|
@@ -77,12 +77,6 @@ enum rx_mgmt_action {
|
|
|
|
|
|
/* caller must tell cfg80211 about internal error */
|
|
|
RX_MGMT_CFG80211_ASSOC_ERROR,
|
|
|
-
|
|
|
- /* caller must call cfg80211_auth_timeout() & free work */
|
|
|
- RX_MGMT_CFG80211_AUTH_TO,
|
|
|
-
|
|
|
- /* caller must call cfg80211_assoc_timeout() & free work */
|
|
|
- RX_MGMT_CFG80211_ASSOC_TO,
|
|
|
};
|
|
|
|
|
|
/* utils */
|
|
@@ -125,27 +119,6 @@ static int ecw2cw(int ecw)
|
|
|
return (1 << ecw) - 1;
|
|
|
}
|
|
|
|
|
|
-static int ieee80211_compatible_rates(const u8 *supp_rates, int supp_rates_len,
|
|
|
- struct ieee80211_supported_band *sband,
|
|
|
- u32 *rates)
|
|
|
-{
|
|
|
- int i, j, count;
|
|
|
- *rates = 0;
|
|
|
- count = 0;
|
|
|
- for (i = 0; i < supp_rates_len; i++) {
|
|
|
- int rate = (supp_rates[i] & 0x7F) * 5;
|
|
|
-
|
|
|
- for (j = 0; j < sband->n_bitrates; j++)
|
|
|
- if (sband->bitrates[j].bitrate == rate) {
|
|
|
- *rates |= BIT(j);
|
|
|
- count++;
|
|
|
- break;
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- return count;
|
|
|
-}
|
|
|
-
|
|
|
/*
|
|
|
* ieee80211_enable_ht should be called only after the operating band
|
|
|
* has been determined as ht configuration depends on the hw's
|
|
@@ -231,266 +204,6 @@ static u32 ieee80211_enable_ht(struct ieee80211_sub_if_data *sdata,
|
|
|
|
|
|
/* frame sending functions */
|
|
|
|
|
|
-static void ieee80211_send_assoc(struct ieee80211_sub_if_data *sdata,
|
|
|
- struct ieee80211_work *wk)
|
|
|
-{
|
|
|
- struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
|
|
|
- struct ieee80211_local *local = sdata->local;
|
|
|
- struct sk_buff *skb;
|
|
|
- struct ieee80211_mgmt *mgmt;
|
|
|
- u8 *pos;
|
|
|
- const u8 *ies, *ht_ie;
|
|
|
- int i, len, count, rates_len, supp_rates_len;
|
|
|
- u16 capab;
|
|
|
- int wmm = 0;
|
|
|
- struct ieee80211_supported_band *sband;
|
|
|
- u32 rates = 0;
|
|
|
-
|
|
|
- skb = dev_alloc_skb(local->hw.extra_tx_headroom +
|
|
|
- sizeof(*mgmt) + 200 + wk->ie_len +
|
|
|
- wk->assoc.ssid_len);
|
|
|
- if (!skb) {
|
|
|
- printk(KERN_DEBUG "%s: failed to allocate buffer for assoc "
|
|
|
- "frame\n", sdata->name);
|
|
|
- return;
|
|
|
- }
|
|
|
- skb_reserve(skb, local->hw.extra_tx_headroom);
|
|
|
-
|
|
|
- sband = local->hw.wiphy->bands[local->hw.conf.channel->band];
|
|
|
-
|
|
|
- capab = ifmgd->capab;
|
|
|
-
|
|
|
- if (local->hw.conf.channel->band == IEEE80211_BAND_2GHZ) {
|
|
|
- if (!(local->hw.flags & IEEE80211_HW_2GHZ_SHORT_SLOT_INCAPABLE))
|
|
|
- capab |= WLAN_CAPABILITY_SHORT_SLOT_TIME;
|
|
|
- if (!(local->hw.flags & IEEE80211_HW_2GHZ_SHORT_PREAMBLE_INCAPABLE))
|
|
|
- capab |= WLAN_CAPABILITY_SHORT_PREAMBLE;
|
|
|
- }
|
|
|
-
|
|
|
- if (wk->assoc.capability & WLAN_CAPABILITY_PRIVACY)
|
|
|
- capab |= WLAN_CAPABILITY_PRIVACY;
|
|
|
- if (wk->assoc.wmm_used)
|
|
|
- wmm = 1;
|
|
|
-
|
|
|
- /* get all rates supported by the device and the AP as
|
|
|
- * some APs don't like getting a superset of their rates
|
|
|
- * in the association request (e.g. D-Link DAP 1353 in
|
|
|
- * b-only mode) */
|
|
|
- rates_len = ieee80211_compatible_rates(wk->assoc.supp_rates,
|
|
|
- wk->assoc.supp_rates_len,
|
|
|
- sband, &rates);
|
|
|
-
|
|
|
- if ((wk->assoc.capability & WLAN_CAPABILITY_SPECTRUM_MGMT) &&
|
|
|
- (local->hw.flags & IEEE80211_HW_SPECTRUM_MGMT))
|
|
|
- capab |= WLAN_CAPABILITY_SPECTRUM_MGMT;
|
|
|
-
|
|
|
- mgmt = (struct ieee80211_mgmt *) skb_put(skb, 24);
|
|
|
- memset(mgmt, 0, 24);
|
|
|
- memcpy(mgmt->da, wk->assoc.bssid, ETH_ALEN);
|
|
|
- memcpy(mgmt->sa, sdata->vif.addr, ETH_ALEN);
|
|
|
- memcpy(mgmt->bssid, wk->assoc.bssid, ETH_ALEN);
|
|
|
-
|
|
|
- if (!is_zero_ether_addr(wk->assoc.prev_bssid)) {
|
|
|
- skb_put(skb, 10);
|
|
|
- mgmt->frame_control = cpu_to_le16(IEEE80211_FTYPE_MGMT |
|
|
|
- IEEE80211_STYPE_REASSOC_REQ);
|
|
|
- mgmt->u.reassoc_req.capab_info = cpu_to_le16(capab);
|
|
|
- mgmt->u.reassoc_req.listen_interval =
|
|
|
- cpu_to_le16(local->hw.conf.listen_interval);
|
|
|
- memcpy(mgmt->u.reassoc_req.current_ap, wk->assoc.prev_bssid,
|
|
|
- ETH_ALEN);
|
|
|
- } else {
|
|
|
- skb_put(skb, 4);
|
|
|
- mgmt->frame_control = cpu_to_le16(IEEE80211_FTYPE_MGMT |
|
|
|
- IEEE80211_STYPE_ASSOC_REQ);
|
|
|
- mgmt->u.assoc_req.capab_info = cpu_to_le16(capab);
|
|
|
- mgmt->u.assoc_req.listen_interval =
|
|
|
- cpu_to_le16(local->hw.conf.listen_interval);
|
|
|
- }
|
|
|
-
|
|
|
- /* SSID */
|
|
|
- ies = pos = skb_put(skb, 2 + wk->assoc.ssid_len);
|
|
|
- *pos++ = WLAN_EID_SSID;
|
|
|
- *pos++ = wk->assoc.ssid_len;
|
|
|
- memcpy(pos, wk->assoc.ssid, wk->assoc.ssid_len);
|
|
|
-
|
|
|
- /* add all rates which were marked to be used above */
|
|
|
- supp_rates_len = rates_len;
|
|
|
- if (supp_rates_len > 8)
|
|
|
- supp_rates_len = 8;
|
|
|
-
|
|
|
- len = sband->n_bitrates;
|
|
|
- pos = skb_put(skb, supp_rates_len + 2);
|
|
|
- *pos++ = WLAN_EID_SUPP_RATES;
|
|
|
- *pos++ = supp_rates_len;
|
|
|
-
|
|
|
- count = 0;
|
|
|
- for (i = 0; i < sband->n_bitrates; i++) {
|
|
|
- if (BIT(i) & rates) {
|
|
|
- int rate = sband->bitrates[i].bitrate;
|
|
|
- *pos++ = (u8) (rate / 5);
|
|
|
- if (++count == 8)
|
|
|
- break;
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- if (rates_len > count) {
|
|
|
- pos = skb_put(skb, rates_len - count + 2);
|
|
|
- *pos++ = WLAN_EID_EXT_SUPP_RATES;
|
|
|
- *pos++ = rates_len - count;
|
|
|
-
|
|
|
- for (i++; i < sband->n_bitrates; i++) {
|
|
|
- if (BIT(i) & rates) {
|
|
|
- int rate = sband->bitrates[i].bitrate;
|
|
|
- *pos++ = (u8) (rate / 5);
|
|
|
- }
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- if (capab & WLAN_CAPABILITY_SPECTRUM_MGMT) {
|
|
|
- /* 1. power capabilities */
|
|
|
- pos = skb_put(skb, 4);
|
|
|
- *pos++ = WLAN_EID_PWR_CAPABILITY;
|
|
|
- *pos++ = 2;
|
|
|
- *pos++ = 0; /* min tx power */
|
|
|
- *pos++ = local->hw.conf.channel->max_power; /* max tx power */
|
|
|
-
|
|
|
- /* 2. supported channels */
|
|
|
- /* TODO: get this in reg domain format */
|
|
|
- pos = skb_put(skb, 2 * sband->n_channels + 2);
|
|
|
- *pos++ = WLAN_EID_SUPPORTED_CHANNELS;
|
|
|
- *pos++ = 2 * sband->n_channels;
|
|
|
- for (i = 0; i < sband->n_channels; i++) {
|
|
|
- *pos++ = ieee80211_frequency_to_channel(
|
|
|
- sband->channels[i].center_freq);
|
|
|
- *pos++ = 1; /* one channel in the subband*/
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- if (wk->ie_len && wk->ie) {
|
|
|
- pos = skb_put(skb, wk->ie_len);
|
|
|
- memcpy(pos, wk->ie, wk->ie_len);
|
|
|
- }
|
|
|
-
|
|
|
- if (wmm && (ifmgd->flags & IEEE80211_STA_WMM_ENABLED)) {
|
|
|
- pos = skb_put(skb, 9);
|
|
|
- *pos++ = WLAN_EID_VENDOR_SPECIFIC;
|
|
|
- *pos++ = 7; /* len */
|
|
|
- *pos++ = 0x00; /* Microsoft OUI 00:50:F2 */
|
|
|
- *pos++ = 0x50;
|
|
|
- *pos++ = 0xf2;
|
|
|
- *pos++ = 2; /* WME */
|
|
|
- *pos++ = 0; /* WME info */
|
|
|
- *pos++ = 1; /* WME ver */
|
|
|
- *pos++ = 0;
|
|
|
- }
|
|
|
-
|
|
|
- /* wmm support is a must to HT */
|
|
|
- /*
|
|
|
- * IEEE802.11n does not allow TKIP/WEP as pairwise
|
|
|
- * ciphers in HT mode. We still associate in non-ht
|
|
|
- * mode (11a/b/g) if any one of these ciphers is
|
|
|
- * configured as pairwise.
|
|
|
- */
|
|
|
- if (wmm && (ifmgd->flags & IEEE80211_STA_WMM_ENABLED) &&
|
|
|
- sband->ht_cap.ht_supported &&
|
|
|
- (ht_ie = wk->assoc.ht_information_ie) &&
|
|
|
- ht_ie[1] >= sizeof(struct ieee80211_ht_info) &&
|
|
|
- (!(ifmgd->flags & IEEE80211_STA_DISABLE_11N))) {
|
|
|
- struct ieee80211_ht_info *ht_info =
|
|
|
- (struct ieee80211_ht_info *)(ht_ie + 2);
|
|
|
- u16 cap = sband->ht_cap.cap;
|
|
|
- __le16 tmp;
|
|
|
- u32 flags = local->hw.conf.channel->flags;
|
|
|
-
|
|
|
- /* determine capability flags */
|
|
|
-
|
|
|
- if (ieee80211_disable_40mhz_24ghz &&
|
|
|
- sband->band == IEEE80211_BAND_2GHZ) {
|
|
|
- cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
|
|
|
- cap &= ~IEEE80211_HT_CAP_SGI_40;
|
|
|
- }
|
|
|
-
|
|
|
- switch (ht_info->ht_param & IEEE80211_HT_PARAM_CHA_SEC_OFFSET) {
|
|
|
- case IEEE80211_HT_PARAM_CHA_SEC_ABOVE:
|
|
|
- if (flags & IEEE80211_CHAN_NO_HT40PLUS) {
|
|
|
- cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
|
|
|
- cap &= ~IEEE80211_HT_CAP_SGI_40;
|
|
|
- }
|
|
|
- break;
|
|
|
- case IEEE80211_HT_PARAM_CHA_SEC_BELOW:
|
|
|
- if (flags & IEEE80211_CHAN_NO_HT40MINUS) {
|
|
|
- cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40;
|
|
|
- cap &= ~IEEE80211_HT_CAP_SGI_40;
|
|
|
- }
|
|
|
- break;
|
|
|
- }
|
|
|
-
|
|
|
- /* set SM PS mode properly */
|
|
|
- cap &= ~IEEE80211_HT_CAP_SM_PS;
|
|
|
- /* new association always uses requested smps mode */
|
|
|
- if (ifmgd->req_smps == IEEE80211_SMPS_AUTOMATIC) {
|
|
|
- if (ifmgd->powersave)
|
|
|
- ifmgd->ap_smps = IEEE80211_SMPS_DYNAMIC;
|
|
|
- else
|
|
|
- ifmgd->ap_smps = IEEE80211_SMPS_OFF;
|
|
|
- } else
|
|
|
- ifmgd->ap_smps = ifmgd->req_smps;
|
|
|
-
|
|
|
- switch (ifmgd->ap_smps) {
|
|
|
- case IEEE80211_SMPS_AUTOMATIC:
|
|
|
- case IEEE80211_SMPS_NUM_MODES:
|
|
|
- WARN_ON(1);
|
|
|
- case IEEE80211_SMPS_OFF:
|
|
|
- cap |= WLAN_HT_CAP_SM_PS_DISABLED <<
|
|
|
- IEEE80211_HT_CAP_SM_PS_SHIFT;
|
|
|
- break;
|
|
|
- case IEEE80211_SMPS_STATIC:
|
|
|
- cap |= WLAN_HT_CAP_SM_PS_STATIC <<
|
|
|
- IEEE80211_HT_CAP_SM_PS_SHIFT;
|
|
|
- break;
|
|
|
- case IEEE80211_SMPS_DYNAMIC:
|
|
|
- cap |= WLAN_HT_CAP_SM_PS_DYNAMIC <<
|
|
|
- IEEE80211_HT_CAP_SM_PS_SHIFT;
|
|
|
- break;
|
|
|
- }
|
|
|
-
|
|
|
- /* reserve and fill IE */
|
|
|
-
|
|
|
- pos = skb_put(skb, sizeof(struct ieee80211_ht_cap) + 2);
|
|
|
- *pos++ = WLAN_EID_HT_CAPABILITY;
|
|
|
- *pos++ = sizeof(struct ieee80211_ht_cap);
|
|
|
- memset(pos, 0, sizeof(struct ieee80211_ht_cap));
|
|
|
-
|
|
|
- /* capability flags */
|
|
|
- tmp = cpu_to_le16(cap);
|
|
|
- memcpy(pos, &tmp, sizeof(u16));
|
|
|
- pos += sizeof(u16);
|
|
|
-
|
|
|
- /* AMPDU parameters */
|
|
|
- *pos++ = sband->ht_cap.ampdu_factor |
|
|
|
- (sband->ht_cap.ampdu_density <<
|
|
|
- IEEE80211_HT_AMPDU_PARM_DENSITY_SHIFT);
|
|
|
-
|
|
|
- /* MCS set */
|
|
|
- memcpy(pos, &sband->ht_cap.mcs, sizeof(sband->ht_cap.mcs));
|
|
|
- pos += sizeof(sband->ht_cap.mcs);
|
|
|
-
|
|
|
- /* extended capabilities */
|
|
|
- pos += sizeof(__le16);
|
|
|
-
|
|
|
- /* BF capabilities */
|
|
|
- pos += sizeof(__le32);
|
|
|
-
|
|
|
- /* antenna selection */
|
|
|
- pos += sizeof(u8);
|
|
|
- }
|
|
|
-
|
|
|
- IEEE80211_SKB_CB(skb)->flags |= IEEE80211_TX_INTFL_DONT_ENCRYPT;
|
|
|
- ieee80211_tx_skb(sdata, skb);
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
static void ieee80211_send_deauth_disassoc(struct ieee80211_sub_if_data *sdata,
|
|
|
const u8 *bssid, u16 stype, u16 reason,
|
|
|
void *cookie)
|
|
@@ -751,6 +464,11 @@ void ieee80211_recalc_ps(struct ieee80211_local *local, s32 latency)
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
+ if (!list_empty(&local->work_list)) {
|
|
|
+ local->ps_sdata = NULL;
|
|
|
+ goto change;
|
|
|
+ }
|
|
|
+
|
|
|
list_for_each_entry(sdata, &local->interfaces, list) {
|
|
|
if (!ieee80211_sdata_running(sdata))
|
|
|
continue;
|
|
@@ -761,7 +479,7 @@ void ieee80211_recalc_ps(struct ieee80211_local *local, s32 latency)
|
|
|
}
|
|
|
|
|
|
if (count == 1 && found->u.mgd.powersave &&
|
|
|
- found->u.mgd.associated && list_empty(&found->u.mgd.work_list) &&
|
|
|
+ found->u.mgd.associated &&
|
|
|
!(found->u.mgd.flags & (IEEE80211_STA_BEACON_POLL |
|
|
|
IEEE80211_STA_CONNECTION_POLL))) {
|
|
|
s32 beaconint_us;
|
|
@@ -789,6 +507,7 @@ void ieee80211_recalc_ps(struct ieee80211_local *local, s32 latency)
|
|
|
local->ps_sdata = NULL;
|
|
|
}
|
|
|
|
|
|
+ change:
|
|
|
ieee80211_change_ps(local);
|
|
|
}
|
|
|
|
|
@@ -848,7 +567,7 @@ static void ieee80211_sta_wmm_params(struct ieee80211_local *local,
|
|
|
int count;
|
|
|
u8 *pos;
|
|
|
|
|
|
- if (!(ifmgd->flags & IEEE80211_STA_WMM_ENABLED))
|
|
|
+ if (local->hw.queues < 4)
|
|
|
return;
|
|
|
|
|
|
if (!wmm_param)
|
|
@@ -1005,110 +724,6 @@ static void ieee80211_set_associated(struct ieee80211_sub_if_data *sdata,
|
|
|
netif_carrier_on(sdata->dev);
|
|
|
}
|
|
|
|
|
|
-static void ieee80211_remove_auth_bss(struct ieee80211_local *local,
|
|
|
- struct ieee80211_work *wk)
|
|
|
-{
|
|
|
- struct cfg80211_bss *cbss;
|
|
|
- u16 capa_val = WLAN_CAPABILITY_ESS;
|
|
|
-
|
|
|
- if (wk->auth.privacy)
|
|
|
- capa_val |= WLAN_CAPABILITY_PRIVACY;
|
|
|
-
|
|
|
- cbss = cfg80211_get_bss(local->hw.wiphy, wk->chan, wk->auth.bssid,
|
|
|
- wk->auth.ssid, wk->auth.ssid_len,
|
|
|
- WLAN_CAPABILITY_ESS | WLAN_CAPABILITY_PRIVACY,
|
|
|
- capa_val);
|
|
|
- if (!cbss)
|
|
|
- return;
|
|
|
-
|
|
|
- cfg80211_unlink_bss(local->hw.wiphy, cbss);
|
|
|
- cfg80211_put_bss(cbss);
|
|
|
-}
|
|
|
-
|
|
|
-static enum rx_mgmt_action __must_check
|
|
|
-ieee80211_direct_probe(struct ieee80211_sub_if_data *sdata,
|
|
|
- struct ieee80211_work *wk)
|
|
|
-{
|
|
|
- struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
|
|
|
- struct ieee80211_local *local = sdata->local;
|
|
|
-
|
|
|
- wk->auth.tries++;
|
|
|
- if (wk->auth.tries > IEEE80211_AUTH_MAX_TRIES) {
|
|
|
- printk(KERN_DEBUG "%s: direct probe to AP %pM timed out\n",
|
|
|
- sdata->name, wk->auth.bssid);
|
|
|
-
|
|
|
- /*
|
|
|
- * Most likely AP is not in the range so remove the
|
|
|
- * bss struct for that AP.
|
|
|
- */
|
|
|
- ieee80211_remove_auth_bss(local, wk);
|
|
|
-
|
|
|
- /*
|
|
|
- * We might have a pending scan which had no chance to run yet
|
|
|
- * due to work needing to be done. Hence, queue the STAs work
|
|
|
- * again for that.
|
|
|
- */
|
|
|
- ieee80211_queue_work(&local->hw, &ifmgd->work);
|
|
|
- return RX_MGMT_CFG80211_AUTH_TO;
|
|
|
- }
|
|
|
-
|
|
|
- printk(KERN_DEBUG "%s: direct probe to AP %pM (try %d)\n",
|
|
|
- sdata->name, wk->auth.bssid, wk->auth.tries);
|
|
|
-
|
|
|
- /*
|
|
|
- * Direct probe is sent to broadcast address as some APs
|
|
|
- * will not answer to direct packet in unassociated state.
|
|
|
- */
|
|
|
- ieee80211_send_probe_req(sdata, NULL, wk->auth.ssid, wk->auth.ssid_len,
|
|
|
- NULL, 0);
|
|
|
-
|
|
|
- wk->timeout = jiffies + IEEE80211_AUTH_TIMEOUT;
|
|
|
- run_again(ifmgd, wk->timeout);
|
|
|
-
|
|
|
- return RX_MGMT_NONE;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
-static enum rx_mgmt_action __must_check
|
|
|
-ieee80211_authenticate(struct ieee80211_sub_if_data *sdata,
|
|
|
- struct ieee80211_work *wk)
|
|
|
-{
|
|
|
- struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
|
|
|
- struct ieee80211_local *local = sdata->local;
|
|
|
-
|
|
|
- wk->auth.tries++;
|
|
|
- if (wk->auth.tries > IEEE80211_AUTH_MAX_TRIES) {
|
|
|
- printk(KERN_DEBUG "%s: authentication with AP %pM"
|
|
|
- " timed out\n", sdata->name, wk->auth.bssid);
|
|
|
-
|
|
|
- /*
|
|
|
- * Most likely AP is not in the range so remove the
|
|
|
- * bss struct for that AP.
|
|
|
- */
|
|
|
- ieee80211_remove_auth_bss(local, wk);
|
|
|
-
|
|
|
- /*
|
|
|
- * We might have a pending scan which had no chance to run yet
|
|
|
- * due to work needing to be done. Hence, queue the STAs work
|
|
|
- * again for that.
|
|
|
- */
|
|
|
- ieee80211_queue_work(&local->hw, &ifmgd->work);
|
|
|
- return RX_MGMT_CFG80211_AUTH_TO;
|
|
|
- }
|
|
|
-
|
|
|
- printk(KERN_DEBUG "%s: authenticate with AP %pM (try %d)\n",
|
|
|
- sdata->name, wk->auth.bssid, wk->auth.tries);
|
|
|
-
|
|
|
- ieee80211_send_auth(sdata, 1, wk->auth.algorithm, wk->ie, wk->ie_len,
|
|
|
- wk->auth.bssid, NULL, 0, 0);
|
|
|
- wk->auth.transaction = 2;
|
|
|
-
|
|
|
- wk->timeout = jiffies + IEEE80211_AUTH_TIMEOUT;
|
|
|
- run_again(ifmgd, wk->timeout);
|
|
|
-
|
|
|
- return RX_MGMT_NONE;
|
|
|
-}
|
|
|
-
|
|
|
static void ieee80211_set_disassoc(struct ieee80211_sub_if_data *sdata)
|
|
|
{
|
|
|
struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
|
|
@@ -1195,44 +810,6 @@ static void ieee80211_set_disassoc(struct ieee80211_sub_if_data *sdata)
|
|
|
sta_info_destroy(sta);
|
|
|
}
|
|
|
|
|
|
-static enum rx_mgmt_action __must_check
|
|
|
-ieee80211_associate(struct ieee80211_sub_if_data *sdata,
|
|
|
- struct ieee80211_work *wk)
|
|
|
-{
|
|
|
- struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
|
|
|
- struct ieee80211_local *local = sdata->local;
|
|
|
-
|
|
|
- wk->assoc.tries++;
|
|
|
- if (wk->assoc.tries > IEEE80211_ASSOC_MAX_TRIES) {
|
|
|
- printk(KERN_DEBUG "%s: association with AP %pM"
|
|
|
- " timed out\n",
|
|
|
- sdata->name, wk->assoc.bssid);
|
|
|
-
|
|
|
- /*
|
|
|
- * Most likely AP is not in the range so remove the
|
|
|
- * bss struct for that AP.
|
|
|
- */
|
|
|
- cfg80211_unlink_bss(local->hw.wiphy, &wk->assoc.bss->cbss);
|
|
|
-
|
|
|
- /*
|
|
|
- * We might have a pending scan which had no chance to run yet
|
|
|
- * due to work needing to be done. Hence, queue the STAs work
|
|
|
- * again for that.
|
|
|
- */
|
|
|
- ieee80211_queue_work(&local->hw, &ifmgd->work);
|
|
|
- return RX_MGMT_CFG80211_ASSOC_TO;
|
|
|
- }
|
|
|
-
|
|
|
- printk(KERN_DEBUG "%s: associate with AP %pM (try %d)\n",
|
|
|
- sdata->name, wk->assoc.bssid, wk->assoc.tries);
|
|
|
- ieee80211_send_assoc(sdata, wk);
|
|
|
-
|
|
|
- wk->timeout = jiffies + IEEE80211_ASSOC_TIMEOUT;
|
|
|
- run_again(ifmgd, wk->timeout);
|
|
|
-
|
|
|
- return RX_MGMT_NONE;
|
|
|
-}
|
|
|
-
|
|
|
void ieee80211_sta_rx_notify(struct ieee80211_sub_if_data *sdata,
|
|
|
struct ieee80211_hdr *hdr)
|
|
|
{
|
|
@@ -1338,86 +915,6 @@ void ieee80211_beacon_loss(struct ieee80211_vif *vif)
|
|
|
}
|
|
|
EXPORT_SYMBOL(ieee80211_beacon_loss);
|
|
|
|
|
|
-static void ieee80211_auth_completed(struct ieee80211_sub_if_data *sdata,
|
|
|
- struct ieee80211_work *wk)
|
|
|
-{
|
|
|
- list_del(&wk->list);
|
|
|
- kfree(wk);
|
|
|
- printk(KERN_DEBUG "%s: authenticated\n", sdata->name);
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
-static void ieee80211_auth_challenge(struct ieee80211_sub_if_data *sdata,
|
|
|
- struct ieee80211_work *wk,
|
|
|
- struct ieee80211_mgmt *mgmt,
|
|
|
- size_t len)
|
|
|
-{
|
|
|
- u8 *pos;
|
|
|
- struct ieee802_11_elems elems;
|
|
|
-
|
|
|
- pos = mgmt->u.auth.variable;
|
|
|
- ieee802_11_parse_elems(pos, len - (pos - (u8 *) mgmt), &elems);
|
|
|
- if (!elems.challenge)
|
|
|
- return;
|
|
|
- ieee80211_send_auth(sdata, 3, wk->auth.algorithm,
|
|
|
- elems.challenge - 2, elems.challenge_len + 2,
|
|
|
- wk->auth.bssid, wk->auth.key, wk->auth.key_len,
|
|
|
- wk->auth.key_idx);
|
|
|
- wk->auth.transaction = 4;
|
|
|
-}
|
|
|
-
|
|
|
-static enum rx_mgmt_action __must_check
|
|
|
-ieee80211_rx_mgmt_auth(struct ieee80211_sub_if_data *sdata,
|
|
|
- struct ieee80211_work *wk,
|
|
|
- struct ieee80211_mgmt *mgmt, size_t len)
|
|
|
-{
|
|
|
- u16 auth_alg, auth_transaction, status_code;
|
|
|
-
|
|
|
- if (wk->type != IEEE80211_WORK_AUTH)
|
|
|
- return RX_MGMT_NONE;
|
|
|
-
|
|
|
- if (len < 24 + 6)
|
|
|
- return RX_MGMT_NONE;
|
|
|
-
|
|
|
- if (memcmp(wk->auth.bssid, mgmt->sa, ETH_ALEN) != 0)
|
|
|
- return RX_MGMT_NONE;
|
|
|
-
|
|
|
- if (memcmp(wk->auth.bssid, mgmt->bssid, ETH_ALEN) != 0)
|
|
|
- return RX_MGMT_NONE;
|
|
|
-
|
|
|
- auth_alg = le16_to_cpu(mgmt->u.auth.auth_alg);
|
|
|
- auth_transaction = le16_to_cpu(mgmt->u.auth.auth_transaction);
|
|
|
- status_code = le16_to_cpu(mgmt->u.auth.status_code);
|
|
|
-
|
|
|
- if (auth_alg != wk->auth.algorithm ||
|
|
|
- auth_transaction != wk->auth.transaction)
|
|
|
- return RX_MGMT_NONE;
|
|
|
-
|
|
|
- if (status_code != WLAN_STATUS_SUCCESS) {
|
|
|
- list_del(&wk->list);
|
|
|
- kfree(wk);
|
|
|
- return RX_MGMT_CFG80211_AUTH;
|
|
|
- }
|
|
|
-
|
|
|
- switch (wk->auth.algorithm) {
|
|
|
- case WLAN_AUTH_OPEN:
|
|
|
- case WLAN_AUTH_LEAP:
|
|
|
- case WLAN_AUTH_FT:
|
|
|
- ieee80211_auth_completed(sdata, wk);
|
|
|
- return RX_MGMT_CFG80211_AUTH;
|
|
|
- case WLAN_AUTH_SHARED_KEY:
|
|
|
- if (wk->auth.transaction == 4) {
|
|
|
- ieee80211_auth_completed(sdata, wk);
|
|
|
- return RX_MGMT_CFG80211_AUTH;
|
|
|
- } else
|
|
|
- ieee80211_auth_challenge(sdata, wk, mgmt, len);
|
|
|
- break;
|
|
|
- }
|
|
|
-
|
|
|
- return RX_MGMT_NONE;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
static enum rx_mgmt_action __must_check
|
|
|
ieee80211_rx_mgmt_deauth(struct ieee80211_sub_if_data *sdata,
|
|
|
struct ieee80211_mgmt *mgmt, size_t len)
|
|
@@ -1474,98 +971,51 @@ ieee80211_rx_mgmt_disassoc(struct ieee80211_sub_if_data *sdata,
|
|
|
}
|
|
|
|
|
|
|
|
|
-static enum rx_mgmt_action __must_check
|
|
|
-ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata,
|
|
|
- struct ieee80211_work *wk,
|
|
|
- struct ieee80211_mgmt *mgmt, size_t len,
|
|
|
- bool reassoc)
|
|
|
+static bool ieee80211_assoc_success(struct ieee80211_work *wk,
|
|
|
+ struct ieee80211_mgmt *mgmt, size_t len)
|
|
|
{
|
|
|
+ struct ieee80211_sub_if_data *sdata = wk->sdata;
|
|
|
struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
|
|
|
struct ieee80211_local *local = sdata->local;
|
|
|
struct ieee80211_supported_band *sband;
|
|
|
struct sta_info *sta;
|
|
|
struct ieee80211_bss *bss = wk->assoc.bss;
|
|
|
+ u8 *pos;
|
|
|
u32 rates, basic_rates;
|
|
|
- u16 capab_info, status_code, aid;
|
|
|
+ u16 capab_info, aid;
|
|
|
struct ieee802_11_elems elems;
|
|
|
struct ieee80211_bss_conf *bss_conf = &sdata->vif.bss_conf;
|
|
|
- u8 *pos;
|
|
|
u32 changed = 0;
|
|
|
int i, j, err;
|
|
|
bool have_higher_than_11mbit = false;
|
|
|
u16 ap_ht_cap_flags;
|
|
|
|
|
|
- /*
|
|
|
- * AssocResp and ReassocResp have identical structure, so process both
|
|
|
- * of them in this function.
|
|
|
- */
|
|
|
-
|
|
|
- if (len < 24 + 6)
|
|
|
- return RX_MGMT_NONE;
|
|
|
+ /* AssocResp and ReassocResp have identical structure */
|
|
|
|
|
|
- if (memcmp(bss->cbss.bssid, mgmt->sa, ETH_ALEN) != 0)
|
|
|
- return RX_MGMT_NONE;
|
|
|
-
|
|
|
- capab_info = le16_to_cpu(mgmt->u.assoc_resp.capab_info);
|
|
|
- status_code = le16_to_cpu(mgmt->u.assoc_resp.status_code);
|
|
|
aid = le16_to_cpu(mgmt->u.assoc_resp.aid);
|
|
|
-
|
|
|
- printk(KERN_DEBUG "%s: RX %sssocResp from %pM (capab=0x%x "
|
|
|
- "status=%d aid=%d)\n",
|
|
|
- sdata->name, reassoc ? "Rea" : "A", mgmt->sa,
|
|
|
- capab_info, status_code, (u16)(aid & ~(BIT(15) | BIT(14))));
|
|
|
-
|
|
|
- pos = mgmt->u.assoc_resp.variable;
|
|
|
- ieee802_11_parse_elems(pos, len - (pos - (u8 *) mgmt), &elems);
|
|
|
-
|
|
|
- if (status_code == WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY &&
|
|
|
- elems.timeout_int && elems.timeout_int_len == 5 &&
|
|
|
- elems.timeout_int[0] == WLAN_TIMEOUT_ASSOC_COMEBACK) {
|
|
|
- u32 tu, ms;
|
|
|
- tu = get_unaligned_le32(elems.timeout_int + 1);
|
|
|
- ms = tu * 1024 / 1000;
|
|
|
- printk(KERN_DEBUG "%s: AP rejected association temporarily; "
|
|
|
- "comeback duration %u TU (%u ms)\n",
|
|
|
- sdata->name, tu, ms);
|
|
|
- wk->timeout = jiffies + msecs_to_jiffies(ms);
|
|
|
- if (ms > IEEE80211_ASSOC_TIMEOUT)
|
|
|
- run_again(ifmgd, jiffies + msecs_to_jiffies(ms));
|
|
|
- return RX_MGMT_NONE;
|
|
|
- }
|
|
|
-
|
|
|
- /*
|
|
|
- * Here the association was either successful or not.
|
|
|
- */
|
|
|
-
|
|
|
- /* delete work item -- must be before set_associated for PS */
|
|
|
- list_del(&wk->list);
|
|
|
- kfree(wk);
|
|
|
-
|
|
|
- if (status_code != WLAN_STATUS_SUCCESS) {
|
|
|
- printk(KERN_DEBUG "%s: AP denied association (code=%d)\n",
|
|
|
- sdata->name, status_code);
|
|
|
- return RX_MGMT_CFG80211_ASSOC;
|
|
|
- }
|
|
|
+ capab_info = le16_to_cpu(mgmt->u.assoc_resp.capab_info);
|
|
|
|
|
|
if ((aid & (BIT(15) | BIT(14))) != (BIT(15) | BIT(14)))
|
|
|
printk(KERN_DEBUG "%s: invalid aid value %d; bits 15:14 not "
|
|
|
"set\n", sdata->name, aid);
|
|
|
aid &= ~(BIT(15) | BIT(14));
|
|
|
|
|
|
+ pos = mgmt->u.assoc_resp.variable;
|
|
|
+ ieee802_11_parse_elems(pos, len - (pos - (u8 *) mgmt), &elems);
|
|
|
+
|
|
|
if (!elems.supp_rates) {
|
|
|
printk(KERN_DEBUG "%s: no SuppRates element in AssocResp\n",
|
|
|
sdata->name);
|
|
|
- return RX_MGMT_NONE;
|
|
|
+ return false;
|
|
|
}
|
|
|
|
|
|
- printk(KERN_DEBUG "%s: associated\n", sdata->name);
|
|
|
ifmgd->aid = aid;
|
|
|
|
|
|
sta = sta_info_alloc(sdata, bss->cbss.bssid, GFP_KERNEL);
|
|
|
if (!sta) {
|
|
|
printk(KERN_DEBUG "%s: failed to alloc STA entry for"
|
|
|
" the AP\n", sdata->name);
|
|
|
- return RX_MGMT_CFG80211_ASSOC_ERROR;
|
|
|
+ return false;
|
|
|
}
|
|
|
|
|
|
set_sta_flags(sta, WLAN_STA_AUTH | WLAN_STA_ASSOC |
|
|
@@ -1650,7 +1100,7 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata,
|
|
|
ieee80211_set_wmm_default(sdata);
|
|
|
|
|
|
if (elems.ht_info_elem && elems.wmm_param &&
|
|
|
- (ifmgd->flags & IEEE80211_STA_WMM_ENABLED) &&
|
|
|
+ (sdata->local->hw.queues >= 4) &&
|
|
|
!(ifmgd->flags & IEEE80211_STA_DISABLE_11N))
|
|
|
changed |= ieee80211_enable_ht(sdata, elems.ht_info_elem,
|
|
|
bss->cbss.bssid,
|
|
@@ -1669,7 +1119,7 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_sub_if_data *sdata,
|
|
|
ieee80211_sta_rx_notify(sdata, (struct ieee80211_hdr *)mgmt);
|
|
|
mod_beacon_timer(sdata);
|
|
|
|
|
|
- return RX_MGMT_CFG80211_ASSOC;
|
|
|
+ return true;
|
|
|
}
|
|
|
|
|
|
|
|
@@ -1714,12 +1164,12 @@ static void ieee80211_rx_bss_info(struct ieee80211_sub_if_data *sdata,
|
|
|
|
|
|
|
|
|
static void ieee80211_rx_mgmt_probe_resp(struct ieee80211_sub_if_data *sdata,
|
|
|
- struct ieee80211_work *wk,
|
|
|
- struct ieee80211_mgmt *mgmt, size_t len,
|
|
|
- struct ieee80211_rx_status *rx_status)
|
|
|
+ struct sk_buff *skb)
|
|
|
{
|
|
|
+ struct ieee80211_mgmt *mgmt = (void *)skb->data;
|
|
|
struct ieee80211_if_managed *ifmgd;
|
|
|
- size_t baselen;
|
|
|
+ struct ieee80211_rx_status *rx_status = (void *) skb->cb;
|
|
|
+ size_t baselen, len = skb->len;
|
|
|
struct ieee802_11_elems elems;
|
|
|
|
|
|
ifmgd = &sdata->u.mgd;
|
|
@@ -1738,15 +1188,6 @@ static void ieee80211_rx_mgmt_probe_resp(struct ieee80211_sub_if_data *sdata,
|
|
|
|
|
|
ieee80211_rx_bss_info(sdata, mgmt, len, rx_status, &elems, false);
|
|
|
|
|
|
- /* direct probe may be part of the association flow */
|
|
|
- if (wk && wk->type == IEEE80211_WORK_AUTH_PROBE) {
|
|
|
- printk(KERN_DEBUG "%s: direct probe responded\n",
|
|
|
- sdata->name);
|
|
|
- wk->auth.tries = 0;
|
|
|
- wk->type = IEEE80211_WORK_AUTH;
|
|
|
- WARN_ON(ieee80211_authenticate(sdata, wk) != RX_MGMT_NONE);
|
|
|
- }
|
|
|
-
|
|
|
if (ifmgd->associated &&
|
|
|
memcmp(mgmt->bssid, ifmgd->associated->cbss.bssid, ETH_ALEN) == 0 &&
|
|
|
ifmgd->flags & (IEEE80211_STA_BEACON_POLL |
|
|
@@ -1960,9 +1401,6 @@ ieee80211_rx_result ieee80211_sta_rx_mgmt(struct ieee80211_sub_if_data *sdata,
|
|
|
switch (fc & IEEE80211_FCTL_STYPE) {
|
|
|
case IEEE80211_STYPE_PROBE_RESP:
|
|
|
case IEEE80211_STYPE_BEACON:
|
|
|
- case IEEE80211_STYPE_AUTH:
|
|
|
- case IEEE80211_STYPE_ASSOC_RESP:
|
|
|
- case IEEE80211_STYPE_REASSOC_RESP:
|
|
|
case IEEE80211_STYPE_DEAUTH:
|
|
|
case IEEE80211_STYPE_DISASSOC:
|
|
|
case IEEE80211_STYPE_ACTION:
|
|
@@ -1980,7 +1418,6 @@ static void ieee80211_sta_rx_queued_mgmt(struct ieee80211_sub_if_data *sdata,
|
|
|
struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
|
|
|
struct ieee80211_rx_status *rx_status;
|
|
|
struct ieee80211_mgmt *mgmt;
|
|
|
- struct ieee80211_work *wk;
|
|
|
enum rx_mgmt_action rma = RX_MGMT_NONE;
|
|
|
u16 fc;
|
|
|
|
|
@@ -1999,8 +1436,7 @@ static void ieee80211_sta_rx_queued_mgmt(struct ieee80211_sub_if_data *sdata,
|
|
|
rx_status);
|
|
|
break;
|
|
|
case IEEE80211_STYPE_PROBE_RESP:
|
|
|
- ieee80211_rx_mgmt_probe_resp(sdata, NULL, mgmt,
|
|
|
- skb->len, rx_status);
|
|
|
+ ieee80211_rx_mgmt_probe_resp(sdata, skb);
|
|
|
break;
|
|
|
case IEEE80211_STYPE_DEAUTH:
|
|
|
rma = ieee80211_rx_mgmt_deauth(sdata, mgmt, skb->len);
|
|
@@ -2033,88 +1469,11 @@ static void ieee80211_sta_rx_queued_mgmt(struct ieee80211_sub_if_data *sdata,
|
|
|
goto out;
|
|
|
}
|
|
|
|
|
|
- list_for_each_entry(wk, &ifmgd->work_list, list) {
|
|
|
- const u8 *bssid = NULL;
|
|
|
-
|
|
|
- switch (wk->type) {
|
|
|
- case IEEE80211_WORK_AUTH_PROBE:
|
|
|
- case IEEE80211_WORK_AUTH:
|
|
|
- bssid = wk->auth.bssid;
|
|
|
- break;
|
|
|
- case IEEE80211_WORK_ASSOC:
|
|
|
- bssid = wk->assoc.bssid;
|
|
|
- break;
|
|
|
- default:
|
|
|
- continue;
|
|
|
- }
|
|
|
- if (memcmp(bssid, mgmt->bssid, ETH_ALEN) != 0)
|
|
|
- continue;
|
|
|
-
|
|
|
- switch (fc & IEEE80211_FCTL_STYPE) {
|
|
|
- case IEEE80211_STYPE_PROBE_RESP:
|
|
|
- ieee80211_rx_mgmt_probe_resp(sdata, wk, mgmt, skb->len,
|
|
|
- rx_status);
|
|
|
- break;
|
|
|
- case IEEE80211_STYPE_AUTH:
|
|
|
- rma = ieee80211_rx_mgmt_auth(sdata, wk, mgmt, skb->len);
|
|
|
- break;
|
|
|
- case IEEE80211_STYPE_ASSOC_RESP:
|
|
|
- rma = ieee80211_rx_mgmt_assoc_resp(sdata, wk, mgmt,
|
|
|
- skb->len, false);
|
|
|
- break;
|
|
|
- case IEEE80211_STYPE_REASSOC_RESP:
|
|
|
- rma = ieee80211_rx_mgmt_assoc_resp(sdata, wk, mgmt,
|
|
|
- skb->len, true);
|
|
|
- break;
|
|
|
- case IEEE80211_STYPE_DEAUTH:
|
|
|
- if (skb->len >= 24 + 2 /* mgmt + deauth reason */) {
|
|
|
- /*
|
|
|
- * We get here if we get deauth while
|
|
|
- * trying to auth/assoc. Telling cfg80211
|
|
|
- * is handled below, unconditionally.
|
|
|
- */
|
|
|
- list_del(&wk->list);
|
|
|
- kfree(wk);
|
|
|
- }
|
|
|
- break;
|
|
|
- }
|
|
|
- /*
|
|
|
- * We've processed this frame for that work, so it can't
|
|
|
- * belong to another work struct.
|
|
|
- * NB: this is also required for correctness because the
|
|
|
- * called functions can free 'wk', and for 'rma'!
|
|
|
- */
|
|
|
- break;
|
|
|
- }
|
|
|
-
|
|
|
mutex_unlock(&ifmgd->mtx);
|
|
|
|
|
|
if (skb->len >= 24 + 2 /* mgmt + deauth reason */ &&
|
|
|
- (fc & IEEE80211_FCTL_STYPE) == IEEE80211_STYPE_DEAUTH) {
|
|
|
- WARN_ON(rma != RX_MGMT_NONE);
|
|
|
- rma = RX_MGMT_CFG80211_DEAUTH;
|
|
|
- }
|
|
|
-
|
|
|
- switch (rma) {
|
|
|
- case RX_MGMT_NONE:
|
|
|
- /* no action */
|
|
|
- break;
|
|
|
- case RX_MGMT_CFG80211_AUTH:
|
|
|
- cfg80211_send_rx_auth(sdata->dev, (u8 *) mgmt, skb->len);
|
|
|
- break;
|
|
|
- case RX_MGMT_CFG80211_ASSOC:
|
|
|
- cfg80211_send_rx_assoc(sdata->dev, (u8 *) mgmt, skb->len);
|
|
|
- break;
|
|
|
- case RX_MGMT_CFG80211_DEAUTH:
|
|
|
+ (fc & IEEE80211_FCTL_STYPE) == IEEE80211_STYPE_DEAUTH)
|
|
|
cfg80211_send_deauth(sdata->dev, (u8 *)mgmt, skb->len);
|
|
|
- break;
|
|
|
- case RX_MGMT_CFG80211_ASSOC_ERROR:
|
|
|
- /* an internal error -- pretend timeout for now */
|
|
|
- cfg80211_send_assoc_timeout(sdata->dev, mgmt->bssid);
|
|
|
- break;
|
|
|
- default:
|
|
|
- WARN(1, "unexpected: %d", rma);
|
|
|
- }
|
|
|
|
|
|
out:
|
|
|
kfree_skb(skb);
|
|
@@ -2142,9 +1501,6 @@ static void ieee80211_sta_work(struct work_struct *work)
|
|
|
struct ieee80211_local *local = sdata->local;
|
|
|
struct ieee80211_if_managed *ifmgd;
|
|
|
struct sk_buff *skb;
|
|
|
- struct ieee80211_work *wk, *tmp;
|
|
|
- LIST_HEAD(free_work);
|
|
|
- enum rx_mgmt_action rma;
|
|
|
|
|
|
if (!ieee80211_sdata_running(sdata))
|
|
|
return;
|
|
@@ -2214,84 +1570,7 @@ static void ieee80211_sta_work(struct work_struct *work)
|
|
|
}
|
|
|
}
|
|
|
|
|
|
-
|
|
|
- ieee80211_recalc_idle(local);
|
|
|
-
|
|
|
- list_for_each_entry_safe(wk, tmp, &ifmgd->work_list, list) {
|
|
|
- if (time_is_after_jiffies(wk->timeout)) {
|
|
|
- /*
|
|
|
- * This work item isn't supposed to be worked on
|
|
|
- * right now, but take care to adjust the timer
|
|
|
- * properly.
|
|
|
- */
|
|
|
- run_again(ifmgd, wk->timeout);
|
|
|
- continue;
|
|
|
- }
|
|
|
-
|
|
|
- switch (wk->type) {
|
|
|
- default:
|
|
|
- WARN_ON(1);
|
|
|
- /* nothing */
|
|
|
- rma = RX_MGMT_NONE;
|
|
|
- break;
|
|
|
- case IEEE80211_WORK_AUTH_PROBE:
|
|
|
- rma = ieee80211_direct_probe(sdata, wk);
|
|
|
- break;
|
|
|
- case IEEE80211_WORK_AUTH:
|
|
|
- rma = ieee80211_authenticate(sdata, wk);
|
|
|
- break;
|
|
|
- case IEEE80211_WORK_ASSOC:
|
|
|
- rma = ieee80211_associate(sdata, wk);
|
|
|
- break;
|
|
|
- }
|
|
|
-
|
|
|
- switch (rma) {
|
|
|
- case RX_MGMT_NONE:
|
|
|
- /* no action required */
|
|
|
- break;
|
|
|
- case RX_MGMT_CFG80211_AUTH_TO:
|
|
|
- case RX_MGMT_CFG80211_ASSOC_TO:
|
|
|
- list_del(&wk->list);
|
|
|
- list_add(&wk->list, &free_work);
|
|
|
- /*
|
|
|
- * small abuse but only local -- keep the
|
|
|
- * action type in wk->timeout while the item
|
|
|
- * is on the cleanup list
|
|
|
- */
|
|
|
- wk->timeout = rma;
|
|
|
- break;
|
|
|
- default:
|
|
|
- WARN(1, "unexpected: %d", rma);
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- if (list_empty(&ifmgd->work_list) &&
|
|
|
- test_and_clear_bit(IEEE80211_STA_REQ_SCAN, &ifmgd->request))
|
|
|
- ieee80211_queue_delayed_work(&local->hw,
|
|
|
- &local->scan_work,
|
|
|
- round_jiffies_relative(0));
|
|
|
-
|
|
|
mutex_unlock(&ifmgd->mtx);
|
|
|
-
|
|
|
- list_for_each_entry_safe(wk, tmp, &free_work, list) {
|
|
|
- /* see above how we're using wk->timeout */
|
|
|
- switch (wk->timeout) {
|
|
|
- case RX_MGMT_CFG80211_AUTH_TO:
|
|
|
- cfg80211_send_auth_timeout(sdata->dev, wk->auth.bssid);
|
|
|
- break;
|
|
|
- case RX_MGMT_CFG80211_ASSOC_TO:
|
|
|
- cfg80211_send_assoc_timeout(sdata->dev,
|
|
|
- wk->assoc.bssid);
|
|
|
- break;
|
|
|
- default:
|
|
|
- WARN(1, "unexpected: %lu", wk->timeout);
|
|
|
- }
|
|
|
-
|
|
|
- list_del(&wk->list);
|
|
|
- kfree(wk);
|
|
|
- }
|
|
|
-
|
|
|
- ieee80211_recalc_idle(local);
|
|
|
}
|
|
|
|
|
|
static void ieee80211_sta_bcn_mon_timer(unsigned long data)
|
|
@@ -2400,12 +1679,7 @@ void ieee80211_sta_setup_sdata(struct ieee80211_sub_if_data *sdata)
|
|
|
(unsigned long) sdata);
|
|
|
skb_queue_head_init(&ifmgd->skb_queue);
|
|
|
|
|
|
- INIT_LIST_HEAD(&ifmgd->work_list);
|
|
|
-
|
|
|
- ifmgd->capab = WLAN_CAPABILITY_ESS;
|
|
|
ifmgd->flags = 0;
|
|
|
- if (sdata->local->hw.queues >= 4)
|
|
|
- ifmgd->flags |= IEEE80211_STA_WMM_ENABLED;
|
|
|
|
|
|
mutex_init(&ifmgd->mtx);
|
|
|
|
|
@@ -2443,10 +1717,32 @@ int ieee80211_max_network_latency(struct notifier_block *nb,
|
|
|
}
|
|
|
|
|
|
/* config hooks */
|
|
|
+static enum work_done_result
|
|
|
+ieee80211_probe_auth_done(struct ieee80211_work *wk,
|
|
|
+ struct sk_buff *skb)
|
|
|
+{
|
|
|
+ if (!skb) {
|
|
|
+ cfg80211_send_auth_timeout(wk->sdata->dev, wk->filter_ta);
|
|
|
+ return WORK_DONE_DESTROY;
|
|
|
+ }
|
|
|
+
|
|
|
+ if (wk->type == IEEE80211_WORK_AUTH) {
|
|
|
+ cfg80211_send_rx_auth(wk->sdata->dev, skb->data, skb->len);
|
|
|
+ return WORK_DONE_DESTROY;
|
|
|
+ }
|
|
|
+
|
|
|
+ mutex_lock(&wk->sdata->u.mgd.mtx);
|
|
|
+ ieee80211_rx_mgmt_probe_resp(wk->sdata, skb);
|
|
|
+ mutex_unlock(&wk->sdata->u.mgd.mtx);
|
|
|
+
|
|
|
+ wk->type = IEEE80211_WORK_AUTH;
|
|
|
+ wk->probe_auth.tries = 0;
|
|
|
+ return WORK_DONE_REQUEUE;
|
|
|
+}
|
|
|
+
|
|
|
int ieee80211_mgd_auth(struct ieee80211_sub_if_data *sdata,
|
|
|
struct cfg80211_auth_request *req)
|
|
|
{
|
|
|
- struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
|
|
|
const u8 *ssid;
|
|
|
struct ieee80211_work *wk;
|
|
|
u16 auth_alg;
|
|
@@ -2472,7 +1768,7 @@ int ieee80211_mgd_auth(struct ieee80211_sub_if_data *sdata,
|
|
|
if (!wk)
|
|
|
return -ENOMEM;
|
|
|
|
|
|
- memcpy(wk->auth.bssid, req->bss->bssid, ETH_ALEN);;
|
|
|
+ memcpy(wk->filter_ta, req->bss->bssid, ETH_ALEN);;
|
|
|
|
|
|
if (req->ie && req->ie_len) {
|
|
|
memcpy(wk->ie, req->ie, req->ie_len);
|
|
@@ -2480,21 +1776,22 @@ int ieee80211_mgd_auth(struct ieee80211_sub_if_data *sdata,
|
|
|
}
|
|
|
|
|
|
if (req->key && req->key_len) {
|
|
|
- wk->auth.key_len = req->key_len;
|
|
|
- wk->auth.key_idx = req->key_idx;
|
|
|
- memcpy(wk->auth.key, req->key, req->key_len);
|
|
|
+ wk->probe_auth.key_len = req->key_len;
|
|
|
+ wk->probe_auth.key_idx = req->key_idx;
|
|
|
+ memcpy(wk->probe_auth.key, req->key, req->key_len);
|
|
|
}
|
|
|
|
|
|
ssid = ieee80211_bss_get_ie(req->bss, WLAN_EID_SSID);
|
|
|
- memcpy(wk->auth.ssid, ssid + 2, ssid[1]);
|
|
|
- wk->auth.ssid_len = ssid[1];
|
|
|
+ memcpy(wk->probe_auth.ssid, ssid + 2, ssid[1]);
|
|
|
+ wk->probe_auth.ssid_len = ssid[1];
|
|
|
|
|
|
- wk->auth.algorithm = auth_alg;
|
|
|
- wk->auth.privacy = req->bss->capability & WLAN_CAPABILITY_PRIVACY;
|
|
|
+ wk->probe_auth.algorithm = auth_alg;
|
|
|
+ wk->probe_auth.privacy = req->bss->capability & WLAN_CAPABILITY_PRIVACY;
|
|
|
|
|
|
- wk->type = IEEE80211_WORK_AUTH_PROBE;
|
|
|
- wk->timeout = jiffies; /* run right away */
|
|
|
+ wk->type = IEEE80211_WORK_DIRECT_PROBE;
|
|
|
wk->chan = req->bss->channel;
|
|
|
+ wk->sdata = sdata;
|
|
|
+ wk->done = ieee80211_probe_auth_done;
|
|
|
|
|
|
/*
|
|
|
* XXX: if still associated need to tell AP that we're going
|
|
@@ -2505,29 +1802,58 @@ int ieee80211_mgd_auth(struct ieee80211_sub_if_data *sdata,
|
|
|
sdata->local->oper_channel = req->bss->channel;
|
|
|
ieee80211_hw_config(sdata->local, 0);
|
|
|
|
|
|
- mutex_lock(&ifmgd->mtx);
|
|
|
- list_add(&wk->list, &sdata->u.mgd.work_list);
|
|
|
- mutex_unlock(&ifmgd->mtx);
|
|
|
-
|
|
|
- ieee80211_queue_work(&sdata->local->hw, &sdata->u.mgd.work);
|
|
|
+ ieee80211_add_work(wk);
|
|
|
return 0;
|
|
|
}
|
|
|
|
|
|
+static enum work_done_result ieee80211_assoc_done(struct ieee80211_work *wk,
|
|
|
+ struct sk_buff *skb)
|
|
|
+{
|
|
|
+ struct ieee80211_mgmt *mgmt;
|
|
|
+ u16 status;
|
|
|
+
|
|
|
+ if (!skb) {
|
|
|
+ cfg80211_send_assoc_timeout(wk->sdata->dev, wk->filter_ta);
|
|
|
+ return WORK_DONE_DESTROY;
|
|
|
+ }
|
|
|
+
|
|
|
+ mgmt = (void *)skb->data;
|
|
|
+ status = le16_to_cpu(mgmt->u.assoc_resp.status_code);
|
|
|
+
|
|
|
+ if (status == WLAN_STATUS_SUCCESS) {
|
|
|
+ mutex_lock(&wk->sdata->u.mgd.mtx);
|
|
|
+ if (!ieee80211_assoc_success(wk, mgmt, skb->len)) {
|
|
|
+ mutex_unlock(&wk->sdata->u.mgd.mtx);
|
|
|
+ /* oops -- internal error -- send timeout for now */
|
|
|
+ cfg80211_send_assoc_timeout(wk->sdata->dev,
|
|
|
+ wk->filter_ta);
|
|
|
+ return WORK_DONE_DESTROY;
|
|
|
+ }
|
|
|
+ mutex_unlock(&wk->sdata->u.mgd.mtx);
|
|
|
+ }
|
|
|
+
|
|
|
+ cfg80211_send_rx_assoc(wk->sdata->dev, skb->data, skb->len);
|
|
|
+ return WORK_DONE_DESTROY;
|
|
|
+}
|
|
|
+
|
|
|
int ieee80211_mgd_assoc(struct ieee80211_sub_if_data *sdata,
|
|
|
struct cfg80211_assoc_request *req)
|
|
|
{
|
|
|
struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
|
|
|
struct ieee80211_work *wk;
|
|
|
const u8 *ssid;
|
|
|
- int i, err;
|
|
|
+ int i;
|
|
|
|
|
|
mutex_lock(&ifmgd->mtx);
|
|
|
+ if (ifmgd->associated) {
|
|
|
+ mutex_unlock(&ifmgd->mtx);
|
|
|
+ return -EALREADY;
|
|
|
+ }
|
|
|
+ mutex_unlock(&ifmgd->mtx);
|
|
|
|
|
|
wk = kzalloc(sizeof(*wk) + req->ie_len, GFP_KERNEL);
|
|
|
- if (!wk) {
|
|
|
- err = -ENOMEM;
|
|
|
- goto out;
|
|
|
- }
|
|
|
+ if (!wk)
|
|
|
+ return -ENOMEM;
|
|
|
|
|
|
ifmgd->flags &= ~IEEE80211_STA_DISABLE_11N;
|
|
|
|
|
@@ -2546,8 +1872,19 @@ int ieee80211_mgd_assoc(struct ieee80211_sub_if_data *sdata,
|
|
|
|
|
|
wk->assoc.bss = (void *)req->bss;
|
|
|
|
|
|
- memcpy(wk->assoc.bssid, req->bss->bssid, ETH_ALEN);
|
|
|
+ memcpy(wk->filter_ta, req->bss->bssid, ETH_ALEN);
|
|
|
|
|
|
+ /* new association always uses requested smps mode */
|
|
|
+ if (ifmgd->req_smps == IEEE80211_SMPS_AUTOMATIC) {
|
|
|
+ if (ifmgd->powersave)
|
|
|
+ ifmgd->ap_smps = IEEE80211_SMPS_DYNAMIC;
|
|
|
+ else
|
|
|
+ ifmgd->ap_smps = IEEE80211_SMPS_OFF;
|
|
|
+ } else
|
|
|
+ ifmgd->ap_smps = ifmgd->req_smps;
|
|
|
+
|
|
|
+ wk->assoc.smps = ifmgd->ap_smps;
|
|
|
+ wk->assoc.use_11n = !(ifmgd->flags & IEEE80211_STA_DISABLE_11N);
|
|
|
wk->assoc.capability = req->bss->capability;
|
|
|
wk->assoc.wmm_used = wk->assoc.bss->wmm_used;
|
|
|
wk->assoc.supp_rates = wk->assoc.bss->supp_rates;
|
|
@@ -2563,8 +1900,9 @@ int ieee80211_mgd_assoc(struct ieee80211_sub_if_data *sdata,
|
|
|
memcpy(wk->assoc.prev_bssid, req->prev_bssid, ETH_ALEN);
|
|
|
|
|
|
wk->type = IEEE80211_WORK_ASSOC;
|
|
|
- wk->timeout = jiffies; /* run right away */
|
|
|
wk->chan = req->bss->channel;
|
|
|
+ wk->sdata = sdata;
|
|
|
+ wk->done = ieee80211_assoc_done;
|
|
|
|
|
|
if (req->use_mfp) {
|
|
|
ifmgd->mfp = IEEE80211_MFP_REQUIRED;
|
|
@@ -2582,56 +1920,56 @@ int ieee80211_mgd_assoc(struct ieee80211_sub_if_data *sdata,
|
|
|
sdata->local->oper_channel = req->bss->channel;
|
|
|
ieee80211_hw_config(sdata->local, 0);
|
|
|
|
|
|
- list_add(&wk->list, &ifmgd->work_list);
|
|
|
- ieee80211_queue_work(&sdata->local->hw, &sdata->u.mgd.work);
|
|
|
-
|
|
|
- err = 0;
|
|
|
-
|
|
|
- out:
|
|
|
- mutex_unlock(&ifmgd->mtx);
|
|
|
- return err;
|
|
|
+ ieee80211_add_work(wk);
|
|
|
+ return 0;
|
|
|
}
|
|
|
|
|
|
int ieee80211_mgd_deauth(struct ieee80211_sub_if_data *sdata,
|
|
|
struct cfg80211_deauth_request *req,
|
|
|
void *cookie)
|
|
|
{
|
|
|
+ struct ieee80211_local *local = sdata->local;
|
|
|
struct ieee80211_if_managed *ifmgd = &sdata->u.mgd;
|
|
|
struct ieee80211_work *wk;
|
|
|
const u8 *bssid = req->bss->bssid;
|
|
|
- bool not_auth_yet = false;
|
|
|
|
|
|
mutex_lock(&ifmgd->mtx);
|
|
|
|
|
|
if (ifmgd->associated && &ifmgd->associated->cbss == req->bss) {
|
|
|
bssid = req->bss->bssid;
|
|
|
ieee80211_set_disassoc(sdata);
|
|
|
- } else list_for_each_entry(wk, &ifmgd->work_list, list) {
|
|
|
- if (wk->type != IEEE80211_WORK_AUTH_PROBE)
|
|
|
- continue;
|
|
|
- if (memcmp(req->bss->bssid, wk->auth.bssid, ETH_ALEN))
|
|
|
- continue;
|
|
|
- not_auth_yet = true;
|
|
|
- list_del(&wk->list);
|
|
|
- kfree(wk);
|
|
|
- break;
|
|
|
- }
|
|
|
+ mutex_unlock(&ifmgd->mtx);
|
|
|
+ } else {
|
|
|
+ bool not_auth_yet = false;
|
|
|
|
|
|
- /*
|
|
|
- * If somebody requests authentication and we haven't
|
|
|
- * sent out an auth frame yet there's no need to send
|
|
|
- * out a deauth frame either. If the state was PROBE,
|
|
|
- * then this is the case. If it's AUTH we have sent a
|
|
|
- * frame, and if it's IDLE we have completed the auth
|
|
|
- * process already.
|
|
|
- */
|
|
|
- if (not_auth_yet) {
|
|
|
mutex_unlock(&ifmgd->mtx);
|
|
|
- __cfg80211_auth_canceled(sdata->dev, bssid);
|
|
|
- return 0;
|
|
|
- }
|
|
|
|
|
|
- mutex_unlock(&ifmgd->mtx);
|
|
|
+ mutex_lock(&local->work_mtx);
|
|
|
+ list_for_each_entry(wk, &local->work_list, list) {
|
|
|
+ if (wk->type != IEEE80211_WORK_DIRECT_PROBE)
|
|
|
+ continue;
|
|
|
+ if (memcmp(req->bss->bssid, wk->filter_ta, ETH_ALEN))
|
|
|
+ continue;
|
|
|
+ not_auth_yet = true;
|
|
|
+ list_del(&wk->list);
|
|
|
+ free_work(wk);
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ mutex_unlock(&local->work_mtx);
|
|
|
+
|
|
|
+ /*
|
|
|
+ * If somebody requests authentication and we haven't
|
|
|
+ * sent out an auth frame yet there's no need to send
|
|
|
+ * out a deauth frame either. If the state was PROBE,
|
|
|
+ * then this is the case. If it's AUTH we have sent a
|
|
|
+ * frame, and if it's IDLE we have completed the auth
|
|
|
+ * process already.
|
|
|
+ */
|
|
|
+ if (not_auth_yet) {
|
|
|
+ __cfg80211_auth_canceled(sdata->dev, bssid);
|
|
|
+ return 0;
|
|
|
+ }
|
|
|
+ }
|
|
|
|
|
|
printk(KERN_DEBUG "%s: deauthenticating from %pM by local choice (reason=%d)\n",
|
|
|
sdata->name, bssid, req->reason_code);
|