ath6kl: Implement mgmt_tx
[pandora-kernel.git] / drivers / net / wireless / ath / ath6kl / cfg80211.c
index 14559ff..5c98de3 100644 (file)
@@ -17,6 +17,7 @@
 #include "core.h"
 #include "cfg80211.h"
 #include "debug.h"
+#include "hif-ops.h"
 
 #define RATETAB_ENT(_rate, _rateid, _flags) {   \
        .bitrate    = (_rate),                  \
@@ -425,8 +426,6 @@ void ath6kl_cfg80211_connect_event(struct ath6kl *ar, u16 channel,
        unsigned char *ptr_ie_buf = ie_buf;
        unsigned char *ieeemgmtbuf = NULL;
        u8 source_mac[ETH_ALEN];
-       u16 capa_mask;
-       u16 capa_val;
 
        /* capinfo + listen interval */
        u8 assoc_req_ie_offset = sizeof(u16) + sizeof(u16);
@@ -459,24 +458,6 @@ void ath6kl_cfg80211_connect_event(struct ath6kl *ar, u16 channel,
                }
        }
 
-       if (nw_type & ADHOC_NETWORK) {
-               capa_mask = WLAN_CAPABILITY_IBSS;
-               capa_val = WLAN_CAPABILITY_IBSS;
-       } else {
-               capa_mask = WLAN_CAPABILITY_ESS;
-               capa_val = WLAN_CAPABILITY_ESS;
-       }
-
-       /* Before informing the join/connect event, make sure that
-        * bss entry is present in scan list, if it not present
-        * construct and insert into scan list, otherwise that
-        * event will be dropped on the way by cfg80211, due to
-        * this keys will not be plumbed in case of WEP and
-        * application will not be aware of join/connect status. */
-       bss = cfg80211_get_bss(ar->wdev->wiphy, NULL, bssid,
-                              ar->wdev->ssid, ar->wdev->ssid_len,
-                              capa_mask, capa_val);
-
        /*
         * Earlier we were updating the cfg about bss by making a beacon frame
         * only if the entry for bss is not there. This can have some issue if
@@ -527,7 +508,6 @@ void ath6kl_cfg80211_connect_event(struct ath6kl *ar, u16 channel,
        ieeemgmtbuf = kzalloc(size, GFP_ATOMIC);
        if (!ieeemgmtbuf) {
                ath6kl_err("ieee mgmt buf alloc error\n");
-               cfg80211_put_bss(bss);
                return;
        }
 
@@ -664,7 +644,7 @@ void ath6kl_cfg80211_disconnect_event(struct ath6kl *ar, u8 reason,
                                                NULL, 0,
                                                WLAN_STATUS_UNSPECIFIED_FAILURE,
                                                GFP_KERNEL);
-               } else {
+               } else if (ar->sme_state == SME_CONNECTED) {
                        cfg80211_disconnected(ar->net_dev, reason,
                                              NULL, 0, GFP_KERNEL);
                }
@@ -723,8 +703,6 @@ static inline bool is_ch_11a(u16 ch)
 /* struct ath6kl_node_table::nt_nodelock is locked when calling this */
 void ath6kl_cfg80211_scan_node(struct wiphy *wiphy, struct bss *ni)
 {
-       u16 size;
-       unsigned char *ieeemgmtbuf = NULL;
        struct ieee80211_mgmt *mgmt;
        struct ieee80211_channel *channel;
        struct ieee80211_supported_band *band;
@@ -741,37 +719,29 @@ void ath6kl_cfg80211_scan_node(struct wiphy *wiphy, struct bss *ni)
        else
                band = wiphy->bands[IEEE80211_BAND_2GHZ]; /* 11b */
 
-       size = ni->ni_framelen + offsetof(struct ieee80211_mgmt, u);
-       ieeemgmtbuf = kmalloc(size, GFP_ATOMIC);
-       if (!ieeemgmtbuf) {
-               ath6kl_err("ieee mgmt buf alloc error\n");
-               return;
-       }
-
-       /*
-        * TODO: Update target to include 802.11 mac header while sending
-        * bss info. Target removes 802.11 mac header while sending the bss
-        * info to host, cfg80211 needs it, for time being just filling the
-        * da, sa and bssid fields alone.
-        */
-       mgmt = (struct ieee80211_mgmt *)ieeemgmtbuf;
-       memset(mgmt->da, 0xff, ETH_ALEN);       /*broadcast addr */
-       memcpy(mgmt->sa, ni->ni_macaddr, ETH_ALEN);
-       memcpy(mgmt->bssid, ni->ni_macaddr, ETH_ALEN);
-       memcpy(ieeemgmtbuf + offsetof(struct ieee80211_mgmt, u),
-              ni->ni_buf, ni->ni_framelen);
-
        freq = cie->ie_chan;
        channel = ieee80211_get_channel(wiphy, freq);
        signal = ni->ni_snr * 100;
 
        ath6kl_dbg(ATH6KL_DBG_WLAN_CFG,
                   "%s: bssid %pM ch %d freq %d size %d\n", __func__,
-                  mgmt->bssid, channel->hw_value, freq, size);
-       cfg80211_inform_bss_frame(wiphy, channel, mgmt,
-                                 size, signal, GFP_ATOMIC);
-
-       kfree(ieeemgmtbuf);
+                  ni->ni_macaddr, channel->hw_value, freq, ni->ni_framelen);
+       /*
+        * Both Beacon and Probe Response frames have same payload structure,
+        * so it is fine to share the parser for both.
+        */
+       if (ni->ni_framelen < 8 + 2 + 2)
+               return;
+       mgmt = (struct ieee80211_mgmt *) (ni->ni_buf -
+                                         offsetof(struct ieee80211_mgmt, u));
+       cfg80211_inform_bss(wiphy, channel, ni->ni_macaddr,
+                           le64_to_cpu(mgmt->u.beacon.timestamp),
+                           le16_to_cpu(mgmt->u.beacon.capab_info),
+                           le16_to_cpu(mgmt->u.beacon.beacon_int),
+                           mgmt->u.beacon.variable,
+                           ni->ni_buf + ni->ni_framelen -
+                           mgmt->u.beacon.variable,
+                           signal, GFP_ATOMIC);
 }
 
 static int ath6kl_cfg80211_scan(struct wiphy *wiphy, struct net_device *ndev,
@@ -918,6 +888,26 @@ static int ath6kl_cfg80211_add_key(struct wiphy *wiphy, struct net_device *ndev,
                   key_usage, key->seq_len);
 
        ar->def_txkey_index = key_index;
+
+       if (ar->nw_type == AP_NETWORK && !pairwise &&
+           (key_type == TKIP_CRYPT || key_type == AES_CRYPT) && params) {
+               ar->ap_mode_bkey.valid = true;
+               ar->ap_mode_bkey.key_index = key_index;
+               ar->ap_mode_bkey.key_type = key_type;
+               ar->ap_mode_bkey.key_len = key->key_len;
+               memcpy(ar->ap_mode_bkey.key, key->key, key->key_len);
+               if (!test_bit(CONNECTED, &ar->flag)) {
+                       ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "Delay initial group "
+                                  "key configuration until AP mode has been "
+                                  "started\n");
+                       /*
+                        * The key will be set in ath6kl_connect_ap_mode() once
+                        * the connected event is received from the target.
+                        */
+                       return 0;
+               }
+       }
+
        status = ath6kl_wmi_addkey_cmd(ar->wmi, ar->def_txkey_index,
                                       key_type, key_usage, key->key_len,
                                       key->seq, key->key, KEY_OP_INIT_VAL,
@@ -1027,6 +1017,9 @@ static int ath6kl_cfg80211_set_default_key(struct wiphy *wiphy,
        if (ar->prwise_crypto == WEP_CRYPT)
                key_usage |= TX_USAGE;
 
+       if (ar->nw_type == AP_NETWORK && !test_bit(CONNECTED, &ar->flag))
+               return 0; /* Delay until AP mode has been started */
+
        status = ath6kl_wmi_addkey_cmd(ar->wmi, ar->def_txkey_index,
                                       ar->prwise_crypto, key_usage,
                                       key->key_len, key->seq, key->key,
@@ -1455,6 +1448,268 @@ static int ath6kl_flush_pmksa(struct wiphy *wiphy, struct net_device *netdev)
        return 0;
 }
 
+#ifdef CONFIG_PM
+static int ar6k_cfg80211_suspend(struct wiphy *wiphy,
+                                struct cfg80211_wowlan *wow)
+{
+       struct ath6kl *ar = wiphy_priv(wiphy);
+
+       return ath6kl_hif_suspend(ar);
+}
+#endif
+
+static int ath6kl_set_channel(struct wiphy *wiphy, struct net_device *dev,
+                             struct ieee80211_channel *chan,
+                             enum nl80211_channel_type channel_type)
+{
+       struct ath6kl *ar = ath6kl_priv(dev);
+
+       if (!ath6kl_cfg80211_ready(ar))
+               return -EIO;
+
+       ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: center_freq=%u hw_value=%u\n",
+                  __func__, chan->center_freq, chan->hw_value);
+       ar->next_chan = chan->center_freq;
+
+       return 0;
+}
+
+static int ath6kl_ap_beacon(struct wiphy *wiphy, struct net_device *dev,
+                           struct beacon_parameters *info, bool add)
+{
+       struct ath6kl *ar = ath6kl_priv(dev);
+       struct ieee80211_mgmt *mgmt;
+       u8 *ies;
+       int ies_len;
+       struct wmi_connect_cmd p;
+       int res;
+       int i;
+
+       ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: add=%d\n", __func__, add);
+
+       if (!ath6kl_cfg80211_ready(ar))
+               return -EIO;
+
+       if (ar->next_mode != AP_NETWORK)
+               return -EOPNOTSUPP;
+
+       if (info->beacon_ies) {
+               res = ath6kl_wmi_set_appie_cmd(ar->wmi, WMI_FRAME_BEACON,
+                                              info->beacon_ies,
+                                              info->beacon_ies_len);
+               if (res)
+                       return res;
+       }
+       if (info->proberesp_ies) {
+               res = ath6kl_wmi_set_appie_cmd(ar->wmi, WMI_FRAME_PROBE_RESP,
+                                              info->proberesp_ies,
+                                              info->proberesp_ies_len);
+               if (res)
+                       return res;
+       }
+       if (info->assocresp_ies) {
+               res = ath6kl_wmi_set_appie_cmd(ar->wmi, WMI_FRAME_ASSOC_RESP,
+                                              info->assocresp_ies,
+                                              info->assocresp_ies_len);
+               if (res)
+                       return res;
+       }
+
+       if (!add)
+               return 0;
+
+       ar->ap_mode_bkey.valid = false;
+
+       /* TODO:
+        * info->interval
+        * info->dtim_period
+        */
+
+       if (info->head == NULL)
+               return -EINVAL;
+       mgmt = (struct ieee80211_mgmt *) info->head;
+       ies = mgmt->u.beacon.variable;
+       if (ies > info->head + info->head_len)
+               return -EINVAL;
+       ies_len = info->head + info->head_len - ies;
+
+       if (info->ssid == NULL)
+               return -EINVAL;
+       memcpy(ar->ssid, info->ssid, info->ssid_len);
+       ar->ssid_len = info->ssid_len;
+       if (info->hidden_ssid != NL80211_HIDDEN_SSID_NOT_IN_USE)
+               return -EOPNOTSUPP; /* TODO */
+
+       ar->dot11_auth_mode = OPEN_AUTH;
+
+       memset(&p, 0, sizeof(p));
+
+       for (i = 0; i < info->crypto.n_akm_suites; i++) {
+               switch (info->crypto.akm_suites[i]) {
+               case WLAN_AKM_SUITE_8021X:
+                       if (info->crypto.wpa_versions & NL80211_WPA_VERSION_1)
+                               p.auth_mode |= WPA_AUTH;
+                       if (info->crypto.wpa_versions & NL80211_WPA_VERSION_2)
+                               p.auth_mode |= WPA2_AUTH;
+                       break;
+               case WLAN_AKM_SUITE_PSK:
+                       if (info->crypto.wpa_versions & NL80211_WPA_VERSION_1)
+                               p.auth_mode |= WPA_PSK_AUTH;
+                       if (info->crypto.wpa_versions & NL80211_WPA_VERSION_2)
+                               p.auth_mode |= WPA2_PSK_AUTH;
+                       break;
+               }
+       }
+       if (p.auth_mode == 0)
+               p.auth_mode = NONE_AUTH;
+       ar->auth_mode = p.auth_mode;
+
+       for (i = 0; i < info->crypto.n_ciphers_pairwise; i++) {
+               switch (info->crypto.ciphers_pairwise[i]) {
+               case WLAN_CIPHER_SUITE_WEP40:
+               case WLAN_CIPHER_SUITE_WEP104:
+                       p.prwise_crypto_type |= WEP_CRYPT;
+                       break;
+               case WLAN_CIPHER_SUITE_TKIP:
+                       p.prwise_crypto_type |= TKIP_CRYPT;
+                       break;
+               case WLAN_CIPHER_SUITE_CCMP:
+                       p.prwise_crypto_type |= AES_CRYPT;
+                       break;
+               }
+       }
+       if (p.prwise_crypto_type == 0)
+               p.prwise_crypto_type = NONE_CRYPT;
+
+       switch (info->crypto.cipher_group) {
+       case WLAN_CIPHER_SUITE_WEP40:
+       case WLAN_CIPHER_SUITE_WEP104:
+               p.grp_crypto_type = WEP_CRYPT;
+               break;
+       case WLAN_CIPHER_SUITE_TKIP:
+               p.grp_crypto_type = TKIP_CRYPT;
+               break;
+       case WLAN_CIPHER_SUITE_CCMP:
+               p.grp_crypto_type = AES_CRYPT;
+               break;
+       default:
+               p.grp_crypto_type = NONE_CRYPT;
+               break;
+       }
+
+       p.nw_type = AP_NETWORK;
+       ar->nw_type = ar->next_mode;
+
+       p.ssid_len = ar->ssid_len;
+       memcpy(p.ssid, ar->ssid, ar->ssid_len);
+       p.dot11_auth_mode = ar->dot11_auth_mode;
+       p.ch = cpu_to_le16(ar->next_chan);
+
+       res = ath6kl_wmi_ap_profile_commit(ar->wmi, &p);
+       if (res < 0)
+               return res;
+
+       return 0;
+}
+
+static int ath6kl_add_beacon(struct wiphy *wiphy, struct net_device *dev,
+                            struct beacon_parameters *info)
+{
+       return ath6kl_ap_beacon(wiphy, dev, info, true);
+}
+
+static int ath6kl_set_beacon(struct wiphy *wiphy, struct net_device *dev,
+                            struct beacon_parameters *info)
+{
+       return ath6kl_ap_beacon(wiphy, dev, info, false);
+}
+
+static int ath6kl_del_beacon(struct wiphy *wiphy, struct net_device *dev)
+{
+       struct ath6kl *ar = ath6kl_priv(dev);
+
+       if (ar->nw_type != AP_NETWORK)
+               return -EOPNOTSUPP;
+       if (!test_bit(CONNECTED, &ar->flag))
+               return -ENOTCONN;
+
+       ath6kl_wmi_disconnect_cmd(ar->wmi);
+       clear_bit(CONNECTED, &ar->flag);
+
+       return 0;
+}
+
+static int ath6kl_change_station(struct wiphy *wiphy, struct net_device *dev,
+                                u8 *mac, struct station_parameters *params)
+{
+       struct ath6kl *ar = ath6kl_priv(dev);
+
+       if (ar->nw_type != AP_NETWORK)
+               return -EOPNOTSUPP;
+
+       /* Use this only for authorizing/unauthorizing a station */
+       if (!(params->sta_flags_mask & BIT(NL80211_STA_FLAG_AUTHORIZED)))
+               return -EOPNOTSUPP;
+
+       if (params->sta_flags_set & BIT(NL80211_STA_FLAG_AUTHORIZED))
+               return ath6kl_wmi_ap_set_mlme(ar->wmi, WMI_AP_MLME_AUTHORIZE,
+                                             mac, 0);
+       return ath6kl_wmi_ap_set_mlme(ar->wmi, WMI_AP_MLME_UNAUTHORIZE, mac,
+                                     0);
+}
+
+static int ath6kl_remain_on_channel(struct wiphy *wiphy,
+                                   struct net_device *dev,
+                                   struct ieee80211_channel *chan,
+                                   enum nl80211_channel_type channel_type,
+                                   unsigned int duration,
+                                   u64 *cookie)
+{
+       struct ath6kl *ar = ath6kl_priv(dev);
+
+       /* TODO: if already pending or ongoing remain-on-channel,
+        * return -EBUSY */
+       *cookie = 1; /* only a single pending request is supported */
+
+       return ath6kl_wmi_remain_on_chnl_cmd(ar->wmi, chan->center_freq,
+                                            duration);
+}
+
+static int ath6kl_cancel_remain_on_channel(struct wiphy *wiphy,
+                                          struct net_device *dev,
+                                          u64 cookie)
+{
+       struct ath6kl *ar = ath6kl_priv(dev);
+
+       if (cookie != 1)
+               return -ENOENT;
+
+       return ath6kl_wmi_cancel_remain_on_chnl_cmd(ar->wmi);
+}
+
+static int ath6kl_mgmt_tx(struct wiphy *wiphy, struct net_device *dev,
+                         struct ieee80211_channel *chan, bool offchan,
+                         enum nl80211_channel_type channel_type,
+                         bool channel_type_valid, unsigned int wait,
+                         const u8 *buf, size_t len, u64 *cookie)
+{
+       struct ath6kl *ar = ath6kl_priv(dev);
+       u32 id;
+
+       id = ar->send_action_id++;
+       if (id == 0) {
+               /*
+                * 0 is a reserved value in the WMI command and shall not be
+                * used for the command.
+                */
+               id = ar->send_action_id++;
+       }
+
+       *cookie = id;
+       return ath6kl_wmi_send_action_cmd(ar->wmi, id, chan->center_freq, wait,
+                                         buf, len);
+}
+
 static struct cfg80211_ops ath6kl_cfg80211_ops = {
        .change_virtual_intf = ath6kl_cfg80211_change_iface,
        .scan = ath6kl_cfg80211_scan,
@@ -1474,6 +1729,17 @@ static struct cfg80211_ops ath6kl_cfg80211_ops = {
        .set_pmksa = ath6kl_set_pmksa,
        .del_pmksa = ath6kl_del_pmksa,
        .flush_pmksa = ath6kl_flush_pmksa,
+#ifdef CONFIG_PM
+       .suspend = ar6k_cfg80211_suspend,
+#endif
+       .set_channel = ath6kl_set_channel,
+       .add_beacon = ath6kl_add_beacon,
+       .set_beacon = ath6kl_set_beacon,
+       .del_beacon = ath6kl_del_beacon,
+       .change_station = ath6kl_change_station,
+       .remain_on_channel = ath6kl_remain_on_channel,
+       .cancel_remain_on_channel = ath6kl_cancel_remain_on_channel,
+       .mgmt_tx = ath6kl_mgmt_tx,
 };
 
 struct wireless_dev *ath6kl_cfg80211_init(struct device *dev)
@@ -1495,6 +1761,8 @@ struct wireless_dev *ath6kl_cfg80211_init(struct device *dev)
                return NULL;
        }
 
+       wdev->wiphy->max_remain_on_channel_duration = 5000;
+
        /* set device pointer for wiphy */
        set_wiphy_dev(wdev->wiphy, dev);