[PATCH] ieee80211 Added wireless spy support
[linux-2.6-block.git] / net / ieee80211 / ieee80211_rx.c
CommitLineData
b453872c
JG
1/*
2 * Original code based Host AP (software wireless LAN access point) driver
3 * for Intersil Prism2/2.5/3 - hostap.o module, common routines
4 *
5 * Copyright (c) 2001-2002, SSH Communications Security Corp and Jouni Malinen
6 * <jkmaline@cc.hut.fi>
7 * Copyright (c) 2002-2003, Jouni Malinen <jkmaline@cc.hut.fi>
8 * Copyright (c) 2004, Intel Corporation
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License version 2 as
12 * published by the Free Software Foundation. See README and COPYING for
13 * more details.
14 */
15
16#include <linux/compiler.h>
17#include <linux/config.h>
18#include <linux/errno.h>
19#include <linux/if_arp.h>
20#include <linux/in6.h>
21#include <linux/in.h>
22#include <linux/ip.h>
23#include <linux/kernel.h>
24#include <linux/module.h>
25#include <linux/netdevice.h>
b453872c
JG
26#include <linux/proc_fs.h>
27#include <linux/skbuff.h>
28#include <linux/slab.h>
29#include <linux/tcp.h>
30#include <linux/types.h>
31#include <linux/version.h>
32#include <linux/wireless.h>
33#include <linux/etherdevice.h>
34#include <asm/uaccess.h>
35#include <linux/ctype.h>
36
37#include <net/ieee80211.h>
38
39static inline void ieee80211_monitor_rx(struct ieee80211_device *ieee,
40 struct sk_buff *skb,
41 struct ieee80211_rx_stats *rx_stats)
42{
43 struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
44 u16 fc = le16_to_cpu(hdr->frame_ctl);
45
46 skb->dev = ieee->dev;
47 skb->mac.raw = skb->data;
48 skb_pull(skb, ieee80211_get_hdrlen(fc));
49 skb->pkt_type = PACKET_OTHERHOST;
50 skb->protocol = __constant_htons(ETH_P_80211_RAW);
51 memset(skb->cb, 0, sizeof(skb->cb));
52 netif_rx(skb);
53}
54
b453872c 55/* Called only as a tasklet (software IRQ) */
0edd5b44
JG
56static struct ieee80211_frag_entry *ieee80211_frag_cache_find(struct
57 ieee80211_device
58 *ieee,
59 unsigned int seq,
60 unsigned int frag,
61 u8 * src,
62 u8 * dst)
b453872c
JG
63{
64 struct ieee80211_frag_entry *entry;
65 int i;
66
67 for (i = 0; i < IEEE80211_FRAG_CACHE_LEN; i++) {
68 entry = &ieee->frag_cache[i];
69 if (entry->skb != NULL &&
70 time_after(jiffies, entry->first_frag_time + 2 * HZ)) {
0edd5b44
JG
71 IEEE80211_DEBUG_FRAG("expiring fragment cache entry "
72 "seq=%u last_frag=%u\n",
73 entry->seq, entry->last_frag);
b453872c
JG
74 dev_kfree_skb_any(entry->skb);
75 entry->skb = NULL;
76 }
77
78 if (entry->skb != NULL && entry->seq == seq &&
79 (entry->last_frag + 1 == frag || frag == -1) &&
80 memcmp(entry->src_addr, src, ETH_ALEN) == 0 &&
81 memcmp(entry->dst_addr, dst, ETH_ALEN) == 0)
82 return entry;
83 }
84
85 return NULL;
86}
87
88/* Called only as a tasklet (software IRQ) */
0edd5b44
JG
89static struct sk_buff *ieee80211_frag_cache_get(struct ieee80211_device *ieee,
90 struct ieee80211_hdr *hdr)
b453872c
JG
91{
92 struct sk_buff *skb = NULL;
93 u16 sc;
94 unsigned int frag, seq;
95 struct ieee80211_frag_entry *entry;
96
97 sc = le16_to_cpu(hdr->seq_ctl);
98 frag = WLAN_GET_SEQ_FRAG(sc);
99 seq = WLAN_GET_SEQ_SEQ(sc);
100
101 if (frag == 0) {
102 /* Reserve enough space to fit maximum frame length */
103 skb = dev_alloc_skb(ieee->dev->mtu +
104 sizeof(struct ieee80211_hdr) +
0edd5b44
JG
105 8 /* LLC */ +
106 2 /* alignment */ +
107 8 /* WEP */ + ETH_ALEN /* WDS */ );
b453872c
JG
108 if (skb == NULL)
109 return NULL;
110
111 entry = &ieee->frag_cache[ieee->frag_next_idx];
112 ieee->frag_next_idx++;
113 if (ieee->frag_next_idx >= IEEE80211_FRAG_CACHE_LEN)
114 ieee->frag_next_idx = 0;
115
116 if (entry->skb != NULL)
117 dev_kfree_skb_any(entry->skb);
118
119 entry->first_frag_time = jiffies;
120 entry->seq = seq;
121 entry->last_frag = frag;
122 entry->skb = skb;
123 memcpy(entry->src_addr, hdr->addr2, ETH_ALEN);
124 memcpy(entry->dst_addr, hdr->addr1, ETH_ALEN);
125 } else {
126 /* received a fragment of a frame for which the head fragment
127 * should have already been received */
128 entry = ieee80211_frag_cache_find(ieee, seq, frag, hdr->addr2,
129 hdr->addr1);
130 if (entry != NULL) {
131 entry->last_frag = frag;
132 skb = entry->skb;
133 }
134 }
135
136 return skb;
137}
138
b453872c
JG
139/* Called only as a tasklet (software IRQ) */
140static int ieee80211_frag_cache_invalidate(struct ieee80211_device *ieee,
141 struct ieee80211_hdr *hdr)
142{
143 u16 sc;
144 unsigned int seq;
145 struct ieee80211_frag_entry *entry;
146
147 sc = le16_to_cpu(hdr->seq_ctl);
148 seq = WLAN_GET_SEQ_SEQ(sc);
149
150 entry = ieee80211_frag_cache_find(ieee, seq, -1, hdr->addr2,
151 hdr->addr1);
152
153 if (entry == NULL) {
0edd5b44
JG
154 IEEE80211_DEBUG_FRAG("could not invalidate fragment cache "
155 "entry (seq=%u)\n", seq);
b453872c
JG
156 return -1;
157 }
158
159 entry->skb = NULL;
160 return 0;
161}
162
b453872c
JG
163#ifdef NOT_YET
164/* ieee80211_rx_frame_mgtmt
165 *
166 * Responsible for handling management control frames
167 *
168 * Called by ieee80211_rx */
169static inline int
170ieee80211_rx_frame_mgmt(struct ieee80211_device *ieee, struct sk_buff *skb,
171 struct ieee80211_rx_stats *rx_stats, u16 type,
172 u16 stype)
173{
174 if (ieee->iw_mode == IW_MODE_MASTER) {
175 printk(KERN_DEBUG "%s: Master mode not yet suppported.\n",
176 ieee->dev->name);
177 return 0;
178/*
179 hostap_update_sta_ps(ieee, (struct hostap_ieee80211_hdr *)
180 skb->data);*/
181 }
182
183 if (ieee->hostapd && type == WLAN_FC_TYPE_MGMT) {
184 if (stype == WLAN_FC_STYPE_BEACON &&
185 ieee->iw_mode == IW_MODE_MASTER) {
186 struct sk_buff *skb2;
187 /* Process beacon frames also in kernel driver to
188 * update STA(AP) table statistics */
189 skb2 = skb_clone(skb, GFP_ATOMIC);
190 if (skb2)
191 hostap_rx(skb2->dev, skb2, rx_stats);
192 }
193
194 /* send management frames to the user space daemon for
195 * processing */
196 ieee->apdevstats.rx_packets++;
197 ieee->apdevstats.rx_bytes += skb->len;
198 prism2_rx_80211(ieee->apdev, skb, rx_stats, PRISM2_RX_MGMT);
199 return 0;
200 }
201
0edd5b44 202 if (ieee->iw_mode == IW_MODE_MASTER) {
b453872c
JG
203 if (type != WLAN_FC_TYPE_MGMT && type != WLAN_FC_TYPE_CTRL) {
204 printk(KERN_DEBUG "%s: unknown management frame "
205 "(type=0x%02x, stype=0x%02x) dropped\n",
206 skb->dev->name, type, stype);
207 return -1;
208 }
209
210 hostap_rx(skb->dev, skb, rx_stats);
211 return 0;
212 }
213
214 printk(KERN_DEBUG "%s: hostap_rx_frame_mgmt: management frame "
215 "received in non-Host AP mode\n", skb->dev->name);
216 return -1;
217}
218#endif
219
b453872c
JG
220/* See IEEE 802.1H for LLC/SNAP encapsulation/decapsulation */
221/* Ethernet-II snap header (RFC1042 for most EtherTypes) */
0edd5b44
JG
222static unsigned char rfc1042_header[] = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00 };
223
b453872c
JG
224/* Bridge-Tunnel header (for EtherTypes ETH_P_AARP and ETH_P_IPX) */
225static unsigned char bridge_tunnel_header[] =
0edd5b44 226 { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0xf8 };
b453872c
JG
227/* No encapsulation header if EtherType < 0x600 (=length) */
228
229/* Called by ieee80211_rx_frame_decrypt */
230static int ieee80211_is_eapol_frame(struct ieee80211_device *ieee,
231 struct sk_buff *skb)
232{
233 struct net_device *dev = ieee->dev;
234 u16 fc, ethertype;
235 struct ieee80211_hdr *hdr;
236 u8 *pos;
237
238 if (skb->len < 24)
239 return 0;
240
0edd5b44 241 hdr = (struct ieee80211_hdr *)skb->data;
b453872c
JG
242 fc = le16_to_cpu(hdr->frame_ctl);
243
244 /* check that the frame is unicast frame to us */
245 if ((fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
246 IEEE80211_FCTL_TODS &&
247 memcmp(hdr->addr1, dev->dev_addr, ETH_ALEN) == 0 &&
248 memcmp(hdr->addr3, dev->dev_addr, ETH_ALEN) == 0) {
249 /* ToDS frame with own addr BSSID and DA */
250 } else if ((fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
251 IEEE80211_FCTL_FROMDS &&
252 memcmp(hdr->addr1, dev->dev_addr, ETH_ALEN) == 0) {
253 /* FromDS frame with own addr as DA */
254 } else
255 return 0;
256
257 if (skb->len < 24 + 8)
258 return 0;
259
260 /* check for port access entity Ethernet type */
261 pos = skb->data + 24;
262 ethertype = (pos[6] << 8) | pos[7];
263 if (ethertype == ETH_P_PAE)
264 return 1;
265
266 return 0;
267}
268
269/* Called only as a tasklet (software IRQ), by ieee80211_rx */
270static inline int
0edd5b44 271ieee80211_rx_frame_decrypt(struct ieee80211_device *ieee, struct sk_buff *skb,
b453872c
JG
272 struct ieee80211_crypt_data *crypt)
273{
274 struct ieee80211_hdr *hdr;
275 int res, hdrlen;
276
277 if (crypt == NULL || crypt->ops->decrypt_mpdu == NULL)
278 return 0;
279
0edd5b44 280 hdr = (struct ieee80211_hdr *)skb->data;
b453872c
JG
281 hdrlen = ieee80211_get_hdrlen(le16_to_cpu(hdr->frame_ctl));
282
283#ifdef CONFIG_IEEE80211_CRYPT_TKIP
0edd5b44 284 if (ieee->tkip_countermeasures && strcmp(crypt->ops->name, "TKIP") == 0) {
b453872c
JG
285 if (net_ratelimit()) {
286 printk(KERN_DEBUG "%s: TKIP countermeasures: dropped "
287 "received packet from " MAC_FMT "\n",
288 ieee->dev->name, MAC_ARG(hdr->addr2));
289 }
290 return -1;
291 }
292#endif
293
294 atomic_inc(&crypt->refcnt);
295 res = crypt->ops->decrypt_mpdu(skb, hdrlen, crypt->priv);
296 atomic_dec(&crypt->refcnt);
297 if (res < 0) {
0edd5b44
JG
298 IEEE80211_DEBUG_DROP("decryption failed (SA=" MAC_FMT
299 ") res=%d\n", MAC_ARG(hdr->addr2), res);
b453872c
JG
300 if (res == -2)
301 IEEE80211_DEBUG_DROP("Decryption failed ICV "
302 "mismatch (key %d)\n",
303 skb->data[hdrlen + 3] >> 6);
304 ieee->ieee_stats.rx_discards_undecryptable++;
305 return -1;
306 }
307
308 return res;
309}
310
b453872c
JG
311/* Called only as a tasklet (software IRQ), by ieee80211_rx */
312static inline int
0edd5b44
JG
313ieee80211_rx_frame_decrypt_msdu(struct ieee80211_device *ieee,
314 struct sk_buff *skb, int keyidx,
315 struct ieee80211_crypt_data *crypt)
b453872c
JG
316{
317 struct ieee80211_hdr *hdr;
318 int res, hdrlen;
319
320 if (crypt == NULL || crypt->ops->decrypt_msdu == NULL)
321 return 0;
322
0edd5b44 323 hdr = (struct ieee80211_hdr *)skb->data;
b453872c
JG
324 hdrlen = ieee80211_get_hdrlen(le16_to_cpu(hdr->frame_ctl));
325
326 atomic_inc(&crypt->refcnt);
327 res = crypt->ops->decrypt_msdu(skb, keyidx, hdrlen, crypt->priv);
328 atomic_dec(&crypt->refcnt);
329 if (res < 0) {
330 printk(KERN_DEBUG "%s: MSDU decryption/MIC verification failed"
331 " (SA=" MAC_FMT " keyidx=%d)\n",
332 ieee->dev->name, MAC_ARG(hdr->addr2), keyidx);
333 return -1;
334 }
335
336 return 0;
337}
338
b453872c
JG
339/* All received frames are sent to this function. @skb contains the frame in
340 * IEEE 802.11 format, i.e., in the format it was sent over air.
341 * This function is called only as a tasklet (software IRQ). */
342int ieee80211_rx(struct ieee80211_device *ieee, struct sk_buff *skb,
343 struct ieee80211_rx_stats *rx_stats)
344{
345 struct net_device *dev = ieee->dev;
346 struct ieee80211_hdr *hdr;
347 size_t hdrlen;
348 u16 fc, type, stype, sc;
349 struct net_device_stats *stats;
350 unsigned int frag;
351 u8 *payload;
352 u16 ethertype;
353#ifdef NOT_YET
354 struct net_device *wds = NULL;
355 struct sk_buff *skb2 = NULL;
356 struct net_device *wds = NULL;
357 int frame_authorized = 0;
358 int from_assoc_ap = 0;
359 void *sta = NULL;
360#endif
361 u8 dst[ETH_ALEN];
362 u8 src[ETH_ALEN];
363 struct ieee80211_crypt_data *crypt = NULL;
364 int keyidx = 0;
365
366 hdr = (struct ieee80211_hdr *)skb->data;
367 stats = &ieee->stats;
368
369 if (skb->len < 10) {
0edd5b44 370 printk(KERN_INFO "%s: SKB length < 10\n", dev->name);
b453872c
JG
371 goto rx_dropped;
372 }
373
374 fc = le16_to_cpu(hdr->frame_ctl);
375 type = WLAN_FC_GET_TYPE(fc);
376 stype = WLAN_FC_GET_STYPE(fc);
377 sc = le16_to_cpu(hdr->seq_ctl);
378 frag = WLAN_GET_SEQ_FRAG(sc);
379 hdrlen = ieee80211_get_hdrlen(fc);
380
b453872c
JG
381 /* Put this code here so that we avoid duplicating it in all
382 * Rx paths. - Jean II */
383#ifdef IW_WIRELESS_SPY /* defined in iw_handler.h */
384 /* If spy monitoring on */
74079fdc 385 if (ieee->spy_data.spy_number > 0) {
b453872c 386 struct iw_quality wstats;
74079fdc
JK
387
388 wstats.updated = 0;
389 if (rx_stats->mask & IEEE80211_STATMASK_RSSI) {
390 wstats.level = rx_stats->rssi;
391 wstats.updated |= IW_QUAL_LEVEL_UPDATED;
392 } else
393 wstats.updated |= IW_QUAL_LEVEL_INVALID;
394
395 if (rx_stats->mask & IEEE80211_STATMASK_NOISE) {
396 wstats.noise = rx_stats->noise;
397 wstats.updated |= IW_QUAL_NOISE_UPDATED;
398 } else
399 wstats.updated |= IW_QUAL_NOISE_INVALID;
400
401 if (rx_stats->mask & IEEE80211_STATMASK_SIGNAL) {
402 wstats.qual = rx_stats->signal;
403 wstats.updated |= IW_QUAL_QUAL_UPDATED;
404 } else
405 wstats.updated |= IW_QUAL_QUAL_INVALID;
406
b453872c 407 /* Update spy records */
74079fdc 408 wireless_spy_update(ieee->dev, hdr->addr2, &wstats);
b453872c 409 }
0edd5b44 410#endif /* IW_WIRELESS_SPY */
74079fdc
JK
411
412#ifdef NOT_YET
b453872c
JG
413 hostap_update_rx_stats(local->ap, hdr, rx_stats);
414#endif
415
b453872c
JG
416 if (ieee->iw_mode == IW_MODE_MONITOR) {
417 ieee80211_monitor_rx(ieee, skb, rx_stats);
418 stats->rx_packets++;
419 stats->rx_bytes += skb->len;
420 return 1;
421 }
b453872c
JG
422
423 if (ieee->host_decrypt) {
424 int idx = 0;
425 if (skb->len >= hdrlen + 3)
426 idx = skb->data[hdrlen + 3] >> 6;
427 crypt = ieee->crypt[idx];
428#ifdef NOT_YET
429 sta = NULL;
430
431 /* Use station specific key to override default keys if the
432 * receiver address is a unicast address ("individual RA"). If
433 * bcrx_sta_key parameter is set, station specific key is used
434 * even with broad/multicast targets (this is against IEEE
435 * 802.11, but makes it easier to use different keys with
436 * stations that do not support WEP key mapping). */
437
438 if (!(hdr->addr1[0] & 0x01) || local->bcrx_sta_key)
0edd5b44
JG
439 (void)hostap_handle_sta_crypto(local, hdr, &crypt,
440 &sta);
b453872c
JG
441#endif
442
443 /* allow NULL decrypt to indicate an station specific override
444 * for default encryption */
445 if (crypt && (crypt->ops == NULL ||
446 crypt->ops->decrypt_mpdu == NULL))
447 crypt = NULL;
448
f13baae4 449 if (!crypt && (fc & IEEE80211_FCTL_PROTECTED)) {
b453872c
JG
450 /* This seems to be triggered by some (multicast?)
451 * frames from other than current BSS, so just drop the
452 * frames silently instead of filling system log with
453 * these reports. */
454 IEEE80211_DEBUG_DROP("Decryption failed (not set)"
455 " (SA=" MAC_FMT ")\n",
456 MAC_ARG(hdr->addr2));
457 ieee->ieee_stats.rx_discards_undecryptable++;
458 goto rx_dropped;
459 }
460 }
b453872c
JG
461#ifdef NOT_YET
462 if (type != WLAN_FC_TYPE_DATA) {
463 if (type == WLAN_FC_TYPE_MGMT && stype == WLAN_FC_STYPE_AUTH &&
f13baae4 464 fc & IEEE80211_FCTL_PROTECTED && ieee->host_decrypt &&
0edd5b44 465 (keyidx = hostap_rx_frame_decrypt(ieee, skb, crypt)) < 0) {
b453872c
JG
466 printk(KERN_DEBUG "%s: failed to decrypt mgmt::auth "
467 "from " MAC_FMT "\n", dev->name,
468 MAC_ARG(hdr->addr2));
469 /* TODO: could inform hostapd about this so that it
470 * could send auth failure report */
471 goto rx_dropped;
472 }
473
474 if (ieee80211_rx_frame_mgmt(ieee, skb, rx_stats, type, stype))
475 goto rx_dropped;
476 else
477 goto rx_exit;
478 }
479#endif
480
481 /* Data frame - extract src/dst addresses */
286d9747 482 if (skb->len < IEEE80211_3ADDR_LEN)
b453872c
JG
483 goto rx_dropped;
484
485 switch (fc & (IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS)) {
486 case IEEE80211_FCTL_FROMDS:
487 memcpy(dst, hdr->addr1, ETH_ALEN);
488 memcpy(src, hdr->addr3, ETH_ALEN);
489 break;
490 case IEEE80211_FCTL_TODS:
491 memcpy(dst, hdr->addr3, ETH_ALEN);
492 memcpy(src, hdr->addr2, ETH_ALEN);
493 break;
494 case IEEE80211_FCTL_FROMDS | IEEE80211_FCTL_TODS:
286d9747 495 if (skb->len < IEEE80211_4ADDR_LEN)
b453872c
JG
496 goto rx_dropped;
497 memcpy(dst, hdr->addr3, ETH_ALEN);
498 memcpy(src, hdr->addr4, ETH_ALEN);
499 break;
500 case 0:
501 memcpy(dst, hdr->addr1, ETH_ALEN);
502 memcpy(src, hdr->addr2, ETH_ALEN);
503 break;
504 }
505
506#ifdef NOT_YET
507 if (hostap_rx_frame_wds(ieee, hdr, fc, &wds))
508 goto rx_dropped;
509 if (wds) {
510 skb->dev = dev = wds;
511 stats = hostap_get_stats(dev);
512 }
513
514 if (ieee->iw_mode == IW_MODE_MASTER && !wds &&
0edd5b44
JG
515 (fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
516 IEEE80211_FCTL_FROMDS && ieee->stadev
517 && memcmp(hdr->addr2, ieee->assoc_ap_addr, ETH_ALEN) == 0) {
b453872c
JG
518 /* Frame from BSSID of the AP for which we are a client */
519 skb->dev = dev = ieee->stadev;
520 stats = hostap_get_stats(dev);
521 from_assoc_ap = 1;
522 }
523#endif
524
525 dev->last_rx = jiffies;
526
527#ifdef NOT_YET
528 if ((ieee->iw_mode == IW_MODE_MASTER ||
0edd5b44 529 ieee->iw_mode == IW_MODE_REPEAT) && !from_assoc_ap) {
b453872c
JG
530 switch (hostap_handle_sta_rx(ieee, dev, skb, rx_stats,
531 wds != NULL)) {
532 case AP_RX_CONTINUE_NOT_AUTHORIZED:
533 frame_authorized = 0;
534 break;
535 case AP_RX_CONTINUE:
536 frame_authorized = 1;
537 break;
538 case AP_RX_DROP:
539 goto rx_dropped;
540 case AP_RX_EXIT:
541 goto rx_exit;
542 }
543 }
544#endif
545
546 /* Nullfunc frames may have PS-bit set, so they must be passed to
547 * hostap_handle_sta_rx() before being dropped here. */
548 if (stype != IEEE80211_STYPE_DATA &&
549 stype != IEEE80211_STYPE_DATA_CFACK &&
550 stype != IEEE80211_STYPE_DATA_CFPOLL &&
551 stype != IEEE80211_STYPE_DATA_CFACKPOLL) {
552 if (stype != IEEE80211_STYPE_NULLFUNC)
0edd5b44
JG
553 IEEE80211_DEBUG_DROP("RX: dropped data frame "
554 "with no data (type=0x%02x, "
555 "subtype=0x%02x, len=%d)\n",
556 type, stype, skb->len);
b453872c
JG
557 goto rx_dropped;
558 }
559
560 /* skb: hdr + (possibly fragmented, possibly encrypted) payload */
561
f13baae4 562 if (ieee->host_decrypt && (fc & IEEE80211_FCTL_PROTECTED) &&
b453872c
JG
563 (keyidx = ieee80211_rx_frame_decrypt(ieee, skb, crypt)) < 0)
564 goto rx_dropped;
565
0edd5b44 566 hdr = (struct ieee80211_hdr *)skb->data;
b453872c
JG
567
568 /* skb: hdr + (possibly fragmented) plaintext payload */
569 // PR: FIXME: hostap has additional conditions in the "if" below:
f13baae4 570 // ieee->host_decrypt && (fc & IEEE80211_FCTL_PROTECTED) &&
b453872c
JG
571 if ((frag != 0 || (fc & IEEE80211_FCTL_MOREFRAGS))) {
572 int flen;
573 struct sk_buff *frag_skb = ieee80211_frag_cache_get(ieee, hdr);
574 IEEE80211_DEBUG_FRAG("Rx Fragment received (%u)\n", frag);
575
576 if (!frag_skb) {
577 IEEE80211_DEBUG(IEEE80211_DL_RX | IEEE80211_DL_FRAG,
578 "Rx cannot get skb from fragment "
579 "cache (morefrag=%d seq=%u frag=%u)\n",
580 (fc & IEEE80211_FCTL_MOREFRAGS) != 0,
581 WLAN_GET_SEQ_SEQ(sc), frag);
582 goto rx_dropped;
583 }
584
585 flen = skb->len;
586 if (frag != 0)
587 flen -= hdrlen;
588
589 if (frag_skb->tail + flen > frag_skb->end) {
590 printk(KERN_WARNING "%s: host decrypted and "
591 "reassembled frame did not fit skb\n",
592 dev->name);
593 ieee80211_frag_cache_invalidate(ieee, hdr);
594 goto rx_dropped;
595 }
596
597 if (frag == 0) {
598 /* copy first fragment (including full headers) into
599 * beginning of the fragment cache skb */
600 memcpy(skb_put(frag_skb, flen), skb->data, flen);
601 } else {
602 /* append frame payload to the end of the fragment
603 * cache skb */
604 memcpy(skb_put(frag_skb, flen), skb->data + hdrlen,
605 flen);
606 }
607 dev_kfree_skb_any(skb);
608 skb = NULL;
609
610 if (fc & IEEE80211_FCTL_MOREFRAGS) {
611 /* more fragments expected - leave the skb in fragment
612 * cache for now; it will be delivered to upper layers
613 * after all fragments have been received */
614 goto rx_exit;
615 }
616
617 /* this was the last fragment and the frame will be
618 * delivered, so remove skb from fragment cache */
619 skb = frag_skb;
0edd5b44 620 hdr = (struct ieee80211_hdr *)skb->data;
b453872c
JG
621 ieee80211_frag_cache_invalidate(ieee, hdr);
622 }
623
624 /* skb: hdr + (possible reassembled) full MSDU payload; possibly still
625 * encrypted/authenticated */
f13baae4 626 if (ieee->host_decrypt && (fc & IEEE80211_FCTL_PROTECTED) &&
b453872c
JG
627 ieee80211_rx_frame_decrypt_msdu(ieee, skb, keyidx, crypt))
628 goto rx_dropped;
629
0edd5b44 630 hdr = (struct ieee80211_hdr *)skb->data;
f13baae4 631 if (crypt && !(fc & IEEE80211_FCTL_PROTECTED) && !ieee->open_wep) {
0edd5b44
JG
632 if ( /*ieee->ieee802_1x && */
633 ieee80211_is_eapol_frame(ieee, skb)) {
b453872c
JG
634 /* pass unencrypted EAPOL frames even if encryption is
635 * configured */
b453872c 636 } else {
0edd5b44
JG
637 IEEE80211_DEBUG_DROP("encryption configured, but RX "
638 "frame not encrypted (SA=" MAC_FMT
639 ")\n", MAC_ARG(hdr->addr2));
b453872c
JG
640 goto rx_dropped;
641 }
642 }
643
f13baae4 644 if (crypt && !(fc & IEEE80211_FCTL_PROTECTED) && !ieee->open_wep &&
b453872c 645 !ieee80211_is_eapol_frame(ieee, skb)) {
0edd5b44
JG
646 IEEE80211_DEBUG_DROP("dropped unencrypted RX data "
647 "frame from " MAC_FMT
648 " (drop_unencrypted=1)\n",
649 MAC_ARG(hdr->addr2));
b453872c
JG
650 goto rx_dropped;
651 }
652
653 /* skb: hdr + (possible reassembled) full plaintext payload */
654
655 payload = skb->data + hdrlen;
656 ethertype = (payload[6] << 8) | payload[7];
657
658#ifdef NOT_YET
659 /* If IEEE 802.1X is used, check whether the port is authorized to send
660 * the received frame. */
661 if (ieee->ieee802_1x && ieee->iw_mode == IW_MODE_MASTER) {
662 if (ethertype == ETH_P_PAE) {
663 printk(KERN_DEBUG "%s: RX: IEEE 802.1X frame\n",
664 dev->name);
665 if (ieee->hostapd && ieee->apdev) {
666 /* Send IEEE 802.1X frames to the user
667 * space daemon for processing */
668 prism2_rx_80211(ieee->apdev, skb, rx_stats,
669 PRISM2_RX_MGMT);
670 ieee->apdevstats.rx_packets++;
671 ieee->apdevstats.rx_bytes += skb->len;
672 goto rx_exit;
673 }
674 } else if (!frame_authorized) {
675 printk(KERN_DEBUG "%s: dropped frame from "
676 "unauthorized port (IEEE 802.1X): "
0edd5b44 677 "ethertype=0x%04x\n", dev->name, ethertype);
b453872c
JG
678 goto rx_dropped;
679 }
680 }
681#endif
682
683 /* convert hdr + possible LLC headers into Ethernet header */
684 if (skb->len - hdrlen >= 8 &&
685 ((memcmp(payload, rfc1042_header, SNAP_SIZE) == 0 &&
686 ethertype != ETH_P_AARP && ethertype != ETH_P_IPX) ||
687 memcmp(payload, bridge_tunnel_header, SNAP_SIZE) == 0)) {
688 /* remove RFC1042 or Bridge-Tunnel encapsulation and
689 * replace EtherType */
690 skb_pull(skb, hdrlen + SNAP_SIZE);
691 memcpy(skb_push(skb, ETH_ALEN), src, ETH_ALEN);
692 memcpy(skb_push(skb, ETH_ALEN), dst, ETH_ALEN);
693 } else {
694 u16 len;
695 /* Leave Ethernet header part of hdr and full payload */
696 skb_pull(skb, hdrlen);
697 len = htons(skb->len);
698 memcpy(skb_push(skb, 2), &len, 2);
699 memcpy(skb_push(skb, ETH_ALEN), src, ETH_ALEN);
700 memcpy(skb_push(skb, ETH_ALEN), dst, ETH_ALEN);
701 }
702
703#ifdef NOT_YET
704 if (wds && ((fc & (IEEE80211_FCTL_TODS | IEEE80211_FCTL_FROMDS)) ==
0edd5b44 705 IEEE80211_FCTL_TODS) && skb->len >= ETH_HLEN + ETH_ALEN) {
b453872c
JG
706 /* Non-standard frame: get addr4 from its bogus location after
707 * the payload */
708 memcpy(skb->data + ETH_ALEN,
709 skb->data + skb->len - ETH_ALEN, ETH_ALEN);
710 skb_trim(skb, skb->len - ETH_ALEN);
711 }
712#endif
713
714 stats->rx_packets++;
715 stats->rx_bytes += skb->len;
716
717#ifdef NOT_YET
0edd5b44 718 if (ieee->iw_mode == IW_MODE_MASTER && !wds && ieee->ap->bridge_packets) {
b453872c
JG
719 if (dst[0] & 0x01) {
720 /* copy multicast frame both to the higher layers and
721 * to the wireless media */
722 ieee->ap->bridged_multicast++;
723 skb2 = skb_clone(skb, GFP_ATOMIC);
724 if (skb2 == NULL)
725 printk(KERN_DEBUG "%s: skb_clone failed for "
726 "multicast frame\n", dev->name);
727 } else if (hostap_is_sta_assoc(ieee->ap, dst)) {
728 /* send frame directly to the associated STA using
729 * wireless media and not passing to higher layers */
730 ieee->ap->bridged_unicast++;
731 skb2 = skb;
732 skb = NULL;
733 }
734 }
735
736 if (skb2 != NULL) {
737 /* send to wireless media */
738 skb2->protocol = __constant_htons(ETH_P_802_3);
739 skb2->mac.raw = skb2->nh.raw = skb2->data;
740 /* skb2->nh.raw = skb2->data + ETH_HLEN; */
741 skb2->dev = dev;
742 dev_queue_xmit(skb2);
743 }
b453872c
JG
744#endif
745
746 if (skb) {
747 skb->protocol = eth_type_trans(skb, dev);
748 memset(skb->cb, 0, sizeof(skb->cb));
749 skb->dev = dev;
0edd5b44 750 skb->ip_summed = CHECKSUM_NONE; /* 802.11 crc not sufficient */
b453872c
JG
751 netif_rx(skb);
752 }
753
0edd5b44 754 rx_exit:
b453872c
JG
755#ifdef NOT_YET
756 if (sta)
757 hostap_handle_sta_release(sta);
758#endif
759 return 1;
760
0edd5b44 761 rx_dropped:
b453872c
JG
762 stats->rx_dropped++;
763
764 /* Returning 0 indicates to caller that we have not handled the SKB--
765 * so it is still allocated and can be used again by underlying
766 * hardware as a DMA target */
767 return 0;
768}
769
770#define MGMT_FRAME_FIXED_PART_LENGTH 0x24
771
772static inline int ieee80211_is_ofdm_rate(u8 rate)
773{
774 switch (rate & ~IEEE80211_BASIC_RATE_MASK) {
775 case IEEE80211_OFDM_RATE_6MB:
776 case IEEE80211_OFDM_RATE_9MB:
777 case IEEE80211_OFDM_RATE_12MB:
778 case IEEE80211_OFDM_RATE_18MB:
779 case IEEE80211_OFDM_RATE_24MB:
780 case IEEE80211_OFDM_RATE_36MB:
781 case IEEE80211_OFDM_RATE_48MB:
782 case IEEE80211_OFDM_RATE_54MB:
783 return 1;
784 }
0edd5b44 785 return 0;
b453872c
JG
786}
787
74079fdc 788static inline int ieee80211_network_init(struct ieee80211_device *ieee, struct ieee80211_probe_response
0edd5b44
JG
789 *beacon,
790 struct ieee80211_network *network,
791 struct ieee80211_rx_stats *stats)
b453872c
JG
792{
793#ifdef CONFIG_IEEE80211_DEBUG
794 char rates_str[64];
795 char *p;
796#endif
797 struct ieee80211_info_element *info_element;
0edd5b44 798 u16 left;
b453872c
JG
799 u8 i;
800
801 /* Pull out fixed field data */
802 memcpy(network->bssid, beacon->header.addr3, ETH_ALEN);
fd27817c 803 network->capability = le16_to_cpu(beacon->capability);
b453872c 804 network->last_scanned = jiffies;
fd27817c
JK
805 network->time_stamp[0] = le32_to_cpu(beacon->time_stamp[0]);
806 network->time_stamp[1] = le32_to_cpu(beacon->time_stamp[1]);
807 network->beacon_interval = le16_to_cpu(beacon->beacon_interval);
0edd5b44 808 /* Where to pull this? beacon->listen_interval; */
b453872c
JG
809 network->listen_interval = 0x0A;
810 network->rates_len = network->rates_ex_len = 0;
811 network->last_associate = 0;
812 network->ssid_len = 0;
813 network->flags = 0;
814 network->atim_window = 0;
815
816 if (stats->freq == IEEE80211_52GHZ_BAND) {
817 /* for A band (No DS info) */
818 network->channel = stats->received_channel;
819 } else
820 network->flags |= NETWORK_HAS_CCK;
821
0edd5b44
JG
822 network->wpa_ie_len = 0;
823 network->rsn_ie_len = 0;
b453872c 824
0edd5b44 825 info_element = &beacon->info_element;
b453872c
JG
826 left = stats->len - ((void *)info_element - (void *)beacon);
827 while (left >= sizeof(struct ieee80211_info_element_hdr)) {
0edd5b44
JG
828 if (sizeof(struct ieee80211_info_element_hdr) +
829 info_element->len > left) {
830 IEEE80211_DEBUG_SCAN
831 ("SCAN: parse failed: info_element->len + 2 > left : info_element->len+2=%Zd left=%d.\n",
832 info_element->len +
833 sizeof(struct ieee80211_info_element), left);
b453872c 834 return 1;
0edd5b44 835 }
b453872c
JG
836
837 switch (info_element->id) {
838 case MFIE_TYPE_SSID:
839 if (ieee80211_is_empty_essid(info_element->data,
840 info_element->len)) {
841 network->flags |= NETWORK_EMPTY_ESSID;
842 break;
843 }
844
845 network->ssid_len = min(info_element->len,
0edd5b44
JG
846 (u8) IW_ESSID_MAX_SIZE);
847 memcpy(network->ssid, info_element->data,
848 network->ssid_len);
849 if (network->ssid_len < IW_ESSID_MAX_SIZE)
850 memset(network->ssid + network->ssid_len, 0,
b453872c
JG
851 IW_ESSID_MAX_SIZE - network->ssid_len);
852
853 IEEE80211_DEBUG_SCAN("MFIE_TYPE_SSID: '%s' len=%d.\n",
854 network->ssid, network->ssid_len);
855 break;
856
857 case MFIE_TYPE_RATES:
858#ifdef CONFIG_IEEE80211_DEBUG
859 p = rates_str;
860#endif
0edd5b44
JG
861 network->rates_len =
862 min(info_element->len, MAX_RATES_LENGTH);
b453872c
JG
863 for (i = 0; i < network->rates_len; i++) {
864 network->rates[i] = info_element->data[i];
865#ifdef CONFIG_IEEE80211_DEBUG
0edd5b44
JG
866 p += snprintf(p,
867 sizeof(rates_str) - (p -
868 rates_str),
869 "%02X ", network->rates[i]);
b453872c 870#endif
0edd5b44
JG
871 if (ieee80211_is_ofdm_rate
872 (info_element->data[i])) {
b453872c
JG
873 network->flags |= NETWORK_HAS_OFDM;
874 if (info_element->data[i] &
875 IEEE80211_BASIC_RATE_MASK)
876 network->flags &=
0edd5b44 877 ~NETWORK_HAS_CCK;
b453872c
JG
878 }
879 }
880
881 IEEE80211_DEBUG_SCAN("MFIE_TYPE_RATES: '%s' (%d)\n",
882 rates_str, network->rates_len);
883 break;
884
885 case MFIE_TYPE_RATES_EX:
886#ifdef CONFIG_IEEE80211_DEBUG
887 p = rates_str;
888#endif
0edd5b44
JG
889 network->rates_ex_len =
890 min(info_element->len, MAX_RATES_EX_LENGTH);
b453872c
JG
891 for (i = 0; i < network->rates_ex_len; i++) {
892 network->rates_ex[i] = info_element->data[i];
893#ifdef CONFIG_IEEE80211_DEBUG
0edd5b44
JG
894 p += snprintf(p,
895 sizeof(rates_str) - (p -
896 rates_str),
897 "%02X ", network->rates[i]);
b453872c 898#endif
0edd5b44
JG
899 if (ieee80211_is_ofdm_rate
900 (info_element->data[i])) {
b453872c
JG
901 network->flags |= NETWORK_HAS_OFDM;
902 if (info_element->data[i] &
903 IEEE80211_BASIC_RATE_MASK)
904 network->flags &=
0edd5b44 905 ~NETWORK_HAS_CCK;
b453872c
JG
906 }
907 }
908
909 IEEE80211_DEBUG_SCAN("MFIE_TYPE_RATES_EX: '%s' (%d)\n",
910 rates_str, network->rates_ex_len);
911 break;
912
913 case MFIE_TYPE_DS_SET:
0edd5b44 914 IEEE80211_DEBUG_SCAN("MFIE_TYPE_DS_SET: %d\n",
b453872c
JG
915 info_element->data[0]);
916 if (stats->freq == IEEE80211_24GHZ_BAND)
917 network->channel = info_element->data[0];
918 break;
919
0edd5b44
JG
920 case MFIE_TYPE_FH_SET:
921 IEEE80211_DEBUG_SCAN("MFIE_TYPE_FH_SET: ignored\n");
b453872c
JG
922 break;
923
924 case MFIE_TYPE_CF_SET:
925 IEEE80211_DEBUG_SCAN("MFIE_TYPE_CF_SET: ignored\n");
926 break;
927
928 case MFIE_TYPE_TIM:
929 IEEE80211_DEBUG_SCAN("MFIE_TYPE_TIM: ignored\n");
930 break;
931
932 case MFIE_TYPE_IBSS_SET:
933 IEEE80211_DEBUG_SCAN("MFIE_TYPE_IBSS_SET: ignored\n");
934 break;
935
936 case MFIE_TYPE_CHALLENGE:
937 IEEE80211_DEBUG_SCAN("MFIE_TYPE_CHALLENGE: ignored\n");
938 break;
939
940 case MFIE_TYPE_GENERIC:
941 IEEE80211_DEBUG_SCAN("MFIE_TYPE_GENERIC: %d bytes\n",
942 info_element->len);
0edd5b44 943 if (info_element->len >= 4 &&
b453872c
JG
944 info_element->data[0] == 0x00 &&
945 info_element->data[1] == 0x50 &&
946 info_element->data[2] == 0xf2 &&
947 info_element->data[3] == 0x01) {
948 network->wpa_ie_len = min(info_element->len + 2,
0edd5b44 949 MAX_WPA_IE_LEN);
b453872c
JG
950 memcpy(network->wpa_ie, info_element,
951 network->wpa_ie_len);
952 }
953 break;
954
955 case MFIE_TYPE_RSN:
956 IEEE80211_DEBUG_SCAN("MFIE_TYPE_RSN: %d bytes\n",
957 info_element->len);
958 network->rsn_ie_len = min(info_element->len + 2,
0edd5b44 959 MAX_WPA_IE_LEN);
b453872c
JG
960 memcpy(network->rsn_ie, info_element,
961 network->rsn_ie_len);
962 break;
963
964 default:
965 IEEE80211_DEBUG_SCAN("unsupported IE %d\n",
966 info_element->id);
0edd5b44
JG
967 break;
968 }
b453872c
JG
969
970 left -= sizeof(struct ieee80211_info_element_hdr) +
0edd5b44 971 info_element->len;
b453872c 972 info_element = (struct ieee80211_info_element *)
0edd5b44
JG
973 &info_element->data[info_element->len];
974 }
b453872c
JG
975
976 network->mode = 0;
977 if (stats->freq == IEEE80211_52GHZ_BAND)
978 network->mode = IEEE_A;
979 else {
980 if (network->flags & NETWORK_HAS_OFDM)
981 network->mode |= IEEE_G;
982 if (network->flags & NETWORK_HAS_CCK)
983 network->mode |= IEEE_B;
984 }
985
986 if (network->mode == 0) {
987 IEEE80211_DEBUG_SCAN("Filtered out '%s (" MAC_FMT ")' "
988 "network.\n",
989 escape_essid(network->ssid,
990 network->ssid_len),
991 MAC_ARG(network->bssid));
992 return 1;
993 }
994
995 if (ieee80211_is_empty_essid(network->ssid, network->ssid_len))
996 network->flags |= NETWORK_EMPTY_ESSID;
997
998 memcpy(&network->stats, stats, sizeof(network->stats));
999
1000 return 0;
1001}
1002
1003static inline int is_same_network(struct ieee80211_network *src,
1004 struct ieee80211_network *dst)
1005{
1006 /* A network is only a duplicate if the channel, BSSID, and ESSID
1007 * all match. We treat all <hidden> with the same BSSID and channel
1008 * as one network */
1009 return ((src->ssid_len == dst->ssid_len) &&
1010 (src->channel == dst->channel) &&
1011 !memcmp(src->bssid, dst->bssid, ETH_ALEN) &&
1012 !memcmp(src->ssid, dst->ssid, src->ssid_len));
1013}
1014
1015static inline void update_network(struct ieee80211_network *dst,
1016 struct ieee80211_network *src)
1017{
1018 memcpy(&dst->stats, &src->stats, sizeof(struct ieee80211_rx_stats));
1019 dst->capability = src->capability;
1020 memcpy(dst->rates, src->rates, src->rates_len);
1021 dst->rates_len = src->rates_len;
1022 memcpy(dst->rates_ex, src->rates_ex, src->rates_ex_len);
1023 dst->rates_ex_len = src->rates_ex_len;
1024
1025 dst->mode = src->mode;
1026 dst->flags = src->flags;
1027 dst->time_stamp[0] = src->time_stamp[0];
1028 dst->time_stamp[1] = src->time_stamp[1];
1029
1030 dst->beacon_interval = src->beacon_interval;
1031 dst->listen_interval = src->listen_interval;
1032 dst->atim_window = src->atim_window;
1033
1034 memcpy(dst->wpa_ie, src->wpa_ie, src->wpa_ie_len);
1035 dst->wpa_ie_len = src->wpa_ie_len;
1036 memcpy(dst->rsn_ie, src->rsn_ie, src->rsn_ie_len);
1037 dst->rsn_ie_len = src->rsn_ie_len;
1038
1039 dst->last_scanned = jiffies;
1040 /* dst->last_associate is not overwritten */
1041}
1042
0edd5b44 1043static inline void ieee80211_process_probe_response(struct ieee80211_device
74079fdc 1044 *ieee, struct
0edd5b44 1045 ieee80211_probe_response
74079fdc 1046 *beacon, struct ieee80211_rx_stats
0edd5b44 1047 *stats)
b453872c
JG
1048{
1049 struct ieee80211_network network;
1050 struct ieee80211_network *target;
1051 struct ieee80211_network *oldest = NULL;
1052#ifdef CONFIG_IEEE80211_DEBUG
1053 struct ieee80211_info_element *info_element = &beacon->info_element;
1054#endif
1055 unsigned long flags;
1056
0edd5b44
JG
1057 IEEE80211_DEBUG_SCAN("'%s' (" MAC_FMT
1058 "): %c%c%c%c %c%c%c%c-%c%c%c%c %c%c%c%c\n",
1059 escape_essid(info_element->data,
1060 info_element->len),
1061 MAC_ARG(beacon->header.addr3),
1062 (beacon->capability & (1 << 0xf)) ? '1' : '0',
1063 (beacon->capability & (1 << 0xe)) ? '1' : '0',
1064 (beacon->capability & (1 << 0xd)) ? '1' : '0',
1065 (beacon->capability & (1 << 0xc)) ? '1' : '0',
1066 (beacon->capability & (1 << 0xb)) ? '1' : '0',
1067 (beacon->capability & (1 << 0xa)) ? '1' : '0',
1068 (beacon->capability & (1 << 0x9)) ? '1' : '0',
1069 (beacon->capability & (1 << 0x8)) ? '1' : '0',
1070 (beacon->capability & (1 << 0x7)) ? '1' : '0',
1071 (beacon->capability & (1 << 0x6)) ? '1' : '0',
1072 (beacon->capability & (1 << 0x5)) ? '1' : '0',
1073 (beacon->capability & (1 << 0x4)) ? '1' : '0',
1074 (beacon->capability & (1 << 0x3)) ? '1' : '0',
1075 (beacon->capability & (1 << 0x2)) ? '1' : '0',
1076 (beacon->capability & (1 << 0x1)) ? '1' : '0',
1077 (beacon->capability & (1 << 0x0)) ? '1' : '0');
b453872c
JG
1078
1079 if (ieee80211_network_init(ieee, beacon, &network, stats)) {
1080 IEEE80211_DEBUG_SCAN("Dropped '%s' (" MAC_FMT ") via %s.\n",
1081 escape_essid(info_element->data,
1082 info_element->len),
1083 MAC_ARG(beacon->header.addr3),
fd27817c
JK
1084 WLAN_FC_GET_STYPE(le16_to_cpu
1085 (beacon->header.
1086 frame_ctl)) ==
b453872c
JG
1087 IEEE80211_STYPE_PROBE_RESP ?
1088 "PROBE RESPONSE" : "BEACON");
1089 return;
1090 }
1091
1092 /* The network parsed correctly -- so now we scan our known networks
1093 * to see if we can find it in our list.
1094 *
1095 * NOTE: This search is definitely not optimized. Once its doing
1096 * the "right thing" we'll optimize it for efficiency if
1097 * necessary */
1098
1099 /* Search for this entry in the list and update it if it is
1100 * already there. */
1101
1102 spin_lock_irqsave(&ieee->lock, flags);
1103
1104 list_for_each_entry(target, &ieee->network_list, list) {
1105 if (is_same_network(target, &network))
1106 break;
1107
1108 if ((oldest == NULL) ||
1109 (target->last_scanned < oldest->last_scanned))
1110 oldest = target;
1111 }
1112
1113 /* If we didn't find a match, then get a new network slot to initialize
1114 * with this beacon's information */
1115 if (&target->list == &ieee->network_list) {
1116 if (list_empty(&ieee->network_free_list)) {
1117 /* If there are no more slots, expire the oldest */
1118 list_del(&oldest->list);
1119 target = oldest;
1120 IEEE80211_DEBUG_SCAN("Expired '%s' (" MAC_FMT ") from "
1121 "network list.\n",
1122 escape_essid(target->ssid,
1123 target->ssid_len),
1124 MAC_ARG(target->bssid));
1125 } else {
1126 /* Otherwise just pull from the free list */
1127 target = list_entry(ieee->network_free_list.next,
1128 struct ieee80211_network, list);
1129 list_del(ieee->network_free_list.next);
1130 }
1131
b453872c
JG
1132#ifdef CONFIG_IEEE80211_DEBUG
1133 IEEE80211_DEBUG_SCAN("Adding '%s' (" MAC_FMT ") via %s.\n",
1134 escape_essid(network.ssid,
1135 network.ssid_len),
1136 MAC_ARG(network.bssid),
fd27817c
JK
1137 WLAN_FC_GET_STYPE(le16_to_cpu
1138 (beacon->header.
1139 frame_ctl)) ==
b453872c
JG
1140 IEEE80211_STYPE_PROBE_RESP ?
1141 "PROBE RESPONSE" : "BEACON");
1142#endif
1143 memcpy(target, &network, sizeof(*target));
1144 list_add_tail(&target->list, &ieee->network_list);
1145 } else {
1146 IEEE80211_DEBUG_SCAN("Updating '%s' (" MAC_FMT ") via %s.\n",
1147 escape_essid(target->ssid,
1148 target->ssid_len),
1149 MAC_ARG(target->bssid),
fd27817c
JK
1150 WLAN_FC_GET_STYPE(le16_to_cpu
1151 (beacon->header.
1152 frame_ctl)) ==
b453872c
JG
1153 IEEE80211_STYPE_PROBE_RESP ?
1154 "PROBE RESPONSE" : "BEACON");
1155 update_network(target, &network);
1156 }
1157
1158 spin_unlock_irqrestore(&ieee->lock, flags);
1159}
1160
1161void ieee80211_rx_mgt(struct ieee80211_device *ieee,
1162 struct ieee80211_hdr *header,
1163 struct ieee80211_rx_stats *stats)
1164{
fd27817c 1165 switch (WLAN_FC_GET_STYPE(le16_to_cpu(header->frame_ctl))) {
b453872c
JG
1166 case IEEE80211_STYPE_ASSOC_RESP:
1167 IEEE80211_DEBUG_MGMT("received ASSOCIATION RESPONSE (%d)\n",
fd27817c
JK
1168 WLAN_FC_GET_STYPE(le16_to_cpu
1169 (header->frame_ctl)));
b453872c
JG
1170 break;
1171
1172 case IEEE80211_STYPE_REASSOC_RESP:
1173 IEEE80211_DEBUG_MGMT("received REASSOCIATION RESPONSE (%d)\n",
fd27817c
JK
1174 WLAN_FC_GET_STYPE(le16_to_cpu
1175 (header->frame_ctl)));
b453872c
JG
1176 break;
1177
1178 case IEEE80211_STYPE_PROBE_RESP:
1179 IEEE80211_DEBUG_MGMT("received PROBE RESPONSE (%d)\n",
fd27817c
JK
1180 WLAN_FC_GET_STYPE(le16_to_cpu
1181 (header->frame_ctl)));
b453872c 1182 IEEE80211_DEBUG_SCAN("Probe response\n");
0edd5b44
JG
1183 ieee80211_process_probe_response(ieee,
1184 (struct
1185 ieee80211_probe_response *)
1186 header, stats);
b453872c
JG
1187 break;
1188
1189 case IEEE80211_STYPE_BEACON:
1190 IEEE80211_DEBUG_MGMT("received BEACON (%d)\n",
fd27817c
JK
1191 WLAN_FC_GET_STYPE(le16_to_cpu
1192 (header->frame_ctl)));
b453872c 1193 IEEE80211_DEBUG_SCAN("Beacon\n");
0edd5b44
JG
1194 ieee80211_process_probe_response(ieee,
1195 (struct
1196 ieee80211_probe_response *)
1197 header, stats);
b453872c
JG
1198 break;
1199
1200 default:
1201 IEEE80211_DEBUG_MGMT("received UNKNOWN (%d)\n",
fd27817c
JK
1202 WLAN_FC_GET_STYPE(le16_to_cpu
1203 (header->frame_ctl)));
b453872c
JG
1204 IEEE80211_WARNING("%s: Unknown management packet: %d\n",
1205 ieee->dev->name,
fd27817c
JK
1206 WLAN_FC_GET_STYPE(le16_to_cpu
1207 (header->frame_ctl)));
b453872c
JG
1208 break;
1209 }
1210}
1211
b453872c
JG
1212EXPORT_SYMBOL(ieee80211_rx_mgt);
1213EXPORT_SYMBOL(ieee80211_rx);