]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/ieee80211/ieee80211_rx.c
[PATCH] Unlinline a bunch of other functions
[net-next-2.6.git] / net / ieee80211 / ieee80211_rx.c
CommitLineData
b453872c
JG
1/*
2 * Original code based Host AP (software wireless LAN access point) driver
3 * for Intersil Prism2/2.5/3 - hostap.o module, common routines
4 *
5 * Copyright (c) 2001-2002, SSH Communications Security Corp and Jouni Malinen
6 * <jkmaline@cc.hut.fi>
7 * Copyright (c) 2002-2003, Jouni Malinen <jkmaline@cc.hut.fi>
ebeaddcc 8 * Copyright (c) 2004-2005, Intel Corporation
b453872c
JG
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License version 2 as
12 * published by the Free Software Foundation. See README and COPYING for
13 * more details.
14 */
15
16#include <linux/compiler.h>
17#include <linux/config.h>
18#include <linux/errno.h>
19#include <linux/if_arp.h>
20#include <linux/in6.h>
21#include <linux/in.h>
22#include <linux/ip.h>
23#include <linux/kernel.h>
24#include <linux/module.h>
25#include <linux/netdevice.h>
b453872c
JG
26#include <linux/proc_fs.h>
27#include <linux/skbuff.h>
28#include <linux/slab.h>
29#include <linux/tcp.h>
30#include <linux/types.h>
b453872c
JG
31#include <linux/wireless.h>
32#include <linux/etherdevice.h>
33#include <asm/uaccess.h>
34#include <linux/ctype.h>
35
36#include <net/ieee80211.h>
37
858119e1 38static void ieee80211_monitor_rx(struct ieee80211_device *ieee,
b453872c
JG
39 struct sk_buff *skb,
40 struct ieee80211_rx_stats *rx_stats)
41{
42 struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
43 u16 fc = le16_to_cpu(hdr->frame_ctl);
44
45 skb->dev = ieee->dev;
46 skb->mac.raw = skb->data;
47 skb_pull(skb, ieee80211_get_hdrlen(fc));
48 skb->pkt_type = PACKET_OTHERHOST;
49 skb->protocol = __constant_htons(ETH_P_80211_RAW);
50 memset(skb->cb, 0, sizeof(skb->cb));
51 netif_rx(skb);
52}
53
b453872c 54/* Called only as a tasklet (software IRQ) */
0edd5b44
JG
55static struct ieee80211_frag_entry *ieee80211_frag_cache_find(struct
56 ieee80211_device
57 *ieee,
58 unsigned int seq,
59 unsigned int frag,
60 u8 * src,
61 u8 * dst)
b453872c
JG
62{
63 struct ieee80211_frag_entry *entry;
64 int i;
65
66 for (i = 0; i < IEEE80211_FRAG_CACHE_LEN; i++) {
67 entry = &ieee->frag_cache[i];
68 if (entry->skb != NULL &&
69 time_after(jiffies, entry->first_frag_time + 2 * HZ)) {
0edd5b44
JG
70 IEEE80211_DEBUG_FRAG("expiring fragment cache entry "
71 "seq=%u last_frag=%u\n",
72 entry->seq, entry->last_frag);
b453872c
JG
73 dev_kfree_skb_any(entry->skb);
74 entry->skb = NULL;
75 }
76
77 if (entry->skb != NULL && entry->seq == seq &&
78 (entry->last_frag + 1 == frag || frag == -1) &&
d3f4a687
KK
79 !compare_ether_addr(entry->src_addr, src) &&
80 !compare_ether_addr(entry->dst_addr, dst))
b453872c
JG
81 return entry;
82 }
83
84 return NULL;
85}
86
87/* Called only as a tasklet (software IRQ) */
0edd5b44 88static struct sk_buff *ieee80211_frag_cache_get(struct ieee80211_device *ieee,
ee34af37 89 struct ieee80211_hdr_4addr *hdr)
b453872c
JG
90{
91 struct sk_buff *skb = NULL;
92 u16 sc;
93 unsigned int frag, seq;
94 struct ieee80211_frag_entry *entry;
95
96 sc = le16_to_cpu(hdr->seq_ctl);
97 frag = WLAN_GET_SEQ_FRAG(sc);
98 seq = WLAN_GET_SEQ_SEQ(sc);
99
100 if (frag == 0) {
101 /* Reserve enough space to fit maximum frame length */
102 skb = dev_alloc_skb(ieee->dev->mtu +
ee34af37 103 sizeof(struct ieee80211_hdr_4addr) +
0edd5b44
JG
104 8 /* LLC */ +
105 2 /* alignment */ +
106 8 /* WEP */ + ETH_ALEN /* WDS */ );
b453872c
JG
107 if (skb == NULL)
108 return NULL;
109
110 entry = &ieee->frag_cache[ieee->frag_next_idx];
111 ieee->frag_next_idx++;
112 if (ieee->frag_next_idx >= IEEE80211_FRAG_CACHE_LEN)
113 ieee->frag_next_idx = 0;
114
115 if (entry->skb != NULL)
116 dev_kfree_skb_any(entry->skb);
117
118 entry->first_frag_time = jiffies;
119 entry->seq = seq;
120 entry->last_frag = frag;
121 entry->skb = skb;
122 memcpy(entry->src_addr, hdr->addr2, ETH_ALEN);
123 memcpy(entry->dst_addr, hdr->addr1, ETH_ALEN);
124 } else {
125 /* received a fragment of a frame for which the head fragment
126 * should have already been received */
127 entry = ieee80211_frag_cache_find(ieee, seq, frag, hdr->addr2,
128 hdr->addr1);
129 if (entry != NULL) {
130 entry->last_frag = frag;
131 skb = entry->skb;
132 }
133 }
134
135 return skb;
136}
137
b453872c
JG
138/* Called only as a tasklet (software IRQ) */
139static int ieee80211_frag_cache_invalidate(struct ieee80211_device *ieee,
ee34af37 140 struct ieee80211_hdr_4addr *hdr)
b453872c
JG
141{
142 u16 sc;
143 unsigned int seq;
144 struct ieee80211_frag_entry *entry;
145
146 sc = le16_to_cpu(hdr->seq_ctl);
147 seq = WLAN_GET_SEQ_SEQ(sc);
148
149 entry = ieee80211_frag_cache_find(ieee, seq, -1, hdr->addr2,
150 hdr->addr1);
151
152 if (entry == NULL) {
0edd5b44
JG
153 IEEE80211_DEBUG_FRAG("could not invalidate fragment cache "
154 "entry (seq=%u)\n", seq);
b453872c
JG
155 return -1;
156 }
157
158 entry->skb = NULL;
159 return 0;
160}
161
b453872c
JG
162#ifdef NOT_YET
163/* ieee80211_rx_frame_mgtmt
164 *
165 * Responsible for handling management control frames
166 *
167 * Called by ieee80211_rx */
858119e1 168static int
b453872c
JG
169ieee80211_rx_frame_mgmt(struct ieee80211_device *ieee, struct sk_buff *skb,
170 struct ieee80211_rx_stats *rx_stats, u16 type,
171 u16 stype)
172{
173 if (ieee->iw_mode == IW_MODE_MASTER) {
174 printk(KERN_DEBUG "%s: Master mode not yet suppported.\n",
175 ieee->dev->name);
176 return 0;
177/*
ee34af37 178 hostap_update_sta_ps(ieee, (struct hostap_ieee80211_hdr_4addr *)
b453872c
JG
179 skb->data);*/
180 }
181
182 if (ieee->hostapd && type == WLAN_FC_TYPE_MGMT) {
183 if (stype == WLAN_FC_STYPE_BEACON &&
184 ieee->iw_mode == IW_MODE_MASTER) {
185 struct sk_buff *skb2;
186 /* Process beacon frames also in kernel driver to
187 * update STA(AP) table statistics */
188 skb2 = skb_clone(skb, GFP_ATOMIC);
189 if (skb2)
190 hostap_rx(skb2->dev, skb2, rx_stats);
191 }
192
193 /* send management frames to the user space daemon for
194 * processing */
195 ieee->apdevstats.rx_packets++;
196 ieee->apdevstats.rx_bytes += skb->len;
197 prism2_rx_80211(ieee->apdev, skb, rx_stats, PRISM2_RX_MGMT);
198 return 0;
199 }
200
0edd5b44 201 if (ieee->iw_mode == IW_MODE_MASTER) {
b453872c
JG
202 if (type != WLAN_FC_TYPE_MGMT && type != WLAN_FC_TYPE_CTRL) {
203 printk(KERN_DEBUG "%s: unknown management frame "
204 "(type=0x%02x, stype=0x%02x) dropped\n",
205 skb->dev->name, type, stype);
206 return -1;
207 }
208
209 hostap_rx(skb->dev, skb, rx_stats);
210 return 0;
211 }
212
213 printk(KERN_DEBUG "%s: hostap_rx_frame_mgmt: management frame "
214 "received in non-Host AP mode\n", skb->dev->name);
215 return -1;
216}
217#endif
218
b453872c
JG
219/* See IEEE 802.1H for LLC/SNAP encapsulation/decapsulation */
220/* Ethernet-II snap header (RFC1042 for most EtherTypes) */
0edd5b44
JG
221static unsigned char rfc1042_header[] = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00 };
222
b453872c
JG
223/* Bridge-Tunnel header (for EtherTypes ETH_P_AARP and ETH_P_IPX) */
224static unsigned char bridge_tunnel_header[] =
0edd5b44 225 { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0xf8 };
b453872c
JG
226/* No encapsulation header if EtherType < 0x600 (=length) */
227
228/* Called by ieee80211_rx_frame_decrypt */
229static int ieee80211_is_eapol_frame(struct ieee80211_device *ieee,
230 struct sk_buff *skb)
231{
232 struct net_device *dev = ieee->dev;
233 u16 fc, ethertype;
ee34af37 234 struct ieee80211_hdr_3addr *hdr;
b453872c
JG
235 u8 *pos;
236
237 if (skb->len < 24)
238 return 0;
239
ee34af37 240 hdr = (struct ieee80211_hdr_3addr *)skb->data;
b453872c
JG
241 fc = le16_to_cpu(hdr->frame_ctl);
242
243 /* check that the frame is unicast frame to us */
244 if ((fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
245 IEEE80211_FCTL_TODS &&
d3f4a687
KK
246 !compare_ether_addr(hdr->addr1, dev->dev_addr) &&
247 !compare_ether_addr(hdr->addr3, dev->dev_addr)) {
b453872c
JG
248 /* ToDS frame with own addr BSSID and DA */
249 } else if ((fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
250 IEEE80211_FCTL_FROMDS &&
d3f4a687 251 !compare_ether_addr(hdr->addr1, dev->dev_addr)) {
b453872c
JG
252 /* FromDS frame with own addr as DA */
253 } else
254 return 0;
255
256 if (skb->len < 24 + 8)
257 return 0;
258
259 /* check for port access entity Ethernet type */
260 pos = skb->data + 24;
261 ethertype = (pos[6] << 8) | pos[7];
262 if (ethertype == ETH_P_PAE)
263 return 1;
264
265 return 0;
266}
267
268/* Called only as a tasklet (software IRQ), by ieee80211_rx */
858119e1 269static int
0edd5b44 270ieee80211_rx_frame_decrypt(struct ieee80211_device *ieee, struct sk_buff *skb,
b453872c
JG
271 struct ieee80211_crypt_data *crypt)
272{
ee34af37 273 struct ieee80211_hdr_3addr *hdr;
b453872c
JG
274 int res, hdrlen;
275
276 if (crypt == NULL || crypt->ops->decrypt_mpdu == NULL)
277 return 0;
278
ee34af37 279 hdr = (struct ieee80211_hdr_3addr *)skb->data;
b453872c
JG
280 hdrlen = ieee80211_get_hdrlen(le16_to_cpu(hdr->frame_ctl));
281
b453872c
JG
282 atomic_inc(&crypt->refcnt);
283 res = crypt->ops->decrypt_mpdu(skb, hdrlen, crypt->priv);
284 atomic_dec(&crypt->refcnt);
285 if (res < 0) {
0edd5b44
JG
286 IEEE80211_DEBUG_DROP("decryption failed (SA=" MAC_FMT
287 ") res=%d\n", MAC_ARG(hdr->addr2), res);
b453872c
JG
288 if (res == -2)
289 IEEE80211_DEBUG_DROP("Decryption failed ICV "
290 "mismatch (key %d)\n",
291 skb->data[hdrlen + 3] >> 6);
292 ieee->ieee_stats.rx_discards_undecryptable++;
293 return -1;
294 }
295
296 return res;
297}
298
b453872c 299/* Called only as a tasklet (software IRQ), by ieee80211_rx */
858119e1 300static int
0edd5b44
JG
301ieee80211_rx_frame_decrypt_msdu(struct ieee80211_device *ieee,
302 struct sk_buff *skb, int keyidx,
303 struct ieee80211_crypt_data *crypt)
b453872c 304{
ee34af37 305 struct ieee80211_hdr_3addr *hdr;
b453872c
JG
306 int res, hdrlen;
307
308 if (crypt == NULL || crypt->ops->decrypt_msdu == NULL)
309 return 0;
310
ee34af37 311 hdr = (struct ieee80211_hdr_3addr *)skb->data;
b453872c
JG
312 hdrlen = ieee80211_get_hdrlen(le16_to_cpu(hdr->frame_ctl));
313
314 atomic_inc(&crypt->refcnt);
315 res = crypt->ops->decrypt_msdu(skb, keyidx, hdrlen, crypt->priv);
316 atomic_dec(&crypt->refcnt);
317 if (res < 0) {
318 printk(KERN_DEBUG "%s: MSDU decryption/MIC verification failed"
319 " (SA=" MAC_FMT " keyidx=%d)\n",
320 ieee->dev->name, MAC_ARG(hdr->addr2), keyidx);
321 return -1;
322 }
323
324 return 0;
325}
326
b453872c
JG
327/* All received frames are sent to this function. @skb contains the frame in
328 * IEEE 802.11 format, i.e., in the format it was sent over air.
329 * This function is called only as a tasklet (software IRQ). */
330int ieee80211_rx(struct ieee80211_device *ieee, struct sk_buff *skb,
331 struct ieee80211_rx_stats *rx_stats)
332{
333 struct net_device *dev = ieee->dev;
ee34af37 334 struct ieee80211_hdr_4addr *hdr;
b453872c
JG
335 size_t hdrlen;
336 u16 fc, type, stype, sc;
337 struct net_device_stats *stats;
338 unsigned int frag;
339 u8 *payload;
340 u16 ethertype;
341#ifdef NOT_YET
342 struct net_device *wds = NULL;
343 struct sk_buff *skb2 = NULL;
344 struct net_device *wds = NULL;
345 int frame_authorized = 0;
346 int from_assoc_ap = 0;
347 void *sta = NULL;
348#endif
349 u8 dst[ETH_ALEN];
350 u8 src[ETH_ALEN];
351 struct ieee80211_crypt_data *crypt = NULL;
352 int keyidx = 0;
353
ee34af37 354 hdr = (struct ieee80211_hdr_4addr *)skb->data;
b453872c
JG
355 stats = &ieee->stats;
356
357 if (skb->len < 10) {
0edd5b44 358 printk(KERN_INFO "%s: SKB length < 10\n", dev->name);
b453872c
JG
359 goto rx_dropped;
360 }
361
362 fc = le16_to_cpu(hdr->frame_ctl);
363 type = WLAN_FC_GET_TYPE(fc);
364 stype = WLAN_FC_GET_STYPE(fc);
365 sc = le16_to_cpu(hdr->seq_ctl);
366 frag = WLAN_GET_SEQ_FRAG(sc);
367 hdrlen = ieee80211_get_hdrlen(fc);
368
b453872c
JG
369 /* Put this code here so that we avoid duplicating it in all
370 * Rx paths. - Jean II */
371#ifdef IW_WIRELESS_SPY /* defined in iw_handler.h */
fd7a516e 372#ifdef CONFIG_NET_RADIO
b453872c 373 /* If spy monitoring on */
74079fdc 374 if (ieee->spy_data.spy_number > 0) {
b453872c 375 struct iw_quality wstats;
74079fdc
JK
376
377 wstats.updated = 0;
378 if (rx_stats->mask & IEEE80211_STATMASK_RSSI) {
379 wstats.level = rx_stats->rssi;
380 wstats.updated |= IW_QUAL_LEVEL_UPDATED;
381 } else
382 wstats.updated |= IW_QUAL_LEVEL_INVALID;
383
384 if (rx_stats->mask & IEEE80211_STATMASK_NOISE) {
385 wstats.noise = rx_stats->noise;
386 wstats.updated |= IW_QUAL_NOISE_UPDATED;
387 } else
388 wstats.updated |= IW_QUAL_NOISE_INVALID;
389
390 if (rx_stats->mask & IEEE80211_STATMASK_SIGNAL) {
391 wstats.qual = rx_stats->signal;
392 wstats.updated |= IW_QUAL_QUAL_UPDATED;
393 } else
394 wstats.updated |= IW_QUAL_QUAL_INVALID;
395
b453872c 396 /* Update spy records */
74079fdc 397 wireless_spy_update(ieee->dev, hdr->addr2, &wstats);
b453872c 398 }
fd7a516e 399#endif /* CONFIG_NET_RADIO */
0edd5b44 400#endif /* IW_WIRELESS_SPY */
74079fdc
JK
401
402#ifdef NOT_YET
b453872c
JG
403 hostap_update_rx_stats(local->ap, hdr, rx_stats);
404#endif
405
b453872c
JG
406 if (ieee->iw_mode == IW_MODE_MONITOR) {
407 ieee80211_monitor_rx(ieee, skb, rx_stats);
408 stats->rx_packets++;
409 stats->rx_bytes += skb->len;
410 return 1;
411 }
b453872c 412
3c19065a
SH
413 if (is_multicast_ether_addr(hdr->addr1)
414 ? ieee->host_mc_decrypt : ieee->host_decrypt) {
b453872c
JG
415 int idx = 0;
416 if (skb->len >= hdrlen + 3)
417 idx = skb->data[hdrlen + 3] >> 6;
418 crypt = ieee->crypt[idx];
419#ifdef NOT_YET
420 sta = NULL;
421
422 /* Use station specific key to override default keys if the
423 * receiver address is a unicast address ("individual RA"). If
424 * bcrx_sta_key parameter is set, station specific key is used
425 * even with broad/multicast targets (this is against IEEE
426 * 802.11, but makes it easier to use different keys with
427 * stations that do not support WEP key mapping). */
428
429 if (!(hdr->addr1[0] & 0x01) || local->bcrx_sta_key)
0edd5b44
JG
430 (void)hostap_handle_sta_crypto(local, hdr, &crypt,
431 &sta);
b453872c
JG
432#endif
433
434 /* allow NULL decrypt to indicate an station specific override
435 * for default encryption */
436 if (crypt && (crypt->ops == NULL ||
437 crypt->ops->decrypt_mpdu == NULL))
438 crypt = NULL;
439
f13baae4 440 if (!crypt && (fc & IEEE80211_FCTL_PROTECTED)) {
b453872c
JG
441 /* This seems to be triggered by some (multicast?)
442 * frames from other than current BSS, so just drop the
443 * frames silently instead of filling system log with
444 * these reports. */
445 IEEE80211_DEBUG_DROP("Decryption failed (not set)"
446 " (SA=" MAC_FMT ")\n",
447 MAC_ARG(hdr->addr2));
448 ieee->ieee_stats.rx_discards_undecryptable++;
449 goto rx_dropped;
450 }
451 }
b453872c
JG
452#ifdef NOT_YET
453 if (type != WLAN_FC_TYPE_DATA) {
454 if (type == WLAN_FC_TYPE_MGMT && stype == WLAN_FC_STYPE_AUTH &&
f13baae4 455 fc & IEEE80211_FCTL_PROTECTED && ieee->host_decrypt &&
0edd5b44 456 (keyidx = hostap_rx_frame_decrypt(ieee, skb, crypt)) < 0) {
b453872c
JG
457 printk(KERN_DEBUG "%s: failed to decrypt mgmt::auth "
458 "from " MAC_FMT "\n", dev->name,
459 MAC_ARG(hdr->addr2));
460 /* TODO: could inform hostapd about this so that it
461 * could send auth failure report */
462 goto rx_dropped;
463 }
464
465 if (ieee80211_rx_frame_mgmt(ieee, skb, rx_stats, type, stype))
466 goto rx_dropped;
467 else
468 goto rx_exit;
469 }
470#endif
471
472 /* Data frame - extract src/dst addresses */
286d9747 473 if (skb->len < IEEE80211_3ADDR_LEN)
b453872c
JG
474 goto rx_dropped;
475
476 switch (fc & (IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS)) {
477 case IEEE80211_FCTL_FROMDS:
478 memcpy(dst, hdr->addr1, ETH_ALEN);
479 memcpy(src, hdr->addr3, ETH_ALEN);
480 break;
481 case IEEE80211_FCTL_TODS:
482 memcpy(dst, hdr->addr3, ETH_ALEN);
483 memcpy(src, hdr->addr2, ETH_ALEN);
484 break;
485 case IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS:
286d9747 486 if (skb->len < IEEE80211_4ADDR_LEN)
b453872c
JG
487 goto rx_dropped;
488 memcpy(dst, hdr->addr3, ETH_ALEN);
489 memcpy(src, hdr->addr4, ETH_ALEN);
490 break;
491 case 0:
492 memcpy(dst, hdr->addr1, ETH_ALEN);
493 memcpy(src, hdr->addr2, ETH_ALEN);
494 break;
495 }
496
497#ifdef NOT_YET
498 if (hostap_rx_frame_wds(ieee, hdr, fc, &wds))
499 goto rx_dropped;
500 if (wds) {
501 skb->dev = dev = wds;
502 stats = hostap_get_stats(dev);
503 }
504
505 if (ieee->iw_mode == IW_MODE_MASTER && !wds &&
0edd5b44
JG
506 (fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
507 IEEE80211_FCTL_FROMDS && ieee->stadev
d3f4a687 508 && !compare_ether_addr(hdr->addr2, ieee->assoc_ap_addr)) {
b453872c
JG
509 /* Frame from BSSID of the AP for which we are a client */
510 skb->dev = dev = ieee->stadev;
511 stats = hostap_get_stats(dev);
512 from_assoc_ap = 1;
513 }
514#endif
515
516 dev->last_rx = jiffies;
517
518#ifdef NOT_YET
519 if ((ieee->iw_mode == IW_MODE_MASTER ||
0edd5b44 520 ieee->iw_mode == IW_MODE_REPEAT) && !from_assoc_ap) {
b453872c
JG
521 switch (hostap_handle_sta_rx(ieee, dev, skb, rx_stats,
522 wds != NULL)) {
523 case AP_RX_CONTINUE_NOT_AUTHORIZED:
524 frame_authorized = 0;
525 break;
526 case AP_RX_CONTINUE:
527 frame_authorized = 1;
528 break;
529 case AP_RX_DROP:
530 goto rx_dropped;
531 case AP_RX_EXIT:
532 goto rx_exit;
533 }
534 }
535#endif
536
537 /* Nullfunc frames may have PS-bit set, so they must be passed to
538 * hostap_handle_sta_rx() before being dropped here. */
9e8571af
JK
539
540 stype &= ~IEEE80211_STYPE_QOS_DATA;
541
b453872c
JG
542 if (stype != IEEE80211_STYPE_DATA &&
543 stype != IEEE80211_STYPE_DATA_CFACK &&
544 stype != IEEE80211_STYPE_DATA_CFPOLL &&
545 stype != IEEE80211_STYPE_DATA_CFACKPOLL) {
546 if (stype != IEEE80211_STYPE_NULLFUNC)
0edd5b44
JG
547 IEEE80211_DEBUG_DROP("RX: dropped data frame "
548 "with no data (type=0x%02x, "
549 "subtype=0x%02x, len=%d)\n",
550 type, stype, skb->len);
b453872c
JG
551 goto rx_dropped;
552 }
553
554 /* skb: hdr + (possibly fragmented, possibly encrypted) payload */
555
f13baae4 556 if (ieee->host_decrypt && (fc & IEEE80211_FCTL_PROTECTED) &&
b453872c
JG
557 (keyidx = ieee80211_rx_frame_decrypt(ieee, skb, crypt)) < 0)
558 goto rx_dropped;
559
ee34af37 560 hdr = (struct ieee80211_hdr_4addr *)skb->data;
b453872c
JG
561
562 /* skb: hdr + (possibly fragmented) plaintext payload */
563 // PR: FIXME: hostap has additional conditions in the "if" below:
f13baae4 564 // ieee->host_decrypt && (fc & IEEE80211_FCTL_PROTECTED) &&
b453872c
JG
565 if ((frag != 0 || (fc & IEEE80211_FCTL_MOREFRAGS))) {
566 int flen;
567 struct sk_buff *frag_skb = ieee80211_frag_cache_get(ieee, hdr);
568 IEEE80211_DEBUG_FRAG("Rx Fragment received (%u)\n", frag);
569
570 if (!frag_skb) {
571 IEEE80211_DEBUG(IEEE80211_DL_RX | IEEE80211_DL_FRAG,
572 "Rx cannot get skb from fragment "
573 "cache (morefrag=%d seq=%u frag=%u)\n",
574 (fc & IEEE80211_FCTL_MOREFRAGS) != 0,
575 WLAN_GET_SEQ_SEQ(sc), frag);
576 goto rx_dropped;
577 }
578
579 flen = skb->len;
580 if (frag != 0)
581 flen -= hdrlen;
582
583 if (frag_skb->tail + flen > frag_skb->end) {
584 printk(KERN_WARNING "%s: host decrypted and "
585 "reassembled frame did not fit skb\n",
586 dev->name);
587 ieee80211_frag_cache_invalidate(ieee, hdr);
588 goto rx_dropped;
589 }
590
591 if (frag == 0) {
592 /* copy first fragment (including full headers) into
593 * beginning of the fragment cache skb */
594 memcpy(skb_put(frag_skb, flen), skb->data, flen);
595 } else {
596 /* append frame payload to the end of the fragment
597 * cache skb */
598 memcpy(skb_put(frag_skb, flen), skb->data + hdrlen,
599 flen);
600 }
601 dev_kfree_skb_any(skb);
602 skb = NULL;
603
604 if (fc & IEEE80211_FCTL_MOREFRAGS) {
605 /* more fragments expected - leave the skb in fragment
606 * cache for now; it will be delivered to upper layers
607 * after all fragments have been received */
608 goto rx_exit;
609 }
610
611 /* this was the last fragment and the frame will be
612 * delivered, so remove skb from fragment cache */
613 skb = frag_skb;
ee34af37 614 hdr = (struct ieee80211_hdr_4addr *)skb->data;
b453872c
JG
615 ieee80211_frag_cache_invalidate(ieee, hdr);
616 }
617
618 /* skb: hdr + (possible reassembled) full MSDU payload; possibly still
619 * encrypted/authenticated */
f13baae4 620 if (ieee->host_decrypt && (fc & IEEE80211_FCTL_PROTECTED) &&
b453872c
JG
621 ieee80211_rx_frame_decrypt_msdu(ieee, skb, keyidx, crypt))
622 goto rx_dropped;
623
ee34af37 624 hdr = (struct ieee80211_hdr_4addr *)skb->data;
f13baae4 625 if (crypt && !(fc & IEEE80211_FCTL_PROTECTED) && !ieee->open_wep) {
0edd5b44
JG
626 if ( /*ieee->ieee802_1x && */
627 ieee80211_is_eapol_frame(ieee, skb)) {
b453872c
JG
628 /* pass unencrypted EAPOL frames even if encryption is
629 * configured */
b453872c 630 } else {
0edd5b44
JG
631 IEEE80211_DEBUG_DROP("encryption configured, but RX "
632 "frame not encrypted (SA=" MAC_FMT
633 ")\n", MAC_ARG(hdr->addr2));
b453872c
JG
634 goto rx_dropped;
635 }
636 }
637
f13baae4 638 if (crypt && !(fc & IEEE80211_FCTL_PROTECTED) && !ieee->open_wep &&
b453872c 639 !ieee80211_is_eapol_frame(ieee, skb)) {
0edd5b44
JG
640 IEEE80211_DEBUG_DROP("dropped unencrypted RX data "
641 "frame from " MAC_FMT
642 " (drop_unencrypted=1)\n",
643 MAC_ARG(hdr->addr2));
b453872c
JG
644 goto rx_dropped;
645 }
646
647 /* skb: hdr + (possible reassembled) full plaintext payload */
648
649 payload = skb->data + hdrlen;
650 ethertype = (payload[6] << 8) | payload[7];
651
652#ifdef NOT_YET
653 /* If IEEE 802.1X is used, check whether the port is authorized to send
654 * the received frame. */
655 if (ieee->ieee802_1x && ieee->iw_mode == IW_MODE_MASTER) {
656 if (ethertype == ETH_P_PAE) {
657 printk(KERN_DEBUG "%s: RX: IEEE 802.1X frame\n",
658 dev->name);
659 if (ieee->hostapd && ieee->apdev) {
660 /* Send IEEE 802.1X frames to the user
661 * space daemon for processing */
662 prism2_rx_80211(ieee->apdev, skb, rx_stats,
663 PRISM2_RX_MGMT);
664 ieee->apdevstats.rx_packets++;
665 ieee->apdevstats.rx_bytes += skb->len;
666 goto rx_exit;
667 }
668 } else if (!frame_authorized) {
669 printk(KERN_DEBUG "%s: dropped frame from "
670 "unauthorized port (IEEE 802.1X): "
0edd5b44 671 "ethertype=0x%04x\n", dev->name, ethertype);
b453872c
JG
672 goto rx_dropped;
673 }
674 }
675#endif
676
677 /* convert hdr + possible LLC headers into Ethernet header */
678 if (skb->len - hdrlen >= 8 &&
679 ((memcmp(payload, rfc1042_header, SNAP_SIZE) == 0 &&
680 ethertype != ETH_P_AARP && ethertype != ETH_P_IPX) ||
681 memcmp(payload, bridge_tunnel_header, SNAP_SIZE) == 0)) {
682 /* remove RFC1042 or Bridge-Tunnel encapsulation and
683 * replace EtherType */
684 skb_pull(skb, hdrlen + SNAP_SIZE);
685 memcpy(skb_push(skb, ETH_ALEN), src, ETH_ALEN);
686 memcpy(skb_push(skb, ETH_ALEN), dst, ETH_ALEN);
687 } else {
688 u16 len;
689 /* Leave Ethernet header part of hdr and full payload */
690 skb_pull(skb, hdrlen);
691 len = htons(skb->len);
692 memcpy(skb_push(skb, 2), &len, 2);
693 memcpy(skb_push(skb, ETH_ALEN), src, ETH_ALEN);
694 memcpy(skb_push(skb, ETH_ALEN), dst, ETH_ALEN);
695 }
696
697#ifdef NOT_YET
698 if (wds && ((fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
0edd5b44 699 IEEE80211_FCTL_TODS) && skb->len >= ETH_HLEN + ETH_ALEN) {
b453872c
JG
700 /* Non-standard frame: get addr4 from its bogus location after
701 * the payload */
702 memcpy(skb->data + ETH_ALEN,
703 skb->data + skb->len - ETH_ALEN, ETH_ALEN);
704 skb_trim(skb, skb->len - ETH_ALEN);
705 }
706#endif
707
708 stats->rx_packets++;
709 stats->rx_bytes += skb->len;
710
711#ifdef NOT_YET
0edd5b44 712 if (ieee->iw_mode == IW_MODE_MASTER && !wds && ieee->ap->bridge_packets) {
b453872c
JG
713 if (dst[0] & 0x01) {
714 /* copy multicast frame both to the higher layers and
715 * to the wireless media */
716 ieee->ap->bridged_multicast++;
717 skb2 = skb_clone(skb, GFP_ATOMIC);
718 if (skb2 == NULL)
719 printk(KERN_DEBUG "%s: skb_clone failed for "
720 "multicast frame\n", dev->name);
721 } else if (hostap_is_sta_assoc(ieee->ap, dst)) {
722 /* send frame directly to the associated STA using
723 * wireless media and not passing to higher layers */
724 ieee->ap->bridged_unicast++;
725 skb2 = skb;
726 skb = NULL;
727 }
728 }
729
730 if (skb2 != NULL) {
731 /* send to wireless media */
732 skb2->protocol = __constant_htons(ETH_P_802_3);
733 skb2->mac.raw = skb2->nh.raw = skb2->data;
734 /* skb2->nh.raw = skb2->data + ETH_HLEN; */
735 skb2->dev = dev;
736 dev_queue_xmit(skb2);
737 }
b453872c
JG
738#endif
739
740 if (skb) {
741 skb->protocol = eth_type_trans(skb, dev);
742 memset(skb->cb, 0, sizeof(skb->cb));
743 skb->dev = dev;
0edd5b44 744 skb->ip_summed = CHECKSUM_NONE; /* 802.11 crc not sufficient */
b453872c
JG
745 netif_rx(skb);
746 }
747
0edd5b44 748 rx_exit:
b453872c
JG
749#ifdef NOT_YET
750 if (sta)
751 hostap_handle_sta_release(sta);
752#endif
753 return 1;
754
0edd5b44 755 rx_dropped:
b453872c
JG
756 stats->rx_dropped++;
757
758 /* Returning 0 indicates to caller that we have not handled the SKB--
759 * so it is still allocated and can be used again by underlying
760 * hardware as a DMA target */
761 return 0;
762}
763
764#define MGMT_FRAME_FIXED_PART_LENGTH 0x24
765
9e8571af
JK
766static u8 qos_oui[QOS_OUI_LEN] = { 0x00, 0x50, 0xF2 };
767
768/*
769* Make ther structure we read from the beacon packet has
770* the right values
771*/
772static int ieee80211_verify_qos_info(struct ieee80211_qos_information_element
773 *info_element, int sub_type)
774{
775
776 if (info_element->qui_subtype != sub_type)
777 return -1;
778 if (memcmp(info_element->qui, qos_oui, QOS_OUI_LEN))
779 return -1;
780 if (info_element->qui_type != QOS_OUI_TYPE)
781 return -1;
782 if (info_element->version != QOS_VERSION_1)
783 return -1;
784
785 return 0;
786}
787
788/*
789 * Parse a QoS parameter element
790 */
791static int ieee80211_read_qos_param_element(struct ieee80211_qos_parameter_info
792 *element_param, struct ieee80211_info_element
793 *info_element)
794{
795 int ret = 0;
796 u16 size = sizeof(struct ieee80211_qos_parameter_info) - 2;
797
798 if ((info_element == NULL) || (element_param == NULL))
799 return -1;
800
801 if (info_element->id == QOS_ELEMENT_ID && info_element->len == size) {
802 memcpy(element_param->info_element.qui, info_element->data,
803 info_element->len);
804 element_param->info_element.elementID = info_element->id;
805 element_param->info_element.length = info_element->len;
806 } else
807 ret = -1;
808 if (ret == 0)
809 ret = ieee80211_verify_qos_info(&element_param->info_element,
810 QOS_OUI_PARAM_SUB_TYPE);
811 return ret;
812}
813
814/*
815 * Parse a QoS information element
816 */
817static int ieee80211_read_qos_info_element(struct
818 ieee80211_qos_information_element
819 *element_info, struct ieee80211_info_element
820 *info_element)
821{
822 int ret = 0;
823 u16 size = sizeof(struct ieee80211_qos_information_element) - 2;
824
825 if (element_info == NULL)
826 return -1;
827 if (info_element == NULL)
828 return -1;
829
830 if ((info_element->id == QOS_ELEMENT_ID) && (info_element->len == size)) {
831 memcpy(element_info->qui, info_element->data,
832 info_element->len);
833 element_info->elementID = info_element->id;
834 element_info->length = info_element->len;
835 } else
836 ret = -1;
837
838 if (ret == 0)
839 ret = ieee80211_verify_qos_info(element_info,
840 QOS_OUI_INFO_SUB_TYPE);
841 return ret;
842}
843
844/*
845 * Write QoS parameters from the ac parameters.
846 */
847static int ieee80211_qos_convert_ac_to_parameters(struct
848 ieee80211_qos_parameter_info
849 *param_elm, struct
850 ieee80211_qos_parameters
851 *qos_param)
852{
853 int rc = 0;
854 int i;
855 struct ieee80211_qos_ac_parameter *ac_params;
856 u32 txop;
857 u8 cw_min;
858 u8 cw_max;
859
860 for (i = 0; i < QOS_QUEUE_NUM; i++) {
861 ac_params = &(param_elm->ac_params_record[i]);
862
863 qos_param->aifs[i] = (ac_params->aci_aifsn) & 0x0F;
864 qos_param->aifs[i] -= (qos_param->aifs[i] < 2) ? 0 : 2;
865
866 cw_min = ac_params->ecw_min_max & 0x0F;
867 qos_param->cw_min[i] = (u16) ((1 << cw_min) - 1);
868
869 cw_max = (ac_params->ecw_min_max & 0xF0) >> 4;
870 qos_param->cw_max[i] = (u16) ((1 << cw_max) - 1);
871
872 qos_param->flag[i] =
873 (ac_params->aci_aifsn & 0x10) ? 0x01 : 0x00;
874
875 txop = le16_to_cpu(ac_params->tx_op_limit) * 32;
876 qos_param->tx_op_limit[i] = (u16) txop;
877 }
878 return rc;
879}
880
881/*
882 * we have a generic data element which it may contain QoS information or
883 * parameters element. check the information element length to decide
884 * which type to read
885 */
886static int ieee80211_parse_qos_info_param_IE(struct ieee80211_info_element
887 *info_element,
888 struct ieee80211_network *network)
889{
890 int rc = 0;
891 struct ieee80211_qos_parameters *qos_param = NULL;
892 struct ieee80211_qos_information_element qos_info_element;
893
894 rc = ieee80211_read_qos_info_element(&qos_info_element, info_element);
895
896 if (rc == 0) {
897 network->qos_data.param_count = qos_info_element.ac_info & 0x0F;
898 network->flags |= NETWORK_HAS_QOS_INFORMATION;
899 } else {
900 struct ieee80211_qos_parameter_info param_element;
901
902 rc = ieee80211_read_qos_param_element(&param_element,
903 info_element);
904 if (rc == 0) {
905 qos_param = &(network->qos_data.parameters);
906 ieee80211_qos_convert_ac_to_parameters(&param_element,
907 qos_param);
908 network->flags |= NETWORK_HAS_QOS_PARAMETERS;
909 network->qos_data.param_count =
910 param_element.info_element.ac_info & 0x0F;
911 }
912 }
913
914 if (rc == 0) {
915 IEEE80211_DEBUG_QOS("QoS is supported\n");
916 network->qos_data.supported = 1;
917 }
918 return rc;
919}
920
ff0037b2
JK
921static int ieee80211_parse_info_param(struct ieee80211_info_element
922 *info_element, u16 length,
923 struct ieee80211_network *network)
b453872c 924{
ff9e00f1 925 u8 i;
b453872c
JG
926#ifdef CONFIG_IEEE80211_DEBUG
927 char rates_str[64];
928 char *p;
929#endif
b453872c 930
ff9e00f1
ID
931 while (length >= sizeof(*info_element)) {
932 if (sizeof(*info_element) + info_element->len > length) {
933 IEEE80211_DEBUG_MGMT("Info elem: parse failed: "
ff0037b2
JK
934 "info_element->len + 2 > left : "
935 "info_element->len+2=%zd left=%d, id=%d.\n",
936 info_element->len +
937 sizeof(*info_element),
938 length, info_element->id);
b453872c 939 return 1;
0edd5b44 940 }
b453872c
JG
941
942 switch (info_element->id) {
943 case MFIE_TYPE_SSID:
944 if (ieee80211_is_empty_essid(info_element->data,
945 info_element->len)) {
946 network->flags |= NETWORK_EMPTY_ESSID;
947 break;
948 }
949
950 network->ssid_len = min(info_element->len,
0edd5b44
JG
951 (u8) IW_ESSID_MAX_SIZE);
952 memcpy(network->ssid, info_element->data,
953 network->ssid_len);
954 if (network->ssid_len < IW_ESSID_MAX_SIZE)
955 memset(network->ssid + network->ssid_len, 0,
b453872c
JG
956 IW_ESSID_MAX_SIZE - network->ssid_len);
957
ff9e00f1 958 IEEE80211_DEBUG_MGMT("MFIE_TYPE_SSID: '%s' len=%d.\n",
ff0037b2 959 network->ssid, network->ssid_len);
b453872c
JG
960 break;
961
962 case MFIE_TYPE_RATES:
963#ifdef CONFIG_IEEE80211_DEBUG
964 p = rates_str;
965#endif
9e8571af
JK
966 network->rates_len = min(info_element->len,
967 MAX_RATES_LENGTH);
b453872c
JG
968 for (i = 0; i < network->rates_len; i++) {
969 network->rates[i] = info_element->data[i];
970#ifdef CONFIG_IEEE80211_DEBUG
9e8571af
JK
971 p += snprintf(p, sizeof(rates_str) -
972 (p - rates_str), "%02X ",
973 network->rates[i]);
b453872c 974#endif
0edd5b44
JG
975 if (ieee80211_is_ofdm_rate
976 (info_element->data[i])) {
b453872c
JG
977 network->flags |= NETWORK_HAS_OFDM;
978 if (info_element->data[i] &
979 IEEE80211_BASIC_RATE_MASK)
980 network->flags &=
0edd5b44 981 ~NETWORK_HAS_CCK;
b453872c
JG
982 }
983 }
984
ff9e00f1 985 IEEE80211_DEBUG_MGMT("MFIE_TYPE_RATES: '%s' (%d)\n",
b453872c
JG
986 rates_str, network->rates_len);
987 break;
988
989 case MFIE_TYPE_RATES_EX:
990#ifdef CONFIG_IEEE80211_DEBUG
991 p = rates_str;
992#endif
9e8571af
JK
993 network->rates_ex_len = min(info_element->len,
994 MAX_RATES_EX_LENGTH);
b453872c
JG
995 for (i = 0; i < network->rates_ex_len; i++) {
996 network->rates_ex[i] = info_element->data[i];
997#ifdef CONFIG_IEEE80211_DEBUG
9e8571af
JK
998 p += snprintf(p, sizeof(rates_str) -
999 (p - rates_str), "%02X ",
1000 network->rates[i]);
b453872c 1001#endif
0edd5b44
JG
1002 if (ieee80211_is_ofdm_rate
1003 (info_element->data[i])) {
b453872c
JG
1004 network->flags |= NETWORK_HAS_OFDM;
1005 if (info_element->data[i] &
1006 IEEE80211_BASIC_RATE_MASK)
1007 network->flags &=
0edd5b44 1008 ~NETWORK_HAS_CCK;
b453872c
JG
1009 }
1010 }
1011
ff9e00f1 1012 IEEE80211_DEBUG_MGMT("MFIE_TYPE_RATES_EX: '%s' (%d)\n",
b453872c
JG
1013 rates_str, network->rates_ex_len);
1014 break;
1015
1016 case MFIE_TYPE_DS_SET:
ff9e00f1 1017 IEEE80211_DEBUG_MGMT("MFIE_TYPE_DS_SET: %d\n",
b453872c 1018 info_element->data[0]);
ff9e00f1 1019 network->channel = info_element->data[0];
b453872c
JG
1020 break;
1021
0edd5b44 1022 case MFIE_TYPE_FH_SET:
ff9e00f1 1023 IEEE80211_DEBUG_MGMT("MFIE_TYPE_FH_SET: ignored\n");
b453872c
JG
1024 break;
1025
1026 case MFIE_TYPE_CF_SET:
ff9e00f1 1027 IEEE80211_DEBUG_MGMT("MFIE_TYPE_CF_SET: ignored\n");
b453872c
JG
1028 break;
1029
1030 case MFIE_TYPE_TIM:
ff9e00f1 1031 IEEE80211_DEBUG_MGMT("MFIE_TYPE_TIM: ignored\n");
b453872c
JG
1032 break;
1033
42c94e43
JK
1034 case MFIE_TYPE_ERP_INFO:
1035 network->erp_value = info_element->data[0];
ff9e00f1 1036 IEEE80211_DEBUG_MGMT("MFIE_TYPE_ERP_SET: %d\n",
42c94e43
JK
1037 network->erp_value);
1038 break;
1039
b453872c 1040 case MFIE_TYPE_IBSS_SET:
42c94e43 1041 network->atim_window = info_element->data[0];
ff9e00f1 1042 IEEE80211_DEBUG_MGMT("MFIE_TYPE_IBSS_SET: %d\n",
42c94e43 1043 network->atim_window);
b453872c
JG
1044 break;
1045
1046 case MFIE_TYPE_CHALLENGE:
ff9e00f1 1047 IEEE80211_DEBUG_MGMT("MFIE_TYPE_CHALLENGE: ignored\n");
b453872c
JG
1048 break;
1049
1050 case MFIE_TYPE_GENERIC:
ff9e00f1 1051 IEEE80211_DEBUG_MGMT("MFIE_TYPE_GENERIC: %d bytes\n",
b453872c 1052 info_element->len);
9e8571af
JK
1053 if (!ieee80211_parse_qos_info_param_IE(info_element,
1054 network))
1055 break;
1056
0edd5b44 1057 if (info_element->len >= 4 &&
b453872c
JG
1058 info_element->data[0] == 0x00 &&
1059 info_element->data[1] == 0x50 &&
1060 info_element->data[2] == 0xf2 &&
1061 info_element->data[3] == 0x01) {
1062 network->wpa_ie_len = min(info_element->len + 2,
0edd5b44 1063 MAX_WPA_IE_LEN);
b453872c
JG
1064 memcpy(network->wpa_ie, info_element,
1065 network->wpa_ie_len);
1066 }
1067 break;
1068
1069 case MFIE_TYPE_RSN:
ff9e00f1 1070 IEEE80211_DEBUG_MGMT("MFIE_TYPE_RSN: %d bytes\n",
b453872c
JG
1071 info_element->len);
1072 network->rsn_ie_len = min(info_element->len + 2,
0edd5b44 1073 MAX_WPA_IE_LEN);
b453872c
JG
1074 memcpy(network->rsn_ie, info_element,
1075 network->rsn_ie_len);
1076 break;
1077
9e8571af 1078 case MFIE_TYPE_QOS_PARAMETER:
ff0037b2
JK
1079 printk(KERN_ERR
1080 "QoS Error need to parse QOS_PARAMETER IE\n");
9e8571af
JK
1081 break;
1082
b453872c 1083 default:
ff9e00f1 1084 IEEE80211_DEBUG_MGMT("unsupported IE %d\n",
ff0037b2 1085 info_element->id);
0edd5b44
JG
1086 break;
1087 }
b453872c 1088
ff9e00f1 1089 length -= sizeof(*info_element) + info_element->len;
ff0037b2
JK
1090 info_element =
1091 (struct ieee80211_info_element *)&info_element->
1092 data[info_element->len];
0edd5b44 1093 }
b453872c 1094
ff9e00f1
ID
1095 return 0;
1096}
1097
1098static int ieee80211_handle_assoc_resp(struct ieee80211_device *ieee, struct ieee80211_assoc_response
1099 *frame, struct ieee80211_rx_stats *stats)
1100{
1101 struct ieee80211_network network_resp;
1102 struct ieee80211_network *network = &network_resp;
1103 struct net_device *dev = ieee->dev;
1104
1105 network->flags = 0;
1106 network->qos_data.active = 0;
1107 network->qos_data.supported = 0;
1108 network->qos_data.param_count = 0;
1109 network->qos_data.old_param_count = 0;
1110
1111 //network->atim_window = le16_to_cpu(frame->aid) & (0x3FFF);
1112 network->atim_window = le16_to_cpu(frame->aid);
1113 network->listen_interval = le16_to_cpu(frame->status);
c1bda44a
ID
1114 memcpy(network->bssid, frame->header.addr3, ETH_ALEN);
1115 network->capability = le16_to_cpu(frame->capability);
1116 network->last_scanned = jiffies;
1117 network->rates_len = network->rates_ex_len = 0;
1118 network->last_associate = 0;
1119 network->ssid_len = 0;
ff0037b2
JK
1120 network->erp_value =
1121 (network->capability & WLAN_CAPABILITY_IBSS) ? 0x3 : 0x0;
c1bda44a
ID
1122
1123 if (stats->freq == IEEE80211_52GHZ_BAND) {
1124 /* for A band (No DS info) */
1125 network->channel = stats->received_channel;
1126 } else
1127 network->flags |= NETWORK_HAS_CCK;
1128
1129 network->wpa_ie_len = 0;
1130 network->rsn_ie_len = 0;
ff9e00f1 1131
ff0037b2
JK
1132 if (ieee80211_parse_info_param
1133 (frame->info_element, stats->len - sizeof(*frame), network))
ff9e00f1
ID
1134 return 1;
1135
c1bda44a
ID
1136 network->mode = 0;
1137 if (stats->freq == IEEE80211_52GHZ_BAND)
1138 network->mode = IEEE_A;
1139 else {
1140 if (network->flags & NETWORK_HAS_OFDM)
1141 network->mode |= IEEE_G;
1142 if (network->flags & NETWORK_HAS_CCK)
1143 network->mode |= IEEE_B;
1144 }
1145
1146 if (ieee80211_is_empty_essid(network->ssid, network->ssid_len))
1147 network->flags |= NETWORK_EMPTY_ESSID;
1148
1149 memcpy(&network->stats, stats, sizeof(network->stats));
1150
ff9e00f1
ID
1151 if (ieee->handle_assoc_response != NULL)
1152 ieee->handle_assoc_response(dev, frame, network);
1153
1154 return 0;
1155}
1156
1157/***************************************************/
1158
858119e1 1159static int ieee80211_network_init(struct ieee80211_device *ieee, struct ieee80211_probe_response
ff9e00f1
ID
1160 *beacon,
1161 struct ieee80211_network *network,
1162 struct ieee80211_rx_stats *stats)
1163{
1164 network->qos_data.active = 0;
1165 network->qos_data.supported = 0;
1166 network->qos_data.param_count = 0;
c1bda44a 1167 network->qos_data.old_param_count = 0;
ff9e00f1
ID
1168
1169 /* Pull out fixed field data */
1170 memcpy(network->bssid, beacon->header.addr3, ETH_ALEN);
1171 network->capability = le16_to_cpu(beacon->capability);
1172 network->last_scanned = jiffies;
1173 network->time_stamp[0] = le32_to_cpu(beacon->time_stamp[0]);
1174 network->time_stamp[1] = le32_to_cpu(beacon->time_stamp[1]);
1175 network->beacon_interval = le16_to_cpu(beacon->beacon_interval);
1176 /* Where to pull this? beacon->listen_interval; */
1177 network->listen_interval = 0x0A;
1178 network->rates_len = network->rates_ex_len = 0;
1179 network->last_associate = 0;
1180 network->ssid_len = 0;
1181 network->flags = 0;
1182 network->atim_window = 0;
1183 network->erp_value = (network->capability & WLAN_CAPABILITY_IBSS) ?
1184 0x3 : 0x0;
1185
1186 if (stats->freq == IEEE80211_52GHZ_BAND) {
1187 /* for A band (No DS info) */
1188 network->channel = stats->received_channel;
1189 } else
1190 network->flags |= NETWORK_HAS_CCK;
1191
1192 network->wpa_ie_len = 0;
1193 network->rsn_ie_len = 0;
1194
ff0037b2
JK
1195 if (ieee80211_parse_info_param
1196 (beacon->info_element, stats->len - sizeof(*beacon), network))
ff9e00f1
ID
1197 return 1;
1198
b453872c
JG
1199 network->mode = 0;
1200 if (stats->freq == IEEE80211_52GHZ_BAND)
1201 network->mode = IEEE_A;
1202 else {
1203 if (network->flags & NETWORK_HAS_OFDM)
1204 network->mode |= IEEE_G;
1205 if (network->flags & NETWORK_HAS_CCK)
1206 network->mode |= IEEE_B;
1207 }
1208
1209 if (network->mode == 0) {
1210 IEEE80211_DEBUG_SCAN("Filtered out '%s (" MAC_FMT ")' "
1211 "network.\n",
1212 escape_essid(network->ssid,
1213 network->ssid_len),
1214 MAC_ARG(network->bssid));
1215 return 1;
1216 }
1217
1218 if (ieee80211_is_empty_essid(network->ssid, network->ssid_len))
1219 network->flags |= NETWORK_EMPTY_ESSID;
1220
1221 memcpy(&network->stats, stats, sizeof(network->stats));
1222
1223 return 0;
1224}
1225
1226static inline int is_same_network(struct ieee80211_network *src,
1227 struct ieee80211_network *dst)
1228{
1229 /* A network is only a duplicate if the channel, BSSID, and ESSID
1230 * all match. We treat all <hidden> with the same BSSID and channel
1231 * as one network */
1232 return ((src->ssid_len == dst->ssid_len) &&
1233 (src->channel == dst->channel) &&
d3f4a687 1234 !compare_ether_addr(src->bssid, dst->bssid) &&
b453872c
JG
1235 !memcmp(src->ssid, dst->ssid, src->ssid_len));
1236}
1237
858119e1 1238static void update_network(struct ieee80211_network *dst,
b453872c
JG
1239 struct ieee80211_network *src)
1240{
9e8571af
JK
1241 int qos_active;
1242 u8 old_param;
1243
b453872c
JG
1244 memcpy(&dst->stats, &src->stats, sizeof(struct ieee80211_rx_stats));
1245 dst->capability = src->capability;
1246 memcpy(dst->rates, src->rates, src->rates_len);
1247 dst->rates_len = src->rates_len;
1248 memcpy(dst->rates_ex, src->rates_ex, src->rates_ex_len);
1249 dst->rates_ex_len = src->rates_ex_len;
1250
1251 dst->mode = src->mode;
1252 dst->flags = src->flags;
1253 dst->time_stamp[0] = src->time_stamp[0];
1254 dst->time_stamp[1] = src->time_stamp[1];
1255
1256 dst->beacon_interval = src->beacon_interval;
1257 dst->listen_interval = src->listen_interval;
1258 dst->atim_window = src->atim_window;
42c94e43 1259 dst->erp_value = src->erp_value;
b453872c
JG
1260
1261 memcpy(dst->wpa_ie, src->wpa_ie, src->wpa_ie_len);
1262 dst->wpa_ie_len = src->wpa_ie_len;
1263 memcpy(dst->rsn_ie, src->rsn_ie, src->rsn_ie_len);
1264 dst->rsn_ie_len = src->rsn_ie_len;
1265
1266 dst->last_scanned = jiffies;
9e8571af
JK
1267 qos_active = src->qos_data.active;
1268 old_param = dst->qos_data.old_param_count;
1269 if (dst->flags & NETWORK_HAS_QOS_MASK)
1270 memcpy(&dst->qos_data, &src->qos_data,
1271 sizeof(struct ieee80211_qos_data));
1272 else {
1273 dst->qos_data.supported = src->qos_data.supported;
1274 dst->qos_data.param_count = src->qos_data.param_count;
1275 }
1276
1277 if (dst->qos_data.supported == 1) {
1278 if (dst->ssid_len)
1279 IEEE80211_DEBUG_QOS
1280 ("QoS the network %s is QoS supported\n",
1281 dst->ssid);
1282 else
1283 IEEE80211_DEBUG_QOS
1284 ("QoS the network is QoS supported\n");
1285 }
1286 dst->qos_data.active = qos_active;
1287 dst->qos_data.old_param_count = old_param;
1288
b453872c
JG
1289 /* dst->last_associate is not overwritten */
1290}
1291
3f552bbf
JK
1292static inline int is_beacon(int fc)
1293{
1294 return (WLAN_FC_GET_STYPE(le16_to_cpu(fc)) == IEEE80211_STYPE_BEACON);
1295}
1296
858119e1 1297static void ieee80211_process_probe_response(struct ieee80211_device
74079fdc 1298 *ieee, struct
0edd5b44 1299 ieee80211_probe_response
74079fdc 1300 *beacon, struct ieee80211_rx_stats
0edd5b44 1301 *stats)
b453872c 1302{
3f552bbf 1303 struct net_device *dev = ieee->dev;
b453872c
JG
1304 struct ieee80211_network network;
1305 struct ieee80211_network *target;
1306 struct ieee80211_network *oldest = NULL;
1307#ifdef CONFIG_IEEE80211_DEBUG
68e4e036 1308 struct ieee80211_info_element *info_element = beacon->info_element;
b453872c
JG
1309#endif
1310 unsigned long flags;
1311
0edd5b44
JG
1312 IEEE80211_DEBUG_SCAN("'%s' (" MAC_FMT
1313 "): %c%c%c%c %c%c%c%c-%c%c%c%c %c%c%c%c\n",
1314 escape_essid(info_element->data,
1315 info_element->len),
1316 MAC_ARG(beacon->header.addr3),
1317 (beacon->capability & (1 << 0xf)) ? '1' : '0',
1318 (beacon->capability & (1 << 0xe)) ? '1' : '0',
1319 (beacon->capability & (1 << 0xd)) ? '1' : '0',
1320 (beacon->capability & (1 << 0xc)) ? '1' : '0',
1321 (beacon->capability & (1 << 0xb)) ? '1' : '0',
1322 (beacon->capability & (1 << 0xa)) ? '1' : '0',
1323 (beacon->capability & (1 << 0x9)) ? '1' : '0',
1324 (beacon->capability & (1 << 0x8)) ? '1' : '0',
1325 (beacon->capability & (1 << 0x7)) ? '1' : '0',
1326 (beacon->capability & (1 << 0x6)) ? '1' : '0',
1327 (beacon->capability & (1 << 0x5)) ? '1' : '0',
1328 (beacon->capability & (1 << 0x4)) ? '1' : '0',
1329 (beacon->capability & (1 << 0x3)) ? '1' : '0',
1330 (beacon->capability & (1 << 0x2)) ? '1' : '0',
1331 (beacon->capability & (1 << 0x1)) ? '1' : '0',
1332 (beacon->capability & (1 << 0x0)) ? '1' : '0');
b453872c
JG
1333
1334 if (ieee80211_network_init(ieee, beacon, &network, stats)) {
1335 IEEE80211_DEBUG_SCAN("Dropped '%s' (" MAC_FMT ") via %s.\n",
1336 escape_essid(info_element->data,
1337 info_element->len),
1338 MAC_ARG(beacon->header.addr3),
3f552bbf
JK
1339 is_beacon(le16_to_cpu
1340 (beacon->header.
1341 frame_ctl)) ?
1342 "BEACON" : "PROBE RESPONSE");
b453872c
JG
1343 return;
1344 }
1345
1346 /* The network parsed correctly -- so now we scan our known networks
1347 * to see if we can find it in our list.
1348 *
1349 * NOTE: This search is definitely not optimized. Once its doing
1350 * the "right thing" we'll optimize it for efficiency if
1351 * necessary */
1352
1353 /* Search for this entry in the list and update it if it is
1354 * already there. */
1355
1356 spin_lock_irqsave(&ieee->lock, flags);
1357
1358 list_for_each_entry(target, &ieee->network_list, list) {
1359 if (is_same_network(target, &network))
1360 break;
1361
1362 if ((oldest == NULL) ||
1363 (target->last_scanned < oldest->last_scanned))
1364 oldest = target;
1365 }
1366
1367 /* If we didn't find a match, then get a new network slot to initialize
1368 * with this beacon's information */
1369 if (&target->list == &ieee->network_list) {
1370 if (list_empty(&ieee->network_free_list)) {
1371 /* If there are no more slots, expire the oldest */
1372 list_del(&oldest->list);
1373 target = oldest;
1374 IEEE80211_DEBUG_SCAN("Expired '%s' (" MAC_FMT ") from "
1375 "network list.\n",
1376 escape_essid(target->ssid,
1377 target->ssid_len),
1378 MAC_ARG(target->bssid));
1379 } else {
1380 /* Otherwise just pull from the free list */
1381 target = list_entry(ieee->network_free_list.next,
1382 struct ieee80211_network, list);
1383 list_del(ieee->network_free_list.next);
1384 }
1385
b453872c
JG
1386#ifdef CONFIG_IEEE80211_DEBUG
1387 IEEE80211_DEBUG_SCAN("Adding '%s' (" MAC_FMT ") via %s.\n",
1388 escape_essid(network.ssid,
1389 network.ssid_len),
1390 MAC_ARG(network.bssid),
3f552bbf
JK
1391 is_beacon(le16_to_cpu
1392 (beacon->header.
1393 frame_ctl)) ?
1394 "BEACON" : "PROBE RESPONSE");
b453872c
JG
1395#endif
1396 memcpy(target, &network, sizeof(*target));
1397 list_add_tail(&target->list, &ieee->network_list);
1398 } else {
1399 IEEE80211_DEBUG_SCAN("Updating '%s' (" MAC_FMT ") via %s.\n",
1400 escape_essid(target->ssid,
1401 target->ssid_len),
1402 MAC_ARG(target->bssid),
3f552bbf
JK
1403 is_beacon(le16_to_cpu
1404 (beacon->header.
1405 frame_ctl)) ?
1406 "BEACON" : "PROBE RESPONSE");
b453872c
JG
1407 update_network(target, &network);
1408 }
1409
1410 spin_unlock_irqrestore(&ieee->lock, flags);
3f552bbf
JK
1411
1412 if (is_beacon(le16_to_cpu(beacon->header.frame_ctl))) {
1413 if (ieee->handle_beacon != NULL)
1414 ieee->handle_beacon(dev, beacon, &network);
1415 } else {
1416 if (ieee->handle_probe_response != NULL)
1417 ieee->handle_probe_response(dev, beacon, &network);
1418 }
b453872c
JG
1419}
1420
1421void ieee80211_rx_mgt(struct ieee80211_device *ieee,
ee34af37 1422 struct ieee80211_hdr_4addr *header,
b453872c
JG
1423 struct ieee80211_rx_stats *stats)
1424{
fd27817c 1425 switch (WLAN_FC_GET_STYPE(le16_to_cpu(header->frame_ctl))) {
b453872c
JG
1426 case IEEE80211_STYPE_ASSOC_RESP:
1427 IEEE80211_DEBUG_MGMT("received ASSOCIATION RESPONSE (%d)\n",
fd27817c
JK
1428 WLAN_FC_GET_STYPE(le16_to_cpu
1429 (header->frame_ctl)));
9e8571af
JK
1430 ieee80211_handle_assoc_resp(ieee,
1431 (struct ieee80211_assoc_response *)
1432 header, stats);
b453872c
JG
1433 break;
1434
1435 case IEEE80211_STYPE_REASSOC_RESP:
1436 IEEE80211_DEBUG_MGMT("received REASSOCIATION RESPONSE (%d)\n",
fd27817c
JK
1437 WLAN_FC_GET_STYPE(le16_to_cpu
1438 (header->frame_ctl)));
b453872c
JG
1439 break;
1440
42c94e43
JK
1441 case IEEE80211_STYPE_PROBE_REQ:
1442 IEEE80211_DEBUG_MGMT("recieved auth (%d)\n",
1443 WLAN_FC_GET_STYPE(le16_to_cpu
1444 (header->frame_ctl)));
1445
1446 if (ieee->handle_probe_request != NULL)
1447 ieee->handle_probe_request(ieee->dev,
1448 (struct
1449 ieee80211_probe_request *)
1450 header, stats);
1451 break;
1452
b453872c
JG
1453 case IEEE80211_STYPE_PROBE_RESP:
1454 IEEE80211_DEBUG_MGMT("received PROBE RESPONSE (%d)\n",
fd27817c
JK
1455 WLAN_FC_GET_STYPE(le16_to_cpu
1456 (header->frame_ctl)));
b453872c 1457 IEEE80211_DEBUG_SCAN("Probe response\n");
0edd5b44
JG
1458 ieee80211_process_probe_response(ieee,
1459 (struct
1460 ieee80211_probe_response *)
1461 header, stats);
b453872c
JG
1462 break;
1463
1464 case IEEE80211_STYPE_BEACON:
1465 IEEE80211_DEBUG_MGMT("received BEACON (%d)\n",
fd27817c
JK
1466 WLAN_FC_GET_STYPE(le16_to_cpu
1467 (header->frame_ctl)));
b453872c 1468 IEEE80211_DEBUG_SCAN("Beacon\n");
0edd5b44
JG
1469 ieee80211_process_probe_response(ieee,
1470 (struct
1471 ieee80211_probe_response *)
1472 header, stats);
b453872c 1473 break;
3f552bbf
JK
1474 case IEEE80211_STYPE_AUTH:
1475
1476 IEEE80211_DEBUG_MGMT("recieved auth (%d)\n",
1477 WLAN_FC_GET_STYPE(le16_to_cpu
1478 (header->frame_ctl)));
1479
1480 if (ieee->handle_auth != NULL)
1481 ieee->handle_auth(ieee->dev,
1482 (struct ieee80211_auth *)header);
1483 break;
1484
1485 case IEEE80211_STYPE_DISASSOC:
1486 if (ieee->handle_disassoc != NULL)
1487 ieee->handle_disassoc(ieee->dev,
1488 (struct ieee80211_disassoc *)
1489 header);
1490 break;
b453872c 1491
31b59eae
JK
1492 case IEEE80211_STYPE_DEAUTH:
1493 printk("DEAUTH from AP\n");
1494 if (ieee->handle_deauth != NULL)
1495 ieee->handle_deauth(ieee->dev, (struct ieee80211_auth *)
1496 header);
1497 break;
b453872c
JG
1498 default:
1499 IEEE80211_DEBUG_MGMT("received UNKNOWN (%d)\n",
fd27817c
JK
1500 WLAN_FC_GET_STYPE(le16_to_cpu
1501 (header->frame_ctl)));
b453872c
JG
1502 IEEE80211_WARNING("%s: Unknown management packet: %d\n",
1503 ieee->dev->name,
fd27817c
JK
1504 WLAN_FC_GET_STYPE(le16_to_cpu
1505 (header->frame_ctl)));
b453872c
JG
1506 break;
1507 }
1508}
1509
b453872c
JG
1510EXPORT_SYMBOL(ieee80211_rx_mgt);
1511EXPORT_SYMBOL(ieee80211_rx);