mirror of
https://github.com/nxp-imx/mwifiex.git
synced 2024-11-18 16:15:36 +00:00
5a38226a47
Driver Bug Fixes: ----------------- 1. WSW-19892: Driver compilation errors on older kernel version 2. WSW-19638: Enable RF Test Mode support for 9098 PCIE and SDIO 3. WCSWREL-370: oob irq request fail on i.MX93 9x9 qsb board 4. WSW-21756: WLAN Driver hang observed during WiFi connect/disconnect 5. WCSWREL-362: merge the L6.0.0 build errors fix patches 6. WSW-22054: STA CSA event is not propagated to cfg80211 7. WSW-21873: STA does not send probes after switching from DFS channel 8. WSW-21530: UDP Tx not able to send ARP when high bandwidth is used 9. WSW-21541: WFA Pre-Cert Channel switch test is failing 10. WSW-21072: AP stops sending CTS-to-Self in mcast Tx after issue mc_aggr_cfg Signed-off-by: Sherry Sun <sherry.sun@nxp.com>
2700 lines
87 KiB
C
2700 lines
87 KiB
C
/** @file mlan_join.c
|
|
*
|
|
* @brief Functions implementing wlan infrastructure and adhoc join routines
|
|
*
|
|
* IOCTL handlers as well as command preparation and response routines
|
|
* for sending adhoc start, adhoc join, and association commands
|
|
* to the firmware.
|
|
*
|
|
*
|
|
* Copyright 2008-2022 NXP
|
|
*
|
|
* This software file (the File) is distributed by NXP
|
|
* under the terms of the GNU General Public License Version 2, June 1991
|
|
* (the License). You may use, redistribute and/or modify the File in
|
|
* accordance with the terms and conditions of the License, a copy of which
|
|
* is available by writing to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
|
|
* worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
|
|
*
|
|
* THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE EXPRESSLY DISCLAIMED. The License provides additional details about
|
|
* this warranty disclaimer.
|
|
*
|
|
*/
|
|
|
|
/******************************************************
|
|
Change log:
|
|
10/30/2008: initial version
|
|
******************************************************/
|
|
|
|
#include "mlan.h"
|
|
#include "mlan_join.h"
|
|
#include "mlan_util.h"
|
|
#include "mlan_fw.h"
|
|
#include "mlan_main.h"
|
|
#include "mlan_wmm.h"
|
|
#include "mlan_11n.h"
|
|
#include "mlan_11ac.h"
|
|
#include "mlan_11ax.h"
|
|
#include "mlan_11h.h"
|
|
#ifdef DRV_EMBEDDED_SUPPLICANT
|
|
#include "authenticator_api.h"
|
|
#endif
|
|
/********************************************************
|
|
Local Constants
|
|
********************************************************/
|
|
|
|
/********************************************************
|
|
Local Variables
|
|
********************************************************/
|
|
|
|
/********************************************************
|
|
Global Variables
|
|
********************************************************/
|
|
|
|
/********************************************************
|
|
Local Functions
|
|
********************************************************/
|
|
/**
|
|
* @brief Append a generic IE as a pass through TLV to a TLV buffer.
|
|
*
|
|
* This function is called from the network join command prep. routine.
|
|
* If the IE buffer has been setup by the application, this routine appends
|
|
* the buffer as a pass through TLV type to the request.
|
|
*
|
|
* @param priv A pointer to mlan_private structure
|
|
* @param ppbuffer pointer to command buffer pointer
|
|
*
|
|
* @return bytes added to the buffer
|
|
*/
|
|
static int wlan_cmd_append_generic_ie(mlan_private *priv, t_u8 **ppbuffer)
|
|
{
|
|
int ret_len = 0;
|
|
MrvlIEtypesHeader_t ie_header;
|
|
|
|
ENTER();
|
|
|
|
/* Null Checks */
|
|
if (ppbuffer == MNULL) {
|
|
LEAVE();
|
|
return 0;
|
|
}
|
|
if (*ppbuffer == MNULL) {
|
|
LEAVE();
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* If there is a generic ie buffer setup, append it to the return
|
|
* parameter buffer pointer.
|
|
*/
|
|
if (priv->gen_ie_buf_len) {
|
|
PRINTM(MINFO, "append generic IE %d to %p\n",
|
|
priv->gen_ie_buf_len, *ppbuffer);
|
|
|
|
/* Wrap the generic IE buffer with a pass through TLV type */
|
|
ie_header.type = wlan_cpu_to_le16(TLV_TYPE_PASSTHROUGH);
|
|
ie_header.len = wlan_cpu_to_le16(priv->gen_ie_buf_len);
|
|
memcpy_ext(priv->adapter, *ppbuffer, &ie_header,
|
|
sizeof(ie_header), sizeof(ie_header));
|
|
|
|
/* Increment the return size and the return buffer pointer param
|
|
*/
|
|
*ppbuffer += sizeof(ie_header);
|
|
ret_len += sizeof(ie_header);
|
|
|
|
/* Copy the generic IE buffer to the output buffer, advance
|
|
* pointer */
|
|
memcpy_ext(priv->adapter, *ppbuffer, priv->gen_ie_buf,
|
|
priv->gen_ie_buf_len, priv->gen_ie_buf_len);
|
|
|
|
/* Increment the return size and the return buffer pointer param
|
|
*/
|
|
*ppbuffer += priv->gen_ie_buf_len;
|
|
ret_len += priv->gen_ie_buf_len;
|
|
|
|
/* Reset the generic IE buffer */
|
|
priv->gen_ie_buf_len = 0;
|
|
}
|
|
|
|
/* return the length appended to the buffer */
|
|
LEAVE();
|
|
return ret_len;
|
|
}
|
|
|
|
/**
|
|
* @brief Append IE as a pass through TLV to a TLV buffer.
|
|
*
|
|
* This routine appends IE as a pass through TLV type to the request.
|
|
*
|
|
* @param priv A pointer to mlan_private structure
|
|
* @param ie A pointer to IE buffer
|
|
* @param ppbuffer pointer to command buffer pointer
|
|
*
|
|
* @return bytes added to the buffer
|
|
*/
|
|
static int wlan_cmd_append_pass_through_ie(mlan_private *priv,
|
|
IEEEtypes_Generic_t *ie,
|
|
t_u8 **ppbuffer)
|
|
{
|
|
int ret_len = 0;
|
|
MrvlIEtypesHeader_t ie_header;
|
|
|
|
ENTER();
|
|
|
|
/* Null Checks */
|
|
if (ppbuffer == MNULL) {
|
|
LEAVE();
|
|
return 0;
|
|
}
|
|
if (*ppbuffer == MNULL) {
|
|
LEAVE();
|
|
return 0;
|
|
}
|
|
if (ie->ieee_hdr.len) {
|
|
PRINTM(MINFO, "append generic IE %d to %p\n", ie->ieee_hdr.len,
|
|
*ppbuffer);
|
|
|
|
/* Wrap the generic IE buffer with a pass through TLV type */
|
|
ie_header.type = wlan_cpu_to_le16(TLV_TYPE_PASSTHROUGH);
|
|
ie_header.len = wlan_cpu_to_le16(ie->ieee_hdr.len +
|
|
sizeof(IEEEtypes_Header_t));
|
|
memcpy_ext(priv->adapter, *ppbuffer, &ie_header,
|
|
sizeof(ie_header), sizeof(ie_header));
|
|
|
|
/* Increment the return size and the return buffer pointer param
|
|
*/
|
|
*ppbuffer += sizeof(ie_header);
|
|
ret_len += sizeof(ie_header);
|
|
|
|
/* Copy the generic IE buffer to the output buffer, advance
|
|
* pointer */
|
|
memcpy_ext(priv->adapter, *ppbuffer, ie,
|
|
ie->ieee_hdr.len + sizeof(IEEEtypes_Header_t),
|
|
ie->ieee_hdr.len + sizeof(IEEEtypes_Header_t));
|
|
|
|
/* Increment the return size and the return buffer pointer param
|
|
*/
|
|
*ppbuffer += ie->ieee_hdr.len + sizeof(IEEEtypes_Header_t);
|
|
ret_len += ie->ieee_hdr.len + sizeof(IEEEtypes_Header_t);
|
|
}
|
|
/* return the length appended to the buffer */
|
|
LEAVE();
|
|
return ret_len;
|
|
}
|
|
|
|
/**
|
|
* @brief Append TSF tracking info from the scan table for the target AP
|
|
*
|
|
* This function is called from the network join command prep. routine.
|
|
* The TSF table TSF sent to the firmware contains two TSF values:
|
|
* - the TSF of the target AP from its previous beacon/probe response
|
|
* - the TSF timestamp of our local MAC at the time we observed the
|
|
* beacon/probe response.
|
|
*
|
|
* The firmware uses the timestamp values to set an initial TSF value
|
|
* in the MAC for the new association after a reassociation attempt.
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param ppbuffer A pointer to command buffer pointer
|
|
* @param pbss_desc A pointer to the BSS Descriptor from the scan table of
|
|
* the AP we are trying to join
|
|
*
|
|
* @return bytes added to the buffer
|
|
*/
|
|
static int wlan_cmd_append_tsf_tlv(mlan_private *pmriv, t_u8 **ppbuffer,
|
|
BSSDescriptor_t *pbss_desc)
|
|
{
|
|
MrvlIEtypes_TsfTimestamp_t tsf_tlv;
|
|
t_u64 tsf_val;
|
|
|
|
ENTER();
|
|
|
|
/* Null Checks */
|
|
if (ppbuffer == MNULL) {
|
|
LEAVE();
|
|
return 0;
|
|
}
|
|
if (*ppbuffer == MNULL) {
|
|
LEAVE();
|
|
return 0;
|
|
}
|
|
|
|
memset(pmriv->adapter, &tsf_tlv, 0x00,
|
|
sizeof(MrvlIEtypes_TsfTimestamp_t));
|
|
|
|
tsf_tlv.header.type = wlan_cpu_to_le16(TLV_TYPE_TSFTIMESTAMP);
|
|
tsf_tlv.header.len = wlan_cpu_to_le16(2 * sizeof(tsf_val));
|
|
|
|
memcpy_ext(pmriv->adapter, *ppbuffer, &tsf_tlv, sizeof(tsf_tlv.header),
|
|
sizeof(tsf_tlv.header));
|
|
*ppbuffer += sizeof(tsf_tlv.header);
|
|
|
|
/* TSF timestamp from the firmware TSF when the bcn/prb rsp was received
|
|
*/
|
|
tsf_val = wlan_cpu_to_le64(pbss_desc->network_tsf);
|
|
memcpy_ext(pmriv->adapter, *ppbuffer, &tsf_val, sizeof(tsf_val),
|
|
sizeof(tsf_val));
|
|
*ppbuffer += sizeof(tsf_val);
|
|
|
|
memcpy_ext(pmriv->adapter, &tsf_val, pbss_desc->time_stamp,
|
|
sizeof(pbss_desc->time_stamp), sizeof(tsf_val));
|
|
|
|
PRINTM(MINFO, "ASSOC: TSF offset calc: %016llx - %016llx\n", tsf_val,
|
|
pbss_desc->network_tsf);
|
|
|
|
memcpy_ext(pmriv->adapter, *ppbuffer, &tsf_val, sizeof(tsf_val),
|
|
sizeof(tsf_val));
|
|
*ppbuffer += sizeof(tsf_val);
|
|
|
|
LEAVE();
|
|
return sizeof(tsf_tlv.header) + (2 * sizeof(tsf_val));
|
|
}
|
|
|
|
/**
|
|
* @brief This function finds out the common rates between rate1 and rate2.
|
|
*
|
|
* It will fill common rates in rate1 as output if found.
|
|
*
|
|
* NOTE: Setting the MSB of the basic rates needs to be taken
|
|
* care of, either before or after calling this function
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param rate1 the buffer which keeps input and output
|
|
* @param rate1_size the size of rate1 buffer
|
|
* @param rate2 the buffer which keeps rate2
|
|
* @param rate2_size the size of rate2 buffer.
|
|
*
|
|
* @return MLAN_STATUS_SUCCESS or MLAN_STATUS_FAILURE
|
|
*/
|
|
static mlan_status wlan_get_common_rates(mlan_private *pmpriv, t_u8 *rate1,
|
|
t_u32 rate1_size, t_u8 *rate2,
|
|
t_u32 rate2_size)
|
|
{
|
|
mlan_status ret = MLAN_STATUS_SUCCESS;
|
|
mlan_callbacks *pcb = (mlan_callbacks *)&pmpriv->adapter->callbacks;
|
|
t_u8 *ptr = rate1;
|
|
t_u8 *tmp = MNULL;
|
|
t_u32 i, j;
|
|
|
|
ENTER();
|
|
|
|
ret = pcb->moal_malloc(pmpriv->adapter->pmoal_handle, rate1_size,
|
|
MLAN_MEM_DEF | MLAN_MEM_FLAG_ATOMIC, &tmp);
|
|
if (ret != MLAN_STATUS_SUCCESS || !tmp) {
|
|
PRINTM(MERROR, "Failed to allocate buffer\n");
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
memcpy_ext(pmpriv->adapter, tmp, rate1, rate1_size, rate1_size);
|
|
memset(pmpriv->adapter, rate1, 0, rate1_size);
|
|
|
|
for (i = 0; rate2[i] && i < rate2_size; i++) {
|
|
for (j = 0; tmp[j] && j < rate1_size; j++) {
|
|
/* Check common rate, excluding the bit
|
|
* for basic rate */
|
|
if ((rate2[i] & 0x7F) == (tmp[j] & 0x7F)) {
|
|
*rate1++ = tmp[j];
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
HEXDUMP("rate1 (AP) Rates", tmp, rate1_size);
|
|
HEXDUMP("rate2 (Card) Rates", rate2, rate2_size);
|
|
HEXDUMP("Common Rates", ptr, rate1 - ptr);
|
|
PRINTM(MINFO, "Tx DataRate is set to 0x%X\n", pmpriv->data_rate);
|
|
|
|
if (!pmpriv->is_data_rate_auto) {
|
|
while (*ptr) {
|
|
if ((*ptr & 0x7f) == pmpriv->data_rate) {
|
|
ret = MLAN_STATUS_SUCCESS;
|
|
goto done;
|
|
}
|
|
ptr++;
|
|
}
|
|
PRINTM(MMSG,
|
|
"Previously set fixed data rate %#x is not "
|
|
"compatible with the network\n",
|
|
pmpriv->data_rate);
|
|
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
ret = MLAN_STATUS_SUCCESS;
|
|
done:
|
|
if (tmp)
|
|
pcb->moal_mfree(pmpriv->adapter->pmoal_handle, tmp);
|
|
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Create the intersection of the rates supported by a target BSS and
|
|
* our pmadapter settings for use in an assoc/join command.
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param pbss_desc BSS Descriptor whose rates are used in the setup
|
|
* @param pout_rates Output: Octet array of rates common between the BSS
|
|
* and the pmadapter supported rates settings
|
|
* @param pout_rates_size Output: Number of rates/octets set in pout_rates
|
|
*
|
|
* @return MLAN_STATUS_SUCCESS or MLAN_STATUS_FAILURE
|
|
*/
|
|
static mlan_status wlan_setup_rates_from_bssdesc(mlan_private *pmpriv,
|
|
BSSDescriptor_t *pbss_desc,
|
|
t_u8 *pout_rates,
|
|
t_u32 *pout_rates_size)
|
|
{
|
|
t_u8 card_rates[WLAN_SUPPORTED_RATES];
|
|
t_u32 card_rates_size = 0;
|
|
ENTER();
|
|
/* Copy AP supported rates */
|
|
memcpy_ext(pmpriv->adapter, pout_rates, pbss_desc->supported_rates,
|
|
WLAN_SUPPORTED_RATES, WLAN_SUPPORTED_RATES);
|
|
|
|
if ((pmpriv->adapter->region_code == COUNTRY_CODE_JP_40 ||
|
|
pmpriv->adapter->region_code == COUNTRY_CODE_JP_FF) &&
|
|
(pbss_desc->phy_param_set.ds_param_set.current_chan == 14)) {
|
|
/* Special Case: For Japan, 11G rates on CH14 are not allowed*/
|
|
card_rates_size = wlan_get_supported_rates(
|
|
pmpriv, pmpriv->bss_mode, BAND_B, card_rates);
|
|
} else {
|
|
/* Get the STA supported rates */
|
|
card_rates_size =
|
|
wlan_get_supported_rates(pmpriv, pmpriv->bss_mode,
|
|
pmpriv->config_bands,
|
|
card_rates);
|
|
}
|
|
/* Get the common rates between AP and STA supported rates */
|
|
if (wlan_get_common_rates(pmpriv, pout_rates, WLAN_SUPPORTED_RATES,
|
|
card_rates, card_rates_size)) {
|
|
*pout_rates_size = 0;
|
|
PRINTM(MERROR, "wlan_get_common_rates failed\n");
|
|
LEAVE();
|
|
return MLAN_STATUS_FAILURE;
|
|
}
|
|
|
|
*pout_rates_size =
|
|
MIN(wlan_strlen((char *)pout_rates), WLAN_SUPPORTED_RATES);
|
|
|
|
LEAVE();
|
|
return MLAN_STATUS_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Update the scan entry TSF timestamps to reflect a new association
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param pnew_bss_desc A pointer to the newly associated AP's scan table entry
|
|
*
|
|
* @return N/A
|
|
*/
|
|
static t_void wlan_update_tsf_timestamps(mlan_private *pmpriv,
|
|
BSSDescriptor_t *pnew_bss_desc)
|
|
{
|
|
mlan_adapter *pmadapter = pmpriv->adapter;
|
|
t_u32 table_idx;
|
|
t_u64 new_tsf_base;
|
|
t_s64 tsf_delta;
|
|
|
|
ENTER();
|
|
|
|
memcpy_ext(pmpriv->adapter, &new_tsf_base, pnew_bss_desc->time_stamp,
|
|
sizeof(pnew_bss_desc->time_stamp), sizeof(new_tsf_base));
|
|
|
|
tsf_delta = new_tsf_base - pnew_bss_desc->network_tsf;
|
|
|
|
PRINTM(MINFO, "TSF: Update TSF timestamps, 0x%016llx -> 0x%016llx\n",
|
|
pnew_bss_desc->network_tsf, new_tsf_base);
|
|
|
|
for (table_idx = 0; table_idx < pmadapter->num_in_scan_table;
|
|
table_idx++) {
|
|
pmadapter->pscan_table[table_idx].network_tsf += tsf_delta;
|
|
}
|
|
|
|
LEAVE();
|
|
}
|
|
|
|
/**
|
|
* @brief Append a wapi IE
|
|
*
|
|
* This function is called from the network join command prep. routine.
|
|
* If the IE buffer has been setup by the application, this routine appends
|
|
* the buffer as a wapi TLV type to the request.
|
|
*
|
|
* @param priv A pointer to mlan_private structure
|
|
* @param ppbuffer pointer to command buffer pointer
|
|
*
|
|
* @return bytes added to the buffer
|
|
*/
|
|
static int wlan_cmd_append_wapi_ie(mlan_private *priv, t_u8 **ppbuffer)
|
|
{
|
|
int retlen = 0;
|
|
MrvlIEtypesHeader_t ie_header;
|
|
|
|
ENTER();
|
|
|
|
/* Null Checks */
|
|
if (ppbuffer == MNULL) {
|
|
LEAVE();
|
|
return 0;
|
|
}
|
|
if (*ppbuffer == MNULL) {
|
|
LEAVE();
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* If there is a wapi ie buffer setup, append it to the return
|
|
* parameter buffer pointer.
|
|
*/
|
|
if (priv->wapi_ie_len) {
|
|
PRINTM(MCMND, "append wapi ie %d to %p\n", priv->wapi_ie_len,
|
|
*ppbuffer);
|
|
|
|
/* Wrap the generic IE buffer with a pass through TLV type */
|
|
ie_header.type = wlan_cpu_to_le16(TLV_TYPE_WAPI_IE);
|
|
ie_header.len = wlan_cpu_to_le16(priv->wapi_ie_len);
|
|
memcpy_ext(priv->adapter, *ppbuffer, &ie_header,
|
|
sizeof(ie_header), sizeof(ie_header));
|
|
|
|
/* Increment the return size and the return buffer pointer param
|
|
*/
|
|
*ppbuffer += sizeof(ie_header);
|
|
retlen += sizeof(ie_header);
|
|
|
|
/* Copy the wapi IE buffer to the output buffer, advance pointer
|
|
*/
|
|
memcpy_ext(priv->adapter, *ppbuffer, priv->wapi_ie,
|
|
priv->wapi_ie_len, priv->wapi_ie_len);
|
|
|
|
/* Increment the return size and the return buffer pointer param
|
|
*/
|
|
*ppbuffer += priv->wapi_ie_len;
|
|
retlen += priv->wapi_ie_len;
|
|
}
|
|
/* return the length appended to the buffer */
|
|
LEAVE();
|
|
return retlen;
|
|
}
|
|
|
|
/**
|
|
* @brief Append a osen IE
|
|
*
|
|
* This function is called from the network join command prep. routine.
|
|
* If the IE buffer has been setup by the application, this routine appends
|
|
* the buffer as a osen TLV type to the request.
|
|
*
|
|
* @param priv A pointer to mlan_private structure
|
|
* @param ppbuffer pointer to command buffer pointer
|
|
*
|
|
* @return bytes added to the buffer
|
|
*/
|
|
static int wlan_cmd_append_osen_ie(mlan_private *priv, t_u8 **ppbuffer)
|
|
{
|
|
int retlen = 0;
|
|
MrvlIEtypesHeader_t ie_header;
|
|
|
|
ENTER();
|
|
|
|
/* Null Checks */
|
|
if (ppbuffer == MNULL) {
|
|
LEAVE();
|
|
return 0;
|
|
}
|
|
if (*ppbuffer == MNULL) {
|
|
LEAVE();
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* If there is a osen ie buffer setup, append it to the return
|
|
* parameter buffer pointer.
|
|
*/
|
|
if (priv->osen_ie_len) {
|
|
PRINTM(MCMND, "append osen ie %d to %p\n", priv->osen_ie_len,
|
|
*ppbuffer);
|
|
|
|
/* Wrap the generic IE buffer with a pass through TLV type */
|
|
ie_header.type = wlan_cpu_to_le16(TLV_TYPE_VENDOR_SPECIFIC_IE);
|
|
ie_header.len = wlan_cpu_to_le16(priv->osen_ie[1]);
|
|
memcpy_ext(priv->adapter, *ppbuffer, &ie_header,
|
|
sizeof(ie_header), sizeof(ie_header));
|
|
|
|
/* Increment the return size and the return buffer pointer param
|
|
*/
|
|
*ppbuffer += sizeof(ie_header);
|
|
retlen += sizeof(ie_header);
|
|
|
|
/* Copy the osen IE buffer to the output buffer, advance pointer
|
|
*/
|
|
memcpy_ext(priv->adapter, *ppbuffer, &priv->osen_ie[2],
|
|
priv->osen_ie[1], priv->osen_ie[1]);
|
|
|
|
/* Increment the return size and the return buffer pointer param
|
|
*/
|
|
*ppbuffer += priv->osen_ie[1];
|
|
retlen += priv->osen_ie[1];
|
|
}
|
|
/* return the length appended to the buffer */
|
|
LEAVE();
|
|
return retlen;
|
|
}
|
|
|
|
/**
|
|
* @brief This function get the rsn_cap from RSN ie buffer.
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
*
|
|
* @param data A pointer to rsn_ie data after IE header
|
|
* @param return rsn_cap
|
|
*/
|
|
static t_u16 wlan_get_rsn_cap(t_u8 *data)
|
|
{
|
|
t_u16 rsn_cap = 0;
|
|
t_u16 *ptr;
|
|
t_u16 pairwise_cipher_count = 0;
|
|
t_u16 akm_suite_count = 0;
|
|
/* rsn_cap = data + 2 bytes version + 4 bytes
|
|
* group_cipher_suite + 2 bytes pairwise_cipher_count +
|
|
* pairwise_cipher_count * PAIRWISE_CIPHER_SUITE_LEN + 2 bytes
|
|
* akm_suite_count + akm_suite_count * AKM_SUITE_LEN
|
|
*/
|
|
ptr = (t_u16 *)(data + sizeof(t_u16) + 4 * sizeof(t_u8));
|
|
pairwise_cipher_count = wlan_le16_to_cpu(*ptr);
|
|
ptr = (t_u16 *)(data + sizeof(t_u16) + 4 * sizeof(t_u8) +
|
|
sizeof(t_u16) +
|
|
pairwise_cipher_count * PAIRWISE_CIPHER_SUITE_LEN);
|
|
akm_suite_count = wlan_le16_to_cpu(*ptr);
|
|
ptr = (t_u16 *)(data + sizeof(t_u16) + 4 * sizeof(t_u8) +
|
|
sizeof(t_u16) +
|
|
pairwise_cipher_count * PAIRWISE_CIPHER_SUITE_LEN +
|
|
sizeof(t_u16) + akm_suite_count * AKM_SUITE_LEN);
|
|
rsn_cap = wlan_le16_to_cpu(*ptr);
|
|
PRINTM(MCMND, "rsn_cap=0x%x\n", rsn_cap);
|
|
return rsn_cap;
|
|
}
|
|
|
|
/**
|
|
* @brief This function check if we should enable 11w
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
*
|
|
* @param BSSDescriptor_t A pointer to BSSDescriptor_t data structure
|
|
* @param return MTRUE/MFALSE
|
|
*/
|
|
static t_u8 wlan_use_mfp(mlan_private *pmpriv, BSSDescriptor_t *pbss_desc)
|
|
{
|
|
t_u16 ap_rsn_cap = 0;
|
|
t_u16 sta_rsn_cap = 0;
|
|
t_u8 ap_mfpc, ap_mfpr;
|
|
t_u8 sta_mfpc, sta_mfpr;
|
|
|
|
if (pmpriv->wpa_ie[0] != RSN_IE)
|
|
return 0;
|
|
sta_rsn_cap = wlan_get_rsn_cap(pmpriv->wpa_ie + 2);
|
|
if (!pbss_desc->prsn_ie)
|
|
return 0;
|
|
ap_rsn_cap = wlan_get_rsn_cap(pbss_desc->prsn_ie->data);
|
|
ap_mfpc = ((ap_rsn_cap & (0x1 << MFPC_BIT)) == (0x1 << MFPC_BIT));
|
|
ap_mfpr = ((ap_rsn_cap & (0x1 << MFPR_BIT)) == (0x1 << MFPR_BIT));
|
|
sta_mfpc = ((sta_rsn_cap & (0x1 << MFPC_BIT)) == (0x1 << MFPC_BIT));
|
|
sta_mfpr = ((sta_rsn_cap & (0x1 << MFPR_BIT)) == (0x1 << MFPR_BIT));
|
|
if (!ap_mfpc && !ap_mfpr)
|
|
return MFALSE;
|
|
if (!sta_mfpc && !sta_mfpr)
|
|
return MFALSE;
|
|
return MTRUE;
|
|
}
|
|
|
|
/********************************************************
|
|
Global Functions
|
|
********************************************************/
|
|
|
|
/**
|
|
* @brief This function updates RSN IE in the association request.
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
*
|
|
* @param ptlv_rsn_ie A pointer to rsn_ie TLV
|
|
*/
|
|
static int wlan_update_rsn_ie(mlan_private *pmpriv,
|
|
MrvlIEtypes_RsnParamSet_t *ptlv_rsn_ie)
|
|
{
|
|
t_u16 *prsn_cap;
|
|
t_u16 *ptr;
|
|
t_u16 *akm_suite_count_ptr;
|
|
t_u16 pmf_mask = 0x00;
|
|
t_u8 *temp;
|
|
t_u16 pairwise_cipher_count = 0;
|
|
t_u16 akm_suite_count = 0;
|
|
t_u16 temp_akm_suite_count = 0;
|
|
int found = 0;
|
|
t_u8 sha_256_oui[4] = {0x00, 0x0f, 0xac, 0x06};
|
|
t_u8 sae_oui[4] = {0x00, 0x0f, 0xac, 0x08};
|
|
mlan_adapter *pmadapter = pmpriv->adapter;
|
|
|
|
int ap_mfpc = 0, ap_mfpr = 0, ret = MLAN_STATUS_SUCCESS;
|
|
|
|
pmf_mask = (((pmpriv->pmfcfg.mfpc << MFPC_BIT) |
|
|
(pmpriv->pmfcfg.mfpr << MFPR_BIT)) |
|
|
(~PMF_MASK));
|
|
/* prsn_cap = prsn_ie->rsn_ie + 2 bytes version + 4 bytes
|
|
* group_cipher_suite + 2 bytes pairwise_cipher_count +
|
|
* pairwise_cipher_count * PAIRWISE_CIPHER_SUITE_LEN + 2 bytes
|
|
* akm_suite_count + akm_suite_count * AKM_SUITE_LEN
|
|
*/
|
|
ptr = (t_u16 *)(ptlv_rsn_ie->rsn_ie + sizeof(t_u16) + 4 * sizeof(t_u8));
|
|
pairwise_cipher_count = wlan_le16_to_cpu(*ptr);
|
|
ptr = (t_u16 *)(ptlv_rsn_ie->rsn_ie + sizeof(t_u16) + 4 * sizeof(t_u8) +
|
|
sizeof(t_u16) +
|
|
pairwise_cipher_count * PAIRWISE_CIPHER_SUITE_LEN);
|
|
temp_akm_suite_count = wlan_le16_to_cpu(*ptr);
|
|
akm_suite_count = wlan_le16_to_cpu(*ptr);
|
|
/* Save pointer to akm_suite_count in RSN IE to update it later */
|
|
akm_suite_count_ptr = ptr;
|
|
temp = ptlv_rsn_ie->rsn_ie + sizeof(t_u16) + 4 * sizeof(t_u8) +
|
|
sizeof(t_u16) +
|
|
pairwise_cipher_count * PAIRWISE_CIPHER_SUITE_LEN +
|
|
sizeof(t_u16);
|
|
/* ptr now points to the 1st AKM suite */
|
|
if (temp_akm_suite_count > 1) {
|
|
while (temp_akm_suite_count) {
|
|
if (pmpriv->sec_info.authentication_mode ==
|
|
MLAN_AUTH_MODE_SAE) {
|
|
if (!memcmp(pmadapter, temp, sae_oui,
|
|
AKM_SUITE_LEN)) {
|
|
found = 1;
|
|
break;
|
|
}
|
|
} else if (!memcmp(pmadapter, temp, sha_256_oui,
|
|
AKM_SUITE_LEN)) {
|
|
found = 1;
|
|
break;
|
|
}
|
|
temp += AKM_SUITE_LEN;
|
|
temp_akm_suite_count--;
|
|
}
|
|
if (found) {
|
|
/* Copy SHA256 as AKM suite */
|
|
memcpy_ext(pmadapter,
|
|
ptlv_rsn_ie->rsn_ie +
|
|
(sizeof(t_u16) + 4 * sizeof(t_u8) +
|
|
sizeof(t_u16) +
|
|
pairwise_cipher_count *
|
|
PAIRWISE_CIPHER_SUITE_LEN +
|
|
sizeof(t_u16)),
|
|
temp, AKM_SUITE_LEN, AKM_SUITE_LEN);
|
|
/* Shift remaining bytes of RSN IE after this */
|
|
memmove(pmadapter,
|
|
ptlv_rsn_ie->rsn_ie +
|
|
(sizeof(t_u16) + 4 * sizeof(t_u8) +
|
|
sizeof(t_u16) +
|
|
pairwise_cipher_count *
|
|
PAIRWISE_CIPHER_SUITE_LEN +
|
|
sizeof(t_u16) + AKM_SUITE_LEN),
|
|
ptlv_rsn_ie->rsn_ie +
|
|
(sizeof(t_u16) + 4 * sizeof(t_u8) +
|
|
sizeof(t_u16) +
|
|
pairwise_cipher_count *
|
|
PAIRWISE_CIPHER_SUITE_LEN +
|
|
sizeof(t_u16) +
|
|
akm_suite_count * AKM_SUITE_LEN),
|
|
ptlv_rsn_ie->header.len -
|
|
(sizeof(t_u16) + 4 * sizeof(t_u8) +
|
|
sizeof(t_u16) +
|
|
pairwise_cipher_count *
|
|
PAIRWISE_CIPHER_SUITE_LEN +
|
|
sizeof(t_u16) +
|
|
akm_suite_count * AKM_SUITE_LEN));
|
|
ptlv_rsn_ie->header.len =
|
|
ptlv_rsn_ie->header.len -
|
|
(akm_suite_count - 1) * AKM_SUITE_LEN;
|
|
/* Update akm suite count */
|
|
akm_suite_count = 1;
|
|
*akm_suite_count_ptr = akm_suite_count;
|
|
}
|
|
}
|
|
ptr = (t_u16 *)(ptlv_rsn_ie->rsn_ie + sizeof(t_u16) + 4 * sizeof(t_u8) +
|
|
sizeof(t_u16) +
|
|
pairwise_cipher_count * PAIRWISE_CIPHER_SUITE_LEN +
|
|
sizeof(t_u16) + akm_suite_count * AKM_SUITE_LEN);
|
|
prsn_cap = ptr;
|
|
|
|
ap_mfpc = ((*prsn_cap & (0x1 << MFPC_BIT)) == (0x1 << MFPC_BIT));
|
|
ap_mfpr = ((*prsn_cap & (0x1 << MFPR_BIT)) == (0x1 << MFPR_BIT));
|
|
|
|
if ((!ap_mfpc && !ap_mfpr && pmpriv->pmfcfg.mfpr) ||
|
|
((!ap_mfpc) && ap_mfpr) ||
|
|
(ap_mfpc && ap_mfpr && (!pmpriv->pmfcfg.mfpc))) {
|
|
PRINTM(MERROR,
|
|
"Mismatch in PMF config of STA and AP, can't associate to AP\n");
|
|
return MLAN_STATUS_FAILURE;
|
|
}
|
|
if ((pmpriv->pmfcfg.mfpr && pmpriv->pmfcfg.mfpc) ||
|
|
pmpriv->pmfcfg.mfpc) {
|
|
*prsn_cap |= PMF_MASK;
|
|
*prsn_cap &= pmf_mask;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief This function is to find FT AKM in RSN.
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
*
|
|
* @param rsn_ie A pointer to rsn_ie
|
|
*
|
|
*/
|
|
t_u8 wlan_ft_akm_is_used(mlan_private *pmpriv, t_u8 *rsn_ie)
|
|
{
|
|
t_u8 *temp;
|
|
t_u16 count;
|
|
t_u16 pairwise_cipher_count = 0;
|
|
t_u16 akm_suite_count = 0;
|
|
t_u8 found = 0;
|
|
t_u8 rsn_ft_1x_oui[4] = {0x00, 0x0f, 0xac, 0x03};
|
|
t_u8 rsn_ft_psk_oui[4] = {0x00, 0x0f, 0xac, 0x04};
|
|
t_u8 rsn_ft_sae_oui[4] = {0x00, 0x0f, 0xac, 0x09};
|
|
mlan_adapter *pmadapter = pmpriv->adapter;
|
|
|
|
ENTER();
|
|
|
|
if (!rsn_ie)
|
|
goto done;
|
|
|
|
if (rsn_ie[0] != RSN_IE)
|
|
goto done;
|
|
|
|
/* 2 bytes header + 2 bytes version + 4 bytes group_cipher_suite +
|
|
* 2 bytes pairwise_cipher_count + pairwise_cipher_count *
|
|
* PAIRWISE_CIPHER_SUITE_LEN (4) + 2 bytes akm_suite_count +
|
|
* akm_suite_count * AKM_SUITE_LEN (4)
|
|
*/
|
|
count = *(t_u16 *)(rsn_ie + 2 + 2 + 4 * sizeof(t_u8));
|
|
pairwise_cipher_count = wlan_le16_to_cpu(count);
|
|
count = *(t_u16 *)(rsn_ie + 2 + 2 + 4 * sizeof(t_u8) + sizeof(t_u16) +
|
|
pairwise_cipher_count * 4);
|
|
akm_suite_count = wlan_le16_to_cpu(count);
|
|
temp = (t_u8 *)(rsn_ie + 2 + sizeof(t_u16) + 4 * sizeof(t_u8) +
|
|
sizeof(t_u16) + pairwise_cipher_count * 4 +
|
|
sizeof(t_u16));
|
|
|
|
while (akm_suite_count) {
|
|
if (!memcmp(pmadapter, temp, rsn_ft_1x_oui,
|
|
sizeof(rsn_ft_1x_oui)) ||
|
|
!memcmp(pmadapter, temp, rsn_ft_psk_oui,
|
|
sizeof(rsn_ft_psk_oui)) ||
|
|
!memcmp(pmadapter, temp, rsn_ft_sae_oui,
|
|
sizeof(rsn_ft_sae_oui))) {
|
|
found = 1;
|
|
break;
|
|
}
|
|
temp += 4;
|
|
akm_suite_count--;
|
|
}
|
|
|
|
done:
|
|
LEAVE();
|
|
return found;
|
|
}
|
|
|
|
/**
|
|
* @brief This function is to find specific IE.
|
|
*
|
|
* @param ie A pointer to ie buffer
|
|
* @param ie_len Length of ie buffer
|
|
* @param ie_type Type of ie that wants to be found in ie buffer
|
|
*
|
|
* @return MFALSE if not found; MTURE if found
|
|
*/
|
|
static t_u8 wlan_find_ie(t_u8 *ie, t_u8 ie_len, t_u8 ie_type)
|
|
{
|
|
IEEEtypes_Header_t *pheader = MNULL;
|
|
t_u8 *pos = MNULL;
|
|
t_s8 ret_len;
|
|
t_u8 ret = MFALSE;
|
|
|
|
ENTER();
|
|
|
|
pos = (t_u8 *)ie;
|
|
ret_len = ie_len;
|
|
while (ret_len >= 2) {
|
|
pheader = (IEEEtypes_Header_t *)pos;
|
|
if ((t_s8)(pheader->len + sizeof(IEEEtypes_Header_t)) >
|
|
ret_len) {
|
|
PRINTM(MMSG, "invalid IE length = %d left len %d\n",
|
|
pheader->len, ret_len);
|
|
break;
|
|
}
|
|
if (pheader->element_id == ie_type) {
|
|
ret = MTRUE;
|
|
break;
|
|
}
|
|
ret_len -= pheader->len + sizeof(IEEEtypes_Header_t);
|
|
pos += pheader->len + sizeof(IEEEtypes_Header_t);
|
|
}
|
|
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief This function prepares command of association.
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param cmd A pointer to HostCmd_DS_COMMAND structure
|
|
* @param pdata_buf A pointer cast of BSSDescriptor_t from the
|
|
* scan table to assoc
|
|
*
|
|
* @return MLAN_STATUS_SUCCESS or MLAN_STATUS_FAILURE
|
|
*/
|
|
mlan_status wlan_cmd_802_11_associate(mlan_private *pmpriv,
|
|
HostCmd_DS_COMMAND *cmd,
|
|
t_void *pdata_buf)
|
|
{
|
|
mlan_status ret = MLAN_STATUS_SUCCESS;
|
|
mlan_adapter *pmadapter = pmpriv->adapter;
|
|
HostCmd_DS_802_11_ASSOCIATE *passo = &cmd->params.associate;
|
|
BSSDescriptor_t *pbss_desc;
|
|
MrvlIEtypes_SsIdParamSet_t *pssid_tlv;
|
|
MrvlIEtypes_PhyParamSet_t *pphy_tlv;
|
|
MrvlIEtypes_SsParamSet_t *pss_tlv;
|
|
MrvlIEtypes_RatesParamSet_t *prates_tlv;
|
|
MrvlIEtypes_AuthType_t *pauth_tlv = MNULL;
|
|
MrvlIEtypes_RsnParamSet_t *prsn_ie_tlv = MNULL;
|
|
MrvlIEtypes_SAE_PWE_Mode_t *prsnx_ie_tlv = MNULL;
|
|
MrvlIEtypes_SecurityCfg_t *psecurity_cfg_ie = MNULL;
|
|
MrvlIEtypes_ChanListParamSet_t *pchan_tlv;
|
|
WLAN_802_11_RATES rates;
|
|
t_u32 rates_size;
|
|
t_u16 tmp_cap;
|
|
t_u8 *pos;
|
|
#ifdef DRV_EMBEDDED_SUPPLICANT
|
|
void *rsn_wpa_ie_tmp = MNULL;
|
|
#endif
|
|
t_u8 ft_akm = 0;
|
|
t_u8 oper_class;
|
|
t_u8 oper_class_flag = MFALSE;
|
|
MrvlIEtypes_HostMlme_t *host_mlme_tlv = MNULL;
|
|
MrvlIEtypes_PrevBssid_t *prev_bssid_tlv = MNULL;
|
|
t_u8 zero_mac[MLAN_MAC_ADDR_LENGTH] = {0};
|
|
|
|
ENTER();
|
|
|
|
pbss_desc = (BSSDescriptor_t *)pdata_buf;
|
|
pos = (t_u8 *)passo;
|
|
|
|
cmd->command = wlan_cpu_to_le16(HostCmd_CMD_802_11_ASSOCIATE);
|
|
|
|
/* Save so we know which BSS Desc to use in the response handler */
|
|
pmpriv->pattempted_bss_desc = pbss_desc;
|
|
/* clear assoc_rsp_size */
|
|
pmpriv->assoc_rsp_size = 0;
|
|
pmpriv->assoc_req_size = 0;
|
|
|
|
memcpy_ext(pmadapter, passo->peer_sta_addr, pbss_desc->mac_address,
|
|
sizeof(pbss_desc->mac_address),
|
|
sizeof(passo->peer_sta_addr));
|
|
pos += sizeof(passo->peer_sta_addr);
|
|
|
|
/* Set the listen interval */
|
|
passo->listen_interval = wlan_cpu_to_le16(pmpriv->listen_interval);
|
|
/* Set the beacon period */
|
|
passo->beacon_period = wlan_cpu_to_le16(pbss_desc->beacon_period);
|
|
|
|
pos += sizeof(passo->cap_info);
|
|
pos += sizeof(passo->listen_interval);
|
|
pos += sizeof(passo->beacon_period);
|
|
pos += sizeof(passo->dtim_period);
|
|
|
|
pssid_tlv = (MrvlIEtypes_SsIdParamSet_t *)pos;
|
|
pssid_tlv->header.type = wlan_cpu_to_le16(TLV_TYPE_SSID);
|
|
pssid_tlv->header.len = (t_u16)pbss_desc->ssid.ssid_len;
|
|
memcpy_ext(pmadapter, pssid_tlv->ssid, pbss_desc->ssid.ssid,
|
|
pssid_tlv->header.len, pssid_tlv->header.len);
|
|
pos += sizeof(pssid_tlv->header) + pssid_tlv->header.len;
|
|
pssid_tlv->header.len = wlan_cpu_to_le16(pssid_tlv->header.len);
|
|
|
|
pphy_tlv = (MrvlIEtypes_PhyParamSet_t *)pos;
|
|
pphy_tlv->header.type = wlan_cpu_to_le16(TLV_TYPE_PHY_DS);
|
|
pphy_tlv->header.len = sizeof(pphy_tlv->fh_ds.ds_param_set);
|
|
memcpy_ext(pmadapter, &pphy_tlv->fh_ds.ds_param_set,
|
|
&pbss_desc->phy_param_set.ds_param_set.current_chan,
|
|
sizeof(pphy_tlv->fh_ds.ds_param_set),
|
|
sizeof(pphy_tlv->fh_ds.ds_param_set));
|
|
pos += sizeof(pphy_tlv->header) + pphy_tlv->header.len;
|
|
pphy_tlv->header.len = wlan_cpu_to_le16(pphy_tlv->header.len);
|
|
|
|
pss_tlv = (MrvlIEtypes_SsParamSet_t *)pos;
|
|
pss_tlv->header.type = wlan_cpu_to_le16(TLV_TYPE_CF);
|
|
pss_tlv->header.len = sizeof(pss_tlv->cf_ibss.cf_param_set);
|
|
pos += sizeof(pss_tlv->header) + pss_tlv->header.len;
|
|
pss_tlv->header.len = wlan_cpu_to_le16(pss_tlv->header.len);
|
|
|
|
/* Get the common rates supported between the driver and the BSS Desc */
|
|
if (wlan_setup_rates_from_bssdesc(pmpriv, pbss_desc, rates,
|
|
&rates_size)) {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/* Save the data rates into Current BSS state structure */
|
|
pmpriv->curr_bss_params.num_of_rates = rates_size;
|
|
memcpy_ext(pmadapter, &pmpriv->curr_bss_params.data_rates, rates,
|
|
rates_size, WLAN_SUPPORTED_RATES);
|
|
|
|
/* Setup the Rates TLV in the association command */
|
|
prates_tlv = (MrvlIEtypes_RatesParamSet_t *)pos;
|
|
prates_tlv->header.type = wlan_cpu_to_le16(TLV_TYPE_RATES);
|
|
prates_tlv->header.len = wlan_cpu_to_le16((t_u16)rates_size);
|
|
memcpy_ext(pmadapter, prates_tlv->rates, rates, rates_size, rates_size);
|
|
pos += sizeof(prates_tlv->header) + rates_size;
|
|
PRINTM(MINFO, "ASSOC_CMD: Rates size = %d\n", rates_size);
|
|
|
|
/* Add the Authentication type to be used for Auth frames if needed */
|
|
if ((pmpriv->sec_info.authentication_mode != MLAN_AUTH_MODE_AUTO)) {
|
|
pauth_tlv = (MrvlIEtypes_AuthType_t *)pos;
|
|
pauth_tlv->header.type = wlan_cpu_to_le16(TLV_TYPE_AUTH_TYPE);
|
|
pauth_tlv->header.len = sizeof(pauth_tlv->auth_type);
|
|
if ((pmpriv->sec_info.wep_status == Wlan802_11WEPEnabled) ||
|
|
(pmpriv->sec_info.authentication_mode ==
|
|
MLAN_AUTH_MODE_NETWORKEAP))
|
|
pauth_tlv->auth_type = wlan_cpu_to_le16(
|
|
(t_u16)pmpriv->sec_info.authentication_mode);
|
|
else if (pmpriv->sec_info.authentication_mode ==
|
|
MLAN_AUTH_MODE_FT)
|
|
pauth_tlv->auth_type =
|
|
wlan_cpu_to_le16(AssocAgentAuth_FastBss_Skip);
|
|
else if (pmpriv->sec_info.authentication_mode ==
|
|
MLAN_AUTH_MODE_SAE)
|
|
pauth_tlv->auth_type =
|
|
wlan_cpu_to_le16(AssocAgentAuth_Wpa3Sae);
|
|
else
|
|
pauth_tlv->auth_type =
|
|
wlan_cpu_to_le16(MLAN_AUTH_MODE_OPEN);
|
|
pos += sizeof(pauth_tlv->header) + pauth_tlv->header.len;
|
|
pauth_tlv->header.len = wlan_cpu_to_le16(pauth_tlv->header.len);
|
|
}
|
|
|
|
if ((pauth_tlv != MNULL) &&
|
|
(pauth_tlv->auth_type ==
|
|
wlan_cpu_to_le16(AssocAgentAuth_Wpa3Sae))) {
|
|
if (pbss_desc->prsnx_ie && pbss_desc->prsnx_ie->ieee_hdr.len &&
|
|
(pbss_desc->prsnx_ie->data[0] & (0x1 << SAE_H2E_BIT))) {
|
|
MrvlIEtypes_SAE_PWE_Mode_t *psae_pwe_mode_tlv;
|
|
|
|
/* Setup the sae pwe derivation mode TLV in the
|
|
* association command */
|
|
psae_pwe_mode_tlv = (MrvlIEtypes_SAE_PWE_Mode_t *)pos;
|
|
psae_pwe_mode_tlv->header.type = wlan_cpu_to_le16(
|
|
TLV_TYPE_WPA3_SAE_PWE_DERIVATION_MODE);
|
|
psae_pwe_mode_tlv->header.len =
|
|
sizeof(psae_pwe_mode_tlv->pwe);
|
|
psae_pwe_mode_tlv->pwe[0] =
|
|
pbss_desc->prsnx_ie->data[0];
|
|
pos += sizeof(psae_pwe_mode_tlv->header) +
|
|
sizeof(psae_pwe_mode_tlv->pwe);
|
|
}
|
|
}
|
|
|
|
if (IS_SUPPORT_MULTI_BANDS(pmadapter) &&
|
|
(pbss_desc->bss_band & pmpriv->config_bands) &&
|
|
!(ISSUPP_11NENABLED(pmadapter->fw_cap_info) &&
|
|
(!pbss_desc->disable_11n) &&
|
|
(pmpriv->config_bands & BAND_GN ||
|
|
pmpriv->config_bands & BAND_AN) &&
|
|
(pbss_desc->pht_cap))) {
|
|
/* Append a channel TLV for the channel the attempted AP was
|
|
* found on */
|
|
pchan_tlv = (MrvlIEtypes_ChanListParamSet_t *)pos;
|
|
pchan_tlv->header.type = wlan_cpu_to_le16(TLV_TYPE_CHANLIST);
|
|
pchan_tlv->header.len =
|
|
wlan_cpu_to_le16(sizeof(ChanScanParamSet_t));
|
|
|
|
memset(pmadapter, pchan_tlv->chan_scan_param, 0x00,
|
|
sizeof(ChanScanParamSet_t));
|
|
pchan_tlv->chan_scan_param[0].chan_number =
|
|
(pbss_desc->phy_param_set.ds_param_set.current_chan);
|
|
PRINTM(MINFO, "Assoc: TLV Chan = %d\n",
|
|
pchan_tlv->chan_scan_param[0].chan_number);
|
|
|
|
pchan_tlv->chan_scan_param[0].bandcfg.chanBand =
|
|
wlan_band_to_radio_type(pbss_desc->bss_band);
|
|
PRINTM(MINFO, "Assoc: TLV Bandcfg = %x\n",
|
|
pchan_tlv->chan_scan_param[0].bandcfg);
|
|
pos += sizeof(pchan_tlv->header) + sizeof(ChanScanParamSet_t);
|
|
}
|
|
if (!pmpriv->wps.session_enable) {
|
|
if ((pmpriv->sec_info.wpa_enabled ||
|
|
pmpriv->sec_info.wpa2_enabled)) {
|
|
prsn_ie_tlv = (MrvlIEtypes_RsnParamSet_t *)pos;
|
|
/* WPA_IE or RSN_IE */
|
|
prsn_ie_tlv->header.type = (t_u16)pmpriv->wpa_ie[0];
|
|
prsn_ie_tlv->header.type =
|
|
prsn_ie_tlv->header.type & 0x00FF;
|
|
prsn_ie_tlv->header.type =
|
|
wlan_cpu_to_le16(prsn_ie_tlv->header.type);
|
|
prsn_ie_tlv->header.len = (t_u16)pmpriv->wpa_ie[1];
|
|
prsn_ie_tlv->header.len =
|
|
prsn_ie_tlv->header.len & 0x00FF;
|
|
if (prsn_ie_tlv->header.len <=
|
|
(sizeof(pmpriv->wpa_ie) - 2))
|
|
memcpy_ext(pmadapter, prsn_ie_tlv->rsn_ie,
|
|
&pmpriv->wpa_ie[2],
|
|
prsn_ie_tlv->header.len,
|
|
prsn_ie_tlv->header.len);
|
|
else {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
HEXDUMP("ASSOC_CMD: RSN IE", (t_u8 *)prsn_ie_tlv,
|
|
sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len);
|
|
pos += sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len;
|
|
prsn_ie_tlv->header.len =
|
|
wlan_cpu_to_le16(prsn_ie_tlv->header.len);
|
|
/** parse rsn ie to find whether ft akm is used*/
|
|
ft_akm = wlan_ft_akm_is_used(pmpriv, pmpriv->wpa_ie);
|
|
/* Append PMF Configuration coming from cfg80211 layer
|
|
*/
|
|
psecurity_cfg_ie = (MrvlIEtypes_SecurityCfg_t *)pos;
|
|
psecurity_cfg_ie->header.type =
|
|
wlan_cpu_to_le16(TLV_TYPE_SECURITY_CFG);
|
|
|
|
pmpriv->curr_bss_params.use_mfp =
|
|
wlan_use_mfp(pmpriv, pbss_desc);
|
|
PRINTM(MCMND, "use_mfp=%d\n",
|
|
pmpriv->curr_bss_params.use_mfp);
|
|
|
|
if (!pmpriv->curr_bss_params.use_mfp)
|
|
psecurity_cfg_ie->use_mfp = MFALSE;
|
|
else
|
|
psecurity_cfg_ie->use_mfp = MTRUE;
|
|
psecurity_cfg_ie->header.len = sizeof(t_u8);
|
|
pos += sizeof(psecurity_cfg_ie->header) +
|
|
psecurity_cfg_ie->header.len;
|
|
}
|
|
#ifdef DRV_EMBEDDED_SUPPLICANT
|
|
else if (supplicantIsEnabled(pmpriv->psapriv)) {
|
|
supplicantClrEncryptKey(pmpriv->psapriv);
|
|
|
|
if (pbss_desc->prsn_ie)
|
|
rsn_wpa_ie_tmp = pbss_desc->prsn_ie;
|
|
else if (pbss_desc->pwpa_ie)
|
|
rsn_wpa_ie_tmp = pbss_desc->pwpa_ie;
|
|
prsn_ie_tlv = (MrvlIEtypes_RsnParamSet_t *)pos;
|
|
pos += supplicantFormatRsnWpaTlv(
|
|
pmpriv->psapriv, rsn_wpa_ie_tmp, prsn_ie_tlv);
|
|
}
|
|
#endif
|
|
else if (pmpriv->sec_info.ewpa_enabled) {
|
|
prsn_ie_tlv = (MrvlIEtypes_RsnParamSet_t *)pos;
|
|
if (pbss_desc->pwpa_ie) {
|
|
prsn_ie_tlv->header.type =
|
|
(t_u16)(*(pbss_desc->pwpa_ie))
|
|
.vend_hdr.element_id;
|
|
prsn_ie_tlv->header.type =
|
|
prsn_ie_tlv->header.type & 0x00FF;
|
|
prsn_ie_tlv->header.type = wlan_cpu_to_le16(
|
|
prsn_ie_tlv->header.type);
|
|
prsn_ie_tlv->header.len =
|
|
(t_u16)(*(pbss_desc->pwpa_ie))
|
|
.vend_hdr.len;
|
|
prsn_ie_tlv->header.len =
|
|
prsn_ie_tlv->header.len & 0x00FF;
|
|
if (prsn_ie_tlv->header.len <=
|
|
(sizeof(pmpriv->wpa_ie))) {
|
|
memcpy_ext(pmadapter,
|
|
prsn_ie_tlv->rsn_ie,
|
|
&((*(pbss_desc->pwpa_ie))
|
|
.vend_hdr.oui[0]),
|
|
prsn_ie_tlv->header.len,
|
|
prsn_ie_tlv->header.len);
|
|
} else {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
HEXDUMP("ASSOC_CMD: RSN IE",
|
|
(t_u8 *)prsn_ie_tlv,
|
|
sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len);
|
|
pos += sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len;
|
|
prsn_ie_tlv->header.len = wlan_cpu_to_le16(
|
|
prsn_ie_tlv->header.len);
|
|
}
|
|
if (pbss_desc->prsn_ie) {
|
|
prsn_ie_tlv = (MrvlIEtypes_RsnParamSet_t *)pos;
|
|
prsn_ie_tlv->header.type =
|
|
(t_u16)(*(pbss_desc->prsn_ie))
|
|
.ieee_hdr.element_id;
|
|
prsn_ie_tlv->header.type =
|
|
prsn_ie_tlv->header.type & 0x00FF;
|
|
prsn_ie_tlv->header.type = wlan_cpu_to_le16(
|
|
prsn_ie_tlv->header.type);
|
|
prsn_ie_tlv->header.len =
|
|
(t_u16)(*(pbss_desc->prsn_ie))
|
|
.ieee_hdr.len;
|
|
prsn_ie_tlv->header.len =
|
|
prsn_ie_tlv->header.len & 0x00FF;
|
|
if (prsn_ie_tlv->header.len <=
|
|
(sizeof(pmpriv->wpa_ie))) {
|
|
memcpy_ext(pmadapter,
|
|
prsn_ie_tlv->rsn_ie,
|
|
&((*(pbss_desc->prsn_ie))
|
|
.data[0]),
|
|
prsn_ie_tlv->header.len,
|
|
prsn_ie_tlv->header.len);
|
|
ret = wlan_update_rsn_ie(pmpriv,
|
|
prsn_ie_tlv);
|
|
if (ret != MLAN_STATUS_SUCCESS) {
|
|
goto done;
|
|
}
|
|
} else {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
HEXDUMP("ASSOC_CMD: RSN IE",
|
|
(t_u8 *)prsn_ie_tlv,
|
|
sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len);
|
|
pos += sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len;
|
|
prsn_ie_tlv->header.len = wlan_cpu_to_le16(
|
|
prsn_ie_tlv->header.len);
|
|
}
|
|
if (pbss_desc->prsnx_ie) {
|
|
prsnx_ie_tlv =
|
|
(MrvlIEtypes_SAE_PWE_Mode_t *)pos;
|
|
prsnx_ie_tlv->header.type =
|
|
(t_u16)(*(pbss_desc->prsnx_ie))
|
|
.ieee_hdr.element_id;
|
|
prsnx_ie_tlv->header.type =
|
|
prsnx_ie_tlv->header.type & 0x00FF;
|
|
prsnx_ie_tlv->header.type = wlan_cpu_to_le16(
|
|
prsnx_ie_tlv->header.type);
|
|
prsnx_ie_tlv->header.len =
|
|
(t_u16)(*(pbss_desc->prsnx_ie))
|
|
.ieee_hdr.len;
|
|
prsnx_ie_tlv->header.len =
|
|
prsnx_ie_tlv->header.len & 0x00FF;
|
|
|
|
memcpy_ext(pmadapter, prsnx_ie_tlv->pwe,
|
|
&((*(pbss_desc->prsnx_ie)).data[0]),
|
|
prsnx_ie_tlv->header.len,
|
|
prsnx_ie_tlv->header.len);
|
|
|
|
HEXDUMP("ASSOC_CMD: RSNX IE",
|
|
(t_u8 *)prsnx_ie_tlv,
|
|
sizeof(prsnx_ie_tlv->header) +
|
|
prsnx_ie_tlv->header.len);
|
|
|
|
pos += sizeof(prsnx_ie_tlv->header) +
|
|
prsnx_ie_tlv->header.len;
|
|
prsnx_ie_tlv->header.len = wlan_cpu_to_le16(
|
|
prsnx_ie_tlv->header.len);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (ISSUPP_11NENABLED(pmadapter->fw_cap_info) &&
|
|
(!pbss_desc->disable_11n) &&
|
|
wlan_11n_bandconfig_allowed(pmpriv, pbss_desc->bss_band))
|
|
wlan_cmd_append_11n_tlv(pmpriv, pbss_desc, &pos);
|
|
else if ((pmpriv->hotspot_cfg & HOTSPOT_ENABLED) &&
|
|
!(pmpriv->hotspot_cfg & HOTSPOT_BY_SUPPLICANT))
|
|
wlan_add_ext_capa_info_ie(pmpriv, pbss_desc, &pos);
|
|
if (pmpriv->adapter->ecsa_enable) {
|
|
oper_class_flag =
|
|
wlan_find_ie(pmpriv->gen_ie_buf, pmpriv->gen_ie_buf_len,
|
|
REGULATORY_CLASS);
|
|
if (!oper_class_flag) {
|
|
if (MLAN_STATUS_SUCCESS ==
|
|
wlan_get_curr_oper_class(
|
|
pmpriv,
|
|
pbss_desc->phy_param_set.ds_param_set
|
|
.current_chan,
|
|
pbss_desc->curr_bandwidth, &oper_class))
|
|
wlan_add_supported_oper_class_ie(pmpriv, &pos,
|
|
oper_class);
|
|
}
|
|
}
|
|
if (ISSUPP_11ACENABLED(pmadapter->fw_cap_info) &&
|
|
(!pbss_desc->disable_11n) &&
|
|
wlan_11ac_bandconfig_allowed(pmpriv, pbss_desc->bss_band))
|
|
wlan_cmd_append_11ac_tlv(pmpriv, pbss_desc, &pos);
|
|
|
|
if ((IS_FW_SUPPORT_11AX(pmadapter)) &&
|
|
wlan_11ax_bandconfig_allowed(pmpriv, pbss_desc))
|
|
wlan_cmd_append_11ax_tlv(pmpriv, pbss_desc, &pos);
|
|
|
|
wlan_wmm_process_association_req(pmpriv, &pos, &pbss_desc->wmm_ie);
|
|
if (pmpriv->sec_info.wapi_enabled && pmpriv->wapi_ie_len)
|
|
wlan_cmd_append_wapi_ie(pmpriv, &pos);
|
|
|
|
if (pmpriv->sec_info.osen_enabled && pmpriv->osen_ie_len)
|
|
wlan_cmd_append_osen_ie(pmpriv, &pos);
|
|
|
|
wlan_cmd_append_generic_ie(pmpriv, &pos);
|
|
|
|
if (ft_akm && pbss_desc->pmd_ie)
|
|
wlan_cmd_append_pass_through_ie(
|
|
pmpriv, (IEEEtypes_Generic_t *)pbss_desc->pmd_ie, &pos);
|
|
wlan_cmd_append_tsf_tlv(pmpriv, &pos, pbss_desc);
|
|
|
|
if (pmpriv->curr_bss_params.host_mlme) {
|
|
host_mlme_tlv = (MrvlIEtypes_HostMlme_t *)pos;
|
|
host_mlme_tlv->header.type =
|
|
wlan_cpu_to_le16(TLV_TYPE_HOST_MLME);
|
|
host_mlme_tlv->header.len =
|
|
wlan_cpu_to_le16(sizeof(host_mlme_tlv->host_mlme));
|
|
host_mlme_tlv->host_mlme = MTRUE;
|
|
pos += sizeof(host_mlme_tlv->header) +
|
|
host_mlme_tlv->header.len;
|
|
}
|
|
if (memcmp(pmadapter, &pmpriv->curr_bss_params.prev_bssid, zero_mac,
|
|
MLAN_MAC_ADDR_LENGTH)) {
|
|
prev_bssid_tlv = (MrvlIEtypes_PrevBssid_t *)pos;
|
|
prev_bssid_tlv->header.type =
|
|
wlan_cpu_to_le16(TLV_TYPE_PREV_BSSID);
|
|
prev_bssid_tlv->header.len = MLAN_MAC_ADDR_LENGTH;
|
|
memcpy_ext(pmadapter, prev_bssid_tlv->prev_bssid,
|
|
&pmpriv->curr_bss_params.prev_bssid,
|
|
MLAN_MAC_ADDR_LENGTH, MLAN_MAC_ADDR_LENGTH);
|
|
PRINTM(MCMND, "ASSOCIATE: PREV_BSSID = " MACSTR "\n",
|
|
MAC2STR(pmpriv->curr_bss_params.prev_bssid));
|
|
pos += sizeof(prev_bssid_tlv->header) + MLAN_MAC_ADDR_LENGTH;
|
|
}
|
|
|
|
if (wlan_11d_create_dnld_countryinfo(pmpriv, pbss_desc->bss_band)) {
|
|
PRINTM(MERROR, "Dnld_countryinfo_11d failed\n");
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
if (wlan_11d_parse_dnld_countryinfo(pmpriv,
|
|
pmpriv->pattempted_bss_desc)) {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/*
|
|
* Call 11h join API after capability bits are set so adhoc/infra 11h
|
|
* behavior can be properly triggered. pos modified if data is appended
|
|
*/
|
|
wlan_11h_process_join(
|
|
pmpriv, &pos, &passo->cap_info, (t_u8)pbss_desc->bss_band,
|
|
pbss_desc->phy_param_set.ds_param_set.current_chan,
|
|
&pbss_desc->wlan_11h_bss_info);
|
|
|
|
cmd->size = wlan_cpu_to_le16((t_u16)(pos - (t_u8 *)passo) + S_DS_GEN);
|
|
|
|
/* Set the Capability info at last */
|
|
memcpy_ext(pmadapter, &tmp_cap, &pbss_desc->cap_info,
|
|
sizeof(passo->cap_info), sizeof(tmp_cap));
|
|
|
|
if (pmpriv->config_bands == BAND_B)
|
|
SHORT_SLOT_TIME_DISABLED(tmp_cap);
|
|
|
|
tmp_cap &= CAPINFO_MASK;
|
|
PRINTM(MINFO, "ASSOC_CMD: tmp_cap=%4X CAPINFO_MASK=%4lX\n", tmp_cap,
|
|
CAPINFO_MASK);
|
|
tmp_cap = wlan_cpu_to_le16(tmp_cap);
|
|
memcpy_ext(pmadapter, &passo->cap_info, &tmp_cap, sizeof(tmp_cap),
|
|
sizeof(passo->cap_info));
|
|
|
|
done:
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Association firmware command response handler
|
|
*
|
|
* The response buffer for the association command has the following
|
|
* memory layout.
|
|
*
|
|
* For cases where an association response was not received (indicated
|
|
* by the CapInfo and AId field):
|
|
*
|
|
* .------------------------------------------------------------.
|
|
* | Header(4 * sizeof(t_u16)): Standard command response hdr |
|
|
* .------------------------------------------------------------.
|
|
* | cap_info/Error Return(t_u16): |
|
|
* | 0xFFFF(-1): Internal error for association |
|
|
* | 0xFFFE(-2): Authentication unhandled message |
|
|
* | 0xFFFD(-3): Authentication refused |
|
|
* | 0xFFFC(-4): Timeout waiting for AP response |
|
|
* | 0xFFFB(-5): Internal error for authentication |
|
|
* .------------------------------------------------------------.
|
|
* | status_code(t_u16): |
|
|
* | If cap_info is -1: |
|
|
* | An internal firmware failure prevented the |
|
|
* | command from being processed. The status code |
|
|
* | is 6 if associate response parameter invlaid, |
|
|
* | 1 otherwise. |
|
|
* | |
|
|
* | If cap_info is -2: |
|
|
* | An authentication frame was received but was |
|
|
* | not handled by the firmware. IEEE Status code |
|
|
* | for the failure is returned. |
|
|
* | |
|
|
* | If cap_info is -3: |
|
|
* | An authentication frame was received and the |
|
|
* | status_code is the IEEE Status reported in the |
|
|
* | response. |
|
|
* | |
|
|
* | If cap_info is -4: |
|
|
* | (1) Association response timeout |
|
|
* | (2) Authentication response timeout |
|
|
* | |
|
|
* | If cap_info is -5: |
|
|
* | An internal firmware failure prevented the |
|
|
* | command from being processed. The status code |
|
|
* | is 6 if authentication parameter invlaid, |
|
|
* | 1 otherwise. |
|
|
* .------------------------------------------------------------.
|
|
* | a_id(t_u16): 0xFFFF |
|
|
* .------------------------------------------------------------.
|
|
*
|
|
*
|
|
* For cases where an association response was received, the IEEE
|
|
* standard association response frame is returned:
|
|
*
|
|
* .------------------------------------------------------------.
|
|
* | Header(4 * sizeof(t_u16)): Standard command response hdr |
|
|
* .------------------------------------------------------------.
|
|
* | cap_info(t_u16): IEEE Capability |
|
|
* .------------------------------------------------------------.
|
|
* | status_code(t_u16): IEEE Status Code |
|
|
* .------------------------------------------------------------.
|
|
* | a_id(t_u16): IEEE Association ID |
|
|
* .------------------------------------------------------------.
|
|
* | IEEE IEs(variable): Any received IEs comprising the |
|
|
* | remaining portion of a received |
|
|
* | association response frame. |
|
|
* .------------------------------------------------------------.
|
|
*
|
|
* For simplistic handling, the status_code field can be used to determine
|
|
* an association success (0) or failure (non-zero).
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param resp A pointer to HostCmd_DS_COMMAND
|
|
* @param pioctl_buf A pointer to mlan_ioctl_req structure
|
|
*
|
|
* @return MLAN_STATUS_SUCCESS or MLAN_STATUS_FAILURE
|
|
*/
|
|
mlan_status wlan_ret_802_11_associate(mlan_private *pmpriv,
|
|
HostCmd_DS_COMMAND *resp,
|
|
t_void *pioctl_buf)
|
|
{
|
|
mlan_status ret = MLAN_STATUS_SUCCESS;
|
|
mlan_ioctl_req *pioctl_req = (mlan_ioctl_req *)pioctl_buf;
|
|
IEEEtypes_AssocRsp_t *passoc_rsp;
|
|
BSSDescriptor_t *pbss_desc;
|
|
t_u8 enable_data = MTRUE;
|
|
t_u8 event_buf[100];
|
|
mlan_event *pevent = (mlan_event *)event_buf;
|
|
t_u8 cur_mac[MLAN_MAC_ADDR_LENGTH];
|
|
t_u8 media_connected = pmpriv->media_connected;
|
|
mlan_adapter *pmadapter = pmpriv->adapter;
|
|
assoc_logger_data *assoc_succ;
|
|
mlan_ds_bss *bss;
|
|
IEEEtypes_MgmtHdr_t *hdr;
|
|
|
|
ENTER();
|
|
|
|
if (pmpriv->curr_bss_params.host_mlme) {
|
|
hdr = (IEEEtypes_MgmtHdr_t *)&resp->params;
|
|
if (!memcmp(pmpriv->adapter, hdr->BssId,
|
|
pmpriv->pattempted_bss_desc->mac_address,
|
|
MLAN_MAC_ADDR_LENGTH))
|
|
passoc_rsp = (IEEEtypes_AssocRsp_t
|
|
*)((t_u8 *)(&resp->params) +
|
|
sizeof(IEEEtypes_MgmtHdr_t));
|
|
else
|
|
passoc_rsp = (IEEEtypes_AssocRsp_t *)&resp->params;
|
|
} else
|
|
|
|
passoc_rsp = (IEEEtypes_AssocRsp_t *)&resp->params;
|
|
passoc_rsp->status_code = wlan_le16_to_cpu(passoc_rsp->status_code);
|
|
if (pmpriv->media_connected == MTRUE)
|
|
memcpy_ext(pmpriv->adapter, cur_mac,
|
|
pmpriv->curr_bss_params.bss_descriptor.mac_address,
|
|
MLAN_MAC_ADDR_LENGTH, MLAN_MAC_ADDR_LENGTH);
|
|
|
|
HEXDUMP("ASSOC_RESP:", (t_u8 *)&resp->params, (resp->size - S_DS_GEN));
|
|
|
|
pmpriv->assoc_rsp_size =
|
|
MIN(resp->size - S_DS_GEN, sizeof(pmpriv->assoc_rsp_buf));
|
|
|
|
memcpy_ext(pmpriv->adapter, pmpriv->assoc_rsp_buf, &resp->params,
|
|
pmpriv->assoc_rsp_size, pmpriv->assoc_rsp_size);
|
|
|
|
if (pioctl_req != MNULL) {
|
|
bss = (mlan_ds_bss *)pioctl_req->pbuf;
|
|
bss->param.ssid_bssid.assoc_rsp.assoc_resp_len =
|
|
pmpriv->assoc_rsp_size;
|
|
memcpy_ext(pmpriv->adapter,
|
|
bss->param.ssid_bssid.assoc_rsp.assoc_resp_buf,
|
|
pmpriv->assoc_rsp_buf, pmpriv->assoc_rsp_size,
|
|
ASSOC_RSP_BUF_SIZE);
|
|
}
|
|
if (passoc_rsp->status_code) {
|
|
if (pmpriv->media_connected == MTRUE) {
|
|
if (pmpriv->port_ctrl_mode == MTRUE)
|
|
pmpriv->port_open = pmpriv->prior_port_status;
|
|
if (!memcmp(pmpriv->adapter, cur_mac,
|
|
pmpriv->pattempted_bss_desc->mac_address,
|
|
MLAN_MAC_ADDR_LENGTH))
|
|
wlan_reset_connect_state(pmpriv, MTRUE);
|
|
else
|
|
wlan_recv_event(
|
|
pmpriv,
|
|
MLAN_EVENT_ID_DRV_ASSOC_FAILURE_REPORT,
|
|
MNULL);
|
|
} else
|
|
wlan_reset_connect_state(pmpriv, MTRUE);
|
|
pmpriv->adapter->dbg.num_cmd_assoc_failure++;
|
|
pmpriv->adapter->dbg.num_cons_assoc_failure++;
|
|
PRINTM(MERROR,
|
|
"ASSOC_RESP: Association Failed, "
|
|
"status code = %d, error = 0x%x, a_id = 0x%x\n",
|
|
passoc_rsp->status_code,
|
|
wlan_le16_to_cpu(*(t_u16 *)&passoc_rsp->capability),
|
|
wlan_le16_to_cpu(passoc_rsp->a_id));
|
|
memset(pmadapter, event_buf, 0, sizeof(event_buf));
|
|
pevent->bss_index = pmpriv->bss_index;
|
|
pevent->event_id = MLAN_EVENT_ID_DRV_ASSOC_FAILURE_LOGGER;
|
|
pevent->event_len = sizeof(passoc_rsp->status_code);
|
|
memcpy_ext(pmpriv->adapter, (t_u8 *)pevent->event_buf,
|
|
&passoc_rsp->status_code, pevent->event_len,
|
|
pevent->event_len);
|
|
wlan_recv_event(pmpriv, MLAN_EVENT_ID_DRV_ASSOC_FAILURE_LOGGER,
|
|
pevent);
|
|
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/* Send a Media Connected event, according to the Spec */
|
|
pmpriv->media_connected = MTRUE;
|
|
pmpriv->adapter->pps_uapsd_mode = MFALSE;
|
|
pmpriv->adapter->tx_lock_flag = MFALSE;
|
|
pmpriv->adapter->delay_null_pkt = MFALSE;
|
|
|
|
/* Set the attempted BSSID Index to current */
|
|
pbss_desc = pmpriv->pattempted_bss_desc;
|
|
|
|
PRINTM(MCMND, "ASSOC_RESP: %-32s (a_id = 0x%x)\n", pbss_desc->ssid.ssid,
|
|
wlan_le16_to_cpu(passoc_rsp->a_id));
|
|
/* Restore default extended capabilities */
|
|
memcpy_ext(pmpriv->adapter, &pmpriv->ext_cap, &pmpriv->def_ext_cap,
|
|
sizeof(pmpriv->ext_cap), sizeof(pmpriv->ext_cap));
|
|
/* Make a copy of current BSSID descriptor */
|
|
memcpy_ext(pmpriv->adapter, &pmpriv->curr_bss_params.bss_descriptor,
|
|
pbss_desc, sizeof(BSSDescriptor_t), sizeof(BSSDescriptor_t));
|
|
|
|
/* Update curr_bss_params */
|
|
pmpriv->curr_bss_params.bss_descriptor.channel =
|
|
pbss_desc->phy_param_set.ds_param_set.current_chan;
|
|
|
|
pmpriv->curr_bss_params.band = pbss_desc->bss_band;
|
|
|
|
/* Store current channel for further reference.
|
|
* This would save one extra call to get current
|
|
* channel when disconnect/bw_ch event is raised.
|
|
*/
|
|
pmpriv->adapter->dfsr_channel =
|
|
pmpriv->curr_bss_params.bss_descriptor.channel;
|
|
|
|
/*`
|
|
* Adjust the timestamps in the scan table to be relative to the newly
|
|
* associated AP's TSF
|
|
*/
|
|
wlan_update_tsf_timestamps(pmpriv, pbss_desc);
|
|
|
|
if (pbss_desc->wmm_ie.vend_hdr.element_id == WMM_IE)
|
|
pmpriv->curr_bss_params.wmm_enabled = MTRUE;
|
|
else
|
|
pmpriv->curr_bss_params.wmm_enabled = MFALSE;
|
|
|
|
if (pmpriv->wmm_required && pmpriv->curr_bss_params.wmm_enabled)
|
|
pmpriv->wmm_enabled = MTRUE;
|
|
else
|
|
pmpriv->wmm_enabled = MFALSE;
|
|
|
|
pmpriv->curr_bss_params.wmm_uapsd_enabled = MFALSE;
|
|
|
|
if (pmpriv->wmm_enabled == MTRUE)
|
|
pmpriv->curr_bss_params.wmm_uapsd_enabled =
|
|
pbss_desc->wmm_ie.qos_info.qos_uapsd;
|
|
|
|
PRINTM(MINFO, "ASSOC_RESP: curr_pkt_filter is 0x%x\n",
|
|
pmpriv->curr_pkt_filter);
|
|
if (pmpriv->sec_info.wpa_enabled || pmpriv->sec_info.wpa2_enabled)
|
|
pmpriv->wpa_is_gtk_set = MFALSE;
|
|
if (pmpriv->wmm_enabled)
|
|
/* Don't re-enable carrier until we get the WMM_GET_STATUS event
|
|
*/
|
|
enable_data = MFALSE;
|
|
else
|
|
/* Since WMM is not enabled, setup the queues with the defaults
|
|
*/
|
|
wlan_wmm_setup_queues(pmpriv);
|
|
|
|
if (enable_data)
|
|
PRINTM(MINFO, "Post association, re-enabling data flow\n");
|
|
|
|
/* Reset SNR/NF/RSSI values */
|
|
pmpriv->data_rssi_last = 0;
|
|
pmpriv->data_nf_last = 0;
|
|
pmpriv->data_rssi_avg = 0;
|
|
pmpriv->data_nf_avg = 0;
|
|
pmpriv->bcn_rssi_last = 0;
|
|
pmpriv->bcn_nf_last = 0;
|
|
pmpriv->bcn_rssi_avg = 0;
|
|
pmpriv->bcn_nf_avg = 0;
|
|
pmpriv->rxpd_rate = 0;
|
|
pmpriv->rxpd_rate_info = 0;
|
|
/* Reset mib statistics*/
|
|
pmpriv->amsdu_rx_cnt = 0;
|
|
pmpriv->amsdu_tx_cnt = 0;
|
|
pmpriv->msdu_in_rx_amsdu_cnt = 0;
|
|
pmpriv->msdu_in_tx_amsdu_cnt = 0;
|
|
if (pbss_desc->pvht_cap && pbss_desc->pht_cap) {
|
|
if (GET_VHTCAP_MAXMPDULEN(
|
|
pbss_desc->pvht_cap->vht_cap.vht_cap_info) == 2)
|
|
pmpriv->max_amsdu = MLAN_TX_DATA_BUF_SIZE_12K;
|
|
else if (GET_VHTCAP_MAXMPDULEN(
|
|
pbss_desc->pvht_cap->vht_cap.vht_cap_info) ==
|
|
1)
|
|
pmpriv->max_amsdu = MLAN_TX_DATA_BUF_SIZE_8K;
|
|
else
|
|
pmpriv->max_amsdu = MLAN_TX_DATA_BUF_SIZE_4K;
|
|
} else if (pbss_desc->pht_cap) {
|
|
if (GETHT_MAXAMSDU(pbss_desc->pht_cap->ht_cap.ht_cap_info))
|
|
pmpriv->max_amsdu = MLAN_TX_DATA_BUF_SIZE_8K;
|
|
else
|
|
pmpriv->max_amsdu = MLAN_TX_DATA_BUF_SIZE_4K;
|
|
}
|
|
|
|
wlan_save_curr_bcn(pmpriv);
|
|
|
|
pmpriv->adapter->dbg.num_cmd_assoc_success++;
|
|
pmpriv->adapter->dbg.num_cons_assoc_failure = 0;
|
|
PRINTM(MINFO, "ASSOC_RESP: Associated\n");
|
|
pevent->bss_index = pmpriv->bss_index;
|
|
pevent->event_id = MLAN_EVENT_ID_DRV_CONNECTED;
|
|
pevent->event_len = MLAN_MAC_ADDR_LENGTH;
|
|
memcpy_ext(pmpriv->adapter, (t_u8 *)pevent->event_buf,
|
|
(t_u8 *)pmpriv->curr_bss_params.bss_descriptor.mac_address,
|
|
MLAN_MAC_ADDR_LENGTH, pevent->event_len);
|
|
|
|
/* Add the ra_list here for infra mode as there will be only 1 ra always
|
|
*/
|
|
if (media_connected) {
|
|
/** replace ralist's mac address with new mac address */
|
|
if (0 ==
|
|
wlan_ralist_update(
|
|
pmpriv, cur_mac,
|
|
pmpriv->curr_bss_params.bss_descriptor.mac_address))
|
|
wlan_ralist_add(pmpriv,
|
|
pmpriv->curr_bss_params.bss_descriptor
|
|
.mac_address);
|
|
wlan_11n_cleanup_reorder_tbl(pmpriv);
|
|
wlan_11n_deleteall_txbastream_tbl(pmpriv);
|
|
|
|
} else
|
|
wlan_ralist_add(
|
|
pmpriv,
|
|
pmpriv->curr_bss_params.bss_descriptor.mac_address);
|
|
|
|
wlan_recv_event(pmpriv, MLAN_EVENT_ID_DRV_CONNECTED, pevent);
|
|
#ifdef UAP_SUPPORT
|
|
if (pmpriv->adapter->dfs_mode)
|
|
wlan_11h_update_dfs_master_state_by_sta(pmpriv);
|
|
#endif
|
|
|
|
wlan_coex_ampdu_rxwinsize(pmpriv->adapter);
|
|
|
|
if (!pmpriv->sec_info.wpa_enabled && !pmpriv->sec_info.wpa2_enabled &&
|
|
!pmpriv->sec_info.ewpa_enabled && !pmpriv->sec_info.wapi_enabled &&
|
|
!pmpriv->wps.session_enable && !pmpriv->sec_info.osen_enabled
|
|
#ifdef DRV_EMBEDDED_SUPPLICANT
|
|
&& !supplicantIsEnabled(pmpriv->psapriv)
|
|
#endif
|
|
) {
|
|
/* We are in Open/WEP mode, open port immediately */
|
|
if (pmpriv->port_ctrl_mode == MTRUE) {
|
|
pmpriv->port_open = MTRUE;
|
|
PRINTM(MINFO, "ASSOC_RESP: port_status = OPEN\n");
|
|
}
|
|
}
|
|
if (pmpriv->sec_info.wpa_enabled || pmpriv->sec_info.wpa2_enabled ||
|
|
pmpriv->sec_info.ewpa_enabled || pmpriv->sec_info.wapi_enabled ||
|
|
pmpriv->wps.session_enable || pmpriv->sec_info.osen_enabled
|
|
#ifdef DRV_EMBEDDED_SUPPLICANT
|
|
|| (supplicantIsEnabled(pmpriv->psapriv))
|
|
#endif
|
|
)
|
|
pmpriv->adapter->scan_block = MTRUE;
|
|
|
|
#ifdef DRV_EMBEDDED_SUPPLICANT
|
|
supplicantInitSession(
|
|
pmpriv->psapriv,
|
|
(t_u8 *)&pmpriv->curr_bss_params.bss_descriptor.ssid.ssid,
|
|
pmpriv->curr_bss_params.bss_descriptor.ssid.ssid_len,
|
|
(t_u8 *)&pmpriv->curr_bss_params.bss_descriptor.mac_address,
|
|
(t_u8 *)&pmpriv->curr_addr);
|
|
#endif
|
|
|
|
pevent = (mlan_event *)event_buf;
|
|
memset(pmadapter, event_buf, 0, sizeof(event_buf));
|
|
pevent->bss_index = pmpriv->bss_index;
|
|
pevent->event_id = MLAN_EVENT_ID_DRV_ASSOC_SUCC_LOGGER;
|
|
pevent->event_len = sizeof(assoc_logger_data);
|
|
assoc_succ = (assoc_logger_data *)pevent->event_buf;
|
|
memcpy_ext(pmpriv->adapter, (t_u8 *)assoc_succ->bssid,
|
|
pbss_desc->mac_address, MLAN_MAC_ADDR_LENGTH,
|
|
MLAN_MAC_ADDR_LENGTH);
|
|
memcpy_ext(pmpriv->adapter, (t_u8 *)assoc_succ->oui,
|
|
pbss_desc->mac_address, MLAN_MAC_ADDR_LENGTH / 2,
|
|
MLAN_MAC_ADDR_LENGTH / 2);
|
|
memcpy_ext(pmpriv->adapter, (t_u8 *)assoc_succ->ssid,
|
|
pbss_desc->ssid.ssid, pbss_desc->ssid.ssid_len,
|
|
MLAN_MAX_SSID_LENGTH);
|
|
assoc_succ->rssi = pbss_desc->rssi;
|
|
assoc_succ->channel = pbss_desc->channel;
|
|
wlan_recv_event(pmpriv, MLAN_EVENT_ID_DRV_ASSOC_SUCC_LOGGER, pevent);
|
|
|
|
done:
|
|
/* Need to indicate IOCTL complete */
|
|
if (pioctl_req != MNULL) {
|
|
if (ret != MLAN_STATUS_SUCCESS) {
|
|
if (passoc_rsp->status_code)
|
|
pioctl_req->status_code =
|
|
(wlan_le16_to_cpu(*(t_u16 *)&passoc_rsp
|
|
->capability)
|
|
<< 16) +
|
|
passoc_rsp->status_code;
|
|
else
|
|
pioctl_req->status_code =
|
|
MLAN_ERROR_CMD_ASSOC_FAIL;
|
|
} else {
|
|
pioctl_req->status_code = MLAN_ERROR_NO_ERROR;
|
|
}
|
|
}
|
|
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief This function prepares command of ad_hoc_start.
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param cmd A pointer to HostCmd_DS_COMMAND structure
|
|
* @param pdata_buf A pointer cast of mlan_802_11_ssid structure
|
|
*
|
|
* @return MLAN_STATUS_SUCCESS or MLAN_STATUS_FAILURE
|
|
*/
|
|
mlan_status wlan_cmd_802_11_ad_hoc_start(mlan_private *pmpriv,
|
|
HostCmd_DS_COMMAND *cmd,
|
|
t_void *pdata_buf)
|
|
{
|
|
mlan_status ret = MLAN_STATUS_SUCCESS;
|
|
mlan_adapter *pmadapter = pmpriv->adapter;
|
|
HostCmd_DS_802_11_AD_HOC_START *padhoc_start = &cmd->params.adhoc_start;
|
|
BSSDescriptor_t *pbss_desc;
|
|
t_u32 cmd_append_size = 0;
|
|
t_u32 i;
|
|
t_u16 tmp_cap;
|
|
MrvlIEtypes_ChanListParamSet_t *pchan_tlv;
|
|
|
|
MrvlIEtypes_RsnParamSet_t *prsn_ie_tlv;
|
|
/* wpa ie for WPA_NONE AES */
|
|
const t_u8 wpa_ie[24] = {0xdd, 0x16, 0x00, 0x50, 0xf2, 0x01,
|
|
0x01, 0x00, 0x00, 0x50, 0xf2, 0x04,
|
|
0x01, 0x00, 0x00, 0x50, 0xf2, 0x00,
|
|
0x01, 0x00, 0x00, 0x50, 0xf2, 0x00};
|
|
t_s32 append_size_11h = 0;
|
|
t_u8 *pos =
|
|
(t_u8 *)padhoc_start + sizeof(HostCmd_DS_802_11_AD_HOC_START);
|
|
|
|
ENTER();
|
|
|
|
if (!pmadapter) {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
cmd->command = wlan_cpu_to_le16(HostCmd_CMD_802_11_AD_HOC_START);
|
|
|
|
pbss_desc = &pmpriv->curr_bss_params.bss_descriptor;
|
|
pmpriv->pattempted_bss_desc = pbss_desc;
|
|
|
|
/*
|
|
* Fill in the parameters for 2 data structures:
|
|
* 1. HostCmd_DS_802_11_AD_HOC_START command
|
|
* 2. pbss_desc
|
|
* Driver will fill up SSID, bss_mode,IBSS param, Physical Param,
|
|
* probe delay, and Cap info.
|
|
* Firmware will fill up beacon period, Basic rates
|
|
* and operational rates.
|
|
*/
|
|
|
|
memset(pmadapter, padhoc_start->ssid, 0, MLAN_MAX_SSID_LENGTH);
|
|
|
|
memcpy_ext(pmadapter, padhoc_start->ssid,
|
|
((mlan_802_11_ssid *)pdata_buf)->ssid,
|
|
((mlan_802_11_ssid *)pdata_buf)->ssid_len,
|
|
MLAN_MAX_SSID_LENGTH);
|
|
|
|
PRINTM(MINFO, "ADHOC_S_CMD: SSID = %s\n", padhoc_start->ssid);
|
|
|
|
memset(pmadapter, pbss_desc->ssid.ssid, 0, MLAN_MAX_SSID_LENGTH);
|
|
memcpy_ext(pmadapter, pbss_desc->ssid.ssid,
|
|
((mlan_802_11_ssid *)pdata_buf)->ssid,
|
|
((mlan_802_11_ssid *)pdata_buf)->ssid_len,
|
|
MLAN_MAX_SSID_LENGTH);
|
|
|
|
pbss_desc->ssid.ssid_len =
|
|
MIN(MLAN_MAX_SSID_LENGTH,
|
|
((mlan_802_11_ssid *)pdata_buf)->ssid_len);
|
|
|
|
/* Set the BSS mode */
|
|
padhoc_start->bss_mode = HostCmd_BSS_MODE_IBSS;
|
|
pbss_desc->bss_mode = MLAN_BSS_MODE_IBSS;
|
|
padhoc_start->beacon_period = wlan_cpu_to_le16(pmpriv->beacon_period);
|
|
pbss_desc->beacon_period = pmpriv->beacon_period;
|
|
|
|
/* Set Physical param set */
|
|
/** Parameter IE Id */
|
|
#define DS_PARA_IE_ID 3
|
|
/** Parameter IE length */
|
|
#define DS_PARA_IE_LEN 1
|
|
|
|
padhoc_start->phy_param_set.ds_param_set.element_id = DS_PARA_IE_ID;
|
|
padhoc_start->phy_param_set.ds_param_set.len = DS_PARA_IE_LEN;
|
|
|
|
if (!wlan_get_cfp_by_band_and_channel(
|
|
pmadapter, pmadapter->adhoc_start_band,
|
|
(t_u16)pmpriv->adhoc_channel, pmadapter->region_channel)) {
|
|
chan_freq_power_t *cfp;
|
|
cfp = wlan_get_cfp_by_band_and_channel(
|
|
pmadapter, pmadapter->adhoc_start_band,
|
|
FIRST_VALID_CHANNEL, pmadapter->region_channel);
|
|
if (cfp)
|
|
pmpriv->adhoc_channel = (t_u8)cfp->channel;
|
|
}
|
|
|
|
MASSERT(pmpriv->adhoc_channel);
|
|
|
|
PRINTM(MINFO, "ADHOC_S_CMD: Creating ADHOC on Channel %d\n",
|
|
pmpriv->adhoc_channel);
|
|
|
|
pmpriv->curr_bss_params.bss_descriptor.channel = pmpriv->adhoc_channel;
|
|
pmpriv->curr_bss_params.band = pmadapter->adhoc_start_band;
|
|
|
|
pbss_desc->channel = pmpriv->adhoc_channel;
|
|
padhoc_start->phy_param_set.ds_param_set.current_chan =
|
|
pmpriv->adhoc_channel;
|
|
|
|
memcpy_ext(pmadapter, &pbss_desc->phy_param_set,
|
|
&padhoc_start->phy_param_set,
|
|
sizeof(IEEEtypes_PhyParamSet_t),
|
|
sizeof(IEEEtypes_PhyParamSet_t));
|
|
|
|
pbss_desc->network_type_use = Wlan802_11DS;
|
|
|
|
/* Set IBSS param set */
|
|
/** IBSS parameter IE Id */
|
|
#define IBSS_PARA_IE_ID 6
|
|
/** IBSS parameter IE length */
|
|
#define IBSS_PARA_IE_LEN 2
|
|
|
|
padhoc_start->ss_param_set.ibss_param_set.element_id = IBSS_PARA_IE_ID;
|
|
padhoc_start->ss_param_set.ibss_param_set.len = IBSS_PARA_IE_LEN;
|
|
padhoc_start->ss_param_set.ibss_param_set.atim_window =
|
|
wlan_cpu_to_le16(pmpriv->atim_window);
|
|
pbss_desc->atim_window = pmpriv->atim_window;
|
|
memcpy_ext(pmadapter, &pbss_desc->ss_param_set,
|
|
&padhoc_start->ss_param_set, sizeof(IEEEtypes_SsParamSet_t),
|
|
sizeof(IEEEtypes_SsParamSet_t));
|
|
|
|
/* Set Capability info */
|
|
padhoc_start->cap.ess = 0;
|
|
padhoc_start->cap.ibss = 1;
|
|
pbss_desc->cap_info.ibss = 1;
|
|
|
|
/* Set up privacy in pbss_desc */
|
|
if (pmpriv->sec_info.wep_status == Wlan802_11WEPEnabled ||
|
|
pmpriv->sec_info.wpa_enabled || pmpriv->sec_info.ewpa_enabled) {
|
|
/** Ad-Hoc capability privacy on */
|
|
#define AD_HOC_CAP_PRIVACY_ON 1
|
|
PRINTM(MINFO, "ADHOC_S_CMD: wep_status set, Privacy to WEP\n");
|
|
pbss_desc->privacy = Wlan802_11PrivFilter8021xWEP;
|
|
padhoc_start->cap.privacy = AD_HOC_CAP_PRIVACY_ON;
|
|
} else {
|
|
PRINTM(MWARN, "ADHOC_S_CMD: wep_status NOT set, Setting "
|
|
"Privacy to ACCEPT ALL\n");
|
|
pbss_desc->privacy = Wlan802_11PrivFilterAcceptAll;
|
|
}
|
|
|
|
memset(pmadapter, padhoc_start->DataRate, 0,
|
|
sizeof(padhoc_start->DataRate));
|
|
|
|
if ((pmpriv->adapter->region_code == COUNTRY_CODE_JP_40 ||
|
|
pmpriv->adapter->region_code == COUNTRY_CODE_JP_FF) &&
|
|
(pbss_desc->phy_param_set.ds_param_set.current_chan == 14)) {
|
|
wlan_get_active_data_rates(pmpriv, pmpriv->bss_mode, BAND_B,
|
|
padhoc_start->DataRate);
|
|
} else {
|
|
wlan_get_active_data_rates(pmpriv, pmpriv->bss_mode,
|
|
pmadapter->adhoc_start_band,
|
|
padhoc_start->DataRate);
|
|
}
|
|
|
|
if ((pmadapter->adhoc_start_band & BAND_G) &&
|
|
(pmpriv->curr_pkt_filter & HostCmd_ACT_MAC_ADHOC_G_PROTECTION_ON)) {
|
|
ret = wlan_prepare_cmd(pmpriv, HostCmd_CMD_MAC_CONTROL,
|
|
HostCmd_ACT_GEN_SET, 0, MNULL,
|
|
&pmpriv->curr_pkt_filter);
|
|
|
|
if (ret) {
|
|
PRINTM(MERROR,
|
|
"ADHOC_S_CMD: G Protection config failed\n");
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
/* Find the last non zero */
|
|
for (i = 0;
|
|
i < sizeof(padhoc_start->DataRate) && padhoc_start->DataRate[i];
|
|
i++)
|
|
/* XXX Do not delete no-operation line */
|
|
;
|
|
|
|
pmpriv->curr_bss_params.num_of_rates = i;
|
|
|
|
/* Copy the ad-hoc creating rates into Current BSS rate structure */
|
|
memcpy_ext(pmadapter, &pmpriv->curr_bss_params.data_rates,
|
|
&padhoc_start->DataRate,
|
|
pmpriv->curr_bss_params.num_of_rates, WLAN_SUPPORTED_RATES);
|
|
|
|
PRINTM(MINFO, "ADHOC_S_CMD: Rates=%02x %02x %02x %02x\n",
|
|
padhoc_start->DataRate[0], padhoc_start->DataRate[1],
|
|
padhoc_start->DataRate[2], padhoc_start->DataRate[3]);
|
|
|
|
PRINTM(MINFO, "ADHOC_S_CMD: AD HOC Start command is ready\n");
|
|
|
|
if (IS_SUPPORT_MULTI_BANDS(pmadapter)) {
|
|
/* Append a channel TLV */
|
|
pchan_tlv = (MrvlIEtypes_ChanListParamSet_t *)pos;
|
|
pchan_tlv->header.type = wlan_cpu_to_le16(TLV_TYPE_CHANLIST);
|
|
pchan_tlv->header.len =
|
|
wlan_cpu_to_le16(sizeof(ChanScanParamSet_t));
|
|
|
|
memset(pmadapter, pchan_tlv->chan_scan_param, 0x00,
|
|
sizeof(ChanScanParamSet_t));
|
|
pchan_tlv->chan_scan_param[0].chan_number =
|
|
(t_u8)pmpriv->curr_bss_params.bss_descriptor.channel;
|
|
|
|
PRINTM(MINFO, "ADHOC_S_CMD: TLV Chan = %d\n",
|
|
pchan_tlv->chan_scan_param[0].chan_number);
|
|
|
|
pchan_tlv->chan_scan_param[0].bandcfg.chanBand =
|
|
wlan_band_to_radio_type(pmpriv->curr_bss_params.band);
|
|
PRINTM(MINFO, "ADHOC_S_CMD: TLV Bandcfg = %x\n",
|
|
pchan_tlv->chan_scan_param[0].bandcfg);
|
|
pos += sizeof(pchan_tlv->header) + sizeof(ChanScanParamSet_t);
|
|
cmd_append_size +=
|
|
sizeof(pchan_tlv->header) + sizeof(ChanScanParamSet_t);
|
|
}
|
|
|
|
if (wlan_11d_create_dnld_countryinfo(pmpriv,
|
|
pmpriv->curr_bss_params.band)) {
|
|
PRINTM(MERROR, "ADHOC_S_CMD: dnld_countryinfo_11d failed\n");
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/*
|
|
* Call 11h start API to add any 11h flags/elements as TLV parameters
|
|
*/
|
|
append_size_11h =
|
|
wlan_11h_process_start(pmpriv, &pos, &padhoc_start->cap,
|
|
pmpriv->adhoc_channel,
|
|
&pbss_desc->wlan_11h_bss_info);
|
|
if (append_size_11h >= 0)
|
|
cmd_append_size += append_size_11h;
|
|
else {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
if (pmpriv->sec_info.ewpa_enabled) {
|
|
memcpy_ext(pmadapter, pmpriv->wpa_ie, wpa_ie, sizeof(wpa_ie),
|
|
sizeof(pmpriv->wpa_ie));
|
|
pmpriv->wpa_ie_len = sizeof(wpa_ie);
|
|
}
|
|
|
|
if (pmpriv->sec_info.wpa_enabled || pmpriv->sec_info.ewpa_enabled) {
|
|
prsn_ie_tlv = (MrvlIEtypes_RsnParamSet_t *)pos;
|
|
prsn_ie_tlv->header.type = (t_u16)pmpriv->wpa_ie[0];
|
|
/* WPA_IE or RSN_IE */
|
|
prsn_ie_tlv->header.type = prsn_ie_tlv->header.type & 0x00FF;
|
|
prsn_ie_tlv->header.type =
|
|
wlan_cpu_to_le16(prsn_ie_tlv->header.type);
|
|
prsn_ie_tlv->header.len = (t_u16)pmpriv->wpa_ie[1];
|
|
prsn_ie_tlv->header.len = prsn_ie_tlv->header.len & 0x00FF;
|
|
if (prsn_ie_tlv->header.len <= (sizeof(pmpriv->wpa_ie) - 2))
|
|
memcpy_ext(pmadapter, prsn_ie_tlv->rsn_ie,
|
|
&pmpriv->wpa_ie[2], prsn_ie_tlv->header.len,
|
|
prsn_ie_tlv->header.len);
|
|
else {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
DBG_HEXDUMP(MCMD_D, "ADHOC_S_CMD: RSN IE", (t_u8 *)prsn_ie_tlv,
|
|
sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len);
|
|
pos += sizeof(prsn_ie_tlv->header) + prsn_ie_tlv->header.len;
|
|
cmd_append_size +=
|
|
sizeof(prsn_ie_tlv->header) + prsn_ie_tlv->header.len;
|
|
prsn_ie_tlv->header.len =
|
|
wlan_cpu_to_le16(prsn_ie_tlv->header.len);
|
|
}
|
|
|
|
cmd->size = (t_u16)wlan_cpu_to_le16(
|
|
(t_u16)(sizeof(HostCmd_DS_802_11_AD_HOC_START) + S_DS_GEN +
|
|
cmd_append_size));
|
|
|
|
memcpy_ext(pmadapter, &tmp_cap, &padhoc_start->cap, sizeof(t_u16),
|
|
sizeof(tmp_cap));
|
|
|
|
if (pmadapter->adhoc_start_band == BAND_B)
|
|
SHORT_SLOT_TIME_DISABLED(tmp_cap);
|
|
else
|
|
SHORT_SLOT_TIME_ENABLED(tmp_cap);
|
|
|
|
tmp_cap = wlan_cpu_to_le16(tmp_cap);
|
|
memcpy_ext(pmadapter, &padhoc_start->cap, &tmp_cap, sizeof(t_u16),
|
|
sizeof(padhoc_start->cap));
|
|
|
|
ret = MLAN_STATUS_SUCCESS;
|
|
done:
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief This function prepares command of ad_hoc_join.
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param cmd A pointer to HostCmd_DS_COMMAND structure
|
|
* @param pdata_buf Void cast of BSSDescriptor_t from the
|
|
* scan table to join
|
|
*
|
|
* @return MLAN_STATUS_SUCCESS or MLAN_STATUS_FAILURE
|
|
*/
|
|
mlan_status wlan_cmd_802_11_ad_hoc_join(mlan_private *pmpriv,
|
|
HostCmd_DS_COMMAND *cmd,
|
|
t_void *pdata_buf)
|
|
{
|
|
mlan_status ret = MLAN_STATUS_SUCCESS;
|
|
mlan_adapter *pmadapter = pmpriv->adapter;
|
|
HostCmd_DS_802_11_AD_HOC_JOIN *padhoc_join = &cmd->params.adhoc_join;
|
|
BSSDescriptor_t *pbss_desc = (BSSDescriptor_t *)pdata_buf;
|
|
MrvlIEtypes_ChanListParamSet_t *pchan_tlv;
|
|
MrvlIEtypes_RsnParamSet_t *prsn_ie_tlv;
|
|
t_u32 cmd_append_size = 0;
|
|
t_u16 tmp_cap;
|
|
t_u32 i, rates_size = 0;
|
|
t_u32 curr_pkt_filter;
|
|
t_u8 *pos = (t_u8 *)padhoc_join + sizeof(HostCmd_DS_802_11_AD_HOC_JOIN);
|
|
t_s32 append_size_11h = 0;
|
|
|
|
ENTER();
|
|
|
|
/** Use G protection */
|
|
#define USE_G_PROTECTION 0x02
|
|
if (pbss_desc->erp_flags & USE_G_PROTECTION) {
|
|
curr_pkt_filter = pmpriv->curr_pkt_filter |
|
|
HostCmd_ACT_MAC_ADHOC_G_PROTECTION_ON;
|
|
|
|
ret = wlan_prepare_cmd(pmpriv, HostCmd_CMD_MAC_CONTROL,
|
|
HostCmd_ACT_GEN_SET, 0, MNULL,
|
|
&curr_pkt_filter);
|
|
if (ret) {
|
|
PRINTM(MERROR,
|
|
"ADHOC_J_CMD: G Protection config failed\n");
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
pmpriv->pattempted_bss_desc = pbss_desc;
|
|
|
|
cmd->command = wlan_cpu_to_le16(HostCmd_CMD_802_11_AD_HOC_JOIN);
|
|
|
|
padhoc_join->bss_descriptor.bss_mode = HostCmd_BSS_MODE_IBSS;
|
|
|
|
padhoc_join->bss_descriptor.beacon_period =
|
|
wlan_cpu_to_le16(pbss_desc->beacon_period);
|
|
|
|
memcpy_ext(pmadapter, &padhoc_join->bss_descriptor.bssid,
|
|
&pbss_desc->mac_address, MLAN_MAC_ADDR_LENGTH,
|
|
MLAN_MAC_ADDR_LENGTH);
|
|
|
|
memcpy_ext(pmadapter, &padhoc_join->bss_descriptor.ssid,
|
|
&pbss_desc->ssid.ssid, pbss_desc->ssid.ssid_len,
|
|
MLAN_MAX_SSID_LENGTH);
|
|
|
|
memcpy_ext(pmadapter, &padhoc_join->bss_descriptor.phy_param_set,
|
|
&pbss_desc->phy_param_set, sizeof(IEEEtypes_PhyParamSet_t),
|
|
sizeof(IEEEtypes_PhyParamSet_t));
|
|
|
|
padhoc_join->bss_descriptor.phy_param_set.fh_param_set.dwell_time =
|
|
wlan_cpu_to_le16(padhoc_join->bss_descriptor.phy_param_set
|
|
.fh_param_set.dwell_time);
|
|
|
|
memcpy_ext(pmadapter, &padhoc_join->bss_descriptor.ss_param_set,
|
|
&pbss_desc->ss_param_set, sizeof(IEEEtypes_SsParamSet_t),
|
|
sizeof(IEEEtypes_SsParamSet_t));
|
|
padhoc_join->bss_descriptor.ss_param_set.ibss_param_set.atim_window = 0;
|
|
padhoc_join->bss_descriptor.ss_param_set.ibss_param_set.atim_window =
|
|
wlan_cpu_to_le16(padhoc_join->bss_descriptor.ss_param_set
|
|
.ibss_param_set.atim_window);
|
|
|
|
memcpy_ext(pmadapter, &tmp_cap, &pbss_desc->cap_info,
|
|
sizeof(IEEEtypes_CapInfo_t), sizeof(IEEEtypes_CapInfo_t));
|
|
|
|
tmp_cap &= CAPINFO_MASK;
|
|
|
|
PRINTM(MINFO, "ADHOC_J_CMD: tmp_cap=%4X CAPINFO_MASK=%4lX\n", tmp_cap,
|
|
CAPINFO_MASK);
|
|
memcpy_ext(pmadapter, &padhoc_join->bss_descriptor.cap, &tmp_cap,
|
|
sizeof(IEEEtypes_CapInfo_t), sizeof(IEEEtypes_CapInfo_t));
|
|
|
|
/* Information on BSSID descriptor passed to FW */
|
|
PRINTM(MINFO, "ADHOC_J_CMD: BSSID = " MACSTR ", SSID = %s\n",
|
|
MAC2STR(padhoc_join->bss_descriptor.bssid),
|
|
padhoc_join->bss_descriptor.ssid);
|
|
|
|
for (i = 0; i < WLAN_SUPPORTED_RATES && pbss_desc->supported_rates[i];
|
|
i++)
|
|
/* XXX Do not delete no-operation line */
|
|
;
|
|
rates_size = i;
|
|
|
|
/* Copy Data Rates from the Rates recorded in scan response */
|
|
memset(pmadapter, padhoc_join->bss_descriptor.data_rates, 0,
|
|
sizeof(padhoc_join->bss_descriptor.data_rates));
|
|
memcpy_ext(pmadapter, padhoc_join->bss_descriptor.data_rates,
|
|
pbss_desc->supported_rates, rates_size,
|
|
WLAN_SUPPORTED_RATES);
|
|
|
|
HEXDUMP("Adapted Rates:", padhoc_join->bss_descriptor.data_rates,
|
|
rates_size);
|
|
|
|
/* Copy the adhoc join rates into Current BSS state structure */
|
|
pmpriv->curr_bss_params.num_of_rates = rates_size;
|
|
memcpy_ext(pmadapter, &pmpriv->curr_bss_params.data_rates,
|
|
pbss_desc->supported_rates, rates_size,
|
|
WLAN_SUPPORTED_RATES);
|
|
|
|
/* Copy the channel information */
|
|
pmpriv->curr_bss_params.bss_descriptor.channel = pbss_desc->channel;
|
|
pmpriv->curr_bss_params.band = pbss_desc->bss_band;
|
|
|
|
if (pmpriv->sec_info.wep_status == Wlan802_11WEPEnabled ||
|
|
pmpriv->sec_info.wpa_enabled || pmpriv->sec_info.ewpa_enabled)
|
|
padhoc_join->bss_descriptor.cap.privacy = AD_HOC_CAP_PRIVACY_ON;
|
|
|
|
if (IS_SUPPORT_MULTI_BANDS(pmadapter)) {
|
|
/* Append a channel TLV */
|
|
pchan_tlv = (MrvlIEtypes_ChanListParamSet_t *)pos;
|
|
pchan_tlv->header.type = wlan_cpu_to_le16(TLV_TYPE_CHANLIST);
|
|
pchan_tlv->header.len =
|
|
wlan_cpu_to_le16(sizeof(ChanScanParamSet_t));
|
|
|
|
memset(pmadapter, pchan_tlv->chan_scan_param, 0x00,
|
|
sizeof(ChanScanParamSet_t));
|
|
pchan_tlv->chan_scan_param[0].chan_number =
|
|
(pbss_desc->phy_param_set.ds_param_set.current_chan);
|
|
PRINTM(MINFO, "ADHOC_J_CMD: TLV Chan = %d\n",
|
|
pchan_tlv->chan_scan_param[0].chan_number);
|
|
|
|
pchan_tlv->chan_scan_param[0].bandcfg.chanBand =
|
|
wlan_band_to_radio_type(pbss_desc->bss_band);
|
|
|
|
PRINTM(MINFO, "ADHOC_J_CMD: TLV Bandcfg = %x\n",
|
|
pchan_tlv->chan_scan_param[0].bandcfg);
|
|
pos += sizeof(pchan_tlv->header) + sizeof(ChanScanParamSet_t);
|
|
cmd_append_size +=
|
|
sizeof(pchan_tlv->header) + sizeof(ChanScanParamSet_t);
|
|
}
|
|
|
|
if (wlan_11d_create_dnld_countryinfo(pmpriv, pbss_desc->bss_band)) {
|
|
PRINTM(MERROR, "Dnld_countryinfo_11d failed\n");
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
if (wlan_11d_parse_dnld_countryinfo(pmpriv,
|
|
pmpriv->pattempted_bss_desc)) {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/*
|
|
* Call 11h join API after capability bits are set so
|
|
* adhoc/infra 11h behavior can be properly triggered.
|
|
* pos modified if data is appended
|
|
*/
|
|
append_size_11h +=
|
|
wlan_11h_process_join(pmpriv, &pos,
|
|
&padhoc_join->bss_descriptor.cap,
|
|
pbss_desc->bss_band, pbss_desc->channel,
|
|
&pbss_desc->wlan_11h_bss_info);
|
|
if (append_size_11h >= 0)
|
|
cmd_append_size += append_size_11h;
|
|
else {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
if (pmpriv->sec_info.wpa_enabled) {
|
|
prsn_ie_tlv = (MrvlIEtypes_RsnParamSet_t *)pos;
|
|
/* WPA_IE or RSN_IE */
|
|
prsn_ie_tlv->header.type = (t_u16)pmpriv->wpa_ie[0];
|
|
prsn_ie_tlv->header.type = prsn_ie_tlv->header.type & 0x00FF;
|
|
prsn_ie_tlv->header.type =
|
|
wlan_cpu_to_le16(prsn_ie_tlv->header.type);
|
|
prsn_ie_tlv->header.len = (t_u16)pmpriv->wpa_ie[1];
|
|
prsn_ie_tlv->header.len = prsn_ie_tlv->header.len & 0x00FF;
|
|
if (prsn_ie_tlv->header.len <= (sizeof(pmpriv->wpa_ie) - 2))
|
|
memcpy_ext(pmadapter, prsn_ie_tlv->rsn_ie,
|
|
&pmpriv->wpa_ie[2], prsn_ie_tlv->header.len,
|
|
prsn_ie_tlv->header.len);
|
|
else {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
HEXDUMP("ADHOC_JOIN: RSN IE", (t_u8 *)prsn_ie_tlv,
|
|
sizeof(prsn_ie_tlv->header) + prsn_ie_tlv->header.len);
|
|
pos += sizeof(prsn_ie_tlv->header) + prsn_ie_tlv->header.len;
|
|
cmd_append_size +=
|
|
sizeof(prsn_ie_tlv->header) + prsn_ie_tlv->header.len;
|
|
prsn_ie_tlv->header.len =
|
|
wlan_cpu_to_le16(prsn_ie_tlv->header.len);
|
|
} else if (pmpriv->sec_info.ewpa_enabled) {
|
|
prsn_ie_tlv = (MrvlIEtypes_RsnParamSet_t *)pos;
|
|
if (pbss_desc->pwpa_ie) {
|
|
prsn_ie_tlv->header.type =
|
|
(t_u16)(*(pbss_desc->pwpa_ie))
|
|
.vend_hdr.element_id;
|
|
prsn_ie_tlv->header.type =
|
|
prsn_ie_tlv->header.type & 0x00FF;
|
|
prsn_ie_tlv->header.type =
|
|
wlan_cpu_to_le16(prsn_ie_tlv->header.type);
|
|
prsn_ie_tlv->header.len =
|
|
(t_u16)(*(pbss_desc->pwpa_ie)).vend_hdr.len;
|
|
prsn_ie_tlv->header.len =
|
|
prsn_ie_tlv->header.len & 0x00FF;
|
|
if (prsn_ie_tlv->header.len <=
|
|
(sizeof(pmpriv->wpa_ie))) {
|
|
memcpy_ext(pmadapter, prsn_ie_tlv->rsn_ie,
|
|
&((*(pbss_desc->pwpa_ie))
|
|
.vend_hdr.oui[0]),
|
|
prsn_ie_tlv->header.len,
|
|
prsn_ie_tlv->header.len);
|
|
} else {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
HEXDUMP("ADHOC_JOIN: RSN IE", (t_u8 *)prsn_ie_tlv,
|
|
sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len);
|
|
pos += sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len;
|
|
cmd_append_size += sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len;
|
|
prsn_ie_tlv->header.len =
|
|
wlan_cpu_to_le16(prsn_ie_tlv->header.len);
|
|
}
|
|
if (pbss_desc->prsn_ie) {
|
|
prsn_ie_tlv = (MrvlIEtypes_RsnParamSet_t *)pos;
|
|
prsn_ie_tlv->header.type =
|
|
(t_u16)(*(pbss_desc->prsn_ie))
|
|
.ieee_hdr.element_id;
|
|
prsn_ie_tlv->header.type =
|
|
prsn_ie_tlv->header.type & 0x00FF;
|
|
prsn_ie_tlv->header.type =
|
|
wlan_cpu_to_le16(prsn_ie_tlv->header.type);
|
|
prsn_ie_tlv->header.len =
|
|
(t_u16)(*(pbss_desc->prsn_ie)).ieee_hdr.len;
|
|
prsn_ie_tlv->header.len =
|
|
prsn_ie_tlv->header.len & 0x00FF;
|
|
if (prsn_ie_tlv->header.len <=
|
|
(sizeof(pmpriv->wpa_ie))) {
|
|
memcpy_ext(pmadapter, prsn_ie_tlv->rsn_ie,
|
|
&((*(pbss_desc->prsn_ie)).data[0]),
|
|
prsn_ie_tlv->header.len,
|
|
prsn_ie_tlv->header.len);
|
|
} else {
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
HEXDUMP("ADHOC_JOIN: RSN IE", (t_u8 *)prsn_ie_tlv,
|
|
sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len);
|
|
pos += sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len;
|
|
cmd_append_size += sizeof(prsn_ie_tlv->header) +
|
|
prsn_ie_tlv->header.len;
|
|
prsn_ie_tlv->header.len =
|
|
wlan_cpu_to_le16(prsn_ie_tlv->header.len);
|
|
}
|
|
}
|
|
|
|
cmd->size = (t_u16)wlan_cpu_to_le16(
|
|
(t_u16)(sizeof(HostCmd_DS_802_11_AD_HOC_JOIN) + S_DS_GEN +
|
|
cmd_append_size));
|
|
|
|
memcpy_ext(pmadapter, &tmp_cap, &padhoc_join->bss_descriptor.cap,
|
|
sizeof(IEEEtypes_CapInfo_t), sizeof(IEEEtypes_CapInfo_t));
|
|
tmp_cap = wlan_cpu_to_le16(tmp_cap);
|
|
|
|
memcpy_ext(pmadapter, &padhoc_join->bss_descriptor.cap, &tmp_cap,
|
|
sizeof(IEEEtypes_CapInfo_t), sizeof(IEEEtypes_CapInfo_t));
|
|
|
|
done:
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief This function handles the command response of ad_hoc_start and
|
|
* ad_hoc_join
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param resp A pointer to HostCmd_DS_COMMAND
|
|
* @param pioctl_buf A pointer to mlan_ioctl_req structure
|
|
*
|
|
* @return MLAN_STATUS_SUCCESS or MLAN_STATUS_FAILURE
|
|
*/
|
|
mlan_status wlan_ret_802_11_ad_hoc(mlan_private *pmpriv,
|
|
HostCmd_DS_COMMAND *resp, t_void *pioctl_buf)
|
|
{
|
|
mlan_status ret = MLAN_STATUS_SUCCESS;
|
|
mlan_ioctl_req *pioctl_req = (mlan_ioctl_req *)pioctl_buf;
|
|
HostCmd_DS_802_11_AD_HOC_START_RESULT *padhoc_start_result =
|
|
&resp->params.adhoc_start_result;
|
|
HostCmd_DS_802_11_AD_HOC_JOIN_RESULT *padhoc_join_result =
|
|
&resp->params.adhoc_join_result;
|
|
BSSDescriptor_t *pbss_desc;
|
|
t_u16 command = resp->command;
|
|
t_u8 result = 0;
|
|
t_u8 event_buf[100];
|
|
mlan_event *pevent = (mlan_event *)event_buf;
|
|
int ie_len = 0;
|
|
IEEEtypes_WmmParameter_t *pwmm_param_ie = MNULL;
|
|
mlan_adapter *pmadapter = pmpriv->adapter;
|
|
const t_u8 wmm_oui[4] = {0x00, 0x50, 0xf2, 0x02};
|
|
|
|
ENTER();
|
|
|
|
pmpriv->wmm_enabled = MFALSE;
|
|
if (command == HostCmd_CMD_802_11_AD_HOC_START) {
|
|
result = padhoc_start_result->result;
|
|
ie_len = resp->size -
|
|
(sizeof(HostCmd_DS_802_11_AD_HOC_START_RESULT) +
|
|
S_DS_GEN);
|
|
pwmm_param_ie =
|
|
(IEEEtypes_WmmParameter_t
|
|
*)((t_u8 *)resp +
|
|
(sizeof(HostCmd_DS_802_11_AD_HOC_START_RESULT) +
|
|
S_DS_GEN));
|
|
} else {
|
|
result = padhoc_join_result->result;
|
|
ie_len = resp->size -
|
|
(sizeof(HostCmd_DS_802_11_AD_HOC_JOIN_RESULT) +
|
|
S_DS_GEN);
|
|
pwmm_param_ie =
|
|
(IEEEtypes_WmmParameter_t
|
|
*)((t_u8 *)resp +
|
|
(sizeof(HostCmd_DS_802_11_AD_HOC_JOIN_RESULT) +
|
|
S_DS_GEN));
|
|
}
|
|
|
|
pbss_desc = pmpriv->pattempted_bss_desc;
|
|
|
|
/*
|
|
* Join result code 0 --> SUCCESS
|
|
*/
|
|
if (result) {
|
|
PRINTM(MERROR, "ADHOC_RESP Failed 0x%x\n", result);
|
|
if (pmpriv->media_connected == MTRUE)
|
|
wlan_reset_connect_state(pmpriv, MTRUE);
|
|
if (pmpriv->adhoc_state == ADHOC_STARTING)
|
|
pmpriv->adhoc_state = ADHOC_IDLE;
|
|
|
|
memset(pmpriv->adapter, &pmpriv->curr_bss_params.bss_descriptor,
|
|
0x00, sizeof(BSSDescriptor_t));
|
|
|
|
ret = MLAN_STATUS_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/* Send a Media Connected event, according to the Spec */
|
|
pmpriv->media_connected = MTRUE;
|
|
|
|
if (command == HostCmd_CMD_802_11_AD_HOC_START) {
|
|
PRINTM(MINFO, "ADHOC_S_RESP %s\n", pbss_desc->ssid.ssid);
|
|
|
|
/* Update the created network descriptor with the new BSSID */
|
|
memcpy_ext(pmpriv->adapter, pbss_desc->mac_address,
|
|
padhoc_start_result->bssid, MLAN_MAC_ADDR_LENGTH,
|
|
MLAN_MAC_ADDR_LENGTH);
|
|
|
|
pmpriv->adhoc_state = ADHOC_STARTED;
|
|
if (pmpriv->adapter->state_rdh.stage == RDH_RESTART_INTFS)
|
|
wlan_11h_radar_detected_callback((t_void *)pmpriv);
|
|
} else {
|
|
/*
|
|
* Now the join cmd should be successful.
|
|
* If BSSID has changed use SSID to compare instead of BSSID
|
|
*/
|
|
PRINTM(MINFO, "ADHOC_J_RESP %s\n", pbss_desc->ssid.ssid);
|
|
|
|
/*
|
|
* Make a copy of current BSSID descriptor, only needed
|
|
* for join since the current descriptor is already
|
|
* being used for adhoc start
|
|
*/
|
|
memcpy_ext(pmpriv->adapter,
|
|
&pmpriv->curr_bss_params.bss_descriptor, pbss_desc,
|
|
sizeof(BSSDescriptor_t), sizeof(BSSDescriptor_t));
|
|
|
|
pmpriv->adhoc_state = ADHOC_JOINED;
|
|
}
|
|
|
|
/** process wmm ie */
|
|
if (ie_len >= (int)sizeof(IEEEtypes_VendorHeader_t)) {
|
|
if ((pwmm_param_ie->vend_hdr.element_id ==
|
|
VENDOR_SPECIFIC_221) &&
|
|
!memcmp(pmadapter, pwmm_param_ie->vend_hdr.oui, wmm_oui,
|
|
sizeof(wmm_oui)) &&
|
|
(pwmm_param_ie->vend_hdr.len + 2 == ie_len)) {
|
|
DBG_HEXDUMP(MCMD_D, "WMM Param", (t_u8 *)pwmm_param_ie,
|
|
ie_len);
|
|
memcpy_ext(pmpriv->adapter,
|
|
(t_u8 *)&pmpriv->curr_bss_params
|
|
.bss_descriptor.wmm_ie,
|
|
pwmm_param_ie,
|
|
(pwmm_param_ie->vend_hdr.len + 2),
|
|
sizeof(IEEEtypes_WmmParameter_t));
|
|
pmpriv->wmm_enabled = MTRUE;
|
|
wlan_wmm_setup_queue_priorities(pmpriv, pwmm_param_ie);
|
|
wlan_wmm_setup_ac_downgrade(pmpriv);
|
|
}
|
|
}
|
|
/* Since WMM is not enabled, setup the queues with the defaults */
|
|
if (!pmpriv->wmm_enabled)
|
|
wlan_wmm_setup_queues(pmpriv);
|
|
|
|
PRINTM(MINFO, "ADHOC_RESP: Channel = %d\n", pmpriv->adhoc_channel);
|
|
PRINTM(MINFO, "ADHOC_RESP: BSSID = " MACSTR "\n",
|
|
MAC2STR(pmpriv->curr_bss_params.bss_descriptor.mac_address));
|
|
|
|
pevent->bss_index = pmpriv->bss_index;
|
|
pevent->event_id = MLAN_EVENT_ID_DRV_CONNECTED;
|
|
pevent->event_len = MLAN_MAC_ADDR_LENGTH;
|
|
memcpy_ext(pmpriv->adapter, (t_u8 *)pevent->event_buf,
|
|
(t_u8 *)pmpriv->curr_bss_params.bss_descriptor.mac_address,
|
|
MLAN_MAC_ADDR_LENGTH, MLAN_MAC_ADDR_LENGTH);
|
|
wlan_recv_event(pmpriv, MLAN_EVENT_ID_DRV_CONNECTED, pevent);
|
|
wlan_save_curr_bcn(pmpriv);
|
|
|
|
done:
|
|
/* Need to indicate IOCTL complete */
|
|
if (pioctl_req != MNULL) {
|
|
if (ret != MLAN_STATUS_SUCCESS)
|
|
pioctl_req->status_code = MLAN_ERROR_CMD_ASSOC_FAIL;
|
|
else
|
|
pioctl_req->status_code = MLAN_ERROR_NO_ERROR;
|
|
}
|
|
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Associated to a specific BSS discovered in a scan
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param pioctl_buf A pointer to MLAN IOCTL Request buffer
|
|
* @param pbss_desc A pointer to the BSS descriptor to associate with.
|
|
*
|
|
* @return MLAN_STATUS_SUCCESS or MLAN_STATUS_FAILURE
|
|
*/
|
|
mlan_status wlan_associate(mlan_private *pmpriv, t_void *pioctl_buf,
|
|
BSSDescriptor_t *pbss_desc)
|
|
{
|
|
mlan_status ret = MLAN_STATUS_SUCCESS;
|
|
t_u8 current_bssid[MLAN_MAC_ADDR_LENGTH];
|
|
pmlan_ioctl_req pioctl_req = (mlan_ioctl_req *)pioctl_buf;
|
|
|
|
ENTER();
|
|
|
|
/* Return error if the pmadapter or table entry
|
|
* is not marked as infra */
|
|
if ((pmpriv->bss_mode != MLAN_BSS_MODE_INFRA) ||
|
|
(pbss_desc->bss_mode != MLAN_BSS_MODE_INFRA)) {
|
|
if (pioctl_req)
|
|
pioctl_req->status_code = MLAN_ERROR_IOCTL_INVALID;
|
|
LEAVE();
|
|
return MLAN_STATUS_FAILURE;
|
|
}
|
|
|
|
memcpy_ext(pmpriv->adapter, ¤t_bssid,
|
|
&pmpriv->curr_bss_params.bss_descriptor.mac_address,
|
|
sizeof(current_bssid), sizeof(current_bssid));
|
|
|
|
/* Clear any past association response stored for application retrieval
|
|
*/
|
|
pmpriv->assoc_rsp_size = 0;
|
|
|
|
ret = wlan_prepare_cmd(pmpriv, HostCmd_CMD_802_11_ASSOCIATE,
|
|
HostCmd_ACT_GEN_SET, 0, pioctl_buf, pbss_desc);
|
|
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Start an Adhoc Network
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param pioctl_buf A pointer to MLAN IOCTL Request buffer
|
|
* @param padhoc_ssid The ssid of the Adhoc Network
|
|
*
|
|
* @return MLAN_STATUS_SUCCESS--success, MLAN_STATUS_FAILURE--fail
|
|
*/
|
|
mlan_status wlan_adhoc_start(mlan_private *pmpriv, t_void *pioctl_buf,
|
|
mlan_802_11_ssid *padhoc_ssid)
|
|
{
|
|
mlan_status ret = MLAN_STATUS_SUCCESS;
|
|
wlan_meas_state_t *pmeas_state = &pmpriv->adapter->state_meas;
|
|
t_u8 radar = MFALSE;
|
|
pmlan_ioctl_req pioctl_req = (mlan_ioctl_req *)pioctl_buf;
|
|
|
|
ENTER();
|
|
|
|
/*
|
|
* If the report indicates no measurement was done, leave the default
|
|
* return value alone.
|
|
*/
|
|
if (!pmeas_state->meas_rpt_returned.rpt.basic.map.unmeasured) {
|
|
radar = pmeas_state->meas_rpt_returned.rpt.basic.map.radar ?
|
|
MTRUE :
|
|
MFALSE;
|
|
}
|
|
|
|
if (radar) {
|
|
if (pioctl_req)
|
|
pioctl_req->status_code = MLAN_ERROR_IOCTL_INVALID;
|
|
ret = MLAN_STATUS_FAILURE;
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
PRINTM(MINFO, "Adhoc Channel = %d\n", pmpriv->adhoc_channel);
|
|
PRINTM(MINFO, "curr_bss_params.channel = %d\n",
|
|
pmpriv->curr_bss_params.bss_descriptor.channel);
|
|
PRINTM(MINFO, "curr_bss_params.band = %d\n",
|
|
pmpriv->curr_bss_params.band);
|
|
|
|
ret = wlan_prepare_cmd(pmpriv, HostCmd_CMD_802_11_AD_HOC_START,
|
|
HostCmd_ACT_GEN_SET, 0, pioctl_buf, padhoc_ssid);
|
|
#if defined(STA_SUPPORT)
|
|
if (ret == MLAN_STATUS_SUCCESS)
|
|
memcpy_ext(pmpriv->adapter, &pmpriv->adhoc_last_start_ssid,
|
|
padhoc_ssid, sizeof(mlan_802_11_ssid),
|
|
sizeof(mlan_802_11_ssid));
|
|
#endif
|
|
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Join an adhoc network found in a previous scan
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param pioctl_buf A pointer to MLAN IOCTL Request buffer
|
|
* @param pbss_desc A pointer to the BSS descriptor found in a previous
|
|
* scan to attempt to join
|
|
*
|
|
* @return MLAN_STATUS_SUCCESS--success, MLAN_STATUS_FAILURE--fail
|
|
*/
|
|
mlan_status wlan_adhoc_join(mlan_private *pmpriv, t_void *pioctl_buf,
|
|
BSSDescriptor_t *pbss_desc)
|
|
{
|
|
pmlan_adapter pmadapter = pmpriv->adapter;
|
|
mlan_status ret = MLAN_STATUS_SUCCESS;
|
|
pmlan_ioctl_req pioctl_req = (mlan_ioctl_req *)pioctl_buf;
|
|
|
|
ENTER();
|
|
|
|
PRINTM(MINFO, "wlan_adhoc_join: CurBss.ssid =%s\n",
|
|
pmpriv->curr_bss_params.bss_descriptor.ssid.ssid);
|
|
PRINTM(MINFO, "wlan_adhoc_join: CurBss.ssid_len =%u\n",
|
|
pmpriv->curr_bss_params.bss_descriptor.ssid.ssid_len);
|
|
PRINTM(MINFO, "wlan_adhoc_join: ssid =%s\n", pbss_desc->ssid.ssid);
|
|
PRINTM(MINFO, "wlan_adhoc_join: ssid len =%u\n",
|
|
pbss_desc->ssid.ssid_len);
|
|
|
|
/* Check if the requested SSID is already joined */
|
|
if (pmpriv->curr_bss_params.bss_descriptor.ssid.ssid_len &&
|
|
!wlan_ssid_cmp(pmadapter, &pbss_desc->ssid,
|
|
&pmpriv->curr_bss_params.bss_descriptor.ssid) &&
|
|
(pmpriv->curr_bss_params.bss_descriptor.bss_mode ==
|
|
MLAN_BSS_MODE_IBSS)) {
|
|
PRINTM(MINFO,
|
|
"ADHOC_J_CMD: New ad-hoc SSID is the same as current, "
|
|
"not attempting to re-join\n");
|
|
|
|
if (pioctl_req)
|
|
pioctl_req->status_code = MLAN_ERROR_IOCTL_INVALID;
|
|
LEAVE();
|
|
return MLAN_STATUS_FAILURE;
|
|
}
|
|
|
|
PRINTM(MINFO, "curr_bss_params.channel = %d\n",
|
|
pmpriv->curr_bss_params.bss_descriptor.channel);
|
|
PRINTM(MINFO, "curr_bss_params.band = %d\n",
|
|
pmpriv->curr_bss_params.band);
|
|
|
|
ret = wlan_prepare_cmd(pmpriv, HostCmd_CMD_802_11_AD_HOC_JOIN,
|
|
HostCmd_ACT_GEN_SET, 0, pioctl_buf, pbss_desc);
|
|
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Send Deauthentication Request or Stop the AdHoc network depending on
|
|
* mode
|
|
*
|
|
* @param pmpriv A pointer to mlan_private structure
|
|
* @param pioctl_req A pointer to mlan_ioctl_req structure
|
|
* @param deauth_param A pointer to mlan_deauth_param structure
|
|
*
|
|
* @return MLAN_STATUS_SUCCESS--success, MLAN_STATUS_FAILURE--fail,
|
|
* MLAN_STATUS_PENDING--pending
|
|
*/
|
|
mlan_status wlan_disconnect(mlan_private *pmpriv, mlan_ioctl_req *pioctl_req,
|
|
mlan_deauth_param *deauth_param)
|
|
{
|
|
mlan_status ret = MLAN_STATUS_SUCCESS;
|
|
mlan_deauth_param local_param = {.mac_addr = {0, 0, 0, 0, 0, 0},
|
|
.reason_code = DEF_DEAUTH_REASON_CODE};
|
|
t_u8 zero_mac[] = {0, 0, 0, 0, 0, 0};
|
|
|
|
ENTER();
|
|
|
|
if (deauth_param)
|
|
memcpy_ext(pmpriv->adapter, &local_param, deauth_param,
|
|
sizeof(*deauth_param), sizeof(local_param));
|
|
if (pmpriv->media_connected == MTRUE) {
|
|
if (pmpriv->bss_mode == MLAN_BSS_MODE_INFRA) {
|
|
if (!deauth_param ||
|
|
!memcmp(pmpriv->adapter, deauth_param->mac_addr,
|
|
zero_mac, sizeof(zero_mac)))
|
|
memcpy_ext(pmpriv->adapter,
|
|
local_param.mac_addr,
|
|
(t_u8 *)&pmpriv->curr_bss_params
|
|
.bss_descriptor.mac_address,
|
|
MLAN_MAC_ADDR_LENGTH,
|
|
MLAN_MAC_ADDR_LENGTH);
|
|
#ifdef WIFI_DIRECT_SUPPORT
|
|
if (pmpriv->bss_type == MLAN_BSS_TYPE_WIFIDIRECT)
|
|
ret = wlan_prepare_cmd(
|
|
pmpriv, HostCmd_CMD_802_11_DISASSOCIATE,
|
|
HostCmd_ACT_GEN_SET, 0,
|
|
(t_void *)pioctl_req, &local_param);
|
|
else
|
|
#endif
|
|
ret = wlan_prepare_cmd(
|
|
pmpriv,
|
|
HostCmd_CMD_802_11_DEAUTHENTICATE,
|
|
HostCmd_ACT_GEN_SET, 0,
|
|
(t_void *)pioctl_req, &local_param);
|
|
|
|
if (ret == MLAN_STATUS_SUCCESS && pioctl_req)
|
|
ret = MLAN_STATUS_PENDING;
|
|
|
|
} else if (pmpriv->bss_mode == MLAN_BSS_MODE_IBSS) {
|
|
ret = wlan_prepare_cmd(pmpriv,
|
|
HostCmd_CMD_802_11_AD_HOC_STOP,
|
|
HostCmd_ACT_GEN_SET, 0,
|
|
(t_void *)pioctl_req, MNULL);
|
|
|
|
if (ret == MLAN_STATUS_SUCCESS && pioctl_req)
|
|
ret = MLAN_STATUS_PENDING;
|
|
}
|
|
}
|
|
|
|
LEAVE();
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Convert band to radio type used in channel TLV
|
|
*
|
|
* @param band Band enumeration to convert to a channel TLV radio type
|
|
*
|
|
* @return Radio type designator for use in a channel TLV
|
|
*/
|
|
t_u8 wlan_band_to_radio_type(t_u16 band)
|
|
{
|
|
t_u8 ret_radio_type;
|
|
|
|
ENTER();
|
|
|
|
switch (band) {
|
|
case BAND_A:
|
|
case BAND_AN:
|
|
case BAND_A | BAND_AN:
|
|
case BAND_A | BAND_AN | BAND_AAC:
|
|
ret_radio_type = BAND_5GHZ;
|
|
break;
|
|
case BAND_B:
|
|
case BAND_G:
|
|
case BAND_B | BAND_G:
|
|
default:
|
|
ret_radio_type = BAND_2GHZ;
|
|
break;
|
|
}
|
|
|
|
LEAVE();
|
|
return ret_radio_type;
|
|
}
|