]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - drivers/staging/wilc1000/coreconfigurator.c
Merge branches 'for-4.4/upstream-fixes', 'for-4.5/async-suspend', 'for-4.5/container...
[mirror_ubuntu-bionic-kernel.git] / drivers / staging / wilc1000 / coreconfigurator.c
CommitLineData
c5c77ba1
JK
1
2/*!
3 * @file coreconfigurator.c
4 * @brief
5 * @author
6 * @sa coreconfigurator.h
7 * @date 1 Mar 2012
8 * @version 1.0
9 */
10
c5c77ba1 11#include "coreconfigurator.h"
dd322576 12#include "wilc_wlan_if.h"
1028e5a4 13#include "wilc_wlan.h"
24db713f 14#include <linux/errno.h>
e215a871 15#include <linux/slab.h>
c5c77ba1
JK
16#define TAG_PARAM_OFFSET (MAC_HDR_LEN + TIME_STAMP_LEN + \
17 BEACON_INTERVAL_LEN + CAP_INFO_LEN)
18
c5c77ba1 19/* Basic Frame Type Codes (2-bit) */
9dd2f771 20enum basic_frame_type {
13994d1e
SK
21 FRAME_TYPE_CONTROL = 0x04,
22 FRAME_TYPE_DATA = 0x08,
23 FRAME_TYPE_MANAGEMENT = 0x00,
24 FRAME_TYPE_RESERVED = 0x0C,
25 FRAME_TYPE_FORCE_32BIT = 0xFFFFFFFF
9dd2f771 26};
c5c77ba1
JK
27
28/* Frame Type and Subtype Codes (6-bit) */
9dd2f771 29enum sub_frame_type {
c5c77ba1
JK
30 ASSOC_REQ = 0x00,
31 ASSOC_RSP = 0x10,
32 REASSOC_REQ = 0x20,
33 REASSOC_RSP = 0x30,
34 PROBE_REQ = 0x40,
35 PROBE_RSP = 0x50,
36 BEACON = 0x80,
37 ATIM = 0x90,
38 DISASOC = 0xA0,
39 AUTH = 0xB0,
40 DEAUTH = 0xC0,
41 ACTION = 0xD0,
42 PS_POLL = 0xA4,
43 RTS = 0xB4,
44 CTS = 0xC4,
45 ACK = 0xD4,
46 CFEND = 0xE4,
47 CFEND_ACK = 0xF4,
48 DATA = 0x08,
49 DATA_ACK = 0x18,
50 DATA_POLL = 0x28,
51 DATA_POLL_ACK = 0x38,
52 NULL_FRAME = 0x48,
53 CFACK = 0x58,
54 CFPOLL = 0x68,
55 CFPOLL_ACK = 0x78,
56 QOS_DATA = 0x88,
57 QOS_DATA_ACK = 0x98,
58 QOS_DATA_POLL = 0xA8,
59 QOS_DATA_POLL_ACK = 0xB8,
60 QOS_NULL_FRAME = 0xC8,
61 QOS_CFPOLL = 0xE8,
62 QOS_CFPOLL_ACK = 0xF8,
63 BLOCKACK_REQ = 0x84,
64 BLOCKACK = 0x94,
65 FRAME_SUBTYPE_FORCE_32BIT = 0xFFFFFFFF
9dd2f771 66};
c5c77ba1 67
c5c77ba1 68/* Element ID of various Information Elements */
9dd2f771 69enum info_element_id {
c5c77ba1
JK
70 ISSID = 0, /* Service Set Identifier */
71 ISUPRATES = 1, /* Supported Rates */
72 IFHPARMS = 2, /* FH parameter set */
73 IDSPARMS = 3, /* DS parameter set */
74 ICFPARMS = 4, /* CF parameter set */
75 ITIM = 5, /* Traffic Information Map */
76 IIBPARMS = 6, /* IBSS parameter set */
77 ICOUNTRY = 7, /* Country element */
78 IEDCAPARAMS = 12, /* EDCA parameter set */
79 ITSPEC = 13, /* Traffic Specification */
80 ITCLAS = 14, /* Traffic Classification */
81 ISCHED = 15, /* Schedule */
82 ICTEXT = 16, /* Challenge Text */
83 IPOWERCONSTRAINT = 32, /* Power Constraint */
84 IPOWERCAPABILITY = 33, /* Power Capability */
85 ITPCREQUEST = 34, /* TPC Request */
86 ITPCREPORT = 35, /* TPC Report */
87 ISUPCHANNEL = 36, /* Supported channel list */
88 ICHSWANNOUNC = 37, /* Channel Switch Announcement */
89 IMEASUREMENTREQUEST = 38, /* Measurement request */
90 IMEASUREMENTREPORT = 39, /* Measurement report */
91 IQUIET = 40, /* Quiet element Info */
92 IIBSSDFS = 41, /* IBSS DFS */
93 IERPINFO = 42, /* ERP Information */
94 ITSDELAY = 43, /* TS Delay */
95 ITCLASPROCESS = 44, /* TCLAS Processing */
96 IHTCAP = 45, /* HT Capabilities */
97 IQOSCAP = 46, /* QoS Capability */
98 IRSNELEMENT = 48, /* RSN Information Element */
99 IEXSUPRATES = 50, /* Extended Supported Rates */
100 IEXCHSWANNOUNC = 60, /* Extended Ch Switch Announcement*/
101 IHTOPERATION = 61, /* HT Information */
102 ISECCHOFF = 62, /* Secondary Channel Offeset */
103 I2040COEX = 72, /* 20/40 Coexistence IE */
104 I2040INTOLCHREPORT = 73, /* 20/40 Intolerant channel report*/
105 IOBSSSCAN = 74, /* OBSS Scan parameters */
106 IEXTCAP = 127, /* Extended capability */
107 IWMM = 221, /* WMM parameters */
108 IWPAELEMENT = 221, /* WPA Information Element */
109 INFOELEM_ID_FORCE_32BIT = 0xFFFFFFFF
9dd2f771 110};
c5c77ba1 111
c5c77ba1
JK
112/* This function extracts the beacon period field from the beacon or probe */
113/* response frame. */
9af382bc 114static inline u16 get_beacon_period(u8 *data)
c5c77ba1 115{
b5c84cd8 116 u16 bcn_per;
c5c77ba1
JK
117
118 bcn_per = data[0];
119 bcn_per |= (data[1] << 8);
120
121 return bcn_per;
122}
123
9af382bc 124static inline u32 get_beacon_timestamp_lo(u8 *data)
c5c77ba1 125{
4e4467fd
CL
126 u32 time_stamp = 0;
127 u32 index = MAC_HDR_LEN;
c5c77ba1
JK
128
129 time_stamp |= data[index++];
130 time_stamp |= (data[index++] << 8);
131 time_stamp |= (data[index++] << 16);
132 time_stamp |= (data[index] << 24);
133
134 return time_stamp;
135}
136
9af382bc 137static inline u32 get_beacon_timestamp_hi(u8 *data)
c5c77ba1 138{
8a54d917
CL
139 u32 time_stamp = 0;
140 u32 index = (MAC_HDR_LEN + 4);
c5c77ba1
JK
141
142 time_stamp |= data[index++];
143 time_stamp |= (data[index++] << 8);
144 time_stamp |= (data[index++] << 16);
145 time_stamp |= (data[index] << 24);
146
147 return time_stamp;
148}
149
c5c77ba1
JK
150/* This function extracts the 'frame type and sub type' bits from the MAC */
151/* header of the input frame. */
152/* Returns the value in the LSB of the returned value. */
9dd2f771 153static inline enum sub_frame_type get_sub_type(u8 *header)
c5c77ba1 154{
9dd2f771 155 return ((enum sub_frame_type)(header[0] & 0xFC));
c5c77ba1
JK
156}
157
158/* This function extracts the 'to ds' bit from the MAC header of the input */
159/* frame. */
160/* Returns the value in the LSB of the returned value. */
9af382bc 161static inline u8 get_to_ds(u8 *header)
c5c77ba1
JK
162{
163 return (header[1] & 0x01);
164}
165
166/* This function extracts the 'from ds' bit from the MAC header of the input */
167/* frame. */
168/* Returns the value in the LSB of the returned value. */
9af382bc 169static inline u8 get_from_ds(u8 *header)
c5c77ba1
JK
170{
171 return ((header[1] & 0x02) >> 1);
172}
173
b57f9f34
GL
174/* This function extracts the MAC Address in 'address1' field of the MAC */
175/* header and updates the MAC Address in the allocated 'addr' variable. */
176static inline void get_address1(u8 *pu8msa, u8 *addr)
177{
178 memcpy(addr, pu8msa + 4, 6);
179}
180
181/* This function extracts the MAC Address in 'address2' field of the MAC */
182/* header and updates the MAC Address in the allocated 'addr' variable. */
183static inline void get_address2(u8 *pu8msa, u8 *addr)
184{
185 memcpy(addr, pu8msa + 10, 6);
186}
187
188/* This function extracts the MAC Address in 'address3' field of the MAC */
189/* header and updates the MAC Address in the allocated 'addr' variable. */
190static inline void get_address3(u8 *pu8msa, u8 *addr)
191{
192 memcpy(addr, pu8msa + 16, 6);
193}
194
c5c77ba1 195/* This function extracts the BSSID from the incoming WLAN packet based on */
b57f9f34 196/* the 'from ds' bit, and updates the MAC Address in the allocated 'addr' */
c5c77ba1 197/* variable. */
9af382bc 198static inline void get_BSSID(u8 *data, u8 *bssid)
c5c77ba1
JK
199{
200 if (get_from_ds(data) == 1)
b57f9f34 201 get_address2(data, bssid);
c5c77ba1 202 else if (get_to_ds(data) == 1)
b57f9f34 203 get_address1(data, bssid);
c5c77ba1 204 else
b57f9f34 205 get_address3(data, bssid);
c5c77ba1
JK
206}
207
208/* This function extracts the SSID from a beacon/probe response frame */
9af382bc 209static inline void get_ssid(u8 *data, u8 *ssid, u8 *p_ssid_len)
c5c77ba1 210{
63d03e47
GKH
211 u8 len = 0;
212 u8 i = 0;
213 u8 j = 0;
c5c77ba1
JK
214
215 len = data[MAC_HDR_LEN + TIME_STAMP_LEN + BEACON_INTERVAL_LEN +
216 CAP_INFO_LEN + 1];
217 j = MAC_HDR_LEN + TIME_STAMP_LEN + BEACON_INTERVAL_LEN +
218 CAP_INFO_LEN + 2;
219
220 /* If the SSID length field is set wrongly to a value greater than the */
221 /* allowed maximum SSID length limit, reset the length to 0 */
222 if (len >= MAX_SSID_LEN)
223 len = 0;
224
225 for (i = 0; i < len; i++, j++)
226 ssid[i] = data[j];
227
228 ssid[len] = '\0';
229
230 *p_ssid_len = len;
231}
232
233/* This function extracts the capability info field from the beacon or probe */
234/* response frame. */
9af382bc 235static inline u16 get_cap_info(u8 *data)
c5c77ba1 236{
d85f5326
CL
237 u16 cap_info = 0;
238 u16 index = MAC_HDR_LEN;
9dd2f771 239 enum sub_frame_type st;
c5c77ba1
JK
240
241 st = get_sub_type(data);
242
243 /* Location of the Capability field is different for Beacon and */
244 /* Association frames. */
245 if ((st == BEACON) || (st == PROBE_RSP))
246 index += TIME_STAMP_LEN + BEACON_INTERVAL_LEN;
247
248 cap_info = data[index];
249 cap_info |= (data[index + 1] << 8);
250
251 return cap_info;
252}
253
254/* This function extracts the capability info field from the Association */
255/* response frame. */
9af382bc 256static inline u16 get_assoc_resp_cap_info(u8 *data)
c5c77ba1 257{
b5c84cd8 258 u16 cap_info;
c5c77ba1
JK
259
260 cap_info = data[0];
261 cap_info |= (data[1] << 8);
262
263 return cap_info;
264}
265
960819a1 266/* This function extracts the association status code from the incoming */
c5c77ba1 267/* association response frame and returns association status code */
9af382bc 268static inline u16 get_asoc_status(u8 *data)
c5c77ba1 269{
b5c84cd8 270 u16 asoc_status;
c5c77ba1
JK
271
272 asoc_status = data[3];
273 asoc_status = (asoc_status << 8) | data[2];
274
275 return asoc_status;
276}
277
278/* This function extracts association ID from the incoming association */
279/* response frame */
9af382bc 280static inline u16 get_asoc_id(u8 *data)
c5c77ba1 281{
b5c84cd8 282 u16 asoc_id;
c5c77ba1
JK
283
284 asoc_id = data[4];
285 asoc_id |= (data[5] << 8);
286
287 return asoc_id;
288}
289
d85f5326 290u8 *get_tim_elm(u8 *pu8msa, u16 u16RxLen, u16 u16TagParamOffset)
c5c77ba1 291{
b5c84cd8 292 u16 u16index;
c5c77ba1
JK
293
294 /*************************************************************************/
295 /* Beacon Frame - Frame Body */
296 /* --------------------------------------------------------------------- */
297 /* |Timestamp |BeaconInt |CapInfo |SSID |SupRates |DSParSet |TIM elm | */
298 /* --------------------------------------------------------------------- */
299 /* |8 |2 |2 |2-34 |3-10 |3 |4-256 | */
300 /* --------------------------------------------------------------------- */
301 /* */
302 /*************************************************************************/
303
304 u16index = u16TagParamOffset;
305
306 /* Search for the TIM Element Field and return if the element is found */
307 while (u16index < (u16RxLen - FCS_LEN)) {
78174ada 308 if (pu8msa[u16index] == ITIM)
cea3b202 309 return &pu8msa[u16index];
86e4180e 310 u16index += (IE_HDR_LEN + pu8msa[u16index + 1]);
c5c77ba1
JK
311 }
312
0e04f3f3 313 return NULL;
c5c77ba1
JK
314}
315
316/* This function gets the current channel information from
317 * the 802.11n beacon/probe response frame */
d85f5326 318u8 get_current_channel_802_11n(u8 *pu8msa, u16 u16RxLen)
c5c77ba1 319{
d85f5326 320 u16 index;
c5c77ba1
JK
321
322 index = TAG_PARAM_OFFSET;
323 while (index < (u16RxLen - FCS_LEN)) {
324 if (pu8msa[index] == IDSPARMS)
cea3b202 325 return pu8msa[index + 2];
86e4180e
AO
326 /* Increment index by length information and header */
327 index += pu8msa[index + 1] + IE_HDR_LEN;
c5c77ba1
JK
328 }
329
330 /* Return current channel information from the MIB, if beacon/probe */
331 /* response frame does not contain the DS parameter set IE */
332 /* return (mget_CurrentChannel() + 1); */
333 return 0; /* no MIB here */
334}
335
c5c77ba1
JK
336/**
337 * @brief parses the received 'N' message
338 * @details
339 * @param[in] pu8MsgBuffer The message to be parsed
340 * @param[out] ppstrNetworkInfo pointer to pointer to the structure containing the parsed Network Info
341 * @return Error code indicating success/failure
342 * @note
343 * @author mabubakr
344 * @date 1 Mar 2012
345 * @version 1.0
346 */
a1f7f642 347s32 parse_network_info(u8 *pu8MsgBuffer, tstrNetworkInfo **ppstrNetworkInfo)
c5c77ba1 348{
b1413b60 349 tstrNetworkInfo *pstrNetworkInfo = NULL;
63d03e47
GKH
350 u8 u8MsgType = 0;
351 u8 u8MsgID = 0;
d85f5326 352 u16 u16MsgLen = 0;
c5c77ba1 353
d85f5326
CL
354 u16 u16WidID = (u16)WID_NIL;
355 u16 u16WidLen = 0;
0e04f3f3 356 u8 *pu8WidVal = NULL;
c5c77ba1
JK
357
358 u8MsgType = pu8MsgBuffer[0];
359
360 /* Check whether the received message type is 'N' */
361 if ('N' != u8MsgType) {
362 PRINT_ER("Received Message format incorrect.\n");
24db713f 363 return -EFAULT;
c5c77ba1
JK
364 }
365
366 /* Extract message ID */
367 u8MsgID = pu8MsgBuffer[1];
368
369 /* Extract message Length */
370 u16MsgLen = MAKE_WORD16(pu8MsgBuffer[2], pu8MsgBuffer[3]);
371
372 /* Extract WID ID */
373 u16WidID = MAKE_WORD16(pu8MsgBuffer[4], pu8MsgBuffer[5]);
374
375 /* Extract WID Length */
376 u16WidLen = MAKE_WORD16(pu8MsgBuffer[6], pu8MsgBuffer[7]);
377
378 /* Assign a pointer to the WID value */
379 pu8WidVal = &pu8MsgBuffer[8];
380
381 /* parse the WID value of the WID "WID_NEWORK_INFO" */
382 {
0e04f3f3 383 u8 *pu8msa = NULL;
d85f5326 384 u16 u16RxLen = 0;
0e04f3f3
RH
385 u8 *pu8TimElm = NULL;
386 u8 *pu8IEs = NULL;
d85f5326 387 u16 u16IEsLen = 0;
63d03e47 388 u8 u8index = 0;
4e4467fd
CL
389 u32 u32Tsf_Lo;
390 u32 u32Tsf_Hi;
c5c77ba1 391
ef154414 392 pstrNetworkInfo = kzalloc(sizeof(tstrNetworkInfo), GFP_KERNEL);
a78d9a38
CL
393 if (!pstrNetworkInfo)
394 return -ENOMEM;
395
c5c77ba1
JK
396 pstrNetworkInfo->s8rssi = pu8WidVal[0];
397
398 /* Assign a pointer to msa "Mac Header Start Address" */
399 pu8msa = &pu8WidVal[1];
400
401 u16RxLen = u16WidLen - 1;
402
403 /* parse msa*/
404
405 /* Get the cap_info */
406 pstrNetworkInfo->u16CapInfo = get_cap_info(pu8msa);
c5c77ba1
JK
407 /* Get time-stamp [Low only 32 bit] */
408 pstrNetworkInfo->u32Tsf = get_beacon_timestamp_lo(pu8msa);
409 PRINT_D(CORECONFIG_DBG, "TSF :%x\n", pstrNetworkInfo->u32Tsf);
c5c77ba1
JK
410
411 /* Get full time-stamp [Low and High 64 bit] */
412 u32Tsf_Lo = get_beacon_timestamp_lo(pu8msa);
413 u32Tsf_Hi = get_beacon_timestamp_hi(pu8msa);
414
57b298f5 415 pstrNetworkInfo->u64Tsf = u32Tsf_Lo | ((u64)u32Tsf_Hi << 32);
c5c77ba1
JK
416
417 /* Get SSID */
09c02cb5 418 get_ssid(pu8msa, pstrNetworkInfo->au8ssid, &pstrNetworkInfo->u8SsidLen);
c5c77ba1
JK
419
420 /* Get BSSID */
421 get_BSSID(pu8msa, pstrNetworkInfo->au8bssid);
422
ce081898 423 /*
a66907d1 424 * Extract current channel information from
ce081898 425 * the beacon/probe response frame
a66907d1
SB
426 */
427 pstrNetworkInfo->u8channel = get_current_channel_802_11n(pu8msa,
b5c4e4e9 428 u16RxLen + FCS_LEN);
c5c77ba1
JK
429
430 /* Get beacon period */
b5c4e4e9 431 u8index = MAC_HDR_LEN + TIME_STAMP_LEN;
c5c77ba1
JK
432
433 pstrNetworkInfo->u16BeaconPeriod = get_beacon_period(pu8msa + u8index);
434
435 u8index += BEACON_INTERVAL_LEN + CAP_INFO_LEN;
436
437 /* Get DTIM Period */
b5c4e4e9 438 pu8TimElm = get_tim_elm(pu8msa, u16RxLen + FCS_LEN, u8index);
0e04f3f3 439 if (pu8TimElm != NULL)
c5c77ba1 440 pstrNetworkInfo->u8DtimPeriod = pu8TimElm[3];
c5c77ba1
JK
441 pu8IEs = &pu8msa[MAC_HDR_LEN + TIME_STAMP_LEN + BEACON_INTERVAL_LEN + CAP_INFO_LEN];
442 u16IEsLen = u16RxLen - (MAC_HDR_LEN + TIME_STAMP_LEN + BEACON_INTERVAL_LEN + CAP_INFO_LEN);
443
444 if (u16IEsLen > 0) {
02cf299d
CL
445 pstrNetworkInfo->pu8IEs = kmemdup(pu8IEs, u16IEsLen,
446 GFP_KERNEL);
a78d9a38
CL
447 if (!pstrNetworkInfo->pu8IEs)
448 return -ENOMEM;
c5c77ba1
JK
449 }
450 pstrNetworkInfo->u16IEsLen = u16IEsLen;
451
452 }
453
454 *ppstrNetworkInfo = pstrNetworkInfo;
455
74a443e0 456 return 0;
c5c77ba1
JK
457}
458
459/**
460 * @brief Deallocates the parsed Network Info
461 * @details
462 * @param[in] pstrNetworkInfo Network Info to be deallocated
463 * @return Error code indicating success/failure
464 * @note
465 * @author mabubakr
466 * @date 1 Mar 2012
467 * @version 1.0
468 */
fb4ec9ca 469s32 DeallocateNetworkInfo(tstrNetworkInfo *pstrNetworkInfo)
c5c77ba1 470{
e6e12661 471 s32 s32Error = 0;
c5c77ba1 472
b1413b60
GKH
473 if (pstrNetworkInfo != NULL) {
474 if (pstrNetworkInfo->pu8IEs != NULL) {
49188af2 475 kfree(pstrNetworkInfo->pu8IEs);
b1413b60 476 pstrNetworkInfo->pu8IEs = NULL;
c5c77ba1 477 } else {
e6e12661 478 s32Error = -EFAULT;
c5c77ba1
JK
479 }
480
49188af2 481 kfree(pstrNetworkInfo);
b1413b60 482 pstrNetworkInfo = NULL;
c5c77ba1
JK
483
484 } else {
e6e12661 485 s32Error = -EFAULT;
c5c77ba1
JK
486 }
487
488 return s32Error;
489}
490
491/**
492 * @brief parses the received Association Response frame
493 * @details
494 * @param[in] pu8Buffer The Association Response frame to be parsed
495 * @param[out] ppstrConnectRespInfo pointer to pointer to the structure containing the parsed Association Response Info
496 * @return Error code indicating success/failure
497 * @note
498 * @author mabubakr
499 * @date 2 Apr 2012
500 * @version 1.0
501 */
fb4ec9ca 502s32 ParseAssocRespInfo(u8 *pu8Buffer, u32 u32BufferLen,
c5c77ba1
JK
503 tstrConnectRespInfo **ppstrConnectRespInfo)
504{
e6e12661 505 s32 s32Error = 0;
b1413b60 506 tstrConnectRespInfo *pstrConnectRespInfo = NULL;
d85f5326 507 u16 u16AssocRespLen = 0;
0e04f3f3 508 u8 *pu8IEs = NULL;
d85f5326 509 u16 u16IEsLen = 0;
c5c77ba1 510
ef154414 511 pstrConnectRespInfo = kzalloc(sizeof(tstrConnectRespInfo), GFP_KERNEL);
a78d9a38
CL
512 if (!pstrConnectRespInfo)
513 return -ENOMEM;
514
c5c77ba1 515 /* u16AssocRespLen = pu8Buffer[0]; */
d85f5326 516 u16AssocRespLen = (u16)u32BufferLen;
c5c77ba1
JK
517
518 /* get the status code */
519 pstrConnectRespInfo->u16ConnectStatus = get_asoc_status(pu8Buffer);
520 if (pstrConnectRespInfo->u16ConnectStatus == SUCCESSFUL_STATUSCODE) {
521
522 /* get the capability */
523 pstrConnectRespInfo->u16capability = get_assoc_resp_cap_info(pu8Buffer);
524
525 /* get the Association ID */
526 pstrConnectRespInfo->u16AssocID = get_asoc_id(pu8Buffer);
527
528 /* get the Information Elements */
529 pu8IEs = &pu8Buffer[CAP_INFO_LEN + STATUS_CODE_LEN + AID_LEN];
530 u16IEsLen = u16AssocRespLen - (CAP_INFO_LEN + STATUS_CODE_LEN + AID_LEN);
531
02cf299d 532 pstrConnectRespInfo->pu8RespIEs = kmemdup(pu8IEs, u16IEsLen, GFP_KERNEL);
a78d9a38
CL
533 if (!pstrConnectRespInfo->pu8RespIEs)
534 return -ENOMEM;
535
c5c77ba1
JK
536 pstrConnectRespInfo->u16RespIEsLen = u16IEsLen;
537 }
538
539 *ppstrConnectRespInfo = pstrConnectRespInfo;
540
c5c77ba1
JK
541 return s32Error;
542}
543
544/**
545 * @brief Deallocates the parsed Association Response Info
546 * @details
547 * @param[in] pstrNetworkInfo Network Info to be deallocated
548 * @return Error code indicating success/failure
549 * @note
550 * @author mabubakr
551 * @date 2 Apr 2012
552 * @version 1.0
553 */
fb4ec9ca 554s32 DeallocateAssocRespInfo(tstrConnectRespInfo *pstrConnectRespInfo)
c5c77ba1 555{
e6e12661 556 s32 s32Error = 0;
c5c77ba1 557
b1413b60
GKH
558 if (pstrConnectRespInfo != NULL) {
559 if (pstrConnectRespInfo->pu8RespIEs != NULL) {
49188af2 560 kfree(pstrConnectRespInfo->pu8RespIEs);
b1413b60 561 pstrConnectRespInfo->pu8RespIEs = NULL;
c5c77ba1 562 } else {
e6e12661 563 s32Error = -EFAULT;
c5c77ba1
JK
564 }
565
49188af2 566 kfree(pstrConnectRespInfo);
b1413b60 567 pstrConnectRespInfo = NULL;
c5c77ba1
JK
568
569 } else {
e6e12661 570 s32Error = -EFAULT;
c5c77ba1
JK
571 }
572
573 return s32Error;
574}
575
c5c77ba1
JK
576/**
577 * @brief sends certain Configuration Packet based on the input WIDs pstrWIDs
578 * using driver config layer
579 *
580 * @details
581 * @param[in] pstrWIDs WIDs to be sent in the configuration packet
582 * @param[in] u32WIDsCount number of WIDs to be sent in the configuration packet
583 * @param[out] pu8RxResp The received Packet Response
584 * @param[out] ps32RxRespLen Length of the received Packet Response
585 * @return Error code indicating success/failure
586 * @note
587 * @author mabubakr
588 * @date 1 Mar 2012
589 * @version 1.0
590 */
e9e0c260 591s32 send_config_pkt(u8 mode, struct wid *wids, u32 count, u32 drv)
c5c77ba1 592{
fb4ec9ca 593 s32 counter = 0, ret = 0;
8dfaafd6 594
684125a2
TC
595 if (mode == GET_CFG) {
596 for (counter = 0; counter < count; counter++) {
c5c77ba1 597 PRINT_INFO(CORECONFIG_DBG, "Sending CFG packet [%d][%d]\n", !counter,
684125a2 598 (counter == count - 1));
07056a85 599 if (!wilc_wlan_cfg_get(!counter,
daaf16ba 600 wids[counter].id,
684125a2
TC
601 (counter == count - 1),
602 drv)) {
c5c77ba1
JK
603 ret = -1;
604 printk("[Sendconfigpkt]Get Timed out\n");
605 break;
606 }
607 }
c5c77ba1 608 counter = 0;
684125a2 609 for (counter = 0; counter < count; counter++) {
2fd3e443 610 wids[counter].size = wilc_wlan_cfg_get_val(
daaf16ba 611 wids[counter].id,
900bb4a6 612 wids[counter].val,
2fd3e443 613 wids[counter].size);
c5c77ba1
JK
614
615 }
684125a2
TC
616 } else if (mode == SET_CFG) {
617 for (counter = 0; counter < count; counter++) {
daaf16ba 618 PRINT_D(CORECONFIG_DBG, "Sending config SET PACKET WID:%x\n", wids[counter].id);
1028e5a4 619 if (!wilc_wlan_cfg_set(!counter,
daaf16ba 620 wids[counter].id,
900bb4a6 621 wids[counter].val,
2fd3e443 622 wids[counter].size,
684125a2
TC
623 (counter == count - 1),
624 drv)) {
c5c77ba1
JK
625 ret = -1;
626 printk("[Sendconfigpkt]Set Timed out\n");
627 break;
628 }
629 }
630 }
631
632 return ret;
633}