mwifiex: remove unnecessary free_priv handler
[linux-2.6-block.git] / drivers / net / wireless / mwifiex / scan.c
CommitLineData
5e6e3a92
BZ
1/*
2 * Marvell Wireless LAN device driver: scan ioctl and command handling
3 *
4 * Copyright (C) 2011, Marvell International Ltd.
5 *
6 * This software file (the "File") is distributed by Marvell International
7 * Ltd. under the terms of the GNU General Public License Version 2, June 1991
8 * (the "License"). You may use, redistribute and/or modify this File in
9 * accordance with the terms and conditions of the License, a copy of which
10 * is available by writing to the Free Software Foundation, Inc.,
11 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
12 * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
13 *
14 * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
16 * ARE EXPRESSLY DISCLAIMED. The License provides additional details about
17 * this warranty disclaimer.
18 */
19
20#include "decl.h"
21#include "ioctl.h"
22#include "util.h"
23#include "fw.h"
24#include "main.h"
25#include "11n.h"
26#include "cfg80211.h"
27
28/* The maximum number of channels the firmware can scan per command */
29#define MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN 14
30
31#define MWIFIEX_CHANNELS_PER_SCAN_CMD 4
32
33/* Memory needed to store a max sized Channel List TLV for a firmware scan */
34#define CHAN_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_header) \
35 + (MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN \
36 *sizeof(struct mwifiex_chan_scan_param_set)))
37
38/* Memory needed to store supported rate */
39#define RATE_TLV_MAX_SIZE (sizeof(struct mwifiex_ie_types_rates_param_set) \
40 + HOSTCMD_SUPPORTED_RATES)
41
42/* Memory needed to store a max number/size WildCard SSID TLV for a firmware
43 scan */
44#define WILDCARD_SSID_TLV_MAX_SIZE \
45 (MWIFIEX_MAX_SSID_LIST_LENGTH * \
46 (sizeof(struct mwifiex_ie_types_wildcard_ssid_params) \
47 + IEEE80211_MAX_SSID_LEN))
48
49/* Maximum memory needed for a mwifiex_scan_cmd_config with all TLVs at max */
50#define MAX_SCAN_CFG_ALLOC (sizeof(struct mwifiex_scan_cmd_config) \
51 + sizeof(struct mwifiex_ie_types_num_probes) \
52 + sizeof(struct mwifiex_ie_types_htcap) \
53 + CHAN_TLV_MAX_SIZE \
54 + RATE_TLV_MAX_SIZE \
55 + WILDCARD_SSID_TLV_MAX_SIZE)
56
57
58union mwifiex_scan_cmd_config_tlv {
59 /* Scan configuration (variable length) */
60 struct mwifiex_scan_cmd_config config;
61 /* Max allocated block */
62 u8 config_alloc_buf[MAX_SCAN_CFG_ALLOC];
63};
64
65enum cipher_suite {
66 CIPHER_SUITE_TKIP,
67 CIPHER_SUITE_CCMP,
68 CIPHER_SUITE_MAX
69};
70static u8 mwifiex_wpa_oui[CIPHER_SUITE_MAX][4] = {
71 { 0x00, 0x50, 0xf2, 0x02 }, /* TKIP */
72 { 0x00, 0x50, 0xf2, 0x04 }, /* AES */
73};
74static u8 mwifiex_rsn_oui[CIPHER_SUITE_MAX][4] = {
75 { 0x00, 0x0f, 0xac, 0x02 }, /* TKIP */
76 { 0x00, 0x0f, 0xac, 0x04 }, /* AES */
77};
78
79/*
80 * This function parses a given IE for a given OUI.
81 *
82 * This is used to parse a WPA/RSN IE to find if it has
83 * a given oui in PTK.
84 */
85static u8
86mwifiex_search_oui_in_ie(struct ie_body *iebody, u8 *oui)
87{
88 u8 count;
89
90 count = iebody->ptk_cnt[0];
91
92 /* There could be multiple OUIs for PTK hence
93 1) Take the length.
94 2) Check all the OUIs for AES.
95 3) If one of them is AES then pass success. */
96 while (count) {
97 if (!memcmp(iebody->ptk_body, oui, sizeof(iebody->ptk_body)))
98 return MWIFIEX_OUI_PRESENT;
99
100 --count;
101 if (count)
102 iebody = (struct ie_body *) ((u8 *) iebody +
103 sizeof(iebody->ptk_body));
104 }
105
106 pr_debug("info: %s: OUI is not found in PTK\n", __func__);
107 return MWIFIEX_OUI_NOT_PRESENT;
108}
109
110/*
111 * This function checks if a given OUI is present in a RSN IE.
112 *
113 * The function first checks if a RSN IE is present or not in the
114 * BSS descriptor. It tries to locate the OUI only if such an IE is
115 * present.
116 */
117static u8
118mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
119{
270e58e8
YAP
120 u8 *oui;
121 struct ie_body *iebody;
5e6e3a92
BZ
122 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
123
124 if (((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).
125 ieee_hdr.element_id == WLAN_EID_RSN))) {
126 iebody = (struct ie_body *)
127 (((u8 *) bss_desc->bcn_rsn_ie->data) +
128 RSN_GTK_OUI_OFFSET);
129 oui = &mwifiex_rsn_oui[cipher][0];
130 ret = mwifiex_search_oui_in_ie(iebody, oui);
131 if (ret)
132 return ret;
133 }
134 return ret;
135}
136
137/*
138 * This function checks if a given OUI is present in a WPA IE.
139 *
140 * The function first checks if a WPA IE is present or not in the
141 * BSS descriptor. It tries to locate the OUI only if such an IE is
142 * present.
143 */
144static u8
145mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher)
146{
270e58e8
YAP
147 u8 *oui;
148 struct ie_body *iebody;
5e6e3a92
BZ
149 u8 ret = MWIFIEX_OUI_NOT_PRESENT;
150
151 if (((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).
152 vend_hdr.element_id == WLAN_EID_WPA))) {
153 iebody = (struct ie_body *) bss_desc->bcn_wpa_ie->data;
154 oui = &mwifiex_wpa_oui[cipher][0];
155 ret = mwifiex_search_oui_in_ie(iebody, oui);
156 if (ret)
157 return ret;
158 }
159 return ret;
160}
161
162/*
163 * This function compares two SSIDs and checks if they match.
164 */
165s32
166mwifiex_ssid_cmp(struct mwifiex_802_11_ssid *ssid1,
167 struct mwifiex_802_11_ssid *ssid2)
168{
169 if (!ssid1 || !ssid2 || (ssid1->ssid_len != ssid2->ssid_len))
170 return -1;
171 return memcmp(ssid1->ssid, ssid2->ssid, ssid1->ssid_len);
172}
173
5e6e3a92
BZ
174/*
175 * This function checks if wapi is enabled in driver and scanned network is
176 * compatible with it.
177 */
178static bool
179mwifiex_is_network_compatible_for_wapi(struct mwifiex_private *priv,
180 struct mwifiex_bssdescriptor *bss_desc)
181{
182 if (priv->sec_info.wapi_enabled &&
183 (bss_desc->bcn_wapi_ie &&
184 ((*(bss_desc->bcn_wapi_ie)).ieee_hdr.element_id ==
185 WLAN_EID_BSS_AC_ACCESS_DELAY))) {
186 return true;
187 }
188 return false;
189}
190
191/*
192 * This function checks if driver is configured with no security mode and
193 * scanned network is compatible with it.
194 */
195static bool
196mwifiex_is_network_compatible_for_no_sec(struct mwifiex_private *priv,
197 struct mwifiex_bssdescriptor *bss_desc)
198{
199 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
200 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
201 && ((!bss_desc->bcn_wpa_ie) ||
202 ((*(bss_desc->bcn_wpa_ie)).vend_hdr.element_id !=
203 WLAN_EID_WPA))
204 && ((!bss_desc->bcn_rsn_ie) ||
205 ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.element_id !=
206 WLAN_EID_RSN))
2be50b8d
YAP
207 && !priv->sec_info.encryption_mode
208 && !bss_desc->privacy) {
5e6e3a92
BZ
209 return true;
210 }
211 return false;
212}
213
214/*
215 * This function checks if static WEP is enabled in driver and scanned network
216 * is compatible with it.
217 */
218static bool
219mwifiex_is_network_compatible_for_static_wep(struct mwifiex_private *priv,
220 struct mwifiex_bssdescriptor *bss_desc)
221{
222 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_ENABLED
223 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
224 && bss_desc->privacy) {
225 return true;
226 }
227 return false;
228}
229
230/*
231 * This function checks if wpa is enabled in driver and scanned network is
232 * compatible with it.
233 */
234static bool
235mwifiex_is_network_compatible_for_wpa(struct mwifiex_private *priv,
7c6fa2a8 236 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92
BZ
237{
238 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
239 && priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
240 && ((bss_desc->bcn_wpa_ie) && ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
241 element_id == WLAN_EID_WPA))
242 /*
243 * Privacy bit may NOT be set in some APs like
244 * LinkSys WRT54G && bss_desc->privacy
245 */
246 ) {
7c6fa2a8 247 dev_dbg(priv->adapter->dev, "info: %s: WPA:"
5e6e3a92 248 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
7c6fa2a8 249 "EncMode=%#x privacy=%#x\n", __func__,
5e6e3a92
BZ
250 (bss_desc->bcn_wpa_ie) ?
251 (*(bss_desc->bcn_wpa_ie)).
252 vend_hdr.element_id : 0,
253 (bss_desc->bcn_rsn_ie) ?
254 (*(bss_desc->bcn_rsn_ie)).
255 ieee_hdr.element_id : 0,
256 (priv->sec_info.wep_status ==
257 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
258 (priv->sec_info.wpa_enabled) ? "e" : "d",
259 (priv->sec_info.wpa2_enabled) ? "e" : "d",
260 priv->sec_info.encryption_mode,
261 bss_desc->privacy);
262 return true;
263 }
264 return false;
265}
266
267/*
268 * This function checks if wpa2 is enabled in driver and scanned network is
269 * compatible with it.
270 */
271static bool
272mwifiex_is_network_compatible_for_wpa2(struct mwifiex_private *priv,
7c6fa2a8 273 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92
BZ
274{
275 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
276 && !priv->sec_info.wpa_enabled && priv->sec_info.wpa2_enabled
277 && ((bss_desc->bcn_rsn_ie) && ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
278 element_id == WLAN_EID_RSN))
279 /*
280 * Privacy bit may NOT be set in some APs like
281 * LinkSys WRT54G && bss_desc->privacy
282 */
283 ) {
7c6fa2a8 284 dev_dbg(priv->adapter->dev, "info: %s: WPA2: "
5e6e3a92 285 " wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s "
7c6fa2a8 286 "EncMode=%#x privacy=%#x\n", __func__,
5e6e3a92
BZ
287 (bss_desc->bcn_wpa_ie) ?
288 (*(bss_desc->bcn_wpa_ie)).
289 vend_hdr.element_id : 0,
290 (bss_desc->bcn_rsn_ie) ?
291 (*(bss_desc->bcn_rsn_ie)).
292 ieee_hdr.element_id : 0,
293 (priv->sec_info.wep_status ==
294 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
295 (priv->sec_info.wpa_enabled) ? "e" : "d",
296 (priv->sec_info.wpa2_enabled) ? "e" : "d",
297 priv->sec_info.encryption_mode,
298 bss_desc->privacy);
299 return true;
300 }
301 return false;
302}
303
304/*
305 * This function checks if adhoc AES is enabled in driver and scanned network is
306 * compatible with it.
307 */
308static bool
309mwifiex_is_network_compatible_for_adhoc_aes(struct mwifiex_private *priv,
310 struct mwifiex_bssdescriptor *bss_desc)
311{
312 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
313 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
314 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
315 element_id != WLAN_EID_WPA))
316 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
317 element_id != WLAN_EID_RSN))
2be50b8d
YAP
318 && !priv->sec_info.encryption_mode
319 && bss_desc->privacy) {
5e6e3a92
BZ
320 return true;
321 }
322 return false;
323}
324
325/*
326 * This function checks if dynamic WEP is enabled in driver and scanned network
327 * is compatible with it.
328 */
329static bool
330mwifiex_is_network_compatible_for_dynamic_wep(struct mwifiex_private *priv,
7c6fa2a8 331 struct mwifiex_bssdescriptor *bss_desc)
5e6e3a92
BZ
332{
333 if (priv->sec_info.wep_status == MWIFIEX_802_11_WEP_DISABLED
334 && !priv->sec_info.wpa_enabled && !priv->sec_info.wpa2_enabled
335 && ((!bss_desc->bcn_wpa_ie) || ((*(bss_desc->bcn_wpa_ie)).vend_hdr.
336 element_id != WLAN_EID_WPA))
337 && ((!bss_desc->bcn_rsn_ie) || ((*(bss_desc->bcn_rsn_ie)).ieee_hdr.
338 element_id != WLAN_EID_RSN))
2be50b8d
YAP
339 && priv->sec_info.encryption_mode
340 && bss_desc->privacy) {
5e6e3a92 341 dev_dbg(priv->adapter->dev, "info: %s: dynamic "
7c6fa2a8 342 "WEP: wpa_ie=%#x wpa2_ie=%#x "
5e6e3a92 343 "EncMode=%#x privacy=%#x\n",
7c6fa2a8 344 __func__,
5e6e3a92
BZ
345 (bss_desc->bcn_wpa_ie) ?
346 (*(bss_desc->bcn_wpa_ie)).
347 vend_hdr.element_id : 0,
348 (bss_desc->bcn_rsn_ie) ?
349 (*(bss_desc->bcn_rsn_ie)).
350 ieee_hdr.element_id : 0,
351 priv->sec_info.encryption_mode,
352 bss_desc->privacy);
353 return true;
354 }
355 return false;
356}
357
358/*
359 * This function checks if a scanned network is compatible with the driver
360 * settings.
361 *
362 * WEP WPA WPA2 ad-hoc encrypt Network
363 * enabled enabled enabled AES mode Privacy WPA WPA2 Compatible
364 * 0 0 0 0 NONE 0 0 0 yes No security
365 * 0 1 0 0 x 1x 1 x yes WPA (disable
366 * HT if no AES)
367 * 0 0 1 0 x 1x x 1 yes WPA2 (disable
368 * HT if no AES)
369 * 0 0 0 1 NONE 1 0 0 yes Ad-hoc AES
370 * 1 0 0 0 NONE 1 0 0 yes Static WEP
371 * (disable HT)
372 * 0 0 0 0 !=NONE 1 0 0 yes Dynamic WEP
373 *
374 * Compatibility is not matched while roaming, except for mode.
375 */
376static s32
7c6fa2a8
AK
377mwifiex_is_network_compatible(struct mwifiex_private *priv,
378 struct mwifiex_bssdescriptor *bss_desc, u32 mode)
5e6e3a92
BZ
379{
380 struct mwifiex_adapter *adapter = priv->adapter;
5e6e3a92 381
5e6e3a92
BZ
382 bss_desc->disable_11n = false;
383
384 /* Don't check for compatibility if roaming */
eecd8250
BZ
385 if (priv->media_connected && (priv->bss_mode == NL80211_IFTYPE_STATION)
386 && (bss_desc->bss_mode == NL80211_IFTYPE_STATION))
7c6fa2a8 387 return 0;
5e6e3a92
BZ
388
389 if (priv->wps.session_enable) {
390 dev_dbg(adapter->dev,
391 "info: return success directly in WPS period\n");
7c6fa2a8 392 return 0;
5e6e3a92
BZ
393 }
394
395 if (mwifiex_is_network_compatible_for_wapi(priv, bss_desc)) {
396 dev_dbg(adapter->dev, "info: return success for WAPI AP\n");
7c6fa2a8 397 return 0;
5e6e3a92
BZ
398 }
399
400 if (bss_desc->bss_mode == mode) {
401 if (mwifiex_is_network_compatible_for_no_sec(priv, bss_desc)) {
402 /* No security */
7c6fa2a8 403 return 0;
5e6e3a92
BZ
404 } else if (mwifiex_is_network_compatible_for_static_wep(priv,
405 bss_desc)) {
406 /* Static WEP enabled */
407 dev_dbg(adapter->dev, "info: Disable 11n in WEP mode.\n");
408 bss_desc->disable_11n = true;
7c6fa2a8
AK
409 return 0;
410 } else if (mwifiex_is_network_compatible_for_wpa(priv,
411 bss_desc)) {
5e6e3a92
BZ
412 /* WPA enabled */
413 if (((priv->adapter->config_bands & BAND_GN
414 || priv->adapter->config_bands & BAND_AN)
415 && bss_desc->bcn_ht_cap)
416 && !mwifiex_is_wpa_oui_present(bss_desc,
417 CIPHER_SUITE_CCMP)) {
418
419 if (mwifiex_is_wpa_oui_present(bss_desc,
420 CIPHER_SUITE_TKIP)) {
421 dev_dbg(adapter->dev,
422 "info: Disable 11n if AES "
423 "is not supported by AP\n");
424 bss_desc->disable_11n = true;
425 } else {
426 return -1;
427 }
428 }
7c6fa2a8 429 return 0;
5e6e3a92 430 } else if (mwifiex_is_network_compatible_for_wpa2(priv,
7c6fa2a8 431 bss_desc)) {
5e6e3a92
BZ
432 /* WPA2 enabled */
433 if (((priv->adapter->config_bands & BAND_GN
434 || priv->adapter->config_bands & BAND_AN)
435 && bss_desc->bcn_ht_cap)
436 && !mwifiex_is_rsn_oui_present(bss_desc,
437 CIPHER_SUITE_CCMP)) {
438
439 if (mwifiex_is_rsn_oui_present(bss_desc,
440 CIPHER_SUITE_TKIP)) {
441 dev_dbg(adapter->dev,
442 "info: Disable 11n if AES "
443 "is not supported by AP\n");
444 bss_desc->disable_11n = true;
445 } else {
446 return -1;
447 }
448 }
7c6fa2a8 449 return 0;
5e6e3a92
BZ
450 } else if (mwifiex_is_network_compatible_for_adhoc_aes(priv,
451 bss_desc)) {
452 /* Ad-hoc AES enabled */
7c6fa2a8 453 return 0;
5e6e3a92 454 } else if (mwifiex_is_network_compatible_for_dynamic_wep(priv,
7c6fa2a8 455 bss_desc)) {
5e6e3a92 456 /* Dynamic WEP enabled */
7c6fa2a8 457 return 0;
5e6e3a92
BZ
458 }
459
460 /* Security doesn't match */
7c6fa2a8 461 dev_dbg(adapter->dev, "info: %s: failed: "
5e6e3a92
BZ
462 "wpa_ie=%#x wpa2_ie=%#x WEP=%s WPA=%s WPA2=%s EncMode"
463 "=%#x privacy=%#x\n",
7c6fa2a8 464 __func__,
5e6e3a92
BZ
465 (bss_desc->bcn_wpa_ie) ?
466 (*(bss_desc->bcn_wpa_ie)).vend_hdr.
467 element_id : 0,
468 (bss_desc->bcn_rsn_ie) ?
469 (*(bss_desc->bcn_rsn_ie)).ieee_hdr.
470 element_id : 0,
471 (priv->sec_info.wep_status ==
472 MWIFIEX_802_11_WEP_ENABLED) ? "e" : "d",
473 (priv->sec_info.wpa_enabled) ? "e" : "d",
474 (priv->sec_info.wpa2_enabled) ? "e" : "d",
475 priv->sec_info.encryption_mode, bss_desc->privacy);
476 return -1;
477 }
478
479 /* Mode doesn't match */
480 return -1;
481}
482
5e6e3a92
BZ
483/*
484 * This function creates a channel list for the driver to scan, based
485 * on region/band information.
486 *
487 * This routine is used for any scan that is not provided with a
488 * specific channel list to scan.
489 */
490static void
491mwifiex_scan_create_channel_list(struct mwifiex_private *priv,
492 const struct mwifiex_user_scan_cfg
493 *user_scan_in,
494 struct mwifiex_chan_scan_param_set
495 *scan_chan_list,
496 u8 filtered_scan)
497{
498 enum ieee80211_band band;
499 struct ieee80211_supported_band *sband;
500 struct ieee80211_channel *ch;
501 struct mwifiex_adapter *adapter = priv->adapter;
502 int chan_idx = 0, i;
503 u8 scan_type;
504
505 for (band = 0; (band < IEEE80211_NUM_BANDS) ; band++) {
506
507 if (!priv->wdev->wiphy->bands[band])
508 continue;
509
510 sband = priv->wdev->wiphy->bands[band];
511
d06b7b9e 512 for (i = 0; (i < sband->n_channels) ; i++) {
5e6e3a92
BZ
513 ch = &sband->channels[i];
514 if (ch->flags & IEEE80211_CHAN_DISABLED)
515 continue;
516 scan_chan_list[chan_idx].radio_type = band;
517 scan_type = ch->flags & IEEE80211_CHAN_PASSIVE_SCAN;
518 if (user_scan_in &&
519 user_scan_in->chan_list[0].scan_time)
520 scan_chan_list[chan_idx].max_scan_time =
521 cpu_to_le16((u16) user_scan_in->
522 chan_list[0].scan_time);
523 else if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
524 scan_chan_list[chan_idx].max_scan_time =
525 cpu_to_le16(adapter->passive_scan_time);
526 else
527 scan_chan_list[chan_idx].max_scan_time =
528 cpu_to_le16(adapter->active_scan_time);
529 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
530 scan_chan_list[chan_idx].chan_scan_mode_bitmap
531 |= MWIFIEX_PASSIVE_SCAN;
532 else
533 scan_chan_list[chan_idx].chan_scan_mode_bitmap
534 &= ~MWIFIEX_PASSIVE_SCAN;
535 scan_chan_list[chan_idx].chan_number =
536 (u32) ch->hw_value;
537 if (filtered_scan) {
538 scan_chan_list[chan_idx].max_scan_time =
539 cpu_to_le16(adapter->specific_scan_time);
540 scan_chan_list[chan_idx].chan_scan_mode_bitmap
541 |= MWIFIEX_DISABLE_CHAN_FILT;
542 }
d06b7b9e 543 chan_idx++;
5e6e3a92
BZ
544 }
545
546 }
547}
548
549/*
550 * This function constructs and sends multiple scan config commands to
551 * the firmware.
552 *
553 * Previous routines in the code flow have created a scan command configuration
554 * with any requested TLVs. This function splits the channel TLV into maximum
555 * channels supported per scan lists and sends the portion of the channel TLV,
556 * along with the other TLVs, to the firmware.
557 */
558static int
600f5d90 559mwifiex_scan_channel_list(struct mwifiex_private *priv,
5e6e3a92
BZ
560 u32 max_chan_per_scan, u8 filtered_scan,
561 struct mwifiex_scan_cmd_config *scan_cfg_out,
562 struct mwifiex_ie_types_chan_list_param_set
563 *chan_tlv_out,
564 struct mwifiex_chan_scan_param_set *scan_chan_list)
565{
566 int ret = 0;
567 struct mwifiex_chan_scan_param_set *tmp_chan_list;
568 struct mwifiex_chan_scan_param_set *start_chan;
569
570 u32 tlv_idx;
571 u32 total_scan_time;
572 u32 done_early;
573
574 if (!scan_cfg_out || !chan_tlv_out || !scan_chan_list) {
575 dev_dbg(priv->adapter->dev,
576 "info: Scan: Null detect: %p, %p, %p\n",
577 scan_cfg_out, chan_tlv_out, scan_chan_list);
578 return -1;
579 }
580
581 chan_tlv_out->header.type = cpu_to_le16(TLV_TYPE_CHANLIST);
582
583 /* Set the temp channel struct pointer to the start of the desired
584 list */
585 tmp_chan_list = scan_chan_list;
586
587 /* Loop through the desired channel list, sending a new firmware scan
588 commands for each max_chan_per_scan channels (or for 1,6,11
589 individually if configured accordingly) */
590 while (tmp_chan_list->chan_number) {
591
592 tlv_idx = 0;
593 total_scan_time = 0;
594 chan_tlv_out->header.len = 0;
595 start_chan = tmp_chan_list;
596 done_early = false;
597
598 /*
599 * Construct the Channel TLV for the scan command. Continue to
600 * insert channel TLVs until:
601 * - the tlv_idx hits the maximum configured per scan command
602 * - the next channel to insert is 0 (end of desired channel
603 * list)
604 * - done_early is set (controlling individual scanning of
605 * 1,6,11)
606 */
607 while (tlv_idx < max_chan_per_scan
608 && tmp_chan_list->chan_number && !done_early) {
609
610 dev_dbg(priv->adapter->dev,
611 "info: Scan: Chan(%3d), Radio(%d),"
612 " Mode(%d, %d), Dur(%d)\n",
613 tmp_chan_list->chan_number,
614 tmp_chan_list->radio_type,
615 tmp_chan_list->chan_scan_mode_bitmap
616 & MWIFIEX_PASSIVE_SCAN,
617 (tmp_chan_list->chan_scan_mode_bitmap
618 & MWIFIEX_DISABLE_CHAN_FILT) >> 1,
619 le16_to_cpu(tmp_chan_list->max_scan_time));
620
621 /* Copy the current channel TLV to the command being
622 prepared */
623 memcpy(chan_tlv_out->chan_scan_param + tlv_idx,
624 tmp_chan_list,
625 sizeof(chan_tlv_out->chan_scan_param));
626
627 /* Increment the TLV header length by the size
628 appended */
629 chan_tlv_out->header.len =
630 cpu_to_le16(le16_to_cpu(chan_tlv_out->header.len) +
631 (sizeof(chan_tlv_out->chan_scan_param)));
632
633 /*
634 * The tlv buffer length is set to the number of bytes
635 * of the between the channel tlv pointer and the start
636 * of the tlv buffer. This compensates for any TLVs
637 * that were appended before the channel list.
638 */
639 scan_cfg_out->tlv_buf_len = (u32) ((u8 *) chan_tlv_out -
640 scan_cfg_out->tlv_buf);
641
642 /* Add the size of the channel tlv header and the data
643 length */
644 scan_cfg_out->tlv_buf_len +=
645 (sizeof(chan_tlv_out->header)
646 + le16_to_cpu(chan_tlv_out->header.len));
647
648 /* Increment the index to the channel tlv we are
649 constructing */
650 tlv_idx++;
651
652 /* Count the total scan time per command */
653 total_scan_time +=
654 le16_to_cpu(tmp_chan_list->max_scan_time);
655
656 done_early = false;
657
658 /* Stop the loop if the *current* channel is in the
659 1,6,11 set and we are not filtering on a BSSID
660 or SSID. */
661 if (!filtered_scan && (tmp_chan_list->chan_number == 1
662 || tmp_chan_list->chan_number == 6
663 || tmp_chan_list->chan_number == 11))
664 done_early = true;
665
666 /* Increment the tmp pointer to the next channel to
667 be scanned */
668 tmp_chan_list++;
669
670 /* Stop the loop if the *next* channel is in the 1,6,11
671 set. This will cause it to be the only channel
672 scanned on the next interation */
673 if (!filtered_scan && (tmp_chan_list->chan_number == 1
674 || tmp_chan_list->chan_number == 6
675 || tmp_chan_list->chan_number == 11))
676 done_early = true;
677 }
678
679 /* The total scan time should be less than scan command timeout
680 value */
681 if (total_scan_time > MWIFIEX_MAX_TOTAL_SCAN_TIME) {
682 dev_err(priv->adapter->dev, "total scan time %dms"
683 " is over limit (%dms), scan skipped\n",
684 total_scan_time, MWIFIEX_MAX_TOTAL_SCAN_TIME);
685 ret = -1;
686 break;
687 }
688
689 priv->adapter->scan_channels = start_chan;
690
691 /* Send the scan command to the firmware with the specified
692 cfg */
600f5d90
AK
693 ret = mwifiex_send_cmd_async(priv, HostCmd_CMD_802_11_SCAN,
694 HostCmd_ACT_GEN_SET, 0,
695 scan_cfg_out);
5e6e3a92
BZ
696 if (ret)
697 break;
698 }
699
700 if (ret)
701 return -1;
702
703 return 0;
704}
705
706/*
707 * This function constructs a scan command configuration structure to use
708 * in scan commands.
709 *
710 * Application layer or other functions can invoke network scanning
711 * with a scan configuration supplied in a user scan configuration structure.
712 * This structure is used as the basis of one or many scan command configuration
713 * commands that are sent to the command processing module and eventually to the
714 * firmware.
715 *
716 * This function creates a scan command configuration structure based on the
717 * following user supplied parameters (if present):
718 * - SSID filter
719 * - BSSID filter
720 * - Number of Probes to be sent
721 * - Channel list
722 *
723 * If the SSID or BSSID filter is not present, the filter is disabled/cleared.
724 * If the number of probes is not set, adapter default setting is used.
725 */
726static void
727mwifiex_scan_setup_scan_config(struct mwifiex_private *priv,
728 const struct mwifiex_user_scan_cfg *user_scan_in,
729 struct mwifiex_scan_cmd_config *scan_cfg_out,
730 struct mwifiex_ie_types_chan_list_param_set
731 **chan_list_out,
732 struct mwifiex_chan_scan_param_set
733 *scan_chan_list,
734 u8 *max_chan_per_scan, u8 *filtered_scan,
735 u8 *scan_current_only)
736{
737 struct mwifiex_adapter *adapter = priv->adapter;
738 struct mwifiex_ie_types_num_probes *num_probes_tlv;
739 struct mwifiex_ie_types_wildcard_ssid_params *wildcard_ssid_tlv;
740 struct mwifiex_ie_types_rates_param_set *rates_tlv;
741 const u8 zero_mac[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
742 u8 *tlv_pos;
743 u32 num_probes;
744 u32 ssid_len;
745 u32 chan_idx;
746 u32 scan_type;
747 u16 scan_dur;
748 u8 channel;
749 u8 radio_type;
750 u32 ssid_idx;
751 u8 ssid_filter;
752 u8 rates[MWIFIEX_SUPPORTED_RATES];
753 u32 rates_size;
754 struct mwifiex_ie_types_htcap *ht_cap;
755
756 /* The tlv_buf_len is calculated for each scan command. The TLVs added
757 in this routine will be preserved since the routine that sends the
758 command will append channelTLVs at *chan_list_out. The difference
759 between the *chan_list_out and the tlv_buf start will be used to
760 calculate the size of anything we add in this routine. */
761 scan_cfg_out->tlv_buf_len = 0;
762
763 /* Running tlv pointer. Assigned to chan_list_out at end of function
764 so later routines know where channels can be added to the command
765 buf */
766 tlv_pos = scan_cfg_out->tlv_buf;
767
768 /* Initialize the scan as un-filtered; the flag is later set to TRUE
769 below if a SSID or BSSID filter is sent in the command */
770 *filtered_scan = false;
771
772 /* Initialize the scan as not being only on the current channel. If
773 the channel list is customized, only contains one channel, and is
774 the active channel, this is set true and data flow is not halted. */
775 *scan_current_only = false;
776
777 if (user_scan_in) {
778
779 /* Default the ssid_filter flag to TRUE, set false under
780 certain wildcard conditions and qualified by the existence
781 of an SSID list before marking the scan as filtered */
782 ssid_filter = true;
783
784 /* Set the BSS type scan filter, use Adapter setting if
785 unset */
786 scan_cfg_out->bss_mode =
787 (user_scan_in->bss_mode ? (u8) user_scan_in->
788 bss_mode : (u8) adapter->scan_mode);
789
790 /* Set the number of probes to send, use Adapter setting
791 if unset */
792 num_probes =
793 (user_scan_in->num_probes ? user_scan_in->
794 num_probes : adapter->scan_probes);
795
796 /*
797 * Set the BSSID filter to the incoming configuration,
798 * if non-zero. If not set, it will remain disabled
799 * (all zeros).
800 */
801 memcpy(scan_cfg_out->specific_bssid,
802 user_scan_in->specific_bssid,
803 sizeof(scan_cfg_out->specific_bssid));
804
805 for (ssid_idx = 0;
806 ((ssid_idx < ARRAY_SIZE(user_scan_in->ssid_list))
807 && (*user_scan_in->ssid_list[ssid_idx].ssid
808 || user_scan_in->ssid_list[ssid_idx].max_len));
809 ssid_idx++) {
810
811 ssid_len = strlen(user_scan_in->ssid_list[ssid_idx].
812 ssid) + 1;
813
814 wildcard_ssid_tlv =
815 (struct mwifiex_ie_types_wildcard_ssid_params *)
816 tlv_pos;
817 wildcard_ssid_tlv->header.type =
818 cpu_to_le16(TLV_TYPE_WILDCARDSSID);
819 wildcard_ssid_tlv->header.len = cpu_to_le16(
820 (u16) (ssid_len + sizeof(wildcard_ssid_tlv->
821 max_ssid_length)));
822 wildcard_ssid_tlv->max_ssid_length =
823 user_scan_in->ssid_list[ssid_idx].max_len;
824
825 memcpy(wildcard_ssid_tlv->ssid,
826 user_scan_in->ssid_list[ssid_idx].ssid,
827 ssid_len);
828
829 tlv_pos += (sizeof(wildcard_ssid_tlv->header)
830 + le16_to_cpu(wildcard_ssid_tlv->header.len));
831
832 dev_dbg(adapter->dev, "info: scan: ssid_list[%d]: %s, %d\n",
833 ssid_idx, wildcard_ssid_tlv->ssid,
834 wildcard_ssid_tlv->max_ssid_length);
835
836 /* Empty wildcard ssid with a maxlen will match many or
837 potentially all SSIDs (maxlen == 32), therefore do
838 not treat the scan as
839 filtered. */
840 if (!ssid_len && wildcard_ssid_tlv->max_ssid_length)
841 ssid_filter = false;
842
843 }
844
845 /*
846 * The default number of channels sent in the command is low to
847 * ensure the response buffer from the firmware does not
848 * truncate scan results. That is not an issue with an SSID
849 * or BSSID filter applied to the scan results in the firmware.
850 */
851 if ((ssid_idx && ssid_filter)
852 || memcmp(scan_cfg_out->specific_bssid, &zero_mac,
853 sizeof(zero_mac)))
854 *filtered_scan = true;
855 } else {
856 scan_cfg_out->bss_mode = (u8) adapter->scan_mode;
857 num_probes = adapter->scan_probes;
858 }
859
860 /*
861 * If a specific BSSID or SSID is used, the number of channels in the
862 * scan command will be increased to the absolute maximum.
863 */
864 if (*filtered_scan)
865 *max_chan_per_scan = MWIFIEX_MAX_CHANNELS_PER_SPECIFIC_SCAN;
866 else
867 *max_chan_per_scan = MWIFIEX_CHANNELS_PER_SCAN_CMD;
868
869 /* If the input config or adapter has the number of Probes set,
870 add tlv */
871 if (num_probes) {
872
873 dev_dbg(adapter->dev, "info: scan: num_probes = %d\n",
874 num_probes);
875
876 num_probes_tlv = (struct mwifiex_ie_types_num_probes *) tlv_pos;
877 num_probes_tlv->header.type = cpu_to_le16(TLV_TYPE_NUMPROBES);
878 num_probes_tlv->header.len =
879 cpu_to_le16(sizeof(num_probes_tlv->num_probes));
880 num_probes_tlv->num_probes = cpu_to_le16((u16) num_probes);
881
882 tlv_pos += sizeof(num_probes_tlv->header) +
883 le16_to_cpu(num_probes_tlv->header.len);
884
885 }
886
887 /* Append rates tlv */
888 memset(rates, 0, sizeof(rates));
889
890 rates_size = mwifiex_get_supported_rates(priv, rates);
891
892 rates_tlv = (struct mwifiex_ie_types_rates_param_set *) tlv_pos;
893 rates_tlv->header.type = cpu_to_le16(WLAN_EID_SUPP_RATES);
894 rates_tlv->header.len = cpu_to_le16((u16) rates_size);
895 memcpy(rates_tlv->rates, rates, rates_size);
896 tlv_pos += sizeof(rates_tlv->header) + rates_size;
897
898 dev_dbg(adapter->dev, "info: SCAN_CMD: Rates size = %d\n", rates_size);
899
900 if (ISSUPP_11NENABLED(priv->adapter->fw_cap_info)
901 && (priv->adapter->config_bands & BAND_GN
902 || priv->adapter->config_bands & BAND_AN)) {
903 ht_cap = (struct mwifiex_ie_types_htcap *) tlv_pos;
904 memset(ht_cap, 0, sizeof(struct mwifiex_ie_types_htcap));
905 ht_cap->header.type = cpu_to_le16(WLAN_EID_HT_CAPABILITY);
906 ht_cap->header.len =
907 cpu_to_le16(sizeof(struct ieee80211_ht_cap));
a46b7b5c
AK
908 radio_type =
909 mwifiex_band_to_radio_type(priv->adapter->config_bands);
910 mwifiex_fill_cap_info(priv, radio_type, ht_cap);
5e6e3a92
BZ
911 tlv_pos += sizeof(struct mwifiex_ie_types_htcap);
912 }
913
914 /* Append vendor specific IE TLV */
915 mwifiex_cmd_append_vsie_tlv(priv, MWIFIEX_VSIE_MASK_SCAN, &tlv_pos);
916
917 /*
918 * Set the output for the channel TLV to the address in the tlv buffer
919 * past any TLVs that were added in this function (SSID, num_probes).
920 * Channel TLVs will be added past this for each scan command,
921 * preserving the TLVs that were previously added.
922 */
923 *chan_list_out =
924 (struct mwifiex_ie_types_chan_list_param_set *) tlv_pos;
925
926 if (user_scan_in && user_scan_in->chan_list[0].chan_number) {
927
928 dev_dbg(adapter->dev, "info: Scan: Using supplied channel list\n");
929
930 for (chan_idx = 0;
931 chan_idx < MWIFIEX_USER_SCAN_CHAN_MAX
932 && user_scan_in->chan_list[chan_idx].chan_number;
933 chan_idx++) {
934
935 channel = user_scan_in->chan_list[chan_idx].chan_number;
936 (scan_chan_list + chan_idx)->chan_number = channel;
937
938 radio_type =
939 user_scan_in->chan_list[chan_idx].radio_type;
940 (scan_chan_list + chan_idx)->radio_type = radio_type;
941
942 scan_type = user_scan_in->chan_list[chan_idx].scan_type;
943
944 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
945 (scan_chan_list +
946 chan_idx)->chan_scan_mode_bitmap
947 |= MWIFIEX_PASSIVE_SCAN;
948 else
949 (scan_chan_list +
950 chan_idx)->chan_scan_mode_bitmap
951 &= ~MWIFIEX_PASSIVE_SCAN;
952
953 if (user_scan_in->chan_list[chan_idx].scan_time) {
954 scan_dur = (u16) user_scan_in->
955 chan_list[chan_idx].scan_time;
956 } else {
957 if (scan_type == MWIFIEX_SCAN_TYPE_PASSIVE)
958 scan_dur = adapter->passive_scan_time;
959 else if (*filtered_scan)
960 scan_dur = adapter->specific_scan_time;
961 else
962 scan_dur = adapter->active_scan_time;
963 }
964
965 (scan_chan_list + chan_idx)->min_scan_time =
966 cpu_to_le16(scan_dur);
967 (scan_chan_list + chan_idx)->max_scan_time =
968 cpu_to_le16(scan_dur);
969 }
970
971 /* Check if we are only scanning the current channel */
972 if ((chan_idx == 1)
973 && (user_scan_in->chan_list[0].chan_number
974 == priv->curr_bss_params.bss_descriptor.channel)) {
975 *scan_current_only = true;
976 dev_dbg(adapter->dev,
977 "info: Scan: Scanning current channel only\n");
978 }
979
980 } else {
981 dev_dbg(adapter->dev,
982 "info: Scan: Creating full region channel list\n");
983 mwifiex_scan_create_channel_list(priv, user_scan_in,
984 scan_chan_list,
985 *filtered_scan);
986 }
987}
988
989/*
990 * This function inspects the scan response buffer for pointers to
991 * expected TLVs.
992 *
993 * TLVs can be included at the end of the scan response BSS information.
994 *
995 * Data in the buffer is parsed pointers to TLVs that can potentially
996 * be passed back in the response.
997 */
998static void
999mwifiex_ret_802_11_scan_get_tlv_ptrs(struct mwifiex_adapter *adapter,
1000 struct mwifiex_ie_types_data *tlv,
1001 u32 tlv_buf_size, u32 req_tlv_type,
1002 struct mwifiex_ie_types_data **tlv_data)
1003{
1004 struct mwifiex_ie_types_data *current_tlv;
1005 u32 tlv_buf_left;
1006 u32 tlv_type;
1007 u32 tlv_len;
1008
1009 current_tlv = tlv;
1010 tlv_buf_left = tlv_buf_size;
1011 *tlv_data = NULL;
1012
1013 dev_dbg(adapter->dev, "info: SCAN_RESP: tlv_buf_size = %d\n",
1014 tlv_buf_size);
1015
1016 while (tlv_buf_left >= sizeof(struct mwifiex_ie_types_header)) {
1017
1018 tlv_type = le16_to_cpu(current_tlv->header.type);
1019 tlv_len = le16_to_cpu(current_tlv->header.len);
1020
1021 if (sizeof(tlv->header) + tlv_len > tlv_buf_left) {
1022 dev_err(adapter->dev, "SCAN_RESP: TLV buffer corrupt\n");
1023 break;
1024 }
1025
1026 if (req_tlv_type == tlv_type) {
1027 switch (tlv_type) {
1028 case TLV_TYPE_TSFTIMESTAMP:
1029 dev_dbg(adapter->dev, "info: SCAN_RESP: TSF "
1030 "timestamp TLV, len = %d\n", tlv_len);
1031 *tlv_data = (struct mwifiex_ie_types_data *)
1032 current_tlv;
1033 break;
1034 case TLV_TYPE_CHANNELBANDLIST:
1035 dev_dbg(adapter->dev, "info: SCAN_RESP: channel"
1036 " band list TLV, len = %d\n", tlv_len);
1037 *tlv_data = (struct mwifiex_ie_types_data *)
1038 current_tlv;
1039 break;
1040 default:
1041 dev_err(adapter->dev,
1042 "SCAN_RESP: unhandled TLV = %d\n",
1043 tlv_type);
1044 /* Give up, this seems corrupted */
1045 return;
1046 }
1047 }
1048
1049 if (*tlv_data)
1050 break;
1051
1052
1053 tlv_buf_left -= (sizeof(tlv->header) + tlv_len);
1054 current_tlv =
1055 (struct mwifiex_ie_types_data *) (current_tlv->data +
1056 tlv_len);
1057
1058 } /* while */
1059}
1060
1061/*
7c6fa2a8
AK
1062 * This function parses provided beacon buffer and updates
1063 * respective fields in bss descriptor structure.
5e6e3a92 1064 */
7c6fa2a8
AK
1065int
1066mwifiex_update_bss_desc_with_ie(struct mwifiex_adapter *adapter,
1067 struct mwifiex_bssdescriptor *bss_entry,
1068 u8 *ie_buf, u32 ie_len)
5e6e3a92
BZ
1069{
1070 int ret = 0;
1071 u8 element_id;
1072 struct ieee_types_fh_param_set *fh_param_set;
1073 struct ieee_types_ds_param_set *ds_param_set;
1074 struct ieee_types_cf_param_set *cf_param_set;
1075 struct ieee_types_ibss_param_set *ibss_param_set;
5e6e3a92
BZ
1076 u8 *current_ptr;
1077 u8 *rate;
1078 u8 element_len;
1079 u16 total_ie_len;
1080 u8 bytes_to_copy;
1081 u8 rate_size;
5e6e3a92 1082 u8 found_data_rate_ie;
7c6fa2a8 1083 u32 bytes_left;
5e6e3a92
BZ
1084 struct ieee_types_vendor_specific *vendor_ie;
1085 const u8 wpa_oui[4] = { 0x00, 0x50, 0xf2, 0x01 };
1086 const u8 wmm_oui[4] = { 0x00, 0x50, 0xf2, 0x02 };
1087
1088 found_data_rate_ie = false;
1089 rate_size = 0;
7c6fa2a8
AK
1090 current_ptr = ie_buf;
1091 bytes_left = ie_len;
1092 bss_entry->beacon_buf = ie_buf;
1093 bss_entry->beacon_buf_size = ie_len;
5e6e3a92
BZ
1094
1095 /* Process variable IE */
7c6fa2a8 1096 while (bytes_left >= 2) {
5e6e3a92
BZ
1097 element_id = *current_ptr;
1098 element_len = *(current_ptr + 1);
1099 total_ie_len = element_len + sizeof(struct ieee_types_header);
1100
7c6fa2a8 1101 if (bytes_left < total_ie_len) {
5e6e3a92
BZ
1102 dev_err(adapter->dev, "err: InterpretIE: in processing"
1103 " IE, bytes left < IE length\n");
7c6fa2a8 1104 return -1;
5e6e3a92
BZ
1105 }
1106 switch (element_id) {
1107 case WLAN_EID_SSID:
1108 bss_entry->ssid.ssid_len = element_len;
1109 memcpy(bss_entry->ssid.ssid, (current_ptr + 2),
1110 element_len);
7c6fa2a8
AK
1111 dev_dbg(adapter->dev, "info: InterpretIE: ssid: "
1112 "%-32s\n", bss_entry->ssid.ssid);
5e6e3a92
BZ
1113 break;
1114
1115 case WLAN_EID_SUPP_RATES:
1116 memcpy(bss_entry->data_rates, current_ptr + 2,
1117 element_len);
1118 memcpy(bss_entry->supported_rates, current_ptr + 2,
1119 element_len);
1120 rate_size = element_len;
1121 found_data_rate_ie = true;
1122 break;
1123
1124 case WLAN_EID_FH_PARAMS:
1125 fh_param_set =
1126 (struct ieee_types_fh_param_set *) current_ptr;
1127 memcpy(&bss_entry->phy_param_set.fh_param_set,
1128 fh_param_set,
1129 sizeof(struct ieee_types_fh_param_set));
1130 break;
1131
1132 case WLAN_EID_DS_PARAMS:
1133 ds_param_set =
1134 (struct ieee_types_ds_param_set *) current_ptr;
1135
1136 bss_entry->channel = ds_param_set->current_chan;
1137
1138 memcpy(&bss_entry->phy_param_set.ds_param_set,
1139 ds_param_set,
1140 sizeof(struct ieee_types_ds_param_set));
1141 break;
1142
1143 case WLAN_EID_CF_PARAMS:
1144 cf_param_set =
1145 (struct ieee_types_cf_param_set *) current_ptr;
1146 memcpy(&bss_entry->ss_param_set.cf_param_set,
1147 cf_param_set,
1148 sizeof(struct ieee_types_cf_param_set));
1149 break;
1150
1151 case WLAN_EID_IBSS_PARAMS:
1152 ibss_param_set =
1153 (struct ieee_types_ibss_param_set *)
1154 current_ptr;
1155 memcpy(&bss_entry->ss_param_set.ibss_param_set,
1156 ibss_param_set,
1157 sizeof(struct ieee_types_ibss_param_set));
1158 break;
1159
1160 case WLAN_EID_ERP_INFO:
1161 bss_entry->erp_flags = *(current_ptr + 2);
1162 break;
1163
1164 case WLAN_EID_EXT_SUPP_RATES:
1165 /*
1166 * Only process extended supported rate
1167 * if data rate is already found.
1168 * Data rate IE should come before
1169 * extended supported rate IE
1170 */
1171 if (found_data_rate_ie) {
1172 if ((element_len + rate_size) >
1173 MWIFIEX_SUPPORTED_RATES)
1174 bytes_to_copy =
1175 (MWIFIEX_SUPPORTED_RATES -
1176 rate_size);
1177 else
1178 bytes_to_copy = element_len;
1179
1180 rate = (u8 *) bss_entry->data_rates;
1181 rate += rate_size;
1182 memcpy(rate, current_ptr + 2, bytes_to_copy);
1183
1184 rate = (u8 *) bss_entry->supported_rates;
1185 rate += rate_size;
1186 memcpy(rate, current_ptr + 2, bytes_to_copy);
1187 }
1188 break;
1189
1190 case WLAN_EID_VENDOR_SPECIFIC:
1191 vendor_ie = (struct ieee_types_vendor_specific *)
1192 current_ptr;
1193
1194 if (!memcmp
1195 (vendor_ie->vend_hdr.oui, wpa_oui,
1196 sizeof(wpa_oui))) {
1197 bss_entry->bcn_wpa_ie =
1198 (struct ieee_types_vendor_specific *)
1199 current_ptr;
1200 bss_entry->wpa_offset = (u16) (current_ptr -
1201 bss_entry->beacon_buf);
1202 } else if (!memcmp(vendor_ie->vend_hdr.oui, wmm_oui,
1203 sizeof(wmm_oui))) {
1204 if (total_ie_len ==
1205 sizeof(struct ieee_types_wmm_parameter)
1206 || total_ie_len ==
1207 sizeof(struct ieee_types_wmm_info))
1208 /*
1209 * Only accept and copy the WMM IE if
1210 * it matches the size expected for the
1211 * WMM Info IE or the WMM Parameter IE.
1212 */
1213 memcpy((u8 *) &bss_entry->wmm_ie,
1214 current_ptr, total_ie_len);
1215 }
1216 break;
1217 case WLAN_EID_RSN:
1218 bss_entry->bcn_rsn_ie =
1219 (struct ieee_types_generic *) current_ptr;
1220 bss_entry->rsn_offset = (u16) (current_ptr -
1221 bss_entry->beacon_buf);
1222 break;
1223 case WLAN_EID_BSS_AC_ACCESS_DELAY:
1224 bss_entry->bcn_wapi_ie =
1225 (struct ieee_types_generic *) current_ptr;
1226 bss_entry->wapi_offset = (u16) (current_ptr -
1227 bss_entry->beacon_buf);
1228 break;
1229 case WLAN_EID_HT_CAPABILITY:
1230 bss_entry->bcn_ht_cap = (struct ieee80211_ht_cap *)
1231 (current_ptr +
1232 sizeof(struct ieee_types_header));
1233 bss_entry->ht_cap_offset = (u16) (current_ptr +
1234 sizeof(struct ieee_types_header) -
1235 bss_entry->beacon_buf);
1236 break;
1237 case WLAN_EID_HT_INFORMATION:
1238 bss_entry->bcn_ht_info = (struct ieee80211_ht_info *)
1239 (current_ptr +
1240 sizeof(struct ieee_types_header));
1241 bss_entry->ht_info_offset = (u16) (current_ptr +
1242 sizeof(struct ieee_types_header) -
1243 bss_entry->beacon_buf);
1244 break;
1245 case WLAN_EID_BSS_COEX_2040:
1246 bss_entry->bcn_bss_co_2040 = (u8 *) (current_ptr +
1247 sizeof(struct ieee_types_header));
1248 bss_entry->bss_co_2040_offset = (u16) (current_ptr +
1249 sizeof(struct ieee_types_header) -
1250 bss_entry->beacon_buf);
1251 break;
1252 case WLAN_EID_EXT_CAPABILITY:
1253 bss_entry->bcn_ext_cap = (u8 *) (current_ptr +
1254 sizeof(struct ieee_types_header));
1255 bss_entry->ext_cap_offset = (u16) (current_ptr +
1256 sizeof(struct ieee_types_header) -
1257 bss_entry->beacon_buf);
1258 break;
5e6e3a92
BZ
1259 default:
1260 break;
1261 }
1262
1263 current_ptr += element_len + 2;
1264
1265 /* Need to account for IE ID and IE Len */
7c6fa2a8 1266 bytes_left -= (element_len + 2);
5e6e3a92 1267
7c6fa2a8 1268 } /* while (bytes_left > 2) */
5e6e3a92
BZ
1269 return ret;
1270}
1271
5e6e3a92
BZ
1272/*
1273 * This function converts radio type scan parameter to a band configuration
1274 * to be used in join command.
1275 */
1276static u8
1277mwifiex_radio_type_to_band(u8 radio_type)
1278{
5e6e3a92
BZ
1279 switch (radio_type) {
1280 case HostCmd_SCAN_RADIO_TYPE_A:
636c4598 1281 return BAND_A;
5e6e3a92
BZ
1282 case HostCmd_SCAN_RADIO_TYPE_BG:
1283 default:
636c4598 1284 return BAND_G;
5e6e3a92 1285 }
5e6e3a92
BZ
1286}
1287
5e6e3a92
BZ
1288/*
1289 * This is an internal function used to start a scan based on an input
1290 * configuration.
1291 *
1292 * This uses the input user scan configuration information when provided in
1293 * order to send the appropriate scan commands to firmware to populate or
1294 * update the internal driver scan table.
1295 */
711825a0
AK
1296static int mwifiex_scan_networks(struct mwifiex_private *priv,
1297 const struct mwifiex_user_scan_cfg *user_scan_in)
5e6e3a92
BZ
1298{
1299 int ret = 0;
1300 struct mwifiex_adapter *adapter = priv->adapter;
270e58e8
YAP
1301 struct cmd_ctrl_node *cmd_node;
1302 union mwifiex_scan_cmd_config_tlv *scan_cfg_out;
5e6e3a92
BZ
1303 struct mwifiex_ie_types_chan_list_param_set *chan_list_out;
1304 u32 buf_size;
1305 struct mwifiex_chan_scan_param_set *scan_chan_list;
5e6e3a92
BZ
1306 u8 filtered_scan;
1307 u8 scan_current_chan_only;
1308 u8 max_chan_per_scan;
1309 unsigned long flags;
1310
600f5d90 1311 if (adapter->scan_processing) {
5e6e3a92
BZ
1312 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1313 return ret;
1314 }
1315
1316 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1317 adapter->scan_processing = true;
1318 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1319
600f5d90 1320 if (priv->scan_block) {
5e6e3a92
BZ
1321 dev_dbg(adapter->dev,
1322 "cmd: Scan is blocked during association...\n");
1323 return ret;
1324 }
1325
1326 scan_cfg_out = kzalloc(sizeof(union mwifiex_scan_cmd_config_tlv),
1327 GFP_KERNEL);
1328 if (!scan_cfg_out) {
1329 dev_err(adapter->dev, "failed to alloc scan_cfg_out\n");
b53575ec 1330 return -ENOMEM;
5e6e3a92
BZ
1331 }
1332
1333 buf_size = sizeof(struct mwifiex_chan_scan_param_set) *
1334 MWIFIEX_USER_SCAN_CHAN_MAX;
1335 scan_chan_list = kzalloc(buf_size, GFP_KERNEL);
1336 if (!scan_chan_list) {
1337 dev_err(adapter->dev, "failed to alloc scan_chan_list\n");
1338 kfree(scan_cfg_out);
b53575ec 1339 return -ENOMEM;
5e6e3a92
BZ
1340 }
1341
5e6e3a92
BZ
1342 mwifiex_scan_setup_scan_config(priv, user_scan_in,
1343 &scan_cfg_out->config, &chan_list_out,
1344 scan_chan_list, &max_chan_per_scan,
1345 &filtered_scan, &scan_current_chan_only);
1346
600f5d90
AK
1347 ret = mwifiex_scan_channel_list(priv, max_chan_per_scan, filtered_scan,
1348 &scan_cfg_out->config, chan_list_out,
1349 scan_chan_list);
5e6e3a92
BZ
1350
1351 /* Get scan command from scan_pending_q and put to cmd_pending_q */
1352 if (!ret) {
1353 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1354 if (!list_empty(&adapter->scan_pending_q)) {
1355 cmd_node = list_first_entry(&adapter->scan_pending_q,
1356 struct cmd_ctrl_node, list);
1357 list_del(&cmd_node->list);
1358 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1359 flags);
efaaa8b8 1360 adapter->cmd_queued = cmd_node;
5e6e3a92
BZ
1361 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node,
1362 true);
1363 } else {
1364 spin_unlock_irqrestore(&adapter->scan_pending_q_lock,
1365 flags);
1366 }
5e6e3a92
BZ
1367 } else {
1368 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1369 adapter->scan_processing = true;
1370 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
1371 }
1372
1373 kfree(scan_cfg_out);
1374 kfree(scan_chan_list);
1375 return ret;
1376}
1377
711825a0
AK
1378/*
1379 * Sends IOCTL request to start a scan with user configurations.
1380 *
1381 * This function allocates the IOCTL request buffer, fills it
1382 * with requisite parameters and calls the IOCTL handler.
1383 *
1384 * Upon completion, it also generates a wireless event to notify
1385 * applications.
1386 */
1387int mwifiex_set_user_scan_ioctl(struct mwifiex_private *priv,
1388 struct mwifiex_user_scan_cfg *scan_req)
1389{
1390 int status;
1391
1392 priv->adapter->scan_wait_q_woken = false;
1393
1394 status = mwifiex_scan_networks(priv, scan_req);
1395 if (!status)
1396 status = mwifiex_wait_queue_complete(priv->adapter);
1397
1398 return status;
1399}
1400
5e6e3a92
BZ
1401/*
1402 * This function prepares a scan command to be sent to the firmware.
1403 *
1404 * This uses the scan command configuration sent to the command processing
1405 * module in command preparation stage to configure a scan command structure
1406 * to send to firmware.
1407 *
1408 * The fixed fields specifying the BSS type and BSSID filters as well as a
1409 * variable number/length of TLVs are sent in the command to firmware.
1410 *
1411 * Preparation also includes -
1412 * - Setting command ID, and proper size
1413 * - Ensuring correct endian-ness
1414 */
a5ffddb7
AK
1415int mwifiex_cmd_802_11_scan(struct host_cmd_ds_command *cmd,
1416 struct mwifiex_scan_cmd_config *scan_cfg)
5e6e3a92
BZ
1417{
1418 struct host_cmd_ds_802_11_scan *scan_cmd = &cmd->params.scan;
5e6e3a92
BZ
1419
1420 /* Set fixed field variables in scan command */
1421 scan_cmd->bss_mode = scan_cfg->bss_mode;
1422 memcpy(scan_cmd->bssid, scan_cfg->specific_bssid,
1423 sizeof(scan_cmd->bssid));
1424 memcpy(scan_cmd->tlv_buffer, scan_cfg->tlv_buf, scan_cfg->tlv_buf_len);
1425
1426 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_SCAN);
1427
1428 /* Size is equal to the sizeof(fixed portions) + the TLV len + header */
1429 cmd->size = cpu_to_le16((u16) (sizeof(scan_cmd->bss_mode)
1430 + sizeof(scan_cmd->bssid)
1431 + scan_cfg->tlv_buf_len + S_DS_GEN));
1432
1433 return 0;
1434}
1435
7c6fa2a8
AK
1436/*
1437 * This function checks compatibility of requested network with current
1438 * driver settings.
1439 */
1440int mwifiex_check_network_compatibility(struct mwifiex_private *priv,
1441 struct mwifiex_bssdescriptor *bss_desc)
1442{
1443 int ret = -1;
1444
1445 if (!bss_desc)
1446 return -1;
1447
1448 if ((mwifiex_get_cfp_by_band_and_channel_from_cfg80211(priv,
1449 (u8) bss_desc->bss_band, (u16) bss_desc->channel))) {
1450 switch (priv->bss_mode) {
1451 case NL80211_IFTYPE_STATION:
1452 case NL80211_IFTYPE_ADHOC:
1453 ret = mwifiex_is_network_compatible(priv, bss_desc,
1454 priv->bss_mode);
1455 if (ret)
1456 dev_err(priv->adapter->dev, "cannot find ssid "
1457 "%s\n", bss_desc->ssid.ssid);
1458 break;
1459 default:
1460 ret = 0;
1461 }
1462 }
1463
1464 return ret;
1465}
1466
1467static int
5116f3ce
AK
1468mwifiex_update_curr_bss_params(struct mwifiex_private *priv, u8 *bssid,
1469 s32 rssi, const u8 *ie_buf, size_t ie_len,
1470 u16 beacon_period, u16 cap_info_bitmap, u8 band)
7c6fa2a8 1471{
db652e4b 1472 struct mwifiex_bssdescriptor *bss_desc;
7c6fa2a8
AK
1473 int ret;
1474 unsigned long flags;
1475 u8 *beacon_ie;
1476
1477 /* Allocate and fill new bss descriptor */
1478 bss_desc = kzalloc(sizeof(struct mwifiex_bssdescriptor),
1479 GFP_KERNEL);
1480 if (!bss_desc) {
1481 dev_err(priv->adapter->dev, " failed to alloc bss_desc\n");
1482 return -ENOMEM;
1483 }
5982b47a
YAP
1484
1485 beacon_ie = kmemdup(ie_buf, ie_len, GFP_KERNEL);
f7503230 1486 if (!beacon_ie) {
db652e4b 1487 kfree(bss_desc);
f7503230 1488 dev_err(priv->adapter->dev, " failed to alloc beacon_ie\n");
7c6fa2a8
AK
1489 return -ENOMEM;
1490 }
7c6fa2a8
AK
1491
1492 ret = mwifiex_fill_new_bss_desc(priv, bssid, rssi, beacon_ie,
1493 ie_len, beacon_period,
5116f3ce 1494 cap_info_bitmap, band, bss_desc);
7c6fa2a8
AK
1495 if (ret)
1496 goto done;
1497
1498 ret = mwifiex_check_network_compatibility(priv, bss_desc);
1499 if (ret)
1500 goto done;
1501
1502 /* Update current bss descriptor parameters */
1503 spin_lock_irqsave(&priv->curr_bcn_buf_lock, flags);
1504 priv->curr_bss_params.bss_descriptor.bcn_wpa_ie = NULL;
1505 priv->curr_bss_params.bss_descriptor.wpa_offset = 0;
1506 priv->curr_bss_params.bss_descriptor.bcn_rsn_ie = NULL;
1507 priv->curr_bss_params.bss_descriptor.rsn_offset = 0;
1508 priv->curr_bss_params.bss_descriptor.bcn_wapi_ie = NULL;
1509 priv->curr_bss_params.bss_descriptor.wapi_offset = 0;
1510 priv->curr_bss_params.bss_descriptor.bcn_ht_cap = NULL;
1511 priv->curr_bss_params.bss_descriptor.ht_cap_offset =
1512 0;
1513 priv->curr_bss_params.bss_descriptor.bcn_ht_info = NULL;
1514 priv->curr_bss_params.bss_descriptor.ht_info_offset =
1515 0;
1516 priv->curr_bss_params.bss_descriptor.bcn_bss_co_2040 =
1517 NULL;
1518 priv->curr_bss_params.bss_descriptor.
1519 bss_co_2040_offset = 0;
1520 priv->curr_bss_params.bss_descriptor.bcn_ext_cap = NULL;
1521 priv->curr_bss_params.bss_descriptor.ext_cap_offset = 0;
1522 priv->curr_bss_params.bss_descriptor.beacon_buf = NULL;
1523 priv->curr_bss_params.bss_descriptor.beacon_buf_size =
1524 0;
1525
1526 /* Make a copy of current BSSID descriptor */
1527 memcpy(&priv->curr_bss_params.bss_descriptor, bss_desc,
1528 sizeof(priv->curr_bss_params.bss_descriptor));
1529 mwifiex_save_curr_bcn(priv);
1530 spin_unlock_irqrestore(&priv->curr_bcn_buf_lock, flags);
1531
1532done:
1533 kfree(bss_desc);
1534 kfree(beacon_ie);
1535 return 0;
1536}
1537
5e6e3a92
BZ
1538/*
1539 * This function handles the command response of scan.
1540 *
1541 * The response buffer for the scan command has the following
1542 * memory layout:
1543 *
1544 * .-------------------------------------------------------------.
1545 * | Header (4 * sizeof(t_u16)): Standard command response hdr |
1546 * .-------------------------------------------------------------.
1547 * | BufSize (t_u16) : sizeof the BSS Description data |
1548 * .-------------------------------------------------------------.
1549 * | NumOfSet (t_u8) : Number of BSS Descs returned |
1550 * .-------------------------------------------------------------.
1551 * | BSSDescription data (variable, size given in BufSize) |
1552 * .-------------------------------------------------------------.
1553 * | TLV data (variable, size calculated using Header->Size, |
1554 * | BufSize and sizeof the fixed fields above) |
1555 * .-------------------------------------------------------------.
1556 */
1557int mwifiex_ret_802_11_scan(struct mwifiex_private *priv,
600f5d90 1558 struct host_cmd_ds_command *resp)
5e6e3a92
BZ
1559{
1560 int ret = 0;
1561 struct mwifiex_adapter *adapter = priv->adapter;
270e58e8
YAP
1562 struct cmd_ctrl_node *cmd_node;
1563 struct host_cmd_ds_802_11_scan_rsp *scan_rsp;
5e6e3a92
BZ
1564 struct mwifiex_ie_types_data *tlv_data;
1565 struct mwifiex_ie_types_tsf_timestamp *tsf_tlv;
1566 u8 *bss_info;
1567 u32 scan_resp_size;
1568 u32 bytes_left;
5e6e3a92
BZ
1569 u32 idx;
1570 u32 tlv_buf_size;
5e6e3a92
BZ
1571 struct mwifiex_chan_freq_power *cfp;
1572 struct mwifiex_ie_types_chan_band_list_param_set *chan_band_tlv;
1573 struct chan_band_param_set *chan_band;
5e6e3a92
BZ
1574 u8 is_bgscan_resp;
1575 unsigned long flags;
5116f3ce 1576 struct cfg80211_bss *bss;
5e6e3a92
BZ
1577
1578 is_bgscan_resp = (le16_to_cpu(resp->command)
1579 == HostCmd_CMD_802_11_BG_SCAN_QUERY);
1580 if (is_bgscan_resp)
1581 scan_rsp = &resp->params.bg_scan_query_resp.scan_resp;
1582 else
1583 scan_rsp = &resp->params.scan_resp;
1584
1585
67a50035 1586 if (scan_rsp->number_of_sets > MWIFIEX_MAX_AP) {
5e6e3a92
BZ
1587 dev_err(adapter->dev, "SCAN_RESP: too many AP returned (%d)\n",
1588 scan_rsp->number_of_sets);
1589 ret = -1;
1590 goto done;
1591 }
1592
1593 bytes_left = le16_to_cpu(scan_rsp->bss_descript_size);
1594 dev_dbg(adapter->dev, "info: SCAN_RESP: bss_descript_size %d\n",
1595 bytes_left);
1596
1597 scan_resp_size = le16_to_cpu(resp->size);
1598
1599 dev_dbg(adapter->dev,
1600 "info: SCAN_RESP: returned %d APs before parsing\n",
1601 scan_rsp->number_of_sets);
1602
5e6e3a92
BZ
1603 bss_info = scan_rsp->bss_desc_and_tlv_buffer;
1604
1605 /*
1606 * The size of the TLV buffer is equal to the entire command response
1607 * size (scan_resp_size) minus the fixed fields (sizeof()'s), the
1608 * BSS Descriptions (bss_descript_size as bytesLef) and the command
1609 * response header (S_DS_GEN)
1610 */
1611 tlv_buf_size = scan_resp_size - (bytes_left
1612 + sizeof(scan_rsp->bss_descript_size)
1613 + sizeof(scan_rsp->number_of_sets)
1614 + S_DS_GEN);
1615
1616 tlv_data = (struct mwifiex_ie_types_data *) (scan_rsp->
1617 bss_desc_and_tlv_buffer +
1618 bytes_left);
1619
1620 /* Search the TLV buffer space in the scan response for any valid
1621 TLVs */
1622 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1623 TLV_TYPE_TSFTIMESTAMP,
1624 (struct mwifiex_ie_types_data **)
1625 &tsf_tlv);
1626
1627 /* Search the TLV buffer space in the scan response for any valid
1628 TLVs */
1629 mwifiex_ret_802_11_scan_get_tlv_ptrs(adapter, tlv_data, tlv_buf_size,
1630 TLV_TYPE_CHANNELBANDLIST,
1631 (struct mwifiex_ie_types_data **)
1632 &chan_band_tlv);
1633
5e6e3a92 1634 for (idx = 0; idx < scan_rsp->number_of_sets && bytes_left; idx++) {
7c6fa2a8
AK
1635 u8 bssid[ETH_ALEN];
1636 s32 rssi;
1637 const u8 *ie_buf;
1638 size_t ie_len;
1639 int channel = -1;
1640 u64 network_tsf = 0;
1641 u16 beacon_size = 0;
1642 u32 curr_bcn_bytes;
1643 u32 freq;
1644 u16 beacon_period;
1645 u16 cap_info_bitmap;
1646 u8 *current_ptr;
1647 struct mwifiex_bcn_param *bcn_param;
1648
1649 if (bytes_left >= sizeof(beacon_size)) {
1650 /* Extract & convert beacon size from command buffer */
1651 memcpy(&beacon_size, bss_info, sizeof(beacon_size));
1652 bytes_left -= sizeof(beacon_size);
1653 bss_info += sizeof(beacon_size);
5e6e3a92
BZ
1654 }
1655
7c6fa2a8
AK
1656 if (!beacon_size || beacon_size > bytes_left) {
1657 bss_info += bytes_left;
1658 bytes_left = 0;
1659 return -1;
1660 }
5e6e3a92 1661
7c6fa2a8
AK
1662 /* Initialize the current working beacon pointer for this BSS
1663 * iteration */
1664 current_ptr = bss_info;
1665
1666 /* Advance the return beacon pointer past the current beacon */
1667 bss_info += beacon_size;
1668 bytes_left -= beacon_size;
1669
1670 curr_bcn_bytes = beacon_size;
1671
1672 /*
1673 * First 5 fields are bssid, RSSI, time stamp, beacon interval,
1674 * and capability information
1675 */
1676 if (curr_bcn_bytes < sizeof(struct mwifiex_bcn_param)) {
1677 dev_err(adapter->dev, "InterpretIE: not enough bytes left\n");
1678 continue;
1679 }
1680 bcn_param = (struct mwifiex_bcn_param *)current_ptr;
1681 current_ptr += sizeof(*bcn_param);
1682 curr_bcn_bytes -= sizeof(*bcn_param);
1683
1684 memcpy(bssid, bcn_param->bssid, ETH_ALEN);
1685
1686 rssi = (s32) (bcn_param->rssi);
1687 dev_dbg(adapter->dev, "info: InterpretIE: RSSI=%02X\n",
1688 rssi);
1689
1690 beacon_period = le16_to_cpu(bcn_param->beacon_period);
1691
1692 cap_info_bitmap = le16_to_cpu(bcn_param->cap_info_bitmap);
1693 dev_dbg(adapter->dev, "info: InterpretIE: capabilities=0x%X\n",
1694 cap_info_bitmap);
1695
1696 /* Rest of the current buffer are IE's */
1697 ie_buf = current_ptr;
1698 ie_len = curr_bcn_bytes;
1699 dev_dbg(adapter->dev, "info: InterpretIE: IELength for this AP"
1700 " = %d\n", curr_bcn_bytes);
1701
1702 while (curr_bcn_bytes >= sizeof(struct ieee_types_header)) {
1703 u8 element_id, element_len;
1704
1705 element_id = *current_ptr;
1706 element_len = *(current_ptr + 1);
1707 if (curr_bcn_bytes < element_len +
1708 sizeof(struct ieee_types_header)) {
1709 dev_err(priv->adapter->dev, "%s: in processing"
1710 " IE, bytes left < IE length\n",
1711 __func__);
1712 goto done;
5e6e3a92 1713 }
7c6fa2a8
AK
1714 if (element_id == WLAN_EID_DS_PARAMS) {
1715 channel = *(u8 *) (current_ptr +
1716 sizeof(struct ieee_types_header));
5e6e3a92
BZ
1717 break;
1718 }
7c6fa2a8
AK
1719
1720 current_ptr += element_len +
1721 sizeof(struct ieee_types_header);
1722 curr_bcn_bytes -= element_len +
1723 sizeof(struct ieee_types_header);
5e6e3a92
BZ
1724 }
1725
5e6e3a92
BZ
1726 /*
1727 * If the TSF TLV was appended to the scan results, save this
1728 * entry's TSF value in the networkTSF field.The networkTSF is
1729 * the firmware's TSF value at the time the beacon or probe
1730 * response was received.
1731 */
7c6fa2a8
AK
1732 if (tsf_tlv)
1733 memcpy(&network_tsf,
1734 &tsf_tlv->tsf_data[idx * TSF_DATA_SIZE],
1735 sizeof(network_tsf));
1736
1737 if (channel != -1) {
1738 struct ieee80211_channel *chan;
1739 u8 band;
1740
1741 band = BAND_G;
1742 if (chan_band_tlv) {
1743 chan_band =
1744 &chan_band_tlv->chan_band_param[idx];
1745 band = mwifiex_radio_type_to_band(
1746 chan_band->radio_type
1747 & (BIT(0) | BIT(1)));
1748 }
5e6e3a92 1749
7c6fa2a8
AK
1750 cfp = mwifiex_get_cfp_by_band_and_channel_from_cfg80211(
1751 priv, (u8)band, (u16)channel);
5e6e3a92 1752
7c6fa2a8 1753 freq = cfp ? cfp->freq : 0;
5e6e3a92 1754
7c6fa2a8 1755 chan = ieee80211_get_channel(priv->wdev->wiphy, freq);
5e6e3a92 1756
7c6fa2a8 1757 if (chan && !(chan->flags & IEEE80211_CHAN_DISABLED)) {
5116f3ce
AK
1758 bss = cfg80211_inform_bss(priv->wdev->wiphy,
1759 chan, bssid, network_tsf,
1760 cap_info_bitmap, beacon_period,
1761 ie_buf, ie_len, rssi, GFP_KERNEL);
1762 *(u8 *)bss->priv = band;
5e6e3a92 1763
7c6fa2a8
AK
1764 if (priv->media_connected && !memcmp(bssid,
1765 priv->curr_bss_params.bss_descriptor
1766 .mac_address, ETH_ALEN))
1767 mwifiex_update_curr_bss_params(priv,
1768 bssid, rssi, ie_buf,
1769 ie_len, beacon_period,
5116f3ce 1770 cap_info_bitmap, band);
7c6fa2a8
AK
1771 }
1772 } else {
1773 dev_dbg(adapter->dev, "missing BSS channel IE\n");
1774 }
1775 }
5e6e3a92
BZ
1776
1777 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1778 if (list_empty(&adapter->scan_pending_q)) {
1779 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1780 spin_lock_irqsave(&adapter->mwifiex_cmd_lock, flags);
1781 adapter->scan_processing = false;
1782 spin_unlock_irqrestore(&adapter->mwifiex_cmd_lock, flags);
5e6e3a92
BZ
1783
1784 /* Need to indicate IOCTL complete */
600f5d90
AK
1785 if (adapter->curr_cmd->wait_q_enabled) {
1786 adapter->cmd_wait_q.status = 0;
efaaa8b8 1787 mwifiex_complete_cmd(adapter, adapter->curr_cmd);
5e6e3a92
BZ
1788 }
1789 if (priv->report_scan_result)
1790 priv->report_scan_result = false;
1791 if (priv->scan_pending_on_block) {
1792 priv->scan_pending_on_block = false;
1793 up(&priv->async_sem);
1794 }
1795
1796 } else {
1797 /* Get scan command from scan_pending_q and put to
1798 cmd_pending_q */
1799 cmd_node = list_first_entry(&adapter->scan_pending_q,
1800 struct cmd_ctrl_node, list);
1801 list_del(&cmd_node->list);
1802 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1803
1804 mwifiex_insert_cmd_to_pending_q(adapter, cmd_node, true);
1805 }
1806
1807done:
5e6e3a92
BZ
1808 return ret;
1809}
1810
1811/*
1812 * This function prepares command for background scan query.
1813 *
1814 * Preparation includes -
1815 * - Setting command ID and proper size
1816 * - Setting background scan flush parameter
1817 * - Ensuring correct endian-ness
1818 */
572e8f3e 1819int mwifiex_cmd_802_11_bg_scan_query(struct host_cmd_ds_command *cmd)
5e6e3a92
BZ
1820{
1821 struct host_cmd_ds_802_11_bg_scan_query *bg_query =
1822 &cmd->params.bg_scan_query;
1823
1824 cmd->command = cpu_to_le16(HostCmd_CMD_802_11_BG_SCAN_QUERY);
1825 cmd->size = cpu_to_le16(sizeof(struct host_cmd_ds_802_11_bg_scan_query)
1826 + S_DS_GEN);
1827
1828 bg_query->flush = 1;
1829
1830 return 0;
1831}
1832
5e6e3a92
BZ
1833/*
1834 * This function inserts scan command node to the scan pending queue.
1835 */
1836void
1837mwifiex_queue_scan_cmd(struct mwifiex_private *priv,
1838 struct cmd_ctrl_node *cmd_node)
1839{
1840 struct mwifiex_adapter *adapter = priv->adapter;
1841 unsigned long flags;
1842
600f5d90 1843 cmd_node->wait_q_enabled = true;
efaaa8b8 1844 cmd_node->condition = &adapter->scan_wait_q_woken;
5e6e3a92
BZ
1845 spin_lock_irqsave(&adapter->scan_pending_q_lock, flags);
1846 list_add_tail(&cmd_node->list, &adapter->scan_pending_q);
1847 spin_unlock_irqrestore(&adapter->scan_pending_q_lock, flags);
1848}
1849
5e6e3a92
BZ
1850/*
1851 * This function sends a scan command for all available channels to the
1852 * firmware, filtered on a specific SSID.
1853 */
1854static int mwifiex_scan_specific_ssid(struct mwifiex_private *priv,
600f5d90 1855 struct mwifiex_802_11_ssid *req_ssid)
5e6e3a92
BZ
1856{
1857 struct mwifiex_adapter *adapter = priv->adapter;
1858 int ret = 0;
1859 struct mwifiex_user_scan_cfg *scan_cfg;
1860
1861 if (!req_ssid)
1862 return -1;
1863
600f5d90 1864 if (adapter->scan_processing) {
5e6e3a92
BZ
1865 dev_dbg(adapter->dev, "cmd: Scan already in process...\n");
1866 return ret;
1867 }
1868
600f5d90 1869 if (priv->scan_block) {
5e6e3a92
BZ
1870 dev_dbg(adapter->dev,
1871 "cmd: Scan is blocked during association...\n");
1872 return ret;
1873 }
1874
5e6e3a92
BZ
1875 scan_cfg = kzalloc(sizeof(struct mwifiex_user_scan_cfg), GFP_KERNEL);
1876 if (!scan_cfg) {
1877 dev_err(adapter->dev, "failed to alloc scan_cfg\n");
b53575ec 1878 return -ENOMEM;
5e6e3a92
BZ
1879 }
1880
1881 memcpy(scan_cfg->ssid_list[0].ssid, req_ssid->ssid,
1882 req_ssid->ssid_len);
5e6e3a92 1883
600f5d90 1884 ret = mwifiex_scan_networks(priv, scan_cfg);
5e6e3a92
BZ
1885
1886 kfree(scan_cfg);
1887 return ret;
1888}
1889
1890/*
1891 * Sends IOCTL request to start a scan.
1892 *
1893 * This function allocates the IOCTL request buffer, fills it
1894 * with requisite parameters and calls the IOCTL handler.
1895 *
1896 * Scan command can be issued for both normal scan and specific SSID
1897 * scan, depending upon whether an SSID is provided or not.
1898 */
600f5d90 1899int mwifiex_request_scan(struct mwifiex_private *priv,
5e6e3a92
BZ
1900 struct mwifiex_802_11_ssid *req_ssid)
1901{
270e58e8 1902 int ret;
5e6e3a92
BZ
1903
1904 if (down_interruptible(&priv->async_sem)) {
1905 dev_err(priv->adapter->dev, "%s: acquire semaphore\n",
1906 __func__);
1907 return -1;
1908 }
1909 priv->scan_pending_on_block = true;
1910
efaaa8b8 1911 priv->adapter->scan_wait_q_woken = false;
5e6e3a92
BZ
1912
1913 if (req_ssid && req_ssid->ssid_len != 0)
1914 /* Specific SSID scan */
600f5d90 1915 ret = mwifiex_scan_specific_ssid(priv, req_ssid);
5e6e3a92
BZ
1916 else
1917 /* Normal scan */
600f5d90
AK
1918 ret = mwifiex_scan_networks(priv, NULL);
1919
1920 if (!ret)
1921 ret = mwifiex_wait_queue_complete(priv->adapter);
1922
5e6e3a92
BZ
1923 if (ret == -1) {
1924 priv->scan_pending_on_block = false;
1925 up(&priv->async_sem);
1926 }
600f5d90 1927
5e6e3a92
BZ
1928 return ret;
1929}
1930
1931/*
1932 * This function appends the vendor specific IE TLV to a buffer.
1933 */
1934int
1935mwifiex_cmd_append_vsie_tlv(struct mwifiex_private *priv,
1936 u16 vsie_mask, u8 **buffer)
1937{
1938 int id, ret_len = 0;
1939 struct mwifiex_ie_types_vendor_param_set *vs_param_set;
1940
1941 if (!buffer)
1942 return 0;
1943 if (!(*buffer))
1944 return 0;
1945
1946 /*
1947 * Traverse through the saved vendor specific IE array and append
1948 * the selected(scan/assoc/adhoc) IE as TLV to the command
1949 */
1950 for (id = 0; id < MWIFIEX_MAX_VSIE_NUM; id++) {
1951 if (priv->vs_ie[id].mask & vsie_mask) {
1952 vs_param_set =
1953 (struct mwifiex_ie_types_vendor_param_set *)
1954 *buffer;
1955 vs_param_set->header.type =
1956 cpu_to_le16(TLV_TYPE_PASSTHROUGH);
1957 vs_param_set->header.len =
1958 cpu_to_le16((((u16) priv->vs_ie[id].ie[1])
1959 & 0x00FF) + 2);
1960 memcpy(vs_param_set->ie, priv->vs_ie[id].ie,
1961 le16_to_cpu(vs_param_set->header.len));
1962 *buffer += le16_to_cpu(vs_param_set->header.len) +
1963 sizeof(struct mwifiex_ie_types_header);
1964 ret_len += le16_to_cpu(vs_param_set->header.len) +
1965 sizeof(struct mwifiex_ie_types_header);
1966 }
1967 }
1968 return ret_len;
1969}
1970
1971/*
1972 * This function saves a beacon buffer of the current BSS descriptor.
1973 *
1974 * The current beacon buffer is saved so that it can be restored in the
1975 * following cases that makes the beacon buffer not to contain the current
1976 * ssid's beacon buffer.
1977 * - The current ssid was not found somehow in the last scan.
1978 * - The current ssid was the last entry of the scan table and overloaded.
1979 */
1980void
1981mwifiex_save_curr_bcn(struct mwifiex_private *priv)
1982{
1983 struct mwifiex_bssdescriptor *curr_bss =
1984 &priv->curr_bss_params.bss_descriptor;
1985
030fe797
AK
1986 if (!curr_bss->beacon_buf_size)
1987 return;
5e6e3a92 1988
030fe797
AK
1989 /* allocate beacon buffer at 1st time; or if it's size has changed */
1990 if (!priv->curr_bcn_buf ||
1991 priv->curr_bcn_size != curr_bss->beacon_buf_size) {
5e6e3a92 1992 priv->curr_bcn_size = curr_bss->beacon_buf_size;
5e6e3a92 1993
030fe797 1994 kfree(priv->curr_bcn_buf);
5982b47a 1995 priv->curr_bcn_buf = kmalloc(curr_bss->beacon_buf_size,
5e6e3a92
BZ
1996 GFP_KERNEL);
1997 if (!priv->curr_bcn_buf) {
1998 dev_err(priv->adapter->dev,
1999 "failed to alloc curr_bcn_buf\n");
030fe797 2000 return;
5e6e3a92
BZ
2001 }
2002 }
030fe797
AK
2003
2004 memcpy(priv->curr_bcn_buf, curr_bss->beacon_buf,
2005 curr_bss->beacon_buf_size);
2006 dev_dbg(priv->adapter->dev, "info: current beacon saved %d\n",
2007 priv->curr_bcn_size);
7c6fa2a8
AK
2008
2009 curr_bss->beacon_buf = priv->curr_bcn_buf;
2010
2011 /* adjust the pointers in the current BSS descriptor */
2012 if (curr_bss->bcn_wpa_ie)
2013 curr_bss->bcn_wpa_ie =
2014 (struct ieee_types_vendor_specific *)
2015 (curr_bss->beacon_buf +
2016 curr_bss->wpa_offset);
2017
2018 if (curr_bss->bcn_rsn_ie)
2019 curr_bss->bcn_rsn_ie = (struct ieee_types_generic *)
2020 (curr_bss->beacon_buf +
2021 curr_bss->rsn_offset);
2022
2023 if (curr_bss->bcn_ht_cap)
2024 curr_bss->bcn_ht_cap = (struct ieee80211_ht_cap *)
2025 (curr_bss->beacon_buf +
2026 curr_bss->ht_cap_offset);
2027
2028 if (curr_bss->bcn_ht_info)
2029 curr_bss->bcn_ht_info = (struct ieee80211_ht_info *)
2030 (curr_bss->beacon_buf +
2031 curr_bss->ht_info_offset);
2032
2033 if (curr_bss->bcn_bss_co_2040)
2034 curr_bss->bcn_bss_co_2040 =
2035 (u8 *) (curr_bss->beacon_buf +
2036 curr_bss->bss_co_2040_offset);
2037
2038 if (curr_bss->bcn_ext_cap)
2039 curr_bss->bcn_ext_cap = (u8 *) (curr_bss->beacon_buf +
2040 curr_bss->ext_cap_offset);
5e6e3a92
BZ
2041}
2042
2043/*
2044 * This function frees the current BSS descriptor beacon buffer.
2045 */
2046void
2047mwifiex_free_curr_bcn(struct mwifiex_private *priv)
2048{
2049 kfree(priv->curr_bcn_buf);
2050 priv->curr_bcn_buf = NULL;
2051}