Commit | Line | Data |
---|---|---|
5e6e3a92 BZ |
1 | /* |
2 | * Marvell Wireless LAN device driver: association and ad-hoc start/join | |
3 | * | |
65da33f5 | 4 | * Copyright (C) 2011-2014, Marvell International Ltd. |
5e6e3a92 BZ |
5 | * |
6 | * This software file (the "File") is distributed by Marvell International | |
7 | * Ltd. under the terms of the GNU General Public License Version 2, June 1991 | |
8 | * (the "License"). You may use, redistribute and/or modify this File in | |
9 | * accordance with the terms and conditions of the License, a copy of which | |
10 | * is available by writing to the Free Software Foundation, Inc., | |
11 | * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the | |
12 | * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt. | |
13 | * | |
14 | * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE | |
15 | * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE | |
16 | * ARE EXPRESSLY DISCLAIMED. The License provides additional details about | |
17 | * this warranty disclaimer. | |
18 | */ | |
19 | ||
20 | #include "decl.h" | |
21 | #include "ioctl.h" | |
22 | #include "util.h" | |
23 | #include "fw.h" | |
24 | #include "main.h" | |
25 | #include "wmm.h" | |
26 | #include "11n.h" | |
a5f39056 | 27 | #include "11ac.h" |
5e6e3a92 BZ |
28 | |
29 | #define CAPINFO_MASK (~(BIT(15) | BIT(14) | BIT(12) | BIT(11) | BIT(9))) | |
30 | ||
31 | /* | |
32 | * Append a generic IE as a pass through TLV to a TLV buffer. | |
33 | * | |
34 | * This function is called from the network join command preparation routine. | |
35 | * | |
36 | * If the IE buffer has been setup by the application, this routine appends | |
37 | * the buffer as a pass through TLV type to the request. | |
38 | */ | |
39 | static int | |
40 | mwifiex_cmd_append_generic_ie(struct mwifiex_private *priv, u8 **buffer) | |
41 | { | |
42 | int ret_len = 0; | |
43 | struct mwifiex_ie_types_header ie_header; | |
44 | ||
45 | /* Null Checks */ | |
46 | if (!buffer) | |
47 | return 0; | |
48 | if (!(*buffer)) | |
49 | return 0; | |
50 | ||
51 | /* | |
52 | * If there is a generic ie buffer setup, append it to the return | |
53 | * parameter buffer pointer. | |
54 | */ | |
55 | if (priv->gen_ie_buf_len) { | |
acebe8c1 ZL |
56 | mwifiex_dbg(priv->adapter, INFO, |
57 | "info: %s: append generic ie len %d to %p\n", | |
58 | __func__, priv->gen_ie_buf_len, *buffer); | |
5e6e3a92 BZ |
59 | |
60 | /* Wrap the generic IE buffer with a pass through TLV type */ | |
61 | ie_header.type = cpu_to_le16(TLV_TYPE_PASSTHROUGH); | |
62 | ie_header.len = cpu_to_le16(priv->gen_ie_buf_len); | |
63 | memcpy(*buffer, &ie_header, sizeof(ie_header)); | |
64 | ||
65 | /* Increment the return size and the return buffer pointer | |
66 | param */ | |
67 | *buffer += sizeof(ie_header); | |
68 | ret_len += sizeof(ie_header); | |
69 | ||
70 | /* Copy the generic IE buffer to the output buffer, advance | |
71 | pointer */ | |
72 | memcpy(*buffer, priv->gen_ie_buf, priv->gen_ie_buf_len); | |
73 | ||
74 | /* Increment the return size and the return buffer pointer | |
75 | param */ | |
76 | *buffer += priv->gen_ie_buf_len; | |
77 | ret_len += priv->gen_ie_buf_len; | |
78 | ||
79 | /* Reset the generic IE buffer */ | |
80 | priv->gen_ie_buf_len = 0; | |
81 | } | |
82 | ||
83 | /* return the length appended to the buffer */ | |
84 | return ret_len; | |
85 | } | |
86 | ||
87 | /* | |
88 | * Append TSF tracking info from the scan table for the target AP. | |
89 | * | |
90 | * This function is called from the network join command preparation routine. | |
91 | * | |
92 | * The TSF table TSF sent to the firmware contains two TSF values: | |
93 | * - The TSF of the target AP from its previous beacon/probe response | |
94 | * - The TSF timestamp of our local MAC at the time we observed the | |
95 | * beacon/probe response. | |
96 | * | |
97 | * The firmware uses the timestamp values to set an initial TSF value | |
98 | * in the MAC for the new association after a reassociation attempt. | |
99 | */ | |
100 | static int | |
101 | mwifiex_cmd_append_tsf_tlv(struct mwifiex_private *priv, u8 **buffer, | |
102 | struct mwifiex_bssdescriptor *bss_desc) | |
103 | { | |
104 | struct mwifiex_ie_types_tsf_timestamp tsf_tlv; | |
1a5b306f | 105 | __le64 tsf_val; |
5e6e3a92 BZ |
106 | |
107 | /* Null Checks */ | |
108 | if (buffer == NULL) | |
109 | return 0; | |
110 | if (*buffer == NULL) | |
111 | return 0; | |
112 | ||
113 | memset(&tsf_tlv, 0x00, sizeof(struct mwifiex_ie_types_tsf_timestamp)); | |
114 | ||
115 | tsf_tlv.header.type = cpu_to_le16(TLV_TYPE_TSFTIMESTAMP); | |
116 | tsf_tlv.header.len = cpu_to_le16(2 * sizeof(tsf_val)); | |
117 | ||
118 | memcpy(*buffer, &tsf_tlv, sizeof(tsf_tlv.header)); | |
119 | *buffer += sizeof(tsf_tlv.header); | |
120 | ||
1a5b306f | 121 | /* TSF at the time when beacon/probe_response was received */ |
b5abcf02 | 122 | tsf_val = cpu_to_le64(bss_desc->fw_tsf); |
1a5b306f BZ |
123 | memcpy(*buffer, &tsf_val, sizeof(tsf_val)); |
124 | *buffer += sizeof(tsf_val); | |
125 | ||
b5abcf02 | 126 | tsf_val = cpu_to_le64(bss_desc->timestamp); |
5e6e3a92 | 127 | |
acebe8c1 ZL |
128 | mwifiex_dbg(priv->adapter, INFO, |
129 | "info: %s: TSF offset calc: %016llx - %016llx\n", | |
130 | __func__, bss_desc->timestamp, bss_desc->fw_tsf); | |
5e6e3a92 BZ |
131 | |
132 | memcpy(*buffer, &tsf_val, sizeof(tsf_val)); | |
133 | *buffer += sizeof(tsf_val); | |
134 | ||
135 | return sizeof(tsf_tlv.header) + (2 * sizeof(tsf_val)); | |
136 | } | |
137 | ||
138 | /* | |
139 | * This function finds out the common rates between rate1 and rate2. | |
140 | * | |
141 | * It will fill common rates in rate1 as output if found. | |
142 | * | |
143 | * NOTE: Setting the MSB of the basic rates needs to be taken | |
144 | * care of, either before or after calling this function. | |
145 | */ | |
146 | static int mwifiex_get_common_rates(struct mwifiex_private *priv, u8 *rate1, | |
147 | u32 rate1_size, u8 *rate2, u32 rate2_size) | |
148 | { | |
270e58e8 YAP |
149 | int ret; |
150 | u8 *ptr = rate1, *tmp; | |
5e6e3a92 BZ |
151 | u32 i, j; |
152 | ||
5982b47a | 153 | tmp = kmemdup(rate1, rate1_size, GFP_KERNEL); |
5e6e3a92 | 154 | if (!tmp) { |
acebe8c1 | 155 | mwifiex_dbg(priv->adapter, ERROR, "failed to alloc tmp buf\n"); |
5e6e3a92 BZ |
156 | return -ENOMEM; |
157 | } | |
158 | ||
5e6e3a92 BZ |
159 | memset(rate1, 0, rate1_size); |
160 | ||
485f107d CR |
161 | for (i = 0; i < rate2_size && rate2[i]; i++) { |
162 | for (j = 0; j < rate1_size && tmp[j]; j++) { | |
5e6e3a92 BZ |
163 | /* Check common rate, excluding the bit for |
164 | basic rate */ | |
165 | if ((rate2[i] & 0x7F) == (tmp[j] & 0x7F)) { | |
166 | *rate1++ = tmp[j]; | |
167 | break; | |
168 | } | |
169 | } | |
170 | } | |
171 | ||
acebe8c1 ZL |
172 | mwifiex_dbg(priv->adapter, INFO, "info: Tx data rate set to %#x\n", |
173 | priv->data_rate); | |
5e6e3a92 BZ |
174 | |
175 | if (!priv->is_data_rate_auto) { | |
176 | while (*ptr) { | |
177 | if ((*ptr & 0x7f) == priv->data_rate) { | |
178 | ret = 0; | |
179 | goto done; | |
180 | } | |
181 | ptr++; | |
182 | } | |
acebe8c1 ZL |
183 | mwifiex_dbg(priv->adapter, ERROR, |
184 | "previously set fixed data rate %#x\t" | |
185 | "is not compatible with the network\n", | |
186 | priv->data_rate); | |
5e6e3a92 BZ |
187 | |
188 | ret = -1; | |
189 | goto done; | |
190 | } | |
191 | ||
192 | ret = 0; | |
193 | done: | |
194 | kfree(tmp); | |
195 | return ret; | |
196 | } | |
197 | ||
198 | /* | |
199 | * This function creates the intersection of the rates supported by a | |
200 | * target BSS and our adapter settings for use in an assoc/join command. | |
201 | */ | |
202 | static int | |
203 | mwifiex_setup_rates_from_bssdesc(struct mwifiex_private *priv, | |
204 | struct mwifiex_bssdescriptor *bss_desc, | |
205 | u8 *out_rates, u32 *out_rates_size) | |
206 | { | |
207 | u8 card_rates[MWIFIEX_SUPPORTED_RATES]; | |
270e58e8 | 208 | u32 card_rates_size; |
5e6e3a92 BZ |
209 | |
210 | /* Copy AP supported rates */ | |
211 | memcpy(out_rates, bss_desc->supported_rates, MWIFIEX_SUPPORTED_RATES); | |
212 | /* Get the STA supported rates */ | |
213 | card_rates_size = mwifiex_get_active_data_rates(priv, card_rates); | |
214 | /* Get the common rates between AP and STA supported rates */ | |
215 | if (mwifiex_get_common_rates(priv, out_rates, MWIFIEX_SUPPORTED_RATES, | |
216 | card_rates, card_rates_size)) { | |
217 | *out_rates_size = 0; | |
acebe8c1 ZL |
218 | mwifiex_dbg(priv->adapter, ERROR, |
219 | "%s: cannot get common rates\n", | |
220 | __func__); | |
5e6e3a92 BZ |
221 | return -1; |
222 | } | |
223 | ||
224 | *out_rates_size = | |
225 | min_t(size_t, strlen(out_rates), MWIFIEX_SUPPORTED_RATES); | |
226 | ||
227 | return 0; | |
228 | } | |
229 | ||
13d7ba78 AP |
230 | /* |
231 | * This function appends a WPS IE. It is called from the network join command | |
232 | * preparation routine. | |
233 | * | |
234 | * If the IE buffer has been setup by the application, this routine appends | |
235 | * the buffer as a WPS TLV type to the request. | |
236 | */ | |
237 | static int | |
238 | mwifiex_cmd_append_wps_ie(struct mwifiex_private *priv, u8 **buffer) | |
239 | { | |
240 | int retLen = 0; | |
241 | struct mwifiex_ie_types_header ie_header; | |
242 | ||
243 | if (!buffer || !*buffer) | |
244 | return 0; | |
245 | ||
246 | /* | |
247 | * If there is a wps ie buffer setup, append it to the return | |
248 | * parameter buffer pointer. | |
249 | */ | |
250 | if (priv->wps_ie_len) { | |
acebe8c1 ZL |
251 | mwifiex_dbg(priv->adapter, CMD, |
252 | "cmd: append wps ie %d to %p\n", | |
253 | priv->wps_ie_len, *buffer); | |
13d7ba78 AP |
254 | |
255 | /* Wrap the generic IE buffer with a pass through TLV type */ | |
256 | ie_header.type = cpu_to_le16(TLV_TYPE_MGMT_IE); | |
257 | ie_header.len = cpu_to_le16(priv->wps_ie_len); | |
258 | memcpy(*buffer, &ie_header, sizeof(ie_header)); | |
259 | *buffer += sizeof(ie_header); | |
260 | retLen += sizeof(ie_header); | |
261 | ||
262 | memcpy(*buffer, priv->wps_ie, priv->wps_ie_len); | |
263 | *buffer += priv->wps_ie_len; | |
264 | retLen += priv->wps_ie_len; | |
265 | ||
266 | } | |
267 | ||
268 | kfree(priv->wps_ie); | |
269 | priv->wps_ie_len = 0; | |
270 | return retLen; | |
271 | } | |
272 | ||
5e6e3a92 BZ |
273 | /* |
274 | * This function appends a WAPI IE. | |
275 | * | |
276 | * This function is called from the network join command preparation routine. | |
277 | * | |
278 | * If the IE buffer has been setup by the application, this routine appends | |
279 | * the buffer as a WAPI TLV type to the request. | |
280 | */ | |
281 | static int | |
282 | mwifiex_cmd_append_wapi_ie(struct mwifiex_private *priv, u8 **buffer) | |
283 | { | |
284 | int retLen = 0; | |
285 | struct mwifiex_ie_types_header ie_header; | |
286 | ||
287 | /* Null Checks */ | |
288 | if (buffer == NULL) | |
289 | return 0; | |
290 | if (*buffer == NULL) | |
291 | return 0; | |
292 | ||
293 | /* | |
294 | * If there is a wapi ie buffer setup, append it to the return | |
295 | * parameter buffer pointer. | |
296 | */ | |
297 | if (priv->wapi_ie_len) { | |
acebe8c1 ZL |
298 | mwifiex_dbg(priv->adapter, CMD, |
299 | "cmd: append wapi ie %d to %p\n", | |
300 | priv->wapi_ie_len, *buffer); | |
5e6e3a92 BZ |
301 | |
302 | /* Wrap the generic IE buffer with a pass through TLV type */ | |
303 | ie_header.type = cpu_to_le16(TLV_TYPE_WAPI_IE); | |
304 | ie_header.len = cpu_to_le16(priv->wapi_ie_len); | |
305 | memcpy(*buffer, &ie_header, sizeof(ie_header)); | |
306 | ||
307 | /* Increment the return size and the return buffer pointer | |
308 | param */ | |
309 | *buffer += sizeof(ie_header); | |
310 | retLen += sizeof(ie_header); | |
311 | ||
312 | /* Copy the wapi IE buffer to the output buffer, advance | |
313 | pointer */ | |
314 | memcpy(*buffer, priv->wapi_ie, priv->wapi_ie_len); | |
315 | ||
316 | /* Increment the return size and the return buffer pointer | |
317 | param */ | |
318 | *buffer += priv->wapi_ie_len; | |
319 | retLen += priv->wapi_ie_len; | |
320 | ||
321 | } | |
322 | /* return the length appended to the buffer */ | |
323 | return retLen; | |
324 | } | |
325 | ||
326 | /* | |
327 | * This function appends rsn ie tlv for wpa/wpa2 security modes. | |
328 | * It is called from the network join command preparation routine. | |
329 | */ | |
330 | static int mwifiex_append_rsn_ie_wpa_wpa2(struct mwifiex_private *priv, | |
331 | u8 **buffer) | |
332 | { | |
333 | struct mwifiex_ie_types_rsn_param_set *rsn_ie_tlv; | |
334 | int rsn_ie_len; | |
335 | ||
336 | if (!buffer || !(*buffer)) | |
337 | return 0; | |
338 | ||
339 | rsn_ie_tlv = (struct mwifiex_ie_types_rsn_param_set *) (*buffer); | |
340 | rsn_ie_tlv->header.type = cpu_to_le16((u16) priv->wpa_ie[0]); | |
341 | rsn_ie_tlv->header.type = cpu_to_le16( | |
342 | le16_to_cpu(rsn_ie_tlv->header.type) & 0x00FF); | |
343 | rsn_ie_tlv->header.len = cpu_to_le16((u16) priv->wpa_ie[1]); | |
344 | rsn_ie_tlv->header.len = cpu_to_le16(le16_to_cpu(rsn_ie_tlv->header.len) | |
931f1584 | 345 | & 0x00FF); |
5e6e3a92 BZ |
346 | if (le16_to_cpu(rsn_ie_tlv->header.len) <= (sizeof(priv->wpa_ie) - 2)) |
347 | memcpy(rsn_ie_tlv->rsn_ie, &priv->wpa_ie[2], | |
931f1584 | 348 | le16_to_cpu(rsn_ie_tlv->header.len)); |
5e6e3a92 BZ |
349 | else |
350 | return -1; | |
351 | ||
352 | rsn_ie_len = sizeof(rsn_ie_tlv->header) + | |
353 | le16_to_cpu(rsn_ie_tlv->header.len); | |
354 | *buffer += rsn_ie_len; | |
355 | ||
356 | return rsn_ie_len; | |
357 | } | |
358 | ||
359 | /* | |
360 | * This function prepares command for association. | |
361 | * | |
362 | * This sets the following parameters - | |
363 | * - Peer MAC address | |
364 | * - Listen interval | |
365 | * - Beacon interval | |
366 | * - Capability information | |
367 | * | |
368 | * ...and the following TLVs, as required - | |
369 | * - SSID TLV | |
370 | * - PHY TLV | |
371 | * - SS TLV | |
372 | * - Rates TLV | |
373 | * - Authentication TLV | |
374 | * - Channel TLV | |
375 | * - WPA/WPA2 IE | |
376 | * - 11n TLV | |
377 | * - Vendor specific TLV | |
378 | * - WMM TLV | |
379 | * - WAPI IE | |
380 | * - Generic IE | |
381 | * - TSF TLV | |
382 | * | |
383 | * Preparation also includes - | |
384 | * - Setting command ID and proper size | |
385 | * - Ensuring correct endian-ness | |
386 | */ | |
387 | int mwifiex_cmd_802_11_associate(struct mwifiex_private *priv, | |
388 | struct host_cmd_ds_command *cmd, | |
a5ffddb7 | 389 | struct mwifiex_bssdescriptor *bss_desc) |
5e6e3a92 BZ |
390 | { |
391 | struct host_cmd_ds_802_11_associate *assoc = &cmd->params.associate; | |
5e6e3a92 BZ |
392 | struct mwifiex_ie_types_ssid_param_set *ssid_tlv; |
393 | struct mwifiex_ie_types_phy_param_set *phy_tlv; | |
394 | struct mwifiex_ie_types_ss_param_set *ss_tlv; | |
395 | struct mwifiex_ie_types_rates_param_set *rates_tlv; | |
396 | struct mwifiex_ie_types_auth_type *auth_tlv; | |
397 | struct mwifiex_ie_types_chan_list_param_set *chan_tlv; | |
398 | u8 rates[MWIFIEX_SUPPORTED_RATES]; | |
399 | u32 rates_size; | |
400 | u16 tmp_cap; | |
401 | u8 *pos; | |
402 | int rsn_ie_len = 0; | |
403 | ||
5e6e3a92 BZ |
404 | pos = (u8 *) assoc; |
405 | ||
5e6e3a92 BZ |
406 | cmd->command = cpu_to_le16(HostCmd_CMD_802_11_ASSOCIATE); |
407 | ||
408 | /* Save so we know which BSS Desc to use in the response handler */ | |
409 | priv->attempted_bss_desc = bss_desc; | |
410 | ||
411 | memcpy(assoc->peer_sta_addr, | |
412 | bss_desc->mac_address, sizeof(assoc->peer_sta_addr)); | |
413 | pos += sizeof(assoc->peer_sta_addr); | |
414 | ||
415 | /* Set the listen interval */ | |
416 | assoc->listen_interval = cpu_to_le16(priv->listen_interval); | |
417 | /* Set the beacon period */ | |
418 | assoc->beacon_period = cpu_to_le16(bss_desc->beacon_period); | |
419 | ||
420 | pos += sizeof(assoc->cap_info_bitmap); | |
421 | pos += sizeof(assoc->listen_interval); | |
422 | pos += sizeof(assoc->beacon_period); | |
423 | pos += sizeof(assoc->dtim_period); | |
424 | ||
425 | ssid_tlv = (struct mwifiex_ie_types_ssid_param_set *) pos; | |
426 | ssid_tlv->header.type = cpu_to_le16(WLAN_EID_SSID); | |
427 | ssid_tlv->header.len = cpu_to_le16((u16) bss_desc->ssid.ssid_len); | |
428 | memcpy(ssid_tlv->ssid, bss_desc->ssid.ssid, | |
931f1584 | 429 | le16_to_cpu(ssid_tlv->header.len)); |
5e6e3a92 BZ |
430 | pos += sizeof(ssid_tlv->header) + le16_to_cpu(ssid_tlv->header.len); |
431 | ||
432 | phy_tlv = (struct mwifiex_ie_types_phy_param_set *) pos; | |
433 | phy_tlv->header.type = cpu_to_le16(WLAN_EID_DS_PARAMS); | |
434 | phy_tlv->header.len = cpu_to_le16(sizeof(phy_tlv->fh_ds.ds_param_set)); | |
435 | memcpy(&phy_tlv->fh_ds.ds_param_set, | |
436 | &bss_desc->phy_param_set.ds_param_set.current_chan, | |
437 | sizeof(phy_tlv->fh_ds.ds_param_set)); | |
438 | pos += sizeof(phy_tlv->header) + le16_to_cpu(phy_tlv->header.len); | |
439 | ||
440 | ss_tlv = (struct mwifiex_ie_types_ss_param_set *) pos; | |
441 | ss_tlv->header.type = cpu_to_le16(WLAN_EID_CF_PARAMS); | |
442 | ss_tlv->header.len = cpu_to_le16(sizeof(ss_tlv->cf_ibss.cf_param_set)); | |
443 | pos += sizeof(ss_tlv->header) + le16_to_cpu(ss_tlv->header.len); | |
444 | ||
445 | /* Get the common rates supported between the driver and the BSS Desc */ | |
446 | if (mwifiex_setup_rates_from_bssdesc | |
447 | (priv, bss_desc, rates, &rates_size)) | |
448 | return -1; | |
449 | ||
450 | /* Save the data rates into Current BSS state structure */ | |
451 | priv->curr_bss_params.num_of_rates = rates_size; | |
452 | memcpy(&priv->curr_bss_params.data_rates, rates, rates_size); | |
453 | ||
454 | /* Setup the Rates TLV in the association command */ | |
455 | rates_tlv = (struct mwifiex_ie_types_rates_param_set *) pos; | |
456 | rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES); | |
457 | rates_tlv->header.len = cpu_to_le16((u16) rates_size); | |
458 | memcpy(rates_tlv->rates, rates, rates_size); | |
459 | pos += sizeof(rates_tlv->header) + rates_size; | |
acebe8c1 ZL |
460 | mwifiex_dbg(priv->adapter, INFO, "info: ASSOC_CMD: rates size = %d\n", |
461 | rates_size); | |
5e6e3a92 | 462 | |
203afeca MY |
463 | /* Add the Authentication type to be used for Auth frames */ |
464 | auth_tlv = (struct mwifiex_ie_types_auth_type *) pos; | |
465 | auth_tlv->header.type = cpu_to_le16(TLV_TYPE_AUTH_TYPE); | |
466 | auth_tlv->header.len = cpu_to_le16(sizeof(auth_tlv->auth_type)); | |
5eb02e44 | 467 | if (priv->sec_info.wep_enabled) |
203afeca MY |
468 | auth_tlv->auth_type = cpu_to_le16( |
469 | (u16) priv->sec_info.authentication_mode); | |
470 | else | |
f986b6d5 | 471 | auth_tlv->auth_type = cpu_to_le16(NL80211_AUTHTYPE_OPEN_SYSTEM); |
203afeca MY |
472 | |
473 | pos += sizeof(auth_tlv->header) + le16_to_cpu(auth_tlv->header.len); | |
5e6e3a92 | 474 | |
931f1584 YAP |
475 | if (IS_SUPPORT_MULTI_BANDS(priv->adapter) && |
476 | !(ISSUPP_11NENABLED(priv->adapter->fw_cap_info) && | |
477 | (!bss_desc->disable_11n) && | |
478 | (priv->adapter->config_bands & BAND_GN || | |
479 | priv->adapter->config_bands & BAND_AN) && | |
480 | (bss_desc->bcn_ht_cap) | |
5e6e3a92 BZ |
481 | ) |
482 | ) { | |
483 | /* Append a channel TLV for the channel the attempted AP was | |
484 | found on */ | |
485 | chan_tlv = (struct mwifiex_ie_types_chan_list_param_set *) pos; | |
486 | chan_tlv->header.type = cpu_to_le16(TLV_TYPE_CHANLIST); | |
487 | chan_tlv->header.len = | |
488 | cpu_to_le16(sizeof(struct mwifiex_chan_scan_param_set)); | |
489 | ||
490 | memset(chan_tlv->chan_scan_param, 0x00, | |
491 | sizeof(struct mwifiex_chan_scan_param_set)); | |
492 | chan_tlv->chan_scan_param[0].chan_number = | |
493 | (bss_desc->phy_param_set.ds_param_set.current_chan); | |
acebe8c1 ZL |
494 | mwifiex_dbg(priv->adapter, INFO, "info: Assoc: TLV Chan = %d\n", |
495 | chan_tlv->chan_scan_param[0].chan_number); | |
5e6e3a92 BZ |
496 | |
497 | chan_tlv->chan_scan_param[0].radio_type = | |
498 | mwifiex_band_to_radio_type((u8) bss_desc->bss_band); | |
499 | ||
acebe8c1 ZL |
500 | mwifiex_dbg(priv->adapter, INFO, "info: Assoc: TLV Band = %d\n", |
501 | chan_tlv->chan_scan_param[0].radio_type); | |
5e6e3a92 BZ |
502 | pos += sizeof(chan_tlv->header) + |
503 | sizeof(struct mwifiex_chan_scan_param_set); | |
504 | } | |
505 | ||
506 | if (!priv->wps.session_enable) { | |
507 | if (priv->sec_info.wpa_enabled || priv->sec_info.wpa2_enabled) | |
508 | rsn_ie_len = mwifiex_append_rsn_ie_wpa_wpa2(priv, &pos); | |
509 | ||
510 | if (rsn_ie_len == -1) | |
511 | return -1; | |
512 | } | |
513 | ||
931f1584 YAP |
514 | if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info) && |
515 | (!bss_desc->disable_11n) && | |
516 | (priv->adapter->config_bands & BAND_GN || | |
517 | priv->adapter->config_bands & BAND_AN)) | |
5e6e3a92 BZ |
518 | mwifiex_cmd_append_11n_tlv(priv, bss_desc, &pos); |
519 | ||
a5f39056 YAP |
520 | if (ISSUPP_11ACENABLED(priv->adapter->fw_cap_info) && |
521 | !bss_desc->disable_11n && !bss_desc->disable_11ac && | |
f25b1431 | 522 | priv->adapter->config_bands & BAND_AAC) |
a5f39056 YAP |
523 | mwifiex_cmd_append_11ac_tlv(priv, bss_desc, &pos); |
524 | ||
5e6e3a92 BZ |
525 | /* Append vendor specific IE TLV */ |
526 | mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_ASSOC, &pos); | |
527 | ||
528 | mwifiex_wmm_process_association_req(priv, &pos, &bss_desc->wmm_ie, | |
529 | bss_desc->bcn_ht_cap); | |
530 | if (priv->sec_info.wapi_enabled && priv->wapi_ie_len) | |
531 | mwifiex_cmd_append_wapi_ie(priv, &pos); | |
532 | ||
13d7ba78 AP |
533 | if (priv->wps.session_enable && priv->wps_ie_len) |
534 | mwifiex_cmd_append_wps_ie(priv, &pos); | |
5e6e3a92 BZ |
535 | |
536 | mwifiex_cmd_append_generic_ie(priv, &pos); | |
537 | ||
538 | mwifiex_cmd_append_tsf_tlv(priv, &pos, bss_desc); | |
539 | ||
2a7305c8 AK |
540 | mwifiex_11h_process_join(priv, &pos, bss_desc); |
541 | ||
5e6e3a92 BZ |
542 | cmd->size = cpu_to_le16((u16) (pos - (u8 *) assoc) + S_DS_GEN); |
543 | ||
544 | /* Set the Capability info at last */ | |
545 | tmp_cap = bss_desc->cap_info_bitmap; | |
546 | ||
547 | if (priv->adapter->config_bands == BAND_B) | |
b93f85f0 | 548 | tmp_cap &= ~WLAN_CAPABILITY_SHORT_SLOT_TIME; |
5e6e3a92 BZ |
549 | |
550 | tmp_cap &= CAPINFO_MASK; | |
acebe8c1 ZL |
551 | mwifiex_dbg(priv->adapter, INFO, |
552 | "info: ASSOC_CMD: tmp_cap=%4X CAPINFO_MASK=%4lX\n", | |
553 | tmp_cap, CAPINFO_MASK); | |
5e6e3a92 BZ |
554 | assoc->cap_info_bitmap = cpu_to_le16(tmp_cap); |
555 | ||
556 | return 0; | |
557 | } | |
558 | ||
12d11109 AP |
559 | static const char *assoc_failure_reason_to_str(u16 cap_info) |
560 | { | |
561 | switch (cap_info) { | |
562 | case CONNECT_ERR_AUTH_ERR_STA_FAILURE: | |
563 | return "CONNECT_ERR_AUTH_ERR_STA_FAILURE"; | |
564 | case CONNECT_ERR_AUTH_MSG_UNHANDLED: | |
565 | return "CONNECT_ERR_AUTH_MSG_UNHANDLED"; | |
566 | case CONNECT_ERR_ASSOC_ERR_TIMEOUT: | |
567 | return "CONNECT_ERR_ASSOC_ERR_TIMEOUT"; | |
568 | case CONNECT_ERR_ASSOC_ERR_AUTH_REFUSED: | |
569 | return "CONNECT_ERR_ASSOC_ERR_AUTH_REFUSED"; | |
570 | case CONNECT_ERR_STA_FAILURE: | |
571 | return "CONNECT_ERR_STA_FAILURE"; | |
572 | } | |
573 | ||
574 | return "Unknown connect failure"; | |
575 | } | |
5e6e3a92 BZ |
576 | /* |
577 | * Association firmware command response handler | |
578 | * | |
579 | * The response buffer for the association command has the following | |
580 | * memory layout. | |
581 | * | |
582 | * For cases where an association response was not received (indicated | |
583 | * by the CapInfo and AId field): | |
584 | * | |
585 | * .------------------------------------------------------------. | |
586 | * | Header(4 * sizeof(t_u16)): Standard command response hdr | | |
587 | * .------------------------------------------------------------. | |
588 | * | cap_info/Error Return(t_u16): | | |
589 | * | 0xFFFF(-1): Internal error | | |
590 | * | 0xFFFE(-2): Authentication unhandled message | | |
591 | * | 0xFFFD(-3): Authentication refused | | |
592 | * | 0xFFFC(-4): Timeout waiting for AP response | | |
593 | * .------------------------------------------------------------. | |
594 | * | status_code(t_u16): | | |
595 | * | If cap_info is -1: | | |
596 | * | An internal firmware failure prevented the | | |
597 | * | command from being processed. The status_code | | |
598 | * | will be set to 1. | | |
599 | * | | | |
600 | * | If cap_info is -2: | | |
601 | * | An authentication frame was received but was | | |
602 | * | not handled by the firmware. IEEE Status | | |
603 | * | code for the failure is returned. | | |
604 | * | | | |
605 | * | If cap_info is -3: | | |
606 | * | An authentication frame was received and the | | |
607 | * | status_code is the IEEE Status reported in the | | |
608 | * | response. | | |
609 | * | | | |
610 | * | If cap_info is -4: | | |
611 | * | (1) Association response timeout | | |
612 | * | (2) Authentication response timeout | | |
613 | * .------------------------------------------------------------. | |
614 | * | a_id(t_u16): 0xFFFF | | |
615 | * .------------------------------------------------------------. | |
616 | * | |
617 | * | |
618 | * For cases where an association response was received, the IEEE | |
619 | * standard association response frame is returned: | |
620 | * | |
621 | * .------------------------------------------------------------. | |
622 | * | Header(4 * sizeof(t_u16)): Standard command response hdr | | |
623 | * .------------------------------------------------------------. | |
624 | * | cap_info(t_u16): IEEE Capability | | |
625 | * .------------------------------------------------------------. | |
626 | * | status_code(t_u16): IEEE Status Code | | |
627 | * .------------------------------------------------------------. | |
628 | * | a_id(t_u16): IEEE Association ID | | |
629 | * .------------------------------------------------------------. | |
630 | * | IEEE IEs(variable): Any received IEs comprising the | | |
631 | * | remaining portion of a received | | |
632 | * | association response frame. | | |
633 | * .------------------------------------------------------------. | |
634 | * | |
635 | * For simplistic handling, the status_code field can be used to determine | |
636 | * an association success (0) or failure (non-zero). | |
637 | */ | |
638 | int mwifiex_ret_802_11_associate(struct mwifiex_private *priv, | |
600f5d90 | 639 | struct host_cmd_ds_command *resp) |
5e6e3a92 | 640 | { |
600f5d90 | 641 | struct mwifiex_adapter *adapter = priv->adapter; |
5e6e3a92 | 642 | int ret = 0; |
5e6e3a92 BZ |
643 | struct ieee_types_assoc_rsp *assoc_rsp; |
644 | struct mwifiex_bssdescriptor *bss_desc; | |
c856197d | 645 | bool enable_data = true; |
4aff53ef | 646 | u16 cap_info, status_code, aid; |
44ca509c NK |
647 | const u8 *ie_ptr; |
648 | struct ieee80211_ht_operation *assoc_resp_ht_oper; | |
5e6e3a92 | 649 | |
4699fc3f GB |
650 | if (!priv->attempted_bss_desc) { |
651 | mwifiex_dbg(priv->adapter, ERROR, | |
652 | "ASSOC_RESP: failed, association terminated by host\n"); | |
653 | goto done; | |
654 | } | |
655 | ||
5e6e3a92 BZ |
656 | assoc_rsp = (struct ieee_types_assoc_rsp *) &resp->params; |
657 | ||
7532c7d0 AK |
658 | cap_info = le16_to_cpu(assoc_rsp->cap_info_bitmap); |
659 | status_code = le16_to_cpu(assoc_rsp->status_code); | |
4aff53ef XH |
660 | aid = le16_to_cpu(assoc_rsp->a_id); |
661 | ||
662 | if ((aid & (BIT(15) | BIT(14))) != (BIT(15) | BIT(14))) | |
663 | dev_err(priv->adapter->dev, | |
664 | "invalid AID value 0x%x; bits 15:14 not set\n", | |
665 | aid); | |
666 | ||
667 | aid &= ~(BIT(15) | BIT(14)); | |
7532c7d0 | 668 | |
5e6e3a92 | 669 | priv->assoc_rsp_size = min(le16_to_cpu(resp->size) - S_DS_GEN, |
931f1584 | 670 | sizeof(priv->assoc_rsp_buf)); |
5e6e3a92 BZ |
671 | |
672 | memcpy(priv->assoc_rsp_buf, &resp->params, priv->assoc_rsp_size); | |
673 | ||
4aff53ef XH |
674 | assoc_rsp->a_id = cpu_to_le16(aid); |
675 | ||
7532c7d0 | 676 | if (status_code) { |
5e6e3a92 | 677 | priv->adapter->dbg.num_cmd_assoc_failure++; |
acebe8c1 ZL |
678 | mwifiex_dbg(priv->adapter, ERROR, |
679 | "ASSOC_RESP: failed,\t" | |
680 | "status code=%d err=%#x a_id=%#x\n", | |
681 | status_code, cap_info, | |
682 | le16_to_cpu(assoc_rsp->a_id)); | |
7532c7d0 | 683 | |
12d11109 AP |
684 | mwifiex_dbg(priv->adapter, ERROR, "assoc failure: reason %s\n", |
685 | assoc_failure_reason_to_str(cap_info)); | |
686 | if (cap_info == CONNECT_ERR_ASSOC_ERR_TIMEOUT) { | |
687 | if (status_code == MWIFIEX_ASSOC_CMD_FAILURE_AUTH) { | |
7532c7d0 | 688 | ret = WLAN_STATUS_AUTH_TIMEOUT; |
12d11109 AP |
689 | mwifiex_dbg(priv->adapter, ERROR, |
690 | "ASSOC_RESP: AUTH timeout\n"); | |
691 | } else { | |
7532c7d0 | 692 | ret = WLAN_STATUS_UNSPECIFIED_FAILURE; |
12d11109 AP |
693 | mwifiex_dbg(priv->adapter, ERROR, |
694 | "ASSOC_RESP: UNSPECIFIED failure\n"); | |
695 | } | |
7532c7d0 AK |
696 | } else { |
697 | ret = status_code; | |
698 | } | |
5e6e3a92 | 699 | |
5e6e3a92 BZ |
700 | goto done; |
701 | } | |
702 | ||
703 | /* Send a Media Connected event, according to the Spec */ | |
704 | priv->media_connected = true; | |
705 | ||
706 | priv->adapter->ps_state = PS_STATE_AWAKE; | |
707 | priv->adapter->pps_uapsd_mode = false; | |
708 | priv->adapter->tx_lock_flag = false; | |
709 | ||
710 | /* Set the attempted BSSID Index to current */ | |
711 | bss_desc = priv->attempted_bss_desc; | |
712 | ||
acebe8c1 ZL |
713 | mwifiex_dbg(priv->adapter, INFO, "info: ASSOC_RESP: %s\n", |
714 | bss_desc->ssid.ssid); | |
5e6e3a92 BZ |
715 | |
716 | /* Make a copy of current BSSID descriptor */ | |
717 | memcpy(&priv->curr_bss_params.bss_descriptor, | |
718 | bss_desc, sizeof(struct mwifiex_bssdescriptor)); | |
719 | ||
720 | /* Update curr_bss_params */ | |
721 | priv->curr_bss_params.bss_descriptor.channel | |
722 | = bss_desc->phy_param_set.ds_param_set.current_chan; | |
723 | ||
724 | priv->curr_bss_params.band = (u8) bss_desc->bss_band; | |
725 | ||
5e6e3a92 BZ |
726 | if (bss_desc->wmm_ie.vend_hdr.element_id == WLAN_EID_VENDOR_SPECIFIC) |
727 | priv->curr_bss_params.wmm_enabled = true; | |
728 | else | |
729 | priv->curr_bss_params.wmm_enabled = false; | |
730 | ||
931f1584 YAP |
731 | if ((priv->wmm_required || bss_desc->bcn_ht_cap) && |
732 | priv->curr_bss_params.wmm_enabled) | |
5e6e3a92 BZ |
733 | priv->wmm_enabled = true; |
734 | else | |
735 | priv->wmm_enabled = false; | |
736 | ||
737 | priv->curr_bss_params.wmm_uapsd_enabled = false; | |
738 | ||
739 | if (priv->wmm_enabled) | |
740 | priv->curr_bss_params.wmm_uapsd_enabled | |
741 | = ((bss_desc->wmm_ie.qos_info_bitmap & | |
742 | IEEE80211_WMM_IE_AP_QOSINFO_UAPSD) ? 1 : 0); | |
743 | ||
44ca509c NK |
744 | /* Store the bandwidth information from assoc response */ |
745 | ie_ptr = cfg80211_find_ie(WLAN_EID_HT_OPERATION, assoc_rsp->ie_buffer, | |
746 | priv->assoc_rsp_size | |
747 | - sizeof(struct ieee_types_assoc_rsp)); | |
748 | if (ie_ptr) { | |
749 | assoc_resp_ht_oper = (struct ieee80211_ht_operation *)(ie_ptr | |
750 | + sizeof(struct ieee_types_header)); | |
751 | priv->assoc_resp_ht_param = assoc_resp_ht_oper->ht_param; | |
752 | priv->ht_param_present = true; | |
753 | } else { | |
754 | priv->ht_param_present = false; | |
755 | } | |
756 | ||
acebe8c1 ZL |
757 | mwifiex_dbg(priv->adapter, INFO, |
758 | "info: ASSOC_RESP: curr_pkt_filter is %#x\n", | |
759 | priv->curr_pkt_filter); | |
5e6e3a92 BZ |
760 | if (priv->sec_info.wpa_enabled || priv->sec_info.wpa2_enabled) |
761 | priv->wpa_is_gtk_set = false; | |
762 | ||
763 | if (priv->wmm_enabled) { | |
764 | /* Don't re-enable carrier until we get the WMM_GET_STATUS | |
765 | event */ | |
766 | enable_data = false; | |
767 | } else { | |
768 | /* Since WMM is not enabled, setup the queues with the | |
769 | defaults */ | |
770 | mwifiex_wmm_setup_queue_priorities(priv, NULL); | |
771 | mwifiex_wmm_setup_ac_downgrade(priv); | |
772 | } | |
773 | ||
774 | if (enable_data) | |
acebe8c1 ZL |
775 | mwifiex_dbg(priv->adapter, INFO, |
776 | "info: post association, re-enabling data flow\n"); | |
5e6e3a92 BZ |
777 | |
778 | /* Reset SNR/NF/RSSI values */ | |
779 | priv->data_rssi_last = 0; | |
780 | priv->data_nf_last = 0; | |
781 | priv->data_rssi_avg = 0; | |
782 | priv->data_nf_avg = 0; | |
783 | priv->bcn_rssi_last = 0; | |
784 | priv->bcn_nf_last = 0; | |
785 | priv->bcn_rssi_avg = 0; | |
786 | priv->bcn_nf_avg = 0; | |
787 | priv->rxpd_rate = 0; | |
788 | priv->rxpd_htinfo = 0; | |
789 | ||
790 | mwifiex_save_curr_bcn(priv); | |
791 | ||
792 | priv->adapter->dbg.num_cmd_assoc_success++; | |
793 | ||
acebe8c1 | 794 | mwifiex_dbg(priv->adapter, INFO, "info: ASSOC_RESP: associated\n"); |
5e6e3a92 BZ |
795 | |
796 | /* Add the ra_list here for infra mode as there will be only 1 ra | |
797 | always */ | |
798 | mwifiex_ralist_add(priv, | |
799 | priv->curr_bss_params.bss_descriptor.mac_address); | |
800 | ||
801 | if (!netif_carrier_ok(priv->netdev)) | |
802 | netif_carrier_on(priv->netdev); | |
47411a06 | 803 | mwifiex_wake_up_net_dev_queue(priv->netdev, adapter); |
5e6e3a92 BZ |
804 | |
805 | if (priv->sec_info.wpa_enabled || priv->sec_info.wpa2_enabled) | |
806 | priv->scan_block = true; | |
5c894633 AP |
807 | else |
808 | priv->port_open = true; | |
5e6e3a92 BZ |
809 | |
810 | done: | |
811 | /* Need to indicate IOCTL complete */ | |
600f5d90 AK |
812 | if (adapter->curr_cmd->wait_q_enabled) { |
813 | if (ret) | |
814 | adapter->cmd_wait_q.status = -1; | |
815 | else | |
816 | adapter->cmd_wait_q.status = 0; | |
5e6e3a92 BZ |
817 | } |
818 | ||
819 | return ret; | |
820 | } | |
821 | ||
822 | /* | |
823 | * This function prepares command for ad-hoc start. | |
824 | * | |
825 | * Driver will fill up SSID, BSS mode, IBSS parameters, physical | |
826 | * parameters, probe delay, and capability information. Firmware | |
827 | * will fill up beacon period, basic rates and operational rates. | |
828 | * | |
829 | * In addition, the following TLVs are added - | |
830 | * - Channel TLV | |
831 | * - Vendor specific IE | |
832 | * - WPA/WPA2 IE | |
833 | * - HT Capabilities IE | |
834 | * - HT Information IE | |
835 | * | |
836 | * Preparation also includes - | |
837 | * - Setting command ID and proper size | |
838 | * - Ensuring correct endian-ness | |
839 | */ | |
840 | int | |
841 | mwifiex_cmd_802_11_ad_hoc_start(struct mwifiex_private *priv, | |
a5ffddb7 | 842 | struct host_cmd_ds_command *cmd, |
b9be5f39 | 843 | struct cfg80211_ssid *req_ssid) |
5e6e3a92 | 844 | { |
636c4598 | 845 | int rsn_ie_len = 0; |
5e6e3a92 BZ |
846 | struct mwifiex_adapter *adapter = priv->adapter; |
847 | struct host_cmd_ds_802_11_ad_hoc_start *adhoc_start = | |
848 | &cmd->params.adhoc_start; | |
849 | struct mwifiex_bssdescriptor *bss_desc; | |
850 | u32 cmd_append_size = 0; | |
851 | u32 i; | |
852 | u16 tmp_cap; | |
5e6e3a92 | 853 | struct mwifiex_ie_types_chan_list_param_set *chan_tlv; |
eedf15d3 | 854 | u8 radio_type; |
5e6e3a92 BZ |
855 | |
856 | struct mwifiex_ie_types_htcap *ht_cap; | |
857 | struct mwifiex_ie_types_htinfo *ht_info; | |
858 | u8 *pos = (u8 *) adhoc_start + | |
859 | sizeof(struct host_cmd_ds_802_11_ad_hoc_start); | |
860 | ||
861 | if (!adapter) | |
862 | return -1; | |
863 | ||
864 | cmd->command = cpu_to_le16(HostCmd_CMD_802_11_AD_HOC_START); | |
865 | ||
866 | bss_desc = &priv->curr_bss_params.bss_descriptor; | |
867 | priv->attempted_bss_desc = bss_desc; | |
868 | ||
869 | /* | |
870 | * Fill in the parameters for 2 data structures: | |
871 | * 1. struct host_cmd_ds_802_11_ad_hoc_start command | |
872 | * 2. bss_desc | |
873 | * Driver will fill up SSID, bss_mode,IBSS param, Physical Param, | |
874 | * probe delay, and Cap info. | |
875 | * Firmware will fill up beacon period, Basic rates | |
876 | * and operational rates. | |
877 | */ | |
878 | ||
879 | memset(adhoc_start->ssid, 0, IEEE80211_MAX_SSID_LEN); | |
880 | ||
a5ffddb7 | 881 | memcpy(adhoc_start->ssid, req_ssid->ssid, req_ssid->ssid_len); |
5e6e3a92 | 882 | |
acebe8c1 ZL |
883 | mwifiex_dbg(adapter, INFO, "info: ADHOC_S_CMD: SSID = %s\n", |
884 | adhoc_start->ssid); | |
5e6e3a92 BZ |
885 | |
886 | memset(bss_desc->ssid.ssid, 0, IEEE80211_MAX_SSID_LEN); | |
a5ffddb7 | 887 | memcpy(bss_desc->ssid.ssid, req_ssid->ssid, req_ssid->ssid_len); |
5e6e3a92 | 888 | |
a5ffddb7 | 889 | bss_desc->ssid.ssid_len = req_ssid->ssid_len; |
5e6e3a92 BZ |
890 | |
891 | /* Set the BSS mode */ | |
892 | adhoc_start->bss_mode = HostCmd_BSS_MODE_IBSS; | |
eecd8250 | 893 | bss_desc->bss_mode = NL80211_IFTYPE_ADHOC; |
5e6e3a92 BZ |
894 | adhoc_start->beacon_period = cpu_to_le16(priv->beacon_period); |
895 | bss_desc->beacon_period = priv->beacon_period; | |
896 | ||
897 | /* Set Physical param set */ | |
898 | /* Parameter IE Id */ | |
899 | #define DS_PARA_IE_ID 3 | |
900 | /* Parameter IE length */ | |
901 | #define DS_PARA_IE_LEN 1 | |
902 | ||
903 | adhoc_start->phy_param_set.ds_param_set.element_id = DS_PARA_IE_ID; | |
904 | adhoc_start->phy_param_set.ds_param_set.len = DS_PARA_IE_LEN; | |
905 | ||
6685d109 YAP |
906 | if (!mwifiex_get_cfp(priv, adapter->adhoc_start_band, |
907 | (u16) priv->adhoc_channel, 0)) { | |
5e6e3a92 | 908 | struct mwifiex_chan_freq_power *cfp; |
6685d109 YAP |
909 | cfp = mwifiex_get_cfp(priv, adapter->adhoc_start_band, |
910 | FIRST_VALID_CHANNEL, 0); | |
5e6e3a92 BZ |
911 | if (cfp) |
912 | priv->adhoc_channel = (u8) cfp->channel; | |
913 | } | |
914 | ||
915 | if (!priv->adhoc_channel) { | |
acebe8c1 ZL |
916 | mwifiex_dbg(adapter, ERROR, |
917 | "ADHOC_S_CMD: adhoc_channel cannot be 0\n"); | |
5e6e3a92 BZ |
918 | return -1; |
919 | } | |
920 | ||
acebe8c1 ZL |
921 | mwifiex_dbg(adapter, INFO, |
922 | "info: ADHOC_S_CMD: creating ADHOC on channel %d\n", | |
923 | priv->adhoc_channel); | |
5e6e3a92 BZ |
924 | |
925 | priv->curr_bss_params.bss_descriptor.channel = priv->adhoc_channel; | |
926 | priv->curr_bss_params.band = adapter->adhoc_start_band; | |
927 | ||
928 | bss_desc->channel = priv->adhoc_channel; | |
929 | adhoc_start->phy_param_set.ds_param_set.current_chan = | |
930 | priv->adhoc_channel; | |
931 | ||
932 | memcpy(&bss_desc->phy_param_set, &adhoc_start->phy_param_set, | |
933 | sizeof(union ieee_types_phy_param_set)); | |
934 | ||
935 | /* Set IBSS param set */ | |
936 | /* IBSS parameter IE Id */ | |
937 | #define IBSS_PARA_IE_ID 6 | |
938 | /* IBSS parameter IE length */ | |
939 | #define IBSS_PARA_IE_LEN 2 | |
940 | ||
941 | adhoc_start->ss_param_set.ibss_param_set.element_id = IBSS_PARA_IE_ID; | |
942 | adhoc_start->ss_param_set.ibss_param_set.len = IBSS_PARA_IE_LEN; | |
943 | adhoc_start->ss_param_set.ibss_param_set.atim_window | |
931f1584 | 944 | = cpu_to_le16(priv->atim_window); |
5e6e3a92 BZ |
945 | memcpy(&bss_desc->ss_param_set, &adhoc_start->ss_param_set, |
946 | sizeof(union ieee_types_ss_param_set)); | |
947 | ||
948 | /* Set Capability info */ | |
949 | bss_desc->cap_info_bitmap |= WLAN_CAPABILITY_IBSS; | |
4eed83a2 | 950 | tmp_cap = WLAN_CAPABILITY_IBSS; |
5e6e3a92 BZ |
951 | |
952 | /* Set up privacy in bss_desc */ | |
2be50b8d | 953 | if (priv->sec_info.encryption_mode) { |
5e6e3a92 | 954 | /* Ad-Hoc capability privacy on */ |
acebe8c1 ZL |
955 | mwifiex_dbg(adapter, INFO, |
956 | "info: ADHOC_S_CMD: wep_status set privacy to WEP\n"); | |
5e6e3a92 BZ |
957 | bss_desc->privacy = MWIFIEX_802_11_PRIV_FILTER_8021X_WEP; |
958 | tmp_cap |= WLAN_CAPABILITY_PRIVACY; | |
959 | } else { | |
acebe8c1 ZL |
960 | mwifiex_dbg(adapter, INFO, |
961 | "info: ADHOC_S_CMD: wep_status NOT set,\t" | |
962 | "setting privacy to ACCEPT ALL\n"); | |
5e6e3a92 BZ |
963 | bss_desc->privacy = MWIFIEX_802_11_PRIV_FILTER_ACCEPT_ALL; |
964 | } | |
965 | ||
63af6333 YAP |
966 | memset(adhoc_start->data_rate, 0, sizeof(adhoc_start->data_rate)); |
967 | mwifiex_get_active_data_rates(priv, adhoc_start->data_rate); | |
5e6e3a92 BZ |
968 | if ((adapter->adhoc_start_band & BAND_G) && |
969 | (priv->curr_pkt_filter & HostCmd_ACT_MAC_ADHOC_G_PROTECTION_ON)) { | |
fa0ecbb9 BZ |
970 | if (mwifiex_send_cmd(priv, HostCmd_CMD_MAC_CONTROL, |
971 | HostCmd_ACT_GEN_SET, 0, | |
972 | &priv->curr_pkt_filter, false)) { | |
acebe8c1 ZL |
973 | mwifiex_dbg(adapter, ERROR, |
974 | "ADHOC_S_CMD: G Protection config failed\n"); | |
5e6e3a92 BZ |
975 | return -1; |
976 | } | |
977 | } | |
978 | /* Find the last non zero */ | |
63af6333 YAP |
979 | for (i = 0; i < sizeof(adhoc_start->data_rate); i++) |
980 | if (!adhoc_start->data_rate[i]) | |
981 | break; | |
5e6e3a92 BZ |
982 | |
983 | priv->curr_bss_params.num_of_rates = i; | |
984 | ||
985 | /* Copy the ad-hoc creating rates into Current BSS rate structure */ | |
986 | memcpy(&priv->curr_bss_params.data_rates, | |
63af6333 | 987 | &adhoc_start->data_rate, priv->curr_bss_params.num_of_rates); |
5e6e3a92 | 988 | |
acebe8c1 ZL |
989 | mwifiex_dbg(adapter, INFO, "info: ADHOC_S_CMD: rates=%4ph\n", |
990 | adhoc_start->data_rate); | |
5e6e3a92 | 991 | |
acebe8c1 | 992 | mwifiex_dbg(adapter, INFO, "info: ADHOC_S_CMD: AD-HOC Start command is ready\n"); |
5e6e3a92 BZ |
993 | |
994 | if (IS_SUPPORT_MULTI_BANDS(adapter)) { | |
995 | /* Append a channel TLV */ | |
996 | chan_tlv = (struct mwifiex_ie_types_chan_list_param_set *) pos; | |
997 | chan_tlv->header.type = cpu_to_le16(TLV_TYPE_CHANLIST); | |
998 | chan_tlv->header.len = | |
999 | cpu_to_le16(sizeof(struct mwifiex_chan_scan_param_set)); | |
1000 | ||
1001 | memset(chan_tlv->chan_scan_param, 0x00, | |
1002 | sizeof(struct mwifiex_chan_scan_param_set)); | |
1003 | chan_tlv->chan_scan_param[0].chan_number = | |
1004 | (u8) priv->curr_bss_params.bss_descriptor.channel; | |
1005 | ||
acebe8c1 ZL |
1006 | mwifiex_dbg(adapter, INFO, "info: ADHOC_S_CMD: TLV Chan = %d\n", |
1007 | chan_tlv->chan_scan_param[0].chan_number); | |
5e6e3a92 BZ |
1008 | |
1009 | chan_tlv->chan_scan_param[0].radio_type | |
1010 | = mwifiex_band_to_radio_type(priv->curr_bss_params.band); | |
931f1584 YAP |
1011 | if (adapter->adhoc_start_band & BAND_GN || |
1012 | adapter->adhoc_start_band & BAND_AN) { | |
21c3ba34 AK |
1013 | if (adapter->sec_chan_offset == |
1014 | IEEE80211_HT_PARAM_CHA_SEC_ABOVE) | |
5e6e3a92 | 1015 | chan_tlv->chan_scan_param[0].radio_type |= |
21c3ba34 AK |
1016 | (IEEE80211_HT_PARAM_CHA_SEC_ABOVE << 4); |
1017 | else if (adapter->sec_chan_offset == | |
2a317ad8 | 1018 | IEEE80211_HT_PARAM_CHA_SEC_BELOW) |
5e6e3a92 | 1019 | chan_tlv->chan_scan_param[0].radio_type |= |
21c3ba34 | 1020 | (IEEE80211_HT_PARAM_CHA_SEC_BELOW << 4); |
5e6e3a92 | 1021 | } |
acebe8c1 ZL |
1022 | mwifiex_dbg(adapter, INFO, "info: ADHOC_S_CMD: TLV Band = %d\n", |
1023 | chan_tlv->chan_scan_param[0].radio_type); | |
5e6e3a92 BZ |
1024 | pos += sizeof(chan_tlv->header) + |
1025 | sizeof(struct mwifiex_chan_scan_param_set); | |
1026 | cmd_append_size += | |
1027 | sizeof(chan_tlv->header) + | |
1028 | sizeof(struct mwifiex_chan_scan_param_set); | |
1029 | } | |
1030 | ||
1031 | /* Append vendor specific IE TLV */ | |
1032 | cmd_append_size += mwifiex_cmd_append_vsie_tlv(priv, | |
1033 | MWIFIEX_VSIE_MASK_ADHOC, &pos); | |
1034 | ||
1035 | if (priv->sec_info.wpa_enabled) { | |
1036 | rsn_ie_len = mwifiex_append_rsn_ie_wpa_wpa2(priv, &pos); | |
1037 | if (rsn_ie_len == -1) | |
1038 | return -1; | |
1039 | cmd_append_size += rsn_ie_len; | |
1040 | } | |
1041 | ||
1042 | if (adapter->adhoc_11n_enabled) { | |
eedf15d3 YAP |
1043 | /* Fill HT CAPABILITY */ |
1044 | ht_cap = (struct mwifiex_ie_types_htcap *) pos; | |
1045 | memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap)); | |
1046 | ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY); | |
1047 | ht_cap->header.len = | |
1048 | cpu_to_le16(sizeof(struct ieee80211_ht_cap)); | |
1049 | radio_type = mwifiex_band_to_radio_type( | |
1050 | priv->adapter->config_bands); | |
341b8800 | 1051 | mwifiex_fill_cap_info(priv, radio_type, &ht_cap->ht_cap); |
eedf15d3 | 1052 | |
d35f1035 AK |
1053 | if (adapter->sec_chan_offset == |
1054 | IEEE80211_HT_PARAM_CHA_SEC_NONE) { | |
1055 | u16 tmp_ht_cap; | |
1056 | ||
1057 | tmp_ht_cap = le16_to_cpu(ht_cap->ht_cap.cap_info); | |
1058 | tmp_ht_cap &= ~IEEE80211_HT_CAP_SUP_WIDTH_20_40; | |
1059 | tmp_ht_cap &= ~IEEE80211_HT_CAP_SGI_40; | |
1060 | ht_cap->ht_cap.cap_info = cpu_to_le16(tmp_ht_cap); | |
1061 | } | |
1062 | ||
eedf15d3 | 1063 | pos += sizeof(struct mwifiex_ie_types_htcap); |
931f1584 | 1064 | cmd_append_size += sizeof(struct mwifiex_ie_types_htcap); |
eedf15d3 YAP |
1065 | |
1066 | /* Fill HT INFORMATION */ | |
1067 | ht_info = (struct mwifiex_ie_types_htinfo *) pos; | |
1068 | memset(ht_info, 0, sizeof(struct mwifiex_ie_types_htinfo)); | |
074d46d1 | 1069 | ht_info->header.type = cpu_to_le16(WLAN_EID_HT_OPERATION); |
eedf15d3 | 1070 | ht_info->header.len = |
074d46d1 | 1071 | cpu_to_le16(sizeof(struct ieee80211_ht_operation)); |
eedf15d3 | 1072 | |
074d46d1 | 1073 | ht_info->ht_oper.primary_chan = |
eedf15d3 | 1074 | (u8) priv->curr_bss_params.bss_descriptor.channel; |
21c3ba34 | 1075 | if (adapter->sec_chan_offset) { |
074d46d1 JB |
1076 | ht_info->ht_oper.ht_param = adapter->sec_chan_offset; |
1077 | ht_info->ht_oper.ht_param |= | |
6d2bd916 | 1078 | IEEE80211_HT_PARAM_CHAN_WIDTH_ANY; |
5e6e3a92 | 1079 | } |
074d46d1 | 1080 | ht_info->ht_oper.operation_mode = |
eedf15d3 | 1081 | cpu_to_le16(IEEE80211_HT_OP_MODE_NON_GF_STA_PRSNT); |
074d46d1 | 1082 | ht_info->ht_oper.basic_set[0] = 0xff; |
eedf15d3 YAP |
1083 | pos += sizeof(struct mwifiex_ie_types_htinfo); |
1084 | cmd_append_size += | |
931f1584 | 1085 | sizeof(struct mwifiex_ie_types_htinfo); |
5e6e3a92 BZ |
1086 | } |
1087 | ||
931f1584 YAP |
1088 | cmd->size = |
1089 | cpu_to_le16((u16)(sizeof(struct host_cmd_ds_802_11_ad_hoc_start) | |
1090 | + S_DS_GEN + cmd_append_size)); | |
5e6e3a92 BZ |
1091 | |
1092 | if (adapter->adhoc_start_band == BAND_B) | |
b93f85f0 | 1093 | tmp_cap &= ~WLAN_CAPABILITY_SHORT_SLOT_TIME; |
5e6e3a92 | 1094 | else |
b93f85f0 | 1095 | tmp_cap |= WLAN_CAPABILITY_SHORT_SLOT_TIME; |
5e6e3a92 BZ |
1096 | |
1097 | adhoc_start->cap_info_bitmap = cpu_to_le16(tmp_cap); | |
1098 | ||
1099 | return 0; | |
1100 | } | |
1101 | ||
1102 | /* | |
1103 | * This function prepares command for ad-hoc join. | |
1104 | * | |
1105 | * Most of the parameters are set up by copying from the target BSS descriptor | |
1106 | * from the scan response. | |
1107 | * | |
1108 | * In addition, the following TLVs are added - | |
1109 | * - Channel TLV | |
1110 | * - Vendor specific IE | |
1111 | * - WPA/WPA2 IE | |
1112 | * - 11n IE | |
1113 | * | |
1114 | * Preparation also includes - | |
1115 | * - Setting command ID and proper size | |
1116 | * - Ensuring correct endian-ness | |
1117 | */ | |
1118 | int | |
1119 | mwifiex_cmd_802_11_ad_hoc_join(struct mwifiex_private *priv, | |
a5ffddb7 AK |
1120 | struct host_cmd_ds_command *cmd, |
1121 | struct mwifiex_bssdescriptor *bss_desc) | |
5e6e3a92 | 1122 | { |
636c4598 | 1123 | int rsn_ie_len = 0; |
5e6e3a92 BZ |
1124 | struct host_cmd_ds_802_11_ad_hoc_join *adhoc_join = |
1125 | &cmd->params.adhoc_join; | |
5e6e3a92 BZ |
1126 | struct mwifiex_ie_types_chan_list_param_set *chan_tlv; |
1127 | u32 cmd_append_size = 0; | |
1128 | u16 tmp_cap; | |
1129 | u32 i, rates_size = 0; | |
1130 | u16 curr_pkt_filter; | |
1131 | u8 *pos = | |
1132 | (u8 *) adhoc_join + | |
1133 | sizeof(struct host_cmd_ds_802_11_ad_hoc_join); | |
1134 | ||
1135 | /* Use G protection */ | |
1136 | #define USE_G_PROTECTION 0x02 | |
1137 | if (bss_desc->erp_flags & USE_G_PROTECTION) { | |
1138 | curr_pkt_filter = | |
1139 | priv-> | |
1140 | curr_pkt_filter | HostCmd_ACT_MAC_ADHOC_G_PROTECTION_ON; | |
1141 | ||
fa0ecbb9 BZ |
1142 | if (mwifiex_send_cmd(priv, HostCmd_CMD_MAC_CONTROL, |
1143 | HostCmd_ACT_GEN_SET, 0, | |
1144 | &curr_pkt_filter, false)) { | |
acebe8c1 ZL |
1145 | mwifiex_dbg(priv->adapter, ERROR, |
1146 | "ADHOC_J_CMD: G Protection config failed\n"); | |
5e6e3a92 BZ |
1147 | return -1; |
1148 | } | |
1149 | } | |
1150 | ||
1151 | priv->attempted_bss_desc = bss_desc; | |
1152 | ||
1153 | cmd->command = cpu_to_le16(HostCmd_CMD_802_11_AD_HOC_JOIN); | |
1154 | ||
1155 | adhoc_join->bss_descriptor.bss_mode = HostCmd_BSS_MODE_IBSS; | |
1156 | ||
1157 | adhoc_join->bss_descriptor.beacon_period | |
1158 | = cpu_to_le16(bss_desc->beacon_period); | |
1159 | ||
1160 | memcpy(&adhoc_join->bss_descriptor.bssid, | |
1161 | &bss_desc->mac_address, ETH_ALEN); | |
1162 | ||
1163 | memcpy(&adhoc_join->bss_descriptor.ssid, | |
1164 | &bss_desc->ssid.ssid, bss_desc->ssid.ssid_len); | |
1165 | ||
1166 | memcpy(&adhoc_join->bss_descriptor.phy_param_set, | |
1167 | &bss_desc->phy_param_set, | |
1168 | sizeof(union ieee_types_phy_param_set)); | |
1169 | ||
1170 | memcpy(&adhoc_join->bss_descriptor.ss_param_set, | |
1171 | &bss_desc->ss_param_set, sizeof(union ieee_types_ss_param_set)); | |
1172 | ||
1173 | tmp_cap = bss_desc->cap_info_bitmap; | |
1174 | ||
1175 | tmp_cap &= CAPINFO_MASK; | |
1176 | ||
acebe8c1 ZL |
1177 | mwifiex_dbg(priv->adapter, INFO, |
1178 | "info: ADHOC_J_CMD: tmp_cap=%4X CAPINFO_MASK=%4lX\n", | |
1179 | tmp_cap, CAPINFO_MASK); | |
5e6e3a92 BZ |
1180 | |
1181 | /* Information on BSSID descriptor passed to FW */ | |
acebe8c1 ZL |
1182 | mwifiex_dbg(priv->adapter, INFO, |
1183 | "info: ADHOC_J_CMD: BSSID=%pM, SSID='%s'\n", | |
1184 | adhoc_join->bss_descriptor.bssid, | |
1185 | adhoc_join->bss_descriptor.ssid); | |
5e6e3a92 | 1186 | |
5f0fabf8 BZ |
1187 | for (i = 0; i < MWIFIEX_SUPPORTED_RATES && |
1188 | bss_desc->supported_rates[i]; i++) | |
1189 | ; | |
5e6e3a92 BZ |
1190 | rates_size = i; |
1191 | ||
1192 | /* Copy Data Rates from the Rates recorded in scan response */ | |
1193 | memset(adhoc_join->bss_descriptor.data_rates, 0, | |
1194 | sizeof(adhoc_join->bss_descriptor.data_rates)); | |
1195 | memcpy(adhoc_join->bss_descriptor.data_rates, | |
1196 | bss_desc->supported_rates, rates_size); | |
1197 | ||
1198 | /* Copy the adhoc join rates into Current BSS state structure */ | |
1199 | priv->curr_bss_params.num_of_rates = rates_size; | |
1200 | memcpy(&priv->curr_bss_params.data_rates, bss_desc->supported_rates, | |
1201 | rates_size); | |
1202 | ||
1203 | /* Copy the channel information */ | |
1204 | priv->curr_bss_params.bss_descriptor.channel = bss_desc->channel; | |
1205 | priv->curr_bss_params.band = (u8) bss_desc->bss_band; | |
1206 | ||
5eb02e44 | 1207 | if (priv->sec_info.wep_enabled || priv->sec_info.wpa_enabled) |
5e6e3a92 BZ |
1208 | tmp_cap |= WLAN_CAPABILITY_PRIVACY; |
1209 | ||
1210 | if (IS_SUPPORT_MULTI_BANDS(priv->adapter)) { | |
1211 | /* Append a channel TLV */ | |
1212 | chan_tlv = (struct mwifiex_ie_types_chan_list_param_set *) pos; | |
1213 | chan_tlv->header.type = cpu_to_le16(TLV_TYPE_CHANLIST); | |
1214 | chan_tlv->header.len = | |
1215 | cpu_to_le16(sizeof(struct mwifiex_chan_scan_param_set)); | |
1216 | ||
1217 | memset(chan_tlv->chan_scan_param, 0x00, | |
1218 | sizeof(struct mwifiex_chan_scan_param_set)); | |
1219 | chan_tlv->chan_scan_param[0].chan_number = | |
1220 | (bss_desc->phy_param_set.ds_param_set.current_chan); | |
acebe8c1 ZL |
1221 | mwifiex_dbg(priv->adapter, INFO, "info: ADHOC_J_CMD: TLV Chan=%d\n", |
1222 | chan_tlv->chan_scan_param[0].chan_number); | |
5e6e3a92 BZ |
1223 | |
1224 | chan_tlv->chan_scan_param[0].radio_type = | |
1225 | mwifiex_band_to_radio_type((u8) bss_desc->bss_band); | |
1226 | ||
acebe8c1 ZL |
1227 | mwifiex_dbg(priv->adapter, INFO, "info: ADHOC_J_CMD: TLV Band=%d\n", |
1228 | chan_tlv->chan_scan_param[0].radio_type); | |
5e6e3a92 | 1229 | pos += sizeof(chan_tlv->header) + |
931f1584 | 1230 | sizeof(struct mwifiex_chan_scan_param_set); |
5e6e3a92 | 1231 | cmd_append_size += sizeof(chan_tlv->header) + |
931f1584 | 1232 | sizeof(struct mwifiex_chan_scan_param_set); |
5e6e3a92 BZ |
1233 | } |
1234 | ||
1235 | if (priv->sec_info.wpa_enabled) | |
1236 | rsn_ie_len = mwifiex_append_rsn_ie_wpa_wpa2(priv, &pos); | |
1237 | if (rsn_ie_len == -1) | |
1238 | return -1; | |
1239 | cmd_append_size += rsn_ie_len; | |
1240 | ||
1241 | if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info)) | |
1242 | cmd_append_size += mwifiex_cmd_append_11n_tlv(priv, | |
1243 | bss_desc, &pos); | |
1244 | ||
1245 | /* Append vendor specific IE TLV */ | |
1246 | cmd_append_size += mwifiex_cmd_append_vsie_tlv(priv, | |
1247 | MWIFIEX_VSIE_MASK_ADHOC, &pos); | |
1248 | ||
931f1584 YAP |
1249 | cmd->size = cpu_to_le16 |
1250 | ((u16) (sizeof(struct host_cmd_ds_802_11_ad_hoc_join) | |
1251 | + S_DS_GEN + cmd_append_size)); | |
5e6e3a92 BZ |
1252 | |
1253 | adhoc_join->bss_descriptor.cap_info_bitmap = cpu_to_le16(tmp_cap); | |
1254 | ||
636c4598 | 1255 | return 0; |
5e6e3a92 BZ |
1256 | } |
1257 | ||
1258 | /* | |
1259 | * This function handles the command response of ad-hoc start and | |
1260 | * ad-hoc join. | |
1261 | * | |
1262 | * The function generates a device-connected event to notify | |
1263 | * the applications, in case of successful ad-hoc start/join, and | |
1264 | * saves the beacon buffer. | |
1265 | */ | |
1266 | int mwifiex_ret_802_11_ad_hoc(struct mwifiex_private *priv, | |
600f5d90 | 1267 | struct host_cmd_ds_command *resp) |
5e6e3a92 BZ |
1268 | { |
1269 | int ret = 0; | |
600f5d90 | 1270 | struct mwifiex_adapter *adapter = priv->adapter; |
d5556e87 AK |
1271 | struct host_cmd_ds_802_11_ad_hoc_start_result *start_result = |
1272 | &resp->params.start_result; | |
1273 | struct host_cmd_ds_802_11_ad_hoc_join_result *join_result = | |
1274 | &resp->params.join_result; | |
5e6e3a92 | 1275 | struct mwifiex_bssdescriptor *bss_desc; |
d5556e87 AK |
1276 | u16 cmd = le16_to_cpu(resp->command); |
1277 | u8 result; | |
5e6e3a92 | 1278 | |
4699fc3f GB |
1279 | if (!priv->attempted_bss_desc) { |
1280 | mwifiex_dbg(priv->adapter, ERROR, | |
1281 | "ADHOC_RESP: failed, association terminated by host\n"); | |
1282 | goto done; | |
1283 | } | |
1284 | ||
d5556e87 AK |
1285 | if (cmd == HostCmd_CMD_802_11_AD_HOC_START) |
1286 | result = start_result->result; | |
1287 | else | |
1288 | result = join_result->result; | |
5e6e3a92 BZ |
1289 | |
1290 | bss_desc = priv->attempted_bss_desc; | |
1291 | ||
1292 | /* Join result code 0 --> SUCCESS */ | |
d5556e87 | 1293 | if (result) { |
acebe8c1 | 1294 | mwifiex_dbg(priv->adapter, ERROR, "ADHOC_RESP: failed\n"); |
5e6e3a92 | 1295 | if (priv->media_connected) |
c62d50a4 | 1296 | mwifiex_reset_connect_state(priv, result, true); |
5e6e3a92 BZ |
1297 | |
1298 | memset(&priv->curr_bss_params.bss_descriptor, | |
1299 | 0x00, sizeof(struct mwifiex_bssdescriptor)); | |
1300 | ||
1301 | ret = -1; | |
1302 | goto done; | |
1303 | } | |
1304 | ||
1305 | /* Send a Media Connected event, according to the Spec */ | |
1306 | priv->media_connected = true; | |
1307 | ||
636c4598 | 1308 | if (le16_to_cpu(resp->command) == HostCmd_CMD_802_11_AD_HOC_START) { |
acebe8c1 ZL |
1309 | mwifiex_dbg(priv->adapter, INFO, "info: ADHOC_S_RESP %s\n", |
1310 | bss_desc->ssid.ssid); | |
5e6e3a92 BZ |
1311 | |
1312 | /* Update the created network descriptor with the new BSSID */ | |
1313 | memcpy(bss_desc->mac_address, | |
d5556e87 | 1314 | start_result->bssid, ETH_ALEN); |
5e6e3a92 BZ |
1315 | |
1316 | priv->adhoc_state = ADHOC_STARTED; | |
1317 | } else { | |
1318 | /* | |
1319 | * Now the join cmd should be successful. | |
1320 | * If BSSID has changed use SSID to compare instead of BSSID | |
1321 | */ | |
acebe8c1 ZL |
1322 | mwifiex_dbg(priv->adapter, INFO, |
1323 | "info: ADHOC_J_RESP %s\n", | |
1324 | bss_desc->ssid.ssid); | |
5e6e3a92 BZ |
1325 | |
1326 | /* | |
1327 | * Make a copy of current BSSID descriptor, only needed for | |
1328 | * join since the current descriptor is already being used | |
1329 | * for adhoc start | |
1330 | */ | |
1331 | memcpy(&priv->curr_bss_params.bss_descriptor, | |
1332 | bss_desc, sizeof(struct mwifiex_bssdescriptor)); | |
1333 | ||
1334 | priv->adhoc_state = ADHOC_JOINED; | |
1335 | } | |
1336 | ||
acebe8c1 ZL |
1337 | mwifiex_dbg(priv->adapter, INFO, "info: ADHOC_RESP: channel = %d\n", |
1338 | priv->adhoc_channel); | |
1339 | mwifiex_dbg(priv->adapter, INFO, "info: ADHOC_RESP: BSSID = %pM\n", | |
1340 | priv->curr_bss_params.bss_descriptor.mac_address); | |
5e6e3a92 BZ |
1341 | |
1342 | if (!netif_carrier_ok(priv->netdev)) | |
1343 | netif_carrier_on(priv->netdev); | |
47411a06 | 1344 | mwifiex_wake_up_net_dev_queue(priv->netdev, adapter); |
5e6e3a92 BZ |
1345 | |
1346 | mwifiex_save_curr_bcn(priv); | |
1347 | ||
1348 | done: | |
1349 | /* Need to indicate IOCTL complete */ | |
600f5d90 | 1350 | if (adapter->curr_cmd->wait_q_enabled) { |
5e6e3a92 | 1351 | if (ret) |
600f5d90 | 1352 | adapter->cmd_wait_q.status = -1; |
5e6e3a92 | 1353 | else |
600f5d90 | 1354 | adapter->cmd_wait_q.status = 0; |
5e6e3a92 BZ |
1355 | |
1356 | } | |
1357 | ||
1358 | return ret; | |
1359 | } | |
1360 | ||
1361 | /* | |
1362 | * This function associates to a specific BSS discovered in a scan. | |
1363 | * | |
1364 | * It clears any past association response stored for application | |
1365 | * retrieval and calls the command preparation routine to send the | |
1366 | * command to firmware. | |
1367 | */ | |
1368 | int mwifiex_associate(struct mwifiex_private *priv, | |
600f5d90 | 1369 | struct mwifiex_bssdescriptor *bss_desc) |
5e6e3a92 | 1370 | { |
953b3539 AP |
1371 | /* Return error if the adapter is not STA role or table entry |
1372 | * is not marked as infra. | |
1373 | */ | |
1374 | if ((GET_BSS_ROLE(priv) != MWIFIEX_BSS_ROLE_STA) || | |
eecd8250 | 1375 | (bss_desc->bss_mode != NL80211_IFTYPE_STATION)) |
5e6e3a92 BZ |
1376 | return -1; |
1377 | ||
2b6254da AP |
1378 | if (ISSUPP_11ACENABLED(priv->adapter->fw_cap_info) && |
1379 | !bss_desc->disable_11n && !bss_desc->disable_11ac && | |
f25b1431 | 1380 | priv->adapter->config_bands & BAND_AAC) |
2b6254da AP |
1381 | mwifiex_set_11ac_ba_params(priv); |
1382 | else | |
1383 | mwifiex_set_ba_params(priv); | |
1384 | ||
5e6e3a92 BZ |
1385 | /* Clear any past association response stored for application |
1386 | retrieval */ | |
1387 | priv->assoc_rsp_size = 0; | |
1388 | ||
fa0ecbb9 BZ |
1389 | return mwifiex_send_cmd(priv, HostCmd_CMD_802_11_ASSOCIATE, |
1390 | HostCmd_ACT_GEN_SET, 0, bss_desc, true); | |
5e6e3a92 BZ |
1391 | } |
1392 | ||
1393 | /* | |
1394 | * This function starts an ad-hoc network. | |
1395 | * | |
1396 | * It calls the command preparation routine to send the command to firmware. | |
1397 | */ | |
1398 | int | |
1399 | mwifiex_adhoc_start(struct mwifiex_private *priv, | |
b9be5f39 | 1400 | struct cfg80211_ssid *adhoc_ssid) |
5e6e3a92 | 1401 | { |
acebe8c1 ZL |
1402 | mwifiex_dbg(priv->adapter, INFO, "info: Adhoc Channel = %d\n", |
1403 | priv->adhoc_channel); | |
1404 | mwifiex_dbg(priv->adapter, INFO, "info: curr_bss_params.channel = %d\n", | |
1405 | priv->curr_bss_params.bss_descriptor.channel); | |
1406 | mwifiex_dbg(priv->adapter, INFO, "info: curr_bss_params.band = %d\n", | |
1407 | priv->curr_bss_params.band); | |
5e6e3a92 | 1408 | |
2b6254da | 1409 | if (ISSUPP_11ACENABLED(priv->adapter->fw_cap_info) && |
f25b1431 | 1410 | priv->adapter->config_bands & BAND_AAC) |
2b6254da AP |
1411 | mwifiex_set_11ac_ba_params(priv); |
1412 | else | |
1413 | mwifiex_set_ba_params(priv); | |
1414 | ||
fa0ecbb9 BZ |
1415 | return mwifiex_send_cmd(priv, HostCmd_CMD_802_11_AD_HOC_START, |
1416 | HostCmd_ACT_GEN_SET, 0, adhoc_ssid, true); | |
5e6e3a92 BZ |
1417 | } |
1418 | ||
1419 | /* | |
1420 | * This function joins an ad-hoc network found in a previous scan. | |
1421 | * | |
1422 | * It calls the command preparation routine to send the command to firmware, | |
1423 | * if already not connected to the requested SSID. | |
1424 | */ | |
1425 | int mwifiex_adhoc_join(struct mwifiex_private *priv, | |
600f5d90 | 1426 | struct mwifiex_bssdescriptor *bss_desc) |
5e6e3a92 | 1427 | { |
acebe8c1 ZL |
1428 | mwifiex_dbg(priv->adapter, INFO, |
1429 | "info: adhoc join: curr_bss ssid =%s\n", | |
1430 | priv->curr_bss_params.bss_descriptor.ssid.ssid); | |
1431 | mwifiex_dbg(priv->adapter, INFO, | |
1432 | "info: adhoc join: curr_bss ssid_len =%u\n", | |
1433 | priv->curr_bss_params.bss_descriptor.ssid.ssid_len); | |
1434 | mwifiex_dbg(priv->adapter, INFO, "info: adhoc join: ssid =%s\n", | |
1435 | bss_desc->ssid.ssid); | |
1436 | mwifiex_dbg(priv->adapter, INFO, "info: adhoc join: ssid_len =%u\n", | |
1437 | bss_desc->ssid.ssid_len); | |
5e6e3a92 BZ |
1438 | |
1439 | /* Check if the requested SSID is already joined */ | |
1440 | if (priv->curr_bss_params.bss_descriptor.ssid.ssid_len && | |
1441 | !mwifiex_ssid_cmp(&bss_desc->ssid, | |
1442 | &priv->curr_bss_params.bss_descriptor.ssid) && | |
1443 | (priv->curr_bss_params.bss_descriptor.bss_mode == | |
eecd8250 | 1444 | NL80211_IFTYPE_ADHOC)) { |
acebe8c1 ZL |
1445 | mwifiex_dbg(priv->adapter, INFO, |
1446 | "info: ADHOC_J_CMD: new ad-hoc SSID\t" | |
1447 | "is the same as current; not attempting to re-join\n"); | |
5e6e3a92 BZ |
1448 | return -1; |
1449 | } | |
1450 | ||
2b6254da AP |
1451 | if (ISSUPP_11ACENABLED(priv->adapter->fw_cap_info) && |
1452 | !bss_desc->disable_11n && !bss_desc->disable_11ac && | |
f25b1431 | 1453 | priv->adapter->config_bands & BAND_AAC) |
2b6254da AP |
1454 | mwifiex_set_11ac_ba_params(priv); |
1455 | else | |
1456 | mwifiex_set_ba_params(priv); | |
1457 | ||
acebe8c1 ZL |
1458 | mwifiex_dbg(priv->adapter, INFO, |
1459 | "info: curr_bss_params.channel = %d\n", | |
1460 | priv->curr_bss_params.bss_descriptor.channel); | |
1461 | mwifiex_dbg(priv->adapter, INFO, | |
1462 | "info: curr_bss_params.band = %c\n", | |
1463 | priv->curr_bss_params.band); | |
5e6e3a92 | 1464 | |
fa0ecbb9 BZ |
1465 | return mwifiex_send_cmd(priv, HostCmd_CMD_802_11_AD_HOC_JOIN, |
1466 | HostCmd_ACT_GEN_SET, 0, bss_desc, true); | |
5e6e3a92 BZ |
1467 | } |
1468 | ||
1469 | /* | |
1470 | * This function deauthenticates/disconnects from infra network by sending | |
1471 | * deauthentication request. | |
1472 | */ | |
600f5d90 | 1473 | static int mwifiex_deauthenticate_infra(struct mwifiex_private *priv, u8 *mac) |
5e6e3a92 BZ |
1474 | { |
1475 | u8 mac_address[ETH_ALEN]; | |
270e58e8 | 1476 | int ret; |
5e6e3a92 | 1477 | |
2c208890 JP |
1478 | if (!mac || is_zero_ether_addr(mac)) |
1479 | memcpy(mac_address, | |
1480 | priv->curr_bss_params.bss_descriptor.mac_address, | |
1481 | ETH_ALEN); | |
1482 | else | |
1483 | memcpy(mac_address, mac, ETH_ALEN); | |
5e6e3a92 | 1484 | |
fa0ecbb9 BZ |
1485 | ret = mwifiex_send_cmd(priv, HostCmd_CMD_802_11_DEAUTHENTICATE, |
1486 | HostCmd_ACT_GEN_SET, 0, mac_address, true); | |
5e6e3a92 BZ |
1487 | |
1488 | return ret; | |
1489 | } | |
1490 | ||
1491 | /* | |
1492 | * This function deauthenticates/disconnects from a BSS. | |
1493 | * | |
1494 | * In case of infra made, it sends deauthentication request, and | |
1495 | * in case of ad-hoc mode, a stop network request is sent to the firmware. | |
26134e6e | 1496 | * In AP mode, a command to stop bss is sent to firmware. |
5e6e3a92 | 1497 | */ |
600f5d90 | 1498 | int mwifiex_deauthenticate(struct mwifiex_private *priv, u8 *mac) |
5e6e3a92 | 1499 | { |
e8041cee AP |
1500 | int ret = 0; |
1501 | ||
99e126fd BZ |
1502 | if (!priv->media_connected) |
1503 | return 0; | |
5e6e3a92 | 1504 | |
99e126fd BZ |
1505 | switch (priv->bss_mode) { |
1506 | case NL80211_IFTYPE_STATION: | |
5e4c0798 | 1507 | case NL80211_IFTYPE_P2P_CLIENT: |
e8041cee AP |
1508 | ret = mwifiex_deauthenticate_infra(priv, mac); |
1509 | if (ret) | |
1510 | cfg80211_disconnected(priv->netdev, 0, NULL, 0, | |
80279fb7 | 1511 | true, GFP_KERNEL); |
e8041cee | 1512 | break; |
99e126fd | 1513 | case NL80211_IFTYPE_ADHOC: |
fa0ecbb9 BZ |
1514 | return mwifiex_send_cmd(priv, HostCmd_CMD_802_11_AD_HOC_STOP, |
1515 | HostCmd_ACT_GEN_SET, 0, NULL, true); | |
26134e6e | 1516 | case NL80211_IFTYPE_AP: |
fa0ecbb9 BZ |
1517 | return mwifiex_send_cmd(priv, HostCmd_CMD_UAP_BSS_STOP, |
1518 | HostCmd_ACT_GEN_SET, 0, NULL, true); | |
99e126fd BZ |
1519 | default: |
1520 | break; | |
5e6e3a92 BZ |
1521 | } |
1522 | ||
e8041cee | 1523 | return ret; |
5e6e3a92 | 1524 | } |
848819f4 AK |
1525 | |
1526 | /* This function deauthenticates/disconnects from all BSS. */ | |
1527 | void mwifiex_deauthenticate_all(struct mwifiex_adapter *adapter) | |
1528 | { | |
1529 | struct mwifiex_private *priv; | |
1530 | int i; | |
1531 | ||
1532 | for (i = 0; i < adapter->priv_num; i++) { | |
1533 | priv = adapter->priv[i]; | |
1534 | if (priv) | |
1535 | mwifiex_deauthenticate(priv, NULL); | |
1536 | } | |
1537 | } | |
1538 | EXPORT_SYMBOL_GPL(mwifiex_deauthenticate_all); | |
5e6e3a92 BZ |
1539 | |
1540 | /* | |
1541 | * This function converts band to radio type used in channel TLV. | |
1542 | */ | |
1543 | u8 | |
1544 | mwifiex_band_to_radio_type(u8 band) | |
1545 | { | |
5e6e3a92 BZ |
1546 | switch (band) { |
1547 | case BAND_A: | |
1548 | case BAND_AN: | |
1549 | case BAND_A | BAND_AN: | |
a5f39056 | 1550 | case BAND_A | BAND_AN | BAND_AAC: |
636c4598 | 1551 | return HostCmd_SCAN_RADIO_TYPE_A; |
5e6e3a92 BZ |
1552 | case BAND_B: |
1553 | case BAND_G: | |
1554 | case BAND_B | BAND_G: | |
1555 | default: | |
636c4598 | 1556 | return HostCmd_SCAN_RADIO_TYPE_BG; |
5e6e3a92 | 1557 | } |
5e6e3a92 | 1558 | } |