[PATCH] files: lock-free fd look-up
[deliverable/linux.git] / net / ieee80211 / ieee80211_rx.c
CommitLineData
b453872c
JG
1/*
2 * Original code based Host AP (software wireless LAN access point) driver
3 * for Intersil Prism2/2.5/3 - hostap.o module, common routines
4 *
5 * Copyright (c) 2001-2002, SSH Communications Security Corp and Jouni Malinen
6 * <jkmaline@cc.hut.fi>
7 * Copyright (c) 2002-2003, Jouni Malinen <jkmaline@cc.hut.fi>
8 * Copyright (c) 2004, Intel Corporation
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License version 2 as
12 * published by the Free Software Foundation. See README and COPYING for
13 * more details.
14 */
15
16#include <linux/compiler.h>
17#include <linux/config.h>
18#include <linux/errno.h>
19#include <linux/if_arp.h>
20#include <linux/in6.h>
21#include <linux/in.h>
22#include <linux/ip.h>
23#include <linux/kernel.h>
24#include <linux/module.h>
25#include <linux/netdevice.h>
b453872c
JG
26#include <linux/proc_fs.h>
27#include <linux/skbuff.h>
28#include <linux/slab.h>
29#include <linux/tcp.h>
30#include <linux/types.h>
31#include <linux/version.h>
32#include <linux/wireless.h>
33#include <linux/etherdevice.h>
34#include <asm/uaccess.h>
35#include <linux/ctype.h>
36
37#include <net/ieee80211.h>
38
39static inline void ieee80211_monitor_rx(struct ieee80211_device *ieee,
40 struct sk_buff *skb,
41 struct ieee80211_rx_stats *rx_stats)
42{
43 struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
44 u16 fc = le16_to_cpu(hdr->frame_ctl);
45
46 skb->dev = ieee->dev;
47 skb->mac.raw = skb->data;
48 skb_pull(skb, ieee80211_get_hdrlen(fc));
49 skb->pkt_type = PACKET_OTHERHOST;
50 skb->protocol = __constant_htons(ETH_P_80211_RAW);
51 memset(skb->cb, 0, sizeof(skb->cb));
52 netif_rx(skb);
53}
54
b453872c 55/* Called only as a tasklet (software IRQ) */
0edd5b44
JG
56static struct ieee80211_frag_entry *ieee80211_frag_cache_find(struct
57 ieee80211_device
58 *ieee,
59 unsigned int seq,
60 unsigned int frag,
61 u8 * src,
62 u8 * dst)
b453872c
JG
63{
64 struct ieee80211_frag_entry *entry;
65 int i;
66
67 for (i = 0; i < IEEE80211_FRAG_CACHE_LEN; i++) {
68 entry = &ieee->frag_cache[i];
69 if (entry->skb != NULL &&
70 time_after(jiffies, entry->first_frag_time + 2 * HZ)) {
0edd5b44
JG
71 IEEE80211_DEBUG_FRAG("expiring fragment cache entry "
72 "seq=%u last_frag=%u\n",
73 entry->seq, entry->last_frag);
b453872c
JG
74 dev_kfree_skb_any(entry->skb);
75 entry->skb = NULL;
76 }
77
78 if (entry->skb != NULL && entry->seq == seq &&
79 (entry->last_frag + 1 == frag || frag == -1) &&
80 memcmp(entry->src_addr, src, ETH_ALEN) == 0 &&
81 memcmp(entry->dst_addr, dst, ETH_ALEN) == 0)
82 return entry;
83 }
84
85 return NULL;
86}
87
88/* Called only as a tasklet (software IRQ) */
0edd5b44
JG
89static struct sk_buff *ieee80211_frag_cache_get(struct ieee80211_device *ieee,
90 struct ieee80211_hdr *hdr)
b453872c
JG
91{
92 struct sk_buff *skb = NULL;
93 u16 sc;
94 unsigned int frag, seq;
95 struct ieee80211_frag_entry *entry;
96
97 sc = le16_to_cpu(hdr->seq_ctl);
98 frag = WLAN_GET_SEQ_FRAG(sc);
99 seq = WLAN_GET_SEQ_SEQ(sc);
100
101 if (frag == 0) {
102 /* Reserve enough space to fit maximum frame length */
103 skb = dev_alloc_skb(ieee->dev->mtu +
104 sizeof(struct ieee80211_hdr) +
0edd5b44
JG
105 8 /* LLC */ +
106 2 /* alignment */ +
107 8 /* WEP */ + ETH_ALEN /* WDS */ );
b453872c
JG
108 if (skb == NULL)
109 return NULL;
110
111 entry = &ieee->frag_cache[ieee->frag_next_idx];
112 ieee->frag_next_idx++;
113 if (ieee->frag_next_idx >= IEEE80211_FRAG_CACHE_LEN)
114 ieee->frag_next_idx = 0;
115
116 if (entry->skb != NULL)
117 dev_kfree_skb_any(entry->skb);
118
119 entry->first_frag_time = jiffies;
120 entry->seq = seq;
121 entry->last_frag = frag;
122 entry->skb = skb;
123 memcpy(entry->src_addr, hdr->addr2, ETH_ALEN);
124 memcpy(entry->dst_addr, hdr->addr1, ETH_ALEN);
125 } else {
126 /* received a fragment of a frame for which the head fragment
127 * should have already been received */
128 entry = ieee80211_frag_cache_find(ieee, seq, frag, hdr->addr2,
129 hdr->addr1);
130 if (entry != NULL) {
131 entry->last_frag = frag;
132 skb = entry->skb;
133 }
134 }
135
136 return skb;
137}
138
b453872c
JG
139/* Called only as a tasklet (software IRQ) */
140static int ieee80211_frag_cache_invalidate(struct ieee80211_device *ieee,
141 struct ieee80211_hdr *hdr)
142{
143 u16 sc;
144 unsigned int seq;
145 struct ieee80211_frag_entry *entry;
146
147 sc = le16_to_cpu(hdr->seq_ctl);
148 seq = WLAN_GET_SEQ_SEQ(sc);
149
150 entry = ieee80211_frag_cache_find(ieee, seq, -1, hdr->addr2,
151 hdr->addr1);
152
153 if (entry == NULL) {
0edd5b44
JG
154 IEEE80211_DEBUG_FRAG("could not invalidate fragment cache "
155 "entry (seq=%u)\n", seq);
b453872c
JG
156 return -1;
157 }
158
159 entry->skb = NULL;
160 return 0;
161}
162
b453872c
JG
163#ifdef NOT_YET
164/* ieee80211_rx_frame_mgtmt
165 *
166 * Responsible for handling management control frames
167 *
168 * Called by ieee80211_rx */
169static inline int
170ieee80211_rx_frame_mgmt(struct ieee80211_device *ieee, struct sk_buff *skb,
171 struct ieee80211_rx_stats *rx_stats, u16 type,
172 u16 stype)
173{
174 if (ieee->iw_mode == IW_MODE_MASTER) {
175 printk(KERN_DEBUG "%s: Master mode not yet suppported.\n",
176 ieee->dev->name);
177 return 0;
178/*
179 hostap_update_sta_ps(ieee, (struct hostap_ieee80211_hdr *)
180 skb->data);*/
181 }
182
183 if (ieee->hostapd && type == WLAN_FC_TYPE_MGMT) {
184 if (stype == WLAN_FC_STYPE_BEACON &&
185 ieee->iw_mode == IW_MODE_MASTER) {
186 struct sk_buff *skb2;
187 /* Process beacon frames also in kernel driver to
188 * update STA(AP) table statistics */
189 skb2 = skb_clone(skb, GFP_ATOMIC);
190 if (skb2)
191 hostap_rx(skb2->dev, skb2, rx_stats);
192 }
193
194 /* send management frames to the user space daemon for
195 * processing */
196 ieee->apdevstats.rx_packets++;
197 ieee->apdevstats.rx_bytes += skb->len;
198 prism2_rx_80211(ieee->apdev, skb, rx_stats, PRISM2_RX_MGMT);
199 return 0;
200 }
201
0edd5b44 202 if (ieee->iw_mode == IW_MODE_MASTER) {
b453872c
JG
203 if (type != WLAN_FC_TYPE_MGMT && type != WLAN_FC_TYPE_CTRL) {
204 printk(KERN_DEBUG "%s: unknown management frame "
205 "(type=0x%02x, stype=0x%02x) dropped\n",
206 skb->dev->name, type, stype);
207 return -1;
208 }
209
210 hostap_rx(skb->dev, skb, rx_stats);
211 return 0;
212 }
213
214 printk(KERN_DEBUG "%s: hostap_rx_frame_mgmt: management frame "
215 "received in non-Host AP mode\n", skb->dev->name);
216 return -1;
217}
218#endif
219
b453872c
JG
220/* See IEEE 802.1H for LLC/SNAP encapsulation/decapsulation */
221/* Ethernet-II snap header (RFC1042 for most EtherTypes) */
0edd5b44
JG
222static unsigned char rfc1042_header[] = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00 };
223
b453872c
JG
224/* Bridge-Tunnel header (for EtherTypes ETH_P_AARP and ETH_P_IPX) */
225static unsigned char bridge_tunnel_header[] =
0edd5b44 226 { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0xf8 };
b453872c
JG
227/* No encapsulation header if EtherType < 0x600 (=length) */
228
229/* Called by ieee80211_rx_frame_decrypt */
230static int ieee80211_is_eapol_frame(struct ieee80211_device *ieee,
231 struct sk_buff *skb)
232{
233 struct net_device *dev = ieee->dev;
234 u16 fc, ethertype;
235 struct ieee80211_hdr *hdr;
236 u8 *pos;
237
238 if (skb->len < 24)
239 return 0;
240
0edd5b44 241 hdr = (struct ieee80211_hdr *)skb->data;
b453872c
JG
242 fc = le16_to_cpu(hdr->frame_ctl);
243
244 /* check that the frame is unicast frame to us */
245 if ((fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
246 IEEE80211_FCTL_TODS &&
247 memcmp(hdr->addr1, dev->dev_addr, ETH_ALEN) == 0 &&
248 memcmp(hdr->addr3, dev->dev_addr, ETH_ALEN) == 0) {
249 /* ToDS frame with own addr BSSID and DA */
250 } else if ((fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
251 IEEE80211_FCTL_FROMDS &&
252 memcmp(hdr->addr1, dev->dev_addr, ETH_ALEN) == 0) {
253 /* FromDS frame with own addr as DA */
254 } else
255 return 0;
256
257 if (skb->len < 24 + 8)
258 return 0;
259
260 /* check for port access entity Ethernet type */
261 pos = skb->data + 24;
262 ethertype = (pos[6] << 8) | pos[7];
263 if (ethertype == ETH_P_PAE)
264 return 1;
265
266 return 0;
267}
268
269/* Called only as a tasklet (software IRQ), by ieee80211_rx */
270static inline int
0edd5b44 271ieee80211_rx_frame_decrypt(struct ieee80211_device *ieee, struct sk_buff *skb,
b453872c
JG
272 struct ieee80211_crypt_data *crypt)
273{
274 struct ieee80211_hdr *hdr;
275 int res, hdrlen;
276
277 if (crypt == NULL || crypt->ops->decrypt_mpdu == NULL)
278 return 0;
279
0edd5b44 280 hdr = (struct ieee80211_hdr *)skb->data;
b453872c
JG
281 hdrlen = ieee80211_get_hdrlen(le16_to_cpu(hdr->frame_ctl));
282
283#ifdef CONFIG_IEEE80211_CRYPT_TKIP
0edd5b44 284 if (ieee->tkip_countermeasures && strcmp(crypt->ops->name, "TKIP") == 0) {
b453872c
JG
285 if (net_ratelimit()) {
286 printk(KERN_DEBUG "%s: TKIP countermeasures: dropped "
287 "received packet from " MAC_FMT "\n",
288 ieee->dev->name, MAC_ARG(hdr->addr2));
289 }
290 return -1;
291 }
292#endif
293
294 atomic_inc(&crypt->refcnt);
295 res = crypt->ops->decrypt_mpdu(skb, hdrlen, crypt->priv);
296 atomic_dec(&crypt->refcnt);
297 if (res < 0) {
0edd5b44
JG
298 IEEE80211_DEBUG_DROP("decryption failed (SA=" MAC_FMT
299 ") res=%d\n", MAC_ARG(hdr->addr2), res);
b453872c
JG
300 if (res == -2)
301 IEEE80211_DEBUG_DROP("Decryption failed ICV "
302 "mismatch (key %d)\n",
303 skb->data[hdrlen + 3] >> 6);
304 ieee->ieee_stats.rx_discards_undecryptable++;
305 return -1;
306 }
307
308 return res;
309}
310
b453872c
JG
311/* Called only as a tasklet (software IRQ), by ieee80211_rx */
312static inline int
0edd5b44
JG
313ieee80211_rx_frame_decrypt_msdu(struct ieee80211_device *ieee,
314 struct sk_buff *skb, int keyidx,
315 struct ieee80211_crypt_data *crypt)
b453872c
JG
316{
317 struct ieee80211_hdr *hdr;
318 int res, hdrlen;
319
320 if (crypt == NULL || crypt->ops->decrypt_msdu == NULL)
321 return 0;
322
0edd5b44 323 hdr = (struct ieee80211_hdr *)skb->data;
b453872c
JG
324 hdrlen = ieee80211_get_hdrlen(le16_to_cpu(hdr->frame_ctl));
325
326 atomic_inc(&crypt->refcnt);
327 res = crypt->ops->decrypt_msdu(skb, keyidx, hdrlen, crypt->priv);
328 atomic_dec(&crypt->refcnt);
329 if (res < 0) {
330 printk(KERN_DEBUG "%s: MSDU decryption/MIC verification failed"
331 " (SA=" MAC_FMT " keyidx=%d)\n",
332 ieee->dev->name, MAC_ARG(hdr->addr2), keyidx);
333 return -1;
334 }
335
336 return 0;
337}
338
b453872c
JG
339/* All received frames are sent to this function. @skb contains the frame in
340 * IEEE 802.11 format, i.e., in the format it was sent over air.
341 * This function is called only as a tasklet (software IRQ). */
342int ieee80211_rx(struct ieee80211_device *ieee, struct sk_buff *skb,
343 struct ieee80211_rx_stats *rx_stats)
344{
345 struct net_device *dev = ieee->dev;
346 struct ieee80211_hdr *hdr;
347 size_t hdrlen;
348 u16 fc, type, stype, sc;
349 struct net_device_stats *stats;
350 unsigned int frag;
351 u8 *payload;
352 u16 ethertype;
353#ifdef NOT_YET
354 struct net_device *wds = NULL;
355 struct sk_buff *skb2 = NULL;
356 struct net_device *wds = NULL;
357 int frame_authorized = 0;
358 int from_assoc_ap = 0;
359 void *sta = NULL;
360#endif
361 u8 dst[ETH_ALEN];
362 u8 src[ETH_ALEN];
363 struct ieee80211_crypt_data *crypt = NULL;
364 int keyidx = 0;
365
366 hdr = (struct ieee80211_hdr *)skb->data;
367 stats = &ieee->stats;
368
369 if (skb->len < 10) {
0edd5b44 370 printk(KERN_INFO "%s: SKB length < 10\n", dev->name);
b453872c
JG
371 goto rx_dropped;
372 }
373
374 fc = le16_to_cpu(hdr->frame_ctl);
375 type = WLAN_FC_GET_TYPE(fc);
376 stype = WLAN_FC_GET_STYPE(fc);
377 sc = le16_to_cpu(hdr->seq_ctl);
378 frag = WLAN_GET_SEQ_FRAG(sc);
379 hdrlen = ieee80211_get_hdrlen(fc);
380
381#ifdef NOT_YET
382#if WIRELESS_EXT > 15
383 /* Put this code here so that we avoid duplicating it in all
384 * Rx paths. - Jean II */
385#ifdef IW_WIRELESS_SPY /* defined in iw_handler.h */
386 /* If spy monitoring on */
387 if (iface->spy_data.spy_number > 0) {
388 struct iw_quality wstats;
389 wstats.level = rx_stats->signal;
390 wstats.noise = rx_stats->noise;
391 wstats.updated = 6; /* No qual value */
392 /* Update spy records */
393 wireless_spy_update(dev, hdr->addr2, &wstats);
394 }
0edd5b44
JG
395#endif /* IW_WIRELESS_SPY */
396#endif /* WIRELESS_EXT > 15 */
b453872c
JG
397 hostap_update_rx_stats(local->ap, hdr, rx_stats);
398#endif
399
400#if WIRELESS_EXT > 15
401 if (ieee->iw_mode == IW_MODE_MONITOR) {
402 ieee80211_monitor_rx(ieee, skb, rx_stats);
403 stats->rx_packets++;
404 stats->rx_bytes += skb->len;
405 return 1;
406 }
407#endif
408
409 if (ieee->host_decrypt) {
410 int idx = 0;
411 if (skb->len >= hdrlen + 3)
412 idx = skb->data[hdrlen + 3] >> 6;
413 crypt = ieee->crypt[idx];
414#ifdef NOT_YET
415 sta = NULL;
416
417 /* Use station specific key to override default keys if the
418 * receiver address is a unicast address ("individual RA"). If
419 * bcrx_sta_key parameter is set, station specific key is used
420 * even with broad/multicast targets (this is against IEEE
421 * 802.11, but makes it easier to use different keys with
422 * stations that do not support WEP key mapping). */
423
424 if (!(hdr->addr1[0] & 0x01) || local->bcrx_sta_key)
0edd5b44
JG
425 (void)hostap_handle_sta_crypto(local, hdr, &crypt,
426 &sta);
b453872c
JG
427#endif
428
429 /* allow NULL decrypt to indicate an station specific override
430 * for default encryption */
431 if (crypt && (crypt->ops == NULL ||
432 crypt->ops->decrypt_mpdu == NULL))
433 crypt = NULL;
434
f13baae4 435 if (!crypt && (fc & IEEE80211_FCTL_PROTECTED)) {
b453872c
JG
436 /* This seems to be triggered by some (multicast?)
437 * frames from other than current BSS, so just drop the
438 * frames silently instead of filling system log with
439 * these reports. */
440 IEEE80211_DEBUG_DROP("Decryption failed (not set)"
441 " (SA=" MAC_FMT ")\n",
442 MAC_ARG(hdr->addr2));
443 ieee->ieee_stats.rx_discards_undecryptable++;
444 goto rx_dropped;
445 }
446 }
b453872c
JG
447#ifdef NOT_YET
448 if (type != WLAN_FC_TYPE_DATA) {
449 if (type == WLAN_FC_TYPE_MGMT && stype == WLAN_FC_STYPE_AUTH &&
f13baae4 450 fc & IEEE80211_FCTL_PROTECTED && ieee->host_decrypt &&
0edd5b44 451 (keyidx = hostap_rx_frame_decrypt(ieee, skb, crypt)) < 0) {
b453872c
JG
452 printk(KERN_DEBUG "%s: failed to decrypt mgmt::auth "
453 "from " MAC_FMT "\n", dev->name,
454 MAC_ARG(hdr->addr2));
455 /* TODO: could inform hostapd about this so that it
456 * could send auth failure report */
457 goto rx_dropped;
458 }
459
460 if (ieee80211_rx_frame_mgmt(ieee, skb, rx_stats, type, stype))
461 goto rx_dropped;
462 else
463 goto rx_exit;
464 }
465#endif
466
467 /* Data frame - extract src/dst addresses */
286d9747 468 if (skb->len < IEEE80211_3ADDR_LEN)
b453872c
JG
469 goto rx_dropped;
470
471 switch (fc & (IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS)) {
472 case IEEE80211_FCTL_FROMDS:
473 memcpy(dst, hdr->addr1, ETH_ALEN);
474 memcpy(src, hdr->addr3, ETH_ALEN);
475 break;
476 case IEEE80211_FCTL_TODS:
477 memcpy(dst, hdr->addr3, ETH_ALEN);
478 memcpy(src, hdr->addr2, ETH_ALEN);
479 break;
480 case IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS:
286d9747 481 if (skb->len < IEEE80211_4ADDR_LEN)
b453872c
JG
482 goto rx_dropped;
483 memcpy(dst, hdr->addr3, ETH_ALEN);
484 memcpy(src, hdr->addr4, ETH_ALEN);
485 break;
486 case 0:
487 memcpy(dst, hdr->addr1, ETH_ALEN);
488 memcpy(src, hdr->addr2, ETH_ALEN);
489 break;
490 }
491
492#ifdef NOT_YET
493 if (hostap_rx_frame_wds(ieee, hdr, fc, &wds))
494 goto rx_dropped;
495 if (wds) {
496 skb->dev = dev = wds;
497 stats = hostap_get_stats(dev);
498 }
499
500 if (ieee->iw_mode == IW_MODE_MASTER && !wds &&
0edd5b44
JG
501 (fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
502 IEEE80211_FCTL_FROMDS && ieee->stadev
503 && memcmp(hdr->addr2, ieee->assoc_ap_addr, ETH_ALEN) == 0) {
b453872c
JG
504 /* Frame from BSSID of the AP for which we are a client */
505 skb->dev = dev = ieee->stadev;
506 stats = hostap_get_stats(dev);
507 from_assoc_ap = 1;
508 }
509#endif
510
511 dev->last_rx = jiffies;
512
513#ifdef NOT_YET
514 if ((ieee->iw_mode == IW_MODE_MASTER ||
0edd5b44 515 ieee->iw_mode == IW_MODE_REPEAT) && !from_assoc_ap) {
b453872c
JG
516 switch (hostap_handle_sta_rx(ieee, dev, skb, rx_stats,
517 wds != NULL)) {
518 case AP_RX_CONTINUE_NOT_AUTHORIZED:
519 frame_authorized = 0;
520 break;
521 case AP_RX_CONTINUE:
522 frame_authorized = 1;
523 break;
524 case AP_RX_DROP:
525 goto rx_dropped;
526 case AP_RX_EXIT:
527 goto rx_exit;
528 }
529 }
530#endif
531
532 /* Nullfunc frames may have PS-bit set, so they must be passed to
533 * hostap_handle_sta_rx() before being dropped here. */
534 if (stype != IEEE80211_STYPE_DATA &&
535 stype != IEEE80211_STYPE_DATA_CFACK &&
536 stype != IEEE80211_STYPE_DATA_CFPOLL &&
537 stype != IEEE80211_STYPE_DATA_CFACKPOLL) {
538 if (stype != IEEE80211_STYPE_NULLFUNC)
0edd5b44
JG
539 IEEE80211_DEBUG_DROP("RX: dropped data frame "
540 "with no data (type=0x%02x, "
541 "subtype=0x%02x, len=%d)\n",
542 type, stype, skb->len);
b453872c
JG
543 goto rx_dropped;
544 }
545
546 /* skb: hdr + (possibly fragmented, possibly encrypted) payload */
547
f13baae4 548 if (ieee->host_decrypt && (fc & IEEE80211_FCTL_PROTECTED) &&
b453872c
JG
549 (keyidx = ieee80211_rx_frame_decrypt(ieee, skb, crypt)) < 0)
550 goto rx_dropped;
551
0edd5b44 552 hdr = (struct ieee80211_hdr *)skb->data;
b453872c
JG
553
554 /* skb: hdr + (possibly fragmented) plaintext payload */
555 // PR: FIXME: hostap has additional conditions in the "if" below:
f13baae4 556 // ieee->host_decrypt && (fc & IEEE80211_FCTL_PROTECTED) &&
b453872c
JG
557 if ((frag != 0 || (fc & IEEE80211_FCTL_MOREFRAGS))) {
558 int flen;
559 struct sk_buff *frag_skb = ieee80211_frag_cache_get(ieee, hdr);
560 IEEE80211_DEBUG_FRAG("Rx Fragment received (%u)\n", frag);
561
562 if (!frag_skb) {
563 IEEE80211_DEBUG(IEEE80211_DL_RX | IEEE80211_DL_FRAG,
564 "Rx cannot get skb from fragment "
565 "cache (morefrag=%d seq=%u frag=%u)\n",
566 (fc & IEEE80211_FCTL_MOREFRAGS) != 0,
567 WLAN_GET_SEQ_SEQ(sc), frag);
568 goto rx_dropped;
569 }
570
571 flen = skb->len;
572 if (frag != 0)
573 flen -= hdrlen;
574
575 if (frag_skb->tail + flen > frag_skb->end) {
576 printk(KERN_WARNING "%s: host decrypted and "
577 "reassembled frame did not fit skb\n",
578 dev->name);
579 ieee80211_frag_cache_invalidate(ieee, hdr);
580 goto rx_dropped;
581 }
582
583 if (frag == 0) {
584 /* copy first fragment (including full headers) into
585 * beginning of the fragment cache skb */
586 memcpy(skb_put(frag_skb, flen), skb->data, flen);
587 } else {
588 /* append frame payload to the end of the fragment
589 * cache skb */
590 memcpy(skb_put(frag_skb, flen), skb->data + hdrlen,
591 flen);
592 }
593 dev_kfree_skb_any(skb);
594 skb = NULL;
595
596 if (fc & IEEE80211_FCTL_MOREFRAGS) {
597 /* more fragments expected - leave the skb in fragment
598 * cache for now; it will be delivered to upper layers
599 * after all fragments have been received */
600 goto rx_exit;
601 }
602
603 /* this was the last fragment and the frame will be
604 * delivered, so remove skb from fragment cache */
605 skb = frag_skb;
0edd5b44 606 hdr = (struct ieee80211_hdr *)skb->data;
b453872c
JG
607 ieee80211_frag_cache_invalidate(ieee, hdr);
608 }
609
610 /* skb: hdr + (possible reassembled) full MSDU payload; possibly still
611 * encrypted/authenticated */
f13baae4 612 if (ieee->host_decrypt && (fc & IEEE80211_FCTL_PROTECTED) &&
b453872c
JG
613 ieee80211_rx_frame_decrypt_msdu(ieee, skb, keyidx, crypt))
614 goto rx_dropped;
615
0edd5b44 616 hdr = (struct ieee80211_hdr *)skb->data;
f13baae4 617 if (crypt && !(fc & IEEE80211_FCTL_PROTECTED) && !ieee->open_wep) {
0edd5b44
JG
618 if ( /*ieee->ieee802_1x && */
619 ieee80211_is_eapol_frame(ieee, skb)) {
b453872c
JG
620 /* pass unencrypted EAPOL frames even if encryption is
621 * configured */
b453872c 622 } else {
0edd5b44
JG
623 IEEE80211_DEBUG_DROP("encryption configured, but RX "
624 "frame not encrypted (SA=" MAC_FMT
625 ")\n", MAC_ARG(hdr->addr2));
b453872c
JG
626 goto rx_dropped;
627 }
628 }
629
f13baae4 630 if (crypt && !(fc & IEEE80211_FCTL_PROTECTED) && !ieee->open_wep &&
b453872c 631 !ieee80211_is_eapol_frame(ieee, skb)) {
0edd5b44
JG
632 IEEE80211_DEBUG_DROP("dropped unencrypted RX data "
633 "frame from " MAC_FMT
634 " (drop_unencrypted=1)\n",
635 MAC_ARG(hdr->addr2));
b453872c
JG
636 goto rx_dropped;
637 }
638
639 /* skb: hdr + (possible reassembled) full plaintext payload */
640
641 payload = skb->data + hdrlen;
642 ethertype = (payload[6] << 8) | payload[7];
643
644#ifdef NOT_YET
645 /* If IEEE 802.1X is used, check whether the port is authorized to send
646 * the received frame. */
647 if (ieee->ieee802_1x && ieee->iw_mode == IW_MODE_MASTER) {
648 if (ethertype == ETH_P_PAE) {
649 printk(KERN_DEBUG "%s: RX: IEEE 802.1X frame\n",
650 dev->name);
651 if (ieee->hostapd && ieee->apdev) {
652 /* Send IEEE 802.1X frames to the user
653 * space daemon for processing */
654 prism2_rx_80211(ieee->apdev, skb, rx_stats,
655 PRISM2_RX_MGMT);
656 ieee->apdevstats.rx_packets++;
657 ieee->apdevstats.rx_bytes += skb->len;
658 goto rx_exit;
659 }
660 } else if (!frame_authorized) {
661 printk(KERN_DEBUG "%s: dropped frame from "
662 "unauthorized port (IEEE 802.1X): "
0edd5b44 663 "ethertype=0x%04x\n", dev->name, ethertype);
b453872c
JG
664 goto rx_dropped;
665 }
666 }
667#endif
668
669 /* convert hdr + possible LLC headers into Ethernet header */
670 if (skb->len - hdrlen >= 8 &&
671 ((memcmp(payload, rfc1042_header, SNAP_SIZE) == 0 &&
672 ethertype != ETH_P_AARP && ethertype != ETH_P_IPX) ||
673 memcmp(payload, bridge_tunnel_header, SNAP_SIZE) == 0)) {
674 /* remove RFC1042 or Bridge-Tunnel encapsulation and
675 * replace EtherType */
676 skb_pull(skb, hdrlen + SNAP_SIZE);
677 memcpy(skb_push(skb, ETH_ALEN), src, ETH_ALEN);
678 memcpy(skb_push(skb, ETH_ALEN), dst, ETH_ALEN);
679 } else {
680 u16 len;
681 /* Leave Ethernet header part of hdr and full payload */
682 skb_pull(skb, hdrlen);
683 len = htons(skb->len);
684 memcpy(skb_push(skb, 2), &len, 2);
685 memcpy(skb_push(skb, ETH_ALEN), src, ETH_ALEN);
686 memcpy(skb_push(skb, ETH_ALEN), dst, ETH_ALEN);
687 }
688
689#ifdef NOT_YET
690 if (wds && ((fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
0edd5b44 691 IEEE80211_FCTL_TODS) && skb->len >= ETH_HLEN + ETH_ALEN) {
b453872c
JG
692 /* Non-standard frame: get addr4 from its bogus location after
693 * the payload */
694 memcpy(skb->data + ETH_ALEN,
695 skb->data + skb->len - ETH_ALEN, ETH_ALEN);
696 skb_trim(skb, skb->len - ETH_ALEN);
697 }
698#endif
699
700 stats->rx_packets++;
701 stats->rx_bytes += skb->len;
702
703#ifdef NOT_YET
0edd5b44 704 if (ieee->iw_mode == IW_MODE_MASTER && !wds && ieee->ap->bridge_packets) {
b453872c
JG
705 if (dst[0] & 0x01) {
706 /* copy multicast frame both to the higher layers and
707 * to the wireless media */
708 ieee->ap->bridged_multicast++;
709 skb2 = skb_clone(skb, GFP_ATOMIC);
710 if (skb2 == NULL)
711 printk(KERN_DEBUG "%s: skb_clone failed for "
712 "multicast frame\n", dev->name);
713 } else if (hostap_is_sta_assoc(ieee->ap, dst)) {
714 /* send frame directly to the associated STA using
715 * wireless media and not passing to higher layers */
716 ieee->ap->bridged_unicast++;
717 skb2 = skb;
718 skb = NULL;
719 }
720 }
721
722 if (skb2 != NULL) {
723 /* send to wireless media */
724 skb2->protocol = __constant_htons(ETH_P_802_3);
725 skb2->mac.raw = skb2->nh.raw = skb2->data;
726 /* skb2->nh.raw = skb2->data + ETH_HLEN; */
727 skb2->dev = dev;
728 dev_queue_xmit(skb2);
729 }
b453872c
JG
730#endif
731
732 if (skb) {
733 skb->protocol = eth_type_trans(skb, dev);
734 memset(skb->cb, 0, sizeof(skb->cb));
735 skb->dev = dev;
0edd5b44 736 skb->ip_summed = CHECKSUM_NONE; /* 802.11 crc not sufficient */
b453872c
JG
737 netif_rx(skb);
738 }
739
0edd5b44 740 rx_exit:
b453872c
JG
741#ifdef NOT_YET
742 if (sta)
743 hostap_handle_sta_release(sta);
744#endif
745 return 1;
746
0edd5b44 747 rx_dropped:
b453872c
JG
748 stats->rx_dropped++;
749
750 /* Returning 0 indicates to caller that we have not handled the SKB--
751 * so it is still allocated and can be used again by underlying
752 * hardware as a DMA target */
753 return 0;
754}
755
756#define MGMT_FRAME_FIXED_PART_LENGTH 0x24
757
758static inline int ieee80211_is_ofdm_rate(u8 rate)
759{
760 switch (rate & ~IEEE80211_BASIC_RATE_MASK) {
761 case IEEE80211_OFDM_RATE_6MB:
762 case IEEE80211_OFDM_RATE_9MB:
763 case IEEE80211_OFDM_RATE_12MB:
764 case IEEE80211_OFDM_RATE_18MB:
765 case IEEE80211_OFDM_RATE_24MB:
766 case IEEE80211_OFDM_RATE_36MB:
767 case IEEE80211_OFDM_RATE_48MB:
768 case IEEE80211_OFDM_RATE_54MB:
769 return 1;
770 }
0edd5b44 771 return 0;
b453872c
JG
772}
773
0edd5b44
JG
774static inline int ieee80211_network_init(struct ieee80211_device *ieee,
775 struct ieee80211_probe_response
776 *beacon,
777 struct ieee80211_network *network,
778 struct ieee80211_rx_stats *stats)
b453872c
JG
779{
780#ifdef CONFIG_IEEE80211_DEBUG
781 char rates_str[64];
782 char *p;
783#endif
784 struct ieee80211_info_element *info_element;
0edd5b44 785 u16 left;
b453872c
JG
786 u8 i;
787
788 /* Pull out fixed field data */
789 memcpy(network->bssid, beacon->header.addr3, ETH_ALEN);
790 network->capability = beacon->capability;
791 network->last_scanned = jiffies;
792 network->time_stamp[0] = beacon->time_stamp[0];
793 network->time_stamp[1] = beacon->time_stamp[1];
794 network->beacon_interval = beacon->beacon_interval;
0edd5b44 795 /* Where to pull this? beacon->listen_interval; */
b453872c
JG
796 network->listen_interval = 0x0A;
797 network->rates_len = network->rates_ex_len = 0;
798 network->last_associate = 0;
799 network->ssid_len = 0;
800 network->flags = 0;
801 network->atim_window = 0;
802
803 if (stats->freq == IEEE80211_52GHZ_BAND) {
804 /* for A band (No DS info) */
805 network->channel = stats->received_channel;
806 } else
807 network->flags |= NETWORK_HAS_CCK;
808
0edd5b44
JG
809 network->wpa_ie_len = 0;
810 network->rsn_ie_len = 0;
b453872c 811
0edd5b44 812 info_element = &beacon->info_element;
b453872c
JG
813 left = stats->len - ((void *)info_element - (void *)beacon);
814 while (left >= sizeof(struct ieee80211_info_element_hdr)) {
0edd5b44
JG
815 if (sizeof(struct ieee80211_info_element_hdr) +
816 info_element->len > left) {
817 IEEE80211_DEBUG_SCAN
818 ("SCAN: parse failed: info_element->len + 2 > left : info_element->len+2=%Zd left=%d.\n",
819 info_element->len +
820 sizeof(struct ieee80211_info_element), left);
b453872c 821 return 1;
0edd5b44 822 }
b453872c
JG
823
824 switch (info_element->id) {
825 case MFIE_TYPE_SSID:
826 if (ieee80211_is_empty_essid(info_element->data,
827 info_element->len)) {
828 network->flags |= NETWORK_EMPTY_ESSID;
829 break;
830 }
831
832 network->ssid_len = min(info_element->len,
0edd5b44
JG
833 (u8) IW_ESSID_MAX_SIZE);
834 memcpy(network->ssid, info_element->data,
835 network->ssid_len);
836 if (network->ssid_len < IW_ESSID_MAX_SIZE)
837 memset(network->ssid + network->ssid_len, 0,
b453872c
JG
838 IW_ESSID_MAX_SIZE - network->ssid_len);
839
840 IEEE80211_DEBUG_SCAN("MFIE_TYPE_SSID: '%s' len=%d.\n",
841 network->ssid, network->ssid_len);
842 break;
843
844 case MFIE_TYPE_RATES:
845#ifdef CONFIG_IEEE80211_DEBUG
846 p = rates_str;
847#endif
0edd5b44
JG
848 network->rates_len =
849 min(info_element->len, MAX_RATES_LENGTH);
b453872c
JG
850 for (i = 0; i < network->rates_len; i++) {
851 network->rates[i] = info_element->data[i];
852#ifdef CONFIG_IEEE80211_DEBUG
0edd5b44
JG
853 p += snprintf(p,
854 sizeof(rates_str) - (p -
855 rates_str),
856 "%02X ", network->rates[i]);
b453872c 857#endif
0edd5b44
JG
858 if (ieee80211_is_ofdm_rate
859 (info_element->data[i])) {
b453872c
JG
860 network->flags |= NETWORK_HAS_OFDM;
861 if (info_element->data[i] &
862 IEEE80211_BASIC_RATE_MASK)
863 network->flags &=
0edd5b44 864 ~NETWORK_HAS_CCK;
b453872c
JG
865 }
866 }
867
868 IEEE80211_DEBUG_SCAN("MFIE_TYPE_RATES: '%s' (%d)\n",
869 rates_str, network->rates_len);
870 break;
871
872 case MFIE_TYPE_RATES_EX:
873#ifdef CONFIG_IEEE80211_DEBUG
874 p = rates_str;
875#endif
0edd5b44
JG
876 network->rates_ex_len =
877 min(info_element->len, MAX_RATES_EX_LENGTH);
b453872c
JG
878 for (i = 0; i < network->rates_ex_len; i++) {
879 network->rates_ex[i] = info_element->data[i];
880#ifdef CONFIG_IEEE80211_DEBUG
0edd5b44
JG
881 p += snprintf(p,
882 sizeof(rates_str) - (p -
883 rates_str),
884 "%02X ", network->rates[i]);
b453872c 885#endif
0edd5b44
JG
886 if (ieee80211_is_ofdm_rate
887 (info_element->data[i])) {
b453872c
JG
888 network->flags |= NETWORK_HAS_OFDM;
889 if (info_element->data[i] &
890 IEEE80211_BASIC_RATE_MASK)
891 network->flags &=
0edd5b44 892 ~NETWORK_HAS_CCK;
b453872c
JG
893 }
894 }
895
896 IEEE80211_DEBUG_SCAN("MFIE_TYPE_RATES_EX: '%s' (%d)\n",
897 rates_str, network->rates_ex_len);
898 break;
899
900 case MFIE_TYPE_DS_SET:
0edd5b44 901 IEEE80211_DEBUG_SCAN("MFIE_TYPE_DS_SET: %d\n",
b453872c
JG
902 info_element->data[0]);
903 if (stats->freq == IEEE80211_24GHZ_BAND)
904 network->channel = info_element->data[0];
905 break;
906
0edd5b44
JG
907 case MFIE_TYPE_FH_SET:
908 IEEE80211_DEBUG_SCAN("MFIE_TYPE_FH_SET: ignored\n");
b453872c
JG
909 break;
910
911 case MFIE_TYPE_CF_SET:
912 IEEE80211_DEBUG_SCAN("MFIE_TYPE_CF_SET: ignored\n");
913 break;
914
915 case MFIE_TYPE_TIM:
916 IEEE80211_DEBUG_SCAN("MFIE_TYPE_TIM: ignored\n");
917 break;
918
919 case MFIE_TYPE_IBSS_SET:
920 IEEE80211_DEBUG_SCAN("MFIE_TYPE_IBSS_SET: ignored\n");
921 break;
922
923 case MFIE_TYPE_CHALLENGE:
924 IEEE80211_DEBUG_SCAN("MFIE_TYPE_CHALLENGE: ignored\n");
925 break;
926
927 case MFIE_TYPE_GENERIC:
928 IEEE80211_DEBUG_SCAN("MFIE_TYPE_GENERIC: %d bytes\n",
929 info_element->len);
0edd5b44 930 if (info_element->len >= 4 &&
b453872c
JG
931 info_element->data[0] == 0x00 &&
932 info_element->data[1] == 0x50 &&
933 info_element->data[2] == 0xf2 &&
934 info_element->data[3] == 0x01) {
935 network->wpa_ie_len = min(info_element->len + 2,
0edd5b44 936 MAX_WPA_IE_LEN);
b453872c
JG
937 memcpy(network->wpa_ie, info_element,
938 network->wpa_ie_len);
939 }
940 break;
941
942 case MFIE_TYPE_RSN:
943 IEEE80211_DEBUG_SCAN("MFIE_TYPE_RSN: %d bytes\n",
944 info_element->len);
945 network->rsn_ie_len = min(info_element->len + 2,
0edd5b44 946 MAX_WPA_IE_LEN);
b453872c
JG
947 memcpy(network->rsn_ie, info_element,
948 network->rsn_ie_len);
949 break;
950
951 default:
952 IEEE80211_DEBUG_SCAN("unsupported IE %d\n",
953 info_element->id);
0edd5b44
JG
954 break;
955 }
b453872c
JG
956
957 left -= sizeof(struct ieee80211_info_element_hdr) +
0edd5b44 958 info_element->len;
b453872c 959 info_element = (struct ieee80211_info_element *)
0edd5b44
JG
960 &info_element->data[info_element->len];
961 }
b453872c
JG
962
963 network->mode = 0;
964 if (stats->freq == IEEE80211_52GHZ_BAND)
965 network->mode = IEEE_A;
966 else {
967 if (network->flags & NETWORK_HAS_OFDM)
968 network->mode |= IEEE_G;
969 if (network->flags & NETWORK_HAS_CCK)
970 network->mode |= IEEE_B;
971 }
972
973 if (network->mode == 0) {
974 IEEE80211_DEBUG_SCAN("Filtered out '%s (" MAC_FMT ")' "
975 "network.\n",
976 escape_essid(network->ssid,
977 network->ssid_len),
978 MAC_ARG(network->bssid));
979 return 1;
980 }
981
982 if (ieee80211_is_empty_essid(network->ssid, network->ssid_len))
983 network->flags |= NETWORK_EMPTY_ESSID;
984
985 memcpy(&network->stats, stats, sizeof(network->stats));
986
987 return 0;
988}
989
990static inline int is_same_network(struct ieee80211_network *src,
991 struct ieee80211_network *dst)
992{
993 /* A network is only a duplicate if the channel, BSSID, and ESSID
994 * all match. We treat all <hidden> with the same BSSID and channel
995 * as one network */
996 return ((src->ssid_len == dst->ssid_len) &&
997 (src->channel == dst->channel) &&
998 !memcmp(src->bssid, dst->bssid, ETH_ALEN) &&
999 !memcmp(src->ssid, dst->ssid, src->ssid_len));
1000}
1001
1002static inline void update_network(struct ieee80211_network *dst,
1003 struct ieee80211_network *src)
1004{
1005 memcpy(&dst->stats, &src->stats, sizeof(struct ieee80211_rx_stats));
1006 dst->capability = src->capability;
1007 memcpy(dst->rates, src->rates, src->rates_len);
1008 dst->rates_len = src->rates_len;
1009 memcpy(dst->rates_ex, src->rates_ex, src->rates_ex_len);
1010 dst->rates_ex_len = src->rates_ex_len;
1011
1012 dst->mode = src->mode;
1013 dst->flags = src->flags;
1014 dst->time_stamp[0] = src->time_stamp[0];
1015 dst->time_stamp[1] = src->time_stamp[1];
1016
1017 dst->beacon_interval = src->beacon_interval;
1018 dst->listen_interval = src->listen_interval;
1019 dst->atim_window = src->atim_window;
1020
1021 memcpy(dst->wpa_ie, src->wpa_ie, src->wpa_ie_len);
1022 dst->wpa_ie_len = src->wpa_ie_len;
1023 memcpy(dst->rsn_ie, src->rsn_ie, src->rsn_ie_len);
1024 dst->rsn_ie_len = src->rsn_ie_len;
1025
1026 dst->last_scanned = jiffies;
1027 /* dst->last_associate is not overwritten */
1028}
1029
0edd5b44
JG
1030static inline void ieee80211_process_probe_response(struct ieee80211_device
1031 *ieee,
1032 struct
1033 ieee80211_probe_response
1034 *beacon,
1035 struct ieee80211_rx_stats
1036 *stats)
b453872c
JG
1037{
1038 struct ieee80211_network network;
1039 struct ieee80211_network *target;
1040 struct ieee80211_network *oldest = NULL;
1041#ifdef CONFIG_IEEE80211_DEBUG
1042 struct ieee80211_info_element *info_element = &beacon->info_element;
1043#endif
1044 unsigned long flags;
1045
0edd5b44
JG
1046 IEEE80211_DEBUG_SCAN("'%s' (" MAC_FMT
1047 "): %c%c%c%c %c%c%c%c-%c%c%c%c %c%c%c%c\n",
1048 escape_essid(info_element->data,
1049 info_element->len),
1050 MAC_ARG(beacon->header.addr3),
1051 (beacon->capability & (1 << 0xf)) ? '1' : '0',
1052 (beacon->capability & (1 << 0xe)) ? '1' : '0',
1053 (beacon->capability & (1 << 0xd)) ? '1' : '0',
1054 (beacon->capability & (1 << 0xc)) ? '1' : '0',
1055 (beacon->capability & (1 << 0xb)) ? '1' : '0',
1056 (beacon->capability & (1 << 0xa)) ? '1' : '0',
1057 (beacon->capability & (1 << 0x9)) ? '1' : '0',
1058 (beacon->capability & (1 << 0x8)) ? '1' : '0',
1059 (beacon->capability & (1 << 0x7)) ? '1' : '0',
1060 (beacon->capability & (1 << 0x6)) ? '1' : '0',
1061 (beacon->capability & (1 << 0x5)) ? '1' : '0',
1062 (beacon->capability & (1 << 0x4)) ? '1' : '0',
1063 (beacon->capability & (1 << 0x3)) ? '1' : '0',
1064 (beacon->capability & (1 << 0x2)) ? '1' : '0',
1065 (beacon->capability & (1 << 0x1)) ? '1' : '0',
1066 (beacon->capability & (1 << 0x0)) ? '1' : '0');
b453872c
JG
1067
1068 if (ieee80211_network_init(ieee, beacon, &network, stats)) {
1069 IEEE80211_DEBUG_SCAN("Dropped '%s' (" MAC_FMT ") via %s.\n",
1070 escape_essid(info_element->data,
1071 info_element->len),
1072 MAC_ARG(beacon->header.addr3),
0edd5b44
JG
1073 WLAN_FC_GET_STYPE(beacon->header.
1074 frame_ctl) ==
b453872c
JG
1075 IEEE80211_STYPE_PROBE_RESP ?
1076 "PROBE RESPONSE" : "BEACON");
1077 return;
1078 }
1079
1080 /* The network parsed correctly -- so now we scan our known networks
1081 * to see if we can find it in our list.
1082 *
1083 * NOTE: This search is definitely not optimized. Once its doing
1084 * the "right thing" we'll optimize it for efficiency if
1085 * necessary */
1086
1087 /* Search for this entry in the list and update it if it is
1088 * already there. */
1089
1090 spin_lock_irqsave(&ieee->lock, flags);
1091
1092 list_for_each_entry(target, &ieee->network_list, list) {
1093 if (is_same_network(target, &network))
1094 break;
1095
1096 if ((oldest == NULL) ||
1097 (target->last_scanned < oldest->last_scanned))
1098 oldest = target;
1099 }
1100
1101 /* If we didn't find a match, then get a new network slot to initialize
1102 * with this beacon's information */
1103 if (&target->list == &ieee->network_list) {
1104 if (list_empty(&ieee->network_free_list)) {
1105 /* If there are no more slots, expire the oldest */
1106 list_del(&oldest->list);
1107 target = oldest;
1108 IEEE80211_DEBUG_SCAN("Expired '%s' (" MAC_FMT ") from "
1109 "network list.\n",
1110 escape_essid(target->ssid,
1111 target->ssid_len),
1112 MAC_ARG(target->bssid));
1113 } else {
1114 /* Otherwise just pull from the free list */
1115 target = list_entry(ieee->network_free_list.next,
1116 struct ieee80211_network, list);
1117 list_del(ieee->network_free_list.next);
1118 }
1119
b453872c
JG
1120#ifdef CONFIG_IEEE80211_DEBUG
1121 IEEE80211_DEBUG_SCAN("Adding '%s' (" MAC_FMT ") via %s.\n",
1122 escape_essid(network.ssid,
1123 network.ssid_len),
1124 MAC_ARG(network.bssid),
0edd5b44
JG
1125 WLAN_FC_GET_STYPE(beacon->header.
1126 frame_ctl) ==
b453872c
JG
1127 IEEE80211_STYPE_PROBE_RESP ?
1128 "PROBE RESPONSE" : "BEACON");
1129#endif
1130 memcpy(target, &network, sizeof(*target));
1131 list_add_tail(&target->list, &ieee->network_list);
1132 } else {
1133 IEEE80211_DEBUG_SCAN("Updating '%s' (" MAC_FMT ") via %s.\n",
1134 escape_essid(target->ssid,
1135 target->ssid_len),
1136 MAC_ARG(target->bssid),
0edd5b44
JG
1137 WLAN_FC_GET_STYPE(beacon->header.
1138 frame_ctl) ==
b453872c
JG
1139 IEEE80211_STYPE_PROBE_RESP ?
1140 "PROBE RESPONSE" : "BEACON");
1141 update_network(target, &network);
1142 }
1143
1144 spin_unlock_irqrestore(&ieee->lock, flags);
1145}
1146
1147void ieee80211_rx_mgt(struct ieee80211_device *ieee,
1148 struct ieee80211_hdr *header,
1149 struct ieee80211_rx_stats *stats)
1150{
1151 switch (WLAN_FC_GET_STYPE(header->frame_ctl)) {
1152 case IEEE80211_STYPE_ASSOC_RESP:
1153 IEEE80211_DEBUG_MGMT("received ASSOCIATION RESPONSE (%d)\n",
1154 WLAN_FC_GET_STYPE(header->frame_ctl));
1155 break;
1156
1157 case IEEE80211_STYPE_REASSOC_RESP:
1158 IEEE80211_DEBUG_MGMT("received REASSOCIATION RESPONSE (%d)\n",
1159 WLAN_FC_GET_STYPE(header->frame_ctl));
1160 break;
1161
1162 case IEEE80211_STYPE_PROBE_RESP:
1163 IEEE80211_DEBUG_MGMT("received PROBE RESPONSE (%d)\n",
1164 WLAN_FC_GET_STYPE(header->frame_ctl));
1165 IEEE80211_DEBUG_SCAN("Probe response\n");
0edd5b44
JG
1166 ieee80211_process_probe_response(ieee,
1167 (struct
1168 ieee80211_probe_response *)
1169 header, stats);
b453872c
JG
1170 break;
1171
1172 case IEEE80211_STYPE_BEACON:
1173 IEEE80211_DEBUG_MGMT("received BEACON (%d)\n",
1174 WLAN_FC_GET_STYPE(header->frame_ctl));
1175 IEEE80211_DEBUG_SCAN("Beacon\n");
0edd5b44
JG
1176 ieee80211_process_probe_response(ieee,
1177 (struct
1178 ieee80211_probe_response *)
1179 header, stats);
b453872c
JG
1180 break;
1181
1182 default:
1183 IEEE80211_DEBUG_MGMT("received UNKNOWN (%d)\n",
1184 WLAN_FC_GET_STYPE(header->frame_ctl));
1185 IEEE80211_WARNING("%s: Unknown management packet: %d\n",
1186 ieee->dev->name,
1187 WLAN_FC_GET_STYPE(header->frame_ctl));
1188 break;
1189 }
1190}
1191
b453872c
JG
1192EXPORT_SYMBOL(ieee80211_rx_mgt);
1193EXPORT_SYMBOL(ieee80211_rx);
This page took 0.11715 seconds and 5 git commands to generate.