mwifiex: use LOW_PRIORITY scan flag provided in scan request
[deliverable/linux.git] / drivers / net / wireless / mwifiex / scan.c
CommitLineData
5e6e3a92
BZ
1/*
2 * Marvell Wireless LAN device driver: scan ioctl and command handling
3 *
4 * Copyright (C) 2011, Marvell International Ltd.
5 *
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
13 *
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
18 */
19
20#include "decl.h"
21#include "ioctl.h"
22#include "util.h"
23#include "fw.h"
24#include "main.h"
25#include "11n.h"
26#include "cfg80211.h"
27
28/* The maximum number of channels the firmware can scan per command */
29#define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
30
658f37b7
AK
31#define MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD 4
32#define MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD 15
33#define MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD 27
34#define MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD 35
5e6e3a92
BZ
35
36/* Memory needed to store a max sized Channel List TLV for a firmware scan */
37#define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
38 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
39 *sizeof(struct mwifiex_chan_scan_param_set)))
40
41/* Memory needed to store supported rate */
42#define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
43 + HOSTCMD_SUPPORTED_RATES)
44
45/* Memory needed to store a max number/size WildCard SSID TLV for a firmware
46 scan */
47#define WILDCARD_SSID_TLV_MAX_SIZE \
48 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
49 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
50 + IEEE80211_MAX_SSID_LEN))
51
52/* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
53#define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
54 + sizeof(struct mwifiex_ie_types_num_probes) \
55 + sizeof(struct mwifiex_ie_types_htcap) \
56 + CHAN_TLV_MAX_SIZE \
57 + RATE_TLV_MAX_SIZE \
58 + WILDCARD_SSID_TLV_MAX_SIZE)
59
60
61union mwifiex_scan_cmd_config_tlv {
62 /* Scan configuration (variable length) */
63 struct mwifiex_scan_cmd_config config;
64 /* Max allocated block */
65 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
66};
67
68enum cipher_suite {
69 CIPHER_SUITE_TKIP,
70 CIPHER_SUITE_CCMP,
71 CIPHER_SUITE_MAX
72};
73static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
74 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
75 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
76};
77static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
78 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
79 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
80};
81
82/*
83 * This function parses a given IE for a given OUI.
84 *
85 * This is used to parse a WPA/RSN IE to find if it has
86 * a given oui in PTK.
87 */
88static u8
89mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
90{
91 u8 count;
92
93 count = iebody->ptk_cnt[0];
94
95 /* There could be multiple OUIs for PTK hence
96 1) Take the length.
97 2) Check all the OUIs for AES.
98 3) If one of them is AES then pass success. */
99 while (count) {
100 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
101 return MWIFIEX_OUI_PRESENT;
102
103 --count;
104 if (count)
105 iebody = (struct ie_body *) ((u8 *) iebody +
106 sizeof(iebody->ptk_body));
107 }
108
109 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
110 return MWIFIEX_OUI_NOT_PRESENT;
111}
112
113/*
114 * This function checks if a given OUI is present in a RSN IE.
115 *
116 * The function first checks if a RSN IE is present or not in the
117 * BSS descriptor. It tries to locate the OUI only if such an IE is
118 * present.
119 */
120static u8
121mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
122{
270e58e8
YAP
123 u8 *oui;
124 struct ie_body *iebody;
5e6e3a92
BZ
125 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
126
127 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
128 ieee_hdr.element_id == WLAN_EID_RSN))) {
129 iebody = (struct ie_body *)
130 (((u8 *) bss_desc->bcn_rsn_ie->data) +
cff23cec 131 RSN_GTK_OUI_OFFSET);
5e6e3a92
BZ
132 oui = &mwifiex_rsn_oui[cipher][0];
133 ret = mwifiex_search_oui_in_ie(iebody, oui);
134 if (ret)
135 return ret;
136 }
137 return ret;
138}
139
140/*
141 * This function checks if a given OUI is present in a WPA IE.
142 *
143 * The function first checks if a WPA IE is present or not in the
144 * BSS descriptor. It tries to locate the OUI only if such an IE is
145 * present.
146 */
147static u8
148mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
149{
270e58e8
YAP
150 u8 *oui;
151 struct ie_body *iebody;
5e6e3a92
BZ
152 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
153
cff23cec
YAP
154 if (((bss_desc->bcn_wpa_ie) &&
155 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id ==
04b2312a 156 WLAN_EID_VENDOR_SPECIFIC))) {
5e6e3a92
BZ
157 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
158 oui = &mwifiex_wpa_oui[cipher][0];
159 ret = mwifiex_search_oui_in_ie(iebody, oui);
160 if (ret)
161 return ret;
162 }
163 return ret;
164}
165
166/*
167 * This function compares two SSIDs and checks if they match.
168 */
169s32
b9be5f39 170mwifiex_ssid_cmp(struct cfg80211_ssid *ssid1, struct cfg80211_ssid *ssid2)
5e6e3a92
BZ
171{
172 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
173 return -1;
174 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
175}
176
5e6e3a92
BZ
177/*
178 * This function checks if wapi is enabled in driver and scanned network is
179 * compatible with it.
180 */
181static bool
cff23cec
YAP
182mwifiex_is_bss_wapi(struct mwifiex_private *priv,
183 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92
BZ
184{
185 if (priv->sec_info.wapi_enabled &&
186 (bss_desc->bcn_wapi_ie &&
187 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
188 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
189 return true;
190 }
191 return false;
192}
193
194/*
195 * This function checks if driver is configured with no security mode and
196 * scanned network is compatible with it.
197 */
198static bool
cff23cec
YAP
199mwifiex_is_bss_no_sec(struct mwifiex_private *priv,
200 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 201{
5eb02e44
AK
202 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
203 !priv->sec_info.wpa2_enabled && ((!bss_desc->bcn_wpa_ie) ||
5e6e3a92 204 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
04b2312a 205 WLAN_EID_VENDOR_SPECIFIC)) &&
cff23cec 206 ((!bss_desc->bcn_rsn_ie) ||
5e6e3a92 207 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
cff23cec
YAP
208 WLAN_EID_RSN)) &&
209 !priv->sec_info.encryption_mode && !bss_desc->privacy) {
5e6e3a92
BZ
210 return true;
211 }
212 return false;
213}
214
215/*
216 * This function checks if static WEP is enabled in driver and scanned network
217 * is compatible with it.
218 */
219static bool
cff23cec
YAP
220mwifiex_is_bss_static_wep(struct mwifiex_private *priv,
221 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 222{
5eb02e44
AK
223 if (priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
224 !priv->sec_info.wpa2_enabled && bss_desc->privacy) {
5e6e3a92
BZ
225 return true;
226 }
227 return false;
228}
229
230/*
231 * This function checks if wpa is enabled in driver and scanned network is
232 * compatible with it.
233 */
234static bool
cff23cec
YAP
235mwifiex_is_bss_wpa(struct mwifiex_private *priv,
236 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 237{
5eb02e44
AK
238 if (!priv->sec_info.wep_enabled && priv->sec_info.wpa_enabled &&
239 !priv->sec_info.wpa2_enabled && ((bss_desc->bcn_wpa_ie) &&
04b2312a
AS
240 ((*(bss_desc->bcn_wpa_ie)).
241 vend_hdr.element_id == WLAN_EID_VENDOR_SPECIFIC))
5e6e3a92
BZ
242 /*
243 * Privacy bit may NOT be set in some APs like
244 * LinkSys WRT54G && bss_desc->privacy
245 */
246 ) {
7c6fa2a8 247 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
5e6e3a92 248 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
7c6fa2a8 249 "EncMode=%#x privacy=%#x\n", __func__,
5e6e3a92
BZ
250 (bss_desc->bcn_wpa_ie) ?
251 (*(bss_desc->bcn_wpa_ie)).
252 vend_hdr.element_id : 0,
253 (bss_desc->bcn_rsn_ie) ?
254 (*(bss_desc->bcn_rsn_ie)).
255 ieee_hdr.element_id : 0,
5eb02e44 256 (priv->sec_info.wep_enabled) ? "e" : "d",
5e6e3a92
BZ
257 (priv->sec_info.wpa_enabled) ? "e" : "d",
258 (priv->sec_info.wpa2_enabled) ? "e" : "d",
259 priv->sec_info.encryption_mode,
260 bss_desc->privacy);
261 return true;
262 }
263 return false;
264}
265
266/*
267 * This function checks if wpa2 is enabled in driver and scanned network is
268 * compatible with it.
269 */
270static bool
cff23cec
YAP
271mwifiex_is_bss_wpa2(struct mwifiex_private *priv,
272 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 273{
cff23cec
YAP
274 if (!priv->sec_info.wep_enabled &&
275 !priv->sec_info.wpa_enabled &&
276 priv->sec_info.wpa2_enabled &&
277 ((bss_desc->bcn_rsn_ie) &&
278 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id == WLAN_EID_RSN))) {
279 /*
280 * Privacy bit may NOT be set in some APs like
281 * LinkSys WRT54G && bss_desc->privacy
282 */
7c6fa2a8 283 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
5e6e3a92 284 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
7c6fa2a8 285 "EncMode=%#x privacy=%#x\n", __func__,
5e6e3a92
BZ
286 (bss_desc->bcn_wpa_ie) ?
287 (*(bss_desc->bcn_wpa_ie)).
288 vend_hdr.element_id : 0,
289 (bss_desc->bcn_rsn_ie) ?
290 (*(bss_desc->bcn_rsn_ie)).
291 ieee_hdr.element_id : 0,
5eb02e44 292 (priv->sec_info.wep_enabled) ? "e" : "d",
5e6e3a92
BZ
293 (priv->sec_info.wpa_enabled) ? "e" : "d",
294 (priv->sec_info.wpa2_enabled) ? "e" : "d",
295 priv->sec_info.encryption_mode,
296 bss_desc->privacy);
297 return true;
298 }
299 return false;
300}
301
302/*
303 * This function checks if adhoc AES is enabled in driver and scanned network is
304 * compatible with it.
305 */
306static bool
cff23cec
YAP
307mwifiex_is_bss_adhoc_aes(struct mwifiex_private *priv,
308 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 309{
5eb02e44 310 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
cff23cec
YAP
311 !priv->sec_info.wpa2_enabled &&
312 ((!bss_desc->bcn_wpa_ie) ||
04b2312a
AS
313 ((*(bss_desc->bcn_wpa_ie)).
314 vend_hdr.element_id != WLAN_EID_VENDOR_SPECIFIC)) &&
cff23cec
YAP
315 ((!bss_desc->bcn_rsn_ie) ||
316 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
317 !priv->sec_info.encryption_mode && bss_desc->privacy) {
5e6e3a92
BZ
318 return true;
319 }
320 return false;
321}
322
323/*
324 * This function checks if dynamic WEP is enabled in driver and scanned network
325 * is compatible with it.
326 */
327static bool
cff23cec
YAP
328mwifiex_is_bss_dynamic_wep(struct mwifiex_private *priv,
329 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92 330{
5eb02e44 331 if (!priv->sec_info.wep_enabled && !priv->sec_info.wpa_enabled &&
cff23cec
YAP
332 !priv->sec_info.wpa2_enabled &&
333 ((!bss_desc->bcn_wpa_ie) ||
04b2312a
AS
334 ((*(bss_desc->bcn_wpa_ie)).
335 vend_hdr.element_id != WLAN_EID_VENDOR_SPECIFIC)) &&
cff23cec
YAP
336 ((!bss_desc->bcn_rsn_ie) ||
337 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id != WLAN_EID_RSN)) &&
338 priv->sec_info.encryption_mode && bss_desc->privacy) {
5e6e3a92 339 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
7c6fa2a8 340 "WEP: wpa_ie=%#x wpa2_ie=%#x "
5e6e3a92 341 "EncMode=%#x privacy=%#x\n",
7c6fa2a8 342 __func__,
5e6e3a92
BZ
343 (bss_desc->bcn_wpa_ie) ?
344 (*(bss_desc->bcn_wpa_ie)).
345 vend_hdr.element_id : 0,
346 (bss_desc->bcn_rsn_ie) ?
347 (*(bss_desc->bcn_rsn_ie)).
348 ieee_hdr.element_id : 0,
349 priv->sec_info.encryption_mode,
350 bss_desc->privacy);
351 return true;
352 }
353 return false;
354}
355
356/*
357 * This function checks if a scanned network is compatible with the driver
358 * settings.
359 *
360 * WEP WPA WPA2 ad-hoc encrypt Network
361 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
362 * 0 0 0 0 NONE 0 0 0 yes No security
363 * 0 1 0 0 x 1x 1 x yes WPA (disable
364 * HT if no AES)
365 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
366 * HT if no AES)
367 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
368 * 1 0 0 0 NONE 1 0 0 yes Static WEP
369 * (disable HT)
370 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
371 *
372 * Compatibility is not matched while roaming, except for mode.
373 */
374static s32
7c6fa2a8
AK
375mwifiex_is_network_compatible(struct mwifiex_private *priv,
376 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
5e6e3a92
BZ
377{
378 struct mwifiex_adapter *adapter = priv->adapter;
5e6e3a92 379
5e6e3a92
BZ
380 bss_desc->disable_11n = false;
381
382 /* Don't check for compatibility if roaming */
cff23cec
YAP
383 if (priv->media_connected &&
384 (priv->bss_mode == NL80211_IFTYPE_STATION) &&
385 (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
7c6fa2a8 386 return 0;
5e6e3a92
BZ
387
388 if (priv->wps.session_enable) {
389 dev_dbg(adapter->dev,
390 "info: return success directly in WPS period\n");
7c6fa2a8 391 return 0;
5e6e3a92
BZ
392 }
393
cff23cec 394 if (mwifiex_is_bss_wapi(priv, bss_desc)) {
5e6e3a92 395 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
7c6fa2a8 396 return 0;
5e6e3a92
BZ
397 }
398
399 if (bss_desc->bss_mode == mode) {
cff23cec 400 if (mwifiex_is_bss_no_sec(priv, bss_desc)) {
5e6e3a92 401 /* No security */
7c6fa2a8 402 return 0;
cff23cec 403 } else if (mwifiex_is_bss_static_wep(priv, bss_desc)) {
5e6e3a92
BZ
404 /* Static WEP enabled */
405 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
406 bss_desc->disable_11n = true;
7c6fa2a8 407 return 0;
cff23cec 408 } else if (mwifiex_is_bss_wpa(priv, bss_desc)) {
5e6e3a92 409 /* WPA enabled */
cff23cec
YAP
410 if (((priv->adapter->config_bands & BAND_GN ||
411 priv->adapter->config_bands & BAND_AN) &&
412 bss_desc->bcn_ht_cap) &&
413 !mwifiex_is_wpa_oui_present(bss_desc,
414 CIPHER_SUITE_CCMP)) {
415
416 if (mwifiex_is_wpa_oui_present
417 (bss_desc, CIPHER_SUITE_TKIP)) {
5e6e3a92
BZ
418 dev_dbg(adapter->dev,
419 "info: Disable 11n if AES "
420 "is not supported by AP\n");
421 bss_desc->disable_11n = true;
422 } else {
423 return -1;
424 }
425 }
7c6fa2a8 426 return 0;
cff23cec 427 } else if (mwifiex_is_bss_wpa2(priv, bss_desc)) {
5e6e3a92 428 /* WPA2 enabled */
cff23cec
YAP
429 if (((priv->adapter->config_bands & BAND_GN ||
430 priv->adapter->config_bands & BAND_AN) &&
431 bss_desc->bcn_ht_cap) &&
432 !mwifiex_is_rsn_oui_present(bss_desc,
433 CIPHER_SUITE_CCMP)) {
434
435 if (mwifiex_is_rsn_oui_present
436 (bss_desc, CIPHER_SUITE_TKIP)) {
5e6e3a92
BZ
437 dev_dbg(adapter->dev,
438 "info: Disable 11n if AES "
439 "is not supported by AP\n");
440 bss_desc->disable_11n = true;
441 } else {
442 return -1;
443 }
444 }
7c6fa2a8 445 return 0;
cff23cec 446 } else if (mwifiex_is_bss_adhoc_aes(priv, bss_desc)) {
5e6e3a92 447 /* Ad-hoc AES enabled */
7c6fa2a8 448 return 0;
cff23cec 449 } else if (mwifiex_is_bss_dynamic_wep(priv, bss_desc)) {
5e6e3a92 450 /* Dynamic WEP enabled */
7c6fa2a8 451 return 0;
5e6e3a92
BZ
452 }
453
454 /* Security doesn't match */
cff23cec
YAP
455 dev_dbg(adapter->dev,
456 "info: %s: failed: wpa_ie=%#x wpa2_ie=%#x WEP=%s "
457 "WPA=%s WPA2=%s EncMode=%#x privacy=%#x\n", __func__,
458 (bss_desc->bcn_wpa_ie) ?
459 (*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id : 0,
460 (bss_desc->bcn_rsn_ie) ?
461 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id : 0,
462 (priv->sec_info.wep_enabled) ? "e" : "d",
463 (priv->sec_info.wpa_enabled) ? "e" : "d",
464 (priv->sec_info.wpa2_enabled) ? "e" : "d",
465 priv->sec_info.encryption_mode, bss_desc->privacy);
5e6e3a92
BZ
466 return -1;
467 }
468
469 /* Mode doesn't match */
470 return -1;
471}
472
5e6e3a92
BZ
473/*
474 * This function creates a channel list for the driver to scan, based
475 * on region/band information.
476 *
477 * This routine is used for any scan that is not provided with a
478 * specific channel list to scan.
479 */
658f37b7 480static int
5e6e3a92 481mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
cff23cec
YAP
482 const struct mwifiex_user_scan_cfg
483 *user_scan_in,
484 struct mwifiex_chan_scan_param_set
485 *scan_chan_list,
486 u8 filtered_scan)
5e6e3a92
BZ
487{
488 enum ieee80211_band band;
489 struct ieee80211_supported_band *sband;
490 struct ieee80211_channel *ch;
491 struct mwifiex_adapter *adapter = priv->adapter;
492 int chan_idx = 0, i;
5e6e3a92
BZ
493
494 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
495
496 if (!priv->wdev->wiphy->bands[band])
497 continue;
498
499 sband = priv->wdev->wiphy->bands[band];
500
d06b7b9e 501 for (i = 0; (i < sband->n_channels) ; i++) {
5e6e3a92
BZ
502 ch = &sband->channels[i];
503 if (ch->flags & IEEE80211_CHAN_DISABLED)
504 continue;
505 scan_chan_list[chan_idx].radio_type = band;
186630c2 506
5e6e3a92 507 if (user_scan_in &&
cff23cec 508 user_scan_in->chan_list[0].scan_time)
5e6e3a92
BZ
509 scan_chan_list[chan_idx].max_scan_time =
510 cpu_to_le16((u16) user_scan_in->
511 chan_list[0].scan_time);
186630c2 512 else if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
5e6e3a92
BZ
513 scan_chan_list[chan_idx].max_scan_time =
514 cpu_to_le16(adapter->passive_scan_time);
515 else
516 scan_chan_list[chan_idx].max_scan_time =
517 cpu_to_le16(adapter->active_scan_time);
186630c2
AK
518
519 if (ch->flags & IEEE80211_CHAN_PASSIVE_SCAN)
5e6e3a92
BZ
520 scan_chan_list[chan_idx].chan_scan_mode_bitmap
521 |= MWIFIEX_PASSIVE_SCAN;
522 else
523 scan_chan_list[chan_idx].chan_scan_mode_bitmap
524 &= ~MWIFIEX_PASSIVE_SCAN;
525 scan_chan_list[chan_idx].chan_number =
526 (u32) ch->hw_value;
527 if (filtered_scan) {
528 scan_chan_list[chan_idx].max_scan_time =
529 cpu_to_le16(adapter->specific_scan_time);
530 scan_chan_list[chan_idx].chan_scan_mode_bitmap
531 |= MWIFIEX_DISABLE_CHAN_FILT;
532 }
d06b7b9e 533 chan_idx++;
5e6e3a92
BZ
534 }
535
536 }
658f37b7 537 return chan_idx;
5e6e3a92
BZ
538}
539
540/*
541 * This function constructs and sends multiple scan config commands to
542 * the firmware.
543 *
544 * Previous routines in the code flow have created a scan command configuration
545 * with any requested TLVs. This function splits the channel TLV into maximum
546 * channels supported per scan lists and sends the portion of the channel TLV,
547 * along with the other TLVs, to the firmware.
548 */
549static int
600f5d90 550mwifiex_scan_channel_list(struct mwifiex_private *priv,
5e6e3a92
BZ
551 u32 max_chan_per_scan, u8 filtered_scan,
552 struct mwifiex_scan_cmd_config *scan_cfg_out,
553 struct mwifiex_ie_types_chan_list_param_set
554 *chan_tlv_out,
555 struct mwifiex_chan_scan_param_set *scan_chan_list)
556{
557 int ret = 0;
558 struct mwifiex_chan_scan_param_set *tmp_chan_list;
559 struct mwifiex_chan_scan_param_set *start_chan;
560
561 u32 tlv_idx;
562 u32 total_scan_time;
563 u32 done_early;
564
565 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
566 dev_dbg(priv->adapter->dev,
567 "info: Scan: Null detect: %p, %p, %p\n",
568 scan_cfg_out, chan_tlv_out, scan_chan_list);
569 return -1;
570 }
571
572 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
573
574 /* Set the temp channel struct pointer to the start of the desired
575 list */
576 tmp_chan_list = scan_chan_list;
577
578 /* Loop through the desired channel list, sending a new firmware scan
579 commands for each max_chan_per_scan channels (or for 1,6,11
580 individually if configured accordingly) */
581 while (tmp_chan_list->chan_number) {
582
583 tlv_idx = 0;
584 total_scan_time = 0;
585 chan_tlv_out->header.len = 0;
586 start_chan = tmp_chan_list;
587 done_early = false;
588
589 /*
590 * Construct the Channel TLV for the scan command. Continue to
591 * insert channel TLVs until:
592 * - the tlv_idx hits the maximum configured per scan command
593 * - the next channel to insert is 0 (end of desired channel
594 * list)
595 * - done_early is set (controlling individual scanning of
596 * 1,6,11)
597 */
cff23cec
YAP
598 while (tlv_idx < max_chan_per_scan &&
599 tmp_chan_list->chan_number && !done_early) {
5e6e3a92
BZ
600
601 dev_dbg(priv->adapter->dev,
602 "info: Scan: Chan(%3d), Radio(%d),"
603 " Mode(%d, %d), Dur(%d)\n",
cff23cec
YAP
604 tmp_chan_list->chan_number,
605 tmp_chan_list->radio_type,
606 tmp_chan_list->chan_scan_mode_bitmap
607 & MWIFIEX_PASSIVE_SCAN,
608 (tmp_chan_list->chan_scan_mode_bitmap
609 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
610 le16_to_cpu(tmp_chan_list->max_scan_time));
5e6e3a92
BZ
611
612 /* Copy the current channel TLV to the command being
613 prepared */
614 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
615 tmp_chan_list,
616 sizeof(chan_tlv_out->chan_scan_param));
617
618 /* Increment the TLV header length by the size
619 appended */
5570a914
WY
620 le16_add_cpu(&chan_tlv_out->header.len,
621 sizeof(chan_tlv_out->chan_scan_param));
5e6e3a92
BZ
622
623 /*
624 * The tlv buffer length is set to the number of bytes
625 * of the between the channel tlv pointer and the start
626 * of the tlv buffer. This compensates for any TLVs
627 * that were appended before the channel list.
628 */
629 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
630 scan_cfg_out->tlv_buf);
631
632 /* Add the size of the channel tlv header and the data
633 length */
634 scan_cfg_out->tlv_buf_len +=
635 (sizeof(chan_tlv_out->header)
636 + le16_to_cpu(chan_tlv_out->header.len));
637
638 /* Increment the index to the channel tlv we are
639 constructing */
640 tlv_idx++;
641
642 /* Count the total scan time per command */
643 total_scan_time +=
644 le16_to_cpu(tmp_chan_list->max_scan_time);
645
646 done_early = false;
647
648 /* Stop the loop if the *current* channel is in the
649 1,6,11 set and we are not filtering on a BSSID
650 or SSID. */
cff23cec
YAP
651 if (!filtered_scan &&
652 (tmp_chan_list->chan_number == 1 ||
653 tmp_chan_list->chan_number == 6 ||
654 tmp_chan_list->chan_number == 11))
5e6e3a92
BZ
655 done_early = true;
656
657 /* Increment the tmp pointer to the next channel to
658 be scanned */
659 tmp_chan_list++;
660
661 /* Stop the loop if the *next* channel is in the 1,6,11
662 set. This will cause it to be the only channel
663 scanned on the next interation */
cff23cec
YAP
664 if (!filtered_scan &&
665 (tmp_chan_list->chan_number == 1 ||
666 tmp_chan_list->chan_number == 6 ||
667 tmp_chan_list->chan_number == 11))
5e6e3a92
BZ
668 done_early = true;
669 }
670
671 /* The total scan time should be less than scan command timeout
672 value */
673 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
674 dev_err(priv->adapter->dev, "total scan time %dms"
675 " is over limit (%dms), scan skipped\n",
676 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
677 ret = -1;
678 break;
679 }
680
681 priv->adapter->scan_channels = start_chan;
682
683 /* Send the scan command to the firmware with the specified
684 cfg */
600f5d90
AK
685 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
686 HostCmd_ACT_GEN_SET, 0,
687 scan_cfg_out);
5e6e3a92
BZ
688 if (ret)
689 break;
690 }
691
692 if (ret)
693 return -1;
694
695 return 0;
696}
697
698/*
699 * This function constructs a scan command configuration structure to use
700 * in scan commands.
701 *
702 * Application layer or other functions can invoke network scanning
703 * with a scan configuration supplied in a user scan configuration structure.
704 * This structure is used as the basis of one or many scan command configuration
705 * commands that are sent to the command processing module and eventually to the
706 * firmware.
707 *
708 * This function creates a scan command configuration structure based on the
709 * following user supplied parameters (if present):
710 * - SSID filter
711 * - BSSID filter
712 * - Number of Probes to be sent
713 * - Channel list
714 *
715 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
716 * If the number of probes is not set, adapter default setting is used.
717 */
718static void
cff23cec
YAP
719mwifiex_config_scan(struct mwifiex_private *priv,
720 const struct mwifiex_user_scan_cfg *user_scan_in,
721 struct mwifiex_scan_cmd_config *scan_cfg_out,
722 struct mwifiex_ie_types_chan_list_param_set **chan_list_out,
723 struct mwifiex_chan_scan_param_set *scan_chan_list,
724 u8 *max_chan_per_scan, u8 *filtered_scan,
725 u8 *scan_current_only)
5e6e3a92
BZ
726{
727 struct mwifiex_adapter *adapter = priv->adapter;
728 struct mwifiex_ie_types_num_probes *num_probes_tlv;
729 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
730 struct mwifiex_ie_types_rates_param_set *rates_tlv;
5e6e3a92
BZ
731 u8 *tlv_pos;
732 u32 num_probes;
733 u32 ssid_len;
734 u32 chan_idx;
658f37b7 735 u32 chan_num;
5e6e3a92
BZ
736 u32 scan_type;
737 u16 scan_dur;
738 u8 channel;
739 u8 radio_type;
be0b281e 740 int i;
5e6e3a92
BZ
741 u8 ssid_filter;
742 u8 rates[MWIFIEX_SUPPORTED_RATES];
743 u32 rates_size;
744 struct mwifiex_ie_types_htcap *ht_cap;
745
746 /* The tlv_buf_len is calculated for each scan command. The TLVs added
747 in this routine will be preserved since the routine that sends the
748 command will append channelTLVs at *chan_list_out. The difference
749 between the *chan_list_out and the tlv_buf start will be used to
750 calculate the size of anything we add in this routine. */
751 scan_cfg_out->tlv_buf_len = 0;
752
753 /* Running tlv pointer. Assigned to chan_list_out at end of function
754 so later routines know where channels can be added to the command
755 buf */
756 tlv_pos = scan_cfg_out->tlv_buf;
757
758 /* Initialize the scan as un-filtered; the flag is later set to TRUE
759 below if a SSID or BSSID filter is sent in the command */
760 *filtered_scan = false;
761
762 /* Initialize the scan as not being only on the current channel. If
763 the channel list is customized, only contains one channel, and is
764 the active channel, this is set true and data flow is not halted. */
765 *scan_current_only = false;
766
767 if (user_scan_in) {
768
769 /* Default the ssid_filter flag to TRUE, set false under
770 certain wildcard conditions and qualified by the existence
771 of an SSID list before marking the scan as filtered */
772 ssid_filter = true;
773
774 /* Set the BSS type scan filter, use Adapter setting if
775 unset */
776 scan_cfg_out->bss_mode =
777 (user_scan_in->bss_mode ? (u8) user_scan_in->
778 bss_mode : (u8) adapter->scan_mode);
779
780 /* Set the number of probes to send, use Adapter setting
781 if unset */
782 num_probes =
783 (user_scan_in->num_probes ? user_scan_in->
784 num_probes : adapter->scan_probes);
785
786 /*
787 * Set the BSSID filter to the incoming configuration,
788 * if non-zero. If not set, it will remain disabled
789 * (all zeros).
790 */
791 memcpy(scan_cfg_out->specific_bssid,
792 user_scan_in->specific_bssid,
793 sizeof(scan_cfg_out->specific_bssid));
794
be0b281e
AK
795 for (i = 0; i < user_scan_in->num_ssids; i++) {
796 ssid_len = user_scan_in->ssid_list[i].ssid_len;
5e6e3a92
BZ
797
798 wildcard_ssid_tlv =
799 (struct mwifiex_ie_types_wildcard_ssid_params *)
800 tlv_pos;
801 wildcard_ssid_tlv->header.type =
802 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
803 wildcard_ssid_tlv->header.len = cpu_to_le16(
804 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
805 max_ssid_length)));
fada1058 806
be0b281e
AK
807 /*
808 * max_ssid_length = 0 tells firmware to perform
809 * specific scan for the SSID filled, whereas
810 * max_ssid_length = IEEE80211_MAX_SSID_LEN is for
811 * wildcard scan.
812 */
813 if (ssid_len)
814 wildcard_ssid_tlv->max_ssid_length = 0;
815 else
816 wildcard_ssid_tlv->max_ssid_length =
817 IEEE80211_MAX_SSID_LEN;
5e6e3a92
BZ
818
819 memcpy(wildcard_ssid_tlv->ssid,
be0b281e 820 user_scan_in->ssid_list[i].ssid, ssid_len);
5e6e3a92
BZ
821
822 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
823 + le16_to_cpu(wildcard_ssid_tlv->header.len));
824
be0b281e
AK
825 dev_dbg(adapter->dev, "info: scan: ssid[%d]: %s, %d\n",
826 i, wildcard_ssid_tlv->ssid,
5e6e3a92
BZ
827 wildcard_ssid_tlv->max_ssid_length);
828
829 /* Empty wildcard ssid with a maxlen will match many or
830 potentially all SSIDs (maxlen == 32), therefore do
831 not treat the scan as
832 filtered. */
833 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
834 ssid_filter = false;
5e6e3a92
BZ
835 }
836
837 /*
838 * The default number of channels sent in the command is low to
839 * ensure the response buffer from the firmware does not
840 * truncate scan results. That is not an issue with an SSID
841 * or BSSID filter applied to the scan results in the firmware.
842 */
cff23cec 843 if ((i && ssid_filter) ||
84f6a95a 844 !is_zero_ether_addr(scan_cfg_out->specific_bssid))
5e6e3a92
BZ
845 *filtered_scan = true;
846 } else {
847 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
848 num_probes = adapter->scan_probes;
849 }
850
851 /*
852 * If a specific BSSID or SSID is used, the number of channels in the
853 * scan command will be increased to the absolute maximum.
854 */
855 if (*filtered_scan)
856 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
857 else
658f37b7 858 *max_chan_per_scan = MWIFIEX_DEF_CHANNELS_PER_SCAN_CMD;
5e6e3a92
BZ
859
860 /* If the input config or adapter has the number of Probes set,
861 add tlv */
862 if (num_probes) {
863
864 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
cff23cec 865 num_probes);
5e6e3a92
BZ
866
867 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
868 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
869 num_probes_tlv->header.len =
870 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
871 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
872
873 tlv_pos += sizeof(num_probes_tlv->header) +
874 le16_to_cpu(num_probes_tlv->header.len);
875
876 }
877
878 /* Append rates tlv */
879 memset(rates, 0, sizeof(rates));
880
881 rates_size = mwifiex_get_supported_rates(priv, rates);
882
883 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
884 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
885 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
886 memcpy(rates_tlv->rates, rates, rates_size);
887 tlv_pos += sizeof(rates_tlv->header) + rates_size;
888
889 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
890
cff23cec
YAP
891 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info) &&
892 (priv->adapter->config_bands & BAND_GN ||
893 priv->adapter->config_bands & BAND_AN)) {
5e6e3a92
BZ
894 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
895 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
896 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
897 ht_cap->header.len =
898 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
a46b7b5c
AK
899 radio_type =
900 mwifiex_band_to_radio_type(priv->adapter->config_bands);
901 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
5e6e3a92
BZ
902 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
903 }
904
905 /* Append vendor specific IE TLV */
906 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
907
908 /*
909 * Set the output for the channel TLV to the address in the tlv buffer
910 * past any TLVs that were added in this function (SSID, num_probes).
911 * Channel TLVs will be added past this for each scan command,
912 * preserving the TLVs that were previously added.
913 */
914 *chan_list_out =
915 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
916
917 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
918
919 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
920
921 for (chan_idx = 0;
cff23cec
YAP
922 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX &&
923 user_scan_in->chan_list[chan_idx].chan_number;
5e6e3a92
BZ
924 chan_idx++) {
925
926 channel = user_scan_in->chan_list[chan_idx].chan_number;
927 (scan_chan_list + chan_idx)->chan_number = channel;
928
929 radio_type =
930 user_scan_in->chan_list[chan_idx].radio_type;
931 (scan_chan_list + chan_idx)->radio_type = radio_type;
932
933 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
934
935 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
936 (scan_chan_list +
937 chan_idx)->chan_scan_mode_bitmap
938 |= MWIFIEX_PASSIVE_SCAN;
939 else
940 (scan_chan_list +
941 chan_idx)->chan_scan_mode_bitmap
942 &= ~MWIFIEX_PASSIVE_SCAN;
943
944 if (user_scan_in->chan_list[chan_idx].scan_time) {
945 scan_dur = (u16) user_scan_in->
946 chan_list[chan_idx].scan_time;
947 } else {
948 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
949 scan_dur = adapter->passive_scan_time;
950 else if (*filtered_scan)
951 scan_dur = adapter->specific_scan_time;
952 else
953 scan_dur = adapter->active_scan_time;
954 }
955
956 (scan_chan_list + chan_idx)->min_scan_time =
957 cpu_to_le16(scan_dur);
958 (scan_chan_list + chan_idx)->max_scan_time =
959 cpu_to_le16(scan_dur);
960 }
961
962 /* Check if we are only scanning the current channel */
cff23cec
YAP
963 if ((chan_idx == 1) &&
964 (user_scan_in->chan_list[0].chan_number ==
965 priv->curr_bss_params.bss_descriptor.channel)) {
5e6e3a92
BZ
966 *scan_current_only = true;
967 dev_dbg(adapter->dev,
968 "info: Scan: Scanning current channel only\n");
969 }
658f37b7 970 chan_num = chan_idx;
5e6e3a92
BZ
971 } else {
972 dev_dbg(adapter->dev,
cff23cec 973 "info: Scan: Creating full region channel list\n");
658f37b7
AK
974 chan_num = mwifiex_scan_create_channel_list(priv, user_scan_in,
975 scan_chan_list,
976 *filtered_scan);
977 }
978
979 /*
980 * In associated state we will reduce the number of channels scanned per
981 * scan command to avoid any traffic delay/loss. This number is decided
982 * based on total number of channels to be scanned due to constraints
983 * of command buffers.
984 */
985 if (priv->media_connected) {
986 if (chan_num < MWIFIEX_LIMIT_1_CHANNEL_PER_SCAN_CMD)
987 *max_chan_per_scan = 1;
988 else if (chan_num < MWIFIEX_LIMIT_2_CHANNELS_PER_SCAN_CMD)
989 *max_chan_per_scan = 2;
990 else if (chan_num < MWIFIEX_LIMIT_3_CHANNELS_PER_SCAN_CMD)
991 *max_chan_per_scan = 3;
b7525dbd
AK
992 else
993 *max_chan_per_scan = 4;
5e6e3a92
BZ
994 }
995}
996
997/*
998 * This function inspects the scan response buffer for pointers to
999 * expected TLVs.
1000 *
1001 * TLVs can be included at the end of the scan response BSS information.
1002 *
1003 * Data in the buffer is parsed pointers to TLVs that can potentially
1004 * be passed back in the response.
1005 */
1006static void
1007mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
1008 struct mwifiex_ie_types_data *tlv,
1009 u32 tlv_buf_size, u32 req_tlv_type,
1010 struct mwifiex_ie_types_data **tlv_data)
1011{
1012 struct mwifiex_ie_types_data *current_tlv;
1013 u32 tlv_buf_left;
1014 u32 tlv_type;
1015 u32 tlv_len;
1016
1017 current_tlv = tlv;
1018 tlv_buf_left = tlv_buf_size;
1019 *tlv_data = NULL;
1020
1021 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
cff23cec 1022 tlv_buf_size);
5e6e3a92
BZ
1023
1024 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1025
1026 tlv_type = le16_to_cpu(current_tlv->header.type);
1027 tlv_len = le16_to_cpu(current_tlv->header.len);
1028
1029 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1030 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1031 break;
1032 }
1033
1034 if (req_tlv_type == tlv_type) {
1035 switch (tlv_type) {
1036 case TLV_TYPE_TSFTIMESTAMP:
1037 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1038 "timestamp TLV, len = %d\n", tlv_len);
2c208890 1039 *tlv_data = current_tlv;
5e6e3a92
BZ
1040 break;
1041 case TLV_TYPE_CHANNELBANDLIST:
1042 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1043 " band list TLV, len = %d\n", tlv_len);
2c208890 1044 *tlv_data = current_tlv;
5e6e3a92
BZ
1045 break;
1046 default:
1047 dev_err(adapter->dev,
1048 "SCAN_RESP: unhandled TLV = %d\n",
1049 tlv_type);
1050 /* Give up, this seems corrupted */
1051 return;
1052 }
1053 }
1054
1055 if (*tlv_data)
1056 break;
1057
1058
1059 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1060 current_tlv =
1061 (struct mwifiex_ie_types_data *) (current_tlv->data +
1062 tlv_len);
1063
1064 } /* while */
1065}
1066
1067/*
7c6fa2a8
AK
1068 * This function parses provided beacon buffer and updates
1069 * respective fields in bss descriptor structure.
5e6e3a92 1070 */
9558a407
AK
1071int mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1072 struct mwifiex_bssdescriptor *bss_entry)
5e6e3a92
BZ
1073{
1074 int ret = 0;
1075 u8 element_id;
1076 struct ieee_types_fh_param_set *fh_param_set;
1077 struct ieee_types_ds_param_set *ds_param_set;
1078 struct ieee_types_cf_param_set *cf_param_set;
1079 struct ieee_types_ibss_param_set *ibss_param_set;
5e6e3a92
BZ
1080 u8 *current_ptr;
1081 u8 *rate;
1082 u8 element_len;
1083 u16 total_ie_len;
1084 u8 bytes_to_copy;
1085 u8 rate_size;
5e6e3a92 1086 u8 found_data_rate_ie;
7c6fa2a8 1087 u32 bytes_left;
5e6e3a92
BZ
1088 struct ieee_types_vendor_specific *vendor_ie;
1089 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1090 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1091
1092 found_data_rate_ie = false;
1093 rate_size = 0;
9558a407
AK
1094 current_ptr = bss_entry->beacon_buf;
1095 bytes_left = bss_entry->beacon_buf_size;
5e6e3a92
BZ
1096
1097 /* Process variable IE */
7c6fa2a8 1098 while (bytes_left >= 2) {
5e6e3a92
BZ
1099 element_id = *current_ptr;
1100 element_len = *(current_ptr + 1);
1101 total_ie_len = element_len + sizeof(struct ieee_types_header);
1102
7c6fa2a8 1103 if (bytes_left < total_ie_len) {
5e6e3a92
BZ
1104 dev_err(adapter->dev, "err: InterpretIE: in processing"
1105 " IE, bytes left < IE length\n");
7c6fa2a8 1106 return -1;
5e6e3a92
BZ
1107 }
1108 switch (element_id) {
1109 case WLAN_EID_SSID:
1110 bss_entry->ssid.ssid_len = element_len;
1111 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1112 element_len);
cff23cec
YAP
1113 dev_dbg(adapter->dev,
1114 "info: InterpretIE: ssid: %-32s\n",
1115 bss_entry->ssid.ssid);
5e6e3a92
BZ
1116 break;
1117
1118 case WLAN_EID_SUPP_RATES:
1119 memcpy(bss_entry->data_rates, current_ptr + 2,
1120 element_len);
1121 memcpy(bss_entry->supported_rates, current_ptr + 2,
1122 element_len);
1123 rate_size = element_len;
1124 found_data_rate_ie = true;
1125 break;
1126
1127 case WLAN_EID_FH_PARAMS:
1128 fh_param_set =
1129 (struct ieee_types_fh_param_set *) current_ptr;
1130 memcpy(&bss_entry->phy_param_set.fh_param_set,
1131 fh_param_set,
1132 sizeof(struct ieee_types_fh_param_set));
1133 break;
1134
1135 case WLAN_EID_DS_PARAMS:
1136 ds_param_set =
1137 (struct ieee_types_ds_param_set *) current_ptr;
1138
1139 bss_entry->channel = ds_param_set->current_chan;
1140
1141 memcpy(&bss_entry->phy_param_set.ds_param_set,
1142 ds_param_set,
1143 sizeof(struct ieee_types_ds_param_set));
1144 break;
1145
1146 case WLAN_EID_CF_PARAMS:
1147 cf_param_set =
1148 (struct ieee_types_cf_param_set *) current_ptr;
1149 memcpy(&bss_entry->ss_param_set.cf_param_set,
1150 cf_param_set,
1151 sizeof(struct ieee_types_cf_param_set));
1152 break;
1153
1154 case WLAN_EID_IBSS_PARAMS:
1155 ibss_param_set =
1156 (struct ieee_types_ibss_param_set *)
1157 current_ptr;
1158 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1159 ibss_param_set,
1160 sizeof(struct ieee_types_ibss_param_set));
1161 break;
1162
1163 case WLAN_EID_ERP_INFO:
1164 bss_entry->erp_flags = *(current_ptr + 2);
1165 break;
1166
1167 case WLAN_EID_EXT_SUPP_RATES:
1168 /*
1169 * Only process extended supported rate
1170 * if data rate is already found.
1171 * Data rate IE should come before
1172 * extended supported rate IE
1173 */
1174 if (found_data_rate_ie) {
1175 if ((element_len + rate_size) >
1176 MWIFIEX_SUPPORTED_RATES)
1177 bytes_to_copy =
1178 (MWIFIEX_SUPPORTED_RATES -
1179 rate_size);
1180 else
1181 bytes_to_copy = element_len;
1182
1183 rate = (u8 *) bss_entry->data_rates;
1184 rate += rate_size;
1185 memcpy(rate, current_ptr + 2, bytes_to_copy);
1186
1187 rate = (u8 *) bss_entry->supported_rates;
1188 rate += rate_size;
1189 memcpy(rate, current_ptr + 2, bytes_to_copy);
1190 }
1191 break;
1192
1193 case WLAN_EID_VENDOR_SPECIFIC:
1194 vendor_ie = (struct ieee_types_vendor_specific *)
1195 current_ptr;
1196
1197 if (!memcmp
1198 (vendor_ie->vend_hdr.oui, wpa_oui,
1199 sizeof(wpa_oui))) {
1200 bss_entry->bcn_wpa_ie =
1201 (struct ieee_types_vendor_specific *)
1202 current_ptr;
cff23cec
YAP
1203 bss_entry->wpa_offset = (u16)
1204 (current_ptr - bss_entry->beacon_buf);
5e6e3a92
BZ
1205 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1206 sizeof(wmm_oui))) {
1207 if (total_ie_len ==
cff23cec
YAP
1208 sizeof(struct ieee_types_wmm_parameter) ||
1209 total_ie_len ==
5e6e3a92
BZ
1210 sizeof(struct ieee_types_wmm_info))
1211 /*
1212 * Only accept and copy the WMM IE if
1213 * it matches the size expected for the
1214 * WMM Info IE or the WMM Parameter IE.
1215 */
1216 memcpy((u8 *) &bss_entry->wmm_ie,
1217 current_ptr, total_ie_len);
1218 }
1219 break;
1220 case WLAN_EID_RSN:
1221 bss_entry->bcn_rsn_ie =
1222 (struct ieee_types_generic *) current_ptr;
1223 bss_entry->rsn_offset = (u16) (current_ptr -
1224 bss_entry->beacon_buf);
1225 break;
1226 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1227 bss_entry->bcn_wapi_ie =
1228 (struct ieee_types_generic *) current_ptr;
1229 bss_entry->wapi_offset = (u16) (current_ptr -
1230 bss_entry->beacon_buf);
1231 break;
1232 case WLAN_EID_HT_CAPABILITY:
1233 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1234 (current_ptr +
1235 sizeof(struct ieee_types_header));
1236 bss_entry->ht_cap_offset = (u16) (current_ptr +
1237 sizeof(struct ieee_types_header) -
1238 bss_entry->beacon_buf);
1239 break;
074d46d1
JB
1240 case WLAN_EID_HT_OPERATION:
1241 bss_entry->bcn_ht_oper =
1242 (struct ieee80211_ht_operation *)(current_ptr +
5e6e3a92
BZ
1243 sizeof(struct ieee_types_header));
1244 bss_entry->ht_info_offset = (u16) (current_ptr +
1245 sizeof(struct ieee_types_header) -
1246 bss_entry->beacon_buf);
1247 break;
1248 case WLAN_EID_BSS_COEX_2040:
2c208890
JP
1249 bss_entry->bcn_bss_co_2040 = current_ptr +
1250 sizeof(struct ieee_types_header);
5e6e3a92
BZ
1251 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1252 sizeof(struct ieee_types_header) -
1253 bss_entry->beacon_buf);
1254 break;
1255 case WLAN_EID_EXT_CAPABILITY:
2c208890
JP
1256 bss_entry->bcn_ext_cap = current_ptr +
1257 sizeof(struct ieee_types_header);
5e6e3a92
BZ
1258 bss_entry->ext_cap_offset = (u16) (current_ptr +
1259 sizeof(struct ieee_types_header) -
1260 bss_entry->beacon_buf);
1261 break;
5e6e3a92
BZ
1262 default:
1263 break;
1264 }
1265
1266 current_ptr += element_len + 2;
1267
1268 /* Need to account for IE ID and IE Len */
7c6fa2a8 1269 bytes_left -= (element_len + 2);
5e6e3a92 1270
7c6fa2a8 1271 } /* while (bytes_left > 2) */
5e6e3a92
BZ
1272 return ret;
1273}
1274
5e6e3a92
BZ
1275/*
1276 * This function converts radio type scan parameter to a band configuration
1277 * to be used in join command.
1278 */
1279static u8
1280mwifiex_radio_type_to_band(u8 radio_type)
1281{
5e6e3a92
BZ
1282 switch (radio_type) {
1283 case HostCmd_SCAN_RADIO_TYPE_A:
636c4598 1284 return BAND_A;
5e6e3a92
BZ
1285 case HostCmd_SCAN_RADIO_TYPE_BG:
1286 default:
636c4598 1287 return BAND_G;
5e6e3a92 1288 }
5e6e3a92
BZ
1289}
1290
5e6e3a92
BZ
1291/*
1292 * This is an internal function used to start a scan based on an input
1293 * configuration.
1294 *
1295 * This uses the input user scan configuration information when provided in
1296 * order to send the appropriate scan commands to firmware to populate or
1297 * update the internal driver scan table.
1298 */
1a1fb970
AK
1299int mwifiex_scan_networks(struct mwifiex_private *priv,
1300 const struct mwifiex_user_scan_cfg *user_scan_in)
5e6e3a92 1301{
c2476335 1302 int ret;
5e6e3a92 1303 struct mwifiex_adapter *adapter = priv->adapter;
270e58e8
YAP
1304 struct cmd_ctrl_node *cmd_node;
1305 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
5e6e3a92
BZ
1306 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1307 u32 buf_size;
1308 struct mwifiex_chan_scan_param_set *scan_chan_list;
5e6e3a92
BZ
1309 u8 filtered_scan;
1310 u8 scan_current_chan_only;
1311 u8 max_chan_per_scan;
1312 unsigned long flags;
1313
600f5d90 1314 if (adapter->scan_processing) {
c2476335
BZ
1315 dev_err(adapter->dev, "cmd: Scan already in process...\n");
1316 return -EBUSY;
5e6e3a92
BZ
1317 }
1318
600f5d90 1319 if (priv->scan_block) {
c2476335 1320 dev_err(adapter->dev,
5e6e3a92 1321 "cmd: Scan is blocked during association...\n");
c2476335 1322 return -EBUSY;
5e6e3a92
BZ
1323 }
1324
c2476335
BZ
1325 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1326 adapter->scan_processing = true;
1327 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1328
5e6e3a92 1329 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
cff23cec 1330 GFP_KERNEL);
5e6e3a92
BZ
1331 if (!scan_cfg_out) {
1332 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
061f2e69
AK
1333 ret = -ENOMEM;
1334 goto done;
5e6e3a92
BZ
1335 }
1336
1337 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
cff23cec 1338 MWIFIEX_USER_SCAN_CHAN_MAX;
5e6e3a92
BZ
1339 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1340 if (!scan_chan_list) {
1341 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1342 kfree(scan_cfg_out);
061f2e69
AK
1343 ret = -ENOMEM;
1344 goto done;
5e6e3a92
BZ
1345 }
1346
cff23cec
YAP
1347 mwifiex_config_scan(priv, user_scan_in, &scan_cfg_out->config,
1348 &chan_list_out, scan_chan_list, &max_chan_per_scan,
1349 &filtered_scan, &scan_current_chan_only);
5e6e3a92 1350
600f5d90
AK
1351 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1352 &scan_cfg_out->config, chan_list_out,
1353 scan_chan_list);
5e6e3a92
BZ
1354
1355 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1356 if (!ret) {
1357 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1358 if (!list_empty(&adapter->scan_pending_q)) {
1359 cmd_node = list_first_entry(&adapter->scan_pending_q,
cff23cec 1360 struct cmd_ctrl_node, list);
5e6e3a92
BZ
1361 list_del(&cmd_node->list);
1362 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
cff23cec 1363 flags);
efaaa8b8 1364 adapter->cmd_queued = cmd_node;
5e6e3a92
BZ
1365 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1366 true);
1a1fb970 1367 queue_work(adapter->workqueue, &adapter->main_work);
5e6e3a92
BZ
1368 } else {
1369 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1370 flags);
1371 }
5e6e3a92
BZ
1372 }
1373
1374 kfree(scan_cfg_out);
1375 kfree(scan_chan_list);
061f2e69
AK
1376done:
1377 if (ret) {
1378 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1379 adapter->scan_processing = false;
1380 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1381 }
5e6e3a92
BZ
1382 return ret;
1383}
1384
1385/*
1386 * This function prepares a scan command to be sent to the firmware.
1387 *
1388 * This uses the scan command configuration sent to the command processing
1389 * module in command preparation stage to configure a scan command structure
1390 * to send to firmware.
1391 *
1392 * The fixed fields specifying the BSS type and BSSID filters as well as a
1393 * variable number/length of TLVs are sent in the command to firmware.
1394 *
1395 * Preparation also includes -
1396 * - Setting command ID, and proper size
1397 * - Ensuring correct endian-ness
1398 */
a5ffddb7
AK
1399int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1400 struct mwifiex_scan_cmd_config *scan_cfg)
5e6e3a92
BZ
1401{
1402 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
5e6e3a92
BZ
1403
1404 /* Set fixed field variables in scan command */
1405 scan_cmd->bss_mode = scan_cfg->bss_mode;
1406 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1407 sizeof(scan_cmd->bssid));
1408 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1409
1410 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1411
1412 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1413 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1414 + sizeof(scan_cmd->bssid)
1415 + scan_cfg->tlv_buf_len + S_DS_GEN));
1416
1417 return 0;
1418}
1419
7c6fa2a8
AK
1420/*
1421 * This function checks compatibility of requested network with current
1422 * driver settings.
1423 */
1424int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1425 struct mwifiex_bssdescriptor *bss_desc)
1426{
1427 int ret = -1;
1428
1429 if (!bss_desc)
1430 return -1;
1431
6685d109
YAP
1432 if ((mwifiex_get_cfp(priv, (u8) bss_desc->bss_band,
1433 (u16) bss_desc->channel, 0))) {
7c6fa2a8
AK
1434 switch (priv->bss_mode) {
1435 case NL80211_IFTYPE_STATION:
1436 case NL80211_IFTYPE_ADHOC:
1437 ret = mwifiex_is_network_compatible(priv, bss_desc,
1438 priv->bss_mode);
1439 if (ret)
06975884
AK
1440 dev_err(priv->adapter->dev,
1441 "Incompatible network settings\n");
2f9279b5 1442 break;
7c6fa2a8 1443 default:
2f9279b5 1444 ret = 0;
7c6fa2a8
AK
1445 }
1446 }
1447
1448 return ret;
1449}
1450
9558a407
AK
1451static int mwifiex_update_curr_bss_params(struct mwifiex_private *priv,
1452 struct cfg80211_bss *bss)
7c6fa2a8 1453{
db652e4b 1454 struct mwifiex_bssdescriptor *bss_desc;
7c6fa2a8
AK
1455 int ret;
1456 unsigned long flags;
7c6fa2a8
AK
1457
1458 /* Allocate and fill new bss descriptor */
1459 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1460 GFP_KERNEL);
1461 if (!bss_desc) {
1462 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1463 return -ENOMEM;
1464 }
5982b47a 1465
9558a407 1466 ret = mwifiex_fill_new_bss_desc(priv, bss, bss_desc);
7c6fa2a8
AK
1467 if (ret)
1468 goto done;
1469
1470 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1471 if (ret)
1472 goto done;
1473
1474 /* Update current bss descriptor parameters */
1475 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1476 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1477 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1478 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1479 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1480 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1481 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1482 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1483 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1484 0;
074d46d1 1485 priv->curr_bss_params.bss_descriptor.bcn_ht_oper = NULL;
7c6fa2a8
AK
1486 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1487 0;
1488 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1489 NULL;
1490 priv->curr_bss_params.bss_descriptor.
1491 bss_co_2040_offset = 0;
1492 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1493 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1494 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1495 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1496 0;
1497
1498 /* Make a copy of current BSSID descriptor */
1499 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
cff23cec 1500 sizeof(priv->curr_bss_params.bss_descriptor));
7c6fa2a8
AK
1501 mwifiex_save_curr_bcn(priv);
1502 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1503
1504done:
1505 kfree(bss_desc);
7c6fa2a8
AK
1506 return 0;
1507}
1508
5e6e3a92
BZ
1509/*
1510 * This function handles the command response of scan.
1511 *
1512 * The response buffer for the scan command has the following
1513 * memory layout:
1514 *
1515 * .-------------------------------------------------------------.
1516 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1517 * .-------------------------------------------------------------.
1518 * | BufSize (t_u16) : sizeof the BSS Description data |
1519 * .-------------------------------------------------------------.
1520 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1521 * .-------------------------------------------------------------.
1522 * | BSSDescription data (variable, size given in BufSize) |
1523 * .-------------------------------------------------------------.
1524 * | TLV data (variable, size calculated using Header->Size, |
1525 * | BufSize and sizeof the fixed fields above) |
1526 * .-------------------------------------------------------------.
1527 */
1528int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
600f5d90 1529 struct host_cmd_ds_command *resp)
5e6e3a92
BZ
1530{
1531 int ret = 0;
1532 struct mwifiex_adapter *adapter = priv->adapter;
270e58e8
YAP
1533 struct cmd_ctrl_node *cmd_node;
1534 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
5e6e3a92
BZ
1535 struct mwifiex_ie_types_data *tlv_data;
1536 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1537 u8 *bss_info;
1538 u32 scan_resp_size;
1539 u32 bytes_left;
5e6e3a92
BZ
1540 u32 idx;
1541 u32 tlv_buf_size;
5e6e3a92
BZ
1542 struct mwifiex_chan_freq_power *cfp;
1543 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1544 struct chan_band_param_set *chan_band;
5e6e3a92
BZ
1545 u8 is_bgscan_resp;
1546 unsigned long flags;
5116f3ce 1547 struct cfg80211_bss *bss;
5e6e3a92
BZ
1548
1549 is_bgscan_resp = (le16_to_cpu(resp->command)
cff23cec 1550 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
5e6e3a92
BZ
1551 if (is_bgscan_resp)
1552 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1553 else
1554 scan_rsp = &resp->params.scan_resp;
1555
1556
67a50035 1557 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
5e6e3a92 1558 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
cff23cec 1559 scan_rsp->number_of_sets);
5e6e3a92
BZ
1560 ret = -1;
1561 goto done;
1562 }
1563
1564 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1565 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
cff23cec 1566 bytes_left);
5e6e3a92
BZ
1567
1568 scan_resp_size = le16_to_cpu(resp->size);
1569
1570 dev_dbg(adapter->dev,
1571 "info: SCAN_RESP: returned %d APs before parsing\n",
cff23cec 1572 scan_rsp->number_of_sets);
5e6e3a92 1573
5e6e3a92
BZ
1574 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1575
1576 /*
1577 * The size of the TLV buffer is equal to the entire command response
1578 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1579 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1580 * response header (S_DS_GEN)
1581 */
1582 tlv_buf_size = scan_resp_size - (bytes_left
1583 + sizeof(scan_rsp->bss_descript_size)
1584 + sizeof(scan_rsp->number_of_sets)
1585 + S_DS_GEN);
1586
1587 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1588 bss_desc_and_tlv_buffer +
1589 bytes_left);
1590
1591 /* Search the TLV buffer space in the scan response for any valid
1592 TLVs */
1593 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1594 TLV_TYPE_TSFTIMESTAMP,
1595 (struct mwifiex_ie_types_data **)
1596 &tsf_tlv);
1597
1598 /* Search the TLV buffer space in the scan response for any valid
1599 TLVs */
1600 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1601 TLV_TYPE_CHANNELBANDLIST,
1602 (struct mwifiex_ie_types_data **)
1603 &chan_band_tlv);
1604
5e6e3a92 1605 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
7c6fa2a8
AK
1606 u8 bssid[ETH_ALEN];
1607 s32 rssi;
1608 const u8 *ie_buf;
1609 size_t ie_len;
6685d109 1610 u16 channel = 0;
b5abcf02 1611 u64 fw_tsf = 0;
7c6fa2a8
AK
1612 u16 beacon_size = 0;
1613 u32 curr_bcn_bytes;
1614 u32 freq;
1615 u16 beacon_period;
1616 u16 cap_info_bitmap;
1617 u8 *current_ptr;
b5abcf02 1618 u64 timestamp;
7c6fa2a8 1619 struct mwifiex_bcn_param *bcn_param;
b5abcf02 1620 struct mwifiex_bss_priv *bss_priv;
7c6fa2a8
AK
1621
1622 if (bytes_left >= sizeof(beacon_size)) {
1623 /* Extract & convert beacon size from command buffer */
1624 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1625 bytes_left -= sizeof(beacon_size);
1626 bss_info += sizeof(beacon_size);
5e6e3a92
BZ
1627 }
1628
7c6fa2a8
AK
1629 if (!beacon_size || beacon_size > bytes_left) {
1630 bss_info += bytes_left;
1631 bytes_left = 0;
1632 return -1;
1633 }
5e6e3a92 1634
7c6fa2a8
AK
1635 /* Initialize the current working beacon pointer for this BSS
1636 * iteration */
1637 current_ptr = bss_info;
1638
1639 /* Advance the return beacon pointer past the current beacon */
1640 bss_info += beacon_size;
1641 bytes_left -= beacon_size;
1642
1643 curr_bcn_bytes = beacon_size;
1644
1645 /*
1646 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1647 * and capability information
1648 */
1649 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
cff23cec
YAP
1650 dev_err(adapter->dev,
1651 "InterpretIE: not enough bytes left\n");
7c6fa2a8
AK
1652 continue;
1653 }
1654 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1655 current_ptr += sizeof(*bcn_param);
1656 curr_bcn_bytes -= sizeof(*bcn_param);
1657
1658 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1659
c9919be6
AK
1660 rssi = (s32) bcn_param->rssi;
1661 rssi = (-rssi) * 100; /* Convert dBm to mBm */
1662 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%d\n", rssi);
7c6fa2a8 1663
b5abcf02 1664 timestamp = le64_to_cpu(bcn_param->timestamp);
7c6fa2a8
AK
1665 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1666
1667 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1668 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
cff23cec 1669 cap_info_bitmap);
7c6fa2a8
AK
1670
1671 /* Rest of the current buffer are IE's */
1672 ie_buf = current_ptr;
1673 ie_len = curr_bcn_bytes;
cff23cec
YAP
1674 dev_dbg(adapter->dev,
1675 "info: InterpretIE: IELength for this AP = %d\n",
1676 curr_bcn_bytes);
7c6fa2a8
AK
1677
1678 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1679 u8 element_id, element_len;
1680
1681 element_id = *current_ptr;
1682 element_len = *(current_ptr + 1);
1683 if (curr_bcn_bytes < element_len +
1684 sizeof(struct ieee_types_header)) {
cff23cec
YAP
1685 dev_err(priv->adapter->dev,
1686 "%s: bytes left < IE length\n",
7c6fa2a8
AK
1687 __func__);
1688 goto done;
5e6e3a92 1689 }
7c6fa2a8 1690 if (element_id == WLAN_EID_DS_PARAMS) {
2c208890 1691 channel = *(current_ptr + sizeof(struct ieee_types_header));
5e6e3a92
BZ
1692 break;
1693 }
7c6fa2a8
AK
1694
1695 current_ptr += element_len +
1696 sizeof(struct ieee_types_header);
1697 curr_bcn_bytes -= element_len +
1698 sizeof(struct ieee_types_header);
5e6e3a92
BZ
1699 }
1700
5e6e3a92
BZ
1701 /*
1702 * If the TSF TLV was appended to the scan results, save this
b5abcf02
AK
1703 * entry's TSF value in the fw_tsf field. It is the firmware's
1704 * TSF value at the time the beacon or probe response was
1705 * received.
5e6e3a92 1706 */
7c6fa2a8 1707 if (tsf_tlv)
b5abcf02
AK
1708 memcpy(&fw_tsf, &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1709 sizeof(fw_tsf));
7c6fa2a8 1710
6685d109 1711 if (channel) {
7c6fa2a8
AK
1712 struct ieee80211_channel *chan;
1713 u8 band;
1714
1715 band = BAND_G;
1716 if (chan_band_tlv) {
1717 chan_band =
1718 &chan_band_tlv->chan_band_param[idx];
1719 band = mwifiex_radio_type_to_band(
1720 chan_band->radio_type
1721 & (BIT(0) | BIT(1)));
1722 }
5e6e3a92 1723
6685d109 1724 cfp = mwifiex_get_cfp(priv, band, channel, 0);
5e6e3a92 1725
7c6fa2a8 1726 freq = cfp ? cfp->freq : 0;
5e6e3a92 1727
7c6fa2a8 1728 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
5e6e3a92 1729
7c6fa2a8 1730 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
5116f3ce 1731 bss = cfg80211_inform_bss(priv->wdev->wiphy,
b5abcf02 1732 chan, bssid, timestamp,
5116f3ce
AK
1733 cap_info_bitmap, beacon_period,
1734 ie_buf, ie_len, rssi, GFP_KERNEL);
b5abcf02
AK
1735 bss_priv = (struct mwifiex_bss_priv *)bss->priv;
1736 bss_priv->band = band;
1737 bss_priv->fw_tsf = fw_tsf;
cff23cec
YAP
1738 if (priv->media_connected &&
1739 !memcmp(bssid,
1740 priv->curr_bss_params.bss_descriptor
1741 .mac_address, ETH_ALEN))
9558a407
AK
1742 mwifiex_update_curr_bss_params(priv,
1743 bss);
1744 cfg80211_put_bss(bss);
7c6fa2a8
AK
1745 }
1746 } else {
1747 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1748 }
1749 }
5e6e3a92
BZ
1750
1751 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1752 if (list_empty(&adapter->scan_pending_q)) {
1753 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1754 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1755 adapter->scan_processing = false;
1756 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
5e6e3a92
BZ
1757
1758 /* Need to indicate IOCTL complete */
600f5d90
AK
1759 if (adapter->curr_cmd->wait_q_enabled) {
1760 adapter->cmd_wait_q.status = 0;
efaaa8b8 1761 mwifiex_complete_cmd(adapter, adapter->curr_cmd);
5e6e3a92
BZ
1762 }
1763 if (priv->report_scan_result)
1764 priv->report_scan_result = false;
1765 if (priv->scan_pending_on_block) {
1766 priv->scan_pending_on_block = false;
1767 up(&priv->async_sem);
1768 }
1769
38c9d664 1770 if (priv->user_scan_cfg) {
cff23cec
YAP
1771 dev_dbg(priv->adapter->dev,
1772 "info: %s: sending scan results\n", __func__);
38c9d664
AK
1773 cfg80211_scan_done(priv->scan_request, 0);
1774 priv->scan_request = NULL;
1775 kfree(priv->user_scan_cfg);
1776 priv->user_scan_cfg = NULL;
1777 }
5e6e3a92 1778 } else {
e45a8419
AK
1779 if (!mwifiex_wmm_lists_empty(adapter) &&
1780 (priv->scan_request && (priv->scan_request->flags &
1781 NL80211_SCAN_FLAG_LOW_PRIORITY))) {
3249ba73
AK
1782 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1783 flags);
1784 adapter->scan_delay_cnt = 1;
1785 mod_timer(&priv->scan_delay_timer, jiffies +
1786 msecs_to_jiffies(MWIFIEX_SCAN_DELAY_MSEC));
e45a8419
AK
1787 dev_dbg(priv->adapter->dev,
1788 "info: %s: deferring scan\n", __func__);
3249ba73
AK
1789 } else {
1790 /* Get scan command from scan_pending_q and put to
1791 cmd_pending_q */
1792 cmd_node = list_first_entry(&adapter->scan_pending_q,
1793 struct cmd_ctrl_node, list);
1794 list_del(&cmd_node->list);
1795 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1796 flags);
1797 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1798 true);
1799 }
5e6e3a92
BZ
1800 }
1801
1802done:
5e6e3a92
BZ
1803 return ret;
1804}
1805
1806/*
1807 * This function prepares command for background scan query.
1808 *
1809 * Preparation includes -
1810 * - Setting command ID and proper size
1811 * - Setting background scan flush parameter
1812 * - Ensuring correct endian-ness
1813 */
572e8f3e 1814int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
5e6e3a92
BZ
1815{
1816 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1817 &cmd->params.bg_scan_query;
1818
1819 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1820 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1821 + S_DS_GEN);
1822
1823 bg_query->flush = 1;
1824
1825 return 0;
1826}
1827
5e6e3a92
BZ
1828/*
1829 * This function inserts scan command node to the scan pending queue.
1830 */
1831void
1832mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1833 struct cmd_ctrl_node *cmd_node)
1834{
1835 struct mwifiex_adapter *adapter = priv->adapter;
1836 unsigned long flags;
1837
600f5d90 1838 cmd_node->wait_q_enabled = true;
efaaa8b8 1839 cmd_node->condition = &adapter->scan_wait_q_woken;
5e6e3a92
BZ
1840 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1841 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1842 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1843}
1844
5e6e3a92
BZ
1845/*
1846 * This function sends a scan command for all available channels to the
1847 * firmware, filtered on a specific SSID.
1848 */
1849static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
b9be5f39 1850 struct cfg80211_ssid *req_ssid)
5e6e3a92
BZ
1851{
1852 struct mwifiex_adapter *adapter = priv->adapter;
1853 int ret = 0;
1854 struct mwifiex_user_scan_cfg *scan_cfg;
1855
1856 if (!req_ssid)
1857 return -1;
1858
600f5d90 1859 if (adapter->scan_processing) {
5e6e3a92
BZ
1860 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1861 return ret;
1862 }
1863
600f5d90 1864 if (priv->scan_block) {
5e6e3a92
BZ
1865 dev_dbg(adapter->dev,
1866 "cmd: Scan is blocked during association...\n");
1867 return ret;
1868 }
1869
5e6e3a92
BZ
1870 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1871 if (!scan_cfg) {
1872 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
b53575ec 1873 return -ENOMEM;
5e6e3a92
BZ
1874 }
1875
be0b281e
AK
1876 scan_cfg->ssid_list = req_ssid;
1877 scan_cfg->num_ssids = 1;
5e6e3a92 1878
600f5d90 1879 ret = mwifiex_scan_networks(priv, scan_cfg);
5e6e3a92
BZ
1880
1881 kfree(scan_cfg);
1882 return ret;
1883}
1884
1885/*
1886 * Sends IOCTL request to start a scan.
1887 *
1888 * This function allocates the IOCTL request buffer, fills it
1889 * with requisite parameters and calls the IOCTL handler.
1890 *
1891 * Scan command can be issued for both normal scan and specific SSID
1892 * scan, depending upon whether an SSID is provided or not.
1893 */
600f5d90 1894int mwifiex_request_scan(struct mwifiex_private *priv,
b9be5f39 1895 struct cfg80211_ssid *req_ssid)
5e6e3a92 1896{
270e58e8 1897 int ret;
5e6e3a92
BZ
1898
1899 if (down_interruptible(&priv->async_sem)) {
1900 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
cff23cec 1901 __func__);
5e6e3a92
BZ
1902 return -1;
1903 }
1904 priv->scan_pending_on_block = true;
1905
efaaa8b8 1906 priv->adapter->scan_wait_q_woken = false;
5e6e3a92
BZ
1907
1908 if (req_ssid && req_ssid->ssid_len != 0)
1909 /* Specific SSID scan */
600f5d90 1910 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
5e6e3a92
BZ
1911 else
1912 /* Normal scan */
600f5d90
AK
1913 ret = mwifiex_scan_networks(priv, NULL);
1914
1915 if (!ret)
1916 ret = mwifiex_wait_queue_complete(priv->adapter);
1917
5e6e3a92
BZ
1918 if (ret == -1) {
1919 priv->scan_pending_on_block = false;
1920 up(&priv->async_sem);
1921 }
600f5d90 1922
5e6e3a92
BZ
1923 return ret;
1924}
1925
1926/*
1927 * This function appends the vendor specific IE TLV to a buffer.
1928 */
1929int
1930mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1931 u16 vsie_mask, u8 **buffer)
1932{
1933 int id, ret_len = 0;
1934 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1935
1936 if (!buffer)
1937 return 0;
1938 if (!(*buffer))
1939 return 0;
1940
1941 /*
1942 * Traverse through the saved vendor specific IE array and append
1943 * the selected(scan/assoc/adhoc) IE as TLV to the command
1944 */
1945 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1946 if (priv->vs_ie[id].mask & vsie_mask) {
1947 vs_param_set =
1948 (struct mwifiex_ie_types_vendor_param_set *)
1949 *buffer;
1950 vs_param_set->header.type =
1951 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1952 vs_param_set->header.len =
1953 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1954 & 0x00FF) + 2);
1955 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1956 le16_to_cpu(vs_param_set->header.len));
1957 *buffer += le16_to_cpu(vs_param_set->header.len) +
1958 sizeof(struct mwifiex_ie_types_header);
1959 ret_len += le16_to_cpu(vs_param_set->header.len) +
1960 sizeof(struct mwifiex_ie_types_header);
1961 }
1962 }
1963 return ret_len;
1964}
1965
1966/*
1967 * This function saves a beacon buffer of the current BSS descriptor.
1968 *
1969 * The current beacon buffer is saved so that it can be restored in the
1970 * following cases that makes the beacon buffer not to contain the current
1971 * ssid's beacon buffer.
1972 * - The current ssid was not found somehow in the last scan.
1973 * - The current ssid was the last entry of the scan table and overloaded.
1974 */
1975void
1976mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1977{
1978 struct mwifiex_bssdescriptor *curr_bss =
1979 &priv->curr_bss_params.bss_descriptor;
1980
030fe797
AK
1981 if (!curr_bss->beacon_buf_size)
1982 return;
5e6e3a92 1983
030fe797
AK
1984 /* allocate beacon buffer at 1st time; or if it's size has changed */
1985 if (!priv->curr_bcn_buf ||
cff23cec 1986 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
5e6e3a92 1987 priv->curr_bcn_size = curr_bss->beacon_buf_size;
5e6e3a92 1988
030fe797 1989 kfree(priv->curr_bcn_buf);
5982b47a 1990 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
cff23cec 1991 GFP_ATOMIC);
5e6e3a92
BZ
1992 if (!priv->curr_bcn_buf) {
1993 dev_err(priv->adapter->dev,
cff23cec 1994 "failed to alloc curr_bcn_buf\n");
030fe797 1995 return;
5e6e3a92
BZ
1996 }
1997 }
030fe797
AK
1998
1999 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
cff23cec 2000 curr_bss->beacon_buf_size);
030fe797
AK
2001 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
2002 priv->curr_bcn_size);
7c6fa2a8
AK
2003
2004 curr_bss->beacon_buf = priv->curr_bcn_buf;
2005
2006 /* adjust the pointers in the current BSS descriptor */
2007 if (curr_bss->bcn_wpa_ie)
2008 curr_bss->bcn_wpa_ie =
2009 (struct ieee_types_vendor_specific *)
2010 (curr_bss->beacon_buf +
2011 curr_bss->wpa_offset);
2012
2013 if (curr_bss->bcn_rsn_ie)
2014 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2015 (curr_bss->beacon_buf +
2016 curr_bss->rsn_offset);
2017
2018 if (curr_bss->bcn_ht_cap)
2019 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2020 (curr_bss->beacon_buf +
2021 curr_bss->ht_cap_offset);
2022
074d46d1
JB
2023 if (curr_bss->bcn_ht_oper)
2024 curr_bss->bcn_ht_oper = (struct ieee80211_ht_operation *)
7c6fa2a8
AK
2025 (curr_bss->beacon_buf +
2026 curr_bss->ht_info_offset);
2027
2028 if (curr_bss->bcn_bss_co_2040)
2029 curr_bss->bcn_bss_co_2040 =
2c208890 2030 (curr_bss->beacon_buf + curr_bss->bss_co_2040_offset);
7c6fa2a8
AK
2031
2032 if (curr_bss->bcn_ext_cap)
2c208890
JP
2033 curr_bss->bcn_ext_cap = curr_bss->beacon_buf +
2034 curr_bss->ext_cap_offset;
5e6e3a92
BZ
2035}
2036
2037/*
2038 * This function frees the current BSS descriptor beacon buffer.
2039 */
2040void
2041mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2042{
2043 kfree(priv->curr_bcn_buf);
2044 priv->curr_bcn_buf = NULL;
2045}
This page took 0.274693 seconds and 5 git commands to generate.