cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

ps3_gelic_wireless.h (9112B)


      1/* SPDX-License-Identifier: GPL-2.0-only */
      2/*
      3 *  PS3 gelic network driver.
      4 *
      5 * Copyright (C) 2007 Sony Computer Entertainment Inc.
      6 * Copyright 2007 Sony Corporation
      7 */
      8#ifndef _GELIC_WIRELESS_H
      9#define _GELIC_WIRELESS_H
     10
     11#include <linux/wireless.h>
     12#include <net/iw_handler.h>
     13
     14
     15/* return value from  GELIC_LV1_GET_WLAN_EVENT netcontrol */
     16enum gelic_lv1_wl_event {
     17	GELIC_LV1_WL_EVENT_DEVICE_READY   = 0x01, /* Eurus ready */
     18	GELIC_LV1_WL_EVENT_SCAN_COMPLETED = 0x02, /* Scan has completed */
     19	GELIC_LV1_WL_EVENT_DEAUTH         = 0x04, /* Deauthed by the AP */
     20	GELIC_LV1_WL_EVENT_BEACON_LOST    = 0x08, /* Beacon lost detected */
     21	GELIC_LV1_WL_EVENT_CONNECTED      = 0x10, /* Connected to AP */
     22	GELIC_LV1_WL_EVENT_WPA_CONNECTED  = 0x20, /* WPA connection */
     23	GELIC_LV1_WL_EVENT_WPA_ERROR      = 0x40, /* MIC error */
     24};
     25
     26/* arguments for GELIC_LV1_POST_WLAN_COMMAND netcontrol */
     27enum gelic_eurus_command {
     28	GELIC_EURUS_CMD_ASSOC		=  1, /* association start */
     29	GELIC_EURUS_CMD_DISASSOC	=  2, /* disassociate      */
     30	GELIC_EURUS_CMD_START_SCAN	=  3, /* scan start        */
     31	GELIC_EURUS_CMD_GET_SCAN	=  4, /* get scan result   */
     32	GELIC_EURUS_CMD_SET_COMMON_CFG	=  5, /* set common config */
     33	GELIC_EURUS_CMD_GET_COMMON_CFG	=  6, /* set common config */
     34	GELIC_EURUS_CMD_SET_WEP_CFG	=  7, /* set WEP config    */
     35	GELIC_EURUS_CMD_GET_WEP_CFG	=  8, /* get WEP config    */
     36	GELIC_EURUS_CMD_SET_WPA_CFG	=  9, /* set WPA config    */
     37	GELIC_EURUS_CMD_GET_WPA_CFG	= 10, /* get WPA config    */
     38	GELIC_EURUS_CMD_GET_RSSI_CFG	= 11, /* get RSSI info.    */
     39	GELIC_EURUS_CMD_MAX_INDEX
     40};
     41
     42/* for GELIC_EURUS_CMD_COMMON_CFG */
     43enum gelic_eurus_bss_type {
     44	GELIC_EURUS_BSS_INFRA = 0,
     45	GELIC_EURUS_BSS_ADHOC = 1, /* not supported */
     46};
     47
     48enum gelic_eurus_auth_method {
     49	GELIC_EURUS_AUTH_OPEN = 0, /* FIXME: WLAN_AUTH_OPEN */
     50	GELIC_EURUS_AUTH_SHARED = 1, /* not supported */
     51};
     52
     53enum gelic_eurus_opmode {
     54	GELIC_EURUS_OPMODE_11BG = 0, /* 802.11b/g */
     55	GELIC_EURUS_OPMODE_11B = 1, /* 802.11b only */
     56	GELIC_EURUS_OPMODE_11G = 2, /* 802.11g only */
     57};
     58
     59struct gelic_eurus_common_cfg {
     60	/* all fields are big endian */
     61	u16 scan_index;
     62	u16 bss_type;    /* infra or adhoc */
     63	u16 auth_method; /* shared key or open */
     64	u16 op_mode; /* B/G */
     65} __packed;
     66
     67
     68/* for GELIC_EURUS_CMD_WEP_CFG */
     69enum gelic_eurus_wep_security {
     70	GELIC_EURUS_WEP_SEC_NONE	= 0,
     71	GELIC_EURUS_WEP_SEC_40BIT	= 1,
     72	GELIC_EURUS_WEP_SEC_104BIT	= 2,
     73};
     74
     75struct gelic_eurus_wep_cfg {
     76	/* all fields are big endian */
     77	u16 security;
     78	u8 key[4][16];
     79} __packed;
     80
     81/* for GELIC_EURUS_CMD_WPA_CFG */
     82enum gelic_eurus_wpa_security {
     83	GELIC_EURUS_WPA_SEC_NONE		= 0x0000,
     84	/* group=TKIP, pairwise=TKIP */
     85	GELIC_EURUS_WPA_SEC_WPA_TKIP_TKIP	= 0x0001,
     86	/* group=AES, pairwise=AES */
     87	GELIC_EURUS_WPA_SEC_WPA_AES_AES		= 0x0002,
     88	/* group=TKIP, pairwise=TKIP */
     89	GELIC_EURUS_WPA_SEC_WPA2_TKIP_TKIP	= 0x0004,
     90	/* group=AES, pairwise=AES */
     91	GELIC_EURUS_WPA_SEC_WPA2_AES_AES	= 0x0008,
     92	/* group=TKIP, pairwise=AES */
     93	GELIC_EURUS_WPA_SEC_WPA_TKIP_AES	= 0x0010,
     94	/* group=TKIP, pairwise=AES */
     95	GELIC_EURUS_WPA_SEC_WPA2_TKIP_AES	= 0x0020,
     96};
     97
     98enum gelic_eurus_wpa_psk_type {
     99	GELIC_EURUS_WPA_PSK_PASSPHRASE	= 0, /* passphrase string   */
    100	GELIC_EURUS_WPA_PSK_BIN		= 1, /* 32 bytes binary key */
    101};
    102
    103#define GELIC_WL_EURUS_PSK_MAX_LEN	64
    104#define WPA_PSK_LEN			32 /* WPA spec says 256bit */
    105
    106struct gelic_eurus_wpa_cfg {
    107	/* all fields are big endian */
    108	u16 security;
    109	u16 psk_type; /* psk key encoding type */
    110	u8 psk[GELIC_WL_EURUS_PSK_MAX_LEN]; /* psk key; hex or passphrase */
    111} __packed;
    112
    113/* for GELIC_EURUS_CMD_{START,GET}_SCAN */
    114enum gelic_eurus_scan_capability {
    115	GELIC_EURUS_SCAN_CAP_ADHOC	= 0x0000,
    116	GELIC_EURUS_SCAN_CAP_INFRA	= 0x0001,
    117	GELIC_EURUS_SCAN_CAP_MASK	= 0x0001,
    118};
    119
    120enum gelic_eurus_scan_sec_type {
    121	GELIC_EURUS_SCAN_SEC_NONE	= 0x0000,
    122	GELIC_EURUS_SCAN_SEC_WEP	= 0x0100,
    123	GELIC_EURUS_SCAN_SEC_WPA	= 0x0200,
    124	GELIC_EURUS_SCAN_SEC_WPA2	= 0x0400,
    125	GELIC_EURUS_SCAN_SEC_MASK	= 0x0f00,
    126};
    127
    128enum gelic_eurus_scan_sec_wep_type {
    129	GELIC_EURUS_SCAN_SEC_WEP_UNKNOWN	= 0x0000,
    130	GELIC_EURUS_SCAN_SEC_WEP_40		= 0x0001,
    131	GELIC_EURUS_SCAN_SEC_WEP_104		= 0x0002,
    132	GELIC_EURUS_SCAN_SEC_WEP_MASK		= 0x0003,
    133};
    134
    135enum gelic_eurus_scan_sec_wpa_type {
    136	GELIC_EURUS_SCAN_SEC_WPA_UNKNOWN	= 0x0000,
    137	GELIC_EURUS_SCAN_SEC_WPA_TKIP		= 0x0001,
    138	GELIC_EURUS_SCAN_SEC_WPA_AES		= 0x0002,
    139	GELIC_EURUS_SCAN_SEC_WPA_MASK		= 0x0003,
    140};
    141
    142/*
    143 * hw BSS information structure returned from GELIC_EURUS_CMD_GET_SCAN
    144 */
    145struct gelic_eurus_scan_info {
    146	/* all fields are big endian */
    147	__be16 size;
    148	__be16 rssi; /* percentage */
    149	__be16 channel; /* channel number */
    150	__be16 beacon_period; /* FIXME: in msec unit */
    151	__be16 capability;
    152	__be16 security;
    153	u8  bssid[8]; /* last ETH_ALEN are valid. bssid[0],[1] are unused */
    154	u8  essid[32]; /* IW_ESSID_MAX_SIZE */
    155	u8  rate[16]; /* first 12 are valid */
    156	u8  ext_rate[16]; /* first 16 are valid */
    157	__be32 reserved1;
    158	__be32 reserved2;
    159	__be32 reserved3;
    160	__be32 reserved4;
    161	u8 elements[]; /* ie */
    162} __packed;
    163
    164/* the hypervisor returns bbs up to 16 */
    165#define GELIC_EURUS_MAX_SCAN  (16)
    166struct gelic_wl_scan_info {
    167	struct list_head list;
    168	struct gelic_eurus_scan_info *hwinfo;
    169
    170	int valid; /* set 1 if this entry was in latest scanned list
    171		     * from Eurus */
    172	unsigned int eurus_index; /* index in the Eurus list */
    173	unsigned long last_scanned; /* acquired time */
    174
    175	unsigned int rate_len;
    176	unsigned int rate_ext_len;
    177	unsigned int essid_len;
    178};
    179
    180/* for GELIC_EURUS_CMD_GET_RSSI */
    181struct gelic_eurus_rssi_info {
    182	/* big endian */
    183	__be16 rssi;
    184} __packed;
    185
    186
    187/* for 'stat' member of gelic_wl_info */
    188enum gelic_wl_info_status_bit {
    189	GELIC_WL_STAT_CONFIGURED,
    190	GELIC_WL_STAT_CH_INFO,   /* ch info acquired */
    191	GELIC_WL_STAT_ESSID_SET, /* ESSID specified by userspace */
    192	GELIC_WL_STAT_BSSID_SET, /* BSSID specified by userspace */
    193	GELIC_WL_STAT_WPA_PSK_SET, /* PMK specified by userspace */
    194	GELIC_WL_STAT_WPA_LEVEL_SET, /* WEP or WPA[2] selected */
    195};
    196
    197/* for 'scan_stat' member of gelic_wl_info */
    198enum gelic_wl_scan_state {
    199	/* just initialized or get last scan result failed */
    200	GELIC_WL_SCAN_STAT_INIT,
    201	/* scan request issued, accepted or chip is scanning */
    202	GELIC_WL_SCAN_STAT_SCANNING,
    203	/* scan results retrieved */
    204	GELIC_WL_SCAN_STAT_GOT_LIST,
    205};
    206
    207/* for 'cipher_method' */
    208enum gelic_wl_cipher_method {
    209	GELIC_WL_CIPHER_NONE,
    210	GELIC_WL_CIPHER_WEP,
    211	GELIC_WL_CIPHER_TKIP,
    212	GELIC_WL_CIPHER_AES,
    213};
    214
    215/* for 'wpa_level' */
    216enum gelic_wl_wpa_level {
    217	GELIC_WL_WPA_LEVEL_NONE,
    218	GELIC_WL_WPA_LEVEL_WPA,
    219	GELIC_WL_WPA_LEVEL_WPA2,
    220};
    221
    222/* for 'assoc_stat' */
    223enum gelic_wl_assoc_state {
    224	GELIC_WL_ASSOC_STAT_DISCONN,
    225	GELIC_WL_ASSOC_STAT_ASSOCIATING,
    226	GELIC_WL_ASSOC_STAT_ASSOCIATED,
    227};
    228/* part of private data alloc_etherdev() allocated */
    229#define GELIC_WEP_KEYS 4
    230struct gelic_wl_info {
    231	/* bss list */
    232	struct mutex scan_lock;
    233	struct list_head network_list;
    234	struct list_head network_free_list;
    235	struct gelic_wl_scan_info *networks;
    236
    237	unsigned long scan_age; /* last scanned time */
    238	enum gelic_wl_scan_state scan_stat;
    239	struct completion scan_done;
    240
    241	/* eurus command queue */
    242	struct workqueue_struct *eurus_cmd_queue;
    243	struct completion cmd_done_intr;
    244
    245	/* eurus event handling */
    246	struct workqueue_struct *event_queue;
    247	struct delayed_work event_work;
    248
    249	/* wl status bits */
    250	unsigned long stat;
    251	enum gelic_eurus_auth_method auth_method; /* open/shared */
    252	enum gelic_wl_cipher_method group_cipher_method;
    253	enum gelic_wl_cipher_method pairwise_cipher_method;
    254	enum gelic_wl_wpa_level wpa_level; /* wpa/wpa2 */
    255
    256	/* association handling */
    257	struct mutex assoc_stat_lock;
    258	struct delayed_work assoc_work;
    259	enum gelic_wl_assoc_state assoc_stat;
    260	struct completion assoc_done;
    261
    262	spinlock_t lock;
    263	u16 ch_info; /* available channels. bit0 = ch1 */
    264	/* WEP keys */
    265	u8 key[GELIC_WEP_KEYS][IW_ENCODING_TOKEN_MAX];
    266	unsigned long key_enabled;
    267	unsigned int key_len[GELIC_WEP_KEYS];
    268	unsigned int current_key;
    269	/* WWPA PSK */
    270	u8 psk[GELIC_WL_EURUS_PSK_MAX_LEN];
    271	enum gelic_eurus_wpa_psk_type psk_type;
    272	unsigned int psk_len;
    273
    274	u8 essid[IW_ESSID_MAX_SIZE];
    275	u8 bssid[ETH_ALEN]; /* userland requested */
    276	u8 active_bssid[ETH_ALEN]; /* associated bssid */
    277	unsigned int essid_len;
    278
    279	struct iw_public_data wireless_data;
    280	struct iw_statistics iwstat;
    281};
    282
    283#define GELIC_WL_BSS_MAX_ENT 32
    284#define GELIC_WL_ASSOC_RETRY 50
    285static inline struct gelic_port *wl_port(struct gelic_wl_info *wl)
    286{
    287	return container_of((void *)wl, struct gelic_port, priv);
    288}
    289static inline struct gelic_wl_info *port_wl(struct gelic_port *port)
    290{
    291	return port_priv(port);
    292}
    293
    294struct gelic_eurus_cmd {
    295	struct work_struct work;
    296	struct gelic_wl_info *wl;
    297	unsigned int cmd; /* command code */
    298	u64 tag;
    299	u64 size;
    300	void *buffer;
    301	unsigned int buf_size;
    302	struct completion done;
    303	int status;
    304	u64 cmd_status;
    305};
    306
    307/* private ioctls to pass PSK */
    308#define GELIC_WL_PRIV_SET_PSK		(SIOCIWFIRSTPRIV + 0)
    309#define GELIC_WL_PRIV_GET_PSK		(SIOCIWFIRSTPRIV + 1)
    310
    311int gelic_wl_driver_probe(struct gelic_card *card);
    312int gelic_wl_driver_remove(struct gelic_card *card);
    313void gelic_wl_interrupt(struct net_device *netdev, u64 status);
    314#endif /* _GELIC_WIRELESS_H */