mwifiex: add inactivity deauth support for ap
[deliverable/linux.git] / drivers / net / wireless / mwifiex / scan.c
CommitLineData
5e6e3a92
BZ
1/*
2 * Marvell Wireless LAN device driver: scan ioctl and command handling
3 *
4 * Copyright (C) 2011, Marvell International Ltd.
5 *
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
13 *
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
18 */
19
20#include "decl.h"
21#include "ioctl.h"
22#include "util.h"
23#include "fw.h"
24#include "main.h"
25#include "11n.h"
26#include "cfg80211.h"
27
28/* The maximum number of channels the firmware can scan per command */
29#define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
30
658f37b7
AK
31#define MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD 4
32#define MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD 15
33#define MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD 27
34#define MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD 35
5e6e3a92
BZ
35
36/* Memory needed to store a max sized Channel List TLV for a firmware scan */
37#define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
38 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
39 *sizeof(struct mwifiex_chan_scan_param_set)))
40
41/* Memory needed to store supported rate */
42#define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
43 + HOSTCMD_SUPPORTED_RATES)
44
45/* Memory needed to store a max number/size WildCard SSID TLV for a firmware
46 scan */
47#define WILDCARD_SSID_TLV_MAX_SIZE \
48 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
49 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
50 + IEEE80211_MAX_SSID_LEN))
51
52/* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
53#define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
54 + sizeof(struct mwifiex_ie_types_num_probes) \
55 + sizeof(struct mwifiex_ie_types_htcap) \
56 + CHAN_TLV_MAX_SIZE \
57 + RATE_TLV_MAX_SIZE \
58 + WILDCARD_SSID_TLV_MAX_SIZE)
59
60
61union mwifiex_scan_cmd_config_tlv {
62 /* Scan configuration (variable length) */
63 struct mwifiex_scan_cmd_config config;
64 /* Max allocated block */
65 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
66};
67
68enum cipher_suite {
69 CIPHER_SUITE_TKIP,
70 CIPHER_SUITE_CCMP,
71 CIPHER_SUITE_MAX
72};
73static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
74 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
75 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
76};
77static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
78 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
79 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
80};
81
82/*
83 * This function parses a given IE for a given OUI.
84 *
85 * This is used to parse a WPA/RSN IE to find if it has
86 * a given oui in PTK.
87 */
88static u8
89mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
90{
91 u8 count;
92
93 count = iebody->ptk_cnt[0];
94
95 /* There could be multiple OUIs for PTK hence
96 1) Take the length.
97 2) Check all the OUIs for AES.
98 3) If one of them is AES then pass success. */
99 while (count) {
100 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
101 return MWIFIEX_OUI_PRESENT;
102
103 --count;
104 if (count)
105 iebody = (struct ie_body *) ((u8 *) iebody +
106 sizeof(iebody->ptk_body));
107 }
108
109 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
110 return MWIFIEX_OUI_NOT_PRESENT;
111}
112
113/*
114 * This function checks if a given OUI is present in a RSN IE.
115 *
116 * The function first checks if a RSN IE is present or not in the
117 * BSS descriptor. It tries to locate the OUI only if such an IE is
118 * present.
119 */
120static u8
121mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
122{
270e58e8
YAP
123 u8 *oui;
124 struct ie_body *iebody;
5e6e3a92
BZ
125 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
126
127 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
128 ieee_hdr.element_id == WLAN_EID_RSN))) {
129 iebody = (struct ie_body *)
130 (((u8 *) bss_desc->bcn_rsn_ie->data) +
cff23cec 131 RSN_GTK_OUI_OFFSET);
5e6e3a92
BZ
132 oui = &mwifiex_rsn_oui[cipher][0];
133 ret = mwifiex_search_oui_in_ie(iebody, oui);
134 if (ret)
135 return ret;
136 }
137 return ret;
138}
139
140/*
141 * This function checks if a given OUI is present in a WPA IE.
142 *
143 * The function first checks if a WPA IE is present or not in the
144 * BSS descriptor. It tries to locate the OUI only if such an IE is
145 * present.
146 */
147static u8
148mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
149{
270e58e8
YAP
150 u8 *oui;
151 struct ie_body *iebody;
5e6e3a92
BZ
152 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
153
cff23cec
YAP
154 if (((bss_desc->bcn_wpa_ie) &&
155 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id ==
156 WLAN_EID_WPA))) {
5e6e3a92
BZ
157 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
158 oui = &mwifiex_wpa_oui[cipher][0];
159 ret = mwifiex_search_oui_in_ie(iebody, oui);
160 if (ret)
161 return ret;
162 }
163 return ret;
164}
165
166/*
167 * This function compares two SSIDs and checks if they match.
168 */
169s32
b9be5f39 170mwifiex_ssid_cmp(struct cfg80211_ssid *ssid1, struct cfg80211_ssid *ssid2)
5e6e3a92
BZ
171{
172 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
173 return -1;
174 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
175}
176
5e6e3a92
BZ
177/*
178 * This function checks if wapi is enabled in driver and scanned network is
179 * compatible with it.
180 */
181static bool
cff23cec
YAP
182mwifiex_is_bss_wapi(struct mwifiex_private *priv,
183 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92
BZ
184{
185 if (priv->sec_info.wapi_enabled &&
186 (bss_desc->bcn_wapi_ie &&
187 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
188 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
189 return true;
190 }
191 return false;
192}
193
194/*
195 * This function checks if driver is configured with no security mode and
196 * scanned network is compatible with it.
197 */
198static bool
cff23cec
YAP
199mwifiex_is_bss_no_sec(struct mwifiex_private *priv,
200 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 201{
5eb02e44
AK
202 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
203 !priv->sec_info.wpa2_enabled && ((!bss_desc->bcn_wpa_ie) ||
5e6e3a92 204 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
cff23cec
YAP
205 WLAN_EID_WPA)) &&
206 ((!bss_desc->bcn_rsn_ie) ||
5e6e3a92 207 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
cff23cec
YAP
208 WLAN_EID_RSN)) &&
209 !priv->sec_info.encryption_mode && !bss_desc->privacy) {
5e6e3a92
BZ
210 return true;
211 }
212 return false;
213}
214
215/*
216 * This function checks if static WEP is enabled in driver and scanned network
217 * is compatible with it.
218 */
219static bool
cff23cec
YAP
220mwifiex_is_bss_static_wep(struct mwifiex_private *priv,
221 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 222{
5eb02e44
AK
223 if (priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
224 !priv->sec_info.wpa2_enabled && bss_desc->privacy) {
5e6e3a92
BZ
225 return true;
226 }
227 return false;
228}
229
230/*
231 * This function checks if wpa is enabled in driver and scanned network is
232 * compatible with it.
233 */
234static bool
cff23cec
YAP
235mwifiex_is_bss_wpa(struct mwifiex_private *priv,
236 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 237{
5eb02e44
AK
238 if (!priv->sec_info.wep_enabled && priv->sec_info.wpa_enabled &&
239 !priv->sec_info.wpa2_enabled && ((bss_desc->bcn_wpa_ie) &&
240 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id == WLAN_EID_WPA))
5e6e3a92
BZ
241 /*
242 * Privacy bit may NOT be set in some APs like
243 * LinkSys WRT54G && bss_desc->privacy
244 */
245 ) {
7c6fa2a8 246 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
5e6e3a92 247 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
7c6fa2a8 248 "EncMode=%#x privacy=%#x\n", __func__,
5e6e3a92
BZ
249 (bss_desc->bcn_wpa_ie) ?
250 (*(bss_desc->bcn_wpa_ie)).
251 vend_hdr.element_id : 0,
252 (bss_desc->bcn_rsn_ie) ?
253 (*(bss_desc->bcn_rsn_ie)).
254 ieee_hdr.element_id : 0,
5eb02e44 255 (priv->sec_info.wep_enabled) ? "e" : "d",
5e6e3a92
BZ
256 (priv->sec_info.wpa_enabled) ? "e" : "d",
257 (priv->sec_info.wpa2_enabled) ? "e" : "d",
258 priv->sec_info.encryption_mode,
259 bss_desc->privacy);
260 return true;
261 }
262 return false;
263}
264
265/*
266 * This function checks if wpa2 is enabled in driver and scanned network is
267 * compatible with it.
268 */
269static bool
cff23cec
YAP
270mwifiex_is_bss_wpa2(struct mwifiex_private *priv,
271 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 272{
cff23cec
YAP
273 if (!priv->sec_info.wep_enabled &&
274 !priv->sec_info.wpa_enabled &&
275 priv->sec_info.wpa2_enabled &&
276 ((bss_desc->bcn_rsn_ie) &&
277 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id == WLAN_EID_RSN))) {
278 /*
279 * Privacy bit may NOT be set in some APs like
280 * LinkSys WRT54G && bss_desc->privacy
281 */
7c6fa2a8 282 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
5e6e3a92 283 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
7c6fa2a8 284 "EncMode=%#x privacy=%#x\n", __func__,
5e6e3a92
BZ
285 (bss_desc->bcn_wpa_ie) ?
286 (*(bss_desc->bcn_wpa_ie)).
287 vend_hdr.element_id : 0,
288 (bss_desc->bcn_rsn_ie) ?
289 (*(bss_desc->bcn_rsn_ie)).
290 ieee_hdr.element_id : 0,
5eb02e44 291 (priv->sec_info.wep_enabled) ? "e" : "d",
5e6e3a92
BZ
292 (priv->sec_info.wpa_enabled) ? "e" : "d",
293 (priv->sec_info.wpa2_enabled) ? "e" : "d",
294 priv->sec_info.encryption_mode,
295 bss_desc->privacy);
296 return true;
297 }
298 return false;
299}
300
301/*
302 * This function checks if adhoc AES is enabled in driver and scanned network is
303 * compatible with it.
304 */
305static bool
cff23cec
YAP
306mwifiex_is_bss_adhoc_aes(struct mwifiex_private *priv,
307 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 308{
5eb02e44 309 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
cff23cec
YAP
310 !priv->sec_info.wpa2_enabled &&
311 ((!bss_desc->bcn_wpa_ie) ||
312 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
313 ((!bss_desc->bcn_rsn_ie) ||
314 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
315 !priv->sec_info.encryption_mode && bss_desc->privacy) {
5e6e3a92
BZ
316 return true;
317 }
318 return false;
319}
320
321/*
322 * This function checks if dynamic WEP is enabled in driver and scanned network
323 * is compatible with it.
324 */
325static bool
cff23cec
YAP
326mwifiex_is_bss_dynamic_wep(struct mwifiex_private *priv,
327 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 328{
5eb02e44 329 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
cff23cec
YAP
330 !priv->sec_info.wpa2_enabled &&
331 ((!bss_desc->bcn_wpa_ie) ||
332 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id != WLAN_EID_WPA)) &&
333 ((!bss_desc->bcn_rsn_ie) ||
334 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
335 priv->sec_info.encryption_mode && bss_desc->privacy) {
5e6e3a92 336 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
7c6fa2a8 337 "WEP: wpa_ie=%#x wpa2_ie=%#x "
5e6e3a92 338 "EncMode=%#x privacy=%#x\n",
7c6fa2a8 339 __func__,
5e6e3a92
BZ
340 (bss_desc->bcn_wpa_ie) ?
341 (*(bss_desc->bcn_wpa_ie)).
342 vend_hdr.element_id : 0,
343 (bss_desc->bcn_rsn_ie) ?
344 (*(bss_desc->bcn_rsn_ie)).
345 ieee_hdr.element_id : 0,
346 priv->sec_info.encryption_mode,
347 bss_desc->privacy);
348 return true;
349 }
350 return false;
351}
352
353/*
354 * This function checks if a scanned network is compatible with the driver
355 * settings.
356 *
357 * WEP WPA WPA2 ad-hoc encrypt Network
358 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
359 * 0 0 0 0 NONE 0 0 0 yes No security
360 * 0 1 0 0 x 1x 1 x yes WPA (disable
361 * HT if no AES)
362 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
363 * HT if no AES)
364 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
365 * 1 0 0 0 NONE 1 0 0 yes Static WEP
366 * (disable HT)
367 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
368 *
369 * Compatibility is not matched while roaming, except for mode.
370 */
371static s32
7c6fa2a8
AK
372mwifiex_is_network_compatible(struct mwifiex_private *priv,
373 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
5e6e3a92
BZ
374{
375 struct mwifiex_adapter *adapter = priv->adapter;
5e6e3a92 376
5e6e3a92
BZ
377 bss_desc->disable_11n = false;
378
379 /* Don't check for compatibility if roaming */
cff23cec
YAP
380 if (priv->media_connected &&
381 (priv->bss_mode == NL80211_IFTYPE_STATION) &&
382 (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
7c6fa2a8 383 return 0;
5e6e3a92
BZ
384
385 if (priv->wps.session_enable) {
386 dev_dbg(adapter->dev,
387 "info: return success directly in WPS period\n");
7c6fa2a8 388 return 0;
5e6e3a92
BZ
389 }
390
cff23cec 391 if (mwifiex_is_bss_wapi(priv, bss_desc)) {
5e6e3a92 392 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
7c6fa2a8 393 return 0;
5e6e3a92
BZ
394 }
395
396 if (bss_desc->bss_mode == mode) {
cff23cec 397 if (mwifiex_is_bss_no_sec(priv, bss_desc)) {
5e6e3a92 398 /* No security */
7c6fa2a8 399 return 0;
cff23cec 400 } else if (mwifiex_is_bss_static_wep(priv, bss_desc)) {
5e6e3a92
BZ
401 /* Static WEP enabled */
402 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
403 bss_desc->disable_11n = true;
7c6fa2a8 404 return 0;
cff23cec 405 } else if (mwifiex_is_bss_wpa(priv, bss_desc)) {
5e6e3a92 406 /* WPA enabled */
cff23cec
YAP
407 if (((priv->adapter->config_bands & BAND_GN ||
408 priv->adapter->config_bands & BAND_AN) &&
409 bss_desc->bcn_ht_cap) &&
410 !mwifiex_is_wpa_oui_present(bss_desc,
411 CIPHER_SUITE_CCMP)) {
412
413 if (mwifiex_is_wpa_oui_present
414 (bss_desc, CIPHER_SUITE_TKIP)) {
5e6e3a92
BZ
415 dev_dbg(adapter->dev,
416 "info: Disable 11n if AES "
417 "is not supported by AP\n");
418 bss_desc->disable_11n = true;
419 } else {
420 return -1;
421 }
422 }
7c6fa2a8 423 return 0;
cff23cec 424 } else if (mwifiex_is_bss_wpa2(priv, bss_desc)) {
5e6e3a92 425 /* WPA2 enabled */
cff23cec
YAP
426 if (((priv->adapter->config_bands & BAND_GN ||
427 priv->adapter->config_bands & BAND_AN) &&
428 bss_desc->bcn_ht_cap) &&
429 !mwifiex_is_rsn_oui_present(bss_desc,
430 CIPHER_SUITE_CCMP)) {
431
432 if (mwifiex_is_rsn_oui_present
433 (bss_desc, CIPHER_SUITE_TKIP)) {
5e6e3a92
BZ
434 dev_dbg(adapter->dev,
435 "info: Disable 11n if AES "
436 "is not supported by AP\n");
437 bss_desc->disable_11n = true;
438 } else {
439 return -1;
440 }
441 }
7c6fa2a8 442 return 0;
cff23cec 443 } else if (mwifiex_is_bss_adhoc_aes(priv, bss_desc)) {
5e6e3a92 444 /* Ad-hoc AES enabled */
7c6fa2a8 445 return 0;
cff23cec 446 } else if (mwifiex_is_bss_dynamic_wep(priv, bss_desc)) {
5e6e3a92 447 /* Dynamic WEP enabled */
7c6fa2a8 448 return 0;
5e6e3a92
BZ
449 }
450
451 /* Security doesn't match */
cff23cec
YAP
452 dev_dbg(adapter->dev,
453 "info: %s: failed: wpa_ie=%#x wpa2_ie=%#x WEP=%s "
454 "WPA=%s WPA2=%s EncMode=%#x privacy=%#x\n", __func__,
455 (bss_desc->bcn_wpa_ie) ?
456 (*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id : 0,
457 (bss_desc->bcn_rsn_ie) ?
458 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id : 0,
459 (priv->sec_info.wep_enabled) ? "e" : "d",
460 (priv->sec_info.wpa_enabled) ? "e" : "d",
461 (priv->sec_info.wpa2_enabled) ? "e" : "d",
462 priv->sec_info.encryption_mode, bss_desc->privacy);
5e6e3a92
BZ
463 return -1;
464 }
465
466 /* Mode doesn't match */
467 return -1;
468}
469
5e6e3a92
BZ
470/*
471 * This function creates a channel list for the driver to scan, based
472 * on region/band information.
473 *
474 * This routine is used for any scan that is not provided with a
475 * specific channel list to scan.
476 */
658f37b7 477static int
5e6e3a92 478mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
cff23cec
YAP
479 const struct mwifiex_user_scan_cfg
480 *user_scan_in,
481 struct mwifiex_chan_scan_param_set
482 *scan_chan_list,
483 u8 filtered_scan)
5e6e3a92
BZ
484{
485 enum ieee80211_band band;
486 struct ieee80211_supported_band *sband;
487 struct ieee80211_channel *ch;
488 struct mwifiex_adapter *adapter = priv->adapter;
489 int chan_idx = 0, i;
5e6e3a92
BZ
490
491 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
492
493 if (!priv->wdev->wiphy->bands[band])
494 continue;
495
496 sband = priv->wdev->wiphy->bands[band];
497
d06b7b9e 498 for (i = 0; (i < sband->n_channels) ; i++) {
5e6e3a92
BZ
499 ch = &sband->channels[i];
500 if (ch->flags & IEEE80211_CHAN_DISABLED)
501 continue;
502 scan_chan_list[chan_idx].radio_type = band;
186630c2 503
5e6e3a92 504 if (user_scan_in &&
cff23cec 505 user_scan_in->chan_list[0].scan_time)
5e6e3a92
BZ
506 scan_chan_list[chan_idx].max_scan_time =
507 cpu_to_le16((u16) user_scan_in->
508 chan_list[0].scan_time);
186630c2 509 else if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
5e6e3a92
BZ
510 scan_chan_list[chan_idx].max_scan_time =
511 cpu_to_le16(adapter->passive_scan_time);
512 else
513 scan_chan_list[chan_idx].max_scan_time =
514 cpu_to_le16(adapter->active_scan_time);
186630c2
AK
515
516 if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
5e6e3a92
BZ
517 scan_chan_list[chan_idx].chan_scan_mode_bitmap
518 |= MWIFIEX_PASSIVE_SCAN;
519 else
520 scan_chan_list[chan_idx].chan_scan_mode_bitmap
521 &= ~MWIFIEX_PASSIVE_SCAN;
522 scan_chan_list[chan_idx].chan_number =
523 (u32) ch->hw_value;
524 if (filtered_scan) {
525 scan_chan_list[chan_idx].max_scan_time =
526 cpu_to_le16(adapter->specific_scan_time);
527 scan_chan_list[chan_idx].chan_scan_mode_bitmap
528 |= MWIFIEX_DISABLE_CHAN_FILT;
529 }
d06b7b9e 530 chan_idx++;
5e6e3a92
BZ
531 }
532
533 }
658f37b7 534 return chan_idx;
5e6e3a92
BZ
535}
536
537/*
538 * This function constructs and sends multiple scan config commands to
539 * the firmware.
540 *
541 * Previous routines in the code flow have created a scan command configuration
542 * with any requested TLVs. This function splits the channel TLV into maximum
543 * channels supported per scan lists and sends the portion of the channel TLV,
544 * along with the other TLVs, to the firmware.
545 */
546static int
600f5d90 547mwifiex_scan_channel_list(struct mwifiex_private *priv,
5e6e3a92
BZ
548 u32 max_chan_per_scan, u8 filtered_scan,
549 struct mwifiex_scan_cmd_config *scan_cfg_out,
550 struct mwifiex_ie_types_chan_list_param_set
551 *chan_tlv_out,
552 struct mwifiex_chan_scan_param_set *scan_chan_list)
553{
554 int ret = 0;
555 struct mwifiex_chan_scan_param_set *tmp_chan_list;
556 struct mwifiex_chan_scan_param_set *start_chan;
557
558 u32 tlv_idx;
559 u32 total_scan_time;
560 u32 done_early;
561
562 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
563 dev_dbg(priv->adapter->dev,
564 "info: Scan: Null detect: %p, %p, %p\n",
565 scan_cfg_out, chan_tlv_out, scan_chan_list);
566 return -1;
567 }
568
569 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
570
571 /* Set the temp channel struct pointer to the start of the desired
572 list */
573 tmp_chan_list = scan_chan_list;
574
575 /* Loop through the desired channel list, sending a new firmware scan
576 commands for each max_chan_per_scan channels (or for 1,6,11
577 individually if configured accordingly) */
578 while (tmp_chan_list->chan_number) {
579
580 tlv_idx = 0;
581 total_scan_time = 0;
582 chan_tlv_out->header.len = 0;
583 start_chan = tmp_chan_list;
584 done_early = false;
585
586 /*
587 * Construct the Channel TLV for the scan command. Continue to
588 * insert channel TLVs until:
589 * - the tlv_idx hits the maximum configured per scan command
590 * - the next channel to insert is 0 (end of desired channel
591 * list)
592 * - done_early is set (controlling individual scanning of
593 * 1,6,11)
594 */
cff23cec
YAP
595 while (tlv_idx < max_chan_per_scan &&
596 tmp_chan_list->chan_number && !done_early) {
5e6e3a92
BZ
597
598 dev_dbg(priv->adapter->dev,
599 "info: Scan: Chan(%3d), Radio(%d),"
600 " Mode(%d, %d), Dur(%d)\n",
cff23cec
YAP
601 tmp_chan_list->chan_number,
602 tmp_chan_list->radio_type,
603 tmp_chan_list->chan_scan_mode_bitmap
604 & MWIFIEX_PASSIVE_SCAN,
605 (tmp_chan_list->chan_scan_mode_bitmap
606 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
607 le16_to_cpu(tmp_chan_list->max_scan_time));
5e6e3a92
BZ
608
609 /* Copy the current channel TLV to the command being
610 prepared */
611 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
612 tmp_chan_list,
613 sizeof(chan_tlv_out->chan_scan_param));
614
615 /* Increment the TLV header length by the size
616 appended */
617 chan_tlv_out->header.len =
618 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
619 (sizeof(chan_tlv_out->chan_scan_param)));
620
621 /*
622 * The tlv buffer length is set to the number of bytes
623 * of the between the channel tlv pointer and the start
624 * of the tlv buffer. This compensates for any TLVs
625 * that were appended before the channel list.
626 */
627 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
628 scan_cfg_out->tlv_buf);
629
630 /* Add the size of the channel tlv header and the data
631 length */
632 scan_cfg_out->tlv_buf_len +=
633 (sizeof(chan_tlv_out->header)
634 + le16_to_cpu(chan_tlv_out->header.len));
635
636 /* Increment the index to the channel tlv we are
637 constructing */
638 tlv_idx++;
639
640 /* Count the total scan time per command */
641 total_scan_time +=
642 le16_to_cpu(tmp_chan_list->max_scan_time);
643
644 done_early = false;
645
646 /* Stop the loop if the *current* channel is in the
647 1,6,11 set and we are not filtering on a BSSID
648 or SSID. */
cff23cec
YAP
649 if (!filtered_scan &&
650 (tmp_chan_list->chan_number == 1 ||
651 tmp_chan_list->chan_number == 6 ||
652 tmp_chan_list->chan_number == 11))
5e6e3a92
BZ
653 done_early = true;
654
655 /* Increment the tmp pointer to the next channel to
656 be scanned */
657 tmp_chan_list++;
658
659 /* Stop the loop if the *next* channel is in the 1,6,11
660 set. This will cause it to be the only channel
661 scanned on the next interation */
cff23cec
YAP
662 if (!filtered_scan &&
663 (tmp_chan_list->chan_number == 1 ||
664 tmp_chan_list->chan_number == 6 ||
665 tmp_chan_list->chan_number == 11))
5e6e3a92
BZ
666 done_early = true;
667 }
668
669 /* The total scan time should be less than scan command timeout
670 value */
671 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
672 dev_err(priv->adapter->dev, "total scan time %dms"
673 " is over limit (%dms), scan skipped\n",
674 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
675 ret = -1;
676 break;
677 }
678
679 priv->adapter->scan_channels = start_chan;
680
681 /* Send the scan command to the firmware with the specified
682 cfg */
600f5d90
AK
683 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
684 HostCmd_ACT_GEN_SET, 0,
685 scan_cfg_out);
5e6e3a92
BZ
686 if (ret)
687 break;
688 }
689
690 if (ret)
691 return -1;
692
693 return 0;
694}
695
696/*
697 * This function constructs a scan command configuration structure to use
698 * in scan commands.
699 *
700 * Application layer or other functions can invoke network scanning
701 * with a scan configuration supplied in a user scan configuration structure.
702 * This structure is used as the basis of one or many scan command configuration
703 * commands that are sent to the command processing module and eventually to the
704 * firmware.
705 *
706 * This function creates a scan command configuration structure based on the
707 * following user supplied parameters (if present):
708 * - SSID filter
709 * - BSSID filter
710 * - Number of Probes to be sent
711 * - Channel list
712 *
713 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
714 * If the number of probes is not set, adapter default setting is used.
715 */
716static void
cff23cec
YAP
717mwifiex_config_scan(struct mwifiex_private *priv,
718 const struct mwifiex_user_scan_cfg *user_scan_in,
719 struct mwifiex_scan_cmd_config *scan_cfg_out,
720 struct mwifiex_ie_types_chan_list_param_set **chan_list_out,
721 struct mwifiex_chan_scan_param_set *scan_chan_list,
722 u8 *max_chan_per_scan, u8 *filtered_scan,
723 u8 *scan_current_only)
5e6e3a92
BZ
724{
725 struct mwifiex_adapter *adapter = priv->adapter;
726 struct mwifiex_ie_types_num_probes *num_probes_tlv;
727 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
728 struct mwifiex_ie_types_rates_param_set *rates_tlv;
5e6e3a92
BZ
729 u8 *tlv_pos;
730 u32 num_probes;
731 u32 ssid_len;
732 u32 chan_idx;
658f37b7 733 u32 chan_num;
5e6e3a92
BZ
734 u32 scan_type;
735 u16 scan_dur;
736 u8 channel;
737 u8 radio_type;
be0b281e 738 int i;
5e6e3a92
BZ
739 u8 ssid_filter;
740 u8 rates[MWIFIEX_SUPPORTED_RATES];
741 u32 rates_size;
742 struct mwifiex_ie_types_htcap *ht_cap;
743
744 /* The tlv_buf_len is calculated for each scan command. The TLVs added
745 in this routine will be preserved since the routine that sends the
746 command will append channelTLVs at *chan_list_out. The difference
747 between the *chan_list_out and the tlv_buf start will be used to
748 calculate the size of anything we add in this routine. */
749 scan_cfg_out->tlv_buf_len = 0;
750
751 /* Running tlv pointer. Assigned to chan_list_out at end of function
752 so later routines know where channels can be added to the command
753 buf */
754 tlv_pos = scan_cfg_out->tlv_buf;
755
756 /* Initialize the scan as un-filtered; the flag is later set to TRUE
757 below if a SSID or BSSID filter is sent in the command */
758 *filtered_scan = false;
759
760 /* Initialize the scan as not being only on the current channel. If
761 the channel list is customized, only contains one channel, and is
762 the active channel, this is set true and data flow is not halted. */
763 *scan_current_only = false;
764
765 if (user_scan_in) {
766
767 /* Default the ssid_filter flag to TRUE, set false under
768 certain wildcard conditions and qualified by the existence
769 of an SSID list before marking the scan as filtered */
770 ssid_filter = true;
771
772 /* Set the BSS type scan filter, use Adapter setting if
773 unset */
774 scan_cfg_out->bss_mode =
775 (user_scan_in->bss_mode ? (u8) user_scan_in->
776 bss_mode : (u8) adapter->scan_mode);
777
778 /* Set the number of probes to send, use Adapter setting
779 if unset */
780 num_probes =
781 (user_scan_in->num_probes ? user_scan_in->
782 num_probes : adapter->scan_probes);
783
784 /*
785 * Set the BSSID filter to the incoming configuration,
786 * if non-zero. If not set, it will remain disabled
787 * (all zeros).
788 */
789 memcpy(scan_cfg_out->specific_bssid,
790 user_scan_in->specific_bssid,
791 sizeof(scan_cfg_out->specific_bssid));
792
be0b281e
AK
793 for (i = 0; i < user_scan_in->num_ssids; i++) {
794 ssid_len = user_scan_in->ssid_list[i].ssid_len;
5e6e3a92
BZ
795
796 wildcard_ssid_tlv =
797 (struct mwifiex_ie_types_wildcard_ssid_params *)
798 tlv_pos;
799 wildcard_ssid_tlv->header.type =
800 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
801 wildcard_ssid_tlv->header.len = cpu_to_le16(
802 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
803 max_ssid_length)));
fada1058 804
be0b281e
AK
805 /*
806 * max_ssid_length = 0 tells firmware to perform
807 * specific scan for the SSID filled, whereas
808 * max_ssid_length = IEEE80211_MAX_SSID_LEN is for
809 * wildcard scan.
810 */
811 if (ssid_len)
812 wildcard_ssid_tlv->max_ssid_length = 0;
813 else
814 wildcard_ssid_tlv->max_ssid_length =
815 IEEE80211_MAX_SSID_LEN;
5e6e3a92
BZ
816
817 memcpy(wildcard_ssid_tlv->ssid,
be0b281e 818 user_scan_in->ssid_list[i].ssid, ssid_len);
5e6e3a92
BZ
819
820 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
821 + le16_to_cpu(wildcard_ssid_tlv->header.len));
822
be0b281e
AK
823 dev_dbg(adapter->dev, "info: scan: ssid[%d]: %s, %d\n",
824 i, wildcard_ssid_tlv->ssid,
5e6e3a92
BZ
825 wildcard_ssid_tlv->max_ssid_length);
826
827 /* Empty wildcard ssid with a maxlen will match many or
828 potentially all SSIDs (maxlen == 32), therefore do
829 not treat the scan as
830 filtered. */
831 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
832 ssid_filter = false;
5e6e3a92
BZ
833 }
834
835 /*
836 * The default number of channels sent in the command is low to
837 * ensure the response buffer from the firmware does not
838 * truncate scan results. That is not an issue with an SSID
839 * or BSSID filter applied to the scan results in the firmware.
840 */
cff23cec 841 if ((i && ssid_filter) ||
84f6a95a 842 !is_zero_ether_addr(scan_cfg_out->specific_bssid))
5e6e3a92
BZ
843 *filtered_scan = true;
844 } else {
845 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
846 num_probes = adapter->scan_probes;
847 }
848
849 /*
850 * If a specific BSSID or SSID is used, the number of channels in the
851 * scan command will be increased to the absolute maximum.
852 */
853 if (*filtered_scan)
854 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
855 else
658f37b7 856 *max_chan_per_scan = MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD;
5e6e3a92
BZ
857
858 /* If the input config or adapter has the number of Probes set,
859 add tlv */
860 if (num_probes) {
861
862 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
cff23cec 863 num_probes);
5e6e3a92
BZ
864
865 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
866 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
867 num_probes_tlv->header.len =
868 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
869 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
870
871 tlv_pos += sizeof(num_probes_tlv->header) +
872 le16_to_cpu(num_probes_tlv->header.len);
873
874 }
875
876 /* Append rates tlv */
877 memset(rates, 0, sizeof(rates));
878
879 rates_size = mwifiex_get_supported_rates(priv, rates);
880
881 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
882 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
883 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
884 memcpy(rates_tlv->rates, rates, rates_size);
885 tlv_pos += sizeof(rates_tlv->header) + rates_size;
886
887 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
888
cff23cec
YAP
889 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info) &&
890 (priv->adapter->config_bands & BAND_GN ||
891 priv->adapter->config_bands & BAND_AN)) {
5e6e3a92
BZ
892 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
893 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
894 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
895 ht_cap->header.len =
896 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
a46b7b5c
AK
897 radio_type =
898 mwifiex_band_to_radio_type(priv->adapter->config_bands);
899 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
5e6e3a92
BZ
900 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
901 }
902
903 /* Append vendor specific IE TLV */
904 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
905
906 /*
907 * Set the output for the channel TLV to the address in the tlv buffer
908 * past any TLVs that were added in this function (SSID, num_probes).
909 * Channel TLVs will be added past this for each scan command,
910 * preserving the TLVs that were previously added.
911 */
912 *chan_list_out =
913 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
914
915 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
916
917 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
918
919 for (chan_idx = 0;
cff23cec
YAP
920 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX &&
921 user_scan_in->chan_list[chan_idx].chan_number;
5e6e3a92
BZ
922 chan_idx++) {
923
924 channel = user_scan_in->chan_list[chan_idx].chan_number;
925 (scan_chan_list + chan_idx)->chan_number = channel;
926
927 radio_type =
928 user_scan_in->chan_list[chan_idx].radio_type;
929 (scan_chan_list + chan_idx)->radio_type = radio_type;
930
931 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
932
933 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
934 (scan_chan_list +
935 chan_idx)->chan_scan_mode_bitmap
936 |= MWIFIEX_PASSIVE_SCAN;
937 else
938 (scan_chan_list +
939 chan_idx)->chan_scan_mode_bitmap
940 &= ~MWIFIEX_PASSIVE_SCAN;
941
942 if (user_scan_in->chan_list[chan_idx].scan_time) {
943 scan_dur = (u16) user_scan_in->
944 chan_list[chan_idx].scan_time;
945 } else {
946 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
947 scan_dur = adapter->passive_scan_time;
948 else if (*filtered_scan)
949 scan_dur = adapter->specific_scan_time;
950 else
951 scan_dur = adapter->active_scan_time;
952 }
953
954 (scan_chan_list + chan_idx)->min_scan_time =
955 cpu_to_le16(scan_dur);
956 (scan_chan_list + chan_idx)->max_scan_time =
957 cpu_to_le16(scan_dur);
958 }
959
960 /* Check if we are only scanning the current channel */
cff23cec
YAP
961 if ((chan_idx == 1) &&
962 (user_scan_in->chan_list[0].chan_number ==
963 priv->curr_bss_params.bss_descriptor.channel)) {
5e6e3a92
BZ
964 *scan_current_only = true;
965 dev_dbg(adapter->dev,
966 "info: Scan: Scanning current channel only\n");
967 }
658f37b7 968 chan_num = chan_idx;
5e6e3a92
BZ
969 } else {
970 dev_dbg(adapter->dev,
cff23cec 971 "info: Scan: Creating full region channel list\n");
658f37b7
AK
972 chan_num = mwifiex_scan_create_channel_list(priv, user_scan_in,
973 scan_chan_list,
974 *filtered_scan);
975 }
976
977 /*
978 * In associated state we will reduce the number of channels scanned per
979 * scan command to avoid any traffic delay/loss. This number is decided
980 * based on total number of channels to be scanned due to constraints
981 * of command buffers.
982 */
983 if (priv->media_connected) {
984 if (chan_num < MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD)
985 *max_chan_per_scan = 1;
986 else if (chan_num < MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD)
987 *max_chan_per_scan = 2;
988 else if (chan_num < MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD)
989 *max_chan_per_scan = 3;
b7525dbd
AK
990 else
991 *max_chan_per_scan = 4;
5e6e3a92
BZ
992 }
993}
994
995/*
996 * This function inspects the scan response buffer for pointers to
997 * expected TLVs.
998 *
999 * TLVs can be included at the end of the scan response BSS information.
1000 *
1001 * Data in the buffer is parsed pointers to TLVs that can potentially
1002 * be passed back in the response.
1003 */
1004static void
1005mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
1006 struct mwifiex_ie_types_data *tlv,
1007 u32 tlv_buf_size, u32 req_tlv_type,
1008 struct mwifiex_ie_types_data **tlv_data)
1009{
1010 struct mwifiex_ie_types_data *current_tlv;
1011 u32 tlv_buf_left;
1012 u32 tlv_type;
1013 u32 tlv_len;
1014
1015 current_tlv = tlv;
1016 tlv_buf_left = tlv_buf_size;
1017 *tlv_data = NULL;
1018
1019 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
cff23cec 1020 tlv_buf_size);
5e6e3a92
BZ
1021
1022 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1023
1024 tlv_type = le16_to_cpu(current_tlv->header.type);
1025 tlv_len = le16_to_cpu(current_tlv->header.len);
1026
1027 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1028 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1029 break;
1030 }
1031
1032 if (req_tlv_type == tlv_type) {
1033 switch (tlv_type) {
1034 case TLV_TYPE_TSFTIMESTAMP:
1035 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1036 "timestamp TLV, len = %d\n", tlv_len);
2c208890 1037 *tlv_data = current_tlv;
5e6e3a92
BZ
1038 break;
1039 case TLV_TYPE_CHANNELBANDLIST:
1040 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1041 " band list TLV, len = %d\n", tlv_len);
2c208890 1042 *tlv_data = current_tlv;
5e6e3a92
BZ
1043 break;
1044 default:
1045 dev_err(adapter->dev,
1046 "SCAN_RESP: unhandled TLV = %d\n",
1047 tlv_type);
1048 /* Give up, this seems corrupted */
1049 return;
1050 }
1051 }
1052
1053 if (*tlv_data)
1054 break;
1055
1056
1057 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1058 current_tlv =
1059 (struct mwifiex_ie_types_data *) (current_tlv->data +
1060 tlv_len);
1061
1062 } /* while */
1063}
1064
1065/*
7c6fa2a8
AK
1066 * This function parses provided beacon buffer and updates
1067 * respective fields in bss descriptor structure.
5e6e3a92 1068 */
9558a407
AK
1069int mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1070 struct mwifiex_bssdescriptor *bss_entry)
5e6e3a92
BZ
1071{
1072 int ret = 0;
1073 u8 element_id;
1074 struct ieee_types_fh_param_set *fh_param_set;
1075 struct ieee_types_ds_param_set *ds_param_set;
1076 struct ieee_types_cf_param_set *cf_param_set;
1077 struct ieee_types_ibss_param_set *ibss_param_set;
5e6e3a92
BZ
1078 u8 *current_ptr;
1079 u8 *rate;
1080 u8 element_len;
1081 u16 total_ie_len;
1082 u8 bytes_to_copy;
1083 u8 rate_size;
5e6e3a92 1084 u8 found_data_rate_ie;
7c6fa2a8 1085 u32 bytes_left;
5e6e3a92
BZ
1086 struct ieee_types_vendor_specific *vendor_ie;
1087 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1088 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1089
1090 found_data_rate_ie = false;
1091 rate_size = 0;
9558a407
AK
1092 current_ptr = bss_entry->beacon_buf;
1093 bytes_left = bss_entry->beacon_buf_size;
5e6e3a92
BZ
1094
1095 /* Process variable IE */
7c6fa2a8 1096 while (bytes_left >= 2) {
5e6e3a92
BZ
1097 element_id = *current_ptr;
1098 element_len = *(current_ptr + 1);
1099 total_ie_len = element_len + sizeof(struct ieee_types_header);
1100
7c6fa2a8 1101 if (bytes_left < total_ie_len) {
5e6e3a92
BZ
1102 dev_err(adapter->dev, "err: InterpretIE: in processing"
1103 " IE, bytes left < IE length\n");
7c6fa2a8 1104 return -1;
5e6e3a92
BZ
1105 }
1106 switch (element_id) {
1107 case WLAN_EID_SSID:
1108 bss_entry->ssid.ssid_len = element_len;
1109 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1110 element_len);
cff23cec
YAP
1111 dev_dbg(adapter->dev,
1112 "info: InterpretIE: ssid: %-32s\n",
1113 bss_entry->ssid.ssid);
5e6e3a92
BZ
1114 break;
1115
1116 case WLAN_EID_SUPP_RATES:
1117 memcpy(bss_entry->data_rates, current_ptr + 2,
1118 element_len);
1119 memcpy(bss_entry->supported_rates, current_ptr + 2,
1120 element_len);
1121 rate_size = element_len;
1122 found_data_rate_ie = true;
1123 break;
1124
1125 case WLAN_EID_FH_PARAMS:
1126 fh_param_set =
1127 (struct ieee_types_fh_param_set *) current_ptr;
1128 memcpy(&bss_entry->phy_param_set.fh_param_set,
1129 fh_param_set,
1130 sizeof(struct ieee_types_fh_param_set));
1131 break;
1132
1133 case WLAN_EID_DS_PARAMS:
1134 ds_param_set =
1135 (struct ieee_types_ds_param_set *) current_ptr;
1136
1137 bss_entry->channel = ds_param_set->current_chan;
1138
1139 memcpy(&bss_entry->phy_param_set.ds_param_set,
1140 ds_param_set,
1141 sizeof(struct ieee_types_ds_param_set));
1142 break;
1143
1144 case WLAN_EID_CF_PARAMS:
1145 cf_param_set =
1146 (struct ieee_types_cf_param_set *) current_ptr;
1147 memcpy(&bss_entry->ss_param_set.cf_param_set,
1148 cf_param_set,
1149 sizeof(struct ieee_types_cf_param_set));
1150 break;
1151
1152 case WLAN_EID_IBSS_PARAMS:
1153 ibss_param_set =
1154 (struct ieee_types_ibss_param_set *)
1155 current_ptr;
1156 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1157 ibss_param_set,
1158 sizeof(struct ieee_types_ibss_param_set));
1159 break;
1160
1161 case WLAN_EID_ERP_INFO:
1162 bss_entry->erp_flags = *(current_ptr + 2);
1163 break;
1164
1165 case WLAN_EID_EXT_SUPP_RATES:
1166 /*
1167 * Only process extended supported rate
1168 * if data rate is already found.
1169 * Data rate IE should come before
1170 * extended supported rate IE
1171 */
1172 if (found_data_rate_ie) {
1173 if ((element_len + rate_size) >
1174 MWIFIEX_SUPPORTED_RATES)
1175 bytes_to_copy =
1176 (MWIFIEX_SUPPORTED_RATES -
1177 rate_size);
1178 else
1179 bytes_to_copy = element_len;
1180
1181 rate = (u8 *) bss_entry->data_rates;
1182 rate += rate_size;
1183 memcpy(rate, current_ptr + 2, bytes_to_copy);
1184
1185 rate = (u8 *) bss_entry->supported_rates;
1186 rate += rate_size;
1187 memcpy(rate, current_ptr + 2, bytes_to_copy);
1188 }
1189 break;
1190
1191 case WLAN_EID_VENDOR_SPECIFIC:
1192 vendor_ie = (struct ieee_types_vendor_specific *)
1193 current_ptr;
1194
1195 if (!memcmp
1196 (vendor_ie->vend_hdr.oui, wpa_oui,
1197 sizeof(wpa_oui))) {
1198 bss_entry->bcn_wpa_ie =
1199 (struct ieee_types_vendor_specific *)
1200 current_ptr;
cff23cec
YAP
1201 bss_entry->wpa_offset = (u16)
1202 (current_ptr - bss_entry->beacon_buf);
5e6e3a92
BZ
1203 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1204 sizeof(wmm_oui))) {
1205 if (total_ie_len ==
cff23cec
YAP
1206 sizeof(struct ieee_types_wmm_parameter) ||
1207 total_ie_len ==
5e6e3a92
BZ
1208 sizeof(struct ieee_types_wmm_info))
1209 /*
1210 * Only accept and copy the WMM IE if
1211 * it matches the size expected for the
1212 * WMM Info IE or the WMM Parameter IE.
1213 */
1214 memcpy((u8 *) &bss_entry->wmm_ie,
1215 current_ptr, total_ie_len);
1216 }
1217 break;
1218 case WLAN_EID_RSN:
1219 bss_entry->bcn_rsn_ie =
1220 (struct ieee_types_generic *) current_ptr;
1221 bss_entry->rsn_offset = (u16) (current_ptr -
1222 bss_entry->beacon_buf);
1223 break;
1224 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1225 bss_entry->bcn_wapi_ie =
1226 (struct ieee_types_generic *) current_ptr;
1227 bss_entry->wapi_offset = (u16) (current_ptr -
1228 bss_entry->beacon_buf);
1229 break;
1230 case WLAN_EID_HT_CAPABILITY:
1231 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1232 (current_ptr +
1233 sizeof(struct ieee_types_header));
1234 bss_entry->ht_cap_offset = (u16) (current_ptr +
1235 sizeof(struct ieee_types_header) -
1236 bss_entry->beacon_buf);
1237 break;
074d46d1
JB
1238 case WLAN_EID_HT_OPERATION:
1239 bss_entry->bcn_ht_oper =
1240 (struct ieee80211_ht_operation *)(current_ptr +
5e6e3a92
BZ
1241 sizeof(struct ieee_types_header));
1242 bss_entry->ht_info_offset = (u16) (current_ptr +
1243 sizeof(struct ieee_types_header) -
1244 bss_entry->beacon_buf);
1245 break;
1246 case WLAN_EID_BSS_COEX_2040:
2c208890
JP
1247 bss_entry->bcn_bss_co_2040 = current_ptr +
1248 sizeof(struct ieee_types_header);
5e6e3a92
BZ
1249 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1250 sizeof(struct ieee_types_header) -
1251 bss_entry->beacon_buf);
1252 break;
1253 case WLAN_EID_EXT_CAPABILITY:
2c208890
JP
1254 bss_entry->bcn_ext_cap = current_ptr +
1255 sizeof(struct ieee_types_header);
5e6e3a92
BZ
1256 bss_entry->ext_cap_offset = (u16) (current_ptr +
1257 sizeof(struct ieee_types_header) -
1258 bss_entry->beacon_buf);
1259 break;
5e6e3a92
BZ
1260 default:
1261 break;
1262 }
1263
1264 current_ptr += element_len + 2;
1265
1266 /* Need to account for IE ID and IE Len */
7c6fa2a8 1267 bytes_left -= (element_len + 2);
5e6e3a92 1268
7c6fa2a8 1269 } /* while (bytes_left > 2) */
5e6e3a92
BZ
1270 return ret;
1271}
1272
5e6e3a92
BZ
1273/*
1274 * This function converts radio type scan parameter to a band configuration
1275 * to be used in join command.
1276 */
1277static u8
1278mwifiex_radio_type_to_band(u8 radio_type)
1279{
5e6e3a92
BZ
1280 switch (radio_type) {
1281 case HostCmd_SCAN_RADIO_TYPE_A:
636c4598 1282 return BAND_A;
5e6e3a92
BZ
1283 case HostCmd_SCAN_RADIO_TYPE_BG:
1284 default:
636c4598 1285 return BAND_G;
5e6e3a92 1286 }
5e6e3a92
BZ
1287}
1288
5e6e3a92
BZ
1289/*
1290 * This is an internal function used to start a scan based on an input
1291 * configuration.
1292 *
1293 * This uses the input user scan configuration information when provided in
1294 * order to send the appropriate scan commands to firmware to populate or
1295 * update the internal driver scan table.
1296 */
1a1fb970
AK
1297int mwifiex_scan_networks(struct mwifiex_private *priv,
1298 const struct mwifiex_user_scan_cfg *user_scan_in)
5e6e3a92
BZ
1299{
1300 int ret = 0;
1301 struct mwifiex_adapter *adapter = priv->adapter;
270e58e8
YAP
1302 struct cmd_ctrl_node *cmd_node;
1303 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
5e6e3a92
BZ
1304 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1305 u32 buf_size;
1306 struct mwifiex_chan_scan_param_set *scan_chan_list;
5e6e3a92
BZ
1307 u8 filtered_scan;
1308 u8 scan_current_chan_only;
1309 u8 max_chan_per_scan;
1310 unsigned long flags;
1311
600f5d90 1312 if (adapter->scan_processing) {
5e6e3a92
BZ
1313 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1314 return ret;
1315 }
1316
1317 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1318 adapter->scan_processing = true;
1319 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1320
600f5d90 1321 if (priv->scan_block) {
5e6e3a92
BZ
1322 dev_dbg(adapter->dev,
1323 "cmd: Scan is blocked during association...\n");
1324 return ret;
1325 }
1326
1327 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
cff23cec 1328 GFP_KERNEL);
5e6e3a92
BZ
1329 if (!scan_cfg_out) {
1330 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
b53575ec 1331 return -ENOMEM;
5e6e3a92
BZ
1332 }
1333
1334 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
cff23cec 1335 MWIFIEX_USER_SCAN_CHAN_MAX;
5e6e3a92
BZ
1336 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1337 if (!scan_chan_list) {
1338 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1339 kfree(scan_cfg_out);
b53575ec 1340 return -ENOMEM;
5e6e3a92
BZ
1341 }
1342
cff23cec
YAP
1343 mwifiex_config_scan(priv, user_scan_in, &scan_cfg_out->config,
1344 &chan_list_out, scan_chan_list, &max_chan_per_scan,
1345 &filtered_scan, &scan_current_chan_only);
5e6e3a92 1346
600f5d90
AK
1347 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1348 &scan_cfg_out->config, chan_list_out,
1349 scan_chan_list);
5e6e3a92
BZ
1350
1351 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1352 if (!ret) {
1353 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1354 if (!list_empty(&adapter->scan_pending_q)) {
1355 cmd_node = list_first_entry(&adapter->scan_pending_q,
cff23cec 1356 struct cmd_ctrl_node, list);
5e6e3a92
BZ
1357 list_del(&cmd_node->list);
1358 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
cff23cec 1359 flags);
efaaa8b8 1360 adapter->cmd_queued = cmd_node;
5e6e3a92
BZ
1361 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1362 true);
1a1fb970 1363 queue_work(adapter->workqueue, &adapter->main_work);
5e6e3a92
BZ
1364 } else {
1365 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1366 flags);
1367 }
5e6e3a92
BZ
1368 } else {
1369 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1370 adapter->scan_processing = true;
1371 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1372 }
1373
1374 kfree(scan_cfg_out);
1375 kfree(scan_chan_list);
1376 return ret;
1377}
1378
1379/*
1380 * This function prepares a scan command to be sent to the firmware.
1381 *
1382 * This uses the scan command configuration sent to the command processing
1383 * module in command preparation stage to configure a scan command structure
1384 * to send to firmware.
1385 *
1386 * The fixed fields specifying the BSS type and BSSID filters as well as a
1387 * variable number/length of TLVs are sent in the command to firmware.
1388 *
1389 * Preparation also includes -
1390 * - Setting command ID, and proper size
1391 * - Ensuring correct endian-ness
1392 */
a5ffddb7
AK
1393int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1394 struct mwifiex_scan_cmd_config *scan_cfg)
5e6e3a92
BZ
1395{
1396 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
5e6e3a92
BZ
1397
1398 /* Set fixed field variables in scan command */
1399 scan_cmd->bss_mode = scan_cfg->bss_mode;
1400 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1401 sizeof(scan_cmd->bssid));
1402 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1403
1404 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1405
1406 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1407 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1408 + sizeof(scan_cmd->bssid)
1409 + scan_cfg->tlv_buf_len + S_DS_GEN));
1410
1411 return 0;
1412}
1413
7c6fa2a8
AK
1414/*
1415 * This function checks compatibility of requested network with current
1416 * driver settings.
1417 */
1418int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1419 struct mwifiex_bssdescriptor *bss_desc)
1420{
1421 int ret = -1;
1422
1423 if (!bss_desc)
1424 return -1;
1425
6685d109
YAP
1426 if ((mwifiex_get_cfp(priv, (u8) bss_desc->bss_band,
1427 (u16) bss_desc->channel, 0))) {
7c6fa2a8
AK
1428 switch (priv->bss_mode) {
1429 case NL80211_IFTYPE_STATION:
1430 case NL80211_IFTYPE_ADHOC:
1431 ret = mwifiex_is_network_compatible(priv, bss_desc,
1432 priv->bss_mode);
1433 if (ret)
1434 dev_err(priv->adapter->dev, "cannot find ssid "
1435 "%s\n", bss_desc->ssid.ssid);
2f9279b5 1436 break;
7c6fa2a8 1437 default:
2f9279b5 1438 ret = 0;
7c6fa2a8
AK
1439 }
1440 }
1441
1442 return ret;
1443}
1444
9558a407
AK
1445static int mwifiex_update_curr_bss_params(struct mwifiex_private *priv,
1446 struct cfg80211_bss *bss)
7c6fa2a8 1447{
db652e4b 1448 struct mwifiex_bssdescriptor *bss_desc;
7c6fa2a8
AK
1449 int ret;
1450 unsigned long flags;
7c6fa2a8
AK
1451
1452 /* Allocate and fill new bss descriptor */
1453 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1454 GFP_KERNEL);
1455 if (!bss_desc) {
1456 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1457 return -ENOMEM;
1458 }
5982b47a 1459
9558a407 1460 ret = mwifiex_fill_new_bss_desc(priv, bss, bss_desc);
7c6fa2a8
AK
1461 if (ret)
1462 goto done;
1463
1464 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1465 if (ret)
1466 goto done;
1467
1468 /* Update current bss descriptor parameters */
1469 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1470 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1471 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1472 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1473 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1474 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1475 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1476 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1477 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1478 0;
074d46d1 1479 priv->curr_bss_params.bss_descriptor.bcn_ht_oper = NULL;
7c6fa2a8
AK
1480 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1481 0;
1482 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1483 NULL;
1484 priv->curr_bss_params.bss_descriptor.
1485 bss_co_2040_offset = 0;
1486 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1487 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1488 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1489 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1490 0;
1491
1492 /* Make a copy of current BSSID descriptor */
1493 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
cff23cec 1494 sizeof(priv->curr_bss_params.bss_descriptor));
7c6fa2a8
AK
1495 mwifiex_save_curr_bcn(priv);
1496 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1497
1498done:
1499 kfree(bss_desc);
7c6fa2a8
AK
1500 return 0;
1501}
1502
5e6e3a92
BZ
1503/*
1504 * This function handles the command response of scan.
1505 *
1506 * The response buffer for the scan command has the following
1507 * memory layout:
1508 *
1509 * .-------------------------------------------------------------.
1510 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1511 * .-------------------------------------------------------------.
1512 * | BufSize (t_u16) : sizeof the BSS Description data |
1513 * .-------------------------------------------------------------.
1514 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1515 * .-------------------------------------------------------------.
1516 * | BSSDescription data (variable, size given in BufSize) |
1517 * .-------------------------------------------------------------.
1518 * | TLV data (variable, size calculated using Header->Size, |
1519 * | BufSize and sizeof the fixed fields above) |
1520 * .-------------------------------------------------------------.
1521 */
1522int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
600f5d90 1523 struct host_cmd_ds_command *resp)
5e6e3a92
BZ
1524{
1525 int ret = 0;
1526 struct mwifiex_adapter *adapter = priv->adapter;
270e58e8
YAP
1527 struct cmd_ctrl_node *cmd_node;
1528 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
5e6e3a92
BZ
1529 struct mwifiex_ie_types_data *tlv_data;
1530 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1531 u8 *bss_info;
1532 u32 scan_resp_size;
1533 u32 bytes_left;
5e6e3a92
BZ
1534 u32 idx;
1535 u32 tlv_buf_size;
5e6e3a92
BZ
1536 struct mwifiex_chan_freq_power *cfp;
1537 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1538 struct chan_band_param_set *chan_band;
5e6e3a92
BZ
1539 u8 is_bgscan_resp;
1540 unsigned long flags;
5116f3ce 1541 struct cfg80211_bss *bss;
5e6e3a92
BZ
1542
1543 is_bgscan_resp = (le16_to_cpu(resp->command)
cff23cec 1544 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
5e6e3a92
BZ
1545 if (is_bgscan_resp)
1546 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1547 else
1548 scan_rsp = &resp->params.scan_resp;
1549
1550
67a50035 1551 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
5e6e3a92 1552 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
cff23cec 1553 scan_rsp->number_of_sets);
5e6e3a92
BZ
1554 ret = -1;
1555 goto done;
1556 }
1557
1558 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1559 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
cff23cec 1560 bytes_left);
5e6e3a92
BZ
1561
1562 scan_resp_size = le16_to_cpu(resp->size);
1563
1564 dev_dbg(adapter->dev,
1565 "info: SCAN_RESP: returned %d APs before parsing\n",
cff23cec 1566 scan_rsp->number_of_sets);
5e6e3a92 1567
5e6e3a92
BZ
1568 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1569
1570 /*
1571 * The size of the TLV buffer is equal to the entire command response
1572 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1573 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1574 * response header (S_DS_GEN)
1575 */
1576 tlv_buf_size = scan_resp_size - (bytes_left
1577 + sizeof(scan_rsp->bss_descript_size)
1578 + sizeof(scan_rsp->number_of_sets)
1579 + S_DS_GEN);
1580
1581 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1582 bss_desc_and_tlv_buffer +
1583 bytes_left);
1584
1585 /* Search the TLV buffer space in the scan response for any valid
1586 TLVs */
1587 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1588 TLV_TYPE_TSFTIMESTAMP,
1589 (struct mwifiex_ie_types_data **)
1590 &tsf_tlv);
1591
1592 /* Search the TLV buffer space in the scan response for any valid
1593 TLVs */
1594 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1595 TLV_TYPE_CHANNELBANDLIST,
1596 (struct mwifiex_ie_types_data **)
1597 &chan_band_tlv);
1598
5e6e3a92 1599 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
7c6fa2a8
AK
1600 u8 bssid[ETH_ALEN];
1601 s32 rssi;
1602 const u8 *ie_buf;
1603 size_t ie_len;
6685d109 1604 u16 channel = 0;
b5abcf02 1605 u64 fw_tsf = 0;
7c6fa2a8
AK
1606 u16 beacon_size = 0;
1607 u32 curr_bcn_bytes;
1608 u32 freq;
1609 u16 beacon_period;
1610 u16 cap_info_bitmap;
1611 u8 *current_ptr;
b5abcf02 1612 u64 timestamp;
7c6fa2a8 1613 struct mwifiex_bcn_param *bcn_param;
b5abcf02 1614 struct mwifiex_bss_priv *bss_priv;
7c6fa2a8
AK
1615
1616 if (bytes_left >= sizeof(beacon_size)) {
1617 /* Extract & convert beacon size from command buffer */
1618 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1619 bytes_left -= sizeof(beacon_size);
1620 bss_info += sizeof(beacon_size);
5e6e3a92
BZ
1621 }
1622
7c6fa2a8
AK
1623 if (!beacon_size || beacon_size > bytes_left) {
1624 bss_info += bytes_left;
1625 bytes_left = 0;
1626 return -1;
1627 }
5e6e3a92 1628
7c6fa2a8
AK
1629 /* Initialize the current working beacon pointer for this BSS
1630 * iteration */
1631 current_ptr = bss_info;
1632
1633 /* Advance the return beacon pointer past the current beacon */
1634 bss_info += beacon_size;
1635 bytes_left -= beacon_size;
1636
1637 curr_bcn_bytes = beacon_size;
1638
1639 /*
1640 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1641 * and capability information
1642 */
1643 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
cff23cec
YAP
1644 dev_err(adapter->dev,
1645 "InterpretIE: not enough bytes left\n");
7c6fa2a8
AK
1646 continue;
1647 }
1648 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1649 current_ptr += sizeof(*bcn_param);
1650 curr_bcn_bytes -= sizeof(*bcn_param);
1651
1652 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1653
c9919be6
AK
1654 rssi = (s32) bcn_param->rssi;
1655 rssi = (-rssi) * 100; /* Convert dBm to mBm */
1656 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%d\n", rssi);
7c6fa2a8 1657
b5abcf02 1658 timestamp = le64_to_cpu(bcn_param->timestamp);
7c6fa2a8
AK
1659 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1660
1661 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1662 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
cff23cec 1663 cap_info_bitmap);
7c6fa2a8
AK
1664
1665 /* Rest of the current buffer are IE's */
1666 ie_buf = current_ptr;
1667 ie_len = curr_bcn_bytes;
cff23cec
YAP
1668 dev_dbg(adapter->dev,
1669 "info: InterpretIE: IELength for this AP = %d\n",
1670 curr_bcn_bytes);
7c6fa2a8
AK
1671
1672 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1673 u8 element_id, element_len;
1674
1675 element_id = *current_ptr;
1676 element_len = *(current_ptr + 1);
1677 if (curr_bcn_bytes < element_len +
1678 sizeof(struct ieee_types_header)) {
cff23cec
YAP
1679 dev_err(priv->adapter->dev,
1680 "%s: bytes left < IE length\n",
7c6fa2a8
AK
1681 __func__);
1682 goto done;
5e6e3a92 1683 }
7c6fa2a8 1684 if (element_id == WLAN_EID_DS_PARAMS) {
2c208890 1685 channel = *(current_ptr + sizeof(struct ieee_types_header));
5e6e3a92
BZ
1686 break;
1687 }
7c6fa2a8
AK
1688
1689 current_ptr += element_len +
1690 sizeof(struct ieee_types_header);
1691 curr_bcn_bytes -= element_len +
1692 sizeof(struct ieee_types_header);
5e6e3a92
BZ
1693 }
1694
5e6e3a92
BZ
1695 /*
1696 * If the TSF TLV was appended to the scan results, save this
b5abcf02
AK
1697 * entry's TSF value in the fw_tsf field. It is the firmware's
1698 * TSF value at the time the beacon or probe response was
1699 * received.
5e6e3a92 1700 */
7c6fa2a8 1701 if (tsf_tlv)
b5abcf02
AK
1702 memcpy(&fw_tsf, &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1703 sizeof(fw_tsf));
7c6fa2a8 1704
6685d109 1705 if (channel) {
7c6fa2a8
AK
1706 struct ieee80211_channel *chan;
1707 u8 band;
1708
1709 band = BAND_G;
1710 if (chan_band_tlv) {
1711 chan_band =
1712 &chan_band_tlv->chan_band_param[idx];
1713 band = mwifiex_radio_type_to_band(
1714 chan_band->radio_type
1715 & (BIT(0) | BIT(1)));
1716 }
5e6e3a92 1717
6685d109 1718 cfp = mwifiex_get_cfp(priv, band, channel, 0);
5e6e3a92 1719
7c6fa2a8 1720 freq = cfp ? cfp->freq : 0;
5e6e3a92 1721
7c6fa2a8 1722 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
5e6e3a92 1723
7c6fa2a8 1724 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
5116f3ce 1725 bss = cfg80211_inform_bss(priv->wdev->wiphy,
b5abcf02 1726 chan, bssid, timestamp,
5116f3ce
AK
1727 cap_info_bitmap, beacon_period,
1728 ie_buf, ie_len, rssi, GFP_KERNEL);
b5abcf02
AK
1729 bss_priv = (struct mwifiex_bss_priv *)bss->priv;
1730 bss_priv->band = band;
1731 bss_priv->fw_tsf = fw_tsf;
cff23cec
YAP
1732 if (priv->media_connected &&
1733 !memcmp(bssid,
1734 priv->curr_bss_params.bss_descriptor
1735 .mac_address, ETH_ALEN))
9558a407
AK
1736 mwifiex_update_curr_bss_params(priv,
1737 bss);
1738 cfg80211_put_bss(bss);
7c6fa2a8
AK
1739 }
1740 } else {
1741 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1742 }
1743 }
5e6e3a92
BZ
1744
1745 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1746 if (list_empty(&adapter->scan_pending_q)) {
1747 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1748 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1749 adapter->scan_processing = false;
1750 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
5e6e3a92
BZ
1751
1752 /* Need to indicate IOCTL complete */
600f5d90
AK
1753 if (adapter->curr_cmd->wait_q_enabled) {
1754 adapter->cmd_wait_q.status = 0;
efaaa8b8 1755 mwifiex_complete_cmd(adapter, adapter->curr_cmd);
5e6e3a92
BZ
1756 }
1757 if (priv->report_scan_result)
1758 priv->report_scan_result = false;
1759 if (priv->scan_pending_on_block) {
1760 priv->scan_pending_on_block = false;
1761 up(&priv->async_sem);
1762 }
1763
38c9d664 1764 if (priv->user_scan_cfg) {
cff23cec
YAP
1765 dev_dbg(priv->adapter->dev,
1766 "info: %s: sending scan results\n", __func__);
38c9d664
AK
1767 cfg80211_scan_done(priv->scan_request, 0);
1768 priv->scan_request = NULL;
1769 kfree(priv->user_scan_cfg);
1770 priv->user_scan_cfg = NULL;
1771 }
5e6e3a92 1772 } else {
3249ba73
AK
1773 if (!mwifiex_wmm_lists_empty(adapter)) {
1774 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1775 flags);
1776 adapter->scan_delay_cnt = 1;
1777 mod_timer(&priv->scan_delay_timer, jiffies +
1778 msecs_to_jiffies(MWIFIEX_SCAN_DELAY_MSEC));
1779 } else {
1780 /* Get scan command from scan_pending_q and put to
1781 cmd_pending_q */
1782 cmd_node = list_first_entry(&adapter->scan_pending_q,
1783 struct cmd_ctrl_node, list);
1784 list_del(&cmd_node->list);
1785 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1786 flags);
1787 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1788 true);
1789 }
5e6e3a92
BZ
1790 }
1791
1792done:
5e6e3a92
BZ
1793 return ret;
1794}
1795
1796/*
1797 * This function prepares command for background scan query.
1798 *
1799 * Preparation includes -
1800 * - Setting command ID and proper size
1801 * - Setting background scan flush parameter
1802 * - Ensuring correct endian-ness
1803 */
572e8f3e 1804int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
5e6e3a92
BZ
1805{
1806 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1807 &cmd->params.bg_scan_query;
1808
1809 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1810 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1811 + S_DS_GEN);
1812
1813 bg_query->flush = 1;
1814
1815 return 0;
1816}
1817
5e6e3a92
BZ
1818/*
1819 * This function inserts scan command node to the scan pending queue.
1820 */
1821void
1822mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1823 struct cmd_ctrl_node *cmd_node)
1824{
1825 struct mwifiex_adapter *adapter = priv->adapter;
1826 unsigned long flags;
1827
600f5d90 1828 cmd_node->wait_q_enabled = true;
efaaa8b8 1829 cmd_node->condition = &adapter->scan_wait_q_woken;
5e6e3a92
BZ
1830 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1831 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1832 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1833}
1834
5e6e3a92
BZ
1835/*
1836 * This function sends a scan command for all available channels to the
1837 * firmware, filtered on a specific SSID.
1838 */
1839static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
b9be5f39 1840 struct cfg80211_ssid *req_ssid)
5e6e3a92
BZ
1841{
1842 struct mwifiex_adapter *adapter = priv->adapter;
1843 int ret = 0;
1844 struct mwifiex_user_scan_cfg *scan_cfg;
1845
1846 if (!req_ssid)
1847 return -1;
1848
600f5d90 1849 if (adapter->scan_processing) {
5e6e3a92
BZ
1850 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1851 return ret;
1852 }
1853
600f5d90 1854 if (priv->scan_block) {
5e6e3a92
BZ
1855 dev_dbg(adapter->dev,
1856 "cmd: Scan is blocked during association...\n");
1857 return ret;
1858 }
1859
5e6e3a92
BZ
1860 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1861 if (!scan_cfg) {
1862 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
b53575ec 1863 return -ENOMEM;
5e6e3a92
BZ
1864 }
1865
be0b281e
AK
1866 scan_cfg->ssid_list = req_ssid;
1867 scan_cfg->num_ssids = 1;
5e6e3a92 1868
600f5d90 1869 ret = mwifiex_scan_networks(priv, scan_cfg);
5e6e3a92
BZ
1870
1871 kfree(scan_cfg);
1872 return ret;
1873}
1874
1875/*
1876 * Sends IOCTL request to start a scan.
1877 *
1878 * This function allocates the IOCTL request buffer, fills it
1879 * with requisite parameters and calls the IOCTL handler.
1880 *
1881 * Scan command can be issued for both normal scan and specific SSID
1882 * scan, depending upon whether an SSID is provided or not.
1883 */
600f5d90 1884int mwifiex_request_scan(struct mwifiex_private *priv,
b9be5f39 1885 struct cfg80211_ssid *req_ssid)
5e6e3a92 1886{
270e58e8 1887 int ret;
5e6e3a92
BZ
1888
1889 if (down_interruptible(&priv->async_sem)) {
1890 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
cff23cec 1891 __func__);
5e6e3a92
BZ
1892 return -1;
1893 }
1894 priv->scan_pending_on_block = true;
1895
efaaa8b8 1896 priv->adapter->scan_wait_q_woken = false;
5e6e3a92
BZ
1897
1898 if (req_ssid && req_ssid->ssid_len != 0)
1899 /* Specific SSID scan */
600f5d90 1900 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
5e6e3a92
BZ
1901 else
1902 /* Normal scan */
600f5d90
AK
1903 ret = mwifiex_scan_networks(priv, NULL);
1904
1905 if (!ret)
1906 ret = mwifiex_wait_queue_complete(priv->adapter);
1907
5e6e3a92
BZ
1908 if (ret == -1) {
1909 priv->scan_pending_on_block = false;
1910 up(&priv->async_sem);
1911 }
600f5d90 1912
5e6e3a92
BZ
1913 return ret;
1914}
1915
1916/*
1917 * This function appends the vendor specific IE TLV to a buffer.
1918 */
1919int
1920mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1921 u16 vsie_mask, u8 **buffer)
1922{
1923 int id, ret_len = 0;
1924 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1925
1926 if (!buffer)
1927 return 0;
1928 if (!(*buffer))
1929 return 0;
1930
1931 /*
1932 * Traverse through the saved vendor specific IE array and append
1933 * the selected(scan/assoc/adhoc) IE as TLV to the command
1934 */
1935 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1936 if (priv->vs_ie[id].mask & vsie_mask) {
1937 vs_param_set =
1938 (struct mwifiex_ie_types_vendor_param_set *)
1939 *buffer;
1940 vs_param_set->header.type =
1941 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1942 vs_param_set->header.len =
1943 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1944 & 0x00FF) + 2);
1945 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1946 le16_to_cpu(vs_param_set->header.len));
1947 *buffer += le16_to_cpu(vs_param_set->header.len) +
1948 sizeof(struct mwifiex_ie_types_header);
1949 ret_len += le16_to_cpu(vs_param_set->header.len) +
1950 sizeof(struct mwifiex_ie_types_header);
1951 }
1952 }
1953 return ret_len;
1954}
1955
1956/*
1957 * This function saves a beacon buffer of the current BSS descriptor.
1958 *
1959 * The current beacon buffer is saved so that it can be restored in the
1960 * following cases that makes the beacon buffer not to contain the current
1961 * ssid's beacon buffer.
1962 * - The current ssid was not found somehow in the last scan.
1963 * - The current ssid was the last entry of the scan table and overloaded.
1964 */
1965void
1966mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1967{
1968 struct mwifiex_bssdescriptor *curr_bss =
1969 &priv->curr_bss_params.bss_descriptor;
1970
030fe797
AK
1971 if (!curr_bss->beacon_buf_size)
1972 return;
5e6e3a92 1973
030fe797
AK
1974 /* allocate beacon buffer at 1st time; or if it's size has changed */
1975 if (!priv->curr_bcn_buf ||
cff23cec 1976 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
5e6e3a92 1977 priv->curr_bcn_size = curr_bss->beacon_buf_size;
5e6e3a92 1978
030fe797 1979 kfree(priv->curr_bcn_buf);
5982b47a 1980 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
cff23cec 1981 GFP_ATOMIC);
5e6e3a92
BZ
1982 if (!priv->curr_bcn_buf) {
1983 dev_err(priv->adapter->dev,
cff23cec 1984 "failed to alloc curr_bcn_buf\n");
030fe797 1985 return;
5e6e3a92
BZ
1986 }
1987 }
030fe797
AK
1988
1989 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
cff23cec 1990 curr_bss->beacon_buf_size);
030fe797
AK
1991 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
1992 priv->curr_bcn_size);
7c6fa2a8
AK
1993
1994 curr_bss->beacon_buf = priv->curr_bcn_buf;
1995
1996 /* adjust the pointers in the current BSS descriptor */
1997 if (curr_bss->bcn_wpa_ie)
1998 curr_bss->bcn_wpa_ie =
1999 (struct ieee_types_vendor_specific *)
2000 (curr_bss->beacon_buf +
2001 curr_bss->wpa_offset);
2002
2003 if (curr_bss->bcn_rsn_ie)
2004 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2005 (curr_bss->beacon_buf +
2006 curr_bss->rsn_offset);
2007
2008 if (curr_bss->bcn_ht_cap)
2009 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2010 (curr_bss->beacon_buf +
2011 curr_bss->ht_cap_offset);
2012
074d46d1
JB
2013 if (curr_bss->bcn_ht_oper)
2014 curr_bss->bcn_ht_oper = (struct ieee80211_ht_operation *)
7c6fa2a8
AK
2015 (curr_bss->beacon_buf +
2016 curr_bss->ht_info_offset);
2017
2018 if (curr_bss->bcn_bss_co_2040)
2019 curr_bss->bcn_bss_co_2040 =
2c208890 2020 (curr_bss->beacon_buf + curr_bss->bss_co_2040_offset);
7c6fa2a8
AK
2021
2022 if (curr_bss->bcn_ext_cap)
2c208890
JP
2023 curr_bss->bcn_ext_cap = curr_bss->beacon_buf +
2024 curr_bss->ext_cap_offset;
5e6e3a92
BZ
2025}
2026
2027/*
2028 * This function frees the current BSS descriptor beacon buffer.
2029 */
2030void
2031mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2032{
2033 kfree(priv->curr_bcn_buf);
2034 priv->curr_bcn_buf = NULL;
2035}
This page took 0.289665 seconds and 5 git commands to generate.