Deleted Added
full compact
ieee80211_freebsd.c (139512) ieee80211_freebsd.c (139530)
1/*-
1/*-
2 * Copyright (c) 2003-2004 Sam Leffler, Errno Consulting
2 * Copyright (c) 2003-2005 Sam Leffler, Errno Consulting
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. The name of the author may not be used to endorse or promote products
14 * derived from this software without specific prior written permission.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 */
27
28#include <sys/cdefs.h>
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. The name of the author may not be used to endorse or promote products
14 * derived from this software without specific prior written permission.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 */
27
28#include <sys/cdefs.h>
29__FBSDID("$FreeBSD: head/sys/net80211/ieee80211_freebsd.c 139512 2004-12-31 21:01:41Z sam $");
29__FBSDID("$FreeBSD: head/sys/net80211/ieee80211_freebsd.c 139530 2004-12-31 22:42:38Z sam $");
30
31/*
32 * IEEE 802.11 support (FreeBSD-specific code)
33 */
34#include <sys/param.h>
35#include <sys/kernel.h>
36#include <sys/systm.h>
37#include <sys/linker.h>
38#include <sys/mbuf.h>
39#include <sys/module.h>
40#include <sys/proc.h>
41#include <sys/sysctl.h>
42
43#include <sys/socket.h>
44
45#include <net/if.h>
46#include <net/if_media.h>
47#include <net/ethernet.h>
48#include <net/route.h>
49
50#include <net80211/ieee80211_var.h>
51
52SYSCTL_NODE(_net, OID_AUTO, wlan, CTLFLAG_RD, 0, "IEEE 80211 parameters");
53
54#ifdef IEEE80211_DEBUG
55int ieee80211_debug = 0;
56SYSCTL_INT(_net_wlan, OID_AUTO, debug, CTLFLAG_RW, &ieee80211_debug,
57 0, "debugging printfs");
58#endif
59
60static int
61ieee80211_sysctl_inact(SYSCTL_HANDLER_ARGS)
62{
63 int inact = (*(int *)arg1) * IEEE80211_INACT_WAIT;
64 int error;
65
66 error = sysctl_handle_int(oidp, &inact, 0, req);
67 if (error || !req->newptr)
68 return error;
69 *(int *)arg1 = inact / IEEE80211_INACT_WAIT;
70 return 0;
71}
72
73static int
74ieee80211_sysctl_parent(SYSCTL_HANDLER_ARGS)
75{
76 struct ieee80211com *ic = arg1;
77 const char *name = ic->ic_ifp->if_xname;
78
79 return SYSCTL_OUT(req, name, strlen(name));
80}
81
82void
83ieee80211_sysctl_attach(struct ieee80211com *ic)
84{
85 struct sysctl_ctx_list *ctx;
86 struct sysctl_oid *oid;
87 char num[14]; /* sufficient for 32 bits */
88
89 MALLOC(ctx, struct sysctl_ctx_list *, sizeof(struct sysctl_ctx_list),
90 M_DEVBUF, M_NOWAIT | M_ZERO);
91 if (ctx == NULL) {
92 if_printf(ic->ic_ifp, "%s: cannot allocate sysctl context!\n",
93 __func__);
94 return;
95 }
96 sysctl_ctx_init(ctx);
97 snprintf(num, sizeof(num), "%u", ic->ic_vap);
98 oid = SYSCTL_ADD_NODE(ctx, &SYSCTL_NODE_CHILDREN(_net, wlan),
99 OID_AUTO, num, CTLFLAG_RD, NULL, "");
100 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
101 "%parent", CTLFLAG_RD, ic, 0, ieee80211_sysctl_parent, "A",
102 "parent device");
103#ifdef IEEE80211_DEBUG
104 ic->ic_debug = ieee80211_debug;
105 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
106 "debug", CTLFLAG_RW, &ic->ic_debug, 0,
107 "control debugging printfs");
108#endif
109 /* XXX inherit from tunables */
110 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
111 "inact", CTLTYPE_INT | CTLFLAG_RW, &ic->ic_inact_run, 0,
112 ieee80211_sysctl_inact, "I",
113 "station inactivity timeout (sec)");
114 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
115 "inact_probe", CTLTYPE_INT | CTLFLAG_RW, &ic->ic_inact_probe, 0,
116 ieee80211_sysctl_inact, "I",
117 "station inactivity probe timeout (sec)");
118 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
119 "inact_auth", CTLTYPE_INT | CTLFLAG_RW, &ic->ic_inact_auth, 0,
120 ieee80211_sysctl_inact, "I",
121 "station authentication timeout (sec)");
122 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
123 "inact_init", CTLTYPE_INT | CTLFLAG_RW, &ic->ic_inact_init, 0,
124 ieee80211_sysctl_inact, "I",
125 "station initial state timeout (sec)");
126 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
127 "driver_caps", CTLFLAG_RW, &ic->ic_caps, 0,
128 "driver capabilities");
129 ic->ic_sysctl = ctx;
130}
131
132void
133ieee80211_sysctl_detach(struct ieee80211com *ic)
134{
135
136 if (ic->ic_sysctl != NULL) {
137 sysctl_ctx_free(ic->ic_sysctl);
138 ic->ic_sysctl = NULL;
139 }
140}
141
142int
143ieee80211_node_dectestref(struct ieee80211_node *ni)
144{
145 /* XXX need equivalent of atomic_dec_and_test */
146 atomic_subtract_int(&ni->ni_refcnt, 1);
147 return atomic_cmpset_int(&ni->ni_refcnt, 0, 1);
148}
149
150/*
151 * Allocate and setup a management frame of the specified
152 * size. We return the mbuf and a pointer to the start
153 * of the contiguous data area that's been reserved based
154 * on the packet length. The data area is forced to 32-bit
155 * alignment and the buffer length to a multiple of 4 bytes.
156 * This is done mainly so beacon frames (that require this)
157 * can use this interface too.
158 */
159struct mbuf *
160ieee80211_getmgtframe(u_int8_t **frm, u_int pktlen)
161{
162 struct mbuf *m;
163 u_int len;
164
165 /*
166 * NB: we know the mbuf routines will align the data area
167 * so we don't need to do anything special.
168 */
169 /* XXX 4-address frame? */
170 len = roundup(sizeof(struct ieee80211_frame) + pktlen, 4);
171 KASSERT(len <= MCLBYTES, ("802.11 mgt frame too large: %u", len));
172 if (len < MINCLSIZE) {
173 m = m_gethdr(M_NOWAIT, MT_HEADER);
174 /*
175 * Align the data in case additional headers are added.
176 * This should only happen when a WEP header is added
177 * which only happens for shared key authentication mgt
178 * frames which all fit in MHLEN.
179 */
180 if (m != NULL)
181 MH_ALIGN(m, len);
182 } else
183 m = m_getcl(M_NOWAIT, MT_HEADER, M_PKTHDR);
184 if (m != NULL) {
185 m->m_data += sizeof(struct ieee80211_frame);
186 *frm = m->m_data;
187 }
188 return m;
189}
190
191#include <sys/libkern.h>
192
193void
194get_random_bytes(void *p, size_t n)
195{
196 u_int8_t *dp = p;
197
198 while (n > 0) {
199 u_int32_t v = arc4random();
200 size_t nb = n > sizeof(u_int32_t) ? sizeof(u_int32_t) : n;
201 bcopy(&v, dp, n > sizeof(u_int32_t) ? sizeof(u_int32_t) : n);
202 dp += sizeof(u_int32_t), n -= nb;
203 }
204}
205
206void
207ieee80211_notify_node_join(struct ieee80211com *ic, struct ieee80211_node *ni, int newassoc)
208{
209 struct ifnet *ifp = ic->ic_ifp;
210 struct ieee80211_join_event iev;
211
212 if (ni == ic->ic_bss) {
213 memset(&iev, 0, sizeof(iev));
214 IEEE80211_ADDR_COPY(iev.iev_addr, ni->ni_bssid);
215 rt_ieee80211msg(ifp, newassoc ?
216 RTM_IEEE80211_ASSOC : RTM_IEEE80211_REASSOC,
217 &iev, sizeof(iev));
218 if_link_state_change(ifp, LINK_STATE_UP);
219 } else if (newassoc) {
220 /* fire off wireless event only for new station */
221 memset(&iev, 0, sizeof(iev));
222 IEEE80211_ADDR_COPY(iev.iev_addr, ni->ni_macaddr);
223 rt_ieee80211msg(ifp, RTM_IEEE80211_JOIN, &iev, sizeof(iev));
224 }
225}
226
227void
228ieee80211_notify_node_leave(struct ieee80211com *ic, struct ieee80211_node *ni)
229{
230 struct ifnet *ifp = ic->ic_ifp;
231 struct ieee80211_leave_event iev;
232
233 if (ni == ic->ic_bss) {
234 rt_ieee80211msg(ifp, RTM_IEEE80211_DISASSOC, NULL, 0);
235 if_link_state_change(ifp, LINK_STATE_DOWN);
236 } else {
237 /* fire off wireless event station leaving */
238 memset(&iev, 0, sizeof(iev));
239 IEEE80211_ADDR_COPY(iev.iev_addr, ni->ni_macaddr);
240 rt_ieee80211msg(ifp, RTM_IEEE80211_LEAVE, &iev, sizeof(iev));
241 }
242}
243
244void
245ieee80211_notify_scan_done(struct ieee80211com *ic)
246{
247 struct ifnet *ifp = ic->ic_ifp;
248
249 IEEE80211_DPRINTF(ic, IEEE80211_MSG_SCAN,
250 "%s: notify scan done\n", ic->ic_ifp->if_xname);
251
252 /* dispatch wireless event indicating scan completed */
253 rt_ieee80211msg(ifp, RTM_IEEE80211_SCAN, NULL, 0);
254}
255
256void
257ieee80211_notify_replay_failure(struct ieee80211com *ic,
258 const struct ieee80211_frame *wh, const struct ieee80211_key *k,
259 u_int64_t rsc)
260{
261 struct ifnet *ifp = ic->ic_ifp;
262
263 IEEE80211_DPRINTF(ic, IEEE80211_MSG_CRYPTO,
264 "[%s] %s replay detected <rsc %ju, csc %ju, keyix %u>\n",
265 ether_sprintf(wh->i_addr2), k->wk_cipher->ic_name,
266 (intmax_t) rsc, (intmax_t) k->wk_keyrsc, k->wk_keyix);
267
268 if (ifp != NULL) { /* NB: for cipher test modules */
269 struct ieee80211_replay_event iev;
270
271 IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1);
272 IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2);
273 iev.iev_cipher = k->wk_cipher->ic_cipher;
274 iev.iev_keyix = k->wk_keyix;
275 iev.iev_keyrsc = k->wk_keyrsc;
276 iev.iev_rsc = rsc;
277 rt_ieee80211msg(ifp, RTM_IEEE80211_REPLAY, &iev, sizeof(iev));
278 }
279}
280
281void
282ieee80211_notify_michael_failure(struct ieee80211com *ic,
283 const struct ieee80211_frame *wh, u_int keyix)
284{
285 struct ifnet *ifp = ic->ic_ifp;
286
287 IEEE80211_DPRINTF(ic, IEEE80211_MSG_CRYPTO,
288 "[%s] michael MIC verification failed <keyix %u>\n",
289 ether_sprintf(wh->i_addr2), keyix);
290 ic->ic_stats.is_rx_tkipmic++;
291
292 if (ifp != NULL) { /* NB: for cipher test modules */
293 struct ieee80211_michael_event iev;
294
295 IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1);
296 IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2);
297 iev.iev_cipher = IEEE80211_CIPHER_TKIP;
298 iev.iev_keyix = keyix;
299 rt_ieee80211msg(ifp, RTM_IEEE80211_MICHAEL, &iev, sizeof(iev));
300 }
301}
302
303void
304ieee80211_load_module(const char *modname)
305{
306#ifdef notyet
307 struct thread *td = curthread;
308
309 if (suser(td) == 0 && securelevel_gt(td->td_ucred, 0) == 0) {
310 mtx_lock(&Giant);
311 (void) linker_load_module(modname, NULL, NULL, NULL, NULL);
312 mtx_unlock(&Giant);
313 }
314#else
315 printf("%s: load the %s module by hand for now.\n", __func__, modname);
316#endif
317}
318
319/*
320 * Module glue.
321 *
322 * NB: the module name is "wlan" for compatibility with NetBSD.
323 */
324static int
325wlan_modevent(module_t mod, int type, void *unused)
326{
327 switch (type) {
328 case MOD_LOAD:
329 if (bootverbose)
330 printf("wlan: <802.11 Link Layer>\n");
331 return 0;
332 case MOD_UNLOAD:
333 return 0;
334 }
335 return EINVAL;
336}
337
338static moduledata_t wlan_mod = {
339 "wlan",
340 wlan_modevent,
341 0
342};
343DECLARE_MODULE(wlan, wlan_mod, SI_SUB_DRIVERS, SI_ORDER_FIRST);
344MODULE_VERSION(wlan, 1);
345MODULE_DEPEND(wlan, ether, 1, 1, 1);
30
31/*
32 * IEEE 802.11 support (FreeBSD-specific code)
33 */
34#include <sys/param.h>
35#include <sys/kernel.h>
36#include <sys/systm.h>
37#include <sys/linker.h>
38#include <sys/mbuf.h>
39#include <sys/module.h>
40#include <sys/proc.h>
41#include <sys/sysctl.h>
42
43#include <sys/socket.h>
44
45#include <net/if.h>
46#include <net/if_media.h>
47#include <net/ethernet.h>
48#include <net/route.h>
49
50#include <net80211/ieee80211_var.h>
51
52SYSCTL_NODE(_net, OID_AUTO, wlan, CTLFLAG_RD, 0, "IEEE 80211 parameters");
53
54#ifdef IEEE80211_DEBUG
55int ieee80211_debug = 0;
56SYSCTL_INT(_net_wlan, OID_AUTO, debug, CTLFLAG_RW, &ieee80211_debug,
57 0, "debugging printfs");
58#endif
59
60static int
61ieee80211_sysctl_inact(SYSCTL_HANDLER_ARGS)
62{
63 int inact = (*(int *)arg1) * IEEE80211_INACT_WAIT;
64 int error;
65
66 error = sysctl_handle_int(oidp, &inact, 0, req);
67 if (error || !req->newptr)
68 return error;
69 *(int *)arg1 = inact / IEEE80211_INACT_WAIT;
70 return 0;
71}
72
73static int
74ieee80211_sysctl_parent(SYSCTL_HANDLER_ARGS)
75{
76 struct ieee80211com *ic = arg1;
77 const char *name = ic->ic_ifp->if_xname;
78
79 return SYSCTL_OUT(req, name, strlen(name));
80}
81
82void
83ieee80211_sysctl_attach(struct ieee80211com *ic)
84{
85 struct sysctl_ctx_list *ctx;
86 struct sysctl_oid *oid;
87 char num[14]; /* sufficient for 32 bits */
88
89 MALLOC(ctx, struct sysctl_ctx_list *, sizeof(struct sysctl_ctx_list),
90 M_DEVBUF, M_NOWAIT | M_ZERO);
91 if (ctx == NULL) {
92 if_printf(ic->ic_ifp, "%s: cannot allocate sysctl context!\n",
93 __func__);
94 return;
95 }
96 sysctl_ctx_init(ctx);
97 snprintf(num, sizeof(num), "%u", ic->ic_vap);
98 oid = SYSCTL_ADD_NODE(ctx, &SYSCTL_NODE_CHILDREN(_net, wlan),
99 OID_AUTO, num, CTLFLAG_RD, NULL, "");
100 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
101 "%parent", CTLFLAG_RD, ic, 0, ieee80211_sysctl_parent, "A",
102 "parent device");
103#ifdef IEEE80211_DEBUG
104 ic->ic_debug = ieee80211_debug;
105 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
106 "debug", CTLFLAG_RW, &ic->ic_debug, 0,
107 "control debugging printfs");
108#endif
109 /* XXX inherit from tunables */
110 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
111 "inact", CTLTYPE_INT | CTLFLAG_RW, &ic->ic_inact_run, 0,
112 ieee80211_sysctl_inact, "I",
113 "station inactivity timeout (sec)");
114 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
115 "inact_probe", CTLTYPE_INT | CTLFLAG_RW, &ic->ic_inact_probe, 0,
116 ieee80211_sysctl_inact, "I",
117 "station inactivity probe timeout (sec)");
118 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
119 "inact_auth", CTLTYPE_INT | CTLFLAG_RW, &ic->ic_inact_auth, 0,
120 ieee80211_sysctl_inact, "I",
121 "station authentication timeout (sec)");
122 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
123 "inact_init", CTLTYPE_INT | CTLFLAG_RW, &ic->ic_inact_init, 0,
124 ieee80211_sysctl_inact, "I",
125 "station initial state timeout (sec)");
126 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
127 "driver_caps", CTLFLAG_RW, &ic->ic_caps, 0,
128 "driver capabilities");
129 ic->ic_sysctl = ctx;
130}
131
132void
133ieee80211_sysctl_detach(struct ieee80211com *ic)
134{
135
136 if (ic->ic_sysctl != NULL) {
137 sysctl_ctx_free(ic->ic_sysctl);
138 ic->ic_sysctl = NULL;
139 }
140}
141
142int
143ieee80211_node_dectestref(struct ieee80211_node *ni)
144{
145 /* XXX need equivalent of atomic_dec_and_test */
146 atomic_subtract_int(&ni->ni_refcnt, 1);
147 return atomic_cmpset_int(&ni->ni_refcnt, 0, 1);
148}
149
150/*
151 * Allocate and setup a management frame of the specified
152 * size. We return the mbuf and a pointer to the start
153 * of the contiguous data area that's been reserved based
154 * on the packet length. The data area is forced to 32-bit
155 * alignment and the buffer length to a multiple of 4 bytes.
156 * This is done mainly so beacon frames (that require this)
157 * can use this interface too.
158 */
159struct mbuf *
160ieee80211_getmgtframe(u_int8_t **frm, u_int pktlen)
161{
162 struct mbuf *m;
163 u_int len;
164
165 /*
166 * NB: we know the mbuf routines will align the data area
167 * so we don't need to do anything special.
168 */
169 /* XXX 4-address frame? */
170 len = roundup(sizeof(struct ieee80211_frame) + pktlen, 4);
171 KASSERT(len <= MCLBYTES, ("802.11 mgt frame too large: %u", len));
172 if (len < MINCLSIZE) {
173 m = m_gethdr(M_NOWAIT, MT_HEADER);
174 /*
175 * Align the data in case additional headers are added.
176 * This should only happen when a WEP header is added
177 * which only happens for shared key authentication mgt
178 * frames which all fit in MHLEN.
179 */
180 if (m != NULL)
181 MH_ALIGN(m, len);
182 } else
183 m = m_getcl(M_NOWAIT, MT_HEADER, M_PKTHDR);
184 if (m != NULL) {
185 m->m_data += sizeof(struct ieee80211_frame);
186 *frm = m->m_data;
187 }
188 return m;
189}
190
191#include <sys/libkern.h>
192
193void
194get_random_bytes(void *p, size_t n)
195{
196 u_int8_t *dp = p;
197
198 while (n > 0) {
199 u_int32_t v = arc4random();
200 size_t nb = n > sizeof(u_int32_t) ? sizeof(u_int32_t) : n;
201 bcopy(&v, dp, n > sizeof(u_int32_t) ? sizeof(u_int32_t) : n);
202 dp += sizeof(u_int32_t), n -= nb;
203 }
204}
205
206void
207ieee80211_notify_node_join(struct ieee80211com *ic, struct ieee80211_node *ni, int newassoc)
208{
209 struct ifnet *ifp = ic->ic_ifp;
210 struct ieee80211_join_event iev;
211
212 if (ni == ic->ic_bss) {
213 memset(&iev, 0, sizeof(iev));
214 IEEE80211_ADDR_COPY(iev.iev_addr, ni->ni_bssid);
215 rt_ieee80211msg(ifp, newassoc ?
216 RTM_IEEE80211_ASSOC : RTM_IEEE80211_REASSOC,
217 &iev, sizeof(iev));
218 if_link_state_change(ifp, LINK_STATE_UP);
219 } else if (newassoc) {
220 /* fire off wireless event only for new station */
221 memset(&iev, 0, sizeof(iev));
222 IEEE80211_ADDR_COPY(iev.iev_addr, ni->ni_macaddr);
223 rt_ieee80211msg(ifp, RTM_IEEE80211_JOIN, &iev, sizeof(iev));
224 }
225}
226
227void
228ieee80211_notify_node_leave(struct ieee80211com *ic, struct ieee80211_node *ni)
229{
230 struct ifnet *ifp = ic->ic_ifp;
231 struct ieee80211_leave_event iev;
232
233 if (ni == ic->ic_bss) {
234 rt_ieee80211msg(ifp, RTM_IEEE80211_DISASSOC, NULL, 0);
235 if_link_state_change(ifp, LINK_STATE_DOWN);
236 } else {
237 /* fire off wireless event station leaving */
238 memset(&iev, 0, sizeof(iev));
239 IEEE80211_ADDR_COPY(iev.iev_addr, ni->ni_macaddr);
240 rt_ieee80211msg(ifp, RTM_IEEE80211_LEAVE, &iev, sizeof(iev));
241 }
242}
243
244void
245ieee80211_notify_scan_done(struct ieee80211com *ic)
246{
247 struct ifnet *ifp = ic->ic_ifp;
248
249 IEEE80211_DPRINTF(ic, IEEE80211_MSG_SCAN,
250 "%s: notify scan done\n", ic->ic_ifp->if_xname);
251
252 /* dispatch wireless event indicating scan completed */
253 rt_ieee80211msg(ifp, RTM_IEEE80211_SCAN, NULL, 0);
254}
255
256void
257ieee80211_notify_replay_failure(struct ieee80211com *ic,
258 const struct ieee80211_frame *wh, const struct ieee80211_key *k,
259 u_int64_t rsc)
260{
261 struct ifnet *ifp = ic->ic_ifp;
262
263 IEEE80211_DPRINTF(ic, IEEE80211_MSG_CRYPTO,
264 "[%s] %s replay detected <rsc %ju, csc %ju, keyix %u>\n",
265 ether_sprintf(wh->i_addr2), k->wk_cipher->ic_name,
266 (intmax_t) rsc, (intmax_t) k->wk_keyrsc, k->wk_keyix);
267
268 if (ifp != NULL) { /* NB: for cipher test modules */
269 struct ieee80211_replay_event iev;
270
271 IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1);
272 IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2);
273 iev.iev_cipher = k->wk_cipher->ic_cipher;
274 iev.iev_keyix = k->wk_keyix;
275 iev.iev_keyrsc = k->wk_keyrsc;
276 iev.iev_rsc = rsc;
277 rt_ieee80211msg(ifp, RTM_IEEE80211_REPLAY, &iev, sizeof(iev));
278 }
279}
280
281void
282ieee80211_notify_michael_failure(struct ieee80211com *ic,
283 const struct ieee80211_frame *wh, u_int keyix)
284{
285 struct ifnet *ifp = ic->ic_ifp;
286
287 IEEE80211_DPRINTF(ic, IEEE80211_MSG_CRYPTO,
288 "[%s] michael MIC verification failed <keyix %u>\n",
289 ether_sprintf(wh->i_addr2), keyix);
290 ic->ic_stats.is_rx_tkipmic++;
291
292 if (ifp != NULL) { /* NB: for cipher test modules */
293 struct ieee80211_michael_event iev;
294
295 IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1);
296 IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2);
297 iev.iev_cipher = IEEE80211_CIPHER_TKIP;
298 iev.iev_keyix = keyix;
299 rt_ieee80211msg(ifp, RTM_IEEE80211_MICHAEL, &iev, sizeof(iev));
300 }
301}
302
303void
304ieee80211_load_module(const char *modname)
305{
306#ifdef notyet
307 struct thread *td = curthread;
308
309 if (suser(td) == 0 && securelevel_gt(td->td_ucred, 0) == 0) {
310 mtx_lock(&Giant);
311 (void) linker_load_module(modname, NULL, NULL, NULL, NULL);
312 mtx_unlock(&Giant);
313 }
314#else
315 printf("%s: load the %s module by hand for now.\n", __func__, modname);
316#endif
317}
318
319/*
320 * Module glue.
321 *
322 * NB: the module name is "wlan" for compatibility with NetBSD.
323 */
324static int
325wlan_modevent(module_t mod, int type, void *unused)
326{
327 switch (type) {
328 case MOD_LOAD:
329 if (bootverbose)
330 printf("wlan: <802.11 Link Layer>\n");
331 return 0;
332 case MOD_UNLOAD:
333 return 0;
334 }
335 return EINVAL;
336}
337
338static moduledata_t wlan_mod = {
339 "wlan",
340 wlan_modevent,
341 0
342};
343DECLARE_MODULE(wlan, wlan_mod, SI_SUB_DRIVERS, SI_ORDER_FIRST);
344MODULE_VERSION(wlan, 1);
345MODULE_DEPEND(wlan, ether, 1, 1, 1);