Commit | Line | Data |
---|---|---|
5e6e3a92 BZ |
1 | /* |
2 | * Marvell Wireless LAN device driver: association and ad-hoc start/join | |
3 | * | |
4 | * Copyright (C) 2011, Marvell International Ltd. | |
5 | * | |
6 | * This software file (the "File") is distributed by Marvell International | |
7 | * Ltd. under the terms of the GNU General Public License Version 2, June 1991 | |
8 | * (the "License"). You may use, redistribute and/or modify this File in | |
9 | * accordance with the terms and conditions of the License, a copy of which | |
10 | * is available by writing to the Free Software Foundation, Inc., | |
11 | * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the | |
12 | * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt. | |
13 | * | |
14 | * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE | |
15 | * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE | |
16 | * ARE EXPRESSLY DISCLAIMED. The License provides additional details about | |
17 | * this warranty disclaimer. | |
18 | */ | |
19 | ||
20 | #include "decl.h" | |
21 | #include "ioctl.h" | |
22 | #include "util.h" | |
23 | #include "fw.h" | |
24 | #include "main.h" | |
25 | #include "wmm.h" | |
26 | #include "11n.h" | |
27 | ||
28 | #define CAPINFO_MASK (~(BIT(15) | BIT(14) | BIT(12) | BIT(11) | BIT(9))) | |
29 | ||
30 | /* | |
31 | * Append a generic IE as a pass through TLV to a TLV buffer. | |
32 | * | |
33 | * This function is called from the network join command preparation routine. | |
34 | * | |
35 | * If the IE buffer has been setup by the application, this routine appends | |
36 | * the buffer as a pass through TLV type to the request. | |
37 | */ | |
38 | static int | |
39 | mwifiex_cmd_append_generic_ie(struct mwifiex_private *priv, u8 **buffer) | |
40 | { | |
41 | int ret_len = 0; | |
42 | struct mwifiex_ie_types_header ie_header; | |
43 | ||
44 | /* Null Checks */ | |
45 | if (!buffer) | |
46 | return 0; | |
47 | if (!(*buffer)) | |
48 | return 0; | |
49 | ||
50 | /* | |
51 | * If there is a generic ie buffer setup, append it to the return | |
52 | * parameter buffer pointer. | |
53 | */ | |
54 | if (priv->gen_ie_buf_len) { | |
931f1584 YAP |
55 | dev_dbg(priv->adapter->dev, |
56 | "info: %s: append generic ie len %d to %p\n", | |
57 | __func__, priv->gen_ie_buf_len, *buffer); | |
5e6e3a92 BZ |
58 | |
59 | /* Wrap the generic IE buffer with a pass through TLV type */ | |
60 | ie_header.type = cpu_to_le16(TLV_TYPE_PASSTHROUGH); | |
61 | ie_header.len = cpu_to_le16(priv->gen_ie_buf_len); | |
62 | memcpy(*buffer, &ie_header, sizeof(ie_header)); | |
63 | ||
64 | /* Increment the return size and the return buffer pointer | |
65 | param */ | |
66 | *buffer += sizeof(ie_header); | |
67 | ret_len += sizeof(ie_header); | |
68 | ||
69 | /* Copy the generic IE buffer to the output buffer, advance | |
70 | pointer */ | |
71 | memcpy(*buffer, priv->gen_ie_buf, priv->gen_ie_buf_len); | |
72 | ||
73 | /* Increment the return size and the return buffer pointer | |
74 | param */ | |
75 | *buffer += priv->gen_ie_buf_len; | |
76 | ret_len += priv->gen_ie_buf_len; | |
77 | ||
78 | /* Reset the generic IE buffer */ | |
79 | priv->gen_ie_buf_len = 0; | |
80 | } | |
81 | ||
82 | /* return the length appended to the buffer */ | |
83 | return ret_len; | |
84 | } | |
85 | ||
86 | /* | |
87 | * Append TSF tracking info from the scan table for the target AP. | |
88 | * | |
89 | * This function is called from the network join command preparation routine. | |
90 | * | |
91 | * The TSF table TSF sent to the firmware contains two TSF values: | |
92 | * - The TSF of the target AP from its previous beacon/probe response | |
93 | * - The TSF timestamp of our local MAC at the time we observed the | |
94 | * beacon/probe response. | |
95 | * | |
96 | * The firmware uses the timestamp values to set an initial TSF value | |
97 | * in the MAC for the new association after a reassociation attempt. | |
98 | */ | |
99 | static int | |
100 | mwifiex_cmd_append_tsf_tlv(struct mwifiex_private *priv, u8 **buffer, | |
101 | struct mwifiex_bssdescriptor *bss_desc) | |
102 | { | |
103 | struct mwifiex_ie_types_tsf_timestamp tsf_tlv; | |
1a5b306f | 104 | __le64 tsf_val; |
5e6e3a92 BZ |
105 | |
106 | /* Null Checks */ | |
107 | if (buffer == NULL) | |
108 | return 0; | |
109 | if (*buffer == NULL) | |
110 | return 0; | |
111 | ||
112 | memset(&tsf_tlv, 0x00, sizeof(struct mwifiex_ie_types_tsf_timestamp)); | |
113 | ||
114 | tsf_tlv.header.type = cpu_to_le16(TLV_TYPE_TSFTIMESTAMP); | |
115 | tsf_tlv.header.len = cpu_to_le16(2 * sizeof(tsf_val)); | |
116 | ||
117 | memcpy(*buffer, &tsf_tlv, sizeof(tsf_tlv.header)); | |
118 | *buffer += sizeof(tsf_tlv.header); | |
119 | ||
1a5b306f | 120 | /* TSF at the time when beacon/probe_response was received */ |
b5abcf02 | 121 | tsf_val = cpu_to_le64(bss_desc->fw_tsf); |
1a5b306f BZ |
122 | memcpy(*buffer, &tsf_val, sizeof(tsf_val)); |
123 | *buffer += sizeof(tsf_val); | |
124 | ||
b5abcf02 | 125 | tsf_val = cpu_to_le64(bss_desc->timestamp); |
5e6e3a92 | 126 | |
931f1584 YAP |
127 | dev_dbg(priv->adapter->dev, |
128 | "info: %s: TSF offset calc: %016llx - %016llx\n", | |
b5abcf02 | 129 | __func__, bss_desc->timestamp, bss_desc->fw_tsf); |
5e6e3a92 BZ |
130 | |
131 | memcpy(*buffer, &tsf_val, sizeof(tsf_val)); | |
132 | *buffer += sizeof(tsf_val); | |
133 | ||
134 | return sizeof(tsf_tlv.header) + (2 * sizeof(tsf_val)); | |
135 | } | |
136 | ||
137 | /* | |
138 | * This function finds out the common rates between rate1 and rate2. | |
139 | * | |
140 | * It will fill common rates in rate1 as output if found. | |
141 | * | |
142 | * NOTE: Setting the MSB of the basic rates needs to be taken | |
143 | * care of, either before or after calling this function. | |
144 | */ | |
145 | static int mwifiex_get_common_rates(struct mwifiex_private *priv, u8 *rate1, | |
146 | u32 rate1_size, u8 *rate2, u32 rate2_size) | |
147 | { | |
270e58e8 YAP |
148 | int ret; |
149 | u8 *ptr = rate1, *tmp; | |
5e6e3a92 BZ |
150 | u32 i, j; |
151 | ||
5982b47a | 152 | tmp = kmemdup(rate1, rate1_size, GFP_KERNEL); |
5e6e3a92 BZ |
153 | if (!tmp) { |
154 | dev_err(priv->adapter->dev, "failed to alloc tmp buf\n"); | |
155 | return -ENOMEM; | |
156 | } | |
157 | ||
5e6e3a92 BZ |
158 | memset(rate1, 0, rate1_size); |
159 | ||
160 | for (i = 0; rate2[i] && i < rate2_size; i++) { | |
161 | for (j = 0; tmp[j] && j < rate1_size; j++) { | |
162 | /* Check common rate, excluding the bit for | |
163 | basic rate */ | |
164 | if ((rate2[i] & 0x7F) == (tmp[j] & 0x7F)) { | |
165 | *rate1++ = tmp[j]; | |
166 | break; | |
167 | } | |
168 | } | |
169 | } | |
170 | ||
171 | dev_dbg(priv->adapter->dev, "info: Tx data rate set to %#x\n", | |
931f1584 | 172 | priv->data_rate); |
5e6e3a92 BZ |
173 | |
174 | if (!priv->is_data_rate_auto) { | |
175 | while (*ptr) { | |
176 | if ((*ptr & 0x7f) == priv->data_rate) { | |
177 | ret = 0; | |
178 | goto done; | |
179 | } | |
180 | ptr++; | |
181 | } | |
182 | dev_err(priv->adapter->dev, "previously set fixed data rate %#x" | |
183 | " is not compatible with the network\n", | |
184 | priv->data_rate); | |
185 | ||
186 | ret = -1; | |
187 | goto done; | |
188 | } | |
189 | ||
190 | ret = 0; | |
191 | done: | |
192 | kfree(tmp); | |
193 | return ret; | |
194 | } | |
195 | ||
196 | /* | |
197 | * This function creates the intersection of the rates supported by a | |
198 | * target BSS and our adapter settings for use in an assoc/join command. | |
199 | */ | |
200 | static int | |
201 | mwifiex_setup_rates_from_bssdesc(struct mwifiex_private *priv, | |
202 | struct mwifiex_bssdescriptor *bss_desc, | |
203 | u8 *out_rates, u32 *out_rates_size) | |
204 | { | |
205 | u8 card_rates[MWIFIEX_SUPPORTED_RATES]; | |
270e58e8 | 206 | u32 card_rates_size; |
5e6e3a92 BZ |
207 | |
208 | /* Copy AP supported rates */ | |
209 | memcpy(out_rates, bss_desc->supported_rates, MWIFIEX_SUPPORTED_RATES); | |
210 | /* Get the STA supported rates */ | |
211 | card_rates_size = mwifiex_get_active_data_rates(priv, card_rates); | |
212 | /* Get the common rates between AP and STA supported rates */ | |
213 | if (mwifiex_get_common_rates(priv, out_rates, MWIFIEX_SUPPORTED_RATES, | |
214 | card_rates, card_rates_size)) { | |
215 | *out_rates_size = 0; | |
216 | dev_err(priv->adapter->dev, "%s: cannot get common rates\n", | |
931f1584 | 217 | __func__); |
5e6e3a92 BZ |
218 | return -1; |
219 | } | |
220 | ||
221 | *out_rates_size = | |
222 | min_t(size_t, strlen(out_rates), MWIFIEX_SUPPORTED_RATES); | |
223 | ||
224 | return 0; | |
225 | } | |
226 | ||
13d7ba78 AP |
227 | /* |
228 | * This function appends a WPS IE. It is called from the network join command | |
229 | * preparation routine. | |
230 | * | |
231 | * If the IE buffer has been setup by the application, this routine appends | |
232 | * the buffer as a WPS TLV type to the request. | |
233 | */ | |
234 | static int | |
235 | mwifiex_cmd_append_wps_ie(struct mwifiex_private *priv, u8 **buffer) | |
236 | { | |
237 | int retLen = 0; | |
238 | struct mwifiex_ie_types_header ie_header; | |
239 | ||
240 | if (!buffer || !*buffer) | |
241 | return 0; | |
242 | ||
243 | /* | |
244 | * If there is a wps ie buffer setup, append it to the return | |
245 | * parameter buffer pointer. | |
246 | */ | |
247 | if (priv->wps_ie_len) { | |
248 | dev_dbg(priv->adapter->dev, "cmd: append wps ie %d to %p\n", | |
249 | priv->wps_ie_len, *buffer); | |
250 | ||
251 | /* Wrap the generic IE buffer with a pass through TLV type */ | |
252 | ie_header.type = cpu_to_le16(TLV_TYPE_MGMT_IE); | |
253 | ie_header.len = cpu_to_le16(priv->wps_ie_len); | |
254 | memcpy(*buffer, &ie_header, sizeof(ie_header)); | |
255 | *buffer += sizeof(ie_header); | |
256 | retLen += sizeof(ie_header); | |
257 | ||
258 | memcpy(*buffer, priv->wps_ie, priv->wps_ie_len); | |
259 | *buffer += priv->wps_ie_len; | |
260 | retLen += priv->wps_ie_len; | |
261 | ||
262 | } | |
263 | ||
264 | kfree(priv->wps_ie); | |
265 | priv->wps_ie_len = 0; | |
266 | return retLen; | |
267 | } | |
268 | ||
5e6e3a92 BZ |
269 | /* |
270 | * This function appends a WAPI IE. | |
271 | * | |
272 | * This function is called from the network join command preparation routine. | |
273 | * | |
274 | * If the IE buffer has been setup by the application, this routine appends | |
275 | * the buffer as a WAPI TLV type to the request. | |
276 | */ | |
277 | static int | |
278 | mwifiex_cmd_append_wapi_ie(struct mwifiex_private *priv, u8 **buffer) | |
279 | { | |
280 | int retLen = 0; | |
281 | struct mwifiex_ie_types_header ie_header; | |
282 | ||
283 | /* Null Checks */ | |
284 | if (buffer == NULL) | |
285 | return 0; | |
286 | if (*buffer == NULL) | |
287 | return 0; | |
288 | ||
289 | /* | |
290 | * If there is a wapi ie buffer setup, append it to the return | |
291 | * parameter buffer pointer. | |
292 | */ | |
293 | if (priv->wapi_ie_len) { | |
294 | dev_dbg(priv->adapter->dev, "cmd: append wapi ie %d to %p\n", | |
931f1584 | 295 | priv->wapi_ie_len, *buffer); |
5e6e3a92 BZ |
296 | |
297 | /* Wrap the generic IE buffer with a pass through TLV type */ | |
298 | ie_header.type = cpu_to_le16(TLV_TYPE_WAPI_IE); | |
299 | ie_header.len = cpu_to_le16(priv->wapi_ie_len); | |
300 | memcpy(*buffer, &ie_header, sizeof(ie_header)); | |
301 | ||
302 | /* Increment the return size and the return buffer pointer | |
303 | param */ | |
304 | *buffer += sizeof(ie_header); | |
305 | retLen += sizeof(ie_header); | |
306 | ||
307 | /* Copy the wapi IE buffer to the output buffer, advance | |
308 | pointer */ | |
309 | memcpy(*buffer, priv->wapi_ie, priv->wapi_ie_len); | |
310 | ||
311 | /* Increment the return size and the return buffer pointer | |
312 | param */ | |
313 | *buffer += priv->wapi_ie_len; | |
314 | retLen += priv->wapi_ie_len; | |
315 | ||
316 | } | |
317 | /* return the length appended to the buffer */ | |
318 | return retLen; | |
319 | } | |
320 | ||
321 | /* | |
322 | * This function appends rsn ie tlv for wpa/wpa2 security modes. | |
323 | * It is called from the network join command preparation routine. | |
324 | */ | |
325 | static int mwifiex_append_rsn_ie_wpa_wpa2(struct mwifiex_private *priv, | |
326 | u8 **buffer) | |
327 | { | |
328 | struct mwifiex_ie_types_rsn_param_set *rsn_ie_tlv; | |
329 | int rsn_ie_len; | |
330 | ||
331 | if (!buffer || !(*buffer)) | |
332 | return 0; | |
333 | ||
334 | rsn_ie_tlv = (struct mwifiex_ie_types_rsn_param_set *) (*buffer); | |
335 | rsn_ie_tlv->header.type = cpu_to_le16((u16) priv->wpa_ie[0]); | |
336 | rsn_ie_tlv->header.type = cpu_to_le16( | |
337 | le16_to_cpu(rsn_ie_tlv->header.type) & 0x00FF); | |
338 | rsn_ie_tlv->header.len = cpu_to_le16((u16) priv->wpa_ie[1]); | |
339 | rsn_ie_tlv->header.len = cpu_to_le16(le16_to_cpu(rsn_ie_tlv->header.len) | |
931f1584 | 340 | & 0x00FF); |
5e6e3a92 BZ |
341 | if (le16_to_cpu(rsn_ie_tlv->header.len) <= (sizeof(priv->wpa_ie) - 2)) |
342 | memcpy(rsn_ie_tlv->rsn_ie, &priv->wpa_ie[2], | |
931f1584 | 343 | le16_to_cpu(rsn_ie_tlv->header.len)); |
5e6e3a92 BZ |
344 | else |
345 | return -1; | |
346 | ||
347 | rsn_ie_len = sizeof(rsn_ie_tlv->header) + | |
348 | le16_to_cpu(rsn_ie_tlv->header.len); | |
349 | *buffer += rsn_ie_len; | |
350 | ||
351 | return rsn_ie_len; | |
352 | } | |
353 | ||
354 | /* | |
355 | * This function prepares command for association. | |
356 | * | |
357 | * This sets the following parameters - | |
358 | * - Peer MAC address | |
359 | * - Listen interval | |
360 | * - Beacon interval | |
361 | * - Capability information | |
362 | * | |
363 | * ...and the following TLVs, as required - | |
364 | * - SSID TLV | |
365 | * - PHY TLV | |
366 | * - SS TLV | |
367 | * - Rates TLV | |
368 | * - Authentication TLV | |
369 | * - Channel TLV | |
370 | * - WPA/WPA2 IE | |
371 | * - 11n TLV | |
372 | * - Vendor specific TLV | |
373 | * - WMM TLV | |
374 | * - WAPI IE | |
375 | * - Generic IE | |
376 | * - TSF TLV | |
377 | * | |
378 | * Preparation also includes - | |
379 | * - Setting command ID and proper size | |
380 | * - Ensuring correct endian-ness | |
381 | */ | |
382 | int mwifiex_cmd_802_11_associate(struct mwifiex_private *priv, | |
383 | struct host_cmd_ds_command *cmd, | |
a5ffddb7 | 384 | struct mwifiex_bssdescriptor *bss_desc) |
5e6e3a92 BZ |
385 | { |
386 | struct host_cmd_ds_802_11_associate *assoc = &cmd->params.associate; | |
5e6e3a92 BZ |
387 | struct mwifiex_ie_types_ssid_param_set *ssid_tlv; |
388 | struct mwifiex_ie_types_phy_param_set *phy_tlv; | |
389 | struct mwifiex_ie_types_ss_param_set *ss_tlv; | |
390 | struct mwifiex_ie_types_rates_param_set *rates_tlv; | |
391 | struct mwifiex_ie_types_auth_type *auth_tlv; | |
392 | struct mwifiex_ie_types_chan_list_param_set *chan_tlv; | |
393 | u8 rates[MWIFIEX_SUPPORTED_RATES]; | |
394 | u32 rates_size; | |
395 | u16 tmp_cap; | |
396 | u8 *pos; | |
397 | int rsn_ie_len = 0; | |
398 | ||
5e6e3a92 BZ |
399 | pos = (u8 *) assoc; |
400 | ||
401 | mwifiex_cfg_tx_buf(priv, bss_desc); | |
402 | ||
403 | cmd->command = cpu_to_le16(HostCmd_CMD_802_11_ASSOCIATE); | |
404 | ||
405 | /* Save so we know which BSS Desc to use in the response handler */ | |
406 | priv->attempted_bss_desc = bss_desc; | |
407 | ||
408 | memcpy(assoc->peer_sta_addr, | |
409 | bss_desc->mac_address, sizeof(assoc->peer_sta_addr)); | |
410 | pos += sizeof(assoc->peer_sta_addr); | |
411 | ||
412 | /* Set the listen interval */ | |
413 | assoc->listen_interval = cpu_to_le16(priv->listen_interval); | |
414 | /* Set the beacon period */ | |
415 | assoc->beacon_period = cpu_to_le16(bss_desc->beacon_period); | |
416 | ||
417 | pos += sizeof(assoc->cap_info_bitmap); | |
418 | pos += sizeof(assoc->listen_interval); | |
419 | pos += sizeof(assoc->beacon_period); | |
420 | pos += sizeof(assoc->dtim_period); | |
421 | ||
422 | ssid_tlv = (struct mwifiex_ie_types_ssid_param_set *) pos; | |
423 | ssid_tlv->header.type = cpu_to_le16(WLAN_EID_SSID); | |
424 | ssid_tlv->header.len = cpu_to_le16((u16) bss_desc->ssid.ssid_len); | |
425 | memcpy(ssid_tlv->ssid, bss_desc->ssid.ssid, | |
931f1584 | 426 | le16_to_cpu(ssid_tlv->header.len)); |
5e6e3a92 BZ |
427 | pos += sizeof(ssid_tlv->header) + le16_to_cpu(ssid_tlv->header.len); |
428 | ||
429 | phy_tlv = (struct mwifiex_ie_types_phy_param_set *) pos; | |
430 | phy_tlv->header.type = cpu_to_le16(WLAN_EID_DS_PARAMS); | |
431 | phy_tlv->header.len = cpu_to_le16(sizeof(phy_tlv->fh_ds.ds_param_set)); | |
432 | memcpy(&phy_tlv->fh_ds.ds_param_set, | |
433 | &bss_desc->phy_param_set.ds_param_set.current_chan, | |
434 | sizeof(phy_tlv->fh_ds.ds_param_set)); | |
435 | pos += sizeof(phy_tlv->header) + le16_to_cpu(phy_tlv->header.len); | |
436 | ||
437 | ss_tlv = (struct mwifiex_ie_types_ss_param_set *) pos; | |
438 | ss_tlv->header.type = cpu_to_le16(WLAN_EID_CF_PARAMS); | |
439 | ss_tlv->header.len = cpu_to_le16(sizeof(ss_tlv->cf_ibss.cf_param_set)); | |
440 | pos += sizeof(ss_tlv->header) + le16_to_cpu(ss_tlv->header.len); | |
441 | ||
442 | /* Get the common rates supported between the driver and the BSS Desc */ | |
443 | if (mwifiex_setup_rates_from_bssdesc | |
444 | (priv, bss_desc, rates, &rates_size)) | |
445 | return -1; | |
446 | ||
447 | /* Save the data rates into Current BSS state structure */ | |
448 | priv->curr_bss_params.num_of_rates = rates_size; | |
449 | memcpy(&priv->curr_bss_params.data_rates, rates, rates_size); | |
450 | ||
451 | /* Setup the Rates TLV in the association command */ | |
452 | rates_tlv = (struct mwifiex_ie_types_rates_param_set *) pos; | |
453 | rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES); | |
454 | rates_tlv->header.len = cpu_to_le16((u16) rates_size); | |
455 | memcpy(rates_tlv->rates, rates, rates_size); | |
456 | pos += sizeof(rates_tlv->header) + rates_size; | |
457 | dev_dbg(priv->adapter->dev, "info: ASSOC_CMD: rates size = %d\n", | |
931f1584 | 458 | rates_size); |
5e6e3a92 | 459 | |
203afeca MY |
460 | /* Add the Authentication type to be used for Auth frames */ |
461 | auth_tlv = (struct mwifiex_ie_types_auth_type *) pos; | |
462 | auth_tlv->header.type = cpu_to_le16(TLV_TYPE_AUTH_TYPE); | |
463 | auth_tlv->header.len = cpu_to_le16(sizeof(auth_tlv->auth_type)); | |
5eb02e44 | 464 | if (priv->sec_info.wep_enabled) |
203afeca MY |
465 | auth_tlv->auth_type = cpu_to_le16( |
466 | (u16) priv->sec_info.authentication_mode); | |
467 | else | |
f986b6d5 | 468 | auth_tlv->auth_type = cpu_to_le16(NL80211_AUTHTYPE_OPEN_SYSTEM); |
203afeca MY |
469 | |
470 | pos += sizeof(auth_tlv->header) + le16_to_cpu(auth_tlv->header.len); | |
5e6e3a92 | 471 | |
931f1584 YAP |
472 | if (IS_SUPPORT_MULTI_BANDS(priv->adapter) && |
473 | !(ISSUPP_11NENABLED(priv->adapter->fw_cap_info) && | |
474 | (!bss_desc->disable_11n) && | |
475 | (priv->adapter->config_bands & BAND_GN || | |
476 | priv->adapter->config_bands & BAND_AN) && | |
477 | (bss_desc->bcn_ht_cap) | |
5e6e3a92 BZ |
478 | ) |
479 | ) { | |
480 | /* Append a channel TLV for the channel the attempted AP was | |
481 | found on */ | |
482 | chan_tlv = (struct mwifiex_ie_types_chan_list_param_set *) pos; | |
483 | chan_tlv->header.type = cpu_to_le16(TLV_TYPE_CHANLIST); | |
484 | chan_tlv->header.len = | |
485 | cpu_to_le16(sizeof(struct mwifiex_chan_scan_param_set)); | |
486 | ||
487 | memset(chan_tlv->chan_scan_param, 0x00, | |
488 | sizeof(struct mwifiex_chan_scan_param_set)); | |
489 | chan_tlv->chan_scan_param[0].chan_number = | |
490 | (bss_desc->phy_param_set.ds_param_set.current_chan); | |
491 | dev_dbg(priv->adapter->dev, "info: Assoc: TLV Chan = %d\n", | |
931f1584 | 492 | chan_tlv->chan_scan_param[0].chan_number); |
5e6e3a92 BZ |
493 | |
494 | chan_tlv->chan_scan_param[0].radio_type = | |
495 | mwifiex_band_to_radio_type((u8) bss_desc->bss_band); | |
496 | ||
497 | dev_dbg(priv->adapter->dev, "info: Assoc: TLV Band = %d\n", | |
931f1584 | 498 | chan_tlv->chan_scan_param[0].radio_type); |
5e6e3a92 BZ |
499 | pos += sizeof(chan_tlv->header) + |
500 | sizeof(struct mwifiex_chan_scan_param_set); | |
501 | } | |
502 | ||
503 | if (!priv->wps.session_enable) { | |
504 | if (priv->sec_info.wpa_enabled || priv->sec_info.wpa2_enabled) | |
505 | rsn_ie_len = mwifiex_append_rsn_ie_wpa_wpa2(priv, &pos); | |
506 | ||
507 | if (rsn_ie_len == -1) | |
508 | return -1; | |
509 | } | |
510 | ||
931f1584 YAP |
511 | if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info) && |
512 | (!bss_desc->disable_11n) && | |
513 | (priv->adapter->config_bands & BAND_GN || | |
514 | priv->adapter->config_bands & BAND_AN)) | |
5e6e3a92 BZ |
515 | mwifiex_cmd_append_11n_tlv(priv, bss_desc, &pos); |
516 | ||
517 | /* Append vendor specific IE TLV */ | |
518 | mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_ASSOC, &pos); | |
519 | ||
520 | mwifiex_wmm_process_association_req(priv, &pos, &bss_desc->wmm_ie, | |
521 | bss_desc->bcn_ht_cap); | |
522 | if (priv->sec_info.wapi_enabled && priv->wapi_ie_len) | |
523 | mwifiex_cmd_append_wapi_ie(priv, &pos); | |
524 | ||
13d7ba78 AP |
525 | if (priv->wps.session_enable && priv->wps_ie_len) |
526 | mwifiex_cmd_append_wps_ie(priv, &pos); | |
5e6e3a92 BZ |
527 | |
528 | mwifiex_cmd_append_generic_ie(priv, &pos); | |
529 | ||
530 | mwifiex_cmd_append_tsf_tlv(priv, &pos, bss_desc); | |
531 | ||
532 | cmd->size = cpu_to_le16((u16) (pos - (u8 *) assoc) + S_DS_GEN); | |
533 | ||
534 | /* Set the Capability info at last */ | |
535 | tmp_cap = bss_desc->cap_info_bitmap; | |
536 | ||
537 | if (priv->adapter->config_bands == BAND_B) | |
b93f85f0 | 538 | tmp_cap &= ~WLAN_CAPABILITY_SHORT_SLOT_TIME; |
5e6e3a92 BZ |
539 | |
540 | tmp_cap &= CAPINFO_MASK; | |
541 | dev_dbg(priv->adapter->dev, "info: ASSOC_CMD: tmp_cap=%4X CAPINFO_MASK=%4lX\n", | |
931f1584 | 542 | tmp_cap, CAPINFO_MASK); |
5e6e3a92 BZ |
543 | assoc->cap_info_bitmap = cpu_to_le16(tmp_cap); |
544 | ||
545 | return 0; | |
546 | } | |
547 | ||
548 | /* | |
549 | * Association firmware command response handler | |
550 | * | |
551 | * The response buffer for the association command has the following | |
552 | * memory layout. | |
553 | * | |
554 | * For cases where an association response was not received (indicated | |
555 | * by the CapInfo and AId field): | |
556 | * | |
557 | * .------------------------------------------------------------. | |
558 | * | Header(4 * sizeof(t_u16)): Standard command response hdr | | |
559 | * .------------------------------------------------------------. | |
560 | * | cap_info/Error Return(t_u16): | | |
561 | * | 0xFFFF(-1): Internal error | | |
562 | * | 0xFFFE(-2): Authentication unhandled message | | |
563 | * | 0xFFFD(-3): Authentication refused | | |
564 | * | 0xFFFC(-4): Timeout waiting for AP response | | |
565 | * .------------------------------------------------------------. | |
566 | * | status_code(t_u16): | | |
567 | * | If cap_info is -1: | | |
568 | * | An internal firmware failure prevented the | | |
569 | * | command from being processed. The status_code | | |
570 | * | will be set to 1. | | |
571 | * | | | |
572 | * | If cap_info is -2: | | |
573 | * | An authentication frame was received but was | | |
574 | * | not handled by the firmware. IEEE Status | | |
575 | * | code for the failure is returned. | | |
576 | * | | | |
577 | * | If cap_info is -3: | | |
578 | * | An authentication frame was received and the | | |
579 | * | status_code is the IEEE Status reported in the | | |
580 | * | response. | | |
581 | * | | | |
582 | * | If cap_info is -4: | | |
583 | * | (1) Association response timeout | | |
584 | * | (2) Authentication response timeout | | |
585 | * .------------------------------------------------------------. | |
586 | * | a_id(t_u16): 0xFFFF | | |
587 | * .------------------------------------------------------------. | |
588 | * | |
589 | * | |
590 | * For cases where an association response was received, the IEEE | |
591 | * standard association response frame is returned: | |
592 | * | |
593 | * .------------------------------------------------------------. | |
594 | * | Header(4 * sizeof(t_u16)): Standard command response hdr | | |
595 | * .------------------------------------------------------------. | |
596 | * | cap_info(t_u16): IEEE Capability | | |
597 | * .------------------------------------------------------------. | |
598 | * | status_code(t_u16): IEEE Status Code | | |
599 | * .------------------------------------------------------------. | |
600 | * | a_id(t_u16): IEEE Association ID | | |
601 | * .------------------------------------------------------------. | |
602 | * | IEEE IEs(variable): Any received IEs comprising the | | |
603 | * | remaining portion of a received | | |
604 | * | association response frame. | | |
605 | * .------------------------------------------------------------. | |
606 | * | |
607 | * For simplistic handling, the status_code field can be used to determine | |
608 | * an association success (0) or failure (non-zero). | |
609 | */ | |
610 | int mwifiex_ret_802_11_associate(struct mwifiex_private *priv, | |
600f5d90 | 611 | struct host_cmd_ds_command *resp) |
5e6e3a92 | 612 | { |
600f5d90 | 613 | struct mwifiex_adapter *adapter = priv->adapter; |
5e6e3a92 | 614 | int ret = 0; |
5e6e3a92 BZ |
615 | struct ieee_types_assoc_rsp *assoc_rsp; |
616 | struct mwifiex_bssdescriptor *bss_desc; | |
617 | u8 enable_data = true; | |
618 | ||
619 | assoc_rsp = (struct ieee_types_assoc_rsp *) &resp->params; | |
620 | ||
621 | priv->assoc_rsp_size = min(le16_to_cpu(resp->size) - S_DS_GEN, | |
931f1584 | 622 | sizeof(priv->assoc_rsp_buf)); |
5e6e3a92 BZ |
623 | |
624 | memcpy(priv->assoc_rsp_buf, &resp->params, priv->assoc_rsp_size); | |
625 | ||
626 | if (le16_to_cpu(assoc_rsp->status_code)) { | |
627 | priv->adapter->dbg.num_cmd_assoc_failure++; | |
931f1584 YAP |
628 | dev_err(priv->adapter->dev, |
629 | "ASSOC_RESP: failed, status code=%d err=%#x a_id=%#x\n", | |
630 | le16_to_cpu(assoc_rsp->status_code), | |
631 | le16_to_cpu(assoc_rsp->cap_info_bitmap), | |
632 | le16_to_cpu(assoc_rsp->a_id)); | |
5e6e3a92 | 633 | |
a0f6d6ca | 634 | ret = le16_to_cpu(assoc_rsp->status_code); |
5e6e3a92 BZ |
635 | goto done; |
636 | } | |
637 | ||
638 | /* Send a Media Connected event, according to the Spec */ | |
639 | priv->media_connected = true; | |
640 | ||
641 | priv->adapter->ps_state = PS_STATE_AWAKE; | |
642 | priv->adapter->pps_uapsd_mode = false; | |
643 | priv->adapter->tx_lock_flag = false; | |
644 | ||
645 | /* Set the attempted BSSID Index to current */ | |
646 | bss_desc = priv->attempted_bss_desc; | |
647 | ||
648 | dev_dbg(priv->adapter->dev, "info: ASSOC_RESP: %s\n", | |
931f1584 | 649 | bss_desc->ssid.ssid); |
5e6e3a92 BZ |
650 | |
651 | /* Make a copy of current BSSID descriptor */ | |
652 | memcpy(&priv->curr_bss_params.bss_descriptor, | |
653 | bss_desc, sizeof(struct mwifiex_bssdescriptor)); | |
654 | ||
655 | /* Update curr_bss_params */ | |
656 | priv->curr_bss_params.bss_descriptor.channel | |
657 | = bss_desc->phy_param_set.ds_param_set.current_chan; | |
658 | ||
659 | priv->curr_bss_params.band = (u8) bss_desc->bss_band; | |
660 | ||
5e6e3a92 BZ |
661 | if (bss_desc->wmm_ie.vend_hdr.element_id == WLAN_EID_VENDOR_SPECIFIC) |
662 | priv->curr_bss_params.wmm_enabled = true; | |
663 | else | |
664 | priv->curr_bss_params.wmm_enabled = false; | |
665 | ||
931f1584 YAP |
666 | if ((priv->wmm_required || bss_desc->bcn_ht_cap) && |
667 | priv->curr_bss_params.wmm_enabled) | |
5e6e3a92 BZ |
668 | priv->wmm_enabled = true; |
669 | else | |
670 | priv->wmm_enabled = false; | |
671 | ||
672 | priv->curr_bss_params.wmm_uapsd_enabled = false; | |
673 | ||
674 | if (priv->wmm_enabled) | |
675 | priv->curr_bss_params.wmm_uapsd_enabled | |
676 | = ((bss_desc->wmm_ie.qos_info_bitmap & | |
677 | IEEE80211_WMM_IE_AP_QOSINFO_UAPSD) ? 1 : 0); | |
678 | ||
679 | dev_dbg(priv->adapter->dev, "info: ASSOC_RESP: curr_pkt_filter is %#x\n", | |
931f1584 | 680 | priv->curr_pkt_filter); |
5e6e3a92 BZ |
681 | if (priv->sec_info.wpa_enabled || priv->sec_info.wpa2_enabled) |
682 | priv->wpa_is_gtk_set = false; | |
683 | ||
684 | if (priv->wmm_enabled) { | |
685 | /* Don't re-enable carrier until we get the WMM_GET_STATUS | |
686 | event */ | |
687 | enable_data = false; | |
688 | } else { | |
689 | /* Since WMM is not enabled, setup the queues with the | |
690 | defaults */ | |
691 | mwifiex_wmm_setup_queue_priorities(priv, NULL); | |
692 | mwifiex_wmm_setup_ac_downgrade(priv); | |
693 | } | |
694 | ||
695 | if (enable_data) | |
696 | dev_dbg(priv->adapter->dev, | |
697 | "info: post association, re-enabling data flow\n"); | |
698 | ||
699 | /* Reset SNR/NF/RSSI values */ | |
700 | priv->data_rssi_last = 0; | |
701 | priv->data_nf_last = 0; | |
702 | priv->data_rssi_avg = 0; | |
703 | priv->data_nf_avg = 0; | |
704 | priv->bcn_rssi_last = 0; | |
705 | priv->bcn_nf_last = 0; | |
706 | priv->bcn_rssi_avg = 0; | |
707 | priv->bcn_nf_avg = 0; | |
708 | priv->rxpd_rate = 0; | |
709 | priv->rxpd_htinfo = 0; | |
710 | ||
711 | mwifiex_save_curr_bcn(priv); | |
712 | ||
713 | priv->adapter->dbg.num_cmd_assoc_success++; | |
714 | ||
715 | dev_dbg(priv->adapter->dev, "info: ASSOC_RESP: associated\n"); | |
716 | ||
717 | /* Add the ra_list here for infra mode as there will be only 1 ra | |
718 | always */ | |
719 | mwifiex_ralist_add(priv, | |
720 | priv->curr_bss_params.bss_descriptor.mac_address); | |
721 | ||
722 | if (!netif_carrier_ok(priv->netdev)) | |
723 | netif_carrier_on(priv->netdev); | |
724 | if (netif_queue_stopped(priv->netdev)) | |
725 | netif_wake_queue(priv->netdev); | |
726 | ||
727 | if (priv->sec_info.wpa_enabled || priv->sec_info.wpa2_enabled) | |
728 | priv->scan_block = true; | |
729 | ||
730 | done: | |
731 | /* Need to indicate IOCTL complete */ | |
600f5d90 AK |
732 | if (adapter->curr_cmd->wait_q_enabled) { |
733 | if (ret) | |
734 | adapter->cmd_wait_q.status = -1; | |
735 | else | |
736 | adapter->cmd_wait_q.status = 0; | |
5e6e3a92 BZ |
737 | } |
738 | ||
739 | return ret; | |
740 | } | |
741 | ||
742 | /* | |
743 | * This function prepares command for ad-hoc start. | |
744 | * | |
745 | * Driver will fill up SSID, BSS mode, IBSS parameters, physical | |
746 | * parameters, probe delay, and capability information. Firmware | |
747 | * will fill up beacon period, basic rates and operational rates. | |
748 | * | |
749 | * In addition, the following TLVs are added - | |
750 | * - Channel TLV | |
751 | * - Vendor specific IE | |
752 | * - WPA/WPA2 IE | |
753 | * - HT Capabilities IE | |
754 | * - HT Information IE | |
755 | * | |
756 | * Preparation also includes - | |
757 | * - Setting command ID and proper size | |
758 | * - Ensuring correct endian-ness | |
759 | */ | |
760 | int | |
761 | mwifiex_cmd_802_11_ad_hoc_start(struct mwifiex_private *priv, | |
a5ffddb7 | 762 | struct host_cmd_ds_command *cmd, |
b9be5f39 | 763 | struct cfg80211_ssid *req_ssid) |
5e6e3a92 | 764 | { |
636c4598 | 765 | int rsn_ie_len = 0; |
5e6e3a92 BZ |
766 | struct mwifiex_adapter *adapter = priv->adapter; |
767 | struct host_cmd_ds_802_11_ad_hoc_start *adhoc_start = | |
768 | &cmd->params.adhoc_start; | |
769 | struct mwifiex_bssdescriptor *bss_desc; | |
770 | u32 cmd_append_size = 0; | |
771 | u32 i; | |
772 | u16 tmp_cap; | |
5e6e3a92 | 773 | struct mwifiex_ie_types_chan_list_param_set *chan_tlv; |
eedf15d3 | 774 | u8 radio_type; |
5e6e3a92 BZ |
775 | |
776 | struct mwifiex_ie_types_htcap *ht_cap; | |
777 | struct mwifiex_ie_types_htinfo *ht_info; | |
778 | u8 *pos = (u8 *) adhoc_start + | |
779 | sizeof(struct host_cmd_ds_802_11_ad_hoc_start); | |
780 | ||
781 | if (!adapter) | |
782 | return -1; | |
783 | ||
784 | cmd->command = cpu_to_le16(HostCmd_CMD_802_11_AD_HOC_START); | |
785 | ||
786 | bss_desc = &priv->curr_bss_params.bss_descriptor; | |
787 | priv->attempted_bss_desc = bss_desc; | |
788 | ||
789 | /* | |
790 | * Fill in the parameters for 2 data structures: | |
791 | * 1. struct host_cmd_ds_802_11_ad_hoc_start command | |
792 | * 2. bss_desc | |
793 | * Driver will fill up SSID, bss_mode,IBSS param, Physical Param, | |
794 | * probe delay, and Cap info. | |
795 | * Firmware will fill up beacon period, Basic rates | |
796 | * and operational rates. | |
797 | */ | |
798 | ||
799 | memset(adhoc_start->ssid, 0, IEEE80211_MAX_SSID_LEN); | |
800 | ||
a5ffddb7 | 801 | memcpy(adhoc_start->ssid, req_ssid->ssid, req_ssid->ssid_len); |
5e6e3a92 BZ |
802 | |
803 | dev_dbg(adapter->dev, "info: ADHOC_S_CMD: SSID = %s\n", | |
931f1584 | 804 | adhoc_start->ssid); |
5e6e3a92 BZ |
805 | |
806 | memset(bss_desc->ssid.ssid, 0, IEEE80211_MAX_SSID_LEN); | |
a5ffddb7 | 807 | memcpy(bss_desc->ssid.ssid, req_ssid->ssid, req_ssid->ssid_len); |
5e6e3a92 | 808 | |
a5ffddb7 | 809 | bss_desc->ssid.ssid_len = req_ssid->ssid_len; |
5e6e3a92 BZ |
810 | |
811 | /* Set the BSS mode */ | |
812 | adhoc_start->bss_mode = HostCmd_BSS_MODE_IBSS; | |
eecd8250 | 813 | bss_desc->bss_mode = NL80211_IFTYPE_ADHOC; |
5e6e3a92 BZ |
814 | adhoc_start->beacon_period = cpu_to_le16(priv->beacon_period); |
815 | bss_desc->beacon_period = priv->beacon_period; | |
816 | ||
817 | /* Set Physical param set */ | |
818 | /* Parameter IE Id */ | |
819 | #define DS_PARA_IE_ID 3 | |
820 | /* Parameter IE length */ | |
821 | #define DS_PARA_IE_LEN 1 | |
822 | ||
823 | adhoc_start->phy_param_set.ds_param_set.element_id = DS_PARA_IE_ID; | |
824 | adhoc_start->phy_param_set.ds_param_set.len = DS_PARA_IE_LEN; | |
825 | ||
6685d109 YAP |
826 | if (!mwifiex_get_cfp(priv, adapter->adhoc_start_band, |
827 | (u16) priv->adhoc_channel, 0)) { | |
5e6e3a92 | 828 | struct mwifiex_chan_freq_power *cfp; |
6685d109 YAP |
829 | cfp = mwifiex_get_cfp(priv, adapter->adhoc_start_band, |
830 | FIRST_VALID_CHANNEL, 0); | |
5e6e3a92 BZ |
831 | if (cfp) |
832 | priv->adhoc_channel = (u8) cfp->channel; | |
833 | } | |
834 | ||
835 | if (!priv->adhoc_channel) { | |
836 | dev_err(adapter->dev, "ADHOC_S_CMD: adhoc_channel cannot be 0\n"); | |
837 | return -1; | |
838 | } | |
839 | ||
840 | dev_dbg(adapter->dev, "info: ADHOC_S_CMD: creating ADHOC on channel %d\n", | |
931f1584 | 841 | priv->adhoc_channel); |
5e6e3a92 BZ |
842 | |
843 | priv->curr_bss_params.bss_descriptor.channel = priv->adhoc_channel; | |
844 | priv->curr_bss_params.band = adapter->adhoc_start_band; | |
845 | ||
846 | bss_desc->channel = priv->adhoc_channel; | |
847 | adhoc_start->phy_param_set.ds_param_set.current_chan = | |
848 | priv->adhoc_channel; | |
849 | ||
850 | memcpy(&bss_desc->phy_param_set, &adhoc_start->phy_param_set, | |
851 | sizeof(union ieee_types_phy_param_set)); | |
852 | ||
853 | /* Set IBSS param set */ | |
854 | /* IBSS parameter IE Id */ | |
855 | #define IBSS_PARA_IE_ID 6 | |
856 | /* IBSS parameter IE length */ | |
857 | #define IBSS_PARA_IE_LEN 2 | |
858 | ||
859 | adhoc_start->ss_param_set.ibss_param_set.element_id = IBSS_PARA_IE_ID; | |
860 | adhoc_start->ss_param_set.ibss_param_set.len = IBSS_PARA_IE_LEN; | |
861 | adhoc_start->ss_param_set.ibss_param_set.atim_window | |
931f1584 | 862 | = cpu_to_le16(priv->atim_window); |
5e6e3a92 BZ |
863 | memcpy(&bss_desc->ss_param_set, &adhoc_start->ss_param_set, |
864 | sizeof(union ieee_types_ss_param_set)); | |
865 | ||
866 | /* Set Capability info */ | |
867 | bss_desc->cap_info_bitmap |= WLAN_CAPABILITY_IBSS; | |
868 | tmp_cap = le16_to_cpu(adhoc_start->cap_info_bitmap); | |
869 | tmp_cap &= ~WLAN_CAPABILITY_ESS; | |
870 | tmp_cap |= WLAN_CAPABILITY_IBSS; | |
871 | ||
872 | /* Set up privacy in bss_desc */ | |
2be50b8d | 873 | if (priv->sec_info.encryption_mode) { |
5e6e3a92 BZ |
874 | /* Ad-Hoc capability privacy on */ |
875 | dev_dbg(adapter->dev, | |
876 | "info: ADHOC_S_CMD: wep_status set privacy to WEP\n"); | |
877 | bss_desc->privacy = MWIFIEX_802_11_PRIV_FILTER_8021X_WEP; | |
878 | tmp_cap |= WLAN_CAPABILITY_PRIVACY; | |
879 | } else { | |
880 | dev_dbg(adapter->dev, "info: ADHOC_S_CMD: wep_status NOT set," | |
881 | " setting privacy to ACCEPT ALL\n"); | |
882 | bss_desc->privacy = MWIFIEX_802_11_PRIV_FILTER_ACCEPT_ALL; | |
883 | } | |
884 | ||
63af6333 YAP |
885 | memset(adhoc_start->data_rate, 0, sizeof(adhoc_start->data_rate)); |
886 | mwifiex_get_active_data_rates(priv, adhoc_start->data_rate); | |
5e6e3a92 BZ |
887 | if ((adapter->adhoc_start_band & BAND_G) && |
888 | (priv->curr_pkt_filter & HostCmd_ACT_MAC_ADHOC_G_PROTECTION_ON)) { | |
636c4598 | 889 | if (mwifiex_send_cmd_async(priv, HostCmd_CMD_MAC_CONTROL, |
931f1584 YAP |
890 | HostCmd_ACT_GEN_SET, 0, |
891 | &priv->curr_pkt_filter)) { | |
5e6e3a92 | 892 | dev_err(adapter->dev, |
931f1584 | 893 | "ADHOC_S_CMD: G Protection config failed\n"); |
5e6e3a92 BZ |
894 | return -1; |
895 | } | |
896 | } | |
897 | /* Find the last non zero */ | |
63af6333 YAP |
898 | for (i = 0; i < sizeof(adhoc_start->data_rate); i++) |
899 | if (!adhoc_start->data_rate[i]) | |
900 | break; | |
5e6e3a92 BZ |
901 | |
902 | priv->curr_bss_params.num_of_rates = i; | |
903 | ||
904 | /* Copy the ad-hoc creating rates into Current BSS rate structure */ | |
905 | memcpy(&priv->curr_bss_params.data_rates, | |
63af6333 | 906 | &adhoc_start->data_rate, priv->curr_bss_params.num_of_rates); |
5e6e3a92 BZ |
907 | |
908 | dev_dbg(adapter->dev, "info: ADHOC_S_CMD: rates=%02x %02x %02x %02x\n", | |
931f1584 YAP |
909 | adhoc_start->data_rate[0], adhoc_start->data_rate[1], |
910 | adhoc_start->data_rate[2], adhoc_start->data_rate[3]); | |
5e6e3a92 BZ |
911 | |
912 | dev_dbg(adapter->dev, "info: ADHOC_S_CMD: AD-HOC Start command is ready\n"); | |
913 | ||
914 | if (IS_SUPPORT_MULTI_BANDS(adapter)) { | |
915 | /* Append a channel TLV */ | |
916 | chan_tlv = (struct mwifiex_ie_types_chan_list_param_set *) pos; | |
917 | chan_tlv->header.type = cpu_to_le16(TLV_TYPE_CHANLIST); | |
918 | chan_tlv->header.len = | |
919 | cpu_to_le16(sizeof(struct mwifiex_chan_scan_param_set)); | |
920 | ||
921 | memset(chan_tlv->chan_scan_param, 0x00, | |
922 | sizeof(struct mwifiex_chan_scan_param_set)); | |
923 | chan_tlv->chan_scan_param[0].chan_number = | |
924 | (u8) priv->curr_bss_params.bss_descriptor.channel; | |
925 | ||
926 | dev_dbg(adapter->dev, "info: ADHOC_S_CMD: TLV Chan = %d\n", | |
931f1584 | 927 | chan_tlv->chan_scan_param[0].chan_number); |
5e6e3a92 BZ |
928 | |
929 | chan_tlv->chan_scan_param[0].radio_type | |
930 | = mwifiex_band_to_radio_type(priv->curr_bss_params.band); | |
931f1584 YAP |
931 | if (adapter->adhoc_start_band & BAND_GN || |
932 | adapter->adhoc_start_band & BAND_AN) { | |
21c3ba34 AK |
933 | if (adapter->sec_chan_offset == |
934 | IEEE80211_HT_PARAM_CHA_SEC_ABOVE) | |
5e6e3a92 | 935 | chan_tlv->chan_scan_param[0].radio_type |= |
21c3ba34 AK |
936 | (IEEE80211_HT_PARAM_CHA_SEC_ABOVE << 4); |
937 | else if (adapter->sec_chan_offset == | |
938 | IEEE80211_HT_PARAM_CHA_SEC_ABOVE) | |
5e6e3a92 | 939 | chan_tlv->chan_scan_param[0].radio_type |= |
21c3ba34 | 940 | (IEEE80211_HT_PARAM_CHA_SEC_BELOW << 4); |
5e6e3a92 BZ |
941 | } |
942 | dev_dbg(adapter->dev, "info: ADHOC_S_CMD: TLV Band = %d\n", | |
931f1584 | 943 | chan_tlv->chan_scan_param[0].radio_type); |
5e6e3a92 BZ |
944 | pos += sizeof(chan_tlv->header) + |
945 | sizeof(struct mwifiex_chan_scan_param_set); | |
946 | cmd_append_size += | |
947 | sizeof(chan_tlv->header) + | |
948 | sizeof(struct mwifiex_chan_scan_param_set); | |
949 | } | |
950 | ||
951 | /* Append vendor specific IE TLV */ | |
952 | cmd_append_size += mwifiex_cmd_append_vsie_tlv(priv, | |
953 | MWIFIEX_VSIE_MASK_ADHOC, &pos); | |
954 | ||
955 | if (priv->sec_info.wpa_enabled) { | |
956 | rsn_ie_len = mwifiex_append_rsn_ie_wpa_wpa2(priv, &pos); | |
957 | if (rsn_ie_len == -1) | |
958 | return -1; | |
959 | cmd_append_size += rsn_ie_len; | |
960 | } | |
961 | ||
962 | if (adapter->adhoc_11n_enabled) { | |
eedf15d3 YAP |
963 | /* Fill HT CAPABILITY */ |
964 | ht_cap = (struct mwifiex_ie_types_htcap *) pos; | |
965 | memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap)); | |
966 | ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY); | |
967 | ht_cap->header.len = | |
968 | cpu_to_le16(sizeof(struct ieee80211_ht_cap)); | |
969 | radio_type = mwifiex_band_to_radio_type( | |
970 | priv->adapter->config_bands); | |
971 | mwifiex_fill_cap_info(priv, radio_type, ht_cap); | |
972 | ||
973 | pos += sizeof(struct mwifiex_ie_types_htcap); | |
931f1584 | 974 | cmd_append_size += sizeof(struct mwifiex_ie_types_htcap); |
eedf15d3 YAP |
975 | |
976 | /* Fill HT INFORMATION */ | |
977 | ht_info = (struct mwifiex_ie_types_htinfo *) pos; | |
978 | memset(ht_info, 0, sizeof(struct mwifiex_ie_types_htinfo)); | |
074d46d1 | 979 | ht_info->header.type = cpu_to_le16(WLAN_EID_HT_OPERATION); |
eedf15d3 | 980 | ht_info->header.len = |
074d46d1 | 981 | cpu_to_le16(sizeof(struct ieee80211_ht_operation)); |
eedf15d3 | 982 | |
074d46d1 | 983 | ht_info->ht_oper.primary_chan = |
eedf15d3 | 984 | (u8) priv->curr_bss_params.bss_descriptor.channel; |
21c3ba34 | 985 | if (adapter->sec_chan_offset) { |
074d46d1 JB |
986 | ht_info->ht_oper.ht_param = adapter->sec_chan_offset; |
987 | ht_info->ht_oper.ht_param |= | |
6d2bd916 | 988 | IEEE80211_HT_PARAM_CHAN_WIDTH_ANY; |
5e6e3a92 | 989 | } |
074d46d1 | 990 | ht_info->ht_oper.operation_mode = |
eedf15d3 | 991 | cpu_to_le16(IEEE80211_HT_OP_MODE_NON_GF_STA_PRSNT); |
074d46d1 | 992 | ht_info->ht_oper.basic_set[0] = 0xff; |
eedf15d3 YAP |
993 | pos += sizeof(struct mwifiex_ie_types_htinfo); |
994 | cmd_append_size += | |
931f1584 | 995 | sizeof(struct mwifiex_ie_types_htinfo); |
5e6e3a92 BZ |
996 | } |
997 | ||
931f1584 YAP |
998 | cmd->size = |
999 | cpu_to_le16((u16)(sizeof(struct host_cmd_ds_802_11_ad_hoc_start) | |
1000 | + S_DS_GEN + cmd_append_size)); | |
5e6e3a92 BZ |
1001 | |
1002 | if (adapter->adhoc_start_band == BAND_B) | |
b93f85f0 | 1003 | tmp_cap &= ~WLAN_CAPABILITY_SHORT_SLOT_TIME; |
5e6e3a92 | 1004 | else |
b93f85f0 | 1005 | tmp_cap |= WLAN_CAPABILITY_SHORT_SLOT_TIME; |
5e6e3a92 BZ |
1006 | |
1007 | adhoc_start->cap_info_bitmap = cpu_to_le16(tmp_cap); | |
1008 | ||
1009 | return 0; | |
1010 | } | |
1011 | ||
1012 | /* | |
1013 | * This function prepares command for ad-hoc join. | |
1014 | * | |
1015 | * Most of the parameters are set up by copying from the target BSS descriptor | |
1016 | * from the scan response. | |
1017 | * | |
1018 | * In addition, the following TLVs are added - | |
1019 | * - Channel TLV | |
1020 | * - Vendor specific IE | |
1021 | * - WPA/WPA2 IE | |
1022 | * - 11n IE | |
1023 | * | |
1024 | * Preparation also includes - | |
1025 | * - Setting command ID and proper size | |
1026 | * - Ensuring correct endian-ness | |
1027 | */ | |
1028 | int | |
1029 | mwifiex_cmd_802_11_ad_hoc_join(struct mwifiex_private *priv, | |
a5ffddb7 AK |
1030 | struct host_cmd_ds_command *cmd, |
1031 | struct mwifiex_bssdescriptor *bss_desc) | |
5e6e3a92 | 1032 | { |
636c4598 | 1033 | int rsn_ie_len = 0; |
5e6e3a92 BZ |
1034 | struct host_cmd_ds_802_11_ad_hoc_join *adhoc_join = |
1035 | &cmd->params.adhoc_join; | |
5e6e3a92 BZ |
1036 | struct mwifiex_ie_types_chan_list_param_set *chan_tlv; |
1037 | u32 cmd_append_size = 0; | |
1038 | u16 tmp_cap; | |
1039 | u32 i, rates_size = 0; | |
1040 | u16 curr_pkt_filter; | |
1041 | u8 *pos = | |
1042 | (u8 *) adhoc_join + | |
1043 | sizeof(struct host_cmd_ds_802_11_ad_hoc_join); | |
1044 | ||
1045 | /* Use G protection */ | |
1046 | #define USE_G_PROTECTION 0x02 | |
1047 | if (bss_desc->erp_flags & USE_G_PROTECTION) { | |
1048 | curr_pkt_filter = | |
1049 | priv-> | |
1050 | curr_pkt_filter | HostCmd_ACT_MAC_ADHOC_G_PROTECTION_ON; | |
1051 | ||
636c4598 | 1052 | if (mwifiex_send_cmd_async(priv, HostCmd_CMD_MAC_CONTROL, |
931f1584 YAP |
1053 | HostCmd_ACT_GEN_SET, 0, |
1054 | &curr_pkt_filter)) { | |
5e6e3a92 | 1055 | dev_err(priv->adapter->dev, |
931f1584 | 1056 | "ADHOC_J_CMD: G Protection config failed\n"); |
5e6e3a92 BZ |
1057 | return -1; |
1058 | } | |
1059 | } | |
1060 | ||
1061 | priv->attempted_bss_desc = bss_desc; | |
1062 | ||
1063 | cmd->command = cpu_to_le16(HostCmd_CMD_802_11_AD_HOC_JOIN); | |
1064 | ||
1065 | adhoc_join->bss_descriptor.bss_mode = HostCmd_BSS_MODE_IBSS; | |
1066 | ||
1067 | adhoc_join->bss_descriptor.beacon_period | |
1068 | = cpu_to_le16(bss_desc->beacon_period); | |
1069 | ||
1070 | memcpy(&adhoc_join->bss_descriptor.bssid, | |
1071 | &bss_desc->mac_address, ETH_ALEN); | |
1072 | ||
1073 | memcpy(&adhoc_join->bss_descriptor.ssid, | |
1074 | &bss_desc->ssid.ssid, bss_desc->ssid.ssid_len); | |
1075 | ||
1076 | memcpy(&adhoc_join->bss_descriptor.phy_param_set, | |
1077 | &bss_desc->phy_param_set, | |
1078 | sizeof(union ieee_types_phy_param_set)); | |
1079 | ||
1080 | memcpy(&adhoc_join->bss_descriptor.ss_param_set, | |
1081 | &bss_desc->ss_param_set, sizeof(union ieee_types_ss_param_set)); | |
1082 | ||
1083 | tmp_cap = bss_desc->cap_info_bitmap; | |
1084 | ||
1085 | tmp_cap &= CAPINFO_MASK; | |
1086 | ||
931f1584 YAP |
1087 | dev_dbg(priv->adapter->dev, |
1088 | "info: ADHOC_J_CMD: tmp_cap=%4X CAPINFO_MASK=%4lX\n", | |
1089 | tmp_cap, CAPINFO_MASK); | |
5e6e3a92 BZ |
1090 | |
1091 | /* Information on BSSID descriptor passed to FW */ | |
931f1584 YAP |
1092 | dev_dbg(priv->adapter->dev, "info: ADHOC_J_CMD: BSSID=%pM, SSID='%s'\n", |
1093 | adhoc_join->bss_descriptor.bssid, | |
1094 | adhoc_join->bss_descriptor.ssid); | |
5e6e3a92 BZ |
1095 | |
1096 | for (i = 0; bss_desc->supported_rates[i] && | |
1097 | i < MWIFIEX_SUPPORTED_RATES; | |
1098 | i++) | |
1099 | ; | |
1100 | rates_size = i; | |
1101 | ||
1102 | /* Copy Data Rates from the Rates recorded in scan response */ | |
1103 | memset(adhoc_join->bss_descriptor.data_rates, 0, | |
1104 | sizeof(adhoc_join->bss_descriptor.data_rates)); | |
1105 | memcpy(adhoc_join->bss_descriptor.data_rates, | |
1106 | bss_desc->supported_rates, rates_size); | |
1107 | ||
1108 | /* Copy the adhoc join rates into Current BSS state structure */ | |
1109 | priv->curr_bss_params.num_of_rates = rates_size; | |
1110 | memcpy(&priv->curr_bss_params.data_rates, bss_desc->supported_rates, | |
1111 | rates_size); | |
1112 | ||
1113 | /* Copy the channel information */ | |
1114 | priv->curr_bss_params.bss_descriptor.channel = bss_desc->channel; | |
1115 | priv->curr_bss_params.band = (u8) bss_desc->bss_band; | |
1116 | ||
5eb02e44 | 1117 | if (priv->sec_info.wep_enabled || priv->sec_info.wpa_enabled) |
5e6e3a92 BZ |
1118 | tmp_cap |= WLAN_CAPABILITY_PRIVACY; |
1119 | ||
1120 | if (IS_SUPPORT_MULTI_BANDS(priv->adapter)) { | |
1121 | /* Append a channel TLV */ | |
1122 | chan_tlv = (struct mwifiex_ie_types_chan_list_param_set *) pos; | |
1123 | chan_tlv->header.type = cpu_to_le16(TLV_TYPE_CHANLIST); | |
1124 | chan_tlv->header.len = | |
1125 | cpu_to_le16(sizeof(struct mwifiex_chan_scan_param_set)); | |
1126 | ||
1127 | memset(chan_tlv->chan_scan_param, 0x00, | |
1128 | sizeof(struct mwifiex_chan_scan_param_set)); | |
1129 | chan_tlv->chan_scan_param[0].chan_number = | |
1130 | (bss_desc->phy_param_set.ds_param_set.current_chan); | |
931f1584 YAP |
1131 | dev_dbg(priv->adapter->dev, "info: ADHOC_J_CMD: TLV Chan=%d\n", |
1132 | chan_tlv->chan_scan_param[0].chan_number); | |
5e6e3a92 BZ |
1133 | |
1134 | chan_tlv->chan_scan_param[0].radio_type = | |
1135 | mwifiex_band_to_radio_type((u8) bss_desc->bss_band); | |
1136 | ||
931f1584 YAP |
1137 | dev_dbg(priv->adapter->dev, "info: ADHOC_J_CMD: TLV Band=%d\n", |
1138 | chan_tlv->chan_scan_param[0].radio_type); | |
5e6e3a92 | 1139 | pos += sizeof(chan_tlv->header) + |
931f1584 | 1140 | sizeof(struct mwifiex_chan_scan_param_set); |
5e6e3a92 | 1141 | cmd_append_size += sizeof(chan_tlv->header) + |
931f1584 | 1142 | sizeof(struct mwifiex_chan_scan_param_set); |
5e6e3a92 BZ |
1143 | } |
1144 | ||
1145 | if (priv->sec_info.wpa_enabled) | |
1146 | rsn_ie_len = mwifiex_append_rsn_ie_wpa_wpa2(priv, &pos); | |
1147 | if (rsn_ie_len == -1) | |
1148 | return -1; | |
1149 | cmd_append_size += rsn_ie_len; | |
1150 | ||
1151 | if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info)) | |
1152 | cmd_append_size += mwifiex_cmd_append_11n_tlv(priv, | |
1153 | bss_desc, &pos); | |
1154 | ||
1155 | /* Append vendor specific IE TLV */ | |
1156 | cmd_append_size += mwifiex_cmd_append_vsie_tlv(priv, | |
1157 | MWIFIEX_VSIE_MASK_ADHOC, &pos); | |
1158 | ||
931f1584 YAP |
1159 | cmd->size = cpu_to_le16 |
1160 | ((u16) (sizeof(struct host_cmd_ds_802_11_ad_hoc_join) | |
1161 | + S_DS_GEN + cmd_append_size)); | |
5e6e3a92 BZ |
1162 | |
1163 | adhoc_join->bss_descriptor.cap_info_bitmap = cpu_to_le16(tmp_cap); | |
1164 | ||
636c4598 | 1165 | return 0; |
5e6e3a92 BZ |
1166 | } |
1167 | ||
1168 | /* | |
1169 | * This function handles the command response of ad-hoc start and | |
1170 | * ad-hoc join. | |
1171 | * | |
1172 | * The function generates a device-connected event to notify | |
1173 | * the applications, in case of successful ad-hoc start/join, and | |
1174 | * saves the beacon buffer. | |
1175 | */ | |
1176 | int mwifiex_ret_802_11_ad_hoc(struct mwifiex_private *priv, | |
600f5d90 | 1177 | struct host_cmd_ds_command *resp) |
5e6e3a92 BZ |
1178 | { |
1179 | int ret = 0; | |
600f5d90 | 1180 | struct mwifiex_adapter *adapter = priv->adapter; |
5e6e3a92 BZ |
1181 | struct host_cmd_ds_802_11_ad_hoc_result *adhoc_result; |
1182 | struct mwifiex_bssdescriptor *bss_desc; | |
8cc1d523 | 1183 | u16 reason_code; |
5e6e3a92 BZ |
1184 | |
1185 | adhoc_result = &resp->params.adhoc_result; | |
1186 | ||
1187 | bss_desc = priv->attempted_bss_desc; | |
1188 | ||
1189 | /* Join result code 0 --> SUCCESS */ | |
8cc1d523 AK |
1190 | reason_code = le16_to_cpu(resp->result); |
1191 | if (reason_code) { | |
5e6e3a92 BZ |
1192 | dev_err(priv->adapter->dev, "ADHOC_RESP: failed\n"); |
1193 | if (priv->media_connected) | |
8cc1d523 | 1194 | mwifiex_reset_connect_state(priv, reason_code); |
5e6e3a92 BZ |
1195 | |
1196 | memset(&priv->curr_bss_params.bss_descriptor, | |
1197 | 0x00, sizeof(struct mwifiex_bssdescriptor)); | |
1198 | ||
1199 | ret = -1; | |
1200 | goto done; | |
1201 | } | |
1202 | ||
1203 | /* Send a Media Connected event, according to the Spec */ | |
1204 | priv->media_connected = true; | |
1205 | ||
636c4598 | 1206 | if (le16_to_cpu(resp->command) == HostCmd_CMD_802_11_AD_HOC_START) { |
5e6e3a92 | 1207 | dev_dbg(priv->adapter->dev, "info: ADHOC_S_RESP %s\n", |
931f1584 | 1208 | bss_desc->ssid.ssid); |
5e6e3a92 BZ |
1209 | |
1210 | /* Update the created network descriptor with the new BSSID */ | |
1211 | memcpy(bss_desc->mac_address, | |
1212 | adhoc_result->bssid, ETH_ALEN); | |
1213 | ||
1214 | priv->adhoc_state = ADHOC_STARTED; | |
1215 | } else { | |
1216 | /* | |
1217 | * Now the join cmd should be successful. | |
1218 | * If BSSID has changed use SSID to compare instead of BSSID | |
1219 | */ | |
1220 | dev_dbg(priv->adapter->dev, "info: ADHOC_J_RESP %s\n", | |
931f1584 | 1221 | bss_desc->ssid.ssid); |
5e6e3a92 BZ |
1222 | |
1223 | /* | |
1224 | * Make a copy of current BSSID descriptor, only needed for | |
1225 | * join since the current descriptor is already being used | |
1226 | * for adhoc start | |
1227 | */ | |
1228 | memcpy(&priv->curr_bss_params.bss_descriptor, | |
1229 | bss_desc, sizeof(struct mwifiex_bssdescriptor)); | |
1230 | ||
1231 | priv->adhoc_state = ADHOC_JOINED; | |
1232 | } | |
1233 | ||
1234 | dev_dbg(priv->adapter->dev, "info: ADHOC_RESP: channel = %d\n", | |
931f1584 | 1235 | priv->adhoc_channel); |
5e6e3a92 | 1236 | dev_dbg(priv->adapter->dev, "info: ADHOC_RESP: BSSID = %pM\n", |
931f1584 | 1237 | priv->curr_bss_params.bss_descriptor.mac_address); |
5e6e3a92 BZ |
1238 | |
1239 | if (!netif_carrier_ok(priv->netdev)) | |
1240 | netif_carrier_on(priv->netdev); | |
1241 | if (netif_queue_stopped(priv->netdev)) | |
1242 | netif_wake_queue(priv->netdev); | |
1243 | ||
1244 | mwifiex_save_curr_bcn(priv); | |
1245 | ||
1246 | done: | |
1247 | /* Need to indicate IOCTL complete */ | |
600f5d90 | 1248 | if (adapter->curr_cmd->wait_q_enabled) { |
5e6e3a92 | 1249 | if (ret) |
600f5d90 | 1250 | adapter->cmd_wait_q.status = -1; |
5e6e3a92 | 1251 | else |
600f5d90 | 1252 | adapter->cmd_wait_q.status = 0; |
5e6e3a92 BZ |
1253 | |
1254 | } | |
1255 | ||
1256 | return ret; | |
1257 | } | |
1258 | ||
1259 | /* | |
1260 | * This function associates to a specific BSS discovered in a scan. | |
1261 | * | |
1262 | * It clears any past association response stored for application | |
1263 | * retrieval and calls the command preparation routine to send the | |
1264 | * command to firmware. | |
1265 | */ | |
1266 | int mwifiex_associate(struct mwifiex_private *priv, | |
600f5d90 | 1267 | struct mwifiex_bssdescriptor *bss_desc) |
5e6e3a92 | 1268 | { |
5e6e3a92 BZ |
1269 | u8 current_bssid[ETH_ALEN]; |
1270 | ||
1271 | /* Return error if the adapter or table entry is not marked as infra */ | |
eecd8250 BZ |
1272 | if ((priv->bss_mode != NL80211_IFTYPE_STATION) || |
1273 | (bss_desc->bss_mode != NL80211_IFTYPE_STATION)) | |
5e6e3a92 BZ |
1274 | return -1; |
1275 | ||
1276 | memcpy(¤t_bssid, | |
1277 | &priv->curr_bss_params.bss_descriptor.mac_address, | |
1278 | sizeof(current_bssid)); | |
1279 | ||
1280 | /* Clear any past association response stored for application | |
1281 | retrieval */ | |
1282 | priv->assoc_rsp_size = 0; | |
1283 | ||
636c4598 | 1284 | return mwifiex_send_cmd_sync(priv, HostCmd_CMD_802_11_ASSOCIATE, |
600f5d90 | 1285 | HostCmd_ACT_GEN_SET, 0, bss_desc); |
5e6e3a92 BZ |
1286 | } |
1287 | ||
1288 | /* | |
1289 | * This function starts an ad-hoc network. | |
1290 | * | |
1291 | * It calls the command preparation routine to send the command to firmware. | |
1292 | */ | |
1293 | int | |
1294 | mwifiex_adhoc_start(struct mwifiex_private *priv, | |
b9be5f39 | 1295 | struct cfg80211_ssid *adhoc_ssid) |
5e6e3a92 | 1296 | { |
5e6e3a92 BZ |
1297 | dev_dbg(priv->adapter->dev, "info: Adhoc Channel = %d\n", |
1298 | priv->adhoc_channel); | |
1299 | dev_dbg(priv->adapter->dev, "info: curr_bss_params.channel = %d\n", | |
931f1584 | 1300 | priv->curr_bss_params.bss_descriptor.channel); |
5e6e3a92 | 1301 | dev_dbg(priv->adapter->dev, "info: curr_bss_params.band = %d\n", |
931f1584 | 1302 | priv->curr_bss_params.band); |
5e6e3a92 | 1303 | |
636c4598 | 1304 | return mwifiex_send_cmd_sync(priv, HostCmd_CMD_802_11_AD_HOC_START, |
600f5d90 | 1305 | HostCmd_ACT_GEN_SET, 0, adhoc_ssid); |
5e6e3a92 BZ |
1306 | } |
1307 | ||
1308 | /* | |
1309 | * This function joins an ad-hoc network found in a previous scan. | |
1310 | * | |
1311 | * It calls the command preparation routine to send the command to firmware, | |
1312 | * if already not connected to the requested SSID. | |
1313 | */ | |
1314 | int mwifiex_adhoc_join(struct mwifiex_private *priv, | |
600f5d90 | 1315 | struct mwifiex_bssdescriptor *bss_desc) |
5e6e3a92 | 1316 | { |
5e6e3a92 | 1317 | dev_dbg(priv->adapter->dev, "info: adhoc join: curr_bss ssid =%s\n", |
931f1584 | 1318 | priv->curr_bss_params.bss_descriptor.ssid.ssid); |
5e6e3a92 | 1319 | dev_dbg(priv->adapter->dev, "info: adhoc join: curr_bss ssid_len =%u\n", |
931f1584 | 1320 | priv->curr_bss_params.bss_descriptor.ssid.ssid_len); |
5e6e3a92 BZ |
1321 | dev_dbg(priv->adapter->dev, "info: adhoc join: ssid =%s\n", |
1322 | bss_desc->ssid.ssid); | |
1323 | dev_dbg(priv->adapter->dev, "info: adhoc join: ssid_len =%u\n", | |
931f1584 | 1324 | bss_desc->ssid.ssid_len); |
5e6e3a92 BZ |
1325 | |
1326 | /* Check if the requested SSID is already joined */ | |
1327 | if (priv->curr_bss_params.bss_descriptor.ssid.ssid_len && | |
1328 | !mwifiex_ssid_cmp(&bss_desc->ssid, | |
1329 | &priv->curr_bss_params.bss_descriptor.ssid) && | |
1330 | (priv->curr_bss_params.bss_descriptor.bss_mode == | |
eecd8250 | 1331 | NL80211_IFTYPE_ADHOC)) { |
5e6e3a92 BZ |
1332 | dev_dbg(priv->adapter->dev, "info: ADHOC_J_CMD: new ad-hoc SSID" |
1333 | " is the same as current; not attempting to re-join\n"); | |
1334 | return -1; | |
1335 | } | |
1336 | ||
1337 | dev_dbg(priv->adapter->dev, "info: curr_bss_params.channel = %d\n", | |
931f1584 | 1338 | priv->curr_bss_params.bss_descriptor.channel); |
5e6e3a92 | 1339 | dev_dbg(priv->adapter->dev, "info: curr_bss_params.band = %c\n", |
931f1584 | 1340 | priv->curr_bss_params.band); |
5e6e3a92 | 1341 | |
636c4598 | 1342 | return mwifiex_send_cmd_sync(priv, HostCmd_CMD_802_11_AD_HOC_JOIN, |
600f5d90 | 1343 | HostCmd_ACT_GEN_SET, 0, bss_desc); |
5e6e3a92 BZ |
1344 | } |
1345 | ||
1346 | /* | |
1347 | * This function deauthenticates/disconnects from infra network by sending | |
1348 | * deauthentication request. | |
1349 | */ | |
600f5d90 | 1350 | static int mwifiex_deauthenticate_infra(struct mwifiex_private *priv, u8 *mac) |
5e6e3a92 BZ |
1351 | { |
1352 | u8 mac_address[ETH_ALEN]; | |
270e58e8 | 1353 | int ret; |
5e6e3a92 | 1354 | |
2c208890 JP |
1355 | if (!mac || is_zero_ether_addr(mac)) |
1356 | memcpy(mac_address, | |
1357 | priv->curr_bss_params.bss_descriptor.mac_address, | |
1358 | ETH_ALEN); | |
1359 | else | |
1360 | memcpy(mac_address, mac, ETH_ALEN); | |
5e6e3a92 | 1361 | |
600f5d90 | 1362 | ret = mwifiex_send_cmd_sync(priv, HostCmd_CMD_802_11_DEAUTHENTICATE, |
2c208890 | 1363 | HostCmd_ACT_GEN_SET, 0, mac_address); |
5e6e3a92 BZ |
1364 | |
1365 | return ret; | |
1366 | } | |
1367 | ||
1368 | /* | |
1369 | * This function deauthenticates/disconnects from a BSS. | |
1370 | * | |
1371 | * In case of infra made, it sends deauthentication request, and | |
1372 | * in case of ad-hoc mode, a stop network request is sent to the firmware. | |
26134e6e | 1373 | * In AP mode, a command to stop bss is sent to firmware. |
5e6e3a92 | 1374 | */ |
600f5d90 | 1375 | int mwifiex_deauthenticate(struct mwifiex_private *priv, u8 *mac) |
5e6e3a92 | 1376 | { |
99e126fd BZ |
1377 | if (!priv->media_connected) |
1378 | return 0; | |
5e6e3a92 | 1379 | |
99e126fd BZ |
1380 | switch (priv->bss_mode) { |
1381 | case NL80211_IFTYPE_STATION: | |
1382 | return mwifiex_deauthenticate_infra(priv, mac); | |
1383 | case NL80211_IFTYPE_ADHOC: | |
1384 | return mwifiex_send_cmd_sync(priv, | |
1385 | HostCmd_CMD_802_11_AD_HOC_STOP, | |
1386 | HostCmd_ACT_GEN_SET, 0, NULL); | |
26134e6e AP |
1387 | case NL80211_IFTYPE_AP: |
1388 | return mwifiex_send_cmd_sync(priv, HostCmd_CMD_UAP_BSS_STOP, | |
1389 | HostCmd_ACT_GEN_SET, 0, NULL); | |
99e126fd BZ |
1390 | default: |
1391 | break; | |
5e6e3a92 BZ |
1392 | } |
1393 | ||
99e126fd | 1394 | return 0; |
5e6e3a92 | 1395 | } |
600f5d90 | 1396 | EXPORT_SYMBOL_GPL(mwifiex_deauthenticate); |
5e6e3a92 BZ |
1397 | |
1398 | /* | |
1399 | * This function converts band to radio type used in channel TLV. | |
1400 | */ | |
1401 | u8 | |
1402 | mwifiex_band_to_radio_type(u8 band) | |
1403 | { | |
5e6e3a92 BZ |
1404 | switch (band) { |
1405 | case BAND_A: | |
1406 | case BAND_AN: | |
1407 | case BAND_A | BAND_AN: | |
636c4598 | 1408 | return HostCmd_SCAN_RADIO_TYPE_A; |
5e6e3a92 BZ |
1409 | case BAND_B: |
1410 | case BAND_G: | |
1411 | case BAND_B | BAND_G: | |
1412 | default: | |
636c4598 | 1413 | return HostCmd_SCAN_RADIO_TYPE_BG; |
5e6e3a92 | 1414 | } |
5e6e3a92 | 1415 | } |