mwifiex: fix make namespacecheck warnings
[deliverable/linux.git] / drivers / net / wireless / mwifiex / scan.c
CommitLineData
5e6e3a92
BZ
1/*
2 * Marvell Wireless LAN device driver: scan ioctl and command handling
3 *
4 * Copyright (C) 2011, Marvell International Ltd.
5 *
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
13 *
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
18 */
19
20#include "decl.h"
21#include "ioctl.h"
22#include "util.h"
23#include "fw.h"
24#include "main.h"
25#include "11n.h"
26#include "cfg80211.h"
27
28/* The maximum number of channels the firmware can scan per command */
29#define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
30
31#define MWIFIEX_CHANNELS_PER_SCAN_CMD 4
32
33/* Memory needed to store a max sized Channel List TLV for a firmware scan */
34#define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
35 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
36 *sizeof(struct mwifiex_chan_scan_param_set)))
37
38/* Memory needed to store supported rate */
39#define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
40 + HOSTCMD_SUPPORTED_RATES)
41
42/* Memory needed to store a max number/size WildCard SSID TLV for a firmware
43 scan */
44#define WILDCARD_SSID_TLV_MAX_SIZE \
45 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
46 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
47 + IEEE80211_MAX_SSID_LEN))
48
49/* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
50#define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
51 + sizeof(struct mwifiex_ie_types_num_probes) \
52 + sizeof(struct mwifiex_ie_types_htcap) \
53 + CHAN_TLV_MAX_SIZE \
54 + RATE_TLV_MAX_SIZE \
55 + WILDCARD_SSID_TLV_MAX_SIZE)
56
57
58union mwifiex_scan_cmd_config_tlv {
59 /* Scan configuration (variable length) */
60 struct mwifiex_scan_cmd_config config;
61 /* Max allocated block */
62 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
63};
64
65enum cipher_suite {
66 CIPHER_SUITE_TKIP,
67 CIPHER_SUITE_CCMP,
68 CIPHER_SUITE_MAX
69};
70static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
71 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
72 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
73};
74static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
75 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
76 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
77};
78
79/*
80 * This function parses a given IE for a given OUI.
81 *
82 * This is used to parse a WPA/RSN IE to find if it has
83 * a given oui in PTK.
84 */
85static u8
86mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
87{
88 u8 count;
89
90 count = iebody->ptk_cnt[0];
91
92 /* There could be multiple OUIs for PTK hence
93 1) Take the length.
94 2) Check all the OUIs for AES.
95 3) If one of them is AES then pass success. */
96 while (count) {
97 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
98 return MWIFIEX_OUI_PRESENT;
99
100 --count;
101 if (count)
102 iebody = (struct ie_body *) ((u8 *) iebody +
103 sizeof(iebody->ptk_body));
104 }
105
106 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
107 return MWIFIEX_OUI_NOT_PRESENT;
108}
109
110/*
111 * This function checks if a given OUI is present in a RSN IE.
112 *
113 * The function first checks if a RSN IE is present or not in the
114 * BSS descriptor. It tries to locate the OUI only if such an IE is
115 * present.
116 */
117static u8
118mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
119{
270e58e8
YAP
120 u8 *oui;
121 struct ie_body *iebody;
5e6e3a92
BZ
122 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
123
124 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
125 ieee_hdr.element_id == WLAN_EID_RSN))) {
126 iebody = (struct ie_body *)
127 (((u8 *) bss_desc->bcn_rsn_ie->data) +
128 RSN_GTK_OUI_OFFSET);
129 oui = &mwifiex_rsn_oui[cipher][0];
130 ret = mwifiex_search_oui_in_ie(iebody, oui);
131 if (ret)
132 return ret;
133 }
134 return ret;
135}
136
137/*
138 * This function checks if a given OUI is present in a WPA IE.
139 *
140 * The function first checks if a WPA IE is present or not in the
141 * BSS descriptor. It tries to locate the OUI only if such an IE is
142 * present.
143 */
144static u8
145mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
146{
270e58e8
YAP
147 u8 *oui;
148 struct ie_body *iebody;
5e6e3a92
BZ
149 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
150
151 if (((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).
152 vend_hdr.element_id == WLAN_EID_WPA))) {
153 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
154 oui = &mwifiex_wpa_oui[cipher][0];
155 ret = mwifiex_search_oui_in_ie(iebody, oui);
156 if (ret)
157 return ret;
158 }
159 return ret;
160}
161
162/*
163 * This function compares two SSIDs and checks if they match.
164 */
165s32
166mwifiex_ssid_cmp(struct mwifiex_802_11_ssid *ssid1,
167 struct mwifiex_802_11_ssid *ssid2)
168{
169 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
170 return -1;
171 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
172}
173
5e6e3a92
BZ
174/*
175 * This function checks if wapi is enabled in driver and scanned network is
176 * compatible with it.
177 */
178static bool
179mwifiex_is_network_compatible_for_wapi(struct mwifiex_private *priv,
180 struct mwifiex_bssdescriptor *bss_desc)
181{
182 if (priv->sec_info.wapi_enabled &&
183 (bss_desc->bcn_wapi_ie &&
184 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
185 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
186 return true;
187 }
188 return false;
189}
190
191/*
192 * This function checks if driver is configured with no security mode and
193 * scanned network is compatible with it.
194 */
195static bool
196mwifiex_is_network_compatible_for_no_sec(struct mwifiex_private *priv,
197 struct mwifiex_bssdescriptor *bss_desc)
198{
199 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
200 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
201 && ((!bss_desc->bcn_wpa_ie) ||
202 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
203 WLAN_EID_WPA))
204 && ((!bss_desc->bcn_rsn_ie) ||
205 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
206 WLAN_EID_RSN))
2be50b8d
YAP
207 && !priv->sec_info.encryption_mode
208 && !bss_desc->privacy) {
5e6e3a92
BZ
209 return true;
210 }
211 return false;
212}
213
214/*
215 * This function checks if static WEP is enabled in driver and scanned network
216 * is compatible with it.
217 */
218static bool
219mwifiex_is_network_compatible_for_static_wep(struct mwifiex_private *priv,
220 struct mwifiex_bssdescriptor *bss_desc)
221{
222 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_ENABLED
223 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
224 && bss_desc->privacy) {
225 return true;
226 }
227 return false;
228}
229
230/*
231 * This function checks if wpa is enabled in driver and scanned network is
232 * compatible with it.
233 */
234static bool
235mwifiex_is_network_compatible_for_wpa(struct mwifiex_private *priv,
7c6fa2a8 236 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92
BZ
237{
238 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
239 && priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
240 && ((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
241 element_id == WLAN_EID_WPA))
242 /*
243 * Privacy bit may NOT be set in some APs like
244 * LinkSys WRT54G && bss_desc->privacy
245 */
246 ) {
7c6fa2a8 247 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
5e6e3a92 248 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
7c6fa2a8 249 "EncMode=%#x privacy=%#x\n", __func__,
5e6e3a92
BZ
250 (bss_desc->bcn_wpa_ie) ?
251 (*(bss_desc->bcn_wpa_ie)).
252 vend_hdr.element_id : 0,
253 (bss_desc->bcn_rsn_ie) ?
254 (*(bss_desc->bcn_rsn_ie)).
255 ieee_hdr.element_id : 0,
256 (priv->sec_info.wep_status ==
257 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
258 (priv->sec_info.wpa_enabled) ? "e" : "d",
259 (priv->sec_info.wpa2_enabled) ? "e" : "d",
260 priv->sec_info.encryption_mode,
261 bss_desc->privacy);
262 return true;
263 }
264 return false;
265}
266
267/*
268 * This function checks if wpa2 is enabled in driver and scanned network is
269 * compatible with it.
270 */
271static bool
272mwifiex_is_network_compatible_for_wpa2(struct mwifiex_private *priv,
7c6fa2a8 273 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92
BZ
274{
275 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
276 && !priv->sec_info.wpa_enabled && priv->sec_info.wpa2_enabled
277 && ((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
278 element_id == WLAN_EID_RSN))
279 /*
280 * Privacy bit may NOT be set in some APs like
281 * LinkSys WRT54G && bss_desc->privacy
282 */
283 ) {
7c6fa2a8 284 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
5e6e3a92 285 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
7c6fa2a8 286 "EncMode=%#x privacy=%#x\n", __func__,
5e6e3a92
BZ
287 (bss_desc->bcn_wpa_ie) ?
288 (*(bss_desc->bcn_wpa_ie)).
289 vend_hdr.element_id : 0,
290 (bss_desc->bcn_rsn_ie) ?
291 (*(bss_desc->bcn_rsn_ie)).
292 ieee_hdr.element_id : 0,
293 (priv->sec_info.wep_status ==
294 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
295 (priv->sec_info.wpa_enabled) ? "e" : "d",
296 (priv->sec_info.wpa2_enabled) ? "e" : "d",
297 priv->sec_info.encryption_mode,
298 bss_desc->privacy);
299 return true;
300 }
301 return false;
302}
303
304/*
305 * This function checks if adhoc AES is enabled in driver and scanned network is
306 * compatible with it.
307 */
308static bool
309mwifiex_is_network_compatible_for_adhoc_aes(struct mwifiex_private *priv,
310 struct mwifiex_bssdescriptor *bss_desc)
311{
312 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
313 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
314 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
315 element_id != WLAN_EID_WPA))
316 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
317 element_id != WLAN_EID_RSN))
2be50b8d
YAP
318 && !priv->sec_info.encryption_mode
319 && bss_desc->privacy) {
5e6e3a92
BZ
320 return true;
321 }
322 return false;
323}
324
325/*
326 * This function checks if dynamic WEP is enabled in driver and scanned network
327 * is compatible with it.
328 */
329static bool
330mwifiex_is_network_compatible_for_dynamic_wep(struct mwifiex_private *priv,
7c6fa2a8 331 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92
BZ
332{
333 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
334 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
335 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
336 element_id != WLAN_EID_WPA))
337 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
338 element_id != WLAN_EID_RSN))
2be50b8d
YAP
339 && priv->sec_info.encryption_mode
340 && bss_desc->privacy) {
5e6e3a92 341 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
7c6fa2a8 342 "WEP: wpa_ie=%#x wpa2_ie=%#x "
5e6e3a92 343 "EncMode=%#x privacy=%#x\n",
7c6fa2a8 344 __func__,
5e6e3a92
BZ
345 (bss_desc->bcn_wpa_ie) ?
346 (*(bss_desc->bcn_wpa_ie)).
347 vend_hdr.element_id : 0,
348 (bss_desc->bcn_rsn_ie) ?
349 (*(bss_desc->bcn_rsn_ie)).
350 ieee_hdr.element_id : 0,
351 priv->sec_info.encryption_mode,
352 bss_desc->privacy);
353 return true;
354 }
355 return false;
356}
357
358/*
359 * This function checks if a scanned network is compatible with the driver
360 * settings.
361 *
362 * WEP WPA WPA2 ad-hoc encrypt Network
363 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
364 * 0 0 0 0 NONE 0 0 0 yes No security
365 * 0 1 0 0 x 1x 1 x yes WPA (disable
366 * HT if no AES)
367 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
368 * HT if no AES)
369 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
370 * 1 0 0 0 NONE 1 0 0 yes Static WEP
371 * (disable HT)
372 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
373 *
374 * Compatibility is not matched while roaming, except for mode.
375 */
376static s32
7c6fa2a8
AK
377mwifiex_is_network_compatible(struct mwifiex_private *priv,
378 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
5e6e3a92
BZ
379{
380 struct mwifiex_adapter *adapter = priv->adapter;
5e6e3a92 381
5e6e3a92
BZ
382 bss_desc->disable_11n = false;
383
384 /* Don't check for compatibility if roaming */
eecd8250
BZ
385 if (priv->media_connected && (priv->bss_mode == NL80211_IFTYPE_STATION)
386 && (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
7c6fa2a8 387 return 0;
5e6e3a92
BZ
388
389 if (priv->wps.session_enable) {
390 dev_dbg(adapter->dev,
391 "info: return success directly in WPS period\n");
7c6fa2a8 392 return 0;
5e6e3a92
BZ
393 }
394
395 if (mwifiex_is_network_compatible_for_wapi(priv, bss_desc)) {
396 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
7c6fa2a8 397 return 0;
5e6e3a92
BZ
398 }
399
400 if (bss_desc->bss_mode == mode) {
401 if (mwifiex_is_network_compatible_for_no_sec(priv, bss_desc)) {
402 /* No security */
7c6fa2a8 403 return 0;
5e6e3a92
BZ
404 } else if (mwifiex_is_network_compatible_for_static_wep(priv,
405 bss_desc)) {
406 /* Static WEP enabled */
407 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
408 bss_desc->disable_11n = true;
7c6fa2a8
AK
409 return 0;
410 } else if (mwifiex_is_network_compatible_for_wpa(priv,
411 bss_desc)) {
5e6e3a92
BZ
412 /* WPA enabled */
413 if (((priv->adapter->config_bands & BAND_GN
414 || priv->adapter->config_bands & BAND_AN)
415 && bss_desc->bcn_ht_cap)
416 && !mwifiex_is_wpa_oui_present(bss_desc,
417 CIPHER_SUITE_CCMP)) {
418
419 if (mwifiex_is_wpa_oui_present(bss_desc,
420 CIPHER_SUITE_TKIP)) {
421 dev_dbg(adapter->dev,
422 "info: Disable 11n if AES "
423 "is not supported by AP\n");
424 bss_desc->disable_11n = true;
425 } else {
426 return -1;
427 }
428 }
7c6fa2a8 429 return 0;
5e6e3a92 430 } else if (mwifiex_is_network_compatible_for_wpa2(priv,
7c6fa2a8 431 bss_desc)) {
5e6e3a92
BZ
432 /* WPA2 enabled */
433 if (((priv->adapter->config_bands & BAND_GN
434 || priv->adapter->config_bands & BAND_AN)
435 && bss_desc->bcn_ht_cap)
436 && !mwifiex_is_rsn_oui_present(bss_desc,
437 CIPHER_SUITE_CCMP)) {
438
439 if (mwifiex_is_rsn_oui_present(bss_desc,
440 CIPHER_SUITE_TKIP)) {
441 dev_dbg(adapter->dev,
442 "info: Disable 11n if AES "
443 "is not supported by AP\n");
444 bss_desc->disable_11n = true;
445 } else {
446 return -1;
447 }
448 }
7c6fa2a8 449 return 0;
5e6e3a92
BZ
450 } else if (mwifiex_is_network_compatible_for_adhoc_aes(priv,
451 bss_desc)) {
452 /* Ad-hoc AES enabled */
7c6fa2a8 453 return 0;
5e6e3a92 454 } else if (mwifiex_is_network_compatible_for_dynamic_wep(priv,
7c6fa2a8 455 bss_desc)) {
5e6e3a92 456 /* Dynamic WEP enabled */
7c6fa2a8 457 return 0;
5e6e3a92
BZ
458 }
459
460 /* Security doesn't match */
7c6fa2a8 461 dev_dbg(adapter->dev, "info: %s: failed: "
5e6e3a92
BZ
462 "wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s EncMode"
463 "=%#x privacy=%#x\n",
7c6fa2a8 464 __func__,
5e6e3a92
BZ
465 (bss_desc->bcn_wpa_ie) ?
466 (*(bss_desc->bcn_wpa_ie)).vend_hdr.
467 element_id : 0,
468 (bss_desc->bcn_rsn_ie) ?
469 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.
470 element_id : 0,
471 (priv->sec_info.wep_status ==
472 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
473 (priv->sec_info.wpa_enabled) ? "e" : "d",
474 (priv->sec_info.wpa2_enabled) ? "e" : "d",
475 priv->sec_info.encryption_mode, bss_desc->privacy);
476 return -1;
477 }
478
479 /* Mode doesn't match */
480 return -1;
481}
482
5e6e3a92
BZ
483/*
484 * This function creates a channel list for the driver to scan, based
485 * on region/band information.
486 *
487 * This routine is used for any scan that is not provided with a
488 * specific channel list to scan.
489 */
490static void
491mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
492 const struct mwifiex_user_scan_cfg
493 *user_scan_in,
494 struct mwifiex_chan_scan_param_set
495 *scan_chan_list,
496 u8 filtered_scan)
497{
498 enum ieee80211_band band;
499 struct ieee80211_supported_band *sband;
500 struct ieee80211_channel *ch;
501 struct mwifiex_adapter *adapter = priv->adapter;
502 int chan_idx = 0, i;
503 u8 scan_type;
504
505 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
506
507 if (!priv->wdev->wiphy->bands[band])
508 continue;
509
510 sband = priv->wdev->wiphy->bands[band];
511
d06b7b9e 512 for (i = 0; (i < sband->n_channels) ; i++) {
5e6e3a92
BZ
513 ch = &sband->channels[i];
514 if (ch->flags & IEEE80211_CHAN_DISABLED)
515 continue;
516 scan_chan_list[chan_idx].radio_type = band;
517 scan_type = ch->flags & IEEE80211_CHAN_PASSIVE_SCAN;
518 if (user_scan_in &&
519 user_scan_in->chan_list[0].scan_time)
520 scan_chan_list[chan_idx].max_scan_time =
521 cpu_to_le16((u16) user_scan_in->
522 chan_list[0].scan_time);
523 else if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
524 scan_chan_list[chan_idx].max_scan_time =
525 cpu_to_le16(adapter->passive_scan_time);
526 else
527 scan_chan_list[chan_idx].max_scan_time =
528 cpu_to_le16(adapter->active_scan_time);
529 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
530 scan_chan_list[chan_idx].chan_scan_mode_bitmap
531 |= MWIFIEX_PASSIVE_SCAN;
532 else
533 scan_chan_list[chan_idx].chan_scan_mode_bitmap
534 &= ~MWIFIEX_PASSIVE_SCAN;
535 scan_chan_list[chan_idx].chan_number =
536 (u32) ch->hw_value;
537 if (filtered_scan) {
538 scan_chan_list[chan_idx].max_scan_time =
539 cpu_to_le16(adapter->specific_scan_time);
540 scan_chan_list[chan_idx].chan_scan_mode_bitmap
541 |= MWIFIEX_DISABLE_CHAN_FILT;
542 }
d06b7b9e 543 chan_idx++;
5e6e3a92
BZ
544 }
545
546 }
547}
548
549/*
550 * This function constructs and sends multiple scan config commands to
551 * the firmware.
552 *
553 * Previous routines in the code flow have created a scan command configuration
554 * with any requested TLVs. This function splits the channel TLV into maximum
555 * channels supported per scan lists and sends the portion of the channel TLV,
556 * along with the other TLVs, to the firmware.
557 */
558static int
600f5d90 559mwifiex_scan_channel_list(struct mwifiex_private *priv,
5e6e3a92
BZ
560 u32 max_chan_per_scan, u8 filtered_scan,
561 struct mwifiex_scan_cmd_config *scan_cfg_out,
562 struct mwifiex_ie_types_chan_list_param_set
563 *chan_tlv_out,
564 struct mwifiex_chan_scan_param_set *scan_chan_list)
565{
566 int ret = 0;
567 struct mwifiex_chan_scan_param_set *tmp_chan_list;
568 struct mwifiex_chan_scan_param_set *start_chan;
569
570 u32 tlv_idx;
571 u32 total_scan_time;
572 u32 done_early;
573
574 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
575 dev_dbg(priv->adapter->dev,
576 "info: Scan: Null detect: %p, %p, %p\n",
577 scan_cfg_out, chan_tlv_out, scan_chan_list);
578 return -1;
579 }
580
581 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
582
583 /* Set the temp channel struct pointer to the start of the desired
584 list */
585 tmp_chan_list = scan_chan_list;
586
587 /* Loop through the desired channel list, sending a new firmware scan
588 commands for each max_chan_per_scan channels (or for 1,6,11
589 individually if configured accordingly) */
590 while (tmp_chan_list->chan_number) {
591
592 tlv_idx = 0;
593 total_scan_time = 0;
594 chan_tlv_out->header.len = 0;
595 start_chan = tmp_chan_list;
596 done_early = false;
597
598 /*
599 * Construct the Channel TLV for the scan command. Continue to
600 * insert channel TLVs until:
601 * - the tlv_idx hits the maximum configured per scan command
602 * - the next channel to insert is 0 (end of desired channel
603 * list)
604 * - done_early is set (controlling individual scanning of
605 * 1,6,11)
606 */
607 while (tlv_idx < max_chan_per_scan
608 && tmp_chan_list->chan_number && !done_early) {
609
610 dev_dbg(priv->adapter->dev,
611 "info: Scan: Chan(%3d), Radio(%d),"
612 " Mode(%d, %d), Dur(%d)\n",
613 tmp_chan_list->chan_number,
614 tmp_chan_list->radio_type,
615 tmp_chan_list->chan_scan_mode_bitmap
616 & MWIFIEX_PASSIVE_SCAN,
617 (tmp_chan_list->chan_scan_mode_bitmap
618 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
619 le16_to_cpu(tmp_chan_list->max_scan_time));
620
621 /* Copy the current channel TLV to the command being
622 prepared */
623 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
624 tmp_chan_list,
625 sizeof(chan_tlv_out->chan_scan_param));
626
627 /* Increment the TLV header length by the size
628 appended */
629 chan_tlv_out->header.len =
630 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
631 (sizeof(chan_tlv_out->chan_scan_param)));
632
633 /*
634 * The tlv buffer length is set to the number of bytes
635 * of the between the channel tlv pointer and the start
636 * of the tlv buffer. This compensates for any TLVs
637 * that were appended before the channel list.
638 */
639 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
640 scan_cfg_out->tlv_buf);
641
642 /* Add the size of the channel tlv header and the data
643 length */
644 scan_cfg_out->tlv_buf_len +=
645 (sizeof(chan_tlv_out->header)
646 + le16_to_cpu(chan_tlv_out->header.len));
647
648 /* Increment the index to the channel tlv we are
649 constructing */
650 tlv_idx++;
651
652 /* Count the total scan time per command */
653 total_scan_time +=
654 le16_to_cpu(tmp_chan_list->max_scan_time);
655
656 done_early = false;
657
658 /* Stop the loop if the *current* channel is in the
659 1,6,11 set and we are not filtering on a BSSID
660 or SSID. */
661 if (!filtered_scan && (tmp_chan_list->chan_number == 1
662 || tmp_chan_list->chan_number == 6
663 || tmp_chan_list->chan_number == 11))
664 done_early = true;
665
666 /* Increment the tmp pointer to the next channel to
667 be scanned */
668 tmp_chan_list++;
669
670 /* Stop the loop if the *next* channel is in the 1,6,11
671 set. This will cause it to be the only channel
672 scanned on the next interation */
673 if (!filtered_scan && (tmp_chan_list->chan_number == 1
674 || tmp_chan_list->chan_number == 6
675 || tmp_chan_list->chan_number == 11))
676 done_early = true;
677 }
678
679 /* The total scan time should be less than scan command timeout
680 value */
681 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
682 dev_err(priv->adapter->dev, "total scan time %dms"
683 " is over limit (%dms), scan skipped\n",
684 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
685 ret = -1;
686 break;
687 }
688
689 priv->adapter->scan_channels = start_chan;
690
691 /* Send the scan command to the firmware with the specified
692 cfg */
600f5d90
AK
693 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
694 HostCmd_ACT_GEN_SET, 0,
695 scan_cfg_out);
5e6e3a92
BZ
696 if (ret)
697 break;
698 }
699
700 if (ret)
701 return -1;
702
703 return 0;
704}
705
706/*
707 * This function constructs a scan command configuration structure to use
708 * in scan commands.
709 *
710 * Application layer or other functions can invoke network scanning
711 * with a scan configuration supplied in a user scan configuration structure.
712 * This structure is used as the basis of one or many scan command configuration
713 * commands that are sent to the command processing module and eventually to the
714 * firmware.
715 *
716 * This function creates a scan command configuration structure based on the
717 * following user supplied parameters (if present):
718 * - SSID filter
719 * - BSSID filter
720 * - Number of Probes to be sent
721 * - Channel list
722 *
723 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
724 * If the number of probes is not set, adapter default setting is used.
725 */
726static void
727mwifiex_scan_setup_scan_config(struct mwifiex_private *priv,
728 const struct mwifiex_user_scan_cfg *user_scan_in,
729 struct mwifiex_scan_cmd_config *scan_cfg_out,
730 struct mwifiex_ie_types_chan_list_param_set
731 **chan_list_out,
732 struct mwifiex_chan_scan_param_set
733 *scan_chan_list,
734 u8 *max_chan_per_scan, u8 *filtered_scan,
735 u8 *scan_current_only)
736{
737 struct mwifiex_adapter *adapter = priv->adapter;
738 struct mwifiex_ie_types_num_probes *num_probes_tlv;
739 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
740 struct mwifiex_ie_types_rates_param_set *rates_tlv;
741 const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
742 u8 *tlv_pos;
743 u32 num_probes;
744 u32 ssid_len;
745 u32 chan_idx;
746 u32 scan_type;
747 u16 scan_dur;
748 u8 channel;
749 u8 radio_type;
750 u32 ssid_idx;
751 u8 ssid_filter;
752 u8 rates[MWIFIEX_SUPPORTED_RATES];
753 u32 rates_size;
754 struct mwifiex_ie_types_htcap *ht_cap;
755
756 /* The tlv_buf_len is calculated for each scan command. The TLVs added
757 in this routine will be preserved since the routine that sends the
758 command will append channelTLVs at *chan_list_out. The difference
759 between the *chan_list_out and the tlv_buf start will be used to
760 calculate the size of anything we add in this routine. */
761 scan_cfg_out->tlv_buf_len = 0;
762
763 /* Running tlv pointer. Assigned to chan_list_out at end of function
764 so later routines know where channels can be added to the command
765 buf */
766 tlv_pos = scan_cfg_out->tlv_buf;
767
768 /* Initialize the scan as un-filtered; the flag is later set to TRUE
769 below if a SSID or BSSID filter is sent in the command */
770 *filtered_scan = false;
771
772 /* Initialize the scan as not being only on the current channel. If
773 the channel list is customized, only contains one channel, and is
774 the active channel, this is set true and data flow is not halted. */
775 *scan_current_only = false;
776
777 if (user_scan_in) {
778
779 /* Default the ssid_filter flag to TRUE, set false under
780 certain wildcard conditions and qualified by the existence
781 of an SSID list before marking the scan as filtered */
782 ssid_filter = true;
783
784 /* Set the BSS type scan filter, use Adapter setting if
785 unset */
786 scan_cfg_out->bss_mode =
787 (user_scan_in->bss_mode ? (u8) user_scan_in->
788 bss_mode : (u8) adapter->scan_mode);
789
790 /* Set the number of probes to send, use Adapter setting
791 if unset */
792 num_probes =
793 (user_scan_in->num_probes ? user_scan_in->
794 num_probes : adapter->scan_probes);
795
796 /*
797 * Set the BSSID filter to the incoming configuration,
798 * if non-zero. If not set, it will remain disabled
799 * (all zeros).
800 */
801 memcpy(scan_cfg_out->specific_bssid,
802 user_scan_in->specific_bssid,
803 sizeof(scan_cfg_out->specific_bssid));
804
805 for (ssid_idx = 0;
806 ((ssid_idx < ARRAY_SIZE(user_scan_in->ssid_list))
807 && (*user_scan_in->ssid_list[ssid_idx].ssid
808 || user_scan_in->ssid_list[ssid_idx].max_len));
809 ssid_idx++) {
810
811 ssid_len = strlen(user_scan_in->ssid_list[ssid_idx].
812 ssid) + 1;
813
814 wildcard_ssid_tlv =
815 (struct mwifiex_ie_types_wildcard_ssid_params *)
816 tlv_pos;
817 wildcard_ssid_tlv->header.type =
818 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
819 wildcard_ssid_tlv->header.len = cpu_to_le16(
820 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
821 max_ssid_length)));
822 wildcard_ssid_tlv->max_ssid_length =
823 user_scan_in->ssid_list[ssid_idx].max_len;
824
825 memcpy(wildcard_ssid_tlv->ssid,
826 user_scan_in->ssid_list[ssid_idx].ssid,
827 ssid_len);
828
829 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
830 + le16_to_cpu(wildcard_ssid_tlv->header.len));
831
832 dev_dbg(adapter->dev, "info: scan: ssid_list[%d]: %s, %d\n",
833 ssid_idx, wildcard_ssid_tlv->ssid,
834 wildcard_ssid_tlv->max_ssid_length);
835
836 /* Empty wildcard ssid with a maxlen will match many or
837 potentially all SSIDs (maxlen == 32), therefore do
838 not treat the scan as
839 filtered. */
840 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
841 ssid_filter = false;
842
843 }
844
845 /*
846 * The default number of channels sent in the command is low to
847 * ensure the response buffer from the firmware does not
848 * truncate scan results. That is not an issue with an SSID
849 * or BSSID filter applied to the scan results in the firmware.
850 */
851 if ((ssid_idx && ssid_filter)
852 || memcmp(scan_cfg_out->specific_bssid, &zero_mac,
853 sizeof(zero_mac)))
854 *filtered_scan = true;
855 } else {
856 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
857 num_probes = adapter->scan_probes;
858 }
859
860 /*
861 * If a specific BSSID or SSID is used, the number of channels in the
862 * scan command will be increased to the absolute maximum.
863 */
864 if (*filtered_scan)
865 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
866 else
867 *max_chan_per_scan = MWIFIEX_CHANNELS_PER_SCAN_CMD;
868
869 /* If the input config or adapter has the number of Probes set,
870 add tlv */
871 if (num_probes) {
872
873 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
874 num_probes);
875
876 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
877 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
878 num_probes_tlv->header.len =
879 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
880 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
881
882 tlv_pos += sizeof(num_probes_tlv->header) +
883 le16_to_cpu(num_probes_tlv->header.len);
884
885 }
886
887 /* Append rates tlv */
888 memset(rates, 0, sizeof(rates));
889
890 rates_size = mwifiex_get_supported_rates(priv, rates);
891
892 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
893 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
894 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
895 memcpy(rates_tlv->rates, rates, rates_size);
896 tlv_pos += sizeof(rates_tlv->header) + rates_size;
897
898 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
899
900 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info)
901 && (priv->adapter->config_bands & BAND_GN
902 || priv->adapter->config_bands & BAND_AN)) {
903 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
904 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
905 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
906 ht_cap->header.len =
907 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
a46b7b5c
AK
908 radio_type =
909 mwifiex_band_to_radio_type(priv->adapter->config_bands);
910 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
5e6e3a92
BZ
911 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
912 }
913
914 /* Append vendor specific IE TLV */
915 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
916
917 /*
918 * Set the output for the channel TLV to the address in the tlv buffer
919 * past any TLVs that were added in this function (SSID, num_probes).
920 * Channel TLVs will be added past this for each scan command,
921 * preserving the TLVs that were previously added.
922 */
923 *chan_list_out =
924 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
925
926 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
927
928 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
929
930 for (chan_idx = 0;
931 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX
932 && user_scan_in->chan_list[chan_idx].chan_number;
933 chan_idx++) {
934
935 channel = user_scan_in->chan_list[chan_idx].chan_number;
936 (scan_chan_list + chan_idx)->chan_number = channel;
937
938 radio_type =
939 user_scan_in->chan_list[chan_idx].radio_type;
940 (scan_chan_list + chan_idx)->radio_type = radio_type;
941
942 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
943
944 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
945 (scan_chan_list +
946 chan_idx)->chan_scan_mode_bitmap
947 |= MWIFIEX_PASSIVE_SCAN;
948 else
949 (scan_chan_list +
950 chan_idx)->chan_scan_mode_bitmap
951 &= ~MWIFIEX_PASSIVE_SCAN;
952
953 if (user_scan_in->chan_list[chan_idx].scan_time) {
954 scan_dur = (u16) user_scan_in->
955 chan_list[chan_idx].scan_time;
956 } else {
957 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
958 scan_dur = adapter->passive_scan_time;
959 else if (*filtered_scan)
960 scan_dur = adapter->specific_scan_time;
961 else
962 scan_dur = adapter->active_scan_time;
963 }
964
965 (scan_chan_list + chan_idx)->min_scan_time =
966 cpu_to_le16(scan_dur);
967 (scan_chan_list + chan_idx)->max_scan_time =
968 cpu_to_le16(scan_dur);
969 }
970
971 /* Check if we are only scanning the current channel */
972 if ((chan_idx == 1)
973 && (user_scan_in->chan_list[0].chan_number
974 == priv->curr_bss_params.bss_descriptor.channel)) {
975 *scan_current_only = true;
976 dev_dbg(adapter->dev,
977 "info: Scan: Scanning current channel only\n");
978 }
979
980 } else {
981 dev_dbg(adapter->dev,
982 "info: Scan: Creating full region channel list\n");
983 mwifiex_scan_create_channel_list(priv, user_scan_in,
984 scan_chan_list,
985 *filtered_scan);
986 }
987}
988
989/*
990 * This function inspects the scan response buffer for pointers to
991 * expected TLVs.
992 *
993 * TLVs can be included at the end of the scan response BSS information.
994 *
995 * Data in the buffer is parsed pointers to TLVs that can potentially
996 * be passed back in the response.
997 */
998static void
999mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
1000 struct mwifiex_ie_types_data *tlv,
1001 u32 tlv_buf_size, u32 req_tlv_type,
1002 struct mwifiex_ie_types_data **tlv_data)
1003{
1004 struct mwifiex_ie_types_data *current_tlv;
1005 u32 tlv_buf_left;
1006 u32 tlv_type;
1007 u32 tlv_len;
1008
1009 current_tlv = tlv;
1010 tlv_buf_left = tlv_buf_size;
1011 *tlv_data = NULL;
1012
1013 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1014 tlv_buf_size);
1015
1016 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1017
1018 tlv_type = le16_to_cpu(current_tlv->header.type);
1019 tlv_len = le16_to_cpu(current_tlv->header.len);
1020
1021 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1022 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1023 break;
1024 }
1025
1026 if (req_tlv_type == tlv_type) {
1027 switch (tlv_type) {
1028 case TLV_TYPE_TSFTIMESTAMP:
1029 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1030 "timestamp TLV, len = %d\n", tlv_len);
1031 *tlv_data = (struct mwifiex_ie_types_data *)
1032 current_tlv;
1033 break;
1034 case TLV_TYPE_CHANNELBANDLIST:
1035 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1036 " band list TLV, len = %d\n", tlv_len);
1037 *tlv_data = (struct mwifiex_ie_types_data *)
1038 current_tlv;
1039 break;
1040 default:
1041 dev_err(adapter->dev,
1042 "SCAN_RESP: unhandled TLV = %d\n",
1043 tlv_type);
1044 /* Give up, this seems corrupted */
1045 return;
1046 }
1047 }
1048
1049 if (*tlv_data)
1050 break;
1051
1052
1053 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1054 current_tlv =
1055 (struct mwifiex_ie_types_data *) (current_tlv->data +
1056 tlv_len);
1057
1058 } /* while */
1059}
1060
1061/*
7c6fa2a8
AK
1062 * This function parses provided beacon buffer and updates
1063 * respective fields in bss descriptor structure.
5e6e3a92 1064 */
7c6fa2a8
AK
1065int
1066mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1067 struct mwifiex_bssdescriptor *bss_entry,
1068 u8 *ie_buf, u32 ie_len)
5e6e3a92
BZ
1069{
1070 int ret = 0;
1071 u8 element_id;
1072 struct ieee_types_fh_param_set *fh_param_set;
1073 struct ieee_types_ds_param_set *ds_param_set;
1074 struct ieee_types_cf_param_set *cf_param_set;
1075 struct ieee_types_ibss_param_set *ibss_param_set;
5e6e3a92
BZ
1076 u8 *current_ptr;
1077 u8 *rate;
1078 u8 element_len;
1079 u16 total_ie_len;
1080 u8 bytes_to_copy;
1081 u8 rate_size;
5e6e3a92 1082 u8 found_data_rate_ie;
7c6fa2a8 1083 u32 bytes_left;
5e6e3a92
BZ
1084 struct ieee_types_vendor_specific *vendor_ie;
1085 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1086 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1087
1088 found_data_rate_ie = false;
1089 rate_size = 0;
7c6fa2a8
AK
1090 current_ptr = ie_buf;
1091 bytes_left = ie_len;
1092 bss_entry->beacon_buf = ie_buf;
1093 bss_entry->beacon_buf_size = ie_len;
5e6e3a92
BZ
1094
1095 /* Process variable IE */
7c6fa2a8 1096 while (bytes_left >= 2) {
5e6e3a92
BZ
1097 element_id = *current_ptr;
1098 element_len = *(current_ptr + 1);
1099 total_ie_len = element_len + sizeof(struct ieee_types_header);
1100
7c6fa2a8 1101 if (bytes_left < total_ie_len) {
5e6e3a92
BZ
1102 dev_err(adapter->dev, "err: InterpretIE: in processing"
1103 " IE, bytes left < IE length\n");
7c6fa2a8 1104 return -1;
5e6e3a92
BZ
1105 }
1106 switch (element_id) {
1107 case WLAN_EID_SSID:
1108 bss_entry->ssid.ssid_len = element_len;
1109 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1110 element_len);
7c6fa2a8
AK
1111 dev_dbg(adapter->dev, "info: InterpretIE: ssid: "
1112 "%-32s\n", bss_entry->ssid.ssid);
5e6e3a92
BZ
1113 break;
1114
1115 case WLAN_EID_SUPP_RATES:
1116 memcpy(bss_entry->data_rates, current_ptr + 2,
1117 element_len);
1118 memcpy(bss_entry->supported_rates, current_ptr + 2,
1119 element_len);
1120 rate_size = element_len;
1121 found_data_rate_ie = true;
1122 break;
1123
1124 case WLAN_EID_FH_PARAMS:
1125 fh_param_set =
1126 (struct ieee_types_fh_param_set *) current_ptr;
1127 memcpy(&bss_entry->phy_param_set.fh_param_set,
1128 fh_param_set,
1129 sizeof(struct ieee_types_fh_param_set));
1130 break;
1131
1132 case WLAN_EID_DS_PARAMS:
1133 ds_param_set =
1134 (struct ieee_types_ds_param_set *) current_ptr;
1135
1136 bss_entry->channel = ds_param_set->current_chan;
1137
1138 memcpy(&bss_entry->phy_param_set.ds_param_set,
1139 ds_param_set,
1140 sizeof(struct ieee_types_ds_param_set));
1141 break;
1142
1143 case WLAN_EID_CF_PARAMS:
1144 cf_param_set =
1145 (struct ieee_types_cf_param_set *) current_ptr;
1146 memcpy(&bss_entry->ss_param_set.cf_param_set,
1147 cf_param_set,
1148 sizeof(struct ieee_types_cf_param_set));
1149 break;
1150
1151 case WLAN_EID_IBSS_PARAMS:
1152 ibss_param_set =
1153 (struct ieee_types_ibss_param_set *)
1154 current_ptr;
1155 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1156 ibss_param_set,
1157 sizeof(struct ieee_types_ibss_param_set));
1158 break;
1159
1160 case WLAN_EID_ERP_INFO:
1161 bss_entry->erp_flags = *(current_ptr + 2);
1162 break;
1163
1164 case WLAN_EID_EXT_SUPP_RATES:
1165 /*
1166 * Only process extended supported rate
1167 * if data rate is already found.
1168 * Data rate IE should come before
1169 * extended supported rate IE
1170 */
1171 if (found_data_rate_ie) {
1172 if ((element_len + rate_size) >
1173 MWIFIEX_SUPPORTED_RATES)
1174 bytes_to_copy =
1175 (MWIFIEX_SUPPORTED_RATES -
1176 rate_size);
1177 else
1178 bytes_to_copy = element_len;
1179
1180 rate = (u8 *) bss_entry->data_rates;
1181 rate += rate_size;
1182 memcpy(rate, current_ptr + 2, bytes_to_copy);
1183
1184 rate = (u8 *) bss_entry->supported_rates;
1185 rate += rate_size;
1186 memcpy(rate, current_ptr + 2, bytes_to_copy);
1187 }
1188 break;
1189
1190 case WLAN_EID_VENDOR_SPECIFIC:
1191 vendor_ie = (struct ieee_types_vendor_specific *)
1192 current_ptr;
1193
1194 if (!memcmp
1195 (vendor_ie->vend_hdr.oui, wpa_oui,
1196 sizeof(wpa_oui))) {
1197 bss_entry->bcn_wpa_ie =
1198 (struct ieee_types_vendor_specific *)
1199 current_ptr;
1200 bss_entry->wpa_offset = (u16) (current_ptr -
1201 bss_entry->beacon_buf);
1202 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1203 sizeof(wmm_oui))) {
1204 if (total_ie_len ==
1205 sizeof(struct ieee_types_wmm_parameter)
1206 || total_ie_len ==
1207 sizeof(struct ieee_types_wmm_info))
1208 /*
1209 * Only accept and copy the WMM IE if
1210 * it matches the size expected for the
1211 * WMM Info IE or the WMM Parameter IE.
1212 */
1213 memcpy((u8 *) &bss_entry->wmm_ie,
1214 current_ptr, total_ie_len);
1215 }
1216 break;
1217 case WLAN_EID_RSN:
1218 bss_entry->bcn_rsn_ie =
1219 (struct ieee_types_generic *) current_ptr;
1220 bss_entry->rsn_offset = (u16) (current_ptr -
1221 bss_entry->beacon_buf);
1222 break;
1223 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1224 bss_entry->bcn_wapi_ie =
1225 (struct ieee_types_generic *) current_ptr;
1226 bss_entry->wapi_offset = (u16) (current_ptr -
1227 bss_entry->beacon_buf);
1228 break;
1229 case WLAN_EID_HT_CAPABILITY:
1230 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1231 (current_ptr +
1232 sizeof(struct ieee_types_header));
1233 bss_entry->ht_cap_offset = (u16) (current_ptr +
1234 sizeof(struct ieee_types_header) -
1235 bss_entry->beacon_buf);
1236 break;
1237 case WLAN_EID_HT_INFORMATION:
1238 bss_entry->bcn_ht_info = (struct ieee80211_ht_info *)
1239 (current_ptr +
1240 sizeof(struct ieee_types_header));
1241 bss_entry->ht_info_offset = (u16) (current_ptr +
1242 sizeof(struct ieee_types_header) -
1243 bss_entry->beacon_buf);
1244 break;
1245 case WLAN_EID_BSS_COEX_2040:
1246 bss_entry->bcn_bss_co_2040 = (u8 *) (current_ptr +
1247 sizeof(struct ieee_types_header));
1248 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1249 sizeof(struct ieee_types_header) -
1250 bss_entry->beacon_buf);
1251 break;
1252 case WLAN_EID_EXT_CAPABILITY:
1253 bss_entry->bcn_ext_cap = (u8 *) (current_ptr +
1254 sizeof(struct ieee_types_header));
1255 bss_entry->ext_cap_offset = (u16) (current_ptr +
1256 sizeof(struct ieee_types_header) -
1257 bss_entry->beacon_buf);
1258 break;
5e6e3a92
BZ
1259 default:
1260 break;
1261 }
1262
1263 current_ptr += element_len + 2;
1264
1265 /* Need to account for IE ID and IE Len */
7c6fa2a8 1266 bytes_left -= (element_len + 2);
5e6e3a92 1267
7c6fa2a8 1268 } /* while (bytes_left > 2) */
5e6e3a92
BZ
1269 return ret;
1270}
1271
5e6e3a92
BZ
1272/*
1273 * This function converts radio type scan parameter to a band configuration
1274 * to be used in join command.
1275 */
1276static u8
1277mwifiex_radio_type_to_band(u8 radio_type)
1278{
5e6e3a92
BZ
1279 switch (radio_type) {
1280 case HostCmd_SCAN_RADIO_TYPE_A:
636c4598 1281 return BAND_A;
5e6e3a92
BZ
1282 case HostCmd_SCAN_RADIO_TYPE_BG:
1283 default:
636c4598 1284 return BAND_G;
5e6e3a92 1285 }
5e6e3a92
BZ
1286}
1287
5e6e3a92
BZ
1288/*
1289 * This is an internal function used to start a scan based on an input
1290 * configuration.
1291 *
1292 * This uses the input user scan configuration information when provided in
1293 * order to send the appropriate scan commands to firmware to populate or
1294 * update the internal driver scan table.
1295 */
711825a0
AK
1296static int mwifiex_scan_networks(struct mwifiex_private *priv,
1297 const struct mwifiex_user_scan_cfg *user_scan_in)
5e6e3a92
BZ
1298{
1299 int ret = 0;
1300 struct mwifiex_adapter *adapter = priv->adapter;
270e58e8
YAP
1301 struct cmd_ctrl_node *cmd_node;
1302 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
5e6e3a92
BZ
1303 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1304 u32 buf_size;
1305 struct mwifiex_chan_scan_param_set *scan_chan_list;
5e6e3a92
BZ
1306 u8 filtered_scan;
1307 u8 scan_current_chan_only;
1308 u8 max_chan_per_scan;
1309 unsigned long flags;
1310
600f5d90 1311 if (adapter->scan_processing) {
5e6e3a92
BZ
1312 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1313 return ret;
1314 }
1315
1316 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1317 adapter->scan_processing = true;
1318 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1319
600f5d90 1320 if (priv->scan_block) {
5e6e3a92
BZ
1321 dev_dbg(adapter->dev,
1322 "cmd: Scan is blocked during association...\n");
1323 return ret;
1324 }
1325
1326 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1327 GFP_KERNEL);
1328 if (!scan_cfg_out) {
1329 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
b53575ec 1330 return -ENOMEM;
5e6e3a92
BZ
1331 }
1332
1333 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
1334 MWIFIEX_USER_SCAN_CHAN_MAX;
1335 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1336 if (!scan_chan_list) {
1337 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1338 kfree(scan_cfg_out);
b53575ec 1339 return -ENOMEM;
5e6e3a92
BZ
1340 }
1341
5e6e3a92
BZ
1342 mwifiex_scan_setup_scan_config(priv, user_scan_in,
1343 &scan_cfg_out->config, &chan_list_out,
1344 scan_chan_list, &max_chan_per_scan,
1345 &filtered_scan, &scan_current_chan_only);
1346
600f5d90
AK
1347 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1348 &scan_cfg_out->config, chan_list_out,
1349 scan_chan_list);
5e6e3a92
BZ
1350
1351 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1352 if (!ret) {
1353 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1354 if (!list_empty(&adapter->scan_pending_q)) {
1355 cmd_node = list_first_entry(&adapter->scan_pending_q,
1356 struct cmd_ctrl_node, list);
1357 list_del(&cmd_node->list);
1358 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1359 flags);
efaaa8b8 1360 adapter->cmd_queued = cmd_node;
5e6e3a92
BZ
1361 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1362 true);
1363 } else {
1364 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1365 flags);
1366 }
5e6e3a92
BZ
1367 } else {
1368 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1369 adapter->scan_processing = true;
1370 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1371 }
1372
1373 kfree(scan_cfg_out);
1374 kfree(scan_chan_list);
1375 return ret;
1376}
1377
711825a0
AK
1378/*
1379 * Sends IOCTL request to start a scan with user configurations.
1380 *
1381 * This function allocates the IOCTL request buffer, fills it
1382 * with requisite parameters and calls the IOCTL handler.
1383 *
1384 * Upon completion, it also generates a wireless event to notify
1385 * applications.
1386 */
1387int mwifiex_set_user_scan_ioctl(struct mwifiex_private *priv,
1388 struct mwifiex_user_scan_cfg *scan_req)
1389{
1390 int status;
1391
1392 priv->adapter->scan_wait_q_woken = false;
1393
1394 status = mwifiex_scan_networks(priv, scan_req);
1395 if (!status)
1396 status = mwifiex_wait_queue_complete(priv->adapter);
1397
1398 return status;
1399}
1400
5e6e3a92
BZ
1401/*
1402 * This function prepares a scan command to be sent to the firmware.
1403 *
1404 * This uses the scan command configuration sent to the command processing
1405 * module in command preparation stage to configure a scan command structure
1406 * to send to firmware.
1407 *
1408 * The fixed fields specifying the BSS type and BSSID filters as well as a
1409 * variable number/length of TLVs are sent in the command to firmware.
1410 *
1411 * Preparation also includes -
1412 * - Setting command ID, and proper size
1413 * - Ensuring correct endian-ness
1414 */
a5ffddb7
AK
1415int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1416 struct mwifiex_scan_cmd_config *scan_cfg)
5e6e3a92
BZ
1417{
1418 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
5e6e3a92
BZ
1419
1420 /* Set fixed field variables in scan command */
1421 scan_cmd->bss_mode = scan_cfg->bss_mode;
1422 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1423 sizeof(scan_cmd->bssid));
1424 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1425
1426 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1427
1428 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1429 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1430 + sizeof(scan_cmd->bssid)
1431 + scan_cfg->tlv_buf_len + S_DS_GEN));
1432
1433 return 0;
1434}
1435
7c6fa2a8
AK
1436/*
1437 * This function checks compatibility of requested network with current
1438 * driver settings.
1439 */
1440int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1441 struct mwifiex_bssdescriptor *bss_desc)
1442{
1443 int ret = -1;
1444
1445 if (!bss_desc)
1446 return -1;
1447
1448 if ((mwifiex_get_cfp_by_band_and_channel_from_cfg80211(priv,
1449 (u8) bss_desc->bss_band, (u16) bss_desc->channel))) {
1450 switch (priv->bss_mode) {
1451 case NL80211_IFTYPE_STATION:
1452 case NL80211_IFTYPE_ADHOC:
1453 ret = mwifiex_is_network_compatible(priv, bss_desc,
1454 priv->bss_mode);
1455 if (ret)
1456 dev_err(priv->adapter->dev, "cannot find ssid "
1457 "%s\n", bss_desc->ssid.ssid);
1458 break;
1459 default:
1460 ret = 0;
1461 }
1462 }
1463
1464 return ret;
1465}
1466
1467static int
5116f3ce
AK
1468mwifiex_update_curr_bss_params(struct mwifiex_private *priv, u8 *bssid,
1469 s32 rssi, const u8 *ie_buf, size_t ie_len,
1470 u16 beacon_period, u16 cap_info_bitmap, u8 band)
7c6fa2a8
AK
1471{
1472 struct mwifiex_bssdescriptor *bss_desc = NULL;
1473 int ret;
1474 unsigned long flags;
1475 u8 *beacon_ie;
1476
1477 /* Allocate and fill new bss descriptor */
1478 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1479 GFP_KERNEL);
1480 if (!bss_desc) {
1481 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1482 return -ENOMEM;
1483 }
5982b47a
YAP
1484
1485 beacon_ie = kmemdup(ie_buf, ie_len, GFP_KERNEL);
f7503230
JL
1486 if (!beacon_ie) {
1487 dev_err(priv->adapter->dev, " failed to alloc beacon_ie\n");
7c6fa2a8
AK
1488 return -ENOMEM;
1489 }
7c6fa2a8
AK
1490
1491 ret = mwifiex_fill_new_bss_desc(priv, bssid, rssi, beacon_ie,
1492 ie_len, beacon_period,
5116f3ce 1493 cap_info_bitmap, band, bss_desc);
7c6fa2a8
AK
1494 if (ret)
1495 goto done;
1496
1497 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1498 if (ret)
1499 goto done;
1500
1501 /* Update current bss descriptor parameters */
1502 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1503 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1504 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1505 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1506 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1507 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1508 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1509 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1510 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1511 0;
1512 priv->curr_bss_params.bss_descriptor.bcn_ht_info = NULL;
1513 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1514 0;
1515 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1516 NULL;
1517 priv->curr_bss_params.bss_descriptor.
1518 bss_co_2040_offset = 0;
1519 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1520 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1521 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1522 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1523 0;
1524
1525 /* Make a copy of current BSSID descriptor */
1526 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1527 sizeof(priv->curr_bss_params.bss_descriptor));
1528 mwifiex_save_curr_bcn(priv);
1529 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1530
1531done:
1532 kfree(bss_desc);
1533 kfree(beacon_ie);
1534 return 0;
1535}
1536
5116f3ce
AK
1537static void mwifiex_free_bss_priv(struct cfg80211_bss *bss)
1538{
1539 kfree(bss->priv);
1540}
1541
5e6e3a92
BZ
1542/*
1543 * This function handles the command response of scan.
1544 *
1545 * The response buffer for the scan command has the following
1546 * memory layout:
1547 *
1548 * .-------------------------------------------------------------.
1549 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1550 * .-------------------------------------------------------------.
1551 * | BufSize (t_u16) : sizeof the BSS Description data |
1552 * .-------------------------------------------------------------.
1553 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1554 * .-------------------------------------------------------------.
1555 * | BSSDescription data (variable, size given in BufSize) |
1556 * .-------------------------------------------------------------.
1557 * | TLV data (variable, size calculated using Header->Size, |
1558 * | BufSize and sizeof the fixed fields above) |
1559 * .-------------------------------------------------------------.
1560 */
1561int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
600f5d90 1562 struct host_cmd_ds_command *resp)
5e6e3a92
BZ
1563{
1564 int ret = 0;
1565 struct mwifiex_adapter *adapter = priv->adapter;
270e58e8
YAP
1566 struct cmd_ctrl_node *cmd_node;
1567 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
5e6e3a92
BZ
1568 struct mwifiex_ie_types_data *tlv_data;
1569 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1570 u8 *bss_info;
1571 u32 scan_resp_size;
1572 u32 bytes_left;
5e6e3a92
BZ
1573 u32 idx;
1574 u32 tlv_buf_size;
5e6e3a92
BZ
1575 struct mwifiex_chan_freq_power *cfp;
1576 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1577 struct chan_band_param_set *chan_band;
5e6e3a92
BZ
1578 u8 is_bgscan_resp;
1579 unsigned long flags;
5116f3ce 1580 struct cfg80211_bss *bss;
5e6e3a92
BZ
1581
1582 is_bgscan_resp = (le16_to_cpu(resp->command)
1583 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1584 if (is_bgscan_resp)
1585 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1586 else
1587 scan_rsp = &resp->params.scan_resp;
1588
1589
67a50035 1590 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
5e6e3a92
BZ
1591 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1592 scan_rsp->number_of_sets);
1593 ret = -1;
1594 goto done;
1595 }
1596
1597 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1598 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1599 bytes_left);
1600
1601 scan_resp_size = le16_to_cpu(resp->size);
1602
1603 dev_dbg(adapter->dev,
1604 "info: SCAN_RESP: returned %d APs before parsing\n",
1605 scan_rsp->number_of_sets);
1606
5e6e3a92
BZ
1607 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1608
1609 /*
1610 * The size of the TLV buffer is equal to the entire command response
1611 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1612 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1613 * response header (S_DS_GEN)
1614 */
1615 tlv_buf_size = scan_resp_size - (bytes_left
1616 + sizeof(scan_rsp->bss_descript_size)
1617 + sizeof(scan_rsp->number_of_sets)
1618 + S_DS_GEN);
1619
1620 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1621 bss_desc_and_tlv_buffer +
1622 bytes_left);
1623
1624 /* Search the TLV buffer space in the scan response for any valid
1625 TLVs */
1626 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1627 TLV_TYPE_TSFTIMESTAMP,
1628 (struct mwifiex_ie_types_data **)
1629 &tsf_tlv);
1630
1631 /* Search the TLV buffer space in the scan response for any valid
1632 TLVs */
1633 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1634 TLV_TYPE_CHANNELBANDLIST,
1635 (struct mwifiex_ie_types_data **)
1636 &chan_band_tlv);
1637
5e6e3a92 1638 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
7c6fa2a8
AK
1639 u8 bssid[ETH_ALEN];
1640 s32 rssi;
1641 const u8 *ie_buf;
1642 size_t ie_len;
1643 int channel = -1;
1644 u64 network_tsf = 0;
1645 u16 beacon_size = 0;
1646 u32 curr_bcn_bytes;
1647 u32 freq;
1648 u16 beacon_period;
1649 u16 cap_info_bitmap;
1650 u8 *current_ptr;
1651 struct mwifiex_bcn_param *bcn_param;
1652
1653 if (bytes_left >= sizeof(beacon_size)) {
1654 /* Extract & convert beacon size from command buffer */
1655 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1656 bytes_left -= sizeof(beacon_size);
1657 bss_info += sizeof(beacon_size);
5e6e3a92
BZ
1658 }
1659
7c6fa2a8
AK
1660 if (!beacon_size || beacon_size > bytes_left) {
1661 bss_info += bytes_left;
1662 bytes_left = 0;
1663 return -1;
1664 }
5e6e3a92 1665
7c6fa2a8
AK
1666 /* Initialize the current working beacon pointer for this BSS
1667 * iteration */
1668 current_ptr = bss_info;
1669
1670 /* Advance the return beacon pointer past the current beacon */
1671 bss_info += beacon_size;
1672 bytes_left -= beacon_size;
1673
1674 curr_bcn_bytes = beacon_size;
1675
1676 /*
1677 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1678 * and capability information
1679 */
1680 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1681 dev_err(adapter->dev, "InterpretIE: not enough bytes left\n");
1682 continue;
1683 }
1684 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1685 current_ptr += sizeof(*bcn_param);
1686 curr_bcn_bytes -= sizeof(*bcn_param);
1687
1688 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1689
1690 rssi = (s32) (bcn_param->rssi);
1691 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%02X\n",
1692 rssi);
1693
1694 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1695
1696 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1697 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1698 cap_info_bitmap);
1699
1700 /* Rest of the current buffer are IE's */
1701 ie_buf = current_ptr;
1702 ie_len = curr_bcn_bytes;
1703 dev_dbg(adapter->dev, "info: InterpretIE: IELength for this AP"
1704 " = %d\n", curr_bcn_bytes);
1705
1706 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1707 u8 element_id, element_len;
1708
1709 element_id = *current_ptr;
1710 element_len = *(current_ptr + 1);
1711 if (curr_bcn_bytes < element_len +
1712 sizeof(struct ieee_types_header)) {
1713 dev_err(priv->adapter->dev, "%s: in processing"
1714 " IE, bytes left < IE length\n",
1715 __func__);
1716 goto done;
5e6e3a92 1717 }
7c6fa2a8
AK
1718 if (element_id == WLAN_EID_DS_PARAMS) {
1719 channel = *(u8 *) (current_ptr +
1720 sizeof(struct ieee_types_header));
5e6e3a92
BZ
1721 break;
1722 }
7c6fa2a8
AK
1723
1724 current_ptr += element_len +
1725 sizeof(struct ieee_types_header);
1726 curr_bcn_bytes -= element_len +
1727 sizeof(struct ieee_types_header);
5e6e3a92
BZ
1728 }
1729
5e6e3a92
BZ
1730 /*
1731 * If the TSF TLV was appended to the scan results, save this
1732 * entry's TSF value in the networkTSF field.The networkTSF is
1733 * the firmware's TSF value at the time the beacon or probe
1734 * response was received.
1735 */
7c6fa2a8
AK
1736 if (tsf_tlv)
1737 memcpy(&network_tsf,
1738 &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1739 sizeof(network_tsf));
1740
1741 if (channel != -1) {
1742 struct ieee80211_channel *chan;
1743 u8 band;
1744
1745 band = BAND_G;
1746 if (chan_band_tlv) {
1747 chan_band =
1748 &chan_band_tlv->chan_band_param[idx];
1749 band = mwifiex_radio_type_to_band(
1750 chan_band->radio_type
1751 & (BIT(0) | BIT(1)));
1752 }
5e6e3a92 1753
7c6fa2a8
AK
1754 cfp = mwifiex_get_cfp_by_band_and_channel_from_cfg80211(
1755 priv, (u8)band, (u16)channel);
5e6e3a92 1756
7c6fa2a8 1757 freq = cfp ? cfp->freq : 0;
5e6e3a92 1758
7c6fa2a8 1759 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
5e6e3a92 1760
7c6fa2a8 1761 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
5116f3ce
AK
1762 bss = cfg80211_inform_bss(priv->wdev->wiphy,
1763 chan, bssid, network_tsf,
1764 cap_info_bitmap, beacon_period,
1765 ie_buf, ie_len, rssi, GFP_KERNEL);
1766 *(u8 *)bss->priv = band;
1767 bss->free_priv = mwifiex_free_bss_priv;
5e6e3a92 1768
7c6fa2a8
AK
1769 if (priv->media_connected && !memcmp(bssid,
1770 priv->curr_bss_params.bss_descriptor
1771 .mac_address, ETH_ALEN))
1772 mwifiex_update_curr_bss_params(priv,
1773 bssid, rssi, ie_buf,
1774 ie_len, beacon_period,
5116f3ce 1775 cap_info_bitmap, band);
7c6fa2a8
AK
1776 }
1777 } else {
1778 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1779 }
1780 }
5e6e3a92
BZ
1781
1782 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1783 if (list_empty(&adapter->scan_pending_q)) {
1784 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1785 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1786 adapter->scan_processing = false;
1787 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
5e6e3a92
BZ
1788
1789 /* Need to indicate IOCTL complete */
600f5d90
AK
1790 if (adapter->curr_cmd->wait_q_enabled) {
1791 adapter->cmd_wait_q.status = 0;
efaaa8b8 1792 mwifiex_complete_cmd(adapter, adapter->curr_cmd);
5e6e3a92
BZ
1793 }
1794 if (priv->report_scan_result)
1795 priv->report_scan_result = false;
1796 if (priv->scan_pending_on_block) {
1797 priv->scan_pending_on_block = false;
1798 up(&priv->async_sem);
1799 }
1800
1801 } else {
1802 /* Get scan command from scan_pending_q and put to
1803 cmd_pending_q */
1804 cmd_node = list_first_entry(&adapter->scan_pending_q,
1805 struct cmd_ctrl_node, list);
1806 list_del(&cmd_node->list);
1807 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1808
1809 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node, true);
1810 }
1811
1812done:
5e6e3a92
BZ
1813 return ret;
1814}
1815
1816/*
1817 * This function prepares command for background scan query.
1818 *
1819 * Preparation includes -
1820 * - Setting command ID and proper size
1821 * - Setting background scan flush parameter
1822 * - Ensuring correct endian-ness
1823 */
572e8f3e 1824int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
5e6e3a92
BZ
1825{
1826 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1827 &cmd->params.bg_scan_query;
1828
1829 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1830 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1831 + S_DS_GEN);
1832
1833 bg_query->flush = 1;
1834
1835 return 0;
1836}
1837
5e6e3a92
BZ
1838/*
1839 * This function inserts scan command node to the scan pending queue.
1840 */
1841void
1842mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1843 struct cmd_ctrl_node *cmd_node)
1844{
1845 struct mwifiex_adapter *adapter = priv->adapter;
1846 unsigned long flags;
1847
600f5d90 1848 cmd_node->wait_q_enabled = true;
efaaa8b8 1849 cmd_node->condition = &adapter->scan_wait_q_woken;
5e6e3a92
BZ
1850 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1851 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1852 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1853}
1854
5e6e3a92
BZ
1855/*
1856 * This function sends a scan command for all available channels to the
1857 * firmware, filtered on a specific SSID.
1858 */
1859static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
600f5d90 1860 struct mwifiex_802_11_ssid *req_ssid)
5e6e3a92
BZ
1861{
1862 struct mwifiex_adapter *adapter = priv->adapter;
1863 int ret = 0;
1864 struct mwifiex_user_scan_cfg *scan_cfg;
1865
1866 if (!req_ssid)
1867 return -1;
1868
600f5d90 1869 if (adapter->scan_processing) {
5e6e3a92
BZ
1870 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1871 return ret;
1872 }
1873
600f5d90 1874 if (priv->scan_block) {
5e6e3a92
BZ
1875 dev_dbg(adapter->dev,
1876 "cmd: Scan is blocked during association...\n");
1877 return ret;
1878 }
1879
5e6e3a92
BZ
1880 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1881 if (!scan_cfg) {
1882 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
b53575ec 1883 return -ENOMEM;
5e6e3a92
BZ
1884 }
1885
1886 memcpy(scan_cfg->ssid_list[0].ssid, req_ssid->ssid,
1887 req_ssid->ssid_len);
5e6e3a92 1888
600f5d90 1889 ret = mwifiex_scan_networks(priv, scan_cfg);
5e6e3a92
BZ
1890
1891 kfree(scan_cfg);
1892 return ret;
1893}
1894
1895/*
1896 * Sends IOCTL request to start a scan.
1897 *
1898 * This function allocates the IOCTL request buffer, fills it
1899 * with requisite parameters and calls the IOCTL handler.
1900 *
1901 * Scan command can be issued for both normal scan and specific SSID
1902 * scan, depending upon whether an SSID is provided or not.
1903 */
600f5d90 1904int mwifiex_request_scan(struct mwifiex_private *priv,
5e6e3a92
BZ
1905 struct mwifiex_802_11_ssid *req_ssid)
1906{
270e58e8 1907 int ret;
5e6e3a92
BZ
1908
1909 if (down_interruptible(&priv->async_sem)) {
1910 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1911 __func__);
1912 return -1;
1913 }
1914 priv->scan_pending_on_block = true;
1915
efaaa8b8 1916 priv->adapter->scan_wait_q_woken = false;
5e6e3a92
BZ
1917
1918 if (req_ssid && req_ssid->ssid_len != 0)
1919 /* Specific SSID scan */
600f5d90 1920 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
5e6e3a92
BZ
1921 else
1922 /* Normal scan */
600f5d90
AK
1923 ret = mwifiex_scan_networks(priv, NULL);
1924
1925 if (!ret)
1926 ret = mwifiex_wait_queue_complete(priv->adapter);
1927
5e6e3a92
BZ
1928 if (ret == -1) {
1929 priv->scan_pending_on_block = false;
1930 up(&priv->async_sem);
1931 }
600f5d90 1932
5e6e3a92
BZ
1933 return ret;
1934}
1935
1936/*
1937 * This function appends the vendor specific IE TLV to a buffer.
1938 */
1939int
1940mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1941 u16 vsie_mask, u8 **buffer)
1942{
1943 int id, ret_len = 0;
1944 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1945
1946 if (!buffer)
1947 return 0;
1948 if (!(*buffer))
1949 return 0;
1950
1951 /*
1952 * Traverse through the saved vendor specific IE array and append
1953 * the selected(scan/assoc/adhoc) IE as TLV to the command
1954 */
1955 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1956 if (priv->vs_ie[id].mask & vsie_mask) {
1957 vs_param_set =
1958 (struct mwifiex_ie_types_vendor_param_set *)
1959 *buffer;
1960 vs_param_set->header.type =
1961 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1962 vs_param_set->header.len =
1963 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1964 & 0x00FF) + 2);
1965 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1966 le16_to_cpu(vs_param_set->header.len));
1967 *buffer += le16_to_cpu(vs_param_set->header.len) +
1968 sizeof(struct mwifiex_ie_types_header);
1969 ret_len += le16_to_cpu(vs_param_set->header.len) +
1970 sizeof(struct mwifiex_ie_types_header);
1971 }
1972 }
1973 return ret_len;
1974}
1975
1976/*
1977 * This function saves a beacon buffer of the current BSS descriptor.
1978 *
1979 * The current beacon buffer is saved so that it can be restored in the
1980 * following cases that makes the beacon buffer not to contain the current
1981 * ssid's beacon buffer.
1982 * - The current ssid was not found somehow in the last scan.
1983 * - The current ssid was the last entry of the scan table and overloaded.
1984 */
1985void
1986mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1987{
1988 struct mwifiex_bssdescriptor *curr_bss =
1989 &priv->curr_bss_params.bss_descriptor;
1990
030fe797
AK
1991 if (!curr_bss->beacon_buf_size)
1992 return;
5e6e3a92 1993
030fe797
AK
1994 /* allocate beacon buffer at 1st time; or if it's size has changed */
1995 if (!priv->curr_bcn_buf ||
1996 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
5e6e3a92 1997 priv->curr_bcn_size = curr_bss->beacon_buf_size;
5e6e3a92 1998
030fe797 1999 kfree(priv->curr_bcn_buf);
5982b47a 2000 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
5e6e3a92
BZ
2001 GFP_KERNEL);
2002 if (!priv->curr_bcn_buf) {
2003 dev_err(priv->adapter->dev,
2004 "failed to alloc curr_bcn_buf\n");
030fe797 2005 return;
5e6e3a92
BZ
2006 }
2007 }
030fe797
AK
2008
2009 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
2010 curr_bss->beacon_buf_size);
2011 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
2012 priv->curr_bcn_size);
7c6fa2a8
AK
2013
2014 curr_bss->beacon_buf = priv->curr_bcn_buf;
2015
2016 /* adjust the pointers in the current BSS descriptor */
2017 if (curr_bss->bcn_wpa_ie)
2018 curr_bss->bcn_wpa_ie =
2019 (struct ieee_types_vendor_specific *)
2020 (curr_bss->beacon_buf +
2021 curr_bss->wpa_offset);
2022
2023 if (curr_bss->bcn_rsn_ie)
2024 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2025 (curr_bss->beacon_buf +
2026 curr_bss->rsn_offset);
2027
2028 if (curr_bss->bcn_ht_cap)
2029 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2030 (curr_bss->beacon_buf +
2031 curr_bss->ht_cap_offset);
2032
2033 if (curr_bss->bcn_ht_info)
2034 curr_bss->bcn_ht_info = (struct ieee80211_ht_info *)
2035 (curr_bss->beacon_buf +
2036 curr_bss->ht_info_offset);
2037
2038 if (curr_bss->bcn_bss_co_2040)
2039 curr_bss->bcn_bss_co_2040 =
2040 (u8 *) (curr_bss->beacon_buf +
2041 curr_bss->bss_co_2040_offset);
2042
2043 if (curr_bss->bcn_ext_cap)
2044 curr_bss->bcn_ext_cap = (u8 *) (curr_bss->beacon_buf +
2045 curr_bss->ext_cap_offset);
5e6e3a92
BZ
2046}
2047
2048/*
2049 * This function frees the current BSS descriptor beacon buffer.
2050 */
2051void
2052mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2053{
2054 kfree(priv->curr_bcn_buf);
2055 priv->curr_bcn_buf = NULL;
2056}
This page took 0.178321 seconds and 5 git commands to generate.