrRxReAssocRequest(
|
|
|
if (!pMgmt->sNodeDBTable[uNodeIndex].bShortPreamble)
|
|
|
pDevice->bBarkerPreambleMd = true;
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "Rx ReAssociate AID= %d\n", wAssocAID);
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "MAC=%2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
|
|
|
+ pr_info("Rx ReAssociate AID= %d\n", wAssocAID);
|
|
|
+ pr_info("MAC=%2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
|
|
|
sFrame.pHdr->sA3.abyAddr2[0],
|
|
|
sFrame.pHdr->sA3.abyAddr2[1],
|
|
|
sFrame.pHdr->sA3.abyAddr2[2],
|
|
@@ -876,7 +873,7 @@ s_vMgrRxReAssocRequest(
|
|
|
sFrame.pHdr->sA3.abyAddr2[4],
|
|
|
sFrame.pHdr->sA3.abyAddr2[5]
|
|
|
);
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "Max Support rate = %d\n",
|
|
|
+ pr_info("Max Support rate = %d\n",
|
|
|
pMgmt->sNodeDBTable[uNodeIndex].wMaxSuppRate);
|
|
|
|
|
|
}
|
|
@@ -901,9 +898,9 @@ s_vMgrRxReAssocRequest(
|
|
|
|
|
|
Status = csMgmt_xmit(pDevice, pTxPacket);
|
|
|
if (Status != CMD_STATUS_PENDING)
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:ReAssoc response tx failed\n");
|
|
|
+ pr_debug("Mgt:ReAssoc response tx failed\n");
|
|
|
else
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:ReAssoc response tx sending..\n");
|
|
|
+ pr_debug("Mgt:ReAssoc response tx sending..\n");
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -961,13 +958,14 @@ s_vMgrRxAssocResponse(
|
|
|
// set AID
|
|
|
pMgmt->wCurrAID = cpu_to_le16((*(sFrame.pwAid)));
|
|
|
if ((pMgmt->wCurrAID >> 14) != (BIT0 | BIT1))
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "AID from AP, has two msb clear.\n");
|
|
|
+ pr_debug("AID from AP, has two msb clear\n");
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "Association Successful, AID=%d.\n", pMgmt->wCurrAID & ~(BIT14 | BIT15));
|
|
|
+ pr_info("Association Successful, AID=%d\n",
|
|
|
+ pMgmt->wCurrAID & ~(BIT14 | BIT15));
|
|
|
pMgmt->eCurrState = WMAC_STATE_ASSOC;
|
|
|
BSSvUpdateAPNode((void *)pDevice, sFrame.pwCapInfo, sFrame.pSuppRates, sFrame.pExtSuppRates);
|
|
|
pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID;
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "Link with AP(SSID): %s\n", pItemSSID->abySSID);
|
|
|
+ pr_info("Link with AP(SSID): %s\n", pItemSSID->abySSID);
|
|
|
pDevice->bLinkPass = true;
|
|
|
pDevice->uBBVGADiffCount = 0;
|
|
|
if ((pDevice->bWPADEVUp) && (pDevice->skb != NULL)) {
|
|
@@ -1206,8 +1204,8 @@ s_vMgrRxAuthentication(
|
|
|
s_vMgrRxAuthenSequence_4(pDevice, pMgmt, &sFrame);
|
|
|
break;
|
|
|
default:
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Auth Sequence error, seq = %d\n",
|
|
|
- cpu_to_le16((*(sFrame.pwAuthSequence))));
|
|
|
+ pr_debug("Auth Sequence error, seq = %d\n",
|
|
|
+ cpu_to_le16((*(sFrame.pwAuthSequence))));
|
|
|
break;
|
|
|
}
|
|
|
}
|
|
@@ -1306,9 +1304,9 @@ s_vMgrRxAuthenSequence_1(
|
|
|
if (pDevice->bEnableHostapd)
|
|
|
return;
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:Authreq_reply sequence_1 tx..\n");
|
|
|
+ pr_debug("Mgt:Authreq_reply sequence_1 tx..\n");
|
|
|
if (csMgmt_xmit(pDevice, pTxPacket) != CMD_STATUS_PENDING)
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:Authreq_reply sequence_1 tx failed.\n");
|
|
|
+ pr_debug("Mgt:Authreq_reply sequence_1 tx failed\n");
|
|
|
}
|
|
|
|
|
|
/*+
|
|
@@ -1337,11 +1335,11 @@ s_vMgrRxAuthenSequence_2(
|
|
|
switch (cpu_to_le16((*(pFrame->pwAuthAlgorithm)))) {
|
|
|
case WLAN_AUTH_ALG_OPENSYSTEM:
|
|
|
if (cpu_to_le16((*(pFrame->pwStatus))) == WLAN_MGMT_STATUS_SUCCESS) {
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "802.11 Authen (OPEN) Successful.\n");
|
|
|
+ pr_info("802.11 Authen (OPEN) Successful\n");
|
|
|
pMgmt->eCurrState = WMAC_STATE_AUTH;
|
|
|
timer_expire(pDevice->sTimerCommand, 0);
|
|
|
} else {
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "802.11 Authen (OPEN) Failed.\n");
|
|
|
+ pr_info("802.11 Authen (OPEN) Failed\n");
|
|
|
s_vMgrLogStatus(pMgmt, cpu_to_le16((*(pFrame->pwStatus))));
|
|
|
pMgmt->eCurrState = WMAC_STATE_IDLE;
|
|
|
}
|
|
@@ -1381,16 +1379,17 @@ s_vMgrRxAuthenSequence_2(
|
|
|
pTxPacket->cbPayloadLen = sFrame.len - WLAN_HDR_ADDR3_LEN;
|
|
|
// send the frame
|
|
|
if (csMgmt_xmit(pDevice, pTxPacket) != CMD_STATUS_PENDING)
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:Auth_reply sequence_2 tx failed.\n");
|
|
|
+ pr_debug("Mgt:Auth_reply sequence_2 tx failed\n");
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:Auth_reply sequence_2 tx ...\n");
|
|
|
+ pr_debug("Mgt:Auth_reply sequence_2 tx ...\n");
|
|
|
} else {
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:rx Auth_reply sequence_2 status error ...\n");
|
|
|
+ pr_debug("Mgt:rx Auth_reply sequence_2 status error ...\n");
|
|
|
s_vMgrLogStatus(pMgmt, cpu_to_le16((*(pFrame->pwStatus))));
|
|
|
}
|
|
|
break;
|
|
|
default:
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt: rx auth.seq = 2 unknown AuthAlgorithm=%d\n", cpu_to_le16((*(pFrame->pwAuthAlgorithm))));
|
|
|
+ pr_debug("Mgt: rx auth.seq = 2 unknown AuthAlgorithm=%d\n",
|
|
|
+ cpu_to_le16((*(pFrame->pwAuthAlgorithm))));
|
|
|
break;
|
|
|
}
|
|
|
}
|
|
@@ -1444,7 +1443,7 @@ s_vMgrRxAuthenSequence_3(
|
|
|
pMgmt->sNodeDBTable[uNodeIndex].byAuthSequence = 0;
|
|
|
}
|
|
|
uStatusCode = WLAN_MGMT_STATUS_SUCCESS;
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Challenge text check ok..\n");
|
|
|
+ pr_debug("Challenge text check ok..\n");
|
|
|
|
|
|
reply:
|
|
|
// send auth reply
|
|
@@ -1477,7 +1476,7 @@ reply:
|
|
|
return;
|
|
|
|
|
|
if (csMgmt_xmit(pDevice, pTxPacket) != CMD_STATUS_PENDING)
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:Authreq_reply sequence_4 tx failed.\n");
|
|
|
+ pr_debug("Mgt:Authreq_reply sequence_4 tx failed\n");
|
|
|
}
|
|
|
|
|
|
/*+
|
|
@@ -1499,11 +1498,11 @@ s_vMgrRxAuthenSequence_4(
|
|
|
)
|
|
|
{
|
|
|
if (cpu_to_le16((*(pFrame->pwStatus))) == WLAN_MGMT_STATUS_SUCCESS) {
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "802.11 Authen (SHAREDKEY) Successful.\n");
|
|
|
+ pr_info("802.11 Authen (SHAREDKEY) Successful\n");
|
|
|
pMgmt->eCurrState = WMAC_STATE_AUTH;
|
|
|
timer_expire(pDevice->sTimerCommand, 0);
|
|
|
} else{
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "802.11 Authen (SHAREDKEY) Failed.\n");
|
|
|
+ pr_info("802.11 Authen (SHAREDKEY) Failed\n");
|
|
|
s_vMgrLogStatus(pMgmt, cpu_to_le16((*(pFrame->pwStatus))));
|
|
|
pMgmt->eCurrState = WMAC_STATE_IDLE;
|
|
|
}
|
|
@@ -1540,13 +1539,14 @@ s_vMgrRxDisassociation(
|
|
|
if (BSSDBbIsSTAInNodeDB(pMgmt, pRxPacket->p80211Header->sA3.abyAddr2, &uNodeIndex))
|
|
|
BSSvRemoveOneNode(pDevice, uNodeIndex);
|
|
|
else
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Rx disassoc, sta not found\n");
|
|
|
+ pr_debug("Rx disassoc, sta not found\n");
|
|
|
|
|
|
} else if (pMgmt->eCurrMode == WMAC_MODE_ESS_STA) {
|
|
|
sFrame.len = pRxPacket->cbMPDULen;
|
|
|
sFrame.pBuf = (unsigned char *)pRxPacket->p80211Header;
|
|
|
vMgrDecodeDisassociation(&sFrame);
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "AP disassociated me, reason=%d.\n", cpu_to_le16(*(sFrame.pwReason)));
|
|
|
+ pr_info("AP disassociated me, reason=%d\n",
|
|
|
+ cpu_to_le16(*(sFrame.pwReason)));
|
|
|
//TODO: do something let upper layer know or
|
|
|
//try to send associate packet again because of inactivity timeout
|
|
|
if ((pDevice->bWPADEVUp) && (pDevice->skb != NULL)) {
|
|
@@ -1611,13 +1611,14 @@ s_vMgrRxDeauthentication(
|
|
|
if (BSSDBbIsSTAInNodeDB(pMgmt, pRxPacket->p80211Header->sA3.abyAddr2, &uNodeIndex))
|
|
|
BSSvRemoveOneNode(pDevice, uNodeIndex);
|
|
|
else
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Rx deauth, sta not found\n");
|
|
|
+ pr_info("Rx deauth, sta not found\n");
|
|
|
} else {
|
|
|
if (pMgmt->eCurrMode == WMAC_MODE_ESS_STA) {
|
|
|
sFrame.len = pRxPacket->cbMPDULen;
|
|
|
sFrame.pBuf = (unsigned char *)pRxPacket->p80211Header;
|
|
|
vMgrDecodeDeauthen(&sFrame);
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "AP deauthed me, reason=%d.\n", cpu_to_le16((*(sFrame.pwReason))));
|
|
|
+ pr_info("AP deauthed me, reason=%d\n",
|
|
|
+ cpu_to_le16((*(sFrame.pwReason))));
|
|
|
// TODO: update BSS list for specific BSSID if pre-authentication case
|
|
|
if (ether_addr_equal(sFrame.pHdr->sA3.abyAddr3,
|
|
|
pMgmt->abyCurrBSSID)) {
|
|
@@ -1755,7 +1756,7 @@ s_vMgrRxBeacon(
|
|
|
(sFrame.pwCapInfo == NULL) ||
|
|
|
(sFrame.pSSID == NULL) ||
|
|
|
(sFrame.pSuppRates == NULL)) {
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Rx beacon frame error\n");
|
|
|
+ pr_debug("Rx beacon frame error\n");
|
|
|
return;
|
|
|
}
|
|
|
|
|
@@ -1790,7 +1791,7 @@ s_vMgrRxBeacon(
|
|
|
|
|
|
pBSSList = BSSpAddrIsInBSSList((void *)pDevice, sFrame.pHdr->sA3.abyAddr3, sFrame.pSSID);
|
|
|
if (pBSSList == NULL) {
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Beacon/insert: RxChannel = : %d\n", byCurrChannel);
|
|
|
+ pr_debug("Beacon/insert: RxChannel = : %d\n", byCurrChannel);
|
|
|
BSSbInsertToBSSList((void *)pDevice,
|
|
|
sFrame.pHdr->sA3.abyAddr3,
|
|
|
*sFrame.pqwTimestamp,
|
|
@@ -1964,7 +1965,7 @@ s_vMgrRxBeacon(
|
|
|
}
|
|
|
}
|
|
|
|
|
|
-// DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Beacon 2\n");
|
|
|
+// pr_debug("Beacon 2\n");
|
|
|
// check if CF field exists
|
|
|
if (WLAN_GET_CAP_INFO_ESS(*sFrame.pwCapInfo)) {
|
|
|
if (sFrame.pCFParms->wCFPDurRemaining > 0) {
|
|
@@ -2030,14 +2031,14 @@ s_vMgrRxBeacon(
|
|
|
|
|
|
} else {
|
|
|
pMgmt->bInTIMWake = false;
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "BCN: Not In TIM..\n");
|
|
|
+ pr_debug("BCN: Not In TIM..\n");
|
|
|
if (!pDevice->bPWBitOn) {
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "BCN: Send Null Packet\n");
|
|
|
+ pr_debug("BCN: Send Null Packet\n");
|
|
|
if (PSbSendNullPacket(pDevice))
|
|
|
pDevice->bPWBitOn = true;
|
|
|
}
|
|
|
if (PSbConsiderPowerDown(pDevice, false, false))
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "BCN: Power down now...\n");
|
|
|
+ pr_debug("BCN: Power down now...\n");
|
|
|
}
|
|
|
|
|
|
}
|
|
@@ -2105,7 +2106,7 @@ s_vMgrRxBeacon(
|
|
|
|
|
|
// if other stations joined, indicate connection to upper layer..
|
|
|
if (pMgmt->eCurrState == WMAC_STATE_STARTED) {
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Current IBSS State: [Started]........to: [Jointed]\n");
|
|
|
+ pr_debug("Current IBSS State: [Started]........to: [Jointed]\n");
|
|
|
pMgmt->eCurrState = WMAC_STATE_JOINTED;
|
|
|
pDevice->bLinkPass = true;
|
|
|
if (netif_queue_stopped(pDevice->dev))
|
|
@@ -2131,7 +2132,7 @@ s_vMgrRxBeacon(
|
|
|
(PWLAN_IE_SUPP_RATES)pMgmt->abyCurrSuppRates,
|
|
|
WLAN_RATES_MAXLEN_11B);
|
|
|
// set HW beacon interval and re-synchronizing....
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Rejoining to Other Adhoc group with same SSID........\n");
|
|
|
+ pr_debug("Rejoining to Other Adhoc group with same SSID........\n");
|
|
|
VNSvOutPortW(pDevice->PortOffset + MAC_REG_BI, pMgmt->wCurrBeaconPeriod);
|
|
|
CARDbUpdateTSF(pDevice, pRxPacket->byRxRate, qwTimestamp, qwLocalTSF);
|
|
|
CARDvUpdateNextTBTT(pDevice->PortOffset, qwTimestamp, pMgmt->wCurrBeaconPeriod);
|
|
@@ -2191,7 +2192,7 @@ vMgrCreateOwnIBSS(
|
|
|
unsigned char abyOFDM_RATE[] = {0x0C, 0x12, 0x18, 0x24, 0x30, 0x48, 0x60, 0x6C};
|
|
|
unsigned short wSuppRate;
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Create Basic Service Set .......\n");
|
|
|
+ pr_debug("Create Basic Service Set .......\n");
|
|
|
|
|
|
if (pMgmt->eConfigMode == WMAC_CONFIG_IBSS_STA) {
|
|
|
if ((pMgmt->eAuthenMode == WMAC_AUTH_WPANONE) &&
|
|
@@ -2300,7 +2301,7 @@ vMgrCreateOwnIBSS(
|
|
|
if (pMgmt->eCurrMode == WMAC_MODE_ESS_AP) {
|
|
|
// AP mode BSSID = MAC addr
|
|
|
memcpy(pMgmt->abyCurrBSSID, pMgmt->abyMACAddr, WLAN_ADDR_LEN);
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "AP beacon created BSSID:%pM\n",
|
|
|
+ pr_info("AP beacon created BSSID:%pM\n",
|
|
|
pMgmt->abyCurrBSSID);
|
|
|
}
|
|
|
|
|
@@ -2321,7 +2322,7 @@ vMgrCreateOwnIBSS(
|
|
|
pMgmt->abyCurrBSSID[0] &= ~IEEE_ADDR_GROUP;
|
|
|
pMgmt->abyCurrBSSID[0] |= IEEE_ADDR_UNIVERSAL;
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_INFO, KERN_INFO "Adhoc beacon created bssid:%pM\n",
|
|
|
+ pr_info("Adhoc beacon created bssid:%pM\n",
|
|
|
pMgmt->abyCurrBSSID);
|
|
|
}
|
|
|
|
|
@@ -2435,7 +2436,7 @@ vMgrJoinBSSBegin(
|
|
|
|
|
|
if (ii == MAX_BSS_NUM) {
|
|
|
*pStatus = CMD_STATUS_RESOURCES;
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "BSS finding:BSS list is empty.\n");
|
|
|
+ pr_info("BSS finding:BSS list is empty\n");
|
|
|
return;
|
|
|
}
|
|
|
|
|
@@ -2450,11 +2451,12 @@ vMgrJoinBSSBegin(
|
|
|
if (pCurr == NULL) {
|
|
|
*pStatus = CMD_STATUS_RESOURCES;
|
|
|
pItemSSID = (PWLAN_IE_SSID)pMgmt->abyDesireSSID;
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Scanning [%s] not found, disconnected !\n", pItemSSID->abySSID);
|
|
|
+ pr_info("Scanning [%s] not found, disconnected !\n",
|
|
|
+ pItemSSID->abySSID);
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "AP(BSS) finding:Found a AP(BSS)..\n");
|
|
|
+ pr_info("AP(BSS) finding:Found a AP(BSS)..\n");
|
|
|
if (WLAN_GET_CAP_INFO_ESS(cpu_to_le16(pCurr->wCapInfo))) {
|
|
|
if ((pMgmt->eAuthenMode == WMAC_AUTH_WPA) || (pMgmt->eAuthenMode == WMAC_AUTH_WPAPSK)) {
|
|
|
// patch for CISCO migration mode
|
|
@@ -2532,10 +2534,11 @@ vMgrJoinBSSBegin(
|
|
|
if (pMgmt->eAuthenMode == WMAC_AUTH_WPA2) {
|
|
|
bool bResult = bAdd_PMKID_Candidate((void *)pDevice, pMgmt->abyCurrBSSID, &pCurr->sRSNCapObj);
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "bAdd_PMKID_Candidate: 1(%d)\n", bResult);
|
|
|
+ pr_debug("bAdd_PMKID_Candidate: 1(%d)\n",
|
|
|
+ bResult);
|
|
|
if (!bResult) {
|
|
|
vFlush_PMKID_Candidate((void *)pDevice);
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "vFlush_PMKID_Candidate: 4\n");
|
|
|
+ pr_debug("vFlush_PMKID_Candidate: 4\n");
|
|
|
bAdd_PMKID_Candidate((void *)pDevice, pMgmt->abyCurrBSSID, &pCurr->sRSNCapObj);
|
|
|
}
|
|
|
}
|
|
@@ -2543,9 +2546,9 @@ vMgrJoinBSSBegin(
|
|
|
// Preamble type auto-switch: if AP can receive short-preamble cap,
|
|
|
// we can turn on too.
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Join ESS\n");
|
|
|
+ pr_debug("Join ESS\n");
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "End of Join AP -- A/B/G Action\n");
|
|
|
+ pr_debug("End of Join AP -- A/B/G Action\n");
|
|
|
} else {
|
|
|
pMgmt->eCurrState = WMAC_STATE_IDLE;
|
|
|
}
|
|
@@ -2603,8 +2606,8 @@ vMgrJoinBSSBegin(
|
|
|
|
|
|
pMgmt->eCurrState = WMAC_STATE_STARTED;
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Join IBSS ok:%pM\n",
|
|
|
- pMgmt->abyCurrBSSID);
|
|
|
+ pr_debug("Join IBSS ok:%pM\n",
|
|
|
+ pMgmt->abyCurrBSSID);
|
|
|
// Preamble type auto-switch: if AP can receive short-preamble cap,
|
|
|
// and if registry setting is short preamble we can turn on too.
|
|
|
|
|
@@ -2651,7 +2654,7 @@ s_vMgrSynchBSS(
|
|
|
pDevice->eEncryptionStatus,
|
|
|
&(pMgmt->byCSSPK),
|
|
|
&(pMgmt->byCSSGK))) {
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "s_bCipherMatch Fail .......\n");
|
|
|
+ pr_debug("s_bCipherMatch Fail .......\n");
|
|
|
return;
|
|
|
}
|
|
|
|
|
@@ -2689,8 +2692,7 @@ s_vMgrSynchBSS(
|
|
|
|
|
|
MACvReadBSSIDAddress(pDevice->PortOffset, pMgmt->abyCurrBSSID);
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Sync:set CurrBSSID address = "
|
|
|
- "%pM\n", pMgmt->abyCurrBSSID);
|
|
|
+ pr_debug("Sync:set CurrBSSID address = %pM\n", pMgmt->abyCurrBSSID);
|
|
|
|
|
|
if (pCurr->eNetworkTypeInUse == PHY_TYPE_11A) {
|
|
|
if ((pMgmt->eConfigPHYMode == PHY_TYPE_11A) ||
|
|
@@ -2745,19 +2747,20 @@ s_vMgrSynchBSS(
|
|
|
pCurr->sERP.byERP,
|
|
|
pMgmt->abyCurrSuppRates,
|
|
|
pMgmt->abyCurrExtSuppRates)) {
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "<----s_bSynchBSS Set Phy Mode Fail [%d]\n", ePhyType);
|
|
|
+ pr_debug("<----s_bSynchBSS Set Phy Mode Fail [%d]\n", ePhyType);
|
|
|
return;
|
|
|
}
|
|
|
// set channel and clear NAV
|
|
|
if (!set_channel(pMgmt->pAdapter, pCurr->uChannel)) {
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "<----s_bSynchBSS Set Channel [%d]\n", pCurr->uChannel);
|
|
|
+ pr_debug("<----s_bSynchBSS Set Channel [%d]\n",
|
|
|
+ pCurr->uChannel);
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
pMgmt->uCurrChannel = pCurr->uChannel;
|
|
|
pMgmt->eCurrentPHYMode = ePhyType;
|
|
|
pMgmt->byERPContext = pCurr->sERP.byERP;
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Sync:Set to channel = [%d]\n", (int)pCurr->uChannel);
|
|
|
+ pr_debug("Sync:Set to channel = [%d]\n", (int)pCurr->uChannel);
|
|
|
|
|
|
*pStatus = CMD_STATUS_SUCCESS;
|
|
|
|
|
@@ -3954,13 +3957,14 @@ s_vMgrRxProbeResponse(
|
|
|
(sFrame.pwCapInfo == NULL) ||
|
|
|
(sFrame.pSSID == NULL) ||
|
|
|
(sFrame.pSuppRates == NULL)) {
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Probe resp:Fail addr:[%p]\n", pRxPacket->p80211Header);
|
|
|
+ pr_debug("Probe resp:Fail addr:[%p]\n",
|
|
|
+ pRxPacket->p80211Header);
|
|
|
DBG_PORT80(0xCC);
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
if (sFrame.pSSID->len == 0)
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Rx Probe resp: SSID len = 0\n");
|
|
|
+ pr_debug("Rx Probe resp: SSID len = 0\n");
|
|
|
|
|
|
if (sFrame.pDSParms != NULL) {
|
|
|
if (byCurrChannel > CB_MAX_CHANNEL_24G) {
|
|
@@ -4014,7 +4018,8 @@ s_vMgrRxProbeResponse(
|
|
|
(void *)pRxPacket
|
|
|
);
|
|
|
} else {
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Probe resp/insert: RxChannel = : %d\n", byCurrChannel);
|
|
|
+ pr_debug("Probe resp/insert: RxChannel = : %d\n",
|
|
|
+ byCurrChannel);
|
|
|
BSSbInsertToBSSList((void *)pDevice,
|
|
|
sFrame.pHdr->sA3.abyAddr3,
|
|
|
*sFrame.pqwTimestamp,
|
|
@@ -4103,7 +4108,7 @@ s_vMgrRxProbeRequest(
|
|
|
/* send the frame */
|
|
|
Status = csMgmt_xmit(pDevice, pTxPacket);
|
|
|
if (Status != CMD_STATUS_PENDING)
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Mgt:Probe response tx failed\n");
|
|
|
+ pr_debug("Mgt:Probe response tx failed\n");
|
|
|
}
|
|
|
}
|
|
|
}
|
|
@@ -4143,7 +4148,7 @@ vMgrRxManagePacket(
|
|
|
switch (WLAN_GET_FC_FSTYPE((pRxPacket->p80211Header->sA3.wFrameCtl))) {
|
|
|
case WLAN_FSTYPE_ASSOCREQ:
|
|
|
// Frame Clase = 2
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "rx assocreq\n");
|
|
|
+ pr_debug("rx assocreq\n");
|
|
|
if (eNodeState < NODE_AUTH) {
|
|
|
// send deauth notification
|
|
|
// reason = (6) class 2 received from nonauth sta
|
|
@@ -4153,7 +4158,7 @@ vMgrRxManagePacket(
|
|
|
(6),
|
|
|
&Status
|
|
|
);
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "wmgr: send vMgrDeAuthenBeginSta 1\n");
|
|
|
+ pr_debug("wmgr: send vMgrDeAuthenBeginSta 1\n");
|
|
|
} else {
|
|
|
s_vMgrRxAssocRequest(pDevice, pMgmt, pRxPacket, uNodeIndex);
|
|
|
}
|
|
@@ -4161,14 +4166,14 @@ vMgrRxManagePacket(
|
|
|
|
|
|
case WLAN_FSTYPE_ASSOCRESP:
|
|
|
// Frame Clase = 2
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "rx assocresp1\n");
|
|
|
+ pr_debug("rx assocresp1\n");
|
|
|
s_vMgrRxAssocResponse(pDevice, pMgmt, pRxPacket, false);
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "rx assocresp2\n");
|
|
|
+ pr_debug("rx assocresp2\n");
|
|
|
break;
|
|
|
|
|
|
case WLAN_FSTYPE_REASSOCREQ:
|
|
|
// Frame Clase = 2
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "rx reassocreq\n");
|
|
|
+ pr_debug("rx reassocreq\n");
|
|
|
// Todo: reassoc
|
|
|
if (eNodeState < NODE_AUTH) {
|
|
|
// send deauth notification
|
|
@@ -4179,7 +4184,7 @@ vMgrRxManagePacket(
|
|
|
(6),
|
|
|
&Status
|
|
|
);
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "wmgr: send vMgrDeAuthenBeginSta 2\n");
|
|
|
+ pr_debug("wmgr: send vMgrDeAuthenBeginSta 2\n");
|
|
|
|
|
|
}
|
|
|
s_vMgrRxReAssocRequest(pDevice, pMgmt, pRxPacket, uNodeIndex);
|
|
@@ -4187,7 +4192,7 @@ vMgrRxManagePacket(
|
|
|
|
|
|
case WLAN_FSTYPE_REASSOCRESP:
|
|
|
// Frame Clase = 2
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "rx reassocresp\n");
|
|
|
+ pr_debug("rx reassocresp\n");
|
|
|
s_vMgrRxAssocResponse(pDevice, pMgmt, pRxPacket, true);
|
|
|
break;
|
|
|
|
|
@@ -4198,7 +4203,7 @@ vMgrRxManagePacket(
|
|
|
|
|
|
case WLAN_FSTYPE_PROBERESP:
|
|
|
// Frame Clase = 0
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "rx proberesp\n");
|
|
|
+ pr_debug("rx proberesp\n");
|
|
|
|
|
|
s_vMgrRxProbeResponse(pDevice, pMgmt, pRxPacket);
|
|
|
break;
|
|
@@ -4213,12 +4218,12 @@ vMgrRxManagePacket(
|
|
|
|
|
|
case WLAN_FSTYPE_ATIM:
|
|
|
// Frame Clase = 1
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "rx atim\n");
|
|
|
+ pr_debug("rx atim\n");
|
|
|
break;
|
|
|
|
|
|
case WLAN_FSTYPE_DISASSOC:
|
|
|
// Frame Clase = 2
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "rx disassoc\n");
|
|
|
+ pr_debug("rx disassoc\n");
|
|
|
if (eNodeState < NODE_AUTH) {
|
|
|
// send deauth notification
|
|
|
// reason = (6) class 2 received from nonauth sta
|
|
@@ -4228,25 +4233,25 @@ vMgrRxManagePacket(
|
|
|
(6),
|
|
|
&Status
|
|
|
);
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "wmgr: send vMgrDeAuthenBeginSta 3\n");
|
|
|
+ pr_debug("wmgr: send vMgrDeAuthenBeginSta 3\n");
|
|
|
}
|
|
|
s_vMgrRxDisassociation(pDevice, pMgmt, pRxPacket);
|
|
|
break;
|
|
|
|
|
|
case WLAN_FSTYPE_AUTHEN:
|
|
|
// Frame Clase = 1
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "rx authen\n");
|
|
|
+ pr_debug("rx authen\n");
|
|
|
s_vMgrRxAuthentication(pDevice, pMgmt, pRxPacket);
|
|
|
break;
|
|
|
|
|
|
case WLAN_FSTYPE_DEAUTHEN:
|
|
|
// Frame Clase = 1
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "rx deauthen\n");
|
|
|
+ pr_debug("rx deauthen\n");
|
|
|
s_vMgrRxDeauthentication(pDevice, pMgmt, pRxPacket);
|
|
|
break;
|
|
|
|
|
|
default:
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "rx unknown mgmt\n");
|
|
|
+ pr_debug("rx unknown mgmt\n");
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -4319,46 +4324,46 @@ s_vMgrLogStatus(
|
|
|
{
|
|
|
switch (wStatus) {
|
|
|
case WLAN_MGMT_STATUS_UNSPEC_FAILURE:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Unspecified error.\n");
|
|
|
+ pr_info("Status code == Unspecified error\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_CAPS_UNSUPPORTED:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Can't support all requested capabilities.\n");
|
|
|
+ pr_info("Status code == Can't support all requested capabilities\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_REASSOC_NO_ASSOC:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Reassoc denied, can't confirm original Association.\n");
|
|
|
+ pr_info("Status code == Reassoc denied, can't confirm original Association\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_ASSOC_DENIED_UNSPEC:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Assoc denied, undefine in spec\n");
|
|
|
+ pr_info("Status code == Assoc denied, undefine in spec\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_UNSUPPORTED_AUTHALG:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Peer doesn't support authen algorithm.\n");
|
|
|
+ pr_info("Status code == Peer doesn't support authen algorithm\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_RX_AUTH_NOSEQ:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Authen frame received out of sequence.\n");
|
|
|
+ pr_info("Status code == Authen frame received out of sequence\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_CHALLENGE_FAIL:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Authen rejected, challenge failure.\n");
|
|
|
+ pr_info("Status code == Authen rejected, challenge failure\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_AUTH_TIMEOUT:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Authen rejected, timeout waiting for next frame.\n");
|
|
|
+ pr_info("Status code == Authen rejected, timeout waiting for next frame\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_ASSOC_DENIED_BUSY:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Assoc denied, AP too busy.\n");
|
|
|
+ pr_info("Status code == Assoc denied, AP too busy\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_ASSOC_DENIED_RATES:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Assoc denied, we haven't enough basic rates.\n");
|
|
|
+ pr_info("Status code == Assoc denied, we haven't enough basic rates\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_ASSOC_DENIED_SHORTPREAMBLE:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Assoc denied, we do not support short preamble.\n");
|
|
|
+ pr_info("Status code == Assoc denied, we do not support short preamble\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_ASSOC_DENIED_PBCC:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Assoc denied, we do not support PBCC.\n");
|
|
|
+ pr_info("Status code == Assoc denied, we do not support PBCC\n");
|
|
|
break;
|
|
|
case WLAN_MGMT_STATUS_ASSOC_DENIED_AGILITY:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Status code == Assoc denied, we do not support channel agility.\n");
|
|
|
+ pr_info("Status code == Assoc denied, we do not support channel agility\n");
|
|
|
break;
|
|
|
default:
|
|
|
- DBG_PRT(MSG_LEVEL_NOTICE, KERN_INFO "Unknown status code %d.\n", wStatus);
|
|
|
+ pr_info("Unknown status code %d\n", wStatus);
|
|
|
break;
|
|
|
}
|
|
|
}
|
|
@@ -4390,7 +4395,8 @@ bAdd_PMKID_Candidate(
|
|
|
struct pmkid_candidate *pCandidateList;
|
|
|
unsigned int ii = 0;
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "bAdd_PMKID_Candidate START: (%d)\n", (int)pDevice->gsPMKIDCandidate.NumCandidates);
|
|
|
+ pr_debug("bAdd_PMKID_Candidate START: (%d)\n",
|
|
|
+ (int)pDevice->gsPMKIDCandidate.NumCandidates);
|
|
|
|
|
|
if ((pDevice == NULL) || (pbyBSSID == NULL) || (psRSNCapObj == NULL))
|
|
|
return false;
|
|
@@ -4420,7 +4426,8 @@ bAdd_PMKID_Candidate(
|
|
|
|
|
|
memcpy(pCandidateList->BSSID, pbyBSSID, ETH_ALEN);
|
|
|
pDevice->gsPMKIDCandidate.NumCandidates++;
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "NumCandidates:%d\n", (int)pDevice->gsPMKIDCandidate.NumCandidates);
|
|
|
+ pr_debug("NumCandidates:%d\n",
|
|
|
+ (int)pDevice->gsPMKIDCandidate.NumCandidates);
|
|
|
return true;
|
|
|
}
|
|
|
|
|
@@ -4537,8 +4544,9 @@ s_bCipherMatch(
|
|
|
}
|
|
|
}
|
|
|
|
|
|
- DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "%d, %d, %d, %d, EncStatus:%d\n",
|
|
|
- byMulticastCipher, byCipherMask, pBSSNode->bWPAValid, pBSSNode->bWPA2Valid, EncStatus);
|
|
|
+ pr_debug("%d, %d, %d, %d, EncStatus:%d\n",
|
|
|
+ byMulticastCipher, byCipherMask,
|
|
|
+ pBSSNode->bWPAValid, pBSSNode->bWPA2Valid, EncStatus);
|
|
|
|
|
|
// mask our cap. with BSS
|
|
|
if (EncStatus == Ndis802_11Encryption1Enabled) {
|