Root/drivers/staging/wlan-ng/prism2sta.c

1/* src/prism2/driver/prism2sta.c
2*
3* Implements the station functionality for prism2
4*
5* Copyright (C) 1999 AbsoluteValue Systems, Inc. All Rights Reserved.
6* --------------------------------------------------------------------
7*
8* linux-wlan
9*
10* The contents of this file are subject to the Mozilla Public
11* License Version 1.1 (the "License"); you may not use this file
12* except in compliance with the License. You may obtain a copy of
13* the License at http://www.mozilla.org/MPL/
14*
15* Software distributed under the License is distributed on an "AS
16* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
17* implied. See the License for the specific language governing
18* rights and limitations under the License.
19*
20* Alternatively, the contents of this file may be used under the
21* terms of the GNU Public License version 2 (the "GPL"), in which
22* case the provisions of the GPL are applicable instead of the
23* above. If you wish to allow the use of your version of this file
24* only under the terms of the GPL and not to allow others to use
25* your version of this file under the MPL, indicate your decision
26* by deleting the provisions above and replace them with the notice
27* and other provisions required by the GPL. If you do not delete
28* the provisions above, a recipient may use your version of this
29* file under either the MPL or the GPL.
30*
31* --------------------------------------------------------------------
32*
33* Inquiries regarding the linux-wlan Open Source project can be
34* made directly to:
35*
36* AbsoluteValue Systems Inc.
37* info@linux-wlan.com
38* http://www.linux-wlan.com
39*
40* --------------------------------------------------------------------
41*
42* Portions of the development of this software were funded by
43* Intersil Corporation as part of PRISM(R) chipset product development.
44*
45* --------------------------------------------------------------------
46*
47* This file implements the module and linux pcmcia routines for the
48* prism2 driver.
49*
50* --------------------------------------------------------------------
51*/
52
53#include <linux/module.h>
54#include <linux/moduleparam.h>
55#include <linux/kernel.h>
56#include <linux/sched.h>
57#include <linux/types.h>
58#include <linux/init.h>
59#include <linux/slab.h>
60#include <linux/wireless.h>
61#include <linux/netdevice.h>
62#include <linux/workqueue.h>
63#include <linux/byteorder/generic.h>
64#include <linux/ctype.h>
65
66#include <linux/io.h>
67#include <linux/delay.h>
68#include <asm/byteorder.h>
69#include <linux/if_arp.h>
70#include <linux/if_ether.h>
71#include <linux/bitops.h>
72
73#include "p80211types.h"
74#include "p80211hdr.h"
75#include "p80211mgmt.h"
76#include "p80211conv.h"
77#include "p80211msg.h"
78#include "p80211netdev.h"
79#include "p80211req.h"
80#include "p80211metadef.h"
81#include "p80211metastruct.h"
82#include "hfa384x.h"
83#include "prism2mgmt.h"
84
85/* Create a string of printable chars from something that might not be */
86/* It's recommended that the str be 4*len + 1 bytes long */
87#define wlan_mkprintstr(buf, buflen, str, strlen) \
88{ \
89    int i = 0; \
90    int j = 0; \
91    memset(str, 0, (strlen)); \
92    for (i = 0; i < (buflen); i++) { \
93        if (isprint((buf)[i])) { \
94            (str)[j] = (buf)[i]; \
95            j++; \
96        } else { \
97            (str)[j] = '\\'; \
98            (str)[j+1] = 'x'; \
99            (str)[j+2] = hex_asc_hi((buf)[i]); \
100            (str)[j+3] = hex_asc_lo((buf)[i]); \
101            j += 4; \
102        } \
103    } \
104}
105
106static char *dev_info = "prism2_usb";
107static wlandevice_t *create_wlan(void);
108
109int prism2_reset_holdtime = 30; /* Reset hold time in ms */
110int prism2_reset_settletime = 100; /* Reset settle time in ms */
111
112static int prism2_doreset; /* Do a reset at init? */
113
114module_param(prism2_doreset, int, 0644);
115MODULE_PARM_DESC(prism2_doreset, "Issue a reset on initialization");
116
117module_param(prism2_reset_holdtime, int, 0644);
118MODULE_PARM_DESC(prism2_reset_holdtime, "reset hold time in ms");
119module_param(prism2_reset_settletime, int, 0644);
120MODULE_PARM_DESC(prism2_reset_settletime, "reset settle time in ms");
121
122MODULE_LICENSE("Dual MPL/GPL");
123
124void prism2_connect_result(wlandevice_t *wlandev, u8 failed);
125void prism2_disconnected(wlandevice_t *wlandev);
126void prism2_roamed(wlandevice_t *wlandev);
127
128static int prism2sta_open(wlandevice_t *wlandev);
129static int prism2sta_close(wlandevice_t *wlandev);
130static void prism2sta_reset(wlandevice_t *wlandev);
131static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
132                 union p80211_hdr *p80211_hdr,
133                 struct p80211_metawep *p80211_wep);
134static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg);
135static int prism2sta_getcardinfo(wlandevice_t *wlandev);
136static int prism2sta_globalsetup(wlandevice_t *wlandev);
137static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev);
138
139static void prism2sta_inf_handover(wlandevice_t *wlandev,
140                   hfa384x_InfFrame_t *inf);
141static void prism2sta_inf_tallies(wlandevice_t *wlandev,
142                  hfa384x_InfFrame_t *inf);
143static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
144                      hfa384x_InfFrame_t *inf);
145static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
146                      hfa384x_InfFrame_t *inf);
147static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
148                    hfa384x_InfFrame_t *inf);
149static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
150                     hfa384x_InfFrame_t *inf);
151static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
152                      hfa384x_InfFrame_t *inf);
153static void prism2sta_inf_authreq(wlandevice_t *wlandev,
154                  hfa384x_InfFrame_t *inf);
155static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
156                    hfa384x_InfFrame_t *inf);
157static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
158                    hfa384x_InfFrame_t *inf);
159
160/*----------------------------------------------------------------
161* prism2sta_open
162*
163* WLAN device open method. Called from p80211netdev when kernel
164* device open (start) method is called in response to the
165* SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
166* from clear to set.
167*
168* Arguments:
169* wlandev wlan device structure
170*
171* Returns:
172* 0 success
173* >0 f/w reported error
174* <0 driver reported error
175*
176* Side effects:
177*
178* Call context:
179* process thread
180----------------------------------------------------------------*/
181static int prism2sta_open(wlandevice_t *wlandev)
182{
183    /* We don't currently have to do anything else.
184     * The setup of the MAC should be subsequently completed via
185     * the mlme commands.
186     * Higher layers know we're ready from dev->start==1 and
187     * dev->tbusy==0. Our rx path knows to pass up received/
188     * frames because of dev->flags&IFF_UP is true.
189     */
190
191    return 0;
192}
193
194/*----------------------------------------------------------------
195* prism2sta_close
196*
197* WLAN device close method. Called from p80211netdev when kernel
198* device close method is called in response to the
199* SIOCSIIFFLAGS ioctl changing the flags bit IFF_UP
200* from set to clear.
201*
202* Arguments:
203* wlandev wlan device structure
204*
205* Returns:
206* 0 success
207* >0 f/w reported error
208* <0 driver reported error
209*
210* Side effects:
211*
212* Call context:
213* process thread
214----------------------------------------------------------------*/
215static int prism2sta_close(wlandevice_t *wlandev)
216{
217    /* We don't currently have to do anything else.
218     * Higher layers know we're not ready from dev->start==0 and
219     * dev->tbusy==1. Our rx path knows to not pass up received
220     * frames because of dev->flags&IFF_UP is false.
221     */
222
223    return 0;
224}
225
226/*----------------------------------------------------------------
227* prism2sta_reset
228*
229* Not currently implented.
230*
231* Arguments:
232* wlandev wlan device structure
233* none
234*
235* Returns:
236* nothing
237*
238* Side effects:
239*
240* Call context:
241* process thread
242----------------------------------------------------------------*/
243static void prism2sta_reset(wlandevice_t *wlandev)
244{
245    return;
246}
247
248/*----------------------------------------------------------------
249* prism2sta_txframe
250*
251* Takes a frame from p80211 and queues it for transmission.
252*
253* Arguments:
254* wlandev wlan device structure
255* pb packet buffer struct. Contains an 802.11
256* data frame.
257* p80211_hdr points to the 802.11 header for the packet.
258* Returns:
259* 0 Success and more buffs available
260* 1 Success but no more buffs
261* 2 Allocation failure
262* 4 Buffer full or queue busy
263*
264* Side effects:
265*
266* Call context:
267* process thread
268----------------------------------------------------------------*/
269static int prism2sta_txframe(wlandevice_t *wlandev, struct sk_buff *skb,
270                 union p80211_hdr *p80211_hdr,
271                 struct p80211_metawep *p80211_wep)
272{
273    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
274    int result;
275
276    /* If necessary, set the 802.11 WEP bit */
277    if ((wlandev->hostwep & (HOSTWEP_PRIVACYINVOKED | HOSTWEP_ENCRYPT)) ==
278        HOSTWEP_PRIVACYINVOKED) {
279        p80211_hdr->a3.fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1));
280    }
281
282    result = hfa384x_drvr_txframe(hw, skb, p80211_hdr, p80211_wep);
283
284    return result;
285}
286
287/*----------------------------------------------------------------
288* prism2sta_mlmerequest
289*
290* wlan command message handler. All we do here is pass the message
291* over to the prism2sta_mgmt_handler.
292*
293* Arguments:
294* wlandev wlan device structure
295* msg wlan command message
296* Returns:
297* 0 success
298* <0 successful acceptance of message, but we're
299* waiting for an async process to finish before
300* we're done with the msg. When the asynch
301* process is done, we'll call the p80211
302* function p80211req_confirm() .
303* >0 An error occurred while we were handling
304* the message.
305*
306* Side effects:
307*
308* Call context:
309* process thread
310----------------------------------------------------------------*/
311static int prism2sta_mlmerequest(wlandevice_t *wlandev, struct p80211msg *msg)
312{
313    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
314
315    int result = 0;
316
317    switch (msg->msgcode) {
318    case DIDmsg_dot11req_mibget:
319        pr_debug("Received mibget request\n");
320        result = prism2mgmt_mibset_mibget(wlandev, msg);
321        break;
322    case DIDmsg_dot11req_mibset:
323        pr_debug("Received mibset request\n");
324        result = prism2mgmt_mibset_mibget(wlandev, msg);
325        break;
326    case DIDmsg_dot11req_scan:
327        pr_debug("Received scan request\n");
328        result = prism2mgmt_scan(wlandev, msg);
329        break;
330    case DIDmsg_dot11req_scan_results:
331        pr_debug("Received scan_results request\n");
332        result = prism2mgmt_scan_results(wlandev, msg);
333        break;
334    case DIDmsg_dot11req_start:
335        pr_debug("Received mlme start request\n");
336        result = prism2mgmt_start(wlandev, msg);
337        break;
338        /*
339         * Prism2 specific messages
340         */
341    case DIDmsg_p2req_readpda:
342        pr_debug("Received mlme readpda request\n");
343        result = prism2mgmt_readpda(wlandev, msg);
344        break;
345    case DIDmsg_p2req_ramdl_state:
346        pr_debug("Received mlme ramdl_state request\n");
347        result = prism2mgmt_ramdl_state(wlandev, msg);
348        break;
349    case DIDmsg_p2req_ramdl_write:
350        pr_debug("Received mlme ramdl_write request\n");
351        result = prism2mgmt_ramdl_write(wlandev, msg);
352        break;
353    case DIDmsg_p2req_flashdl_state:
354        pr_debug("Received mlme flashdl_state request\n");
355        result = prism2mgmt_flashdl_state(wlandev, msg);
356        break;
357    case DIDmsg_p2req_flashdl_write:
358        pr_debug("Received mlme flashdl_write request\n");
359        result = prism2mgmt_flashdl_write(wlandev, msg);
360        break;
361        /*
362         * Linux specific messages
363         */
364    case DIDmsg_lnxreq_hostwep:
365        break; /* ignore me. */
366    case DIDmsg_lnxreq_ifstate:
367        {
368            struct p80211msg_lnxreq_ifstate *ifstatemsg;
369            pr_debug("Received mlme ifstate request\n");
370            ifstatemsg = (struct p80211msg_lnxreq_ifstate *) msg;
371            result =
372                prism2sta_ifstate(wlandev,
373                          ifstatemsg->ifstate.data);
374            ifstatemsg->resultcode.status =
375                P80211ENUM_msgitem_status_data_ok;
376            ifstatemsg->resultcode.data = result;
377            result = 0;
378        }
379        break;
380    case DIDmsg_lnxreq_wlansniff:
381        pr_debug("Received mlme wlansniff request\n");
382        result = prism2mgmt_wlansniff(wlandev, msg);
383        break;
384    case DIDmsg_lnxreq_autojoin:
385        pr_debug("Received mlme autojoin request\n");
386        result = prism2mgmt_autojoin(wlandev, msg);
387        break;
388    case DIDmsg_lnxreq_commsquality:{
389            struct p80211msg_lnxreq_commsquality *qualmsg;
390
391            pr_debug("Received commsquality request\n");
392
393            qualmsg = (struct p80211msg_lnxreq_commsquality *) msg;
394
395            qualmsg->link.status =
396                P80211ENUM_msgitem_status_data_ok;
397            qualmsg->level.status =
398                P80211ENUM_msgitem_status_data_ok;
399            qualmsg->noise.status =
400                P80211ENUM_msgitem_status_data_ok;
401
402            qualmsg->link.data = le16_to_cpu(hw->qual.CQ_currBSS);
403            qualmsg->level.data = le16_to_cpu(hw->qual.ASL_currBSS);
404            qualmsg->noise.data = le16_to_cpu(hw->qual.ANL_currFC);
405            qualmsg->txrate.data = hw->txrate;
406
407            break;
408        }
409    default:
410        printk(KERN_WARNING "Unknown mgmt request message 0x%08x",
411               msg->msgcode);
412        break;
413    }
414
415    return result;
416}
417
418/*----------------------------------------------------------------
419* prism2sta_ifstate
420*
421* Interface state. This is the primary WLAN interface enable/disable
422* handler. Following the driver/load/deviceprobe sequence, this
423* function must be called with a state of "enable" before any other
424* commands will be accepted.
425*
426* Arguments:
427* wlandev wlan device structure
428* msgp ptr to msg buffer
429*
430* Returns:
431* A p80211 message resultcode value.
432*
433* Side effects:
434*
435* Call context:
436* process thread (usually)
437* interrupt
438----------------------------------------------------------------*/
439u32 prism2sta_ifstate(wlandevice_t *wlandev, u32 ifstate)
440{
441    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
442    u32 result;
443
444    result = P80211ENUM_resultcode_implementation_failure;
445
446    pr_debug("Current MSD state(%d), requesting(%d)\n",
447         wlandev->msdstate, ifstate);
448    switch (ifstate) {
449    case P80211ENUM_ifstate_fwload:
450        switch (wlandev->msdstate) {
451        case WLAN_MSD_HWPRESENT:
452            wlandev->msdstate = WLAN_MSD_FWLOAD_PENDING;
453            /*
454             * Initialize the device+driver sufficiently
455             * for firmware loading.
456             */
457            result = hfa384x_drvr_start(hw);
458            if (result) {
459                printk(KERN_ERR
460                       "hfa384x_drvr_start() failed,"
461                       "result=%d\n", (int)result);
462                result =
463                 P80211ENUM_resultcode_implementation_failure;
464                wlandev->msdstate = WLAN_MSD_HWPRESENT;
465                break;
466            }
467            wlandev->msdstate = WLAN_MSD_FWLOAD;
468            result = P80211ENUM_resultcode_success;
469            break;
470        case WLAN_MSD_FWLOAD:
471            hfa384x_cmd_initialize(hw);
472            result = P80211ENUM_resultcode_success;
473            break;
474        case WLAN_MSD_RUNNING:
475            printk(KERN_WARNING
476                   "Cannot enter fwload state from enable state,"
477                   "you must disable first.\n");
478            result = P80211ENUM_resultcode_invalid_parameters;
479            break;
480        case WLAN_MSD_HWFAIL:
481        default:
482            /* probe() had a problem or the msdstate contains
483             * an unrecognized value, there's nothing we can do.
484             */
485            result = P80211ENUM_resultcode_implementation_failure;
486            break;
487        }
488        break;
489    case P80211ENUM_ifstate_enable:
490        switch (wlandev->msdstate) {
491        case WLAN_MSD_HWPRESENT:
492        case WLAN_MSD_FWLOAD:
493            wlandev->msdstate = WLAN_MSD_RUNNING_PENDING;
494            /* Initialize the device+driver for full
495             * operation. Note that this might me an FWLOAD to
496             * to RUNNING transition so we must not do a chip
497             * or board level reset. Note that on failure,
498             * the MSD state is set to HWPRESENT because we
499             * can't make any assumptions about the state
500             * of the hardware or a previous firmware load.
501             */
502            result = hfa384x_drvr_start(hw);
503            if (result) {
504                printk(KERN_ERR
505                       "hfa384x_drvr_start() failed,"
506                       "result=%d\n", (int)result);
507                result =
508                  P80211ENUM_resultcode_implementation_failure;
509                wlandev->msdstate = WLAN_MSD_HWPRESENT;
510                break;
511            }
512
513            result = prism2sta_getcardinfo(wlandev);
514            if (result) {
515                printk(KERN_ERR
516                       "prism2sta_getcardinfo() failed,"
517                       "result=%d\n", (int)result);
518                result =
519                  P80211ENUM_resultcode_implementation_failure;
520                hfa384x_drvr_stop(hw);
521                wlandev->msdstate = WLAN_MSD_HWPRESENT;
522                break;
523            }
524            result = prism2sta_globalsetup(wlandev);
525            if (result) {
526                printk(KERN_ERR
527                       "prism2sta_globalsetup() failed,"
528                       "result=%d\n", (int)result);
529                result =
530                  P80211ENUM_resultcode_implementation_failure;
531                hfa384x_drvr_stop(hw);
532                wlandev->msdstate = WLAN_MSD_HWPRESENT;
533                break;
534            }
535            wlandev->msdstate = WLAN_MSD_RUNNING;
536            hw->join_ap = 0;
537            hw->join_retries = 60;
538            result = P80211ENUM_resultcode_success;
539            break;
540        case WLAN_MSD_RUNNING:
541            /* Do nothing, we're already in this state. */
542            result = P80211ENUM_resultcode_success;
543            break;
544        case WLAN_MSD_HWFAIL:
545        default:
546            /* probe() had a problem or the msdstate contains
547             * an unrecognized value, there's nothing we can do.
548             */
549            result = P80211ENUM_resultcode_implementation_failure;
550            break;
551        }
552        break;
553    case P80211ENUM_ifstate_disable:
554        switch (wlandev->msdstate) {
555        case WLAN_MSD_HWPRESENT:
556            /* Do nothing, we're already in this state. */
557            result = P80211ENUM_resultcode_success;
558            break;
559        case WLAN_MSD_FWLOAD:
560        case WLAN_MSD_RUNNING:
561            wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
562            /*
563             * TODO: Shut down the MAC completely. Here a chip
564             * or board level reset is probably called for.
565             * After a "disable" _all_ results are lost, even
566             * those from a fwload.
567             */
568            if (!wlandev->hwremoved)
569                netif_carrier_off(wlandev->netdev);
570
571            hfa384x_drvr_stop(hw);
572
573            wlandev->macmode = WLAN_MACMODE_NONE;
574            wlandev->msdstate = WLAN_MSD_HWPRESENT;
575            result = P80211ENUM_resultcode_success;
576            break;
577        case WLAN_MSD_HWFAIL:
578        default:
579            /* probe() had a problem or the msdstate contains
580             * an unrecognized value, there's nothing we can do.
581             */
582            result = P80211ENUM_resultcode_implementation_failure;
583            break;
584        }
585        break;
586    default:
587        result = P80211ENUM_resultcode_invalid_parameters;
588        break;
589    }
590
591    return result;
592}
593
594/*----------------------------------------------------------------
595* prism2sta_getcardinfo
596*
597* Collect the NICID, firmware version and any other identifiers
598* we'd like to have in host-side data structures.
599*
600* Arguments:
601* wlandev wlan device structure
602*
603* Returns:
604* 0 success
605* >0 f/w reported error
606* <0 driver reported error
607*
608* Side effects:
609*
610* Call context:
611* Either.
612----------------------------------------------------------------*/
613static int prism2sta_getcardinfo(wlandevice_t *wlandev)
614{
615    int result = 0;
616    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
617    u16 temp;
618    u8 snum[HFA384x_RID_NICSERIALNUMBER_LEN];
619    char pstr[(HFA384x_RID_NICSERIALNUMBER_LEN * 4) + 1];
620
621    /* Collect version and compatibility info */
622    /* Some are critical, some are not */
623    /* NIC identity */
624    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICIDENTITY,
625                    &hw->ident_nic,
626                    sizeof(hfa384x_compident_t));
627    if (result) {
628        printk(KERN_ERR "Failed to retrieve NICIDENTITY\n");
629        goto failed;
630    }
631
632    /* get all the nic id fields in host byte order */
633    hw->ident_nic.id = le16_to_cpu(hw->ident_nic.id);
634    hw->ident_nic.variant = le16_to_cpu(hw->ident_nic.variant);
635    hw->ident_nic.major = le16_to_cpu(hw->ident_nic.major);
636    hw->ident_nic.minor = le16_to_cpu(hw->ident_nic.minor);
637
638    printk(KERN_INFO "ident: nic h/w: id=0x%02x %d.%d.%d\n",
639           hw->ident_nic.id, hw->ident_nic.major,
640           hw->ident_nic.minor, hw->ident_nic.variant);
641
642    /* Primary f/w identity */
643    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRIIDENTITY,
644                    &hw->ident_pri_fw,
645                    sizeof(hfa384x_compident_t));
646    if (result) {
647        printk(KERN_ERR "Failed to retrieve PRIIDENTITY\n");
648        goto failed;
649    }
650
651    /* get all the private fw id fields in host byte order */
652    hw->ident_pri_fw.id = le16_to_cpu(hw->ident_pri_fw.id);
653    hw->ident_pri_fw.variant = le16_to_cpu(hw->ident_pri_fw.variant);
654    hw->ident_pri_fw.major = le16_to_cpu(hw->ident_pri_fw.major);
655    hw->ident_pri_fw.minor = le16_to_cpu(hw->ident_pri_fw.minor);
656
657    printk(KERN_INFO "ident: pri f/w: id=0x%02x %d.%d.%d\n",
658           hw->ident_pri_fw.id, hw->ident_pri_fw.major,
659           hw->ident_pri_fw.minor, hw->ident_pri_fw.variant);
660
661    /* Station (Secondary?) f/w identity */
662    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STAIDENTITY,
663                    &hw->ident_sta_fw,
664                    sizeof(hfa384x_compident_t));
665    if (result) {
666        printk(KERN_ERR "Failed to retrieve STAIDENTITY\n");
667        goto failed;
668    }
669
670    if (hw->ident_nic.id < 0x8000) {
671        printk(KERN_ERR
672               "FATAL: Card is not an Intersil Prism2/2.5/3\n");
673        result = -1;
674        goto failed;
675    }
676
677    /* get all the station fw id fields in host byte order */
678    hw->ident_sta_fw.id = le16_to_cpu(hw->ident_sta_fw.id);
679    hw->ident_sta_fw.variant = le16_to_cpu(hw->ident_sta_fw.variant);
680    hw->ident_sta_fw.major = le16_to_cpu(hw->ident_sta_fw.major);
681    hw->ident_sta_fw.minor = le16_to_cpu(hw->ident_sta_fw.minor);
682
683    /* strip out the 'special' variant bits */
684    hw->mm_mods = hw->ident_sta_fw.variant & (BIT(14) | BIT(15));
685    hw->ident_sta_fw.variant &= ~((u16) (BIT(14) | BIT(15)));
686
687    if (hw->ident_sta_fw.id == 0x1f) {
688        printk(KERN_INFO
689               "ident: sta f/w: id=0x%02x %d.%d.%d\n",
690               hw->ident_sta_fw.id, hw->ident_sta_fw.major,
691               hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
692    } else {
693        printk(KERN_INFO
694               "ident: ap f/w: id=0x%02x %d.%d.%d\n",
695               hw->ident_sta_fw.id, hw->ident_sta_fw.major,
696               hw->ident_sta_fw.minor, hw->ident_sta_fw.variant);
697        printk(KERN_ERR "Unsupported Tertiary AP firmeare loaded!\n");
698        goto failed;
699    }
700
701    /* Compatibility range, Modem supplier */
702    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_MFISUPRANGE,
703                    &hw->cap_sup_mfi,
704                    sizeof(hfa384x_caplevel_t));
705    if (result) {
706        printk(KERN_ERR "Failed to retrieve MFISUPRANGE\n");
707        goto failed;
708    }
709
710    /* get all the Compatibility range, modem interface supplier
711       fields in byte order */
712    hw->cap_sup_mfi.role = le16_to_cpu(hw->cap_sup_mfi.role);
713    hw->cap_sup_mfi.id = le16_to_cpu(hw->cap_sup_mfi.id);
714    hw->cap_sup_mfi.variant = le16_to_cpu(hw->cap_sup_mfi.variant);
715    hw->cap_sup_mfi.bottom = le16_to_cpu(hw->cap_sup_mfi.bottom);
716    hw->cap_sup_mfi.top = le16_to_cpu(hw->cap_sup_mfi.top);
717
718    printk(KERN_INFO
719           "MFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
720           hw->cap_sup_mfi.role, hw->cap_sup_mfi.id,
721           hw->cap_sup_mfi.variant, hw->cap_sup_mfi.bottom,
722           hw->cap_sup_mfi.top);
723
724    /* Compatibility range, Controller supplier */
725    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CFISUPRANGE,
726                    &hw->cap_sup_cfi,
727                    sizeof(hfa384x_caplevel_t));
728    if (result) {
729        printk(KERN_ERR "Failed to retrieve CFISUPRANGE\n");
730        goto failed;
731    }
732
733    /* get all the Compatibility range, controller interface supplier
734       fields in byte order */
735    hw->cap_sup_cfi.role = le16_to_cpu(hw->cap_sup_cfi.role);
736    hw->cap_sup_cfi.id = le16_to_cpu(hw->cap_sup_cfi.id);
737    hw->cap_sup_cfi.variant = le16_to_cpu(hw->cap_sup_cfi.variant);
738    hw->cap_sup_cfi.bottom = le16_to_cpu(hw->cap_sup_cfi.bottom);
739    hw->cap_sup_cfi.top = le16_to_cpu(hw->cap_sup_cfi.top);
740
741    printk(KERN_INFO
742           "CFI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
743           hw->cap_sup_cfi.role, hw->cap_sup_cfi.id,
744           hw->cap_sup_cfi.variant, hw->cap_sup_cfi.bottom,
745           hw->cap_sup_cfi.top);
746
747    /* Compatibility range, Primary f/w supplier */
748    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRISUPRANGE,
749                    &hw->cap_sup_pri,
750                    sizeof(hfa384x_caplevel_t));
751    if (result) {
752        printk(KERN_ERR "Failed to retrieve PRISUPRANGE\n");
753        goto failed;
754    }
755
756    /* get all the Compatibility range, primary firmware supplier
757       fields in byte order */
758    hw->cap_sup_pri.role = le16_to_cpu(hw->cap_sup_pri.role);
759    hw->cap_sup_pri.id = le16_to_cpu(hw->cap_sup_pri.id);
760    hw->cap_sup_pri.variant = le16_to_cpu(hw->cap_sup_pri.variant);
761    hw->cap_sup_pri.bottom = le16_to_cpu(hw->cap_sup_pri.bottom);
762    hw->cap_sup_pri.top = le16_to_cpu(hw->cap_sup_pri.top);
763
764    printk(KERN_INFO
765           "PRI:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
766           hw->cap_sup_pri.role, hw->cap_sup_pri.id,
767           hw->cap_sup_pri.variant, hw->cap_sup_pri.bottom,
768           hw->cap_sup_pri.top);
769
770    /* Compatibility range, Station f/w supplier */
771    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STASUPRANGE,
772                    &hw->cap_sup_sta,
773                    sizeof(hfa384x_caplevel_t));
774    if (result) {
775        printk(KERN_ERR "Failed to retrieve STASUPRANGE\n");
776        goto failed;
777    }
778
779    /* get all the Compatibility range, station firmware supplier
780       fields in byte order */
781    hw->cap_sup_sta.role = le16_to_cpu(hw->cap_sup_sta.role);
782    hw->cap_sup_sta.id = le16_to_cpu(hw->cap_sup_sta.id);
783    hw->cap_sup_sta.variant = le16_to_cpu(hw->cap_sup_sta.variant);
784    hw->cap_sup_sta.bottom = le16_to_cpu(hw->cap_sup_sta.bottom);
785    hw->cap_sup_sta.top = le16_to_cpu(hw->cap_sup_sta.top);
786
787    if (hw->cap_sup_sta.id == 0x04) {
788        printk(KERN_INFO
789               "STA:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
790               hw->cap_sup_sta.role, hw->cap_sup_sta.id,
791               hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
792               hw->cap_sup_sta.top);
793    } else {
794        printk(KERN_INFO
795               "AP:SUP:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
796               hw->cap_sup_sta.role, hw->cap_sup_sta.id,
797               hw->cap_sup_sta.variant, hw->cap_sup_sta.bottom,
798               hw->cap_sup_sta.top);
799    }
800
801    /* Compatibility range, primary f/w actor, CFI supplier */
802    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_PRI_CFIACTRANGES,
803                    &hw->cap_act_pri_cfi,
804                    sizeof(hfa384x_caplevel_t));
805    if (result) {
806        printk(KERN_ERR "Failed to retrieve PRI_CFIACTRANGES\n");
807        goto failed;
808    }
809
810    /* get all the Compatibility range, primary f/w actor, CFI supplier
811       fields in byte order */
812    hw->cap_act_pri_cfi.role = le16_to_cpu(hw->cap_act_pri_cfi.role);
813    hw->cap_act_pri_cfi.id = le16_to_cpu(hw->cap_act_pri_cfi.id);
814    hw->cap_act_pri_cfi.variant = le16_to_cpu(hw->cap_act_pri_cfi.variant);
815    hw->cap_act_pri_cfi.bottom = le16_to_cpu(hw->cap_act_pri_cfi.bottom);
816    hw->cap_act_pri_cfi.top = le16_to_cpu(hw->cap_act_pri_cfi.top);
817
818    printk(KERN_INFO
819           "PRI-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
820           hw->cap_act_pri_cfi.role, hw->cap_act_pri_cfi.id,
821           hw->cap_act_pri_cfi.variant, hw->cap_act_pri_cfi.bottom,
822           hw->cap_act_pri_cfi.top);
823
824    /* Compatibility range, sta f/w actor, CFI supplier */
825    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_CFIACTRANGES,
826                    &hw->cap_act_sta_cfi,
827                    sizeof(hfa384x_caplevel_t));
828    if (result) {
829        printk(KERN_ERR "Failed to retrieve STA_CFIACTRANGES\n");
830        goto failed;
831    }
832
833    /* get all the Compatibility range, station f/w actor, CFI supplier
834       fields in byte order */
835    hw->cap_act_sta_cfi.role = le16_to_cpu(hw->cap_act_sta_cfi.role);
836    hw->cap_act_sta_cfi.id = le16_to_cpu(hw->cap_act_sta_cfi.id);
837    hw->cap_act_sta_cfi.variant = le16_to_cpu(hw->cap_act_sta_cfi.variant);
838    hw->cap_act_sta_cfi.bottom = le16_to_cpu(hw->cap_act_sta_cfi.bottom);
839    hw->cap_act_sta_cfi.top = le16_to_cpu(hw->cap_act_sta_cfi.top);
840
841    printk(KERN_INFO
842           "STA-CFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
843           hw->cap_act_sta_cfi.role, hw->cap_act_sta_cfi.id,
844           hw->cap_act_sta_cfi.variant, hw->cap_act_sta_cfi.bottom,
845           hw->cap_act_sta_cfi.top);
846
847    /* Compatibility range, sta f/w actor, MFI supplier */
848    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_STA_MFIACTRANGES,
849                    &hw->cap_act_sta_mfi,
850                    sizeof(hfa384x_caplevel_t));
851    if (result) {
852        printk(KERN_ERR "Failed to retrieve STA_MFIACTRANGES\n");
853        goto failed;
854    }
855
856    /* get all the Compatibility range, station f/w actor, MFI supplier
857       fields in byte order */
858    hw->cap_act_sta_mfi.role = le16_to_cpu(hw->cap_act_sta_mfi.role);
859    hw->cap_act_sta_mfi.id = le16_to_cpu(hw->cap_act_sta_mfi.id);
860    hw->cap_act_sta_mfi.variant = le16_to_cpu(hw->cap_act_sta_mfi.variant);
861    hw->cap_act_sta_mfi.bottom = le16_to_cpu(hw->cap_act_sta_mfi.bottom);
862    hw->cap_act_sta_mfi.top = le16_to_cpu(hw->cap_act_sta_mfi.top);
863
864    printk(KERN_INFO
865           "STA-MFI:ACT:role=0x%02x:id=0x%02x:var=0x%02x:b/t=%d/%d\n",
866           hw->cap_act_sta_mfi.role, hw->cap_act_sta_mfi.id,
867           hw->cap_act_sta_mfi.variant, hw->cap_act_sta_mfi.bottom,
868           hw->cap_act_sta_mfi.top);
869
870    /* Serial Number */
871    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_NICSERIALNUMBER,
872                    snum, HFA384x_RID_NICSERIALNUMBER_LEN);
873    if (!result) {
874        wlan_mkprintstr(snum, HFA384x_RID_NICSERIALNUMBER_LEN,
875                pstr, sizeof(pstr));
876        printk(KERN_INFO "Prism2 card SN: %s\n", pstr);
877    } else {
878        printk(KERN_ERR "Failed to retrieve Prism2 Card SN\n");
879        goto failed;
880    }
881
882    /* Collect the MAC address */
883    result = hfa384x_drvr_getconfig(hw, HFA384x_RID_CNFOWNMACADDR,
884                    wlandev->netdev->dev_addr, ETH_ALEN);
885    if (result != 0) {
886        printk(KERN_ERR "Failed to retrieve mac address\n");
887        goto failed;
888    }
889
890    /* short preamble is always implemented */
891    wlandev->nsdcaps |= P80211_NSDCAP_SHORT_PREAMBLE;
892
893    /* find out if hardware wep is implemented */
894    hfa384x_drvr_getconfig16(hw, HFA384x_RID_PRIVACYOPTIMP, &temp);
895    if (temp)
896        wlandev->nsdcaps |= P80211_NSDCAP_HARDWAREWEP;
897
898    /* get the dBm Scaling constant */
899    hfa384x_drvr_getconfig16(hw, HFA384x_RID_CNFDBMADJUST, &temp);
900    hw->dbmadjust = temp;
901
902    /* Only enable scan by default on newer firmware */
903    if (HFA384x_FIRMWARE_VERSION(hw->ident_sta_fw.major,
904                     hw->ident_sta_fw.minor,
905                     hw->ident_sta_fw.variant) <
906        HFA384x_FIRMWARE_VERSION(1, 5, 5)) {
907        wlandev->nsdcaps |= P80211_NSDCAP_NOSCAN;
908    }
909
910    /* TODO: Set any internally managed config items */
911
912    goto done;
913failed:
914    printk(KERN_ERR "Failed, result=%d\n", result);
915done:
916    return result;
917}
918
919/*----------------------------------------------------------------
920* prism2sta_globalsetup
921*
922* Set any global RIDs that we want to set at device activation.
923*
924* Arguments:
925* wlandev wlan device structure
926*
927* Returns:
928* 0 success
929* >0 f/w reported error
930* <0 driver reported error
931*
932* Side effects:
933*
934* Call context:
935* process thread
936----------------------------------------------------------------*/
937static int prism2sta_globalsetup(wlandevice_t *wlandev)
938{
939    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
940
941    /* Set the maximum frame size */
942    return hfa384x_drvr_setconfig16(hw, HFA384x_RID_CNFMAXDATALEN,
943                    WLAN_DATA_MAXLEN);
944}
945
946static int prism2sta_setmulticast(wlandevice_t *wlandev, netdevice_t *dev)
947{
948    int result = 0;
949    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
950
951    u16 promisc;
952
953    /* If we're not ready, what's the point? */
954    if (hw->state != HFA384x_STATE_RUNNING)
955        goto exit;
956
957    if ((dev->flags & (IFF_PROMISC | IFF_ALLMULTI)) != 0)
958        promisc = P80211ENUM_truth_true;
959    else
960        promisc = P80211ENUM_truth_false;
961
962    result =
963        hfa384x_drvr_setconfig16_async(hw, HFA384x_RID_PROMISCMODE,
964                       promisc);
965exit:
966    return result;
967}
968
969/*----------------------------------------------------------------
970* prism2sta_inf_handover
971*
972* Handles the receipt of a Handover info frame. Should only be present
973* in APs only.
974*
975* Arguments:
976* wlandev wlan device structure
977* inf ptr to info frame (contents in hfa384x order)
978*
979* Returns:
980* nothing
981*
982* Side effects:
983*
984* Call context:
985* interrupt
986----------------------------------------------------------------*/
987static void prism2sta_inf_handover(wlandevice_t *wlandev,
988                   hfa384x_InfFrame_t *inf)
989{
990    pr_debug("received infoframe:HANDOVER (unhandled)\n");
991    return;
992}
993
994/*----------------------------------------------------------------
995* prism2sta_inf_tallies
996*
997* Handles the receipt of a CommTallies info frame.
998*
999* Arguments:
1000* wlandev wlan device structure
1001* inf ptr to info frame (contents in hfa384x order)
1002*
1003* Returns:
1004* nothing
1005*
1006* Side effects:
1007*
1008* Call context:
1009* interrupt
1010----------------------------------------------------------------*/
1011static void prism2sta_inf_tallies(wlandevice_t *wlandev,
1012                  hfa384x_InfFrame_t *inf)
1013{
1014    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1015    u16 *src16;
1016    u32 *dst;
1017    u32 *src32;
1018    int i;
1019    int cnt;
1020
1021    /*
1022     ** Determine if these are 16-bit or 32-bit tallies, based on the
1023     ** record length of the info record.
1024     */
1025
1026    cnt = sizeof(hfa384x_CommTallies32_t) / sizeof(u32);
1027    if (inf->framelen > 22) {
1028        dst = (u32 *) &hw->tallies;
1029        src32 = (u32 *) &inf->info.commtallies32;
1030        for (i = 0; i < cnt; i++, dst++, src32++)
1031            *dst += le32_to_cpu(*src32);
1032    } else {
1033        dst = (u32 *) &hw->tallies;
1034        src16 = (u16 *) &inf->info.commtallies16;
1035        for (i = 0; i < cnt; i++, dst++, src16++)
1036            *dst += le16_to_cpu(*src16);
1037    }
1038
1039    return;
1040}
1041
1042/*----------------------------------------------------------------
1043* prism2sta_inf_scanresults
1044*
1045* Handles the receipt of a Scan Results info frame.
1046*
1047* Arguments:
1048* wlandev wlan device structure
1049* inf ptr to info frame (contents in hfa384x order)
1050*
1051* Returns:
1052* nothing
1053*
1054* Side effects:
1055*
1056* Call context:
1057* interrupt
1058----------------------------------------------------------------*/
1059static void prism2sta_inf_scanresults(wlandevice_t *wlandev,
1060                      hfa384x_InfFrame_t *inf)
1061{
1062
1063    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1064    int nbss;
1065    hfa384x_ScanResult_t *sr = &(inf->info.scanresult);
1066    int i;
1067    hfa384x_JoinRequest_data_t joinreq;
1068    int result;
1069
1070    /* Get the number of results, first in bytes, then in results */
1071    nbss = (inf->framelen * sizeof(u16)) -
1072        sizeof(inf->infotype) - sizeof(inf->info.scanresult.scanreason);
1073    nbss /= sizeof(hfa384x_ScanResultSub_t);
1074
1075    /* Print em */
1076    pr_debug("rx scanresults, reason=%d, nbss=%d:\n",
1077         inf->info.scanresult.scanreason, nbss);
1078    for (i = 0; i < nbss; i++) {
1079        pr_debug("chid=%d anl=%d sl=%d bcnint=%d\n",
1080             sr->result[i].chid,
1081             sr->result[i].anl,
1082             sr->result[i].sl, sr->result[i].bcnint);
1083        pr_debug(" capinfo=0x%04x proberesp_rate=%d\n",
1084             sr->result[i].capinfo, sr->result[i].proberesp_rate);
1085    }
1086    /* issue a join request */
1087    joinreq.channel = sr->result[0].chid;
1088    memcpy(joinreq.bssid, sr->result[0].bssid, WLAN_BSSID_LEN);
1089    result = hfa384x_drvr_setconfig(hw,
1090                    HFA384x_RID_JOINREQUEST,
1091                    &joinreq, HFA384x_RID_JOINREQUEST_LEN);
1092    if (result) {
1093        printk(KERN_ERR "setconfig(joinreq) failed, result=%d\n",
1094               result);
1095    }
1096
1097    return;
1098}
1099
1100/*----------------------------------------------------------------
1101* prism2sta_inf_hostscanresults
1102*
1103* Handles the receipt of a Scan Results info frame.
1104*
1105* Arguments:
1106* wlandev wlan device structure
1107* inf ptr to info frame (contents in hfa384x order)
1108*
1109* Returns:
1110* nothing
1111*
1112* Side effects:
1113*
1114* Call context:
1115* interrupt
1116----------------------------------------------------------------*/
1117static void prism2sta_inf_hostscanresults(wlandevice_t *wlandev,
1118                      hfa384x_InfFrame_t *inf)
1119{
1120    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1121    int nbss;
1122
1123    nbss = (inf->framelen - 3) / 32;
1124    pr_debug("Received %d hostscan results\n", nbss);
1125
1126    if (nbss > 32)
1127        nbss = 32;
1128
1129    kfree(hw->scanresults);
1130
1131    hw->scanresults = kmalloc(sizeof(hfa384x_InfFrame_t), GFP_ATOMIC);
1132    memcpy(hw->scanresults, inf, sizeof(hfa384x_InfFrame_t));
1133
1134    if (nbss == 0)
1135        nbss = -1;
1136
1137    /* Notify/wake the sleeping caller. */
1138    hw->scanflag = nbss;
1139    wake_up_interruptible(&hw->cmdq);
1140};
1141
1142/*----------------------------------------------------------------
1143* prism2sta_inf_chinforesults
1144*
1145* Handles the receipt of a Channel Info Results info frame.
1146*
1147* Arguments:
1148* wlandev wlan device structure
1149* inf ptr to info frame (contents in hfa384x order)
1150*
1151* Returns:
1152* nothing
1153*
1154* Side effects:
1155*
1156* Call context:
1157* interrupt
1158----------------------------------------------------------------*/
1159static void prism2sta_inf_chinforesults(wlandevice_t *wlandev,
1160                    hfa384x_InfFrame_t *inf)
1161{
1162    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1163    unsigned int i, n;
1164
1165    hw->channel_info.results.scanchannels =
1166        le16_to_cpu(inf->info.chinforesult.scanchannels);
1167
1168    for (i = 0, n = 0; i < HFA384x_CHINFORESULT_MAX; i++) {
1169        if (hw->channel_info.results.scanchannels & (1 << i)) {
1170            int channel =
1171                le16_to_cpu(inf->info.chinforesult.result[n].chid) -
1172                1;
1173            hfa384x_ChInfoResultSub_t *chinforesult =
1174                &hw->channel_info.results.result[channel];
1175            chinforesult->chid = channel;
1176            chinforesult->anl =
1177                le16_to_cpu(inf->info.chinforesult.result[n].anl);
1178            chinforesult->pnl =
1179                le16_to_cpu(inf->info.chinforesult.result[n].pnl);
1180            chinforesult->active =
1181                le16_to_cpu(inf->info.chinforesult.result[n].
1182                    active);
1183    pr_debug
1184        ("chinfo: channel %d, %s level (avg/peak)=%d/%d dB, pcf %d\n",
1185                 channel + 1,
1186                 chinforesult->
1187                 active & HFA384x_CHINFORESULT_BSSACTIVE ? "signal"
1188                 : "noise", chinforesult->anl, chinforesult->pnl,
1189                 chinforesult->
1190                 active & HFA384x_CHINFORESULT_PCFACTIVE ? 1 : 0);
1191            n++;
1192        }
1193    }
1194    atomic_set(&hw->channel_info.done, 2);
1195
1196    hw->channel_info.count = n;
1197    return;
1198}
1199
1200void prism2sta_processing_defer(struct work_struct *data)
1201{
1202    hfa384x_t *hw = container_of(data, struct hfa384x, link_bh);
1203    wlandevice_t *wlandev = hw->wlandev;
1204    hfa384x_bytestr32_t ssid;
1205    int result;
1206
1207    /* First let's process the auth frames */
1208    {
1209        struct sk_buff *skb;
1210        hfa384x_InfFrame_t *inf;
1211
1212        while ((skb = skb_dequeue(&hw->authq))) {
1213            inf = (hfa384x_InfFrame_t *) skb->data;
1214            prism2sta_inf_authreq_defer(wlandev, inf);
1215        }
1216
1217    }
1218
1219    /* Now let's handle the linkstatus stuff */
1220    if (hw->link_status == hw->link_status_new)
1221        goto failed;
1222
1223    hw->link_status = hw->link_status_new;
1224
1225    switch (hw->link_status) {
1226    case HFA384x_LINK_NOTCONNECTED:
1227        /* I'm currently assuming that this is the initial link
1228         * state. It should only be possible immediately
1229         * following an Enable command.
1230         * Response:
1231         * Block Transmits, Ignore receives of data frames
1232         */
1233        netif_carrier_off(wlandev->netdev);
1234
1235        printk(KERN_INFO "linkstatus=NOTCONNECTED (unhandled)\n");
1236        break;
1237
1238    case HFA384x_LINK_CONNECTED:
1239        /* This one indicates a successful scan/join/auth/assoc.
1240         * When we have the full MLME complement, this event will
1241         * signify successful completion of both mlme_authenticate
1242         * and mlme_associate. State management will get a little
1243         * ugly here.
1244         * Response:
1245         * Indicate authentication and/or association
1246         * Enable Transmits, Receives and pass up data frames
1247         */
1248
1249        netif_carrier_on(wlandev->netdev);
1250
1251        /* If we are joining a specific AP, set our
1252         * state and reset retries
1253         */
1254        if (hw->join_ap == 1)
1255            hw->join_ap = 2;
1256        hw->join_retries = 60;
1257
1258        /* Don't call this in monitor mode */
1259        if (wlandev->netdev->type == ARPHRD_ETHER) {
1260            u16 portstatus;
1261
1262            printk(KERN_INFO "linkstatus=CONNECTED\n");
1263
1264            /* For non-usb devices, we can use the sync versions */
1265            /* Collect the BSSID, and set state to allow tx */
1266
1267            result = hfa384x_drvr_getconfig(hw,
1268                        HFA384x_RID_CURRENTBSSID,
1269                        wlandev->bssid,
1270                        WLAN_BSSID_LEN);
1271            if (result) {
1272                pr_debug
1273                    ("getconfig(0x%02x) failed, result = %d\n",
1274                     HFA384x_RID_CURRENTBSSID, result);
1275                goto failed;
1276            }
1277
1278            result = hfa384x_drvr_getconfig(hw,
1279                            HFA384x_RID_CURRENTSSID,
1280                            &ssid, sizeof(ssid));
1281            if (result) {
1282                pr_debug
1283                    ("getconfig(0x%02x) failed, result = %d\n",
1284                     HFA384x_RID_CURRENTSSID, result);
1285                goto failed;
1286            }
1287            prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
1288                        (p80211pstrd_t *) &
1289                        wlandev->ssid);
1290
1291            /* Collect the port status */
1292            result = hfa384x_drvr_getconfig16(hw,
1293                            HFA384x_RID_PORTSTATUS,
1294                            &portstatus);
1295            if (result) {
1296                pr_debug
1297                    ("getconfig(0x%02x) failed, result = %d\n",
1298                     HFA384x_RID_PORTSTATUS, result);
1299                goto failed;
1300            }
1301            wlandev->macmode =
1302                (portstatus == HFA384x_PSTATUS_CONN_IBSS) ?
1303                WLAN_MACMODE_IBSS_STA : WLAN_MACMODE_ESS_STA;
1304
1305            /* signal back up to cfg80211 layer */
1306            prism2_connect_result(wlandev, P80211ENUM_truth_false);
1307
1308            /* Get the ball rolling on the comms quality stuff */
1309            prism2sta_commsqual_defer(&hw->commsqual_bh);
1310        }
1311        break;
1312
1313    case HFA384x_LINK_DISCONNECTED:
1314        /* This one indicates that our association is gone. We've
1315         * lost connection with the AP and/or been disassociated.
1316         * This indicates that the MAC has completely cleared it's
1317         * associated state. We * should send a deauth indication
1318         * (implying disassoc) up * to the MLME.
1319         * Response:
1320         * Indicate Deauthentication
1321         * Block Transmits, Ignore receives of data frames
1322         */
1323        if (wlandev->netdev->type == ARPHRD_ETHER)
1324            printk(KERN_INFO
1325                   "linkstatus=DISCONNECTED (unhandled)\n");
1326        wlandev->macmode = WLAN_MACMODE_NONE;
1327
1328        netif_carrier_off(wlandev->netdev);
1329
1330        /* signal back up to cfg80211 layer */
1331        prism2_disconnected(wlandev);
1332
1333        break;
1334
1335    case HFA384x_LINK_AP_CHANGE:
1336        /* This one indicates that the MAC has decided to and
1337         * successfully completed a change to another AP. We
1338         * should probably implement a reassociation indication
1339         * in response to this one. I'm thinking that the the
1340         * p80211 layer needs to be notified in case of
1341         * buffering/queueing issues. User mode also needs to be
1342         * notified so that any BSS dependent elements can be
1343         * updated.
1344         * associated state. We * should send a deauth indication
1345         * (implying disassoc) up * to the MLME.
1346         * Response:
1347         * Indicate Reassociation
1348         * Enable Transmits, Receives and pass up data frames
1349         */
1350        printk(KERN_INFO "linkstatus=AP_CHANGE\n");
1351
1352        result = hfa384x_drvr_getconfig(hw,
1353                        HFA384x_RID_CURRENTBSSID,
1354                        wlandev->bssid, WLAN_BSSID_LEN);
1355        if (result) {
1356            pr_debug("getconfig(0x%02x) failed, result = %d\n",
1357                 HFA384x_RID_CURRENTBSSID, result);
1358            goto failed;
1359        }
1360
1361        result = hfa384x_drvr_getconfig(hw,
1362                        HFA384x_RID_CURRENTSSID,
1363                        &ssid, sizeof(ssid));
1364        if (result) {
1365            pr_debug("getconfig(0x%02x) failed, result = %d\n",
1366                 HFA384x_RID_CURRENTSSID, result);
1367            goto failed;
1368        }
1369        prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
1370                    (p80211pstrd_t *) &wlandev->ssid);
1371
1372        hw->link_status = HFA384x_LINK_CONNECTED;
1373        netif_carrier_on(wlandev->netdev);
1374
1375        /* signal back up to cfg80211 layer */
1376        prism2_roamed(wlandev);
1377
1378        break;
1379
1380    case HFA384x_LINK_AP_OUTOFRANGE:
1381        /* This one indicates that the MAC has decided that the
1382         * AP is out of range, but hasn't found a better candidate
1383         * so the MAC maintains its "associated" state in case
1384         * we get back in range. We should block transmits and
1385         * receives in this state. Do we need an indication here?
1386         * Probably not since a polling user-mode element would
1387         * get this status from from p2PortStatus(FD40). What about
1388         * p80211?
1389         * Response:
1390         * Block Transmits, Ignore receives of data frames
1391         */
1392        printk(KERN_INFO "linkstatus=AP_OUTOFRANGE (unhandled)\n");
1393
1394        netif_carrier_off(wlandev->netdev);
1395
1396        break;
1397
1398    case HFA384x_LINK_AP_INRANGE:
1399        /* This one indicates that the MAC has decided that the
1400         * AP is back in range. We continue working with our
1401         * existing association.
1402         * Response:
1403         * Enable Transmits, Receives and pass up data frames
1404         */
1405        printk(KERN_INFO "linkstatus=AP_INRANGE\n");
1406
1407        hw->link_status = HFA384x_LINK_CONNECTED;
1408        netif_carrier_on(wlandev->netdev);
1409
1410        break;
1411
1412    case HFA384x_LINK_ASSOCFAIL:
1413        /* This one is actually a peer to CONNECTED. We've
1414         * requested a join for a given SSID and optionally BSSID.
1415         * We can use this one to indicate authentication and
1416         * association failures. The trick is going to be
1417         * 1) identifying the failure, and 2) state management.
1418         * Response:
1419         * Disable Transmits, Ignore receives of data frames
1420         */
1421        if (hw->join_ap && --hw->join_retries > 0) {
1422            hfa384x_JoinRequest_data_t joinreq;
1423            joinreq = hw->joinreq;
1424            /* Send the join request */
1425            hfa384x_drvr_setconfig(hw,
1426                           HFA384x_RID_JOINREQUEST,
1427                           &joinreq,
1428                           HFA384x_RID_JOINREQUEST_LEN);
1429            printk(KERN_INFO
1430                   "linkstatus=ASSOCFAIL (re-submitting join)\n");
1431        } else {
1432            printk(KERN_INFO "linkstatus=ASSOCFAIL (unhandled)\n");
1433        }
1434
1435        netif_carrier_off(wlandev->netdev);
1436
1437        /* signal back up to cfg80211 layer */
1438        prism2_connect_result(wlandev, P80211ENUM_truth_true);
1439
1440        break;
1441
1442    default:
1443        /* This is bad, IO port problems? */
1444        printk(KERN_WARNING
1445               "unknown linkstatus=0x%02x\n", hw->link_status);
1446        goto failed;
1447        break;
1448    }
1449
1450    wlandev->linkstatus = (hw->link_status == HFA384x_LINK_CONNECTED);
1451
1452failed:
1453    return;
1454}
1455
1456/*----------------------------------------------------------------
1457* prism2sta_inf_linkstatus
1458*
1459* Handles the receipt of a Link Status info frame.
1460*
1461* Arguments:
1462* wlandev wlan device structure
1463* inf ptr to info frame (contents in hfa384x order)
1464*
1465* Returns:
1466* nothing
1467*
1468* Side effects:
1469*
1470* Call context:
1471* interrupt
1472----------------------------------------------------------------*/
1473static void prism2sta_inf_linkstatus(wlandevice_t *wlandev,
1474                     hfa384x_InfFrame_t *inf)
1475{
1476    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1477
1478    hw->link_status_new = le16_to_cpu(inf->info.linkstatus.linkstatus);
1479
1480    schedule_work(&hw->link_bh);
1481
1482    return;
1483}
1484
1485/*----------------------------------------------------------------
1486* prism2sta_inf_assocstatus
1487*
1488* Handles the receipt of an Association Status info frame. Should
1489* be present in APs only.
1490*
1491* Arguments:
1492* wlandev wlan device structure
1493* inf ptr to info frame (contents in hfa384x order)
1494*
1495* Returns:
1496* nothing
1497*
1498* Side effects:
1499*
1500* Call context:
1501* interrupt
1502----------------------------------------------------------------*/
1503static void prism2sta_inf_assocstatus(wlandevice_t *wlandev,
1504                      hfa384x_InfFrame_t *inf)
1505{
1506    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1507    hfa384x_AssocStatus_t rec;
1508    int i;
1509
1510    memcpy(&rec, &inf->info.assocstatus, sizeof(rec));
1511    rec.assocstatus = le16_to_cpu(rec.assocstatus);
1512    rec.reason = le16_to_cpu(rec.reason);
1513
1514    /*
1515     ** Find the address in the list of authenticated stations.
1516     ** If it wasn't found, then this address has not been previously
1517     ** authenticated and something weird has happened if this is
1518     ** anything other than an "authentication failed" message.
1519     ** If the address was found, then set the "associated" flag for
1520     ** that station, based on whether the station is associating or
1521     ** losing its association. Something weird has also happened
1522     ** if we find the address in the list of authenticated stations
1523     ** but we are getting an "authentication failed" message.
1524     */
1525
1526    for (i = 0; i < hw->authlist.cnt; i++)
1527        if (memcmp(rec.sta_addr, hw->authlist.addr[i], ETH_ALEN) == 0)
1528            break;
1529
1530    if (i >= hw->authlist.cnt) {
1531        if (rec.assocstatus != HFA384x_ASSOCSTATUS_AUTHFAIL)
1532            printk(KERN_WARNING
1533    "assocstatus info frame received for non-authenticated station.\n");
1534    } else {
1535        hw->authlist.assoc[i] =
1536            (rec.assocstatus == HFA384x_ASSOCSTATUS_STAASSOC ||
1537             rec.assocstatus == HFA384x_ASSOCSTATUS_REASSOC);
1538
1539        if (rec.assocstatus == HFA384x_ASSOCSTATUS_AUTHFAIL)
1540            printk(KERN_WARNING
1541"authfail assocstatus info frame received for authenticated station.\n");
1542    }
1543
1544    return;
1545}
1546
1547/*----------------------------------------------------------------
1548* prism2sta_inf_authreq
1549*
1550* Handles the receipt of an Authentication Request info frame. Should
1551* be present in APs only.
1552*
1553* Arguments:
1554* wlandev wlan device structure
1555* inf ptr to info frame (contents in hfa384x order)
1556*
1557* Returns:
1558* nothing
1559*
1560* Side effects:
1561*
1562* Call context:
1563* interrupt
1564*
1565----------------------------------------------------------------*/
1566static void prism2sta_inf_authreq(wlandevice_t *wlandev,
1567                  hfa384x_InfFrame_t *inf)
1568{
1569    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1570    struct sk_buff *skb;
1571
1572    skb = dev_alloc_skb(sizeof(*inf));
1573    if (skb) {
1574        skb_put(skb, sizeof(*inf));
1575        memcpy(skb->data, inf, sizeof(*inf));
1576        skb_queue_tail(&hw->authq, skb);
1577        schedule_work(&hw->link_bh);
1578    }
1579}
1580
1581static void prism2sta_inf_authreq_defer(wlandevice_t *wlandev,
1582                    hfa384x_InfFrame_t *inf)
1583{
1584    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1585    hfa384x_authenticateStation_data_t rec;
1586
1587    int i, added, result, cnt;
1588    u8 *addr;
1589
1590    /*
1591     ** Build the AuthenticateStation record. Initialize it for denying
1592     ** authentication.
1593     */
1594
1595    memcpy(rec.address, inf->info.authreq.sta_addr, ETH_ALEN);
1596    rec.status = P80211ENUM_status_unspec_failure;
1597
1598    /*
1599     ** Authenticate based on the access mode.
1600     */
1601
1602    switch (hw->accessmode) {
1603    case WLAN_ACCESS_NONE:
1604
1605        /*
1606         ** Deny all new authentications. However, if a station
1607         ** is ALREADY authenticated, then accept it.
1608         */
1609
1610        for (i = 0; i < hw->authlist.cnt; i++)
1611            if (memcmp(rec.address, hw->authlist.addr[i],
1612                   ETH_ALEN) == 0) {
1613                rec.status = P80211ENUM_status_successful;
1614                break;
1615            }
1616
1617        break;
1618
1619    case WLAN_ACCESS_ALL:
1620
1621        /*
1622         ** Allow all authentications.
1623         */
1624
1625        rec.status = P80211ENUM_status_successful;
1626        break;
1627
1628    case WLAN_ACCESS_ALLOW:
1629
1630        /*
1631         ** Only allow the authentication if the MAC address
1632         ** is in the list of allowed addresses.
1633         **
1634         ** Since this is the interrupt handler, we may be here
1635         ** while the access list is in the middle of being
1636         ** updated. Choose the list which is currently okay.
1637         ** See "prism2mib_priv_accessallow()" for details.
1638         */
1639
1640        if (hw->allow.modify == 0) {
1641            cnt = hw->allow.cnt;
1642            addr = hw->allow.addr[0];
1643        } else {
1644            cnt = hw->allow.cnt1;
1645            addr = hw->allow.addr1[0];
1646        }
1647
1648        for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1649            if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1650                rec.status = P80211ENUM_status_successful;
1651                break;
1652            }
1653
1654        break;
1655
1656    case WLAN_ACCESS_DENY:
1657
1658        /*
1659         ** Allow the authentication UNLESS the MAC address is
1660         ** in the list of denied addresses.
1661         **
1662         ** Since this is the interrupt handler, we may be here
1663         ** while the access list is in the middle of being
1664         ** updated. Choose the list which is currently okay.
1665         ** See "prism2mib_priv_accessdeny()" for details.
1666         */
1667
1668        if (hw->deny.modify == 0) {
1669            cnt = hw->deny.cnt;
1670            addr = hw->deny.addr[0];
1671        } else {
1672            cnt = hw->deny.cnt1;
1673            addr = hw->deny.addr1[0];
1674        }
1675
1676        rec.status = P80211ENUM_status_successful;
1677
1678        for (i = 0; i < cnt; i++, addr += ETH_ALEN)
1679            if (memcmp(rec.address, addr, ETH_ALEN) == 0) {
1680                rec.status = P80211ENUM_status_unspec_failure;
1681                break;
1682            }
1683
1684        break;
1685    }
1686
1687    /*
1688     ** If the authentication is okay, then add the MAC address to the
1689     ** list of authenticated stations. Don't add the address if it
1690     ** is already in the list. (802.11b does not seem to disallow
1691     ** a station from issuing an authentication request when the
1692     ** station is already authenticated. Does this sort of thing
1693     ** ever happen? We might as well do the check just in case.)
1694     */
1695
1696    added = 0;
1697
1698    if (rec.status == P80211ENUM_status_successful) {
1699        for (i = 0; i < hw->authlist.cnt; i++)
1700            if (memcmp(rec.address, hw->authlist.addr[i], ETH_ALEN)
1701                == 0)
1702                break;
1703
1704        if (i >= hw->authlist.cnt) {
1705            if (hw->authlist.cnt >= WLAN_AUTH_MAX) {
1706                rec.status = P80211ENUM_status_ap_full;
1707            } else {
1708                memcpy(hw->authlist.addr[hw->authlist.cnt],
1709                       rec.address, ETH_ALEN);
1710                hw->authlist.cnt++;
1711                added = 1;
1712            }
1713        }
1714    }
1715
1716    /*
1717     ** Send back the results of the authentication. If this doesn't work,
1718     ** then make sure to remove the address from the authenticated list if
1719     ** it was added.
1720     */
1721
1722    rec.status = cpu_to_le16(rec.status);
1723    rec.algorithm = inf->info.authreq.algorithm;
1724
1725    result = hfa384x_drvr_setconfig(hw, HFA384x_RID_AUTHENTICATESTA,
1726                    &rec, sizeof(rec));
1727    if (result) {
1728        if (added)
1729            hw->authlist.cnt--;
1730        printk(KERN_ERR
1731               "setconfig(authenticatestation) failed, result=%d\n",
1732               result);
1733    }
1734    return;
1735}
1736
1737/*----------------------------------------------------------------
1738* prism2sta_inf_psusercnt
1739*
1740* Handles the receipt of a PowerSaveUserCount info frame. Should
1741* be present in APs only.
1742*
1743* Arguments:
1744* wlandev wlan device structure
1745* inf ptr to info frame (contents in hfa384x order)
1746*
1747* Returns:
1748* nothing
1749*
1750* Side effects:
1751*
1752* Call context:
1753* interrupt
1754----------------------------------------------------------------*/
1755static void prism2sta_inf_psusercnt(wlandevice_t *wlandev,
1756                    hfa384x_InfFrame_t *inf)
1757{
1758    hfa384x_t *hw = (hfa384x_t *) wlandev->priv;
1759
1760    hw->psusercount = le16_to_cpu(inf->info.psusercnt.usercnt);
1761
1762    return;
1763}
1764
1765/*----------------------------------------------------------------
1766* prism2sta_ev_info
1767*
1768* Handles the Info event.
1769*
1770* Arguments:
1771* wlandev wlan device structure
1772* inf ptr to a generic info frame
1773*
1774* Returns:
1775* nothing
1776*
1777* Side effects:
1778*
1779* Call context:
1780* interrupt
1781----------------------------------------------------------------*/
1782void prism2sta_ev_info(wlandevice_t *wlandev, hfa384x_InfFrame_t *inf)
1783{
1784    inf->infotype = le16_to_cpu(inf->infotype);
1785    /* Dispatch */
1786    switch (inf->infotype) {
1787    case HFA384x_IT_HANDOVERADDR:
1788        prism2sta_inf_handover(wlandev, inf);
1789        break;
1790    case HFA384x_IT_COMMTALLIES:
1791        prism2sta_inf_tallies(wlandev, inf);
1792        break;
1793    case HFA384x_IT_HOSTSCANRESULTS:
1794        prism2sta_inf_hostscanresults(wlandev, inf);
1795        break;
1796    case HFA384x_IT_SCANRESULTS:
1797        prism2sta_inf_scanresults(wlandev, inf);
1798        break;
1799    case HFA384x_IT_CHINFORESULTS:
1800        prism2sta_inf_chinforesults(wlandev, inf);
1801        break;
1802    case HFA384x_IT_LINKSTATUS:
1803        prism2sta_inf_linkstatus(wlandev, inf);
1804        break;
1805    case HFA384x_IT_ASSOCSTATUS:
1806        prism2sta_inf_assocstatus(wlandev, inf);
1807        break;
1808    case HFA384x_IT_AUTHREQ:
1809        prism2sta_inf_authreq(wlandev, inf);
1810        break;
1811    case HFA384x_IT_PSUSERCNT:
1812        prism2sta_inf_psusercnt(wlandev, inf);
1813        break;
1814    case HFA384x_IT_KEYIDCHANGED:
1815        printk(KERN_WARNING "Unhandled IT_KEYIDCHANGED\n");
1816        break;
1817    case HFA384x_IT_ASSOCREQ:
1818        printk(KERN_WARNING "Unhandled IT_ASSOCREQ\n");
1819        break;
1820    case HFA384x_IT_MICFAILURE:
1821        printk(KERN_WARNING "Unhandled IT_MICFAILURE\n");
1822        break;
1823    default:
1824        printk(KERN_WARNING
1825               "Unknown info type=0x%02x\n", inf->infotype);
1826        break;
1827    }
1828    return;
1829}
1830
1831/*----------------------------------------------------------------
1832* prism2sta_ev_txexc
1833*
1834* Handles the TxExc event. A Transmit Exception event indicates
1835* that the MAC's TX process was unsuccessful - so the packet did
1836* not get transmitted.
1837*
1838* Arguments:
1839* wlandev wlan device structure
1840* status tx frame status word
1841*
1842* Returns:
1843* nothing
1844*
1845* Side effects:
1846*
1847* Call context:
1848* interrupt
1849----------------------------------------------------------------*/
1850void prism2sta_ev_txexc(wlandevice_t *wlandev, u16 status)
1851{
1852    pr_debug("TxExc status=0x%x.\n", status);
1853
1854    return;
1855}
1856
1857/*----------------------------------------------------------------
1858* prism2sta_ev_tx
1859*
1860* Handles the Tx event.
1861*
1862* Arguments:
1863* wlandev wlan device structure
1864* status tx frame status word
1865* Returns:
1866* nothing
1867*
1868* Side effects:
1869*
1870* Call context:
1871* interrupt
1872----------------------------------------------------------------*/
1873void prism2sta_ev_tx(wlandevice_t *wlandev, u16 status)
1874{
1875    pr_debug("Tx Complete, status=0x%04x\n", status);
1876    /* update linux network stats */
1877    wlandev->linux_stats.tx_packets++;
1878    return;
1879}
1880
1881/*----------------------------------------------------------------
1882* prism2sta_ev_rx
1883*
1884* Handles the Rx event.
1885*
1886* Arguments:
1887* wlandev wlan device structure
1888*
1889* Returns:
1890* nothing
1891*
1892* Side effects:
1893*
1894* Call context:
1895* interrupt
1896----------------------------------------------------------------*/
1897void prism2sta_ev_rx(wlandevice_t *wlandev, struct sk_buff *skb)
1898{
1899    p80211netdev_rx(wlandev, skb);
1900    return;
1901}
1902
1903/*----------------------------------------------------------------
1904* prism2sta_ev_alloc
1905*
1906* Handles the Alloc event.
1907*
1908* Arguments:
1909* wlandev wlan device structure
1910*
1911* Returns:
1912* nothing
1913*
1914* Side effects:
1915*
1916* Call context:
1917* interrupt
1918----------------------------------------------------------------*/
1919void prism2sta_ev_alloc(wlandevice_t *wlandev)
1920{
1921    netif_wake_queue(wlandev->netdev);
1922    return;
1923}
1924
1925/*----------------------------------------------------------------
1926* create_wlan
1927*
1928* Called at module init time. This creates the wlandevice_t structure
1929* and initializes it with relevant bits.
1930*
1931* Arguments:
1932* none
1933*
1934* Returns:
1935* the created wlandevice_t structure.
1936*
1937* Side effects:
1938* also allocates the priv/hw structures.
1939*
1940* Call context:
1941* process thread
1942*
1943----------------------------------------------------------------*/
1944static wlandevice_t *create_wlan(void)
1945{
1946    wlandevice_t *wlandev = NULL;
1947    hfa384x_t *hw = NULL;
1948
1949    /* Alloc our structures */
1950    wlandev = kzalloc(sizeof(wlandevice_t), GFP_KERNEL);
1951    hw = kzalloc(sizeof(hfa384x_t), GFP_KERNEL);
1952
1953    if (!wlandev || !hw) {
1954        printk(KERN_ERR "%s: Memory allocation failure.\n", dev_info);
1955        kfree(wlandev);
1956        kfree(hw);
1957        return NULL;
1958    }
1959
1960    /* Initialize the network device object. */
1961    wlandev->nsdname = dev_info;
1962    wlandev->msdstate = WLAN_MSD_HWPRESENT_PENDING;
1963    wlandev->priv = hw;
1964    wlandev->open = prism2sta_open;
1965    wlandev->close = prism2sta_close;
1966    wlandev->reset = prism2sta_reset;
1967    wlandev->txframe = prism2sta_txframe;
1968    wlandev->mlmerequest = prism2sta_mlmerequest;
1969    wlandev->set_multicast_list = prism2sta_setmulticast;
1970    wlandev->tx_timeout = hfa384x_tx_timeout;
1971
1972    wlandev->nsdcaps = P80211_NSDCAP_HWFRAGMENT | P80211_NSDCAP_AUTOJOIN;
1973
1974    /* Initialize the device private data structure. */
1975    hw->dot11_desired_bss_type = 1;
1976
1977    return wlandev;
1978}
1979
1980void prism2sta_commsqual_defer(struct work_struct *data)
1981{
1982    hfa384x_t *hw = container_of(data, struct hfa384x, commsqual_bh);
1983    wlandevice_t *wlandev = hw->wlandev;
1984    hfa384x_bytestr32_t ssid;
1985    struct p80211msg_dot11req_mibget msg;
1986    p80211item_uint32_t *mibitem = (p80211item_uint32_t *)
1987                        &msg.mibattribute.data;
1988    int result = 0;
1989
1990    if (hw->wlandev->hwremoved)
1991        goto done;
1992
1993    /* we don't care if we're in AP mode */
1994    if ((wlandev->macmode == WLAN_MACMODE_NONE) ||
1995        (wlandev->macmode == WLAN_MACMODE_ESS_AP)) {
1996        goto done;
1997    }
1998
1999    /* It only makes sense to poll these in non-IBSS */
2000    if (wlandev->macmode != WLAN_MACMODE_IBSS_STA) {
2001        result = hfa384x_drvr_getconfig(
2002                hw, HFA384x_RID_DBMCOMMSQUALITY,
2003                &hw->qual, HFA384x_RID_DBMCOMMSQUALITY_LEN);
2004
2005        if (result) {
2006            printk(KERN_ERR "error fetching commsqual\n");
2007            goto done;
2008        }
2009
2010        pr_debug("commsqual %d %d %d\n",
2011             le16_to_cpu(hw->qual.CQ_currBSS),
2012             le16_to_cpu(hw->qual.ASL_currBSS),
2013             le16_to_cpu(hw->qual.ANL_currFC));
2014    }
2015
2016    /* Get the signal rate */
2017    msg.msgcode = DIDmsg_dot11req_mibget;
2018    mibitem->did = DIDmib_p2_p2MAC_p2CurrentTxRate;
2019    result = p80211req_dorequest(wlandev, (u8 *) &msg);
2020
2021    if (result) {
2022        pr_debug("get signal rate failed, result = %d\n",
2023             result);
2024        goto done;
2025    }
2026
2027    switch (mibitem->data) {
2028    case HFA384x_RATEBIT_1:
2029        hw->txrate = 10;
2030        break;
2031    case HFA384x_RATEBIT_2:
2032        hw->txrate = 20;
2033        break;
2034    case HFA384x_RATEBIT_5dot5:
2035        hw->txrate = 55;
2036        break;
2037    case HFA384x_RATEBIT_11:
2038        hw->txrate = 110;
2039        break;
2040    default:
2041        pr_debug("Bad ratebit (%d)\n", mibitem->data);
2042    }
2043
2044    /* Lastly, we need to make sure the BSSID didn't change on us */
2045    result = hfa384x_drvr_getconfig(hw,
2046                    HFA384x_RID_CURRENTBSSID,
2047                    wlandev->bssid, WLAN_BSSID_LEN);
2048    if (result) {
2049        pr_debug("getconfig(0x%02x) failed, result = %d\n",
2050             HFA384x_RID_CURRENTBSSID, result);
2051        goto done;
2052    }
2053
2054    result = hfa384x_drvr_getconfig(hw,
2055                    HFA384x_RID_CURRENTSSID,
2056                    &ssid, sizeof(ssid));
2057    if (result) {
2058        pr_debug("getconfig(0x%02x) failed, result = %d\n",
2059             HFA384x_RID_CURRENTSSID, result);
2060        goto done;
2061    }
2062    prism2mgmt_bytestr2pstr((hfa384x_bytestr_t *) &ssid,
2063                (p80211pstrd_t *) &wlandev->ssid);
2064
2065    /* Reschedule timer */
2066    mod_timer(&hw->commsqual_timer, jiffies + HZ);
2067
2068done:
2069    ;
2070}
2071
2072void prism2sta_commsqual_timer(unsigned long data)
2073{
2074    hfa384x_t *hw = (hfa384x_t *) data;
2075
2076    schedule_work(&hw->commsqual_bh);
2077}
2078

Archive Download this file



interactive