mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-09-14 06:35:12 +00:00
62eb734b49
Remove misc typedefs. Signed-off-by: Bartlomiej Zolnierkiewicz <bzolnier@gmail.com> Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
142 lines
4.5 KiB
C
142 lines
4.5 KiB
C
/*
|
|
*************************************************************************
|
|
* Ralink Tech Inc.
|
|
* 5F., No.36, Taiyuan St., Jhubei City,
|
|
* Hsinchu County 302,
|
|
* Taiwan, R.O.C.
|
|
*
|
|
* (c) Copyright 2002-2007, Ralink Technology, Inc.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify *
|
|
* it under the terms of the GNU General Public License as published by *
|
|
* the Free Software Foundation; either version 2 of the License, or *
|
|
* (at your option) any later version. *
|
|
* *
|
|
* This program is distributed in the hope that it will be useful, *
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
|
|
* GNU General Public License for more details. *
|
|
* *
|
|
* You should have received a copy of the GNU General Public License *
|
|
* along with this program; if not, write to the *
|
|
* Free Software Foundation, Inc., *
|
|
* 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
|
|
* *
|
|
*************************************************************************
|
|
|
|
Module Name:
|
|
auth_rsp.c
|
|
|
|
Abstract:
|
|
|
|
Revision History:
|
|
Who When What
|
|
-------- ---------- ----------------------------------------------
|
|
John 2004-10-1 copy from RT2560
|
|
*/
|
|
#include "../rt_config.h"
|
|
|
|
/*
|
|
==========================================================================
|
|
Description:
|
|
authentication state machine init procedure
|
|
Parameters:
|
|
Sm - the state machine
|
|
|
|
IRQL = PASSIVE_LEVEL
|
|
|
|
==========================================================================
|
|
*/
|
|
void AuthRspStateMachineInit(struct rt_rtmp_adapter *pAd,
|
|
struct rt_state_machine *Sm,
|
|
IN STATE_MACHINE_FUNC Trans[])
|
|
{
|
|
StateMachineInit(Sm, Trans, MAX_AUTH_RSP_STATE, MAX_AUTH_RSP_MSG,
|
|
(STATE_MACHINE_FUNC) Drop, AUTH_RSP_IDLE,
|
|
AUTH_RSP_MACHINE_BASE);
|
|
|
|
/* column 1 */
|
|
StateMachineSetAction(Sm, AUTH_RSP_IDLE, MT2_PEER_DEAUTH,
|
|
(STATE_MACHINE_FUNC) PeerDeauthAction);
|
|
|
|
/* column 2 */
|
|
StateMachineSetAction(Sm, AUTH_RSP_WAIT_CHAL, MT2_PEER_DEAUTH,
|
|
(STATE_MACHINE_FUNC) PeerDeauthAction);
|
|
|
|
}
|
|
|
|
/*
|
|
==========================================================================
|
|
Description:
|
|
|
|
IRQL = DISPATCH_LEVEL
|
|
|
|
==========================================================================
|
|
*/
|
|
void PeerAuthSimpleRspGenAndSend(struct rt_rtmp_adapter *pAd,
|
|
struct rt_header_802_11 * pHdr80211,
|
|
u16 Alg,
|
|
u16 Seq,
|
|
u16 Reason, u16 Status)
|
|
{
|
|
struct rt_header_802_11 AuthHdr;
|
|
unsigned long FrameLen = 0;
|
|
u8 *pOutBuffer = NULL;
|
|
int NStatus;
|
|
|
|
if (Reason != MLME_SUCCESS) {
|
|
DBGPRINT(RT_DEBUG_TRACE, ("Peer AUTH fail...\n"));
|
|
return;
|
|
}
|
|
/*Get an unused nonpaged memory */
|
|
NStatus = MlmeAllocateMemory(pAd, &pOutBuffer);
|
|
if (NStatus != NDIS_STATUS_SUCCESS)
|
|
return;
|
|
|
|
DBGPRINT(RT_DEBUG_TRACE, ("Send AUTH response (seq#2)...\n"));
|
|
MgtMacHeaderInit(pAd, &AuthHdr, SUBTYPE_AUTH, 0, pHdr80211->Addr2,
|
|
pAd->MlmeAux.Bssid);
|
|
MakeOutgoingFrame(pOutBuffer, &FrameLen, sizeof(struct rt_header_802_11),
|
|
&AuthHdr, 2, &Alg, 2, &Seq, 2, &Reason, END_OF_ARGS);
|
|
MiniportMMRequest(pAd, 0, pOutBuffer, FrameLen);
|
|
MlmeFreeMemory(pAd, pOutBuffer);
|
|
}
|
|
|
|
/*
|
|
==========================================================================
|
|
Description:
|
|
|
|
IRQL = DISPATCH_LEVEL
|
|
|
|
==========================================================================
|
|
*/
|
|
void PeerDeauthAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
|
|
{
|
|
u8 Addr2[MAC_ADDR_LEN];
|
|
u16 Reason;
|
|
|
|
if (PeerDeauthSanity(pAd, Elem->Msg, Elem->MsgLen, Addr2, &Reason)) {
|
|
if (INFRA_ON(pAd)
|
|
&& MAC_ADDR_EQUAL(Addr2, pAd->CommonCfg.Bssid)
|
|
) {
|
|
DBGPRINT(RT_DEBUG_TRACE,
|
|
("AUTH_RSP - receive DE-AUTH from our AP (Reason=%d)\n",
|
|
Reason));
|
|
|
|
RtmpOSWrielessEventSend(pAd, SIOCGIWAP, -1, NULL, NULL,
|
|
0);
|
|
|
|
/* send wireless event - for deauthentication */
|
|
if (pAd->CommonCfg.bWirelessEvent)
|
|
RTMPSendWirelessEvent(pAd, IW_DEAUTH_EVENT_FLAG,
|
|
pAd->MacTab.
|
|
Content[BSSID_WCID].Addr,
|
|
BSS0, 0);
|
|
|
|
LinkDown(pAd, TRUE);
|
|
}
|
|
} else {
|
|
DBGPRINT(RT_DEBUG_TRACE,
|
|
("AUTH_RSP - PeerDeauthAction() sanity check fail\n"));
|
|
}
|
|
}
|