brcmfmac: use struct brcmf_if parameter in firmware event callbacks
[deliverable/linux.git] / drivers / net / wireless / brcm80211 / brcmfmac / wl_cfg80211.c
CommitLineData
5b435de0
AS
1/*
2 * Copyright (c) 2010 Broadcom Corporation
3 *
4 * Permission to use, copy, modify, and/or distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
11 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
13 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
14 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15 */
16
17/* Toplevel file. Relies on dhd_linux.c to send commands to the dongle. */
18
02f77195
JP
19#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
20
5b435de0
AS
21#include <linux/kernel.h>
22#include <linux/if_arp.h>
23#include <linux/sched.h>
24#include <linux/kthread.h>
25#include <linux/netdevice.h>
26#include <linux/bitops.h>
27#include <linux/etherdevice.h>
28#include <linux/ieee80211.h>
29#include <linux/uaccess.h>
30#include <net/cfg80211.h>
cbaa177d 31#include <net/netlink.h>
5b435de0
AS
32
33#include <brcmu_utils.h>
34#include <defs.h>
35#include <brcmu_wifi.h>
36#include "dhd.h"
37#include "wl_cfg80211.h"
81f5dcb8 38#include "fwil.h"
5b435de0 39
e5806072
AS
40#define BRCMF_SCAN_IE_LEN_MAX 2048
41#define BRCMF_PNO_VERSION 2
42#define BRCMF_PNO_TIME 30
43#define BRCMF_PNO_REPEAT 4
44#define BRCMF_PNO_FREQ_EXPO_MAX 3
45#define BRCMF_PNO_MAX_PFN_COUNT 16
46#define BRCMF_PNO_ENABLE_ADAPTSCAN_BIT 6
47#define BRCMF_PNO_HIDDEN_BIT 2
48#define BRCMF_PNO_WPA_AUTH_ANY 0xFFFFFFFF
49#define BRCMF_PNO_SCAN_COMPLETE 1
50#define BRCMF_PNO_SCAN_INCOMPLETE 0
51
3eacf866
AS
52#define BRCMF_IFACE_MAX_CNT 2
53
1a873342 54#define TLV_LEN_OFF 1 /* length offset */
04012895 55#define TLV_HDR_LEN 2 /* header length */
1a873342
HM
56#define TLV_BODY_OFF 2 /* body offset */
57#define TLV_OUI_LEN 3 /* oui id length */
58#define WPA_OUI "\x00\x50\xF2" /* WPA OUI */
59#define WPA_OUI_TYPE 1
60#define RSN_OUI "\x00\x0F\xAC" /* RSN OUI */
61#define WME_OUI_TYPE 2
62
63#define VS_IE_FIXED_HDR_LEN 6
64#define WPA_IE_VERSION_LEN 2
65#define WPA_IE_MIN_OUI_LEN 4
66#define WPA_IE_SUITE_COUNT_LEN 2
67
68#define WPA_CIPHER_NONE 0 /* None */
69#define WPA_CIPHER_WEP_40 1 /* WEP (40-bit) */
70#define WPA_CIPHER_TKIP 2 /* TKIP: default for WPA */
71#define WPA_CIPHER_AES_CCM 4 /* AES (CCM) */
72#define WPA_CIPHER_WEP_104 5 /* WEP (104-bit) */
73
74#define RSN_AKM_NONE 0 /* None (IBSS) */
75#define RSN_AKM_UNSPECIFIED 1 /* Over 802.1x */
76#define RSN_AKM_PSK 2 /* Pre-shared Key */
77#define RSN_CAP_LEN 2 /* Length of RSN capabilities */
78#define RSN_CAP_PTK_REPLAY_CNTR_MASK 0x000C
79
80#define VNDR_IE_CMD_LEN 4 /* length of the set command
81 * string :"add", "del" (+ NUL)
82 */
83#define VNDR_IE_COUNT_OFFSET 4
84#define VNDR_IE_PKTFLAG_OFFSET 8
85#define VNDR_IE_VSIE_OFFSET 12
86#define VNDR_IE_HDR_SIZE 12
87#define VNDR_IE_BEACON_FLAG 0x1
88#define VNDR_IE_PRBRSP_FLAG 0x2
89#define MAX_VNDR_IE_NUMBER 5
90
91#define DOT11_MGMT_HDR_LEN 24 /* d11 management header len */
92#define DOT11_BCN_PRB_FIXED_LEN 12 /* beacon/probe fixed length */
04012895 93
5b435de0
AS
94#define BRCMF_ASSOC_PARAMS_FIXED_SIZE \
95 (sizeof(struct brcmf_assoc_params_le) - sizeof(u16))
96
5b435de0
AS
97static u32 brcmf_dbg_level = WL_DBG_ERR;
98
ce81e317 99static bool check_vif_up(struct brcmf_cfg80211_vif *vif)
5b435de0 100{
c1179033
AS
101 if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state)) {
102 WL_INFO("device is not ready : status (%lu)\n",
103 vif->sme_state);
5b435de0
AS
104 return false;
105 }
106 return true;
107}
108
109#define CHAN2G(_channel, _freq, _flags) { \
110 .band = IEEE80211_BAND_2GHZ, \
111 .center_freq = (_freq), \
112 .hw_value = (_channel), \
113 .flags = (_flags), \
114 .max_antenna_gain = 0, \
115 .max_power = 30, \
116}
117
118#define CHAN5G(_channel, _flags) { \
119 .band = IEEE80211_BAND_5GHZ, \
120 .center_freq = 5000 + (5 * (_channel)), \
121 .hw_value = (_channel), \
122 .flags = (_flags), \
123 .max_antenna_gain = 0, \
124 .max_power = 30, \
125}
126
127#define RATE_TO_BASE100KBPS(rate) (((rate) * 10) / 2)
128#define RATETAB_ENT(_rateid, _flags) \
129 { \
130 .bitrate = RATE_TO_BASE100KBPS(_rateid), \
131 .hw_value = (_rateid), \
132 .flags = (_flags), \
133 }
134
135static struct ieee80211_rate __wl_rates[] = {
136 RATETAB_ENT(BRCM_RATE_1M, 0),
137 RATETAB_ENT(BRCM_RATE_2M, IEEE80211_RATE_SHORT_PREAMBLE),
138 RATETAB_ENT(BRCM_RATE_5M5, IEEE80211_RATE_SHORT_PREAMBLE),
139 RATETAB_ENT(BRCM_RATE_11M, IEEE80211_RATE_SHORT_PREAMBLE),
140 RATETAB_ENT(BRCM_RATE_6M, 0),
141 RATETAB_ENT(BRCM_RATE_9M, 0),
142 RATETAB_ENT(BRCM_RATE_12M, 0),
143 RATETAB_ENT(BRCM_RATE_18M, 0),
144 RATETAB_ENT(BRCM_RATE_24M, 0),
145 RATETAB_ENT(BRCM_RATE_36M, 0),
146 RATETAB_ENT(BRCM_RATE_48M, 0),
147 RATETAB_ENT(BRCM_RATE_54M, 0),
148};
149
150#define wl_a_rates (__wl_rates + 4)
151#define wl_a_rates_size 8
152#define wl_g_rates (__wl_rates + 0)
153#define wl_g_rates_size 12
154
155static struct ieee80211_channel __wl_2ghz_channels[] = {
156 CHAN2G(1, 2412, 0),
157 CHAN2G(2, 2417, 0),
158 CHAN2G(3, 2422, 0),
159 CHAN2G(4, 2427, 0),
160 CHAN2G(5, 2432, 0),
161 CHAN2G(6, 2437, 0),
162 CHAN2G(7, 2442, 0),
163 CHAN2G(8, 2447, 0),
164 CHAN2G(9, 2452, 0),
165 CHAN2G(10, 2457, 0),
166 CHAN2G(11, 2462, 0),
167 CHAN2G(12, 2467, 0),
168 CHAN2G(13, 2472, 0),
169 CHAN2G(14, 2484, 0),
170};
171
172static struct ieee80211_channel __wl_5ghz_a_channels[] = {
173 CHAN5G(34, 0), CHAN5G(36, 0),
174 CHAN5G(38, 0), CHAN5G(40, 0),
175 CHAN5G(42, 0), CHAN5G(44, 0),
176 CHAN5G(46, 0), CHAN5G(48, 0),
177 CHAN5G(52, 0), CHAN5G(56, 0),
178 CHAN5G(60, 0), CHAN5G(64, 0),
179 CHAN5G(100, 0), CHAN5G(104, 0),
180 CHAN5G(108, 0), CHAN5G(112, 0),
181 CHAN5G(116, 0), CHAN5G(120, 0),
182 CHAN5G(124, 0), CHAN5G(128, 0),
183 CHAN5G(132, 0), CHAN5G(136, 0),
184 CHAN5G(140, 0), CHAN5G(149, 0),
185 CHAN5G(153, 0), CHAN5G(157, 0),
186 CHAN5G(161, 0), CHAN5G(165, 0),
187 CHAN5G(184, 0), CHAN5G(188, 0),
188 CHAN5G(192, 0), CHAN5G(196, 0),
189 CHAN5G(200, 0), CHAN5G(204, 0),
190 CHAN5G(208, 0), CHAN5G(212, 0),
191 CHAN5G(216, 0),
192};
193
194static struct ieee80211_channel __wl_5ghz_n_channels[] = {
195 CHAN5G(32, 0), CHAN5G(34, 0),
196 CHAN5G(36, 0), CHAN5G(38, 0),
197 CHAN5G(40, 0), CHAN5G(42, 0),
198 CHAN5G(44, 0), CHAN5G(46, 0),
199 CHAN5G(48, 0), CHAN5G(50, 0),
200 CHAN5G(52, 0), CHAN5G(54, 0),
201 CHAN5G(56, 0), CHAN5G(58, 0),
202 CHAN5G(60, 0), CHAN5G(62, 0),
203 CHAN5G(64, 0), CHAN5G(66, 0),
204 CHAN5G(68, 0), CHAN5G(70, 0),
205 CHAN5G(72, 0), CHAN5G(74, 0),
206 CHAN5G(76, 0), CHAN5G(78, 0),
207 CHAN5G(80, 0), CHAN5G(82, 0),
208 CHAN5G(84, 0), CHAN5G(86, 0),
209 CHAN5G(88, 0), CHAN5G(90, 0),
210 CHAN5G(92, 0), CHAN5G(94, 0),
211 CHAN5G(96, 0), CHAN5G(98, 0),
212 CHAN5G(100, 0), CHAN5G(102, 0),
213 CHAN5G(104, 0), CHAN5G(106, 0),
214 CHAN5G(108, 0), CHAN5G(110, 0),
215 CHAN5G(112, 0), CHAN5G(114, 0),
216 CHAN5G(116, 0), CHAN5G(118, 0),
217 CHAN5G(120, 0), CHAN5G(122, 0),
218 CHAN5G(124, 0), CHAN5G(126, 0),
219 CHAN5G(128, 0), CHAN5G(130, 0),
220 CHAN5G(132, 0), CHAN5G(134, 0),
221 CHAN5G(136, 0), CHAN5G(138, 0),
222 CHAN5G(140, 0), CHAN5G(142, 0),
223 CHAN5G(144, 0), CHAN5G(145, 0),
224 CHAN5G(146, 0), CHAN5G(147, 0),
225 CHAN5G(148, 0), CHAN5G(149, 0),
226 CHAN5G(150, 0), CHAN5G(151, 0),
227 CHAN5G(152, 0), CHAN5G(153, 0),
228 CHAN5G(154, 0), CHAN5G(155, 0),
229 CHAN5G(156, 0), CHAN5G(157, 0),
230 CHAN5G(158, 0), CHAN5G(159, 0),
231 CHAN5G(160, 0), CHAN5G(161, 0),
232 CHAN5G(162, 0), CHAN5G(163, 0),
233 CHAN5G(164, 0), CHAN5G(165, 0),
234 CHAN5G(166, 0), CHAN5G(168, 0),
235 CHAN5G(170, 0), CHAN5G(172, 0),
236 CHAN5G(174, 0), CHAN5G(176, 0),
237 CHAN5G(178, 0), CHAN5G(180, 0),
238 CHAN5G(182, 0), CHAN5G(184, 0),
239 CHAN5G(186, 0), CHAN5G(188, 0),
240 CHAN5G(190, 0), CHAN5G(192, 0),
241 CHAN5G(194, 0), CHAN5G(196, 0),
242 CHAN5G(198, 0), CHAN5G(200, 0),
243 CHAN5G(202, 0), CHAN5G(204, 0),
244 CHAN5G(206, 0), CHAN5G(208, 0),
245 CHAN5G(210, 0), CHAN5G(212, 0),
246 CHAN5G(214, 0), CHAN5G(216, 0),
247 CHAN5G(218, 0), CHAN5G(220, 0),
248 CHAN5G(222, 0), CHAN5G(224, 0),
249 CHAN5G(226, 0), CHAN5G(228, 0),
250};
251
252static struct ieee80211_supported_band __wl_band_2ghz = {
253 .band = IEEE80211_BAND_2GHZ,
254 .channels = __wl_2ghz_channels,
255 .n_channels = ARRAY_SIZE(__wl_2ghz_channels),
256 .bitrates = wl_g_rates,
257 .n_bitrates = wl_g_rates_size,
258};
259
260static struct ieee80211_supported_band __wl_band_5ghz_a = {
261 .band = IEEE80211_BAND_5GHZ,
262 .channels = __wl_5ghz_a_channels,
263 .n_channels = ARRAY_SIZE(__wl_5ghz_a_channels),
264 .bitrates = wl_a_rates,
265 .n_bitrates = wl_a_rates_size,
266};
267
268static struct ieee80211_supported_band __wl_band_5ghz_n = {
269 .band = IEEE80211_BAND_5GHZ,
270 .channels = __wl_5ghz_n_channels,
271 .n_channels = ARRAY_SIZE(__wl_5ghz_n_channels),
272 .bitrates = wl_a_rates,
273 .n_bitrates = wl_a_rates_size,
274};
275
276static const u32 __wl_cipher_suites[] = {
277 WLAN_CIPHER_SUITE_WEP40,
278 WLAN_CIPHER_SUITE_WEP104,
279 WLAN_CIPHER_SUITE_TKIP,
280 WLAN_CIPHER_SUITE_CCMP,
281 WLAN_CIPHER_SUITE_AES_CMAC,
282};
283
f8e4b412
AB
284/* tag_ID/length/value_buffer tuple */
285struct brcmf_tlv {
286 u8 id;
287 u8 len;
288 u8 data[1];
289};
290
1a873342
HM
291/* Vendor specific ie. id = 221, oui and type defines exact ie */
292struct brcmf_vs_tlv {
293 u8 id;
294 u8 len;
295 u8 oui[3];
296 u8 oui_type;
297};
298
299struct parsed_vndr_ie_info {
300 u8 *ie_ptr;
301 u32 ie_len; /* total length including id & length field */
302 struct brcmf_vs_tlv vndrie;
303};
304
305struct parsed_vndr_ies {
306 u32 count;
307 struct parsed_vndr_ie_info ie_info[MAX_VNDR_IE_NUMBER];
308};
309
ef6ac17a
AB
310/* Quarter dBm units to mW
311 * Table starts at QDBM_OFFSET, so the first entry is mW for qdBm=153
312 * Table is offset so the last entry is largest mW value that fits in
313 * a u16.
314 */
315
316#define QDBM_OFFSET 153 /* Offset for first entry */
317#define QDBM_TABLE_LEN 40 /* Table size */
318
319/* Smallest mW value that will round up to the first table entry, QDBM_OFFSET.
320 * Value is ( mW(QDBM_OFFSET - 1) + mW(QDBM_OFFSET) ) / 2
321 */
322#define QDBM_TABLE_LOW_BOUND 6493 /* Low bound */
323
324/* Largest mW value that will round down to the last table entry,
325 * QDBM_OFFSET + QDBM_TABLE_LEN-1.
326 * Value is ( mW(QDBM_OFFSET + QDBM_TABLE_LEN - 1) +
327 * mW(QDBM_OFFSET + QDBM_TABLE_LEN) ) / 2.
328 */
329#define QDBM_TABLE_HIGH_BOUND 64938 /* High bound */
330
331static const u16 nqdBm_to_mW_map[QDBM_TABLE_LEN] = {
332/* qdBm: +0 +1 +2 +3 +4 +5 +6 +7 */
333/* 153: */ 6683, 7079, 7499, 7943, 8414, 8913, 9441, 10000,
334/* 161: */ 10593, 11220, 11885, 12589, 13335, 14125, 14962, 15849,
335/* 169: */ 16788, 17783, 18836, 19953, 21135, 22387, 23714, 25119,
336/* 177: */ 26607, 28184, 29854, 31623, 33497, 35481, 37584, 39811,
337/* 185: */ 42170, 44668, 47315, 50119, 53088, 56234, 59566, 63096
338};
339
340static u16 brcmf_qdbm_to_mw(u8 qdbm)
341{
342 uint factor = 1;
343 int idx = qdbm - QDBM_OFFSET;
344
345 if (idx >= QDBM_TABLE_LEN)
346 /* clamp to max u16 mW value */
347 return 0xFFFF;
348
349 /* scale the qdBm index up to the range of the table 0-40
350 * where an offset of 40 qdBm equals a factor of 10 mW.
351 */
352 while (idx < 0) {
353 idx += 40;
354 factor *= 10;
355 }
356
357 /* return the mW value scaled down to the correct factor of 10,
358 * adding in factor/2 to get proper rounding.
359 */
360 return (nqdBm_to_mW_map[idx] + factor / 2) / factor;
361}
362
363static u8 brcmf_mw_to_qdbm(u16 mw)
364{
365 u8 qdbm;
366 int offset;
367 uint mw_uint = mw;
368 uint boundary;
369
370 /* handle boundary case */
371 if (mw_uint <= 1)
372 return 0;
373
374 offset = QDBM_OFFSET;
375
376 /* move mw into the range of the table */
377 while (mw_uint < QDBM_TABLE_LOW_BOUND) {
378 mw_uint *= 10;
379 offset -= 40;
380 }
381
382 for (qdbm = 0; qdbm < QDBM_TABLE_LEN - 1; qdbm++) {
383 boundary = nqdBm_to_mW_map[qdbm] + (nqdBm_to_mW_map[qdbm + 1] -
384 nqdBm_to_mW_map[qdbm]) / 2;
385 if (mw_uint < boundary)
386 break;
387 }
388
389 qdbm += (u8) offset;
390
391 return qdbm;
392}
393
6e186166
AS
394static u16 channel_to_chanspec(struct ieee80211_channel *ch)
395{
396 u16 chanspec;
397
398 chanspec = ieee80211_frequency_to_channel(ch->center_freq);
399 chanspec &= WL_CHANSPEC_CHAN_MASK;
400
401 if (ch->band == IEEE80211_BAND_2GHZ)
402 chanspec |= WL_CHANSPEC_BAND_2G;
403 else
404 chanspec |= WL_CHANSPEC_BAND_5G;
405
406 if (ch->flags & IEEE80211_CHAN_NO_HT40) {
407 chanspec |= WL_CHANSPEC_BW_20;
408 chanspec |= WL_CHANSPEC_CTL_SB_NONE;
409 } else {
410 chanspec |= WL_CHANSPEC_BW_40;
411 if (ch->flags & IEEE80211_CHAN_NO_HT40PLUS)
412 chanspec |= WL_CHANSPEC_CTL_SB_LOWER;
413 else
414 chanspec |= WL_CHANSPEC_CTL_SB_UPPER;
415 }
416 return chanspec;
417}
418
5b435de0
AS
419static void convert_key_from_CPU(struct brcmf_wsec_key *key,
420 struct brcmf_wsec_key_le *key_le)
421{
422 key_le->index = cpu_to_le32(key->index);
423 key_le->len = cpu_to_le32(key->len);
424 key_le->algo = cpu_to_le32(key->algo);
425 key_le->flags = cpu_to_le32(key->flags);
426 key_le->rxiv.hi = cpu_to_le32(key->rxiv.hi);
427 key_le->rxiv.lo = cpu_to_le16(key->rxiv.lo);
428 key_le->iv_initialized = cpu_to_le32(key->iv_initialized);
429 memcpy(key_le->data, key->data, sizeof(key->data));
430 memcpy(key_le->ea, key->ea, sizeof(key->ea));
431}
432
f09d0c02 433static int
2eaba7e8 434send_key_to_dongle(struct net_device *ndev, struct brcmf_wsec_key *key)
5b435de0
AS
435{
436 int err;
437 struct brcmf_wsec_key_le key_le;
438
439 convert_key_from_CPU(key, &key_le);
f09d0c02 440
81f5dcb8
HM
441 brcmf_netdev_wait_pend8021x(ndev);
442
ac24be6f 443 err = brcmf_fil_bsscfg_data_set(netdev_priv(ndev), "wsec_key", &key_le,
81f5dcb8 444 sizeof(key_le));
f09d0c02 445
5b435de0 446 if (err)
f09d0c02 447 WL_ERR("wsec_key error (%d)\n", err);
5b435de0
AS
448 return err;
449}
450
451static s32
452brcmf_cfg80211_change_iface(struct wiphy *wiphy, struct net_device *ndev,
453 enum nl80211_iftype type, u32 *flags,
454 struct vif_params *params)
455{
c1179033 456 struct brcmf_if *ifp = netdev_priv(ndev);
27a68fe3 457 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
5b435de0 458 s32 infra = 0;
1a873342 459 s32 ap = 0;
5b435de0
AS
460 s32 err = 0;
461
1a873342 462 WL_TRACE("Enter, ndev=%p, type=%d\n", ndev, type);
5b435de0
AS
463
464 switch (type) {
465 case NL80211_IFTYPE_MONITOR:
466 case NL80211_IFTYPE_WDS:
467 WL_ERR("type (%d) : currently we do not support this type\n",
468 type);
469 return -EOPNOTSUPP;
470 case NL80211_IFTYPE_ADHOC:
27a68fe3 471 cfg->conf->mode = WL_MODE_IBSS;
5b435de0
AS
472 infra = 0;
473 break;
474 case NL80211_IFTYPE_STATION:
27a68fe3 475 cfg->conf->mode = WL_MODE_BSS;
5b435de0
AS
476 infra = 1;
477 break;
1a873342 478 case NL80211_IFTYPE_AP:
27a68fe3 479 cfg->conf->mode = WL_MODE_AP;
1a873342
HM
480 ap = 1;
481 break;
5b435de0
AS
482 default:
483 err = -EINVAL;
484 goto done;
485 }
486
1a873342 487 if (ap) {
c1179033 488 set_bit(BRCMF_VIF_STATUS_AP_CREATING, &ifp->vif->sme_state);
1a873342 489 WL_INFO("IF Type = AP\n");
5b435de0 490 } else {
ac24be6f
AS
491 err = brcmf_fil_cmd_int_set(netdev_priv(ndev),
492 BRCMF_C_SET_INFRA, infra);
1a873342
HM
493 if (err) {
494 WL_ERR("WLC_SET_INFRA error (%d)\n", err);
495 err = -EAGAIN;
496 goto done;
497 }
498 WL_INFO("IF Type = %s\n",
27a68fe3 499 (cfg->conf->mode == WL_MODE_IBSS) ?
1a873342 500 "Adhoc" : "Infra");
5b435de0 501 }
1a873342 502 ndev->ieee80211_ptr->iftype = type;
5b435de0
AS
503
504done:
505 WL_TRACE("Exit\n");
506
507 return err;
508}
509
5b435de0
AS
510static void brcmf_set_mpc(struct net_device *ndev, int mpc)
511{
c1179033 512 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0 513 s32 err = 0;
5b435de0 514
ce81e317 515 if (check_vif_up(ifp->vif)) {
c1179033 516 err = brcmf_fil_iovar_int_set(ifp, "mpc", mpc);
5b435de0
AS
517 if (err) {
518 WL_ERR("fail to set mpc\n");
519 return;
520 }
521 WL_INFO("MPC : %d\n", mpc);
522 }
523}
524
e756af5b
HM
525static void brcmf_escan_prep(struct brcmf_scan_params_le *params_le,
526 struct cfg80211_scan_request *request)
527{
528 u32 n_ssids;
529 u32 n_channels;
530 s32 i;
531 s32 offset;
029591f3 532 u16 chanspec;
e756af5b 533 char *ptr;
029591f3 534 struct brcmf_ssid_le ssid_le;
e756af5b 535
ba40d166 536 memset(params_le->bssid, 0xFF, ETH_ALEN);
e756af5b
HM
537 params_le->bss_type = DOT11_BSSTYPE_ANY;
538 params_le->scan_type = 0;
539 params_le->channel_num = 0;
540 params_le->nprobes = cpu_to_le32(-1);
541 params_le->active_time = cpu_to_le32(-1);
542 params_le->passive_time = cpu_to_le32(-1);
543 params_le->home_time = cpu_to_le32(-1);
544 memset(&params_le->ssid_le, 0, sizeof(params_le->ssid_le));
545
546 /* if request is null exit so it will be all channel broadcast scan */
547 if (!request)
548 return;
549
550 n_ssids = request->n_ssids;
551 n_channels = request->n_channels;
552 /* Copy channel array if applicable */
553 WL_SCAN("### List of channelspecs to scan ### %d\n", n_channels);
554 if (n_channels > 0) {
555 for (i = 0; i < n_channels; i++) {
6e186166 556 chanspec = channel_to_chanspec(request->channels[i]);
e756af5b 557 WL_SCAN("Chan : %d, Channel spec: %x\n",
6e186166 558 request->channels[i]->hw_value, chanspec);
029591f3 559 params_le->channel_list[i] = cpu_to_le16(chanspec);
e756af5b
HM
560 }
561 } else {
562 WL_SCAN("Scanning all channels\n");
563 }
564 /* Copy ssid array if applicable */
565 WL_SCAN("### List of SSIDs to scan ### %d\n", n_ssids);
566 if (n_ssids > 0) {
567 offset = offsetof(struct brcmf_scan_params_le, channel_list) +
568 n_channels * sizeof(u16);
569 offset = roundup(offset, sizeof(u32));
570 ptr = (char *)params_le + offset;
571 for (i = 0; i < n_ssids; i++) {
029591f3
AS
572 memset(&ssid_le, 0, sizeof(ssid_le));
573 ssid_le.SSID_len =
574 cpu_to_le32(request->ssids[i].ssid_len);
575 memcpy(ssid_le.SSID, request->ssids[i].ssid,
576 request->ssids[i].ssid_len);
577 if (!ssid_le.SSID_len)
e756af5b
HM
578 WL_SCAN("%d: Broadcast scan\n", i);
579 else
580 WL_SCAN("%d: scan for %s size =%d\n", i,
029591f3
AS
581 ssid_le.SSID, ssid_le.SSID_len);
582 memcpy(ptr, &ssid_le, sizeof(ssid_le));
583 ptr += sizeof(ssid_le);
e756af5b
HM
584 }
585 } else {
586 WL_SCAN("Broadcast scan %p\n", request->ssids);
587 if ((request->ssids) && request->ssids->ssid_len) {
588 WL_SCAN("SSID %s len=%d\n", params_le->ssid_le.SSID,
589 request->ssids->ssid_len);
590 params_le->ssid_le.SSID_len =
591 cpu_to_le32(request->ssids->ssid_len);
592 memcpy(&params_le->ssid_le.SSID, request->ssids->ssid,
593 request->ssids->ssid_len);
594 }
595 }
596 /* Adding mask to channel numbers */
597 params_le->channel_num =
598 cpu_to_le32((n_ssids << BRCMF_SCAN_PARAMS_NSSID_SHIFT) |
599 (n_channels & BRCMF_SCAN_PARAMS_COUNT_MASK));
600}
601
602static s32
27a68fe3 603brcmf_notify_escan_complete(struct brcmf_cfg80211_info *cfg,
e756af5b
HM
604 struct net_device *ndev,
605 bool aborted, bool fw_abort)
606{
607 struct brcmf_scan_params_le params_le;
608 struct cfg80211_scan_request *scan_request;
609 s32 err = 0;
610
611 WL_SCAN("Enter\n");
612
613 /* clear scan request, because the FW abort can cause a second call */
614 /* to this functon and might cause a double cfg80211_scan_done */
27a68fe3
AS
615 scan_request = cfg->scan_request;
616 cfg->scan_request = NULL;
e756af5b 617
27a68fe3
AS
618 if (timer_pending(&cfg->escan_timeout))
619 del_timer_sync(&cfg->escan_timeout);
e756af5b
HM
620
621 if (fw_abort) {
622 /* Do a scan abort to stop the driver's scan engine */
623 WL_SCAN("ABORT scan in firmware\n");
624 memset(&params_le, 0, sizeof(params_le));
ba40d166 625 memset(params_le.bssid, 0xFF, ETH_ALEN);
e756af5b
HM
626 params_le.bss_type = DOT11_BSSTYPE_ANY;
627 params_le.scan_type = 0;
628 params_le.channel_num = cpu_to_le32(1);
629 params_le.nprobes = cpu_to_le32(1);
630 params_le.active_time = cpu_to_le32(-1);
631 params_le.passive_time = cpu_to_le32(-1);
632 params_le.home_time = cpu_to_le32(-1);
633 /* Scan is aborted by setting channel_list[0] to -1 */
634 params_le.channel_list[0] = cpu_to_le16(-1);
635 /* E-Scan (or anyother type) can be aborted by SCAN */
ac24be6f
AS
636 err = brcmf_fil_cmd_data_set(netdev_priv(ndev), BRCMF_C_SCAN,
637 &params_le, sizeof(params_le));
e756af5b
HM
638 if (err)
639 WL_ERR("Scan abort failed\n");
640 }
e5806072
AS
641 /*
642 * e-scan can be initiated by scheduled scan
643 * which takes precedence.
644 */
27a68fe3 645 if (cfg->sched_escan) {
e5806072 646 WL_SCAN("scheduled scan completed\n");
27a68fe3 647 cfg->sched_escan = false;
e5806072 648 if (!aborted)
27a68fe3 649 cfg80211_sched_scan_results(cfg_to_wiphy(cfg));
e5806072
AS
650 brcmf_set_mpc(ndev, 1);
651 } else if (scan_request) {
e756af5b
HM
652 WL_SCAN("ESCAN Completed scan: %s\n",
653 aborted ? "Aborted" : "Done");
654 cfg80211_scan_done(scan_request, aborted);
655 brcmf_set_mpc(ndev, 1);
656 }
c1179033 657 if (!test_and_clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
e756af5b
HM
658 WL_ERR("Scan complete while device not scanning\n");
659 return -EPERM;
660 }
661
662 return err;
663}
664
665static s32
27a68fe3 666brcmf_run_escan(struct brcmf_cfg80211_info *cfg, struct net_device *ndev,
e756af5b
HM
667 struct cfg80211_scan_request *request, u16 action)
668{
669 s32 params_size = BRCMF_SCAN_PARAMS_FIXED_SIZE +
670 offsetof(struct brcmf_escan_params_le, params_le);
671 struct brcmf_escan_params_le *params;
672 s32 err = 0;
673
674 WL_SCAN("E-SCAN START\n");
675
676 if (request != NULL) {
677 /* Allocate space for populating ssids in struct */
678 params_size += sizeof(u32) * ((request->n_channels + 1) / 2);
679
680 /* Allocate space for populating ssids in struct */
681 params_size += sizeof(struct brcmf_ssid) * request->n_ssids;
682 }
683
684 params = kzalloc(params_size, GFP_KERNEL);
685 if (!params) {
686 err = -ENOMEM;
687 goto exit;
688 }
689 BUG_ON(params_size + sizeof("escan") >= BRCMF_DCMD_MEDLEN);
690 brcmf_escan_prep(&params->params_le, request);
691 params->version = cpu_to_le32(BRCMF_ESCAN_REQ_VERSION);
692 params->action = cpu_to_le16(action);
693 params->sync_id = cpu_to_le16(0x1234);
694
ac24be6f
AS
695 err = brcmf_fil_iovar_data_set(netdev_priv(ndev), "escan",
696 params, params_size);
e756af5b
HM
697 if (err) {
698 if (err == -EBUSY)
699 WL_INFO("system busy : escan canceled\n");
700 else
701 WL_ERR("error (%d)\n", err);
702 }
703
704 kfree(params);
705exit:
706 return err;
707}
708
709static s32
27a68fe3 710brcmf_do_escan(struct brcmf_cfg80211_info *cfg, struct wiphy *wiphy,
e756af5b
HM
711 struct net_device *ndev, struct cfg80211_scan_request *request)
712{
713 s32 err;
81f5dcb8 714 u32 passive_scan;
e756af5b
HM
715 struct brcmf_scan_results *results;
716
717 WL_SCAN("Enter\n");
27a68fe3
AS
718 cfg->escan_info.ndev = ndev;
719 cfg->escan_info.wiphy = wiphy;
720 cfg->escan_info.escan_state = WL_ESCAN_STATE_SCANNING;
81f5dcb8 721 passive_scan = cfg->active_scan ? 0 : 1;
ac24be6f 722 err = brcmf_fil_cmd_int_set(netdev_priv(ndev), BRCMF_C_SET_PASSIVE_SCAN,
81f5dcb8 723 passive_scan);
e756af5b
HM
724 if (err) {
725 WL_ERR("error (%d)\n", err);
726 return err;
727 }
728 brcmf_set_mpc(ndev, 0);
27a68fe3 729 results = (struct brcmf_scan_results *)cfg->escan_info.escan_buf;
e756af5b
HM
730 results->version = 0;
731 results->count = 0;
732 results->buflen = WL_ESCAN_RESULTS_FIXED_SIZE;
733
27a68fe3 734 err = brcmf_run_escan(cfg, ndev, request, WL_ESCAN_ACTION_START);
e756af5b
HM
735 if (err)
736 brcmf_set_mpc(ndev, 1);
737 return err;
738}
739
740static s32
741brcmf_cfg80211_escan(struct wiphy *wiphy, struct net_device *ndev,
742 struct cfg80211_scan_request *request,
743 struct cfg80211_ssid *this_ssid)
744{
c1179033 745 struct brcmf_if *ifp = netdev_priv(ndev);
27a68fe3 746 struct brcmf_cfg80211_info *cfg = ndev_to_cfg(ndev);
e756af5b 747 struct cfg80211_ssid *ssids;
f0799895 748 struct brcmf_cfg80211_scan_req *sr = &cfg->scan_req_int;
81f5dcb8 749 u32 passive_scan;
e756af5b
HM
750 bool escan_req;
751 bool spec_scan;
752 s32 err;
753 u32 SSID_len;
754
755 WL_SCAN("START ESCAN\n");
756
c1179033
AS
757 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
758 WL_ERR("Scanning already: status (%lu)\n", cfg->scan_status);
e756af5b
HM
759 return -EAGAIN;
760 }
c1179033
AS
761 if (test_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status)) {
762 WL_ERR("Scanning being aborted: status (%lu)\n",
763 cfg->scan_status);
e756af5b
HM
764 return -EAGAIN;
765 }
c1179033
AS
766 if (test_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state)) {
767 WL_ERR("Connecting: status (%lu)\n", ifp->vif->sme_state);
e756af5b
HM
768 return -EAGAIN;
769 }
770
771 /* Arm scan timeout timer */
27a68fe3 772 mod_timer(&cfg->escan_timeout, jiffies +
e756af5b
HM
773 WL_ESCAN_TIMER_INTERVAL_MS * HZ / 1000);
774
775 escan_req = false;
776 if (request) {
777 /* scan bss */
778 ssids = request->ssids;
779 escan_req = true;
780 } else {
781 /* scan in ibss */
782 /* we don't do escan in ibss */
783 ssids = this_ssid;
784 }
785
27a68fe3 786 cfg->scan_request = request;
c1179033 787 set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
e756af5b 788 if (escan_req) {
27a68fe3 789 err = brcmf_do_escan(cfg, wiphy, ndev, request);
2cb941c0 790 if (err)
e756af5b
HM
791 goto scan_out;
792 } else {
793 WL_SCAN("ssid \"%s\", ssid_len (%d)\n",
794 ssids->ssid, ssids->ssid_len);
795 memset(&sr->ssid_le, 0, sizeof(sr->ssid_le));
796 SSID_len = min_t(u8, sizeof(sr->ssid_le.SSID), ssids->ssid_len);
797 sr->ssid_le.SSID_len = cpu_to_le32(0);
798 spec_scan = false;
799 if (SSID_len) {
800 memcpy(sr->ssid_le.SSID, ssids->ssid, SSID_len);
801 sr->ssid_le.SSID_len = cpu_to_le32(SSID_len);
802 spec_scan = true;
803 } else
804 WL_SCAN("Broadcast scan\n");
805
81f5dcb8 806 passive_scan = cfg->active_scan ? 0 : 1;
c1179033 807 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PASSIVE_SCAN,
81f5dcb8 808 passive_scan);
e756af5b
HM
809 if (err) {
810 WL_ERR("WLC_SET_PASSIVE_SCAN error (%d)\n", err);
811 goto scan_out;
812 }
813 brcmf_set_mpc(ndev, 0);
c1179033 814 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCAN,
ac24be6f 815 &sr->ssid_le, sizeof(sr->ssid_le));
e756af5b
HM
816 if (err) {
817 if (err == -EBUSY)
818 WL_INFO("BUSY: scan for \"%s\" canceled\n",
819 sr->ssid_le.SSID);
820 else
821 WL_ERR("WLC_SCAN error (%d)\n", err);
822
823 brcmf_set_mpc(ndev, 1);
824 goto scan_out;
825 }
826 }
827
828 return 0;
829
830scan_out:
c1179033 831 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
27a68fe3
AS
832 if (timer_pending(&cfg->escan_timeout))
833 del_timer_sync(&cfg->escan_timeout);
834 cfg->scan_request = NULL;
e756af5b
HM
835 return err;
836}
837
5b435de0 838static s32
0abb5f21 839brcmf_cfg80211_scan(struct wiphy *wiphy, struct cfg80211_scan_request *request)
5b435de0 840{
fd014284 841 struct net_device *ndev = request->wdev->netdev;
5b435de0
AS
842 s32 err = 0;
843
844 WL_TRACE("Enter\n");
845
ce81e317 846 if (!check_vif_up(container_of(request->wdev,
0abb5f21 847 struct brcmf_cfg80211_vif, wdev)))
5b435de0
AS
848 return -EIO;
849
f0799895 850 err = brcmf_cfg80211_escan(wiphy, ndev, request, NULL);
e756af5b 851
5b435de0
AS
852 if (err)
853 WL_ERR("scan error (%d)\n", err);
854
855 WL_TRACE("Exit\n");
856 return err;
857}
858
859static s32 brcmf_set_rts(struct net_device *ndev, u32 rts_threshold)
860{
861 s32 err = 0;
862
ac24be6f
AS
863 err = brcmf_fil_iovar_int_set(netdev_priv(ndev), "rtsthresh",
864 rts_threshold);
5b435de0
AS
865 if (err)
866 WL_ERR("Error (%d)\n", err);
867
868 return err;
869}
870
871static s32 brcmf_set_frag(struct net_device *ndev, u32 frag_threshold)
872{
873 s32 err = 0;
874
ac24be6f
AS
875 err = brcmf_fil_iovar_int_set(netdev_priv(ndev), "fragthresh",
876 frag_threshold);
5b435de0
AS
877 if (err)
878 WL_ERR("Error (%d)\n", err);
879
880 return err;
881}
882
883static s32 brcmf_set_retry(struct net_device *ndev, u32 retry, bool l)
884{
885 s32 err = 0;
886 u32 cmd = (l ? BRCM_SET_LRL : BRCM_SET_SRL);
887
ac24be6f 888 err = brcmf_fil_cmd_int_set(netdev_priv(ndev), cmd, retry);
5b435de0
AS
889 if (err) {
890 WL_ERR("cmd (%d) , error (%d)\n", cmd, err);
891 return err;
892 }
893 return err;
894}
895
896static s32 brcmf_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed)
897{
27a68fe3
AS
898 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
899 struct net_device *ndev = cfg_to_ndev(cfg);
0abb5f21 900 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0
AS
901 s32 err = 0;
902
903 WL_TRACE("Enter\n");
ce81e317 904 if (!check_vif_up(ifp->vif))
5b435de0
AS
905 return -EIO;
906
907 if (changed & WIPHY_PARAM_RTS_THRESHOLD &&
27a68fe3
AS
908 (cfg->conf->rts_threshold != wiphy->rts_threshold)) {
909 cfg->conf->rts_threshold = wiphy->rts_threshold;
910 err = brcmf_set_rts(ndev, cfg->conf->rts_threshold);
5b435de0
AS
911 if (!err)
912 goto done;
913 }
914 if (changed & WIPHY_PARAM_FRAG_THRESHOLD &&
27a68fe3
AS
915 (cfg->conf->frag_threshold != wiphy->frag_threshold)) {
916 cfg->conf->frag_threshold = wiphy->frag_threshold;
917 err = brcmf_set_frag(ndev, cfg->conf->frag_threshold);
5b435de0
AS
918 if (!err)
919 goto done;
920 }
921 if (changed & WIPHY_PARAM_RETRY_LONG
27a68fe3
AS
922 && (cfg->conf->retry_long != wiphy->retry_long)) {
923 cfg->conf->retry_long = wiphy->retry_long;
924 err = brcmf_set_retry(ndev, cfg->conf->retry_long, true);
5b435de0
AS
925 if (!err)
926 goto done;
927 }
928 if (changed & WIPHY_PARAM_RETRY_SHORT
27a68fe3
AS
929 && (cfg->conf->retry_short != wiphy->retry_short)) {
930 cfg->conf->retry_short = wiphy->retry_short;
931 err = brcmf_set_retry(ndev, cfg->conf->retry_short, false);
5b435de0
AS
932 if (!err)
933 goto done;
934 }
935
936done:
937 WL_TRACE("Exit\n");
938 return err;
939}
940
5b435de0
AS
941static void brcmf_init_prof(struct brcmf_cfg80211_profile *prof)
942{
943 memset(prof, 0, sizeof(*prof));
944}
945
946static void brcmf_ch_to_chanspec(int ch, struct brcmf_join_params *join_params,
947 size_t *join_params_size)
948{
949 u16 chanspec = 0;
950
951 if (ch != 0) {
952 if (ch <= CH_MAX_2G_CHANNEL)
953 chanspec |= WL_CHANSPEC_BAND_2G;
954 else
955 chanspec |= WL_CHANSPEC_BAND_5G;
956
957 chanspec |= WL_CHANSPEC_BW_20;
958 chanspec |= WL_CHANSPEC_CTL_SB_NONE;
959
960 *join_params_size += BRCMF_ASSOC_PARAMS_FIXED_SIZE +
961 sizeof(u16);
962
963 chanspec |= (ch & WL_CHANSPEC_CHAN_MASK);
964 join_params->params_le.chanspec_list[0] = cpu_to_le16(chanspec);
965 join_params->params_le.chanspec_num = cpu_to_le32(1);
966
967 WL_CONN("join_params->params.chanspec_list[0]= %#X,"
968 "channel %d, chanspec %#X\n",
969 chanspec, ch, chanspec);
970 }
971}
972
27a68fe3 973static void brcmf_link_down(struct brcmf_cfg80211_info *cfg)
5b435de0
AS
974{
975 struct net_device *ndev = NULL;
976 s32 err = 0;
977
978 WL_TRACE("Enter\n");
979
27a68fe3
AS
980 if (cfg->link_up) {
981 ndev = cfg_to_ndev(cfg);
5b435de0 982 WL_INFO("Call WLC_DISASSOC to stop excess roaming\n ");
ac24be6f
AS
983 err = brcmf_fil_cmd_data_set(netdev_priv(ndev),
984 BRCMF_C_DISASSOC, NULL, 0);
5b435de0
AS
985 if (err)
986 WL_ERR("WLC_DISASSOC failed (%d)\n", err);
27a68fe3 987 cfg->link_up = false;
5b435de0
AS
988 }
989 WL_TRACE("Exit\n");
990}
991
992static s32
993brcmf_cfg80211_join_ibss(struct wiphy *wiphy, struct net_device *ndev,
994 struct cfg80211_ibss_params *params)
995{
27a68fe3 996 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
0abb5f21
AS
997 struct brcmf_if *ifp = netdev_priv(ndev);
998 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5b435de0
AS
999 struct brcmf_join_params join_params;
1000 size_t join_params_size = 0;
1001 s32 err = 0;
1002 s32 wsec = 0;
1003 s32 bcnprd;
5b435de0
AS
1004
1005 WL_TRACE("Enter\n");
ce81e317 1006 if (!check_vif_up(ifp->vif))
5b435de0
AS
1007 return -EIO;
1008
1009 if (params->ssid)
1010 WL_CONN("SSID: %s\n", params->ssid);
1011 else {
1012 WL_CONN("SSID: NULL, Not supported\n");
1013 return -EOPNOTSUPP;
1014 }
1015
c1179033 1016 set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
5b435de0
AS
1017
1018 if (params->bssid)
040a7831 1019 WL_CONN("BSSID: %pM\n", params->bssid);
5b435de0
AS
1020 else
1021 WL_CONN("No BSSID specified\n");
1022
1023 if (params->channel)
1024 WL_CONN("channel: %d\n", params->channel->center_freq);
1025 else
1026 WL_CONN("no channel specified\n");
1027
1028 if (params->channel_fixed)
1029 WL_CONN("fixed channel required\n");
1030 else
1031 WL_CONN("no fixed channel required\n");
1032
1033 if (params->ie && params->ie_len)
1034 WL_CONN("ie len: %d\n", params->ie_len);
1035 else
1036 WL_CONN("no ie specified\n");
1037
1038 if (params->beacon_interval)
1039 WL_CONN("beacon interval: %d\n", params->beacon_interval);
1040 else
1041 WL_CONN("no beacon interval specified\n");
1042
1043 if (params->basic_rates)
1044 WL_CONN("basic rates: %08X\n", params->basic_rates);
1045 else
1046 WL_CONN("no basic rates specified\n");
1047
1048 if (params->privacy)
1049 WL_CONN("privacy required\n");
1050 else
1051 WL_CONN("no privacy required\n");
1052
1053 /* Configure Privacy for starter */
1054 if (params->privacy)
1055 wsec |= WEP_ENABLED;
1056
c1179033 1057 err = brcmf_fil_iovar_int_set(ifp, "wsec", wsec);
5b435de0
AS
1058 if (err) {
1059 WL_ERR("wsec failed (%d)\n", err);
1060 goto done;
1061 }
1062
1063 /* Configure Beacon Interval for starter */
1064 if (params->beacon_interval)
1065 bcnprd = params->beacon_interval;
1066 else
1067 bcnprd = 100;
1068
c1179033 1069 err = brcmf_fil_cmd_int_set(ifp, BRCM_SET_BCNPRD, bcnprd);
5b435de0
AS
1070 if (err) {
1071 WL_ERR("WLC_SET_BCNPRD failed (%d)\n", err);
1072 goto done;
1073 }
1074
1075 /* Configure required join parameter */
1076 memset(&join_params, 0, sizeof(struct brcmf_join_params));
1077
1078 /* SSID */
6c8c4f72
AS
1079 profile->ssid.SSID_len = min_t(u32, params->ssid_len, 32);
1080 memcpy(profile->ssid.SSID, params->ssid, profile->ssid.SSID_len);
1081 memcpy(join_params.ssid_le.SSID, params->ssid, profile->ssid.SSID_len);
1082 join_params.ssid_le.SSID_len = cpu_to_le32(profile->ssid.SSID_len);
5b435de0 1083 join_params_size = sizeof(join_params.ssid_le);
5b435de0
AS
1084
1085 /* BSSID */
1086 if (params->bssid) {
1087 memcpy(join_params.params_le.bssid, params->bssid, ETH_ALEN);
1088 join_params_size = sizeof(join_params.ssid_le) +
1089 BRCMF_ASSOC_PARAMS_FIXED_SIZE;
6c8c4f72 1090 memcpy(profile->bssid, params->bssid, ETH_ALEN);
5b435de0 1091 } else {
ba40d166 1092 memset(join_params.params_le.bssid, 0xFF, ETH_ALEN);
6c8c4f72 1093 memset(profile->bssid, 0, ETH_ALEN);
5b435de0
AS
1094 }
1095
5b435de0
AS
1096 /* Channel */
1097 if (params->channel) {
1098 u32 target_channel;
1099
27a68fe3 1100 cfg->channel =
5b435de0
AS
1101 ieee80211_frequency_to_channel(
1102 params->channel->center_freq);
1103 if (params->channel_fixed) {
1104 /* adding chanspec */
27a68fe3 1105 brcmf_ch_to_chanspec(cfg->channel,
5b435de0
AS
1106 &join_params, &join_params_size);
1107 }
1108
1109 /* set channel for starter */
27a68fe3 1110 target_channel = cfg->channel;
c1179033 1111 err = brcmf_fil_cmd_int_set(ifp, BRCM_SET_CHANNEL,
81f5dcb8 1112 target_channel);
5b435de0
AS
1113 if (err) {
1114 WL_ERR("WLC_SET_CHANNEL failed (%d)\n", err);
1115 goto done;
1116 }
1117 } else
27a68fe3 1118 cfg->channel = 0;
5b435de0 1119
27a68fe3 1120 cfg->ibss_starter = false;
5b435de0
AS
1121
1122
c1179033 1123 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
81f5dcb8 1124 &join_params, join_params_size);
5b435de0
AS
1125 if (err) {
1126 WL_ERR("WLC_SET_SSID failed (%d)\n", err);
1127 goto done;
1128 }
1129
1130done:
1131 if (err)
c1179033 1132 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
5b435de0
AS
1133 WL_TRACE("Exit\n");
1134 return err;
1135}
1136
1137static s32
1138brcmf_cfg80211_leave_ibss(struct wiphy *wiphy, struct net_device *ndev)
1139{
27a68fe3 1140 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
0abb5f21 1141 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0
AS
1142 s32 err = 0;
1143
1144 WL_TRACE("Enter\n");
ce81e317 1145 if (!check_vif_up(ifp->vif))
5b435de0
AS
1146 return -EIO;
1147
27a68fe3 1148 brcmf_link_down(cfg);
5b435de0
AS
1149
1150 WL_TRACE("Exit\n");
1151
1152 return err;
1153}
1154
1155static s32 brcmf_set_wpa_version(struct net_device *ndev,
1156 struct cfg80211_connect_params *sme)
1157{
6ac4f4ed 1158 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
5b435de0
AS
1159 struct brcmf_cfg80211_security *sec;
1160 s32 val = 0;
1161 s32 err = 0;
1162
1163 if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1)
1164 val = WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED;
1165 else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2)
1166 val = WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED;
1167 else
1168 val = WPA_AUTH_DISABLED;
1169 WL_CONN("setting wpa_auth to 0x%0x\n", val);
ac24be6f 1170 err = brcmf_fil_iovar_int_set(netdev_priv(ndev), "wpa_auth", val);
5b435de0
AS
1171 if (err) {
1172 WL_ERR("set wpa_auth failed (%d)\n", err);
1173 return err;
1174 }
06bb123e 1175 sec = &profile->sec;
5b435de0
AS
1176 sec->wpa_versions = sme->crypto.wpa_versions;
1177 return err;
1178}
1179
1180static s32 brcmf_set_auth_type(struct net_device *ndev,
1181 struct cfg80211_connect_params *sme)
1182{
6ac4f4ed 1183 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
5b435de0
AS
1184 struct brcmf_cfg80211_security *sec;
1185 s32 val = 0;
1186 s32 err = 0;
1187
1188 switch (sme->auth_type) {
1189 case NL80211_AUTHTYPE_OPEN_SYSTEM:
1190 val = 0;
1191 WL_CONN("open system\n");
1192 break;
1193 case NL80211_AUTHTYPE_SHARED_KEY:
1194 val = 1;
1195 WL_CONN("shared key\n");
1196 break;
1197 case NL80211_AUTHTYPE_AUTOMATIC:
1198 val = 2;
1199 WL_CONN("automatic\n");
1200 break;
1201 case NL80211_AUTHTYPE_NETWORK_EAP:
1202 WL_CONN("network eap\n");
1203 default:
1204 val = 2;
1205 WL_ERR("invalid auth type (%d)\n", sme->auth_type);
1206 break;
1207 }
1208
ac24be6f 1209 err = brcmf_fil_iovar_int_set(netdev_priv(ndev), "auth", val);
5b435de0
AS
1210 if (err) {
1211 WL_ERR("set auth failed (%d)\n", err);
1212 return err;
1213 }
06bb123e 1214 sec = &profile->sec;
5b435de0
AS
1215 sec->auth_type = sme->auth_type;
1216 return err;
1217}
1218
1219static s32
1220brcmf_set_set_cipher(struct net_device *ndev,
1221 struct cfg80211_connect_params *sme)
1222{
6ac4f4ed 1223 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
5b435de0
AS
1224 struct brcmf_cfg80211_security *sec;
1225 s32 pval = 0;
1226 s32 gval = 0;
1227 s32 err = 0;
1228
1229 if (sme->crypto.n_ciphers_pairwise) {
1230 switch (sme->crypto.ciphers_pairwise[0]) {
1231 case WLAN_CIPHER_SUITE_WEP40:
1232 case WLAN_CIPHER_SUITE_WEP104:
1233 pval = WEP_ENABLED;
1234 break;
1235 case WLAN_CIPHER_SUITE_TKIP:
1236 pval = TKIP_ENABLED;
1237 break;
1238 case WLAN_CIPHER_SUITE_CCMP:
1239 pval = AES_ENABLED;
1240 break;
1241 case WLAN_CIPHER_SUITE_AES_CMAC:
1242 pval = AES_ENABLED;
1243 break;
1244 default:
1245 WL_ERR("invalid cipher pairwise (%d)\n",
1246 sme->crypto.ciphers_pairwise[0]);
1247 return -EINVAL;
1248 }
1249 }
1250 if (sme->crypto.cipher_group) {
1251 switch (sme->crypto.cipher_group) {
1252 case WLAN_CIPHER_SUITE_WEP40:
1253 case WLAN_CIPHER_SUITE_WEP104:
1254 gval = WEP_ENABLED;
1255 break;
1256 case WLAN_CIPHER_SUITE_TKIP:
1257 gval = TKIP_ENABLED;
1258 break;
1259 case WLAN_CIPHER_SUITE_CCMP:
1260 gval = AES_ENABLED;
1261 break;
1262 case WLAN_CIPHER_SUITE_AES_CMAC:
1263 gval = AES_ENABLED;
1264 break;
1265 default:
1266 WL_ERR("invalid cipher group (%d)\n",
1267 sme->crypto.cipher_group);
1268 return -EINVAL;
1269 }
1270 }
1271
1272 WL_CONN("pval (%d) gval (%d)\n", pval, gval);
ac24be6f 1273 err = brcmf_fil_iovar_int_set(netdev_priv(ndev), "wsec", pval | gval);
5b435de0
AS
1274 if (err) {
1275 WL_ERR("error (%d)\n", err);
1276 return err;
1277 }
1278
06bb123e 1279 sec = &profile->sec;
5b435de0
AS
1280 sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0];
1281 sec->cipher_group = sme->crypto.cipher_group;
1282
1283 return err;
1284}
1285
1286static s32
1287brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme)
1288{
6ac4f4ed 1289 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
5b435de0
AS
1290 struct brcmf_cfg80211_security *sec;
1291 s32 val = 0;
1292 s32 err = 0;
1293
1294 if (sme->crypto.n_akm_suites) {
ac24be6f
AS
1295 err = brcmf_fil_iovar_int_get(netdev_priv(ndev),
1296 "wpa_auth", &val);
5b435de0
AS
1297 if (err) {
1298 WL_ERR("could not get wpa_auth (%d)\n", err);
1299 return err;
1300 }
1301 if (val & (WPA_AUTH_PSK | WPA_AUTH_UNSPECIFIED)) {
1302 switch (sme->crypto.akm_suites[0]) {
1303 case WLAN_AKM_SUITE_8021X:
1304 val = WPA_AUTH_UNSPECIFIED;
1305 break;
1306 case WLAN_AKM_SUITE_PSK:
1307 val = WPA_AUTH_PSK;
1308 break;
1309 default:
1310 WL_ERR("invalid cipher group (%d)\n",
1311 sme->crypto.cipher_group);
1312 return -EINVAL;
1313 }
1314 } else if (val & (WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED)) {
1315 switch (sme->crypto.akm_suites[0]) {
1316 case WLAN_AKM_SUITE_8021X:
1317 val = WPA2_AUTH_UNSPECIFIED;
1318 break;
1319 case WLAN_AKM_SUITE_PSK:
1320 val = WPA2_AUTH_PSK;
1321 break;
1322 default:
1323 WL_ERR("invalid cipher group (%d)\n",
1324 sme->crypto.cipher_group);
1325 return -EINVAL;
1326 }
1327 }
1328
1329 WL_CONN("setting wpa_auth to %d\n", val);
ac24be6f
AS
1330 err = brcmf_fil_iovar_int_set(netdev_priv(ndev),
1331 "wpa_auth", val);
5b435de0
AS
1332 if (err) {
1333 WL_ERR("could not set wpa_auth (%d)\n", err);
1334 return err;
1335 }
1336 }
06bb123e 1337 sec = &profile->sec;
5b435de0
AS
1338 sec->wpa_auth = sme->crypto.akm_suites[0];
1339
1340 return err;
1341}
1342
1343static s32
f09d0c02
HM
1344brcmf_set_sharedkey(struct net_device *ndev,
1345 struct cfg80211_connect_params *sme)
5b435de0 1346{
6ac4f4ed 1347 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
5b435de0
AS
1348 struct brcmf_cfg80211_security *sec;
1349 struct brcmf_wsec_key key;
1350 s32 val;
1351 s32 err = 0;
1352
1353 WL_CONN("key len (%d)\n", sme->key_len);
5b435de0 1354
a718e2fe
RV
1355 if (sme->key_len == 0)
1356 return 0;
1357
06bb123e 1358 sec = &profile->sec;
a718e2fe
RV
1359 WL_CONN("wpa_versions 0x%x cipher_pairwise 0x%x\n",
1360 sec->wpa_versions, sec->cipher_pairwise);
1361
1362 if (sec->wpa_versions & (NL80211_WPA_VERSION_1 | NL80211_WPA_VERSION_2))
1363 return 0;
1364
f09d0c02
HM
1365 if (!(sec->cipher_pairwise &
1366 (WLAN_CIPHER_SUITE_WEP40 | WLAN_CIPHER_SUITE_WEP104)))
1367 return 0;
a718e2fe 1368
f09d0c02
HM
1369 memset(&key, 0, sizeof(key));
1370 key.len = (u32) sme->key_len;
1371 key.index = (u32) sme->key_idx;
1372 if (key.len > sizeof(key.data)) {
1373 WL_ERR("Too long key length (%u)\n", key.len);
1374 return -EINVAL;
1375 }
1376 memcpy(key.data, sme->key, key.len);
1377 key.flags = BRCMF_PRIMARY_KEY;
1378 switch (sec->cipher_pairwise) {
1379 case WLAN_CIPHER_SUITE_WEP40:
1380 key.algo = CRYPTO_ALGO_WEP1;
1381 break;
1382 case WLAN_CIPHER_SUITE_WEP104:
1383 key.algo = CRYPTO_ALGO_WEP128;
1384 break;
1385 default:
1386 WL_ERR("Invalid algorithm (%d)\n",
1387 sme->crypto.ciphers_pairwise[0]);
1388 return -EINVAL;
1389 }
1390 /* Set the new key/index */
1391 WL_CONN("key length (%d) key index (%d) algo (%d)\n",
1392 key.len, key.index, key.algo);
1393 WL_CONN("key \"%s\"\n", key.data);
2eaba7e8 1394 err = send_key_to_dongle(ndev, &key);
f09d0c02
HM
1395 if (err)
1396 return err;
1397
1398 if (sec->auth_type == NL80211_AUTHTYPE_SHARED_KEY) {
1399 WL_CONN("set auth_type to shared key\n");
1400 val = WL_AUTH_SHARED_KEY; /* shared key */
ac24be6f 1401 err = brcmf_fil_bsscfg_int_set(netdev_priv(ndev), "auth", val);
f09d0c02
HM
1402 if (err)
1403 WL_ERR("set auth failed (%d)\n", err);
5b435de0
AS
1404 }
1405 return err;
1406}
1407
1408static s32
1409brcmf_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev,
1410 struct cfg80211_connect_params *sme)
1411{
27a68fe3 1412 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
0abb5f21
AS
1413 struct brcmf_if *ifp = netdev_priv(ndev);
1414 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5b435de0
AS
1415 struct ieee80211_channel *chan = sme->channel;
1416 struct brcmf_join_params join_params;
1417 size_t join_params_size;
1418 struct brcmf_ssid ssid;
1419
1420 s32 err = 0;
1421
1422 WL_TRACE("Enter\n");
ce81e317 1423 if (!check_vif_up(ifp->vif))
5b435de0
AS
1424 return -EIO;
1425
1426 if (!sme->ssid) {
1427 WL_ERR("Invalid ssid\n");
1428 return -EOPNOTSUPP;
1429 }
1430
c1179033 1431 set_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
5b435de0
AS
1432
1433 if (chan) {
27a68fe3 1434 cfg->channel =
5b435de0
AS
1435 ieee80211_frequency_to_channel(chan->center_freq);
1436 WL_CONN("channel (%d), center_req (%d)\n",
27a68fe3 1437 cfg->channel, chan->center_freq);
5b435de0 1438 } else
27a68fe3 1439 cfg->channel = 0;
5b435de0
AS
1440
1441 WL_INFO("ie (%p), ie_len (%zd)\n", sme->ie, sme->ie_len);
1442
1443 err = brcmf_set_wpa_version(ndev, sme);
1444 if (err) {
1445 WL_ERR("wl_set_wpa_version failed (%d)\n", err);
1446 goto done;
1447 }
1448
1449 err = brcmf_set_auth_type(ndev, sme);
1450 if (err) {
1451 WL_ERR("wl_set_auth_type failed (%d)\n", err);
1452 goto done;
1453 }
1454
1455 err = brcmf_set_set_cipher(ndev, sme);
1456 if (err) {
1457 WL_ERR("wl_set_set_cipher failed (%d)\n", err);
1458 goto done;
1459 }
1460
1461 err = brcmf_set_key_mgmt(ndev, sme);
1462 if (err) {
1463 WL_ERR("wl_set_key_mgmt failed (%d)\n", err);
1464 goto done;
1465 }
1466
f09d0c02 1467 err = brcmf_set_sharedkey(ndev, sme);
5b435de0 1468 if (err) {
f09d0c02 1469 WL_ERR("brcmf_set_sharedkey failed (%d)\n", err);
5b435de0
AS
1470 goto done;
1471 }
1472
1473 memset(&join_params, 0, sizeof(join_params));
1474 join_params_size = sizeof(join_params.ssid_le);
1475
6c8c4f72
AS
1476 profile->ssid.SSID_len = min_t(u32,
1477 sizeof(ssid.SSID), (u32)sme->ssid_len);
1478 memcpy(&join_params.ssid_le.SSID, sme->ssid, profile->ssid.SSID_len);
1479 memcpy(&profile->ssid.SSID, sme->ssid, profile->ssid.SSID_len);
1480 join_params.ssid_le.SSID_len = cpu_to_le32(profile->ssid.SSID_len);
5b435de0 1481
ba40d166 1482 memset(join_params.params_le.bssid, 0xFF, ETH_ALEN);
5b435de0
AS
1483
1484 if (ssid.SSID_len < IEEE80211_MAX_SSID_LEN)
1485 WL_CONN("ssid \"%s\", len (%d)\n",
1486 ssid.SSID, ssid.SSID_len);
1487
27a68fe3 1488 brcmf_ch_to_chanspec(cfg->channel,
5b435de0 1489 &join_params, &join_params_size);
c1179033 1490 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
81f5dcb8 1491 &join_params, join_params_size);
5b435de0
AS
1492 if (err)
1493 WL_ERR("WLC_SET_SSID failed (%d)\n", err);
1494
1495done:
1496 if (err)
c1179033 1497 clear_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state);
5b435de0
AS
1498 WL_TRACE("Exit\n");
1499 return err;
1500}
1501
1502static s32
1503brcmf_cfg80211_disconnect(struct wiphy *wiphy, struct net_device *ndev,
1504 u16 reason_code)
1505{
27a68fe3 1506 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
0abb5f21
AS
1507 struct brcmf_if *ifp = netdev_priv(ndev);
1508 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5b435de0
AS
1509 struct brcmf_scb_val_le scbval;
1510 s32 err = 0;
1511
1512 WL_TRACE("Enter. Reason code = %d\n", reason_code);
ce81e317 1513 if (!check_vif_up(ifp->vif))
5b435de0
AS
1514 return -EIO;
1515
c1179033 1516 clear_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
5b435de0 1517
06bb123e 1518 memcpy(&scbval.ea, &profile->bssid, ETH_ALEN);
5b435de0 1519 scbval.val = cpu_to_le32(reason_code);
c1179033 1520 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_DISASSOC,
ac24be6f 1521 &scbval, sizeof(scbval));
5b435de0
AS
1522 if (err)
1523 WL_ERR("error (%d)\n", err);
1524
27a68fe3 1525 cfg->link_up = false;
5b435de0
AS
1526
1527 WL_TRACE("Exit\n");
1528 return err;
1529}
1530
1531static s32
1532brcmf_cfg80211_set_tx_power(struct wiphy *wiphy,
d3f31134 1533 enum nl80211_tx_power_setting type, s32 mbm)
5b435de0
AS
1534{
1535
27a68fe3 1536 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
0abb5f21
AS
1537 struct net_device *ndev = cfg_to_ndev(cfg);
1538 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0
AS
1539 u16 txpwrmw;
1540 s32 err = 0;
1541 s32 disable = 0;
d3f31134 1542 s32 dbm = MBM_TO_DBM(mbm);
5b435de0
AS
1543
1544 WL_TRACE("Enter\n");
ce81e317 1545 if (!check_vif_up(ifp->vif))
5b435de0
AS
1546 return -EIO;
1547
1548 switch (type) {
1549 case NL80211_TX_POWER_AUTOMATIC:
1550 break;
1551 case NL80211_TX_POWER_LIMITED:
5b435de0
AS
1552 case NL80211_TX_POWER_FIXED:
1553 if (dbm < 0) {
1554 WL_ERR("TX_POWER_FIXED - dbm is negative\n");
1555 err = -EINVAL;
1556 goto done;
1557 }
1558 break;
1559 }
1560 /* Make sure radio is off or on as far as software is concerned */
1561 disable = WL_RADIO_SW_DISABLE << 16;
ac24be6f 1562 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_RADIO, disable);
5b435de0
AS
1563 if (err)
1564 WL_ERR("WLC_SET_RADIO error (%d)\n", err);
1565
1566 if (dbm > 0xffff)
1567 txpwrmw = 0xffff;
1568 else
1569 txpwrmw = (u16) dbm;
ac24be6f
AS
1570 err = brcmf_fil_iovar_int_set(ifp, "qtxpower",
1571 (s32)brcmf_mw_to_qdbm(txpwrmw));
5b435de0
AS
1572 if (err)
1573 WL_ERR("qtxpower error (%d)\n", err);
27a68fe3 1574 cfg->conf->tx_power = dbm;
5b435de0
AS
1575
1576done:
1577 WL_TRACE("Exit\n");
1578 return err;
1579}
1580
1581static s32 brcmf_cfg80211_get_tx_power(struct wiphy *wiphy, s32 *dbm)
1582{
27a68fe3 1583 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
0abb5f21 1584 struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
5b435de0
AS
1585 s32 txpwrdbm;
1586 u8 result;
1587 s32 err = 0;
1588
1589 WL_TRACE("Enter\n");
ce81e317 1590 if (!check_vif_up(ifp->vif))
5b435de0
AS
1591 return -EIO;
1592
0abb5f21 1593 err = brcmf_fil_iovar_int_get(ifp, "qtxpower", &txpwrdbm);
5b435de0
AS
1594 if (err) {
1595 WL_ERR("error (%d)\n", err);
1596 goto done;
1597 }
1598
1599 result = (u8) (txpwrdbm & ~WL_TXPWR_OVERRIDE);
ef6ac17a 1600 *dbm = (s32) brcmf_qdbm_to_mw(result);
5b435de0
AS
1601
1602done:
1603 WL_TRACE("Exit\n");
1604 return err;
1605}
1606
1607static s32
1608brcmf_cfg80211_config_default_key(struct wiphy *wiphy, struct net_device *ndev,
1609 u8 key_idx, bool unicast, bool multicast)
1610{
0abb5f21 1611 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0
AS
1612 u32 index;
1613 u32 wsec;
1614 s32 err = 0;
1615
1616 WL_TRACE("Enter\n");
1617 WL_CONN("key index (%d)\n", key_idx);
ce81e317 1618 if (!check_vif_up(ifp->vif))
5b435de0
AS
1619 return -EIO;
1620
0abb5f21 1621 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
5b435de0
AS
1622 if (err) {
1623 WL_ERR("WLC_GET_WSEC error (%d)\n", err);
1624 goto done;
1625 }
1626
1627 if (wsec & WEP_ENABLED) {
1628 /* Just select a new current key */
1629 index = key_idx;
0abb5f21 1630 err = brcmf_fil_cmd_int_set(ifp,
ac24be6f 1631 BRCMF_C_SET_KEY_PRIMARY, index);
5b435de0
AS
1632 if (err)
1633 WL_ERR("error (%d)\n", err);
1634 }
1635done:
1636 WL_TRACE("Exit\n");
1637 return err;
1638}
1639
1640static s32
1641brcmf_add_keyext(struct wiphy *wiphy, struct net_device *ndev,
1642 u8 key_idx, const u8 *mac_addr, struct key_params *params)
1643{
1644 struct brcmf_wsec_key key;
5b435de0
AS
1645 s32 err = 0;
1646
1647 memset(&key, 0, sizeof(key));
1648 key.index = (u32) key_idx;
1649 /* Instead of bcast for ea address for default wep keys,
1650 driver needs it to be Null */
1651 if (!is_multicast_ether_addr(mac_addr))
1652 memcpy((char *)&key.ea, (void *)mac_addr, ETH_ALEN);
1653 key.len = (u32) params->key_len;
1654 /* check for key index change */
1655 if (key.len == 0) {
1656 /* key delete */
2eaba7e8 1657 err = send_key_to_dongle(ndev, &key);
5b435de0 1658 if (err)
f09d0c02 1659 WL_ERR("key delete error (%d)\n", err);
5b435de0
AS
1660 } else {
1661 if (key.len > sizeof(key.data)) {
1662 WL_ERR("Invalid key length (%d)\n", key.len);
1663 return -EINVAL;
1664 }
1665
1666 WL_CONN("Setting the key index %d\n", key.index);
1667 memcpy(key.data, params->key, key.len);
1668
1669 if (params->cipher == WLAN_CIPHER_SUITE_TKIP) {
1670 u8 keybuf[8];
1671 memcpy(keybuf, &key.data[24], sizeof(keybuf));
1672 memcpy(&key.data[24], &key.data[16], sizeof(keybuf));
1673 memcpy(&key.data[16], keybuf, sizeof(keybuf));
1674 }
1675
1676 /* if IW_ENCODE_EXT_RX_SEQ_VALID set */
1677 if (params->seq && params->seq_len == 6) {
1678 /* rx iv */
1679 u8 *ivptr;
1680 ivptr = (u8 *) params->seq;
1681 key.rxiv.hi = (ivptr[5] << 24) | (ivptr[4] << 16) |
1682 (ivptr[3] << 8) | ivptr[2];
1683 key.rxiv.lo = (ivptr[1] << 8) | ivptr[0];
1684 key.iv_initialized = true;
1685 }
1686
1687 switch (params->cipher) {
1688 case WLAN_CIPHER_SUITE_WEP40:
1689 key.algo = CRYPTO_ALGO_WEP1;
1690 WL_CONN("WLAN_CIPHER_SUITE_WEP40\n");
1691 break;
1692 case WLAN_CIPHER_SUITE_WEP104:
1693 key.algo = CRYPTO_ALGO_WEP128;
1694 WL_CONN("WLAN_CIPHER_SUITE_WEP104\n");
1695 break;
1696 case WLAN_CIPHER_SUITE_TKIP:
1697 key.algo = CRYPTO_ALGO_TKIP;
1698 WL_CONN("WLAN_CIPHER_SUITE_TKIP\n");
1699 break;
1700 case WLAN_CIPHER_SUITE_AES_CMAC:
1701 key.algo = CRYPTO_ALGO_AES_CCM;
1702 WL_CONN("WLAN_CIPHER_SUITE_AES_CMAC\n");
1703 break;
1704 case WLAN_CIPHER_SUITE_CCMP:
1705 key.algo = CRYPTO_ALGO_AES_CCM;
1706 WL_CONN("WLAN_CIPHER_SUITE_CCMP\n");
1707 break;
1708 default:
1709 WL_ERR("Invalid cipher (0x%x)\n", params->cipher);
1710 return -EINVAL;
1711 }
2eaba7e8 1712 err = send_key_to_dongle(ndev, &key);
f09d0c02
HM
1713 if (err)
1714 WL_ERR("wsec_key error (%d)\n", err);
5b435de0
AS
1715 }
1716 return err;
1717}
1718
1719static s32
1720brcmf_cfg80211_add_key(struct wiphy *wiphy, struct net_device *ndev,
1721 u8 key_idx, bool pairwise, const u8 *mac_addr,
1722 struct key_params *params)
1723{
27a68fe3 1724 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
0abb5f21 1725 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0
AS
1726 struct brcmf_wsec_key key;
1727 s32 val;
1728 s32 wsec;
1729 s32 err = 0;
1730 u8 keybuf[8];
1731
1732 WL_TRACE("Enter\n");
1733 WL_CONN("key index (%d)\n", key_idx);
ce81e317 1734 if (!check_vif_up(ifp->vif))
5b435de0
AS
1735 return -EIO;
1736
1737 if (mac_addr) {
1738 WL_TRACE("Exit");
1739 return brcmf_add_keyext(wiphy, ndev, key_idx, mac_addr, params);
1740 }
1741 memset(&key, 0, sizeof(key));
1742
1743 key.len = (u32) params->key_len;
1744 key.index = (u32) key_idx;
1745
1746 if (key.len > sizeof(key.data)) {
1747 WL_ERR("Too long key length (%u)\n", key.len);
1748 err = -EINVAL;
1749 goto done;
1750 }
1751 memcpy(key.data, params->key, key.len);
1752
1753 key.flags = BRCMF_PRIMARY_KEY;
1754 switch (params->cipher) {
1755 case WLAN_CIPHER_SUITE_WEP40:
1756 key.algo = CRYPTO_ALGO_WEP1;
f09d0c02 1757 val = WEP_ENABLED;
5b435de0
AS
1758 WL_CONN("WLAN_CIPHER_SUITE_WEP40\n");
1759 break;
1760 case WLAN_CIPHER_SUITE_WEP104:
1761 key.algo = CRYPTO_ALGO_WEP128;
f09d0c02 1762 val = WEP_ENABLED;
5b435de0
AS
1763 WL_CONN("WLAN_CIPHER_SUITE_WEP104\n");
1764 break;
1765 case WLAN_CIPHER_SUITE_TKIP:
27a68fe3 1766 if (cfg->conf->mode != WL_MODE_AP) {
1a873342
HM
1767 WL_CONN("Swapping key\n");
1768 memcpy(keybuf, &key.data[24], sizeof(keybuf));
1769 memcpy(&key.data[24], &key.data[16], sizeof(keybuf));
1770 memcpy(&key.data[16], keybuf, sizeof(keybuf));
1771 }
5b435de0 1772 key.algo = CRYPTO_ALGO_TKIP;
f09d0c02 1773 val = TKIP_ENABLED;
5b435de0
AS
1774 WL_CONN("WLAN_CIPHER_SUITE_TKIP\n");
1775 break;
1776 case WLAN_CIPHER_SUITE_AES_CMAC:
1777 key.algo = CRYPTO_ALGO_AES_CCM;
f09d0c02 1778 val = AES_ENABLED;
5b435de0
AS
1779 WL_CONN("WLAN_CIPHER_SUITE_AES_CMAC\n");
1780 break;
1781 case WLAN_CIPHER_SUITE_CCMP:
1782 key.algo = CRYPTO_ALGO_AES_CCM;
f09d0c02 1783 val = AES_ENABLED;
5b435de0
AS
1784 WL_CONN("WLAN_CIPHER_SUITE_CCMP\n");
1785 break;
1786 default:
1787 WL_ERR("Invalid cipher (0x%x)\n", params->cipher);
1788 err = -EINVAL;
1789 goto done;
1790 }
1791
2eaba7e8 1792 err = send_key_to_dongle(ndev, &key);
5b435de0
AS
1793 if (err)
1794 goto done;
1795
0abb5f21 1796 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
5b435de0
AS
1797 if (err) {
1798 WL_ERR("get wsec error (%d)\n", err);
1799 goto done;
1800 }
5b435de0 1801 wsec |= val;
0abb5f21 1802 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
5b435de0
AS
1803 if (err) {
1804 WL_ERR("set wsec error (%d)\n", err);
1805 goto done;
1806 }
1807
5b435de0
AS
1808done:
1809 WL_TRACE("Exit\n");
1810 return err;
1811}
1812
1813static s32
1814brcmf_cfg80211_del_key(struct wiphy *wiphy, struct net_device *ndev,
1815 u8 key_idx, bool pairwise, const u8 *mac_addr)
1816{
0abb5f21 1817 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0
AS
1818 struct brcmf_wsec_key key;
1819 s32 err = 0;
5b435de0
AS
1820
1821 WL_TRACE("Enter\n");
ce81e317 1822 if (!check_vif_up(ifp->vif))
5b435de0
AS
1823 return -EIO;
1824
256c374f
HM
1825 if (key_idx >= DOT11_MAX_DEFAULT_KEYS) {
1826 /* we ignore this key index in this case */
1827 WL_ERR("invalid key index (%d)\n", key_idx);
1828 return -EINVAL;
1829 }
1830
5b435de0
AS
1831 memset(&key, 0, sizeof(key));
1832
1833 key.index = (u32) key_idx;
1834 key.flags = BRCMF_PRIMARY_KEY;
1835 key.algo = CRYPTO_ALGO_OFF;
1836
1837 WL_CONN("key index (%d)\n", key_idx);
1838
1839 /* Set the new key/index */
2eaba7e8 1840 err = send_key_to_dongle(ndev, &key);
5b435de0 1841
5b435de0
AS
1842 WL_TRACE("Exit\n");
1843 return err;
1844}
1845
1846static s32
1847brcmf_cfg80211_get_key(struct wiphy *wiphy, struct net_device *ndev,
1848 u8 key_idx, bool pairwise, const u8 *mac_addr, void *cookie,
1849 void (*callback) (void *cookie, struct key_params * params))
1850{
1851 struct key_params params;
0abb5f21
AS
1852 struct brcmf_if *ifp = netdev_priv(ndev);
1853 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5b435de0
AS
1854 struct brcmf_cfg80211_security *sec;
1855 s32 wsec;
1856 s32 err = 0;
1857
1858 WL_TRACE("Enter\n");
1859 WL_CONN("key index (%d)\n", key_idx);
ce81e317 1860 if (!check_vif_up(ifp->vif))
5b435de0
AS
1861 return -EIO;
1862
1863 memset(&params, 0, sizeof(params));
1864
0abb5f21 1865 err = brcmf_fil_bsscfg_int_get(ifp, "wsec", &wsec);
5b435de0
AS
1866 if (err) {
1867 WL_ERR("WLC_GET_WSEC error (%d)\n", err);
1868 /* Ignore this error, may happen during DISASSOC */
1869 err = -EAGAIN;
1870 goto done;
1871 }
f09d0c02 1872 switch (wsec & ~SES_OW_ENABLED) {
5b435de0 1873 case WEP_ENABLED:
06bb123e 1874 sec = &profile->sec;
5b435de0
AS
1875 if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP40) {
1876 params.cipher = WLAN_CIPHER_SUITE_WEP40;
1877 WL_CONN("WLAN_CIPHER_SUITE_WEP40\n");
1878 } else if (sec->cipher_pairwise & WLAN_CIPHER_SUITE_WEP104) {
1879 params.cipher = WLAN_CIPHER_SUITE_WEP104;
1880 WL_CONN("WLAN_CIPHER_SUITE_WEP104\n");
1881 }
1882 break;
1883 case TKIP_ENABLED:
1884 params.cipher = WLAN_CIPHER_SUITE_TKIP;
1885 WL_CONN("WLAN_CIPHER_SUITE_TKIP\n");
1886 break;
1887 case AES_ENABLED:
1888 params.cipher = WLAN_CIPHER_SUITE_AES_CMAC;
1889 WL_CONN("WLAN_CIPHER_SUITE_AES_CMAC\n");
1890 break;
1891 default:
1892 WL_ERR("Invalid algo (0x%x)\n", wsec);
1893 err = -EINVAL;
1894 goto done;
1895 }
1896 callback(cookie, &params);
1897
1898done:
1899 WL_TRACE("Exit\n");
1900 return err;
1901}
1902
1903static s32
1904brcmf_cfg80211_config_default_mgmt_key(struct wiphy *wiphy,
1905 struct net_device *ndev, u8 key_idx)
1906{
1907 WL_INFO("Not supported\n");
1908
1909 return -EOPNOTSUPP;
1910}
1911
1912static s32
1913brcmf_cfg80211_get_station(struct wiphy *wiphy, struct net_device *ndev,
1a873342 1914 u8 *mac, struct station_info *sinfo)
5b435de0 1915{
27a68fe3 1916 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
0abb5f21
AS
1917 struct brcmf_if *ifp = netdev_priv(ndev);
1918 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5b435de0
AS
1919 struct brcmf_scb_val_le scb_val;
1920 int rssi;
1921 s32 rate;
1922 s32 err = 0;
06bb123e 1923 u8 *bssid = profile->bssid;
81f5dcb8 1924 struct brcmf_sta_info_le sta_info_le;
5b435de0 1925
1a873342 1926 WL_TRACE("Enter, MAC %pM\n", mac);
ce81e317 1927 if (!check_vif_up(ifp->vif))
5b435de0
AS
1928 return -EIO;
1929
27a68fe3 1930 if (cfg->conf->mode == WL_MODE_AP) {
81f5dcb8 1931 memcpy(&sta_info_le, mac, ETH_ALEN);
0abb5f21 1932 err = brcmf_fil_iovar_data_get(ifp, "sta_info",
ac24be6f 1933 &sta_info_le,
81f5dcb8 1934 sizeof(sta_info_le));
1a873342
HM
1935 if (err < 0) {
1936 WL_ERR("GET STA INFO failed, %d\n", err);
1937 goto done;
1938 }
1a873342 1939 sinfo->filled = STATION_INFO_INACTIVE_TIME;
81f5dcb8
HM
1940 sinfo->inactive_time = le32_to_cpu(sta_info_le.idle) * 1000;
1941 if (le32_to_cpu(sta_info_le.flags) & BRCMF_STA_ASSOC) {
1a873342 1942 sinfo->filled |= STATION_INFO_CONNECTED_TIME;
81f5dcb8 1943 sinfo->connected_time = le32_to_cpu(sta_info_le.in);
1a873342
HM
1944 }
1945 WL_TRACE("STA idle time : %d ms, connected time :%d sec\n",
1946 sinfo->inactive_time, sinfo->connected_time);
27a68fe3 1947 } else if (cfg->conf->mode == WL_MODE_BSS) {
1a873342
HM
1948 if (memcmp(mac, bssid, ETH_ALEN)) {
1949 WL_ERR("Wrong Mac address cfg_mac-%pM wl_bssid-%pM\n",
1950 mac, bssid);
1951 err = -ENOENT;
1952 goto done;
1953 }
1954 /* Report the current tx rate */
0abb5f21 1955 err = brcmf_fil_cmd_int_get(ifp, BRCMF_C_GET_RATE, &rate);
7f6c562d 1956 if (err) {
1a873342
HM
1957 WL_ERR("Could not get rate (%d)\n", err);
1958 goto done;
7f6c562d 1959 } else {
1a873342
HM
1960 sinfo->filled |= STATION_INFO_TX_BITRATE;
1961 sinfo->txrate.legacy = rate * 5;
1962 WL_CONN("Rate %d Mbps\n", rate / 2);
7f6c562d 1963 }
5b435de0 1964
c1179033
AS
1965 if (test_bit(BRCMF_VIF_STATUS_CONNECTED,
1966 &ifp->vif->sme_state)) {
1a873342 1967 memset(&scb_val, 0, sizeof(scb_val));
c1179033
AS
1968 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_RSSI,
1969 &scb_val, sizeof(scb_val));
1a873342
HM
1970 if (err) {
1971 WL_ERR("Could not get rssi (%d)\n", err);
1972 goto done;
1973 } else {
1974 rssi = le32_to_cpu(scb_val.val);
1975 sinfo->filled |= STATION_INFO_SIGNAL;
1976 sinfo->signal = rssi;
1977 WL_CONN("RSSI %d dBm\n", rssi);
1978 }
1979 }
1980 } else
1981 err = -EPERM;
5b435de0
AS
1982done:
1983 WL_TRACE("Exit\n");
1984 return err;
1985}
1986
1987static s32
1988brcmf_cfg80211_set_power_mgmt(struct wiphy *wiphy, struct net_device *ndev,
1989 bool enabled, s32 timeout)
1990{
1991 s32 pm;
1992 s32 err = 0;
27a68fe3 1993 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
c1179033 1994 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0
AS
1995
1996 WL_TRACE("Enter\n");
1997
1998 /*
1999 * Powersave enable/disable request is coming from the
2000 * cfg80211 even before the interface is up. In that
2001 * scenario, driver will be storing the power save
27a68fe3 2002 * preference in cfg struct to apply this to
5b435de0
AS
2003 * FW later while initializing the dongle
2004 */
27a68fe3 2005 cfg->pwr_save = enabled;
ce81e317 2006 if (!check_vif_up(ifp->vif)) {
5b435de0 2007
27a68fe3 2008 WL_INFO("Device is not ready, storing the value in cfg_info struct\n");
5b435de0
AS
2009 goto done;
2010 }
2011
2012 pm = enabled ? PM_FAST : PM_OFF;
2013 WL_INFO("power save %s\n", (pm ? "enabled" : "disabled"));
2014
c1179033 2015 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_PM, pm);
5b435de0
AS
2016 if (err) {
2017 if (err == -ENODEV)
2018 WL_ERR("net_device is not ready yet\n");
2019 else
2020 WL_ERR("error (%d)\n", err);
2021 }
2022done:
2023 WL_TRACE("Exit\n");
2024 return err;
2025}
2026
2027static s32
2028brcmf_cfg80211_set_bitrate_mask(struct wiphy *wiphy, struct net_device *ndev,
2029 const u8 *addr,
2030 const struct cfg80211_bitrate_mask *mask)
2031{
0abb5f21 2032 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0
AS
2033 struct brcm_rateset_le rateset_le;
2034 s32 rate;
2035 s32 val;
2036 s32 err_bg;
2037 s32 err_a;
2038 u32 legacy;
2039 s32 err = 0;
2040
2041 WL_TRACE("Enter\n");
ce81e317 2042 if (!check_vif_up(ifp->vif))
5b435de0
AS
2043 return -EIO;
2044
2045 /* addr param is always NULL. ignore it */
2046 /* Get current rateset */
0abb5f21 2047 err = brcmf_fil_cmd_data_get(ifp, BRCM_GET_CURR_RATESET,
ac24be6f 2048 &rateset_le, sizeof(rateset_le));
5b435de0
AS
2049 if (err) {
2050 WL_ERR("could not get current rateset (%d)\n", err);
2051 goto done;
2052 }
2053
2054 legacy = ffs(mask->control[IEEE80211_BAND_2GHZ].legacy & 0xFFFF);
2055 if (!legacy)
2056 legacy = ffs(mask->control[IEEE80211_BAND_5GHZ].legacy &
2057 0xFFFF);
2058
2059 val = wl_g_rates[legacy - 1].bitrate * 100000;
2060
2061 if (val < le32_to_cpu(rateset_le.count))
2062 /* Select rate by rateset index */
2063 rate = rateset_le.rates[val] & 0x7f;
2064 else
2065 /* Specified rate in bps */
2066 rate = val / 500000;
2067
2068 WL_CONN("rate %d mbps\n", rate / 2);
2069
2070 /*
2071 *
2072 * Set rate override,
2073 * Since the is a/b/g-blind, both a/bg_rate are enforced.
2074 */
0abb5f21
AS
2075 err_bg = brcmf_fil_iovar_int_set(ifp, "bg_rate", rate);
2076 err_a = brcmf_fil_iovar_int_set(ifp, "a_rate", rate);
5b435de0
AS
2077 if (err_bg && err_a) {
2078 WL_ERR("could not set fixed rate (%d) (%d)\n", err_bg, err_a);
2079 err = err_bg | err_a;
2080 }
2081
2082done:
2083 WL_TRACE("Exit\n");
2084 return err;
2085}
2086
27a68fe3 2087static s32 brcmf_inform_single_bss(struct brcmf_cfg80211_info *cfg,
d34bf64f 2088 struct brcmf_bss_info_le *bi)
5b435de0 2089{
27a68fe3 2090 struct wiphy *wiphy = cfg_to_wiphy(cfg);
5b435de0
AS
2091 struct ieee80211_channel *notify_channel;
2092 struct cfg80211_bss *bss;
2093 struct ieee80211_supported_band *band;
2094 s32 err = 0;
2095 u16 channel;
2096 u32 freq;
5b435de0
AS
2097 u16 notify_capability;
2098 u16 notify_interval;
2099 u8 *notify_ie;
2100 size_t notify_ielen;
2101 s32 notify_signal;
2102
2103 if (le32_to_cpu(bi->length) > WL_BSS_INFO_MAX) {
2104 WL_ERR("Bss info is larger than buffer. Discarding\n");
2105 return 0;
2106 }
2107
2108 channel = bi->ctl_ch ? bi->ctl_ch :
2109 CHSPEC_CHANNEL(le16_to_cpu(bi->chanspec));
2110
2111 if (channel <= CH_MAX_2G_CHANNEL)
2112 band = wiphy->bands[IEEE80211_BAND_2GHZ];
2113 else
2114 band = wiphy->bands[IEEE80211_BAND_5GHZ];
2115
2116 freq = ieee80211_channel_to_frequency(channel, band->band);
2117 notify_channel = ieee80211_get_channel(wiphy, freq);
2118
5b435de0
AS
2119 notify_capability = le16_to_cpu(bi->capability);
2120 notify_interval = le16_to_cpu(bi->beacon_period);
2121 notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
2122 notify_ielen = le32_to_cpu(bi->ie_length);
2123 notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100;
2124
2125 WL_CONN("bssid: %2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
2126 bi->BSSID[0], bi->BSSID[1], bi->BSSID[2],
2127 bi->BSSID[3], bi->BSSID[4], bi->BSSID[5]);
2128 WL_CONN("Channel: %d(%d)\n", channel, freq);
2129 WL_CONN("Capability: %X\n", notify_capability);
2130 WL_CONN("Beacon interval: %d\n", notify_interval);
2131 WL_CONN("Signal: %d\n", notify_signal);
5b435de0
AS
2132
2133 bss = cfg80211_inform_bss(wiphy, notify_channel, (const u8 *)bi->BSSID,
8e6cffb3 2134 0, notify_capability, notify_interval, notify_ie,
5b435de0
AS
2135 notify_ielen, notify_signal, GFP_KERNEL);
2136
e78946e1
FL
2137 if (!bss)
2138 return -ENOMEM;
2139
2140 cfg80211_put_bss(bss);
5b435de0
AS
2141
2142 return err;
2143}
2144
6f09be0a
RV
2145static struct brcmf_bss_info_le *
2146next_bss_le(struct brcmf_scan_results *list, struct brcmf_bss_info_le *bss)
2147{
2148 if (bss == NULL)
2149 return list->bss_info_le;
2150 return (struct brcmf_bss_info_le *)((unsigned long)bss +
2151 le32_to_cpu(bss->length));
2152}
2153
27a68fe3 2154static s32 brcmf_inform_bss(struct brcmf_cfg80211_info *cfg)
5b435de0
AS
2155{
2156 struct brcmf_scan_results *bss_list;
d34bf64f 2157 struct brcmf_bss_info_le *bi = NULL; /* must be initialized */
5b435de0
AS
2158 s32 err = 0;
2159 int i;
2160
27a68fe3 2161 bss_list = cfg->bss_list;
0ecd8164
AS
2162 if (bss_list->count != 0 &&
2163 bss_list->version != BRCMF_BSS_INFO_VERSION) {
5b435de0
AS
2164 WL_ERR("Version %d != WL_BSS_INFO_VERSION\n",
2165 bss_list->version);
2166 return -EOPNOTSUPP;
2167 }
2168 WL_SCAN("scanned AP count (%d)\n", bss_list->count);
f0799895 2169 for (i = 0; i < bss_list->count; i++) {
6f09be0a 2170 bi = next_bss_le(bss_list, bi);
27a68fe3 2171 err = brcmf_inform_single_bss(cfg, bi);
5b435de0
AS
2172 if (err)
2173 break;
2174 }
2175 return err;
2176}
2177
27a68fe3 2178static s32 wl_inform_ibss(struct brcmf_cfg80211_info *cfg,
5b435de0
AS
2179 struct net_device *ndev, const u8 *bssid)
2180{
27a68fe3 2181 struct wiphy *wiphy = cfg_to_wiphy(cfg);
5b435de0 2182 struct ieee80211_channel *notify_channel;
d34bf64f 2183 struct brcmf_bss_info_le *bi = NULL;
5b435de0 2184 struct ieee80211_supported_band *band;
e78946e1 2185 struct cfg80211_bss *bss;
5b435de0
AS
2186 u8 *buf = NULL;
2187 s32 err = 0;
2188 u16 channel;
2189 u32 freq;
5b435de0
AS
2190 u16 notify_capability;
2191 u16 notify_interval;
2192 u8 *notify_ie;
2193 size_t notify_ielen;
2194 s32 notify_signal;
2195
2196 WL_TRACE("Enter\n");
2197
2198 buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
2199 if (buf == NULL) {
2200 err = -ENOMEM;
2201 goto CleanUp;
2202 }
2203
2204 *(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);
2205
ac24be6f
AS
2206 err = brcmf_fil_cmd_data_get(netdev_priv(ndev), BRCMF_C_GET_BSS_INFO,
2207 buf, WL_BSS_INFO_MAX);
5b435de0
AS
2208 if (err) {
2209 WL_ERR("WLC_GET_BSS_INFO failed: %d\n", err);
2210 goto CleanUp;
2211 }
2212
d34bf64f 2213 bi = (struct brcmf_bss_info_le *)(buf + 4);
5b435de0
AS
2214
2215 channel = bi->ctl_ch ? bi->ctl_ch :
2216 CHSPEC_CHANNEL(le16_to_cpu(bi->chanspec));
2217
2218 if (channel <= CH_MAX_2G_CHANNEL)
2219 band = wiphy->bands[IEEE80211_BAND_2GHZ];
2220 else
2221 band = wiphy->bands[IEEE80211_BAND_5GHZ];
2222
2223 freq = ieee80211_channel_to_frequency(channel, band->band);
2224 notify_channel = ieee80211_get_channel(wiphy, freq);
2225
5b435de0
AS
2226 notify_capability = le16_to_cpu(bi->capability);
2227 notify_interval = le16_to_cpu(bi->beacon_period);
2228 notify_ie = (u8 *)bi + le16_to_cpu(bi->ie_offset);
2229 notify_ielen = le32_to_cpu(bi->ie_length);
2230 notify_signal = (s16)le16_to_cpu(bi->RSSI) * 100;
2231
2232 WL_CONN("channel: %d(%d)\n", channel, freq);
2233 WL_CONN("capability: %X\n", notify_capability);
2234 WL_CONN("beacon interval: %d\n", notify_interval);
2235 WL_CONN("signal: %d\n", notify_signal);
5b435de0 2236
e78946e1 2237 bss = cfg80211_inform_bss(wiphy, notify_channel, bssid,
8e6cffb3 2238 0, notify_capability, notify_interval,
5b435de0
AS
2239 notify_ie, notify_ielen, notify_signal, GFP_KERNEL);
2240
e78946e1
FL
2241 if (!bss) {
2242 err = -ENOMEM;
2243 goto CleanUp;
2244 }
2245
2246 cfg80211_put_bss(bss);
2247
5b435de0
AS
2248CleanUp:
2249
2250 kfree(buf);
2251
2252 WL_TRACE("Exit\n");
2253
2254 return err;
2255}
2256
27a68fe3 2257static bool brcmf_is_ibssmode(struct brcmf_cfg80211_info *cfg)
5b435de0 2258{
27a68fe3 2259 return cfg->conf->mode == WL_MODE_IBSS;
5b435de0
AS
2260}
2261
f8e4b412
AB
2262/*
2263 * Traverse a string of 1-byte tag/1-byte length/variable-length value
2264 * triples, returning a pointer to the substring whose first element
2265 * matches tag
2266 */
2267static struct brcmf_tlv *brcmf_parse_tlvs(void *buf, int buflen, uint key)
2268{
2269 struct brcmf_tlv *elt;
2270 int totlen;
2271
2272 elt = (struct brcmf_tlv *) buf;
2273 totlen = buflen;
2274
2275 /* find tagged parameter */
04012895 2276 while (totlen >= TLV_HDR_LEN) {
f8e4b412
AB
2277 int len = elt->len;
2278
2279 /* validate remaining totlen */
04012895 2280 if ((elt->id == key) && (totlen >= (len + TLV_HDR_LEN)))
f8e4b412
AB
2281 return elt;
2282
04012895
HM
2283 elt = (struct brcmf_tlv *) ((u8 *) elt + (len + TLV_HDR_LEN));
2284 totlen -= (len + TLV_HDR_LEN);
f8e4b412
AB
2285 }
2286
2287 return NULL;
2288}
2289
1a873342
HM
2290/* Is any of the tlvs the expected entry? If
2291 * not update the tlvs buffer pointer/length.
2292 */
2293static bool
2294brcmf_tlv_has_ie(u8 *ie, u8 **tlvs, u32 *tlvs_len,
2295 u8 *oui, u32 oui_len, u8 type)
2296{
2297 /* If the contents match the OUI and the type */
2298 if (ie[TLV_LEN_OFF] >= oui_len + 1 &&
2299 !memcmp(&ie[TLV_BODY_OFF], oui, oui_len) &&
2300 type == ie[TLV_BODY_OFF + oui_len]) {
2301 return true;
f8e4b412
AB
2302 }
2303
1a873342
HM
2304 if (tlvs == NULL)
2305 return false;
2306 /* point to the next ie */
2307 ie += ie[TLV_LEN_OFF] + TLV_HDR_LEN;
2308 /* calculate the length of the rest of the buffer */
2309 *tlvs_len -= (int)(ie - *tlvs);
2310 /* update the pointer to the start of the buffer */
2311 *tlvs = ie;
2312
2313 return false;
2314}
2315
3cb91f53 2316static struct brcmf_vs_tlv *
1a873342
HM
2317brcmf_find_wpaie(u8 *parse, u32 len)
2318{
2319 struct brcmf_tlv *ie;
2320
04b2312a 2321 while ((ie = brcmf_parse_tlvs(parse, len, WLAN_EID_VENDOR_SPECIFIC))) {
1a873342
HM
2322 if (brcmf_tlv_has_ie((u8 *)ie, &parse, &len,
2323 WPA_OUI, TLV_OUI_LEN, WPA_OUI_TYPE))
2324 return (struct brcmf_vs_tlv *)ie;
2325 }
f8e4b412
AB
2326 return NULL;
2327}
2328
27a68fe3 2329static s32 brcmf_update_bss_info(struct brcmf_cfg80211_info *cfg)
5b435de0 2330{
6ac4f4ed
AS
2331 struct net_device *ndev = cfg_to_ndev(cfg);
2332 struct brcmf_cfg80211_profile *profile = ndev_to_prof(ndev);
2333 struct brcmf_if *ifp = netdev_priv(ndev);
d34bf64f 2334 struct brcmf_bss_info_le *bi;
5b435de0 2335 struct brcmf_ssid *ssid;
f8e4b412 2336 struct brcmf_tlv *tim;
5b435de0
AS
2337 u16 beacon_interval;
2338 u8 dtim_period;
2339 size_t ie_len;
2340 u8 *ie;
2341 s32 err = 0;
2342
2343 WL_TRACE("Enter\n");
27a68fe3 2344 if (brcmf_is_ibssmode(cfg))
5b435de0
AS
2345 return err;
2346
06bb123e 2347 ssid = &profile->ssid;
5b435de0 2348
27a68fe3 2349 *(__le32 *)cfg->extra_buf = cpu_to_le32(WL_EXTRA_BUF_MAX);
ac24be6f 2350 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
81f5dcb8 2351 cfg->extra_buf, WL_EXTRA_BUF_MAX);
5b435de0
AS
2352 if (err) {
2353 WL_ERR("Could not get bss info %d\n", err);
2354 goto update_bss_info_out;
2355 }
2356
27a68fe3
AS
2357 bi = (struct brcmf_bss_info_le *)(cfg->extra_buf + 4);
2358 err = brcmf_inform_single_bss(cfg, bi);
5b435de0
AS
2359 if (err)
2360 goto update_bss_info_out;
2361
2362 ie = ((u8 *)bi) + le16_to_cpu(bi->ie_offset);
2363 ie_len = le32_to_cpu(bi->ie_length);
2364 beacon_interval = le16_to_cpu(bi->beacon_period);
2365
f8e4b412 2366 tim = brcmf_parse_tlvs(ie, ie_len, WLAN_EID_TIM);
5b435de0
AS
2367 if (tim)
2368 dtim_period = tim->data[1];
2369 else {
2370 /*
2371 * active scan was done so we could not get dtim
2372 * information out of probe response.
2373 * so we speficially query dtim information to dongle.
2374 */
2375 u32 var;
ac24be6f 2376 err = brcmf_fil_iovar_int_get(ifp, "dtim_assoc", &var);
5b435de0
AS
2377 if (err) {
2378 WL_ERR("wl dtim_assoc failed (%d)\n", err);
2379 goto update_bss_info_out;
2380 }
2381 dtim_period = (u8)var;
2382 }
2383
5b435de0
AS
2384update_bss_info_out:
2385 WL_TRACE("Exit");
2386 return err;
2387}
2388
27a68fe3 2389static void brcmf_abort_scanning(struct brcmf_cfg80211_info *cfg)
5b435de0 2390{
27a68fe3 2391 struct escan_info *escan = &cfg->escan_info;
5b435de0 2392
c1179033 2393 set_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
f0799895 2394 if (cfg->scan_request) {
108a4bee 2395 escan->escan_state = WL_ESCAN_STATE_IDLE;
27a68fe3 2396 brcmf_notify_escan_complete(cfg, escan->ndev, true, true);
5b435de0 2397 }
c1179033
AS
2398 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
2399 clear_bit(BRCMF_SCAN_STATUS_ABORT, &cfg->scan_status);
5b435de0
AS
2400}
2401
e756af5b
HM
2402static void brcmf_cfg80211_escan_timeout_worker(struct work_struct *work)
2403{
27a68fe3
AS
2404 struct brcmf_cfg80211_info *cfg =
2405 container_of(work, struct brcmf_cfg80211_info,
e756af5b
HM
2406 escan_timeout_work);
2407
27a68fe3
AS
2408 brcmf_notify_escan_complete(cfg,
2409 cfg->escan_info.ndev, true, true);
e756af5b
HM
2410}
2411
2412static void brcmf_escan_timeout(unsigned long data)
2413{
27a68fe3
AS
2414 struct brcmf_cfg80211_info *cfg =
2415 (struct brcmf_cfg80211_info *)data;
e756af5b 2416
27a68fe3 2417 if (cfg->scan_request) {
e756af5b 2418 WL_ERR("timer expired\n");
f0799895 2419 schedule_work(&cfg->escan_timeout_work);
e756af5b
HM
2420 }
2421}
2422
2423static s32
2424brcmf_compare_update_same_bss(struct brcmf_bss_info_le *bss,
2425 struct brcmf_bss_info_le *bss_info_le)
2426{
2427 if (!memcmp(&bss_info_le->BSSID, &bss->BSSID, ETH_ALEN) &&
2428 (CHSPEC_BAND(le16_to_cpu(bss_info_le->chanspec)) ==
2429 CHSPEC_BAND(le16_to_cpu(bss->chanspec))) &&
2430 bss_info_le->SSID_len == bss->SSID_len &&
2431 !memcmp(bss_info_le->SSID, bss->SSID, bss_info_le->SSID_len)) {
2432 if ((bss->flags & WLC_BSS_RSSI_ON_CHANNEL) ==
2433 (bss_info_le->flags & WLC_BSS_RSSI_ON_CHANNEL)) {
029591f3
AS
2434 s16 bss_rssi = le16_to_cpu(bss->RSSI);
2435 s16 bss_info_rssi = le16_to_cpu(bss_info_le->RSSI);
2436
e756af5b
HM
2437 /* preserve max RSSI if the measurements are
2438 * both on-channel or both off-channel
2439 */
029591f3 2440 if (bss_info_rssi > bss_rssi)
e756af5b
HM
2441 bss->RSSI = bss_info_le->RSSI;
2442 } else if ((bss->flags & WLC_BSS_RSSI_ON_CHANNEL) &&
2443 (bss_info_le->flags & WLC_BSS_RSSI_ON_CHANNEL) == 0) {
2444 /* preserve the on-channel rssi measurement
2445 * if the new measurement is off channel
2446 */
2447 bss->RSSI = bss_info_le->RSSI;
2448 bss->flags |= WLC_BSS_RSSI_ON_CHANNEL;
2449 }
2450 return 1;
2451 }
2452 return 0;
2453}
2454
2455static s32
1993732e 2456brcmf_cfg80211_escan_handler(struct brcmf_if *ifp,
e756af5b
HM
2457 const struct brcmf_event_msg *e, void *data)
2458{
1993732e
AS
2459 struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
2460 struct net_device *ndev = ifp->ndev;
e756af5b
HM
2461 s32 status;
2462 s32 err = 0;
2463 struct brcmf_escan_result_le *escan_result_le;
2464 struct brcmf_bss_info_le *bss_info_le;
2465 struct brcmf_bss_info_le *bss = NULL;
2466 u32 bi_length;
2467 struct brcmf_scan_results *list;
2468 u32 i;
97ed15c7 2469 bool aborted;
e756af5b
HM
2470
2471 status = be32_to_cpu(e->status);
2472
f0799895
HM
2473 if (!ndev || !test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
2474 WL_ERR("scan not ready ndev %p drv_status %x\n", ndev,
2475 !test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status));
e756af5b
HM
2476 return -EPERM;
2477 }
2478
2479 if (status == BRCMF_E_STATUS_PARTIAL) {
2480 WL_SCAN("ESCAN Partial result\n");
2481 escan_result_le = (struct brcmf_escan_result_le *) data;
2482 if (!escan_result_le) {
2483 WL_ERR("Invalid escan result (NULL pointer)\n");
2484 goto exit;
2485 }
27a68fe3 2486 if (!cfg->scan_request) {
e756af5b
HM
2487 WL_SCAN("result without cfg80211 request\n");
2488 goto exit;
2489 }
2490
2491 if (le16_to_cpu(escan_result_le->bss_count) != 1) {
2492 WL_ERR("Invalid bss_count %d: ignoring\n",
2493 escan_result_le->bss_count);
2494 goto exit;
2495 }
2496 bss_info_le = &escan_result_le->bss_info_le;
2497
2498 bi_length = le32_to_cpu(bss_info_le->length);
2499 if (bi_length != (le32_to_cpu(escan_result_le->buflen) -
2500 WL_ESCAN_RESULTS_FIXED_SIZE)) {
2501 WL_ERR("Invalid bss_info length %d: ignoring\n",
2502 bi_length);
2503 goto exit;
2504 }
2505
27a68fe3 2506 if (!(cfg_to_wiphy(cfg)->interface_modes &
e756af5b
HM
2507 BIT(NL80211_IFTYPE_ADHOC))) {
2508 if (le16_to_cpu(bss_info_le->capability) &
2509 WLAN_CAPABILITY_IBSS) {
2510 WL_ERR("Ignoring IBSS result\n");
2511 goto exit;
2512 }
2513 }
2514
2515 list = (struct brcmf_scan_results *)
27a68fe3 2516 cfg->escan_info.escan_buf;
e756af5b
HM
2517 if (bi_length > WL_ESCAN_BUF_SIZE - list->buflen) {
2518 WL_ERR("Buffer is too small: ignoring\n");
2519 goto exit;
2520 }
2521
2522 for (i = 0; i < list->count; i++) {
2523 bss = bss ? (struct brcmf_bss_info_le *)
2524 ((unsigned char *)bss +
2525 le32_to_cpu(bss->length)) : list->bss_info_le;
2526 if (brcmf_compare_update_same_bss(bss, bss_info_le))
2527 goto exit;
2528 }
27a68fe3 2529 memcpy(&(cfg->escan_info.escan_buf[list->buflen]),
e756af5b
HM
2530 bss_info_le, bi_length);
2531 list->version = le32_to_cpu(bss_info_le->version);
2532 list->buflen += bi_length;
2533 list->count++;
2534 } else {
27a68fe3
AS
2535 cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
2536 if (cfg->scan_request) {
2537 cfg->bss_list = (struct brcmf_scan_results *)
2538 cfg->escan_info.escan_buf;
2539 brcmf_inform_bss(cfg);
97ed15c7 2540 aborted = status != BRCMF_E_STATUS_SUCCESS;
27a68fe3 2541 brcmf_notify_escan_complete(cfg, ndev, aborted,
97ed15c7 2542 false);
e756af5b
HM
2543 } else
2544 WL_ERR("Unexpected scan result 0x%x\n", status);
2545 }
2546exit:
2547 return err;
2548}
2549
27a68fe3 2550static void brcmf_init_escan(struct brcmf_cfg80211_info *cfg)
e756af5b
HM
2551{
2552
f0799895
HM
2553 cfg->el.handler[BRCMF_E_ESCAN_RESULT] =
2554 brcmf_cfg80211_escan_handler;
2555 cfg->escan_info.escan_state = WL_ESCAN_STATE_IDLE;
2556 /* Init scan_timeout timer */
2557 init_timer(&cfg->escan_timeout);
2558 cfg->escan_timeout.data = (unsigned long) cfg;
2559 cfg->escan_timeout.function = brcmf_escan_timeout;
2560 INIT_WORK(&cfg->escan_timeout_work,
2561 brcmf_cfg80211_escan_timeout_worker);
e756af5b
HM
2562}
2563
5addc0de 2564static __always_inline void brcmf_delay(u32 ms)
5b435de0
AS
2565{
2566 if (ms < 1000 / HZ) {
2567 cond_resched();
2568 mdelay(ms);
2569 } else {
2570 msleep(ms);
2571 }
2572}
2573
2574static s32 brcmf_cfg80211_resume(struct wiphy *wiphy)
2575{
5b435de0
AS
2576 WL_TRACE("Enter\n");
2577
5b435de0
AS
2578 return 0;
2579}
2580
2581static s32 brcmf_cfg80211_suspend(struct wiphy *wiphy,
2582 struct cfg80211_wowlan *wow)
2583{
27a68fe3
AS
2584 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
2585 struct net_device *ndev = cfg_to_ndev(cfg);
7d641072 2586 struct brcmf_cfg80211_vif *vif;
5b435de0
AS
2587
2588 WL_TRACE("Enter\n");
2589
2590 /*
7d641072
AS
2591 * if the primary net_device is not READY there is nothing
2592 * we can do but pray resume goes smoothly.
5b435de0 2593 */
7d641072
AS
2594 vif = ((struct brcmf_if *)netdev_priv(ndev))->vif;
2595 if (!check_vif_up(vif))
2596 goto exit;
5b435de0 2597
7d641072
AS
2598 list_for_each_entry(vif, &cfg->vif_list, list) {
2599 if (!test_bit(BRCMF_VIF_STATUS_READY, &vif->sme_state))
2600 continue;
5b435de0 2601 /*
7d641072
AS
2602 * While going to suspend if associated with AP disassociate
2603 * from AP to save power while system is in suspended state
5b435de0 2604 */
7d641072
AS
2605 if (test_bit(BRCMF_VIF_STATUS_CONNECTED, &vif->sme_state) ||
2606 test_bit(BRCMF_VIF_STATUS_CONNECTING, &vif->sme_state)) {
2607 WL_INFO("Disassociating from AP before suspend\n");
2608 brcmf_link_down(cfg);
2609
2610 /* Make sure WPA_Supplicant receives all the event
2611 * generated due to DISASSOC call to the fw to keep
2612 * the state fw and WPA_Supplicant state consistent
2613 */
2614 brcmf_delay(500);
2615 }
5b435de0
AS
2616 }
2617
7d641072
AS
2618 /* end any scanning */
2619 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status))
27a68fe3 2620 brcmf_abort_scanning(cfg);
5b435de0
AS
2621
2622 /* Turn off watchdog timer */
7d641072 2623 brcmf_set_mpc(ndev, 1);
5b435de0 2624
7d641072 2625exit:
5b435de0 2626 WL_TRACE("Exit\n");
7d641072
AS
2627 /* clear any scanning activity */
2628 cfg->scan_status = 0;
5b435de0
AS
2629 return 0;
2630}
2631
5b435de0
AS
2632static __used s32
2633brcmf_update_pmklist(struct net_device *ndev,
2634 struct brcmf_cfg80211_pmk_list *pmk_list, s32 err)
2635{
2636 int i, j;
40c8e95a 2637 int pmkid_len;
5b435de0 2638
40c8e95a
AS
2639 pmkid_len = le32_to_cpu(pmk_list->pmkids.npmkid);
2640
2641 WL_CONN("No of elements %d\n", pmkid_len);
2642 for (i = 0; i < pmkid_len; i++) {
5b435de0
AS
2643 WL_CONN("PMKID[%d]: %pM =\n", i,
2644 &pmk_list->pmkids.pmkid[i].BSSID);
2645 for (j = 0; j < WLAN_PMKID_LEN; j++)
2646 WL_CONN("%02x\n", pmk_list->pmkids.pmkid[i].PMKID[j]);
2647 }
2648
2649 if (!err)
ac24be6f
AS
2650 brcmf_fil_iovar_data_set(netdev_priv(ndev), "pmkid_info",
2651 (char *)pmk_list, sizeof(*pmk_list));
5b435de0
AS
2652
2653 return err;
2654}
2655
2656static s32
2657brcmf_cfg80211_set_pmksa(struct wiphy *wiphy, struct net_device *ndev,
2658 struct cfg80211_pmksa *pmksa)
2659{
27a68fe3 2660 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
0abb5f21 2661 struct brcmf_if *ifp = netdev_priv(ndev);
27a68fe3 2662 struct pmkid_list *pmkids = &cfg->pmk_list->pmkids;
5b435de0
AS
2663 s32 err = 0;
2664 int i;
40c8e95a 2665 int pmkid_len;
5b435de0
AS
2666
2667 WL_TRACE("Enter\n");
ce81e317 2668 if (!check_vif_up(ifp->vif))
5b435de0
AS
2669 return -EIO;
2670
40c8e95a
AS
2671 pmkid_len = le32_to_cpu(pmkids->npmkid);
2672 for (i = 0; i < pmkid_len; i++)
5b435de0
AS
2673 if (!memcmp(pmksa->bssid, pmkids->pmkid[i].BSSID, ETH_ALEN))
2674 break;
2675 if (i < WL_NUM_PMKIDS_MAX) {
2676 memcpy(pmkids->pmkid[i].BSSID, pmksa->bssid, ETH_ALEN);
2677 memcpy(pmkids->pmkid[i].PMKID, pmksa->pmkid, WLAN_PMKID_LEN);
40c8e95a
AS
2678 if (i == pmkid_len) {
2679 pmkid_len++;
2680 pmkids->npmkid = cpu_to_le32(pmkid_len);
2681 }
5b435de0
AS
2682 } else
2683 err = -EINVAL;
2684
2685 WL_CONN("set_pmksa,IW_PMKSA_ADD - PMKID: %pM =\n",
40c8e95a 2686 pmkids->pmkid[pmkid_len].BSSID);
5b435de0 2687 for (i = 0; i < WLAN_PMKID_LEN; i++)
40c8e95a 2688 WL_CONN("%02x\n", pmkids->pmkid[pmkid_len].PMKID[i]);
5b435de0 2689
27a68fe3 2690 err = brcmf_update_pmklist(ndev, cfg->pmk_list, err);
5b435de0
AS
2691
2692 WL_TRACE("Exit\n");
2693 return err;
2694}
2695
2696static s32
2697brcmf_cfg80211_del_pmksa(struct wiphy *wiphy, struct net_device *ndev,
2698 struct cfg80211_pmksa *pmksa)
2699{
27a68fe3 2700 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
0abb5f21 2701 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0
AS
2702 struct pmkid_list pmkid;
2703 s32 err = 0;
40c8e95a 2704 int i, pmkid_len;
5b435de0
AS
2705
2706 WL_TRACE("Enter\n");
ce81e317 2707 if (!check_vif_up(ifp->vif))
5b435de0
AS
2708 return -EIO;
2709
2710 memcpy(&pmkid.pmkid[0].BSSID, pmksa->bssid, ETH_ALEN);
2711 memcpy(&pmkid.pmkid[0].PMKID, pmksa->pmkid, WLAN_PMKID_LEN);
2712
2713 WL_CONN("del_pmksa,IW_PMKSA_REMOVE - PMKID: %pM =\n",
2714 &pmkid.pmkid[0].BSSID);
2715 for (i = 0; i < WLAN_PMKID_LEN; i++)
2716 WL_CONN("%02x\n", pmkid.pmkid[0].PMKID[i]);
2717
27a68fe3 2718 pmkid_len = le32_to_cpu(cfg->pmk_list->pmkids.npmkid);
40c8e95a 2719 for (i = 0; i < pmkid_len; i++)
5b435de0 2720 if (!memcmp
27a68fe3 2721 (pmksa->bssid, &cfg->pmk_list->pmkids.pmkid[i].BSSID,
5b435de0
AS
2722 ETH_ALEN))
2723 break;
2724
40c8e95a
AS
2725 if ((pmkid_len > 0)
2726 && (i < pmkid_len)) {
27a68fe3 2727 memset(&cfg->pmk_list->pmkids.pmkid[i], 0,
5b435de0 2728 sizeof(struct pmkid));
40c8e95a 2729 for (; i < (pmkid_len - 1); i++) {
27a68fe3
AS
2730 memcpy(&cfg->pmk_list->pmkids.pmkid[i].BSSID,
2731 &cfg->pmk_list->pmkids.pmkid[i + 1].BSSID,
5b435de0 2732 ETH_ALEN);
27a68fe3
AS
2733 memcpy(&cfg->pmk_list->pmkids.pmkid[i].PMKID,
2734 &cfg->pmk_list->pmkids.pmkid[i + 1].PMKID,
5b435de0
AS
2735 WLAN_PMKID_LEN);
2736 }
27a68fe3 2737 cfg->pmk_list->pmkids.npmkid = cpu_to_le32(pmkid_len - 1);
5b435de0
AS
2738 } else
2739 err = -EINVAL;
2740
27a68fe3 2741 err = brcmf_update_pmklist(ndev, cfg->pmk_list, err);
5b435de0
AS
2742
2743 WL_TRACE("Exit\n");
2744 return err;
2745
2746}
2747
2748static s32
2749brcmf_cfg80211_flush_pmksa(struct wiphy *wiphy, struct net_device *ndev)
2750{
27a68fe3 2751 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
0abb5f21 2752 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0
AS
2753 s32 err = 0;
2754
2755 WL_TRACE("Enter\n");
ce81e317 2756 if (!check_vif_up(ifp->vif))
5b435de0
AS
2757 return -EIO;
2758
27a68fe3
AS
2759 memset(cfg->pmk_list, 0, sizeof(*cfg->pmk_list));
2760 err = brcmf_update_pmklist(ndev, cfg->pmk_list, err);
5b435de0
AS
2761
2762 WL_TRACE("Exit\n");
2763 return err;
2764
2765}
2766
e5806072
AS
2767/*
2768 * PFN result doesn't have all the info which are
2769 * required by the supplicant
2770 * (For e.g IEs) Do a target Escan so that sched scan results are reported
2771 * via wl_inform_single_bss in the required format. Escan does require the
2772 * scan request in the form of cfg80211_scan_request. For timebeing, create
2773 * cfg80211_scan_request one out of the received PNO event.
2774 */
2775static s32
1993732e 2776brcmf_notify_sched_scan_results(struct brcmf_if *ifp,
e5806072
AS
2777 const struct brcmf_event_msg *e, void *data)
2778{
1993732e
AS
2779 struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
2780 struct net_device *ndev = ifp->ndev;
e5806072
AS
2781 struct brcmf_pno_net_info_le *netinfo, *netinfo_start;
2782 struct cfg80211_scan_request *request = NULL;
2783 struct cfg80211_ssid *ssid = NULL;
2784 struct ieee80211_channel *channel = NULL;
27a68fe3 2785 struct wiphy *wiphy = cfg_to_wiphy(cfg);
e5806072
AS
2786 int err = 0;
2787 int channel_req = 0;
2788 int band = 0;
2789 struct brcmf_pno_scanresults_le *pfn_result;
2790 u32 result_count;
2791 u32 status;
2792
2793 WL_SCAN("Enter\n");
2794
2795 if (e->event_type == cpu_to_be32(BRCMF_E_PFN_NET_LOST)) {
2796 WL_SCAN("PFN NET LOST event. Do Nothing\n");
2797 return 0;
2798 }
2799
2800 pfn_result = (struct brcmf_pno_scanresults_le *)data;
2801 result_count = le32_to_cpu(pfn_result->count);
2802 status = le32_to_cpu(pfn_result->status);
2803
2804 /*
2805 * PFN event is limited to fit 512 bytes so we may get
2806 * multiple NET_FOUND events. For now place a warning here.
2807 */
2808 WARN_ON(status != BRCMF_PNO_SCAN_COMPLETE);
2809 WL_SCAN("PFN NET FOUND event. count: %d\n", result_count);
2810 if (result_count > 0) {
2811 int i;
2812
2813 request = kzalloc(sizeof(*request), GFP_KERNEL);
58901d18
DC
2814 ssid = kcalloc(result_count, sizeof(*ssid), GFP_KERNEL);
2815 channel = kcalloc(result_count, sizeof(*channel), GFP_KERNEL);
e5806072
AS
2816 if (!request || !ssid || !channel) {
2817 err = -ENOMEM;
2818 goto out_err;
2819 }
2820
2821 request->wiphy = wiphy;
2822 data += sizeof(struct brcmf_pno_scanresults_le);
2823 netinfo_start = (struct brcmf_pno_net_info_le *)data;
2824
2825 for (i = 0; i < result_count; i++) {
2826 netinfo = &netinfo_start[i];
2827 if (!netinfo) {
2828 WL_ERR("Invalid netinfo ptr. index: %d\n", i);
2829 err = -EINVAL;
2830 goto out_err;
2831 }
2832
2833 WL_SCAN("SSID:%s Channel:%d\n",
2834 netinfo->SSID, netinfo->channel);
2835 memcpy(ssid[i].ssid, netinfo->SSID, netinfo->SSID_len);
2836 ssid[i].ssid_len = netinfo->SSID_len;
2837 request->n_ssids++;
2838
2839 channel_req = netinfo->channel;
2840 if (channel_req <= CH_MAX_2G_CHANNEL)
2841 band = NL80211_BAND_2GHZ;
2842 else
2843 band = NL80211_BAND_5GHZ;
2844 channel[i].center_freq =
2845 ieee80211_channel_to_frequency(channel_req,
2846 band);
2847 channel[i].band = band;
2848 channel[i].flags |= IEEE80211_CHAN_NO_HT40;
2849 request->channels[i] = &channel[i];
2850 request->n_channels++;
2851 }
2852
2853 /* assign parsed ssid array */
2854 if (request->n_ssids)
2855 request->ssids = &ssid[0];
2856
c1179033 2857 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
e5806072 2858 /* Abort any on-going scan */
27a68fe3 2859 brcmf_abort_scanning(cfg);
e5806072
AS
2860 }
2861
c1179033 2862 set_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
27a68fe3 2863 err = brcmf_do_escan(cfg, wiphy, ndev, request);
e5806072 2864 if (err) {
c1179033 2865 clear_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status);
e5806072
AS
2866 goto out_err;
2867 }
27a68fe3
AS
2868 cfg->sched_escan = true;
2869 cfg->scan_request = request;
e5806072
AS
2870 } else {
2871 WL_ERR("FALSE PNO Event. (pfn_count == 0)\n");
2872 goto out_err;
2873 }
2874
2875 kfree(ssid);
2876 kfree(channel);
2877 kfree(request);
2878 return 0;
2879
2880out_err:
2881 kfree(ssid);
2882 kfree(channel);
2883 kfree(request);
2884 cfg80211_sched_scan_stopped(wiphy);
2885 return err;
2886}
2887
e5806072
AS
2888static int brcmf_dev_pno_clean(struct net_device *ndev)
2889{
e5806072
AS
2890 int ret;
2891
2892 /* Disable pfn */
ac24be6f 2893 ret = brcmf_fil_iovar_int_set(netdev_priv(ndev), "pfn", 0);
e5806072
AS
2894 if (ret == 0) {
2895 /* clear pfn */
ac24be6f
AS
2896 ret = brcmf_fil_iovar_data_set(netdev_priv(ndev), "pfnclear",
2897 NULL, 0);
e5806072
AS
2898 }
2899 if (ret < 0)
2900 WL_ERR("failed code %d\n", ret);
2901
2902 return ret;
2903}
2904
2905static int brcmf_dev_pno_config(struct net_device *ndev)
2906{
2907 struct brcmf_pno_param_le pfn_param;
e5806072
AS
2908
2909 memset(&pfn_param, 0, sizeof(pfn_param));
2910 pfn_param.version = cpu_to_le32(BRCMF_PNO_VERSION);
2911
2912 /* set extra pno params */
2913 pfn_param.flags = cpu_to_le16(1 << BRCMF_PNO_ENABLE_ADAPTSCAN_BIT);
2914 pfn_param.repeat = BRCMF_PNO_REPEAT;
2915 pfn_param.exp = BRCMF_PNO_FREQ_EXPO_MAX;
2916
2917 /* set up pno scan fr */
2918 pfn_param.scan_freq = cpu_to_le32(BRCMF_PNO_TIME);
2919
ac24be6f
AS
2920 return brcmf_fil_iovar_data_set(netdev_priv(ndev), "pfn_set",
2921 &pfn_param, sizeof(pfn_param));
e5806072
AS
2922}
2923
2924static int
2925brcmf_cfg80211_sched_scan_start(struct wiphy *wiphy,
2926 struct net_device *ndev,
2927 struct cfg80211_sched_scan_request *request)
2928{
c1179033 2929 struct brcmf_if *ifp = netdev_priv(ndev);
27a68fe3 2930 struct brcmf_cfg80211_info *cfg = wiphy_priv(wiphy);
e5806072
AS
2931 struct brcmf_pno_net_param_le pfn;
2932 int i;
2933 int ret = 0;
2934
2935 WL_SCAN("Enter n_match_sets:%d n_ssids:%d\n",
2936 request->n_match_sets, request->n_ssids);
c1179033
AS
2937 if (test_bit(BRCMF_SCAN_STATUS_BUSY, &cfg->scan_status)) {
2938 WL_ERR("Scanning already: status (%lu)\n", cfg->scan_status);
e5806072
AS
2939 return -EAGAIN;
2940 }
2941
2942 if (!request || !request->n_ssids || !request->n_match_sets) {
2943 WL_ERR("Invalid sched scan req!! n_ssids:%d\n",
9495b31a 2944 request ? request->n_ssids : 0);
e5806072
AS
2945 return -EINVAL;
2946 }
2947
2948 if (request->n_ssids > 0) {
2949 for (i = 0; i < request->n_ssids; i++) {
2950 /* Active scan req for ssids */
2951 WL_SCAN(">>> Active scan req for ssid (%s)\n",
2952 request->ssids[i].ssid);
2953
2954 /*
2955 * match_set ssids is a supert set of n_ssid list,
2956 * so we need not add these set seperately.
2957 */
2958 }
2959 }
2960
2961 if (request->n_match_sets > 0) {
2962 /* clean up everything */
2963 ret = brcmf_dev_pno_clean(ndev);
2964 if (ret < 0) {
2965 WL_ERR("failed error=%d\n", ret);
2966 return ret;
2967 }
2968
2969 /* configure pno */
2970 ret = brcmf_dev_pno_config(ndev);
2971 if (ret < 0) {
2972 WL_ERR("PNO setup failed!! ret=%d\n", ret);
2973 return -EINVAL;
2974 }
2975
2976 /* configure each match set */
2977 for (i = 0; i < request->n_match_sets; i++) {
2978 struct cfg80211_ssid *ssid;
2979 u32 ssid_len;
2980
2981 ssid = &request->match_sets[i].ssid;
2982 ssid_len = ssid->ssid_len;
2983
2984 if (!ssid_len) {
2985 WL_ERR("skip broadcast ssid\n");
2986 continue;
2987 }
2988 pfn.auth = cpu_to_le32(WLAN_AUTH_OPEN);
2989 pfn.wpa_auth = cpu_to_le32(BRCMF_PNO_WPA_AUTH_ANY);
2990 pfn.wsec = cpu_to_le32(0);
2991 pfn.infra = cpu_to_le32(1);
2992 pfn.flags = cpu_to_le32(1 << BRCMF_PNO_HIDDEN_BIT);
2993 pfn.ssid.SSID_len = cpu_to_le32(ssid_len);
2994 memcpy(pfn.ssid.SSID, ssid->ssid, ssid_len);
c1179033 2995 ret = brcmf_fil_iovar_data_set(ifp, "pfn_add", &pfn,
ac24be6f 2996 sizeof(pfn));
e5806072
AS
2997 WL_SCAN(">>> PNO filter %s for ssid (%s)\n",
2998 ret == 0 ? "set" : "failed",
2999 ssid->ssid);
3000 }
3001 /* Enable the PNO */
c1179033 3002 if (brcmf_fil_iovar_int_set(ifp, "pfn", 1) < 0) {
e5806072
AS
3003 WL_ERR("PNO enable failed!! ret=%d\n", ret);
3004 return -EINVAL;
3005 }
3006 } else {
3007 return -EINVAL;
3008 }
3009
3010 return 0;
3011}
3012
3013static int brcmf_cfg80211_sched_scan_stop(struct wiphy *wiphy,
3014 struct net_device *ndev)
3015{
27a68fe3 3016 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
e5806072
AS
3017
3018 WL_SCAN("enter\n");
3019 brcmf_dev_pno_clean(ndev);
27a68fe3
AS
3020 if (cfg->sched_escan)
3021 brcmf_notify_escan_complete(cfg, ndev, true, true);
e5806072
AS
3022 return 0;
3023}
e5806072 3024
cbaa177d
AS
3025#ifdef CONFIG_NL80211_TESTMODE
3026static int brcmf_cfg80211_testmode(struct wiphy *wiphy, void *data, int len)
3027{
27a68fe3 3028 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
3eacf866 3029 struct net_device *ndev = cfg_to_ndev(cfg);
cbaa177d
AS
3030 struct brcmf_dcmd *dcmd = data;
3031 struct sk_buff *reply;
3032 int ret;
3033
f368a5b6
HM
3034 WL_TRACE("cmd %x set %d buf %p len %d\n", dcmd->cmd, dcmd->set,
3035 dcmd->buf, dcmd->len);
3036
3037 if (dcmd->set)
ac24be6f
AS
3038 ret = brcmf_fil_cmd_data_set(netdev_priv(ndev), dcmd->cmd,
3039 dcmd->buf, dcmd->len);
f368a5b6 3040 else
ac24be6f
AS
3041 ret = brcmf_fil_cmd_data_get(netdev_priv(ndev), dcmd->cmd,
3042 dcmd->buf, dcmd->len);
cbaa177d
AS
3043 if (ret == 0) {
3044 reply = cfg80211_testmode_alloc_reply_skb(wiphy, sizeof(*dcmd));
3045 nla_put(reply, NL80211_ATTR_TESTDATA, sizeof(*dcmd), dcmd);
3046 ret = cfg80211_testmode_reply(reply);
3047 }
3048 return ret;
3049}
3050#endif
3051
1a873342
HM
3052static s32 brcmf_configure_opensecurity(struct net_device *ndev, s32 bssidx)
3053{
ac24be6f 3054 struct brcmf_if *ifp = netdev_priv(ndev);
1a873342
HM
3055 s32 err;
3056
3057 /* set auth */
ac24be6f 3058 err = brcmf_fil_bsscfg_int_set(ifp, "auth", 0);
1a873342
HM
3059 if (err < 0) {
3060 WL_ERR("auth error %d\n", err);
3061 return err;
3062 }
3063 /* set wsec */
ac24be6f 3064 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", 0);
1a873342
HM
3065 if (err < 0) {
3066 WL_ERR("wsec error %d\n", err);
3067 return err;
3068 }
3069 /* set upper-layer auth */
ac24be6f 3070 err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", WPA_AUTH_NONE);
1a873342
HM
3071 if (err < 0) {
3072 WL_ERR("wpa_auth error %d\n", err);
3073 return err;
3074 }
3075
3076 return 0;
3077}
3078
3079static bool brcmf_valid_wpa_oui(u8 *oui, bool is_rsn_ie)
3080{
3081 if (is_rsn_ie)
3082 return (memcmp(oui, RSN_OUI, TLV_OUI_LEN) == 0);
3083
3084 return (memcmp(oui, WPA_OUI, TLV_OUI_LEN) == 0);
3085}
3086
3087static s32
3088brcmf_configure_wpaie(struct net_device *ndev, struct brcmf_vs_tlv *wpa_ie,
34778529 3089 bool is_rsn_ie)
1a873342 3090{
ac24be6f 3091 struct brcmf_if *ifp = netdev_priv(ndev);
1a873342
HM
3092 u32 auth = 0; /* d11 open authentication */
3093 u16 count;
3094 s32 err = 0;
3095 s32 len = 0;
3096 u32 i;
3097 u32 wsec;
3098 u32 pval = 0;
3099 u32 gval = 0;
3100 u32 wpa_auth = 0;
3101 u32 offset;
3102 u8 *data;
3103 u16 rsn_cap;
3104 u32 wme_bss_disable;
3105
3106 WL_TRACE("Enter\n");
3107 if (wpa_ie == NULL)
3108 goto exit;
3109
3110 len = wpa_ie->len + TLV_HDR_LEN;
3111 data = (u8 *)wpa_ie;
3112 offset = 0;
3113 if (!is_rsn_ie)
3114 offset += VS_IE_FIXED_HDR_LEN;
3115 offset += WPA_IE_VERSION_LEN;
3116
3117 /* check for multicast cipher suite */
3118 if (offset + WPA_IE_MIN_OUI_LEN > len) {
3119 err = -EINVAL;
3120 WL_ERR("no multicast cipher suite\n");
3121 goto exit;
3122 }
3123
3124 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
3125 err = -EINVAL;
3126 WL_ERR("ivalid OUI\n");
3127 goto exit;
3128 }
3129 offset += TLV_OUI_LEN;
3130
3131 /* pick up multicast cipher */
3132 switch (data[offset]) {
3133 case WPA_CIPHER_NONE:
3134 gval = 0;
3135 break;
3136 case WPA_CIPHER_WEP_40:
3137 case WPA_CIPHER_WEP_104:
3138 gval = WEP_ENABLED;
3139 break;
3140 case WPA_CIPHER_TKIP:
3141 gval = TKIP_ENABLED;
3142 break;
3143 case WPA_CIPHER_AES_CCM:
3144 gval = AES_ENABLED;
3145 break;
3146 default:
3147 err = -EINVAL;
3148 WL_ERR("Invalid multi cast cipher info\n");
3149 goto exit;
3150 }
3151
3152 offset++;
3153 /* walk thru unicast cipher list and pick up what we recognize */
3154 count = data[offset] + (data[offset + 1] << 8);
3155 offset += WPA_IE_SUITE_COUNT_LEN;
3156 /* Check for unicast suite(s) */
3157 if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
3158 err = -EINVAL;
3159 WL_ERR("no unicast cipher suite\n");
3160 goto exit;
3161 }
3162 for (i = 0; i < count; i++) {
3163 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
3164 err = -EINVAL;
3165 WL_ERR("ivalid OUI\n");
3166 goto exit;
3167 }
3168 offset += TLV_OUI_LEN;
3169 switch (data[offset]) {
3170 case WPA_CIPHER_NONE:
3171 break;
3172 case WPA_CIPHER_WEP_40:
3173 case WPA_CIPHER_WEP_104:
3174 pval |= WEP_ENABLED;
3175 break;
3176 case WPA_CIPHER_TKIP:
3177 pval |= TKIP_ENABLED;
3178 break;
3179 case WPA_CIPHER_AES_CCM:
3180 pval |= AES_ENABLED;
3181 break;
3182 default:
3183 WL_ERR("Ivalid unicast security info\n");
3184 }
3185 offset++;
3186 }
3187 /* walk thru auth management suite list and pick up what we recognize */
3188 count = data[offset] + (data[offset + 1] << 8);
3189 offset += WPA_IE_SUITE_COUNT_LEN;
3190 /* Check for auth key management suite(s) */
3191 if (offset + (WPA_IE_MIN_OUI_LEN * count) > len) {
3192 err = -EINVAL;
3193 WL_ERR("no auth key mgmt suite\n");
3194 goto exit;
3195 }
3196 for (i = 0; i < count; i++) {
3197 if (!brcmf_valid_wpa_oui(&data[offset], is_rsn_ie)) {
3198 err = -EINVAL;
3199 WL_ERR("ivalid OUI\n");
3200 goto exit;
3201 }
3202 offset += TLV_OUI_LEN;
3203 switch (data[offset]) {
3204 case RSN_AKM_NONE:
3205 WL_TRACE("RSN_AKM_NONE\n");
3206 wpa_auth |= WPA_AUTH_NONE;
3207 break;
3208 case RSN_AKM_UNSPECIFIED:
3209 WL_TRACE("RSN_AKM_UNSPECIFIED\n");
3210 is_rsn_ie ? (wpa_auth |= WPA2_AUTH_UNSPECIFIED) :
3211 (wpa_auth |= WPA_AUTH_UNSPECIFIED);
3212 break;
3213 case RSN_AKM_PSK:
3214 WL_TRACE("RSN_AKM_PSK\n");
3215 is_rsn_ie ? (wpa_auth |= WPA2_AUTH_PSK) :
3216 (wpa_auth |= WPA_AUTH_PSK);
3217 break;
3218 default:
3219 WL_ERR("Ivalid key mgmt info\n");
3220 }
3221 offset++;
3222 }
3223
3224 if (is_rsn_ie) {
3225 wme_bss_disable = 1;
3226 if ((offset + RSN_CAP_LEN) <= len) {
3227 rsn_cap = data[offset] + (data[offset + 1] << 8);
3228 if (rsn_cap & RSN_CAP_PTK_REPLAY_CNTR_MASK)
3229 wme_bss_disable = 0;
3230 }
3231 /* set wme_bss_disable to sync RSN Capabilities */
ac24be6f 3232 err = brcmf_fil_bsscfg_int_set(ifp, "wme_bss_disable",
81f5dcb8 3233 wme_bss_disable);
1a873342
HM
3234 if (err < 0) {
3235 WL_ERR("wme_bss_disable error %d\n", err);
3236 goto exit;
3237 }
3238 }
3239 /* FOR WPS , set SES_OW_ENABLED */
3240 wsec = (pval | gval | SES_OW_ENABLED);
3241
3242 /* set auth */
ac24be6f 3243 err = brcmf_fil_bsscfg_int_set(ifp, "auth", auth);
1a873342
HM
3244 if (err < 0) {
3245 WL_ERR("auth error %d\n", err);
3246 goto exit;
3247 }
3248 /* set wsec */
ac24be6f 3249 err = brcmf_fil_bsscfg_int_set(ifp, "wsec", wsec);
1a873342
HM
3250 if (err < 0) {
3251 WL_ERR("wsec error %d\n", err);
3252 goto exit;
3253 }
3254 /* set upper-layer auth */
ac24be6f 3255 err = brcmf_fil_bsscfg_int_set(ifp, "wpa_auth", wpa_auth);
1a873342
HM
3256 if (err < 0) {
3257 WL_ERR("wpa_auth error %d\n", err);
3258 goto exit;
3259 }
3260
3261exit:
3262 return err;
3263}
3264
3265static s32
3082b9be 3266brcmf_parse_vndr_ies(const u8 *vndr_ie_buf, u32 vndr_ie_len,
1a873342
HM
3267 struct parsed_vndr_ies *vndr_ies)
3268{
3269 s32 err = 0;
3270 struct brcmf_vs_tlv *vndrie;
3271 struct brcmf_tlv *ie;
3272 struct parsed_vndr_ie_info *parsed_info;
3273 s32 remaining_len;
3274
3275 remaining_len = (s32)vndr_ie_len;
3276 memset(vndr_ies, 0, sizeof(*vndr_ies));
3277
3278 ie = (struct brcmf_tlv *)vndr_ie_buf;
3279 while (ie) {
3280 if (ie->id != WLAN_EID_VENDOR_SPECIFIC)
3281 goto next;
3282 vndrie = (struct brcmf_vs_tlv *)ie;
3283 /* len should be bigger than OUI length + one */
3284 if (vndrie->len < (VS_IE_FIXED_HDR_LEN - TLV_HDR_LEN + 1)) {
3285 WL_ERR("invalid vndr ie. length is too small %d\n",
3286 vndrie->len);
3287 goto next;
3288 }
3289 /* if wpa or wme ie, do not add ie */
3290 if (!memcmp(vndrie->oui, (u8 *)WPA_OUI, TLV_OUI_LEN) &&
3291 ((vndrie->oui_type == WPA_OUI_TYPE) ||
3292 (vndrie->oui_type == WME_OUI_TYPE))) {
3293 WL_TRACE("Found WPA/WME oui. Do not add it\n");
3294 goto next;
3295 }
3296
3297 parsed_info = &vndr_ies->ie_info[vndr_ies->count];
3298
3299 /* save vndr ie information */
3300 parsed_info->ie_ptr = (char *)vndrie;
3301 parsed_info->ie_len = vndrie->len + TLV_HDR_LEN;
3302 memcpy(&parsed_info->vndrie, vndrie, sizeof(*vndrie));
3303
3304 vndr_ies->count++;
3305
3306 WL_TRACE("** OUI %02x %02x %02x, type 0x%02x\n",
3307 parsed_info->vndrie.oui[0],
3308 parsed_info->vndrie.oui[1],
3309 parsed_info->vndrie.oui[2],
3310 parsed_info->vndrie.oui_type);
3311
3312 if (vndr_ies->count >= MAX_VNDR_IE_NUMBER)
3313 break;
3314next:
3315 remaining_len -= ie->len;
3316 if (remaining_len <= 2)
3317 ie = NULL;
3318 else
3319 ie = (struct brcmf_tlv *)(((u8 *)ie) + ie->len);
3320 }
3321 return err;
3322}
3323
3324static u32
3325brcmf_vndr_ie(u8 *iebuf, s32 pktflag, u8 *ie_ptr, u32 ie_len, s8 *add_del_cmd)
3326{
3327
3328 __le32 iecount_le;
3329 __le32 pktflag_le;
3330
3331 strncpy(iebuf, add_del_cmd, VNDR_IE_CMD_LEN - 1);
3332 iebuf[VNDR_IE_CMD_LEN - 1] = '\0';
3333
3334 iecount_le = cpu_to_le32(1);
3335 memcpy(&iebuf[VNDR_IE_COUNT_OFFSET], &iecount_le, sizeof(iecount_le));
3336
3337 pktflag_le = cpu_to_le32(pktflag);
3338 memcpy(&iebuf[VNDR_IE_PKTFLAG_OFFSET], &pktflag_le, sizeof(pktflag_le));
3339
3340 memcpy(&iebuf[VNDR_IE_VSIE_OFFSET], ie_ptr, ie_len);
3341
3342 return ie_len + VNDR_IE_HDR_SIZE;
3343}
3344
3082b9be 3345static
1332e26e
AS
3346s32 brcmf_vif_set_mgmt_ie(struct brcmf_cfg80211_vif *vif, s32 pktflag,
3347 const u8 *vndr_ie_buf, u32 vndr_ie_len)
1a873342 3348{
1332e26e
AS
3349 struct brcmf_if *ifp;
3350 struct vif_saved_ie *saved_ie;
1a873342
HM
3351 s32 err = 0;
3352 u8 *iovar_ie_buf;
3353 u8 *curr_ie_buf;
3354 u8 *mgmt_ie_buf = NULL;
3e4f319d 3355 int mgmt_ie_buf_len;
81118d16 3356 u32 *mgmt_ie_len;
1a873342
HM
3357 u32 del_add_ie_buf_len = 0;
3358 u32 total_ie_buf_len = 0;
3359 u32 parsed_ie_buf_len = 0;
3360 struct parsed_vndr_ies old_vndr_ies;
3361 struct parsed_vndr_ies new_vndr_ies;
3362 struct parsed_vndr_ie_info *vndrie_info;
3363 s32 i;
3364 u8 *ptr;
3e4f319d 3365 int remained_buf_len;
1a873342 3366
1332e26e
AS
3367 if (!vif)
3368 return -ENODEV;
3369 ifp = vif->ifp;
3370 saved_ie = &vif->saved_ie;
3371
3372 WL_TRACE("bssidx %d, pktflag : 0x%02X\n", ifp->bssidx, pktflag);
1a873342
HM
3373 iovar_ie_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
3374 if (!iovar_ie_buf)
3375 return -ENOMEM;
3376 curr_ie_buf = iovar_ie_buf;
8ff5dc92 3377 if (ifp->vif->mode == WL_MODE_AP) {
1a873342
HM
3378 switch (pktflag) {
3379 case VNDR_IE_PRBRSP_FLAG:
8ff5dc92
AS
3380 mgmt_ie_buf = saved_ie->probe_res_ie;
3381 mgmt_ie_len = &saved_ie->probe_res_ie_len;
3382 mgmt_ie_buf_len = sizeof(saved_ie->probe_res_ie);
1a873342
HM
3383 break;
3384 case VNDR_IE_BEACON_FLAG:
8ff5dc92
AS
3385 mgmt_ie_buf = saved_ie->beacon_ie;
3386 mgmt_ie_len = &saved_ie->beacon_ie_len;
3387 mgmt_ie_buf_len = sizeof(saved_ie->beacon_ie);
1a873342
HM
3388 break;
3389 default:
3390 err = -EPERM;
3391 WL_ERR("not suitable type\n");
3392 goto exit;
3393 }
1a873342
HM
3394 } else {
3395 err = -EPERM;
3396 WL_ERR("not suitable type\n");
3397 goto exit;
3398 }
3399
3400 if (vndr_ie_len > mgmt_ie_buf_len) {
3401 err = -ENOMEM;
3402 WL_ERR("extra IE size too big\n");
3403 goto exit;
3404 }
3405
3406 /* parse and save new vndr_ie in curr_ie_buff before comparing it */
3407 if (vndr_ie_buf && vndr_ie_len && curr_ie_buf) {
3408 ptr = curr_ie_buf;
3409 brcmf_parse_vndr_ies(vndr_ie_buf, vndr_ie_len, &new_vndr_ies);
3410 for (i = 0; i < new_vndr_ies.count; i++) {
3411 vndrie_info = &new_vndr_ies.ie_info[i];
3412 memcpy(ptr + parsed_ie_buf_len, vndrie_info->ie_ptr,
3413 vndrie_info->ie_len);
3414 parsed_ie_buf_len += vndrie_info->ie_len;
3415 }
3416 }
3417
3418 if (mgmt_ie_buf != NULL) {
3419 if (parsed_ie_buf_len && (parsed_ie_buf_len == *mgmt_ie_len) &&
3420 (memcmp(mgmt_ie_buf, curr_ie_buf,
3421 parsed_ie_buf_len) == 0)) {
3422 WL_TRACE("Previous mgmt IE is equals to current IE");
3423 goto exit;
3424 }
3425
3426 /* parse old vndr_ie */
3427 brcmf_parse_vndr_ies(mgmt_ie_buf, *mgmt_ie_len, &old_vndr_ies);
3428
3429 /* make a command to delete old ie */
3430 for (i = 0; i < old_vndr_ies.count; i++) {
3431 vndrie_info = &old_vndr_ies.ie_info[i];
3432
3433 WL_TRACE("DEL ID : %d, Len: %d , OUI:%02x:%02x:%02x\n",
3434 vndrie_info->vndrie.id,
3435 vndrie_info->vndrie.len,
3436 vndrie_info->vndrie.oui[0],
3437 vndrie_info->vndrie.oui[1],
3438 vndrie_info->vndrie.oui[2]);
3439
3440 del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
3441 vndrie_info->ie_ptr,
3442 vndrie_info->ie_len,
3443 "del");
3444 curr_ie_buf += del_add_ie_buf_len;
3445 total_ie_buf_len += del_add_ie_buf_len;
3446 }
3447 }
3448
3449 *mgmt_ie_len = 0;
3450 /* Add if there is any extra IE */
3451 if (mgmt_ie_buf && parsed_ie_buf_len) {
3452 ptr = mgmt_ie_buf;
3453
3454 remained_buf_len = mgmt_ie_buf_len;
3455
3456 /* make a command to add new ie */
3457 for (i = 0; i < new_vndr_ies.count; i++) {
3458 vndrie_info = &new_vndr_ies.ie_info[i];
3459
3460 WL_TRACE("ADDED ID : %d, Len: %d, OUI:%02x:%02x:%02x\n",
3461 vndrie_info->vndrie.id,
3462 vndrie_info->vndrie.len,
3463 vndrie_info->vndrie.oui[0],
3464 vndrie_info->vndrie.oui[1],
3465 vndrie_info->vndrie.oui[2]);
3466
3467 del_add_ie_buf_len = brcmf_vndr_ie(curr_ie_buf, pktflag,
3468 vndrie_info->ie_ptr,
3469 vndrie_info->ie_len,
3470 "add");
3471 /* verify remained buf size before copy data */
3472 remained_buf_len -= vndrie_info->ie_len;
3473 if (remained_buf_len < 0) {
3474 WL_ERR("no space in mgmt_ie_buf: len left %d",
3475 remained_buf_len);
3476 break;
3477 }
3478
3479 /* save the parsed IE in wl struct */
3480 memcpy(ptr + (*mgmt_ie_len), vndrie_info->ie_ptr,
3481 vndrie_info->ie_len);
3482 *mgmt_ie_len += vndrie_info->ie_len;
3483
3484 curr_ie_buf += del_add_ie_buf_len;
3485 total_ie_buf_len += del_add_ie_buf_len;
3486 }
3487 }
3488 if (total_ie_buf_len) {
c1179033 3489 err = brcmf_fil_bsscfg_data_set(ifp, "vndr_ie", iovar_ie_buf,
81f5dcb8 3490 total_ie_buf_len);
1a873342
HM
3491 if (err)
3492 WL_ERR("vndr ie set error : %d\n", err);
3493 }
3494
3495exit:
3496 kfree(iovar_ie_buf);
3497 return err;
3498}
3499
3500static s32
3501brcmf_cfg80211_start_ap(struct wiphy *wiphy, struct net_device *ndev,
3502 struct cfg80211_ap_settings *settings)
3503{
3504 s32 ie_offset;
ac24be6f 3505 struct brcmf_if *ifp = netdev_priv(ndev);
1a873342
HM
3506 struct brcmf_tlv *ssid_ie;
3507 struct brcmf_ssid_le ssid_le;
1a873342
HM
3508 s32 err = -EPERM;
3509 struct brcmf_tlv *rsn_ie;
3510 struct brcmf_vs_tlv *wpa_ie;
3511 struct brcmf_join_params join_params;
1a873342
HM
3512 s32 bssidx = 0;
3513
3514 WL_TRACE("channel_type=%d, beacon_interval=%d, dtim_period=%d,\n",
3515 settings->channel_type, settings->beacon_interval,
3516 settings->dtim_period);
3f40b839 3517 WL_TRACE("ssid=%s(%zu), auth_type=%d, inactivity_timeout=%d\n",
1a873342
HM
3518 settings->ssid, settings->ssid_len, settings->auth_type,
3519 settings->inactivity_timeout);
3520
c1179033 3521 if (!test_bit(BRCMF_VIF_STATUS_AP_CREATING, &ifp->vif->sme_state)) {
1a873342
HM
3522 WL_ERR("Not in AP creation mode\n");
3523 return -EPERM;
3524 }
3525
3526 memset(&ssid_le, 0, sizeof(ssid_le));
3527 if (settings->ssid == NULL || settings->ssid_len == 0) {
3528 ie_offset = DOT11_MGMT_HDR_LEN + DOT11_BCN_PRB_FIXED_LEN;
3529 ssid_ie = brcmf_parse_tlvs(
3530 (u8 *)&settings->beacon.head[ie_offset],
3531 settings->beacon.head_len - ie_offset,
3532 WLAN_EID_SSID);
3533 if (!ssid_ie)
3534 return -EINVAL;
3535
3536 memcpy(ssid_le.SSID, ssid_ie->data, ssid_ie->len);
3537 ssid_le.SSID_len = cpu_to_le32(ssid_ie->len);
3538 WL_TRACE("SSID is (%s) in Head\n", ssid_le.SSID);
3539 } else {
3540 memcpy(ssid_le.SSID, settings->ssid, settings->ssid_len);
3541 ssid_le.SSID_len = cpu_to_le32((u32)settings->ssid_len);
3542 }
3543
3544 brcmf_set_mpc(ndev, 0);
ac24be6f 3545 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_DOWN, 1);
1a873342
HM
3546 if (err < 0) {
3547 WL_ERR("BRCMF_C_DOWN error %d\n", err);
3548 goto exit;
3549 }
ac24be6f 3550 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_INFRA, 1);
1a873342
HM
3551 if (err < 0) {
3552 WL_ERR("SET INFRA error %d\n", err);
3553 goto exit;
3554 }
ac24be6f 3555 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_AP, 1);
1a873342
HM
3556 if (err < 0) {
3557 WL_ERR("setting AP mode failed %d\n", err);
3558 goto exit;
3559 }
3560
3561 /* find the RSN_IE */
3562 rsn_ie = brcmf_parse_tlvs((u8 *)settings->beacon.tail,
3563 settings->beacon.tail_len, WLAN_EID_RSN);
3564
3565 /* find the WPA_IE */
3566 wpa_ie = brcmf_find_wpaie((u8 *)settings->beacon.tail,
3567 settings->beacon.tail_len);
3568
1a873342
HM
3569 if ((wpa_ie != NULL || rsn_ie != NULL)) {
3570 WL_TRACE("WPA(2) IE is found\n");
3571 if (wpa_ie != NULL) {
3572 /* WPA IE */
34778529 3573 err = brcmf_configure_wpaie(ndev, wpa_ie, false);
1a873342
HM
3574 if (err < 0)
3575 goto exit;
1a873342
HM
3576 } else {
3577 /* RSN IE */
3578 err = brcmf_configure_wpaie(ndev,
34778529 3579 (struct brcmf_vs_tlv *)rsn_ie, true);
1a873342
HM
3580 if (err < 0)
3581 goto exit;
1a873342 3582 }
1a873342
HM
3583 } else {
3584 WL_TRACE("No WPA(2) IEs found\n");
3585 brcmf_configure_opensecurity(ndev, bssidx);
1a873342
HM
3586 }
3587 /* Set Beacon IEs to FW */
1332e26e
AS
3588 err = brcmf_vif_set_mgmt_ie(ndev_to_vif(ndev),
3589 VNDR_IE_BEACON_FLAG,
3590 settings->beacon.tail,
3591 settings->beacon.tail_len);
1a873342
HM
3592 if (err)
3593 WL_ERR("Set Beacon IE Failed\n");
3594 else
3595 WL_TRACE("Applied Vndr IEs for Beacon\n");
3596
3597 /* Set Probe Response IEs to FW */
1332e26e
AS
3598 err = brcmf_vif_set_mgmt_ie(ndev_to_vif(ndev),
3599 VNDR_IE_PRBRSP_FLAG,
3600 settings->beacon.proberesp_ies,
3601 settings->beacon.proberesp_ies_len);
1a873342
HM
3602 if (err)
3603 WL_ERR("Set Probe Resp IE Failed\n");
3604 else
3605 WL_TRACE("Applied Vndr IEs for Probe Resp\n");
3606
3607 if (settings->beacon_interval) {
ac24be6f 3608 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_BCNPRD,
81f5dcb8 3609 settings->beacon_interval);
1a873342
HM
3610 if (err < 0) {
3611 WL_ERR("Beacon Interval Set Error, %d\n", err);
3612 goto exit;
3613 }
3614 }
3615 if (settings->dtim_period) {
ac24be6f 3616 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_DTIMPRD,
81f5dcb8 3617 settings->dtim_period);
1a873342
HM
3618 if (err < 0) {
3619 WL_ERR("DTIM Interval Set Error, %d\n", err);
3620 goto exit;
3621 }
3622 }
ac24be6f 3623 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_UP, 1);
1a873342
HM
3624 if (err < 0) {
3625 WL_ERR("BRCMF_C_UP error (%d)\n", err);
3626 goto exit;
3627 }
3628
3629 memset(&join_params, 0, sizeof(join_params));
3630 /* join parameters starts with ssid */
3631 memcpy(&join_params.ssid_le, &ssid_le, sizeof(ssid_le));
3632 /* create softap */
ac24be6f
AS
3633 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_SSID,
3634 &join_params, sizeof(join_params));
1a873342
HM
3635 if (err < 0) {
3636 WL_ERR("SET SSID error (%d)\n", err);
3637 goto exit;
3638 }
c1179033
AS
3639 clear_bit(BRCMF_VIF_STATUS_AP_CREATING, &ifp->vif->sme_state);
3640 set_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
1a873342
HM
3641
3642exit:
3643 if (err)
3644 brcmf_set_mpc(ndev, 1);
3645 return err;
3646}
3647
3648static int brcmf_cfg80211_stop_ap(struct wiphy *wiphy, struct net_device *ndev)
3649{
c1179033 3650 struct brcmf_if *ifp = netdev_priv(ndev);
27a68fe3 3651 struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
1a873342
HM
3652 s32 err = -EPERM;
3653
3654 WL_TRACE("Enter\n");
3655
27a68fe3 3656 if (cfg->conf->mode == WL_MODE_AP) {
1a873342
HM
3657 /* Due to most likely deauths outstanding we sleep */
3658 /* first to make sure they get processed by fw. */
3659 msleep(400);
ac24be6f
AS
3660 err = brcmf_fil_cmd_int_set(netdev_priv(ndev),
3661 BRCMF_C_SET_AP, 0);
1a873342
HM
3662 if (err < 0) {
3663 WL_ERR("setting AP mode failed %d\n", err);
3664 goto exit;
3665 }
ac24be6f 3666 err = brcmf_fil_cmd_int_set(netdev_priv(ndev), BRCMF_C_UP, 0);
1a873342
HM
3667 if (err < 0) {
3668 WL_ERR("BRCMF_C_UP error %d\n", err);
3669 goto exit;
3670 }
3671 brcmf_set_mpc(ndev, 1);
c1179033
AS
3672 clear_bit(BRCMF_VIF_STATUS_AP_CREATING, &ifp->vif->sme_state);
3673 clear_bit(BRCMF_VIF_STATUS_AP_CREATED, &ifp->vif->sme_state);
1a873342
HM
3674 }
3675exit:
3676 return err;
3677}
3678
3679static int
3680brcmf_cfg80211_del_station(struct wiphy *wiphy, struct net_device *ndev,
3681 u8 *mac)
3682{
3683 struct brcmf_scb_val_le scbval;
0abb5f21 3684 struct brcmf_if *ifp = netdev_priv(ndev);
1a873342
HM
3685 s32 err;
3686
3687 if (!mac)
3688 return -EFAULT;
3689
3690 WL_TRACE("Enter %pM\n", mac);
3691
ce81e317 3692 if (!check_vif_up(ifp->vif))
1a873342
HM
3693 return -EIO;
3694
3695 memcpy(&scbval.ea, mac, ETH_ALEN);
3696 scbval.val = cpu_to_le32(WLAN_REASON_DEAUTH_LEAVING);
0abb5f21 3697 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SCB_DEAUTHENTICATE_FOR_REASON,
81f5dcb8 3698 &scbval, sizeof(scbval));
1a873342
HM
3699 if (err)
3700 WL_ERR("SCB_DEAUTHENTICATE_FOR_REASON failed %d\n", err);
3701
3702 WL_TRACE("Exit\n");
3703 return err;
3704}
3705
5b435de0
AS
3706static struct cfg80211_ops wl_cfg80211_ops = {
3707 .change_virtual_intf = brcmf_cfg80211_change_iface,
3708 .scan = brcmf_cfg80211_scan,
3709 .set_wiphy_params = brcmf_cfg80211_set_wiphy_params,
3710 .join_ibss = brcmf_cfg80211_join_ibss,
3711 .leave_ibss = brcmf_cfg80211_leave_ibss,
3712 .get_station = brcmf_cfg80211_get_station,
3713 .set_tx_power = brcmf_cfg80211_set_tx_power,
3714 .get_tx_power = brcmf_cfg80211_get_tx_power,
3715 .add_key = brcmf_cfg80211_add_key,
3716 .del_key = brcmf_cfg80211_del_key,
3717 .get_key = brcmf_cfg80211_get_key,
3718 .set_default_key = brcmf_cfg80211_config_default_key,
3719 .set_default_mgmt_key = brcmf_cfg80211_config_default_mgmt_key,
3720 .set_power_mgmt = brcmf_cfg80211_set_power_mgmt,
3721 .set_bitrate_mask = brcmf_cfg80211_set_bitrate_mask,
3722 .connect = brcmf_cfg80211_connect,
3723 .disconnect = brcmf_cfg80211_disconnect,
3724 .suspend = brcmf_cfg80211_suspend,
3725 .resume = brcmf_cfg80211_resume,
3726 .set_pmksa = brcmf_cfg80211_set_pmksa,
3727 .del_pmksa = brcmf_cfg80211_del_pmksa,
cbaa177d 3728 .flush_pmksa = brcmf_cfg80211_flush_pmksa,
1a873342
HM
3729 .start_ap = brcmf_cfg80211_start_ap,
3730 .stop_ap = brcmf_cfg80211_stop_ap,
3731 .del_station = brcmf_cfg80211_del_station,
e5806072
AS
3732 .sched_scan_start = brcmf_cfg80211_sched_scan_start,
3733 .sched_scan_stop = brcmf_cfg80211_sched_scan_stop,
cbaa177d
AS
3734#ifdef CONFIG_NL80211_TESTMODE
3735 .testmode_cmd = brcmf_cfg80211_testmode
3736#endif
5b435de0
AS
3737};
3738
3739static s32 brcmf_mode_to_nl80211_iftype(s32 mode)
3740{
3741 s32 err = 0;
3742
3743 switch (mode) {
3744 case WL_MODE_BSS:
3745 return NL80211_IFTYPE_STATION;
3746 case WL_MODE_IBSS:
3747 return NL80211_IFTYPE_ADHOC;
3748 default:
3749 return NL80211_IFTYPE_UNSPECIFIED;
3750 }
3751
3752 return err;
3753}
3754
e5806072
AS
3755static void brcmf_wiphy_pno_params(struct wiphy *wiphy)
3756{
e5806072
AS
3757 /* scheduled scan settings */
3758 wiphy->max_sched_scan_ssids = BRCMF_PNO_MAX_PFN_COUNT;
3759 wiphy->max_match_sets = BRCMF_PNO_MAX_PFN_COUNT;
3760 wiphy->max_sched_scan_ie_len = BRCMF_SCAN_IE_LEN_MAX;
3761 wiphy->flags |= WIPHY_FLAG_SUPPORTS_SCHED_SCAN;
e5806072
AS
3762}
3763
3eacf866 3764static struct wiphy *brcmf_setup_wiphy(struct device *phydev)
5b435de0 3765{
3eacf866 3766 struct wiphy *wiphy;
5b435de0
AS
3767 s32 err = 0;
3768
3eacf866
AS
3769 wiphy = wiphy_new(&wl_cfg80211_ops, sizeof(struct brcmf_cfg80211_info));
3770 if (!wiphy) {
bfeb4dbc 3771 WL_ERR("Could not allocate wiphy device\n");
3eacf866
AS
3772 return ERR_PTR(-ENOMEM);
3773 }
3774 set_wiphy_dev(wiphy, phydev);
3775 wiphy->max_scan_ssids = WL_NUM_SCAN_MAX;
3776 wiphy->max_num_pmkids = WL_NUM_PMKIDS_MAX;
3777 wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) |
3778 BIT(NL80211_IFTYPE_ADHOC) |
3779 BIT(NL80211_IFTYPE_AP);
3780 wiphy->bands[IEEE80211_BAND_2GHZ] = &__wl_band_2ghz;
3781 wiphy->bands[IEEE80211_BAND_5GHZ] = &__wl_band_5ghz_a; /* Set
5b435de0
AS
3782 * it as 11a by default.
3783 * This will be updated with
3784 * 11n phy tables in
3785 * "ifconfig up"
3786 * if phy has 11n capability
3787 */
3eacf866
AS
3788 wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM;
3789 wiphy->cipher_suites = __wl_cipher_suites;
3790 wiphy->n_cipher_suites = ARRAY_SIZE(__wl_cipher_suites);
3791 wiphy->flags |= WIPHY_FLAG_PS_ON_BY_DEFAULT; /* enable power
5b435de0
AS
3792 * save mode
3793 * by default
3794 */
3eacf866
AS
3795 brcmf_wiphy_pno_params(wiphy);
3796 err = wiphy_register(wiphy);
5b435de0 3797 if (err < 0) {
bfeb4dbc 3798 WL_ERR("Could not register wiphy device (%d)\n", err);
3eacf866
AS
3799 wiphy_free(wiphy);
3800 return ERR_PTR(err);
5b435de0 3801 }
3eacf866
AS
3802 return wiphy;
3803}
3804
3805static
3806struct brcmf_cfg80211_vif *brcmf_alloc_vif(struct brcmf_cfg80211_info *cfg,
3807 struct net_device *netdev,
3808 s32 mode, bool pm_block)
3809{
3810 struct brcmf_cfg80211_vif *vif;
5b435de0 3811
3eacf866
AS
3812 if (cfg->vif_cnt == BRCMF_IFACE_MAX_CNT)
3813 return ERR_PTR(-ENOSPC);
5b435de0 3814
3eacf866
AS
3815 vif = kzalloc(sizeof(*vif), GFP_KERNEL);
3816 if (!vif)
3817 return ERR_PTR(-ENOMEM);
3818
3819 vif->wdev.wiphy = cfg->wiphy;
3820 vif->wdev.netdev = netdev;
3821 vif->wdev.iftype = brcmf_mode_to_nl80211_iftype(mode);
5b435de0 3822
3eacf866
AS
3823 if (netdev) {
3824 vif->ifp = netdev_priv(netdev);
3825 netdev->ieee80211_ptr = &vif->wdev;
3826 SET_NETDEV_DEV(netdev, wiphy_dev(cfg->wiphy));
3827 }
3828
3829 vif->mode = mode;
3830 vif->pm_block = pm_block;
3831 vif->roam_off = -1;
3832
6ac4f4ed
AS
3833 brcmf_init_prof(&vif->profile);
3834
3eacf866
AS
3835 list_add_tail(&vif->list, &cfg->vif_list);
3836 cfg->vif_cnt++;
3837 return vif;
5b435de0
AS
3838}
3839
3eacf866 3840static void brcmf_free_vif(struct brcmf_cfg80211_vif *vif)
5b435de0 3841{
3eacf866
AS
3842 struct brcmf_cfg80211_info *cfg;
3843 struct wiphy *wiphy;
5b435de0 3844
3eacf866
AS
3845 wiphy = vif->wdev.wiphy;
3846 cfg = wiphy_priv(wiphy);
3847 list_del(&vif->list);
3848 cfg->vif_cnt--;
3849
3850 kfree(vif);
3851 if (!cfg->vif_cnt) {
3852 wiphy_unregister(wiphy);
3853 wiphy_free(wiphy);
5b435de0 3854 }
5b435de0
AS
3855}
3856
27a68fe3 3857static bool brcmf_is_linkup(struct brcmf_cfg80211_info *cfg,
5b435de0
AS
3858 const struct brcmf_event_msg *e)
3859{
3860 u32 event = be32_to_cpu(e->event_type);
3861 u32 status = be32_to_cpu(e->status);
3862
3863 if (event == BRCMF_E_SET_SSID && status == BRCMF_E_STATUS_SUCCESS) {
3864 WL_CONN("Processing set ssid\n");
27a68fe3 3865 cfg->link_up = true;
5b435de0
AS
3866 return true;
3867 }
3868
3869 return false;
3870}
3871
27a68fe3 3872static bool brcmf_is_linkdown(struct brcmf_cfg80211_info *cfg,
5b435de0
AS
3873 const struct brcmf_event_msg *e)
3874{
3875 u32 event = be32_to_cpu(e->event_type);
3876 u16 flags = be16_to_cpu(e->flags);
3877
3878 if (event == BRCMF_E_LINK && (!(flags & BRCMF_EVENT_MSG_LINK))) {
3879 WL_CONN("Processing link down\n");
3880 return true;
3881 }
3882 return false;
3883}
3884
27a68fe3 3885static bool brcmf_is_nonetwork(struct brcmf_cfg80211_info *cfg,
5b435de0
AS
3886 const struct brcmf_event_msg *e)
3887{
3888 u32 event = be32_to_cpu(e->event_type);
3889 u32 status = be32_to_cpu(e->status);
3890
3891 if (event == BRCMF_E_LINK && status == BRCMF_E_STATUS_NO_NETWORKS) {
3892 WL_CONN("Processing Link %s & no network found\n",
3893 be16_to_cpu(e->flags) & BRCMF_EVENT_MSG_LINK ?
3894 "up" : "down");
3895 return true;
3896 }
3897
3898 if (event == BRCMF_E_SET_SSID && status != BRCMF_E_STATUS_SUCCESS) {
3899 WL_CONN("Processing connecting & no network found\n");
3900 return true;
3901 }
3902
3903 return false;
3904}
3905
27a68fe3 3906static void brcmf_clear_assoc_ies(struct brcmf_cfg80211_info *cfg)
5b435de0 3907{
27a68fe3 3908 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5b435de0
AS
3909
3910 kfree(conn_info->req_ie);
3911 conn_info->req_ie = NULL;
3912 conn_info->req_ie_len = 0;
3913 kfree(conn_info->resp_ie);
3914 conn_info->resp_ie = NULL;
3915 conn_info->resp_ie_len = 0;
3916}
3917
27a68fe3 3918static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg)
5b435de0 3919{
ac24be6f 3920 struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
c4e382d2 3921 struct brcmf_cfg80211_assoc_ielen_le *assoc_info;
27a68fe3 3922 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5b435de0
AS
3923 u32 req_len;
3924 u32 resp_len;
3925 s32 err = 0;
3926
27a68fe3 3927 brcmf_clear_assoc_ies(cfg);
5b435de0 3928
ac24be6f
AS
3929 err = brcmf_fil_iovar_data_get(ifp, "assoc_info",
3930 cfg->extra_buf, WL_ASSOC_INFO_MAX);
5b435de0
AS
3931 if (err) {
3932 WL_ERR("could not get assoc info (%d)\n", err);
3933 return err;
3934 }
c4e382d2 3935 assoc_info =
27a68fe3 3936 (struct brcmf_cfg80211_assoc_ielen_le *)cfg->extra_buf;
c4e382d2
AS
3937 req_len = le32_to_cpu(assoc_info->req_len);
3938 resp_len = le32_to_cpu(assoc_info->resp_len);
5b435de0 3939 if (req_len) {
ac24be6f 3940 err = brcmf_fil_iovar_data_get(ifp, "assoc_req_ies",
81f5dcb8
HM
3941 cfg->extra_buf,
3942 WL_ASSOC_INFO_MAX);
5b435de0
AS
3943 if (err) {
3944 WL_ERR("could not get assoc req (%d)\n", err);
3945 return err;
3946 }
3947 conn_info->req_ie_len = req_len;
3948 conn_info->req_ie =
27a68fe3 3949 kmemdup(cfg->extra_buf, conn_info->req_ie_len,
5b435de0
AS
3950 GFP_KERNEL);
3951 } else {
3952 conn_info->req_ie_len = 0;
3953 conn_info->req_ie = NULL;
3954 }
3955 if (resp_len) {
ac24be6f 3956 err = brcmf_fil_iovar_data_get(ifp, "assoc_resp_ies",
81f5dcb8
HM
3957 cfg->extra_buf,
3958 WL_ASSOC_INFO_MAX);
5b435de0
AS
3959 if (err) {
3960 WL_ERR("could not get assoc resp (%d)\n", err);
3961 return err;
3962 }
3963 conn_info->resp_ie_len = resp_len;
3964 conn_info->resp_ie =
27a68fe3 3965 kmemdup(cfg->extra_buf, conn_info->resp_ie_len,
5b435de0
AS
3966 GFP_KERNEL);
3967 } else {
3968 conn_info->resp_ie_len = 0;
3969 conn_info->resp_ie = NULL;
3970 }
3971 WL_CONN("req len (%d) resp len (%d)\n",
3972 conn_info->req_ie_len, conn_info->resp_ie_len);
3973
3974 return err;
3975}
3976
3977static s32
27a68fe3 3978brcmf_bss_roaming_done(struct brcmf_cfg80211_info *cfg,
5b435de0
AS
3979 struct net_device *ndev,
3980 const struct brcmf_event_msg *e)
3981{
c1179033
AS
3982 struct brcmf_if *ifp = netdev_priv(ndev);
3983 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
27a68fe3
AS
3984 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
3985 struct wiphy *wiphy = cfg_to_wiphy(cfg);
a180b83b 3986 struct ieee80211_channel *notify_channel = NULL;
5b435de0 3987 struct ieee80211_supported_band *band;
a180b83b 3988 struct brcmf_bss_info_le *bi;
5b435de0
AS
3989 u32 freq;
3990 s32 err = 0;
3991 u32 target_channel;
a180b83b 3992 u8 *buf;
5b435de0
AS
3993
3994 WL_TRACE("Enter\n");
3995
27a68fe3 3996 brcmf_get_assoc_ies(cfg);
6c8c4f72 3997 memcpy(profile->bssid, e->addr, ETH_ALEN);
27a68fe3 3998 brcmf_update_bss_info(cfg);
5b435de0 3999
a180b83b
FL
4000 buf = kzalloc(WL_BSS_INFO_MAX, GFP_KERNEL);
4001 if (buf == NULL) {
4002 err = -ENOMEM;
4003 goto done;
4004 }
4005
4006 /* data sent to dongle has to be little endian */
4007 *(__le32 *)buf = cpu_to_le32(WL_BSS_INFO_MAX);
c1179033 4008 err = brcmf_fil_cmd_data_get(ifp, BRCMF_C_GET_BSS_INFO,
ac24be6f 4009 buf, WL_BSS_INFO_MAX);
a180b83b
FL
4010
4011 if (err)
4012 goto done;
5b435de0 4013
a180b83b
FL
4014 bi = (struct brcmf_bss_info_le *)(buf + 4);
4015 target_channel = bi->ctl_ch ? bi->ctl_ch :
4016 CHSPEC_CHANNEL(le16_to_cpu(bi->chanspec));
5b435de0
AS
4017
4018 if (target_channel <= CH_MAX_2G_CHANNEL)
4019 band = wiphy->bands[IEEE80211_BAND_2GHZ];
4020 else
4021 band = wiphy->bands[IEEE80211_BAND_5GHZ];
4022
4023 freq = ieee80211_channel_to_frequency(target_channel, band->band);
4024 notify_channel = ieee80211_get_channel(wiphy, freq);
4025
a180b83b
FL
4026done:
4027 kfree(buf);
06bb123e 4028 cfg80211_roamed(ndev, notify_channel, (u8 *)profile->bssid,
5b435de0
AS
4029 conn_info->req_ie, conn_info->req_ie_len,
4030 conn_info->resp_ie, conn_info->resp_ie_len, GFP_KERNEL);
4031 WL_CONN("Report roaming result\n");
4032
c1179033 4033 set_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state);
5b435de0
AS
4034 WL_TRACE("Exit\n");
4035 return err;
4036}
4037
4038static s32
27a68fe3 4039brcmf_bss_connect_done(struct brcmf_cfg80211_info *cfg,
5b435de0
AS
4040 struct net_device *ndev, const struct brcmf_event_msg *e,
4041 bool completed)
4042{
c1179033
AS
4043 struct brcmf_if *ifp = netdev_priv(ndev);
4044 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
27a68fe3 4045 struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg);
5b435de0
AS
4046 s32 err = 0;
4047
4048 WL_TRACE("Enter\n");
4049
c1179033
AS
4050 if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTING,
4051 &ifp->vif->sme_state)) {
5b435de0 4052 if (completed) {
27a68fe3 4053 brcmf_get_assoc_ies(cfg);
6c8c4f72 4054 memcpy(profile->bssid, e->addr, ETH_ALEN);
27a68fe3 4055 brcmf_update_bss_info(cfg);
5b435de0
AS
4056 }
4057 cfg80211_connect_result(ndev,
06bb123e 4058 (u8 *)profile->bssid,
5b435de0
AS
4059 conn_info->req_ie,
4060 conn_info->req_ie_len,
4061 conn_info->resp_ie,
4062 conn_info->resp_ie_len,
4063 completed ? WLAN_STATUS_SUCCESS :
4064 WLAN_STATUS_AUTH_TIMEOUT,
4065 GFP_KERNEL);
4066 if (completed)
c1179033
AS
4067 set_bit(BRCMF_VIF_STATUS_CONNECTED,
4068 &ifp->vif->sme_state);
5b435de0
AS
4069 WL_CONN("Report connect result - connection %s\n",
4070 completed ? "succeeded" : "failed");
4071 }
4072 WL_TRACE("Exit\n");
4073 return err;
4074}
4075
4076static s32
27a68fe3 4077brcmf_notify_connect_status_ap(struct brcmf_cfg80211_info *cfg,
1a873342
HM
4078 struct net_device *ndev,
4079 const struct brcmf_event_msg *e, void *data)
4080{
4081 s32 err = 0;
4082 u32 event = be32_to_cpu(e->event_type);
4083 u32 reason = be32_to_cpu(e->reason);
4084 u32 len = be32_to_cpu(e->datalen);
4085 static int generation;
4086
4087 struct station_info sinfo;
4088
4089 WL_CONN("event %d, reason %d\n", event, reason);
4090 memset(&sinfo, 0, sizeof(sinfo));
4091
4092 sinfo.filled = 0;
4093 if (((event == BRCMF_E_ASSOC_IND) || (event == BRCMF_E_REASSOC_IND)) &&
4094 reason == BRCMF_E_STATUS_SUCCESS) {
4095 sinfo.filled = STATION_INFO_ASSOC_REQ_IES;
4096 if (!data) {
4097 WL_ERR("No IEs present in ASSOC/REASSOC_IND");
4098 return -EINVAL;
4099 }
4100 sinfo.assoc_req_ies = data;
4101 sinfo.assoc_req_ies_len = len;
4102 generation++;
4103 sinfo.generation = generation;
4104 cfg80211_new_sta(ndev, e->addr, &sinfo, GFP_ATOMIC);
4105 } else if ((event == BRCMF_E_DISASSOC_IND) ||
4106 (event == BRCMF_E_DEAUTH_IND) ||
4107 (event == BRCMF_E_DEAUTH)) {
4108 generation++;
4109 sinfo.generation = generation;
4110 cfg80211_del_sta(ndev, e->addr, GFP_ATOMIC);
4111 }
4112 return err;
4113}
4114
5b435de0 4115static s32
1993732e 4116brcmf_notify_connect_status(struct brcmf_if *ifp,
5b435de0
AS
4117 const struct brcmf_event_msg *e, void *data)
4118{
1993732e
AS
4119 struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
4120 struct net_device *ndev = ifp->ndev;
c1179033 4121 struct brcmf_cfg80211_profile *profile = &ifp->vif->profile;
5b435de0
AS
4122 s32 err = 0;
4123
27a68fe3
AS
4124 if (cfg->conf->mode == WL_MODE_AP) {
4125 err = brcmf_notify_connect_status_ap(cfg, ndev, e, data);
4126 } else if (brcmf_is_linkup(cfg, e)) {
5b435de0 4127 WL_CONN("Linkup\n");
27a68fe3 4128 if (brcmf_is_ibssmode(cfg)) {
6c8c4f72 4129 memcpy(profile->bssid, e->addr, ETH_ALEN);
27a68fe3 4130 wl_inform_ibss(cfg, ndev, e->addr);
5b435de0 4131 cfg80211_ibss_joined(ndev, e->addr, GFP_KERNEL);
c1179033
AS
4132 clear_bit(BRCMF_VIF_STATUS_CONNECTING,
4133 &ifp->vif->sme_state);
4134 set_bit(BRCMF_VIF_STATUS_CONNECTED,
4135 &ifp->vif->sme_state);
5b435de0 4136 } else
27a68fe3
AS
4137 brcmf_bss_connect_done(cfg, ndev, e, true);
4138 } else if (brcmf_is_linkdown(cfg, e)) {
5b435de0 4139 WL_CONN("Linkdown\n");
27a68fe3 4140 if (brcmf_is_ibssmode(cfg)) {
c1179033
AS
4141 clear_bit(BRCMF_VIF_STATUS_CONNECTING,
4142 &ifp->vif->sme_state);
4143 if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTED,
4144 &ifp->vif->sme_state))
27a68fe3 4145 brcmf_link_down(cfg);
5b435de0 4146 } else {
27a68fe3 4147 brcmf_bss_connect_done(cfg, ndev, e, false);
c1179033
AS
4148 if (test_and_clear_bit(BRCMF_VIF_STATUS_CONNECTED,
4149 &ifp->vif->sme_state)) {
5b435de0 4150 cfg80211_disconnected(ndev, 0, NULL, 0,
c1179033 4151 GFP_KERNEL);
27a68fe3 4152 brcmf_link_down(cfg);
5b435de0
AS
4153 }
4154 }
6ac4f4ed 4155 brcmf_init_prof(ndev_to_prof(ndev));
27a68fe3
AS
4156 } else if (brcmf_is_nonetwork(cfg, e)) {
4157 if (brcmf_is_ibssmode(cfg))
c1179033
AS
4158 clear_bit(BRCMF_VIF_STATUS_CONNECTING,
4159 &ifp->vif->sme_state);
5b435de0 4160 else
27a68fe3 4161 brcmf_bss_connect_done(cfg, ndev, e, false);
5b435de0
AS
4162 }
4163
4164 return err;
4165}
4166
4167static s32
1993732e 4168brcmf_notify_roaming_status(struct brcmf_if *ifp,
5b435de0
AS
4169 const struct brcmf_event_msg *e, void *data)
4170{
1993732e 4171 struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
5b435de0
AS
4172 s32 err = 0;
4173 u32 event = be32_to_cpu(e->event_type);
4174 u32 status = be32_to_cpu(e->status);
4175
4176 if (event == BRCMF_E_ROAM && status == BRCMF_E_STATUS_SUCCESS) {
c1179033 4177 if (test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state))
1993732e 4178 brcmf_bss_roaming_done(cfg, ifp->ndev, e);
5b435de0 4179 else
1993732e 4180 brcmf_bss_connect_done(cfg, ifp->ndev, e, true);
5b435de0
AS
4181 }
4182
4183 return err;
4184}
4185
4186static s32
1993732e 4187brcmf_notify_mic_status(struct brcmf_if *ifp,
5b435de0
AS
4188 const struct brcmf_event_msg *e, void *data)
4189{
4190 u16 flags = be16_to_cpu(e->flags);
4191 enum nl80211_key_type key_type;
4192
4193 if (flags & BRCMF_EVENT_MSG_GROUP)
4194 key_type = NL80211_KEYTYPE_GROUP;
4195 else
4196 key_type = NL80211_KEYTYPE_PAIRWISE;
4197
1993732e 4198 cfg80211_michael_mic_failure(ifp->ndev, (u8 *)&e->addr, key_type, -1,
5b435de0
AS
4199 NULL, GFP_KERNEL);
4200
4201 return 0;
4202}
4203
5b435de0
AS
4204static void brcmf_init_conf(struct brcmf_cfg80211_conf *conf)
4205{
4206 conf->mode = (u32)-1;
4207 conf->frag_threshold = (u32)-1;
4208 conf->rts_threshold = (u32)-1;
4209 conf->retry_short = (u32)-1;
4210 conf->retry_long = (u32)-1;
4211 conf->tx_power = -1;
4212}
4213
4214static void brcmf_init_eloop_handler(struct brcmf_cfg80211_event_loop *el)
4215{
4216 memset(el, 0, sizeof(*el));
5b435de0 4217 el->handler[BRCMF_E_LINK] = brcmf_notify_connect_status;
1a873342
HM
4218 el->handler[BRCMF_E_DEAUTH_IND] = brcmf_notify_connect_status;
4219 el->handler[BRCMF_E_DEAUTH] = brcmf_notify_connect_status;
4220 el->handler[BRCMF_E_DISASSOC_IND] = brcmf_notify_connect_status;
4221 el->handler[BRCMF_E_ASSOC_IND] = brcmf_notify_connect_status;
4222 el->handler[BRCMF_E_REASSOC_IND] = brcmf_notify_connect_status;
5b435de0
AS
4223 el->handler[BRCMF_E_ROAM] = brcmf_notify_roaming_status;
4224 el->handler[BRCMF_E_MIC_ERROR] = brcmf_notify_mic_status;
4225 el->handler[BRCMF_E_SET_SSID] = brcmf_notify_connect_status;
e5806072 4226 el->handler[BRCMF_E_PFN_NET_FOUND] = brcmf_notify_sched_scan_results;
5b435de0
AS
4227}
4228
27a68fe3
AS
4229static void brcmf_deinit_priv_mem(struct brcmf_cfg80211_info *cfg)
4230{
27a68fe3
AS
4231 kfree(cfg->conf);
4232 cfg->conf = NULL;
27a68fe3
AS
4233 kfree(cfg->escan_ioctl_buf);
4234 cfg->escan_ioctl_buf = NULL;
27a68fe3
AS
4235 kfree(cfg->extra_buf);
4236 cfg->extra_buf = NULL;
27a68fe3
AS
4237 kfree(cfg->pmk_list);
4238 cfg->pmk_list = NULL;
27a68fe3
AS
4239}
4240
4241static s32 brcmf_init_priv_mem(struct brcmf_cfg80211_info *cfg)
4242{
27a68fe3
AS
4243 cfg->conf = kzalloc(sizeof(*cfg->conf), GFP_KERNEL);
4244 if (!cfg->conf)
5b435de0 4245 goto init_priv_mem_out;
27a68fe3
AS
4246 cfg->escan_ioctl_buf = kzalloc(BRCMF_DCMD_MEDLEN, GFP_KERNEL);
4247 if (!cfg->escan_ioctl_buf)
e756af5b 4248 goto init_priv_mem_out;
27a68fe3
AS
4249 cfg->extra_buf = kzalloc(WL_EXTRA_BUF_MAX, GFP_KERNEL);
4250 if (!cfg->extra_buf)
5b435de0 4251 goto init_priv_mem_out;
27a68fe3
AS
4252 cfg->pmk_list = kzalloc(sizeof(*cfg->pmk_list), GFP_KERNEL);
4253 if (!cfg->pmk_list)
5b435de0
AS
4254 goto init_priv_mem_out;
4255
4256 return 0;
4257
4258init_priv_mem_out:
27a68fe3 4259 brcmf_deinit_priv_mem(cfg);
5b435de0
AS
4260
4261 return -ENOMEM;
4262}
4263
4264/*
4265* retrieve first queued event from head
4266*/
4267
4268static struct brcmf_cfg80211_event_q *brcmf_deq_event(
27a68fe3 4269 struct brcmf_cfg80211_info *cfg)
5b435de0
AS
4270{
4271 struct brcmf_cfg80211_event_q *e = NULL;
4272
27a68fe3
AS
4273 spin_lock_irq(&cfg->evt_q_lock);
4274 if (!list_empty(&cfg->evt_q_list)) {
4275 e = list_first_entry(&cfg->evt_q_list,
5b435de0
AS
4276 struct brcmf_cfg80211_event_q, evt_q_list);
4277 list_del(&e->evt_q_list);
4278 }
27a68fe3 4279 spin_unlock_irq(&cfg->evt_q_lock);
5b435de0
AS
4280
4281 return e;
4282}
4283
4284/*
bcbec9e7
AS
4285* push event to tail of the queue
4286*
4287* remark: this function may not sleep as it is called in atomic context.
5b435de0
AS
4288*/
4289
4290static s32
1993732e 4291brcmf_enq_event(struct brcmf_if *ifp, u32 event,
c4fdb056 4292 const struct brcmf_event_msg *msg, void *data)
5b435de0 4293{
1993732e 4294 struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
5b435de0
AS
4295 struct brcmf_cfg80211_event_q *e;
4296 s32 err = 0;
cf44066a 4297 ulong flags;
c4fdb056
HM
4298 u32 data_len;
4299 u32 total_len;
5b435de0 4300
c4fdb056
HM
4301 total_len = sizeof(struct brcmf_cfg80211_event_q);
4302 if (data)
4303 data_len = be32_to_cpu(msg->datalen);
4304 else
4305 data_len = 0;
4306 total_len += data_len;
4307 e = kzalloc(total_len, GFP_ATOMIC);
5b435de0
AS
4308 if (!e)
4309 return -ENOMEM;
4310
4311 e->etype = event;
1993732e 4312 e->ifp = ifp;
5b435de0 4313 memcpy(&e->emsg, msg, sizeof(struct brcmf_event_msg));
c4fdb056
HM
4314 if (data)
4315 memcpy(&e->edata, data, data_len);
5b435de0 4316
27a68fe3
AS
4317 spin_lock_irqsave(&cfg->evt_q_lock, flags);
4318 list_add_tail(&e->evt_q_list, &cfg->evt_q_list);
4319 spin_unlock_irqrestore(&cfg->evt_q_lock, flags);
5b435de0
AS
4320
4321 return err;
4322}
4323
4324static void brcmf_put_event(struct brcmf_cfg80211_event_q *e)
4325{
4326 kfree(e);
4327}
4328
4329static void brcmf_cfg80211_event_handler(struct work_struct *work)
4330{
27a68fe3
AS
4331 struct brcmf_cfg80211_info *cfg =
4332 container_of(work, struct brcmf_cfg80211_info,
5b435de0
AS
4333 event_work);
4334 struct brcmf_cfg80211_event_q *e;
4335
27a68fe3 4336 e = brcmf_deq_event(cfg);
5b435de0
AS
4337 if (unlikely(!e)) {
4338 WL_ERR("event queue empty...\n");
4339 return;
4340 }
4341
4342 do {
4343 WL_INFO("event type (%d)\n", e->etype);
27a68fe3 4344 if (cfg->el.handler[e->etype])
1993732e 4345 cfg->el.handler[e->etype](e->ifp, &e->emsg, e->edata);
5b435de0
AS
4346 else
4347 WL_INFO("Unknown Event (%d): ignoring\n", e->etype);
4348 brcmf_put_event(e);
27a68fe3 4349 } while ((e = brcmf_deq_event(cfg)));
5b435de0
AS
4350
4351}
4352
27a68fe3 4353static void brcmf_init_eq(struct brcmf_cfg80211_info *cfg)
5b435de0 4354{
27a68fe3
AS
4355 spin_lock_init(&cfg->evt_q_lock);
4356 INIT_LIST_HEAD(&cfg->evt_q_list);
5b435de0
AS
4357}
4358
27a68fe3 4359static void brcmf_flush_eq(struct brcmf_cfg80211_info *cfg)
5b435de0
AS
4360{
4361 struct brcmf_cfg80211_event_q *e;
4362
27a68fe3
AS
4363 spin_lock_irq(&cfg->evt_q_lock);
4364 while (!list_empty(&cfg->evt_q_list)) {
4365 e = list_first_entry(&cfg->evt_q_list,
5b435de0
AS
4366 struct brcmf_cfg80211_event_q, evt_q_list);
4367 list_del(&e->evt_q_list);
4368 kfree(e);
4369 }
27a68fe3 4370 spin_unlock_irq(&cfg->evt_q_lock);
5b435de0
AS
4371}
4372
27a68fe3 4373static s32 wl_init_priv(struct brcmf_cfg80211_info *cfg)
5b435de0
AS
4374{
4375 s32 err = 0;
4376
27a68fe3
AS
4377 cfg->scan_request = NULL;
4378 cfg->pwr_save = true;
27a68fe3 4379 cfg->roam_on = true; /* roam on & off switch.
5b435de0 4380 we enable roam per default */
27a68fe3 4381 cfg->active_scan = true; /* we do active scan for
5b435de0 4382 specific scan per default */
27a68fe3
AS
4383 cfg->dongle_up = false; /* dongle is not up yet */
4384 brcmf_init_eq(cfg);
4385 err = brcmf_init_priv_mem(cfg);
5b435de0
AS
4386 if (err)
4387 return err;
27a68fe3
AS
4388 INIT_WORK(&cfg->event_work, brcmf_cfg80211_event_handler);
4389 brcmf_init_eloop_handler(&cfg->el);
4390 mutex_init(&cfg->usr_sync);
27a68fe3
AS
4391 brcmf_init_escan(cfg);
4392 brcmf_init_conf(cfg->conf);
27a68fe3 4393 brcmf_link_down(cfg);
5b435de0
AS
4394
4395 return err;
4396}
4397
27a68fe3 4398static void wl_deinit_priv(struct brcmf_cfg80211_info *cfg)
5b435de0 4399{
27a68fe3
AS
4400 cancel_work_sync(&cfg->event_work);
4401 cfg->dongle_up = false; /* dongle down */
4402 brcmf_flush_eq(cfg);
4403 brcmf_link_down(cfg);
4404 brcmf_abort_scanning(cfg);
4405 brcmf_deinit_priv_mem(cfg);
5b435de0
AS
4406}
4407
1ed9baf0 4408struct brcmf_cfg80211_info *brcmf_cfg80211_attach(struct brcmf_pub *drvr)
5b435de0 4409{
1ed9baf0
AS
4410 struct net_device *ndev = drvr->iflist[0]->ndev;
4411 struct device *busdev = drvr->dev;
27a68fe3 4412 struct brcmf_cfg80211_info *cfg;
3eacf866
AS
4413 struct wiphy *wiphy;
4414 struct brcmf_cfg80211_vif *vif;
4415 struct brcmf_if *ifp;
5b435de0
AS
4416 s32 err = 0;
4417
4418 if (!ndev) {
4419 WL_ERR("ndev is invalid\n");
4420 return NULL;
4421 }
5b435de0 4422
3eacf866
AS
4423 ifp = netdev_priv(ndev);
4424 wiphy = brcmf_setup_wiphy(busdev);
4425 if (IS_ERR(wiphy))
5b435de0 4426 return NULL;
5b435de0 4427
3eacf866
AS
4428 cfg = wiphy_priv(wiphy);
4429 cfg->wiphy = wiphy;
27a68fe3 4430 cfg->pub = drvr;
3eacf866
AS
4431 INIT_LIST_HEAD(&cfg->vif_list);
4432
4433 vif = brcmf_alloc_vif(cfg, ndev, WL_MODE_BSS, false);
4434 if (IS_ERR(vif)) {
4435 wiphy_free(wiphy);
4436 return NULL;
4437 }
4438
27a68fe3 4439 err = wl_init_priv(cfg);
5b435de0
AS
4440 if (err) {
4441 WL_ERR("Failed to init iwm_priv (%d)\n", err);
4442 goto cfg80211_attach_out;
4443 }
5b435de0 4444
3eacf866 4445 ifp->vif = vif;
27a68fe3 4446 return cfg;
5b435de0
AS
4447
4448cfg80211_attach_out:
3eacf866 4449 brcmf_free_vif(vif);
5b435de0
AS
4450 return NULL;
4451}
4452
27a68fe3 4453void brcmf_cfg80211_detach(struct brcmf_cfg80211_info *cfg)
5b435de0 4454{
3eacf866
AS
4455 struct brcmf_cfg80211_vif *vif;
4456 struct brcmf_cfg80211_vif *tmp;
4457
27a68fe3 4458 wl_deinit_priv(cfg);
3eacf866
AS
4459 list_for_each_entry_safe(vif, tmp, &cfg->vif_list, list) {
4460 brcmf_free_vif(vif);
4461 }
5b435de0
AS
4462}
4463
1993732e
AS
4464void brcmf_cfg80211_event(struct brcmf_if *ifp,
4465 const struct brcmf_event_msg *e, void *data)
5b435de0 4466{
1993732e 4467 struct brcmf_cfg80211_info *cfg = ifp->drvr->config;
5b435de0 4468 u32 event_type = be32_to_cpu(e->event_type);
5b435de0 4469
1993732e 4470 if (!brcmf_enq_event(ifp, event_type, e, data))
27a68fe3 4471 schedule_work(&cfg->event_work);
5b435de0
AS
4472}
4473
5b435de0
AS
4474static s32 brcmf_dongle_eventmsg(struct net_device *ndev)
4475{
5b435de0
AS
4476 s8 eventmask[BRCMF_EVENTING_MASK_LEN];
4477 s32 err = 0;
4478
4479 WL_TRACE("Enter\n");
4480
4481 /* Setup event_msgs */
ac24be6f
AS
4482 err = brcmf_fil_iovar_data_get(netdev_priv(ndev), "event_msgs",
4483 eventmask, BRCMF_EVENTING_MASK_LEN);
5b435de0
AS
4484 if (err) {
4485 WL_ERR("Get event_msgs error (%d)\n", err);
4486 goto dongle_eventmsg_out;
4487 }
5b435de0
AS
4488
4489 setbit(eventmask, BRCMF_E_SET_SSID);
4490 setbit(eventmask, BRCMF_E_ROAM);
4491 setbit(eventmask, BRCMF_E_PRUNE);
4492 setbit(eventmask, BRCMF_E_AUTH);
4493 setbit(eventmask, BRCMF_E_REASSOC);
4494 setbit(eventmask, BRCMF_E_REASSOC_IND);
4495 setbit(eventmask, BRCMF_E_DEAUTH_IND);
4496 setbit(eventmask, BRCMF_E_DISASSOC_IND);
4497 setbit(eventmask, BRCMF_E_DISASSOC);
4498 setbit(eventmask, BRCMF_E_JOIN);
4499 setbit(eventmask, BRCMF_E_ASSOC_IND);
4500 setbit(eventmask, BRCMF_E_PSK_SUP);
4501 setbit(eventmask, BRCMF_E_LINK);
4502 setbit(eventmask, BRCMF_E_NDIS_LINK);
4503 setbit(eventmask, BRCMF_E_MIC_ERROR);
4504 setbit(eventmask, BRCMF_E_PMKID_CACHE);
4505 setbit(eventmask, BRCMF_E_TXFAIL);
4506 setbit(eventmask, BRCMF_E_JOIN_START);
e756af5b 4507 setbit(eventmask, BRCMF_E_ESCAN_RESULT);
e5806072 4508 setbit(eventmask, BRCMF_E_PFN_NET_FOUND);
5b435de0 4509
ac24be6f
AS
4510 err = brcmf_fil_iovar_data_set(netdev_priv(ndev), "event_msgs",
4511 eventmask, BRCMF_EVENTING_MASK_LEN);
5b435de0
AS
4512 if (err) {
4513 WL_ERR("Set event_msgs error (%d)\n", err);
4514 goto dongle_eventmsg_out;
4515 }
4516
4517dongle_eventmsg_out:
4518 WL_TRACE("Exit\n");
4519 return err;
4520}
4521
4522static s32
4523brcmf_dongle_roam(struct net_device *ndev, u32 roamvar, u32 bcn_timeout)
4524{
ac24be6f 4525 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0 4526 s32 err = 0;
f588bc0c
AS
4527 __le32 roamtrigger[2];
4528 __le32 roam_delta[2];
5b435de0
AS
4529
4530 /*
4531 * Setup timeout if Beacons are lost and roam is
4532 * off to report link down
4533 */
4534 if (roamvar) {
ac24be6f 4535 err = brcmf_fil_iovar_int_set(ifp, "bcn_timeout", bcn_timeout);
5b435de0
AS
4536 if (err) {
4537 WL_ERR("bcn_timeout error (%d)\n", err);
4538 goto dongle_rom_out;
4539 }
4540 }
4541
4542 /*
4543 * Enable/Disable built-in roaming to allow supplicant
4544 * to take care of roaming
4545 */
4546 WL_INFO("Internal Roaming = %s\n", roamvar ? "Off" : "On");
ac24be6f 4547 err = brcmf_fil_iovar_int_set(ifp, "roam_off", roamvar);
5b435de0
AS
4548 if (err) {
4549 WL_ERR("roam_off error (%d)\n", err);
4550 goto dongle_rom_out;
4551 }
4552
f588bc0c
AS
4553 roamtrigger[0] = cpu_to_le32(WL_ROAM_TRIGGER_LEVEL);
4554 roamtrigger[1] = cpu_to_le32(BRCM_BAND_ALL);
ac24be6f 4555 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_TRIGGER,
81f5dcb8 4556 (void *)roamtrigger, sizeof(roamtrigger));
5b435de0
AS
4557 if (err) {
4558 WL_ERR("WLC_SET_ROAM_TRIGGER error (%d)\n", err);
4559 goto dongle_rom_out;
4560 }
4561
f588bc0c
AS
4562 roam_delta[0] = cpu_to_le32(WL_ROAM_DELTA);
4563 roam_delta[1] = cpu_to_le32(BRCM_BAND_ALL);
ac24be6f 4564 err = brcmf_fil_cmd_data_set(ifp, BRCMF_C_SET_ROAM_DELTA,
81f5dcb8 4565 (void *)roam_delta, sizeof(roam_delta));
5b435de0
AS
4566 if (err) {
4567 WL_ERR("WLC_SET_ROAM_DELTA error (%d)\n", err);
4568 goto dongle_rom_out;
4569 }
4570
4571dongle_rom_out:
4572 return err;
4573}
4574
4575static s32
4576brcmf_dongle_scantime(struct net_device *ndev, s32 scan_assoc_time,
c68cdc0f 4577 s32 scan_unassoc_time, s32 scan_passive_time)
5b435de0 4578{
ac24be6f 4579 struct brcmf_if *ifp = netdev_priv(ndev);
5b435de0
AS
4580 s32 err = 0;
4581
ac24be6f 4582 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_CHANNEL_TIME,
81f5dcb8 4583 scan_assoc_time);
5b435de0
AS
4584 if (err) {
4585 if (err == -EOPNOTSUPP)
4586 WL_INFO("Scan assoc time is not supported\n");
4587 else
4588 WL_ERR("Scan assoc time error (%d)\n", err);
4589 goto dongle_scantime_out;
4590 }
ac24be6f 4591 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_UNASSOC_TIME,
81f5dcb8 4592 scan_unassoc_time);
5b435de0
AS
4593 if (err) {
4594 if (err == -EOPNOTSUPP)
4595 WL_INFO("Scan unassoc time is not supported\n");
4596 else
4597 WL_ERR("Scan unassoc time error (%d)\n", err);
4598 goto dongle_scantime_out;
4599 }
4600
ac24be6f 4601 err = brcmf_fil_cmd_int_set(ifp, BRCMF_C_SET_SCAN_PASSIVE_TIME,
81f5dcb8 4602 scan_passive_time);
5b435de0
AS
4603 if (err) {
4604 if (err == -EOPNOTSUPP)
4605 WL_INFO("Scan passive time is not supported\n");
4606 else
4607 WL_ERR("Scan passive time error (%d)\n", err);
4608 goto dongle_scantime_out;
4609 }
4610
4611dongle_scantime_out:
4612 return err;
4613}
4614
27a68fe3 4615static s32 wl_update_wiphybands(struct brcmf_cfg80211_info *cfg)
5b435de0 4616{
ac24be6f 4617 struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
5b435de0
AS
4618 struct wiphy *wiphy;
4619 s32 phy_list;
4620 s8 phy;
4621 s32 err = 0;
4622
ac24be6f 4623 err = brcmf_fil_cmd_data_get(ifp, BRCM_GET_PHYLIST,
81f5dcb8 4624 &phy_list, sizeof(phy_list));
5b435de0
AS
4625 if (err) {
4626 WL_ERR("error (%d)\n", err);
4627 return err;
4628 }
4629
3ba81376 4630 phy = ((char *)&phy_list)[0];
5b435de0
AS
4631 WL_INFO("%c phy\n", phy);
4632 if (phy == 'n' || phy == 'a') {
27a68fe3 4633 wiphy = cfg_to_wiphy(cfg);
5b435de0
AS
4634 wiphy->bands[IEEE80211_BAND_5GHZ] = &__wl_band_5ghz_n;
4635 }
4636
4637 return err;
4638}
4639
27a68fe3 4640static s32 brcmf_dongle_probecap(struct brcmf_cfg80211_info *cfg)
5b435de0 4641{
27a68fe3 4642 return wl_update_wiphybands(cfg);
5b435de0
AS
4643}
4644
27a68fe3 4645static s32 brcmf_config_dongle(struct brcmf_cfg80211_info *cfg)
5b435de0
AS
4646{
4647 struct net_device *ndev;
4648 struct wireless_dev *wdev;
4649 s32 power_mode;
4650 s32 err = 0;
4651
27a68fe3 4652 if (cfg->dongle_up)
5b435de0
AS
4653 return err;
4654
27a68fe3 4655 ndev = cfg_to_ndev(cfg);
5b435de0
AS
4656 wdev = ndev->ieee80211_ptr;
4657
4658 brcmf_dongle_scantime(ndev, WL_SCAN_CHANNEL_TIME,
4659 WL_SCAN_UNASSOC_TIME, WL_SCAN_PASSIVE_TIME);
4660
4661 err = brcmf_dongle_eventmsg(ndev);
4662 if (err)
4663 goto default_conf_out;
4664
27a68fe3 4665 power_mode = cfg->pwr_save ? PM_FAST : PM_OFF;
ac24be6f
AS
4666 err = brcmf_fil_cmd_int_set(netdev_priv(ndev), BRCMF_C_SET_PM,
4667 power_mode);
5b435de0
AS
4668 if (err)
4669 goto default_conf_out;
4670 WL_INFO("power save set to %s\n",
4671 (power_mode ? "enabled" : "disabled"));
4672
27a68fe3 4673 err = brcmf_dongle_roam(ndev, (cfg->roam_on ? 0 : 1),
5b435de0
AS
4674 WL_BEACON_TIMEOUT);
4675 if (err)
4676 goto default_conf_out;
5dd161ff
FL
4677 err = brcmf_cfg80211_change_iface(wdev->wiphy, ndev, wdev->iftype,
4678 NULL, NULL);
5b435de0
AS
4679 if (err && err != -EINPROGRESS)
4680 goto default_conf_out;
27a68fe3 4681 err = brcmf_dongle_probecap(cfg);
5b435de0
AS
4682 if (err)
4683 goto default_conf_out;
4684
4685 /* -EINPROGRESS: Call commit handler */
4686
4687default_conf_out:
4688
27a68fe3 4689 cfg->dongle_up = true;
5b435de0
AS
4690
4691 return err;
4692
4693}
4694
27a68fe3 4695static s32 __brcmf_cfg80211_up(struct brcmf_cfg80211_info *cfg)
5b435de0 4696{
c1179033 4697 struct brcmf_if *ifp = netdev_priv(cfg_to_ndev(cfg));
5b435de0 4698
c1179033 4699 set_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
5b435de0 4700
f0799895 4701 return brcmf_config_dongle(cfg);
5b435de0
AS
4702}
4703
27a68fe3 4704static s32 __brcmf_cfg80211_down(struct brcmf_cfg80211_info *cfg)
5b435de0 4705{
c1179033
AS
4706 struct net_device *ndev = cfg_to_ndev(cfg);
4707 struct brcmf_if *ifp = netdev_priv(ndev);
4708
5b435de0
AS
4709 /*
4710 * While going down, if associated with AP disassociate
4711 * from AP to save power
4712 */
c1179033
AS
4713 if ((test_bit(BRCMF_VIF_STATUS_CONNECTED, &ifp->vif->sme_state) ||
4714 test_bit(BRCMF_VIF_STATUS_CONNECTING, &ifp->vif->sme_state)) &&
ce81e317 4715 check_vif_up(ifp->vif)) {
5b435de0 4716 WL_INFO("Disassociating from AP");
27a68fe3 4717 brcmf_link_down(cfg);
5b435de0
AS
4718
4719 /* Make sure WPA_Supplicant receives all the event
4720 generated due to DISASSOC call to the fw to keep
4721 the state fw and WPA_Supplicant state consistent
4722 */
4723 brcmf_delay(500);
4724 }
4725
27a68fe3 4726 brcmf_abort_scanning(cfg);
c1179033 4727 clear_bit(BRCMF_VIF_STATUS_READY, &ifp->vif->sme_state);
5b435de0 4728
5b435de0
AS
4729 return 0;
4730}
4731
27a68fe3 4732s32 brcmf_cfg80211_up(struct brcmf_cfg80211_info *cfg)
5b435de0 4733{
5b435de0
AS
4734 s32 err = 0;
4735
27a68fe3
AS
4736 mutex_lock(&cfg->usr_sync);
4737 err = __brcmf_cfg80211_up(cfg);
4738 mutex_unlock(&cfg->usr_sync);
5b435de0
AS
4739
4740 return err;
4741}
4742
27a68fe3 4743s32 brcmf_cfg80211_down(struct brcmf_cfg80211_info *cfg)
5b435de0 4744{
5b435de0
AS
4745 s32 err = 0;
4746
27a68fe3
AS
4747 mutex_lock(&cfg->usr_sync);
4748 err = __brcmf_cfg80211_down(cfg);
4749 mutex_unlock(&cfg->usr_sync);
5b435de0
AS
4750
4751 return err;
4752}
4753
This page took 0.490008 seconds and 5 git commands to generate.