mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-25 13:14:07 +08:00
2c706002fc
Convert all the drivers using net/ieee80211.h to use linux/ieee80211.h. Contains a bugfix in libertas where the SSID parsing could overrun the buffer when the AP sends invalid information. Signed-off-by: Johannes Berg <johannes@sipsolutions.net> Acked-by: Dan Williams <dcbw@redhat.com> [airo, libertas] Acked-by: Pavel Roskin <proski@gnu.org> [orinoco] Acked-by: David Kilroy <kilroyd@googlemail.com> [orinoco] Signed-off-by: John W. Linville <linville@tuxdriver.com>
327 lines
9.6 KiB
C
327 lines
9.6 KiB
C
/*
|
|
* PS3 gelic network driver.
|
|
*
|
|
* Copyright (C) 2007 Sony Computer Entertainment Inc.
|
|
* Copyright 2007 Sony Corporation
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation version 2.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
#ifndef _GELIC_WIRELESS_H
|
|
#define _GELIC_WIRELESS_H
|
|
|
|
#include <linux/wireless.h>
|
|
#include <net/iw_handler.h>
|
|
|
|
|
|
/* return value from GELIC_LV1_GET_WLAN_EVENT netcontrol */
|
|
enum gelic_lv1_wl_event {
|
|
GELIC_LV1_WL_EVENT_DEVICE_READY = 0x01, /* Eurus ready */
|
|
GELIC_LV1_WL_EVENT_SCAN_COMPLETED = 0x02, /* Scan has completed */
|
|
GELIC_LV1_WL_EVENT_DEAUTH = 0x04, /* Deauthed by the AP */
|
|
GELIC_LV1_WL_EVENT_BEACON_LOST = 0x08, /* Beacon lost detected */
|
|
GELIC_LV1_WL_EVENT_CONNECTED = 0x10, /* Connected to AP */
|
|
GELIC_LV1_WL_EVENT_WPA_CONNECTED = 0x20, /* WPA connection */
|
|
GELIC_LV1_WL_EVENT_WPA_ERROR = 0x40, /* MIC error */
|
|
};
|
|
|
|
/* arguments for GELIC_LV1_POST_WLAN_COMMAND netcontrol */
|
|
enum gelic_eurus_command {
|
|
GELIC_EURUS_CMD_ASSOC = 1, /* association start */
|
|
GELIC_EURUS_CMD_DISASSOC = 2, /* disassociate */
|
|
GELIC_EURUS_CMD_START_SCAN = 3, /* scan start */
|
|
GELIC_EURUS_CMD_GET_SCAN = 4, /* get scan result */
|
|
GELIC_EURUS_CMD_SET_COMMON_CFG = 5, /* set common config */
|
|
GELIC_EURUS_CMD_GET_COMMON_CFG = 6, /* set common config */
|
|
GELIC_EURUS_CMD_SET_WEP_CFG = 7, /* set WEP config */
|
|
GELIC_EURUS_CMD_GET_WEP_CFG = 8, /* get WEP config */
|
|
GELIC_EURUS_CMD_SET_WPA_CFG = 9, /* set WPA config */
|
|
GELIC_EURUS_CMD_GET_WPA_CFG = 10, /* get WPA config */
|
|
GELIC_EURUS_CMD_GET_RSSI_CFG = 11, /* get RSSI info. */
|
|
GELIC_EURUS_CMD_MAX_INDEX
|
|
};
|
|
|
|
/* for GELIC_EURUS_CMD_COMMON_CFG */
|
|
enum gelic_eurus_bss_type {
|
|
GELIC_EURUS_BSS_INFRA = 0,
|
|
GELIC_EURUS_BSS_ADHOC = 1, /* not supported */
|
|
};
|
|
|
|
enum gelic_eurus_auth_method {
|
|
GELIC_EURUS_AUTH_OPEN = 0, /* FIXME: WLAN_AUTH_OPEN */
|
|
GELIC_EURUS_AUTH_SHARED = 1, /* not supported */
|
|
};
|
|
|
|
enum gelic_eurus_opmode {
|
|
GELIC_EURUS_OPMODE_11BG = 0, /* 802.11b/g */
|
|
GELIC_EURUS_OPMODE_11B = 1, /* 802.11b only */
|
|
GELIC_EURUS_OPMODE_11G = 2, /* 802.11g only */
|
|
};
|
|
|
|
struct gelic_eurus_common_cfg {
|
|
/* all fields are big endian */
|
|
u16 scan_index;
|
|
u16 bss_type; /* infra or adhoc */
|
|
u16 auth_method; /* shared key or open */
|
|
u16 op_mode; /* B/G */
|
|
} __attribute__((packed));
|
|
|
|
|
|
/* for GELIC_EURUS_CMD_WEP_CFG */
|
|
enum gelic_eurus_wep_security {
|
|
GELIC_EURUS_WEP_SEC_NONE = 0,
|
|
GELIC_EURUS_WEP_SEC_40BIT = 1,
|
|
GELIC_EURUS_WEP_SEC_104BIT = 2,
|
|
};
|
|
|
|
struct gelic_eurus_wep_cfg {
|
|
/* all fields are big endian */
|
|
u16 security;
|
|
u8 key[4][16];
|
|
} __attribute__((packed));
|
|
|
|
/* for GELIC_EURUS_CMD_WPA_CFG */
|
|
enum gelic_eurus_wpa_security {
|
|
GELIC_EURUS_WPA_SEC_NONE = 0x0000,
|
|
/* group=TKIP, pairwise=TKIP */
|
|
GELIC_EURUS_WPA_SEC_WPA_TKIP_TKIP = 0x0001,
|
|
/* group=AES, pairwise=AES */
|
|
GELIC_EURUS_WPA_SEC_WPA_AES_AES = 0x0002,
|
|
/* group=TKIP, pairwise=TKIP */
|
|
GELIC_EURUS_WPA_SEC_WPA2_TKIP_TKIP = 0x0004,
|
|
/* group=AES, pairwise=AES */
|
|
GELIC_EURUS_WPA_SEC_WPA2_AES_AES = 0x0008,
|
|
/* group=TKIP, pairwise=AES */
|
|
GELIC_EURUS_WPA_SEC_WPA_TKIP_AES = 0x0010,
|
|
/* group=TKIP, pairwise=AES */
|
|
GELIC_EURUS_WPA_SEC_WPA2_TKIP_AES = 0x0020,
|
|
};
|
|
|
|
enum gelic_eurus_wpa_psk_type {
|
|
GELIC_EURUS_WPA_PSK_PASSPHRASE = 0, /* passphrase string */
|
|
GELIC_EURUS_WPA_PSK_BIN = 1, /* 32 bytes binary key */
|
|
};
|
|
|
|
#define GELIC_WL_EURUS_PSK_MAX_LEN 64
|
|
#define WPA_PSK_LEN 32 /* WPA spec says 256bit */
|
|
|
|
struct gelic_eurus_wpa_cfg {
|
|
/* all fields are big endian */
|
|
u16 security;
|
|
u16 psk_type; /* psk key encoding type */
|
|
u8 psk[GELIC_WL_EURUS_PSK_MAX_LEN]; /* psk key; hex or passphrase */
|
|
} __attribute__((packed));
|
|
|
|
/* for GELIC_EURUS_CMD_{START,GET}_SCAN */
|
|
enum gelic_eurus_scan_capability {
|
|
GELIC_EURUS_SCAN_CAP_ADHOC = 0x0000,
|
|
GELIC_EURUS_SCAN_CAP_INFRA = 0x0001,
|
|
GELIC_EURUS_SCAN_CAP_MASK = 0x0001,
|
|
};
|
|
|
|
enum gelic_eurus_scan_sec_type {
|
|
GELIC_EURUS_SCAN_SEC_NONE = 0x0000,
|
|
GELIC_EURUS_SCAN_SEC_WEP = 0x0100,
|
|
GELIC_EURUS_SCAN_SEC_WPA = 0x0200,
|
|
GELIC_EURUS_SCAN_SEC_WPA2 = 0x0400,
|
|
GELIC_EURUS_SCAN_SEC_MASK = 0x0f00,
|
|
};
|
|
|
|
enum gelic_eurus_scan_sec_wep_type {
|
|
GELIC_EURUS_SCAN_SEC_WEP_UNKNOWN = 0x0000,
|
|
GELIC_EURUS_SCAN_SEC_WEP_40 = 0x0001,
|
|
GELIC_EURUS_SCAN_SEC_WEP_104 = 0x0002,
|
|
GELIC_EURUS_SCAN_SEC_WEP_MASK = 0x0003,
|
|
};
|
|
|
|
enum gelic_eurus_scan_sec_wpa_type {
|
|
GELIC_EURUS_SCAN_SEC_WPA_UNKNOWN = 0x0000,
|
|
GELIC_EURUS_SCAN_SEC_WPA_TKIP = 0x0001,
|
|
GELIC_EURUS_SCAN_SEC_WPA_AES = 0x0002,
|
|
GELIC_EURUS_SCAN_SEC_WPA_MASK = 0x0003,
|
|
};
|
|
|
|
/*
|
|
* hw BSS information structure returned from GELIC_EURUS_CMD_GET_SCAN
|
|
*/
|
|
struct gelic_eurus_scan_info {
|
|
/* all fields are big endian */
|
|
__be16 size;
|
|
__be16 rssi; /* percentage */
|
|
__be16 channel; /* channel number */
|
|
__be16 beacon_period; /* FIXME: in msec unit */
|
|
__be16 capability;
|
|
__be16 security;
|
|
u8 bssid[8]; /* last ETH_ALEN are valid. bssid[0],[1] are unused */
|
|
u8 essid[32]; /* IW_ESSID_MAX_SIZE */
|
|
u8 rate[16]; /* first 12 are valid */
|
|
u8 ext_rate[16]; /* first 16 are valid */
|
|
__be32 reserved1;
|
|
__be32 reserved2;
|
|
__be32 reserved3;
|
|
__be32 reserved4;
|
|
u8 elements[0]; /* ie */
|
|
} __attribute__ ((packed));
|
|
|
|
/* the hypervisor returns bbs up to 16 */
|
|
#define GELIC_EURUS_MAX_SCAN (16)
|
|
struct gelic_wl_scan_info {
|
|
struct list_head list;
|
|
struct gelic_eurus_scan_info *hwinfo;
|
|
|
|
int valid; /* set 1 if this entry was in latest scanned list
|
|
* from Eurus */
|
|
unsigned int eurus_index; /* index in the Eurus list */
|
|
unsigned long last_scanned; /* acquired time */
|
|
|
|
unsigned int rate_len;
|
|
unsigned int rate_ext_len;
|
|
unsigned int essid_len;
|
|
};
|
|
|
|
/* for GELIC_EURUS_CMD_GET_RSSI */
|
|
struct gelic_eurus_rssi_info {
|
|
/* big endian */
|
|
__be16 rssi;
|
|
} __attribute__ ((packed));
|
|
|
|
|
|
/* for 'stat' member of gelic_wl_info */
|
|
enum gelic_wl_info_status_bit {
|
|
GELIC_WL_STAT_CONFIGURED,
|
|
GELIC_WL_STAT_CH_INFO, /* ch info aquired */
|
|
GELIC_WL_STAT_ESSID_SET, /* ESSID specified by userspace */
|
|
GELIC_WL_STAT_BSSID_SET, /* BSSID specified by userspace */
|
|
GELIC_WL_STAT_WPA_PSK_SET, /* PMK specified by userspace */
|
|
GELIC_WL_STAT_WPA_LEVEL_SET, /* WEP or WPA[2] selected */
|
|
};
|
|
|
|
/* for 'scan_stat' member of gelic_wl_info */
|
|
enum gelic_wl_scan_state {
|
|
/* just initialized or get last scan result failed */
|
|
GELIC_WL_SCAN_STAT_INIT,
|
|
/* scan request issued, accepted or chip is scanning */
|
|
GELIC_WL_SCAN_STAT_SCANNING,
|
|
/* scan results retrieved */
|
|
GELIC_WL_SCAN_STAT_GOT_LIST,
|
|
};
|
|
|
|
/* for 'cipher_method' */
|
|
enum gelic_wl_cipher_method {
|
|
GELIC_WL_CIPHER_NONE,
|
|
GELIC_WL_CIPHER_WEP,
|
|
GELIC_WL_CIPHER_TKIP,
|
|
GELIC_WL_CIPHER_AES,
|
|
};
|
|
|
|
/* for 'wpa_level' */
|
|
enum gelic_wl_wpa_level {
|
|
GELIC_WL_WPA_LEVEL_NONE,
|
|
GELIC_WL_WPA_LEVEL_WPA,
|
|
GELIC_WL_WPA_LEVEL_WPA2,
|
|
};
|
|
|
|
/* for 'assoc_stat' */
|
|
enum gelic_wl_assoc_state {
|
|
GELIC_WL_ASSOC_STAT_DISCONN,
|
|
GELIC_WL_ASSOC_STAT_ASSOCIATING,
|
|
GELIC_WL_ASSOC_STAT_ASSOCIATED,
|
|
};
|
|
/* part of private data alloc_etherdev() allocated */
|
|
#define GELIC_WEP_KEYS 4
|
|
struct gelic_wl_info {
|
|
/* bss list */
|
|
struct mutex scan_lock;
|
|
struct list_head network_list;
|
|
struct list_head network_free_list;
|
|
struct gelic_wl_scan_info *networks;
|
|
|
|
unsigned long scan_age; /* last scanned time */
|
|
enum gelic_wl_scan_state scan_stat;
|
|
struct completion scan_done;
|
|
|
|
/* eurus command queue */
|
|
struct workqueue_struct *eurus_cmd_queue;
|
|
struct completion cmd_done_intr;
|
|
|
|
/* eurus event handling */
|
|
struct workqueue_struct *event_queue;
|
|
struct delayed_work event_work;
|
|
|
|
/* wl status bits */
|
|
unsigned long stat;
|
|
enum gelic_eurus_auth_method auth_method; /* open/shared */
|
|
enum gelic_wl_cipher_method group_cipher_method;
|
|
enum gelic_wl_cipher_method pairwise_cipher_method;
|
|
enum gelic_wl_wpa_level wpa_level; /* wpa/wpa2 */
|
|
|
|
/* association handling */
|
|
struct mutex assoc_stat_lock;
|
|
struct delayed_work assoc_work;
|
|
enum gelic_wl_assoc_state assoc_stat;
|
|
struct completion assoc_done;
|
|
|
|
spinlock_t lock;
|
|
u16 ch_info; /* available channels. bit0 = ch1 */
|
|
/* WEP keys */
|
|
u8 key[GELIC_WEP_KEYS][IW_ENCODING_TOKEN_MAX];
|
|
unsigned long key_enabled;
|
|
unsigned int key_len[GELIC_WEP_KEYS];
|
|
unsigned int current_key;
|
|
/* WWPA PSK */
|
|
u8 psk[GELIC_WL_EURUS_PSK_MAX_LEN];
|
|
enum gelic_eurus_wpa_psk_type psk_type;
|
|
unsigned int psk_len;
|
|
|
|
u8 essid[IW_ESSID_MAX_SIZE];
|
|
u8 bssid[ETH_ALEN]; /* userland requested */
|
|
u8 active_bssid[ETH_ALEN]; /* associated bssid */
|
|
unsigned int essid_len;
|
|
|
|
struct iw_public_data wireless_data;
|
|
struct iw_statistics iwstat;
|
|
};
|
|
|
|
#define GELIC_WL_BSS_MAX_ENT 32
|
|
#define GELIC_WL_ASSOC_RETRY 50
|
|
static inline struct gelic_port *wl_port(struct gelic_wl_info *wl)
|
|
{
|
|
return container_of((void *)wl, struct gelic_port, priv);
|
|
}
|
|
static inline struct gelic_wl_info *port_wl(struct gelic_port *port)
|
|
{
|
|
return port_priv(port);
|
|
}
|
|
|
|
struct gelic_eurus_cmd {
|
|
struct work_struct work;
|
|
struct gelic_wl_info *wl;
|
|
unsigned int cmd; /* command code */
|
|
u64 tag;
|
|
u64 size;
|
|
void *buffer;
|
|
unsigned int buf_size;
|
|
struct completion done;
|
|
int status;
|
|
u64 cmd_status;
|
|
};
|
|
|
|
/* private ioctls to pass PSK */
|
|
#define GELIC_WL_PRIV_SET_PSK (SIOCIWFIRSTPRIV + 0)
|
|
#define GELIC_WL_PRIV_GET_PSK (SIOCIWFIRSTPRIV + 1)
|
|
|
|
extern int gelic_wl_driver_probe(struct gelic_card *card);
|
|
extern int gelic_wl_driver_remove(struct gelic_card *card);
|
|
extern void gelic_wl_interrupt(struct net_device *netdev, u64 status);
|
|
#endif /* _GELIC_WIRELESS_H */
|