]>
Commit | Line | Data |
---|---|---|
c5c77ba1 | 1 | #include "host_interface.h" |
c5c77ba1 JK |
2 | #include "coreconfigurator.h" |
3 | ||
fb4ec9ca CL |
4 | extern s32 TransportInit(void); |
5 | extern s32 TransportDeInit(void); | |
63d03e47 | 6 | extern u8 connecting; |
c5c77ba1 JK |
7 | |
8 | #ifdef DISABLE_PWRSAVE_AND_SCAN_DURING_IP | |
da711eb6 | 9 | extern struct timer_list hDuringIpTimer; |
c5c77ba1 JK |
10 | #endif |
11 | ||
c5c77ba1 | 12 | /*BugID_5137*/ |
63d03e47 | 13 | extern u8 g_wilc_initialized; |
c5c77ba1 JK |
14 | /*****************************************************************************/ |
15 | /* Macros */ | |
16 | /*****************************************************************************/ | |
17 | ||
18 | /* Message types of the Host IF Message Queue*/ | |
9eac3a15 CL |
19 | #define HOST_IF_MSG_SCAN 0 |
20 | #define HOST_IF_MSG_CONNECT 1 | |
21 | #define HOST_IF_MSG_RCVD_GNRL_ASYNC_INFO 2 | |
22 | #define HOST_IF_MSG_KEY 3 | |
23 | #define HOST_IF_MSG_RCVD_NTWRK_INFO 4 | |
24 | #define HOST_IF_MSG_RCVD_SCAN_COMPLETE 5 | |
25 | #define HOST_IF_MSG_CFG_PARAMS 6 | |
26 | #define HOST_IF_MSG_SET_CHANNEL 7 | |
27 | #define HOST_IF_MSG_DISCONNECT 8 | |
28 | #define HOST_IF_MSG_GET_RSSI 9 | |
29 | #define HOST_IF_MSG_GET_CHNL 10 | |
30 | #define HOST_IF_MSG_ADD_BEACON 11 | |
31 | #define HOST_IF_MSG_DEL_BEACON 12 | |
32 | #define HOST_IF_MSG_ADD_STATION 13 | |
33 | #define HOST_IF_MSG_DEL_STATION 14 | |
34 | #define HOST_IF_MSG_EDIT_STATION 15 | |
35 | #define HOST_IF_MSG_SCAN_TIMER_FIRED 16 | |
36 | #define HOST_IF_MSG_CONNECT_TIMER_FIRED 17 | |
37 | #define HOST_IF_MSG_POWER_MGMT 18 | |
38 | #define HOST_IF_MSG_GET_INACTIVETIME 19 | |
39 | #define HOST_IF_MSG_REMAIN_ON_CHAN 20 | |
40 | #define HOST_IF_MSG_REGISTER_FRAME 21 | |
41 | #define HOST_IF_MSG_LISTEN_TIMER_FIRED 22 | |
42 | #define HOST_IF_MSG_GET_LINKSPEED 23 | |
43 | #define HOST_IF_MSG_SET_WFIDRV_HANDLER 24 | |
44 | #define HOST_IF_MSG_SET_MAC_ADDRESS 25 | |
45 | #define HOST_IF_MSG_GET_MAC_ADDRESS 26 | |
46 | #define HOST_IF_MSG_SET_OPERATION_MODE 27 | |
47 | #define HOST_IF_MSG_SET_IPADDRESS 28 | |
48 | #define HOST_IF_MSG_GET_IPADDRESS 29 | |
49 | #define HOST_IF_MSG_FLUSH_CONNECT 30 | |
50 | #define HOST_IF_MSG_GET_STATISTICS 31 | |
51 | #define HOST_IF_MSG_SET_MULTICAST_FILTER 32 | |
52 | #define HOST_IF_MSG_ADD_BA_SESSION 33 | |
53 | #define HOST_IF_MSG_DEL_BA_SESSION 34 | |
54 | #define HOST_IF_MSG_Q_IDLE 35 | |
55 | #define HOST_IF_MSG_DEL_ALL_STA 36 | |
56 | #define HOST_IF_MSG_DEL_ALL_RX_BA_SESSIONS 34 | |
57 | #define HOST_IF_MSG_EXIT 100 | |
d85f5326 | 58 | |
e54d5b75 CL |
59 | #define HOST_IF_SCAN_TIMEOUT 4000 |
60 | #define HOST_IF_CONNECT_TIMEOUT 9500 | |
c5c77ba1 | 61 | |
e54d5b75 CL |
62 | #define BA_SESSION_DEFAULT_BUFFER_SIZE 16 |
63 | #define BA_SESSION_DEFAULT_TIMEOUT 1000 | |
64 | #define BLOCK_ACK_REQ_SIZE 0x14 | |
c5c77ba1 JK |
65 | /*****************************************************************************/ |
66 | /* Type Definitions */ | |
67 | /*****************************************************************************/ | |
68 | ||
69 | /*! | |
70 | * @struct tstrHostIFCfgParamAttr | |
71 | * @brief Structure to hold Host IF CFG Params Attributes | |
72 | * @details | |
73 | * @todo | |
74 | * @sa | |
75 | * @author Mai Daftedar | |
76 | * @date 02 April 2012 | |
77 | * @version 1.0 | |
78 | */ | |
79 | typedef struct _tstrHostIFCfgParamAttr { | |
80 | tstrCfgParamVal pstrCfgParamVal; | |
81 | ||
82 | } tstrHostIFCfgParamAttr; | |
83 | ||
84 | /*! | |
85 | * @struct tstrHostIFwpaAttr | |
86 | * @brief Structure to hold Host IF Scan Attributes | |
87 | * @details | |
88 | * @todo | |
89 | * @sa | |
90 | * @author Mai Daftedar | |
91 | * @date 25 March 2012 | |
92 | * @version 1.0 | |
93 | */ | |
94 | typedef struct _tstrHostIFwpaAttr { | |
63d03e47 GKH |
95 | u8 *pu8key; |
96 | const u8 *pu8macaddr; | |
97 | u8 *pu8seq; | |
98 | u8 u8seqlen; | |
99 | u8 u8keyidx; | |
100 | u8 u8Keylen; | |
101 | u8 u8Ciphermode; | |
c5c77ba1 JK |
102 | } tstrHostIFwpaAttr; |
103 | ||
104 | ||
105 | /*! | |
106 | * @struct tstrHostIFwepAttr | |
107 | * @brief Structure to hold Host IF Scan Attributes | |
108 | * @details | |
109 | * @todo | |
110 | * @sa | |
111 | * @author Mai Daftedar | |
112 | * @date 25 March 2012 | |
113 | * @version 1.0 | |
114 | */ | |
115 | typedef struct _tstrHostIFwepAttr { | |
63d03e47 GKH |
116 | u8 *pu8WepKey; |
117 | u8 u8WepKeylen; | |
118 | u8 u8Wepidx; | |
119 | u8 u8mode; | |
c5c77ba1 JK |
120 | AUTHTYPE_T tenuAuth_type; |
121 | ||
122 | } tstrHostIFwepAttr; | |
123 | ||
124 | /*! | |
125 | * @struct tuniHostIFkeyAttr | |
126 | * @brief Structure to hold Host IF Scan Attributes | |
127 | * @details | |
128 | * @todo | |
129 | * @sa | |
130 | * @author Mai Daftedar | |
131 | * @date 25 March 2012 | |
132 | * @version 1.0 | |
133 | */ | |
134 | typedef union _tuniHostIFkeyAttr { | |
135 | tstrHostIFwepAttr strHostIFwepAttr; | |
136 | tstrHostIFwpaAttr strHostIFwpaAttr; | |
137 | tstrHostIFpmkidAttr strHostIFpmkidAttr; | |
138 | } tuniHostIFkeyAttr; | |
139 | ||
140 | /*! | |
141 | * @struct tstrHostIFkeyAttr | |
142 | * @brief Structure to hold Host IF Scan Attributes | |
143 | * @details | |
144 | * @todo | |
145 | * @sa | |
146 | * @author Mai Daftedar | |
147 | * @date 25 March 2012 | |
148 | * @version 1.0 | |
149 | */ | |
150 | typedef struct _tstrHostIFkeyAttr { | |
151 | tenuKeyType enuKeyType; | |
63d03e47 | 152 | u8 u8KeyAction; |
c5c77ba1 JK |
153 | tuniHostIFkeyAttr uniHostIFkeyAttr; |
154 | } tstrHostIFkeyAttr; | |
155 | ||
156 | ||
157 | ||
158 | ||
159 | /*! | |
160 | * @struct tstrHostIFscanAttr | |
161 | * @brief Structure to hold Host IF Scan Attributes | |
162 | * @details | |
163 | * @todo | |
164 | * @sa | |
165 | * @author Mostafa Abu Bakr | |
166 | * @date 25 March 2012 | |
167 | * @version 1.0 | |
168 | */ | |
169 | typedef struct _tstrHostIFscanAttr { | |
63d03e47 GKH |
170 | u8 u8ScanSource; |
171 | u8 u8ScanType; | |
172 | u8 *pu8ChnlFreqList; | |
173 | u8 u8ChnlListLen; | |
174 | u8 *pu8IEs; | |
c5c77ba1 JK |
175 | size_t IEsLen; |
176 | tWILCpfScanResult pfScanResult; | |
177 | void *pvUserArg; | |
178 | /*BugID_4189*/ | |
179 | tstrHiddenNetwork strHiddenNetwork; | |
180 | ||
181 | } tstrHostIFscanAttr; | |
182 | ||
183 | /*! | |
184 | * @struct tstrHostIFconnectAttr | |
185 | * @brief Structure to hold Host IF Connect Attributes | |
186 | * @details | |
187 | * @todo | |
188 | * @sa | |
189 | * @author Mostafa Abu Bakr | |
190 | * @date 25 March 2012 | |
191 | * @version 1.0 | |
192 | */ | |
193 | typedef struct _tstrHostIFconnectAttr { | |
63d03e47 GKH |
194 | u8 *pu8bssid; |
195 | u8 *pu8ssid; | |
c5c77ba1 | 196 | size_t ssidLen; |
63d03e47 | 197 | u8 *pu8IEs; |
c5c77ba1 | 198 | size_t IEsLen; |
63d03e47 | 199 | u8 u8security; |
c5c77ba1 JK |
200 | tWILCpfConnectResult pfConnectResult; |
201 | void *pvUserArg; | |
202 | AUTHTYPE_T tenuAuth_type; | |
63d03e47 | 203 | u8 u8channel; |
c5c77ba1 JK |
204 | void *pJoinParams; |
205 | } tstrHostIFconnectAttr; | |
206 | ||
207 | /*! | |
208 | * @struct tstrRcvdGnrlAsyncInfo | |
209 | * @brief Structure to hold Received General Asynchronous info | |
210 | * @details | |
211 | * @todo | |
212 | * @sa | |
213 | * @author Mostafa Abu Bakr | |
214 | * @date 25 March 2012 | |
215 | * @version 1.0 | |
216 | */ | |
217 | typedef struct _tstrRcvdGnrlAsyncInfo { | |
63d03e47 | 218 | u8 *pu8Buffer; |
4e4467fd | 219 | u32 u32Length; |
c5c77ba1 JK |
220 | } tstrRcvdGnrlAsyncInfo; |
221 | ||
222 | /*! | |
223 | * @struct tstrHostIFSetChan | |
224 | * @brief Set Channel message body | |
225 | * @details | |
226 | * @todo | |
227 | * @sa | |
228 | * @author Mai Daftedar | |
229 | * @date 25 March 2012 | |
230 | * @version 1.0 | |
231 | */ | |
232 | typedef struct _tstrHostIFSetChan { | |
63d03e47 | 233 | u8 u8SetChan; |
c5c77ba1 JK |
234 | } tstrHostIFSetChan; |
235 | ||
236 | /*! | |
237 | * @struct tstrHostIFSetChan | |
238 | * @brief Get Channel message body | |
239 | * @details | |
240 | * @todo | |
241 | * @sa | |
242 | * @author Mai Daftedar | |
243 | * @date 01 Jule 2012 | |
244 | * @version 1.0 | |
245 | */ | |
246 | typedef struct _tstrHostIFGetChan { | |
63d03e47 | 247 | u8 u8GetChan; |
c5c77ba1 JK |
248 | } tstrHostIFGetChan; |
249 | ||
250 | /*bug3819: Add Scan acomplete notification to host*/ | |
251 | /*! | |
252 | * @struct tstrScanComplete | |
253 | * @brief hold received Async. Scan Complete message body | |
254 | * @details | |
255 | * @todo | |
256 | * @sa | |
257 | * @author zsalah | |
258 | * @date 25 March 2012 | |
259 | * @version 1.0 | |
260 | */ | |
261 | /*typedef struct _tstrScanComplete | |
262 | * { | |
63d03e47 | 263 | * u8* pu8Buffer; |
4e4467fd | 264 | * u32 u32Length; |
c5c77ba1 JK |
265 | * } tstrScanComplete;*/ |
266 | ||
267 | /*! | |
268 | * @struct tstrHostIFSetBeacon | |
269 | * @brief Set Beacon message body | |
270 | * @details | |
271 | * @todo | |
272 | * @sa | |
273 | * @author Adham Abozaeid | |
274 | * @date 10 July 2012 | |
275 | * @version 1.0 | |
276 | */ | |
277 | typedef struct _tstrHostIFSetBeacon { | |
4e4467fd CL |
278 | u32 u32Interval; /*!< Beacon Interval. Period between two successive beacons on air */ |
279 | u32 u32DTIMPeriod; /*!< DTIM Period. Indicates how many Beacon frames | |
c5c77ba1 | 280 | * (including the current frame) appear before the next DTIM */ |
4e4467fd | 281 | u32 u32HeadLen; /*!< Length of the head buffer in bytes */ |
63d03e47 | 282 | u8 *pu8Head; /*!< Pointer to the beacon's head buffer. Beacon's head is the part |
c5c77ba1 | 283 | * from the beacon's start till the TIM element, NOT including the TIM */ |
4e4467fd | 284 | u32 u32TailLen; /*!< Length of the tail buffer in bytes */ |
63d03e47 | 285 | u8 *pu8Tail; /*!< Pointer to the beacon's tail buffer. Beacon's tail starts just |
c5c77ba1 JK |
286 | * after the TIM inormation element */ |
287 | } tstrHostIFSetBeacon; | |
288 | ||
289 | ||
290 | ||
291 | /*! | |
292 | * @struct tstrHostIFDelBeacon | |
293 | * @brief Del Beacon message body | |
294 | * @details | |
295 | * @todo | |
296 | * @sa | |
297 | * @author Adham Abozaeid | |
298 | * @date 15 July 2012 | |
299 | * @version 1.0 | |
300 | */ | |
301 | typedef struct _tstrHostIFDelBeacon { | |
63d03e47 | 302 | u8 u8dummy; |
c5c77ba1 JK |
303 | } tstrHostIFDelBeacon; |
304 | ||
305 | /*! | |
306 | * @struct tstrHostIFSetMulti | |
307 | * @brief set Multicast filter Address | |
308 | * @details | |
309 | * @todo | |
310 | * @sa | |
311 | * @author Abdelrahman Sobhy | |
312 | * @date 30 August 2013 | |
313 | * @version 1.0 Description | |
314 | */ | |
315 | ||
316 | typedef struct { | |
72ed4dc7 | 317 | bool bIsEnabled; |
4e4467fd | 318 | u32 u32count; |
c5c77ba1 JK |
319 | } tstrHostIFSetMulti; |
320 | ||
321 | /*! | |
322 | * @struct tstrHostIFDelAllSta | |
323 | * @brief Deauth station message body | |
324 | * @details | |
325 | * @todo | |
326 | * @sa | |
327 | * @author Mai Daftedar | |
328 | * @date 09 April 2014 | |
329 | * @version 1.0 Description | |
330 | */ | |
331 | ||
332 | typedef struct { | |
63d03e47 GKH |
333 | u8 au8Sta_DelAllSta[MAX_NUM_STA][ETH_ALEN]; |
334 | u8 u8Num_AssocSta; | |
c5c77ba1 JK |
335 | } tstrHostIFDelAllSta; |
336 | ||
337 | /*! | |
338 | * @struct tstrHostIFDelSta | |
339 | * @brief Delete station message body | |
340 | * @details | |
341 | * @todo | |
342 | * @sa | |
343 | * @author Adham Abozaeid | |
344 | * @date 15 July 2012 | |
345 | * @version 1.0 Description | |
346 | */ | |
347 | ||
348 | typedef struct { | |
63d03e47 | 349 | u8 au8MacAddr[ETH_ALEN]; |
c5c77ba1 JK |
350 | } tstrHostIFDelSta; |
351 | ||
352 | /*! | |
353 | * @struct tstrTimerCb | |
354 | * @brief Timer callback message body | |
355 | * @details | |
356 | * @todo | |
357 | * @sa | |
358 | * @author Mostafa Abu Bakr | |
359 | * @date 25 March 2012 | |
360 | * @version 1.0 | |
361 | */ | |
362 | typedef struct _tstrTimerCb { | |
363 | void *pvUsrArg; /*!< Private data passed at timer start */ | |
364 | } tstrTimerCb; | |
365 | ||
366 | /*! | |
367 | * @struct tstrHostIfPowerMgmtParam | |
368 | * @brief Power management message body | |
369 | * @details | |
370 | * @todo | |
371 | * @sa | |
372 | * @author Adham Abozaeid | |
373 | * @date 24 November 2012 | |
374 | * @version 1.0 | |
375 | */ | |
376 | typedef struct { | |
377 | ||
72ed4dc7 | 378 | bool bIsEnabled; |
4e4467fd | 379 | u32 u32Timeout; |
c5c77ba1 JK |
380 | } tstrHostIfPowerMgmtParam; |
381 | ||
382 | /*! | |
383 | * @struct tstrHostIFSetIPAddr | |
384 | * @brief set IP Address message body | |
385 | * @details | |
386 | * @todo | |
387 | * @sa | |
388 | * @author Abdelrahman Sobhy | |
389 | * @date 30 August 2013 | |
390 | * @version 1.0 Description | |
391 | */ | |
392 | ||
393 | typedef struct { | |
63d03e47 GKH |
394 | u8 *au8IPAddr; |
395 | u8 idx; | |
c5c77ba1 JK |
396 | } tstrHostIFSetIPAddr; |
397 | ||
398 | /*! | |
399 | * @struct tstrHostIfStaInactiveT | |
400 | * @brief Get station message body | |
401 | * @details | |
402 | * @todo | |
403 | * @sa | |
404 | * @author Mai Daftedar | |
405 | * @date 16 April 2013 | |
406 | * @version 1.0 | |
407 | */ | |
408 | typedef struct { | |
63d03e47 | 409 | u8 mac[6]; |
c5c77ba1 JK |
410 | |
411 | } tstrHostIfStaInactiveT; | |
412 | /**/ | |
413 | /*! | |
414 | * @union tuniHostIFmsgBody | |
415 | * @brief Message body for the Host Interface message_q | |
416 | * @details | |
417 | * @todo | |
418 | * @sa | |
419 | * @author Mostafa Abu Bakr | |
420 | * @date 25 March 2012 | |
421 | * @version 1.0 | |
422 | */ | |
423 | typedef union _tuniHostIFmsgBody { | |
424 | tstrHostIFscanAttr strHostIFscanAttr; /*!< Host IF Scan Request Attributes message body */ | |
425 | tstrHostIFconnectAttr strHostIFconnectAttr; /*!< Host IF Connect Request Attributes message body */ | |
426 | tstrRcvdNetworkInfo strRcvdNetworkInfo; /*!< Received Asynchronous Network Info message body */ | |
427 | tstrRcvdGnrlAsyncInfo strRcvdGnrlAsyncInfo; /*!< Received General Asynchronous Info message body */ | |
428 | tstrHostIFkeyAttr strHostIFkeyAttr; /*!<>*/ | |
429 | tstrHostIFCfgParamAttr strHostIFCfgParamAttr; /*! <CFG Parameter message Body> */ | |
430 | tstrHostIFSetChan strHostIFSetChan; | |
431 | tstrHostIFGetChan strHostIFGetChan; | |
432 | tstrHostIFSetBeacon strHostIFSetBeacon; /*!< Set beacon message body */ | |
433 | tstrHostIFDelBeacon strHostIFDelBeacon; /*!< Del beacon message body */ | |
434 | tstrWILC_AddStaParam strAddStaParam; /*!< Add station message body */ | |
435 | tstrHostIFDelSta strDelStaParam; /*!< Del Station message body */ | |
436 | tstrWILC_AddStaParam strEditStaParam; /*!< Edit station message body */ | |
437 | /* tstrScanComplete strScanComplete; / *Received Async. Scan Complete message body* / */ | |
438 | tstrTimerCb strTimerCb; /*!< Timer callback message body */ | |
439 | tstrHostIfPowerMgmtParam strPowerMgmtparam; /*!< Power Management message body */ | |
440 | tstrHostIfStaInactiveT strHostIfStaInactiveT; | |
441 | tstrHostIFSetIPAddr strHostIfSetIP; | |
442 | tstrHostIfSetDrvHandler strHostIfSetDrvHandler; | |
443 | tstrHostIFSetMulti strHostIfSetMulti; | |
444 | tstrHostIfSetOperationMode strHostIfSetOperationMode; | |
445 | tstrHostIfSetMacAddress strHostIfSetMacAddress; | |
446 | tstrHostIfGetMacAddress strHostIfGetMacAddress; | |
447 | tstrHostIfBASessionInfo strHostIfBASessionInfo; | |
448 | #ifdef WILC_P2P | |
449 | tstrHostIfRemainOnChan strHostIfRemainOnChan; | |
450 | tstrHostIfRegisterFrame strHostIfRegisterFrame; | |
451 | #endif | |
576917ad | 452 | char *pUserData; |
c5c77ba1 JK |
453 | tstrHostIFDelAllSta strHostIFDelAllSta; |
454 | } tuniHostIFmsgBody; | |
455 | ||
456 | /*! | |
457 | * @struct tstrHostIFmsg | |
458 | * @brief Host Interface message | |
459 | * @details | |
460 | * @todo | |
461 | * @sa | |
462 | * @author Mostafa Abu Bakr | |
463 | * @date 25 March 2012 | |
464 | * @version 1.0 | |
465 | */ | |
466 | typedef struct _tstrHostIFmsg { | |
d85f5326 | 467 | u16 u16MsgId; /*!< Message ID */ |
c5c77ba1 | 468 | tuniHostIFmsgBody uniHostIFmsgBody; /*!< Message body */ |
11f58c88 | 469 | tstrWILC_WFIDrv *drvHandler; |
c5c77ba1 JK |
470 | } tstrHostIFmsg; |
471 | ||
472 | #ifdef CONNECT_DIRECT | |
473 | typedef struct _tstrWidJoinReqExt { | |
576917ad | 474 | char SSID[MAX_SSID_LEN]; |
63d03e47 GKH |
475 | u8 u8channel; |
476 | u8 BSSID[6]; | |
c5c77ba1 JK |
477 | } tstrWidJoinReqExt; |
478 | #endif | |
479 | ||
480 | /*Bug4218: Parsing Join Param*/ | |
481 | #ifdef WILC_PARSE_SCAN_IN_HOST | |
482 | /*Struct containg joinParam of each AP*/ | |
483 | typedef struct _tstrJoinBssParam { | |
484 | BSSTYPE_T bss_type; | |
63d03e47 | 485 | u8 dtim_period; |
d85f5326 CL |
486 | u16 beacon_period; |
487 | u16 cap_info; | |
63d03e47 | 488 | u8 au8bssid[6]; |
576917ad | 489 | char ssid[MAX_SSID_LEN]; |
63d03e47 GKH |
490 | u8 ssidLen; |
491 | u8 supp_rates[MAX_RATES_SUPPORTED + 1]; | |
492 | u8 ht_capable; | |
493 | u8 wmm_cap; | |
494 | u8 uapsd_cap; | |
72ed4dc7 | 495 | bool rsn_found; |
63d03e47 GKH |
496 | u8 rsn_grp_policy; |
497 | u8 mode_802_11i; | |
498 | u8 rsn_pcip_policy[3]; | |
499 | u8 rsn_auth_policy[3]; | |
500 | u8 rsn_cap[2]; | |
c5c77ba1 JK |
501 | struct _tstrJoinParam *nextJoinBss; |
502 | #ifdef WILC_P2P | |
4e4467fd | 503 | u32 tsf; |
63d03e47 GKH |
504 | u8 u8NoaEnbaled; |
505 | u8 u8OppEnable; | |
506 | u8 u8CtWindow; | |
507 | u8 u8Count; | |
508 | u8 u8Index; | |
509 | u8 au8Duration[4]; | |
510 | u8 au8Interval[4]; | |
511 | u8 au8StartTime[4]; | |
c5c77ba1 JK |
512 | #endif |
513 | } tstrJoinBssParam; | |
514 | /*Bug4218: Parsing Join Param*/ | |
515 | /*a linked list table containing needed join parameters entries for each AP found in most recent scan*/ | |
516 | typedef struct _tstrBssTable { | |
63d03e47 | 517 | u8 u8noBssEntries; |
c5c77ba1 JK |
518 | tstrJoinBssParam *head; |
519 | tstrJoinBssParam *tail; | |
520 | } tstrBssTable; | |
521 | #endif /*WILC_PARSE_SCAN_IN_HOST*/ | |
522 | ||
523 | typedef enum { | |
524 | SCAN_TIMER = 0, | |
525 | CONNECT_TIMER = 1, | |
526 | SCAN_CONNECT_TIMER_FORCE_32BIT = 0xFFFFFFFF | |
527 | } tenuScanConnTimer; | |
528 | ||
529 | /*****************************************************************************/ | |
530 | /* */ | |
531 | /* Global Variabls */ | |
532 | /* */ | |
533 | /*****************************************************************************/ | |
534 | ||
535 | ||
6fdb302c DM |
536 | tstrWILC_WFIDrv *terminated_handle; |
537 | tstrWILC_WFIDrv *gWFiDrvHandle; | |
c5c77ba1 | 538 | #ifdef DISABLE_PWRSAVE_AND_SCAN_DURING_IP |
72ed4dc7 | 539 | bool g_obtainingIP = false; |
c5c77ba1 | 540 | #endif |
63d03e47 | 541 | u8 P2P_LISTEN_STATE; |
1999bd52 | 542 | static struct task_struct *HostIFthreadHandler; |
c5c77ba1 | 543 | static WILC_MsgQueueHandle gMsgQHostIF; |
83383ea3 | 544 | static struct semaphore hSemHostIFthrdEnd; |
c5c77ba1 | 545 | |
83383ea3 AB |
546 | struct semaphore hSemDeinitDrvHandle; |
547 | static struct semaphore hWaitResponse; | |
548 | struct semaphore hSemHostIntDeinit; | |
da711eb6 | 549 | struct timer_list g_hPeriodicRSSI; |
c5c77ba1 JK |
550 | |
551 | ||
552 | ||
63d03e47 | 553 | u8 gau8MulticastMacAddrList[WILC_MULTICAST_TABLE_SIZE][ETH_ALEN]; |
c5c77ba1 JK |
554 | |
555 | #ifndef CONNECT_DIRECT | |
63d03e47 | 556 | static u8 gapu8RcvdSurveyResults[2][MAX_SURVEY_RESULT_FRAG_SIZE]; |
c5c77ba1 JK |
557 | #endif |
558 | ||
63d03e47 | 559 | static u8 gapu8RcvdAssocResp[MAX_ASSOC_RESP_FRAME_SIZE]; |
c5c77ba1 | 560 | |
72ed4dc7 | 561 | bool gbScanWhileConnected = false; |
c5c77ba1 | 562 | |
ca356ada CL |
563 | static s8 gs8Rssi; |
564 | static s8 gs8lnkspd; | |
63d03e47 GKH |
565 | static u8 gu8Chnl; |
566 | static u8 gs8SetIP[2][4]; | |
567 | static u8 gs8GetIP[2][4]; | |
c5c77ba1 | 568 | #ifdef WILC_AP_EXTERNAL_MLME |
4e4467fd | 569 | static u32 gu32InactiveTime; |
63d03e47 | 570 | static u8 gu8DelBcn; |
c5c77ba1 | 571 | #endif |
4e4467fd | 572 | static u32 gu32WidConnRstHack; |
c5c77ba1 JK |
573 | |
574 | /*BugID_5137*/ | |
63d03e47 GKH |
575 | u8 *gu8FlushedJoinReq; |
576 | u8 *gu8FlushedInfoElemAsoc; | |
577 | u8 gu8Flushed11iMode; | |
578 | u8 gu8FlushedAuthType; | |
4e4467fd CL |
579 | u32 gu32FlushedJoinReqSize; |
580 | u32 gu32FlushedInfoElemAsocSize; | |
581 | u32 gu8FlushedJoinReqDrvHandler; | |
c5c77ba1 JK |
582 | #define REAL_JOIN_REQ 0 |
583 | #define FLUSHED_JOIN_REQ 1 | |
584 | #define FLUSHED_BYTE_POS 79 /* Position the byte indicating flushing in the flushed request */ | |
585 | ||
586 | /*Bug4218: Parsing Join Param*/ | |
587 | #ifdef WILC_PARSE_SCAN_IN_HOST | |
588 | /*Bug4218: Parsing Join Param*/ | |
589 | static void *host_int_ParseJoinBssParam(tstrNetworkInfo *ptstrNetworkInfo); | |
590 | #endif /*WILC_PARSE_SCAN_IN_HOST*/ | |
591 | ||
4e4467fd | 592 | extern void chip_sleep_manually(u32 u32SleepTime); |
c5c77ba1 JK |
593 | extern int linux_wlan_get_num_conn_ifcs(void); |
594 | ||
595 | /** | |
596 | * @brief Handle_SetChannel | |
597 | * @details Sending config packet to firmware to set channel | |
598 | * @param[in] tstrHostIFSetChan* pstrHostIFSetChan | |
599 | * @return Error code. | |
600 | * @author | |
601 | * @date | |
602 | * @version 1.0 | |
603 | */ | |
2b05df55 | 604 | static s32 Handle_SetChannel(tstrWILC_WFIDrv *drvHandler, tstrHostIFSetChan *pstrHostIFSetChan) |
c5c77ba1 JK |
605 | { |
606 | ||
fb4ec9ca | 607 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
608 | tstrWID strWID; |
609 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
610 | ||
611 | /*prepare configuration packet*/ | |
d85f5326 | 612 | strWID.u16WIDid = (u16)WID_CURRENT_CHANNEL; |
c5c77ba1 | 613 | strWID.enuWIDtype = WID_CHAR; |
576917ad DL |
614 | strWID.ps8WidVal = (char *)&(pstrHostIFSetChan->u8SetChan); |
615 | strWID.s32ValueSize = sizeof(char); | |
c5c77ba1 JK |
616 | |
617 | PRINT_D(HOSTINF_DBG, "Setting channel\n"); | |
618 | /*Sending Cfg*/ | |
72ed4dc7 | 619 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
620 | if (s32Error) { |
621 | PRINT_ER("Failed to set channel\n"); | |
622 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
623 | } | |
624 | WILC_CATCH(s32Error) | |
625 | { | |
626 | ||
627 | } | |
628 | ||
629 | return s32Error; | |
630 | } | |
631 | /** | |
632 | * @brief Handle_SetWfiDrvHandler | |
633 | * @details Sending config packet to firmware to set driver handler | |
634 | * @param[in] void * drvHandler,tstrHostIfSetDrvHandler* pstrHostIfSetDrvHandler | |
635 | * @return Error code. | |
636 | * @author | |
637 | * @date | |
638 | * @version 1.0 | |
639 | */ | |
fb4ec9ca | 640 | static s32 Handle_SetWfiDrvHandler(tstrHostIfSetDrvHandler *pstrHostIfSetDrvHandler) |
c5c77ba1 JK |
641 | { |
642 | ||
fb4ec9ca | 643 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
644 | tstrWID strWID; |
645 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)((pstrHostIfSetDrvHandler->u32Address)); | |
646 | ||
647 | ||
648 | /*prepare configuration packet*/ | |
d85f5326 | 649 | strWID.u16WIDid = (u16)WID_SET_DRV_HANDLER; |
c5c77ba1 | 650 | strWID.enuWIDtype = WID_INT; |
ca356ada | 651 | strWID.ps8WidVal = (s8 *)&(pstrHostIfSetDrvHandler->u32Address); |
4e4467fd | 652 | strWID.s32ValueSize = sizeof(u32); |
c5c77ba1 JK |
653 | |
654 | /*Sending Cfg*/ | |
655 | ||
72ed4dc7 | 656 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
657 | |
658 | ||
2b9d5b48 | 659 | if ((pstrHostIfSetDrvHandler->u32Address) == (u32)NULL) |
83383ea3 | 660 | up(&hSemDeinitDrvHandle); |
c5c77ba1 JK |
661 | |
662 | ||
663 | if (s32Error) { | |
664 | PRINT_ER("Failed to set driver handler\n"); | |
665 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
666 | } | |
667 | WILC_CATCH(s32Error) | |
668 | { | |
669 | ||
670 | } | |
671 | ||
672 | return s32Error; | |
673 | } | |
674 | ||
675 | /** | |
676 | * @brief Handle_SetWfiAPDrvHandler | |
677 | * @details Sending config packet to firmware to set driver handler | |
678 | * @param[in] void * drvHandler,tstrHostIfSetDrvHandler* pstrHostIfSetDrvHandler | |
679 | * @return Error code. | |
680 | * @author | |
681 | * @date | |
682 | * @version 1.0 | |
683 | */ | |
2b05df55 | 684 | static s32 Handle_SetOperationMode(tstrWILC_WFIDrv *drvHandler, tstrHostIfSetOperationMode *pstrHostIfSetOperationMode) |
c5c77ba1 JK |
685 | { |
686 | ||
fb4ec9ca | 687 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
688 | tstrWID strWID; |
689 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
690 | ||
691 | ||
692 | /*prepare configuration packet*/ | |
d85f5326 | 693 | strWID.u16WIDid = (u16)WID_SET_OPERATION_MODE; |
c5c77ba1 | 694 | strWID.enuWIDtype = WID_INT; |
ca356ada | 695 | strWID.ps8WidVal = (s8 *)&(pstrHostIfSetOperationMode->u32Mode); |
4e4467fd | 696 | strWID.s32ValueSize = sizeof(u32); |
c5c77ba1 JK |
697 | |
698 | /*Sending Cfg*/ | |
03b2d5e7 | 699 | PRINT_INFO(HOSTINF_DBG, "pstrWFIDrv= %p\n", pstrWFIDrv); |
c5c77ba1 | 700 | |
72ed4dc7 | 701 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
702 | |
703 | ||
2b9d5b48 | 704 | if ((pstrHostIfSetOperationMode->u32Mode) == (u32)NULL) |
83383ea3 | 705 | up(&hSemDeinitDrvHandle); |
c5c77ba1 JK |
706 | |
707 | ||
708 | if (s32Error) { | |
709 | PRINT_ER("Failed to set driver handler\n"); | |
710 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
711 | } | |
712 | WILC_CATCH(s32Error) | |
713 | { | |
714 | ||
715 | } | |
716 | ||
717 | return s32Error; | |
718 | } | |
719 | ||
720 | /** | |
721 | * @brief host_int_set_IPAddress | |
722 | * @details Setting IP address params in message queue | |
63d03e47 | 723 | * @param[in] WILC_WFIDrvHandle hWFIDrv, u8* pu8IPAddr |
c5c77ba1 JK |
724 | * @return Error code. |
725 | * @author | |
726 | * @date | |
727 | * @version 1.0 | |
728 | */ | |
2b05df55 | 729 | s32 Handle_set_IPAddress(tstrWILC_WFIDrv *drvHandler, u8 *pu8IPAddr, u8 idx) |
c5c77ba1 JK |
730 | { |
731 | ||
fb4ec9ca | 732 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
733 | tstrWID strWID; |
734 | char firmwareIPAddress[4] = {0}; | |
735 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
736 | ||
737 | if (pu8IPAddr[0] < 192) | |
738 | pu8IPAddr[0] = 0; | |
739 | ||
b3a02832 | 740 | PRINT_INFO(HOSTINF_DBG, "Indx = %d, Handling set IP = %pI4\n", idx, pu8IPAddr); |
c5c77ba1 | 741 | |
d00d2ba3 | 742 | memcpy(gs8SetIP[idx], pu8IPAddr, IP_ALEN); |
c5c77ba1 JK |
743 | |
744 | /*prepare configuration packet*/ | |
d85f5326 | 745 | strWID.u16WIDid = (u16)WID_IP_ADDRESS; |
c5c77ba1 | 746 | strWID.enuWIDtype = WID_STR; |
63d03e47 | 747 | strWID.ps8WidVal = (u8 *)pu8IPAddr; |
c5c77ba1 JK |
748 | strWID.s32ValueSize = IP_ALEN; |
749 | ||
72ed4dc7 | 750 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
751 | |
752 | ||
753 | ||
218dc407 | 754 | host_int_get_ipaddress(drvHandler, firmwareIPAddress, idx); |
c5c77ba1 JK |
755 | |
756 | if (s32Error) { | |
757 | PRINT_D(HOSTINF_DBG, "Failed to set IP address\n"); | |
758 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
759 | } else { | |
760 | PRINT_INFO(HOSTINF_DBG, "IP address set\n"); | |
761 | } | |
762 | ||
763 | WILC_CATCH(s32Error) | |
764 | { | |
765 | ||
766 | } | |
767 | ||
768 | return s32Error; | |
769 | } | |
770 | ||
771 | ||
772 | /** | |
773 | * @brief Handle_get_IPAddress | |
774 | * @details Setting IP address params in message queue | |
63d03e47 | 775 | * @param[in] WILC_WFIDrvHandle hWFIDrv, u8* pu8IPAddr |
c5c77ba1 JK |
776 | * @return Error code. |
777 | * @author | |
778 | * @date | |
779 | * @version 1.0 | |
780 | */ | |
2b05df55 | 781 | s32 Handle_get_IPAddress(tstrWILC_WFIDrv *drvHandler, u8 *pu8IPAddr, u8 idx) |
c5c77ba1 JK |
782 | { |
783 | ||
fb4ec9ca | 784 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
785 | tstrWID strWID; |
786 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
787 | ||
788 | /*prepare configuration packet*/ | |
d85f5326 | 789 | strWID.u16WIDid = (u16)WID_IP_ADDRESS; |
c5c77ba1 | 790 | strWID.enuWIDtype = WID_STR; |
63d03e47 | 791 | strWID.ps8WidVal = (u8 *)WILC_MALLOC(IP_ALEN); |
c5c77ba1 JK |
792 | strWID.s32ValueSize = IP_ALEN; |
793 | ||
72ed4dc7 | 794 | s32Error = SendConfigPkt(GET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 | 795 | |
b3a02832 | 796 | PRINT_INFO(HOSTINF_DBG, "%pI4\n", strWID.ps8WidVal); |
c5c77ba1 | 797 | |
d00d2ba3 | 798 | memcpy(gs8GetIP[idx], strWID.ps8WidVal, IP_ALEN); |
c5c77ba1 JK |
799 | |
800 | /*get the value by searching the local copy*/ | |
49188af2 | 801 | kfree(strWID.ps8WidVal); |
c5c77ba1 | 802 | |
1a646e7e | 803 | if (memcmp(gs8GetIP[idx], gs8SetIP[idx], IP_ALEN) != 0) |
218dc407 | 804 | host_int_setup_ipaddress(pstrWFIDrv, gs8SetIP[idx], idx); |
c5c77ba1 JK |
805 | |
806 | if (s32Error != WILC_SUCCESS) { | |
807 | PRINT_ER("Failed to get IP address\n"); | |
808 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
809 | } else { | |
03b2d5e7 | 810 | PRINT_INFO(HOSTINF_DBG, "IP address retrieved:: u8IfIdx = %d\n", idx); |
b3a02832 | 811 | PRINT_INFO(HOSTINF_DBG, "%pI4\n", gs8GetIP[idx]); |
c5c77ba1 JK |
812 | PRINT_INFO(HOSTINF_DBG, "\n"); |
813 | } | |
814 | ||
815 | WILC_CATCH(s32Error) | |
816 | { | |
817 | ||
818 | } | |
819 | ||
820 | return s32Error; | |
821 | } | |
822 | ||
823 | ||
824 | /*BugId_5077*/ | |
825 | /** | |
826 | * @brief Handle_SetMacAddress | |
827 | * @details Setting mac address | |
828 | * @param[in] void * drvHandler,tstrHostIfSetDrvHandler* pstrHostIfSetDrvHandler | |
829 | * @return Error code. | |
830 | * @author Amr Abdel-Moghny | |
831 | * @date November 2013 | |
832 | * @version 7.0 | |
833 | */ | |
2b05df55 | 834 | static s32 Handle_SetMacAddress(tstrWILC_WFIDrv *drvHandler, tstrHostIfSetMacAddress *pstrHostIfSetMacAddress) |
c5c77ba1 JK |
835 | { |
836 | ||
fb4ec9ca | 837 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
838 | tstrWID strWID; |
839 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
63d03e47 | 840 | u8 *mac_buf = (u8 *)WILC_MALLOC(ETH_ALEN); |
78c87591 | 841 | |
c5c77ba1 JK |
842 | if (mac_buf == NULL) { |
843 | PRINT_ER("No buffer to send mac address\n"); | |
844 | return WILC_FAIL; | |
845 | } | |
d00d2ba3 | 846 | memcpy(mac_buf, pstrHostIfSetMacAddress->u8MacAddress, ETH_ALEN); |
c5c77ba1 JK |
847 | |
848 | /*prepare configuration packet*/ | |
d85f5326 | 849 | strWID.u16WIDid = (u16)WID_MAC_ADDR; |
c5c77ba1 JK |
850 | strWID.enuWIDtype = WID_STR; |
851 | strWID.ps8WidVal = mac_buf; | |
852 | strWID.s32ValueSize = ETH_ALEN; | |
853 | PRINT_D(GENERIC_DBG, "mac addr = :%x:%x:%x:%x:%x:%x\n", strWID.ps8WidVal[0], strWID.ps8WidVal[1], strWID.ps8WidVal[2], strWID.ps8WidVal[3], strWID.ps8WidVal[4], strWID.ps8WidVal[5]); | |
854 | /*Sending Cfg*/ | |
72ed4dc7 | 855 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
856 | if (s32Error) { |
857 | PRINT_ER("Failed to set mac address\n"); | |
858 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
859 | } | |
860 | ||
861 | WILC_CATCH(s32Error) | |
862 | { | |
863 | ||
864 | } | |
49188af2 | 865 | kfree(mac_buf); |
c5c77ba1 JK |
866 | return s32Error; |
867 | } | |
868 | ||
869 | ||
870 | /*BugID_5213*/ | |
871 | /** | |
872 | * @brief Handle_GetMacAddress | |
873 | * @details Getting mac address | |
874 | * @param[in] void * drvHandler,tstrHostIfSetDrvHandler* pstrHostIfSetDrvHandler | |
875 | * @return Error code. | |
876 | * @author Amr Abdel-Moghny | |
877 | * @date JAN 2013 | |
878 | * @version 8.0 | |
879 | */ | |
2b05df55 | 880 | static s32 Handle_GetMacAddress(tstrWILC_WFIDrv *drvHandler, tstrHostIfGetMacAddress *pstrHostIfGetMacAddress) |
c5c77ba1 JK |
881 | { |
882 | ||
fb4ec9ca | 883 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
884 | tstrWID strWID; |
885 | ||
886 | /*prepare configuration packet*/ | |
d85f5326 | 887 | strWID.u16WIDid = (u16)WID_MAC_ADDR; |
c5c77ba1 JK |
888 | strWID.enuWIDtype = WID_STR; |
889 | strWID.ps8WidVal = pstrHostIfGetMacAddress->u8MacAddress; | |
890 | strWID.s32ValueSize = ETH_ALEN; | |
891 | ||
892 | /*Sending Cfg*/ | |
72ed4dc7 | 893 | s32Error = SendConfigPkt(GET_CFG, &strWID, 1, false, (u32)drvHandler); |
c5c77ba1 JK |
894 | if (s32Error) { |
895 | PRINT_ER("Failed to get mac address\n"); | |
896 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
897 | } | |
898 | WILC_CATCH(s32Error) | |
899 | { | |
900 | ||
901 | } | |
83383ea3 | 902 | up(&hWaitResponse); |
c5c77ba1 JK |
903 | |
904 | return s32Error; | |
905 | } | |
906 | ||
907 | ||
908 | /** | |
909 | * @brief Handle_CfgParam | |
910 | * @details Sending config packet to firmware to set CFG params | |
911 | * @param[in] tstrHostIFCfgParamAttr* strHostIFCfgParamAttr | |
912 | * @return Error code. | |
913 | * @author | |
914 | * @date | |
915 | * @version 1.0 | |
916 | */ | |
2b05df55 | 917 | static s32 Handle_CfgParam(tstrWILC_WFIDrv *drvHandler, tstrHostIFCfgParamAttr *strHostIFCfgParamAttr) |
c5c77ba1 | 918 | { |
fb4ec9ca | 919 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 920 | tstrWID strWIDList[32]; |
63d03e47 | 921 | u8 u8WidCnt = 0; |
c5c77ba1 JK |
922 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; |
923 | ||
924 | ||
83383ea3 | 925 | down(&(pstrWFIDrv->gtOsCfgValuesSem)); |
c5c77ba1 JK |
926 | |
927 | ||
928 | PRINT_D(HOSTINF_DBG, "Setting CFG params\n"); | |
929 | ||
930 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & BSS_TYPE) { | |
931 | /*----------------------------------------------------------*/ | |
932 | /*Input Value: INFRASTRUCTURE = 1, */ | |
933 | /* INDEPENDENT= 2, */ | |
934 | /* ANY_BSS= 3 */ | |
935 | /*----------------------------------------------------------*/ | |
936 | /* validate input then copy>> need to check value 4 and 5 */ | |
937 | if (strHostIFCfgParamAttr->pstrCfgParamVal.bss_type < 6) { | |
938 | strWIDList[u8WidCnt].u16WIDid = WID_BSS_TYPE; | |
ca356ada | 939 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.bss_type; |
c5c77ba1 | 940 | strWIDList[u8WidCnt].enuWIDtype = WID_CHAR; |
576917ad | 941 | strWIDList[u8WidCnt].s32ValueSize = sizeof(char); |
63d03e47 | 942 | pstrWFIDrv->strCfgValues.bss_type = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.bss_type; |
c5c77ba1 JK |
943 | } else { |
944 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
945 | } | |
946 | u8WidCnt++; | |
947 | } | |
948 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & AUTH_TYPE) { | |
949 | /*------------------------------------------------------*/ | |
950 | /*Input Values: OPEN_SYSTEM = 0, */ | |
951 | /* SHARED_KEY = 1, */ | |
952 | /* ANY = 2 */ | |
953 | /*------------------------------------------------------*/ | |
954 | /*validate Possible values*/ | |
955 | if ((strHostIFCfgParamAttr->pstrCfgParamVal.auth_type) == 1 || (strHostIFCfgParamAttr->pstrCfgParamVal.auth_type) == 2 || (strHostIFCfgParamAttr->pstrCfgParamVal.auth_type) == 5) { | |
956 | strWIDList[u8WidCnt].u16WIDid = WID_AUTH_TYPE; | |
ca356ada | 957 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.auth_type; |
c5c77ba1 | 958 | strWIDList[u8WidCnt].enuWIDtype = WID_CHAR; |
576917ad | 959 | strWIDList[u8WidCnt].s32ValueSize = sizeof(char); |
63d03e47 | 960 | pstrWFIDrv->strCfgValues.auth_type = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.auth_type; |
c5c77ba1 JK |
961 | } else { |
962 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
963 | } | |
964 | u8WidCnt++; | |
965 | } | |
966 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & AUTHEN_TIMEOUT) { | |
967 | /* range is 1 to 65535. */ | |
968 | if (strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout < 65536) { | |
969 | strWIDList[u8WidCnt].u16WIDid = WID_AUTH_TIMEOUT; | |
ca356ada | 970 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout; |
c5c77ba1 | 971 | strWIDList[u8WidCnt].enuWIDtype = WID_SHORT; |
d85f5326 | 972 | strWIDList[u8WidCnt].s32ValueSize = sizeof(u16); |
c5c77ba1 JK |
973 | pstrWFIDrv->strCfgValues.auth_timeout = strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout; |
974 | } else { | |
975 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
976 | } | |
977 | u8WidCnt++; | |
978 | } | |
979 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & POWER_MANAGEMENT) { | |
980 | /*-----------------------------------------------------------*/ | |
981 | /*Input Values: NO_POWERSAVE = 0, */ | |
982 | /* MIN_FAST_PS = 1, */ | |
983 | /* MAX_FAST_PS = 2, */ | |
984 | /* MIN_PSPOLL_PS = 3, */ | |
985 | /* MAX_PSPOLL_PS = 4 */ | |
986 | /*----------------------------------------------------------*/ | |
987 | if (strHostIFCfgParamAttr->pstrCfgParamVal.power_mgmt_mode < 5) { | |
988 | strWIDList[u8WidCnt].u16WIDid = WID_POWER_MANAGEMENT; | |
ca356ada | 989 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.power_mgmt_mode; |
c5c77ba1 | 990 | strWIDList[u8WidCnt].enuWIDtype = WID_CHAR; |
576917ad | 991 | strWIDList[u8WidCnt].s32ValueSize = sizeof(char); |
63d03e47 | 992 | pstrWFIDrv->strCfgValues.power_mgmt_mode = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.power_mgmt_mode; |
c5c77ba1 JK |
993 | } else { |
994 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
995 | } | |
996 | u8WidCnt++; | |
997 | } | |
998 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & RETRY_SHORT) { | |
999 | /* range from 1 to 256 */ | |
1000 | if ((strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit > 0) && (strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit < 256)) { | |
1001 | strWIDList[u8WidCnt].u16WIDid = WID_SHORT_RETRY_LIMIT; | |
ca356ada | 1002 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit; |
c5c77ba1 | 1003 | strWIDList[u8WidCnt].enuWIDtype = WID_SHORT; |
d85f5326 | 1004 | strWIDList[u8WidCnt].s32ValueSize = sizeof(u16); |
c5c77ba1 JK |
1005 | pstrWFIDrv->strCfgValues.short_retry_limit = strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit; |
1006 | } else { | |
1007 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1008 | } | |
1009 | u8WidCnt++; | |
1010 | } | |
1011 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & RETRY_LONG) { | |
1012 | /* range from 1 to 256 */ | |
1013 | if ((strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit > 0) && (strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit < 256)) { | |
1014 | strWIDList[u8WidCnt].u16WIDid = WID_LONG_RETRY_LIMIT; | |
ca356ada | 1015 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit; |
c5c77ba1 JK |
1016 | |
1017 | strWIDList[u8WidCnt].enuWIDtype = WID_SHORT; | |
d85f5326 | 1018 | strWIDList[u8WidCnt].s32ValueSize = sizeof(u16); |
c5c77ba1 JK |
1019 | pstrWFIDrv->strCfgValues.long_retry_limit = strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit; |
1020 | } else { | |
1021 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1022 | } | |
1023 | u8WidCnt++; | |
1024 | } | |
1025 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & FRAG_THRESHOLD) { | |
1026 | ||
1027 | if (strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold > 255 && strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold < 7937) { | |
1028 | strWIDList[u8WidCnt].u16WIDid = WID_FRAG_THRESHOLD; | |
ca356ada | 1029 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold; |
c5c77ba1 | 1030 | strWIDList[u8WidCnt].enuWIDtype = WID_SHORT; |
d85f5326 | 1031 | strWIDList[u8WidCnt].s32ValueSize = sizeof(u16); |
c5c77ba1 JK |
1032 | pstrWFIDrv->strCfgValues.frag_threshold = strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold; |
1033 | } else { | |
1034 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1035 | } | |
1036 | u8WidCnt++; | |
1037 | } | |
1038 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & RTS_THRESHOLD) { | |
1039 | /* range 256 to 65535 */ | |
1040 | if (strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold > 255 && strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold < 65536) { | |
1041 | strWIDList[u8WidCnt].u16WIDid = WID_RTS_THRESHOLD; | |
ca356ada | 1042 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold; |
c5c77ba1 | 1043 | strWIDList[u8WidCnt].enuWIDtype = WID_SHORT; |
d85f5326 | 1044 | strWIDList[u8WidCnt].s32ValueSize = sizeof(u16); |
c5c77ba1 JK |
1045 | pstrWFIDrv->strCfgValues.rts_threshold = strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold; |
1046 | } else { | |
1047 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1048 | } | |
1049 | u8WidCnt++; | |
1050 | } | |
1051 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & PREAMBLE) { | |
1052 | /*-----------------------------------------------------*/ | |
1053 | /*Input Values: Short= 0, */ | |
1054 | /* Long= 1, */ | |
1055 | /* Auto= 2 */ | |
1056 | /*------------------------------------------------------*/ | |
1057 | if (strHostIFCfgParamAttr->pstrCfgParamVal.preamble_type < 3) { | |
1058 | strWIDList[u8WidCnt].u16WIDid = WID_PREAMBLE; | |
ca356ada | 1059 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.preamble_type; |
c5c77ba1 | 1060 | strWIDList[u8WidCnt].enuWIDtype = WID_CHAR; |
576917ad | 1061 | strWIDList[u8WidCnt].s32ValueSize = sizeof(char); |
c5c77ba1 JK |
1062 | pstrWFIDrv->strCfgValues.preamble_type = strHostIFCfgParamAttr->pstrCfgParamVal.preamble_type; |
1063 | } else { | |
1064 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1065 | } | |
1066 | u8WidCnt++; | |
1067 | } | |
1068 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & SHORT_SLOT_ALLOWED) { | |
1069 | if (strHostIFCfgParamAttr->pstrCfgParamVal.short_slot_allowed < 2) { | |
1070 | strWIDList[u8WidCnt].u16WIDid = WID_SHORT_SLOT_ALLOWED; | |
ca356ada | 1071 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.short_slot_allowed; |
c5c77ba1 | 1072 | strWIDList[u8WidCnt].enuWIDtype = WID_CHAR; |
576917ad | 1073 | strWIDList[u8WidCnt].s32ValueSize = sizeof(char); |
63d03e47 | 1074 | pstrWFIDrv->strCfgValues.short_slot_allowed = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.short_slot_allowed; |
c5c77ba1 JK |
1075 | } else { |
1076 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1077 | } | |
1078 | u8WidCnt++; | |
1079 | } | |
1080 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & TXOP_PROT_DISABLE) { | |
1081 | /*Description: used to Disable RTS-CTS protection for TXOP burst*/ | |
1082 | /*transmission when the acknowledgement policy is No-Ack or Block-Ack */ | |
1083 | /* this information is useful for external supplicant */ | |
1084 | /*Input Values: 1 for enable and 0 for disable. */ | |
1085 | if (strHostIFCfgParamAttr->pstrCfgParamVal.txop_prot_disabled < 2) { | |
1086 | strWIDList[u8WidCnt].u16WIDid = WID_11N_TXOP_PROT_DISABLE; | |
ca356ada | 1087 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.txop_prot_disabled; |
c5c77ba1 | 1088 | strWIDList[u8WidCnt].enuWIDtype = WID_CHAR; |
576917ad | 1089 | strWIDList[u8WidCnt].s32ValueSize = sizeof(char); |
63d03e47 | 1090 | pstrWFIDrv->strCfgValues.txop_prot_disabled = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.txop_prot_disabled; |
c5c77ba1 JK |
1091 | } else { |
1092 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1093 | } | |
1094 | u8WidCnt++; | |
1095 | } | |
1096 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & BEACON_INTERVAL) { | |
1097 | /* range is 1 to 65535. */ | |
1098 | if (strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval < 65536) { | |
1099 | strWIDList[u8WidCnt].u16WIDid = WID_BEACON_INTERVAL; | |
ca356ada | 1100 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval; |
c5c77ba1 | 1101 | strWIDList[u8WidCnt].enuWIDtype = WID_SHORT; |
d85f5326 | 1102 | strWIDList[u8WidCnt].s32ValueSize = sizeof(u16); |
c5c77ba1 JK |
1103 | pstrWFIDrv->strCfgValues.beacon_interval = strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval; |
1104 | } else { | |
1105 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1106 | } | |
1107 | u8WidCnt++; | |
1108 | } | |
1109 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & DTIM_PERIOD) { | |
1110 | /* range is 1 to 255. */ | |
1111 | if (strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period < 256) { | |
1112 | strWIDList[u8WidCnt].u16WIDid = WID_DTIM_PERIOD; | |
ca356ada | 1113 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period; |
c5c77ba1 | 1114 | strWIDList[u8WidCnt].enuWIDtype = WID_CHAR; |
576917ad | 1115 | strWIDList[u8WidCnt].s32ValueSize = sizeof(char); |
c5c77ba1 JK |
1116 | pstrWFIDrv->strCfgValues.dtim_period = strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period; |
1117 | } else { | |
1118 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1119 | } | |
1120 | u8WidCnt++; | |
1121 | } | |
1122 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & SITE_SURVEY) { | |
1123 | /*----------------------------------------------------------------------*/ | |
1124 | /*Input Values: SITE_SURVEY_1CH = 0, i.e.: currently set channel */ | |
1125 | /* SITE_SURVEY_ALL_CH = 1, */ | |
1126 | /* SITE_SURVEY_OFF = 2 */ | |
1127 | /*----------------------------------------------------------------------*/ | |
1128 | if (strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_enabled < 3) { | |
1129 | strWIDList[u8WidCnt].u16WIDid = WID_SITE_SURVEY; | |
ca356ada | 1130 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_enabled; |
c5c77ba1 | 1131 | strWIDList[u8WidCnt].enuWIDtype = WID_CHAR; |
576917ad | 1132 | strWIDList[u8WidCnt].s32ValueSize = sizeof(char); |
63d03e47 | 1133 | pstrWFIDrv->strCfgValues.site_survey_enabled = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_enabled; |
c5c77ba1 JK |
1134 | } else { |
1135 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1136 | } | |
1137 | u8WidCnt++; | |
1138 | } | |
1139 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & SITE_SURVEY_SCAN_TIME) { | |
1140 | /* range is 1 to 65535. */ | |
1141 | if (strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time < 65536) { | |
1142 | strWIDList[u8WidCnt].u16WIDid = WID_SITE_SURVEY_SCAN_TIME; | |
ca356ada | 1143 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time; |
c5c77ba1 | 1144 | strWIDList[u8WidCnt].enuWIDtype = WID_SHORT; |
d85f5326 | 1145 | strWIDList[u8WidCnt].s32ValueSize = sizeof(u16); |
c5c77ba1 JK |
1146 | pstrWFIDrv->strCfgValues.site_survey_scan_time = strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time; |
1147 | } else { | |
1148 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1149 | } | |
1150 | u8WidCnt++; | |
1151 | } | |
1152 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & ACTIVE_SCANTIME) { | |
1153 | /* range is 1 to 65535. */ | |
1154 | if (strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time < 65536) { | |
1155 | strWIDList[u8WidCnt].u16WIDid = WID_ACTIVE_SCAN_TIME; | |
ca356ada | 1156 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time; |
c5c77ba1 | 1157 | strWIDList[u8WidCnt].enuWIDtype = WID_SHORT; |
d85f5326 | 1158 | strWIDList[u8WidCnt].s32ValueSize = sizeof(u16); |
c5c77ba1 JK |
1159 | pstrWFIDrv->strCfgValues.active_scan_time = strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time; |
1160 | } else { | |
1161 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1162 | } | |
1163 | u8WidCnt++; | |
1164 | } | |
1165 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & PASSIVE_SCANTIME) { | |
1166 | /* range is 1 to 65535. */ | |
1167 | if (strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time < 65536) { | |
1168 | strWIDList[u8WidCnt].u16WIDid = WID_PASSIVE_SCAN_TIME; | |
ca356ada | 1169 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time; |
c5c77ba1 | 1170 | strWIDList[u8WidCnt].enuWIDtype = WID_SHORT; |
d85f5326 | 1171 | strWIDList[u8WidCnt].s32ValueSize = sizeof(u16); |
c5c77ba1 JK |
1172 | pstrWFIDrv->strCfgValues.passive_scan_time = strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time; |
1173 | } else { | |
1174 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1175 | } | |
1176 | u8WidCnt++; | |
1177 | } | |
1178 | if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & CURRENT_TX_RATE) { | |
1179 | CURRENT_TX_RATE_T curr_tx_rate = strHostIFCfgParamAttr->pstrCfgParamVal.curr_tx_rate; | |
1180 | /*----------------------------------------------------------------------*/ | |
1181 | /*Rates: 1 2 5.5 11 6 9 12 18 24 36 48 54 Auto */ | |
1182 | /*InputValues: 1 2 3 4 5 6 7 8 9 10 11 12 0 */ | |
1183 | /*----------------------------------------------------------------------*/ | |
1184 | /* validate rate */ | |
1185 | if (curr_tx_rate == AUTORATE || curr_tx_rate == MBPS_1 | |
1186 | || curr_tx_rate == MBPS_2 || curr_tx_rate == MBPS_5_5 | |
1187 | || curr_tx_rate == MBPS_11 || curr_tx_rate == MBPS_6 | |
1188 | || curr_tx_rate == MBPS_9 || curr_tx_rate == MBPS_12 | |
1189 | || curr_tx_rate == MBPS_18 || curr_tx_rate == MBPS_24 | |
1190 | || curr_tx_rate == MBPS_36 || curr_tx_rate == MBPS_48 || curr_tx_rate == MBPS_54) { | |
1191 | strWIDList[u8WidCnt].u16WIDid = WID_CURRENT_TX_RATE; | |
ca356ada | 1192 | strWIDList[u8WidCnt].ps8WidVal = (s8 *)&curr_tx_rate; |
c5c77ba1 | 1193 | strWIDList[u8WidCnt].enuWIDtype = WID_SHORT; |
d85f5326 | 1194 | strWIDList[u8WidCnt].s32ValueSize = sizeof(u16); |
63d03e47 | 1195 | pstrWFIDrv->strCfgValues.curr_tx_rate = (u8)curr_tx_rate; |
c5c77ba1 JK |
1196 | } else { |
1197 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); | |
1198 | } | |
1199 | u8WidCnt++; | |
1200 | } | |
72ed4dc7 | 1201 | s32Error = SendConfigPkt(SET_CFG, strWIDList, u8WidCnt, false, (u32)pstrWFIDrv); |
c5c77ba1 | 1202 | |
2b9d5b48 | 1203 | if (s32Error) |
c5c77ba1 JK |
1204 | PRINT_ER("Error in setting CFG params\n"); |
1205 | ||
c5c77ba1 JK |
1206 | WILC_CATCH(s32Error) |
1207 | { | |
1208 | } | |
83383ea3 | 1209 | up(&(pstrWFIDrv->gtOsCfgValuesSem)); |
c5c77ba1 JK |
1210 | return s32Error; |
1211 | } | |
1212 | ||
1213 | ||
1214 | /** | |
1215 | * @brief Handle_wait_msg_q_empty | |
1216 | * @details this should be the last msg and then the msg Q becomes idle | |
1217 | * @param[in] tstrHostIFscanAttr* pstrHostIFscanAttr | |
1218 | * @return Error code. | |
1219 | * @author | |
1220 | * @date | |
1221 | * @version 1.0 | |
1222 | */ | |
fb4ec9ca | 1223 | static s32 Handle_wait_msg_q_empty(void) |
c5c77ba1 | 1224 | { |
fb4ec9ca | 1225 | s32 s32Error = WILC_SUCCESS; |
78c87591 | 1226 | |
c5c77ba1 | 1227 | g_wilc_initialized = 0; |
83383ea3 | 1228 | up(&hWaitResponse); |
c5c77ba1 JK |
1229 | return s32Error; |
1230 | } | |
1231 | ||
1232 | /** | |
1233 | * @brief Handle_Scan | |
1234 | * @details Sending config packet to firmware to set the scan params | |
1235 | * @param[in] tstrHostIFscanAttr* pstrHostIFscanAttr | |
1236 | * @return Error code. | |
1237 | * @author | |
1238 | * @date | |
1239 | * @version 1.0 | |
1240 | */ | |
2b05df55 | 1241 | static s32 Handle_Scan(tstrWILC_WFIDrv *drvHandler, tstrHostIFscanAttr *pstrHostIFscanAttr) |
c5c77ba1 | 1242 | { |
fb4ec9ca | 1243 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 1244 | tstrWID strWIDList[5]; |
4e4467fd CL |
1245 | u32 u32WidsCount = 0; |
1246 | u32 i; | |
63d03e47 GKH |
1247 | u8 *pu8Buffer; |
1248 | u8 valuesize = 0; | |
1249 | u8 *pu8HdnNtwrksWidVal = NULL; | |
c5c77ba1 JK |
1250 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler; |
1251 | ||
1252 | PRINT_D(HOSTINF_DBG, "Setting SCAN params\n"); | |
03b2d5e7 | 1253 | PRINT_D(HOSTINF_DBG, "Scanning: In [%d] state\n", pstrWFIDrv->enuHostIFstate); |
c5c77ba1 JK |
1254 | |
1255 | pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = pstrHostIFscanAttr->pfScanResult; | |
1256 | pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid = pstrHostIFscanAttr->pvUserArg; | |
1257 | ||
1258 | #ifdef WILC_P2P | |
c5c77ba1 JK |
1259 | #endif |
1260 | ||
1261 | if ((pstrWFIDrv->enuHostIFstate >= HOST_IF_SCANNING) && (pstrWFIDrv->enuHostIFstate < HOST_IF_CONNECTED)) { | |
1262 | /* here we either in HOST_IF_SCANNING, HOST_IF_WAITING_CONN_REQ or HOST_IF_WAITING_CONN_RESP */ | |
1263 | PRINT_D(GENERIC_DBG, "Don't scan we are already in [%d] state\n", pstrWFIDrv->enuHostIFstate); | |
1264 | WILC_ERRORREPORT(s32Error, WILC_BUSY); | |
1265 | } | |
1266 | ||
1267 | #ifdef DISABLE_PWRSAVE_AND_SCAN_DURING_IP | |
1268 | if (g_obtainingIP || connecting) { | |
1269 | PRINT_D(GENERIC_DBG, "[handle_scan]: Don't do obss scan until IP adresss is obtained\n"); | |
1270 | WILC_ERRORREPORT(s32Error, WILC_BUSY); | |
1271 | } | |
1272 | #endif | |
1273 | ||
1274 | PRINT_D(HOSTINF_DBG, "Setting SCAN params\n"); | |
1275 | ||
1276 | ||
1277 | pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount = 0; | |
1278 | ||
1279 | /*BugID_4189*/ | |
d85f5326 | 1280 | strWIDList[u32WidsCount].u16WIDid = (u16)WID_SSID_PROBE_REQ; |
c5c77ba1 JK |
1281 | strWIDList[u32WidsCount].enuWIDtype = WID_STR; |
1282 | ||
2b9d5b48 | 1283 | for (i = 0; i < pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum; i++) |
c5c77ba1 | 1284 | valuesize += ((pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen) + 1); |
c5c77ba1 JK |
1285 | pu8HdnNtwrksWidVal = WILC_MALLOC(valuesize + 1); |
1286 | strWIDList[u32WidsCount].ps8WidVal = pu8HdnNtwrksWidVal; | |
b1413b60 | 1287 | if (strWIDList[u32WidsCount].ps8WidVal != NULL) { |
c5c77ba1 JK |
1288 | pu8Buffer = strWIDList[u32WidsCount].ps8WidVal; |
1289 | ||
1290 | *pu8Buffer++ = pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum; | |
1291 | ||
1292 | PRINT_D(HOSTINF_DBG, "In Handle_ProbeRequest number of ssid %d\n", pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum); | |
1293 | ||
1294 | for (i = 0; i < pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum; i++) { | |
1295 | *pu8Buffer++ = pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen; | |
d00d2ba3 | 1296 | memcpy(pu8Buffer, pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].pu8ssid, pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen); |
c5c77ba1 JK |
1297 | pu8Buffer += pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen; |
1298 | } | |
1299 | ||
1300 | ||
1301 | ||
fb4ec9ca | 1302 | strWIDList[u32WidsCount].s32ValueSize = (s32)(valuesize + 1); |
c5c77ba1 JK |
1303 | u32WidsCount++; |
1304 | } | |
1305 | ||
1306 | /*filling cfg param array*/ | |
1307 | ||
1308 | /* if((pstrHostIFscanAttr->pu8IEs != NULL) && (pstrHostIFscanAttr->IEsLen != 0)) */ | |
1309 | { | |
1310 | /* IEs to be inserted in Probe Request */ | |
1311 | strWIDList[u32WidsCount].u16WIDid = WID_INFO_ELEMENT_PROBE; | |
1312 | strWIDList[u32WidsCount].enuWIDtype = WID_BIN_DATA; | |
1313 | strWIDList[u32WidsCount].ps8WidVal = pstrHostIFscanAttr->pu8IEs; | |
1314 | strWIDList[u32WidsCount].s32ValueSize = pstrHostIFscanAttr->IEsLen; | |
1315 | u32WidsCount++; | |
1316 | } | |
1317 | ||
1318 | /*Scan Type*/ | |
1319 | strWIDList[u32WidsCount].u16WIDid = WID_SCAN_TYPE; | |
1320 | strWIDList[u32WidsCount].enuWIDtype = WID_CHAR; | |
576917ad | 1321 | strWIDList[u32WidsCount].s32ValueSize = sizeof(char); |
ca356ada | 1322 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrHostIFscanAttr->u8ScanType)); |
c5c77ba1 JK |
1323 | u32WidsCount++; |
1324 | ||
1325 | /*list of channels to be scanned*/ | |
1326 | strWIDList[u32WidsCount].u16WIDid = WID_SCAN_CHANNEL_LIST; | |
1327 | strWIDList[u32WidsCount].enuWIDtype = WID_BIN_DATA; | |
1328 | ||
1329 | /* Bug 4648: Convert channel numbers to start from 0 not 1. */ | |
1330 | if (pstrHostIFscanAttr->pu8ChnlFreqList != NULL && pstrHostIFscanAttr->u8ChnlListLen > 0) { | |
1331 | int i; | |
1332 | ||
1333 | for (i = 0; i < pstrHostIFscanAttr->u8ChnlListLen; i++) { | |
2b9d5b48 | 1334 | if (pstrHostIFscanAttr->pu8ChnlFreqList[i] > 0) |
c5c77ba1 | 1335 | pstrHostIFscanAttr->pu8ChnlFreqList[i] = pstrHostIFscanAttr->pu8ChnlFreqList[i] - 1; |
c5c77ba1 JK |
1336 | } |
1337 | } | |
1338 | ||
1339 | strWIDList[u32WidsCount].ps8WidVal = pstrHostIFscanAttr->pu8ChnlFreqList; | |
1340 | strWIDList[u32WidsCount].s32ValueSize = pstrHostIFscanAttr->u8ChnlListLen; | |
1341 | u32WidsCount++; | |
1342 | ||
1343 | /*Scan Request*/ | |
1344 | strWIDList[u32WidsCount].u16WIDid = WID_START_SCAN_REQ; | |
1345 | strWIDList[u32WidsCount].enuWIDtype = WID_CHAR; | |
576917ad | 1346 | strWIDList[u32WidsCount].s32ValueSize = sizeof(char); |
ca356ada | 1347 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrHostIFscanAttr->u8ScanSource)); |
c5c77ba1 JK |
1348 | u32WidsCount++; |
1349 | ||
1350 | /*keep the state as is , no need to change it*/ | |
1351 | /* gWFiDrvHandle->enuHostIFstate = HOST_IF_SCANNING; */ | |
1352 | ||
78174ada | 1353 | if (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED) |
72ed4dc7 | 1354 | gbScanWhileConnected = true; |
78174ada | 1355 | else if (pstrWFIDrv->enuHostIFstate == HOST_IF_IDLE) |
72ed4dc7 | 1356 | gbScanWhileConnected = false; |
c5c77ba1 | 1357 | |
72ed4dc7 | 1358 | s32Error = SendConfigPkt(SET_CFG, strWIDList, u32WidsCount, false, (u32)pstrWFIDrv); |
c5c77ba1 JK |
1359 | |
1360 | if (s32Error) { | |
1361 | PRINT_ER("Failed to send scan paramters config packet\n"); | |
1362 | WILC_ERRORREPORT(s32Error, s32Error); | |
1363 | } else { | |
1364 | PRINT_D(HOSTINF_DBG, "Successfully sent SCAN params config packet\n"); | |
1365 | } | |
1366 | ||
1367 | WILC_CATCH(s32Error) | |
1368 | { | |
334e1a57 | 1369 | WILC_TimerStop(&pstrWFIDrv->hScanTimer); |
c5c77ba1 JK |
1370 | /*if there is an ongoing scan request*/ |
1371 | Handle_ScanDone(drvHandler, SCAN_EVENT_ABORTED); | |
1372 | } | |
1373 | ||
1374 | /* Deallocate pstrHostIFscanAttr->u8ChnlListLen which was prevoisuly allocated by the sending thread */ | |
1375 | if (pstrHostIFscanAttr->pu8ChnlFreqList != NULL) { | |
49188af2 | 1376 | kfree(pstrHostIFscanAttr->pu8ChnlFreqList); |
c5c77ba1 JK |
1377 | pstrHostIFscanAttr->pu8ChnlFreqList = NULL; |
1378 | } | |
1379 | ||
1380 | /* Deallocate pstrHostIFscanAttr->pu8IEs which was previously allocated by the sending thread */ | |
1381 | if (pstrHostIFscanAttr->pu8IEs != NULL) { | |
49188af2 | 1382 | kfree(pstrHostIFscanAttr->pu8IEs); |
c5c77ba1 JK |
1383 | pstrHostIFscanAttr->pu8IEs = NULL; |
1384 | } | |
1385 | if (pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo != NULL) { | |
49188af2 | 1386 | kfree(pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo); |
c5c77ba1 JK |
1387 | pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo = NULL; |
1388 | } | |
1389 | ||
1390 | /* Deallocate pstrHostIFscanAttr->u8ChnlListLen which was prevoisuly allocated by the sending thread */ | |
1391 | if (pstrHostIFscanAttr->pu8ChnlFreqList != NULL) { | |
49188af2 | 1392 | kfree(pstrHostIFscanAttr->pu8ChnlFreqList); |
c5c77ba1 JK |
1393 | pstrHostIFscanAttr->pu8ChnlFreqList = NULL; |
1394 | } | |
1395 | ||
2b9d5b48 | 1396 | if (pu8HdnNtwrksWidVal != NULL) |
49188af2 | 1397 | kfree(pu8HdnNtwrksWidVal); |
c5c77ba1 JK |
1398 | |
1399 | return s32Error; | |
1400 | } | |
1401 | ||
1402 | /** | |
1403 | * @brief Handle_ScanDone | |
1404 | * @details Call scan notification callback function | |
1405 | * @param[in] NONE | |
1406 | * @return Error code. | |
1407 | * @author | |
1408 | * @date | |
1409 | * @version 1.0 | |
1410 | */ | |
2b05df55 | 1411 | static s32 Handle_ScanDone(tstrWILC_WFIDrv *drvHandler, tenuScanEvent enuEvent) |
c5c77ba1 | 1412 | { |
fb4ec9ca | 1413 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
1414 | |
1415 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
1416 | ||
1417 | ||
63d03e47 | 1418 | u8 u8abort_running_scan; |
c5c77ba1 JK |
1419 | tstrWID strWID; |
1420 | ||
1421 | ||
1422 | PRINT_D(HOSTINF_DBG, "in Handle_ScanDone()\n"); | |
1423 | ||
1424 | /*BugID_4978*/ | |
1425 | /*Ask FW to abort the running scan, if any*/ | |
1426 | if (enuEvent == SCAN_EVENT_ABORTED) { | |
1427 | PRINT_D(GENERIC_DBG, "Abort running scan\n"); | |
1428 | u8abort_running_scan = 1; | |
d85f5326 | 1429 | strWID.u16WIDid = (u16)WID_ABORT_RUNNING_SCAN; |
c5c77ba1 | 1430 | strWID.enuWIDtype = WID_CHAR; |
ca356ada | 1431 | strWID.ps8WidVal = (s8 *)&u8abort_running_scan; |
576917ad | 1432 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
1433 | |
1434 | /*Sending Cfg*/ | |
72ed4dc7 | 1435 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
1436 | if (s32Error != WILC_SUCCESS) { |
1437 | PRINT_ER("Failed to set abort running scan\n"); | |
1438 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
1439 | } | |
1440 | WILC_CATCH(s32Error) | |
1441 | { | |
1442 | } | |
1443 | } | |
1444 | ||
1445 | if (pstrWFIDrv == NULL) { | |
1446 | PRINT_ER("Driver handler is NULL\n"); | |
1447 | return s32Error; | |
1448 | } | |
1449 | ||
1450 | /*if there is an ongoing scan request*/ | |
1451 | if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) { | |
b1413b60 | 1452 | pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(enuEvent, NULL, |
c5c77ba1 JK |
1453 | pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL); |
1454 | /*delete current scan request*/ | |
1455 | pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = NULL; | |
1456 | } | |
1457 | ||
1458 | return s32Error; | |
1459 | } | |
1460 | ||
1461 | /** | |
1462 | * @brief Handle_Connect | |
1463 | * @details Sending config packet to firmware to starting connection | |
1464 | * @param[in] tstrHostIFconnectAttr* pstrHostIFconnectAttr | |
1465 | * @return Error code. | |
1466 | * @author | |
1467 | * @date | |
1468 | * @version 1.0 | |
1469 | */ | |
63d03e47 | 1470 | u8 u8ConnectedSSID[6] = {0}; |
2b05df55 | 1471 | static s32 Handle_Connect(tstrWILC_WFIDrv *drvHandler, tstrHostIFconnectAttr *pstrHostIFconnectAttr) |
c5c77ba1 JK |
1472 | { |
1473 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler; | |
fb4ec9ca | 1474 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 1475 | tstrWID strWIDList[8]; |
4e4467fd | 1476 | u32 u32WidsCount = 0, dummyval = 0; |
c5c77ba1 JK |
1477 | /* char passphrase[] = "12345678"; */ |
1478 | #ifndef CONNECT_DIRECT | |
fb4ec9ca | 1479 | s32 s32Err = WILC_SUCCESS; |
4e4467fd | 1480 | u32 i; |
63d03e47 | 1481 | u8 u8bssDscListIndex; |
b1413b60 | 1482 | wid_site_survey_reslts_s *pstrSurveyResults = NULL; |
c5c77ba1 | 1483 | #else |
63d03e47 | 1484 | u8 *pu8CurrByte = NULL; |
c5c77ba1 JK |
1485 | /*Bug4218: Parsing Join Param*/ |
1486 | #ifdef WILC_PARSE_SCAN_IN_HOST | |
1487 | tstrJoinBssParam *ptstrJoinBssParam; | |
1488 | #endif /*WILC_PARSE_SCAN_IN_HOST*/ | |
1489 | ||
1490 | #endif | |
1491 | ||
1492 | PRINT_D(GENERIC_DBG, "Handling connect request\n"); | |
1493 | ||
1494 | #ifndef CONNECT_DIRECT | |
2cc46837 CL |
1495 | memset(gapu8RcvdSurveyResults[0], 0, MAX_SURVEY_RESULT_FRAG_SIZE); |
1496 | memset(gapu8RcvdSurveyResults[1], 0, MAX_SURVEY_RESULT_FRAG_SIZE); | |
c5c77ba1 JK |
1497 | |
1498 | ||
1499 | PRINT_D(HOSTINF_DBG, "Getting site survey results\n"); | |
218dc407 | 1500 | s32Err = host_int_get_site_survey_results(pstrWFIDrv, |
c5c77ba1 JK |
1501 | gapu8RcvdSurveyResults, |
1502 | MAX_SURVEY_RESULT_FRAG_SIZE); | |
1503 | if (s32Err) { | |
1504 | PRINT_ER("Failed to get site survey results\n"); | |
1505 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
1506 | ||
1507 | } | |
1508 | s32Err = ParseSurveyResults(gapu8RcvdSurveyResults, &pstrSurveyResults, | |
1509 | &pstrWFIDrv->u32SurveyResultsCount); | |
1510 | ||
1511 | ||
1512 | if (s32Err == WILC_SUCCESS) { | |
1513 | /* use the parsed info in pstrSurveyResults, then deallocate it */ | |
1514 | PRINT_D(HOSTINF_DBG, "Copying site survey results in global structure, then deallocate\n"); | |
1515 | for (i = 0; i < pstrWFIDrv->u32SurveyResultsCount; i++) { | |
d00d2ba3 | 1516 | memcpy(&pstrWFIDrv->astrSurveyResults[i], &pstrSurveyResults[i], |
c5c77ba1 JK |
1517 | sizeof(wid_site_survey_reslts_s)); |
1518 | } | |
1519 | ||
1520 | DeallocateSurveyResults(pstrSurveyResults); | |
1521 | } else { | |
1522 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
03b2d5e7 | 1523 | PRINT_ER("ParseSurveyResults() Error(%d)\n", s32Err); |
c5c77ba1 JK |
1524 | } |
1525 | ||
1526 | ||
1527 | for (i = 0; i < pstrWFIDrv->u32SurveyResultsCount; i++) { | |
1a646e7e | 1528 | if (memcmp(pstrWFIDrv->astrSurveyResults[i].SSID, |
c5c77ba1 JK |
1529 | pstrHostIFconnectAttr->pu8ssid, |
1530 | pstrHostIFconnectAttr->ssidLen) == 0) { | |
1531 | PRINT_INFO(HOSTINF_DBG, "Network with required SSID is found %s\n", pstrHostIFconnectAttr->pu8ssid); | |
1532 | if (pstrHostIFconnectAttr->pu8bssid == NULL) { | |
1533 | /* BSSID is not passed from the user, so decision of matching | |
1534 | * is done by SSID only */ | |
1535 | PRINT_INFO(HOSTINF_DBG, "BSSID is not passed from the user\n"); | |
1536 | break; | |
1537 | } else { | |
1538 | /* BSSID is also passed from the user, so decision of matching | |
1539 | * should consider also this passed BSSID */ | |
1540 | ||
1a646e7e | 1541 | if (memcmp(pstrWFIDrv->astrSurveyResults[i].BSSID, |
c5c77ba1 JK |
1542 | pstrHostIFconnectAttr->pu8bssid, |
1543 | 6) == 0) { | |
1544 | PRINT_INFO(HOSTINF_DBG, "BSSID is passed from the user and matched\n"); | |
1545 | break; | |
1546 | } | |
1547 | } | |
1548 | } | |
1549 | } | |
1550 | ||
1551 | if (i < pstrWFIDrv->u32SurveyResultsCount) { | |
1552 | u8bssDscListIndex = i; | |
1553 | ||
03b2d5e7 | 1554 | PRINT_INFO(HOSTINF_DBG, "Connecting to network of Bss Idx%d and SSID %s and channel%d\n", |
c5c77ba1 JK |
1555 | u8bssDscListIndex, pstrWFIDrv->astrSurveyResults[u8bssDscListIndex].SSID, |
1556 | pstrWFIDrv->astrSurveyResults[u8bssDscListIndex].Channel); | |
1557 | ||
1558 | PRINT_INFO(HOSTINF_DBG, "Saving connection parameters in global structure\n"); | |
1559 | ||
1560 | if (pstrHostIFconnectAttr->pu8bssid != NULL) { | |
63d03e47 | 1561 | pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = (u8 *)WILC_MALLOC(6); |
d00d2ba3 | 1562 | memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, pstrHostIFconnectAttr->pu8bssid, 6); |
c5c77ba1 JK |
1563 | } |
1564 | ||
1565 | pstrWFIDrv->strWILC_UsrConnReq.ssidLen = pstrHostIFconnectAttr->ssidLen; | |
1566 | if (pstrHostIFconnectAttr->pu8ssid != NULL) { | |
63d03e47 | 1567 | pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = (u8 *)WILC_MALLOC(pstrHostIFconnectAttr->ssidLen + 1); |
d00d2ba3 | 1568 | memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid, pstrHostIFconnectAttr->pu8ssid, |
c5c77ba1 JK |
1569 | pstrHostIFconnectAttr->ssidLen); |
1570 | pstrWFIDrv->strWILC_UsrConnReq.pu8ssid[pstrHostIFconnectAttr->ssidLen] = '\0'; | |
1571 | } | |
1572 | ||
1573 | pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = pstrHostIFconnectAttr->IEsLen; | |
1574 | if (pstrHostIFconnectAttr->pu8IEs != NULL) { | |
63d03e47 | 1575 | pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = (u8 *)WILC_MALLOC(pstrHostIFconnectAttr->IEsLen); |
d00d2ba3 | 1576 | memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs, pstrHostIFconnectAttr->pu8IEs, |
c5c77ba1 JK |
1577 | pstrHostIFconnectAttr->IEsLen); |
1578 | } | |
1579 | ||
1580 | pstrWFIDrv->strWILC_UsrConnReq.u8security = pstrHostIFconnectAttr->u8security; | |
1581 | pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type = pstrHostIFconnectAttr->tenuAuth_type; | |
1582 | pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult = pstrHostIFconnectAttr->pfConnectResult; | |
1583 | pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid = pstrHostIFconnectAttr->pvUserArg; | |
1584 | ||
1585 | ||
1586 | /* if((gWFiDrvHandle->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) && */ | |
1587 | /* (gWFiDrvHandle->strWILC_UsrConnReq.ConnReqIEsLen != 0)) */ | |
1588 | { | |
1589 | /* IEs to be inserted in Association Request */ | |
1590 | strWIDList[u32WidsCount].u16WIDid = WID_INFO_ELEMENT_ASSOCIATE; | |
1591 | strWIDList[u32WidsCount].enuWIDtype = WID_BIN_DATA; | |
1592 | strWIDList[u32WidsCount].ps8WidVal = pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs; | |
1593 | strWIDList[u32WidsCount].s32ValueSize = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen; | |
1594 | u32WidsCount++; | |
1595 | } | |
d85f5326 | 1596 | strWIDList[u32WidsCount].u16WIDid = (u16)WID_11I_MODE; |
c5c77ba1 | 1597 | strWIDList[u32WidsCount].enuWIDtype = WID_CHAR; |
576917ad | 1598 | strWIDList[u32WidsCount].s32ValueSize = sizeof(char); |
ca356ada | 1599 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrWFIDrv->strWILC_UsrConnReq.u8security)); |
c5c77ba1 JK |
1600 | u32WidsCount++; |
1601 | ||
1602 | PRINT_INFO(HOSTINF_DBG, "Encrypt Mode = %x\n", pstrWFIDrv->strWILC_UsrConnReq.u8security); | |
1603 | ||
d85f5326 | 1604 | strWIDList[u32WidsCount].u16WIDid = (u16)WID_AUTH_TYPE; |
c5c77ba1 | 1605 | strWIDList[u32WidsCount].enuWIDtype = WID_CHAR; |
576917ad | 1606 | strWIDList[u32WidsCount].s32ValueSize = sizeof(char); |
ca356ada | 1607 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type); |
c5c77ba1 JK |
1608 | u32WidsCount++; |
1609 | ||
1610 | PRINT_INFO(HOSTINF_DBG, "Authentication Type = %x\n", pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type); | |
1611 | /* | |
d85f5326 | 1612 | * strWIDList[u32WidsCount].u16WIDid = (u16)WID_11I_PSK; |
c5c77ba1 JK |
1613 | * strWIDList[u32WidsCount].enuWIDtype = WID_STR; |
1614 | * strWIDList[u32WidsCount].s32ValueSize = sizeof(passphrase); | |
ca356ada | 1615 | * strWIDList[u32WidsCount].ps8WidVal = (s8*)(passphrase); |
c5c77ba1 JK |
1616 | * u32WidsCount++; |
1617 | */ | |
1618 | ||
d85f5326 | 1619 | strWIDList[u32WidsCount].u16WIDid = (u16)WID_JOIN_REQ; |
c5c77ba1 | 1620 | strWIDList[u32WidsCount].enuWIDtype = WID_CHAR; |
576917ad | 1621 | strWIDList[u32WidsCount].s32ValueSize = sizeof(char); |
ca356ada | 1622 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)&u8bssDscListIndex; |
c5c77ba1 JK |
1623 | u32WidsCount++; |
1624 | ||
c5c77ba1 JK |
1625 | /* A temporary workaround to avoid handling the misleading MAC_DISCONNECTED raised from the |
1626 | * firmware at chip reset when processing the WIDs of the Connect Request. | |
1627 | * (This workaround should be removed in the future when the Chip reset of the Connect WIDs is disabled) */ | |
1628 | /* ////////////////////// */ | |
1629 | gu32WidConnRstHack = 0; | |
1630 | /* ////////////////////// */ | |
c5c77ba1 | 1631 | |
72ed4dc7 | 1632 | s32Error = SendConfigPkt(SET_CFG, strWIDList, u32WidsCount, false, (u32)pstrWFIDrv); |
c5c77ba1 JK |
1633 | if (s32Error) { |
1634 | PRINT_ER("Handle_Connect()] failed to send config packet\n"); | |
1635 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
1636 | } else { | |
1637 | pstrWFIDrv->enuHostIFstate = HOST_IF_WAITING_CONN_RESP; | |
1638 | } | |
1639 | ||
1640 | } else { | |
1641 | PRINT_ER("Required BSSID not found\n"); | |
1642 | WILC_ERRORREPORT(s32Error, WILC_NOT_FOUND); | |
1643 | } | |
1644 | ||
1645 | #else | |
1646 | ||
1647 | /* if we try to connect to an already connected AP then discard the request */ | |
1648 | ||
1a646e7e | 1649 | if (memcmp(pstrHostIFconnectAttr->pu8bssid, u8ConnectedSSID, ETH_ALEN) == 0) { |
c5c77ba1 JK |
1650 | |
1651 | s32Error = WILC_SUCCESS; | |
1652 | PRINT_ER("Trying to connect to an already connected AP, Discard connect request\n"); | |
1653 | return s32Error; | |
1654 | } | |
1655 | ||
1656 | PRINT_INFO(HOSTINF_DBG, "Saving connection parameters in global structure\n"); | |
1657 | ||
1658 | /*Bug4218: Parsing Join Param*/ | |
1659 | #ifdef WILC_PARSE_SCAN_IN_HOST | |
1660 | ptstrJoinBssParam = (tstrJoinBssParam *)pstrHostIFconnectAttr->pJoinParams; | |
1661 | if (ptstrJoinBssParam == NULL) { | |
1662 | PRINT_ER("Required BSSID not found\n"); | |
1663 | WILC_ERRORREPORT(s32Error, WILC_NOT_FOUND); | |
1664 | } | |
1665 | #endif /*WILC_PARSE_SCAN_IN_HOST*/ | |
1666 | ||
c5c77ba1 | 1667 | if (pstrHostIFconnectAttr->pu8bssid != NULL) { |
63d03e47 | 1668 | pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = (u8 *)WILC_MALLOC(6); |
d00d2ba3 | 1669 | memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, pstrHostIFconnectAttr->pu8bssid, 6); |
c5c77ba1 JK |
1670 | } |
1671 | ||
1672 | pstrWFIDrv->strWILC_UsrConnReq.ssidLen = pstrHostIFconnectAttr->ssidLen; | |
1673 | if (pstrHostIFconnectAttr->pu8ssid != NULL) { | |
63d03e47 | 1674 | pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = (u8 *)WILC_MALLOC(pstrHostIFconnectAttr->ssidLen + 1); |
d00d2ba3 | 1675 | memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid, pstrHostIFconnectAttr->pu8ssid, |
c5c77ba1 JK |
1676 | pstrHostIFconnectAttr->ssidLen); |
1677 | pstrWFIDrv->strWILC_UsrConnReq.pu8ssid[pstrHostIFconnectAttr->ssidLen] = '\0'; | |
1678 | } | |
1679 | ||
1680 | pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = pstrHostIFconnectAttr->IEsLen; | |
1681 | if (pstrHostIFconnectAttr->pu8IEs != NULL) { | |
63d03e47 | 1682 | pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = (u8 *)WILC_MALLOC(pstrHostIFconnectAttr->IEsLen); |
d00d2ba3 | 1683 | memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs, pstrHostIFconnectAttr->pu8IEs, |
c5c77ba1 JK |
1684 | pstrHostIFconnectAttr->IEsLen); |
1685 | } | |
1686 | ||
1687 | pstrWFIDrv->strWILC_UsrConnReq.u8security = pstrHostIFconnectAttr->u8security; | |
1688 | pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type = pstrHostIFconnectAttr->tenuAuth_type; | |
1689 | pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult = pstrHostIFconnectAttr->pfConnectResult; | |
1690 | pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid = pstrHostIFconnectAttr->pvUserArg; | |
1691 | ||
1692 | strWIDList[u32WidsCount].u16WIDid = WID_SUCCESS_FRAME_COUNT; | |
1693 | strWIDList[u32WidsCount].enuWIDtype = WID_INT; | |
4e4467fd | 1694 | strWIDList[u32WidsCount].s32ValueSize = sizeof(u32); |
ca356ada | 1695 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(dummyval)); |
c5c77ba1 JK |
1696 | u32WidsCount++; |
1697 | ||
1698 | strWIDList[u32WidsCount].u16WIDid = WID_RECEIVED_FRAGMENT_COUNT; | |
1699 | strWIDList[u32WidsCount].enuWIDtype = WID_INT; | |
4e4467fd | 1700 | strWIDList[u32WidsCount].s32ValueSize = sizeof(u32); |
ca356ada | 1701 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(dummyval)); |
c5c77ba1 JK |
1702 | u32WidsCount++; |
1703 | ||
1704 | strWIDList[u32WidsCount].u16WIDid = WID_FAILED_COUNT; | |
1705 | strWIDList[u32WidsCount].enuWIDtype = WID_INT; | |
4e4467fd | 1706 | strWIDList[u32WidsCount].s32ValueSize = sizeof(u32); |
ca356ada | 1707 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(dummyval)); |
c5c77ba1 JK |
1708 | u32WidsCount++; |
1709 | ||
1710 | /* if((gWFiDrvHandle->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) && */ | |
1711 | /* (gWFiDrvHandle->strWILC_UsrConnReq.ConnReqIEsLen != 0)) */ | |
1712 | { | |
1713 | /* IEs to be inserted in Association Request */ | |
1714 | strWIDList[u32WidsCount].u16WIDid = WID_INFO_ELEMENT_ASSOCIATE; | |
1715 | strWIDList[u32WidsCount].enuWIDtype = WID_BIN_DATA; | |
1716 | strWIDList[u32WidsCount].ps8WidVal = pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs; | |
1717 | strWIDList[u32WidsCount].s32ValueSize = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen; | |
1718 | u32WidsCount++; | |
1719 | ||
1720 | /*BugID_5137*/ | |
1a646e7e | 1721 | if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7)) { |
c5c77ba1 JK |
1722 | |
1723 | gu32FlushedInfoElemAsocSize = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen; | |
1724 | gu8FlushedInfoElemAsoc = WILC_MALLOC(gu32FlushedInfoElemAsocSize); | |
1725 | memcpy(gu8FlushedInfoElemAsoc, pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs, | |
1726 | gu32FlushedInfoElemAsocSize); | |
1727 | } | |
1728 | } | |
d85f5326 | 1729 | strWIDList[u32WidsCount].u16WIDid = (u16)WID_11I_MODE; |
c5c77ba1 | 1730 | strWIDList[u32WidsCount].enuWIDtype = WID_CHAR; |
576917ad | 1731 | strWIDList[u32WidsCount].s32ValueSize = sizeof(char); |
ca356ada | 1732 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrWFIDrv->strWILC_UsrConnReq.u8security)); |
c5c77ba1 JK |
1733 | u32WidsCount++; |
1734 | ||
1735 | /*BugID_5137*/ | |
1a646e7e | 1736 | if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7)) |
c5c77ba1 JK |
1737 | gu8Flushed11iMode = pstrWFIDrv->strWILC_UsrConnReq.u8security; |
1738 | ||
1739 | PRINT_INFO(HOSTINF_DBG, "Encrypt Mode = %x\n", pstrWFIDrv->strWILC_UsrConnReq.u8security); | |
1740 | ||
1741 | ||
d85f5326 | 1742 | strWIDList[u32WidsCount].u16WIDid = (u16)WID_AUTH_TYPE; |
c5c77ba1 | 1743 | strWIDList[u32WidsCount].enuWIDtype = WID_CHAR; |
576917ad | 1744 | strWIDList[u32WidsCount].s32ValueSize = sizeof(char); |
ca356ada | 1745 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type); |
c5c77ba1 JK |
1746 | u32WidsCount++; |
1747 | ||
1748 | /*BugID_5137*/ | |
1a646e7e | 1749 | if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7)) |
63d03e47 | 1750 | gu8FlushedAuthType = (u8)pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type; |
c5c77ba1 JK |
1751 | |
1752 | PRINT_INFO(HOSTINF_DBG, "Authentication Type = %x\n", pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type); | |
1753 | /* | |
d85f5326 | 1754 | * strWIDList[u32WidsCount].u16WIDid = (u16)WID_11I_PSK; |
c5c77ba1 JK |
1755 | * strWIDList[u32WidsCount].enuWIDtype = WID_STR; |
1756 | * strWIDList[u32WidsCount].s32ValueSize = sizeof(passphrase); | |
ca356ada | 1757 | * strWIDList[u32WidsCount].ps8WidVal = (s8*)(passphrase); |
c5c77ba1 JK |
1758 | * u32WidsCount++; |
1759 | */ | |
1760 | ||
1761 | PRINT_D(HOSTINF_DBG, "Connecting to network of SSID %s on channel %d\n", | |
1762 | pstrWFIDrv->strWILC_UsrConnReq.pu8ssid, pstrHostIFconnectAttr->u8channel); | |
1763 | ||
1764 | ||
1765 | #ifndef WILC_PARSE_SCAN_IN_HOST | |
d85f5326 | 1766 | strWIDList[u32WidsCount].u16WIDid = (u16)WID_JOIN_REQ_EXTENDED; |
c5c77ba1 JK |
1767 | strWIDList[u32WidsCount].enuWIDtype = WID_STR; |
1768 | strWIDList[u32WidsCount].s32ValueSize = MAX_SSID_LEN + 7; | |
1769 | strWIDList[u32WidsCount].ps8WidVal = WILC_MALLOC(strWIDList[u32WidsCount].s32ValueSize); | |
1770 | ||
2b9d5b48 | 1771 | if (strWIDList[u32WidsCount].ps8WidVal == NULL) |
c5c77ba1 | 1772 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
c5c77ba1 JK |
1773 | |
1774 | pu8CurrByte = strWIDList[u32WidsCount].ps8WidVal; | |
1775 | ||
1776 | if (pstrHostIFconnectAttr->pu8ssid != NULL) { | |
d00d2ba3 | 1777 | memcpy(pu8CurrByte, pstrHostIFconnectAttr->pu8ssid, pstrHostIFconnectAttr->ssidLen); |
c5c77ba1 JK |
1778 | pu8CurrByte[pstrHostIFconnectAttr->ssidLen] = '\0'; |
1779 | } | |
1780 | pu8CurrByte += MAX_SSID_LEN; | |
1781 | if ((pstrHostIFconnectAttr->u8channel >= 1) && (pstrHostIFconnectAttr->u8channel <= 14)) { | |
1782 | *(pu8CurrByte++) = pstrHostIFconnectAttr->u8channel; | |
1783 | } else { | |
1784 | PRINT_ER("Channel out of range\n"); | |
1785 | *(pu8CurrByte++) = 0xFF; | |
1786 | } | |
2b9d5b48 | 1787 | if (pstrHostIFconnectAttr->pu8bssid != NULL) |
d00d2ba3 | 1788 | memcpy(pu8CurrByte, pstrHostIFconnectAttr->pu8bssid, 6); |
c5c77ba1 JK |
1789 | pu8CurrByte += 6; |
1790 | ||
1791 | /* keep the buffer at the start of the allocated pointer to use it with the free*/ | |
1792 | pu8CurrByte = strWIDList[u32WidsCount].ps8WidVal; | |
1793 | ||
1794 | #else | |
1795 | ||
d85f5326 | 1796 | strWIDList[u32WidsCount].u16WIDid = (u16)WID_JOIN_REQ_EXTENDED; |
c5c77ba1 JK |
1797 | strWIDList[u32WidsCount].enuWIDtype = WID_STR; |
1798 | ||
1799 | /*Sending NoA attributes during connection*/ | |
1800 | strWIDList[u32WidsCount].s32ValueSize = 112; /* 79; */ | |
1801 | strWIDList[u32WidsCount].ps8WidVal = WILC_MALLOC(strWIDList[u32WidsCount].s32ValueSize); | |
1802 | ||
1803 | /*BugID_5137*/ | |
1a646e7e | 1804 | if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7)) { |
c5c77ba1 JK |
1805 | gu32FlushedJoinReqSize = strWIDList[u32WidsCount].s32ValueSize; |
1806 | gu8FlushedJoinReq = WILC_MALLOC(gu32FlushedJoinReqSize); | |
1807 | } | |
2b9d5b48 | 1808 | if (strWIDList[u32WidsCount].ps8WidVal == NULL) |
c5c77ba1 | 1809 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
c5c77ba1 JK |
1810 | |
1811 | pu8CurrByte = strWIDList[u32WidsCount].ps8WidVal; | |
1812 | ||
1813 | ||
1814 | if (pstrHostIFconnectAttr->pu8ssid != NULL) { | |
d00d2ba3 | 1815 | memcpy(pu8CurrByte, pstrHostIFconnectAttr->pu8ssid, pstrHostIFconnectAttr->ssidLen); |
c5c77ba1 JK |
1816 | pu8CurrByte[pstrHostIFconnectAttr->ssidLen] = '\0'; |
1817 | } | |
1818 | pu8CurrByte += MAX_SSID_LEN; | |
1819 | ||
1820 | /* BSS type*/ | |
1821 | *(pu8CurrByte++) = INFRASTRUCTURE; | |
1822 | /* Channel*/ | |
1823 | if ((pstrHostIFconnectAttr->u8channel >= 1) && (pstrHostIFconnectAttr->u8channel <= 14)) { | |
1824 | *(pu8CurrByte++) = pstrHostIFconnectAttr->u8channel; | |
1825 | } else { | |
1826 | PRINT_ER("Channel out of range\n"); | |
1827 | *(pu8CurrByte++) = 0xFF; | |
1828 | } | |
1829 | /* Cap Info*/ | |
1830 | *(pu8CurrByte++) = (ptstrJoinBssParam->cap_info) & 0xFF; | |
1831 | *(pu8CurrByte++) = ((ptstrJoinBssParam->cap_info) >> 8) & 0xFF; | |
1832 | PRINT_D(HOSTINF_DBG, "* Cap Info %0x*\n", (*(pu8CurrByte - 2) | ((*(pu8CurrByte - 1)) << 8))); | |
1833 | ||
1834 | /* sa*/ | |
2b9d5b48 | 1835 | if (pstrHostIFconnectAttr->pu8bssid != NULL) |
d00d2ba3 | 1836 | memcpy(pu8CurrByte, pstrHostIFconnectAttr->pu8bssid, 6); |
c5c77ba1 JK |
1837 | pu8CurrByte += 6; |
1838 | ||
1839 | /* bssid*/ | |
2b9d5b48 | 1840 | if (pstrHostIFconnectAttr->pu8bssid != NULL) |
d00d2ba3 | 1841 | memcpy(pu8CurrByte, pstrHostIFconnectAttr->pu8bssid, 6); |
c5c77ba1 JK |
1842 | pu8CurrByte += 6; |
1843 | ||
1844 | /* Beacon Period*/ | |
1845 | *(pu8CurrByte++) = (ptstrJoinBssParam->beacon_period) & 0xFF; | |
1846 | *(pu8CurrByte++) = ((ptstrJoinBssParam->beacon_period) >> 8) & 0xFF; | |
1847 | PRINT_D(HOSTINF_DBG, "* Beacon Period %d*\n", (*(pu8CurrByte - 2) | ((*(pu8CurrByte - 1)) << 8))); | |
1848 | /* DTIM Period*/ | |
1849 | *(pu8CurrByte++) = ptstrJoinBssParam->dtim_period; | |
1850 | PRINT_D(HOSTINF_DBG, "* DTIM Period %d*\n", (*(pu8CurrByte - 1))); | |
1851 | /* Supported rates*/ | |
d00d2ba3 | 1852 | memcpy(pu8CurrByte, ptstrJoinBssParam->supp_rates, MAX_RATES_SUPPORTED + 1); |
c5c77ba1 JK |
1853 | pu8CurrByte += (MAX_RATES_SUPPORTED + 1); |
1854 | ||
1855 | /* wmm cap*/ | |
1856 | *(pu8CurrByte++) = ptstrJoinBssParam->wmm_cap; | |
1857 | PRINT_D(HOSTINF_DBG, "* wmm cap%d*\n", (*(pu8CurrByte - 1))); | |
1858 | /* uapsd cap*/ | |
1859 | *(pu8CurrByte++) = ptstrJoinBssParam->uapsd_cap; | |
1860 | ||
1861 | /* ht cap*/ | |
1862 | *(pu8CurrByte++) = ptstrJoinBssParam->ht_capable; | |
1863 | /* copy this information to the user request */ | |
1864 | pstrWFIDrv->strWILC_UsrConnReq.IsHTCapable = ptstrJoinBssParam->ht_capable; | |
1865 | ||
1866 | /* rsn found*/ | |
1867 | *(pu8CurrByte++) = ptstrJoinBssParam->rsn_found; | |
1868 | PRINT_D(HOSTINF_DBG, "* rsn found %d*\n", *(pu8CurrByte - 1)); | |
1869 | /* rsn group policy*/ | |
1870 | *(pu8CurrByte++) = ptstrJoinBssParam->rsn_grp_policy; | |
1871 | PRINT_D(HOSTINF_DBG, "* rsn group policy %0x*\n", (*(pu8CurrByte - 1))); | |
1872 | /* mode_802_11i*/ | |
1873 | *(pu8CurrByte++) = ptstrJoinBssParam->mode_802_11i; | |
1874 | PRINT_D(HOSTINF_DBG, "* mode_802_11i %d*\n", (*(pu8CurrByte - 1))); | |
1875 | /* rsn pcip policy*/ | |
d00d2ba3 | 1876 | memcpy(pu8CurrByte, ptstrJoinBssParam->rsn_pcip_policy, sizeof(ptstrJoinBssParam->rsn_pcip_policy)); |
c5c77ba1 JK |
1877 | pu8CurrByte += sizeof(ptstrJoinBssParam->rsn_pcip_policy); |
1878 | ||
1879 | /* rsn auth policy*/ | |
d00d2ba3 | 1880 | memcpy(pu8CurrByte, ptstrJoinBssParam->rsn_auth_policy, sizeof(ptstrJoinBssParam->rsn_auth_policy)); |
c5c77ba1 JK |
1881 | pu8CurrByte += sizeof(ptstrJoinBssParam->rsn_auth_policy); |
1882 | ||
1883 | /* rsn auth policy*/ | |
d00d2ba3 | 1884 | memcpy(pu8CurrByte, ptstrJoinBssParam->rsn_cap, sizeof(ptstrJoinBssParam->rsn_cap)); |
c5c77ba1 JK |
1885 | pu8CurrByte += sizeof(ptstrJoinBssParam->rsn_cap); |
1886 | ||
1887 | /*BugID_5137*/ | |
1888 | *(pu8CurrByte++) = REAL_JOIN_REQ; | |
1889 | ||
1890 | #ifdef WILC_P2P | |
1891 | *(pu8CurrByte++) = ptstrJoinBssParam->u8NoaEnbaled; | |
1892 | if (ptstrJoinBssParam->u8NoaEnbaled) { | |
1893 | PRINT_D(HOSTINF_DBG, "NOA present\n"); | |
1894 | ||
1895 | *(pu8CurrByte++) = (ptstrJoinBssParam->tsf) & 0xFF; | |
1896 | *(pu8CurrByte++) = ((ptstrJoinBssParam->tsf) >> 8) & 0xFF; | |
1897 | *(pu8CurrByte++) = ((ptstrJoinBssParam->tsf) >> 16) & 0xFF; | |
1898 | *(pu8CurrByte++) = ((ptstrJoinBssParam->tsf) >> 24) & 0xFF; | |
1899 | ||
1900 | *(pu8CurrByte++) = ptstrJoinBssParam->u8Index; | |
1901 | ||
1902 | *(pu8CurrByte++) = ptstrJoinBssParam->u8OppEnable; | |
1903 | ||
1904 | if (ptstrJoinBssParam->u8OppEnable) | |
1905 | *(pu8CurrByte++) = ptstrJoinBssParam->u8CtWindow; | |
1906 | ||
1907 | *(pu8CurrByte++) = ptstrJoinBssParam->u8Count; | |
1908 | ||
d00d2ba3 | 1909 | memcpy(pu8CurrByte, ptstrJoinBssParam->au8Duration, sizeof(ptstrJoinBssParam->au8Duration)); |
c5c77ba1 JK |
1910 | |
1911 | pu8CurrByte += sizeof(ptstrJoinBssParam->au8Duration); | |
1912 | ||
d00d2ba3 | 1913 | memcpy(pu8CurrByte, ptstrJoinBssParam->au8Interval, sizeof(ptstrJoinBssParam->au8Interval)); |
c5c77ba1 JK |
1914 | |
1915 | pu8CurrByte += sizeof(ptstrJoinBssParam->au8Interval); | |
1916 | ||
d00d2ba3 | 1917 | memcpy(pu8CurrByte, ptstrJoinBssParam->au8StartTime, sizeof(ptstrJoinBssParam->au8StartTime)); |
c5c77ba1 JK |
1918 | |
1919 | pu8CurrByte += sizeof(ptstrJoinBssParam->au8StartTime); | |
1920 | ||
1921 | } else | |
1922 | PRINT_D(HOSTINF_DBG, "NOA not present\n"); | |
1923 | #endif | |
1924 | ||
1925 | ||
1926 | /* keep the buffer at the start of the allocated pointer to use it with the free*/ | |
1927 | pu8CurrByte = strWIDList[u32WidsCount].ps8WidVal; | |
1928 | ||
1929 | ||
1930 | #endif /* #ifdef WILC_PARSE_SCAN_IN_HOST*/ | |
1931 | u32WidsCount++; | |
1932 | ||
c5c77ba1 JK |
1933 | /* A temporary workaround to avoid handling the misleading MAC_DISCONNECTED raised from the |
1934 | * firmware at chip reset when processing the WIDs of the Connect Request. | |
1935 | * (This workaround should be removed in the future when the Chip reset of the Connect WIDs is disabled) */ | |
1936 | /* ////////////////////// */ | |
1937 | gu32WidConnRstHack = 0; | |
1938 | /* ////////////////////// */ | |
c5c77ba1 JK |
1939 | |
1940 | /*BugID_5137*/ | |
1a646e7e | 1941 | if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7)) { |
c5c77ba1 | 1942 | memcpy(gu8FlushedJoinReq, pu8CurrByte, gu32FlushedJoinReqSize); |
4e4467fd | 1943 | gu8FlushedJoinReqDrvHandler = (u32)pstrWFIDrv; |
c5c77ba1 JK |
1944 | } |
1945 | ||
1946 | PRINT_D(GENERIC_DBG, "send HOST_IF_WAITING_CONN_RESP\n"); | |
1947 | ||
1948 | if (pstrHostIFconnectAttr->pu8bssid != NULL) { | |
d00d2ba3 | 1949 | memcpy(u8ConnectedSSID, pstrHostIFconnectAttr->pu8bssid, ETH_ALEN); |
c5c77ba1 JK |
1950 | |
1951 | PRINT_D(GENERIC_DBG, "save Bssid = %x:%x:%x:%x:%x:%x\n", (pstrHostIFconnectAttr->pu8bssid[0]), (pstrHostIFconnectAttr->pu8bssid[1]), (pstrHostIFconnectAttr->pu8bssid[2]), (pstrHostIFconnectAttr->pu8bssid[3]), (pstrHostIFconnectAttr->pu8bssid[4]), (pstrHostIFconnectAttr->pu8bssid[5])); | |
1952 | PRINT_D(GENERIC_DBG, "save bssid = %x:%x:%x:%x:%x:%x\n", (u8ConnectedSSID[0]), (u8ConnectedSSID[1]), (u8ConnectedSSID[2]), (u8ConnectedSSID[3]), (u8ConnectedSSID[4]), (u8ConnectedSSID[5])); | |
1953 | } | |
1954 | ||
72ed4dc7 | 1955 | s32Error = SendConfigPkt(SET_CFG, strWIDList, u32WidsCount, false, (u32)pstrWFIDrv); |
c5c77ba1 JK |
1956 | if (s32Error) { |
1957 | PRINT_ER("Handle_Connect()] failed to send config packet\n"); | |
1958 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
1959 | } else { | |
1960 | PRINT_D(GENERIC_DBG, "set HOST_IF_WAITING_CONN_RESP\n"); | |
1961 | pstrWFIDrv->enuHostIFstate = HOST_IF_WAITING_CONN_RESP; | |
1962 | } | |
1963 | #endif | |
1964 | ||
1965 | WILC_CATCH(s32Error) | |
1966 | { | |
1967 | tstrConnectInfo strConnectInfo; | |
1968 | ||
334e1a57 | 1969 | WILC_TimerStop(&pstrWFIDrv->hConnectTimer); |
c5c77ba1 JK |
1970 | |
1971 | PRINT_D(HOSTINF_DBG, "could not start connecting to the required network\n"); | |
1972 | ||
2cc46837 | 1973 | memset(&strConnectInfo, 0, sizeof(tstrConnectInfo)); |
c5c77ba1 JK |
1974 | |
1975 | if (pstrHostIFconnectAttr->pfConnectResult != NULL) { | |
2b9d5b48 | 1976 | if (pstrHostIFconnectAttr->pu8bssid != NULL) |
d00d2ba3 | 1977 | memcpy(strConnectInfo.au8bssid, pstrHostIFconnectAttr->pu8bssid, 6); |
c5c77ba1 JK |
1978 | |
1979 | if (pstrHostIFconnectAttr->pu8IEs != NULL) { | |
1980 | strConnectInfo.ReqIEsLen = pstrHostIFconnectAttr->IEsLen; | |
63d03e47 | 1981 | strConnectInfo.pu8ReqIEs = (u8 *)WILC_MALLOC(pstrHostIFconnectAttr->IEsLen); |
d00d2ba3 | 1982 | memcpy(strConnectInfo.pu8ReqIEs, |
c5c77ba1 JK |
1983 | pstrHostIFconnectAttr->pu8IEs, |
1984 | pstrHostIFconnectAttr->IEsLen); | |
1985 | } | |
1986 | ||
1987 | pstrHostIFconnectAttr->pfConnectResult(CONN_DISCONN_EVENT_CONN_RESP, | |
1988 | &strConnectInfo, | |
1989 | MAC_DISCONNECTED, | |
1990 | NULL, | |
1991 | pstrHostIFconnectAttr->pvUserArg); | |
1992 | /*Change state to idle*/ | |
1993 | pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE; | |
1994 | /* Deallocation */ | |
1995 | if (strConnectInfo.pu8ReqIEs != NULL) { | |
49188af2 | 1996 | kfree(strConnectInfo.pu8ReqIEs); |
c5c77ba1 JK |
1997 | strConnectInfo.pu8ReqIEs = NULL; |
1998 | } | |
1999 | ||
2000 | } else { | |
03b2d5e7 | 2001 | PRINT_ER("Connect callback function pointer is NULL\n"); |
c5c77ba1 JK |
2002 | } |
2003 | } | |
2004 | ||
2005 | PRINT_D(HOSTINF_DBG, "Deallocating connection parameters\n"); | |
2006 | /* Deallocate pstrHostIFconnectAttr->pu8bssid which was prevoisuly allocated by the sending thread */ | |
2007 | if (pstrHostIFconnectAttr->pu8bssid != NULL) { | |
49188af2 | 2008 | kfree(pstrHostIFconnectAttr->pu8bssid); |
c5c77ba1 JK |
2009 | pstrHostIFconnectAttr->pu8bssid = NULL; |
2010 | } | |
2011 | ||
2012 | /* Deallocate pstrHostIFconnectAttr->pu8ssid which was prevoisuly allocated by the sending thread */ | |
2013 | if (pstrHostIFconnectAttr->pu8ssid != NULL) { | |
49188af2 | 2014 | kfree(pstrHostIFconnectAttr->pu8ssid); |
c5c77ba1 JK |
2015 | pstrHostIFconnectAttr->pu8ssid = NULL; |
2016 | } | |
2017 | ||
2018 | /* Deallocate pstrHostIFconnectAttr->pu8IEs which was prevoisuly allocated by the sending thread */ | |
2019 | if (pstrHostIFconnectAttr->pu8IEs != NULL) { | |
49188af2 | 2020 | kfree(pstrHostIFconnectAttr->pu8IEs); |
c5c77ba1 JK |
2021 | pstrHostIFconnectAttr->pu8IEs = NULL; |
2022 | } | |
2023 | ||
2b9d5b48 | 2024 | if (pu8CurrByte != NULL) |
49188af2 | 2025 | kfree(pu8CurrByte); |
c5c77ba1 JK |
2026 | return s32Error; |
2027 | } | |
2028 | ||
2029 | /** | |
2030 | * @brief Handle_FlushConnect | |
2031 | * @details Sending config packet to firmware to flush an old connection | |
2032 | * after switching FW from station one to hybrid one | |
2033 | * @param[in] void * drvHandler | |
2034 | * @return Error code. | |
2035 | * @author Amr Abdel-Moghny | |
2036 | * @date 19 DEC 2013 | |
2037 | * @version 8.0 | |
2038 | */ | |
2039 | ||
2b05df55 | 2040 | static s32 Handle_FlushConnect(tstrWILC_WFIDrv *drvHandler) |
c5c77ba1 | 2041 | { |
fb4ec9ca | 2042 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 2043 | tstrWID strWIDList[5]; |
4e4467fd | 2044 | u32 u32WidsCount = 0; |
63d03e47 | 2045 | u8 *pu8CurrByte = NULL; |
c5c77ba1 JK |
2046 | |
2047 | ||
2048 | /* IEs to be inserted in Association Request */ | |
2049 | strWIDList[u32WidsCount].u16WIDid = WID_INFO_ELEMENT_ASSOCIATE; | |
2050 | strWIDList[u32WidsCount].enuWIDtype = WID_BIN_DATA; | |
2051 | strWIDList[u32WidsCount].ps8WidVal = gu8FlushedInfoElemAsoc; | |
2052 | strWIDList[u32WidsCount].s32ValueSize = gu32FlushedInfoElemAsocSize; | |
2053 | u32WidsCount++; | |
2054 | ||
d85f5326 | 2055 | strWIDList[u32WidsCount].u16WIDid = (u16)WID_11I_MODE; |
c5c77ba1 | 2056 | strWIDList[u32WidsCount].enuWIDtype = WID_CHAR; |
576917ad | 2057 | strWIDList[u32WidsCount].s32ValueSize = sizeof(char); |
ca356ada | 2058 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(gu8Flushed11iMode)); |
c5c77ba1 JK |
2059 | u32WidsCount++; |
2060 | ||
2061 | ||
2062 | ||
d85f5326 | 2063 | strWIDList[u32WidsCount].u16WIDid = (u16)WID_AUTH_TYPE; |
c5c77ba1 | 2064 | strWIDList[u32WidsCount].enuWIDtype = WID_CHAR; |
576917ad | 2065 | strWIDList[u32WidsCount].s32ValueSize = sizeof(char); |
ca356ada | 2066 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&gu8FlushedAuthType); |
c5c77ba1 JK |
2067 | u32WidsCount++; |
2068 | ||
2069 | ||
2070 | #ifdef WILC_PARSE_SCAN_IN_HOST | |
d85f5326 | 2071 | strWIDList[u32WidsCount].u16WIDid = (u16)WID_JOIN_REQ_EXTENDED; |
c5c77ba1 JK |
2072 | strWIDList[u32WidsCount].enuWIDtype = WID_STR; |
2073 | strWIDList[u32WidsCount].s32ValueSize = gu32FlushedJoinReqSize; | |
ca356ada | 2074 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)gu8FlushedJoinReq; |
c5c77ba1 JK |
2075 | pu8CurrByte = strWIDList[u32WidsCount].ps8WidVal; |
2076 | ||
2077 | pu8CurrByte += FLUSHED_BYTE_POS; | |
2078 | *(pu8CurrByte) = FLUSHED_JOIN_REQ; | |
2079 | ||
2080 | u32WidsCount++; | |
2081 | ||
2082 | #endif | |
2083 | ||
72ed4dc7 | 2084 | s32Error = SendConfigPkt(SET_CFG, strWIDList, u32WidsCount, false, gu8FlushedJoinReqDrvHandler); |
c5c77ba1 JK |
2085 | if (s32Error) { |
2086 | PRINT_ER("Handle_Flush_Connect()] failed to send config packet\n"); | |
2087 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
2088 | } | |
2089 | ||
2090 | WILC_CATCH(s32Error) | |
2091 | { | |
2092 | ||
2093 | } | |
2094 | ||
2095 | return s32Error; | |
2096 | } | |
2097 | ||
2098 | /** | |
2099 | * @brief Handle_ConnectTimeout | |
2100 | * @details Call connect notification callback function indicating connection failure | |
2101 | * @param[in] NONE | |
2102 | * @return Error code. | |
2103 | * @author | |
2104 | * @date | |
2105 | * @version 1.0 | |
2106 | */ | |
2b05df55 | 2107 | static s32 Handle_ConnectTimeout(tstrWILC_WFIDrv *drvHandler) |
c5c77ba1 | 2108 | { |
fb4ec9ca | 2109 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
2110 | tstrConnectInfo strConnectInfo; |
2111 | tstrWID strWID; | |
d85f5326 | 2112 | u16 u16DummyReasonCode = 0; |
c5c77ba1 JK |
2113 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler; |
2114 | ||
2115 | if (pstrWFIDrv == NULL) { | |
2116 | PRINT_ER("Driver handler is NULL\n"); | |
2117 | return s32Error; | |
2118 | } | |
2119 | ||
2120 | pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE; | |
2121 | ||
72ed4dc7 | 2122 | gbScanWhileConnected = false; |
c5c77ba1 JK |
2123 | |
2124 | ||
2cc46837 | 2125 | memset(&strConnectInfo, 0, sizeof(tstrConnectInfo)); |
c5c77ba1 JK |
2126 | |
2127 | ||
2128 | /* First, we will notify the upper layer with the Connection failure {through the Connect Callback function}, | |
2129 | * then we will notify our firmware also with the Connection failure {through sending to it Cfg packet carrying | |
2130 | * WID_DISCONNECT} */ | |
2131 | if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult != NULL) { | |
2132 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) { | |
d00d2ba3 | 2133 | memcpy(strConnectInfo.au8bssid, |
c5c77ba1 JK |
2134 | pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, 6); |
2135 | } | |
2136 | ||
2137 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) { | |
2138 | strConnectInfo.ReqIEsLen = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen; | |
63d03e47 | 2139 | strConnectInfo.pu8ReqIEs = (u8 *)WILC_MALLOC(pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen); |
d00d2ba3 | 2140 | memcpy(strConnectInfo.pu8ReqIEs, |
c5c77ba1 JK |
2141 | pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs, |
2142 | pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen); | |
2143 | } | |
2144 | ||
2145 | pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_CONN_RESP, | |
2146 | &strConnectInfo, | |
2147 | MAC_DISCONNECTED, | |
2148 | NULL, | |
2149 | pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid); | |
2150 | ||
2151 | /* Deallocation of strConnectInfo.pu8ReqIEs */ | |
2152 | if (strConnectInfo.pu8ReqIEs != NULL) { | |
49188af2 | 2153 | kfree(strConnectInfo.pu8ReqIEs); |
c5c77ba1 JK |
2154 | strConnectInfo.pu8ReqIEs = NULL; |
2155 | } | |
2156 | } else { | |
03b2d5e7 | 2157 | PRINT_ER("Connect callback function pointer is NULL\n"); |
c5c77ba1 JK |
2158 | } |
2159 | ||
2160 | /* Here we will notify our firmware also with the Connection failure {through sending to it Cfg packet carrying | |
2161 | * WID_DISCONNECT} */ | |
d85f5326 | 2162 | strWID.u16WIDid = (u16)WID_DISCONNECT; |
c5c77ba1 | 2163 | strWID.enuWIDtype = WID_CHAR; |
ca356ada | 2164 | strWID.ps8WidVal = (s8 *)&u16DummyReasonCode; |
576917ad | 2165 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
2166 | |
2167 | PRINT_D(HOSTINF_DBG, "Sending disconnect request\n"); | |
2168 | ||
72ed4dc7 | 2169 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, false, (u32)pstrWFIDrv); |
2b9d5b48 | 2170 | if (s32Error) |
c5c77ba1 | 2171 | PRINT_ER("Failed to send dissconect config packet\n"); |
c5c77ba1 JK |
2172 | |
2173 | /* Deallocation of the Saved Connect Request in the global Handle */ | |
2174 | pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0; | |
2175 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) { | |
49188af2 | 2176 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid); |
c5c77ba1 JK |
2177 | pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL; |
2178 | } | |
2179 | ||
2180 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) { | |
49188af2 | 2181 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid); |
c5c77ba1 JK |
2182 | pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL; |
2183 | } | |
2184 | ||
2185 | pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0; | |
2186 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) { | |
49188af2 | 2187 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs); |
c5c77ba1 JK |
2188 | pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL; |
2189 | } | |
2190 | ||
2cc46837 | 2191 | memset(u8ConnectedSSID, 0, ETH_ALEN); |
c5c77ba1 JK |
2192 | /*BugID_5213*/ |
2193 | /*Freeing flushed join request params on connect timeout*/ | |
4e4467fd | 2194 | if (gu8FlushedJoinReq != NULL && gu8FlushedJoinReqDrvHandler == (u32)drvHandler) { |
49188af2 | 2195 | kfree(gu8FlushedJoinReq); |
c5c77ba1 JK |
2196 | gu8FlushedJoinReq = NULL; |
2197 | } | |
4e4467fd | 2198 | if (gu8FlushedInfoElemAsoc != NULL && gu8FlushedJoinReqDrvHandler == (u32)drvHandler) { |
49188af2 | 2199 | kfree(gu8FlushedInfoElemAsoc); |
c5c77ba1 JK |
2200 | gu8FlushedInfoElemAsoc = NULL; |
2201 | } | |
2202 | ||
2203 | return s32Error; | |
2204 | } | |
2205 | ||
2206 | /** | |
2207 | * @brief Handle_RcvdNtwrkInfo | |
2208 | * @details Handling received network information | |
2209 | * @param[in] tstrRcvdNetworkInfo* pstrRcvdNetworkInfo | |
2210 | * @return Error code. | |
2211 | * @author | |
2212 | * @date | |
2213 | * @version 1.0 | |
2214 | */ | |
2b05df55 | 2215 | static s32 Handle_RcvdNtwrkInfo(tstrWILC_WFIDrv *drvHandler, tstrRcvdNetworkInfo *pstrRcvdNetworkInfo) |
c5c77ba1 | 2216 | { |
4e4467fd | 2217 | u32 i; |
72ed4dc7 | 2218 | bool bNewNtwrkFound; |
c5c77ba1 JK |
2219 | |
2220 | ||
2221 | ||
fb4ec9ca | 2222 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
2223 | tstrNetworkInfo *pstrNetworkInfo = NULL; |
2224 | void *pJoinParams = NULL; | |
2225 | ||
2226 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
2227 | ||
2228 | ||
2229 | ||
72ed4dc7 | 2230 | bNewNtwrkFound = true; |
c5c77ba1 JK |
2231 | PRINT_INFO(HOSTINF_DBG, "Handling received network info\n"); |
2232 | ||
2233 | /*if there is a an ongoing scan request*/ | |
2234 | if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) { | |
2235 | PRINT_D(HOSTINF_DBG, "State: Scanning, parsing network information received\n"); | |
2236 | ParseNetworkInfo(pstrRcvdNetworkInfo->pu8Buffer, &pstrNetworkInfo); | |
2237 | if ((pstrNetworkInfo == NULL) | |
b1413b60 | 2238 | || (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult == NULL)) { |
c5c77ba1 JK |
2239 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
2240 | } | |
2241 | ||
2242 | /* check whether this network is discovered before */ | |
2243 | for (i = 0; i < pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount; i++) { | |
2244 | ||
2245 | if ((pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].au8bssid != NULL) && | |
2246 | (pstrNetworkInfo->au8bssid != NULL)) { | |
1a646e7e | 2247 | if (memcmp(pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].au8bssid, |
c5c77ba1 JK |
2248 | pstrNetworkInfo->au8bssid, 6) == 0) { |
2249 | if (pstrNetworkInfo->s8rssi <= pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].s8rssi) { | |
2250 | /*we have already found this network with better rssi, so keep the old cached one and don't | |
2251 | * send anything to the upper layer */ | |
2252 | PRINT_D(HOSTINF_DBG, "Network previously discovered\n"); | |
2253 | goto done; | |
2254 | } else { | |
2255 | /* here the same already found network is found again but with a better rssi, so just update | |
2256 | * the rssi for this cached network and send this updated network to the upper layer but | |
2257 | * don't add a new record for it */ | |
2258 | pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].s8rssi = pstrNetworkInfo->s8rssi; | |
72ed4dc7 | 2259 | bNewNtwrkFound = false; |
c5c77ba1 JK |
2260 | break; |
2261 | } | |
2262 | } | |
2263 | } | |
2264 | } | |
2265 | ||
72ed4dc7 | 2266 | if (bNewNtwrkFound == true) { |
c5c77ba1 JK |
2267 | /* here it is confirmed that it is a new discovered network, |
2268 | * so add its record then call the User CallBack function */ | |
2269 | ||
2270 | PRINT_D(HOSTINF_DBG, "New network found\n"); | |
2271 | ||
2272 | if (pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount < MAX_NUM_SCANNED_NETWORKS) { | |
2273 | pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount].s8rssi = pstrNetworkInfo->s8rssi; | |
2274 | ||
2275 | if ((pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount].au8bssid != NULL) | |
2276 | && (pstrNetworkInfo->au8bssid != NULL)) { | |
d00d2ba3 | 2277 | memcpy(pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount].au8bssid, |
c5c77ba1 JK |
2278 | pstrNetworkInfo->au8bssid, 6); |
2279 | ||
2280 | pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount++; | |
2281 | ||
72ed4dc7 | 2282 | pstrNetworkInfo->bNewNetwork = true; |
c5c77ba1 JK |
2283 | /*Bug4218: Parsing Join Param*/ |
2284 | /* add new BSS to JoinBssTable */ | |
2285 | #ifdef WILC_PARSE_SCAN_IN_HOST | |
2286 | pJoinParams = host_int_ParseJoinBssParam(pstrNetworkInfo); | |
2287 | #endif /*WILC_PARSE_SCAN_IN_HOST*/ | |
2288 | ||
2289 | pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_NETWORK_FOUND, pstrNetworkInfo, | |
2290 | pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, | |
2291 | pJoinParams); | |
2292 | ||
2293 | ||
2294 | } | |
2295 | } else { | |
03b2d5e7 | 2296 | PRINT_WRN(HOSTINF_DBG, "Discovered networks exceeded max. limit\n"); |
c5c77ba1 JK |
2297 | } |
2298 | } else { | |
72ed4dc7 | 2299 | pstrNetworkInfo->bNewNetwork = false; |
c5c77ba1 JK |
2300 | /* just call the User CallBack function to send the same discovered network with its updated RSSI */ |
2301 | pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_NETWORK_FOUND, pstrNetworkInfo, | |
2302 | pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL); | |
2303 | } | |
2304 | } | |
2305 | ||
2306 | ||
2307 | WILC_CATCH(s32Error) | |
2308 | { | |
2309 | ||
2310 | } | |
2311 | ||
2312 | done: | |
2313 | /* Deallocate pstrRcvdNetworkInfo->pu8Buffer which was prevoisuly allocated by the sending thread */ | |
2314 | if (pstrRcvdNetworkInfo->pu8Buffer != NULL) { | |
49188af2 | 2315 | kfree(pstrRcvdNetworkInfo->pu8Buffer); |
c5c77ba1 JK |
2316 | pstrRcvdNetworkInfo->pu8Buffer = NULL; |
2317 | } | |
2318 | ||
2319 | /*free structure allocated*/ | |
b1413b60 | 2320 | if (pstrNetworkInfo != NULL) { |
c5c77ba1 | 2321 | DeallocateNetworkInfo(pstrNetworkInfo); |
b1413b60 | 2322 | pstrNetworkInfo = NULL; |
c5c77ba1 JK |
2323 | } |
2324 | ||
2325 | return s32Error; | |
2326 | } | |
2327 | ||
2328 | /** | |
2329 | * @brief Handle_RcvdGnrlAsyncInfo | |
2330 | * @details Handling received asynchrous general network information | |
2331 | * @param[in] tstrRcvdGnrlAsyncInfo* pstrRcvdGnrlAsyncInfo | |
2332 | * @return Error code. | |
2333 | * @author | |
2334 | * @date | |
2335 | * @version 1.0 | |
2336 | */ | |
2b05df55 | 2337 | static s32 Handle_RcvdGnrlAsyncInfo(tstrWILC_WFIDrv *drvHandler, tstrRcvdGnrlAsyncInfo *pstrRcvdGnrlAsyncInfo) |
c5c77ba1 JK |
2338 | { |
2339 | /* TODO: mostafa: till now, this function just handles only the received mac status msg, */ | |
2340 | /* which carries only 1 WID which have WID ID = WID_STATUS */ | |
fb4ec9ca | 2341 | s32 s32Error = WILC_SUCCESS; |
63d03e47 GKH |
2342 | u8 u8MsgType = 0; |
2343 | u8 u8MsgID = 0; | |
d85f5326 CL |
2344 | u16 u16MsgLen = 0; |
2345 | u16 u16WidID = (u16)WID_NIL; | |
63d03e47 GKH |
2346 | u8 u8WidLen = 0; |
2347 | u8 u8MacStatus; | |
2348 | u8 u8MacStatusReasonCode; | |
2349 | u8 u8MacStatusAdditionalInfo; | |
c5c77ba1 JK |
2350 | tstrConnectInfo strConnectInfo; |
2351 | tstrDisconnectNotifInfo strDisconnectNotifInfo; | |
fb4ec9ca | 2352 | s32 s32Err = WILC_SUCCESS; |
c5c77ba1 | 2353 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler; |
78c87591 | 2354 | |
2b9d5b48 | 2355 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 2356 | PRINT_ER("Driver handler is NULL\n"); |
c5c77ba1 JK |
2357 | PRINT_D(GENERIC_DBG, "Current State = %d,Received state = %d\n", pstrWFIDrv->enuHostIFstate, |
2358 | pstrRcvdGnrlAsyncInfo->pu8Buffer[7]); | |
2359 | ||
2360 | if ((pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) || | |
2361 | (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED) || | |
2362 | pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) { | |
2363 | if ((pstrRcvdGnrlAsyncInfo->pu8Buffer == NULL) || | |
b1413b60 | 2364 | (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult == NULL)) { |
c5c77ba1 JK |
2365 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
2366 | } | |
2367 | ||
2368 | u8MsgType = pstrRcvdGnrlAsyncInfo->pu8Buffer[0]; | |
2369 | ||
2370 | /* Check whether the received message type is 'I' */ | |
2371 | if ('I' != u8MsgType) { | |
2372 | PRINT_ER("Received Message format incorrect.\n"); | |
2373 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
2374 | } | |
2375 | ||
2376 | /* Extract message ID */ | |
2377 | u8MsgID = pstrRcvdGnrlAsyncInfo->pu8Buffer[1]; | |
2378 | ||
2379 | /* Extract message Length */ | |
2380 | u16MsgLen = MAKE_WORD16(pstrRcvdGnrlAsyncInfo->pu8Buffer[2], pstrRcvdGnrlAsyncInfo->pu8Buffer[3]); | |
2381 | ||
2382 | /* Extract WID ID [expected to be = WID_STATUS] */ | |
2383 | u16WidID = MAKE_WORD16(pstrRcvdGnrlAsyncInfo->pu8Buffer[4], pstrRcvdGnrlAsyncInfo->pu8Buffer[5]); | |
2384 | ||
2385 | /* Extract WID Length [expected to be = 1] */ | |
2386 | u8WidLen = pstrRcvdGnrlAsyncInfo->pu8Buffer[6]; | |
2387 | ||
2388 | /* get the WID value [expected to be one of two values: either MAC_CONNECTED = (1) or MAC_DISCONNECTED = (0)] */ | |
2389 | u8MacStatus = pstrRcvdGnrlAsyncInfo->pu8Buffer[7]; | |
2390 | u8MacStatusReasonCode = pstrRcvdGnrlAsyncInfo->pu8Buffer[8]; | |
2391 | u8MacStatusAdditionalInfo = pstrRcvdGnrlAsyncInfo->pu8Buffer[9]; | |
2392 | PRINT_INFO(HOSTINF_DBG, "Recieved MAC status = %d with Reason = %d , Info = %d\n", u8MacStatus, u8MacStatusReasonCode, u8MacStatusAdditionalInfo); | |
2393 | if (pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) { | |
2394 | /* our station had sent Association Request frame, so here it will get the Association Response frame then parse it */ | |
4e4467fd | 2395 | u32 u32RcvdAssocRespInfoLen; |
c5c77ba1 JK |
2396 | tstrConnectRespInfo *pstrConnectRespInfo = NULL; |
2397 | ||
2398 | PRINT_D(HOSTINF_DBG, "Recieved MAC status = %d with Reason = %d , Code = %d\n", u8MacStatus, u8MacStatusReasonCode, u8MacStatusAdditionalInfo); | |
2399 | ||
2cc46837 | 2400 | memset(&strConnectInfo, 0, sizeof(tstrConnectInfo)); |
c5c77ba1 JK |
2401 | |
2402 | if (u8MacStatus == MAC_CONNECTED) { | |
2cc46837 | 2403 | memset(gapu8RcvdAssocResp, 0, MAX_ASSOC_RESP_FRAME_SIZE); |
c5c77ba1 | 2404 | |
218dc407 | 2405 | host_int_get_assoc_res_info(pstrWFIDrv, |
c5c77ba1 JK |
2406 | gapu8RcvdAssocResp, |
2407 | MAX_ASSOC_RESP_FRAME_SIZE, | |
2408 | &u32RcvdAssocRespInfoLen); | |
2409 | ||
2410 | PRINT_INFO(HOSTINF_DBG, "Received association response with length = %d\n", u32RcvdAssocRespInfoLen); | |
2411 | ||
2412 | if (u32RcvdAssocRespInfoLen != 0) { | |
2413 | ||
2414 | PRINT_D(HOSTINF_DBG, "Parsing association response\n"); | |
2415 | s32Err = ParseAssocRespInfo(gapu8RcvdAssocResp, u32RcvdAssocRespInfoLen, | |
2416 | &pstrConnectRespInfo); | |
2417 | if (s32Err) { | |
03b2d5e7 | 2418 | PRINT_ER("ParseAssocRespInfo() returned error %d\n", s32Err); |
c5c77ba1 JK |
2419 | } else { |
2420 | /* use the necessary parsed Info from the Received Association Response */ | |
2421 | strConnectInfo.u16ConnectStatus = pstrConnectRespInfo->u16ConnectStatus; | |
2422 | ||
2423 | if (strConnectInfo.u16ConnectStatus == SUCCESSFUL_STATUSCODE) { | |
2424 | PRINT_INFO(HOSTINF_DBG, "Association response received : Successful connection status\n"); | |
2425 | if (pstrConnectRespInfo->pu8RespIEs != NULL) { | |
2426 | strConnectInfo.u16RespIEsLen = pstrConnectRespInfo->u16RespIEsLen; | |
2427 | ||
2428 | ||
63d03e47 | 2429 | strConnectInfo.pu8RespIEs = (u8 *)WILC_MALLOC(pstrConnectRespInfo->u16RespIEsLen); |
d00d2ba3 | 2430 | memcpy(strConnectInfo.pu8RespIEs, pstrConnectRespInfo->pu8RespIEs, |
c5c77ba1 JK |
2431 | pstrConnectRespInfo->u16RespIEsLen); |
2432 | } | |
2433 | } | |
2434 | ||
2435 | /* deallocate the Assoc. Resp. parsed structure as it is not needed anymore */ | |
2436 | if (pstrConnectRespInfo != NULL) { | |
2437 | DeallocateAssocRespInfo(pstrConnectRespInfo); | |
2438 | pstrConnectRespInfo = NULL; | |
2439 | } | |
2440 | } | |
2441 | } | |
2442 | } | |
2443 | ||
2444 | /* The station has just received mac status and it also received assoc. response which | |
2445 | * it was waiting for. | |
2446 | * So check first the matching between the received mac status and the received status code in Asoc Resp */ | |
2447 | if ((u8MacStatus == MAC_CONNECTED) && | |
2448 | (strConnectInfo.u16ConnectStatus != SUCCESSFUL_STATUSCODE)) { | |
03b2d5e7 | 2449 | PRINT_ER("Received MAC status is MAC_CONNECTED while the received status code in Asoc Resp is not SUCCESSFUL_STATUSCODE\n"); |
2cc46837 | 2450 | memset(u8ConnectedSSID, 0, ETH_ALEN); |
c5c77ba1 JK |
2451 | |
2452 | } else if (u8MacStatus == MAC_DISCONNECTED) { | |
2453 | PRINT_ER("Received MAC status is MAC_DISCONNECTED\n"); | |
2cc46837 | 2454 | memset(u8ConnectedSSID, 0, ETH_ALEN); |
c5c77ba1 JK |
2455 | } |
2456 | ||
2457 | /* TODO: mostafa: correct BSSID should be retrieved from actual BSSID received from AP */ | |
2458 | /* through a structure of type tstrConnectRespInfo */ | |
2459 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) { | |
2460 | PRINT_D(HOSTINF_DBG, "Retrieving actual BSSID from AP\n"); | |
d00d2ba3 | 2461 | memcpy(strConnectInfo.au8bssid, pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, 6); |
c5c77ba1 JK |
2462 | |
2463 | if ((u8MacStatus == MAC_CONNECTED) && | |
2464 | (strConnectInfo.u16ConnectStatus == SUCCESSFUL_STATUSCODE)) { | |
d00d2ba3 | 2465 | memcpy(pstrWFIDrv->au8AssociatedBSSID, |
c5c77ba1 JK |
2466 | pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, ETH_ALEN); |
2467 | } | |
2468 | } | |
2469 | ||
2470 | ||
2471 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) { | |
2472 | strConnectInfo.ReqIEsLen = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen; | |
63d03e47 | 2473 | strConnectInfo.pu8ReqIEs = (u8 *)WILC_MALLOC(pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen); |
d00d2ba3 | 2474 | memcpy(strConnectInfo.pu8ReqIEs, |
c5c77ba1 JK |
2475 | pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs, |
2476 | pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen); | |
2477 | } | |
2478 | ||
2479 | ||
334e1a57 | 2480 | WILC_TimerStop(&pstrWFIDrv->hConnectTimer); |
c5c77ba1 JK |
2481 | pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_CONN_RESP, |
2482 | &strConnectInfo, | |
2483 | u8MacStatus, | |
2484 | NULL, | |
2485 | pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid); | |
2486 | ||
2487 | ||
2488 | /* if received mac status is MAC_CONNECTED and | |
2489 | * received status code in Asoc Resp is SUCCESSFUL_STATUSCODE, change state to CONNECTED | |
2490 | * else change state to IDLE */ | |
2491 | if ((u8MacStatus == MAC_CONNECTED) && | |
2492 | (strConnectInfo.u16ConnectStatus == SUCCESSFUL_STATUSCODE)) { | |
2493 | #ifdef DISABLE_PWRSAVE_AND_SCAN_DURING_IP | |
2494 | ||
218dc407 | 2495 | host_int_set_power_mgmt(pstrWFIDrv, 0, 0); |
c5c77ba1 JK |
2496 | #endif |
2497 | ||
2498 | PRINT_D(HOSTINF_DBG, "MAC status : CONNECTED and Connect Status : Successful\n"); | |
2499 | pstrWFIDrv->enuHostIFstate = HOST_IF_CONNECTED; | |
2500 | ||
2501 | #ifdef DISABLE_PWRSAVE_AND_SCAN_DURING_IP | |
2502 | PRINT_D(GENERIC_DBG, "Obtaining an IP, Disable Scan\n"); | |
72ed4dc7 | 2503 | g_obtainingIP = true; |
334e1a57 | 2504 | WILC_TimerStart(&hDuringIpTimer, 10000, NULL); |
c5c77ba1 JK |
2505 | #endif |
2506 | ||
2507 | #ifdef WILC_PARSE_SCAN_IN_HOST | |
2508 | /* open a BA session if possible */ | |
2509 | /* if(pstrWFIDrv->strWILC_UsrConnReq.IsHTCapable) */ | |
2510 | ||
2511 | #endif | |
2512 | ||
2513 | /* host_int_addBASession(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid,0, */ | |
2514 | /* BA_SESSION_DEFAULT_BUFFER_SIZE,BA_SESSION_DEFAULT_TIMEOUT); */ | |
2515 | } else { | |
2516 | PRINT_D(HOSTINF_DBG, "MAC status : %d and Connect Status : %d\n", u8MacStatus, strConnectInfo.u16ConnectStatus); | |
2517 | pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE; | |
72ed4dc7 | 2518 | gbScanWhileConnected = false; |
c5c77ba1 JK |
2519 | } |
2520 | ||
2521 | /* Deallocation */ | |
2522 | if (strConnectInfo.pu8RespIEs != NULL) { | |
49188af2 | 2523 | kfree(strConnectInfo.pu8RespIEs); |
c5c77ba1 JK |
2524 | strConnectInfo.pu8RespIEs = NULL; |
2525 | } | |
2526 | ||
2527 | if (strConnectInfo.pu8ReqIEs != NULL) { | |
49188af2 | 2528 | kfree(strConnectInfo.pu8ReqIEs); |
c5c77ba1 JK |
2529 | strConnectInfo.pu8ReqIEs = NULL; |
2530 | } | |
2531 | ||
2532 | ||
2533 | pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0; | |
2534 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) { | |
49188af2 | 2535 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid); |
c5c77ba1 JK |
2536 | pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL; |
2537 | } | |
2538 | ||
2539 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) { | |
49188af2 | 2540 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid); |
c5c77ba1 JK |
2541 | pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL; |
2542 | } | |
2543 | ||
2544 | pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0; | |
2545 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) { | |
49188af2 | 2546 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs); |
c5c77ba1 JK |
2547 | pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL; |
2548 | } | |
2549 | ||
2550 | } else if ((u8MacStatus == MAC_DISCONNECTED) && | |
2551 | (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED)) { | |
2552 | /* Disassociation or Deauthentication frame has been received */ | |
2553 | PRINT_D(HOSTINF_DBG, "Received MAC_DISCONNECTED from the FW\n"); | |
2554 | ||
2cc46837 | 2555 | memset(&strDisconnectNotifInfo, 0, sizeof(tstrDisconnectNotifInfo)); |
c5c77ba1 JK |
2556 | |
2557 | if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) { | |
03b2d5e7 | 2558 | PRINT_D(HOSTINF_DBG, "\n\n<< Abort the running OBSS Scan >>\n\n"); |
334e1a57 | 2559 | WILC_TimerStop(&pstrWFIDrv->hScanTimer); |
c5c77ba1 JK |
2560 | Handle_ScanDone((void *)pstrWFIDrv, SCAN_EVENT_ABORTED); |
2561 | } | |
2562 | ||
2563 | strDisconnectNotifInfo.u16reason = 0; | |
2564 | strDisconnectNotifInfo.ie = NULL; | |
2565 | strDisconnectNotifInfo.ie_len = 0; | |
2566 | ||
2567 | if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult != NULL) { | |
2568 | #ifdef DISABLE_PWRSAVE_AND_SCAN_DURING_IP | |
2569 | ||
72ed4dc7 | 2570 | g_obtainingIP = false; |
218dc407 | 2571 | host_int_set_power_mgmt(pstrWFIDrv, 0, 0); |
c5c77ba1 JK |
2572 | #endif |
2573 | ||
2574 | pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_DISCONN_NOTIF, | |
2575 | NULL, | |
2576 | 0, | |
2577 | &strDisconnectNotifInfo, | |
2578 | pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid); | |
2579 | ||
2580 | } else { | |
03b2d5e7 | 2581 | PRINT_ER("Connect result callback function is NULL\n"); |
c5c77ba1 JK |
2582 | } |
2583 | ||
2cc46837 | 2584 | memset(pstrWFIDrv->au8AssociatedBSSID, 0, ETH_ALEN); |
c5c77ba1 JK |
2585 | |
2586 | ||
2587 | /* Deallocation */ | |
2588 | ||
2589 | /* if Information Elements were retrieved from the Received deauth/disassoc frame, then they | |
2590 | * should be deallocated here */ | |
2591 | /* | |
2592 | * if(strDisconnectNotifInfo.ie != NULL) | |
2593 | * { | |
49188af2 | 2594 | * kfree(strDisconnectNotifInfo.ie); |
c5c77ba1 JK |
2595 | * strDisconnectNotifInfo.ie = NULL; |
2596 | * } | |
2597 | */ | |
2598 | ||
2599 | pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0; | |
2600 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) { | |
49188af2 | 2601 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid); |
c5c77ba1 JK |
2602 | pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL; |
2603 | } | |
2604 | ||
2605 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) { | |
49188af2 | 2606 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid); |
c5c77ba1 JK |
2607 | pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL; |
2608 | } | |
2609 | ||
2610 | pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0; | |
2611 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) { | |
49188af2 | 2612 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs); |
c5c77ba1 JK |
2613 | pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL; |
2614 | } | |
2615 | ||
2616 | /*BugID_5213*/ | |
2617 | /*Freeing flushed join request params on receiving*/ | |
2618 | /*MAC_DISCONNECTED while connected*/ | |
4e4467fd | 2619 | if (gu8FlushedJoinReq != NULL && gu8FlushedJoinReqDrvHandler == (u32)drvHandler) { |
49188af2 | 2620 | kfree(gu8FlushedJoinReq); |
c5c77ba1 JK |
2621 | gu8FlushedJoinReq = NULL; |
2622 | } | |
4e4467fd | 2623 | if (gu8FlushedInfoElemAsoc != NULL && gu8FlushedJoinReqDrvHandler == (u32)drvHandler) { |
49188af2 | 2624 | kfree(gu8FlushedInfoElemAsoc); |
c5c77ba1 JK |
2625 | gu8FlushedInfoElemAsoc = NULL; |
2626 | } | |
2627 | ||
2628 | pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE; | |
72ed4dc7 | 2629 | gbScanWhileConnected = false; |
c5c77ba1 JK |
2630 | |
2631 | } else if ((u8MacStatus == MAC_DISCONNECTED) && | |
2632 | (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult != NULL)) { | |
2633 | PRINT_D(HOSTINF_DBG, "Received MAC_DISCONNECTED from the FW while scanning\n"); | |
03b2d5e7 | 2634 | PRINT_D(HOSTINF_DBG, "\n\n<< Abort the running Scan >>\n\n"); |
c5c77ba1 | 2635 | /*Abort the running scan*/ |
334e1a57 | 2636 | WILC_TimerStop(&pstrWFIDrv->hScanTimer); |
2b9d5b48 | 2637 | if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) |
2b05df55 | 2638 | Handle_ScanDone(pstrWFIDrv, SCAN_EVENT_ABORTED); |
c5c77ba1 | 2639 | |
c5c77ba1 JK |
2640 | } |
2641 | ||
2642 | } | |
2643 | ||
2644 | WILC_CATCH(s32Error) | |
2645 | { | |
2646 | ||
2647 | } | |
2648 | ||
2649 | /* Deallocate pstrRcvdGnrlAsyncInfo->pu8Buffer which was prevoisuly allocated by the sending thread */ | |
2650 | if (pstrRcvdGnrlAsyncInfo->pu8Buffer != NULL) { | |
49188af2 | 2651 | kfree(pstrRcvdGnrlAsyncInfo->pu8Buffer); |
c5c77ba1 JK |
2652 | pstrRcvdGnrlAsyncInfo->pu8Buffer = NULL; |
2653 | } | |
2654 | ||
2655 | return s32Error; | |
2656 | } | |
2657 | ||
2658 | /** | |
2659 | * @brief Handle_Key | |
2660 | * @details Sending config packet to firmware to set key | |
2661 | * @param[in] tstrHostIFkeyAttr* pstrHostIFkeyAttr | |
2662 | * @return Error code. | |
2663 | * @author | |
2664 | * @date | |
2665 | * @version 1.0 | |
2666 | */ | |
2b05df55 | 2667 | static int Handle_Key(tstrWILC_WFIDrv *drvHandler, tstrHostIFkeyAttr *pstrHostIFkeyAttr) |
c5c77ba1 | 2668 | { |
fb4ec9ca | 2669 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
2670 | tstrWID strWID; |
2671 | #ifdef WILC_AP_EXTERNAL_MLME | |
2672 | tstrWID strWIDList[5]; | |
2673 | #endif | |
63d03e47 GKH |
2674 | u8 i; |
2675 | u8 *pu8keybuf; | |
ca356ada CL |
2676 | s8 s8idxarray[1]; |
2677 | s8 ret = 0; | |
c5c77ba1 JK |
2678 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; |
2679 | ||
2680 | ||
2681 | switch (pstrHostIFkeyAttr->enuKeyType) { | |
2682 | ||
2683 | ||
2684 | case WEP: | |
2685 | ||
2686 | #ifdef WILC_AP_EXTERNAL_MLME | |
2687 | if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY_AP) { | |
2688 | ||
2689 | PRINT_D(HOSTINF_DBG, "Handling WEP key\n"); | |
2690 | PRINT_D(GENERIC_DBG, "ID Hostint is %d\n", (pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx)); | |
d85f5326 | 2691 | strWIDList[0].u16WIDid = (u16)WID_11I_MODE; |
c5c77ba1 | 2692 | strWIDList[0].enuWIDtype = WID_CHAR; |
576917ad | 2693 | strWIDList[0].s32ValueSize = sizeof(char); |
ca356ada | 2694 | strWIDList[0].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8mode)); |
c5c77ba1 JK |
2695 | |
2696 | strWIDList[1].u16WIDid = WID_AUTH_TYPE; | |
2697 | strWIDList[1].enuWIDtype = WID_CHAR; | |
576917ad | 2698 | strWIDList[1].s32ValueSize = sizeof(char); |
ca356ada | 2699 | strWIDList[1].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.tenuAuth_type)); |
c5c77ba1 | 2700 | |
d85f5326 | 2701 | strWIDList[2].u16WIDid = (u16)WID_KEY_ID; |
c5c77ba1 JK |
2702 | strWIDList[2].enuWIDtype = WID_CHAR; |
2703 | ||
ca356ada | 2704 | strWIDList[2].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx)); |
576917ad | 2705 | strWIDList[2].s32ValueSize = sizeof(char); |
c5c77ba1 JK |
2706 | |
2707 | ||
63d03e47 | 2708 | pu8keybuf = (u8 *)WILC_MALLOC(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen); |
c5c77ba1 JK |
2709 | |
2710 | ||
2711 | if (pu8keybuf == NULL) { | |
2712 | PRINT_ER("No buffer to send Key\n"); | |
2713 | return -1; | |
2714 | } | |
2715 | ||
d00d2ba3 | 2716 | memcpy(pu8keybuf, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey, |
c5c77ba1 JK |
2717 | pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen); |
2718 | ||
2719 | ||
49188af2 | 2720 | kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey); |
c5c77ba1 | 2721 | |
d85f5326 | 2722 | strWIDList[3].u16WIDid = (u16)WID_WEP_KEY_VALUE; |
c5c77ba1 JK |
2723 | strWIDList[3].enuWIDtype = WID_STR; |
2724 | strWIDList[3].s32ValueSize = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen; | |
ca356ada | 2725 | strWIDList[3].ps8WidVal = (s8 *)pu8keybuf; |
c5c77ba1 JK |
2726 | |
2727 | ||
72ed4dc7 | 2728 | s32Error = SendConfigPkt(SET_CFG, strWIDList, 4, true, (u32)pstrWFIDrv); |
49188af2 | 2729 | kfree(pu8keybuf); |
c5c77ba1 JK |
2730 | |
2731 | ||
2732 | } | |
2733 | #endif | |
2734 | ||
2735 | if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY) { | |
2736 | PRINT_D(HOSTINF_DBG, "Handling WEP key\n"); | |
63d03e47 | 2737 | pu8keybuf = (u8 *)WILC_MALLOC(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen + 2); |
c5c77ba1 JK |
2738 | if (pu8keybuf == NULL) { |
2739 | PRINT_ER("No buffer to send Key\n"); | |
2740 | return -1; | |
2741 | } | |
2742 | pu8keybuf[0] = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx; | |
2743 | ||
d00d2ba3 | 2744 | memcpy(pu8keybuf + 1, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen, 1); |
c5c77ba1 | 2745 | |
d00d2ba3 | 2746 | memcpy(pu8keybuf + 2, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey, |
c5c77ba1 JK |
2747 | pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen); |
2748 | ||
49188af2 | 2749 | kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey); |
c5c77ba1 | 2750 | |
d85f5326 | 2751 | strWID.u16WIDid = (u16)WID_ADD_WEP_KEY; |
c5c77ba1 | 2752 | strWID.enuWIDtype = WID_STR; |
ca356ada | 2753 | strWID.ps8WidVal = (s8 *)pu8keybuf; |
c5c77ba1 JK |
2754 | strWID.s32ValueSize = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen + 2; |
2755 | ||
72ed4dc7 | 2756 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
49188af2 | 2757 | kfree(pu8keybuf); |
c5c77ba1 JK |
2758 | } else if (pstrHostIFkeyAttr->u8KeyAction & REMOVEKEY) { |
2759 | ||
2760 | PRINT_D(HOSTINF_DBG, "Removing key\n"); | |
d85f5326 | 2761 | strWID.u16WIDid = (u16)WID_REMOVE_WEP_KEY; |
c5c77ba1 JK |
2762 | strWID.enuWIDtype = WID_STR; |
2763 | ||
ca356ada | 2764 | s8idxarray[0] = (s8)pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx; |
c5c77ba1 JK |
2765 | strWID.ps8WidVal = s8idxarray; |
2766 | strWID.s32ValueSize = 1; | |
2767 | ||
72ed4dc7 | 2768 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 | 2769 | } else { |
d85f5326 | 2770 | strWID.u16WIDid = (u16)WID_KEY_ID; |
c5c77ba1 | 2771 | strWID.enuWIDtype = WID_CHAR; |
ca356ada | 2772 | strWID.ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx)); |
576917ad | 2773 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
2774 | |
2775 | PRINT_D(HOSTINF_DBG, "Setting default key index\n"); | |
2776 | ||
72ed4dc7 | 2777 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 | 2778 | } |
83383ea3 | 2779 | up(&(pstrWFIDrv->hSemTestKeyBlock)); |
c5c77ba1 JK |
2780 | break; |
2781 | ||
2782 | case WPARxGtk: | |
2783 | #ifdef WILC_AP_EXTERNAL_MLME | |
2784 | if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY_AP) { | |
63d03e47 | 2785 | pu8keybuf = (u8 *)WILC_MALLOC(RX_MIC_KEY_MSG_LEN); |
c5c77ba1 JK |
2786 | if (pu8keybuf == NULL) { |
2787 | PRINT_ER("No buffer to send RxGTK Key\n"); | |
2788 | ret = -1; | |
2789 | goto _WPARxGtk_end_case_; | |
2790 | } | |
2791 | ||
2cc46837 | 2792 | memset(pu8keybuf, 0, RX_MIC_KEY_MSG_LEN); |
c5c77ba1 JK |
2793 | |
2794 | ||
2795 | /*|----------------------------------------------------------------------------| | |
2796 | * |Sta Address | Key RSC | KeyID | Key Length | Temporal Key | Rx Michael Key | | |
2797 | * |------------|---------|-------|------------|---------------|----------------| | |
2798 | | 6 bytes | 8 byte |1 byte | 1 byte | 16 bytes | 8 bytes |*/ | |
2799 | ||
2800 | ||
2801 | ||
2802 | if (pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq != NULL) | |
d00d2ba3 | 2803 | memcpy(pu8keybuf + 6, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq, 8); |
c5c77ba1 JK |
2804 | |
2805 | ||
d00d2ba3 | 2806 | memcpy(pu8keybuf + 14, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx, 1); |
c5c77ba1 | 2807 | |
d00d2ba3 | 2808 | memcpy(pu8keybuf + 15, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1); |
c5c77ba1 | 2809 | |
d00d2ba3 | 2810 | memcpy(pu8keybuf + 16, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key, |
c5c77ba1 JK |
2811 | pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen); |
2812 | /* pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode = 0X51; */ | |
d85f5326 | 2813 | strWIDList[0].u16WIDid = (u16)WID_11I_MODE; |
c5c77ba1 | 2814 | strWIDList[0].enuWIDtype = WID_CHAR; |
576917ad | 2815 | strWIDList[0].s32ValueSize = sizeof(char); |
ca356ada | 2816 | strWIDList[0].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode)); |
c5c77ba1 | 2817 | |
d85f5326 | 2818 | strWIDList[1].u16WIDid = (u16)WID_ADD_RX_GTK; |
c5c77ba1 | 2819 | strWIDList[1].enuWIDtype = WID_STR; |
ca356ada | 2820 | strWIDList[1].ps8WidVal = (s8 *)pu8keybuf; |
c5c77ba1 JK |
2821 | strWIDList[1].s32ValueSize = RX_MIC_KEY_MSG_LEN; |
2822 | ||
72ed4dc7 | 2823 | s32Error = SendConfigPkt(SET_CFG, strWIDList, 2, true, (u32)pstrWFIDrv); |
c5c77ba1 | 2824 | |
49188af2 | 2825 | kfree(pu8keybuf); |
c5c77ba1 JK |
2826 | |
2827 | /* ////////////////////////// */ | |
83383ea3 | 2828 | up(&(pstrWFIDrv->hSemTestKeyBlock)); |
c5c77ba1 JK |
2829 | /* ///////////////////////// */ |
2830 | } | |
2831 | ||
2832 | #endif | |
2833 | if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY) { | |
2834 | PRINT_D(HOSTINF_DBG, "Handling group key(Rx) function\n"); | |
2835 | ||
63d03e47 | 2836 | pu8keybuf = (u8 *)WILC_MALLOC(RX_MIC_KEY_MSG_LEN); |
c5c77ba1 JK |
2837 | if (pu8keybuf == NULL) { |
2838 | PRINT_ER("No buffer to send RxGTK Key\n"); | |
2839 | ret = -1; | |
2840 | goto _WPARxGtk_end_case_; | |
2841 | } | |
2842 | ||
2cc46837 | 2843 | memset(pu8keybuf, 0, RX_MIC_KEY_MSG_LEN); |
c5c77ba1 JK |
2844 | |
2845 | ||
2846 | /*|----------------------------------------------------------------------------| | |
2847 | * |Sta Address | Key RSC | KeyID | Key Length | Temporal Key | Rx Michael Key | | |
2848 | * |------------|---------|-------|------------|---------------|----------------| | |
2849 | | 6 bytes | 8 byte |1 byte | 1 byte | 16 bytes | 8 bytes |*/ | |
2850 | ||
78174ada | 2851 | if (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED) |
d00d2ba3 | 2852 | memcpy(pu8keybuf, pstrWFIDrv->au8AssociatedBSSID, ETH_ALEN); |
78174ada | 2853 | else |
03b2d5e7 | 2854 | PRINT_ER("Couldn't handle WPARxGtk while enuHostIFstate is not HOST_IF_CONNECTED\n"); |
c5c77ba1 | 2855 | |
d00d2ba3 | 2856 | memcpy(pu8keybuf + 6, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq, 8); |
c5c77ba1 | 2857 | |
d00d2ba3 | 2858 | memcpy(pu8keybuf + 14, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx, 1); |
c5c77ba1 | 2859 | |
d00d2ba3 CL |
2860 | memcpy(pu8keybuf + 15, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1); |
2861 | memcpy(pu8keybuf + 16, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key, | |
c5c77ba1 JK |
2862 | pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen); |
2863 | ||
d85f5326 | 2864 | strWID.u16WIDid = (u16)WID_ADD_RX_GTK; |
c5c77ba1 | 2865 | strWID.enuWIDtype = WID_STR; |
ca356ada | 2866 | strWID.ps8WidVal = (s8 *)pu8keybuf; |
c5c77ba1 JK |
2867 | strWID.s32ValueSize = RX_MIC_KEY_MSG_LEN; |
2868 | ||
72ed4dc7 | 2869 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 | 2870 | |
49188af2 | 2871 | kfree(pu8keybuf); |
c5c77ba1 JK |
2872 | |
2873 | /* ////////////////////////// */ | |
83383ea3 | 2874 | up(&(pstrWFIDrv->hSemTestKeyBlock)); |
c5c77ba1 JK |
2875 | /* ///////////////////////// */ |
2876 | } | |
2877 | _WPARxGtk_end_case_: | |
49188af2 CL |
2878 | kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key); |
2879 | kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq); | |
c5c77ba1 JK |
2880 | if (ret == -1) |
2881 | return ret; | |
2882 | ||
2883 | break; | |
2884 | ||
2885 | case WPAPtk: | |
2886 | #ifdef WILC_AP_EXTERNAL_MLME | |
2887 | if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY_AP) { | |
2888 | ||
2889 | ||
63d03e47 | 2890 | pu8keybuf = (u8 *)WILC_MALLOC(PTK_KEY_MSG_LEN + 1); |
c5c77ba1 JK |
2891 | |
2892 | ||
2893 | ||
2894 | if (pu8keybuf == NULL) { | |
2895 | PRINT_ER("No buffer to send PTK Key\n"); | |
2896 | ret = -1; | |
2897 | goto _WPAPtk_end_case_; | |
2898 | ||
2899 | } | |
2900 | ||
2901 | /*|-----------------------------------------------------------------------------| | |
2902 | * |Station address | keyidx |Key Length |Temporal Key | Rx Michael Key |Tx Michael Key | | |
2903 | * |----------------|------------ |--------------|----------------|---------------| | |
2904 | | 6 bytes | 1 byte | 1byte | 16 bytes | 8 bytes | 8 bytes | | |
2905 | |-----------------------------------------------------------------------------|*/ | |
2906 | ||
d00d2ba3 | 2907 | memcpy(pu8keybuf, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8macaddr, 6); /*1 bytes Key Length */ |
c5c77ba1 | 2908 | |
d00d2ba3 CL |
2909 | memcpy(pu8keybuf + 6, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx, 1); |
2910 | memcpy(pu8keybuf + 7, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1); | |
c5c77ba1 | 2911 | /*16 byte TK*/ |
d00d2ba3 | 2912 | memcpy(pu8keybuf + 8, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key, |
c5c77ba1 JK |
2913 | pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen); |
2914 | ||
2915 | ||
d85f5326 | 2916 | strWIDList[0].u16WIDid = (u16)WID_11I_MODE; |
c5c77ba1 | 2917 | strWIDList[0].enuWIDtype = WID_CHAR; |
576917ad | 2918 | strWIDList[0].s32ValueSize = sizeof(char); |
ca356ada | 2919 | strWIDList[0].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode)); |
c5c77ba1 | 2920 | |
d85f5326 | 2921 | strWIDList[1].u16WIDid = (u16)WID_ADD_PTK; |
c5c77ba1 | 2922 | strWIDList[1].enuWIDtype = WID_STR; |
ca356ada | 2923 | strWIDList[1].ps8WidVal = (s8 *)pu8keybuf; |
c5c77ba1 JK |
2924 | strWIDList[1].s32ValueSize = PTK_KEY_MSG_LEN + 1; |
2925 | ||
72ed4dc7 | 2926 | s32Error = SendConfigPkt(SET_CFG, strWIDList, 2, true, (u32)pstrWFIDrv); |
49188af2 | 2927 | kfree(pu8keybuf); |
c5c77ba1 JK |
2928 | |
2929 | /* ////////////////////////// */ | |
83383ea3 | 2930 | up(&(pstrWFIDrv->hSemTestKeyBlock)); |
c5c77ba1 JK |
2931 | /* ///////////////////////// */ |
2932 | } | |
2933 | #endif | |
2934 | if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY) { | |
2935 | ||
2936 | ||
63d03e47 | 2937 | pu8keybuf = (u8 *)WILC_MALLOC(PTK_KEY_MSG_LEN); |
c5c77ba1 JK |
2938 | |
2939 | ||
2940 | ||
2941 | if (pu8keybuf == NULL) { | |
2942 | PRINT_ER("No buffer to send PTK Key\n"); | |
2943 | ret = -1; | |
2944 | goto _WPAPtk_end_case_; | |
2945 | ||
2946 | } | |
2947 | ||
2948 | /*|-----------------------------------------------------------------------------| | |
2949 | * |Station address | Key Length | Temporal Key | Rx Michael Key |Tx Michael Key | | |
2950 | * |----------------|------------|--------------|----------------|---------------| | |
2951 | | 6 bytes | 1byte | 16 bytes | 8 bytes | 8 bytes | | |
2952 | |-----------------------------------------------------------------------------|*/ | |
2953 | ||
d00d2ba3 | 2954 | memcpy(pu8keybuf, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8macaddr, 6); /*1 bytes Key Length */ |
c5c77ba1 | 2955 | |
d00d2ba3 | 2956 | memcpy(pu8keybuf + 6, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1); |
c5c77ba1 | 2957 | /*16 byte TK*/ |
d00d2ba3 | 2958 | memcpy(pu8keybuf + 7, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key, |
c5c77ba1 JK |
2959 | pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen); |
2960 | ||
2961 | ||
d85f5326 | 2962 | strWID.u16WIDid = (u16)WID_ADD_PTK; |
c5c77ba1 | 2963 | strWID.enuWIDtype = WID_STR; |
ca356ada | 2964 | strWID.ps8WidVal = (s8 *)pu8keybuf; |
c5c77ba1 JK |
2965 | strWID.s32ValueSize = PTK_KEY_MSG_LEN; |
2966 | ||
72ed4dc7 | 2967 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
49188af2 | 2968 | kfree(pu8keybuf); |
c5c77ba1 JK |
2969 | |
2970 | /* ////////////////////////// */ | |
83383ea3 | 2971 | up(&(pstrWFIDrv->hSemTestKeyBlock)); |
c5c77ba1 JK |
2972 | /* ///////////////////////// */ |
2973 | } | |
2974 | ||
2975 | _WPAPtk_end_case_: | |
49188af2 | 2976 | kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key); |
c5c77ba1 JK |
2977 | if (ret == -1) |
2978 | return ret; | |
2979 | ||
2980 | break; | |
2981 | ||
2982 | ||
2983 | case PMKSA: | |
2984 | ||
2985 | PRINT_D(HOSTINF_DBG, "Handling PMKSA key\n"); | |
2986 | ||
63d03e47 | 2987 | pu8keybuf = (u8 *)WILC_MALLOC((pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid * PMKSA_KEY_LEN) + 1); |
c5c77ba1 JK |
2988 | if (pu8keybuf == NULL) { |
2989 | PRINT_ER("No buffer to send PMKSA Key\n"); | |
2990 | return -1; | |
2991 | } | |
2992 | ||
2993 | pu8keybuf[0] = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid; | |
2994 | ||
2995 | for (i = 0; i < pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid; i++) { | |
2996 | ||
d00d2ba3 CL |
2997 | memcpy(pu8keybuf + ((PMKSA_KEY_LEN * i) + 1), pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].bssid, ETH_ALEN); |
2998 | memcpy(pu8keybuf + ((PMKSA_KEY_LEN * i) + ETH_ALEN + 1), pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].pmkid, PMKID_LEN); | |
c5c77ba1 JK |
2999 | } |
3000 | ||
d85f5326 | 3001 | strWID.u16WIDid = (u16)WID_PMKID_INFO; |
c5c77ba1 | 3002 | strWID.enuWIDtype = WID_STR; |
ca356ada | 3003 | strWID.ps8WidVal = (s8 *)pu8keybuf; |
c5c77ba1 JK |
3004 | strWID.s32ValueSize = (pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid * PMKSA_KEY_LEN) + 1; |
3005 | ||
72ed4dc7 | 3006 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 | 3007 | |
49188af2 | 3008 | kfree(pu8keybuf); |
c5c77ba1 JK |
3009 | break; |
3010 | } | |
3011 | ||
3012 | if (s32Error) | |
3013 | PRINT_ER("Failed to send key config packet\n"); | |
3014 | ||
3015 | ||
3016 | return s32Error; | |
3017 | } | |
3018 | ||
3019 | ||
3020 | /** | |
3021 | * @brief Handle_Disconnect | |
3022 | * @details Sending config packet to firmware to disconnect | |
3023 | * @param[in] NONE | |
3024 | * @return NONE | |
3025 | * @author | |
3026 | * @date | |
3027 | * @version 1.0 | |
3028 | */ | |
2b05df55 | 3029 | static void Handle_Disconnect(tstrWILC_WFIDrv *drvHandler) |
c5c77ba1 JK |
3030 | { |
3031 | tstrWID strWID; | |
3032 | ||
fb4ec9ca | 3033 | s32 s32Error = WILC_SUCCESS; |
d85f5326 | 3034 | u16 u16DummyReasonCode = 0; |
c5c77ba1 JK |
3035 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; |
3036 | ||
3037 | ||
d85f5326 | 3038 | strWID.u16WIDid = (u16)WID_DISCONNECT; |
c5c77ba1 | 3039 | strWID.enuWIDtype = WID_CHAR; |
ca356ada | 3040 | strWID.ps8WidVal = (s8 *)&u16DummyReasonCode; |
576917ad | 3041 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
3042 | |
3043 | ||
3044 | ||
3045 | PRINT_D(HOSTINF_DBG, "Sending disconnect request\n"); | |
3046 | ||
3047 | #ifdef DISABLE_PWRSAVE_AND_SCAN_DURING_IP | |
3048 | ||
72ed4dc7 | 3049 | g_obtainingIP = false; |
218dc407 | 3050 | host_int_set_power_mgmt(pstrWFIDrv, 0, 0); |
c5c77ba1 JK |
3051 | #endif |
3052 | ||
2cc46837 | 3053 | memset(u8ConnectedSSID, 0, ETH_ALEN); |
c5c77ba1 | 3054 | |
72ed4dc7 | 3055 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, false, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3056 | |
3057 | if (s32Error) { | |
3058 | PRINT_ER("Failed to send dissconect config packet\n"); | |
3059 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
3060 | } else { | |
3061 | tstrDisconnectNotifInfo strDisconnectNotifInfo; | |
3062 | ||
2cc46837 | 3063 | memset(&strDisconnectNotifInfo, 0, sizeof(tstrDisconnectNotifInfo)); |
c5c77ba1 JK |
3064 | |
3065 | strDisconnectNotifInfo.u16reason = 0; | |
3066 | strDisconnectNotifInfo.ie = NULL; | |
3067 | strDisconnectNotifInfo.ie_len = 0; | |
3068 | ||
3069 | if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) { | |
334e1a57 | 3070 | WILC_TimerStop(&pstrWFIDrv->hScanTimer); |
b1413b60 | 3071 | pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_ABORTED, NULL, |
c5c77ba1 JK |
3072 | pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL); |
3073 | ||
b1413b60 | 3074 | pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = NULL; |
c5c77ba1 JK |
3075 | } |
3076 | ||
3077 | if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult != NULL) { | |
3078 | ||
3079 | /*BugID_5193*/ | |
3080 | /*Stop connect timer, if connection in progress*/ | |
3081 | if (pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) { | |
3082 | PRINT_D(HOSTINF_DBG, "Upper layer requested termination of connection\n"); | |
334e1a57 | 3083 | WILC_TimerStop(&pstrWFIDrv->hConnectTimer); |
c5c77ba1 JK |
3084 | } |
3085 | ||
3086 | pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_DISCONN_NOTIF, NULL, | |
3087 | 0, &strDisconnectNotifInfo, pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid); | |
3088 | } else { | |
03b2d5e7 | 3089 | PRINT_ER("strWILC_UsrConnReq.pfUserConnectResult = NULL\n"); |
c5c77ba1 JK |
3090 | } |
3091 | ||
72ed4dc7 | 3092 | gbScanWhileConnected = false; |
c5c77ba1 JK |
3093 | |
3094 | pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE; | |
3095 | ||
2cc46837 | 3096 | memset(pstrWFIDrv->au8AssociatedBSSID, 0, ETH_ALEN); |
c5c77ba1 JK |
3097 | |
3098 | ||
3099 | /* Deallocation */ | |
3100 | pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0; | |
3101 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) { | |
49188af2 | 3102 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid); |
c5c77ba1 JK |
3103 | pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL; |
3104 | } | |
3105 | ||
3106 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) { | |
49188af2 | 3107 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid); |
c5c77ba1 JK |
3108 | pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL; |
3109 | } | |
3110 | ||
3111 | pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0; | |
3112 | if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) { | |
49188af2 | 3113 | kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs); |
c5c77ba1 JK |
3114 | pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL; |
3115 | } | |
3116 | ||
3117 | ||
3118 | /*BugID_5137*/ | |
4e4467fd | 3119 | if (gu8FlushedJoinReq != NULL && gu8FlushedJoinReqDrvHandler == (u32)drvHandler) { |
49188af2 | 3120 | kfree(gu8FlushedJoinReq); |
c5c77ba1 JK |
3121 | gu8FlushedJoinReq = NULL; |
3122 | } | |
4e4467fd | 3123 | if (gu8FlushedInfoElemAsoc != NULL && gu8FlushedJoinReqDrvHandler == (u32)drvHandler) { |
49188af2 | 3124 | kfree(gu8FlushedInfoElemAsoc); |
c5c77ba1 JK |
3125 | gu8FlushedInfoElemAsoc = NULL; |
3126 | } | |
3127 | ||
3128 | } | |
3129 | ||
3130 | WILC_CATCH(s32Error) | |
3131 | { | |
3132 | ||
3133 | } | |
3134 | ||
3135 | /* ////////////////////////// */ | |
83383ea3 | 3136 | up(&(pstrWFIDrv->hSemTestDisconnectBlock)); |
c5c77ba1 JK |
3137 | /* ///////////////////////// */ |
3138 | ||
3139 | } | |
3140 | ||
3141 | ||
2b05df55 | 3142 | void resolve_disconnect_aberration(tstrWILC_WFIDrv *drvHandler) |
c5c77ba1 JK |
3143 | { |
3144 | tstrWILC_WFIDrv *pstrWFIDrv; | |
3145 | ||
3146 | pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
b1413b60 | 3147 | if (pstrWFIDrv == NULL) |
c5c77ba1 JK |
3148 | return; |
3149 | if ((pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) || (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTING)) { | |
3150 | PRINT_D(HOSTINF_DBG, "\n\n<< correcting Supplicant state machine >>\n\n"); | |
218dc407 | 3151 | host_int_disconnect(pstrWFIDrv, 1); |
c5c77ba1 JK |
3152 | } |
3153 | } | |
2b05df55 | 3154 | static s32 Switch_Log_Terminal(tstrWILC_WFIDrv *drvHandler) |
c5c77ba1 JK |
3155 | { |
3156 | ||
3157 | ||
fb4ec9ca | 3158 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
3159 | tstrWID strWID; |
3160 | static char dummy = 9; | |
3161 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
3162 | ||
d85f5326 | 3163 | strWID.u16WIDid = (u16)WID_LOGTerminal_Switch; |
c5c77ba1 JK |
3164 | strWID.enuWIDtype = WID_CHAR; |
3165 | strWID.ps8WidVal = &dummy; | |
576917ad | 3166 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 | 3167 | |
72ed4dc7 | 3168 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3169 | |
3170 | ||
3171 | if (s32Error) { | |
3172 | PRINT_D(HOSTINF_DBG, "Failed to switch log terminal\n"); | |
3173 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
3174 | } else { | |
03b2d5e7 | 3175 | PRINT_INFO(HOSTINF_DBG, "MAC address set ::\n"); |
c5c77ba1 JK |
3176 | |
3177 | ||
3178 | } | |
3179 | ||
3180 | WILC_CATCH(s32Error) | |
3181 | { | |
3182 | ||
3183 | } | |
3184 | ||
3185 | return s32Error; | |
3186 | } | |
3187 | ||
3188 | /** | |
3189 | * @brief Handle_GetChnl | |
3190 | * @details Sending config packet to get channel | |
3191 | * @param[in] NONE | |
3192 | * @return NONE | |
3193 | * | |
3194 | * @author | |
3195 | * @date | |
3196 | * @version 1.0 | |
3197 | */ | |
2b05df55 | 3198 | static s32 Handle_GetChnl(tstrWILC_WFIDrv *drvHandler) |
c5c77ba1 JK |
3199 | { |
3200 | ||
fb4ec9ca | 3201 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
3202 | tstrWID strWID; |
3203 | /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */ | |
3204 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
78c87591 | 3205 | |
d85f5326 | 3206 | strWID.u16WIDid = (u16)WID_CURRENT_CHANNEL; |
c5c77ba1 | 3207 | strWID.enuWIDtype = WID_CHAR; |
ca356ada | 3208 | strWID.ps8WidVal = (s8 *)&gu8Chnl; |
576917ad | 3209 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
3210 | |
3211 | PRINT_D(HOSTINF_DBG, "Getting channel value\n"); | |
3212 | ||
72ed4dc7 | 3213 | s32Error = SendConfigPkt(GET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3214 | /*get the value by searching the local copy*/ |
3215 | if (s32Error) { | |
3216 | PRINT_ER("Failed to get channel number\n"); | |
3217 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
3218 | } | |
3219 | ||
3220 | ||
3221 | WILC_CATCH(s32Error) | |
3222 | { | |
3223 | ||
3224 | } | |
83383ea3 | 3225 | up(&(pstrWFIDrv->hSemGetCHNL)); |
c5c77ba1 JK |
3226 | |
3227 | return s32Error; | |
3228 | ||
3229 | ||
3230 | ||
3231 | } | |
3232 | ||
3233 | ||
3234 | /** | |
3235 | * @brief Handle_GetRssi | |
3236 | * @details Sending config packet to get RSSI | |
3237 | * @param[in] NONE | |
3238 | * @return NONE | |
3239 | * @author | |
3240 | * @date | |
3241 | * @version 1.0 | |
3242 | */ | |
2b05df55 | 3243 | static void Handle_GetRssi(tstrWILC_WFIDrv *drvHandler) |
c5c77ba1 | 3244 | { |
fb4ec9ca | 3245 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
3246 | tstrWID strWID; |
3247 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
3248 | ||
d85f5326 | 3249 | strWID.u16WIDid = (u16)WID_RSSI; |
c5c77ba1 JK |
3250 | strWID.enuWIDtype = WID_CHAR; |
3251 | strWID.ps8WidVal = &gs8Rssi; | |
576917ad | 3252 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
3253 | |
3254 | /*Sending Cfg*/ | |
3255 | PRINT_D(HOSTINF_DBG, "Getting RSSI value\n"); | |
3256 | ||
72ed4dc7 | 3257 | s32Error = SendConfigPkt(GET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3258 | if (s32Error) { |
3259 | PRINT_ER("Failed to get RSSI value\n"); | |
3260 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
3261 | } | |
3262 | ||
3263 | WILC_CATCH(s32Error) | |
3264 | { | |
3265 | ||
3266 | } | |
83383ea3 | 3267 | up(&(pstrWFIDrv->hSemGetRSSI)); |
c5c77ba1 JK |
3268 | |
3269 | ||
3270 | } | |
3271 | ||
3272 | ||
2b05df55 | 3273 | static void Handle_GetLinkspeed(tstrWILC_WFIDrv *drvHandler) |
c5c77ba1 | 3274 | { |
fb4ec9ca | 3275 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
3276 | tstrWID strWID; |
3277 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
3278 | ||
3279 | gs8lnkspd = 0; | |
3280 | ||
d85f5326 | 3281 | strWID.u16WIDid = (u16)WID_LINKSPEED; |
c5c77ba1 JK |
3282 | strWID.enuWIDtype = WID_CHAR; |
3283 | strWID.ps8WidVal = &gs8lnkspd; | |
576917ad | 3284 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
3285 | /*Sending Cfg*/ |
3286 | PRINT_D(HOSTINF_DBG, "Getting LINKSPEED value\n"); | |
3287 | ||
72ed4dc7 | 3288 | s32Error = SendConfigPkt(GET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3289 | if (s32Error) { |
3290 | PRINT_ER("Failed to get LINKSPEED value\n"); | |
3291 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
3292 | } | |
3293 | ||
3294 | WILC_CATCH(s32Error) | |
3295 | { | |
3296 | ||
3297 | } | |
83383ea3 | 3298 | up(&(pstrWFIDrv->hSemGetLINKSPEED)); |
c5c77ba1 JK |
3299 | |
3300 | ||
3301 | } | |
3302 | ||
2b05df55 | 3303 | s32 Handle_GetStatistics(tstrWILC_WFIDrv *drvHandler, tstrStatistics *pstrStatistics) |
c5c77ba1 JK |
3304 | { |
3305 | tstrWID strWIDList[5]; | |
3306 | uint32_t u32WidsCount = 0, s32Error = 0; | |
3307 | ||
3308 | strWIDList[u32WidsCount].u16WIDid = WID_LINKSPEED; | |
3309 | strWIDList[u32WidsCount].enuWIDtype = WID_CHAR; | |
576917ad | 3310 | strWIDList[u32WidsCount].s32ValueSize = sizeof(char); |
ca356ada | 3311 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u8LinkSpeed)); |
c5c77ba1 JK |
3312 | u32WidsCount++; |
3313 | ||
3314 | strWIDList[u32WidsCount].u16WIDid = WID_RSSI; | |
3315 | strWIDList[u32WidsCount].enuWIDtype = WID_CHAR; | |
576917ad | 3316 | strWIDList[u32WidsCount].s32ValueSize = sizeof(char); |
ca356ada | 3317 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->s8RSSI)); |
c5c77ba1 JK |
3318 | u32WidsCount++; |
3319 | ||
3320 | strWIDList[u32WidsCount].u16WIDid = WID_SUCCESS_FRAME_COUNT; | |
3321 | strWIDList[u32WidsCount].enuWIDtype = WID_INT; | |
4e4467fd | 3322 | strWIDList[u32WidsCount].s32ValueSize = sizeof(u32); |
ca356ada | 3323 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u32TxCount)); |
c5c77ba1 JK |
3324 | u32WidsCount++; |
3325 | ||
3326 | strWIDList[u32WidsCount].u16WIDid = WID_RECEIVED_FRAGMENT_COUNT; | |
3327 | strWIDList[u32WidsCount].enuWIDtype = WID_INT; | |
4e4467fd | 3328 | strWIDList[u32WidsCount].s32ValueSize = sizeof(u32); |
ca356ada | 3329 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u32RxCount)); |
c5c77ba1 JK |
3330 | u32WidsCount++; |
3331 | ||
3332 | strWIDList[u32WidsCount].u16WIDid = WID_FAILED_COUNT; | |
3333 | strWIDList[u32WidsCount].enuWIDtype = WID_INT; | |
4e4467fd | 3334 | strWIDList[u32WidsCount].s32ValueSize = sizeof(u32); |
ca356ada | 3335 | strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u32TxFailureCount)); |
c5c77ba1 JK |
3336 | u32WidsCount++; |
3337 | ||
72ed4dc7 | 3338 | s32Error = SendConfigPkt(GET_CFG, strWIDList, u32WidsCount, false, (u32)drvHandler); |
c5c77ba1 JK |
3339 | |
3340 | if (s32Error) { | |
3341 | PRINT_ER("Failed to send scan paramters config packet\n"); | |
3342 | /* WILC_ERRORREPORT(s32Error, s32Error); */ | |
3343 | } | |
83383ea3 | 3344 | up(&hWaitResponse); |
c5c77ba1 JK |
3345 | return 0; |
3346 | ||
3347 | } | |
3348 | ||
3349 | ||
3350 | #ifdef WILC_AP_EXTERNAL_MLME | |
3351 | ||
3352 | ||
3353 | /** | |
3354 | * @brief Handle_Get_InActiveTime | |
3355 | * @details Sending config packet to set mac adddress for station and | |
3356 | * get inactive time | |
3357 | * @param[in] NONE | |
3358 | * @return NONE | |
3359 | * | |
3360 | * @author | |
3361 | * @date | |
3362 | * @version 1.0 | |
3363 | */ | |
2b05df55 | 3364 | static s32 Handle_Get_InActiveTime(tstrWILC_WFIDrv *drvHandler, tstrHostIfStaInactiveT *strHostIfStaInactiveT) |
c5c77ba1 JK |
3365 | { |
3366 | ||
fb4ec9ca | 3367 | s32 s32Error = WILC_SUCCESS; |
63d03e47 | 3368 | u8 *stamac; |
c5c77ba1 JK |
3369 | tstrWID strWID; |
3370 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
3371 | ||
3372 | ||
d85f5326 | 3373 | strWID.u16WIDid = (u16)WID_SET_STA_MAC_INACTIVE_TIME; |
c5c77ba1 JK |
3374 | strWID.enuWIDtype = WID_STR; |
3375 | strWID.s32ValueSize = ETH_ALEN; | |
63d03e47 | 3376 | strWID.ps8WidVal = (u8 *)WILC_MALLOC(strWID.s32ValueSize); |
c5c77ba1 JK |
3377 | |
3378 | ||
3379 | stamac = strWID.ps8WidVal; | |
d00d2ba3 | 3380 | memcpy(stamac, strHostIfStaInactiveT->mac, ETH_ALEN); |
c5c77ba1 JK |
3381 | |
3382 | ||
3383 | PRINT_D(CFG80211_DBG, "SETING STA inactive time\n"); | |
3384 | ||
3385 | ||
72ed4dc7 | 3386 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3387 | /*get the value by searching the local copy*/ |
3388 | if (s32Error) { | |
3389 | PRINT_ER("Failed to SET incative time\n"); | |
3390 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
3391 | } | |
3392 | ||
3393 | ||
d85f5326 | 3394 | strWID.u16WIDid = (u16)WID_GET_INACTIVE_TIME; |
c5c77ba1 | 3395 | strWID.enuWIDtype = WID_INT; |
ca356ada | 3396 | strWID.ps8WidVal = (s8 *)&gu32InactiveTime; |
4e4467fd | 3397 | strWID.s32ValueSize = sizeof(u32); |
c5c77ba1 JK |
3398 | |
3399 | ||
72ed4dc7 | 3400 | s32Error = SendConfigPkt(GET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3401 | /*get the value by searching the local copy*/ |
3402 | if (s32Error) { | |
3403 | PRINT_ER("Failed to get incative time\n"); | |
3404 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
3405 | } | |
3406 | ||
3407 | ||
3408 | PRINT_D(CFG80211_DBG, "Getting inactive time : %d\n", gu32InactiveTime); | |
3409 | ||
83383ea3 | 3410 | up(&(pstrWFIDrv->hSemInactiveTime)); |
c5c77ba1 JK |
3411 | WILC_CATCH(s32Error) |
3412 | { | |
3413 | ||
3414 | } | |
3415 | ||
3416 | ||
3417 | return s32Error; | |
3418 | ||
3419 | ||
3420 | ||
3421 | } | |
3422 | ||
3423 | ||
3424 | /** | |
3425 | * @brief Handle_AddBeacon | |
3426 | * @details Sending config packet to add beacon | |
3427 | * @param[in] tstrHostIFSetBeacon* pstrSetBeaconParam | |
3428 | * @return NONE | |
3429 | * @author | |
3430 | * @date | |
3431 | * @version 1.0 | |
3432 | */ | |
2b05df55 | 3433 | static void Handle_AddBeacon(tstrWILC_WFIDrv *drvHandler, tstrHostIFSetBeacon *pstrSetBeaconParam) |
c5c77ba1 | 3434 | { |
fb4ec9ca | 3435 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 3436 | tstrWID strWID; |
63d03e47 | 3437 | u8 *pu8CurrByte; |
c5c77ba1 | 3438 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; |
78c87591 | 3439 | |
c5c77ba1 JK |
3440 | PRINT_D(HOSTINF_DBG, "Adding BEACON\n"); |
3441 | ||
d85f5326 | 3442 | strWID.u16WIDid = (u16)WID_ADD_BEACON; |
c5c77ba1 JK |
3443 | strWID.enuWIDtype = WID_BIN; |
3444 | strWID.s32ValueSize = pstrSetBeaconParam->u32HeadLen + pstrSetBeaconParam->u32TailLen + 16; | |
3445 | strWID.ps8WidVal = WILC_MALLOC(strWID.s32ValueSize); | |
2b9d5b48 | 3446 | if (strWID.ps8WidVal == NULL) |
c5c77ba1 | 3447 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
c5c77ba1 JK |
3448 | |
3449 | pu8CurrByte = strWID.ps8WidVal; | |
3450 | *pu8CurrByte++ = (pstrSetBeaconParam->u32Interval & 0xFF); | |
3451 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32Interval >> 8) & 0xFF); | |
3452 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32Interval >> 16) & 0xFF); | |
3453 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32Interval >> 24) & 0xFF); | |
3454 | ||
3455 | *pu8CurrByte++ = (pstrSetBeaconParam->u32DTIMPeriod & 0xFF); | |
3456 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32DTIMPeriod >> 8) & 0xFF); | |
3457 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32DTIMPeriod >> 16) & 0xFF); | |
3458 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32DTIMPeriod >> 24) & 0xFF); | |
3459 | ||
3460 | *pu8CurrByte++ = (pstrSetBeaconParam->u32HeadLen & 0xFF); | |
3461 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32HeadLen >> 8) & 0xFF); | |
3462 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32HeadLen >> 16) & 0xFF); | |
3463 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32HeadLen >> 24) & 0xFF); | |
3464 | ||
3465 | memcpy(pu8CurrByte, pstrSetBeaconParam->pu8Head, pstrSetBeaconParam->u32HeadLen); | |
3466 | pu8CurrByte += pstrSetBeaconParam->u32HeadLen; | |
3467 | ||
3468 | *pu8CurrByte++ = (pstrSetBeaconParam->u32TailLen & 0xFF); | |
3469 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32TailLen >> 8) & 0xFF); | |
3470 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32TailLen >> 16) & 0xFF); | |
3471 | *pu8CurrByte++ = ((pstrSetBeaconParam->u32TailLen >> 24) & 0xFF); | |
3472 | ||
3473 | /* Bug 4599 : if tail length = 0 skip copying */ | |
3474 | if (pstrSetBeaconParam->pu8Tail > 0) | |
3475 | memcpy(pu8CurrByte, pstrSetBeaconParam->pu8Tail, pstrSetBeaconParam->u32TailLen); | |
3476 | pu8CurrByte += pstrSetBeaconParam->u32TailLen; | |
3477 | ||
3478 | ||
3479 | ||
3480 | /*Sending Cfg*/ | |
72ed4dc7 | 3481 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, false, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3482 | if (s32Error) { |
3483 | PRINT_ER("Failed to send add beacon config packet\n"); | |
3484 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
3485 | } | |
3486 | ||
3487 | WILC_CATCH(s32Error) | |
3488 | { | |
3489 | } | |
969effe9 GKH |
3490 | kfree(strWID.ps8WidVal); |
3491 | kfree(pstrSetBeaconParam->pu8Head); | |
3492 | kfree(pstrSetBeaconParam->pu8Tail); | |
c5c77ba1 JK |
3493 | } |
3494 | ||
3495 | ||
3496 | /** | |
3497 | * @brief Handle_AddBeacon | |
3498 | * @details Sending config packet to delete beacon | |
3499 | * @param[in] tstrHostIFDelBeacon* pstrDelBeacon | |
3500 | * @return NONE | |
3501 | * @author | |
3502 | * @date | |
3503 | * @version 1.0 | |
3504 | */ | |
2b05df55 | 3505 | static void Handle_DelBeacon(tstrWILC_WFIDrv *drvHandler, tstrHostIFDelBeacon *pstrDelBeacon) |
c5c77ba1 | 3506 | { |
fb4ec9ca | 3507 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 3508 | tstrWID strWID; |
63d03e47 | 3509 | u8 *pu8CurrByte; |
c5c77ba1 | 3510 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; |
78c87591 | 3511 | |
d85f5326 | 3512 | strWID.u16WIDid = (u16)WID_DEL_BEACON; |
c5c77ba1 | 3513 | strWID.enuWIDtype = WID_CHAR; |
576917ad | 3514 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
3515 | strWID.ps8WidVal = &gu8DelBcn; |
3516 | ||
2b9d5b48 | 3517 | if (strWID.ps8WidVal == NULL) |
c5c77ba1 | 3518 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
c5c77ba1 JK |
3519 | |
3520 | pu8CurrByte = strWID.ps8WidVal; | |
3521 | ||
3522 | PRINT_D(HOSTINF_DBG, "Deleting BEACON\n"); | |
3523 | /* TODO: build del beacon message*/ | |
3524 | ||
3525 | /*Sending Cfg*/ | |
72ed4dc7 | 3526 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, false, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3527 | if (s32Error) { |
3528 | ||
3529 | PRINT_ER("Failed to send delete beacon config packet\n"); | |
3530 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
3531 | } | |
3532 | ||
3533 | WILC_CATCH(s32Error) | |
3534 | { | |
3535 | } | |
3536 | } | |
3537 | ||
3538 | ||
3539 | /** | |
3540 | * @brief WILC_HostIf_PackStaParam | |
3541 | * @details Handling packing of the station params in a buffer | |
63d03e47 | 3542 | * @param[in] u8* pu8Buffer, tstrWILC_AddStaParam* pstrStationParam |
c5c77ba1 JK |
3543 | * @return NONE |
3544 | * @author | |
3545 | * @date | |
3546 | * @version 1.0 | |
3547 | */ | |
4e4467fd | 3548 | static u32 WILC_HostIf_PackStaParam(u8 *pu8Buffer, tstrWILC_AddStaParam *pstrStationParam) |
c5c77ba1 | 3549 | { |
63d03e47 | 3550 | u8 *pu8CurrByte; |
c5c77ba1 JK |
3551 | |
3552 | pu8CurrByte = pu8Buffer; | |
3553 | ||
3554 | PRINT_D(HOSTINF_DBG, "Packing STA params\n"); | |
d00d2ba3 | 3555 | memcpy(pu8CurrByte, pstrStationParam->au8BSSID, ETH_ALEN); |
c5c77ba1 JK |
3556 | pu8CurrByte += ETH_ALEN; |
3557 | ||
3558 | *pu8CurrByte++ = pstrStationParam->u16AssocID & 0xFF; | |
3559 | *pu8CurrByte++ = (pstrStationParam->u16AssocID >> 8) & 0xFF; | |
3560 | ||
3561 | *pu8CurrByte++ = pstrStationParam->u8NumRates; | |
2b9d5b48 | 3562 | if (pstrStationParam->u8NumRates > 0) |
d00d2ba3 | 3563 | memcpy(pu8CurrByte, pstrStationParam->pu8Rates, pstrStationParam->u8NumRates); |
c5c77ba1 JK |
3564 | pu8CurrByte += pstrStationParam->u8NumRates; |
3565 | ||
3566 | *pu8CurrByte++ = pstrStationParam->bIsHTSupported; | |
3567 | *pu8CurrByte++ = pstrStationParam->u16HTCapInfo & 0xFF; | |
3568 | *pu8CurrByte++ = (pstrStationParam->u16HTCapInfo >> 8) & 0xFF; | |
3569 | ||
3570 | *pu8CurrByte++ = pstrStationParam->u8AmpduParams; | |
d00d2ba3 | 3571 | memcpy(pu8CurrByte, pstrStationParam->au8SuppMCsSet, WILC_SUPP_MCS_SET_SIZE); |
c5c77ba1 JK |
3572 | pu8CurrByte += WILC_SUPP_MCS_SET_SIZE; |
3573 | ||
3574 | *pu8CurrByte++ = pstrStationParam->u16HTExtParams & 0xFF; | |
3575 | *pu8CurrByte++ = (pstrStationParam->u16HTExtParams >> 8) & 0xFF; | |
3576 | ||
3577 | *pu8CurrByte++ = pstrStationParam->u32TxBeamformingCap & 0xFF; | |
3578 | *pu8CurrByte++ = (pstrStationParam->u32TxBeamformingCap >> 8) & 0xFF; | |
3579 | *pu8CurrByte++ = (pstrStationParam->u32TxBeamformingCap >> 16) & 0xFF; | |
3580 | *pu8CurrByte++ = (pstrStationParam->u32TxBeamformingCap >> 24) & 0xFF; | |
3581 | ||
3582 | *pu8CurrByte++ = pstrStationParam->u8ASELCap; | |
3583 | ||
3584 | *pu8CurrByte++ = pstrStationParam->u16FlagsMask & 0xFF; | |
3585 | *pu8CurrByte++ = (pstrStationParam->u16FlagsMask >> 8) & 0xFF; | |
3586 | ||
3587 | *pu8CurrByte++ = pstrStationParam->u16FlagsSet & 0xFF; | |
3588 | *pu8CurrByte++ = (pstrStationParam->u16FlagsSet >> 8) & 0xFF; | |
3589 | ||
3590 | return pu8CurrByte - pu8Buffer; | |
3591 | } | |
3592 | ||
3593 | /** | |
3594 | * @brief Handle_AddStation | |
3595 | * @details Sending config packet to add station | |
3596 | * @param[in] tstrWILC_AddStaParam* pstrStationParam | |
3597 | * @return NONE | |
3598 | * @author | |
3599 | * @date | |
3600 | * @version 1.0 | |
3601 | */ | |
2b05df55 | 3602 | static void Handle_AddStation(tstrWILC_WFIDrv *drvHandler, tstrWILC_AddStaParam *pstrStationParam) |
c5c77ba1 | 3603 | { |
fb4ec9ca | 3604 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 3605 | tstrWID strWID; |
63d03e47 | 3606 | u8 *pu8CurrByte; |
c5c77ba1 | 3607 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; |
78c87591 | 3608 | |
c5c77ba1 | 3609 | PRINT_D(HOSTINF_DBG, "Handling add station\n"); |
d85f5326 | 3610 | strWID.u16WIDid = (u16)WID_ADD_STA; |
c5c77ba1 JK |
3611 | strWID.enuWIDtype = WID_BIN; |
3612 | strWID.s32ValueSize = WILC_ADD_STA_LENGTH + pstrStationParam->u8NumRates; | |
3613 | ||
3614 | strWID.ps8WidVal = WILC_MALLOC(strWID.s32ValueSize); | |
2b9d5b48 | 3615 | if (strWID.ps8WidVal == NULL) |
c5c77ba1 | 3616 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
c5c77ba1 JK |
3617 | |
3618 | pu8CurrByte = strWID.ps8WidVal; | |
3619 | pu8CurrByte += WILC_HostIf_PackStaParam(pu8CurrByte, pstrStationParam); | |
3620 | ||
3621 | /*Sending Cfg*/ | |
72ed4dc7 | 3622 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, false, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3623 | if (s32Error != WILC_SUCCESS) { |
3624 | ||
3625 | PRINT_ER("Failed to send add station config packet\n"); | |
3626 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
3627 | } | |
3628 | ||
3629 | WILC_CATCH(s32Error) | |
3630 | { | |
3631 | } | |
969effe9 GKH |
3632 | kfree(pstrStationParam->pu8Rates); |
3633 | kfree(strWID.ps8WidVal); | |
c5c77ba1 JK |
3634 | } |
3635 | ||
3636 | /** | |
3637 | * @brief Handle_DelAllSta | |
3638 | * @details Sending config packet to delete station | |
3639 | * @param[in] tstrHostIFDelSta* pstrDelStaParam | |
3640 | * @return NONE | |
3641 | * @author | |
3642 | * @date | |
3643 | * @version 1.0 | |
3644 | */ | |
2b05df55 | 3645 | static void Handle_DelAllSta(tstrWILC_WFIDrv *drvHandler, tstrHostIFDelAllSta *pstrDelAllStaParam) |
c5c77ba1 | 3646 | { |
fb4ec9ca | 3647 | s32 s32Error = WILC_SUCCESS; |
78c87591 | 3648 | |
c5c77ba1 | 3649 | tstrWID strWID; |
63d03e47 | 3650 | u8 *pu8CurrByte; |
c5c77ba1 | 3651 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; |
63d03e47 | 3652 | u8 i; |
3703480b | 3653 | u8 au8Zero_Buff[6] = {0}; |
78c87591 | 3654 | |
d85f5326 | 3655 | strWID.u16WIDid = (u16)WID_DEL_ALL_STA; |
c5c77ba1 JK |
3656 | strWID.enuWIDtype = WID_STR; |
3657 | strWID.s32ValueSize = (pstrDelAllStaParam->u8Num_AssocSta * ETH_ALEN) + 1; | |
3658 | ||
03b2d5e7 | 3659 | PRINT_D(HOSTINF_DBG, "Handling delete station\n"); |
c5c77ba1 JK |
3660 | |
3661 | strWID.ps8WidVal = WILC_MALLOC((pstrDelAllStaParam->u8Num_AssocSta * ETH_ALEN) + 1); | |
2b9d5b48 | 3662 | if (strWID.ps8WidVal == NULL) |
c5c77ba1 | 3663 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
c5c77ba1 JK |
3664 | |
3665 | pu8CurrByte = strWID.ps8WidVal; | |
3666 | ||
3667 | *(pu8CurrByte++) = pstrDelAllStaParam->u8Num_AssocSta; | |
3668 | ||
3669 | for (i = 0; i < MAX_NUM_STA; i++) { | |
3670 | if (memcmp(pstrDelAllStaParam->au8Sta_DelAllSta[i], au8Zero_Buff, ETH_ALEN)) | |
d00d2ba3 | 3671 | memcpy(pu8CurrByte, pstrDelAllStaParam->au8Sta_DelAllSta[i], ETH_ALEN); |
c5c77ba1 JK |
3672 | else |
3673 | continue; | |
3674 | ||
3675 | pu8CurrByte += ETH_ALEN; | |
3676 | } | |
3677 | ||
3678 | /*Sending Cfg*/ | |
72ed4dc7 | 3679 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3680 | if (s32Error) { |
3681 | ||
83cc9be5 | 3682 | PRINT_ER("Failed to send add station config packet\n"); |
c5c77ba1 JK |
3683 | WILC_ERRORREPORT(s32Error, WILC_FAIL); |
3684 | } | |
3685 | ||
3686 | WILC_CATCH(s32Error) | |
3687 | { | |
3688 | } | |
969effe9 | 3689 | kfree(strWID.ps8WidVal); |
c5c77ba1 | 3690 | |
83383ea3 | 3691 | up(&hWaitResponse); |
c5c77ba1 JK |
3692 | } |
3693 | ||
3694 | ||
3695 | /** | |
3696 | * @brief Handle_DelStation | |
3697 | * @details Sending config packet to delete station | |
3698 | * @param[in] tstrHostIFDelSta* pstrDelStaParam | |
3699 | * @return NONE | |
3700 | * @author | |
3701 | * @date | |
3702 | * @version 1.0 | |
3703 | */ | |
2b05df55 | 3704 | static void Handle_DelStation(tstrWILC_WFIDrv *drvHandler, tstrHostIFDelSta *pstrDelStaParam) |
c5c77ba1 | 3705 | { |
fb4ec9ca | 3706 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 3707 | tstrWID strWID; |
63d03e47 | 3708 | u8 *pu8CurrByte; |
c5c77ba1 JK |
3709 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; |
3710 | ||
d85f5326 | 3711 | strWID.u16WIDid = (u16)WID_REMOVE_STA; |
c5c77ba1 JK |
3712 | strWID.enuWIDtype = WID_BIN; |
3713 | strWID.s32ValueSize = ETH_ALEN; | |
3714 | ||
03b2d5e7 | 3715 | PRINT_D(HOSTINF_DBG, "Handling delete station\n"); |
c5c77ba1 JK |
3716 | |
3717 | strWID.ps8WidVal = WILC_MALLOC(strWID.s32ValueSize); | |
2b9d5b48 | 3718 | if (strWID.ps8WidVal == NULL) |
c5c77ba1 | 3719 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
c5c77ba1 JK |
3720 | |
3721 | pu8CurrByte = strWID.ps8WidVal; | |
3722 | ||
d00d2ba3 | 3723 | memcpy(pu8CurrByte, pstrDelStaParam->au8MacAddr, ETH_ALEN); |
c5c77ba1 JK |
3724 | |
3725 | /*Sending Cfg*/ | |
72ed4dc7 | 3726 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, false, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3727 | if (s32Error) { |
3728 | ||
83cc9be5 | 3729 | PRINT_ER("Failed to send add station config packet\n"); |
c5c77ba1 JK |
3730 | WILC_ERRORREPORT(s32Error, WILC_FAIL); |
3731 | } | |
3732 | ||
3733 | WILC_CATCH(s32Error) | |
3734 | { | |
3735 | } | |
969effe9 | 3736 | kfree(strWID.ps8WidVal); |
c5c77ba1 JK |
3737 | } |
3738 | ||
3739 | ||
3740 | /** | |
3741 | * @brief Handle_EditStation | |
3742 | * @details Sending config packet to edit station | |
3743 | * @param[in] tstrWILC_AddStaParam* pstrStationParam | |
3744 | * @return NONE | |
3745 | * @author | |
3746 | * @date | |
3747 | * @version 1.0 | |
3748 | */ | |
2b05df55 | 3749 | static void Handle_EditStation(tstrWILC_WFIDrv *drvHandler, tstrWILC_AddStaParam *pstrStationParam) |
c5c77ba1 | 3750 | { |
fb4ec9ca | 3751 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 3752 | tstrWID strWID; |
63d03e47 | 3753 | u8 *pu8CurrByte; |
c5c77ba1 JK |
3754 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; |
3755 | ||
d85f5326 | 3756 | strWID.u16WIDid = (u16)WID_EDIT_STA; |
c5c77ba1 JK |
3757 | strWID.enuWIDtype = WID_BIN; |
3758 | strWID.s32ValueSize = WILC_ADD_STA_LENGTH + pstrStationParam->u8NumRates; | |
3759 | ||
3760 | PRINT_D(HOSTINF_DBG, "Handling edit station\n"); | |
3761 | strWID.ps8WidVal = WILC_MALLOC(strWID.s32ValueSize); | |
2b9d5b48 | 3762 | if (strWID.ps8WidVal == NULL) |
c5c77ba1 | 3763 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
c5c77ba1 JK |
3764 | |
3765 | pu8CurrByte = strWID.ps8WidVal; | |
3766 | pu8CurrByte += WILC_HostIf_PackStaParam(pu8CurrByte, pstrStationParam); | |
3767 | ||
3768 | /*Sending Cfg*/ | |
72ed4dc7 | 3769 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, false, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3770 | if (s32Error) { |
3771 | ||
3772 | PRINT_ER("Failed to send edit station config packet\n"); | |
3773 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
3774 | } | |
3775 | ||
3776 | WILC_CATCH(s32Error) | |
3777 | { | |
3778 | } | |
969effe9 GKH |
3779 | kfree(pstrStationParam->pu8Rates); |
3780 | kfree(strWID.ps8WidVal); | |
c5c77ba1 JK |
3781 | } |
3782 | #endif /*WILC_AP_EXTERNAL_MLME*/ | |
3783 | ||
3784 | #ifdef WILC_P2P | |
3785 | /** | |
3786 | * @brief Handle_RemainOnChan | |
3787 | * @details Sending config packet to edit station | |
3788 | * @param[in] tstrWILC_AddStaParam* pstrStationParam | |
3789 | * @return NONE | |
3790 | * @author | |
3791 | * @date | |
3792 | * @version 1.0 | |
3793 | */ | |
2b05df55 | 3794 | static int Handle_RemainOnChan(tstrWILC_WFIDrv *drvHandler, tstrHostIfRemainOnChan *pstrHostIfRemainOnChan) |
c5c77ba1 | 3795 | { |
fb4ec9ca | 3796 | s32 s32Error = WILC_SUCCESS; |
63d03e47 | 3797 | u8 u8remain_on_chan_flag; |
c5c77ba1 JK |
3798 | tstrWID strWID; |
3799 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler; | |
3800 | ||
3801 | /*If it's a pendig remain-on-channel, don't overwrite gWFiDrvHandle values (since incoming msg is garbbage)*/ | |
3802 | if (!pstrWFIDrv->u8RemainOnChan_pendingreq) { | |
3803 | pstrWFIDrv->strHostIfRemainOnChan.pVoid = pstrHostIfRemainOnChan->pVoid; | |
3804 | pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanExpired = pstrHostIfRemainOnChan->pRemainOnChanExpired; | |
3805 | pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanReady = pstrHostIfRemainOnChan->pRemainOnChanReady; | |
3806 | pstrWFIDrv->strHostIfRemainOnChan.u16Channel = pstrHostIfRemainOnChan->u16Channel; | |
3807 | pstrWFIDrv->strHostIfRemainOnChan.u32ListenSessionID = pstrHostIfRemainOnChan->u32ListenSessionID; | |
3808 | } else { | |
3809 | /*Set the channel to use it as a wid val*/ | |
3810 | pstrHostIfRemainOnChan->u16Channel = pstrWFIDrv->strHostIfRemainOnChan.u16Channel; | |
3811 | } | |
3812 | ||
3813 | if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult != NULL) { | |
3814 | PRINT_INFO(GENERIC_DBG, "Required to remain on chan while scanning return\n"); | |
3815 | pstrWFIDrv->u8RemainOnChan_pendingreq = 1; | |
3816 | WILC_ERRORREPORT(s32Error, WILC_BUSY); | |
3817 | } | |
3818 | if (pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) { | |
3819 | PRINT_INFO(GENERIC_DBG, "Required to remain on chan while connecting return\n"); | |
3820 | WILC_ERRORREPORT(s32Error, WILC_BUSY); | |
3821 | } | |
3822 | ||
3823 | #ifdef DISABLE_PWRSAVE_AND_SCAN_DURING_IP | |
3824 | if (g_obtainingIP || connecting) { | |
3825 | PRINT_D(GENERIC_DBG, "[handle_scan]: Don't do obss scan until IP adresss is obtained\n"); | |
3826 | WILC_ERRORREPORT(s32Error, WILC_BUSY); | |
3827 | } | |
3828 | #endif | |
3829 | ||
3830 | PRINT_D(HOSTINF_DBG, "Setting channel :%d\n", pstrHostIfRemainOnChan->u16Channel); | |
3831 | ||
72ed4dc7 | 3832 | u8remain_on_chan_flag = true; |
d85f5326 | 3833 | strWID.u16WIDid = (u16)WID_REMAIN_ON_CHAN; |
c5c77ba1 JK |
3834 | strWID.enuWIDtype = WID_STR; |
3835 | strWID.s32ValueSize = 2; | |
ca356ada | 3836 | strWID.ps8WidVal = (s8 *)WILC_MALLOC(strWID.s32ValueSize); |
c5c77ba1 | 3837 | |
2b9d5b48 | 3838 | if (strWID.ps8WidVal == NULL) |
c5c77ba1 | 3839 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
c5c77ba1 JK |
3840 | |
3841 | strWID.ps8WidVal[0] = u8remain_on_chan_flag; | |
ca356ada | 3842 | strWID.ps8WidVal[1] = (s8)pstrHostIfRemainOnChan->u16Channel; |
c5c77ba1 JK |
3843 | |
3844 | /*Sending Cfg*/ | |
72ed4dc7 | 3845 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
2b9d5b48 | 3846 | if (s32Error != WILC_SUCCESS) |
c5c77ba1 | 3847 | PRINT_ER("Failed to set remain on channel\n"); |
c5c77ba1 JK |
3848 | |
3849 | WILC_CATCH(-1) | |
3850 | { | |
3851 | P2P_LISTEN_STATE = 1; | |
334e1a57 | 3852 | WILC_TimerStart(&(pstrWFIDrv->hRemainOnChannel), pstrHostIfRemainOnChan->u32duration, (void *)pstrWFIDrv); |
c5c77ba1 JK |
3853 | |
3854 | /*Calling CFG ready_on_channel*/ | |
2b9d5b48 | 3855 | if (pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanReady) |
c5c77ba1 | 3856 | pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanReady(pstrWFIDrv->strHostIfRemainOnChan.pVoid); |
c5c77ba1 JK |
3857 | |
3858 | if (pstrWFIDrv->u8RemainOnChan_pendingreq) | |
3859 | pstrWFIDrv->u8RemainOnChan_pendingreq = 0; | |
3860 | } | |
3861 | return s32Error; | |
3862 | } | |
3863 | ||
3864 | /** | |
3865 | * @brief Handle_RegisterFrame | |
3866 | * @details | |
3867 | * @param[in] | |
3868 | * @return NONE | |
3869 | * @author | |
3870 | * @date | |
3871 | * @version 1.0 | |
3872 | */ | |
2b05df55 | 3873 | static int Handle_RegisterFrame(tstrWILC_WFIDrv *drvHandler, tstrHostIfRegisterFrame *pstrHostIfRegisterFrame) |
c5c77ba1 | 3874 | { |
fb4ec9ca | 3875 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 3876 | tstrWID strWID; |
63d03e47 | 3877 | u8 *pu8CurrByte; |
c5c77ba1 JK |
3878 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; |
3879 | ||
3880 | PRINT_D(HOSTINF_DBG, "Handling frame register Flag : %d FrameType: %d\n", pstrHostIfRegisterFrame->bReg, pstrHostIfRegisterFrame->u16FrameType); | |
3881 | ||
3882 | /*prepare configuration packet*/ | |
d85f5326 | 3883 | strWID.u16WIDid = (u16)WID_REGISTER_FRAME; |
c5c77ba1 | 3884 | strWID.enuWIDtype = WID_STR; |
d85f5326 | 3885 | strWID.ps8WidVal = WILC_MALLOC(sizeof(u16) + 2); |
2b9d5b48 | 3886 | if (strWID.ps8WidVal == NULL) |
c5c77ba1 | 3887 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
c5c77ba1 JK |
3888 | |
3889 | pu8CurrByte = strWID.ps8WidVal; | |
3890 | ||
3891 | *pu8CurrByte++ = pstrHostIfRegisterFrame->bReg; | |
3892 | *pu8CurrByte++ = pstrHostIfRegisterFrame->u8Regid; | |
d00d2ba3 | 3893 | memcpy(pu8CurrByte, &(pstrHostIfRegisterFrame->u16FrameType), sizeof(u16)); |
c5c77ba1 JK |
3894 | |
3895 | ||
d85f5326 | 3896 | strWID.s32ValueSize = sizeof(u16) + 2; |
c5c77ba1 JK |
3897 | |
3898 | ||
3899 | /*Sending Cfg*/ | |
72ed4dc7 | 3900 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3901 | if (s32Error) { |
3902 | PRINT_ER("Failed to frame register config packet\n"); | |
3903 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
3904 | } | |
3905 | ||
3906 | ||
3907 | WILC_CATCH(s32Error) | |
3908 | { | |
3909 | } | |
3910 | ||
3911 | return s32Error; | |
3912 | ||
3913 | } | |
3914 | ||
3915 | /** | |
3916 | * @brief Handle_ListenStateExpired | |
3917 | * @details Handle of listen state expiration | |
3918 | * @param[in] NONE | |
3919 | * @return Error code. | |
3920 | * @author | |
3921 | * @date | |
3922 | * @version 1.0 | |
3923 | */ | |
3924 | #define FALSE_FRMWR_CHANNEL 100 | |
2b05df55 | 3925 | static u32 Handle_ListenStateExpired(tstrWILC_WFIDrv *drvHandler, tstrHostIfRemainOnChan *pstrHostIfRemainOnChan) |
c5c77ba1 | 3926 | { |
63d03e47 | 3927 | u8 u8remain_on_chan_flag; |
c5c77ba1 | 3928 | tstrWID strWID; |
fb4ec9ca | 3929 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
3930 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler; |
3931 | ||
3932 | PRINT_D(HOSTINF_DBG, "CANCEL REMAIN ON CHAN\n"); | |
3933 | ||
3934 | /*BugID_5477*/ | |
3935 | /*Make sure we are already in listen state*/ | |
3936 | /*This is to handle duplicate expiry messages (listen timer fired and supplicant called cancel_remain_on_channel())*/ | |
3937 | if (P2P_LISTEN_STATE) { | |
72ed4dc7 | 3938 | u8remain_on_chan_flag = false; |
d85f5326 | 3939 | strWID.u16WIDid = (u16)WID_REMAIN_ON_CHAN; |
c5c77ba1 JK |
3940 | strWID.enuWIDtype = WID_STR; |
3941 | strWID.s32ValueSize = 2; | |
3942 | strWID.ps8WidVal = WILC_MALLOC(strWID.s32ValueSize); | |
3943 | ||
2b9d5b48 | 3944 | if (strWID.ps8WidVal == NULL) |
c5c77ba1 | 3945 | PRINT_ER("Failed to allocate memory\n"); |
c5c77ba1 JK |
3946 | |
3947 | strWID.ps8WidVal[0] = u8remain_on_chan_flag; | |
3948 | strWID.ps8WidVal[1] = FALSE_FRMWR_CHANNEL; | |
3949 | ||
3950 | /*Sending Cfg*/ | |
72ed4dc7 | 3951 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
3952 | if (s32Error != WILC_SUCCESS) { |
3953 | PRINT_ER("Failed to set remain on channel\n"); | |
3954 | goto _done_; | |
3955 | } | |
3956 | ||
3957 | if (pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanExpired) { | |
3958 | pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanExpired(pstrWFIDrv->strHostIfRemainOnChan.pVoid | |
3959 | , pstrHostIfRemainOnChan->u32ListenSessionID); | |
3960 | } | |
3961 | P2P_LISTEN_STATE = 0; | |
3962 | } else { | |
3963 | PRINT_D(GENERIC_DBG, "Not in listen state\n"); | |
3964 | s32Error = WILC_FAIL; | |
3965 | } | |
3966 | ||
3967 | _done_: | |
3968 | return s32Error; | |
3969 | } | |
3970 | ||
3971 | ||
3972 | /** | |
3973 | * @brief ListenTimerCB | |
3974 | * @details Callback function of remain-on-channel timer | |
3975 | * @param[in] NONE | |
3976 | * @return Error code. | |
3977 | * @author | |
3978 | * @date | |
3979 | * @version 1.0 | |
3980 | */ | |
3981 | static void ListenTimerCB(void *pvArg) | |
3982 | { | |
fb4ec9ca | 3983 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
3984 | tstrHostIFmsg strHostIFmsg; |
3985 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)pvArg; | |
3986 | /*Stopping remain-on-channel timer*/ | |
334e1a57 | 3987 | WILC_TimerStop(&pstrWFIDrv->hRemainOnChannel); |
c5c77ba1 JK |
3988 | |
3989 | /* prepare the Timer Callback message */ | |
2cc46837 | 3990 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
3991 | strHostIFmsg.u16MsgId = HOST_IF_MSG_LISTEN_TIMER_FIRED; |
3992 | strHostIFmsg.drvHandler = pstrWFIDrv; | |
3993 | strHostIFmsg.uniHostIFmsgBody.strHostIfRemainOnChan.u32ListenSessionID = pstrWFIDrv->strHostIfRemainOnChan.u32ListenSessionID; | |
3994 | ||
3995 | /* send the message */ | |
b1413b60 | 3996 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 3997 | if (s32Error) |
c5c77ba1 | 3998 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
3999 | WILC_CATCH(s32Error) |
4000 | { | |
4001 | ||
4002 | } | |
4003 | } | |
4004 | #endif | |
4005 | ||
4006 | ||
4007 | /** | |
4008 | * @brief Handle_EditStation | |
4009 | * @details Sending config packet to edit station | |
4010 | * @param[in] tstrWILC_AddStaParam* pstrStationParam | |
4011 | * @return NONE | |
4012 | * @author | |
4013 | * @date | |
4014 | * @version 1.0 | |
4015 | */ | |
2b05df55 | 4016 | static void Handle_PowerManagement(tstrWILC_WFIDrv *drvHandler, tstrHostIfPowerMgmtParam *strPowerMgmtParam) |
c5c77ba1 | 4017 | { |
fb4ec9ca | 4018 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 4019 | tstrWID strWID; |
ca356ada | 4020 | s8 s8PowerMode; |
c5c77ba1 | 4021 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; |
78c87591 | 4022 | |
d85f5326 | 4023 | strWID.u16WIDid = (u16)WID_POWER_MANAGEMENT; |
c5c77ba1 | 4024 | |
78174ada | 4025 | if (strPowerMgmtParam->bIsEnabled == true) |
c5c77ba1 | 4026 | s8PowerMode = MIN_FAST_PS; |
78174ada | 4027 | else |
c5c77ba1 | 4028 | s8PowerMode = NO_POWERSAVE; |
c5c77ba1 JK |
4029 | PRINT_D(HOSTINF_DBG, "Handling power mgmt to %d\n", s8PowerMode); |
4030 | strWID.ps8WidVal = &s8PowerMode; | |
576917ad | 4031 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
4032 | |
4033 | PRINT_D(HOSTINF_DBG, "Handling Power Management\n"); | |
4034 | ||
4035 | /*Sending Cfg*/ | |
72ed4dc7 | 4036 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
4037 | if (s32Error) { |
4038 | PRINT_ER("Failed to send power management config packet\n"); | |
4039 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
4040 | } | |
4041 | ||
4042 | WILC_CATCH(s32Error) | |
4043 | { | |
4044 | ||
4045 | } | |
4046 | } | |
4047 | ||
4048 | /** | |
4049 | * @brief Handle_SetMulticastFilter | |
4050 | * @details Set Multicast filter in firmware | |
4051 | * @param[in] tstrHostIFSetMulti* strHostIfSetMulti | |
4052 | * @return NONE | |
4053 | * @author asobhy | |
4054 | * @date | |
4055 | * @version 1.0 | |
4056 | */ | |
2b05df55 | 4057 | static void Handle_SetMulticastFilter(tstrWILC_WFIDrv *drvHandler, tstrHostIFSetMulti *strHostIfSetMulti) |
c5c77ba1 | 4058 | { |
fb4ec9ca | 4059 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 4060 | tstrWID strWID; |
63d03e47 | 4061 | u8 *pu8CurrByte; |
c5c77ba1 JK |
4062 | |
4063 | PRINT_D(HOSTINF_DBG, "Setup Multicast Filter\n"); | |
4064 | ||
d85f5326 | 4065 | strWID.u16WIDid = (u16)WID_SETUP_MULTICAST_FILTER; |
c5c77ba1 JK |
4066 | strWID.enuWIDtype = WID_BIN; |
4067 | strWID.s32ValueSize = sizeof(tstrHostIFSetMulti) + ((strHostIfSetMulti->u32count) * ETH_ALEN); | |
4068 | strWID.ps8WidVal = WILC_MALLOC(strWID.s32ValueSize); | |
2b9d5b48 | 4069 | if (strWID.ps8WidVal == NULL) |
c5c77ba1 | 4070 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
c5c77ba1 JK |
4071 | |
4072 | pu8CurrByte = strWID.ps8WidVal; | |
4073 | *pu8CurrByte++ = (strHostIfSetMulti->bIsEnabled & 0xFF); | |
4074 | *pu8CurrByte++ = ((strHostIfSetMulti->bIsEnabled >> 8) & 0xFF); | |
4075 | *pu8CurrByte++ = ((strHostIfSetMulti->bIsEnabled >> 16) & 0xFF); | |
4076 | *pu8CurrByte++ = ((strHostIfSetMulti->bIsEnabled >> 24) & 0xFF); | |
4077 | ||
4078 | *pu8CurrByte++ = (strHostIfSetMulti->u32count & 0xFF); | |
4079 | *pu8CurrByte++ = ((strHostIfSetMulti->u32count >> 8) & 0xFF); | |
4080 | *pu8CurrByte++ = ((strHostIfSetMulti->u32count >> 16) & 0xFF); | |
4081 | *pu8CurrByte++ = ((strHostIfSetMulti->u32count >> 24) & 0xFF); | |
4082 | ||
4083 | if ((strHostIfSetMulti->u32count) > 0) | |
4084 | memcpy(pu8CurrByte, gau8MulticastMacAddrList, ((strHostIfSetMulti->u32count) * ETH_ALEN)); | |
4085 | ||
4086 | /*Sending Cfg*/ | |
72ed4dc7 | 4087 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, false, (u32)drvHandler); |
c5c77ba1 JK |
4088 | if (s32Error) { |
4089 | PRINT_ER("Failed to send setup multicast config packet\n"); | |
4090 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
4091 | } | |
4092 | ||
4093 | WILC_CATCH(s32Error) | |
4094 | { | |
4095 | } | |
969effe9 | 4096 | kfree(strWID.ps8WidVal); |
c5c77ba1 JK |
4097 | |
4098 | } | |
4099 | ||
4100 | ||
4101 | /*BugID_5222*/ | |
4102 | /** | |
4103 | * @brief Handle_AddBASession | |
4104 | * @details Add block ack session | |
4105 | * @param[in] tstrHostIFSetMulti* strHostIfSetMulti | |
4106 | * @return NONE | |
4107 | * @author Amr Abdel-Moghny | |
4108 | * @date Feb. 2014 | |
4109 | * @version 9.0 | |
4110 | */ | |
2b05df55 | 4111 | static s32 Handle_AddBASession(tstrWILC_WFIDrv *drvHandler, tstrHostIfBASessionInfo *strHostIfBASessionInfo) |
c5c77ba1 | 4112 | { |
fb4ec9ca | 4113 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
4114 | tstrWID strWID; |
4115 | int AddbaTimeout = 100; | |
4116 | char *ptr = NULL; | |
4117 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
4118 | ||
03b2d5e7 | 4119 | PRINT_D(HOSTINF_DBG, "Opening Block Ack session with\nBSSID = %.2x:%.2x:%.2x\nTID=%d\nBufferSize == %d\nSessionTimeOut = %d\n", |
c5c77ba1 JK |
4120 | strHostIfBASessionInfo->au8Bssid[0], |
4121 | strHostIfBASessionInfo->au8Bssid[1], | |
4122 | strHostIfBASessionInfo->au8Bssid[2], | |
4123 | strHostIfBASessionInfo->u16BufferSize, | |
4124 | strHostIfBASessionInfo->u16SessionTimeout, | |
4125 | strHostIfBASessionInfo->u8Ted); | |
4126 | ||
d85f5326 | 4127 | strWID.u16WIDid = (u16)WID_11E_P_ACTION_REQ; |
c5c77ba1 | 4128 | strWID.enuWIDtype = WID_STR; |
63d03e47 | 4129 | strWID.ps8WidVal = (u8 *)WILC_MALLOC(BLOCK_ACK_REQ_SIZE); |
c5c77ba1 JK |
4130 | strWID.s32ValueSize = BLOCK_ACK_REQ_SIZE; |
4131 | ptr = strWID.ps8WidVal; | |
4132 | /* *ptr++ = 0x14; */ | |
4133 | *ptr++ = 0x14; | |
4134 | *ptr++ = 0x3; | |
4135 | *ptr++ = 0x0; | |
d00d2ba3 | 4136 | memcpy(ptr, strHostIfBASessionInfo->au8Bssid, ETH_ALEN); |
c5c77ba1 JK |
4137 | ptr += ETH_ALEN; |
4138 | *ptr++ = strHostIfBASessionInfo->u8Ted; | |
4139 | /* BA Policy*/ | |
4140 | *ptr++ = 1; | |
4141 | /* Buffer size*/ | |
4142 | *ptr++ = (strHostIfBASessionInfo->u16BufferSize & 0xFF); | |
4143 | *ptr++ = ((strHostIfBASessionInfo->u16BufferSize >> 16) & 0xFF); | |
4144 | /* BA timeout*/ | |
4145 | *ptr++ = (strHostIfBASessionInfo->u16SessionTimeout & 0xFF); | |
4146 | *ptr++ = ((strHostIfBASessionInfo->u16SessionTimeout >> 16) & 0xFF); | |
4147 | /* ADDBA timeout*/ | |
4148 | *ptr++ = (AddbaTimeout & 0xFF); | |
4149 | *ptr++ = ((AddbaTimeout >> 16) & 0xFF); | |
4150 | /* Group Buffer Max Frames*/ | |
4151 | *ptr++ = 8; | |
4152 | /* Group Buffer Timeout */ | |
4153 | *ptr++ = 0; | |
4154 | ||
72ed4dc7 | 4155 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
4156 | if (s32Error) |
4157 | PRINT_D(HOSTINF_DBG, "Couldn't open BA Session\n"); | |
4158 | ||
4159 | ||
d85f5326 | 4160 | strWID.u16WIDid = (u16)WID_11E_P_ACTION_REQ; |
c5c77ba1 JK |
4161 | strWID.enuWIDtype = WID_STR; |
4162 | strWID.s32ValueSize = 15; | |
4163 | ptr = strWID.ps8WidVal; | |
4164 | /* *ptr++ = 0x14; */ | |
4165 | *ptr++ = 15; | |
4166 | *ptr++ = 7; | |
4167 | *ptr++ = 0x2; | |
d00d2ba3 | 4168 | memcpy(ptr, strHostIfBASessionInfo->au8Bssid, ETH_ALEN); |
c5c77ba1 JK |
4169 | ptr += ETH_ALEN; |
4170 | /* TID*/ | |
4171 | *ptr++ = strHostIfBASessionInfo->u8Ted; | |
4172 | /* Max Num MSDU */ | |
4173 | *ptr++ = 8; | |
4174 | /* BA timeout*/ | |
4175 | *ptr++ = (strHostIfBASessionInfo->u16BufferSize & 0xFF); | |
4176 | *ptr++ = ((strHostIfBASessionInfo->u16SessionTimeout >> 16) & 0xFF); | |
4177 | /*Ack-Policy */ | |
4178 | *ptr++ = 3; | |
72ed4dc7 | 4179 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
4180 | |
4181 | if (strWID.ps8WidVal != NULL) | |
49188af2 | 4182 | kfree(strWID.ps8WidVal); |
c5c77ba1 JK |
4183 | |
4184 | return s32Error; | |
4185 | ||
4186 | } | |
4187 | ||
4188 | ||
4189 | /*BugID_5222*/ | |
4190 | /** | |
4191 | * @brief Handle_DelBASession | |
4192 | * @details Delete block ack session | |
4193 | * @param[in] tstrHostIFSetMulti* strHostIfSetMulti | |
4194 | * @return NONE | |
4195 | * @author Amr Abdel-Moghny | |
4196 | * @date Feb. 2013 | |
4197 | * @version 9.0 | |
4198 | */ | |
2b05df55 | 4199 | static s32 Handle_DelBASession(tstrWILC_WFIDrv *drvHandler, tstrHostIfBASessionInfo *strHostIfBASessionInfo) |
c5c77ba1 | 4200 | { |
fb4ec9ca | 4201 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
4202 | tstrWID strWID; |
4203 | char *ptr = NULL; | |
4204 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
4205 | ||
03b2d5e7 | 4206 | PRINT_D(GENERIC_DBG, "Delete Block Ack session with\nBSSID = %.2x:%.2x:%.2x\nTID=%d\n", |
c5c77ba1 JK |
4207 | strHostIfBASessionInfo->au8Bssid[0], |
4208 | strHostIfBASessionInfo->au8Bssid[1], | |
4209 | strHostIfBASessionInfo->au8Bssid[2], | |
4210 | strHostIfBASessionInfo->u8Ted); | |
4211 | ||
d85f5326 | 4212 | strWID.u16WIDid = (u16)WID_11E_P_ACTION_REQ; |
c5c77ba1 | 4213 | strWID.enuWIDtype = WID_STR; |
63d03e47 | 4214 | strWID.ps8WidVal = (u8 *)WILC_MALLOC(BLOCK_ACK_REQ_SIZE); |
c5c77ba1 JK |
4215 | strWID.s32ValueSize = BLOCK_ACK_REQ_SIZE; |
4216 | ptr = strWID.ps8WidVal; | |
4217 | /* *ptr++ = 0x14; */ | |
4218 | *ptr++ = 0x14; | |
4219 | *ptr++ = 0x3; | |
4220 | *ptr++ = 0x2; | |
d00d2ba3 | 4221 | memcpy(ptr, strHostIfBASessionInfo->au8Bssid, ETH_ALEN); |
c5c77ba1 JK |
4222 | ptr += ETH_ALEN; |
4223 | *ptr++ = strHostIfBASessionInfo->u8Ted; | |
4224 | /* BA direction = recipent*/ | |
4225 | *ptr++ = 0; | |
4226 | /* Delba Reason */ | |
4227 | *ptr++ = 32; /* Unspecific QOS reason */ | |
4228 | ||
72ed4dc7 | 4229 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
4230 | if (s32Error) |
4231 | PRINT_D(HOSTINF_DBG, "Couldn't delete BA Session\n"); | |
4232 | ||
4233 | ||
d85f5326 | 4234 | strWID.u16WIDid = (u16)WID_11E_P_ACTION_REQ; |
c5c77ba1 JK |
4235 | strWID.enuWIDtype = WID_STR; |
4236 | strWID.s32ValueSize = 15; | |
4237 | ptr = strWID.ps8WidVal; | |
4238 | /* *ptr++ = 0x14; */ | |
4239 | *ptr++ = 15; | |
4240 | *ptr++ = 7; | |
4241 | *ptr++ = 0x3; | |
d00d2ba3 | 4242 | memcpy(ptr, strHostIfBASessionInfo->au8Bssid, ETH_ALEN); |
c5c77ba1 JK |
4243 | ptr += ETH_ALEN; |
4244 | /* TID*/ | |
4245 | *ptr++ = strHostIfBASessionInfo->u8Ted; | |
4246 | ||
72ed4dc7 | 4247 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
4248 | |
4249 | if (strWID.ps8WidVal != NULL) | |
49188af2 | 4250 | kfree(strWID.ps8WidVal); |
c5c77ba1 JK |
4251 | |
4252 | /*BugID_5222*/ | |
83383ea3 | 4253 | up(&hWaitResponse); |
c5c77ba1 JK |
4254 | |
4255 | return s32Error; | |
4256 | ||
4257 | } | |
4258 | ||
4259 | ||
4260 | /** | |
4261 | * @brief Handle_DelAllRxBASessions | |
4262 | * @details Delete all Rx BA sessions | |
4263 | * @param[in] tstrHostIFSetMulti* strHostIfSetMulti | |
4264 | * @return NONE | |
4265 | * @author Abdelrahman Sobhy | |
4266 | * @date Feb. 2013 | |
4267 | * @version 9.0 | |
4268 | */ | |
2b05df55 | 4269 | static s32 Handle_DelAllRxBASessions(tstrWILC_WFIDrv *drvHandler, tstrHostIfBASessionInfo *strHostIfBASessionInfo) |
c5c77ba1 | 4270 | { |
fb4ec9ca | 4271 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
4272 | tstrWID strWID; |
4273 | char *ptr = NULL; | |
4274 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
4275 | ||
03b2d5e7 | 4276 | PRINT_D(GENERIC_DBG, "Delete Block Ack session with\nBSSID = %.2x:%.2x:%.2x\nTID=%d\n", |
c5c77ba1 JK |
4277 | strHostIfBASessionInfo->au8Bssid[0], |
4278 | strHostIfBASessionInfo->au8Bssid[1], | |
4279 | strHostIfBASessionInfo->au8Bssid[2], | |
4280 | strHostIfBASessionInfo->u8Ted); | |
4281 | ||
d85f5326 | 4282 | strWID.u16WIDid = (u16)WID_DEL_ALL_RX_BA; |
c5c77ba1 | 4283 | strWID.enuWIDtype = WID_STR; |
63d03e47 | 4284 | strWID.ps8WidVal = (u8 *)WILC_MALLOC(BLOCK_ACK_REQ_SIZE); |
c5c77ba1 JK |
4285 | strWID.s32ValueSize = BLOCK_ACK_REQ_SIZE; |
4286 | ptr = strWID.ps8WidVal; | |
4287 | *ptr++ = 0x14; | |
4288 | *ptr++ = 0x3; | |
4289 | *ptr++ = 0x2; | |
d00d2ba3 | 4290 | memcpy(ptr, strHostIfBASessionInfo->au8Bssid, ETH_ALEN); |
c5c77ba1 JK |
4291 | ptr += ETH_ALEN; |
4292 | *ptr++ = strHostIfBASessionInfo->u8Ted; | |
4293 | /* BA direction = recipent*/ | |
4294 | *ptr++ = 0; | |
4295 | /* Delba Reason */ | |
4296 | *ptr++ = 32; /* Unspecific QOS reason */ | |
4297 | ||
72ed4dc7 | 4298 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
4299 | if (s32Error) |
4300 | PRINT_D(HOSTINF_DBG, "Couldn't delete BA Session\n"); | |
4301 | ||
4302 | ||
4303 | if (strWID.ps8WidVal != NULL) | |
49188af2 | 4304 | kfree(strWID.ps8WidVal); |
c5c77ba1 JK |
4305 | |
4306 | /*BugID_5222*/ | |
83383ea3 | 4307 | up(&hWaitResponse); |
c5c77ba1 JK |
4308 | |
4309 | return s32Error; | |
4310 | ||
4311 | } | |
4312 | ||
4313 | /** | |
4314 | * @brief hostIFthread | |
4315 | * @details Main thread to handle message queue requests | |
4316 | * @param[in] void* pvArg | |
4317 | * @return NONE | |
4318 | * @author | |
4319 | * @date | |
4320 | * @version 1.0 | |
4321 | */ | |
1999bd52 | 4322 | static int hostIFthread(void *pvArg) |
c5c77ba1 | 4323 | { |
4e4467fd | 4324 | u32 u32Ret; |
c5c77ba1 JK |
4325 | tstrHostIFmsg strHostIFmsg; |
4326 | tstrWILC_WFIDrv *pstrWFIDrv; | |
4327 | ||
2cc46837 | 4328 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
4329 | |
4330 | while (1) { | |
b1413b60 | 4331 | WILC_MsgQueueRecv(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), &u32Ret, NULL); |
c5c77ba1 JK |
4332 | pstrWFIDrv = (tstrWILC_WFIDrv *)strHostIFmsg.drvHandler; |
4333 | if (strHostIFmsg.u16MsgId == HOST_IF_MSG_EXIT) { | |
4334 | PRINT_D(GENERIC_DBG, "THREAD: Exiting HostIfThread\n"); | |
4335 | break; | |
4336 | } | |
4337 | ||
4338 | ||
4339 | /*Re-Queue HIF message*/ | |
4340 | if ((!g_wilc_initialized)) { | |
4341 | PRINT_D(GENERIC_DBG, "--WAIT--"); | |
80e29c7a | 4342 | usleep_range(200 * 1000, 200 * 1000); |
b1413b60 | 4343 | WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
4344 | continue; |
4345 | } | |
4346 | ||
4347 | if (strHostIFmsg.u16MsgId == HOST_IF_MSG_CONNECT && pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult != NULL) { | |
4348 | PRINT_D(HOSTINF_DBG, "Requeue connect request till scan done received\n"); | |
b1413b60 | 4349 | WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
80e29c7a | 4350 | usleep_range(2 * 1000, 2 * 1000); |
c5c77ba1 JK |
4351 | continue; |
4352 | } | |
4353 | ||
4354 | switch (strHostIFmsg.u16MsgId) { | |
4355 | case HOST_IF_MSG_Q_IDLE: | |
4356 | Handle_wait_msg_q_empty(); | |
4357 | break; | |
4358 | ||
4359 | case HOST_IF_MSG_SCAN: | |
4360 | Handle_Scan(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr); | |
4361 | break; | |
4362 | ||
4363 | case HOST_IF_MSG_CONNECT: | |
4364 | Handle_Connect(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr); | |
4365 | break; | |
4366 | ||
4367 | /*BugID_5137*/ | |
4368 | case HOST_IF_MSG_FLUSH_CONNECT: | |
4369 | Handle_FlushConnect(strHostIFmsg.drvHandler); | |
4370 | break; | |
4371 | ||
4372 | case HOST_IF_MSG_RCVD_NTWRK_INFO: | |
4373 | Handle_RcvdNtwrkInfo(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strRcvdNetworkInfo); | |
4374 | break; | |
4375 | ||
4376 | case HOST_IF_MSG_RCVD_GNRL_ASYNC_INFO: | |
4377 | Handle_RcvdGnrlAsyncInfo(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strRcvdGnrlAsyncInfo); | |
4378 | break; | |
4379 | ||
4380 | case HOST_IF_MSG_KEY: | |
4381 | Handle_Key(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr); | |
4382 | break; | |
4383 | ||
4384 | case HOST_IF_MSG_CFG_PARAMS: | |
4385 | ||
4386 | Handle_CfgParam(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIFCfgParamAttr); | |
4387 | break; | |
4388 | ||
4389 | case HOST_IF_MSG_SET_CHANNEL: | |
4390 | Handle_SetChannel(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIFSetChan); | |
4391 | break; | |
4392 | ||
4393 | case HOST_IF_MSG_DISCONNECT: | |
4394 | Handle_Disconnect(strHostIFmsg.drvHandler); | |
4395 | break; | |
4396 | ||
4397 | case HOST_IF_MSG_RCVD_SCAN_COMPLETE: | |
334e1a57 | 4398 | WILC_TimerStop(&pstrWFIDrv->hScanTimer); |
c5c77ba1 JK |
4399 | PRINT_D(HOSTINF_DBG, "scan completed successfully\n"); |
4400 | ||
4401 | /*BugID_5213*/ | |
4402 | /*Allow chip sleep, only if both interfaces are not connected*/ | |
2b9d5b48 | 4403 | if (!linux_wlan_get_num_conn_ifcs()) |
c5c77ba1 | 4404 | chip_sleep_manually(INFINITE_SLEEP_TIME); |
c5c77ba1 JK |
4405 | |
4406 | Handle_ScanDone(strHostIFmsg.drvHandler, SCAN_EVENT_DONE); | |
4407 | ||
4408 | #ifdef WILC_P2P | |
4409 | if (pstrWFIDrv->u8RemainOnChan_pendingreq) | |
4410 | Handle_RemainOnChan(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIfRemainOnChan); | |
4411 | #endif | |
4412 | ||
4413 | break; | |
4414 | ||
4415 | case HOST_IF_MSG_GET_RSSI: | |
4416 | Handle_GetRssi(strHostIFmsg.drvHandler); | |
4417 | break; | |
4418 | ||
4419 | case HOST_IF_MSG_GET_LINKSPEED: | |
4420 | Handle_GetLinkspeed(strHostIFmsg.drvHandler); | |
4421 | break; | |
4422 | ||
4423 | case HOST_IF_MSG_GET_STATISTICS: | |
4424 | Handle_GetStatistics(strHostIFmsg.drvHandler, (tstrStatistics *)strHostIFmsg.uniHostIFmsgBody.pUserData); | |
4425 | break; | |
4426 | ||
4427 | case HOST_IF_MSG_GET_CHNL: | |
4428 | Handle_GetChnl(strHostIFmsg.drvHandler); | |
4429 | break; | |
4430 | ||
4431 | #ifdef WILC_AP_EXTERNAL_MLME | |
4432 | case HOST_IF_MSG_ADD_BEACON: | |
4433 | Handle_AddBeacon(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIFSetBeacon); | |
4434 | break; | |
4435 | ||
4436 | case HOST_IF_MSG_DEL_BEACON: | |
4437 | Handle_DelBeacon(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIFDelBeacon); | |
4438 | break; | |
4439 | ||
4440 | case HOST_IF_MSG_ADD_STATION: | |
4441 | Handle_AddStation(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strAddStaParam); | |
4442 | break; | |
4443 | ||
4444 | case HOST_IF_MSG_DEL_STATION: | |
4445 | Handle_DelStation(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strDelStaParam); | |
4446 | break; | |
4447 | ||
4448 | case HOST_IF_MSG_EDIT_STATION: | |
4449 | Handle_EditStation(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strEditStaParam); | |
4450 | break; | |
4451 | ||
4452 | case HOST_IF_MSG_GET_INACTIVETIME: | |
4453 | Handle_Get_InActiveTime(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIfStaInactiveT); | |
4454 | break; | |
4455 | ||
4456 | #endif /*WILC_AP_EXTERNAL_MLME*/ | |
4457 | case HOST_IF_MSG_SCAN_TIMER_FIRED: | |
4458 | PRINT_D(HOSTINF_DBG, "Scan Timeout\n"); | |
4459 | ||
4460 | Handle_ScanDone(strHostIFmsg.drvHandler, SCAN_EVENT_ABORTED); | |
4461 | break; | |
4462 | ||
4463 | case HOST_IF_MSG_CONNECT_TIMER_FIRED: | |
03b2d5e7 | 4464 | PRINT_D(HOSTINF_DBG, "Connect Timeout\n"); |
c5c77ba1 JK |
4465 | Handle_ConnectTimeout(strHostIFmsg.drvHandler); |
4466 | break; | |
4467 | ||
4468 | case HOST_IF_MSG_POWER_MGMT: | |
4469 | Handle_PowerManagement(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strPowerMgmtparam); | |
4470 | break; | |
4471 | ||
4472 | case HOST_IF_MSG_SET_WFIDRV_HANDLER: | |
4473 | Handle_SetWfiDrvHandler(&strHostIFmsg.uniHostIFmsgBody.strHostIfSetDrvHandler); | |
4474 | break; | |
4475 | ||
4476 | case HOST_IF_MSG_SET_OPERATION_MODE: | |
4477 | Handle_SetOperationMode(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIfSetOperationMode); | |
4478 | break; | |
4479 | ||
4480 | case HOST_IF_MSG_SET_IPADDRESS: | |
4481 | PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_SET_IPADDRESS\n"); | |
4482 | Handle_set_IPAddress(strHostIFmsg.drvHandler, strHostIFmsg.uniHostIFmsgBody.strHostIfSetIP.au8IPAddr, strHostIFmsg.uniHostIFmsgBody.strHostIfSetIP.idx); | |
4483 | break; | |
4484 | ||
4485 | case HOST_IF_MSG_GET_IPADDRESS: | |
4486 | PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_SET_IPADDRESS\n"); | |
4487 | Handle_get_IPAddress(strHostIFmsg.drvHandler, strHostIFmsg.uniHostIFmsgBody.strHostIfSetIP.au8IPAddr, strHostIFmsg.uniHostIFmsgBody.strHostIfSetIP.idx); | |
4488 | break; | |
4489 | ||
4490 | /*BugID_5077*/ | |
4491 | case HOST_IF_MSG_SET_MAC_ADDRESS: | |
4492 | Handle_SetMacAddress(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIfSetMacAddress); | |
4493 | break; | |
4494 | ||
4495 | /*BugID_5213*/ | |
4496 | case HOST_IF_MSG_GET_MAC_ADDRESS: | |
4497 | Handle_GetMacAddress(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIfGetMacAddress); | |
4498 | break; | |
4499 | ||
4500 | #ifdef WILC_P2P | |
4501 | case HOST_IF_MSG_REMAIN_ON_CHAN: | |
4502 | PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_REMAIN_ON_CHAN\n"); | |
4503 | Handle_RemainOnChan(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIfRemainOnChan); | |
4504 | break; | |
4505 | ||
4506 | case HOST_IF_MSG_REGISTER_FRAME: | |
4507 | PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_REGISTER_FRAME\n"); | |
4508 | Handle_RegisterFrame(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIfRegisterFrame); | |
4509 | break; | |
4510 | ||
4511 | case HOST_IF_MSG_LISTEN_TIMER_FIRED: | |
4512 | Handle_ListenStateExpired(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIfRemainOnChan); | |
4513 | break; | |
4514 | ||
4515 | #endif | |
4516 | case HOST_IF_MSG_SET_MULTICAST_FILTER: | |
4517 | PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_SET_MULTICAST_FILTER\n"); | |
4518 | Handle_SetMulticastFilter(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIfSetMulti); | |
4519 | break; | |
4520 | ||
4521 | /*BugID_5222*/ | |
4522 | case HOST_IF_MSG_ADD_BA_SESSION: | |
4523 | Handle_AddBASession(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIfBASessionInfo); | |
4524 | break; | |
4525 | ||
4526 | case HOST_IF_MSG_DEL_ALL_RX_BA_SESSIONS: | |
4527 | Handle_DelAllRxBASessions(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIfBASessionInfo); | |
4528 | break; | |
4529 | ||
4530 | case HOST_IF_MSG_DEL_ALL_STA: | |
4531 | Handle_DelAllSta(strHostIFmsg.drvHandler, &strHostIFmsg.uniHostIFmsgBody.strHostIFDelAllSta); | |
4532 | break; | |
4533 | ||
4534 | default: | |
03b2d5e7 | 4535 | PRINT_ER("[Host Interface] undefined Received Msg ID\n"); |
c5c77ba1 JK |
4536 | break; |
4537 | } | |
4538 | } | |
4539 | ||
4540 | PRINT_D(HOSTINF_DBG, "Releasing thread exit semaphore\n"); | |
83383ea3 | 4541 | up(&hSemHostIFthrdEnd); |
1999bd52 | 4542 | return 0; |
c5c77ba1 JK |
4543 | } |
4544 | ||
4545 | static void TimerCB_Scan(void *pvArg) | |
4546 | { | |
4547 | tstrHostIFmsg strHostIFmsg; | |
4548 | ||
4549 | /* prepare the Timer Callback message */ | |
2cc46837 | 4550 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
4551 | strHostIFmsg.drvHandler = pvArg; |
4552 | strHostIFmsg.u16MsgId = HOST_IF_MSG_SCAN_TIMER_FIRED; | |
4553 | ||
4554 | /* send the message */ | |
b1413b60 | 4555 | WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
4556 | } |
4557 | ||
4558 | static void TimerCB_Connect(void *pvArg) | |
4559 | { | |
4560 | tstrHostIFmsg strHostIFmsg; | |
4561 | ||
4562 | /* prepare the Timer Callback message */ | |
2cc46837 | 4563 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
4564 | strHostIFmsg.drvHandler = pvArg; |
4565 | strHostIFmsg.u16MsgId = HOST_IF_MSG_CONNECT_TIMER_FIRED; | |
4566 | ||
4567 | /* send the message */ | |
b1413b60 | 4568 | WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
4569 | } |
4570 | ||
4571 | ||
4572 | /** | |
4573 | * @brief removes wpa/wpa2 keys | |
4574 | * @details only in BSS STA mode if External Supplicant support is enabled. | |
4575 | * removes all WPA/WPA2 station key entries from MAC hardware. | |
4576 | * @param[in,out] handle to the wifi driver | |
4577 | * @param[in] 6 bytes of Station Adress in the station entry table | |
4578 | * @return Error code indicating success/failure | |
4579 | * @note | |
4580 | * @author zsalah | |
4581 | * @date 8 March 2012 | |
4582 | * @version 1.0 | |
4583 | */ | |
4584 | /* Check implementation in core adding 9 bytes to the input! */ | |
218dc407 | 4585 | s32 host_int_remove_key(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8StaAddress) |
c5c77ba1 | 4586 | { |
fb4ec9ca | 4587 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
4588 | tstrWID strWID; |
4589 | /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */ | |
4590 | ||
d85f5326 | 4591 | strWID.u16WIDid = (u16)WID_REMOVE_KEY; |
c5c77ba1 | 4592 | strWID.enuWIDtype = WID_STR; |
ca356ada | 4593 | strWID.ps8WidVal = (s8 *)pu8StaAddress; |
c5c77ba1 JK |
4594 | strWID.s32ValueSize = 6; |
4595 | ||
4596 | return s32Error; | |
4597 | ||
4598 | } | |
4599 | ||
4600 | /** | |
4601 | * @brief removes WEP key | |
4602 | * @details valid only in BSS STA mode if External Supplicant support is enabled. | |
4603 | * remove a WEP key entry from MAC HW. | |
4604 | * The BSS Station automatically finds the index of the entry using its | |
4605 | * BSS ID and removes that entry from the MAC hardware. | |
4606 | * @param[in,out] handle to the wifi driver | |
4607 | * @param[in] 6 bytes of Station Adress in the station entry table | |
4608 | * @return Error code indicating success/failure | |
4609 | * @note NO need for the STA add since it is not used for processing | |
4610 | * @author zsalah | |
4611 | * @date 8 March 2012 | |
4612 | * @version 1.0 | |
4613 | */ | |
218dc407 | 4614 | s32 host_int_remove_wep_key(tstrWILC_WFIDrv *hWFIDrv, u8 u8keyIdx) |
c5c77ba1 | 4615 | { |
fb4ec9ca | 4616 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
4617 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
4618 | tstrHostIFmsg strHostIFmsg; | |
4619 | ||
4620 | ||
2b9d5b48 | 4621 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 4622 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
4623 | |
4624 | /* prepare the Remove Wep Key Message */ | |
2cc46837 | 4625 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
4626 | |
4627 | ||
4628 | strHostIFmsg.u16MsgId = HOST_IF_MSG_KEY; | |
4629 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.enuKeyType = WEP; | |
4630 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.u8KeyAction = REMOVEKEY; | |
4631 | strHostIFmsg.drvHandler = hWFIDrv; | |
4632 | ||
4633 | ||
4634 | ||
4635 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4636 | uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = u8keyIdx; | |
4637 | ||
4638 | /* send the message */ | |
b1413b60 | 4639 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 | 4640 | if (s32Error) |
03b2d5e7 | 4641 | PRINT_ER("Error in sending message queue : Request to remove WEP key\n"); |
83383ea3 | 4642 | down(&(pstrWFIDrv->hSemTestKeyBlock)); |
c5c77ba1 JK |
4643 | |
4644 | WILC_CATCH(s32Error) | |
4645 | { | |
4646 | ||
4647 | } | |
4648 | return s32Error; | |
4649 | } | |
4650 | ||
4651 | /** | |
4652 | * @brief sets WEP default key | |
4653 | * @details Sets the index of the WEP encryption key in use, | |
4654 | * in the key table | |
4655 | * @param[in,out] handle to the wifi driver | |
4656 | * @param[in] key index ( 0, 1, 2, 3) | |
4657 | * @return Error code indicating success/failure | |
4658 | * @note | |
4659 | * @author zsalah | |
4660 | * @date 8 March 2012 | |
4661 | * @version 1.0 | |
4662 | */ | |
218dc407 | 4663 | s32 host_int_set_WEPDefaultKeyID(tstrWILC_WFIDrv *hWFIDrv, u8 u8Index) |
c5c77ba1 | 4664 | { |
fb4ec9ca | 4665 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
4666 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
4667 | tstrHostIFmsg strHostIFmsg; | |
4668 | ||
4669 | ||
2b9d5b48 | 4670 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 4671 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
4672 | |
4673 | /* prepare the Key Message */ | |
2cc46837 | 4674 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
4675 | |
4676 | ||
4677 | strHostIFmsg.u16MsgId = HOST_IF_MSG_KEY; | |
4678 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.enuKeyType = WEP; | |
4679 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.u8KeyAction = DEFAULTKEY; | |
4680 | strHostIFmsg.drvHandler = hWFIDrv; | |
4681 | ||
4682 | ||
4683 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4684 | uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = u8Index; | |
4685 | ||
4686 | /* send the message */ | |
b1413b60 | 4687 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
4688 | if (s32Error) |
4689 | PRINT_ER("Error in sending message queue : Default key index\n"); | |
83383ea3 | 4690 | down(&(pstrWFIDrv->hSemTestKeyBlock)); |
c5c77ba1 JK |
4691 | |
4692 | WILC_CATCH(s32Error) | |
4693 | { | |
4694 | ||
4695 | } | |
4696 | ||
4697 | return s32Error; | |
4698 | } | |
4699 | ||
4700 | /** | |
4701 | * @brief sets WEP deafault key | |
4702 | * @details valid only in BSS STA mode if External Supplicant support is enabled. | |
4703 | * sets WEP key entry into MAC hardware when it receives the | |
4704 | * corresponding request from NDIS. | |
4705 | * @param[in,out] handle to the wifi driver | |
4706 | * @param[in] message containing WEP Key in the following format | |
4707 | *|---------------------------------------| | |
4708 | *|Key ID Value | Key Length | Key | | |
4709 | *|-------------|------------|------------| | |
4710 | | 1byte | 1byte | Key Length | | |
4711 | ||---------------------------------------| | |
4712 | | | |
4713 | * @return Error code indicating success/failure | |
4714 | * @note | |
4715 | * @author zsalah | |
4716 | * @date 8 March 2012 | |
4717 | * @version 1.0 | |
4718 | */ | |
218dc407 | 4719 | s32 host_int_add_wep_key_bss_sta(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8WepKey, u8 u8WepKeylen, u8 u8Keyidx) |
c5c77ba1 JK |
4720 | { |
4721 | ||
fb4ec9ca | 4722 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
4723 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
4724 | tstrHostIFmsg strHostIFmsg; | |
4725 | ||
2b9d5b48 | 4726 | if (pstrWFIDrv == NULL) |
c5c77ba1 JK |
4727 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
4728 | ||
c5c77ba1 JK |
4729 | |
4730 | /* prepare the Key Message */ | |
2cc46837 | 4731 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
4732 | |
4733 | ||
4734 | strHostIFmsg.u16MsgId = HOST_IF_MSG_KEY; | |
4735 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.enuKeyType = WEP; | |
4736 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.u8KeyAction = ADDKEY; | |
4737 | strHostIFmsg.drvHandler = hWFIDrv; | |
4738 | ||
4739 | ||
4740 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
63d03e47 | 4741 | uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey = (u8 *)WILC_MALLOC(u8WepKeylen); |
c5c77ba1 | 4742 | |
d00d2ba3 | 4743 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey, |
c5c77ba1 JK |
4744 | pu8WepKey, u8WepKeylen); |
4745 | ||
4746 | ||
4747 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4748 | uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen = (u8WepKeylen); | |
4749 | ||
4750 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4751 | uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = u8Keyidx; | |
4752 | ||
4753 | /* send the message */ | |
b1413b60 | 4754 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
4755 | if (s32Error) |
4756 | PRINT_ER("Error in sending message queue :WEP Key\n"); | |
83383ea3 | 4757 | down(&(pstrWFIDrv->hSemTestKeyBlock)); |
c5c77ba1 JK |
4758 | |
4759 | WILC_CATCH(s32Error) | |
4760 | { | |
4761 | ||
4762 | } | |
4763 | return s32Error; | |
4764 | ||
4765 | } | |
4766 | ||
4767 | #ifdef WILC_AP_EXTERNAL_MLME | |
4768 | /** | |
4769 | * | |
4770 | * @brief host_int_add_wep_key_bss_ap | |
4771 | * @details valid only in BSS AP mode if External Supplicant support is enabled. | |
4772 | * sets WEP key entry into MAC hardware when it receives the | |
4773 | * | |
4774 | * corresponding request from NDIS. | |
4775 | * @param[in,out] handle to the wifi driver | |
4776 | * | |
4777 | * | |
4778 | * @return Error code indicating success/failure | |
4779 | * @note | |
4780 | * @author mdaftedar | |
4781 | * @date 28 FEB 2013 | |
4782 | * @version 1.0 | |
4783 | */ | |
218dc407 | 4784 | s32 host_int_add_wep_key_bss_ap(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8WepKey, u8 u8WepKeylen, u8 u8Keyidx, u8 u8mode, AUTHTYPE_T tenuAuth_type) |
c5c77ba1 JK |
4785 | { |
4786 | ||
fb4ec9ca | 4787 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
4788 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
4789 | tstrHostIFmsg strHostIFmsg; | |
63d03e47 | 4790 | u8 i; |
c5c77ba1 | 4791 | |
2b9d5b48 | 4792 | if (pstrWFIDrv == NULL) |
c5c77ba1 JK |
4793 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
4794 | ||
c5c77ba1 JK |
4795 | |
4796 | /* prepare the Key Message */ | |
2cc46837 | 4797 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
4798 | |
4799 | if (INFO) { | |
4800 | for (i = 0; i < u8WepKeylen; i++) | |
4801 | PRINT_INFO(HOSTAPD_DBG, "KEY is %x\n", pu8WepKey[i]); | |
4802 | } | |
4803 | strHostIFmsg.u16MsgId = HOST_IF_MSG_KEY; | |
4804 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.enuKeyType = WEP; | |
4805 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.u8KeyAction = ADDKEY_AP; | |
4806 | strHostIFmsg.drvHandler = hWFIDrv; | |
4807 | ||
4808 | ||
4809 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
63d03e47 | 4810 | uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey = (u8 *)WILC_MALLOC((u8WepKeylen)); |
c5c77ba1 JK |
4811 | |
4812 | ||
d00d2ba3 | 4813 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey, |
c5c77ba1 JK |
4814 | pu8WepKey, (u8WepKeylen)); |
4815 | ||
4816 | ||
4817 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4818 | uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen = (u8WepKeylen); | |
4819 | ||
4820 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4821 | uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = u8Keyidx; | |
4822 | ||
4823 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4824 | uniHostIFkeyAttr.strHostIFwepAttr.u8mode = u8mode; | |
4825 | ||
4826 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4827 | uniHostIFkeyAttr.strHostIFwepAttr.tenuAuth_type = tenuAuth_type; | |
4828 | /* send the message */ | |
b1413b60 | 4829 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
4830 | |
4831 | if (s32Error) | |
4832 | PRINT_ER("Error in sending message queue :WEP Key\n"); | |
83383ea3 | 4833 | down(&(pstrWFIDrv->hSemTestKeyBlock)); |
c5c77ba1 JK |
4834 | |
4835 | WILC_CATCH(s32Error) | |
4836 | { | |
4837 | ||
4838 | } | |
4839 | return s32Error; | |
4840 | ||
4841 | } | |
4842 | #endif | |
4843 | /** | |
4844 | * @brief adds ptk Key | |
4845 | * @details | |
4846 | * @param[in,out] handle to the wifi driver | |
4847 | * @param[in] message containing PTK Key in the following format | |
4848 | *|-----------------------------------------------------------------------------| | |
4849 | *|Station address | Key Length | Temporal Key | Rx Michael Key |Tx Michael Key | | |
4850 | *|----------------|------------|--------------|----------------|---------------| | |
4851 | | 6 bytes | 1byte | 16 bytes | 8 bytes | 8 bytes | | |
4852 | ||-----------------------------------------------------------------------------| | |
4853 | * @return Error code indicating success/failure | |
4854 | * @note | |
4855 | * @author zsalah | |
4856 | * @date 8 March 2012 | |
4857 | * @version 1.0 | |
4858 | */ | |
218dc407 | 4859 | s32 host_int_add_ptk(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8Ptk, u8 u8PtkKeylen, |
63d03e47 | 4860 | const u8 *mac_addr, const u8 *pu8RxMic, const u8 *pu8TxMic, u8 mode, u8 u8Ciphermode, u8 u8Idx) |
c5c77ba1 | 4861 | { |
fb4ec9ca | 4862 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
4863 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
4864 | tstrHostIFmsg strHostIFmsg; | |
63d03e47 | 4865 | u8 u8KeyLen = u8PtkKeylen; |
4e4467fd | 4866 | u32 i; |
78c87591 | 4867 | |
2b9d5b48 | 4868 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 4869 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
2b9d5b48 | 4870 | if (pu8RxMic != NULL) |
c5c77ba1 | 4871 | u8KeyLen += RX_MIC_KEY_LEN; |
2b9d5b48 | 4872 | if (pu8TxMic != NULL) |
c5c77ba1 | 4873 | u8KeyLen += TX_MIC_KEY_LEN; |
c5c77ba1 JK |
4874 | |
4875 | /* prepare the Key Message */ | |
2cc46837 | 4876 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
4877 | |
4878 | ||
4879 | strHostIFmsg.u16MsgId = HOST_IF_MSG_KEY; | |
4880 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.enuKeyType = WPAPtk; | |
4881 | #ifdef WILC_AP_EXTERNAL_MLME | |
4882 | if (mode == AP_MODE) { | |
4883 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.u8KeyAction = ADDKEY_AP; | |
4884 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4885 | uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx = u8Idx; | |
4886 | } | |
4887 | #endif | |
4888 | if (mode == STATION_MODE) | |
4889 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.u8KeyAction = ADDKEY; | |
4890 | ||
4891 | ||
4892 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
63d03e47 | 4893 | uniHostIFkeyAttr.strHostIFwpaAttr.pu8key = (u8 *)WILC_MALLOC(u8PtkKeylen); |
c5c77ba1 JK |
4894 | |
4895 | ||
d00d2ba3 | 4896 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key, |
c5c77ba1 JK |
4897 | pu8Ptk, u8PtkKeylen); |
4898 | ||
4899 | if (pu8RxMic != NULL) { | |
4900 | ||
d00d2ba3 | 4901 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 16, |
c5c77ba1 JK |
4902 | pu8RxMic, RX_MIC_KEY_LEN); |
4903 | if (INFO) { | |
4904 | for (i = 0; i < RX_MIC_KEY_LEN; i++) | |
4905 | PRINT_INFO(CFG80211_DBG, "PairwiseRx[%d] = %x\n", i, pu8RxMic[i]); | |
4906 | } | |
4907 | } | |
4908 | if (pu8TxMic != NULL) { | |
4909 | ||
d00d2ba3 | 4910 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 24, |
c5c77ba1 JK |
4911 | pu8TxMic, TX_MIC_KEY_LEN); |
4912 | if (INFO) { | |
4913 | for (i = 0; i < TX_MIC_KEY_LEN; i++) | |
4914 | PRINT_INFO(CFG80211_DBG, "PairwiseTx[%d] = %x\n", i, pu8TxMic[i]); | |
4915 | } | |
4916 | } | |
4917 | ||
4918 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4919 | uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen = u8KeyLen; | |
4920 | ||
4921 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4922 | uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode = u8Ciphermode; | |
4923 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
4924 | uniHostIFkeyAttr.strHostIFwpaAttr.pu8macaddr = mac_addr; | |
4925 | strHostIFmsg.drvHandler = hWFIDrv; | |
4926 | ||
4927 | /* send the message */ | |
b1413b60 | 4928 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
4929 | |
4930 | if (s32Error) | |
4931 | PRINT_ER("Error in sending message queue: PTK Key\n"); | |
4932 | ||
4933 | /* ////////////// */ | |
83383ea3 | 4934 | down(&(pstrWFIDrv->hSemTestKeyBlock)); |
c5c77ba1 JK |
4935 | /* /////// */ |
4936 | ||
4937 | WILC_CATCH(s32Error) | |
4938 | { | |
4939 | ||
4940 | } | |
4941 | ||
4942 | return s32Error; | |
4943 | } | |
4944 | ||
4945 | /** | |
4946 | * @brief adds Rx GTk Key | |
4947 | * @details | |
4948 | * @param[in,out] handle to the wifi driver | |
4949 | * @param[in] pu8RxGtk : contains temporal key | Rx Mic | Tx Mic | |
4950 | * u8GtkKeylen :The total key length | |
4951 | * | |
4952 | * @return Error code indicating success/failure | |
4953 | * @note | |
4954 | * @author zsalah | |
4955 | * @date 8 March 2012 | |
4956 | * @version 1.0 | |
4957 | */ | |
218dc407 | 4958 | s32 host_int_add_rx_gtk(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8RxGtk, u8 u8GtkKeylen, |
4e4467fd | 4959 | u8 u8KeyIdx, u32 u32KeyRSClen, const u8 *KeyRSC, |
63d03e47 | 4960 | const u8 *pu8RxMic, const u8 *pu8TxMic, u8 mode, u8 u8Ciphermode) |
c5c77ba1 | 4961 | { |
fb4ec9ca | 4962 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
4963 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
4964 | tstrHostIFmsg strHostIFmsg; | |
63d03e47 | 4965 | u8 u8KeyLen = u8GtkKeylen; |
c5c77ba1 | 4966 | |
2b9d5b48 | 4967 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 4968 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 4969 | /* prepare the Key Message */ |
2cc46837 | 4970 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
4971 | |
4972 | ||
2b9d5b48 | 4973 | if (pu8RxMic != NULL) |
c5c77ba1 | 4974 | u8KeyLen += RX_MIC_KEY_LEN; |
2b9d5b48 | 4975 | if (pu8TxMic != NULL) |
c5c77ba1 | 4976 | u8KeyLen += TX_MIC_KEY_LEN; |
c5c77ba1 JK |
4977 | if (KeyRSC != NULL) { |
4978 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
63d03e47 | 4979 | uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq = (u8 *)WILC_MALLOC(u32KeyRSClen); |
c5c77ba1 | 4980 | |
d00d2ba3 | 4981 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq, |
c5c77ba1 JK |
4982 | KeyRSC, u32KeyRSClen); |
4983 | } | |
4984 | ||
4985 | ||
4986 | strHostIFmsg.u16MsgId = HOST_IF_MSG_KEY; | |
4987 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.enuKeyType = WPARxGtk; | |
4988 | strHostIFmsg.drvHandler = hWFIDrv; | |
4989 | ||
4990 | #ifdef WILC_AP_EXTERNAL_MLME | |
4991 | if (mode == AP_MODE) { | |
4992 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.u8KeyAction = ADDKEY_AP; | |
4993 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode = u8Ciphermode; | |
4994 | } | |
4995 | #endif | |
4996 | if (mode == STATION_MODE) | |
4997 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.u8KeyAction = ADDKEY; | |
4998 | ||
4999 | ||
5000 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
63d03e47 | 5001 | uniHostIFkeyAttr.strHostIFwpaAttr.pu8key = (u8 *)WILC_MALLOC(u8KeyLen); |
c5c77ba1 | 5002 | |
d00d2ba3 | 5003 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key, |
c5c77ba1 JK |
5004 | pu8RxGtk, u8GtkKeylen); |
5005 | ||
5006 | if (pu8RxMic != NULL) { | |
5007 | ||
d00d2ba3 | 5008 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 16, |
c5c77ba1 JK |
5009 | pu8RxMic, RX_MIC_KEY_LEN); |
5010 | ||
5011 | } | |
5012 | if (pu8TxMic != NULL) { | |
5013 | ||
d00d2ba3 | 5014 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 24, |
c5c77ba1 JK |
5015 | pu8TxMic, TX_MIC_KEY_LEN); |
5016 | ||
5017 | } | |
5018 | ||
5019 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
5020 | uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx = u8KeyIdx; | |
5021 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
5022 | uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen = u8KeyLen; | |
5023 | ||
5024 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr. | |
5025 | uniHostIFkeyAttr.strHostIFwpaAttr.u8seqlen = u32KeyRSClen; | |
5026 | ||
5027 | ||
5028 | ||
5029 | /* send the message */ | |
b1413b60 | 5030 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
5031 | if (s32Error) |
5032 | PRINT_ER("Error in sending message queue: RX GTK\n"); | |
5033 | /* ////////////// */ | |
83383ea3 | 5034 | down(&(pstrWFIDrv->hSemTestKeyBlock)); |
c5c77ba1 JK |
5035 | /* /////// */ |
5036 | ||
5037 | WILC_CATCH(s32Error) | |
5038 | { | |
5039 | ||
5040 | } | |
5041 | return s32Error; | |
5042 | } | |
c5c77ba1 | 5043 | |
c5c77ba1 JK |
5044 | /** |
5045 | * @brief host_int_set_pmkid_info | |
5046 | * @details caches the pmkid valid only in BSS STA mode if External Supplicant | |
5047 | * support is enabled. This Function sets the PMKID in firmware | |
5048 | * when host drivr receives the corresponding request from NDIS. | |
5049 | * The firmware then includes theset PMKID in the appropriate | |
5050 | * management frames | |
5051 | * @param[in,out] handle to the wifi driver | |
5052 | * @param[in] message containing PMKID Info in the following format | |
5053 | *|-----------------------------------------------------------------| | |
5054 | *|NumEntries | BSSID[1] | PMKID[1] | ... | BSSID[K] | PMKID[K] | | |
5055 | *|-----------|------------|----------|-------|----------|----------| | |
5056 | | 1 | 6 | 16 | ... | 6 | 16 | | |
5057 | ||-----------------------------------------------------------------| | |
5058 | * @return Error code indicating success/failure | |
5059 | * @note | |
5060 | * @author zsalah | |
5061 | * @date 8 March 2012 | |
5062 | * @version 1.0 | |
5063 | */ | |
218dc407 | 5064 | s32 host_int_set_pmkid_info(tstrWILC_WFIDrv *hWFIDrv, tstrHostIFpmkidAttr *pu8PmkidInfoArray) |
c5c77ba1 | 5065 | { |
fb4ec9ca | 5066 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5067 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
5068 | tstrHostIFmsg strHostIFmsg; | |
4e4467fd | 5069 | u32 i; |
c5c77ba1 JK |
5070 | |
5071 | ||
2b9d5b48 | 5072 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 5073 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
5074 | |
5075 | /* prepare the Key Message */ | |
2cc46837 | 5076 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
5077 | |
5078 | strHostIFmsg.u16MsgId = HOST_IF_MSG_KEY; | |
5079 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.enuKeyType = PMKSA; | |
5080 | strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.u8KeyAction = ADDKEY; | |
5081 | strHostIFmsg.drvHandler = hWFIDrv; | |
5082 | ||
5083 | for (i = 0; i < pu8PmkidInfoArray->numpmkid; i++) { | |
5084 | ||
d00d2ba3 | 5085 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].bssid, &pu8PmkidInfoArray->pmkidlist[i].bssid, |
c5c77ba1 JK |
5086 | ETH_ALEN); |
5087 | ||
d00d2ba3 | 5088 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFkeyAttr.uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].pmkid, &pu8PmkidInfoArray->pmkidlist[i].pmkid, |
c5c77ba1 JK |
5089 | PMKID_LEN); |
5090 | } | |
5091 | ||
5092 | /* send the message */ | |
b1413b60 | 5093 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
5094 | if (s32Error) |
5095 | PRINT_ER(" Error in sending messagequeue: PMKID Info\n"); | |
5096 | ||
5097 | WILC_CATCH(s32Error) | |
5098 | { | |
5099 | ||
5100 | } | |
5101 | ||
5102 | return s32Error; | |
5103 | } | |
5104 | ||
5105 | /** | |
5106 | * @brief gets the cached the pmkid info | |
5107 | * @details valid only in BSS STA mode if External Supplicant | |
5108 | * support is enabled. This Function sets the PMKID in firmware | |
5109 | * when host drivr receives the corresponding request from NDIS. | |
5110 | * The firmware then includes theset PMKID in the appropriate | |
5111 | * management frames | |
5112 | * @param[in,out] handle to the wifi driver, | |
5113 | * message containing PMKID Info in the following format | |
5114 | *|-----------------------------------------------------------------| | |
5115 | *|NumEntries | BSSID[1] | PMKID[1] | ... | BSSID[K] | PMKID[K] | | |
5116 | *|-----------|------------|----------|-------|----------|----------| | |
5117 | | 1 | 6 | 16 | ... | 6 | 16 | | |
5118 | ||-----------------------------------------------------------------| | |
5119 | * @param[in] | |
5120 | * @return Error code indicating success/failure | |
5121 | * @note | |
5122 | * @author zsalah | |
5123 | * @date 8 March 2012 | |
5124 | * @version 1.0 | |
5125 | */ | |
218dc407 | 5126 | s32 host_int_get_pmkid_info(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8PmkidInfoArray, |
4e4467fd | 5127 | u32 u32PmkidInfoLen) |
c5c77ba1 | 5128 | { |
fb4ec9ca | 5129 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5130 | tstrWID strWID; |
5131 | /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */ | |
5132 | ||
d85f5326 | 5133 | strWID.u16WIDid = (u16)WID_PMKID_INFO; |
c5c77ba1 JK |
5134 | strWID.enuWIDtype = WID_STR; |
5135 | strWID.s32ValueSize = u32PmkidInfoLen; | |
5136 | strWID.ps8WidVal = pu8PmkidInfoArray; | |
5137 | ||
5138 | return s32Error; | |
5139 | } | |
5140 | ||
5141 | /** | |
5142 | * @brief sets the pass phrase | |
5143 | * @details AP/STA mode. This function gives the pass phrase used to | |
5144 | * generate the Pre-Shared Key when WPA/WPA2 is enabled | |
5145 | * The length of the field can vary from 8 to 64 bytes, | |
5146 | * the lower layer should get the | |
5147 | * @param[in,out] handle to the wifi driver, | |
5148 | * @param[in] String containing PSK | |
5149 | * @return Error code indicating success/failure | |
5150 | * @note | |
5151 | * @author zsalah | |
5152 | * @date 8 March 2012 | |
5153 | * @version 1.0 | |
5154 | */ | |
218dc407 | 5155 | s32 host_int_set_RSNAConfigPSKPassPhrase(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8PassPhrase, |
63d03e47 | 5156 | u8 u8Psklength) |
c5c77ba1 | 5157 | { |
fb4ec9ca | 5158 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 5159 | tstrWID strWID; |
c5c77ba1 | 5160 | |
c5c77ba1 JK |
5161 | /*validating psk length*/ |
5162 | if ((u8Psklength > 7) && (u8Psklength < 65)) { | |
d85f5326 | 5163 | strWID.u16WIDid = (u16)WID_11I_PSK; |
c5c77ba1 JK |
5164 | strWID.enuWIDtype = WID_STR; |
5165 | strWID.ps8WidVal = pu8PassPhrase; | |
5166 | strWID.s32ValueSize = u8Psklength; | |
5167 | } | |
5168 | ||
5169 | return s32Error; | |
5170 | } | |
5171 | /** | |
5172 | * @brief host_int_get_MacAddress | |
5173 | * @details gets mac address | |
5174 | * @param[in,out] handle to the wifi driver, | |
5175 | * | |
5176 | * @return Error code indicating success/failure | |
5177 | * @note | |
5178 | * @author mdaftedar | |
5179 | * @date 19 April 2012 | |
5180 | * @version 1.0 | |
5181 | */ | |
218dc407 | 5182 | s32 host_int_get_MacAddress(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8MacAddress) |
c5c77ba1 | 5183 | { |
fb4ec9ca | 5184 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5185 | tstrHostIFmsg strHostIFmsg; |
5186 | ||
5187 | ||
5188 | /* prepare the Message */ | |
2cc46837 | 5189 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
5190 | |
5191 | strHostIFmsg.u16MsgId = HOST_IF_MSG_GET_MAC_ADDRESS; | |
5192 | strHostIFmsg.uniHostIFmsgBody.strHostIfGetMacAddress.u8MacAddress = pu8MacAddress; | |
5193 | strHostIFmsg.drvHandler = hWFIDrv; | |
5194 | /* send the message */ | |
b1413b60 | 5195 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
5196 | if (s32Error) { |
5197 | PRINT_ER("Failed to send get mac address\n"); | |
5198 | return WILC_FAIL; | |
5199 | } | |
5200 | ||
83383ea3 | 5201 | down(&hWaitResponse); |
c5c77ba1 JK |
5202 | return s32Error; |
5203 | } | |
5204 | ||
5205 | /** | |
5206 | * @brief host_int_set_MacAddress | |
5207 | * @details sets mac address | |
5208 | * @param[in,out] handle to the wifi driver, | |
5209 | * | |
5210 | * @return Error code indicating success/failure | |
5211 | * @note | |
5212 | * @author mabubakr | |
5213 | * @date 16 July 2012 | |
5214 | * @version 1.0 | |
5215 | */ | |
218dc407 | 5216 | s32 host_int_set_MacAddress(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8MacAddress) |
c5c77ba1 | 5217 | { |
fb4ec9ca | 5218 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5219 | tstrHostIFmsg strHostIFmsg; |
5220 | ||
5221 | PRINT_D(GENERIC_DBG, "mac addr = %x:%x:%x\n", pu8MacAddress[0], pu8MacAddress[1], pu8MacAddress[2]); | |
5222 | ||
5223 | /* prepare setting mac address message */ | |
2cc46837 | 5224 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 | 5225 | strHostIFmsg.u16MsgId = HOST_IF_MSG_SET_MAC_ADDRESS; |
d00d2ba3 | 5226 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIfSetMacAddress.u8MacAddress, pu8MacAddress, ETH_ALEN); |
c5c77ba1 JK |
5227 | strHostIFmsg.drvHandler = hWFIDrv; |
5228 | ||
b1413b60 | 5229 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
5230 | if (s32Error) { |
5231 | PRINT_ER("Failed to send message queue: Set mac address\n"); | |
5232 | WILC_ERRORREPORT(s32Error, s32Error); | |
5233 | } | |
5234 | WILC_CATCH(s32Error) | |
5235 | { | |
5236 | ||
5237 | } | |
5238 | ||
5239 | return s32Error; | |
5240 | ||
5241 | } | |
5242 | ||
5243 | /** | |
5244 | * @brief host_int_get_RSNAConfigPSKPassPhrase | |
5245 | * @details gets the pass phrase:AP/STA mode. This function gets the pass phrase used to | |
5246 | * generate the Pre-Shared Key when WPA/WPA2 is enabled | |
5247 | * The length of the field can vary from 8 to 64 bytes, | |
5248 | * the lower layer should get the | |
5249 | * @param[in,out] handle to the wifi driver, | |
5250 | * String containing PSK | |
5251 | * @return Error code indicating success/failure | |
5252 | * @note | |
5253 | * @author zsalah | |
5254 | * @date 8 March 2012 | |
5255 | * @version 1.0 | |
5256 | */ | |
218dc407 | 5257 | s32 host_int_get_RSNAConfigPSKPassPhrase(tstrWILC_WFIDrv *hWFIDrv, |
63d03e47 | 5258 | u8 *pu8PassPhrase, u8 u8Psklength) |
c5c77ba1 | 5259 | { |
fb4ec9ca | 5260 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5261 | tstrWID strWID; |
5262 | /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */ | |
5263 | ||
d85f5326 | 5264 | strWID.u16WIDid = (u16)WID_11I_PSK; |
c5c77ba1 JK |
5265 | strWID.enuWIDtype = WID_STR; |
5266 | strWID.s32ValueSize = u8Psklength; | |
5267 | strWID.ps8WidVal = pu8PassPhrase; | |
5268 | ||
5269 | return s32Error; | |
5270 | } | |
5271 | ||
5272 | /** | |
5273 | * @brief host_int_get_site_survey_results | |
5274 | * @details gets the site survey results | |
5275 | * @param[in,out] handle to the wifi driver, | |
5276 | * Message containing site survey results in the | |
5277 | * following format | |
5278 | *|---------------------------------------------------| | |
5279 | | MsgLength | fragNo. | MsgBodyLength | MsgBody | | |
5280 | ||-----------|-----------|---------------|-----------| | |
5281 | | 1 | 1 | 1 | 1 | | |
5282 | | ----------------------------------------- | ---------------- | |
5283 | | | |
5284 | ||---------------------------------------| | |
5285 | | Network1 | Netweork2 | ... | Network5 | | |
5286 | ||---------------------------------------| | |
5287 | | 44 | 44 | ... | 44 | | |
5288 | | -------------------------- | --------------------------------------- | |
5289 | | | |
5290 | ||---------------------------------------------------------------------| | |
5291 | | SSID | BSS Type | Channel | Security Status| BSSID | RSSI |Reserved | | |
5292 | | | |
5293 | | | |
5294 | ||------|----------|---------|----------------|-------|------|---------| | |
5295 | | 33 | 1 | 1 | 1 | 6 | 1 | 1 | | |
5296 | ||---------------------------------------------------------------------| | |
5297 | * @return Error code indicating success/failure | |
5298 | * @note | |
5299 | * @author zsalah | |
5300 | * @date 8 March 2012 | |
5301 | * @version 1.0 | |
5302 | */ | |
5303 | #ifndef CONNECT_DIRECT | |
218dc407 | 5304 | s32 host_int_get_site_survey_results(tstrWILC_WFIDrv *hWFIDrv, |
63d03e47 | 5305 | u8 ppu8RcvdSiteSurveyResults[][MAX_SURVEY_RESULT_FRAG_SIZE], |
4e4467fd | 5306 | u32 u32MaxSiteSrvyFragLen) |
c5c77ba1 | 5307 | { |
fb4ec9ca | 5308 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5309 | tstrWID astrWIDList[2]; |
5310 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; | |
5311 | ||
d85f5326 | 5312 | astrWIDList[0].u16WIDid = (u16)WID_SITE_SURVEY_RESULTS; |
c5c77ba1 JK |
5313 | astrWIDList[0].enuWIDtype = WID_STR; |
5314 | astrWIDList[0].ps8WidVal = ppu8RcvdSiteSurveyResults[0]; | |
5315 | astrWIDList[0].s32ValueSize = u32MaxSiteSrvyFragLen; | |
5316 | ||
d85f5326 | 5317 | astrWIDList[1].u16WIDid = (u16)WID_SITE_SURVEY_RESULTS; |
c5c77ba1 JK |
5318 | astrWIDList[1].enuWIDtype = WID_STR; |
5319 | astrWIDList[1].ps8WidVal = ppu8RcvdSiteSurveyResults[1]; | |
5320 | astrWIDList[1].s32ValueSize = u32MaxSiteSrvyFragLen; | |
5321 | ||
72ed4dc7 | 5322 | s32Error = SendConfigPkt(GET_CFG, astrWIDList, 2, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
5323 | |
5324 | /*get the value by searching the local copy*/ | |
5325 | if (s32Error) { | |
5326 | PRINT_ER("Failed to send config packet to get survey results\n"); | |
5327 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
5328 | } | |
5329 | ||
5330 | WILC_CATCH(s32Error) | |
5331 | { | |
5332 | ||
5333 | } | |
5334 | ||
5335 | return s32Error; | |
5336 | } | |
5337 | #endif | |
5338 | ||
5339 | /** | |
5340 | * @brief sets a start scan request | |
5341 | * @details | |
5342 | * @param[in,out] handle to the wifi driver, | |
5343 | * @param[in] Scan Source one of the following values | |
5344 | * DEFAULT_SCAN 0 | |
5345 | * USER_SCAN BIT0 | |
5346 | * OBSS_PERIODIC_SCAN BIT1 | |
5347 | * OBSS_ONETIME_SCAN BIT2 | |
5348 | * @return Error code indicating success/failure | |
5349 | * @note | |
5350 | * @author zsalah | |
5351 | * @date 8 March 2012 | |
5352 | * @version 1.0 | |
5353 | */ | |
218dc407 | 5354 | s32 host_int_set_start_scan_req(tstrWILC_WFIDrv *hWFIDrv, u8 scanSource) |
c5c77ba1 | 5355 | { |
fb4ec9ca | 5356 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5357 | tstrWID strWID; |
5358 | /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */ | |
5359 | ||
d85f5326 | 5360 | strWID.u16WIDid = (u16)WID_START_SCAN_REQ; |
c5c77ba1 | 5361 | strWID.enuWIDtype = WID_CHAR; |
ca356ada | 5362 | strWID.ps8WidVal = (s8 *)&scanSource; |
576917ad | 5363 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
5364 | |
5365 | return s32Error; | |
5366 | } | |
5367 | ||
5368 | /** | |
5369 | * @brief host_int_get_start_scan_req | |
5370 | * @details gets a start scan request | |
5371 | * @param[in,out] handle to the wifi driver, | |
5372 | * @param[in] Scan Source one of the following values | |
5373 | * DEFAULT_SCAN 0 | |
5374 | * USER_SCAN BIT0 | |
5375 | * OBSS_PERIODIC_SCAN BIT1 | |
5376 | * OBSS_ONETIME_SCAN BIT2 | |
5377 | * @return Error code indicating success/failure | |
5378 | * @note | |
5379 | * @author zsalah | |
5380 | * @date 8 March 2012 | |
5381 | * @version 1.0 | |
5382 | */ | |
5383 | ||
218dc407 | 5384 | s32 host_int_get_start_scan_req(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8ScanSource) |
c5c77ba1 | 5385 | { |
fb4ec9ca | 5386 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5387 | tstrWID strWID; |
5388 | /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */ | |
5389 | ||
d85f5326 | 5390 | strWID.u16WIDid = (u16)WID_START_SCAN_REQ; |
c5c77ba1 | 5391 | strWID.enuWIDtype = WID_CHAR; |
ca356ada | 5392 | strWID.ps8WidVal = (s8 *)pu8ScanSource; |
576917ad | 5393 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
5394 | |
5395 | return s32Error; | |
5396 | } | |
5397 | ||
5398 | /** | |
5399 | * @brief host_int_set_join_req | |
5400 | * @details sets a join request | |
5401 | * @param[in,out] handle to the wifi driver, | |
5402 | * @param[in] Index of the bss descriptor | |
5403 | * @return Error code indicating success/failure | |
5404 | * @note | |
5405 | * @author zsalah | |
5406 | * @date 8 March 2012 | |
5407 | * @version 1.0 | |
5408 | */ | |
218dc407 | 5409 | s32 host_int_set_join_req(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8bssid, |
057d1e97 | 5410 | const u8 *pu8ssid, size_t ssidLen, |
63d03e47 | 5411 | const u8 *pu8IEs, size_t IEsLen, |
c5c77ba1 | 5412 | tWILCpfConnectResult pfConnectResult, void *pvUserArg, |
63d03e47 GKH |
5413 | u8 u8security, AUTHTYPE_T tenuAuth_type, |
5414 | u8 u8channel, | |
c5c77ba1 JK |
5415 | void *pJoinParams) |
5416 | { | |
fb4ec9ca | 5417 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5418 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
5419 | tstrHostIFmsg strHostIFmsg; | |
5420 | tenuScanConnTimer enuScanConnTimer; | |
5421 | ||
2b9d5b48 | 5422 | if (pstrWFIDrv == NULL || pfConnectResult == NULL) |
c5c77ba1 | 5423 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
5424 | |
5425 | if (hWFIDrv == NULL) { | |
5426 | PRINT_ER("Driver not initialized: gWFiDrvHandle = NULL\n"); | |
5427 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
5428 | } | |
5429 | ||
5430 | if (pJoinParams == NULL) { | |
5431 | PRINT_ER("Unable to Join - JoinParams is NULL\n"); | |
5432 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
5433 | ||
5434 | } | |
5435 | /* | |
5436 | * if(gWFiDrvHandle->strWILC_UsrScanReq.u32RcvdChCount == 0) | |
5437 | * { | |
5438 | * PRINT_ER("No scan results exist: Scanning should be done\n"); | |
5439 | * WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
5440 | * } | |
5441 | */ | |
5442 | /* prepare the Connect Message */ | |
2cc46837 | 5443 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
5444 | |
5445 | strHostIFmsg.u16MsgId = HOST_IF_MSG_CONNECT; | |
5446 | ||
5447 | strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.u8security = u8security; | |
5448 | strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.tenuAuth_type = tenuAuth_type; | |
5449 | strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.u8channel = u8channel; | |
5450 | strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.pfConnectResult = pfConnectResult; | |
5451 | strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.pvUserArg = pvUserArg; | |
5452 | strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.pJoinParams = pJoinParams; | |
5453 | strHostIFmsg.drvHandler = hWFIDrv; | |
5454 | ||
5455 | if (pu8bssid != NULL) { | |
63d03e47 | 5456 | strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.pu8bssid = (u8 *)WILC_MALLOC(6); /* will be deallocated by the receiving thread */ |
d00d2ba3 | 5457 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.pu8bssid, |
c5c77ba1 JK |
5458 | pu8bssid, 6); |
5459 | } | |
5460 | ||
5461 | if (pu8ssid != NULL) { | |
5462 | strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.ssidLen = ssidLen; | |
63d03e47 | 5463 | strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.pu8ssid = (u8 *)WILC_MALLOC(ssidLen); /* will be deallocated by the receiving thread */ |
d00d2ba3 | 5464 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.pu8ssid, |
c5c77ba1 JK |
5465 | |
5466 | pu8ssid, ssidLen); | |
5467 | } | |
5468 | ||
5469 | if (pu8IEs != NULL) { | |
5470 | strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.IEsLen = IEsLen; | |
63d03e47 | 5471 | strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.pu8IEs = (u8 *)WILC_MALLOC(IEsLen); /* will be deallocated by the receiving thread */ |
d00d2ba3 | 5472 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFconnectAttr.pu8IEs, |
c5c77ba1 JK |
5473 | pu8IEs, IEsLen); |
5474 | } | |
78174ada | 5475 | if (pstrWFIDrv->enuHostIFstate < HOST_IF_CONNECTING) |
c5c77ba1 | 5476 | pstrWFIDrv->enuHostIFstate = HOST_IF_CONNECTING; |
78174ada | 5477 | else |
c5c77ba1 JK |
5478 | PRINT_D(GENERIC_DBG, "Don't set state to 'connecting' as state is %d\n", pstrWFIDrv->enuHostIFstate); |
5479 | ||
5480 | /* send the message */ | |
b1413b60 | 5481 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
5482 | if (s32Error) { |
5483 | PRINT_ER("Failed to send message queue: Set join request\n"); | |
5484 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
5485 | } | |
5486 | ||
5487 | enuScanConnTimer = CONNECT_TIMER; | |
334e1a57 | 5488 | WILC_TimerStart(&(pstrWFIDrv->hConnectTimer), HOST_IF_CONNECT_TIMEOUT, (void *) hWFIDrv); |
c5c77ba1 JK |
5489 | |
5490 | WILC_CATCH(s32Error) | |
5491 | { | |
5492 | ||
5493 | } | |
5494 | ||
5495 | return s32Error; | |
5496 | } | |
5497 | ||
5498 | /** | |
5499 | * @brief Flush a join request parameters to FW, but actual connection | |
5500 | * @details The function is called in situation where WILC is connected to AP and | |
5501 | * required to switch to hybrid FW for P2P connection | |
5502 | * @param[in] handle to the wifi driver, | |
5503 | * @return Error code indicating success/failure | |
5504 | * @note | |
5505 | * @author Amr Abdel-Moghny | |
5506 | * @date 19 DEC 2013 | |
5507 | * @version 8.0 | |
5508 | */ | |
5509 | ||
218dc407 | 5510 | s32 host_int_flush_join_req(tstrWILC_WFIDrv *hWFIDrv) |
c5c77ba1 | 5511 | { |
fb4ec9ca | 5512 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5513 | tstrHostIFmsg strHostIFmsg; |
5514 | ||
5515 | if (!gu8FlushedJoinReq) { | |
5516 | s32Error = WILC_FAIL; | |
5517 | return s32Error; | |
5518 | } | |
5519 | ||
5520 | ||
2b9d5b48 | 5521 | if (hWFIDrv == NULL) |
c5c77ba1 | 5522 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
5523 | |
5524 | ||
5525 | strHostIFmsg.u16MsgId = HOST_IF_MSG_FLUSH_CONNECT; | |
5526 | strHostIFmsg.drvHandler = hWFIDrv; | |
5527 | ||
5528 | /* send the message */ | |
b1413b60 | 5529 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
5530 | if (s32Error) { |
5531 | PRINT_ER("Failed to send message queue: Flush join request\n"); | |
5532 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
5533 | } | |
5534 | ||
5535 | WILC_CATCH(s32Error) | |
5536 | { | |
5537 | ||
5538 | } | |
5539 | return s32Error; | |
5540 | } | |
5541 | ||
5542 | /** | |
5543 | * @brief host_int_disconnect | |
5544 | * @details disconnects from the currently associated network | |
5545 | * @param[in,out] handle to the wifi driver, | |
5546 | * @param[in] Reason Code of the Disconnection | |
5547 | * @return Error code indicating success/failure | |
5548 | * @note | |
5549 | * @author zsalah | |
5550 | * @date 8 March 2012 | |
5551 | * @version 1.0 | |
5552 | */ | |
218dc407 | 5553 | s32 host_int_disconnect(tstrWILC_WFIDrv *hWFIDrv, u16 u16ReasonCode) |
c5c77ba1 | 5554 | { |
fb4ec9ca | 5555 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5556 | tstrHostIFmsg strHostIFmsg; |
5557 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; | |
5558 | ||
b1413b60 | 5559 | if (pstrWFIDrv == NULL) { |
03b2d5e7 | 5560 | PRINT_ER("Driver not initialized: pstrWFIDrv = NULL\n"); |
c5c77ba1 JK |
5561 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
5562 | } | |
5563 | ||
5564 | if (pstrWFIDrv == NULL) { | |
5565 | PRINT_ER("gWFiDrvHandle = NULL\n"); | |
5566 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
5567 | } | |
5568 | ||
5569 | /* prepare the Disconnect Message */ | |
2cc46837 | 5570 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
5571 | |
5572 | strHostIFmsg.u16MsgId = HOST_IF_MSG_DISCONNECT; | |
5573 | strHostIFmsg.drvHandler = hWFIDrv; | |
5574 | ||
5575 | /* send the message */ | |
b1413b60 | 5576 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
5577 | if (s32Error) |
5578 | PRINT_ER("Failed to send message queue: disconnect\n"); | |
5579 | /* ////////////// */ | |
83383ea3 | 5580 | down(&(pstrWFIDrv->hSemTestDisconnectBlock)); |
c5c77ba1 JK |
5581 | /* /////// */ |
5582 | ||
5583 | WILC_CATCH(s32Error) | |
5584 | { | |
5585 | ||
5586 | } | |
5587 | ||
5588 | return s32Error; | |
5589 | } | |
5590 | ||
5591 | /** | |
5592 | * @brief host_int_disconnect_station | |
5593 | * @details disconnects a sta | |
5594 | * @param[in,out] handle to the wifi driver, | |
5595 | * @param[in] Association Id of the station to be disconnected | |
5596 | * @return Error code indicating success/failure | |
5597 | * @note | |
5598 | * @author zsalah | |
5599 | * @date 8 March 2012 | |
5600 | * @version 1.0 | |
5601 | */ | |
218dc407 | 5602 | s32 host_int_disconnect_station(tstrWILC_WFIDrv *hWFIDrv, u8 assoc_id) |
c5c77ba1 | 5603 | { |
fb4ec9ca | 5604 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5605 | tstrWID strWID; |
5606 | /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */ | |
5607 | ||
d85f5326 | 5608 | strWID.u16WIDid = (u16)WID_DISCONNECT; |
c5c77ba1 | 5609 | strWID.enuWIDtype = WID_CHAR; |
ca356ada | 5610 | strWID.ps8WidVal = (s8 *)&assoc_id; |
576917ad | 5611 | strWID.s32ValueSize = sizeof(char); |
c5c77ba1 JK |
5612 | |
5613 | return s32Error; | |
5614 | } | |
5615 | ||
5616 | /** | |
5617 | * @brief host_int_get_assoc_req_info | |
5618 | * @details gets a Association request info | |
5619 | * @param[in,out] handle to the wifi driver, | |
5620 | * Message containg assoc. req info in the following format | |
5621 | * ------------------------------------------------------------------------ | |
5622 | | Management Frame Format | | |
5623 | ||-------------------------------------------------------------------| | |
5624 | ||Frame Control|Duration|DA|SA|BSSID|Sequence Control|Frame Body|FCS | | |
5625 | ||-------------|--------|--|--|-----|----------------|----------|----| | |
5626 | | 2 |2 |6 |6 |6 | 2 |0 - 2312 | 4 | | |
5627 | ||-------------------------------------------------------------------| | |
5628 | | | | |
5629 | | Association Request Frame - Frame Body | | |
5630 | ||-------------------------------------------------------------------| | |
5631 | | Capability Information | Listen Interval | SSID | Supported Rates | | |
5632 | ||------------------------|-----------------|------|-----------------| | |
5633 | | 2 | 2 | 2-34 | 3-10 | | |
5634 | | --------------------------------------------------------------------- | |
5635 | * @return Error code indicating success/failure | |
5636 | * @note | |
5637 | * @author zsalah | |
5638 | * @date 8 March 2012 | |
5639 | * @version 1.0 | |
5640 | */ | |
5641 | ||
218dc407 | 5642 | s32 host_int_get_assoc_req_info(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8AssocReqInfo, |
4e4467fd | 5643 | u32 u32AssocReqInfoLen) |
c5c77ba1 | 5644 | { |
fb4ec9ca | 5645 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5646 | tstrWID strWID; |
5647 | /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */ | |
5648 | ||
d85f5326 | 5649 | strWID.u16WIDid = (u16)WID_ASSOC_REQ_INFO; |
c5c77ba1 JK |
5650 | strWID.enuWIDtype = WID_STR; |
5651 | strWID.ps8WidVal = pu8AssocReqInfo; | |
5652 | strWID.s32ValueSize = u32AssocReqInfoLen; | |
5653 | ||
5654 | ||
5655 | return s32Error; | |
5656 | } | |
5657 | ||
5658 | /** | |
5659 | * @brief gets a Association Response info | |
5660 | * @details | |
5661 | * @param[in,out] handle to the wifi driver, | |
5662 | * Message containg assoc. resp info | |
5663 | * @return Error code indicating success/failure | |
5664 | * @note | |
5665 | * @author zsalah | |
5666 | * @date 8 March 2012 | |
5667 | * @version 1.0 | |
5668 | */ | |
218dc407 | 5669 | s32 host_int_get_assoc_res_info(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8AssocRespInfo, |
4e4467fd | 5670 | u32 u32MaxAssocRespInfoLen, u32 *pu32RcvdAssocRespInfoLen) |
c5c77ba1 | 5671 | { |
fb4ec9ca | 5672 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5673 | tstrWID strWID; |
5674 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; | |
5675 | ||
b1413b60 | 5676 | if (pstrWFIDrv == NULL) { |
03b2d5e7 | 5677 | PRINT_ER("Driver not initialized: pstrWFIDrv = NULL\n"); |
c5c77ba1 JK |
5678 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
5679 | } | |
5680 | ||
d85f5326 | 5681 | strWID.u16WIDid = (u16)WID_ASSOC_RES_INFO; |
c5c77ba1 JK |
5682 | strWID.enuWIDtype = WID_STR; |
5683 | strWID.ps8WidVal = pu8AssocRespInfo; | |
5684 | strWID.s32ValueSize = u32MaxAssocRespInfoLen; | |
5685 | ||
5686 | ||
5687 | /* Sending Configuration packet */ | |
72ed4dc7 | 5688 | s32Error = SendConfigPkt(GET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
5689 | if (s32Error) { |
5690 | PRINT_ER("Failed to send association response config packet\n"); | |
5691 | *pu32RcvdAssocRespInfoLen = 0; | |
5692 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
5693 | } else { | |
5694 | *pu32RcvdAssocRespInfoLen = strWID.s32ValueSize; | |
5695 | } | |
5696 | ||
5697 | WILC_CATCH(s32Error) | |
5698 | { | |
5699 | ||
5700 | } | |
5701 | return s32Error; | |
5702 | } | |
5703 | ||
5704 | /** | |
5705 | * @brief gets a Association Response info | |
5706 | * @details Valid only in STA mode. This function gives the RSSI | |
5707 | * values observed in all the channels at the time of scanning. | |
5708 | * The length of the field is 1 greater that the total number of | |
5709 | * channels supported. Byte 0 contains the number of channels while | |
5710 | * each of Byte N contains the observed RSSI value for the channel index N. | |
5711 | * @param[in,out] handle to the wifi driver, | |
5712 | * array of scanned channels' RSSI | |
5713 | * @return Error code indicating success/failure | |
5714 | * @note | |
5715 | * @author zsalah | |
5716 | * @date 8 March 2012 | |
5717 | * @version 1.0 | |
5718 | */ | |
218dc407 | 5719 | s32 host_int_get_rx_power_level(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8RxPowerLevel, |
4e4467fd | 5720 | u32 u32RxPowerLevelLen) |
c5c77ba1 | 5721 | { |
fb4ec9ca | 5722 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5723 | tstrWID strWID; |
5724 | /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */ | |
5725 | ||
d85f5326 | 5726 | strWID.u16WIDid = (u16)WID_RX_POWER_LEVEL; |
c5c77ba1 JK |
5727 | strWID.enuWIDtype = WID_STR; |
5728 | strWID.ps8WidVal = pu8RxPowerLevel; | |
5729 | strWID.s32ValueSize = u32RxPowerLevelLen; | |
5730 | ||
5731 | ||
5732 | return s32Error; | |
5733 | } | |
5734 | ||
5735 | /** | |
5736 | * @brief sets a channel | |
5737 | * @details | |
5738 | * @param[in,out] handle to the wifi driver, | |
5739 | * @param[in] Index of the channel to be set | |
5740 | *|-------------------------------------------------------------------| | |
5741 | | CHANNEL1 CHANNEL2 .... CHANNEL14 | | |
5742 | | Input: 1 2 14 | | |
5743 | ||-------------------------------------------------------------------| | |
5744 | * @return Error code indicating success/failure | |
5745 | * @note | |
5746 | * @author zsalah | |
5747 | * @date 8 March 2012 | |
5748 | * @version 1.0 | |
5749 | */ | |
218dc407 | 5750 | s32 host_int_set_mac_chnl_num(tstrWILC_WFIDrv *hWFIDrv, u8 u8ChNum) |
c5c77ba1 | 5751 | { |
fb4ec9ca | 5752 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5753 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
5754 | tstrHostIFmsg strHostIFmsg; | |
5755 | ||
2b9d5b48 | 5756 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 5757 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
5758 | |
5759 | /* prepare the set channel message */ | |
2cc46837 | 5760 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
5761 | strHostIFmsg.u16MsgId = HOST_IF_MSG_SET_CHANNEL; |
5762 | strHostIFmsg.uniHostIFmsgBody.strHostIFSetChan.u8SetChan = u8ChNum; | |
5763 | strHostIFmsg.drvHandler = hWFIDrv; | |
5764 | ||
b1413b60 | 5765 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 5766 | if (s32Error) |
c5c77ba1 | 5767 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
5768 | WILC_CATCH(s32Error) |
5769 | { | |
5770 | ||
5771 | } | |
5772 | ||
5773 | return s32Error; | |
5774 | } | |
5775 | ||
5776 | ||
fb4ec9ca | 5777 | s32 host_int_wait_msg_queue_idle(void) |
c5c77ba1 | 5778 | { |
fb4ec9ca | 5779 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5780 | |
5781 | tstrHostIFmsg strHostIFmsg; | |
5782 | ||
5783 | /* prepare the set driver handler message */ | |
5784 | ||
2cc46837 | 5785 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 | 5786 | strHostIFmsg.u16MsgId = HOST_IF_MSG_Q_IDLE; |
b1413b60 | 5787 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 5788 | if (s32Error) |
c5c77ba1 | 5789 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
5790 | WILC_CATCH(s32Error) |
5791 | { | |
5792 | ||
5793 | } | |
5794 | ||
5795 | /* wait untill MSG Q is empty */ | |
83383ea3 | 5796 | down(&hWaitResponse); |
c5c77ba1 JK |
5797 | |
5798 | return s32Error; | |
5799 | ||
5800 | } | |
5801 | ||
218dc407 | 5802 | s32 host_int_set_wfi_drv_handler(tstrWILC_WFIDrv *u32address) |
c5c77ba1 | 5803 | { |
fb4ec9ca | 5804 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5805 | |
5806 | tstrHostIFmsg strHostIFmsg; | |
5807 | ||
5808 | ||
5809 | /* prepare the set driver handler message */ | |
5810 | ||
2cc46837 | 5811 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
5812 | strHostIFmsg.u16MsgId = HOST_IF_MSG_SET_WFIDRV_HANDLER; |
5813 | strHostIFmsg.uniHostIFmsgBody.strHostIfSetDrvHandler.u32Address = u32address; | |
5814 | /* strHostIFmsg.drvHandler=hWFIDrv; */ | |
5815 | ||
b1413b60 | 5816 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 5817 | if (s32Error) |
c5c77ba1 | 5818 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
5819 | WILC_CATCH(s32Error) |
5820 | { | |
5821 | ||
5822 | } | |
5823 | ||
5824 | return s32Error; | |
5825 | } | |
5826 | ||
5827 | ||
5828 | ||
218dc407 | 5829 | s32 host_int_set_operation_mode(tstrWILC_WFIDrv *hWFIDrv, u32 u32mode) |
c5c77ba1 | 5830 | { |
fb4ec9ca | 5831 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5832 | |
5833 | tstrHostIFmsg strHostIFmsg; | |
5834 | ||
5835 | ||
5836 | /* prepare the set driver handler message */ | |
5837 | ||
2cc46837 | 5838 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
5839 | strHostIFmsg.u16MsgId = HOST_IF_MSG_SET_OPERATION_MODE; |
5840 | strHostIFmsg.uniHostIFmsgBody.strHostIfSetOperationMode.u32Mode = u32mode; | |
5841 | strHostIFmsg.drvHandler = hWFIDrv; | |
5842 | ||
b1413b60 | 5843 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 5844 | if (s32Error) |
c5c77ba1 | 5845 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
5846 | WILC_CATCH(s32Error) |
5847 | { | |
5848 | ||
5849 | } | |
5850 | ||
5851 | return s32Error; | |
5852 | } | |
5853 | ||
5854 | /** | |
5855 | * @brief gets the current channel index | |
5856 | * @details | |
5857 | * @param[in,out] handle to the wifi driver, | |
5858 | * current channel index | |
5859 | *|-----------------------------------------------------------------------| | |
5860 | | CHANNEL1 CHANNEL2 .... CHANNEL14 | | |
5861 | | Input: 1 2 14 | | |
5862 | ||-----------------------------------------------------------------------| | |
5863 | * @return Error code indicating success/failure | |
5864 | * @note | |
5865 | * @author zsalah | |
5866 | * @date 8 March 2012 | |
5867 | * @version 1.0 | |
5868 | */ | |
218dc407 | 5869 | s32 host_int_get_host_chnl_num(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8ChNo) |
c5c77ba1 | 5870 | { |
fb4ec9ca | 5871 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5872 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
5873 | tstrHostIFmsg strHostIFmsg; | |
5874 | ||
b1413b60 | 5875 | if (pstrWFIDrv == NULL) { |
03b2d5e7 | 5876 | PRINT_ER("Driver not initialized: pstrWFIDrv = NULL\n"); |
c5c77ba1 JK |
5877 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
5878 | } | |
5879 | ||
5880 | /* prepare the Get Channel Message */ | |
2cc46837 | 5881 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
5882 | |
5883 | strHostIFmsg.u16MsgId = HOST_IF_MSG_GET_CHNL; | |
5884 | strHostIFmsg.drvHandler = hWFIDrv; | |
5885 | ||
5886 | /* send the message */ | |
b1413b60 | 5887 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
5888 | if (s32Error) |
5889 | PRINT_ER("Failed to send get host channel param's message queue "); | |
83383ea3 | 5890 | down(&(pstrWFIDrv->hSemGetCHNL)); |
c5c77ba1 JK |
5891 | /* gu8Chnl = 11; */ |
5892 | ||
5893 | *pu8ChNo = gu8Chnl; | |
5894 | ||
5895 | WILC_CATCH(s32Error) | |
5896 | { | |
5897 | } | |
5898 | ||
5899 | return s32Error; | |
5900 | ||
5901 | ||
5902 | } | |
5903 | ||
5904 | ||
5905 | /** | |
5906 | * @brief host_int_test_set_int_wid | |
5907 | * @details Test function for setting wids | |
4e4467fd | 5908 | * @param[in,out] WILC_WFIDrvHandle hWFIDrv, u32 u32TestMemAddr |
c5c77ba1 JK |
5909 | * @return Error code indicating success/failure |
5910 | * @note | |
5911 | * @author zsalah | |
5912 | * @date 8 March 2012 | |
5913 | * @version 1.0 | |
5914 | */ | |
218dc407 | 5915 | s32 host_int_test_set_int_wid(tstrWILC_WFIDrv *hWFIDrv, u32 u32TestMemAddr) |
c5c77ba1 | 5916 | { |
fb4ec9ca | 5917 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5918 | tstrWID strWID; |
5919 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; | |
5920 | ||
5921 | ||
b1413b60 | 5922 | if (pstrWFIDrv == NULL) { |
03b2d5e7 | 5923 | PRINT_ER("Driver not initialized: pstrWFIDrv = NULL\n"); |
c5c77ba1 JK |
5924 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
5925 | } | |
5926 | ||
5927 | /*prepare configuration packet*/ | |
d85f5326 | 5928 | strWID.u16WIDid = (u16)WID_MEMORY_ADDRESS; |
c5c77ba1 | 5929 | strWID.enuWIDtype = WID_INT; |
576917ad | 5930 | strWID.ps8WidVal = (char *)&u32TestMemAddr; |
4e4467fd | 5931 | strWID.s32ValueSize = sizeof(u32); |
c5c77ba1 JK |
5932 | |
5933 | /*Sending Cfg*/ | |
72ed4dc7 | 5934 | s32Error = SendConfigPkt(SET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
5935 | if (s32Error) { |
5936 | PRINT_ER("Test Function: Failed to set wid value\n"); | |
5937 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
5938 | } else { | |
5939 | PRINT_D(HOSTINF_DBG, "Successfully set wid value\n"); | |
5940 | ||
5941 | } | |
5942 | ||
5943 | WILC_CATCH(s32Error) | |
5944 | { | |
5945 | ||
5946 | } | |
5947 | return s32Error; | |
5948 | } | |
5949 | ||
5950 | #ifdef WILC_AP_EXTERNAL_MLME | |
5951 | /** | |
5952 | * @brief host_int_get_inactive_time | |
5953 | * @details | |
5954 | * @param[in,out] handle to the wifi driver, | |
5955 | * current sta macaddress, inactive_time | |
5956 | * @return | |
5957 | * @note | |
5958 | * @author | |
5959 | * @date | |
5960 | * @version 1.0 | |
5961 | */ | |
218dc407 | 5962 | s32 host_int_get_inactive_time(tstrWILC_WFIDrv *hWFIDrv, const u8 *mac, u32 *pu32InactiveTime) |
c5c77ba1 | 5963 | { |
fb4ec9ca | 5964 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
5965 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
5966 | tstrHostIFmsg strHostIFmsg; | |
5967 | ||
b1413b60 | 5968 | if (pstrWFIDrv == NULL) { |
03b2d5e7 | 5969 | PRINT_ER("Driver not initialized: pstrWFIDrv = NULL\n"); |
c5c77ba1 JK |
5970 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
5971 | } | |
5972 | ||
2cc46837 | 5973 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
5974 | |
5975 | ||
d00d2ba3 | 5976 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIfStaInactiveT.mac, |
c5c77ba1 JK |
5977 | mac, ETH_ALEN); |
5978 | ||
5979 | strHostIFmsg.u16MsgId = HOST_IF_MSG_GET_INACTIVETIME; | |
5980 | strHostIFmsg.drvHandler = hWFIDrv; | |
5981 | ||
5982 | /* send the message */ | |
b1413b60 | 5983 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
5984 | if (s32Error) |
5985 | PRINT_ER("Failed to send get host channel param's message queue "); | |
5986 | ||
83383ea3 | 5987 | down(&(pstrWFIDrv->hSemInactiveTime)); |
c5c77ba1 JK |
5988 | |
5989 | *pu32InactiveTime = gu32InactiveTime; | |
5990 | ||
5991 | WILC_CATCH(s32Error) | |
5992 | { | |
5993 | } | |
5994 | ||
5995 | return s32Error; | |
5996 | } | |
5997 | #endif | |
5998 | /** | |
5999 | * @brief host_int_test_get_int_wid | |
6000 | * @details Test function for getting wids | |
4e4467fd | 6001 | * @param[in,out] WILC_WFIDrvHandle hWFIDrv, u32* pu32TestMemAddr |
c5c77ba1 JK |
6002 | * @return Error code indicating success/failure |
6003 | * @note | |
6004 | * @author zsalah | |
6005 | * @date 8 March 2012 | |
6006 | * @version 1.0 | |
6007 | */ | |
218dc407 | 6008 | s32 host_int_test_get_int_wid(tstrWILC_WFIDrv *hWFIDrv, u32 *pu32TestMemAddr) |
c5c77ba1 JK |
6009 | { |
6010 | ||
fb4ec9ca | 6011 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
6012 | tstrWID strWID; |
6013 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; | |
6014 | ||
6015 | ||
b1413b60 | 6016 | if (pstrWFIDrv == NULL) { |
03b2d5e7 | 6017 | PRINT_ER("Driver not initialized: pstrWFIDrv = NULL\n"); |
c5c77ba1 JK |
6018 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
6019 | } | |
6020 | ||
d85f5326 | 6021 | strWID.u16WIDid = (u16)WID_MEMORY_ADDRESS; |
c5c77ba1 | 6022 | strWID.enuWIDtype = WID_INT; |
ca356ada | 6023 | strWID.ps8WidVal = (s8 *)pu32TestMemAddr; |
4e4467fd | 6024 | strWID.s32ValueSize = sizeof(u32); |
c5c77ba1 | 6025 | |
72ed4dc7 | 6026 | s32Error = SendConfigPkt(GET_CFG, &strWID, 1, true, (u32)pstrWFIDrv); |
c5c77ba1 JK |
6027 | /*get the value by searching the local copy*/ |
6028 | if (s32Error) { | |
6029 | PRINT_ER("Test Function: Failed to get wid value\n"); | |
6030 | WILC_ERRORREPORT(s32Error, WILC_INVALID_STATE); | |
6031 | } else { | |
6032 | PRINT_D(HOSTINF_DBG, "Successfully got wid value\n"); | |
6033 | ||
6034 | } | |
6035 | ||
6036 | WILC_CATCH(s32Error) | |
6037 | { | |
6038 | ||
6039 | } | |
6040 | return s32Error; | |
6041 | } | |
6042 | ||
6043 | ||
6044 | /** | |
6045 | * @brief host_int_get_rssi | |
6046 | * @details gets the currently maintained RSSI value for the station. | |
6047 | * The received signal strength value in dB. | |
6048 | * The range of valid values is -128 to 0. | |
6049 | * @param[in,out] handle to the wifi driver, | |
6050 | * rssi value in dB | |
6051 | * @return Error code indicating success/failure | |
6052 | * @note | |
6053 | * @author zsalah | |
6054 | * @date 8 March 2012 | |
6055 | * @version 1.0 | |
6056 | */ | |
218dc407 | 6057 | s32 host_int_get_rssi(tstrWILC_WFIDrv *hWFIDrv, s8 *ps8Rssi) |
c5c77ba1 | 6058 | { |
fb4ec9ca | 6059 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
6060 | tstrHostIFmsg strHostIFmsg; |
6061 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; | |
6062 | ||
6063 | ||
6064 | /* prepare the Get RSSI Message */ | |
2cc46837 | 6065 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6066 | |
6067 | strHostIFmsg.u16MsgId = HOST_IF_MSG_GET_RSSI; | |
6068 | strHostIFmsg.drvHandler = hWFIDrv; | |
6069 | ||
6070 | /* send the message */ | |
b1413b60 | 6071 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
6072 | if (s32Error) { |
6073 | PRINT_ER("Failed to send get host channel param's message queue "); | |
6074 | return WILC_FAIL; | |
6075 | } | |
6076 | ||
83383ea3 | 6077 | down(&(pstrWFIDrv->hSemGetRSSI)); |
c5c77ba1 JK |
6078 | |
6079 | ||
6080 | if (ps8Rssi == NULL) { | |
6081 | PRINT_ER("RSS pointer value is null"); | |
6082 | return WILC_FAIL; | |
6083 | } | |
6084 | ||
6085 | ||
6086 | *ps8Rssi = gs8Rssi; | |
6087 | ||
6088 | ||
6089 | return s32Error; | |
6090 | } | |
6091 | ||
218dc407 | 6092 | s32 host_int_get_link_speed(tstrWILC_WFIDrv *hWFIDrv, s8 *ps8lnkspd) |
c5c77ba1 JK |
6093 | { |
6094 | tstrHostIFmsg strHostIFmsg; | |
fb4ec9ca | 6095 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
6096 | |
6097 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; | |
6098 | ||
6099 | ||
6100 | ||
6101 | /* prepare the Get LINKSPEED Message */ | |
2cc46837 | 6102 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6103 | |
6104 | strHostIFmsg.u16MsgId = HOST_IF_MSG_GET_LINKSPEED; | |
6105 | strHostIFmsg.drvHandler = hWFIDrv; | |
6106 | ||
6107 | /* send the message */ | |
b1413b60 | 6108 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
6109 | if (s32Error) { |
6110 | PRINT_ER("Failed to send GET_LINKSPEED to message queue "); | |
6111 | return WILC_FAIL; | |
6112 | } | |
6113 | ||
83383ea3 | 6114 | down(&(pstrWFIDrv->hSemGetLINKSPEED)); |
c5c77ba1 JK |
6115 | |
6116 | ||
6117 | if (ps8lnkspd == NULL) { | |
6118 | PRINT_ER("LINKSPEED pointer value is null"); | |
6119 | return WILC_FAIL; | |
6120 | } | |
6121 | ||
6122 | ||
6123 | *ps8lnkspd = gs8lnkspd; | |
6124 | ||
6125 | ||
6126 | return s32Error; | |
6127 | } | |
6128 | ||
218dc407 | 6129 | s32 host_int_get_statistics(tstrWILC_WFIDrv *hWFIDrv, tstrStatistics *pstrStatistics) |
c5c77ba1 | 6130 | { |
fb4ec9ca | 6131 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
6132 | tstrHostIFmsg strHostIFmsg; |
6133 | ||
6134 | ||
6135 | /* prepare the Get RSSI Message */ | |
2cc46837 | 6136 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6137 | |
6138 | strHostIFmsg.u16MsgId = HOST_IF_MSG_GET_STATISTICS; | |
576917ad | 6139 | strHostIFmsg.uniHostIFmsgBody.pUserData = (char *)pstrStatistics; |
c5c77ba1 JK |
6140 | strHostIFmsg.drvHandler = hWFIDrv; |
6141 | /* send the message */ | |
b1413b60 | 6142 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
6143 | if (s32Error) { |
6144 | PRINT_ER("Failed to send get host channel param's message queue "); | |
6145 | return WILC_FAIL; | |
6146 | } | |
6147 | ||
83383ea3 | 6148 | down(&hWaitResponse); |
c5c77ba1 JK |
6149 | return s32Error; |
6150 | } | |
6151 | ||
6152 | ||
6153 | /** | |
6154 | * @brief host_int_scan | |
6155 | * @details scans a set of channels | |
6156 | * @param[in,out] handle to the wifi driver, | |
6157 | * @param[in] Scan source | |
6158 | * Scan Type PASSIVE_SCAN = 0, | |
6159 | * ACTIVE_SCAN = 1 | |
6160 | * Channels Array | |
6161 | * Channels Array length | |
6162 | * Scan Callback function | |
6163 | * @return Error code indicating success/failure | |
6164 | * @note | |
6165 | * @author zsalah | |
6166 | * @date 8 March 2012 | |
6167 | * @version 1.0 | |
6168 | */ | |
218dc407 | 6169 | s32 host_int_scan(tstrWILC_WFIDrv *hWFIDrv, u8 u8ScanSource, |
63d03e47 GKH |
6170 | u8 u8ScanType, u8 *pu8ChnlFreqList, |
6171 | u8 u8ChnlListLen, const u8 *pu8IEs, | |
c5c77ba1 JK |
6172 | size_t IEsLen, tWILCpfScanResult ScanResult, |
6173 | void *pvUserArg, tstrHiddenNetwork *pstrHiddenNetwork) | |
6174 | { | |
fb4ec9ca | 6175 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
6176 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
6177 | tstrHostIFmsg strHostIFmsg; | |
6178 | tenuScanConnTimer enuScanConnTimer; | |
6179 | ||
2b9d5b48 | 6180 | if (pstrWFIDrv == NULL || ScanResult == NULL) |
c5c77ba1 | 6181 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
6182 | |
6183 | ||
6184 | /* prepare the Scan Message */ | |
2cc46837 | 6185 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6186 | |
6187 | strHostIFmsg.u16MsgId = HOST_IF_MSG_SCAN; | |
6188 | ||
6189 | if (pstrHiddenNetwork != NULL) { | |
6190 | strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.strHiddenNetwork.pstrHiddenNetworkInfo = pstrHiddenNetwork->pstrHiddenNetworkInfo; | |
6191 | strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.strHiddenNetwork.u8ssidnum = pstrHiddenNetwork->u8ssidnum; | |
6192 | ||
6193 | } else | |
6194 | PRINT_D(HOSTINF_DBG, "pstrHiddenNetwork IS EQUAL TO NULL\n"); | |
6195 | ||
6196 | strHostIFmsg.drvHandler = hWFIDrv; | |
6197 | strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.u8ScanSource = u8ScanSource; | |
6198 | strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.u8ScanType = u8ScanType; | |
6199 | strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.pfScanResult = ScanResult; | |
6200 | strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.pvUserArg = pvUserArg; | |
6201 | ||
6202 | strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.u8ChnlListLen = u8ChnlListLen; | |
63d03e47 | 6203 | strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.pu8ChnlFreqList = (u8 *)WILC_MALLOC(u8ChnlListLen); /* will be deallocated by the receiving thread */ |
d00d2ba3 | 6204 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.pu8ChnlFreqList, |
c5c77ba1 JK |
6205 | pu8ChnlFreqList, u8ChnlListLen); |
6206 | ||
6207 | strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.IEsLen = IEsLen; | |
63d03e47 | 6208 | strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.pu8IEs = (u8 *)WILC_MALLOC(IEsLen); /* will be deallocated by the receiving thread */ |
d00d2ba3 | 6209 | memcpy(strHostIFmsg.uniHostIFmsgBody.strHostIFscanAttr.pu8IEs, |
c5c77ba1 JK |
6210 | pu8IEs, IEsLen); |
6211 | ||
6212 | /* send the message */ | |
b1413b60 | 6213 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
6214 | if (s32Error) { |
6215 | PRINT_ER("Error in sending message queue scanning parameters: Error(%d)\n", s32Error); | |
6216 | WILC_ERRORREPORT(s32Error, WILC_FAIL); | |
6217 | } | |
6218 | ||
6219 | enuScanConnTimer = SCAN_TIMER; | |
6220 | PRINT_D(HOSTINF_DBG, ">> Starting the SCAN timer\n"); | |
334e1a57 | 6221 | WILC_TimerStart(&(pstrWFIDrv->hScanTimer), HOST_IF_SCAN_TIMEOUT, (void *) hWFIDrv); |
c5c77ba1 JK |
6222 | |
6223 | ||
6224 | WILC_CATCH(s32Error) | |
6225 | { | |
6226 | ||
6227 | } | |
6228 | return s32Error; | |
6229 | ||
6230 | } | |
6231 | /** | |
6232 | * @brief hif_set_cfg | |
6233 | * @details sets configuration wids values | |
6234 | * @param[in,out] handle to the wifi driver, | |
6235 | * @param[in] WID, WID value | |
6236 | * @return Error code indicating success/failure | |
6237 | * @note | |
6238 | * @author zsalah | |
6239 | * @date 8 March 2012 | |
6240 | * @version 1.0 | |
6241 | */ | |
218dc407 | 6242 | s32 hif_set_cfg(tstrWILC_WFIDrv *hWFIDrv, tstrCfgParamVal *pstrCfgParamVal) |
c5c77ba1 JK |
6243 | { |
6244 | ||
fb4ec9ca | 6245 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
6246 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
6247 | ||
6248 | tstrHostIFmsg strHostIFmsg; | |
6249 | ||
6250 | ||
2b9d5b48 | 6251 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 6252 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 6253 | /* prepare the WiphyParams Message */ |
2cc46837 | 6254 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6255 | strHostIFmsg.u16MsgId = HOST_IF_MSG_CFG_PARAMS; |
6256 | strHostIFmsg.uniHostIFmsgBody.strHostIFCfgParamAttr.pstrCfgParamVal = *pstrCfgParamVal; | |
6257 | strHostIFmsg.drvHandler = hWFIDrv; | |
6258 | ||
b1413b60 | 6259 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
6260 | |
6261 | WILC_CATCH(s32Error) | |
6262 | { | |
6263 | } | |
6264 | ||
6265 | return s32Error; | |
6266 | ||
6267 | } | |
6268 | ||
6269 | ||
6270 | /** | |
6271 | * @brief hif_get_cfg | |
6272 | * @details gets configuration wids values | |
6273 | * @param[in,out] handle to the wifi driver, | |
6274 | * WID value | |
6275 | * @param[in] WID, | |
6276 | * @return Error code indicating success/failure | |
6277 | * @note | |
6278 | * @author zsalah | |
6279 | * | |
6280 | * @date 8 March 2012 | |
6281 | * @version 1.0 | |
6282 | */ | |
218dc407 | 6283 | s32 hif_get_cfg(tstrWILC_WFIDrv *hWFIDrv, u16 u16WID, u16 *pu16WID_Value) |
c5c77ba1 | 6284 | { |
fb4ec9ca | 6285 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
6286 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
6287 | ||
83383ea3 | 6288 | down(&(pstrWFIDrv->gtOsCfgValuesSem)); |
c5c77ba1 | 6289 | |
b1413b60 | 6290 | if (pstrWFIDrv == NULL) { |
03b2d5e7 | 6291 | PRINT_ER("Driver not initialized: pstrWFIDrv = NULL\n"); |
c5c77ba1 JK |
6292 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
6293 | } | |
6294 | PRINT_D(HOSTINF_DBG, "Getting configuration parameters\n"); | |
6295 | switch (u16WID) { | |
6296 | ||
6297 | case WID_BSS_TYPE: | |
d85f5326 | 6298 | *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.bss_type; |
c5c77ba1 JK |
6299 | break; |
6300 | ||
6301 | case WID_AUTH_TYPE: | |
d85f5326 | 6302 | *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.auth_type; |
c5c77ba1 JK |
6303 | break; |
6304 | ||
6305 | case WID_AUTH_TIMEOUT: | |
6306 | *pu16WID_Value = pstrWFIDrv->strCfgValues.auth_timeout; | |
6307 | break; | |
6308 | ||
6309 | case WID_POWER_MANAGEMENT: | |
d85f5326 | 6310 | *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.power_mgmt_mode; |
c5c77ba1 JK |
6311 | break; |
6312 | ||
6313 | case WID_SHORT_RETRY_LIMIT: | |
6314 | *pu16WID_Value = pstrWFIDrv->strCfgValues.short_retry_limit; | |
6315 | break; | |
6316 | ||
6317 | case WID_LONG_RETRY_LIMIT: | |
6318 | *pu16WID_Value = pstrWFIDrv->strCfgValues.long_retry_limit; | |
6319 | break; | |
6320 | ||
6321 | case WID_FRAG_THRESHOLD: | |
6322 | *pu16WID_Value = pstrWFIDrv->strCfgValues.frag_threshold; | |
6323 | break; | |
6324 | ||
6325 | case WID_RTS_THRESHOLD: | |
6326 | *pu16WID_Value = pstrWFIDrv->strCfgValues.rts_threshold; | |
6327 | break; | |
6328 | ||
6329 | case WID_PREAMBLE: | |
d85f5326 | 6330 | *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.preamble_type; |
c5c77ba1 JK |
6331 | break; |
6332 | ||
6333 | case WID_SHORT_SLOT_ALLOWED: | |
d85f5326 | 6334 | *pu16WID_Value = (u16) pstrWFIDrv->strCfgValues.short_slot_allowed; |
c5c77ba1 JK |
6335 | break; |
6336 | ||
6337 | case WID_11N_TXOP_PROT_DISABLE: | |
d85f5326 | 6338 | *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.txop_prot_disabled; |
c5c77ba1 JK |
6339 | break; |
6340 | ||
6341 | case WID_BEACON_INTERVAL: | |
6342 | *pu16WID_Value = pstrWFIDrv->strCfgValues.beacon_interval; | |
6343 | break; | |
6344 | ||
6345 | case WID_DTIM_PERIOD: | |
d85f5326 | 6346 | *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.dtim_period; |
c5c77ba1 JK |
6347 | break; |
6348 | ||
6349 | case WID_SITE_SURVEY: | |
d85f5326 | 6350 | *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.site_survey_enabled; |
c5c77ba1 JK |
6351 | break; |
6352 | ||
6353 | case WID_SITE_SURVEY_SCAN_TIME: | |
6354 | *pu16WID_Value = pstrWFIDrv->strCfgValues.site_survey_scan_time; | |
6355 | break; | |
6356 | ||
6357 | case WID_ACTIVE_SCAN_TIME: | |
6358 | *pu16WID_Value = pstrWFIDrv->strCfgValues.active_scan_time; | |
6359 | break; | |
6360 | ||
6361 | case WID_PASSIVE_SCAN_TIME: | |
6362 | *pu16WID_Value = pstrWFIDrv->strCfgValues.passive_scan_time; | |
6363 | break; | |
6364 | ||
6365 | case WID_CURRENT_TX_RATE: | |
6366 | *pu16WID_Value = pstrWFIDrv->strCfgValues.curr_tx_rate; | |
6367 | break; | |
6368 | ||
6369 | default: | |
6370 | break; | |
6371 | } | |
6372 | ||
83383ea3 | 6373 | up(&(pstrWFIDrv->gtOsCfgValuesSem)); |
c5c77ba1 JK |
6374 | |
6375 | WILC_CATCH(s32Error) | |
6376 | { | |
6377 | } | |
6378 | return s32Error; | |
6379 | ||
6380 | } | |
6381 | ||
6382 | /*****************************************************************************/ | |
6383 | /* Notification Functions */ | |
6384 | /*****************************************************************************/ | |
6385 | /** | |
6386 | * @brief notifies host with join and leave requests | |
6387 | * @details This function prepares an Information frame having the | |
6388 | * information about a joining/leaving station. | |
6389 | * @param[in,out] handle to the wifi driver, | |
6390 | * @param[in] 6 byte Sta Adress | |
6391 | * Join or leave flag: | |
6392 | * Join = 1, | |
6393 | * Leave =0 | |
6394 | * @return Error code indicating success/failure | |
6395 | * @note | |
6396 | * @author zsalah | |
6397 | * @date 8 March 2012 | |
6398 | * @version 1.0 | |
6399 | */ | |
6400 | void host_int_send_join_leave_info_to_host | |
72ed4dc7 | 6401 | (u16 assocId, u8 *stationAddr, bool joining) |
c5c77ba1 JK |
6402 | { |
6403 | } | |
6404 | /** | |
6405 | * @brief notifies host with stations found in scan | |
6406 | * @details sends the beacon/probe response from scan | |
6407 | * @param[in,out] handle to the wifi driver, | |
6408 | * @param[in] Sta Address, | |
6409 | * Frame length, | |
6410 | * Rssi of the Station found | |
6411 | * @return Error code indicating success/failure | |
6412 | * @note | |
6413 | * @author zsalah | |
6414 | * @date 8 March 2012 | |
6415 | * @version 1.0 | |
6416 | */ | |
6417 | ||
6418 | void GetPeriodicRSSI(void *pvArg) | |
6419 | { | |
6420 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)pvArg; | |
78c87591 | 6421 | |
c5c77ba1 JK |
6422 | if (pstrWFIDrv == NULL) { |
6423 | PRINT_ER("Driver handler is NULL\n"); | |
6424 | return; | |
6425 | } | |
6426 | ||
6427 | if (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED) { | |
fb4ec9ca | 6428 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
6429 | tstrHostIFmsg strHostIFmsg; |
6430 | ||
6431 | /* prepare the Get RSSI Message */ | |
2cc46837 | 6432 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6433 | |
6434 | strHostIFmsg.u16MsgId = HOST_IF_MSG_GET_RSSI; | |
6435 | strHostIFmsg.drvHandler = pstrWFIDrv; | |
6436 | ||
6437 | /* send the message */ | |
b1413b60 | 6438 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
6439 | if (s32Error) { |
6440 | PRINT_ER("Failed to send get host channel param's message queue "); | |
6441 | return; | |
6442 | } | |
6443 | } | |
334e1a57 | 6444 | WILC_TimerStart(&(g_hPeriodicRSSI), 5000, (void *)pstrWFIDrv); |
c5c77ba1 JK |
6445 | } |
6446 | ||
6447 | ||
6448 | void host_int_send_network_info_to_host | |
ca356ada | 6449 | (u8 *macStartAddress, u16 u16RxFrameLen, s8 s8Rssi) |
c5c77ba1 JK |
6450 | { |
6451 | } | |
6452 | /** | |
6453 | * @brief host_int_init | |
6454 | * @details host interface initialization function | |
6455 | * @param[in,out] handle to the wifi driver, | |
6456 | * @note | |
6457 | * @author zsalah | |
6458 | * @date 8 March 2012 | |
6459 | * @version 1.0 | |
6460 | */ | |
4e4467fd CL |
6461 | static u32 u32Intialized; |
6462 | static u32 msgQ_created; | |
6463 | static u32 clients_count; | |
c5c77ba1 | 6464 | |
218dc407 | 6465 | s32 host_int_init(tstrWILC_WFIDrv **phWFIDrv) |
c5c77ba1 | 6466 | { |
fb4ec9ca | 6467 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 6468 | tstrWILC_WFIDrv *pstrWFIDrv; |
c5c77ba1 JK |
6469 | |
6470 | /*if(u32Intialized == 1) | |
6471 | * { | |
6472 | * PRINT_D(HOSTINF_DBG,"Host interface is previously initialized\n"); | |
6473 | * *phWFIDrv = (WILC_WFIDrvHandle)gWFiDrvHandle; //Will be adjusted later for P2P | |
6474 | * return 0; | |
6475 | * } */ | |
6476 | PRINT_D(HOSTINF_DBG, "Initializing host interface for client %d\n", clients_count + 1); | |
6477 | ||
72ed4dc7 | 6478 | gbScanWhileConnected = false; |
c5c77ba1 | 6479 | |
83383ea3 | 6480 | sema_init(&hWaitResponse, 0); |
c5c77ba1 JK |
6481 | |
6482 | ||
6483 | ||
6484 | /*Allocate host interface private structure*/ | |
6485 | pstrWFIDrv = (tstrWILC_WFIDrv *)WILC_MALLOC(sizeof(tstrWILC_WFIDrv)); | |
b1413b60 | 6486 | if (pstrWFIDrv == NULL) { |
c5c77ba1 JK |
6487 | /* WILC_ERRORREPORT(s32Error,WILC_NO_MEM); */ |
6488 | s32Error = WILC_NO_MEM; | |
6489 | PRINT_ER("Failed to allocate memory\n"); | |
6490 | goto _fail_timer_2; | |
6491 | } | |
2cc46837 | 6492 | memset(pstrWFIDrv, 0, sizeof(tstrWILC_WFIDrv)); |
c5c77ba1 | 6493 | /*return driver handle to user*/ |
218dc407 | 6494 | *phWFIDrv = pstrWFIDrv; |
c5c77ba1 JK |
6495 | /*save into globl handle*/ |
6496 | ||
6497 | #ifdef DISABLE_PWRSAVE_AND_SCAN_DURING_IP | |
6498 | ||
72ed4dc7 | 6499 | g_obtainingIP = false; |
c5c77ba1 JK |
6500 | #endif |
6501 | ||
8a14330f | 6502 | PRINT_D(HOSTINF_DBG, "Global handle pointer value=%p\n", pstrWFIDrv); |
c5c77ba1 JK |
6503 | /* /////////////////////////////////////// */ |
6504 | if (clients_count == 0) { | |
83383ea3 AB |
6505 | sema_init(&hSemHostIFthrdEnd, 0); |
6506 | sema_init(&hSemDeinitDrvHandle, 0); | |
c5c77ba1 | 6507 | /*BugID_5348*/ |
83383ea3 AB |
6508 | sema_init(&hSemHostIntDeinit, 1); |
6509 | } | |
6510 | ||
6511 | sema_init(&(pstrWFIDrv->hSemTestKeyBlock), 0); | |
6512 | sema_init(&(pstrWFIDrv->hSemTestDisconnectBlock), 0); | |
6513 | sema_init(&(pstrWFIDrv->hSemGetRSSI), 0); | |
6514 | sema_init(&(pstrWFIDrv->hSemGetLINKSPEED), 0); | |
6515 | sema_init(&(pstrWFIDrv->hSemGetCHNL), 0); | |
6516 | sema_init(&(pstrWFIDrv->hSemInactiveTime), 0); | |
c5c77ba1 JK |
6517 | |
6518 | /* /////////////////////////////////////// */ | |
6519 | ||
6520 | ||
6521 | ||
6522 | PRINT_D(HOSTINF_DBG, "INIT: CLIENT COUNT %d\n", clients_count); | |
6523 | ||
6524 | if (clients_count == 0) { | |
6525 | ||
b1413b60 | 6526 | s32Error = WILC_MsgQueueCreate(&gMsgQHostIF, NULL); |
c5c77ba1 JK |
6527 | |
6528 | ||
6529 | if (s32Error < 0) { | |
6530 | PRINT_ER("Failed to creat MQ\n"); | |
6531 | goto _fail_; | |
6532 | } | |
6533 | msgQ_created = 1; | |
1999bd52 AB |
6534 | HostIFthreadHandler = kthread_run(hostIFthread, NULL, "WILC_kthread"); |
6535 | if (IS_ERR(HostIFthreadHandler)) { | |
c5c77ba1 | 6536 | PRINT_ER("Failed to creat Thread\n"); |
1999bd52 | 6537 | s32Error = WILC_FAIL; |
c5c77ba1 JK |
6538 | goto _fail_mq_; |
6539 | } | |
334e1a57 | 6540 | s32Error = WILC_TimerCreate(&(g_hPeriodicRSSI), GetPeriodicRSSI); |
c5c77ba1 JK |
6541 | if (s32Error < 0) { |
6542 | PRINT_ER("Failed to creat Timer\n"); | |
6543 | goto _fail_timer_1; | |
6544 | } | |
334e1a57 | 6545 | WILC_TimerStart(&(g_hPeriodicRSSI), 5000, (void *)pstrWFIDrv); |
c5c77ba1 JK |
6546 | |
6547 | } | |
6548 | ||
6549 | ||
334e1a57 | 6550 | s32Error = WILC_TimerCreate(&(pstrWFIDrv->hScanTimer), TimerCB_Scan); |
c5c77ba1 JK |
6551 | if (s32Error < 0) { |
6552 | PRINT_ER("Failed to creat Timer\n"); | |
6553 | goto _fail_thread_; | |
6554 | } | |
6555 | ||
334e1a57 | 6556 | s32Error = WILC_TimerCreate(&(pstrWFIDrv->hConnectTimer), TimerCB_Connect); |
c5c77ba1 JK |
6557 | if (s32Error < 0) { |
6558 | PRINT_ER("Failed to creat Timer\n"); | |
6559 | goto _fail_timer_1; | |
6560 | } | |
6561 | ||
6562 | ||
6563 | #ifdef WILC_P2P | |
6564 | /*Remain on channel timer*/ | |
334e1a57 | 6565 | s32Error = WILC_TimerCreate(&(pstrWFIDrv->hRemainOnChannel), ListenTimerCB); |
c5c77ba1 JK |
6566 | if (s32Error < 0) { |
6567 | PRINT_ER("Failed to creat Remain-on-channel Timer\n"); | |
6568 | goto _fail_timer_3; | |
6569 | } | |
6570 | #endif | |
6571 | ||
83383ea3 AB |
6572 | sema_init(&(pstrWFIDrv->gtOsCfgValuesSem), 1); |
6573 | down(&(pstrWFIDrv->gtOsCfgValuesSem)); | |
c5c77ba1 | 6574 | |
c5c77ba1 | 6575 | pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE; |
72ed4dc7 | 6576 | /* gWFiDrvHandle->bPendingConnRequest = false; */ |
c5c77ba1 JK |
6577 | |
6578 | /*Initialize CFG WIDS Defualt Values*/ | |
6579 | ||
6580 | pstrWFIDrv->strCfgValues.site_survey_enabled = SITE_SURVEY_OFF; | |
6581 | pstrWFIDrv->strCfgValues.scan_source = DEFAULT_SCAN; | |
6582 | pstrWFIDrv->strCfgValues.active_scan_time = ACTIVE_SCAN_TIME; | |
6583 | pstrWFIDrv->strCfgValues.passive_scan_time = PASSIVE_SCAN_TIME; | |
6584 | pstrWFIDrv->strCfgValues.curr_tx_rate = AUTORATE; | |
6585 | ||
6586 | ||
6587 | #ifdef WILC_P2P | |
6588 | ||
6589 | pstrWFIDrv->u64P2p_MgmtTimeout = 0; | |
6590 | ||
6591 | #endif | |
6592 | ||
6593 | PRINT_INFO(HOSTINF_DBG, "Initialization values, Site survey value: %d\n Scan source: %d\n Active scan time: %d\n Passive scan time: %d\nCurrent tx Rate = %d\n", | |
6594 | ||
6595 | pstrWFIDrv->strCfgValues.site_survey_enabled, pstrWFIDrv->strCfgValues.scan_source, | |
6596 | pstrWFIDrv->strCfgValues.active_scan_time, pstrWFIDrv->strCfgValues.passive_scan_time, | |
6597 | pstrWFIDrv->strCfgValues.curr_tx_rate); | |
6598 | ||
6599 | ||
83383ea3 | 6600 | up(&(pstrWFIDrv->gtOsCfgValuesSem)); |
c5c77ba1 JK |
6601 | |
6602 | /*TODO Code to setup simulation to be removed later*/ | |
6603 | /*Intialize configurator module*/ | |
6604 | s32Error = CoreConfiguratorInit(); | |
6605 | if (s32Error < 0) { | |
6606 | PRINT_ER("Failed to initialize core configurator\n"); | |
6607 | goto _fail_mem_; | |
6608 | } | |
6609 | ||
c5c77ba1 JK |
6610 | u32Intialized = 1; |
6611 | clients_count++; /* increase number of created entities */ | |
6612 | ||
6613 | return s32Error; | |
6614 | ||
6615 | ||
6616 | _fail_mem_: | |
b1413b60 | 6617 | if (pstrWFIDrv != NULL) |
49188af2 | 6618 | kfree(pstrWFIDrv); |
c5c77ba1 JK |
6619 | #ifdef WILC_P2P |
6620 | _fail_timer_3: | |
334e1a57 | 6621 | WILC_TimerDestroy(&pstrWFIDrv->hRemainOnChannel); |
c5c77ba1 JK |
6622 | #endif |
6623 | _fail_timer_2: | |
83383ea3 | 6624 | up(&(pstrWFIDrv->gtOsCfgValuesSem)); |
334e1a57 | 6625 | WILC_TimerDestroy(&pstrWFIDrv->hConnectTimer); |
c5c77ba1 | 6626 | _fail_timer_1: |
334e1a57 | 6627 | WILC_TimerDestroy(&pstrWFIDrv->hScanTimer); |
c5c77ba1 | 6628 | _fail_thread_: |
1999bd52 | 6629 | kthread_stop(HostIFthreadHandler); |
c5c77ba1 | 6630 | _fail_mq_: |
b1413b60 | 6631 | WILC_MsgQueueDestroy(&gMsgQHostIF, NULL); |
c5c77ba1 JK |
6632 | _fail_: |
6633 | return s32Error; | |
6634 | ||
6635 | ||
6636 | } | |
6637 | /** | |
6638 | * @brief host_int_deinit | |
6639 | * @details host interface initialization function | |
6640 | * @param[in,out] handle to the wifi driver, | |
6641 | * @note | |
6642 | * @author zsalah | |
6643 | * @date 8 March 2012 | |
6644 | * @version 1.0 | |
6645 | */ | |
6646 | ||
218dc407 | 6647 | s32 host_int_deinit(tstrWILC_WFIDrv *hWFIDrv) |
c5c77ba1 | 6648 | { |
fb4ec9ca | 6649 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
6650 | tstrHostIFmsg strHostIFmsg; |
6651 | ||
6652 | ||
6653 | /*obtain driver handle*/ | |
6654 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; | |
6655 | /*if(u32Intialized == 0) | |
6656 | * { | |
6657 | * PRINT_ER("Host Interface is not initialized\n"); | |
6658 | * return 0; | |
6659 | * }*/ | |
6660 | ||
6661 | /*BugID_5348*/ | |
6662 | ||
6663 | if (pstrWFIDrv == NULL) { | |
6664 | PRINT_ER("pstrWFIDrv = NULL\n"); | |
6665 | return 0; | |
6666 | } | |
6667 | ||
83383ea3 | 6668 | down(&hSemHostIntDeinit); |
c5c77ba1 JK |
6669 | |
6670 | terminated_handle = pstrWFIDrv; | |
6671 | PRINT_D(HOSTINF_DBG, "De-initializing host interface for client %d\n", clients_count); | |
6672 | ||
6673 | /*BugID_5348*/ | |
6674 | /*Destroy all timers before acquiring hSemDeinitDrvHandle*/ | |
6675 | /*to guarantee handling all messages befor proceeding*/ | |
334e1a57 | 6676 | if (WILC_TimerDestroy(&pstrWFIDrv->hScanTimer)) { |
03b2d5e7 | 6677 | PRINT_D(HOSTINF_DBG, ">> Scan timer is active\n"); |
c5c77ba1 JK |
6678 | /* msleep(HOST_IF_SCAN_TIMEOUT+1000); */ |
6679 | } | |
6680 | ||
334e1a57 | 6681 | if (WILC_TimerDestroy(&pstrWFIDrv->hConnectTimer)) { |
03b2d5e7 | 6682 | PRINT_D(HOSTINF_DBG, ">> Connect timer is active\n"); |
c5c77ba1 JK |
6683 | /* msleep(HOST_IF_CONNECT_TIMEOUT+1000); */ |
6684 | } | |
6685 | ||
6686 | ||
334e1a57 | 6687 | if (WILC_TimerDestroy(&g_hPeriodicRSSI)) { |
03b2d5e7 | 6688 | PRINT_D(HOSTINF_DBG, ">> Connect timer is active\n"); |
c5c77ba1 JK |
6689 | /* msleep(HOST_IF_CONNECT_TIMEOUT+1000); */ |
6690 | } | |
6691 | ||
6692 | #ifdef WILC_P2P | |
6693 | /*Destroy Remain-onchannel Timer*/ | |
334e1a57 | 6694 | WILC_TimerDestroy(&pstrWFIDrv->hRemainOnChannel); |
c5c77ba1 JK |
6695 | #endif |
6696 | ||
218dc407 | 6697 | host_int_set_wfi_drv_handler(NULL); |
83383ea3 | 6698 | down(&hSemDeinitDrvHandle); |
c5c77ba1 JK |
6699 | |
6700 | ||
6701 | /*Calling the CFG80211 scan done function with the abort flag set to true*/ | |
6702 | if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) { | |
b1413b60 | 6703 | pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_ABORTED, NULL, |
c5c77ba1 JK |
6704 | pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL); |
6705 | ||
b1413b60 | 6706 | pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = NULL; |
c5c77ba1 JK |
6707 | } |
6708 | /*deinit configurator and simulator*/ | |
c5c77ba1 | 6709 | CoreConfiguratorDeInit(); |
c5c77ba1 JK |
6710 | |
6711 | pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE; | |
6712 | ||
72ed4dc7 | 6713 | gbScanWhileConnected = false; |
c5c77ba1 | 6714 | |
2cc46837 | 6715 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6716 | |
6717 | if (clients_count == 1) { | |
334e1a57 | 6718 | if (WILC_TimerDestroy(&g_hPeriodicRSSI)) { |
03b2d5e7 | 6719 | PRINT_D(HOSTINF_DBG, ">> Connect timer is active\n"); |
c5c77ba1 JK |
6720 | /* msleep(HOST_IF_CONNECT_TIMEOUT+1000); */ |
6721 | } | |
6722 | strHostIFmsg.u16MsgId = HOST_IF_MSG_EXIT; | |
6723 | strHostIFmsg.drvHandler = hWFIDrv; | |
6724 | ||
6725 | ||
b1413b60 | 6726 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 6727 | if (s32Error != WILC_SUCCESS) |
c5c77ba1 | 6728 | PRINT_ER("Error in sending deinit's message queue message function: Error(%d)\n", s32Error); |
c5c77ba1 | 6729 | |
83383ea3 | 6730 | down(&hSemHostIFthrdEnd); |
c5c77ba1 JK |
6731 | |
6732 | ||
6733 | ||
b1413b60 | 6734 | WILC_MsgQueueDestroy(&gMsgQHostIF, NULL); |
c5c77ba1 | 6735 | msgQ_created = 0; |
c5c77ba1 JK |
6736 | } |
6737 | ||
83383ea3 | 6738 | down(&(pstrWFIDrv->gtOsCfgValuesSem)); |
c5c77ba1 JK |
6739 | |
6740 | /*Setting the gloabl driver handler with NULL*/ | |
6741 | u32Intialized = 0; | |
6742 | /* gWFiDrvHandle = NULL; */ | |
b1413b60 | 6743 | if (pstrWFIDrv != NULL) { |
49188af2 | 6744 | kfree(pstrWFIDrv); |
b1413b60 | 6745 | /* pstrWFIDrv=NULL; */ |
c5c77ba1 JK |
6746 | |
6747 | } | |
6748 | ||
6749 | clients_count--; /* Decrease number of created entities */ | |
b1413b60 | 6750 | terminated_handle = NULL; |
83383ea3 | 6751 | up(&hSemHostIntDeinit); |
c5c77ba1 JK |
6752 | return s32Error; |
6753 | } | |
6754 | ||
6755 | ||
6756 | /** | |
6757 | * @brief NetworkInfoReceived | |
6758 | * @details function to to be called when network info packet is received | |
6759 | * @param[in] pu8Buffer the received packet | |
6760 | * @param[in] u32Length length of the received packet | |
6761 | * @return none | |
6762 | * @note | |
6763 | * @author | |
6764 | * @date 1 Mar 2012 | |
6765 | * @version 1.0 | |
6766 | */ | |
4e4467fd | 6767 | void NetworkInfoReceived(u8 *pu8Buffer, u32 u32Length) |
c5c77ba1 | 6768 | { |
fb4ec9ca | 6769 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 6770 | tstrHostIFmsg strHostIFmsg; |
4e4467fd | 6771 | u32 drvHandler; |
b1413b60 | 6772 | tstrWILC_WFIDrv *pstrWFIDrv = NULL; |
c5c77ba1 JK |
6773 | |
6774 | drvHandler = ((pu8Buffer[u32Length - 4]) | (pu8Buffer[u32Length - 3] << 8) | (pu8Buffer[u32Length - 2] << 16) | (pu8Buffer[u32Length - 1] << 24)); | |
6775 | pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
6776 | ||
6777 | ||
6778 | ||
6779 | ||
b1413b60 | 6780 | if (pstrWFIDrv == NULL || pstrWFIDrv == terminated_handle) { |
8a14330f | 6781 | PRINT_ER("NetworkInfo received but driver not init[%p]\n", pstrWFIDrv); |
c5c77ba1 JK |
6782 | return; |
6783 | } | |
6784 | ||
6785 | /* prepare the Asynchronous Network Info message */ | |
2cc46837 | 6786 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6787 | |
6788 | strHostIFmsg.u16MsgId = HOST_IF_MSG_RCVD_NTWRK_INFO; | |
6789 | strHostIFmsg.drvHandler = pstrWFIDrv; | |
6790 | ||
6791 | strHostIFmsg.uniHostIFmsgBody.strRcvdNetworkInfo.u32Length = u32Length; | |
63d03e47 | 6792 | strHostIFmsg.uniHostIFmsgBody.strRcvdNetworkInfo.pu8Buffer = (u8 *)WILC_MALLOC(u32Length); /* will be deallocated by the receiving thread */ |
d00d2ba3 | 6793 | memcpy(strHostIFmsg.uniHostIFmsgBody.strRcvdNetworkInfo.pu8Buffer, |
c5c77ba1 JK |
6794 | pu8Buffer, u32Length); |
6795 | ||
6796 | /* send the message */ | |
b1413b60 | 6797 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 6798 | if (s32Error) |
c5c77ba1 | 6799 | PRINT_ER("Error in sending network info message queue message parameters: Error(%d)\n", s32Error); |
c5c77ba1 JK |
6800 | |
6801 | ||
6802 | return; | |
6803 | } | |
6804 | ||
6805 | /** | |
6806 | * @brief GnrlAsyncInfoReceived | |
6807 | * @details function to be called when general Asynchronous info packet is received | |
6808 | * @param[in] pu8Buffer the received packet | |
6809 | * @param[in] u32Length length of the received packet | |
6810 | * @return none | |
6811 | * @note | |
6812 | * @author | |
6813 | * @date 15 Mar 2012 | |
6814 | * @version 1.0 | |
6815 | */ | |
4e4467fd | 6816 | void GnrlAsyncInfoReceived(u8 *pu8Buffer, u32 u32Length) |
c5c77ba1 | 6817 | { |
fb4ec9ca | 6818 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 6819 | tstrHostIFmsg strHostIFmsg; |
4e4467fd | 6820 | u32 drvHandler; |
b1413b60 | 6821 | tstrWILC_WFIDrv *pstrWFIDrv = NULL; |
c5c77ba1 JK |
6822 | |
6823 | /*BugID_5348*/ | |
83383ea3 | 6824 | down(&hSemHostIntDeinit); |
c5c77ba1 JK |
6825 | |
6826 | drvHandler = ((pu8Buffer[u32Length - 4]) | (pu8Buffer[u32Length - 3] << 8) | (pu8Buffer[u32Length - 2] << 16) | (pu8Buffer[u32Length - 1] << 24)); | |
6827 | pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
03b2d5e7 | 6828 | PRINT_D(HOSTINF_DBG, "General asynchronous info packet received\n"); |
c5c77ba1 JK |
6829 | |
6830 | ||
6831 | if (pstrWFIDrv == NULL || pstrWFIDrv == terminated_handle) { | |
6832 | PRINT_D(HOSTINF_DBG, "Wifi driver handler is equal to NULL\n"); | |
6833 | /*BugID_5348*/ | |
83383ea3 | 6834 | up(&hSemHostIntDeinit); |
c5c77ba1 JK |
6835 | return; |
6836 | } | |
6837 | ||
b1413b60 | 6838 | if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult == NULL) { |
c5c77ba1 JK |
6839 | /* received mac status is not needed when there is no current Connect Request */ |
6840 | PRINT_ER("Received mac status is not needed when there is no current Connect Reques\n"); | |
6841 | /*BugID_5348*/ | |
83383ea3 | 6842 | up(&hSemHostIntDeinit); |
c5c77ba1 JK |
6843 | return; |
6844 | } | |
6845 | ||
6846 | /* prepare the General Asynchronous Info message */ | |
2cc46837 | 6847 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6848 | |
6849 | ||
6850 | strHostIFmsg.u16MsgId = HOST_IF_MSG_RCVD_GNRL_ASYNC_INFO; | |
6851 | strHostIFmsg.drvHandler = pstrWFIDrv; | |
6852 | ||
6853 | ||
6854 | strHostIFmsg.uniHostIFmsgBody.strRcvdGnrlAsyncInfo.u32Length = u32Length; | |
63d03e47 | 6855 | strHostIFmsg.uniHostIFmsgBody.strRcvdGnrlAsyncInfo.pu8Buffer = (u8 *)WILC_MALLOC(u32Length); /* will be deallocated by the receiving thread */ |
d00d2ba3 | 6856 | memcpy(strHostIFmsg.uniHostIFmsgBody.strRcvdGnrlAsyncInfo.pu8Buffer, |
c5c77ba1 JK |
6857 | pu8Buffer, u32Length); |
6858 | ||
6859 | /* send the message */ | |
b1413b60 | 6860 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 6861 | if (s32Error) |
c5c77ba1 | 6862 | PRINT_ER("Error in sending message queue asynchronous message info: Error(%d)\n", s32Error); |
c5c77ba1 JK |
6863 | |
6864 | /*BugID_5348*/ | |
83383ea3 | 6865 | up(&hSemHostIntDeinit); |
c5c77ba1 JK |
6866 | return; |
6867 | } | |
6868 | ||
6869 | /** | |
6870 | * @brief host_int_ScanCompleteReceived | |
6871 | * @details Setting scan complete received notifcation in message queue | |
4e4467fd | 6872 | * @param[in] u8* pu8Buffer, u32 u32Length |
c5c77ba1 JK |
6873 | * @return Error code. |
6874 | * @author | |
6875 | * @date | |
6876 | * @version 1.0 | |
6877 | */ | |
4e4467fd | 6878 | void host_int_ScanCompleteReceived(u8 *pu8Buffer, u32 u32Length) |
c5c77ba1 | 6879 | { |
fb4ec9ca | 6880 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 | 6881 | tstrHostIFmsg strHostIFmsg; |
4e4467fd | 6882 | u32 drvHandler; |
b1413b60 | 6883 | tstrWILC_WFIDrv *pstrWFIDrv = NULL; |
78c87591 | 6884 | |
c5c77ba1 JK |
6885 | drvHandler = ((pu8Buffer[u32Length - 4]) | (pu8Buffer[u32Length - 3] << 8) | (pu8Buffer[u32Length - 2] << 16) | (pu8Buffer[u32Length - 1] << 24)); |
6886 | pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler; | |
6887 | ||
6888 | ||
8a14330f | 6889 | PRINT_D(GENERIC_DBG, "Scan notification received %p\n", pstrWFIDrv); |
c5c77ba1 | 6890 | |
2b9d5b48 | 6891 | if (pstrWFIDrv == NULL || pstrWFIDrv == terminated_handle) |
c5c77ba1 | 6892 | return; |
c5c77ba1 JK |
6893 | |
6894 | /*if there is an ongoing scan request*/ | |
6895 | if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) { | |
6896 | /* prepare theScan Done message */ | |
2cc46837 | 6897 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6898 | |
6899 | strHostIFmsg.u16MsgId = HOST_IF_MSG_RCVD_SCAN_COMPLETE; | |
6900 | strHostIFmsg.drvHandler = pstrWFIDrv; | |
6901 | ||
6902 | ||
6903 | /* will be deallocated by the receiving thread */ | |
6904 | /*no need to send message body*/ | |
6905 | ||
6906 | /*strHostIFmsg.uniHostIFmsgBody.strScanComplete.u32Length = u32Length; | |
63d03e47 | 6907 | * strHostIFmsg.uniHostIFmsgBody.strScanComplete.pu8Buffer = (u8*)WILC_MALLOC(u32Length); |
d00d2ba3 | 6908 | * memcpy(strHostIFmsg.uniHostIFmsgBody.strScanComplete.pu8Buffer, |
c5c77ba1 JK |
6909 | * pu8Buffer, u32Length); */ |
6910 | ||
6911 | /* send the message */ | |
b1413b60 | 6912 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 6913 | if (s32Error) |
c5c77ba1 | 6914 | PRINT_ER("Error in sending message queue scan complete parameters: Error(%d)\n", s32Error); |
c5c77ba1 JK |
6915 | } |
6916 | ||
6917 | ||
6918 | return; | |
6919 | ||
6920 | } | |
6921 | ||
6922 | #ifdef WILC_P2P | |
6923 | /** | |
6924 | * @brief host_int_remain_on_channel | |
6925 | * @details | |
6926 | * @param[in] Handle to wifi driver | |
6927 | * Duration to remain on channel | |
6928 | * Channel to remain on | |
6929 | * Pointer to fn to be called on receive frames in listen state | |
6930 | * Pointer to remain-on-channel expired fn | |
6931 | * Priv | |
6932 | * @return Error code. | |
6933 | * @author | |
6934 | * @date | |
6935 | * @version 1.0 | |
6936 | */ | |
218dc407 | 6937 | s32 host_int_remain_on_channel(tstrWILC_WFIDrv *hWFIDrv, u32 u32SessionID, u32 u32duration, u16 chan, tWILCpfRemainOnChanExpired RemainOnChanExpired, tWILCpfRemainOnChanReady RemainOnChanReady, void *pvUserArg) |
c5c77ba1 | 6938 | { |
fb4ec9ca | 6939 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
6940 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
6941 | tstrHostIFmsg strHostIFmsg; | |
6942 | ||
2b9d5b48 | 6943 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 6944 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
6945 | |
6946 | /* prepare the remainonchan Message */ | |
2cc46837 | 6947 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6948 | |
6949 | /* prepare the WiphyParams Message */ | |
6950 | strHostIFmsg.u16MsgId = HOST_IF_MSG_REMAIN_ON_CHAN; | |
6951 | strHostIFmsg.uniHostIFmsgBody.strHostIfRemainOnChan.u16Channel = chan; | |
6952 | strHostIFmsg.uniHostIFmsgBody.strHostIfRemainOnChan.pRemainOnChanExpired = RemainOnChanExpired; | |
6953 | strHostIFmsg.uniHostIFmsgBody.strHostIfRemainOnChan.pRemainOnChanReady = RemainOnChanReady; | |
6954 | strHostIFmsg.uniHostIFmsgBody.strHostIfRemainOnChan.pVoid = pvUserArg; | |
6955 | strHostIFmsg.uniHostIFmsgBody.strHostIfRemainOnChan.u32duration = u32duration; | |
6956 | strHostIFmsg.uniHostIFmsgBody.strHostIfRemainOnChan.u32ListenSessionID = u32SessionID; | |
6957 | strHostIFmsg.drvHandler = hWFIDrv; | |
6958 | ||
b1413b60 | 6959 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 6960 | if (s32Error) |
c5c77ba1 | 6961 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
6962 | WILC_CATCH(s32Error) |
6963 | { | |
6964 | ||
6965 | } | |
6966 | ||
6967 | return s32Error; | |
6968 | } | |
6969 | ||
6970 | /** | |
6971 | * @brief host_int_ListenStateExpired | |
6972 | * @details | |
6973 | * @param[in] Handle to wifi driver | |
6974 | * Duration to remain on channel | |
6975 | * Channel to remain on | |
6976 | * Pointer to fn to be called on receive frames in listen state | |
6977 | * Pointer to remain-on-channel expired fn | |
6978 | * Priv | |
6979 | * @return Error code. | |
6980 | * @author | |
6981 | * @date | |
6982 | * @version 1.0 | |
6983 | */ | |
218dc407 | 6984 | s32 host_int_ListenStateExpired(tstrWILC_WFIDrv *hWFIDrv, u32 u32SessionID) |
c5c77ba1 | 6985 | { |
fb4ec9ca | 6986 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
6987 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
6988 | tstrHostIFmsg strHostIFmsg; | |
6989 | ||
2b9d5b48 | 6990 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 6991 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
6992 | |
6993 | /*Stopping remain-on-channel timer*/ | |
334e1a57 | 6994 | WILC_TimerStop(&pstrWFIDrv->hRemainOnChannel); |
c5c77ba1 JK |
6995 | |
6996 | /* prepare the timer fire Message */ | |
2cc46837 | 6997 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
6998 | strHostIFmsg.u16MsgId = HOST_IF_MSG_LISTEN_TIMER_FIRED; |
6999 | strHostIFmsg.drvHandler = hWFIDrv; | |
7000 | strHostIFmsg.uniHostIFmsgBody.strHostIfRemainOnChan.u32ListenSessionID = u32SessionID; | |
7001 | ||
b1413b60 | 7002 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7003 | if (s32Error) |
c5c77ba1 | 7004 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7005 | WILC_CATCH(s32Error) |
7006 | { | |
7007 | ||
7008 | } | |
7009 | return s32Error; | |
7010 | } | |
7011 | ||
7012 | /** | |
7013 | * @brief host_int_frame_register | |
7014 | * @details | |
7015 | * @param[in] Handle to wifi driver | |
7016 | * @return Error code. | |
7017 | * @author | |
7018 | * @date | |
7019 | * @version 1.0*/ | |
218dc407 | 7020 | s32 host_int_frame_register(tstrWILC_WFIDrv *hWFIDrv, u16 u16FrameType, bool bReg) |
c5c77ba1 | 7021 | { |
fb4ec9ca | 7022 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7023 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7024 | tstrHostIFmsg strHostIFmsg; | |
7025 | ||
2b9d5b48 | 7026 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7027 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 7028 | |
2cc46837 | 7029 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7030 | |
7031 | /* prepare the WiphyParams Message */ | |
7032 | strHostIFmsg.u16MsgId = HOST_IF_MSG_REGISTER_FRAME; | |
7033 | switch (u16FrameType) { | |
7034 | case ACTION: | |
7035 | PRINT_D(HOSTINF_DBG, "ACTION\n"); | |
7036 | strHostIFmsg.uniHostIFmsgBody.strHostIfRegisterFrame.u8Regid = ACTION_FRM_IDX; | |
7037 | break; | |
7038 | ||
7039 | case PROBE_REQ: | |
7040 | PRINT_D(HOSTINF_DBG, "PROBE REQ\n"); | |
7041 | strHostIFmsg.uniHostIFmsgBody.strHostIfRegisterFrame.u8Regid = PROBE_REQ_IDX; | |
7042 | break; | |
7043 | ||
7044 | default: | |
7045 | PRINT_D(HOSTINF_DBG, "Not valid frame type\n"); | |
7046 | break; | |
7047 | } | |
7048 | strHostIFmsg.uniHostIFmsgBody.strHostIfRegisterFrame.u16FrameType = u16FrameType; | |
7049 | strHostIFmsg.uniHostIFmsgBody.strHostIfRegisterFrame.bReg = bReg; | |
7050 | strHostIFmsg.drvHandler = hWFIDrv; | |
7051 | ||
b1413b60 | 7052 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7053 | if (s32Error) |
c5c77ba1 | 7054 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7055 | WILC_CATCH(s32Error) |
7056 | { | |
7057 | ||
7058 | } | |
7059 | ||
7060 | return s32Error; | |
7061 | ||
7062 | ||
7063 | } | |
7064 | #endif | |
7065 | ||
7066 | #ifdef WILC_AP_EXTERNAL_MLME | |
7067 | /** | |
7068 | * @brief host_int_add_beacon | |
7069 | * @details Setting add beacon params in message queue | |
4e4467fd CL |
7070 | * @param[in] WILC_WFIDrvHandle hWFIDrv, u32 u32Interval, |
7071 | * u32 u32DTIMPeriod,u32 u32HeadLen, u8* pu8Head, | |
7072 | * u32 u32TailLen, u8* pu8Tail | |
c5c77ba1 JK |
7073 | * @return Error code. |
7074 | * @author | |
7075 | * @date | |
7076 | * @version 1.0 | |
7077 | */ | |
218dc407 | 7078 | s32 host_int_add_beacon(tstrWILC_WFIDrv *hWFIDrv, u32 u32Interval, |
4e4467fd CL |
7079 | u32 u32DTIMPeriod, |
7080 | u32 u32HeadLen, u8 *pu8Head, | |
7081 | u32 u32TailLen, u8 *pu8Tail) | |
c5c77ba1 | 7082 | { |
fb4ec9ca | 7083 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7084 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7085 | tstrHostIFmsg strHostIFmsg; | |
7086 | tstrHostIFSetBeacon *pstrSetBeaconParam = &strHostIFmsg.uniHostIFmsgBody.strHostIFSetBeacon; | |
7087 | ||
2b9d5b48 | 7088 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7089 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 7090 | |
2cc46837 | 7091 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7092 | |
7093 | PRINT_D(HOSTINF_DBG, "Setting adding beacon message queue params\n"); | |
7094 | ||
7095 | ||
7096 | /* prepare the WiphyParams Message */ | |
7097 | strHostIFmsg.u16MsgId = HOST_IF_MSG_ADD_BEACON; | |
7098 | strHostIFmsg.drvHandler = hWFIDrv; | |
7099 | pstrSetBeaconParam->u32Interval = u32Interval; | |
7100 | pstrSetBeaconParam->u32DTIMPeriod = u32DTIMPeriod; | |
7101 | pstrSetBeaconParam->u32HeadLen = u32HeadLen; | |
63d03e47 | 7102 | pstrSetBeaconParam->pu8Head = (u8 *)WILC_MALLOC(u32HeadLen); |
2b9d5b48 | 7103 | if (pstrSetBeaconParam->pu8Head == NULL) |
c5c77ba1 | 7104 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
d00d2ba3 | 7105 | memcpy(pstrSetBeaconParam->pu8Head, pu8Head, u32HeadLen); |
c5c77ba1 JK |
7106 | pstrSetBeaconParam->u32TailLen = u32TailLen; |
7107 | ||
7108 | /* Bug 4599 : if tail length = 0 skip allocating & copying */ | |
7109 | if (u32TailLen > 0) { | |
63d03e47 | 7110 | pstrSetBeaconParam->pu8Tail = (u8 *)WILC_MALLOC(u32TailLen); |
2b9d5b48 | 7111 | if (pstrSetBeaconParam->pu8Tail == NULL) |
c5c77ba1 | 7112 | WILC_ERRORREPORT(s32Error, WILC_NO_MEM); |
d00d2ba3 | 7113 | memcpy(pstrSetBeaconParam->pu8Tail, pu8Tail, u32TailLen); |
c5c77ba1 JK |
7114 | } else { |
7115 | pstrSetBeaconParam->pu8Tail = NULL; | |
7116 | } | |
7117 | ||
b1413b60 | 7118 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7119 | if (s32Error) |
c5c77ba1 | 7120 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7121 | |
7122 | WILC_CATCH(s32Error) | |
7123 | { | |
2b9d5b48 | 7124 | if (pstrSetBeaconParam->pu8Head != NULL) |
49188af2 | 7125 | kfree(pstrSetBeaconParam->pu8Head); |
c5c77ba1 | 7126 | |
2b9d5b48 | 7127 | if (pstrSetBeaconParam->pu8Tail != NULL) |
49188af2 | 7128 | kfree(pstrSetBeaconParam->pu8Tail); |
c5c77ba1 JK |
7129 | } |
7130 | ||
7131 | return s32Error; | |
7132 | ||
7133 | } | |
7134 | ||
7135 | ||
7136 | /** | |
7137 | * @brief host_int_del_beacon | |
7138 | * @details Setting add beacon params in message queue | |
7139 | * @param[in] WILC_WFIDrvHandle hWFIDrv | |
7140 | * @return Error code. | |
7141 | * @author | |
7142 | * @date | |
7143 | * @version 1.0 | |
7144 | */ | |
218dc407 | 7145 | s32 host_int_del_beacon(tstrWILC_WFIDrv *hWFIDrv) |
c5c77ba1 | 7146 | { |
fb4ec9ca | 7147 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7148 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7149 | tstrHostIFmsg strHostIFmsg; | |
7150 | ||
2b9d5b48 | 7151 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7152 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
7153 | |
7154 | /* prepare the WiphyParams Message */ | |
7155 | strHostIFmsg.u16MsgId = HOST_IF_MSG_DEL_BEACON; | |
7156 | strHostIFmsg.drvHandler = hWFIDrv; | |
7157 | PRINT_D(HOSTINF_DBG, "Setting deleting beacon message queue params\n"); | |
7158 | ||
b1413b60 | 7159 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
7160 | WILC_ERRORCHECK(s32Error); |
7161 | ||
7162 | WILC_CATCH(s32Error) | |
7163 | { | |
7164 | } | |
7165 | return s32Error; | |
7166 | } | |
7167 | ||
7168 | ||
7169 | /** | |
7170 | * @brief host_int_add_station | |
7171 | * @details Setting add station params in message queue | |
7172 | * @param[in] WILC_WFIDrvHandle hWFIDrv, tstrWILC_AddStaParam* pstrStaParams | |
7173 | * @return Error code. | |
7174 | * @author | |
7175 | * @date | |
7176 | * @version 1.0 | |
7177 | */ | |
218dc407 | 7178 | s32 host_int_add_station(tstrWILC_WFIDrv *hWFIDrv, tstrWILC_AddStaParam *pstrStaParams) |
c5c77ba1 | 7179 | { |
fb4ec9ca | 7180 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7181 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7182 | tstrHostIFmsg strHostIFmsg; | |
7183 | tstrWILC_AddStaParam *pstrAddStationMsg = &strHostIFmsg.uniHostIFmsgBody.strAddStaParam; | |
7184 | ||
7185 | ||
2b9d5b48 | 7186 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7187 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 7188 | |
2cc46837 | 7189 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7190 | |
7191 | PRINT_D(HOSTINF_DBG, "Setting adding station message queue params\n"); | |
7192 | ||
7193 | ||
7194 | /* prepare the WiphyParams Message */ | |
7195 | strHostIFmsg.u16MsgId = HOST_IF_MSG_ADD_STATION; | |
7196 | strHostIFmsg.drvHandler = hWFIDrv; | |
7197 | ||
d00d2ba3 | 7198 | memcpy(pstrAddStationMsg, pstrStaParams, sizeof(tstrWILC_AddStaParam)); |
c5c77ba1 | 7199 | if (pstrAddStationMsg->u8NumRates > 0) { |
057d1e97 | 7200 | u8 *rates = WILC_MALLOC(pstrAddStationMsg->u8NumRates); |
78c87591 | 7201 | |
057d1e97 | 7202 | WILC_NULLCHECK(s32Error, rates); |
c5c77ba1 | 7203 | |
d00d2ba3 | 7204 | memcpy(rates, pstrStaParams->pu8Rates, pstrAddStationMsg->u8NumRates); |
057d1e97 | 7205 | pstrAddStationMsg->pu8Rates = rates; |
c5c77ba1 JK |
7206 | } |
7207 | ||
7208 | ||
b1413b60 | 7209 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7210 | if (s32Error) |
c5c77ba1 | 7211 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7212 | |
7213 | WILC_CATCH(s32Error) | |
7214 | { | |
7215 | } | |
7216 | return s32Error; | |
7217 | } | |
7218 | ||
7219 | /** | |
7220 | * @brief host_int_del_station | |
7221 | * @details Setting delete station params in message queue | |
63d03e47 | 7222 | * @param[in] WILC_WFIDrvHandle hWFIDrv, u8* pu8MacAddr |
c5c77ba1 JK |
7223 | * @return Error code. |
7224 | * @author | |
7225 | * @date | |
7226 | * @version 1.0 | |
7227 | */ | |
218dc407 | 7228 | s32 host_int_del_station(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8MacAddr) |
c5c77ba1 | 7229 | { |
fb4ec9ca | 7230 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7231 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7232 | tstrHostIFmsg strHostIFmsg; | |
7233 | tstrHostIFDelSta *pstrDelStationMsg = &strHostIFmsg.uniHostIFmsgBody.strDelStaParam; | |
7234 | ||
2b9d5b48 | 7235 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7236 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 7237 | |
2cc46837 | 7238 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7239 | |
7240 | PRINT_D(HOSTINF_DBG, "Setting deleting station message queue params\n"); | |
7241 | ||
7242 | ||
7243 | ||
7244 | /* prepare the WiphyParams Message */ | |
7245 | strHostIFmsg.u16MsgId = HOST_IF_MSG_DEL_STATION; | |
7246 | strHostIFmsg.drvHandler = hWFIDrv; | |
7247 | ||
7248 | /*BugID_4795: Handling situation of deleting all stations*/ | |
b1413b60 | 7249 | if (pu8MacAddr == NULL) |
2cc46837 | 7250 | memset(pstrDelStationMsg->au8MacAddr, 255, ETH_ALEN); |
c5c77ba1 | 7251 | else |
d00d2ba3 | 7252 | memcpy(pstrDelStationMsg->au8MacAddr, pu8MacAddr, ETH_ALEN); |
c5c77ba1 | 7253 | |
b1413b60 | 7254 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7255 | if (s32Error) |
c5c77ba1 | 7256 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7257 | |
7258 | WILC_CATCH(s32Error) | |
7259 | { | |
7260 | } | |
7261 | return s32Error; | |
7262 | } | |
7263 | /** | |
7264 | * @brief host_int_del_allstation | |
7265 | * @details Setting del station params in message queue | |
63d03e47 | 7266 | * @param[in] WILC_WFIDrvHandle hWFIDrv, u8 pu8MacAddr[][ETH_ALEN]s |
c5c77ba1 JK |
7267 | * @return Error code. |
7268 | * @author | |
7269 | * @date | |
7270 | * @version 1.0 | |
7271 | */ | |
218dc407 | 7272 | s32 host_int_del_allstation(tstrWILC_WFIDrv *hWFIDrv, u8 pu8MacAddr[][ETH_ALEN]) |
c5c77ba1 | 7273 | { |
fb4ec9ca | 7274 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7275 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7276 | tstrHostIFmsg strHostIFmsg; | |
7277 | tstrHostIFDelAllSta *pstrDelAllStationMsg = &strHostIFmsg.uniHostIFmsgBody.strHostIFDelAllSta; | |
63d03e47 | 7278 | u8 au8Zero_Buff[ETH_ALEN] = {0}; |
4e4467fd | 7279 | u32 i; |
63d03e47 | 7280 | u8 u8AssocNumb = 0; |
c5c77ba1 JK |
7281 | |
7282 | ||
2b9d5b48 | 7283 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7284 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 7285 | |
2cc46837 | 7286 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7287 | |
7288 | PRINT_D(HOSTINF_DBG, "Setting deauthenticating station message queue params\n"); | |
7289 | ||
7290 | /* prepare the WiphyParams Message */ | |
7291 | strHostIFmsg.u16MsgId = HOST_IF_MSG_DEL_ALL_STA; | |
7292 | strHostIFmsg.drvHandler = hWFIDrv; | |
7293 | ||
7294 | /* Handling situation of deauthenticing all associated stations*/ | |
7295 | for (i = 0; i < MAX_NUM_STA; i++) { | |
7296 | if (memcmp(pu8MacAddr[i], au8Zero_Buff, ETH_ALEN)) { | |
d00d2ba3 | 7297 | memcpy(pstrDelAllStationMsg->au8Sta_DelAllSta[i], pu8MacAddr[i], ETH_ALEN); |
c5c77ba1 JK |
7298 | PRINT_D(CFG80211_DBG, "BSSID = %x%x%x%x%x%x\n", pstrDelAllStationMsg->au8Sta_DelAllSta[i][0], pstrDelAllStationMsg->au8Sta_DelAllSta[i][1], pstrDelAllStationMsg->au8Sta_DelAllSta[i][2], pstrDelAllStationMsg->au8Sta_DelAllSta[i][3], pstrDelAllStationMsg->au8Sta_DelAllSta[i][4], |
7299 | pstrDelAllStationMsg->au8Sta_DelAllSta[i][5]); | |
7300 | u8AssocNumb++; | |
7301 | } | |
7302 | } | |
7303 | if (!u8AssocNumb) { | |
7304 | PRINT_D(CFG80211_DBG, "NO ASSOCIATED STAS\n"); | |
7305 | return s32Error; | |
7306 | } | |
7307 | ||
7308 | pstrDelAllStationMsg->u8Num_AssocSta = u8AssocNumb; | |
b1413b60 | 7309 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
c5c77ba1 JK |
7310 | |
7311 | ||
2b9d5b48 | 7312 | if (s32Error) |
c5c77ba1 JK |
7313 | WILC_ERRORREPORT(s32Error, s32Error); |
7314 | ||
c5c77ba1 JK |
7315 | WILC_CATCH(s32Error) |
7316 | { | |
7317 | ||
7318 | } | |
83383ea3 | 7319 | down(&hWaitResponse); |
c5c77ba1 JK |
7320 | |
7321 | return s32Error; | |
7322 | ||
7323 | } | |
7324 | ||
7325 | /** | |
7326 | * @brief host_int_edit_station | |
7327 | * @details Setting edit station params in message queue | |
7328 | * @param[in] WILC_WFIDrvHandle hWFIDrv, tstrWILC_AddStaParam* pstrStaParams | |
7329 | * @return Error code. | |
7330 | * @author | |
7331 | * @date | |
7332 | * @version 1.0 | |
7333 | */ | |
218dc407 | 7334 | s32 host_int_edit_station(tstrWILC_WFIDrv *hWFIDrv, tstrWILC_AddStaParam *pstrStaParams) |
c5c77ba1 | 7335 | { |
fb4ec9ca | 7336 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7337 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7338 | tstrHostIFmsg strHostIFmsg; | |
7339 | tstrWILC_AddStaParam *pstrAddStationMsg = &strHostIFmsg.uniHostIFmsgBody.strAddStaParam; | |
7340 | ||
2b9d5b48 | 7341 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7342 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
7343 | |
7344 | PRINT_D(HOSTINF_DBG, "Setting editing station message queue params\n"); | |
7345 | ||
2cc46837 | 7346 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7347 | |
7348 | ||
7349 | /* prepare the WiphyParams Message */ | |
7350 | strHostIFmsg.u16MsgId = HOST_IF_MSG_EDIT_STATION; | |
7351 | strHostIFmsg.drvHandler = hWFIDrv; | |
7352 | ||
d00d2ba3 | 7353 | memcpy(pstrAddStationMsg, pstrStaParams, sizeof(tstrWILC_AddStaParam)); |
c5c77ba1 | 7354 | if (pstrAddStationMsg->u8NumRates > 0) { |
057d1e97 | 7355 | u8 *rates = WILC_MALLOC(pstrAddStationMsg->u8NumRates); |
78c87591 | 7356 | |
057d1e97 | 7357 | WILC_NULLCHECK(s32Error, rates); |
d00d2ba3 | 7358 | memcpy(rates, pstrStaParams->pu8Rates, pstrAddStationMsg->u8NumRates); |
057d1e97 | 7359 | pstrAddStationMsg->pu8Rates = rates; |
c5c77ba1 JK |
7360 | } |
7361 | ||
b1413b60 | 7362 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7363 | if (s32Error) |
c5c77ba1 | 7364 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7365 | WILC_CATCH(s32Error) |
7366 | { | |
7367 | } | |
7368 | return s32Error; | |
7369 | } | |
7370 | #endif /*WILC_AP_EXTERNAL_MLME*/ | |
7371 | uint32_t wilc_get_chipid(uint8_t); | |
7372 | ||
218dc407 | 7373 | s32 host_int_set_power_mgmt(tstrWILC_WFIDrv *hWFIDrv, bool bIsEnabled, u32 u32Timeout) |
c5c77ba1 | 7374 | { |
fb4ec9ca | 7375 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7376 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7377 | tstrHostIFmsg strHostIFmsg; | |
7378 | tstrHostIfPowerMgmtParam *pstrPowerMgmtParam = &strHostIFmsg.uniHostIFmsgBody.strPowerMgmtparam; | |
7379 | ||
03b2d5e7 | 7380 | PRINT_INFO(HOSTINF_DBG, "\n\n>> Setting PS to %d <<\n\n", bIsEnabled); |
c5c77ba1 | 7381 | |
2b9d5b48 | 7382 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7383 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
7384 | |
7385 | PRINT_D(HOSTINF_DBG, "Setting Power management message queue params\n"); | |
7386 | ||
2cc46837 | 7387 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7388 | |
7389 | ||
7390 | /* prepare the WiphyParams Message */ | |
7391 | strHostIFmsg.u16MsgId = HOST_IF_MSG_POWER_MGMT; | |
7392 | strHostIFmsg.drvHandler = hWFIDrv; | |
7393 | ||
7394 | pstrPowerMgmtParam->bIsEnabled = bIsEnabled; | |
7395 | pstrPowerMgmtParam->u32Timeout = u32Timeout; | |
7396 | ||
7397 | ||
b1413b60 | 7398 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7399 | if (s32Error) |
c5c77ba1 | 7400 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7401 | WILC_CATCH(s32Error) |
7402 | { | |
7403 | } | |
7404 | return s32Error; | |
7405 | } | |
7406 | ||
218dc407 | 7407 | s32 host_int_setup_multicast_filter(tstrWILC_WFIDrv *hWFIDrv, bool bIsEnabled, u32 u32count) |
c5c77ba1 | 7408 | { |
fb4ec9ca | 7409 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7410 | |
7411 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; | |
7412 | tstrHostIFmsg strHostIFmsg; | |
7413 | tstrHostIFSetMulti *pstrMulticastFilterParam = &strHostIFmsg.uniHostIFmsgBody.strHostIfSetMulti; | |
7414 | ||
7415 | ||
2b9d5b48 | 7416 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7417 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 JK |
7418 | |
7419 | PRINT_D(HOSTINF_DBG, "Setting Multicast Filter params\n"); | |
7420 | ||
2cc46837 | 7421 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7422 | |
7423 | ||
7424 | /* prepare the WiphyParams Message */ | |
7425 | strHostIFmsg.u16MsgId = HOST_IF_MSG_SET_MULTICAST_FILTER; | |
7426 | strHostIFmsg.drvHandler = hWFIDrv; | |
7427 | ||
7428 | pstrMulticastFilterParam->bIsEnabled = bIsEnabled; | |
7429 | pstrMulticastFilterParam->u32count = u32count; | |
7430 | ||
b1413b60 | 7431 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7432 | if (s32Error) |
c5c77ba1 | 7433 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7434 | WILC_CATCH(s32Error) |
7435 | { | |
7436 | } | |
7437 | return s32Error; | |
7438 | } | |
7439 | ||
7440 | ||
7441 | ||
7442 | /*Bug4218: Parsing Join Param*/ | |
7443 | #ifdef WILC_PARSE_SCAN_IN_HOST | |
7444 | ||
7445 | /*Bug4218: Parsing Join Param*/ | |
7446 | /** | |
7447 | * @brief host_int_ParseJoinBssParam | |
7448 | * @details Parse Needed Join Parameters and save it in a new JoinBssParam entry | |
7449 | * @param[in] tstrNetworkInfo* ptstrNetworkInfo | |
7450 | * @return | |
7451 | * @author zsalah | |
7452 | * @date | |
7453 | * @version 1.0**/ | |
7454 | static void *host_int_ParseJoinBssParam(tstrNetworkInfo *ptstrNetworkInfo) | |
7455 | { | |
7456 | tstrJoinBssParam *pNewJoinBssParam = NULL; | |
63d03e47 | 7457 | u8 *pu8IEs; |
d85f5326 CL |
7458 | u16 u16IEsLen; |
7459 | u16 index = 0; | |
63d03e47 GKH |
7460 | u8 suppRatesNo = 0; |
7461 | u8 extSuppRatesNo; | |
d85f5326 | 7462 | u16 jumpOffset; |
63d03e47 GKH |
7463 | u8 pcipherCount; |
7464 | u8 authCount; | |
7465 | u8 pcipherTotalCount = 0; | |
7466 | u8 authTotalCount = 0; | |
7467 | u8 i, j; | |
c5c77ba1 JK |
7468 | |
7469 | pu8IEs = ptstrNetworkInfo->pu8IEs; | |
7470 | u16IEsLen = ptstrNetworkInfo->u16IEsLen; | |
7471 | ||
7472 | pNewJoinBssParam = WILC_MALLOC(sizeof(tstrJoinBssParam)); | |
7473 | if (pNewJoinBssParam != NULL) { | |
2cc46837 | 7474 | memset(pNewJoinBssParam, 0, sizeof(tstrJoinBssParam)); |
c5c77ba1 JK |
7475 | pNewJoinBssParam->dtim_period = ptstrNetworkInfo->u8DtimPeriod; |
7476 | pNewJoinBssParam->beacon_period = ptstrNetworkInfo->u16BeaconPeriod; | |
7477 | pNewJoinBssParam->cap_info = ptstrNetworkInfo->u16CapInfo; | |
d00d2ba3 | 7478 | memcpy(pNewJoinBssParam->au8bssid, ptstrNetworkInfo->au8bssid, 6); |
c5c77ba1 JK |
7479 | /*for(i=0; i<6;i++) |
7480 | * PRINT_D(HOSTINF_DBG,"%c",pNewJoinBssParam->au8bssid[i]);*/ | |
d00d2ba3 | 7481 | memcpy((u8 *)pNewJoinBssParam->ssid, ptstrNetworkInfo->au8ssid, ptstrNetworkInfo->u8SsidLen + 1); |
c5c77ba1 | 7482 | pNewJoinBssParam->ssidLen = ptstrNetworkInfo->u8SsidLen; |
2cc46837 CL |
7483 | memset(pNewJoinBssParam->rsn_pcip_policy, 0xFF, 3); |
7484 | memset(pNewJoinBssParam->rsn_auth_policy, 0xFF, 3); | |
c5c77ba1 JK |
7485 | /*for(i=0; i<pNewJoinBssParam->ssidLen;i++) |
7486 | * PRINT_D(HOSTINF_DBG,"%c",pNewJoinBssParam->ssid[i]);*/ | |
7487 | ||
7488 | /* parse supported rates: */ | |
7489 | while (index < u16IEsLen) { | |
7490 | /* supportedRates IE */ | |
7491 | if (pu8IEs[index] == SUPP_RATES_IE) { | |
7492 | /* PRINT_D(HOSTINF_DBG, "Supported Rates\n"); */ | |
7493 | suppRatesNo = pu8IEs[index + 1]; | |
7494 | pNewJoinBssParam->supp_rates[0] = suppRatesNo; | |
7495 | index += 2; /* skipping ID and length bytes; */ | |
7496 | ||
7497 | for (i = 0; i < suppRatesNo; i++) { | |
7498 | pNewJoinBssParam->supp_rates[i + 1] = pu8IEs[index + i]; | |
7499 | /* PRINT_D(HOSTINF_DBG,"%0x ",pNewJoinBssParam->supp_rates[i+1]); */ | |
7500 | } | |
7501 | index += suppRatesNo; | |
7502 | continue; | |
7503 | } | |
7504 | /* Ext SupportedRates IE */ | |
7505 | else if (pu8IEs[index] == EXT_SUPP_RATES_IE) { | |
7506 | /* PRINT_D(HOSTINF_DBG, "Extended Supported Rates\n"); */ | |
7507 | /* checking if no of ext. supp and supp rates < max limit */ | |
7508 | extSuppRatesNo = pu8IEs[index + 1]; | |
7509 | if (extSuppRatesNo > (MAX_RATES_SUPPORTED - suppRatesNo)) | |
7510 | pNewJoinBssParam->supp_rates[0] = MAX_RATES_SUPPORTED; | |
7511 | else | |
7512 | pNewJoinBssParam->supp_rates[0] += extSuppRatesNo; | |
7513 | index += 2; | |
7514 | /* pNewJoinBssParam.supp_rates[0] contains now old number not the ext. no */ | |
7515 | for (i = 0; i < (pNewJoinBssParam->supp_rates[0] - suppRatesNo); i++) { | |
7516 | pNewJoinBssParam->supp_rates[suppRatesNo + i + 1] = pu8IEs[index + i]; | |
7517 | /* PRINT_D(HOSTINF_DBG,"%0x ",pNewJoinBssParam->supp_rates[suppRatesNo+i+1]); */ | |
7518 | } | |
7519 | index += extSuppRatesNo; | |
7520 | continue; | |
7521 | } | |
7522 | /* HT Cap. IE */ | |
7523 | else if (pu8IEs[index] == HT_CAPABILITY_IE) { | |
7524 | /* if IE found set the flag */ | |
0be1eb74 | 7525 | pNewJoinBssParam->ht_capable = true; |
c5c77ba1 JK |
7526 | index += pu8IEs[index + 1] + 2; /* ID,Length bytes and IE body */ |
7527 | /* PRINT_D(HOSTINF_DBG,"HT_CAPABALE\n"); */ | |
7528 | continue; | |
7529 | } else if ((pu8IEs[index] == WMM_IE) && /* WMM Element ID */ | |
7530 | (pu8IEs[index + 2] == 0x00) && (pu8IEs[index + 3] == 0x50) && | |
7531 | (pu8IEs[index + 4] == 0xF2) && /* OUI */ | |
7532 | (pu8IEs[index + 5] == 0x02) && /* OUI Type */ | |
7533 | ((pu8IEs[index + 6] == 0x00) || (pu8IEs[index + 6] == 0x01)) && /* OUI Sub Type */ | |
7534 | (pu8IEs[index + 7] == 0x01)) { | |
7535 | /* Presence of WMM Info/Param element indicates WMM capability */ | |
0be1eb74 | 7536 | pNewJoinBssParam->wmm_cap = true; |
c5c77ba1 JK |
7537 | |
7538 | /* Check if Bit 7 is set indicating U-APSD capability */ | |
2b9d5b48 | 7539 | if (pu8IEs[index + 8] & (1 << 7)) |
0be1eb74 | 7540 | pNewJoinBssParam->uapsd_cap = true; |
c5c77ba1 JK |
7541 | index += pu8IEs[index + 1] + 2; |
7542 | continue; | |
7543 | } | |
7544 | #ifdef WILC_P2P | |
7545 | else if ((pu8IEs[index] == P2P_IE) && /* P2P Element ID */ | |
7546 | (pu8IEs[index + 2] == 0x50) && (pu8IEs[index + 3] == 0x6f) && | |
7547 | (pu8IEs[index + 4] == 0x9a) && /* OUI */ | |
7548 | (pu8IEs[index + 5] == 0x09) && (pu8IEs[index + 6] == 0x0c)) { /* OUI Type */ | |
d85f5326 | 7549 | u16 u16P2P_count; |
78c87591 | 7550 | |
c5c77ba1 JK |
7551 | pNewJoinBssParam->tsf = ptstrNetworkInfo->u32Tsf; |
7552 | pNewJoinBssParam->u8NoaEnbaled = 1; | |
7553 | pNewJoinBssParam->u8Index = pu8IEs[index + 9]; | |
7554 | ||
7555 | /* Check if Bit 7 is set indicating Opss capability */ | |
7556 | if (pu8IEs[index + 10] & (1 << 7)) { | |
7557 | pNewJoinBssParam->u8OppEnable = 1; | |
7558 | pNewJoinBssParam->u8CtWindow = pu8IEs[index + 10]; | |
7559 | } else | |
7560 | pNewJoinBssParam->u8OppEnable = 0; | |
7561 | /* HOSTINF_DBG */ | |
03b2d5e7 | 7562 | PRINT_D(GENERIC_DBG, "P2P Dump\n"); |
c5c77ba1 | 7563 | for (i = 0; i < pu8IEs[index + 7]; i++) |
03b2d5e7 | 7564 | PRINT_D(GENERIC_DBG, " %x\n", pu8IEs[index + 9 + i]); |
c5c77ba1 JK |
7565 | |
7566 | pNewJoinBssParam->u8Count = pu8IEs[index + 11]; | |
7567 | u16P2P_count = index + 12; | |
7568 | ||
d00d2ba3 | 7569 | memcpy(pNewJoinBssParam->au8Duration, pu8IEs + u16P2P_count, 4); |
c5c77ba1 JK |
7570 | u16P2P_count += 4; |
7571 | ||
d00d2ba3 | 7572 | memcpy(pNewJoinBssParam->au8Interval, pu8IEs + u16P2P_count, 4); |
c5c77ba1 JK |
7573 | u16P2P_count += 4; |
7574 | ||
d00d2ba3 | 7575 | memcpy(pNewJoinBssParam->au8StartTime, pu8IEs + u16P2P_count, 4); |
c5c77ba1 JK |
7576 | |
7577 | index += pu8IEs[index + 1] + 2; | |
7578 | continue; | |
7579 | ||
7580 | } | |
7581 | #endif | |
7582 | else if ((pu8IEs[index] == RSN_IE) || | |
7583 | ((pu8IEs[index] == WPA_IE) && (pu8IEs[index + 2] == 0x00) && | |
7584 | (pu8IEs[index + 3] == 0x50) && (pu8IEs[index + 4] == 0xF2) && | |
7585 | (pu8IEs[index + 5] == 0x01))) { | |
d85f5326 | 7586 | u16 rsnIndex = index; |
c5c77ba1 JK |
7587 | /*PRINT_D(HOSTINF_DBG,"RSN IE Length:%d\n",pu8IEs[rsnIndex+1]); |
7588 | * for(i=0; i<pu8IEs[rsnIndex+1]; i++) | |
7589 | * { | |
7590 | * PRINT_D(HOSTINF_DBG,"%0x ",pu8IEs[rsnIndex+2+i]); | |
7591 | * }*/ | |
7592 | if (pu8IEs[rsnIndex] == RSN_IE) { | |
7593 | pNewJoinBssParam->mode_802_11i = 2; | |
7594 | /* PRINT_D(HOSTINF_DBG,"\nRSN_IE\n"); */ | |
7595 | } else { /* check if rsn was previously parsed */ | |
7596 | if (pNewJoinBssParam->mode_802_11i == 0) | |
7597 | pNewJoinBssParam->mode_802_11i = 1; | |
7598 | /* PRINT_D(HOSTINF_DBG,"\nWPA_IE\n"); */ | |
7599 | rsnIndex += 4; | |
7600 | } | |
7601 | rsnIndex += 7; /* skipping id, length, version(2B) and first 3 bytes of gcipher */ | |
7602 | pNewJoinBssParam->rsn_grp_policy = pu8IEs[rsnIndex]; | |
7603 | rsnIndex++; | |
03b2d5e7 | 7604 | /* PRINT_D(HOSTINF_DBG,"Group Policy: %0x\n",pNewJoinBssParam->rsn_grp_policy); */ |
c5c77ba1 JK |
7605 | /* initialize policies with invalid values */ |
7606 | ||
7607 | jumpOffset = pu8IEs[rsnIndex] * 4; /* total no.of bytes of pcipher field (count*4) */ | |
7608 | ||
7609 | /*parsing pairwise cipher*/ | |
7610 | ||
7611 | /* saving 3 pcipher max. */ | |
7612 | pcipherCount = (pu8IEs[rsnIndex] > 3) ? 3 : pu8IEs[rsnIndex]; | |
7613 | rsnIndex += 2; /* jump 2 bytes of pcipher count */ | |
7614 | ||
03b2d5e7 | 7615 | /* PRINT_D(HOSTINF_DBG,"\npcipher:%d\n",pcipherCount); */ |
c5c77ba1 JK |
7616 | for (i = pcipherTotalCount, j = 0; i < pcipherCount + pcipherTotalCount && i < 3; i++, j++) { |
7617 | /* each count corresponds to 4 bytes, only last byte is saved */ | |
7618 | pNewJoinBssParam->rsn_pcip_policy[i] = pu8IEs[rsnIndex + ((j + 1) * 4) - 1]; | |
7619 | /* PRINT_D(HOSTINF_DBG,"PAIR policy = [%0x,%0x]\n",pNewJoinBssParam->rsn_pcip_policy[i],i); */ | |
7620 | } | |
7621 | pcipherTotalCount += pcipherCount; | |
7622 | rsnIndex += jumpOffset; | |
7623 | ||
7624 | jumpOffset = pu8IEs[rsnIndex] * 4; | |
7625 | ||
7626 | /*parsing AKM suite (auth_policy)*/ | |
7627 | /* saving 3 auth policies max. */ | |
7628 | authCount = (pu8IEs[rsnIndex] > 3) ? 3 : pu8IEs[rsnIndex]; | |
7629 | rsnIndex += 2; /* jump 2 bytes of pcipher count */ | |
7630 | ||
7631 | for (i = authTotalCount, j = 0; i < authTotalCount + authCount; i++, j++) { | |
7632 | /* each count corresponds to 4 bytes, only last byte is saved */ | |
7633 | pNewJoinBssParam->rsn_auth_policy[i] = pu8IEs[rsnIndex + ((j + 1) * 4) - 1]; | |
7634 | } | |
7635 | authTotalCount += authCount; | |
7636 | rsnIndex += jumpOffset; | |
7637 | /*pasring rsn cap. only if rsn IE*/ | |
7638 | if (pu8IEs[index] == RSN_IE) { | |
7639 | pNewJoinBssParam->rsn_cap[0] = pu8IEs[rsnIndex]; | |
7640 | pNewJoinBssParam->rsn_cap[1] = pu8IEs[rsnIndex + 1]; | |
7641 | rsnIndex += 2; | |
7642 | } | |
f717c0eb | 7643 | pNewJoinBssParam->rsn_found = true; |
c5c77ba1 JK |
7644 | index += pu8IEs[index + 1] + 2; /* ID,Length bytes and IE body */ |
7645 | continue; | |
7646 | } else | |
7647 | index += pu8IEs[index + 1] + 2; /* ID,Length bytes and IE body */ | |
7648 | ||
7649 | } | |
7650 | ||
7651 | ||
7652 | } | |
7653 | ||
7654 | return (void *)pNewJoinBssParam; | |
7655 | ||
7656 | } | |
7657 | ||
7658 | void host_int_freeJoinParams(void *pJoinParams) | |
7659 | { | |
7660 | if ((tstrJoinBssParam *)pJoinParams != NULL) | |
49188af2 | 7661 | kfree((tstrJoinBssParam *)pJoinParams); |
c5c77ba1 JK |
7662 | else |
7663 | PRINT_ER("Unable to FREE null pointer\n"); | |
7664 | } | |
7665 | #endif /*WILC_PARSE_SCAN_IN_HOST*/ | |
7666 | ||
7667 | ||
7668 | /** | |
7669 | * @brief host_int_addBASession | |
7670 | * @details Open a block Ack session with the given parameters | |
7671 | * @param[in] tstrNetworkInfo* ptstrNetworkInfo | |
7672 | * @return | |
7673 | * @author anoureldin | |
7674 | * @date | |
7675 | * @version 1.0**/ | |
7676 | ||
2b05df55 | 7677 | static int host_int_addBASession(tstrWILC_WFIDrv *hWFIDrv, char *pBSSID, char TID, short int BufferSize, |
c5c77ba1 JK |
7678 | short int SessionTimeout, void *drvHandler) |
7679 | { | |
fb4ec9ca | 7680 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7681 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7682 | tstrHostIFmsg strHostIFmsg; | |
7683 | tstrHostIfBASessionInfo *pBASessionInfo = &strHostIFmsg.uniHostIFmsgBody.strHostIfBASessionInfo; | |
7684 | ||
2b9d5b48 | 7685 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7686 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 7687 | |
2cc46837 | 7688 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7689 | |
7690 | /* prepare the WiphyParams Message */ | |
7691 | strHostIFmsg.u16MsgId = HOST_IF_MSG_ADD_BA_SESSION; | |
7692 | ||
7693 | memcpy(pBASessionInfo->au8Bssid, pBSSID, ETH_ALEN); | |
7694 | pBASessionInfo->u8Ted = TID; | |
7695 | pBASessionInfo->u16BufferSize = BufferSize; | |
7696 | pBASessionInfo->u16SessionTimeout = SessionTimeout; | |
7697 | strHostIFmsg.drvHandler = hWFIDrv; | |
7698 | ||
b1413b60 | 7699 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7700 | if (s32Error) |
c5c77ba1 | 7701 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7702 | WILC_CATCH(s32Error) |
7703 | { | |
7704 | ||
7705 | } | |
7706 | ||
7707 | return s32Error; | |
7708 | } | |
7709 | ||
7710 | ||
218dc407 | 7711 | s32 host_int_delBASession(tstrWILC_WFIDrv *hWFIDrv, char *pBSSID, char TID) |
c5c77ba1 | 7712 | { |
fb4ec9ca | 7713 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7714 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7715 | tstrHostIFmsg strHostIFmsg; | |
7716 | tstrHostIfBASessionInfo *pBASessionInfo = &strHostIFmsg.uniHostIFmsgBody.strHostIfBASessionInfo; | |
7717 | ||
2b9d5b48 | 7718 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7719 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 7720 | |
2cc46837 | 7721 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7722 | |
7723 | /* prepare the WiphyParams Message */ | |
7724 | strHostIFmsg.u16MsgId = HOST_IF_MSG_DEL_BA_SESSION; | |
7725 | ||
7726 | memcpy(pBASessionInfo->au8Bssid, pBSSID, ETH_ALEN); | |
7727 | pBASessionInfo->u8Ted = TID; | |
7728 | strHostIFmsg.drvHandler = hWFIDrv; | |
7729 | ||
b1413b60 | 7730 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7731 | if (s32Error) |
c5c77ba1 | 7732 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7733 | WILC_CATCH(s32Error) |
7734 | { | |
7735 | ||
7736 | } | |
7737 | ||
7738 | /*BugID_5222*/ | |
83383ea3 | 7739 | down(&hWaitResponse); |
c5c77ba1 JK |
7740 | |
7741 | return s32Error; | |
7742 | } | |
7743 | ||
218dc407 | 7744 | s32 host_int_del_All_Rx_BASession(tstrWILC_WFIDrv *hWFIDrv, char *pBSSID, char TID) |
c5c77ba1 | 7745 | { |
fb4ec9ca | 7746 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7747 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7748 | tstrHostIFmsg strHostIFmsg; | |
7749 | tstrHostIfBASessionInfo *pBASessionInfo = &strHostIFmsg.uniHostIFmsgBody.strHostIfBASessionInfo; | |
7750 | ||
2b9d5b48 | 7751 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7752 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 7753 | |
2cc46837 | 7754 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7755 | |
7756 | /* prepare the WiphyParams Message */ | |
7757 | strHostIFmsg.u16MsgId = HOST_IF_MSG_DEL_ALL_RX_BA_SESSIONS; | |
7758 | ||
7759 | memcpy(pBASessionInfo->au8Bssid, pBSSID, ETH_ALEN); | |
7760 | pBASessionInfo->u8Ted = TID; | |
7761 | strHostIFmsg.drvHandler = hWFIDrv; | |
7762 | ||
b1413b60 | 7763 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7764 | if (s32Error) |
c5c77ba1 | 7765 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7766 | WILC_CATCH(s32Error) |
7767 | { | |
7768 | ||
7769 | } | |
7770 | ||
7771 | /*BugID_5222*/ | |
83383ea3 | 7772 | down(&hWaitResponse); |
c5c77ba1 JK |
7773 | |
7774 | return s32Error; | |
7775 | } | |
7776 | ||
7777 | /** | |
7778 | * @brief host_int_setup_ipaddress | |
7779 | * @details setup IP in firmware | |
7780 | * @param[in] Handle to wifi driver | |
7781 | * @return Error code. | |
7782 | * @author Abdelrahman Sobhy | |
7783 | * @date | |
7784 | * @version 1.0*/ | |
218dc407 | 7785 | s32 host_int_setup_ipaddress(tstrWILC_WFIDrv *hWFIDrv, u8 *u16ipadd, u8 idx) |
c5c77ba1 | 7786 | { |
fb4ec9ca | 7787 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7788 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7789 | tstrHostIFmsg strHostIFmsg; | |
7790 | ||
7791 | /* TODO: Enable This feature on softap firmware */ | |
7792 | return 0; | |
7793 | ||
2b9d5b48 | 7794 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7795 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 7796 | |
2cc46837 | 7797 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7798 | |
7799 | /* prepare the WiphyParams Message */ | |
7800 | strHostIFmsg.u16MsgId = HOST_IF_MSG_SET_IPADDRESS; | |
7801 | ||
7802 | strHostIFmsg.uniHostIFmsgBody.strHostIfSetIP.au8IPAddr = u16ipadd; | |
7803 | strHostIFmsg.drvHandler = hWFIDrv; | |
7804 | strHostIFmsg.uniHostIFmsgBody.strHostIfSetIP.idx = idx; | |
7805 | ||
b1413b60 | 7806 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7807 | if (s32Error) |
c5c77ba1 | 7808 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7809 | WILC_CATCH(s32Error) |
7810 | { | |
7811 | ||
7812 | } | |
7813 | ||
7814 | return s32Error; | |
7815 | ||
7816 | ||
7817 | } | |
7818 | ||
7819 | /** | |
7820 | * @brief host_int_get_ipaddress | |
7821 | * @details Get IP from firmware | |
7822 | * @param[in] Handle to wifi driver | |
7823 | * @return Error code. | |
7824 | * @author Abdelrahman Sobhy | |
7825 | * @date | |
7826 | * @version 1.0*/ | |
218dc407 | 7827 | s32 host_int_get_ipaddress(tstrWILC_WFIDrv *hWFIDrv, u8 *u16ipadd, u8 idx) |
c5c77ba1 | 7828 | { |
fb4ec9ca | 7829 | s32 s32Error = WILC_SUCCESS; |
c5c77ba1 JK |
7830 | tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; |
7831 | tstrHostIFmsg strHostIFmsg; | |
7832 | ||
2b9d5b48 | 7833 | if (pstrWFIDrv == NULL) |
c5c77ba1 | 7834 | WILC_ERRORREPORT(s32Error, WILC_INVALID_ARGUMENT); |
c5c77ba1 | 7835 | |
2cc46837 | 7836 | memset(&strHostIFmsg, 0, sizeof(tstrHostIFmsg)); |
c5c77ba1 JK |
7837 | |
7838 | /* prepare the WiphyParams Message */ | |
7839 | strHostIFmsg.u16MsgId = HOST_IF_MSG_GET_IPADDRESS; | |
7840 | ||
7841 | strHostIFmsg.uniHostIFmsgBody.strHostIfSetIP.au8IPAddr = u16ipadd; | |
bf903c1e SS |
7842 | strHostIFmsg.drvHandler = hWFIDrv; |
7843 | strHostIFmsg.uniHostIFmsgBody.strHostIfSetIP.idx = idx; | |
c5c77ba1 | 7844 | |
b1413b60 | 7845 | s32Error = WILC_MsgQueueSend(&gMsgQHostIF, &strHostIFmsg, sizeof(tstrHostIFmsg), NULL); |
2b9d5b48 | 7846 | if (s32Error) |
c5c77ba1 | 7847 | WILC_ERRORREPORT(s32Error, s32Error); |
c5c77ba1 JK |
7848 | WILC_CATCH(s32Error) |
7849 | { | |
7850 | ||
7851 | } | |
7852 | ||
7853 | return s32Error; | |
7854 | ||
7855 | ||
7856 | } |