blob: b32843779c5fb262cf4b501f6fdd35ba69433ffb [file] [log] [blame]
Kalle Valobdcd8172011-07-18 00:22:30 +03001/*
2 * Copyright (c) 2004-2011 Atheros Communications Inc.
3 *
4 * Permission to use, copy, modify, and/or distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15 */
16
17#include "core.h"
18#include "cfg80211.h"
19#include "debug.h"
Kalle Valoabcb3442011-07-22 08:26:20 +030020#include "hif-ops.h"
Kalle Valo003353b0d2011-09-01 10:14:21 +030021#include "testmode.h"
Kalle Valobdcd8172011-07-18 00:22:30 +030022
Jouni Malinen6bbc7c32011-09-05 17:38:47 +030023static unsigned int ath6kl_p2p;
24
25module_param(ath6kl_p2p, uint, 0644);
26
Kalle Valobdcd8172011-07-18 00:22:30 +030027#define RATETAB_ENT(_rate, _rateid, _flags) { \
28 .bitrate = (_rate), \
29 .flags = (_flags), \
30 .hw_value = (_rateid), \
31}
32
33#define CHAN2G(_channel, _freq, _flags) { \
34 .band = IEEE80211_BAND_2GHZ, \
35 .hw_value = (_channel), \
36 .center_freq = (_freq), \
37 .flags = (_flags), \
38 .max_antenna_gain = 0, \
39 .max_power = 30, \
40}
41
42#define CHAN5G(_channel, _flags) { \
43 .band = IEEE80211_BAND_5GHZ, \
44 .hw_value = (_channel), \
45 .center_freq = 5000 + (5 * (_channel)), \
46 .flags = (_flags), \
47 .max_antenna_gain = 0, \
48 .max_power = 30, \
49}
50
51static struct ieee80211_rate ath6kl_rates[] = {
52 RATETAB_ENT(10, 0x1, 0),
53 RATETAB_ENT(20, 0x2, 0),
54 RATETAB_ENT(55, 0x4, 0),
55 RATETAB_ENT(110, 0x8, 0),
56 RATETAB_ENT(60, 0x10, 0),
57 RATETAB_ENT(90, 0x20, 0),
58 RATETAB_ENT(120, 0x40, 0),
59 RATETAB_ENT(180, 0x80, 0),
60 RATETAB_ENT(240, 0x100, 0),
61 RATETAB_ENT(360, 0x200, 0),
62 RATETAB_ENT(480, 0x400, 0),
63 RATETAB_ENT(540, 0x800, 0),
64};
65
66#define ath6kl_a_rates (ath6kl_rates + 4)
67#define ath6kl_a_rates_size 8
68#define ath6kl_g_rates (ath6kl_rates + 0)
69#define ath6kl_g_rates_size 12
70
71static struct ieee80211_channel ath6kl_2ghz_channels[] = {
72 CHAN2G(1, 2412, 0),
73 CHAN2G(2, 2417, 0),
74 CHAN2G(3, 2422, 0),
75 CHAN2G(4, 2427, 0),
76 CHAN2G(5, 2432, 0),
77 CHAN2G(6, 2437, 0),
78 CHAN2G(7, 2442, 0),
79 CHAN2G(8, 2447, 0),
80 CHAN2G(9, 2452, 0),
81 CHAN2G(10, 2457, 0),
82 CHAN2G(11, 2462, 0),
83 CHAN2G(12, 2467, 0),
84 CHAN2G(13, 2472, 0),
85 CHAN2G(14, 2484, 0),
86};
87
88static struct ieee80211_channel ath6kl_5ghz_a_channels[] = {
89 CHAN5G(34, 0), CHAN5G(36, 0),
90 CHAN5G(38, 0), CHAN5G(40, 0),
91 CHAN5G(42, 0), CHAN5G(44, 0),
92 CHAN5G(46, 0), CHAN5G(48, 0),
93 CHAN5G(52, 0), CHAN5G(56, 0),
94 CHAN5G(60, 0), CHAN5G(64, 0),
95 CHAN5G(100, 0), CHAN5G(104, 0),
96 CHAN5G(108, 0), CHAN5G(112, 0),
97 CHAN5G(116, 0), CHAN5G(120, 0),
98 CHAN5G(124, 0), CHAN5G(128, 0),
99 CHAN5G(132, 0), CHAN5G(136, 0),
100 CHAN5G(140, 0), CHAN5G(149, 0),
101 CHAN5G(153, 0), CHAN5G(157, 0),
102 CHAN5G(161, 0), CHAN5G(165, 0),
103 CHAN5G(184, 0), CHAN5G(188, 0),
104 CHAN5G(192, 0), CHAN5G(196, 0),
105 CHAN5G(200, 0), CHAN5G(204, 0),
106 CHAN5G(208, 0), CHAN5G(212, 0),
107 CHAN5G(216, 0),
108};
109
110static struct ieee80211_supported_band ath6kl_band_2ghz = {
111 .n_channels = ARRAY_SIZE(ath6kl_2ghz_channels),
112 .channels = ath6kl_2ghz_channels,
113 .n_bitrates = ath6kl_g_rates_size,
114 .bitrates = ath6kl_g_rates,
115};
116
117static struct ieee80211_supported_band ath6kl_band_5ghz = {
118 .n_channels = ARRAY_SIZE(ath6kl_5ghz_a_channels),
119 .channels = ath6kl_5ghz_a_channels,
120 .n_bitrates = ath6kl_a_rates_size,
121 .bitrates = ath6kl_a_rates,
122};
123
124static int ath6kl_set_wpa_version(struct ath6kl *ar,
125 enum nl80211_wpa_versions wpa_version)
126{
127 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: %u\n", __func__, wpa_version);
128
129 if (!wpa_version) {
130 ar->auth_mode = NONE_AUTH;
131 } else if (wpa_version & NL80211_WPA_VERSION_2) {
132 ar->auth_mode = WPA2_AUTH;
133 } else if (wpa_version & NL80211_WPA_VERSION_1) {
134 ar->auth_mode = WPA_AUTH;
135 } else {
136 ath6kl_err("%s: %u not supported\n", __func__, wpa_version);
137 return -ENOTSUPP;
138 }
139
140 return 0;
141}
142
143static int ath6kl_set_auth_type(struct ath6kl *ar,
144 enum nl80211_auth_type auth_type)
145{
146
147 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: 0x%x\n", __func__, auth_type);
148
149 switch (auth_type) {
150 case NL80211_AUTHTYPE_OPEN_SYSTEM:
151 ar->dot11_auth_mode = OPEN_AUTH;
152 break;
153 case NL80211_AUTHTYPE_SHARED_KEY:
154 ar->dot11_auth_mode = SHARED_AUTH;
155 break;
156 case NL80211_AUTHTYPE_NETWORK_EAP:
157 ar->dot11_auth_mode = LEAP_AUTH;
158 break;
159
160 case NL80211_AUTHTYPE_AUTOMATIC:
Vasanthakumar Thiagarajanac59a2b2011-09-10 15:26:34 +0530161 ar->dot11_auth_mode = OPEN_AUTH | SHARED_AUTH;
Kalle Valobdcd8172011-07-18 00:22:30 +0300162 break;
163
164 default:
165 ath6kl_err("%s: 0x%x not spported\n", __func__, auth_type);
166 return -ENOTSUPP;
167 }
168
169 return 0;
170}
171
172static int ath6kl_set_cipher(struct ath6kl *ar, u32 cipher, bool ucast)
173{
174 u8 *ar_cipher = ucast ? &ar->prwise_crypto : &ar->grp_crypto;
Edward Lu38acde32011-08-30 21:58:06 +0300175 u8 *ar_cipher_len = ucast ? &ar->prwise_crypto_len :
176 &ar->grp_crypto_len;
Kalle Valobdcd8172011-07-18 00:22:30 +0300177
178 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: cipher 0x%x, ucast %u\n",
179 __func__, cipher, ucast);
180
181 switch (cipher) {
182 case 0:
183 /* our own hack to use value 0 as no crypto used */
184 *ar_cipher = NONE_CRYPT;
185 *ar_cipher_len = 0;
186 break;
187 case WLAN_CIPHER_SUITE_WEP40:
188 *ar_cipher = WEP_CRYPT;
189 *ar_cipher_len = 5;
190 break;
191 case WLAN_CIPHER_SUITE_WEP104:
192 *ar_cipher = WEP_CRYPT;
193 *ar_cipher_len = 13;
194 break;
195 case WLAN_CIPHER_SUITE_TKIP:
196 *ar_cipher = TKIP_CRYPT;
197 *ar_cipher_len = 0;
198 break;
199 case WLAN_CIPHER_SUITE_CCMP:
200 *ar_cipher = AES_CRYPT;
201 *ar_cipher_len = 0;
202 break;
203 default:
204 ath6kl_err("cipher 0x%x not supported\n", cipher);
205 return -ENOTSUPP;
206 }
207
208 return 0;
209}
210
211static void ath6kl_set_key_mgmt(struct ath6kl *ar, u32 key_mgmt)
212{
213 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: 0x%x\n", __func__, key_mgmt);
214
215 if (key_mgmt == WLAN_AKM_SUITE_PSK) {
216 if (ar->auth_mode == WPA_AUTH)
217 ar->auth_mode = WPA_PSK_AUTH;
218 else if (ar->auth_mode == WPA2_AUTH)
219 ar->auth_mode = WPA2_PSK_AUTH;
220 } else if (key_mgmt != WLAN_AKM_SUITE_8021X) {
221 ar->auth_mode = NONE_AUTH;
222 }
223}
224
225static bool ath6kl_cfg80211_ready(struct ath6kl *ar)
226{
227 if (!test_bit(WMI_READY, &ar->flag)) {
228 ath6kl_err("wmi is not ready\n");
229 return false;
230 }
231
Raja Mani575b5f32011-07-19 19:27:33 +0530232 if (!test_bit(WLAN_ENABLED, &ar->flag)) {
Kalle Valobdcd8172011-07-18 00:22:30 +0300233 ath6kl_err("wlan disabled\n");
234 return false;
235 }
236
237 return true;
238}
239
240static int ath6kl_cfg80211_connect(struct wiphy *wiphy, struct net_device *dev,
241 struct cfg80211_connect_params *sme)
242{
243 struct ath6kl *ar = ath6kl_priv(dev);
244 int status;
245
246 ar->sme_state = SME_CONNECTING;
247
248 if (!ath6kl_cfg80211_ready(ar))
249 return -EIO;
250
251 if (test_bit(DESTROY_IN_PROGRESS, &ar->flag)) {
252 ath6kl_err("destroy in progress\n");
253 return -EBUSY;
254 }
255
256 if (test_bit(SKIP_SCAN, &ar->flag) &&
257 ((sme->channel && sme->channel->center_freq == 0) ||
258 (sme->bssid && is_zero_ether_addr(sme->bssid)))) {
259 ath6kl_err("SkipScan: channel or bssid invalid\n");
260 return -EINVAL;
261 }
262
263 if (down_interruptible(&ar->sem)) {
264 ath6kl_err("busy, couldn't get access\n");
265 return -ERESTARTSYS;
266 }
267
268 if (test_bit(DESTROY_IN_PROGRESS, &ar->flag)) {
269 ath6kl_err("busy, destroy in progress\n");
270 up(&ar->sem);
271 return -EBUSY;
272 }
273
274 if (ar->tx_pending[ath6kl_wmi_get_control_ep(ar->wmi)]) {
275 /*
276 * sleep until the command queue drains
277 */
278 wait_event_interruptible_timeout(ar->event_wq,
279 ar->tx_pending[ath6kl_wmi_get_control_ep(ar->wmi)] == 0,
280 WMI_TIMEOUT);
281 if (signal_pending(current)) {
282 ath6kl_err("cmd queue drain timeout\n");
283 up(&ar->sem);
284 return -EINTR;
285 }
286 }
287
288 if (test_bit(CONNECTED, &ar->flag) &&
289 ar->ssid_len == sme->ssid_len &&
290 !memcmp(ar->ssid, sme->ssid, ar->ssid_len)) {
291 ar->reconnect_flag = true;
292 status = ath6kl_wmi_reconnect_cmd(ar->wmi, ar->req_bssid,
293 ar->ch_hint);
294
295 up(&ar->sem);
296 if (status) {
297 ath6kl_err("wmi_reconnect_cmd failed\n");
298 return -EIO;
299 }
300 return 0;
301 } else if (ar->ssid_len == sme->ssid_len &&
302 !memcmp(ar->ssid, sme->ssid, ar->ssid_len)) {
303 ath6kl_disconnect(ar);
304 }
305
306 memset(ar->ssid, 0, sizeof(ar->ssid));
307 ar->ssid_len = sme->ssid_len;
308 memcpy(ar->ssid, sme->ssid, sme->ssid_len);
309
310 if (sme->channel)
311 ar->ch_hint = sme->channel->center_freq;
312
313 memset(ar->req_bssid, 0, sizeof(ar->req_bssid));
314 if (sme->bssid && !is_broadcast_ether_addr(sme->bssid))
315 memcpy(ar->req_bssid, sme->bssid, sizeof(ar->req_bssid));
316
317 ath6kl_set_wpa_version(ar, sme->crypto.wpa_versions);
318
319 status = ath6kl_set_auth_type(ar, sme->auth_type);
320 if (status) {
321 up(&ar->sem);
322 return status;
323 }
324
325 if (sme->crypto.n_ciphers_pairwise)
326 ath6kl_set_cipher(ar, sme->crypto.ciphers_pairwise[0], true);
327 else
328 ath6kl_set_cipher(ar, 0, true);
329
330 ath6kl_set_cipher(ar, sme->crypto.cipher_group, false);
331
332 if (sme->crypto.n_akm_suites)
333 ath6kl_set_key_mgmt(ar, sme->crypto.akm_suites[0]);
334
335 if ((sme->key_len) &&
336 (ar->auth_mode == NONE_AUTH) && (ar->prwise_crypto == WEP_CRYPT)) {
337 struct ath6kl_key *key = NULL;
338
339 if (sme->key_idx < WMI_MIN_KEY_INDEX ||
340 sme->key_idx > WMI_MAX_KEY_INDEX) {
341 ath6kl_err("key index %d out of bounds\n",
342 sme->key_idx);
343 up(&ar->sem);
344 return -ENOENT;
345 }
346
347 key = &ar->keys[sme->key_idx];
348 key->key_len = sme->key_len;
349 memcpy(key->key, sme->key, key->key_len);
350 key->cipher = ar->prwise_crypto;
351 ar->def_txkey_index = sme->key_idx;
352
353 ath6kl_wmi_addkey_cmd(ar->wmi, sme->key_idx,
354 ar->prwise_crypto,
355 GROUP_USAGE | TX_USAGE,
356 key->key_len,
357 NULL,
358 key->key, KEY_OP_INIT_VAL, NULL,
359 NO_SYNC_WMIFLAG);
360 }
361
362 if (!ar->usr_bss_filter) {
363 if (ath6kl_wmi_bssfilter_cmd(ar->wmi, ALL_BSS_FILTER, 0) != 0) {
364 ath6kl_err("couldn't set bss filtering\n");
365 up(&ar->sem);
366 return -EIO;
367 }
368 }
369
370 ar->nw_type = ar->next_mode;
371
372 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
373 "%s: connect called with authmode %d dot11 auth %d"
374 " PW crypto %d PW crypto len %d GRP crypto %d"
375 " GRP crypto len %d channel hint %u\n",
376 __func__,
377 ar->auth_mode, ar->dot11_auth_mode, ar->prwise_crypto,
378 ar->prwise_crypto_len, ar->grp_crypto,
Edward Lu38acde32011-08-30 21:58:06 +0300379 ar->grp_crypto_len, ar->ch_hint);
Kalle Valobdcd8172011-07-18 00:22:30 +0300380
381 ar->reconnect_flag = 0;
382 status = ath6kl_wmi_connect_cmd(ar->wmi, ar->nw_type,
383 ar->dot11_auth_mode, ar->auth_mode,
384 ar->prwise_crypto,
385 ar->prwise_crypto_len,
Edward Lu38acde32011-08-30 21:58:06 +0300386 ar->grp_crypto, ar->grp_crypto_len,
Kalle Valobdcd8172011-07-18 00:22:30 +0300387 ar->ssid_len, ar->ssid,
388 ar->req_bssid, ar->ch_hint,
389 ar->connect_ctrl_flags);
390
391 up(&ar->sem);
392
393 if (status == -EINVAL) {
394 memset(ar->ssid, 0, sizeof(ar->ssid));
395 ar->ssid_len = 0;
396 ath6kl_err("invalid request\n");
397 return -ENOENT;
398 } else if (status) {
399 ath6kl_err("ath6kl_wmi_connect_cmd failed\n");
400 return -EIO;
401 }
402
403 if ((!(ar->connect_ctrl_flags & CONNECT_DO_WPA_OFFLOAD)) &&
404 ((ar->auth_mode == WPA_PSK_AUTH)
405 || (ar->auth_mode == WPA2_PSK_AUTH))) {
406 mod_timer(&ar->disconnect_timer,
407 jiffies + msecs_to_jiffies(DISCON_TIMER_INTVAL));
408 }
409
410 ar->connect_ctrl_flags &= ~CONNECT_DO_WPA_OFFLOAD;
411 set_bit(CONNECT_PEND, &ar->flag);
412
413 return 0;
414}
415
Jouni Malinen01cac472011-09-19 19:14:59 +0300416static int ath6kl_add_bss_if_needed(struct ath6kl *ar, const u8 *bssid,
417 struct ieee80211_channel *chan,
418 const u8 *beacon_ie, size_t beacon_ie_len)
419{
420 struct cfg80211_bss *bss;
421 u8 *ie;
422
423 bss = cfg80211_get_bss(ar->wdev->wiphy, chan, bssid,
424 ar->ssid, ar->ssid_len, WLAN_CAPABILITY_ESS,
425 WLAN_CAPABILITY_ESS);
426 if (bss == NULL) {
427 /*
428 * Since cfg80211 may not yet know about the BSS,
429 * generate a partial entry until the first BSS info
430 * event becomes available.
431 *
432 * Prepend SSID element since it is not included in the Beacon
433 * IEs from the target.
434 */
435 ie = kmalloc(2 + ar->ssid_len + beacon_ie_len, GFP_KERNEL);
436 if (ie == NULL)
437 return -ENOMEM;
438 ie[0] = WLAN_EID_SSID;
439 ie[1] = ar->ssid_len;
440 memcpy(ie + 2, ar->ssid, ar->ssid_len);
441 memcpy(ie + 2 + ar->ssid_len, beacon_ie, beacon_ie_len);
442 bss = cfg80211_inform_bss(ar->wdev->wiphy, chan,
443 bssid, 0, WLAN_CAPABILITY_ESS, 100,
444 ie, 2 + ar->ssid_len + beacon_ie_len,
445 0, GFP_KERNEL);
446 if (bss)
447 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "added dummy bss for "
448 "%pM prior to indicating connect/roamed "
449 "event\n", bssid);
450 kfree(ie);
451 } else
452 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "cfg80211 already has a bss "
453 "entry\n");
454
455 if (bss == NULL)
456 return -ENOMEM;
457
458 cfg80211_put_bss(bss);
459
460 return 0;
461}
462
Kalle Valobdcd8172011-07-18 00:22:30 +0300463void ath6kl_cfg80211_connect_event(struct ath6kl *ar, u16 channel,
464 u8 *bssid, u16 listen_intvl,
465 u16 beacon_intvl,
466 enum network_type nw_type,
467 u8 beacon_ie_len, u8 assoc_req_len,
468 u8 assoc_resp_len, u8 *assoc_info)
469{
Jouni Malinen01cac472011-09-19 19:14:59 +0300470 struct ieee80211_channel *chan;
Kalle Valobdcd8172011-07-18 00:22:30 +0300471
472 /* capinfo + listen interval */
473 u8 assoc_req_ie_offset = sizeof(u16) + sizeof(u16);
474
475 /* capinfo + status code + associd */
476 u8 assoc_resp_ie_offset = sizeof(u16) + sizeof(u16) + sizeof(u16);
477
478 u8 *assoc_req_ie = assoc_info + beacon_ie_len + assoc_req_ie_offset;
479 u8 *assoc_resp_ie = assoc_info + beacon_ie_len + assoc_req_len +
480 assoc_resp_ie_offset;
481
482 assoc_req_len -= assoc_req_ie_offset;
483 assoc_resp_len -= assoc_resp_ie_offset;
484
Kalle Valobdcd8172011-07-18 00:22:30 +0300485 if (nw_type & ADHOC_NETWORK) {
486 if (ar->wdev->iftype != NL80211_IFTYPE_ADHOC) {
487 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
488 "%s: ath6k not in ibss mode\n", __func__);
489 return;
490 }
491 }
492
493 if (nw_type & INFRA_NETWORK) {
Jouni Malinen6b5e5d22011-08-30 21:58:05 +0300494 if (ar->wdev->iftype != NL80211_IFTYPE_STATION &&
495 ar->wdev->iftype != NL80211_IFTYPE_P2P_CLIENT) {
Kalle Valobdcd8172011-07-18 00:22:30 +0300496 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
497 "%s: ath6k not in station mode\n", __func__);
498 return;
499 }
500 }
501
Jouni Malinen01cac472011-09-19 19:14:59 +0300502 chan = ieee80211_get_channel(ar->wdev->wiphy, (int) channel);
Kalle Valobdcd8172011-07-18 00:22:30 +0300503
Kalle Valobdcd8172011-07-18 00:22:30 +0300504
505 if (nw_type & ADHOC_NETWORK) {
506 cfg80211_ibss_joined(ar->net_dev, bssid, GFP_KERNEL);
507 return;
508 }
509
Jouni Malinen01cac472011-09-19 19:14:59 +0300510 if (ath6kl_add_bss_if_needed(ar, bssid, chan, assoc_info,
511 beacon_ie_len) < 0) {
512 ath6kl_err("could not add cfg80211 bss entry for "
513 "connect/roamed notification\n");
514 return;
515 }
516
Raja Mani9aa60352011-08-04 19:26:29 +0530517 if (ar->sme_state == SME_CONNECTING) {
Kalle Valobdcd8172011-07-18 00:22:30 +0300518 /* inform connect result to cfg80211 */
Raja Mani9aa60352011-08-04 19:26:29 +0530519 ar->sme_state = SME_CONNECTED;
Kalle Valobdcd8172011-07-18 00:22:30 +0300520 cfg80211_connect_result(ar->net_dev, bssid,
521 assoc_req_ie, assoc_req_len,
522 assoc_resp_ie, assoc_resp_len,
523 WLAN_STATUS_SUCCESS, GFP_KERNEL);
Raja Mani9aa60352011-08-04 19:26:29 +0530524 } else if (ar->sme_state == SME_CONNECTED) {
Kalle Valobdcd8172011-07-18 00:22:30 +0300525 /* inform roam event to cfg80211 */
Jouni Malinen01cac472011-09-19 19:14:59 +0300526 cfg80211_roamed(ar->net_dev, chan, bssid,
Kalle Valobdcd8172011-07-18 00:22:30 +0300527 assoc_req_ie, assoc_req_len,
528 assoc_resp_ie, assoc_resp_len, GFP_KERNEL);
529 }
530}
531
532static int ath6kl_cfg80211_disconnect(struct wiphy *wiphy,
533 struct net_device *dev, u16 reason_code)
534{
535 struct ath6kl *ar = (struct ath6kl *)ath6kl_priv(dev);
536
537 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: reason=%u\n", __func__,
538 reason_code);
539
540 if (!ath6kl_cfg80211_ready(ar))
541 return -EIO;
542
543 if (test_bit(DESTROY_IN_PROGRESS, &ar->flag)) {
544 ath6kl_err("busy, destroy in progress\n");
545 return -EBUSY;
546 }
547
548 if (down_interruptible(&ar->sem)) {
549 ath6kl_err("busy, couldn't get access\n");
550 return -ERESTARTSYS;
551 }
552
553 ar->reconnect_flag = 0;
554 ath6kl_disconnect(ar);
555 memset(ar->ssid, 0, sizeof(ar->ssid));
556 ar->ssid_len = 0;
557
558 if (!test_bit(SKIP_SCAN, &ar->flag))
559 memset(ar->req_bssid, 0, sizeof(ar->req_bssid));
560
561 up(&ar->sem);
562
Vasanthakumar Thiagarajan170826d2011-09-10 15:26:35 +0530563 ar->sme_state = SME_DISCONNECTED;
564
Kalle Valobdcd8172011-07-18 00:22:30 +0300565 return 0;
566}
567
568void ath6kl_cfg80211_disconnect_event(struct ath6kl *ar, u8 reason,
569 u8 *bssid, u8 assoc_resp_len,
570 u8 *assoc_info, u16 proto_reason)
571{
Kalle Valobdcd8172011-07-18 00:22:30 +0300572 if (ar->scan_req) {
573 cfg80211_scan_done(ar->scan_req, true);
574 ar->scan_req = NULL;
575 }
576
577 if (ar->nw_type & ADHOC_NETWORK) {
578 if (ar->wdev->iftype != NL80211_IFTYPE_ADHOC) {
579 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
580 "%s: ath6k not in ibss mode\n", __func__);
581 return;
582 }
583 memset(bssid, 0, ETH_ALEN);
584 cfg80211_ibss_joined(ar->net_dev, bssid, GFP_KERNEL);
585 return;
586 }
587
588 if (ar->nw_type & INFRA_NETWORK) {
Jouni Malinen6b5e5d22011-08-30 21:58:05 +0300589 if (ar->wdev->iftype != NL80211_IFTYPE_STATION &&
590 ar->wdev->iftype != NL80211_IFTYPE_P2P_CLIENT) {
Kalle Valobdcd8172011-07-18 00:22:30 +0300591 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
592 "%s: ath6k not in station mode\n", __func__);
593 return;
594 }
595 }
596
597 if (!test_bit(CONNECT_PEND, &ar->flag)) {
598 if (reason != DISCONNECT_CMD)
599 ath6kl_wmi_disconnect_cmd(ar->wmi);
600
601 return;
602 }
603
604 if (reason == NO_NETWORK_AVAIL) {
605 /* connect cmd failed */
606 ath6kl_wmi_disconnect_cmd(ar->wmi);
607 return;
608 }
609
610 if (reason != DISCONNECT_CMD)
611 return;
612
Vasanthakumar Thiagarajanac59a2b2011-09-10 15:26:34 +0530613 clear_bit(CONNECT_PEND, &ar->flag);
Kalle Valobdcd8172011-07-18 00:22:30 +0300614
Vasanthakumar Thiagarajanac59a2b2011-09-10 15:26:34 +0530615 if (ar->sme_state == SME_CONNECTING) {
616 cfg80211_connect_result(ar->net_dev,
617 bssid, NULL, 0,
618 NULL, 0,
619 WLAN_STATUS_UNSPECIFIED_FAILURE,
620 GFP_KERNEL);
621 } else if (ar->sme_state == SME_CONNECTED) {
622 cfg80211_disconnected(ar->net_dev, reason,
623 NULL, 0, GFP_KERNEL);
Kalle Valobdcd8172011-07-18 00:22:30 +0300624 }
625
Vasanthakumar Thiagarajanac59a2b2011-09-10 15:26:34 +0530626 ar->sme_state = SME_DISCONNECTED;
Kalle Valobdcd8172011-07-18 00:22:30 +0300627}
628
Kalle Valobdcd8172011-07-18 00:22:30 +0300629static int ath6kl_cfg80211_scan(struct wiphy *wiphy, struct net_device *ndev,
630 struct cfg80211_scan_request *request)
631{
632 struct ath6kl *ar = (struct ath6kl *)ath6kl_priv(ndev);
Edward Lu1276c9e2011-08-30 21:58:00 +0300633 s8 n_channels = 0;
634 u16 *channels = NULL;
Kalle Valobdcd8172011-07-18 00:22:30 +0300635 int ret = 0;
Kalle Valobdcd8172011-07-18 00:22:30 +0300636
637 if (!ath6kl_cfg80211_ready(ar))
638 return -EIO;
639
640 if (!ar->usr_bss_filter) {
Jouni Malinen1b1e6ee2011-08-30 21:58:10 +0300641 ret = ath6kl_wmi_bssfilter_cmd(
642 ar->wmi,
643 (test_bit(CONNECTED, &ar->flag) ?
644 ALL_BUT_BSS_FILTER : ALL_BSS_FILTER), 0);
645 if (ret) {
Kalle Valobdcd8172011-07-18 00:22:30 +0300646 ath6kl_err("couldn't set bss filtering\n");
Jouni Malinen1b1e6ee2011-08-30 21:58:10 +0300647 return ret;
Kalle Valobdcd8172011-07-18 00:22:30 +0300648 }
649 }
650
651 if (request->n_ssids && request->ssids[0].ssid_len) {
652 u8 i;
653
654 if (request->n_ssids > (MAX_PROBED_SSID_INDEX - 1))
655 request->n_ssids = MAX_PROBED_SSID_INDEX - 1;
656
657 for (i = 0; i < request->n_ssids; i++)
658 ath6kl_wmi_probedssid_cmd(ar->wmi, i + 1,
659 SPECIFIC_SSID_FLAG,
660 request->ssids[i].ssid_len,
661 request->ssids[i].ssid);
662 }
663
Jouni Malinenb84da8c2011-08-30 21:57:59 +0300664 if (request->ie) {
665 ret = ath6kl_wmi_set_appie_cmd(ar->wmi, WMI_FRAME_PROBE_REQ,
666 request->ie, request->ie_len);
667 if (ret) {
668 ath6kl_err("failed to set Probe Request appie for "
669 "scan");
670 return ret;
671 }
672 }
673
Jouni Malinen11869be2011-09-02 20:07:06 +0300674 /*
675 * Scan only the requested channels if the request specifies a set of
676 * channels. If the list is longer than the target supports, do not
677 * configure the list and instead, scan all available channels.
678 */
679 if (request->n_channels > 0 &&
680 request->n_channels <= WMI_MAX_CHANNELS) {
Edward Lu1276c9e2011-08-30 21:58:00 +0300681 u8 i;
682
Jouni Malinen11869be2011-09-02 20:07:06 +0300683 n_channels = request->n_channels;
Edward Lu1276c9e2011-08-30 21:58:00 +0300684
685 channels = kzalloc(n_channels * sizeof(u16), GFP_KERNEL);
686 if (channels == NULL) {
687 ath6kl_warn("failed to set scan channels, "
688 "scan all channels");
689 n_channels = 0;
690 }
691
692 for (i = 0; i < n_channels; i++)
693 channels[i] = request->channels[i]->center_freq;
694 }
695
Jouni Malinen1b1e6ee2011-08-30 21:58:10 +0300696 ret = ath6kl_wmi_startscan_cmd(ar->wmi, WMI_LONG_SCAN, 0,
697 false, 0, 0, n_channels, channels);
698 if (ret)
Kalle Valobdcd8172011-07-18 00:22:30 +0300699 ath6kl_err("wmi_startscan_cmd failed\n");
Jouni Malinen11869be2011-09-02 20:07:06 +0300700 else
701 ar->scan_req = request;
Kalle Valobdcd8172011-07-18 00:22:30 +0300702
Edward Lu1276c9e2011-08-30 21:58:00 +0300703 kfree(channels);
704
Kalle Valobdcd8172011-07-18 00:22:30 +0300705 return ret;
706}
707
708void ath6kl_cfg80211_scan_complete_event(struct ath6kl *ar, int status)
709{
Kalle Valo6fd1eac2011-07-21 10:22:50 +0300710 int i;
Kalle Valobdcd8172011-07-18 00:22:30 +0300711
712 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: status %d\n", __func__, status);
713
Kalle Valo6fd1eac2011-07-21 10:22:50 +0300714 if (!ar->scan_req)
715 return;
Kalle Valobdcd8172011-07-18 00:22:30 +0300716
Kalle Valo6fd1eac2011-07-21 10:22:50 +0300717 if ((status == -ECANCELED) || (status == -EBUSY)) {
718 cfg80211_scan_done(ar->scan_req, true);
719 goto out;
Kalle Valobdcd8172011-07-18 00:22:30 +0300720 }
Kalle Valo6fd1eac2011-07-21 10:22:50 +0300721
Kalle Valo6fd1eac2011-07-21 10:22:50 +0300722 cfg80211_scan_done(ar->scan_req, false);
723
724 if (ar->scan_req->n_ssids && ar->scan_req->ssids[0].ssid_len) {
725 for (i = 0; i < ar->scan_req->n_ssids; i++) {
726 ath6kl_wmi_probedssid_cmd(ar->wmi, i + 1,
727 DISABLE_SSID_FLAG,
728 0, NULL);
729 }
730 }
731
732out:
733 ar->scan_req = NULL;
Kalle Valobdcd8172011-07-18 00:22:30 +0300734}
735
736static int ath6kl_cfg80211_add_key(struct wiphy *wiphy, struct net_device *ndev,
737 u8 key_index, bool pairwise,
738 const u8 *mac_addr,
739 struct key_params *params)
740{
741 struct ath6kl *ar = (struct ath6kl *)ath6kl_priv(ndev);
742 struct ath6kl_key *key = NULL;
743 u8 key_usage;
744 u8 key_type;
745 int status = 0;
746
747 if (!ath6kl_cfg80211_ready(ar))
748 return -EIO;
749
750 if (key_index < WMI_MIN_KEY_INDEX || key_index > WMI_MAX_KEY_INDEX) {
751 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
752 "%s: key index %d out of bounds\n", __func__,
753 key_index);
754 return -ENOENT;
755 }
756
757 key = &ar->keys[key_index];
758 memset(key, 0, sizeof(struct ath6kl_key));
759
760 if (pairwise)
761 key_usage = PAIRWISE_USAGE;
762 else
763 key_usage = GROUP_USAGE;
764
765 if (params) {
766 if (params->key_len > WLAN_MAX_KEY_LEN ||
767 params->seq_len > sizeof(key->seq))
768 return -EINVAL;
769
770 key->key_len = params->key_len;
771 memcpy(key->key, params->key, key->key_len);
772 key->seq_len = params->seq_len;
773 memcpy(key->seq, params->seq, key->seq_len);
774 key->cipher = params->cipher;
775 }
776
777 switch (key->cipher) {
778 case WLAN_CIPHER_SUITE_WEP40:
779 case WLAN_CIPHER_SUITE_WEP104:
780 key_type = WEP_CRYPT;
781 break;
782
783 case WLAN_CIPHER_SUITE_TKIP:
784 key_type = TKIP_CRYPT;
785 break;
786
787 case WLAN_CIPHER_SUITE_CCMP:
788 key_type = AES_CRYPT;
789 break;
790
791 default:
792 return -ENOTSUPP;
793 }
794
795 if (((ar->auth_mode == WPA_PSK_AUTH)
796 || (ar->auth_mode == WPA2_PSK_AUTH))
797 && (key_usage & GROUP_USAGE))
798 del_timer(&ar->disconnect_timer);
799
800 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
801 "%s: index %d, key_len %d, key_type 0x%x, key_usage 0x%x, seq_len %d\n",
802 __func__, key_index, key->key_len, key_type,
803 key_usage, key->seq_len);
804
805 ar->def_txkey_index = key_index;
Jouni Malinen9a5b1312011-08-30 21:57:52 +0300806
807 if (ar->nw_type == AP_NETWORK && !pairwise &&
808 (key_type == TKIP_CRYPT || key_type == AES_CRYPT) && params) {
809 ar->ap_mode_bkey.valid = true;
810 ar->ap_mode_bkey.key_index = key_index;
811 ar->ap_mode_bkey.key_type = key_type;
812 ar->ap_mode_bkey.key_len = key->key_len;
813 memcpy(ar->ap_mode_bkey.key, key->key, key->key_len);
814 if (!test_bit(CONNECTED, &ar->flag)) {
815 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "Delay initial group "
816 "key configuration until AP mode has been "
817 "started\n");
818 /*
819 * The key will be set in ath6kl_connect_ap_mode() once
820 * the connected event is received from the target.
821 */
822 return 0;
823 }
824 }
825
Jouni Malinen151411e2011-09-15 15:10:16 +0300826 if (ar->next_mode == AP_NETWORK && key_type == WEP_CRYPT &&
827 !test_bit(CONNECTED, &ar->flag)) {
828 /*
829 * Store the key locally so that it can be re-configured after
830 * the AP mode has properly started
831 * (ath6kl_install_statioc_wep_keys).
832 */
833 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "Delay WEP key configuration "
834 "until AP mode has been started\n");
835 ar->wep_key_list[key_index].key_len = key->key_len;
836 memcpy(ar->wep_key_list[key_index].key, key->key, key->key_len);
837 return 0;
838 }
839
Kalle Valobdcd8172011-07-18 00:22:30 +0300840 status = ath6kl_wmi_addkey_cmd(ar->wmi, ar->def_txkey_index,
841 key_type, key_usage, key->key_len,
842 key->seq, key->key, KEY_OP_INIT_VAL,
843 (u8 *) mac_addr, SYNC_BOTH_WMIFLAG);
844
845 if (status)
846 return -EIO;
847
848 return 0;
849}
850
851static int ath6kl_cfg80211_del_key(struct wiphy *wiphy, struct net_device *ndev,
852 u8 key_index, bool pairwise,
853 const u8 *mac_addr)
854{
855 struct ath6kl *ar = (struct ath6kl *)ath6kl_priv(ndev);
856
857 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: index %d\n", __func__, key_index);
858
859 if (!ath6kl_cfg80211_ready(ar))
860 return -EIO;
861
862 if (key_index < WMI_MIN_KEY_INDEX || key_index > WMI_MAX_KEY_INDEX) {
863 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
864 "%s: key index %d out of bounds\n", __func__,
865 key_index);
866 return -ENOENT;
867 }
868
869 if (!ar->keys[key_index].key_len) {
870 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
871 "%s: index %d is empty\n", __func__, key_index);
872 return 0;
873 }
874
875 ar->keys[key_index].key_len = 0;
876
877 return ath6kl_wmi_deletekey_cmd(ar->wmi, key_index);
878}
879
880static int ath6kl_cfg80211_get_key(struct wiphy *wiphy, struct net_device *ndev,
881 u8 key_index, bool pairwise,
882 const u8 *mac_addr, void *cookie,
883 void (*callback) (void *cookie,
884 struct key_params *))
885{
886 struct ath6kl *ar = (struct ath6kl *)ath6kl_priv(ndev);
887 struct ath6kl_key *key = NULL;
888 struct key_params params;
889
890 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: index %d\n", __func__, key_index);
891
892 if (!ath6kl_cfg80211_ready(ar))
893 return -EIO;
894
895 if (key_index < WMI_MIN_KEY_INDEX || key_index > WMI_MAX_KEY_INDEX) {
896 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
897 "%s: key index %d out of bounds\n", __func__,
898 key_index);
899 return -ENOENT;
900 }
901
902 key = &ar->keys[key_index];
903 memset(&params, 0, sizeof(params));
904 params.cipher = key->cipher;
905 params.key_len = key->key_len;
906 params.seq_len = key->seq_len;
907 params.seq = key->seq;
908 params.key = key->key;
909
910 callback(cookie, &params);
911
912 return key->key_len ? 0 : -ENOENT;
913}
914
915static int ath6kl_cfg80211_set_default_key(struct wiphy *wiphy,
916 struct net_device *ndev,
917 u8 key_index, bool unicast,
918 bool multicast)
919{
920 struct ath6kl *ar = (struct ath6kl *)ath6kl_priv(ndev);
921 struct ath6kl_key *key = NULL;
922 int status = 0;
923 u8 key_usage;
Edward Lu229ed6b2011-08-30 21:58:07 +0300924 enum crypto_type key_type = NONE_CRYPT;
Kalle Valobdcd8172011-07-18 00:22:30 +0300925
926 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: index %d\n", __func__, key_index);
927
928 if (!ath6kl_cfg80211_ready(ar))
929 return -EIO;
930
931 if (key_index < WMI_MIN_KEY_INDEX || key_index > WMI_MAX_KEY_INDEX) {
932 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
933 "%s: key index %d out of bounds\n",
934 __func__, key_index);
935 return -ENOENT;
936 }
937
938 if (!ar->keys[key_index].key_len) {
939 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: invalid key index %d\n",
940 __func__, key_index);
941 return -EINVAL;
942 }
943
944 ar->def_txkey_index = key_index;
945 key = &ar->keys[ar->def_txkey_index];
946 key_usage = GROUP_USAGE;
947 if (ar->prwise_crypto == WEP_CRYPT)
948 key_usage |= TX_USAGE;
Edward Lu229ed6b2011-08-30 21:58:07 +0300949 if (unicast)
950 key_type = ar->prwise_crypto;
951 if (multicast)
952 key_type = ar->grp_crypto;
Kalle Valobdcd8172011-07-18 00:22:30 +0300953
Jouni Malinen151411e2011-09-15 15:10:16 +0300954 if (ar->next_mode == AP_NETWORK && !test_bit(CONNECTED, &ar->flag))
Jouni Malinen9a5b1312011-08-30 21:57:52 +0300955 return 0; /* Delay until AP mode has been started */
956
Kalle Valobdcd8172011-07-18 00:22:30 +0300957 status = ath6kl_wmi_addkey_cmd(ar->wmi, ar->def_txkey_index,
Edward Lu229ed6b2011-08-30 21:58:07 +0300958 key_type, key_usage,
Kalle Valobdcd8172011-07-18 00:22:30 +0300959 key->key_len, key->seq, key->key,
960 KEY_OP_INIT_VAL, NULL,
961 SYNC_BOTH_WMIFLAG);
962 if (status)
963 return -EIO;
964
965 return 0;
966}
967
968void ath6kl_cfg80211_tkip_micerr_event(struct ath6kl *ar, u8 keyid,
969 bool ismcast)
970{
971 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
972 "%s: keyid %d, ismcast %d\n", __func__, keyid, ismcast);
973
974 cfg80211_michael_mic_failure(ar->net_dev, ar->bssid,
975 (ismcast ? NL80211_KEYTYPE_GROUP :
976 NL80211_KEYTYPE_PAIRWISE), keyid, NULL,
977 GFP_KERNEL);
978}
979
980static int ath6kl_cfg80211_set_wiphy_params(struct wiphy *wiphy, u32 changed)
981{
982 struct ath6kl *ar = (struct ath6kl *)wiphy_priv(wiphy);
983 int ret;
984
985 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: changed 0x%x\n", __func__,
986 changed);
987
988 if (!ath6kl_cfg80211_ready(ar))
989 return -EIO;
990
991 if (changed & WIPHY_PARAM_RTS_THRESHOLD) {
992 ret = ath6kl_wmi_set_rts_cmd(ar->wmi, wiphy->rts_threshold);
993 if (ret != 0) {
994 ath6kl_err("ath6kl_wmi_set_rts_cmd failed\n");
995 return -EIO;
996 }
997 }
998
999 return 0;
1000}
1001
1002/*
1003 * The type nl80211_tx_power_setting replaces the following
1004 * data type from 2.6.36 onwards
1005*/
1006static int ath6kl_cfg80211_set_txpower(struct wiphy *wiphy,
1007 enum nl80211_tx_power_setting type,
1008 int dbm)
1009{
1010 struct ath6kl *ar = (struct ath6kl *)wiphy_priv(wiphy);
1011 u8 ath6kl_dbm;
1012
1013 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: type 0x%x, dbm %d\n", __func__,
1014 type, dbm);
1015
1016 if (!ath6kl_cfg80211_ready(ar))
1017 return -EIO;
1018
1019 switch (type) {
1020 case NL80211_TX_POWER_AUTOMATIC:
1021 return 0;
1022 case NL80211_TX_POWER_LIMITED:
1023 ar->tx_pwr = ath6kl_dbm = dbm;
1024 break;
1025 default:
1026 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: type 0x%x not supported\n",
1027 __func__, type);
1028 return -EOPNOTSUPP;
1029 }
1030
1031 ath6kl_wmi_set_tx_pwr_cmd(ar->wmi, ath6kl_dbm);
1032
1033 return 0;
1034}
1035
1036static int ath6kl_cfg80211_get_txpower(struct wiphy *wiphy, int *dbm)
1037{
1038 struct ath6kl *ar = (struct ath6kl *)wiphy_priv(wiphy);
1039
1040 if (!ath6kl_cfg80211_ready(ar))
1041 return -EIO;
1042
1043 if (test_bit(CONNECTED, &ar->flag)) {
1044 ar->tx_pwr = 0;
1045
1046 if (ath6kl_wmi_get_tx_pwr_cmd(ar->wmi) != 0) {
1047 ath6kl_err("ath6kl_wmi_get_tx_pwr_cmd failed\n");
1048 return -EIO;
1049 }
1050
1051 wait_event_interruptible_timeout(ar->event_wq, ar->tx_pwr != 0,
1052 5 * HZ);
1053
1054 if (signal_pending(current)) {
1055 ath6kl_err("target did not respond\n");
1056 return -EINTR;
1057 }
1058 }
1059
1060 *dbm = ar->tx_pwr;
1061 return 0;
1062}
1063
1064static int ath6kl_cfg80211_set_power_mgmt(struct wiphy *wiphy,
1065 struct net_device *dev,
1066 bool pmgmt, int timeout)
1067{
1068 struct ath6kl *ar = ath6kl_priv(dev);
1069 struct wmi_power_mode_cmd mode;
1070
1071 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: pmgmt %d, timeout %d\n",
1072 __func__, pmgmt, timeout);
1073
1074 if (!ath6kl_cfg80211_ready(ar))
1075 return -EIO;
1076
1077 if (pmgmt) {
1078 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: max perf\n", __func__);
1079 mode.pwr_mode = REC_POWER;
1080 } else {
1081 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: rec power\n", __func__);
1082 mode.pwr_mode = MAX_PERF_POWER;
1083 }
1084
1085 if (ath6kl_wmi_powermode_cmd(ar->wmi, mode.pwr_mode) != 0) {
1086 ath6kl_err("wmi_powermode_cmd failed\n");
1087 return -EIO;
1088 }
1089
1090 return 0;
1091}
1092
1093static int ath6kl_cfg80211_change_iface(struct wiphy *wiphy,
1094 struct net_device *ndev,
1095 enum nl80211_iftype type, u32 *flags,
1096 struct vif_params *params)
1097{
1098 struct ath6kl *ar = ath6kl_priv(ndev);
1099 struct wireless_dev *wdev = ar->wdev;
1100
1101 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: type %u\n", __func__, type);
1102
1103 if (!ath6kl_cfg80211_ready(ar))
1104 return -EIO;
1105
1106 switch (type) {
1107 case NL80211_IFTYPE_STATION:
1108 ar->next_mode = INFRA_NETWORK;
1109 break;
1110 case NL80211_IFTYPE_ADHOC:
1111 ar->next_mode = ADHOC_NETWORK;
1112 break;
Jouni Malinen6e4604c2011-09-05 17:38:46 +03001113 case NL80211_IFTYPE_AP:
1114 ar->next_mode = AP_NETWORK;
1115 break;
Jouni Malinen6b5e5d22011-08-30 21:58:05 +03001116 case NL80211_IFTYPE_P2P_CLIENT:
1117 ar->next_mode = INFRA_NETWORK;
1118 break;
1119 case NL80211_IFTYPE_P2P_GO:
1120 ar->next_mode = AP_NETWORK;
1121 break;
Kalle Valobdcd8172011-07-18 00:22:30 +03001122 default:
1123 ath6kl_err("invalid interface type %u\n", type);
1124 return -EOPNOTSUPP;
1125 }
1126
1127 wdev->iftype = type;
1128
1129 return 0;
1130}
1131
1132static int ath6kl_cfg80211_join_ibss(struct wiphy *wiphy,
1133 struct net_device *dev,
1134 struct cfg80211_ibss_params *ibss_param)
1135{
1136 struct ath6kl *ar = ath6kl_priv(dev);
1137 int status;
1138
1139 if (!ath6kl_cfg80211_ready(ar))
1140 return -EIO;
1141
1142 ar->ssid_len = ibss_param->ssid_len;
1143 memcpy(ar->ssid, ibss_param->ssid, ar->ssid_len);
1144
1145 if (ibss_param->channel)
1146 ar->ch_hint = ibss_param->channel->center_freq;
1147
1148 if (ibss_param->channel_fixed) {
1149 /*
1150 * TODO: channel_fixed: The channel should be fixed, do not
1151 * search for IBSSs to join on other channels. Target
1152 * firmware does not support this feature, needs to be
1153 * updated.
1154 */
1155 return -EOPNOTSUPP;
1156 }
1157
1158 memset(ar->req_bssid, 0, sizeof(ar->req_bssid));
1159 if (ibss_param->bssid && !is_broadcast_ether_addr(ibss_param->bssid))
1160 memcpy(ar->req_bssid, ibss_param->bssid, sizeof(ar->req_bssid));
1161
1162 ath6kl_set_wpa_version(ar, 0);
1163
1164 status = ath6kl_set_auth_type(ar, NL80211_AUTHTYPE_OPEN_SYSTEM);
1165 if (status)
1166 return status;
1167
1168 if (ibss_param->privacy) {
1169 ath6kl_set_cipher(ar, WLAN_CIPHER_SUITE_WEP40, true);
1170 ath6kl_set_cipher(ar, WLAN_CIPHER_SUITE_WEP40, false);
1171 } else {
1172 ath6kl_set_cipher(ar, 0, true);
1173 ath6kl_set_cipher(ar, 0, false);
1174 }
1175
1176 ar->nw_type = ar->next_mode;
1177
1178 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
1179 "%s: connect called with authmode %d dot11 auth %d"
1180 " PW crypto %d PW crypto len %d GRP crypto %d"
1181 " GRP crypto len %d channel hint %u\n",
1182 __func__,
1183 ar->auth_mode, ar->dot11_auth_mode, ar->prwise_crypto,
1184 ar->prwise_crypto_len, ar->grp_crypto,
Edward Lu38acde32011-08-30 21:58:06 +03001185 ar->grp_crypto_len, ar->ch_hint);
Kalle Valobdcd8172011-07-18 00:22:30 +03001186
1187 status = ath6kl_wmi_connect_cmd(ar->wmi, ar->nw_type,
1188 ar->dot11_auth_mode, ar->auth_mode,
1189 ar->prwise_crypto,
1190 ar->prwise_crypto_len,
Edward Lu38acde32011-08-30 21:58:06 +03001191 ar->grp_crypto, ar->grp_crypto_len,
Kalle Valobdcd8172011-07-18 00:22:30 +03001192 ar->ssid_len, ar->ssid,
1193 ar->req_bssid, ar->ch_hint,
1194 ar->connect_ctrl_flags);
1195 set_bit(CONNECT_PEND, &ar->flag);
1196
1197 return 0;
1198}
1199
1200static int ath6kl_cfg80211_leave_ibss(struct wiphy *wiphy,
1201 struct net_device *dev)
1202{
1203 struct ath6kl *ar = (struct ath6kl *)ath6kl_priv(dev);
1204
1205 if (!ath6kl_cfg80211_ready(ar))
1206 return -EIO;
1207
1208 ath6kl_disconnect(ar);
1209 memset(ar->ssid, 0, sizeof(ar->ssid));
1210 ar->ssid_len = 0;
1211
1212 return 0;
1213}
1214
1215static const u32 cipher_suites[] = {
1216 WLAN_CIPHER_SUITE_WEP40,
1217 WLAN_CIPHER_SUITE_WEP104,
1218 WLAN_CIPHER_SUITE_TKIP,
1219 WLAN_CIPHER_SUITE_CCMP,
1220};
1221
1222static bool is_rate_legacy(s32 rate)
1223{
1224 static const s32 legacy[] = { 1000, 2000, 5500, 11000,
1225 6000, 9000, 12000, 18000, 24000,
1226 36000, 48000, 54000
1227 };
1228 u8 i;
1229
1230 for (i = 0; i < ARRAY_SIZE(legacy); i++)
1231 if (rate == legacy[i])
1232 return true;
1233
1234 return false;
1235}
1236
1237static bool is_rate_ht20(s32 rate, u8 *mcs, bool *sgi)
1238{
1239 static const s32 ht20[] = { 6500, 13000, 19500, 26000, 39000,
1240 52000, 58500, 65000, 72200
1241 };
1242 u8 i;
1243
1244 for (i = 0; i < ARRAY_SIZE(ht20); i++) {
1245 if (rate == ht20[i]) {
1246 if (i == ARRAY_SIZE(ht20) - 1)
1247 /* last rate uses sgi */
1248 *sgi = true;
1249 else
1250 *sgi = false;
1251
1252 *mcs = i;
1253 return true;
1254 }
1255 }
1256 return false;
1257}
1258
1259static bool is_rate_ht40(s32 rate, u8 *mcs, bool *sgi)
1260{
1261 static const s32 ht40[] = { 13500, 27000, 40500, 54000,
1262 81000, 108000, 121500, 135000,
1263 150000
1264 };
1265 u8 i;
1266
1267 for (i = 0; i < ARRAY_SIZE(ht40); i++) {
1268 if (rate == ht40[i]) {
1269 if (i == ARRAY_SIZE(ht40) - 1)
1270 /* last rate uses sgi */
1271 *sgi = true;
1272 else
1273 *sgi = false;
1274
1275 *mcs = i;
1276 return true;
1277 }
1278 }
1279
1280 return false;
1281}
1282
1283static int ath6kl_get_station(struct wiphy *wiphy, struct net_device *dev,
1284 u8 *mac, struct station_info *sinfo)
1285{
1286 struct ath6kl *ar = ath6kl_priv(dev);
1287 long left;
1288 bool sgi;
1289 s32 rate;
1290 int ret;
1291 u8 mcs;
1292
1293 if (memcmp(mac, ar->bssid, ETH_ALEN) != 0)
1294 return -ENOENT;
1295
1296 if (down_interruptible(&ar->sem))
1297 return -EBUSY;
1298
1299 set_bit(STATS_UPDATE_PEND, &ar->flag);
1300
1301 ret = ath6kl_wmi_get_stats_cmd(ar->wmi);
1302
1303 if (ret != 0) {
1304 up(&ar->sem);
1305 return -EIO;
1306 }
1307
1308 left = wait_event_interruptible_timeout(ar->event_wq,
1309 !test_bit(STATS_UPDATE_PEND,
1310 &ar->flag),
1311 WMI_TIMEOUT);
1312
1313 up(&ar->sem);
1314
1315 if (left == 0)
1316 return -ETIMEDOUT;
1317 else if (left < 0)
1318 return left;
1319
1320 if (ar->target_stats.rx_byte) {
1321 sinfo->rx_bytes = ar->target_stats.rx_byte;
1322 sinfo->filled |= STATION_INFO_RX_BYTES;
1323 sinfo->rx_packets = ar->target_stats.rx_pkt;
1324 sinfo->filled |= STATION_INFO_RX_PACKETS;
1325 }
1326
1327 if (ar->target_stats.tx_byte) {
1328 sinfo->tx_bytes = ar->target_stats.tx_byte;
1329 sinfo->filled |= STATION_INFO_TX_BYTES;
1330 sinfo->tx_packets = ar->target_stats.tx_pkt;
1331 sinfo->filled |= STATION_INFO_TX_PACKETS;
1332 }
1333
1334 sinfo->signal = ar->target_stats.cs_rssi;
1335 sinfo->filled |= STATION_INFO_SIGNAL;
1336
1337 rate = ar->target_stats.tx_ucast_rate;
1338
1339 if (is_rate_legacy(rate)) {
1340 sinfo->txrate.legacy = rate / 100;
1341 } else if (is_rate_ht20(rate, &mcs, &sgi)) {
1342 if (sgi) {
1343 sinfo->txrate.flags |= RATE_INFO_FLAGS_SHORT_GI;
1344 sinfo->txrate.mcs = mcs - 1;
1345 } else {
1346 sinfo->txrate.mcs = mcs;
1347 }
1348
1349 sinfo->txrate.flags |= RATE_INFO_FLAGS_MCS;
1350 } else if (is_rate_ht40(rate, &mcs, &sgi)) {
1351 if (sgi) {
1352 sinfo->txrate.flags |= RATE_INFO_FLAGS_SHORT_GI;
1353 sinfo->txrate.mcs = mcs - 1;
1354 } else {
1355 sinfo->txrate.mcs = mcs;
1356 }
1357
1358 sinfo->txrate.flags |= RATE_INFO_FLAGS_40_MHZ_WIDTH;
1359 sinfo->txrate.flags |= RATE_INFO_FLAGS_MCS;
1360 } else {
1361 ath6kl_warn("invalid rate: %d\n", rate);
1362 return 0;
1363 }
1364
1365 sinfo->filled |= STATION_INFO_TX_BITRATE;
1366
1367 return 0;
1368}
1369
1370static int ath6kl_set_pmksa(struct wiphy *wiphy, struct net_device *netdev,
1371 struct cfg80211_pmksa *pmksa)
1372{
1373 struct ath6kl *ar = ath6kl_priv(netdev);
1374 return ath6kl_wmi_setpmkid_cmd(ar->wmi, pmksa->bssid,
1375 pmksa->pmkid, true);
1376}
1377
1378static int ath6kl_del_pmksa(struct wiphy *wiphy, struct net_device *netdev,
1379 struct cfg80211_pmksa *pmksa)
1380{
1381 struct ath6kl *ar = ath6kl_priv(netdev);
1382 return ath6kl_wmi_setpmkid_cmd(ar->wmi, pmksa->bssid,
1383 pmksa->pmkid, false);
1384}
1385
1386static int ath6kl_flush_pmksa(struct wiphy *wiphy, struct net_device *netdev)
1387{
1388 struct ath6kl *ar = ath6kl_priv(netdev);
1389 if (test_bit(CONNECTED, &ar->flag))
1390 return ath6kl_wmi_setpmkid_cmd(ar->wmi, ar->bssid, NULL, false);
1391 return 0;
1392}
1393
Kalle Valoabcb3442011-07-22 08:26:20 +03001394#ifdef CONFIG_PM
1395static int ar6k_cfg80211_suspend(struct wiphy *wiphy,
1396 struct cfg80211_wowlan *wow)
1397{
1398 struct ath6kl *ar = wiphy_priv(wiphy);
1399
1400 return ath6kl_hif_suspend(ar);
1401}
1402#endif
1403
Jouni Malinen6a7c9ba2011-08-30 21:57:50 +03001404static int ath6kl_set_channel(struct wiphy *wiphy, struct net_device *dev,
1405 struct ieee80211_channel *chan,
1406 enum nl80211_channel_type channel_type)
1407{
1408 struct ath6kl *ar = ath6kl_priv(dev);
1409
1410 if (!ath6kl_cfg80211_ready(ar))
1411 return -EIO;
1412
1413 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: center_freq=%u hw_value=%u\n",
1414 __func__, chan->center_freq, chan->hw_value);
1415 ar->next_chan = chan->center_freq;
1416
1417 return 0;
1418}
1419
Jouni Malinen8bdfbf42011-08-30 21:58:09 +03001420static bool ath6kl_is_p2p_ie(const u8 *pos)
1421{
1422 return pos[0] == WLAN_EID_VENDOR_SPECIFIC && pos[1] >= 4 &&
1423 pos[2] == 0x50 && pos[3] == 0x6f &&
1424 pos[4] == 0x9a && pos[5] == 0x09;
1425}
1426
1427static int ath6kl_set_ap_probe_resp_ies(struct ath6kl *ar, const u8 *ies,
1428 size_t ies_len)
1429{
1430 const u8 *pos;
1431 u8 *buf = NULL;
1432 size_t len = 0;
1433 int ret;
1434
1435 /*
1436 * Filter out P2P IE(s) since they will be included depending on
1437 * the Probe Request frame in ath6kl_send_go_probe_resp().
1438 */
1439
1440 if (ies && ies_len) {
1441 buf = kmalloc(ies_len, GFP_KERNEL);
1442 if (buf == NULL)
1443 return -ENOMEM;
1444 pos = ies;
1445 while (pos + 1 < ies + ies_len) {
1446 if (pos + 2 + pos[1] > ies + ies_len)
1447 break;
1448 if (!ath6kl_is_p2p_ie(pos)) {
1449 memcpy(buf + len, pos, 2 + pos[1]);
1450 len += 2 + pos[1];
1451 }
1452 pos += 2 + pos[1];
1453 }
1454 }
1455
1456 ret = ath6kl_wmi_set_appie_cmd(ar->wmi, WMI_FRAME_PROBE_RESP,
1457 buf, len);
1458 kfree(buf);
1459 return ret;
1460}
1461
Jouni Malinen6a7c9ba2011-08-30 21:57:50 +03001462static int ath6kl_ap_beacon(struct wiphy *wiphy, struct net_device *dev,
1463 struct beacon_parameters *info, bool add)
1464{
1465 struct ath6kl *ar = ath6kl_priv(dev);
1466 struct ieee80211_mgmt *mgmt;
1467 u8 *ies;
1468 int ies_len;
1469 struct wmi_connect_cmd p;
1470 int res;
1471 int i;
1472
1473 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: add=%d\n", __func__, add);
1474
1475 if (!ath6kl_cfg80211_ready(ar))
1476 return -EIO;
1477
1478 if (ar->next_mode != AP_NETWORK)
1479 return -EOPNOTSUPP;
1480
1481 if (info->beacon_ies) {
1482 res = ath6kl_wmi_set_appie_cmd(ar->wmi, WMI_FRAME_BEACON,
1483 info->beacon_ies,
1484 info->beacon_ies_len);
1485 if (res)
1486 return res;
1487 }
1488 if (info->proberesp_ies) {
Jouni Malinen8bdfbf42011-08-30 21:58:09 +03001489 res = ath6kl_set_ap_probe_resp_ies(ar, info->proberesp_ies,
1490 info->proberesp_ies_len);
Jouni Malinen6a7c9ba2011-08-30 21:57:50 +03001491 if (res)
1492 return res;
1493 }
1494 if (info->assocresp_ies) {
1495 res = ath6kl_wmi_set_appie_cmd(ar->wmi, WMI_FRAME_ASSOC_RESP,
1496 info->assocresp_ies,
1497 info->assocresp_ies_len);
1498 if (res)
1499 return res;
1500 }
1501
1502 if (!add)
1503 return 0;
1504
Jouni Malinen9a5b1312011-08-30 21:57:52 +03001505 ar->ap_mode_bkey.valid = false;
1506
Jouni Malinen6a7c9ba2011-08-30 21:57:50 +03001507 /* TODO:
1508 * info->interval
1509 * info->dtim_period
1510 */
1511
1512 if (info->head == NULL)
1513 return -EINVAL;
1514 mgmt = (struct ieee80211_mgmt *) info->head;
1515 ies = mgmt->u.beacon.variable;
1516 if (ies > info->head + info->head_len)
1517 return -EINVAL;
1518 ies_len = info->head + info->head_len - ies;
1519
1520 if (info->ssid == NULL)
1521 return -EINVAL;
1522 memcpy(ar->ssid, info->ssid, info->ssid_len);
1523 ar->ssid_len = info->ssid_len;
1524 if (info->hidden_ssid != NL80211_HIDDEN_SSID_NOT_IN_USE)
1525 return -EOPNOTSUPP; /* TODO */
1526
1527 ar->dot11_auth_mode = OPEN_AUTH;
1528
1529 memset(&p, 0, sizeof(p));
1530
1531 for (i = 0; i < info->crypto.n_akm_suites; i++) {
1532 switch (info->crypto.akm_suites[i]) {
1533 case WLAN_AKM_SUITE_8021X:
1534 if (info->crypto.wpa_versions & NL80211_WPA_VERSION_1)
1535 p.auth_mode |= WPA_AUTH;
1536 if (info->crypto.wpa_versions & NL80211_WPA_VERSION_2)
1537 p.auth_mode |= WPA2_AUTH;
1538 break;
1539 case WLAN_AKM_SUITE_PSK:
1540 if (info->crypto.wpa_versions & NL80211_WPA_VERSION_1)
1541 p.auth_mode |= WPA_PSK_AUTH;
1542 if (info->crypto.wpa_versions & NL80211_WPA_VERSION_2)
1543 p.auth_mode |= WPA2_PSK_AUTH;
1544 break;
1545 }
1546 }
1547 if (p.auth_mode == 0)
1548 p.auth_mode = NONE_AUTH;
1549 ar->auth_mode = p.auth_mode;
1550
1551 for (i = 0; i < info->crypto.n_ciphers_pairwise; i++) {
1552 switch (info->crypto.ciphers_pairwise[i]) {
1553 case WLAN_CIPHER_SUITE_WEP40:
1554 case WLAN_CIPHER_SUITE_WEP104:
1555 p.prwise_crypto_type |= WEP_CRYPT;
1556 break;
1557 case WLAN_CIPHER_SUITE_TKIP:
1558 p.prwise_crypto_type |= TKIP_CRYPT;
1559 break;
1560 case WLAN_CIPHER_SUITE_CCMP:
1561 p.prwise_crypto_type |= AES_CRYPT;
1562 break;
1563 }
1564 }
Edward Lu229ed6b2011-08-30 21:58:07 +03001565 if (p.prwise_crypto_type == 0) {
Jouni Malinen6a7c9ba2011-08-30 21:57:50 +03001566 p.prwise_crypto_type = NONE_CRYPT;
Edward Lu229ed6b2011-08-30 21:58:07 +03001567 ath6kl_set_cipher(ar, 0, true);
1568 } else if (info->crypto.n_ciphers_pairwise == 1)
1569 ath6kl_set_cipher(ar, info->crypto.ciphers_pairwise[0], true);
Jouni Malinen6a7c9ba2011-08-30 21:57:50 +03001570
1571 switch (info->crypto.cipher_group) {
1572 case WLAN_CIPHER_SUITE_WEP40:
1573 case WLAN_CIPHER_SUITE_WEP104:
1574 p.grp_crypto_type = WEP_CRYPT;
1575 break;
1576 case WLAN_CIPHER_SUITE_TKIP:
1577 p.grp_crypto_type = TKIP_CRYPT;
1578 break;
1579 case WLAN_CIPHER_SUITE_CCMP:
1580 p.grp_crypto_type = AES_CRYPT;
1581 break;
1582 default:
1583 p.grp_crypto_type = NONE_CRYPT;
1584 break;
1585 }
Edward Lu229ed6b2011-08-30 21:58:07 +03001586 ath6kl_set_cipher(ar, info->crypto.cipher_group, false);
Jouni Malinen6a7c9ba2011-08-30 21:57:50 +03001587
1588 p.nw_type = AP_NETWORK;
1589 ar->nw_type = ar->next_mode;
1590
1591 p.ssid_len = ar->ssid_len;
1592 memcpy(p.ssid, ar->ssid, ar->ssid_len);
1593 p.dot11_auth_mode = ar->dot11_auth_mode;
1594 p.ch = cpu_to_le16(ar->next_chan);
1595
Jouni Malinen9a5b1312011-08-30 21:57:52 +03001596 res = ath6kl_wmi_ap_profile_commit(ar->wmi, &p);
1597 if (res < 0)
1598 return res;
1599
1600 return 0;
Jouni Malinen6a7c9ba2011-08-30 21:57:50 +03001601}
1602
1603static int ath6kl_add_beacon(struct wiphy *wiphy, struct net_device *dev,
1604 struct beacon_parameters *info)
1605{
1606 return ath6kl_ap_beacon(wiphy, dev, info, true);
1607}
1608
1609static int ath6kl_set_beacon(struct wiphy *wiphy, struct net_device *dev,
1610 struct beacon_parameters *info)
1611{
1612 return ath6kl_ap_beacon(wiphy, dev, info, false);
1613}
1614
1615static int ath6kl_del_beacon(struct wiphy *wiphy, struct net_device *dev)
1616{
1617 struct ath6kl *ar = ath6kl_priv(dev);
1618
1619 if (ar->nw_type != AP_NETWORK)
1620 return -EOPNOTSUPP;
1621 if (!test_bit(CONNECTED, &ar->flag))
1622 return -ENOTCONN;
1623
1624 ath6kl_wmi_disconnect_cmd(ar->wmi);
1625 clear_bit(CONNECTED, &ar->flag);
1626
1627 return 0;
1628}
1629
Jouni Malinen23875132011-08-30 21:57:53 +03001630static int ath6kl_change_station(struct wiphy *wiphy, struct net_device *dev,
1631 u8 *mac, struct station_parameters *params)
1632{
1633 struct ath6kl *ar = ath6kl_priv(dev);
1634
1635 if (ar->nw_type != AP_NETWORK)
1636 return -EOPNOTSUPP;
1637
1638 /* Use this only for authorizing/unauthorizing a station */
1639 if (!(params->sta_flags_mask & BIT(NL80211_STA_FLAG_AUTHORIZED)))
1640 return -EOPNOTSUPP;
1641
1642 if (params->sta_flags_set & BIT(NL80211_STA_FLAG_AUTHORIZED))
1643 return ath6kl_wmi_ap_set_mlme(ar->wmi, WMI_AP_MLME_AUTHORIZE,
1644 mac, 0);
1645 return ath6kl_wmi_ap_set_mlme(ar->wmi, WMI_AP_MLME_UNAUTHORIZE, mac,
1646 0);
1647}
1648
Jouni Malinen63fa1e02011-08-30 21:57:55 +03001649static int ath6kl_remain_on_channel(struct wiphy *wiphy,
1650 struct net_device *dev,
1651 struct ieee80211_channel *chan,
1652 enum nl80211_channel_type channel_type,
1653 unsigned int duration,
1654 u64 *cookie)
1655{
1656 struct ath6kl *ar = ath6kl_priv(dev);
1657
1658 /* TODO: if already pending or ongoing remain-on-channel,
1659 * return -EBUSY */
1660 *cookie = 1; /* only a single pending request is supported */
1661
1662 return ath6kl_wmi_remain_on_chnl_cmd(ar->wmi, chan->center_freq,
1663 duration);
1664}
1665
1666static int ath6kl_cancel_remain_on_channel(struct wiphy *wiphy,
1667 struct net_device *dev,
1668 u64 cookie)
1669{
1670 struct ath6kl *ar = ath6kl_priv(dev);
1671
1672 if (cookie != 1)
1673 return -ENOENT;
1674
1675 return ath6kl_wmi_cancel_remain_on_chnl_cmd(ar->wmi);
1676}
1677
Jouni Malinen8bdfbf42011-08-30 21:58:09 +03001678static int ath6kl_send_go_probe_resp(struct ath6kl *ar, const u8 *buf,
1679 size_t len, unsigned int freq)
1680{
1681 const u8 *pos;
1682 u8 *p2p;
1683 int p2p_len;
1684 int ret;
1685 const struct ieee80211_mgmt *mgmt;
1686
1687 mgmt = (const struct ieee80211_mgmt *) buf;
1688
1689 /* Include P2P IE(s) from the frame generated in user space. */
1690
1691 p2p = kmalloc(len, GFP_KERNEL);
1692 if (p2p == NULL)
1693 return -ENOMEM;
1694 p2p_len = 0;
1695
1696 pos = mgmt->u.probe_resp.variable;
1697 while (pos + 1 < buf + len) {
1698 if (pos + 2 + pos[1] > buf + len)
1699 break;
1700 if (ath6kl_is_p2p_ie(pos)) {
1701 memcpy(p2p + p2p_len, pos, 2 + pos[1]);
1702 p2p_len += 2 + pos[1];
1703 }
1704 pos += 2 + pos[1];
1705 }
1706
1707 ret = ath6kl_wmi_send_probe_response_cmd(ar->wmi, freq, mgmt->da,
1708 p2p, p2p_len);
1709 kfree(p2p);
1710 return ret;
1711}
1712
Jouni Malinen8a6c80602011-08-30 21:57:56 +03001713static int ath6kl_mgmt_tx(struct wiphy *wiphy, struct net_device *dev,
1714 struct ieee80211_channel *chan, bool offchan,
1715 enum nl80211_channel_type channel_type,
1716 bool channel_type_valid, unsigned int wait,
1717 const u8 *buf, size_t len, u64 *cookie)
1718{
1719 struct ath6kl *ar = ath6kl_priv(dev);
1720 u32 id;
Jouni Malinen8bdfbf42011-08-30 21:58:09 +03001721 const struct ieee80211_mgmt *mgmt;
1722
1723 mgmt = (const struct ieee80211_mgmt *) buf;
1724 if (buf + len >= mgmt->u.probe_resp.variable &&
1725 ar->nw_type == AP_NETWORK && test_bit(CONNECTED, &ar->flag) &&
1726 ieee80211_is_probe_resp(mgmt->frame_control)) {
1727 /*
1728 * Send Probe Response frame in AP mode using a separate WMI
1729 * command to allow the target to fill in the generic IEs.
1730 */
1731 *cookie = 0; /* TX status not supported */
1732 return ath6kl_send_go_probe_resp(ar, buf, len,
1733 chan->center_freq);
1734 }
Jouni Malinen8a6c80602011-08-30 21:57:56 +03001735
1736 id = ar->send_action_id++;
1737 if (id == 0) {
1738 /*
1739 * 0 is a reserved value in the WMI command and shall not be
1740 * used for the command.
1741 */
1742 id = ar->send_action_id++;
1743 }
1744
1745 *cookie = id;
1746 return ath6kl_wmi_send_action_cmd(ar->wmi, id, chan->center_freq, wait,
1747 buf, len);
1748}
1749
Jouni Malinenae32c302011-08-30 21:58:01 +03001750static void ath6kl_mgmt_frame_register(struct wiphy *wiphy,
1751 struct net_device *dev,
1752 u16 frame_type, bool reg)
1753{
1754 struct ath6kl *ar = ath6kl_priv(dev);
1755
1756 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: frame_type=0x%x reg=%d\n",
1757 __func__, frame_type, reg);
1758 if (frame_type == IEEE80211_STYPE_PROBE_REQ) {
1759 /*
1760 * Note: This notification callback is not allowed to sleep, so
1761 * we cannot send WMI_PROBE_REQ_REPORT_CMD here. Instead, we
1762 * hardcode target to report Probe Request frames all the time.
1763 */
1764 ar->probe_req_report = reg;
1765 }
1766}
1767
Jouni Malinenf80574a2011-08-30 21:58:04 +03001768static const struct ieee80211_txrx_stypes
1769ath6kl_mgmt_stypes[NUM_NL80211_IFTYPES] = {
1770 [NL80211_IFTYPE_STATION] = {
1771 .tx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1772 BIT(IEEE80211_STYPE_PROBE_RESP >> 4),
1773 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1774 BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
1775 },
1776 [NL80211_IFTYPE_P2P_CLIENT] = {
1777 .tx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1778 BIT(IEEE80211_STYPE_PROBE_RESP >> 4),
1779 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1780 BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
1781 },
1782 [NL80211_IFTYPE_P2P_GO] = {
1783 .tx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1784 BIT(IEEE80211_STYPE_PROBE_RESP >> 4),
1785 .rx = BIT(IEEE80211_STYPE_ACTION >> 4) |
1786 BIT(IEEE80211_STYPE_PROBE_REQ >> 4)
1787 },
1788};
1789
Kalle Valobdcd8172011-07-18 00:22:30 +03001790static struct cfg80211_ops ath6kl_cfg80211_ops = {
1791 .change_virtual_intf = ath6kl_cfg80211_change_iface,
1792 .scan = ath6kl_cfg80211_scan,
1793 .connect = ath6kl_cfg80211_connect,
1794 .disconnect = ath6kl_cfg80211_disconnect,
1795 .add_key = ath6kl_cfg80211_add_key,
1796 .get_key = ath6kl_cfg80211_get_key,
1797 .del_key = ath6kl_cfg80211_del_key,
1798 .set_default_key = ath6kl_cfg80211_set_default_key,
1799 .set_wiphy_params = ath6kl_cfg80211_set_wiphy_params,
1800 .set_tx_power = ath6kl_cfg80211_set_txpower,
1801 .get_tx_power = ath6kl_cfg80211_get_txpower,
1802 .set_power_mgmt = ath6kl_cfg80211_set_power_mgmt,
1803 .join_ibss = ath6kl_cfg80211_join_ibss,
1804 .leave_ibss = ath6kl_cfg80211_leave_ibss,
1805 .get_station = ath6kl_get_station,
1806 .set_pmksa = ath6kl_set_pmksa,
1807 .del_pmksa = ath6kl_del_pmksa,
1808 .flush_pmksa = ath6kl_flush_pmksa,
Kalle Valo003353b0d2011-09-01 10:14:21 +03001809 CFG80211_TESTMODE_CMD(ath6kl_tm_cmd)
Kalle Valoabcb3442011-07-22 08:26:20 +03001810#ifdef CONFIG_PM
1811 .suspend = ar6k_cfg80211_suspend,
1812#endif
Jouni Malinen6a7c9ba2011-08-30 21:57:50 +03001813 .set_channel = ath6kl_set_channel,
1814 .add_beacon = ath6kl_add_beacon,
1815 .set_beacon = ath6kl_set_beacon,
1816 .del_beacon = ath6kl_del_beacon,
Jouni Malinen23875132011-08-30 21:57:53 +03001817 .change_station = ath6kl_change_station,
Jouni Malinen63fa1e02011-08-30 21:57:55 +03001818 .remain_on_channel = ath6kl_remain_on_channel,
1819 .cancel_remain_on_channel = ath6kl_cancel_remain_on_channel,
Jouni Malinen8a6c80602011-08-30 21:57:56 +03001820 .mgmt_tx = ath6kl_mgmt_tx,
Jouni Malinenae32c302011-08-30 21:58:01 +03001821 .mgmt_frame_register = ath6kl_mgmt_frame_register,
Kalle Valobdcd8172011-07-18 00:22:30 +03001822};
1823
1824struct wireless_dev *ath6kl_cfg80211_init(struct device *dev)
1825{
1826 int ret = 0;
1827 struct wireless_dev *wdev;
Jouni Malinen6bbc7c32011-09-05 17:38:47 +03001828 struct ath6kl *ar;
Kalle Valobdcd8172011-07-18 00:22:30 +03001829
1830 wdev = kzalloc(sizeof(struct wireless_dev), GFP_KERNEL);
1831 if (!wdev) {
1832 ath6kl_err("couldn't allocate wireless device\n");
1833 return NULL;
1834 }
1835
1836 /* create a new wiphy for use with cfg80211 */
1837 wdev->wiphy = wiphy_new(&ath6kl_cfg80211_ops, sizeof(struct ath6kl));
1838 if (!wdev->wiphy) {
1839 ath6kl_err("couldn't allocate wiphy device\n");
1840 kfree(wdev);
1841 return NULL;
1842 }
1843
Jouni Malinen6bbc7c32011-09-05 17:38:47 +03001844 ar = wiphy_priv(wdev->wiphy);
1845 ar->p2p = !!ath6kl_p2p;
1846
Jouni Malinenf80574a2011-08-30 21:58:04 +03001847 wdev->wiphy->mgmt_stypes = ath6kl_mgmt_stypes;
1848
Jouni Malinen63fa1e02011-08-30 21:57:55 +03001849 wdev->wiphy->max_remain_on_channel_duration = 5000;
1850
Kalle Valobdcd8172011-07-18 00:22:30 +03001851 /* set device pointer for wiphy */
1852 set_wiphy_dev(wdev->wiphy, dev);
1853
1854 wdev->wiphy->interface_modes = BIT(NL80211_IFTYPE_STATION) |
Jouni Malinen6e4604c2011-09-05 17:38:46 +03001855 BIT(NL80211_IFTYPE_ADHOC) | BIT(NL80211_IFTYPE_AP);
Jouni Malinen6bbc7c32011-09-05 17:38:47 +03001856 if (ar->p2p) {
1857 wdev->wiphy->interface_modes |= BIT(NL80211_IFTYPE_P2P_GO) |
1858 BIT(NL80211_IFTYPE_P2P_CLIENT);
1859 }
Kalle Valobdcd8172011-07-18 00:22:30 +03001860 /* max num of ssids that can be probed during scanning */
1861 wdev->wiphy->max_scan_ssids = MAX_PROBED_SSID_INDEX;
Jouni Malinenb84da8c2011-08-30 21:57:59 +03001862 wdev->wiphy->max_scan_ie_len = 1000; /* FIX: what is correct limit? */
Kalle Valobdcd8172011-07-18 00:22:30 +03001863 wdev->wiphy->bands[IEEE80211_BAND_2GHZ] = &ath6kl_band_2ghz;
1864 wdev->wiphy->bands[IEEE80211_BAND_5GHZ] = &ath6kl_band_5ghz;
1865 wdev->wiphy->signal_type = CFG80211_SIGNAL_TYPE_MBM;
1866
1867 wdev->wiphy->cipher_suites = cipher_suites;
1868 wdev->wiphy->n_cipher_suites = ARRAY_SIZE(cipher_suites);
1869
1870 ret = wiphy_register(wdev->wiphy);
1871 if (ret < 0) {
1872 ath6kl_err("couldn't register wiphy device\n");
1873 wiphy_free(wdev->wiphy);
1874 kfree(wdev);
1875 return NULL;
1876 }
1877
1878 return wdev;
1879}
1880
1881void ath6kl_cfg80211_deinit(struct ath6kl *ar)
1882{
1883 struct wireless_dev *wdev = ar->wdev;
1884
1885 if (ar->scan_req) {
1886 cfg80211_scan_done(ar->scan_req, true);
1887 ar->scan_req = NULL;
1888 }
1889
1890 if (!wdev)
1891 return;
1892
1893 wiphy_unregister(wdev->wiphy);
1894 wiphy_free(wdev->wiphy);
1895 kfree(wdev);
1896}