1 #include <linux/slab.h>
2 #include <linux/time.h>
3 #include <linux/kthread.h>
4 #include <linux/delay.h>
5 #include "host_interface.h"
6 #include "coreconfigurator.h"
7 #include "wilc_wlan_if.h"
8 #include "wilc_msgqueue.h"
9 #include <linux/etherdevice.h>
13 extern struct timer_list hDuringIpTimer;
15 extern u8 g_wilc_initialized;
17 /* Message types of the Host IF Message Queue*/
18 #define HOST_IF_MSG_SCAN 0
19 #define HOST_IF_MSG_CONNECT 1
20 #define HOST_IF_MSG_RCVD_GNRL_ASYNC_INFO 2
21 #define HOST_IF_MSG_KEY 3
22 #define HOST_IF_MSG_RCVD_NTWRK_INFO 4
23 #define HOST_IF_MSG_RCVD_SCAN_COMPLETE 5
24 #define HOST_IF_MSG_CFG_PARAMS 6
25 #define HOST_IF_MSG_SET_CHANNEL 7
26 #define HOST_IF_MSG_DISCONNECT 8
27 #define HOST_IF_MSG_GET_RSSI 9
28 #define HOST_IF_MSG_GET_CHNL 10
29 #define HOST_IF_MSG_ADD_BEACON 11
30 #define HOST_IF_MSG_DEL_BEACON 12
31 #define HOST_IF_MSG_ADD_STATION 13
32 #define HOST_IF_MSG_DEL_STATION 14
33 #define HOST_IF_MSG_EDIT_STATION 15
34 #define HOST_IF_MSG_SCAN_TIMER_FIRED 16
35 #define HOST_IF_MSG_CONNECT_TIMER_FIRED 17
36 #define HOST_IF_MSG_POWER_MGMT 18
37 #define HOST_IF_MSG_GET_INACTIVETIME 19
38 #define HOST_IF_MSG_REMAIN_ON_CHAN 20
39 #define HOST_IF_MSG_REGISTER_FRAME 21
40 #define HOST_IF_MSG_LISTEN_TIMER_FIRED 22
41 #define HOST_IF_MSG_GET_LINKSPEED 23
42 #define HOST_IF_MSG_SET_WFIDRV_HANDLER 24
43 #define HOST_IF_MSG_SET_MAC_ADDRESS 25
44 #define HOST_IF_MSG_GET_MAC_ADDRESS 26
45 #define HOST_IF_MSG_SET_OPERATION_MODE 27
46 #define HOST_IF_MSG_SET_IPADDRESS 28
47 #define HOST_IF_MSG_GET_IPADDRESS 29
48 #define HOST_IF_MSG_FLUSH_CONNECT 30
49 #define HOST_IF_MSG_GET_STATISTICS 31
50 #define HOST_IF_MSG_SET_MULTICAST_FILTER 32
51 #define HOST_IF_MSG_ADD_BA_SESSION 33
52 #define HOST_IF_MSG_DEL_BA_SESSION 34
53 #define HOST_IF_MSG_Q_IDLE 35
54 #define HOST_IF_MSG_DEL_ALL_STA 36
55 #define HOST_IF_MSG_DEL_ALL_RX_BA_SESSIONS 34
56 #define HOST_IF_MSG_EXIT 100
58 #define HOST_IF_SCAN_TIMEOUT 4000
59 #define HOST_IF_CONNECT_TIMEOUT 9500
61 #define BA_SESSION_DEFAULT_BUFFER_SIZE 16
62 #define BA_SESSION_DEFAULT_TIMEOUT 1000
63 #define BLOCK_ACK_REQ_SIZE 0x14
66 * @struct cfg_param_attr
67 * @brief Structure to hold Host IF CFG Params Attributes
71 * @author Mai Daftedar
75 struct cfg_param_attr {
76 struct cfg_param_val pstrCfgParamVal;
80 * @struct host_if_wpa_attr
81 * @brief Structure to hold Host IF Scan Attributes
85 * @author Mai Daftedar
89 struct host_if_wpa_attr {
101 * @struct host_if_wep_attr
102 * @brief Structure to hold Host IF Scan Attributes
106 * @author Mai Daftedar
107 * @date 25 March 2012
110 struct host_if_wep_attr {
115 enum AUTHTYPE tenuAuth_type;
119 * @struct host_if_key_attr
120 * @brief Structure to hold Host IF Scan Attributes
124 * @author Mai Daftedar
125 * @date 25 March 2012
128 union host_if_key_attr {
129 struct host_if_wep_attr strHostIFwepAttr;
130 struct host_if_wpa_attr strHostIFwpaAttr;
131 struct host_if_pmkid_attr strHostIFpmkidAttr;
136 * @brief Structure to hold Host IF Scan Attributes
140 * @author Mai Daftedar
141 * @date 25 March 2012
145 enum KEY_TYPE enuKeyType;
147 union host_if_key_attr uniHostIFkeyAttr;
155 * @brief Structure to hold Host IF Scan Attributes
159 * @author Mostafa Abu Bakr
160 * @date 25 March 2012
170 wilc_scan_result pfScanResult;
172 struct hidden_network strHiddenNetwork;
176 * @struct connect_attr
177 * @brief Structure to hold Host IF Connect Attributes
181 * @author Mostafa Abu Bakr
182 * @date 25 March 2012
185 struct connect_attr {
192 wilc_connect_result pfConnectResult;
194 enum AUTHTYPE tenuAuth_type;
200 * @struct rcvd_async_info
201 * @brief Structure to hold Received General Asynchronous info
205 * @author Mostafa Abu Bakr
206 * @date 25 March 2012
209 struct rcvd_async_info {
215 * @struct channel_attr
216 * @brief Set Channel message body
220 * @author Mai Daftedar
221 * @date 25 March 2012
224 struct channel_attr {
229 * @struct tstrScanComplete
230 * @brief hold received Async. Scan Complete message body
235 * @date 25 March 2012
238 /*typedef struct _tstrScanComplete
242 * } tstrScanComplete;*/
245 * @struct beacon_attr
246 * @brief Set Beacon message body
250 * @author Adham Abozaeid
255 u32 u32Interval; /*!< Beacon Interval. Period between two successive beacons on air */
256 u32 u32DTIMPeriod; /*!< DTIM Period. Indicates how many Beacon frames
257 * (including the current frame) appear before the next DTIM */
258 u32 u32HeadLen; /*!< Length of the head buffer in bytes */
259 u8 *pu8Head; /*!< Pointer to the beacon's head buffer. Beacon's head is the part
260 * from the beacon's start till the TIM element, NOT including the TIM */
261 u32 u32TailLen; /*!< Length of the tail buffer in bytes */
262 u8 *pu8Tail; /*!< Pointer to the beacon's tail buffer. Beacon's tail starts just
263 * after the TIM inormation element */
267 * @struct set_multicast
268 * @brief set Multicast filter Address
272 * @author Abdelrahman Sobhy
273 * @date 30 August 2013
274 * @version 1.0 Description
277 struct set_multicast {
283 * @struct del_all_sta
284 * @brief Deauth station message body
288 * @author Mai Daftedar
289 * @date 09 April 2014
290 * @version 1.0 Description
293 u8 au8Sta_DelAllSta[MAX_NUM_STA][ETH_ALEN];
299 * @brief Delete station message body
303 * @author Adham Abozaeid
305 * @version 1.0 Description
308 u8 au8MacAddr[ETH_ALEN];
312 * @struct power_mgmt_param
313 * @brief Power management message body
317 * @author Adham Abozaeid
318 * @date 24 November 2012
321 struct power_mgmt_param {
328 * @struct set_ip_addr
329 * @brief set IP Address message body
333 * @author Abdelrahman Sobhy
334 * @date 30 August 2013
335 * @version 1.0 Description
343 * @struct sta_inactive_t
344 * @brief Get station message body
348 * @author Mai Daftedar
349 * @date 16 April 2013
352 struct sta_inactive_t {
357 * @union message_body
358 * @brief Message body for the Host Interface message_q
362 * @author Mostafa Abu Bakr
363 * @date 25 March 2012
367 struct scan_attr scan_info;
368 struct connect_attr con_info;
369 struct rcvd_net_info net_info;
370 struct rcvd_async_info async_info;
371 struct key_attr key_info;
372 struct cfg_param_attr cfg_info;
373 struct channel_attr channel_info;
374 struct beacon_attr beacon_info;
375 struct add_sta_param add_sta_info;
376 struct del_sta del_sta_info;
377 struct add_sta_param edit_sta_info;
378 struct power_mgmt_param pwr_mgmt_info;
379 struct sta_inactive_t mac_info;
380 struct set_ip_addr ip_info;
381 struct drv_handler drv;
382 struct set_multicast multicast_info;
384 struct set_mac_addr set_mac_info;
385 struct get_mac_addr get_mac_info;
386 struct ba_session_info session_info;
387 struct remain_ch remain_on_ch;
388 struct reg_frame reg_frame;
390 struct del_all_sta del_all_sta_info;
394 * @struct struct host_if_msg
395 * @brief Host Interface message
399 * @author Mostafa Abu Bakr
400 * @date 25 March 2012
404 u16 id; /*!< Message ID */
405 union message_body body; /*!< Message body */
406 tstrWILC_WFIDrv *drvHandler;
409 typedef struct _tstrWidJoinReqExt {
410 char SSID[MAX_SSID_LEN];
415 /*Struct containg joinParam of each AP*/
416 typedef struct _tstrJoinBssParam {
422 char ssid[MAX_SSID_LEN];
424 u8 supp_rates[MAX_RATES_SUPPORTED + 1];
431 u8 rsn_pcip_policy[3];
432 u8 rsn_auth_policy[3];
434 struct _tstrJoinParam *nextJoinBss;
445 /*a linked list table containing needed join parameters entries for each AP found in most recent scan*/
446 typedef struct _tstrBssTable {
448 tstrJoinBssParam *head;
449 tstrJoinBssParam *tail;
455 SCAN_CONNECT_TIMER_FORCE_32BIT = 0xFFFFFFFF
458 /*****************************************************************************/
460 /* Global Variabls */
462 /*****************************************************************************/
463 /* Zero is not used, because a zero ID means termination */
464 static tstrWILC_WFIDrv *wfidrv_list[NUM_CONCURRENT_IFC + 1];
465 tstrWILC_WFIDrv *terminated_handle;
466 tstrWILC_WFIDrv *gWFiDrvHandle;
467 bool g_obtainingIP = false;
469 static struct task_struct *HostIFthreadHandler;
470 static WILC_MsgQueueHandle gMsgQHostIF;
471 static struct semaphore hSemHostIFthrdEnd;
473 struct semaphore hSemDeinitDrvHandle;
474 static struct semaphore hWaitResponse;
475 struct semaphore hSemHostIntDeinit;
476 struct timer_list g_hPeriodicRSSI;
480 u8 gau8MulticastMacAddrList[WILC_MULTICAST_TABLE_SIZE][ETH_ALEN];
482 static u8 gapu8RcvdAssocResp[MAX_ASSOC_RESP_FRAME_SIZE];
484 bool gbScanWhileConnected = false;
489 static u8 gs8SetIP[2][4];
490 static u8 gs8GetIP[2][4];
491 static u32 gu32InactiveTime;
493 static u32 gu32WidConnRstHack;
495 u8 *gu8FlushedJoinReq;
496 u8 *gu8FlushedInfoElemAsoc;
497 u8 gu8Flushed11iMode;
498 u8 gu8FlushedAuthType;
499 u32 gu32FlushedJoinReqSize;
500 u32 gu32FlushedInfoElemAsocSize;
501 tstrWILC_WFIDrv *gu8FlushedJoinReqDrvHandler;
502 #define REAL_JOIN_REQ 0
503 #define FLUSHED_JOIN_REQ 1
504 #define FLUSHED_BYTE_POS 79 /* Position the byte indicating flushing in the flushed request */
506 static void *host_int_ParseJoinBssParam(tstrNetworkInfo *ptstrNetworkInfo);
508 extern void chip_sleep_manually(u32 u32SleepTime);
509 extern int linux_wlan_get_num_conn_ifcs(void);
511 static int add_handler_in_list(tstrWILC_WFIDrv *handler)
515 for (i = 1; i < ARRAY_SIZE(wfidrv_list); i++) {
516 if (!wfidrv_list[i]) {
517 wfidrv_list[i] = handler;
525 static int remove_handler_in_list(tstrWILC_WFIDrv *handler)
529 for (i = 1; i < ARRAY_SIZE(wfidrv_list); i++) {
530 if (wfidrv_list[i] == handler) {
531 wfidrv_list[i] = NULL;
539 static int get_id_from_handler(tstrWILC_WFIDrv *handler)
546 for (i = 1; i < ARRAY_SIZE(wfidrv_list); i++) {
547 if (wfidrv_list[i] == handler)
554 static tstrWILC_WFIDrv *get_handler_from_id(int id)
556 if (id <= 0 || id >= ARRAY_SIZE(wfidrv_list))
558 return wfidrv_list[id];
562 * @brief Handle_SetChannel
563 * @details Sending config packet to firmware to set channel
564 * @param[in] struct channel_attr *pstrHostIFSetChan
565 * @return Error code.
570 static s32 Handle_SetChannel(tstrWILC_WFIDrv *drvHandler,
571 struct channel_attr *pstrHostIFSetChan)
576 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
578 /*prepare configuration packet*/
579 strWID.u16WIDid = (u16)WID_CURRENT_CHANNEL;
580 strWID.enuWIDtype = WID_CHAR;
581 strWID.ps8WidVal = (char *)&(pstrHostIFSetChan->u8SetChan);
582 strWID.s32ValueSize = sizeof(char);
584 PRINT_D(HOSTINF_DBG, "Setting channel\n");
586 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
587 get_id_from_handler(pstrWFIDrv));
589 PRINT_ER("Failed to set channel\n");
596 * @brief Handle_SetWfiDrvHandler
597 * @details Sending config packet to firmware to set driver handler
598 * @param[in] void * drvHandler,
599 * struct drv_handler *pstrHostIfSetDrvHandler
600 * @return Error code.
605 static s32 Handle_SetWfiDrvHandler(tstrWILC_WFIDrv *drvHandler,
606 struct drv_handler *pstrHostIfSetDrvHandler)
611 tstrWILC_WFIDrv *pstrWFIDrv = drvHandler;
614 /*prepare configuration packet*/
615 strWID.u16WIDid = (u16)WID_SET_DRV_HANDLER;
616 strWID.enuWIDtype = WID_INT;
617 strWID.ps8WidVal = (s8 *)&(pstrHostIfSetDrvHandler->u32Address);
618 strWID.s32ValueSize = sizeof(u32);
622 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
623 pstrHostIfSetDrvHandler->u32Address);
625 if (pstrWFIDrv == NULL)
626 up(&hSemDeinitDrvHandle);
630 PRINT_ER("Failed to set driver handler\n");
638 * @brief Handle_SetWfiAPDrvHandler
639 * @details Sending config packet to firmware to set driver handler
640 * @param[in] void * drvHandler,tstrHostIfSetDrvHandler* pstrHostIfSetDrvHandler
641 * @return Error code.
646 static s32 Handle_SetOperationMode(tstrWILC_WFIDrv *drvHandler,
647 struct op_mode *pstrHostIfSetOperationMode)
652 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
655 /*prepare configuration packet*/
656 strWID.u16WIDid = (u16)WID_SET_OPERATION_MODE;
657 strWID.enuWIDtype = WID_INT;
658 strWID.ps8WidVal = (s8 *)&(pstrHostIfSetOperationMode->u32Mode);
659 strWID.s32ValueSize = sizeof(u32);
662 PRINT_INFO(HOSTINF_DBG, "pstrWFIDrv= %p\n", pstrWFIDrv);
664 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
665 get_id_from_handler(pstrWFIDrv));
668 if ((pstrHostIfSetOperationMode->u32Mode) == IDLE_MODE)
669 up(&hSemDeinitDrvHandle);
673 PRINT_ER("Failed to set driver handler\n");
681 * @brief host_int_set_IPAddress
682 * @details Setting IP address params in message queue
683 * @param[in] WILC_WFIDrvHandle hWFIDrv, u8* pu8IPAddr
684 * @return Error code.
689 s32 Handle_set_IPAddress(tstrWILC_WFIDrv *drvHandler, u8 *pu8IPAddr, u8 idx)
694 char firmwareIPAddress[4] = {0};
695 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
697 if (pu8IPAddr[0] < 192)
700 PRINT_INFO(HOSTINF_DBG, "Indx = %d, Handling set IP = %pI4\n", idx, pu8IPAddr);
702 memcpy(gs8SetIP[idx], pu8IPAddr, IP_ALEN);
704 /*prepare configuration packet*/
705 strWID.u16WIDid = (u16)WID_IP_ADDRESS;
706 strWID.enuWIDtype = WID_STR;
707 strWID.ps8WidVal = (u8 *)pu8IPAddr;
708 strWID.s32ValueSize = IP_ALEN;
710 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
711 get_id_from_handler(pstrWFIDrv));
714 host_int_get_ipaddress(drvHandler, firmwareIPAddress, idx);
717 PRINT_ER("Failed to set IP address\n");
721 PRINT_INFO(HOSTINF_DBG, "IP address set\n");
728 * @brief Handle_get_IPAddress
729 * @details Setting IP address params in message queue
730 * @param[in] WILC_WFIDrvHandle hWFIDrv, u8* pu8IPAddr
731 * @return Error code.
736 s32 Handle_get_IPAddress(tstrWILC_WFIDrv *drvHandler, u8 *pu8IPAddr, u8 idx)
741 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
743 /*prepare configuration packet*/
744 strWID.u16WIDid = (u16)WID_IP_ADDRESS;
745 strWID.enuWIDtype = WID_STR;
746 strWID.ps8WidVal = kmalloc(IP_ALEN, GFP_KERNEL);
747 strWID.s32ValueSize = IP_ALEN;
749 s32Error = send_config_pkt(GET_CFG, &strWID, 1, true,
750 get_id_from_handler(pstrWFIDrv));
752 PRINT_INFO(HOSTINF_DBG, "%pI4\n", strWID.ps8WidVal);
754 memcpy(gs8GetIP[idx], strWID.ps8WidVal, IP_ALEN);
756 /*get the value by searching the local copy*/
757 kfree(strWID.ps8WidVal);
759 if (memcmp(gs8GetIP[idx], gs8SetIP[idx], IP_ALEN) != 0)
760 host_int_setup_ipaddress(pstrWFIDrv, gs8SetIP[idx], idx);
763 PRINT_ER("Failed to get IP address\n");
767 PRINT_INFO(HOSTINF_DBG, "IP address retrieved:: u8IfIdx = %d\n", idx);
768 PRINT_INFO(HOSTINF_DBG, "%pI4\n", gs8GetIP[idx]);
769 PRINT_INFO(HOSTINF_DBG, "\n");
776 * @brief Handle_SetMacAddress
777 * @details Setting mac address
778 * @param[in] void * drvHandler,tstrHostIfSetDrvHandler* pstrHostIfSetDrvHandler
779 * @return Error code.
780 * @author Amr Abdel-Moghny
781 * @date November 2013
784 static s32 Handle_SetMacAddress(tstrWILC_WFIDrv *drvHandler,
785 struct set_mac_addr *pstrHostIfSetMacAddress)
790 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
791 u8 *mac_buf = kmalloc(ETH_ALEN, GFP_KERNEL);
793 if (mac_buf == NULL) {
794 PRINT_ER("No buffer to send mac address\n");
797 memcpy(mac_buf, pstrHostIfSetMacAddress->u8MacAddress, ETH_ALEN);
799 /*prepare configuration packet*/
800 strWID.u16WIDid = (u16)WID_MAC_ADDR;
801 strWID.enuWIDtype = WID_STR;
802 strWID.ps8WidVal = mac_buf;
803 strWID.s32ValueSize = ETH_ALEN;
804 PRINT_D(GENERIC_DBG, "mac addr = :%pM\n", strWID.ps8WidVal);
806 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
807 get_id_from_handler(pstrWFIDrv));
809 PRINT_ER("Failed to set mac address\n");
819 * @brief Handle_GetMacAddress
820 * @details Getting mac address
821 * @param[in] void * drvHandler,tstrHostIfSetDrvHandler* pstrHostIfSetDrvHandler
822 * @return Error code.
823 * @author Amr Abdel-Moghny
827 static s32 Handle_GetMacAddress(tstrWILC_WFIDrv *drvHandler,
828 struct get_mac_addr *pstrHostIfGetMacAddress)
834 /*prepare configuration packet*/
835 strWID.u16WIDid = (u16)WID_MAC_ADDR;
836 strWID.enuWIDtype = WID_STR;
837 strWID.ps8WidVal = pstrHostIfGetMacAddress->u8MacAddress;
838 strWID.s32ValueSize = ETH_ALEN;
841 s32Error = send_config_pkt(GET_CFG, &strWID, 1, false,
842 get_id_from_handler(drvHandler));
844 PRINT_ER("Failed to get mac address\n");
854 * @brief Handle_CfgParam
855 * @details Sending config packet to firmware to set CFG params
856 * @param[in] struct cfg_param_attr *strHostIFCfgParamAttr
857 * @return Error code.
862 static s32 Handle_CfgParam(tstrWILC_WFIDrv *drvHandler,
863 struct cfg_param_attr *strHostIFCfgParamAttr)
866 tstrWID strWIDList[32];
868 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
871 down(&(pstrWFIDrv->gtOsCfgValuesSem));
874 PRINT_D(HOSTINF_DBG, "Setting CFG params\n");
876 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & BSS_TYPE) {
877 /*----------------------------------------------------------*/
878 /*Input Value: INFRASTRUCTURE = 1, */
879 /* INDEPENDENT= 2, */
881 /*----------------------------------------------------------*/
882 /* validate input then copy>> need to check value 4 and 5 */
883 if (strHostIFCfgParamAttr->pstrCfgParamVal.bss_type < 6) {
884 strWIDList[u8WidCnt].u16WIDid = WID_BSS_TYPE;
885 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.bss_type;
886 strWIDList[u8WidCnt].enuWIDtype = WID_CHAR;
887 strWIDList[u8WidCnt].s32ValueSize = sizeof(char);
888 pstrWFIDrv->strCfgValues.bss_type = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.bss_type;
890 PRINT_ER("check value 6 over\n");
896 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & AUTH_TYPE) {
897 /*------------------------------------------------------*/
898 /*Input Values: OPEN_SYSTEM = 0, */
899 /* SHARED_KEY = 1, */
901 /*------------------------------------------------------*/
902 /*validate Possible values*/
903 if ((strHostIFCfgParamAttr->pstrCfgParamVal.auth_type) == 1 || (strHostIFCfgParamAttr->pstrCfgParamVal.auth_type) == 2 || (strHostIFCfgParamAttr->pstrCfgParamVal.auth_type) == 5) {
904 strWIDList[u8WidCnt].u16WIDid = WID_AUTH_TYPE;
905 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.auth_type;
906 strWIDList[u8WidCnt].enuWIDtype = WID_CHAR;
907 strWIDList[u8WidCnt].s32ValueSize = sizeof(char);
908 pstrWFIDrv->strCfgValues.auth_type = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.auth_type;
910 PRINT_ER("Impossible value \n");
916 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & AUTHEN_TIMEOUT) {
917 /* range is 1 to 65535. */
918 if (strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout < 65536) {
919 strWIDList[u8WidCnt].u16WIDid = WID_AUTH_TIMEOUT;
920 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout;
921 strWIDList[u8WidCnt].enuWIDtype = WID_SHORT;
922 strWIDList[u8WidCnt].s32ValueSize = sizeof(u16);
923 pstrWFIDrv->strCfgValues.auth_timeout = strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout;
925 PRINT_ER("Range(1 ~ 65535) over\n");
931 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & POWER_MANAGEMENT) {
932 /*-----------------------------------------------------------*/
933 /*Input Values: NO_POWERSAVE = 0, */
934 /* MIN_FAST_PS = 1, */
935 /* MAX_FAST_PS = 2, */
936 /* MIN_PSPOLL_PS = 3, */
937 /* MAX_PSPOLL_PS = 4 */
938 /*----------------------------------------------------------*/
939 if (strHostIFCfgParamAttr->pstrCfgParamVal.power_mgmt_mode < 5) {
940 strWIDList[u8WidCnt].u16WIDid = WID_POWER_MANAGEMENT;
941 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.power_mgmt_mode;
942 strWIDList[u8WidCnt].enuWIDtype = WID_CHAR;
943 strWIDList[u8WidCnt].s32ValueSize = sizeof(char);
944 pstrWFIDrv->strCfgValues.power_mgmt_mode = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.power_mgmt_mode;
946 PRINT_ER("Invalide power mode\n");
952 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & RETRY_SHORT) {
953 /* range from 1 to 256 */
954 if ((strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit > 0) && (strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit < 256)) {
955 strWIDList[u8WidCnt].u16WIDid = WID_SHORT_RETRY_LIMIT;
956 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit;
957 strWIDList[u8WidCnt].enuWIDtype = WID_SHORT;
958 strWIDList[u8WidCnt].s32ValueSize = sizeof(u16);
959 pstrWFIDrv->strCfgValues.short_retry_limit = strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit;
961 PRINT_ER("Range(1~256) over\n");
967 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & RETRY_LONG) {
968 /* range from 1 to 256 */
969 if ((strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit > 0) && (strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit < 256)) {
970 strWIDList[u8WidCnt].u16WIDid = WID_LONG_RETRY_LIMIT;
971 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit;
973 strWIDList[u8WidCnt].enuWIDtype = WID_SHORT;
974 strWIDList[u8WidCnt].s32ValueSize = sizeof(u16);
975 pstrWFIDrv->strCfgValues.long_retry_limit = strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit;
977 PRINT_ER("Range(1~256) over\n");
983 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & FRAG_THRESHOLD) {
985 if (strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold > 255 && strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold < 7937) {
986 strWIDList[u8WidCnt].u16WIDid = WID_FRAG_THRESHOLD;
987 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold;
988 strWIDList[u8WidCnt].enuWIDtype = WID_SHORT;
989 strWIDList[u8WidCnt].s32ValueSize = sizeof(u16);
990 pstrWFIDrv->strCfgValues.frag_threshold = strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold;
992 PRINT_ER("Threshold Range fail\n");
998 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & RTS_THRESHOLD) {
999 /* range 256 to 65535 */
1000 if (strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold > 255 && strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold < 65536) {
1001 strWIDList[u8WidCnt].u16WIDid = WID_RTS_THRESHOLD;
1002 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold;
1003 strWIDList[u8WidCnt].enuWIDtype = WID_SHORT;
1004 strWIDList[u8WidCnt].s32ValueSize = sizeof(u16);
1005 pstrWFIDrv->strCfgValues.rts_threshold = strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold;
1007 PRINT_ER("Threshold Range fail\n");
1013 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & PREAMBLE) {
1014 /*-----------------------------------------------------*/
1015 /*Input Values: Short= 0, */
1018 /*------------------------------------------------------*/
1019 if (strHostIFCfgParamAttr->pstrCfgParamVal.preamble_type < 3) {
1020 strWIDList[u8WidCnt].u16WIDid = WID_PREAMBLE;
1021 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.preamble_type;
1022 strWIDList[u8WidCnt].enuWIDtype = WID_CHAR;
1023 strWIDList[u8WidCnt].s32ValueSize = sizeof(char);
1024 pstrWFIDrv->strCfgValues.preamble_type = strHostIFCfgParamAttr->pstrCfgParamVal.preamble_type;
1026 PRINT_ER("Preamle Range(0~2) over\n");
1032 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & SHORT_SLOT_ALLOWED) {
1033 if (strHostIFCfgParamAttr->pstrCfgParamVal.short_slot_allowed < 2) {
1034 strWIDList[u8WidCnt].u16WIDid = WID_SHORT_SLOT_ALLOWED;
1035 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.short_slot_allowed;
1036 strWIDList[u8WidCnt].enuWIDtype = WID_CHAR;
1037 strWIDList[u8WidCnt].s32ValueSize = sizeof(char);
1038 pstrWFIDrv->strCfgValues.short_slot_allowed = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.short_slot_allowed;
1040 PRINT_ER("Short slot(2) over\n");
1046 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & TXOP_PROT_DISABLE) {
1047 /*Description: used to Disable RTS-CTS protection for TXOP burst*/
1048 /*transmission when the acknowledgement policy is No-Ack or Block-Ack */
1049 /* this information is useful for external supplicant */
1050 /*Input Values: 1 for enable and 0 for disable. */
1051 if (strHostIFCfgParamAttr->pstrCfgParamVal.txop_prot_disabled < 2) {
1052 strWIDList[u8WidCnt].u16WIDid = WID_11N_TXOP_PROT_DISABLE;
1053 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.txop_prot_disabled;
1054 strWIDList[u8WidCnt].enuWIDtype = WID_CHAR;
1055 strWIDList[u8WidCnt].s32ValueSize = sizeof(char);
1056 pstrWFIDrv->strCfgValues.txop_prot_disabled = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.txop_prot_disabled;
1058 PRINT_ER("TXOP prot disable\n");
1064 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & BEACON_INTERVAL) {
1065 /* range is 1 to 65535. */
1066 if (strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval < 65536) {
1067 strWIDList[u8WidCnt].u16WIDid = WID_BEACON_INTERVAL;
1068 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval;
1069 strWIDList[u8WidCnt].enuWIDtype = WID_SHORT;
1070 strWIDList[u8WidCnt].s32ValueSize = sizeof(u16);
1071 pstrWFIDrv->strCfgValues.beacon_interval = strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval;
1073 PRINT_ER("Beacon interval(1~65535) fail\n");
1079 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & DTIM_PERIOD) {
1080 /* range is 1 to 255. */
1081 if (strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period < 256) {
1082 strWIDList[u8WidCnt].u16WIDid = WID_DTIM_PERIOD;
1083 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period;
1084 strWIDList[u8WidCnt].enuWIDtype = WID_CHAR;
1085 strWIDList[u8WidCnt].s32ValueSize = sizeof(char);
1086 pstrWFIDrv->strCfgValues.dtim_period = strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period;
1088 PRINT_ER("DTIM range(1~255) fail\n");
1094 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & SITE_SURVEY) {
1095 /*----------------------------------------------------------------------*/
1096 /*Input Values: SITE_SURVEY_1CH = 0, i.e.: currently set channel */
1097 /* SITE_SURVEY_ALL_CH = 1, */
1098 /* SITE_SURVEY_OFF = 2 */
1099 /*----------------------------------------------------------------------*/
1100 if (strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_enabled < 3) {
1101 strWIDList[u8WidCnt].u16WIDid = WID_SITE_SURVEY;
1102 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_enabled;
1103 strWIDList[u8WidCnt].enuWIDtype = WID_CHAR;
1104 strWIDList[u8WidCnt].s32ValueSize = sizeof(char);
1105 pstrWFIDrv->strCfgValues.site_survey_enabled = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_enabled;
1107 PRINT_ER("Site survey disable\n");
1113 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & SITE_SURVEY_SCAN_TIME) {
1114 /* range is 1 to 65535. */
1115 if (strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time < 65536) {
1116 strWIDList[u8WidCnt].u16WIDid = WID_SITE_SURVEY_SCAN_TIME;
1117 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time;
1118 strWIDList[u8WidCnt].enuWIDtype = WID_SHORT;
1119 strWIDList[u8WidCnt].s32ValueSize = sizeof(u16);
1120 pstrWFIDrv->strCfgValues.site_survey_scan_time = strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time;
1122 PRINT_ER("Site survey scan time(1~65535) over\n");
1128 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & ACTIVE_SCANTIME) {
1129 /* range is 1 to 65535. */
1130 if (strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time < 65536) {
1131 strWIDList[u8WidCnt].u16WIDid = WID_ACTIVE_SCAN_TIME;
1132 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time;
1133 strWIDList[u8WidCnt].enuWIDtype = WID_SHORT;
1134 strWIDList[u8WidCnt].s32ValueSize = sizeof(u16);
1135 pstrWFIDrv->strCfgValues.active_scan_time = strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time;
1137 PRINT_ER("Active scan time(1~65535) over\n");
1143 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & PASSIVE_SCANTIME) {
1144 /* range is 1 to 65535. */
1145 if (strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time < 65536) {
1146 strWIDList[u8WidCnt].u16WIDid = WID_PASSIVE_SCAN_TIME;
1147 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time;
1148 strWIDList[u8WidCnt].enuWIDtype = WID_SHORT;
1149 strWIDList[u8WidCnt].s32ValueSize = sizeof(u16);
1150 pstrWFIDrv->strCfgValues.passive_scan_time = strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time;
1152 PRINT_ER("Passive scan time(1~65535) over\n");
1158 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & CURRENT_TX_RATE) {
1159 enum CURRENT_TXRATE curr_tx_rate = strHostIFCfgParamAttr->pstrCfgParamVal.curr_tx_rate;
1160 /*----------------------------------------------------------------------*/
1161 /*Rates: 1 2 5.5 11 6 9 12 18 24 36 48 54 Auto */
1162 /*InputValues: 1 2 3 4 5 6 7 8 9 10 11 12 0 */
1163 /*----------------------------------------------------------------------*/
1165 if (curr_tx_rate == AUTORATE || curr_tx_rate == MBPS_1
1166 || curr_tx_rate == MBPS_2 || curr_tx_rate == MBPS_5_5
1167 || curr_tx_rate == MBPS_11 || curr_tx_rate == MBPS_6
1168 || curr_tx_rate == MBPS_9 || curr_tx_rate == MBPS_12
1169 || curr_tx_rate == MBPS_18 || curr_tx_rate == MBPS_24
1170 || curr_tx_rate == MBPS_36 || curr_tx_rate == MBPS_48 || curr_tx_rate == MBPS_54) {
1171 strWIDList[u8WidCnt].u16WIDid = WID_CURRENT_TX_RATE;
1172 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&curr_tx_rate;
1173 strWIDList[u8WidCnt].enuWIDtype = WID_SHORT;
1174 strWIDList[u8WidCnt].s32ValueSize = sizeof(u16);
1175 pstrWFIDrv->strCfgValues.curr_tx_rate = (u8)curr_tx_rate;
1177 PRINT_ER("out of TX rate\n");
1183 s32Error = send_config_pkt(SET_CFG, strWIDList, u8WidCnt, false,
1184 get_id_from_handler(pstrWFIDrv));
1187 PRINT_ER("Error in setting CFG params\n");
1190 up(&(pstrWFIDrv->gtOsCfgValuesSem));
1196 * @brief Handle_wait_msg_q_empty
1197 * @details this should be the last msg and then the msg Q becomes idle
1198 * @param[in] tstrHostIFscanAttr* pstrHostIFscanAttr
1199 * @return Error code.
1204 static s32 Handle_wait_msg_q_empty(void)
1208 g_wilc_initialized = 0;
1214 * @brief Handle_Scan
1215 * @details Sending config packet to firmware to set the scan params
1216 * @param[in] struct scan_attr *pstrHostIFscanAttr
1217 * @return Error code.
1222 static s32 Handle_Scan(tstrWILC_WFIDrv *drvHandler,
1223 struct scan_attr *pstrHostIFscanAttr)
1226 tstrWID strWIDList[5];
1227 u32 u32WidsCount = 0;
1231 u8 *pu8HdnNtwrksWidVal = NULL;
1232 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler;
1234 PRINT_D(HOSTINF_DBG, "Setting SCAN params\n");
1235 PRINT_D(HOSTINF_DBG, "Scanning: In [%d] state\n", pstrWFIDrv->enuHostIFstate);
1237 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = pstrHostIFscanAttr->pfScanResult;
1238 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid = pstrHostIFscanAttr->pvUserArg;
1240 if ((pstrWFIDrv->enuHostIFstate >= HOST_IF_SCANNING) && (pstrWFIDrv->enuHostIFstate < HOST_IF_CONNECTED)) {
1241 /* here we either in HOST_IF_SCANNING, HOST_IF_WAITING_CONN_REQ or HOST_IF_WAITING_CONN_RESP */
1242 PRINT_D(GENERIC_DBG, "Don't scan we are already in [%d] state\n", pstrWFIDrv->enuHostIFstate);
1243 PRINT_ER("Already scan\n");
1248 if (g_obtainingIP || connecting) {
1249 PRINT_D(GENERIC_DBG, "[handle_scan]: Don't do obss scan until IP adresss is obtained\n");
1250 PRINT_ER("Don't do obss scan\n");
1255 PRINT_D(HOSTINF_DBG, "Setting SCAN params\n");
1258 pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount = 0;
1260 strWIDList[u32WidsCount].u16WIDid = (u16)WID_SSID_PROBE_REQ;
1261 strWIDList[u32WidsCount].enuWIDtype = WID_STR;
1263 for (i = 0; i < pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum; i++)
1264 valuesize += ((pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen) + 1);
1265 pu8HdnNtwrksWidVal = kmalloc(valuesize + 1, GFP_KERNEL);
1266 strWIDList[u32WidsCount].ps8WidVal = pu8HdnNtwrksWidVal;
1267 if (strWIDList[u32WidsCount].ps8WidVal != NULL) {
1268 pu8Buffer = strWIDList[u32WidsCount].ps8WidVal;
1270 *pu8Buffer++ = pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum;
1272 PRINT_D(HOSTINF_DBG, "In Handle_ProbeRequest number of ssid %d\n", pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum);
1274 for (i = 0; i < pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum; i++) {
1275 *pu8Buffer++ = pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen;
1276 memcpy(pu8Buffer, pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].pu8ssid, pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen);
1277 pu8Buffer += pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen;
1282 strWIDList[u32WidsCount].s32ValueSize = (s32)(valuesize + 1);
1286 /*filling cfg param array*/
1288 /* if((pstrHostIFscanAttr->pu8IEs != NULL) && (pstrHostIFscanAttr->IEsLen != 0)) */
1290 /* IEs to be inserted in Probe Request */
1291 strWIDList[u32WidsCount].u16WIDid = WID_INFO_ELEMENT_PROBE;
1292 strWIDList[u32WidsCount].enuWIDtype = WID_BIN_DATA;
1293 strWIDList[u32WidsCount].ps8WidVal = pstrHostIFscanAttr->pu8IEs;
1294 strWIDList[u32WidsCount].s32ValueSize = pstrHostIFscanAttr->IEsLen;
1299 strWIDList[u32WidsCount].u16WIDid = WID_SCAN_TYPE;
1300 strWIDList[u32WidsCount].enuWIDtype = WID_CHAR;
1301 strWIDList[u32WidsCount].s32ValueSize = sizeof(char);
1302 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrHostIFscanAttr->u8ScanType));
1305 /*list of channels to be scanned*/
1306 strWIDList[u32WidsCount].u16WIDid = WID_SCAN_CHANNEL_LIST;
1307 strWIDList[u32WidsCount].enuWIDtype = WID_BIN_DATA;
1309 if (pstrHostIFscanAttr->pu8ChnlFreqList != NULL && pstrHostIFscanAttr->u8ChnlListLen > 0) {
1312 for (i = 0; i < pstrHostIFscanAttr->u8ChnlListLen; i++) {
1313 if (pstrHostIFscanAttr->pu8ChnlFreqList[i] > 0)
1314 pstrHostIFscanAttr->pu8ChnlFreqList[i] = pstrHostIFscanAttr->pu8ChnlFreqList[i] - 1;
1318 strWIDList[u32WidsCount].ps8WidVal = pstrHostIFscanAttr->pu8ChnlFreqList;
1319 strWIDList[u32WidsCount].s32ValueSize = pstrHostIFscanAttr->u8ChnlListLen;
1323 strWIDList[u32WidsCount].u16WIDid = WID_START_SCAN_REQ;
1324 strWIDList[u32WidsCount].enuWIDtype = WID_CHAR;
1325 strWIDList[u32WidsCount].s32ValueSize = sizeof(char);
1326 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrHostIFscanAttr->u8ScanSource));
1329 /*keep the state as is , no need to change it*/
1330 /* gWFiDrvHandle->enuHostIFstate = HOST_IF_SCANNING; */
1332 if (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED)
1333 gbScanWhileConnected = true;
1334 else if (pstrWFIDrv->enuHostIFstate == HOST_IF_IDLE)
1335 gbScanWhileConnected = false;
1337 s32Error = send_config_pkt(SET_CFG, strWIDList, u32WidsCount, false,
1338 get_id_from_handler(pstrWFIDrv));
1341 PRINT_ER("Failed to send scan paramters config packet\n");
1343 PRINT_D(HOSTINF_DBG, "Successfully sent SCAN params config packet\n");
1347 del_timer(&pstrWFIDrv->hScanTimer);
1348 /*if there is an ongoing scan request*/
1349 Handle_ScanDone(drvHandler, SCAN_EVENT_ABORTED);
1352 /* Deallocate pstrHostIFscanAttr->u8ChnlListLen which was prevoisuly allocated by the sending thread */
1353 if (pstrHostIFscanAttr->pu8ChnlFreqList != NULL) {
1354 kfree(pstrHostIFscanAttr->pu8ChnlFreqList);
1355 pstrHostIFscanAttr->pu8ChnlFreqList = NULL;
1358 /* Deallocate pstrHostIFscanAttr->pu8IEs which was previously allocated by the sending thread */
1359 if (pstrHostIFscanAttr->pu8IEs != NULL) {
1360 kfree(pstrHostIFscanAttr->pu8IEs);
1361 pstrHostIFscanAttr->pu8IEs = NULL;
1363 if (pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo != NULL) {
1364 kfree(pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo);
1365 pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo = NULL;
1368 /* Deallocate pstrHostIFscanAttr->u8ChnlListLen which was prevoisuly allocated by the sending thread */
1369 if (pstrHostIFscanAttr->pu8ChnlFreqList != NULL) {
1370 kfree(pstrHostIFscanAttr->pu8ChnlFreqList);
1371 pstrHostIFscanAttr->pu8ChnlFreqList = NULL;
1374 if (pu8HdnNtwrksWidVal != NULL)
1375 kfree(pu8HdnNtwrksWidVal);
1381 * @brief Handle_ScanDone
1382 * @details Call scan notification callback function
1384 * @return Error code.
1389 static s32 Handle_ScanDone(tstrWILC_WFIDrv *drvHandler, tenuScanEvent enuEvent)
1393 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
1396 u8 u8abort_running_scan;
1400 PRINT_D(HOSTINF_DBG, "in Handle_ScanDone()\n");
1402 /*Ask FW to abort the running scan, if any*/
1403 if (enuEvent == SCAN_EVENT_ABORTED) {
1404 PRINT_D(GENERIC_DBG, "Abort running scan\n");
1405 u8abort_running_scan = 1;
1406 strWID.u16WIDid = (u16)WID_ABORT_RUNNING_SCAN;
1407 strWID.enuWIDtype = WID_CHAR;
1408 strWID.ps8WidVal = (s8 *)&u8abort_running_scan;
1409 strWID.s32ValueSize = sizeof(char);
1412 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
1413 get_id_from_handler(pstrWFIDrv));
1415 PRINT_ER("Failed to set abort running scan\n");
1420 if (pstrWFIDrv == NULL) {
1421 PRINT_ER("Driver handler is NULL\n");
1425 /*if there is an ongoing scan request*/
1426 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
1427 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(enuEvent, NULL,
1428 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL);
1429 /*delete current scan request*/
1430 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = NULL;
1437 * @brief Handle_Connect
1438 * @details Sending config packet to firmware to starting connection
1439 * @param[in] struct connect_attr *pstrHostIFconnectAttr
1440 * @return Error code.
1445 u8 u8ConnectedSSID[6] = {0};
1446 static s32 Handle_Connect(tstrWILC_WFIDrv *drvHandler,
1447 struct connect_attr *pstrHostIFconnectAttr)
1449 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler;
1451 tstrWID strWIDList[8];
1452 u32 u32WidsCount = 0, dummyval = 0;
1453 /* char passphrase[] = "12345678"; */
1454 u8 *pu8CurrByte = NULL;
1455 tstrJoinBssParam *ptstrJoinBssParam;
1457 PRINT_D(GENERIC_DBG, "Handling connect request\n");
1459 /* if we try to connect to an already connected AP then discard the request */
1461 if (memcmp(pstrHostIFconnectAttr->pu8bssid, u8ConnectedSSID, ETH_ALEN) == 0) {
1464 PRINT_ER("Trying to connect to an already connected AP, Discard connect request\n");
1468 PRINT_INFO(HOSTINF_DBG, "Saving connection parameters in global structure\n");
1470 ptstrJoinBssParam = (tstrJoinBssParam *)pstrHostIFconnectAttr->pJoinParams;
1471 if (ptstrJoinBssParam == NULL) {
1472 PRINT_ER("Required BSSID not found\n");
1477 if (pstrHostIFconnectAttr->pu8bssid != NULL) {
1478 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = kmalloc(6, GFP_KERNEL);
1479 memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, pstrHostIFconnectAttr->pu8bssid, 6);
1482 pstrWFIDrv->strWILC_UsrConnReq.ssidLen = pstrHostIFconnectAttr->ssidLen;
1483 if (pstrHostIFconnectAttr->pu8ssid != NULL) {
1484 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = kmalloc(pstrHostIFconnectAttr->ssidLen + 1, GFP_KERNEL);
1485 memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid, pstrHostIFconnectAttr->pu8ssid,
1486 pstrHostIFconnectAttr->ssidLen);
1487 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid[pstrHostIFconnectAttr->ssidLen] = '\0';
1490 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = pstrHostIFconnectAttr->IEsLen;
1491 if (pstrHostIFconnectAttr->pu8IEs != NULL) {
1492 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = kmalloc(pstrHostIFconnectAttr->IEsLen, GFP_KERNEL);
1493 memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs, pstrHostIFconnectAttr->pu8IEs,
1494 pstrHostIFconnectAttr->IEsLen);
1497 pstrWFIDrv->strWILC_UsrConnReq.u8security = pstrHostIFconnectAttr->u8security;
1498 pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type = pstrHostIFconnectAttr->tenuAuth_type;
1499 pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult = pstrHostIFconnectAttr->pfConnectResult;
1500 pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid = pstrHostIFconnectAttr->pvUserArg;
1502 strWIDList[u32WidsCount].u16WIDid = WID_SUCCESS_FRAME_COUNT;
1503 strWIDList[u32WidsCount].enuWIDtype = WID_INT;
1504 strWIDList[u32WidsCount].s32ValueSize = sizeof(u32);
1505 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(dummyval));
1508 strWIDList[u32WidsCount].u16WIDid = WID_RECEIVED_FRAGMENT_COUNT;
1509 strWIDList[u32WidsCount].enuWIDtype = WID_INT;
1510 strWIDList[u32WidsCount].s32ValueSize = sizeof(u32);
1511 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(dummyval));
1514 strWIDList[u32WidsCount].u16WIDid = WID_FAILED_COUNT;
1515 strWIDList[u32WidsCount].enuWIDtype = WID_INT;
1516 strWIDList[u32WidsCount].s32ValueSize = sizeof(u32);
1517 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(dummyval));
1520 /* if((gWFiDrvHandle->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) && */
1521 /* (gWFiDrvHandle->strWILC_UsrConnReq.ConnReqIEsLen != 0)) */
1523 /* IEs to be inserted in Association Request */
1524 strWIDList[u32WidsCount].u16WIDid = WID_INFO_ELEMENT_ASSOCIATE;
1525 strWIDList[u32WidsCount].enuWIDtype = WID_BIN_DATA;
1526 strWIDList[u32WidsCount].ps8WidVal = pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs;
1527 strWIDList[u32WidsCount].s32ValueSize = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen;
1530 if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7)) {
1532 gu32FlushedInfoElemAsocSize = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen;
1533 gu8FlushedInfoElemAsoc = kmalloc(gu32FlushedInfoElemAsocSize, GFP_KERNEL);
1534 memcpy(gu8FlushedInfoElemAsoc, pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs,
1535 gu32FlushedInfoElemAsocSize);
1538 strWIDList[u32WidsCount].u16WIDid = (u16)WID_11I_MODE;
1539 strWIDList[u32WidsCount].enuWIDtype = WID_CHAR;
1540 strWIDList[u32WidsCount].s32ValueSize = sizeof(char);
1541 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrWFIDrv->strWILC_UsrConnReq.u8security));
1544 if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7))
1545 gu8Flushed11iMode = pstrWFIDrv->strWILC_UsrConnReq.u8security;
1547 PRINT_INFO(HOSTINF_DBG, "Encrypt Mode = %x\n", pstrWFIDrv->strWILC_UsrConnReq.u8security);
1550 strWIDList[u32WidsCount].u16WIDid = (u16)WID_AUTH_TYPE;
1551 strWIDList[u32WidsCount].enuWIDtype = WID_CHAR;
1552 strWIDList[u32WidsCount].s32ValueSize = sizeof(char);
1553 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type);
1556 if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7))
1557 gu8FlushedAuthType = (u8)pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type;
1559 PRINT_INFO(HOSTINF_DBG, "Authentication Type = %x\n", pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type);
1561 * strWIDList[u32WidsCount].u16WIDid = (u16)WID_11I_PSK;
1562 * strWIDList[u32WidsCount].enuWIDtype = WID_STR;
1563 * strWIDList[u32WidsCount].s32ValueSize = sizeof(passphrase);
1564 * strWIDList[u32WidsCount].ps8WidVal = (s8*)(passphrase);
1568 PRINT_D(HOSTINF_DBG, "Connecting to network of SSID %s on channel %d\n",
1569 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid, pstrHostIFconnectAttr->u8channel);
1571 strWIDList[u32WidsCount].u16WIDid = (u16)WID_JOIN_REQ_EXTENDED;
1572 strWIDList[u32WidsCount].enuWIDtype = WID_STR;
1574 /*Sending NoA attributes during connection*/
1575 strWIDList[u32WidsCount].s32ValueSize = 112; /* 79; */
1576 strWIDList[u32WidsCount].ps8WidVal = kmalloc(strWIDList[u32WidsCount].s32ValueSize, GFP_KERNEL);
1578 if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7)) {
1579 gu32FlushedJoinReqSize = strWIDList[u32WidsCount].s32ValueSize;
1580 gu8FlushedJoinReq = kmalloc(gu32FlushedJoinReqSize, GFP_KERNEL);
1582 if (strWIDList[u32WidsCount].ps8WidVal == NULL) {
1587 pu8CurrByte = strWIDList[u32WidsCount].ps8WidVal;
1590 if (pstrHostIFconnectAttr->pu8ssid != NULL) {
1591 memcpy(pu8CurrByte, pstrHostIFconnectAttr->pu8ssid, pstrHostIFconnectAttr->ssidLen);
1592 pu8CurrByte[pstrHostIFconnectAttr->ssidLen] = '\0';
1594 pu8CurrByte += MAX_SSID_LEN;
1597 *(pu8CurrByte++) = INFRASTRUCTURE;
1599 if ((pstrHostIFconnectAttr->u8channel >= 1) && (pstrHostIFconnectAttr->u8channel <= 14)) {
1600 *(pu8CurrByte++) = pstrHostIFconnectAttr->u8channel;
1602 PRINT_ER("Channel out of range\n");
1603 *(pu8CurrByte++) = 0xFF;
1606 *(pu8CurrByte++) = (ptstrJoinBssParam->cap_info) & 0xFF;
1607 *(pu8CurrByte++) = ((ptstrJoinBssParam->cap_info) >> 8) & 0xFF;
1608 PRINT_D(HOSTINF_DBG, "* Cap Info %0x*\n", (*(pu8CurrByte - 2) | ((*(pu8CurrByte - 1)) << 8)));
1611 if (pstrHostIFconnectAttr->pu8bssid != NULL)
1612 memcpy(pu8CurrByte, pstrHostIFconnectAttr->pu8bssid, 6);
1616 if (pstrHostIFconnectAttr->pu8bssid != NULL)
1617 memcpy(pu8CurrByte, pstrHostIFconnectAttr->pu8bssid, 6);
1621 *(pu8CurrByte++) = (ptstrJoinBssParam->beacon_period) & 0xFF;
1622 *(pu8CurrByte++) = ((ptstrJoinBssParam->beacon_period) >> 8) & 0xFF;
1623 PRINT_D(HOSTINF_DBG, "* Beacon Period %d*\n", (*(pu8CurrByte - 2) | ((*(pu8CurrByte - 1)) << 8)));
1625 *(pu8CurrByte++) = ptstrJoinBssParam->dtim_period;
1626 PRINT_D(HOSTINF_DBG, "* DTIM Period %d*\n", (*(pu8CurrByte - 1)));
1627 /* Supported rates*/
1628 memcpy(pu8CurrByte, ptstrJoinBssParam->supp_rates, MAX_RATES_SUPPORTED + 1);
1629 pu8CurrByte += (MAX_RATES_SUPPORTED + 1);
1632 *(pu8CurrByte++) = ptstrJoinBssParam->wmm_cap;
1633 PRINT_D(HOSTINF_DBG, "* wmm cap%d*\n", (*(pu8CurrByte - 1)));
1635 *(pu8CurrByte++) = ptstrJoinBssParam->uapsd_cap;
1638 *(pu8CurrByte++) = ptstrJoinBssParam->ht_capable;
1639 /* copy this information to the user request */
1640 pstrWFIDrv->strWILC_UsrConnReq.IsHTCapable = ptstrJoinBssParam->ht_capable;
1643 *(pu8CurrByte++) = ptstrJoinBssParam->rsn_found;
1644 PRINT_D(HOSTINF_DBG, "* rsn found %d*\n", *(pu8CurrByte - 1));
1645 /* rsn group policy*/
1646 *(pu8CurrByte++) = ptstrJoinBssParam->rsn_grp_policy;
1647 PRINT_D(HOSTINF_DBG, "* rsn group policy %0x*\n", (*(pu8CurrByte - 1)));
1649 *(pu8CurrByte++) = ptstrJoinBssParam->mode_802_11i;
1650 PRINT_D(HOSTINF_DBG, "* mode_802_11i %d*\n", (*(pu8CurrByte - 1)));
1651 /* rsn pcip policy*/
1652 memcpy(pu8CurrByte, ptstrJoinBssParam->rsn_pcip_policy, sizeof(ptstrJoinBssParam->rsn_pcip_policy));
1653 pu8CurrByte += sizeof(ptstrJoinBssParam->rsn_pcip_policy);
1655 /* rsn auth policy*/
1656 memcpy(pu8CurrByte, ptstrJoinBssParam->rsn_auth_policy, sizeof(ptstrJoinBssParam->rsn_auth_policy));
1657 pu8CurrByte += sizeof(ptstrJoinBssParam->rsn_auth_policy);
1659 /* rsn auth policy*/
1660 memcpy(pu8CurrByte, ptstrJoinBssParam->rsn_cap, sizeof(ptstrJoinBssParam->rsn_cap));
1661 pu8CurrByte += sizeof(ptstrJoinBssParam->rsn_cap);
1663 *(pu8CurrByte++) = REAL_JOIN_REQ;
1665 *(pu8CurrByte++) = ptstrJoinBssParam->u8NoaEnbaled;
1666 if (ptstrJoinBssParam->u8NoaEnbaled) {
1667 PRINT_D(HOSTINF_DBG, "NOA present\n");
1669 *(pu8CurrByte++) = (ptstrJoinBssParam->tsf) & 0xFF;
1670 *(pu8CurrByte++) = ((ptstrJoinBssParam->tsf) >> 8) & 0xFF;
1671 *(pu8CurrByte++) = ((ptstrJoinBssParam->tsf) >> 16) & 0xFF;
1672 *(pu8CurrByte++) = ((ptstrJoinBssParam->tsf) >> 24) & 0xFF;
1674 *(pu8CurrByte++) = ptstrJoinBssParam->u8Index;
1676 *(pu8CurrByte++) = ptstrJoinBssParam->u8OppEnable;
1678 if (ptstrJoinBssParam->u8OppEnable)
1679 *(pu8CurrByte++) = ptstrJoinBssParam->u8CtWindow;
1681 *(pu8CurrByte++) = ptstrJoinBssParam->u8Count;
1683 memcpy(pu8CurrByte, ptstrJoinBssParam->au8Duration, sizeof(ptstrJoinBssParam->au8Duration));
1685 pu8CurrByte += sizeof(ptstrJoinBssParam->au8Duration);
1687 memcpy(pu8CurrByte, ptstrJoinBssParam->au8Interval, sizeof(ptstrJoinBssParam->au8Interval));
1689 pu8CurrByte += sizeof(ptstrJoinBssParam->au8Interval);
1691 memcpy(pu8CurrByte, ptstrJoinBssParam->au8StartTime, sizeof(ptstrJoinBssParam->au8StartTime));
1693 pu8CurrByte += sizeof(ptstrJoinBssParam->au8StartTime);
1696 PRINT_D(HOSTINF_DBG, "NOA not present\n");
1698 /* keep the buffer at the start of the allocated pointer to use it with the free*/
1699 pu8CurrByte = strWIDList[u32WidsCount].ps8WidVal;
1702 /* A temporary workaround to avoid handling the misleading MAC_DISCONNECTED raised from the
1703 * firmware at chip reset when processing the WIDs of the Connect Request.
1704 * (This workaround should be removed in the future when the Chip reset of the Connect WIDs is disabled) */
1705 /* ////////////////////// */
1706 gu32WidConnRstHack = 0;
1707 /* ////////////////////// */
1709 if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7)) {
1710 memcpy(gu8FlushedJoinReq, pu8CurrByte, gu32FlushedJoinReqSize);
1711 gu8FlushedJoinReqDrvHandler = pstrWFIDrv;
1714 PRINT_D(GENERIC_DBG, "send HOST_IF_WAITING_CONN_RESP\n");
1716 if (pstrHostIFconnectAttr->pu8bssid != NULL) {
1717 memcpy(u8ConnectedSSID, pstrHostIFconnectAttr->pu8bssid, ETH_ALEN);
1719 PRINT_D(GENERIC_DBG, "save Bssid = %pM\n", pstrHostIFconnectAttr->pu8bssid);
1720 PRINT_D(GENERIC_DBG, "save bssid = %pM\n", u8ConnectedSSID);
1723 s32Error = send_config_pkt(SET_CFG, strWIDList, u32WidsCount, false,
1724 get_id_from_handler(pstrWFIDrv));
1726 PRINT_ER("failed to send config packet\n");
1730 PRINT_D(GENERIC_DBG, "set HOST_IF_WAITING_CONN_RESP\n");
1731 pstrWFIDrv->enuHostIFstate = HOST_IF_WAITING_CONN_RESP;
1736 tstrConnectInfo strConnectInfo;
1738 del_timer(&pstrWFIDrv->hConnectTimer);
1740 PRINT_D(HOSTINF_DBG, "could not start connecting to the required network\n");
1742 memset(&strConnectInfo, 0, sizeof(tstrConnectInfo));
1744 if (pstrHostIFconnectAttr->pfConnectResult != NULL) {
1745 if (pstrHostIFconnectAttr->pu8bssid != NULL)
1746 memcpy(strConnectInfo.au8bssid, pstrHostIFconnectAttr->pu8bssid, 6);
1748 if (pstrHostIFconnectAttr->pu8IEs != NULL) {
1749 strConnectInfo.ReqIEsLen = pstrHostIFconnectAttr->IEsLen;
1750 strConnectInfo.pu8ReqIEs = kmalloc(pstrHostIFconnectAttr->IEsLen, GFP_KERNEL);
1751 memcpy(strConnectInfo.pu8ReqIEs,
1752 pstrHostIFconnectAttr->pu8IEs,
1753 pstrHostIFconnectAttr->IEsLen);
1756 pstrHostIFconnectAttr->pfConnectResult(CONN_DISCONN_EVENT_CONN_RESP,
1760 pstrHostIFconnectAttr->pvUserArg);
1761 /*Change state to idle*/
1762 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
1764 if (strConnectInfo.pu8ReqIEs != NULL) {
1765 kfree(strConnectInfo.pu8ReqIEs);
1766 strConnectInfo.pu8ReqIEs = NULL;
1770 PRINT_ER("Connect callback function pointer is NULL\n");
1774 PRINT_D(HOSTINF_DBG, "Deallocating connection parameters\n");
1775 /* Deallocate pstrHostIFconnectAttr->pu8bssid which was prevoisuly allocated by the sending thread */
1776 if (pstrHostIFconnectAttr->pu8bssid != NULL) {
1777 kfree(pstrHostIFconnectAttr->pu8bssid);
1778 pstrHostIFconnectAttr->pu8bssid = NULL;
1781 /* Deallocate pstrHostIFconnectAttr->pu8ssid which was prevoisuly allocated by the sending thread */
1782 if (pstrHostIFconnectAttr->pu8ssid != NULL) {
1783 kfree(pstrHostIFconnectAttr->pu8ssid);
1784 pstrHostIFconnectAttr->pu8ssid = NULL;
1787 /* Deallocate pstrHostIFconnectAttr->pu8IEs which was prevoisuly allocated by the sending thread */
1788 if (pstrHostIFconnectAttr->pu8IEs != NULL) {
1789 kfree(pstrHostIFconnectAttr->pu8IEs);
1790 pstrHostIFconnectAttr->pu8IEs = NULL;
1793 if (pu8CurrByte != NULL)
1799 * @brief Handle_FlushConnect
1800 * @details Sending config packet to firmware to flush an old connection
1801 * after switching FW from station one to hybrid one
1802 * @param[in] void * drvHandler
1803 * @return Error code.
1804 * @author Amr Abdel-Moghny
1809 static s32 Handle_FlushConnect(tstrWILC_WFIDrv *drvHandler)
1812 tstrWID strWIDList[5];
1813 u32 u32WidsCount = 0;
1814 u8 *pu8CurrByte = NULL;
1817 /* IEs to be inserted in Association Request */
1818 strWIDList[u32WidsCount].u16WIDid = WID_INFO_ELEMENT_ASSOCIATE;
1819 strWIDList[u32WidsCount].enuWIDtype = WID_BIN_DATA;
1820 strWIDList[u32WidsCount].ps8WidVal = gu8FlushedInfoElemAsoc;
1821 strWIDList[u32WidsCount].s32ValueSize = gu32FlushedInfoElemAsocSize;
1824 strWIDList[u32WidsCount].u16WIDid = (u16)WID_11I_MODE;
1825 strWIDList[u32WidsCount].enuWIDtype = WID_CHAR;
1826 strWIDList[u32WidsCount].s32ValueSize = sizeof(char);
1827 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(gu8Flushed11iMode));
1832 strWIDList[u32WidsCount].u16WIDid = (u16)WID_AUTH_TYPE;
1833 strWIDList[u32WidsCount].enuWIDtype = WID_CHAR;
1834 strWIDList[u32WidsCount].s32ValueSize = sizeof(char);
1835 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&gu8FlushedAuthType);
1838 strWIDList[u32WidsCount].u16WIDid = (u16)WID_JOIN_REQ_EXTENDED;
1839 strWIDList[u32WidsCount].enuWIDtype = WID_STR;
1840 strWIDList[u32WidsCount].s32ValueSize = gu32FlushedJoinReqSize;
1841 strWIDList[u32WidsCount].ps8WidVal = (s8 *)gu8FlushedJoinReq;
1842 pu8CurrByte = strWIDList[u32WidsCount].ps8WidVal;
1844 pu8CurrByte += FLUSHED_BYTE_POS;
1845 *(pu8CurrByte) = FLUSHED_JOIN_REQ;
1849 s32Error = send_config_pkt(SET_CFG, strWIDList, u32WidsCount, false,
1850 get_id_from_handler(gu8FlushedJoinReqDrvHandler));
1852 PRINT_ER("failed to send config packet\n");
1860 * @brief Handle_ConnectTimeout
1861 * @details Call connect notification callback function indicating connection failure
1863 * @return Error code.
1868 static s32 Handle_ConnectTimeout(tstrWILC_WFIDrv *drvHandler)
1871 tstrConnectInfo strConnectInfo;
1873 u16 u16DummyReasonCode = 0;
1874 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler;
1876 if (pstrWFIDrv == NULL) {
1877 PRINT_ER("Driver handler is NULL\n");
1881 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
1883 gbScanWhileConnected = false;
1886 memset(&strConnectInfo, 0, sizeof(tstrConnectInfo));
1889 /* First, we will notify the upper layer with the Connection failure {through the Connect Callback function},
1890 * then we will notify our firmware also with the Connection failure {through sending to it Cfg packet carrying
1891 * WID_DISCONNECT} */
1892 if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult != NULL) {
1893 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
1894 memcpy(strConnectInfo.au8bssid,
1895 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, 6);
1898 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
1899 strConnectInfo.ReqIEsLen = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen;
1900 strConnectInfo.pu8ReqIEs = kmalloc(pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen, GFP_KERNEL);
1901 memcpy(strConnectInfo.pu8ReqIEs,
1902 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs,
1903 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen);
1906 pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_CONN_RESP,
1910 pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid);
1912 /* Deallocation of strConnectInfo.pu8ReqIEs */
1913 if (strConnectInfo.pu8ReqIEs != NULL) {
1914 kfree(strConnectInfo.pu8ReqIEs);
1915 strConnectInfo.pu8ReqIEs = NULL;
1918 PRINT_ER("Connect callback function pointer is NULL\n");
1921 /* Here we will notify our firmware also with the Connection failure {through sending to it Cfg packet carrying
1922 * WID_DISCONNECT} */
1923 strWID.u16WIDid = (u16)WID_DISCONNECT;
1924 strWID.enuWIDtype = WID_CHAR;
1925 strWID.ps8WidVal = (s8 *)&u16DummyReasonCode;
1926 strWID.s32ValueSize = sizeof(char);
1928 PRINT_D(HOSTINF_DBG, "Sending disconnect request\n");
1930 s32Error = send_config_pkt(SET_CFG, &strWID, 1, false,
1931 get_id_from_handler(pstrWFIDrv));
1933 PRINT_ER("Failed to send dissconect config packet\n");
1935 /* Deallocation of the Saved Connect Request in the global Handle */
1936 pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0;
1937 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) {
1938 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid);
1939 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL;
1942 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
1943 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid);
1944 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL;
1947 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0;
1948 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
1949 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs);
1950 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL;
1953 eth_zero_addr(u8ConnectedSSID);
1954 /*Freeing flushed join request params on connect timeout*/
1955 if (gu8FlushedJoinReq != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
1956 kfree(gu8FlushedJoinReq);
1957 gu8FlushedJoinReq = NULL;
1959 if (gu8FlushedInfoElemAsoc != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
1960 kfree(gu8FlushedInfoElemAsoc);
1961 gu8FlushedInfoElemAsoc = NULL;
1968 * @brief Handle_RcvdNtwrkInfo
1969 * @details Handling received network information
1970 * @param[in] struct rcvd_net_info *pstrRcvdNetworkInfo
1971 * @return Error code.
1976 static s32 Handle_RcvdNtwrkInfo(tstrWILC_WFIDrv *drvHandler,
1977 struct rcvd_net_info *pstrRcvdNetworkInfo)
1980 bool bNewNtwrkFound;
1985 tstrNetworkInfo *pstrNetworkInfo = NULL;
1986 void *pJoinParams = NULL;
1988 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
1992 bNewNtwrkFound = true;
1993 PRINT_INFO(HOSTINF_DBG, "Handling received network info\n");
1995 /*if there is a an ongoing scan request*/
1996 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
1997 PRINT_D(HOSTINF_DBG, "State: Scanning, parsing network information received\n");
1998 parse_network_info(pstrRcvdNetworkInfo->pu8Buffer, &pstrNetworkInfo);
1999 if ((pstrNetworkInfo == NULL)
2000 || (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult == NULL)) {
2001 PRINT_ER("driver is null\n");
2006 /* check whether this network is discovered before */
2007 for (i = 0; i < pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount; i++) {
2009 if ((pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].au8bssid != NULL) &&
2010 (pstrNetworkInfo->au8bssid != NULL)) {
2011 if (memcmp(pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].au8bssid,
2012 pstrNetworkInfo->au8bssid, 6) == 0) {
2013 if (pstrNetworkInfo->s8rssi <= pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].s8rssi) {
2014 /*we have already found this network with better rssi, so keep the old cached one and don't
2015 * send anything to the upper layer */
2016 PRINT_D(HOSTINF_DBG, "Network previously discovered\n");
2019 /* here the same already found network is found again but with a better rssi, so just update
2020 * the rssi for this cached network and send this updated network to the upper layer but
2021 * don't add a new record for it */
2022 pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].s8rssi = pstrNetworkInfo->s8rssi;
2023 bNewNtwrkFound = false;
2030 if (bNewNtwrkFound == true) {
2031 /* here it is confirmed that it is a new discovered network,
2032 * so add its record then call the User CallBack function */
2034 PRINT_D(HOSTINF_DBG, "New network found\n");
2036 if (pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount < MAX_NUM_SCANNED_NETWORKS) {
2037 pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount].s8rssi = pstrNetworkInfo->s8rssi;
2039 if ((pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount].au8bssid != NULL)
2040 && (pstrNetworkInfo->au8bssid != NULL)) {
2041 memcpy(pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount].au8bssid,
2042 pstrNetworkInfo->au8bssid, 6);
2044 pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount++;
2046 pstrNetworkInfo->bNewNetwork = true;
2047 /* add new BSS to JoinBssTable */
2048 pJoinParams = host_int_ParseJoinBssParam(pstrNetworkInfo);
2050 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_NETWORK_FOUND, pstrNetworkInfo,
2051 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid,
2057 PRINT_WRN(HOSTINF_DBG, "Discovered networks exceeded max. limit\n");
2060 pstrNetworkInfo->bNewNetwork = false;
2061 /* just call the User CallBack function to send the same discovered network with its updated RSSI */
2062 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_NETWORK_FOUND, pstrNetworkInfo,
2063 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL);
2068 /* Deallocate pstrRcvdNetworkInfo->pu8Buffer which was prevoisuly allocated by the sending thread */
2069 if (pstrRcvdNetworkInfo->pu8Buffer != NULL) {
2070 kfree(pstrRcvdNetworkInfo->pu8Buffer);
2071 pstrRcvdNetworkInfo->pu8Buffer = NULL;
2074 /*free structure allocated*/
2075 if (pstrNetworkInfo != NULL) {
2076 DeallocateNetworkInfo(pstrNetworkInfo);
2077 pstrNetworkInfo = NULL;
2084 * @brief Handle_RcvdGnrlAsyncInfo
2085 * @details Handling received asynchrous general network information
2086 * @param[in] struct rcvd_async_info *pstrRcvdGnrlAsyncInfo
2087 * @return Error code.
2092 static s32 Handle_RcvdGnrlAsyncInfo(tstrWILC_WFIDrv *drvHandler,
2093 struct rcvd_async_info *pstrRcvdGnrlAsyncInfo)
2095 /* TODO: mostafa: till now, this function just handles only the received mac status msg, */
2096 /* which carries only 1 WID which have WID ID = WID_STATUS */
2101 u16 u16WidID = (u16)WID_NIL;
2104 u8 u8MacStatusReasonCode;
2105 u8 u8MacStatusAdditionalInfo;
2106 tstrConnectInfo strConnectInfo;
2107 tstrDisconnectNotifInfo strDisconnectNotifInfo;
2109 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler;
2112 PRINT_ER("Driver handler is NULL\n");
2115 PRINT_D(GENERIC_DBG, "Current State = %d,Received state = %d\n", pstrWFIDrv->enuHostIFstate,
2116 pstrRcvdGnrlAsyncInfo->pu8Buffer[7]);
2118 if ((pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) ||
2119 (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED) ||
2120 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
2121 if ((pstrRcvdGnrlAsyncInfo->pu8Buffer == NULL) ||
2122 (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult == NULL)) {
2123 PRINT_ER("driver is null\n");
2127 u8MsgType = pstrRcvdGnrlAsyncInfo->pu8Buffer[0];
2129 /* Check whether the received message type is 'I' */
2130 if ('I' != u8MsgType) {
2131 PRINT_ER("Received Message format incorrect.\n");
2135 /* Extract message ID */
2136 u8MsgID = pstrRcvdGnrlAsyncInfo->pu8Buffer[1];
2138 /* Extract message Length */
2139 u16MsgLen = MAKE_WORD16(pstrRcvdGnrlAsyncInfo->pu8Buffer[2], pstrRcvdGnrlAsyncInfo->pu8Buffer[3]);
2141 /* Extract WID ID [expected to be = WID_STATUS] */
2142 u16WidID = MAKE_WORD16(pstrRcvdGnrlAsyncInfo->pu8Buffer[4], pstrRcvdGnrlAsyncInfo->pu8Buffer[5]);
2144 /* Extract WID Length [expected to be = 1] */
2145 u8WidLen = pstrRcvdGnrlAsyncInfo->pu8Buffer[6];
2147 /* get the WID value [expected to be one of two values: either MAC_CONNECTED = (1) or MAC_DISCONNECTED = (0)] */
2148 u8MacStatus = pstrRcvdGnrlAsyncInfo->pu8Buffer[7];
2149 u8MacStatusReasonCode = pstrRcvdGnrlAsyncInfo->pu8Buffer[8];
2150 u8MacStatusAdditionalInfo = pstrRcvdGnrlAsyncInfo->pu8Buffer[9];
2151 PRINT_INFO(HOSTINF_DBG, "Recieved MAC status = %d with Reason = %d , Info = %d\n", u8MacStatus, u8MacStatusReasonCode, u8MacStatusAdditionalInfo);
2152 if (pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) {
2153 /* our station had sent Association Request frame, so here it will get the Association Response frame then parse it */
2154 u32 u32RcvdAssocRespInfoLen;
2155 tstrConnectRespInfo *pstrConnectRespInfo = NULL;
2157 PRINT_D(HOSTINF_DBG, "Recieved MAC status = %d with Reason = %d , Code = %d\n", u8MacStatus, u8MacStatusReasonCode, u8MacStatusAdditionalInfo);
2159 memset(&strConnectInfo, 0, sizeof(tstrConnectInfo));
2161 if (u8MacStatus == MAC_CONNECTED) {
2162 memset(gapu8RcvdAssocResp, 0, MAX_ASSOC_RESP_FRAME_SIZE);
2164 host_int_get_assoc_res_info(pstrWFIDrv,
2166 MAX_ASSOC_RESP_FRAME_SIZE,
2167 &u32RcvdAssocRespInfoLen);
2169 PRINT_INFO(HOSTINF_DBG, "Received association response with length = %d\n", u32RcvdAssocRespInfoLen);
2171 if (u32RcvdAssocRespInfoLen != 0) {
2173 PRINT_D(HOSTINF_DBG, "Parsing association response\n");
2174 s32Err = ParseAssocRespInfo(gapu8RcvdAssocResp, u32RcvdAssocRespInfoLen,
2175 &pstrConnectRespInfo);
2177 PRINT_ER("ParseAssocRespInfo() returned error %d\n", s32Err);
2179 /* use the necessary parsed Info from the Received Association Response */
2180 strConnectInfo.u16ConnectStatus = pstrConnectRespInfo->u16ConnectStatus;
2182 if (strConnectInfo.u16ConnectStatus == SUCCESSFUL_STATUSCODE) {
2183 PRINT_INFO(HOSTINF_DBG, "Association response received : Successful connection status\n");
2184 if (pstrConnectRespInfo->pu8RespIEs != NULL) {
2185 strConnectInfo.u16RespIEsLen = pstrConnectRespInfo->u16RespIEsLen;
2188 strConnectInfo.pu8RespIEs = kmalloc(pstrConnectRespInfo->u16RespIEsLen, GFP_KERNEL);
2189 memcpy(strConnectInfo.pu8RespIEs, pstrConnectRespInfo->pu8RespIEs,
2190 pstrConnectRespInfo->u16RespIEsLen);
2194 /* deallocate the Assoc. Resp. parsed structure as it is not needed anymore */
2195 if (pstrConnectRespInfo != NULL) {
2196 DeallocateAssocRespInfo(pstrConnectRespInfo);
2197 pstrConnectRespInfo = NULL;
2203 /* The station has just received mac status and it also received assoc. response which
2204 * it was waiting for.
2205 * So check first the matching between the received mac status and the received status code in Asoc Resp */
2206 if ((u8MacStatus == MAC_CONNECTED) &&
2207 (strConnectInfo.u16ConnectStatus != SUCCESSFUL_STATUSCODE)) {
2208 PRINT_ER("Received MAC status is MAC_CONNECTED while the received status code in Asoc Resp is not SUCCESSFUL_STATUSCODE\n");
2209 eth_zero_addr(u8ConnectedSSID);
2211 } else if (u8MacStatus == MAC_DISCONNECTED) {
2212 PRINT_ER("Received MAC status is MAC_DISCONNECTED\n");
2213 eth_zero_addr(u8ConnectedSSID);
2216 /* TODO: mostafa: correct BSSID should be retrieved from actual BSSID received from AP */
2217 /* through a structure of type tstrConnectRespInfo */
2218 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
2219 PRINT_D(HOSTINF_DBG, "Retrieving actual BSSID from AP\n");
2220 memcpy(strConnectInfo.au8bssid, pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, 6);
2222 if ((u8MacStatus == MAC_CONNECTED) &&
2223 (strConnectInfo.u16ConnectStatus == SUCCESSFUL_STATUSCODE)) {
2224 memcpy(pstrWFIDrv->au8AssociatedBSSID,
2225 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, ETH_ALEN);
2230 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
2231 strConnectInfo.ReqIEsLen = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen;
2232 strConnectInfo.pu8ReqIEs = kmalloc(pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen, GFP_KERNEL);
2233 memcpy(strConnectInfo.pu8ReqIEs,
2234 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs,
2235 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen);
2239 del_timer(&pstrWFIDrv->hConnectTimer);
2240 pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_CONN_RESP,
2244 pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid);
2247 /* if received mac status is MAC_CONNECTED and
2248 * received status code in Asoc Resp is SUCCESSFUL_STATUSCODE, change state to CONNECTED
2249 * else change state to IDLE */
2250 if ((u8MacStatus == MAC_CONNECTED) &&
2251 (strConnectInfo.u16ConnectStatus == SUCCESSFUL_STATUSCODE)) {
2252 host_int_set_power_mgmt(pstrWFIDrv, 0, 0);
2254 PRINT_D(HOSTINF_DBG, "MAC status : CONNECTED and Connect Status : Successful\n");
2255 pstrWFIDrv->enuHostIFstate = HOST_IF_CONNECTED;
2257 PRINT_D(GENERIC_DBG, "Obtaining an IP, Disable Scan\n");
2258 g_obtainingIP = true;
2259 mod_timer(&hDuringIpTimer,
2260 jiffies + msecs_to_jiffies(10000));
2262 /* open a BA session if possible */
2263 /* if(pstrWFIDrv->strWILC_UsrConnReq.IsHTCapable) */
2264 /* BA_SESSION_DEFAULT_BUFFER_SIZE,BA_SESSION_DEFAULT_TIMEOUT); */
2266 PRINT_D(HOSTINF_DBG, "MAC status : %d and Connect Status : %d\n", u8MacStatus, strConnectInfo.u16ConnectStatus);
2267 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
2268 gbScanWhileConnected = false;
2272 if (strConnectInfo.pu8RespIEs != NULL) {
2273 kfree(strConnectInfo.pu8RespIEs);
2274 strConnectInfo.pu8RespIEs = NULL;
2277 if (strConnectInfo.pu8ReqIEs != NULL) {
2278 kfree(strConnectInfo.pu8ReqIEs);
2279 strConnectInfo.pu8ReqIEs = NULL;
2283 pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0;
2284 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) {
2285 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid);
2286 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL;
2289 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
2290 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid);
2291 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL;
2294 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0;
2295 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
2296 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs);
2297 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL;
2300 } else if ((u8MacStatus == MAC_DISCONNECTED) &&
2301 (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED)) {
2302 /* Disassociation or Deauthentication frame has been received */
2303 PRINT_D(HOSTINF_DBG, "Received MAC_DISCONNECTED from the FW\n");
2305 memset(&strDisconnectNotifInfo, 0, sizeof(tstrDisconnectNotifInfo));
2307 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
2308 PRINT_D(HOSTINF_DBG, "\n\n<< Abort the running OBSS Scan >>\n\n");
2309 del_timer(&pstrWFIDrv->hScanTimer);
2310 Handle_ScanDone((void *)pstrWFIDrv, SCAN_EVENT_ABORTED);
2313 strDisconnectNotifInfo.u16reason = 0;
2314 strDisconnectNotifInfo.ie = NULL;
2315 strDisconnectNotifInfo.ie_len = 0;
2317 if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult != NULL) {
2318 g_obtainingIP = false;
2319 host_int_set_power_mgmt(pstrWFIDrv, 0, 0);
2321 pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_DISCONN_NOTIF,
2324 &strDisconnectNotifInfo,
2325 pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid);
2328 PRINT_ER("Connect result callback function is NULL\n");
2331 eth_zero_addr(pstrWFIDrv->au8AssociatedBSSID);
2336 /* if Information Elements were retrieved from the Received deauth/disassoc frame, then they
2337 * should be deallocated here */
2339 * if(strDisconnectNotifInfo.ie != NULL)
2341 * kfree(strDisconnectNotifInfo.ie);
2342 * strDisconnectNotifInfo.ie = NULL;
2346 pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0;
2347 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) {
2348 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid);
2349 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL;
2352 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
2353 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid);
2354 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL;
2357 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0;
2358 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
2359 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs);
2360 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL;
2363 /*Freeing flushed join request params on receiving*/
2364 /*MAC_DISCONNECTED while connected*/
2365 if (gu8FlushedJoinReq != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
2366 kfree(gu8FlushedJoinReq);
2367 gu8FlushedJoinReq = NULL;
2369 if (gu8FlushedInfoElemAsoc != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
2370 kfree(gu8FlushedInfoElemAsoc);
2371 gu8FlushedInfoElemAsoc = NULL;
2374 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
2375 gbScanWhileConnected = false;
2377 } else if ((u8MacStatus == MAC_DISCONNECTED) &&
2378 (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult != NULL)) {
2379 PRINT_D(HOSTINF_DBG, "Received MAC_DISCONNECTED from the FW while scanning\n");
2380 PRINT_D(HOSTINF_DBG, "\n\n<< Abort the running Scan >>\n\n");
2381 /*Abort the running scan*/
2382 del_timer(&pstrWFIDrv->hScanTimer);
2383 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult)
2384 Handle_ScanDone(pstrWFIDrv, SCAN_EVENT_ABORTED);
2390 /* Deallocate pstrRcvdGnrlAsyncInfo->pu8Buffer which was prevoisuly allocated by the sending thread */
2391 if (pstrRcvdGnrlAsyncInfo->pu8Buffer != NULL) {
2392 kfree(pstrRcvdGnrlAsyncInfo->pu8Buffer);
2393 pstrRcvdGnrlAsyncInfo->pu8Buffer = NULL;
2401 * @details Sending config packet to firmware to set key
2402 * @param[in] struct key_attr *pstrHostIFkeyAttr
2403 * @return Error code.
2408 static int Handle_Key(tstrWILC_WFIDrv *drvHandler,
2409 struct key_attr *pstrHostIFkeyAttr)
2413 tstrWID strWIDList[5];
2418 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
2421 switch (pstrHostIFkeyAttr->enuKeyType) {
2426 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY_AP) {
2428 PRINT_D(HOSTINF_DBG, "Handling WEP key\n");
2429 PRINT_D(GENERIC_DBG, "ID Hostint is %d\n", (pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx));
2430 strWIDList[0].u16WIDid = (u16)WID_11I_MODE;
2431 strWIDList[0].enuWIDtype = WID_CHAR;
2432 strWIDList[0].s32ValueSize = sizeof(char);
2433 strWIDList[0].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8mode));
2435 strWIDList[1].u16WIDid = WID_AUTH_TYPE;
2436 strWIDList[1].enuWIDtype = WID_CHAR;
2437 strWIDList[1].s32ValueSize = sizeof(char);
2438 strWIDList[1].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.tenuAuth_type));
2440 strWIDList[2].u16WIDid = (u16)WID_KEY_ID;
2441 strWIDList[2].enuWIDtype = WID_CHAR;
2443 strWIDList[2].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx));
2444 strWIDList[2].s32ValueSize = sizeof(char);
2447 pu8keybuf = kmalloc(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen, GFP_KERNEL);
2450 if (pu8keybuf == NULL) {
2451 PRINT_ER("No buffer to send Key\n");
2455 memcpy(pu8keybuf, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey,
2456 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen);
2459 kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey);
2461 strWIDList[3].u16WIDid = (u16)WID_WEP_KEY_VALUE;
2462 strWIDList[3].enuWIDtype = WID_STR;
2463 strWIDList[3].s32ValueSize = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen;
2464 strWIDList[3].ps8WidVal = (s8 *)pu8keybuf;
2467 s32Error = send_config_pkt(SET_CFG, strWIDList, 4, true,
2468 get_id_from_handler(pstrWFIDrv));
2474 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY) {
2475 PRINT_D(HOSTINF_DBG, "Handling WEP key\n");
2476 pu8keybuf = kmalloc(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen + 2, GFP_KERNEL);
2477 if (pu8keybuf == NULL) {
2478 PRINT_ER("No buffer to send Key\n");
2481 pu8keybuf[0] = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx;
2483 memcpy(pu8keybuf + 1, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen, 1);
2485 memcpy(pu8keybuf + 2, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey,
2486 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen);
2488 kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey);
2490 strWID.u16WIDid = (u16)WID_ADD_WEP_KEY;
2491 strWID.enuWIDtype = WID_STR;
2492 strWID.ps8WidVal = (s8 *)pu8keybuf;
2493 strWID.s32ValueSize = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen + 2;
2495 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
2496 get_id_from_handler(pstrWFIDrv));
2498 } else if (pstrHostIFkeyAttr->u8KeyAction & REMOVEKEY) {
2500 PRINT_D(HOSTINF_DBG, "Removing key\n");
2501 strWID.u16WIDid = (u16)WID_REMOVE_WEP_KEY;
2502 strWID.enuWIDtype = WID_STR;
2504 s8idxarray[0] = (s8)pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx;
2505 strWID.ps8WidVal = s8idxarray;
2506 strWID.s32ValueSize = 1;
2508 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
2509 get_id_from_handler(pstrWFIDrv));
2511 strWID.u16WIDid = (u16)WID_KEY_ID;
2512 strWID.enuWIDtype = WID_CHAR;
2513 strWID.ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx));
2514 strWID.s32ValueSize = sizeof(char);
2516 PRINT_D(HOSTINF_DBG, "Setting default key index\n");
2518 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
2519 get_id_from_handler(pstrWFIDrv));
2521 up(&(pstrWFIDrv->hSemTestKeyBlock));
2525 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY_AP) {
2526 pu8keybuf = kmalloc(RX_MIC_KEY_MSG_LEN, GFP_KERNEL);
2527 if (pu8keybuf == NULL) {
2528 PRINT_ER("No buffer to send RxGTK Key\n");
2530 goto _WPARxGtk_end_case_;
2533 memset(pu8keybuf, 0, RX_MIC_KEY_MSG_LEN);
2536 /*|----------------------------------------------------------------------------|
2537 * |Sta Address | Key RSC | KeyID | Key Length | Temporal Key | Rx Michael Key |
2538 * |------------|---------|-------|------------|---------------|----------------|
2539 | 6 bytes | 8 byte |1 byte | 1 byte | 16 bytes | 8 bytes |*/
2543 if (pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq != NULL)
2544 memcpy(pu8keybuf + 6, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq, 8);
2547 memcpy(pu8keybuf + 14, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx, 1);
2549 memcpy(pu8keybuf + 15, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1);
2551 memcpy(pu8keybuf + 16, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
2552 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen);
2553 /* pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode = 0X51; */
2554 strWIDList[0].u16WIDid = (u16)WID_11I_MODE;
2555 strWIDList[0].enuWIDtype = WID_CHAR;
2556 strWIDList[0].s32ValueSize = sizeof(char);
2557 strWIDList[0].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode));
2559 strWIDList[1].u16WIDid = (u16)WID_ADD_RX_GTK;
2560 strWIDList[1].enuWIDtype = WID_STR;
2561 strWIDList[1].ps8WidVal = (s8 *)pu8keybuf;
2562 strWIDList[1].s32ValueSize = RX_MIC_KEY_MSG_LEN;
2564 s32Error = send_config_pkt(SET_CFG, strWIDList, 2, true,
2565 get_id_from_handler(pstrWFIDrv));
2569 /* ////////////////////////// */
2570 up(&(pstrWFIDrv->hSemTestKeyBlock));
2571 /* ///////////////////////// */
2574 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY) {
2575 PRINT_D(HOSTINF_DBG, "Handling group key(Rx) function\n");
2577 pu8keybuf = kmalloc(RX_MIC_KEY_MSG_LEN, GFP_KERNEL);
2578 if (pu8keybuf == NULL) {
2579 PRINT_ER("No buffer to send RxGTK Key\n");
2581 goto _WPARxGtk_end_case_;
2584 memset(pu8keybuf, 0, RX_MIC_KEY_MSG_LEN);
2587 /*|----------------------------------------------------------------------------|
2588 * |Sta Address | Key RSC | KeyID | Key Length | Temporal Key | Rx Michael Key |
2589 * |------------|---------|-------|------------|---------------|----------------|
2590 | 6 bytes | 8 byte |1 byte | 1 byte | 16 bytes | 8 bytes |*/
2592 if (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED)
2593 memcpy(pu8keybuf, pstrWFIDrv->au8AssociatedBSSID, ETH_ALEN);
2595 PRINT_ER("Couldn't handle WPARxGtk while enuHostIFstate is not HOST_IF_CONNECTED\n");
2597 memcpy(pu8keybuf + 6, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq, 8);
2599 memcpy(pu8keybuf + 14, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx, 1);
2601 memcpy(pu8keybuf + 15, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1);
2602 memcpy(pu8keybuf + 16, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
2603 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen);
2605 strWID.u16WIDid = (u16)WID_ADD_RX_GTK;
2606 strWID.enuWIDtype = WID_STR;
2607 strWID.ps8WidVal = (s8 *)pu8keybuf;
2608 strWID.s32ValueSize = RX_MIC_KEY_MSG_LEN;
2610 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
2611 get_id_from_handler(pstrWFIDrv));
2615 /* ////////////////////////// */
2616 up(&(pstrWFIDrv->hSemTestKeyBlock));
2617 /* ///////////////////////// */
2619 _WPARxGtk_end_case_:
2620 kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key);
2621 kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq);
2628 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY_AP) {
2631 pu8keybuf = kmalloc(PTK_KEY_MSG_LEN + 1, GFP_KERNEL);
2635 if (pu8keybuf == NULL) {
2636 PRINT_ER("No buffer to send PTK Key\n");
2638 goto _WPAPtk_end_case_;
2642 /*|-----------------------------------------------------------------------------|
2643 * |Station address | keyidx |Key Length |Temporal Key | Rx Michael Key |Tx Michael Key |
2644 * |----------------|------------ |--------------|----------------|---------------|
2645 | 6 bytes | 1 byte | 1byte | 16 bytes | 8 bytes | 8 bytes |
2646 |-----------------------------------------------------------------------------|*/
2648 memcpy(pu8keybuf, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8macaddr, 6); /*1 bytes Key Length */
2650 memcpy(pu8keybuf + 6, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx, 1);
2651 memcpy(pu8keybuf + 7, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1);
2653 memcpy(pu8keybuf + 8, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
2654 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen);
2657 strWIDList[0].u16WIDid = (u16)WID_11I_MODE;
2658 strWIDList[0].enuWIDtype = WID_CHAR;
2659 strWIDList[0].s32ValueSize = sizeof(char);
2660 strWIDList[0].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode));
2662 strWIDList[1].u16WIDid = (u16)WID_ADD_PTK;
2663 strWIDList[1].enuWIDtype = WID_STR;
2664 strWIDList[1].ps8WidVal = (s8 *)pu8keybuf;
2665 strWIDList[1].s32ValueSize = PTK_KEY_MSG_LEN + 1;
2667 s32Error = send_config_pkt(SET_CFG, strWIDList, 2, true,
2668 get_id_from_handler(pstrWFIDrv));
2671 /* ////////////////////////// */
2672 up(&(pstrWFIDrv->hSemTestKeyBlock));
2673 /* ///////////////////////// */
2675 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY) {
2678 pu8keybuf = kmalloc(PTK_KEY_MSG_LEN, GFP_KERNEL);
2682 if (pu8keybuf == NULL) {
2683 PRINT_ER("No buffer to send PTK Key\n");
2685 goto _WPAPtk_end_case_;
2689 /*|-----------------------------------------------------------------------------|
2690 * |Station address | Key Length | Temporal Key | Rx Michael Key |Tx Michael Key |
2691 * |----------------|------------|--------------|----------------|---------------|
2692 | 6 bytes | 1byte | 16 bytes | 8 bytes | 8 bytes |
2693 |-----------------------------------------------------------------------------|*/
2695 memcpy(pu8keybuf, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8macaddr, 6); /*1 bytes Key Length */
2697 memcpy(pu8keybuf + 6, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1);
2699 memcpy(pu8keybuf + 7, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
2700 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen);
2703 strWID.u16WIDid = (u16)WID_ADD_PTK;
2704 strWID.enuWIDtype = WID_STR;
2705 strWID.ps8WidVal = (s8 *)pu8keybuf;
2706 strWID.s32ValueSize = PTK_KEY_MSG_LEN;
2708 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
2709 get_id_from_handler(pstrWFIDrv));
2712 /* ////////////////////////// */
2713 up(&(pstrWFIDrv->hSemTestKeyBlock));
2714 /* ///////////////////////// */
2718 kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key);
2727 PRINT_D(HOSTINF_DBG, "Handling PMKSA key\n");
2729 pu8keybuf = kmalloc((pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid * PMKSA_KEY_LEN) + 1, GFP_KERNEL);
2730 if (pu8keybuf == NULL) {
2731 PRINT_ER("No buffer to send PMKSA Key\n");
2735 pu8keybuf[0] = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid;
2737 for (i = 0; i < pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid; i++) {
2739 memcpy(pu8keybuf + ((PMKSA_KEY_LEN * i) + 1), pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].bssid, ETH_ALEN);
2740 memcpy(pu8keybuf + ((PMKSA_KEY_LEN * i) + ETH_ALEN + 1), pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].pmkid, PMKID_LEN);
2743 strWID.u16WIDid = (u16)WID_PMKID_INFO;
2744 strWID.enuWIDtype = WID_STR;
2745 strWID.ps8WidVal = (s8 *)pu8keybuf;
2746 strWID.s32ValueSize = (pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid * PMKSA_KEY_LEN) + 1;
2748 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
2749 get_id_from_handler(pstrWFIDrv));
2756 PRINT_ER("Failed to send key config packet\n");
2764 * @brief Handle_Disconnect
2765 * @details Sending config packet to firmware to disconnect
2772 static void Handle_Disconnect(tstrWILC_WFIDrv *drvHandler)
2777 u16 u16DummyReasonCode = 0;
2778 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
2781 strWID.u16WIDid = (u16)WID_DISCONNECT;
2782 strWID.enuWIDtype = WID_CHAR;
2783 strWID.ps8WidVal = (s8 *)&u16DummyReasonCode;
2784 strWID.s32ValueSize = sizeof(char);
2788 PRINT_D(HOSTINF_DBG, "Sending disconnect request\n");
2790 g_obtainingIP = false;
2791 host_int_set_power_mgmt(pstrWFIDrv, 0, 0);
2793 eth_zero_addr(u8ConnectedSSID);
2795 s32Error = send_config_pkt(SET_CFG, &strWID, 1, false,
2796 get_id_from_handler(pstrWFIDrv));
2799 PRINT_ER("Failed to send dissconect config packet\n");
2801 tstrDisconnectNotifInfo strDisconnectNotifInfo;
2803 memset(&strDisconnectNotifInfo, 0, sizeof(tstrDisconnectNotifInfo));
2805 strDisconnectNotifInfo.u16reason = 0;
2806 strDisconnectNotifInfo.ie = NULL;
2807 strDisconnectNotifInfo.ie_len = 0;
2809 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
2810 del_timer(&pstrWFIDrv->hScanTimer);
2811 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_ABORTED, NULL,
2812 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL);
2814 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = NULL;
2817 if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult != NULL) {
2819 /*Stop connect timer, if connection in progress*/
2820 if (pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) {
2821 PRINT_D(HOSTINF_DBG, "Upper layer requested termination of connection\n");
2822 del_timer(&pstrWFIDrv->hConnectTimer);
2825 pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_DISCONN_NOTIF, NULL,
2826 0, &strDisconnectNotifInfo, pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid);
2828 PRINT_ER("strWILC_UsrConnReq.pfUserConnectResult = NULL\n");
2831 gbScanWhileConnected = false;
2833 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
2835 eth_zero_addr(pstrWFIDrv->au8AssociatedBSSID);
2839 pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0;
2840 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) {
2841 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid);
2842 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL;
2845 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
2846 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid);
2847 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL;
2850 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0;
2851 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
2852 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs);
2853 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL;
2857 if (gu8FlushedJoinReq != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
2858 kfree(gu8FlushedJoinReq);
2859 gu8FlushedJoinReq = NULL;
2861 if (gu8FlushedInfoElemAsoc != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
2862 kfree(gu8FlushedInfoElemAsoc);
2863 gu8FlushedInfoElemAsoc = NULL;
2868 /* ////////////////////////// */
2869 up(&(pstrWFIDrv->hSemTestDisconnectBlock));
2870 /* ///////////////////////// */
2875 void resolve_disconnect_aberration(tstrWILC_WFIDrv *drvHandler)
2877 tstrWILC_WFIDrv *pstrWFIDrv;
2879 pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
2880 if (pstrWFIDrv == NULL)
2882 if ((pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) || (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTING)) {
2883 PRINT_D(HOSTINF_DBG, "\n\n<< correcting Supplicant state machine >>\n\n");
2884 host_int_disconnect(pstrWFIDrv, 1);
2889 * @brief Handle_GetChnl
2890 * @details Sending config packet to get channel
2898 static s32 Handle_GetChnl(tstrWILC_WFIDrv *drvHandler)
2903 /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */
2904 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
2906 strWID.u16WIDid = (u16)WID_CURRENT_CHANNEL;
2907 strWID.enuWIDtype = WID_CHAR;
2908 strWID.ps8WidVal = (s8 *)&gu8Chnl;
2909 strWID.s32ValueSize = sizeof(char);
2911 PRINT_D(HOSTINF_DBG, "Getting channel value\n");
2913 s32Error = send_config_pkt(GET_CFG, &strWID, 1, true,
2914 get_id_from_handler(pstrWFIDrv));
2915 /*get the value by searching the local copy*/
2917 PRINT_ER("Failed to get channel number\n");
2921 up(&(pstrWFIDrv->hSemGetCHNL));
2931 * @brief Handle_GetRssi
2932 * @details Sending config packet to get RSSI
2939 static void Handle_GetRssi(tstrWILC_WFIDrv *drvHandler)
2943 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
2945 strWID.u16WIDid = (u16)WID_RSSI;
2946 strWID.enuWIDtype = WID_CHAR;
2947 strWID.ps8WidVal = &gs8Rssi;
2948 strWID.s32ValueSize = sizeof(char);
2951 PRINT_D(HOSTINF_DBG, "Getting RSSI value\n");
2953 s32Error = send_config_pkt(GET_CFG, &strWID, 1, true,
2954 get_id_from_handler(pstrWFIDrv));
2956 PRINT_ER("Failed to get RSSI value\n");
2960 up(&(pstrWFIDrv->hSemGetRSSI));
2966 static void Handle_GetLinkspeed(tstrWILC_WFIDrv *drvHandler)
2970 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
2974 strWID.u16WIDid = (u16)WID_LINKSPEED;
2975 strWID.enuWIDtype = WID_CHAR;
2976 strWID.ps8WidVal = &gs8lnkspd;
2977 strWID.s32ValueSize = sizeof(char);
2979 PRINT_D(HOSTINF_DBG, "Getting LINKSPEED value\n");
2981 s32Error = send_config_pkt(GET_CFG, &strWID, 1, true,
2982 get_id_from_handler(pstrWFIDrv));
2984 PRINT_ER("Failed to get LINKSPEED value\n");
2988 up(&(pstrWFIDrv->hSemGetLINKSPEED));
2993 s32 Handle_GetStatistics(tstrWILC_WFIDrv *drvHandler, tstrStatistics *pstrStatistics)
2995 tstrWID strWIDList[5];
2996 u32 u32WidsCount = 0, s32Error = 0;
2998 strWIDList[u32WidsCount].u16WIDid = WID_LINKSPEED;
2999 strWIDList[u32WidsCount].enuWIDtype = WID_CHAR;
3000 strWIDList[u32WidsCount].s32ValueSize = sizeof(char);
3001 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u8LinkSpeed));
3004 strWIDList[u32WidsCount].u16WIDid = WID_RSSI;
3005 strWIDList[u32WidsCount].enuWIDtype = WID_CHAR;
3006 strWIDList[u32WidsCount].s32ValueSize = sizeof(char);
3007 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->s8RSSI));
3010 strWIDList[u32WidsCount].u16WIDid = WID_SUCCESS_FRAME_COUNT;
3011 strWIDList[u32WidsCount].enuWIDtype = WID_INT;
3012 strWIDList[u32WidsCount].s32ValueSize = sizeof(u32);
3013 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u32TxCount));
3016 strWIDList[u32WidsCount].u16WIDid = WID_RECEIVED_FRAGMENT_COUNT;
3017 strWIDList[u32WidsCount].enuWIDtype = WID_INT;
3018 strWIDList[u32WidsCount].s32ValueSize = sizeof(u32);
3019 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u32RxCount));
3022 strWIDList[u32WidsCount].u16WIDid = WID_FAILED_COUNT;
3023 strWIDList[u32WidsCount].enuWIDtype = WID_INT;
3024 strWIDList[u32WidsCount].s32ValueSize = sizeof(u32);
3025 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u32TxFailureCount));
3028 s32Error = send_config_pkt(GET_CFG, strWIDList, u32WidsCount, false,
3029 get_id_from_handler(drvHandler));
3032 PRINT_ER("Failed to send scan paramters config packet\n");
3040 * @brief Handle_Get_InActiveTime
3041 * @details Sending config packet to set mac adddress for station and
3050 static s32 Handle_Get_InActiveTime(tstrWILC_WFIDrv *drvHandler,
3051 struct sta_inactive_t *strHostIfStaInactiveT)
3057 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
3060 strWID.u16WIDid = (u16)WID_SET_STA_MAC_INACTIVE_TIME;
3061 strWID.enuWIDtype = WID_STR;
3062 strWID.s32ValueSize = ETH_ALEN;
3063 strWID.ps8WidVal = kmalloc(strWID.s32ValueSize, GFP_KERNEL);
3066 stamac = strWID.ps8WidVal;
3067 memcpy(stamac, strHostIfStaInactiveT->mac, ETH_ALEN);
3070 PRINT_D(CFG80211_DBG, "SETING STA inactive time\n");
3073 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
3074 get_id_from_handler(pstrWFIDrv));
3075 /*get the value by searching the local copy*/
3077 PRINT_ER("Failed to SET incative time\n");
3082 strWID.u16WIDid = (u16)WID_GET_INACTIVE_TIME;
3083 strWID.enuWIDtype = WID_INT;
3084 strWID.ps8WidVal = (s8 *)&gu32InactiveTime;
3085 strWID.s32ValueSize = sizeof(u32);
3088 s32Error = send_config_pkt(GET_CFG, &strWID, 1, true,
3089 get_id_from_handler(pstrWFIDrv));
3090 /*get the value by searching the local copy*/
3092 PRINT_ER("Failed to get incative time\n");
3097 PRINT_D(CFG80211_DBG, "Getting inactive time : %d\n", gu32InactiveTime);
3099 up(&(pstrWFIDrv->hSemInactiveTime));
3109 * @brief Handle_AddBeacon
3110 * @details Sending config packet to add beacon
3111 * @param[in] struct beacon_attr *pstrSetBeaconParam
3117 static void Handle_AddBeacon(tstrWILC_WFIDrv *drvHandler,
3118 struct beacon_attr *pstrSetBeaconParam)
3123 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
3125 PRINT_D(HOSTINF_DBG, "Adding BEACON\n");
3127 strWID.u16WIDid = (u16)WID_ADD_BEACON;
3128 strWID.enuWIDtype = WID_BIN;
3129 strWID.s32ValueSize = pstrSetBeaconParam->u32HeadLen + pstrSetBeaconParam->u32TailLen + 16;
3130 strWID.ps8WidVal = kmalloc(strWID.s32ValueSize, GFP_KERNEL);
3131 if (strWID.ps8WidVal == NULL)
3134 pu8CurrByte = strWID.ps8WidVal;
3135 *pu8CurrByte++ = (pstrSetBeaconParam->u32Interval & 0xFF);
3136 *pu8CurrByte++ = ((pstrSetBeaconParam->u32Interval >> 8) & 0xFF);
3137 *pu8CurrByte++ = ((pstrSetBeaconParam->u32Interval >> 16) & 0xFF);
3138 *pu8CurrByte++ = ((pstrSetBeaconParam->u32Interval >> 24) & 0xFF);
3140 *pu8CurrByte++ = (pstrSetBeaconParam->u32DTIMPeriod & 0xFF);
3141 *pu8CurrByte++ = ((pstrSetBeaconParam->u32DTIMPeriod >> 8) & 0xFF);
3142 *pu8CurrByte++ = ((pstrSetBeaconParam->u32DTIMPeriod >> 16) & 0xFF);
3143 *pu8CurrByte++ = ((pstrSetBeaconParam->u32DTIMPeriod >> 24) & 0xFF);
3145 *pu8CurrByte++ = (pstrSetBeaconParam->u32HeadLen & 0xFF);
3146 *pu8CurrByte++ = ((pstrSetBeaconParam->u32HeadLen >> 8) & 0xFF);
3147 *pu8CurrByte++ = ((pstrSetBeaconParam->u32HeadLen >> 16) & 0xFF);
3148 *pu8CurrByte++ = ((pstrSetBeaconParam->u32HeadLen >> 24) & 0xFF);
3150 memcpy(pu8CurrByte, pstrSetBeaconParam->pu8Head, pstrSetBeaconParam->u32HeadLen);
3151 pu8CurrByte += pstrSetBeaconParam->u32HeadLen;
3153 *pu8CurrByte++ = (pstrSetBeaconParam->u32TailLen & 0xFF);
3154 *pu8CurrByte++ = ((pstrSetBeaconParam->u32TailLen >> 8) & 0xFF);
3155 *pu8CurrByte++ = ((pstrSetBeaconParam->u32TailLen >> 16) & 0xFF);
3156 *pu8CurrByte++ = ((pstrSetBeaconParam->u32TailLen >> 24) & 0xFF);
3158 if (pstrSetBeaconParam->pu8Tail > 0)
3159 memcpy(pu8CurrByte, pstrSetBeaconParam->pu8Tail, pstrSetBeaconParam->u32TailLen);
3160 pu8CurrByte += pstrSetBeaconParam->u32TailLen;
3165 s32Error = send_config_pkt(SET_CFG, &strWID, 1, false,
3166 get_id_from_handler(pstrWFIDrv));
3168 PRINT_ER("Failed to send add beacon config packet\n");
3171 kfree(strWID.ps8WidVal);
3172 kfree(pstrSetBeaconParam->pu8Head);
3173 kfree(pstrSetBeaconParam->pu8Tail);
3178 * @brief Handle_AddBeacon
3179 * @details Sending config packet to delete beacon
3180 * @param[in] tstrWILC_WFIDrv *drvHandler
3186 static void Handle_DelBeacon(tstrWILC_WFIDrv *drvHandler)
3191 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
3193 strWID.u16WIDid = (u16)WID_DEL_BEACON;
3194 strWID.enuWIDtype = WID_CHAR;
3195 strWID.s32ValueSize = sizeof(char);
3196 strWID.ps8WidVal = &gu8DelBcn;
3198 if (strWID.ps8WidVal == NULL)
3201 pu8CurrByte = strWID.ps8WidVal;
3203 PRINT_D(HOSTINF_DBG, "Deleting BEACON\n");
3204 /* TODO: build del beacon message*/
3207 s32Error = send_config_pkt(SET_CFG, &strWID, 1, false,
3208 get_id_from_handler(pstrWFIDrv));
3210 PRINT_ER("Failed to send delete beacon config packet\n");
3215 * @brief WILC_HostIf_PackStaParam
3216 * @details Handling packing of the station params in a buffer
3217 * @param[in] u8* pu8Buffer, struct add_sta_param *pstrStationParam
3223 static u32 WILC_HostIf_PackStaParam(u8 *pu8Buffer,
3224 struct add_sta_param *pstrStationParam)
3228 pu8CurrByte = pu8Buffer;
3230 PRINT_D(HOSTINF_DBG, "Packing STA params\n");
3231 memcpy(pu8CurrByte, pstrStationParam->au8BSSID, ETH_ALEN);
3232 pu8CurrByte += ETH_ALEN;
3234 *pu8CurrByte++ = pstrStationParam->u16AssocID & 0xFF;
3235 *pu8CurrByte++ = (pstrStationParam->u16AssocID >> 8) & 0xFF;
3237 *pu8CurrByte++ = pstrStationParam->u8NumRates;
3238 if (pstrStationParam->u8NumRates > 0)
3239 memcpy(pu8CurrByte, pstrStationParam->pu8Rates, pstrStationParam->u8NumRates);
3240 pu8CurrByte += pstrStationParam->u8NumRates;
3242 *pu8CurrByte++ = pstrStationParam->bIsHTSupported;
3243 *pu8CurrByte++ = pstrStationParam->u16HTCapInfo & 0xFF;
3244 *pu8CurrByte++ = (pstrStationParam->u16HTCapInfo >> 8) & 0xFF;
3246 *pu8CurrByte++ = pstrStationParam->u8AmpduParams;
3247 memcpy(pu8CurrByte, pstrStationParam->au8SuppMCsSet, WILC_SUPP_MCS_SET_SIZE);
3248 pu8CurrByte += WILC_SUPP_MCS_SET_SIZE;
3250 *pu8CurrByte++ = pstrStationParam->u16HTExtParams & 0xFF;
3251 *pu8CurrByte++ = (pstrStationParam->u16HTExtParams >> 8) & 0xFF;
3253 *pu8CurrByte++ = pstrStationParam->u32TxBeamformingCap & 0xFF;
3254 *pu8CurrByte++ = (pstrStationParam->u32TxBeamformingCap >> 8) & 0xFF;
3255 *pu8CurrByte++ = (pstrStationParam->u32TxBeamformingCap >> 16) & 0xFF;
3256 *pu8CurrByte++ = (pstrStationParam->u32TxBeamformingCap >> 24) & 0xFF;
3258 *pu8CurrByte++ = pstrStationParam->u8ASELCap;
3260 *pu8CurrByte++ = pstrStationParam->u16FlagsMask & 0xFF;
3261 *pu8CurrByte++ = (pstrStationParam->u16FlagsMask >> 8) & 0xFF;
3263 *pu8CurrByte++ = pstrStationParam->u16FlagsSet & 0xFF;
3264 *pu8CurrByte++ = (pstrStationParam->u16FlagsSet >> 8) & 0xFF;
3266 return pu8CurrByte - pu8Buffer;
3270 * @brief Handle_AddStation
3271 * @details Sending config packet to add station
3272 * @param[in] struct add_sta_param *pstrStationParam
3278 static void Handle_AddStation(tstrWILC_WFIDrv *drvHandler,
3279 struct add_sta_param *pstrStationParam)
3284 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
3286 PRINT_D(HOSTINF_DBG, "Handling add station\n");
3287 strWID.u16WIDid = (u16)WID_ADD_STA;
3288 strWID.enuWIDtype = WID_BIN;
3289 strWID.s32ValueSize = WILC_ADD_STA_LENGTH + pstrStationParam->u8NumRates;
3291 strWID.ps8WidVal = kmalloc(strWID.s32ValueSize, GFP_KERNEL);
3292 if (strWID.ps8WidVal == NULL)
3295 pu8CurrByte = strWID.ps8WidVal;
3296 pu8CurrByte += WILC_HostIf_PackStaParam(pu8CurrByte, pstrStationParam);
3299 s32Error = send_config_pkt(SET_CFG, &strWID, 1, false,
3300 get_id_from_handler(pstrWFIDrv));
3302 PRINT_ER("Failed to send add station config packet\n");
3305 kfree(pstrStationParam->pu8Rates);
3306 kfree(strWID.ps8WidVal);
3310 * @brief Handle_DelAllSta
3311 * @details Sending config packet to delete station
3312 * @param[in] tstrHostIFDelSta* pstrDelStaParam
3318 static void Handle_DelAllSta(tstrWILC_WFIDrv *drvHandler,
3319 struct del_all_sta *pstrDelAllStaParam)
3325 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
3327 u8 au8Zero_Buff[6] = {0};
3329 strWID.u16WIDid = (u16)WID_DEL_ALL_STA;
3330 strWID.enuWIDtype = WID_STR;
3331 strWID.s32ValueSize = (pstrDelAllStaParam->u8Num_AssocSta * ETH_ALEN) + 1;
3333 PRINT_D(HOSTINF_DBG, "Handling delete station\n");
3335 strWID.ps8WidVal = kmalloc((pstrDelAllStaParam->u8Num_AssocSta * ETH_ALEN) + 1, GFP_KERNEL);
3336 if (strWID.ps8WidVal == NULL)
3339 pu8CurrByte = strWID.ps8WidVal;
3341 *(pu8CurrByte++) = pstrDelAllStaParam->u8Num_AssocSta;
3343 for (i = 0; i < MAX_NUM_STA; i++) {
3344 if (memcmp(pstrDelAllStaParam->au8Sta_DelAllSta[i], au8Zero_Buff, ETH_ALEN))
3345 memcpy(pu8CurrByte, pstrDelAllStaParam->au8Sta_DelAllSta[i], ETH_ALEN);
3349 pu8CurrByte += ETH_ALEN;
3353 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
3354 get_id_from_handler(pstrWFIDrv));
3356 PRINT_ER("Failed to send add station config packet\n");
3359 kfree(strWID.ps8WidVal);
3366 * @brief Handle_DelStation
3367 * @details Sending config packet to delete station
3368 * @param[in] struct del_sta *pstrDelStaParam
3374 static void Handle_DelStation(tstrWILC_WFIDrv *drvHandler,
3375 struct del_sta *pstrDelStaParam)
3380 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
3382 strWID.u16WIDid = (u16)WID_REMOVE_STA;
3383 strWID.enuWIDtype = WID_BIN;
3384 strWID.s32ValueSize = ETH_ALEN;
3386 PRINT_D(HOSTINF_DBG, "Handling delete station\n");
3388 strWID.ps8WidVal = kmalloc(strWID.s32ValueSize, GFP_KERNEL);
3389 if (strWID.ps8WidVal == NULL)
3392 pu8CurrByte = strWID.ps8WidVal;
3394 memcpy(pu8CurrByte, pstrDelStaParam->au8MacAddr, ETH_ALEN);
3397 s32Error = send_config_pkt(SET_CFG, &strWID, 1, false,
3398 get_id_from_handler(pstrWFIDrv));
3400 PRINT_ER("Failed to send add station config packet\n");
3403 kfree(strWID.ps8WidVal);
3408 * @brief Handle_EditStation
3409 * @details Sending config packet to edit station
3410 * @param[in] struct add_sta_param *pstrStationParam
3416 static void Handle_EditStation(tstrWILC_WFIDrv *drvHandler,
3417 struct add_sta_param *pstrStationParam)
3422 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
3424 strWID.u16WIDid = (u16)WID_EDIT_STA;
3425 strWID.enuWIDtype = WID_BIN;
3426 strWID.s32ValueSize = WILC_ADD_STA_LENGTH + pstrStationParam->u8NumRates;
3428 PRINT_D(HOSTINF_DBG, "Handling edit station\n");
3429 strWID.ps8WidVal = kmalloc(strWID.s32ValueSize, GFP_KERNEL);
3430 if (strWID.ps8WidVal == NULL)
3433 pu8CurrByte = strWID.ps8WidVal;
3434 pu8CurrByte += WILC_HostIf_PackStaParam(pu8CurrByte, pstrStationParam);
3437 s32Error = send_config_pkt(SET_CFG, &strWID, 1, false,
3438 get_id_from_handler(pstrWFIDrv));
3440 PRINT_ER("Failed to send edit station config packet\n");
3443 kfree(pstrStationParam->pu8Rates);
3444 kfree(strWID.ps8WidVal);
3448 * @brief Handle_RemainOnChan
3449 * @details Sending config packet to edit station
3450 * @param[in] tstrWILC_AddStaParam* pstrStationParam
3456 static int Handle_RemainOnChan(tstrWILC_WFIDrv *drvHandler,
3457 struct remain_ch *pstrHostIfRemainOnChan)
3460 u8 u8remain_on_chan_flag;
3462 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler;
3464 /*If it's a pendig remain-on-channel, don't overwrite gWFiDrvHandle values (since incoming msg is garbbage)*/
3465 if (!pstrWFIDrv->u8RemainOnChan_pendingreq) {
3466 pstrWFIDrv->strHostIfRemainOnChan.pVoid = pstrHostIfRemainOnChan->pVoid;
3467 pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanExpired = pstrHostIfRemainOnChan->pRemainOnChanExpired;
3468 pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanReady = pstrHostIfRemainOnChan->pRemainOnChanReady;
3469 pstrWFIDrv->strHostIfRemainOnChan.u16Channel = pstrHostIfRemainOnChan->u16Channel;
3470 pstrWFIDrv->strHostIfRemainOnChan.u32ListenSessionID = pstrHostIfRemainOnChan->u32ListenSessionID;
3472 /*Set the channel to use it as a wid val*/
3473 pstrHostIfRemainOnChan->u16Channel = pstrWFIDrv->strHostIfRemainOnChan.u16Channel;
3476 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult != NULL) {
3477 PRINT_INFO(GENERIC_DBG, "Required to remain on chan while scanning return\n");
3478 pstrWFIDrv->u8RemainOnChan_pendingreq = 1;
3482 if (pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) {
3483 PRINT_INFO(GENERIC_DBG, "Required to remain on chan while connecting return\n");
3488 if (g_obtainingIP || connecting) {
3489 PRINT_D(GENERIC_DBG, "[handle_scan]: Don't do obss scan until IP adresss is obtained\n");
3494 PRINT_D(HOSTINF_DBG, "Setting channel :%d\n", pstrHostIfRemainOnChan->u16Channel);
3496 u8remain_on_chan_flag = true;
3497 strWID.u16WIDid = (u16)WID_REMAIN_ON_CHAN;
3498 strWID.enuWIDtype = WID_STR;
3499 strWID.s32ValueSize = 2;
3500 strWID.ps8WidVal = kmalloc(strWID.s32ValueSize, GFP_KERNEL);
3502 if (strWID.ps8WidVal == NULL) {
3507 strWID.ps8WidVal[0] = u8remain_on_chan_flag;
3508 strWID.ps8WidVal[1] = (s8)pstrHostIfRemainOnChan->u16Channel;
3511 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
3512 get_id_from_handler(pstrWFIDrv));
3514 PRINT_ER("Failed to set remain on channel\n");
3518 P2P_LISTEN_STATE = 1;
3519 pstrWFIDrv->hRemainOnChannel.data = (unsigned long)pstrWFIDrv;
3520 mod_timer(&pstrWFIDrv->hRemainOnChannel,
3522 msecs_to_jiffies(pstrHostIfRemainOnChan->u32duration));
3524 /*Calling CFG ready_on_channel*/
3525 if (pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanReady)
3526 pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanReady(pstrWFIDrv->strHostIfRemainOnChan.pVoid);
3528 if (pstrWFIDrv->u8RemainOnChan_pendingreq)
3529 pstrWFIDrv->u8RemainOnChan_pendingreq = 0;
3535 * @brief Handle_RegisterFrame
3543 static int Handle_RegisterFrame(tstrWILC_WFIDrv *drvHandler,
3544 struct reg_frame *pstrHostIfRegisterFrame)
3549 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
3551 PRINT_D(HOSTINF_DBG, "Handling frame register Flag : %d FrameType: %d\n", pstrHostIfRegisterFrame->bReg, pstrHostIfRegisterFrame->u16FrameType);
3553 /*prepare configuration packet*/
3554 strWID.u16WIDid = (u16)WID_REGISTER_FRAME;
3555 strWID.enuWIDtype = WID_STR;
3556 strWID.ps8WidVal = kmalloc(sizeof(u16) + 2, GFP_KERNEL);
3557 if (strWID.ps8WidVal == NULL)
3560 pu8CurrByte = strWID.ps8WidVal;
3562 *pu8CurrByte++ = pstrHostIfRegisterFrame->bReg;
3563 *pu8CurrByte++ = pstrHostIfRegisterFrame->u8Regid;
3564 memcpy(pu8CurrByte, &(pstrHostIfRegisterFrame->u16FrameType), sizeof(u16));
3567 strWID.s32ValueSize = sizeof(u16) + 2;
3571 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
3572 get_id_from_handler(pstrWFIDrv));
3574 PRINT_ER("Failed to frame register config packet\n");
3583 * @brief Handle_ListenStateExpired
3584 * @details Handle of listen state expiration
3586 * @return Error code.
3591 #define FALSE_FRMWR_CHANNEL 100
3592 static u32 Handle_ListenStateExpired(tstrWILC_WFIDrv *drvHandler,
3593 struct remain_ch *pstrHostIfRemainOnChan)
3595 u8 u8remain_on_chan_flag;
3598 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *) drvHandler;
3600 PRINT_D(HOSTINF_DBG, "CANCEL REMAIN ON CHAN\n");
3602 /*Make sure we are already in listen state*/
3603 /*This is to handle duplicate expiry messages (listen timer fired and supplicant called cancel_remain_on_channel())*/
3604 if (P2P_LISTEN_STATE) {
3605 u8remain_on_chan_flag = false;
3606 strWID.u16WIDid = (u16)WID_REMAIN_ON_CHAN;
3607 strWID.enuWIDtype = WID_STR;
3608 strWID.s32ValueSize = 2;
3609 strWID.ps8WidVal = kmalloc(strWID.s32ValueSize, GFP_KERNEL);
3611 if (strWID.ps8WidVal == NULL)
3612 PRINT_ER("Failed to allocate memory\n");
3614 strWID.ps8WidVal[0] = u8remain_on_chan_flag;
3615 strWID.ps8WidVal[1] = FALSE_FRMWR_CHANNEL;
3618 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
3619 get_id_from_handler(pstrWFIDrv));
3620 if (s32Error != 0) {
3621 PRINT_ER("Failed to set remain on channel\n");
3625 if (pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanExpired) {
3626 pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanExpired(pstrWFIDrv->strHostIfRemainOnChan.pVoid
3627 , pstrHostIfRemainOnChan->u32ListenSessionID);
3629 P2P_LISTEN_STATE = 0;
3631 PRINT_D(GENERIC_DBG, "Not in listen state\n");
3641 * @brief ListenTimerCB
3642 * @details Callback function of remain-on-channel timer
3644 * @return Error code.
3649 static void ListenTimerCB(unsigned long arg)
3652 struct host_if_msg msg;
3653 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)arg;
3654 /*Stopping remain-on-channel timer*/
3655 del_timer(&pstrWFIDrv->hRemainOnChannel);
3657 /* prepare the Timer Callback message */
3658 memset(&msg, 0, sizeof(struct host_if_msg));
3659 msg.id = HOST_IF_MSG_LISTEN_TIMER_FIRED;
3660 msg.drvHandler = pstrWFIDrv;
3661 msg.body.remain_on_ch.u32ListenSessionID = pstrWFIDrv->strHostIfRemainOnChan.u32ListenSessionID;
3663 /* send the message */
3664 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
3666 PRINT_ER("wilc_mq_send fail\n");
3670 * @brief Handle_EditStation
3671 * @details Sending config packet to edit station
3672 * @param[in] tstrWILC_AddStaParam* pstrStationParam
3678 static void Handle_PowerManagement(tstrWILC_WFIDrv *drvHandler,
3679 struct power_mgmt_param *strPowerMgmtParam)
3684 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
3686 strWID.u16WIDid = (u16)WID_POWER_MANAGEMENT;
3688 if (strPowerMgmtParam->bIsEnabled == true)
3689 s8PowerMode = MIN_FAST_PS;
3691 s8PowerMode = NO_POWERSAVE;
3692 PRINT_D(HOSTINF_DBG, "Handling power mgmt to %d\n", s8PowerMode);
3693 strWID.ps8WidVal = &s8PowerMode;
3694 strWID.s32ValueSize = sizeof(char);
3696 PRINT_D(HOSTINF_DBG, "Handling Power Management\n");
3699 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
3700 get_id_from_handler(pstrWFIDrv));
3702 PRINT_ER("Failed to send power management config packet\n");
3706 * @brief Handle_SetMulticastFilter
3707 * @details Set Multicast filter in firmware
3708 * @param[in] struct set_multicast *strHostIfSetMulti
3714 static void Handle_SetMulticastFilter(tstrWILC_WFIDrv *drvHandler,
3715 struct set_multicast *strHostIfSetMulti)
3721 PRINT_D(HOSTINF_DBG, "Setup Multicast Filter\n");
3723 strWID.u16WIDid = (u16)WID_SETUP_MULTICAST_FILTER;
3724 strWID.enuWIDtype = WID_BIN;
3725 strWID.s32ValueSize = sizeof(struct set_multicast) + ((strHostIfSetMulti->u32count) * ETH_ALEN);
3726 strWID.ps8WidVal = kmalloc(strWID.s32ValueSize, GFP_KERNEL);
3727 if (strWID.ps8WidVal == NULL)
3730 pu8CurrByte = strWID.ps8WidVal;
3731 *pu8CurrByte++ = (strHostIfSetMulti->bIsEnabled & 0xFF);
3732 *pu8CurrByte++ = ((strHostIfSetMulti->bIsEnabled >> 8) & 0xFF);
3733 *pu8CurrByte++ = ((strHostIfSetMulti->bIsEnabled >> 16) & 0xFF);
3734 *pu8CurrByte++ = ((strHostIfSetMulti->bIsEnabled >> 24) & 0xFF);
3736 *pu8CurrByte++ = (strHostIfSetMulti->u32count & 0xFF);
3737 *pu8CurrByte++ = ((strHostIfSetMulti->u32count >> 8) & 0xFF);
3738 *pu8CurrByte++ = ((strHostIfSetMulti->u32count >> 16) & 0xFF);
3739 *pu8CurrByte++ = ((strHostIfSetMulti->u32count >> 24) & 0xFF);
3741 if ((strHostIfSetMulti->u32count) > 0)
3742 memcpy(pu8CurrByte, gau8MulticastMacAddrList, ((strHostIfSetMulti->u32count) * ETH_ALEN));
3745 s32Error = send_config_pkt(SET_CFG, &strWID, 1, false,
3746 get_id_from_handler(drvHandler));
3748 PRINT_ER("Failed to send setup multicast config packet\n");
3751 kfree(strWID.ps8WidVal);
3757 * @brief Handle_AddBASession
3758 * @details Add block ack session
3759 * @param[in] tstrHostIFSetMulti* strHostIfSetMulti
3761 * @author Amr Abdel-Moghny
3765 static s32 Handle_AddBASession(tstrWILC_WFIDrv *drvHandler,
3766 struct ba_session_info *strHostIfBASessionInfo)
3770 int AddbaTimeout = 100;
3772 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
3774 PRINT_D(HOSTINF_DBG, "Opening Block Ack session with\nBSSID = %.2x:%.2x:%.2x\nTID=%d\nBufferSize == %d\nSessionTimeOut = %d\n",
3775 strHostIfBASessionInfo->au8Bssid[0],
3776 strHostIfBASessionInfo->au8Bssid[1],
3777 strHostIfBASessionInfo->au8Bssid[2],
3778 strHostIfBASessionInfo->u16BufferSize,
3779 strHostIfBASessionInfo->u16SessionTimeout,
3780 strHostIfBASessionInfo->u8Ted);
3782 strWID.u16WIDid = (u16)WID_11E_P_ACTION_REQ;
3783 strWID.enuWIDtype = WID_STR;
3784 strWID.ps8WidVal = kmalloc(BLOCK_ACK_REQ_SIZE, GFP_KERNEL);
3785 strWID.s32ValueSize = BLOCK_ACK_REQ_SIZE;
3786 ptr = strWID.ps8WidVal;
3787 /* *ptr++ = 0x14; */
3791 memcpy(ptr, strHostIfBASessionInfo->au8Bssid, ETH_ALEN);
3793 *ptr++ = strHostIfBASessionInfo->u8Ted;
3797 *ptr++ = (strHostIfBASessionInfo->u16BufferSize & 0xFF);
3798 *ptr++ = ((strHostIfBASessionInfo->u16BufferSize >> 16) & 0xFF);
3800 *ptr++ = (strHostIfBASessionInfo->u16SessionTimeout & 0xFF);
3801 *ptr++ = ((strHostIfBASessionInfo->u16SessionTimeout >> 16) & 0xFF);
3803 *ptr++ = (AddbaTimeout & 0xFF);
3804 *ptr++ = ((AddbaTimeout >> 16) & 0xFF);
3805 /* Group Buffer Max Frames*/
3807 /* Group Buffer Timeout */
3810 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
3811 get_id_from_handler(pstrWFIDrv));
3813 PRINT_D(HOSTINF_DBG, "Couldn't open BA Session\n");
3816 strWID.u16WIDid = (u16)WID_11E_P_ACTION_REQ;
3817 strWID.enuWIDtype = WID_STR;
3818 strWID.s32ValueSize = 15;
3819 ptr = strWID.ps8WidVal;
3820 /* *ptr++ = 0x14; */
3824 memcpy(ptr, strHostIfBASessionInfo->au8Bssid, ETH_ALEN);
3827 *ptr++ = strHostIfBASessionInfo->u8Ted;
3831 *ptr++ = (strHostIfBASessionInfo->u16BufferSize & 0xFF);
3832 *ptr++ = ((strHostIfBASessionInfo->u16SessionTimeout >> 16) & 0xFF);
3835 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
3836 get_id_from_handler(pstrWFIDrv));
3838 if (strWID.ps8WidVal != NULL)
3839 kfree(strWID.ps8WidVal);
3846 * @brief Handle_DelAllRxBASessions
3847 * @details Delete all Rx BA sessions
3848 * @param[in] tstrHostIFSetMulti* strHostIfSetMulti
3850 * @author Abdelrahman Sobhy
3854 static s32 Handle_DelAllRxBASessions(tstrWILC_WFIDrv *drvHandler,
3855 struct ba_session_info *strHostIfBASessionInfo)
3860 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)drvHandler;
3862 PRINT_D(GENERIC_DBG, "Delete Block Ack session with\nBSSID = %.2x:%.2x:%.2x\nTID=%d\n",
3863 strHostIfBASessionInfo->au8Bssid[0],
3864 strHostIfBASessionInfo->au8Bssid[1],
3865 strHostIfBASessionInfo->au8Bssid[2],
3866 strHostIfBASessionInfo->u8Ted);
3868 strWID.u16WIDid = (u16)WID_DEL_ALL_RX_BA;
3869 strWID.enuWIDtype = WID_STR;
3870 strWID.ps8WidVal = kmalloc(BLOCK_ACK_REQ_SIZE, GFP_KERNEL);
3871 strWID.s32ValueSize = BLOCK_ACK_REQ_SIZE;
3872 ptr = strWID.ps8WidVal;
3876 memcpy(ptr, strHostIfBASessionInfo->au8Bssid, ETH_ALEN);
3878 *ptr++ = strHostIfBASessionInfo->u8Ted;
3879 /* BA direction = recipent*/
3882 *ptr++ = 32; /* Unspecific QOS reason */
3884 s32Error = send_config_pkt(SET_CFG, &strWID, 1, true,
3885 get_id_from_handler(pstrWFIDrv));
3887 PRINT_D(HOSTINF_DBG, "Couldn't delete BA Session\n");
3890 if (strWID.ps8WidVal != NULL)
3891 kfree(strWID.ps8WidVal);
3900 * @brief hostIFthread
3901 * @details Main thread to handle message queue requests
3902 * @param[in] void* pvArg
3908 static int hostIFthread(void *pvArg)
3911 struct host_if_msg msg;
3912 tstrWILC_WFIDrv *pstrWFIDrv;
3914 memset(&msg, 0, sizeof(struct host_if_msg));
3917 wilc_mq_recv(&gMsgQHostIF, &msg, sizeof(struct host_if_msg), &u32Ret);
3918 pstrWFIDrv = (tstrWILC_WFIDrv *)msg.drvHandler;
3919 if (msg.id == HOST_IF_MSG_EXIT) {
3920 PRINT_D(GENERIC_DBG, "THREAD: Exiting HostIfThread\n");
3925 /*Re-Queue HIF message*/
3926 if ((!g_wilc_initialized)) {
3927 PRINT_D(GENERIC_DBG, "--WAIT--");
3928 usleep_range(200 * 1000, 200 * 1000);
3929 wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
3933 if (msg.id == HOST_IF_MSG_CONNECT && pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult != NULL) {
3934 PRINT_D(HOSTINF_DBG, "Requeue connect request till scan done received\n");
3935 wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
3936 usleep_range(2 * 1000, 2 * 1000);
3941 case HOST_IF_MSG_Q_IDLE:
3942 Handle_wait_msg_q_empty();
3945 case HOST_IF_MSG_SCAN:
3946 Handle_Scan(msg.drvHandler, &msg.body.scan_info);
3949 case HOST_IF_MSG_CONNECT:
3950 Handle_Connect(msg.drvHandler, &msg.body.con_info);
3953 case HOST_IF_MSG_FLUSH_CONNECT:
3954 Handle_FlushConnect(msg.drvHandler);
3957 case HOST_IF_MSG_RCVD_NTWRK_INFO:
3958 Handle_RcvdNtwrkInfo(msg.drvHandler, &msg.body.net_info);
3961 case HOST_IF_MSG_RCVD_GNRL_ASYNC_INFO:
3962 Handle_RcvdGnrlAsyncInfo(msg.drvHandler, &msg.body.async_info);
3965 case HOST_IF_MSG_KEY:
3966 Handle_Key(msg.drvHandler, &msg.body.key_info);
3969 case HOST_IF_MSG_CFG_PARAMS:
3971 Handle_CfgParam(msg.drvHandler, &msg.body.cfg_info);
3974 case HOST_IF_MSG_SET_CHANNEL:
3975 Handle_SetChannel(msg.drvHandler, &msg.body.channel_info);
3978 case HOST_IF_MSG_DISCONNECT:
3979 Handle_Disconnect(msg.drvHandler);
3982 case HOST_IF_MSG_RCVD_SCAN_COMPLETE:
3983 del_timer(&pstrWFIDrv->hScanTimer);
3984 PRINT_D(HOSTINF_DBG, "scan completed successfully\n");
3986 /*Allow chip sleep, only if both interfaces are not connected*/
3987 if (!linux_wlan_get_num_conn_ifcs())
3988 chip_sleep_manually(INFINITE_SLEEP_TIME);
3990 Handle_ScanDone(msg.drvHandler, SCAN_EVENT_DONE);
3992 if (pstrWFIDrv->u8RemainOnChan_pendingreq)
3993 Handle_RemainOnChan(msg.drvHandler, &msg.body.remain_on_ch);
3997 case HOST_IF_MSG_GET_RSSI:
3998 Handle_GetRssi(msg.drvHandler);
4001 case HOST_IF_MSG_GET_LINKSPEED:
4002 Handle_GetLinkspeed(msg.drvHandler);
4005 case HOST_IF_MSG_GET_STATISTICS:
4006 Handle_GetStatistics(msg.drvHandler, (tstrStatistics *)msg.body.data);
4009 case HOST_IF_MSG_GET_CHNL:
4010 Handle_GetChnl(msg.drvHandler);
4013 case HOST_IF_MSG_ADD_BEACON:
4014 Handle_AddBeacon(msg.drvHandler, &msg.body.beacon_info);
4017 case HOST_IF_MSG_DEL_BEACON:
4018 Handle_DelBeacon(msg.drvHandler);
4021 case HOST_IF_MSG_ADD_STATION:
4022 Handle_AddStation(msg.drvHandler, &msg.body.add_sta_info);
4025 case HOST_IF_MSG_DEL_STATION:
4026 Handle_DelStation(msg.drvHandler, &msg.body.del_sta_info);
4029 case HOST_IF_MSG_EDIT_STATION:
4030 Handle_EditStation(msg.drvHandler, &msg.body.edit_sta_info);
4033 case HOST_IF_MSG_GET_INACTIVETIME:
4034 Handle_Get_InActiveTime(msg.drvHandler, &msg.body.mac_info);
4037 case HOST_IF_MSG_SCAN_TIMER_FIRED:
4038 PRINT_D(HOSTINF_DBG, "Scan Timeout\n");
4040 Handle_ScanDone(msg.drvHandler, SCAN_EVENT_ABORTED);
4043 case HOST_IF_MSG_CONNECT_TIMER_FIRED:
4044 PRINT_D(HOSTINF_DBG, "Connect Timeout\n");
4045 Handle_ConnectTimeout(msg.drvHandler);
4048 case HOST_IF_MSG_POWER_MGMT:
4049 Handle_PowerManagement(msg.drvHandler, &msg.body.pwr_mgmt_info);
4052 case HOST_IF_MSG_SET_WFIDRV_HANDLER:
4053 Handle_SetWfiDrvHandler(msg.drvHandler,
4057 case HOST_IF_MSG_SET_OPERATION_MODE:
4058 Handle_SetOperationMode(msg.drvHandler, &msg.body.mode);
4061 case HOST_IF_MSG_SET_IPADDRESS:
4062 PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_SET_IPADDRESS\n");
4063 Handle_set_IPAddress(msg.drvHandler, msg.body.ip_info.au8IPAddr, msg.body.ip_info.idx);
4066 case HOST_IF_MSG_GET_IPADDRESS:
4067 PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_SET_IPADDRESS\n");
4068 Handle_get_IPAddress(msg.drvHandler, msg.body.ip_info.au8IPAddr, msg.body.ip_info.idx);
4071 case HOST_IF_MSG_SET_MAC_ADDRESS:
4072 Handle_SetMacAddress(msg.drvHandler, &msg.body.set_mac_info);
4075 case HOST_IF_MSG_GET_MAC_ADDRESS:
4076 Handle_GetMacAddress(msg.drvHandler, &msg.body.get_mac_info);
4079 case HOST_IF_MSG_REMAIN_ON_CHAN:
4080 PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_REMAIN_ON_CHAN\n");
4081 Handle_RemainOnChan(msg.drvHandler, &msg.body.remain_on_ch);
4084 case HOST_IF_MSG_REGISTER_FRAME:
4085 PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_REGISTER_FRAME\n");
4086 Handle_RegisterFrame(msg.drvHandler, &msg.body.reg_frame);
4089 case HOST_IF_MSG_LISTEN_TIMER_FIRED:
4090 Handle_ListenStateExpired(msg.drvHandler, &msg.body.remain_on_ch);
4093 case HOST_IF_MSG_SET_MULTICAST_FILTER:
4094 PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_SET_MULTICAST_FILTER\n");
4095 Handle_SetMulticastFilter(msg.drvHandler, &msg.body.multicast_info);
4098 case HOST_IF_MSG_ADD_BA_SESSION:
4099 Handle_AddBASession(msg.drvHandler, &msg.body.session_info);
4102 case HOST_IF_MSG_DEL_ALL_RX_BA_SESSIONS:
4103 Handle_DelAllRxBASessions(msg.drvHandler, &msg.body.session_info);
4106 case HOST_IF_MSG_DEL_ALL_STA:
4107 Handle_DelAllSta(msg.drvHandler, &msg.body.del_all_sta_info);
4111 PRINT_ER("[Host Interface] undefined Received Msg ID\n");
4116 PRINT_D(HOSTINF_DBG, "Releasing thread exit semaphore\n");
4117 up(&hSemHostIFthrdEnd);
4121 static void TimerCB_Scan(unsigned long arg)
4123 void *pvArg = (void *)arg;
4124 struct host_if_msg msg;
4126 /* prepare the Timer Callback message */
4127 memset(&msg, 0, sizeof(struct host_if_msg));
4128 msg.drvHandler = pvArg;
4129 msg.id = HOST_IF_MSG_SCAN_TIMER_FIRED;
4131 /* send the message */
4132 wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4135 static void TimerCB_Connect(unsigned long arg)
4137 void *pvArg = (void *)arg;
4138 struct host_if_msg msg;
4140 /* prepare the Timer Callback message */
4141 memset(&msg, 0, sizeof(struct host_if_msg));
4142 msg.drvHandler = pvArg;
4143 msg.id = HOST_IF_MSG_CONNECT_TIMER_FIRED;
4145 /* send the message */
4146 wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4151 * @brief removes wpa/wpa2 keys
4152 * @details only in BSS STA mode if External Supplicant support is enabled.
4153 * removes all WPA/WPA2 station key entries from MAC hardware.
4154 * @param[in,out] handle to the wifi driver
4155 * @param[in] 6 bytes of Station Adress in the station entry table
4156 * @return Error code indicating success/failure
4159 * @date 8 March 2012
4162 /* Check implementation in core adding 9 bytes to the input! */
4163 s32 host_int_remove_key(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8StaAddress)
4167 /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */
4169 strWID.u16WIDid = (u16)WID_REMOVE_KEY;
4170 strWID.enuWIDtype = WID_STR;
4171 strWID.ps8WidVal = (s8 *)pu8StaAddress;
4172 strWID.s32ValueSize = 6;
4179 * @brief removes WEP key
4180 * @details valid only in BSS STA mode if External Supplicant support is enabled.
4181 * remove a WEP key entry from MAC HW.
4182 * The BSS Station automatically finds the index of the entry using its
4183 * BSS ID and removes that entry from the MAC hardware.
4184 * @param[in,out] handle to the wifi driver
4185 * @param[in] 6 bytes of Station Adress in the station entry table
4186 * @return Error code indicating success/failure
4187 * @note NO need for the STA add since it is not used for processing
4189 * @date 8 March 2012
4192 int host_int_remove_wep_key(tstrWILC_WFIDrv *wfi_drv, u8 index)
4195 struct host_if_msg msg;
4199 PRINT_ER("Failed to send setup multicast config packet\n");
4203 /* prepare the Remove Wep Key Message */
4204 memset(&msg, 0, sizeof(struct host_if_msg));
4206 msg.id = HOST_IF_MSG_KEY;
4207 msg.body.key_info.enuKeyType = WEP;
4208 msg.body.key_info.u8KeyAction = REMOVEKEY;
4209 msg.drvHandler = wfi_drv;
4212 uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = index;
4214 /* send the message */
4215 result = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4217 PRINT_ER("Error in sending message queue : Request to remove WEP key\n");
4218 down(&wfi_drv->hSemTestKeyBlock);
4224 * @brief sets WEP default key
4225 * @details Sets the index of the WEP encryption key in use,
4227 * @param[in,out] handle to the wifi driver
4228 * @param[in] key index ( 0, 1, 2, 3)
4229 * @return Error code indicating success/failure
4232 * @date 8 March 2012
4235 s32 host_int_set_WEPDefaultKeyID(tstrWILC_WFIDrv *hWFIDrv, u8 u8Index)
4238 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
4239 struct host_if_msg msg;
4242 if (pstrWFIDrv == NULL) {
4244 PRINT_ER("driver is null\n");
4248 /* prepare the Key Message */
4249 memset(&msg, 0, sizeof(struct host_if_msg));
4252 msg.id = HOST_IF_MSG_KEY;
4253 msg.body.key_info.enuKeyType = WEP;
4254 msg.body.key_info.u8KeyAction = DEFAULTKEY;
4255 msg.drvHandler = hWFIDrv;
4259 uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = u8Index;
4261 /* send the message */
4262 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4264 PRINT_ER("Error in sending message queue : Default key index\n");
4265 down(&(pstrWFIDrv->hSemTestKeyBlock));
4271 * @brief sets WEP deafault key
4272 * @details valid only in BSS STA mode if External Supplicant support is enabled.
4273 * sets WEP key entry into MAC hardware when it receives the
4274 * corresponding request from NDIS.
4275 * @param[in,out] handle to the wifi driver
4276 * @param[in] message containing WEP Key in the following format
4277 *|---------------------------------------|
4278 *|Key ID Value | Key Length | Key |
4279 *|-------------|------------|------------|
4280 | 1byte | 1byte | Key Length |
4281 ||---------------------------------------|
4283 * @return Error code indicating success/failure
4286 * @date 8 March 2012
4289 s32 host_int_add_wep_key_bss_sta(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8WepKey, u8 u8WepKeylen, u8 u8Keyidx)
4293 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
4294 struct host_if_msg msg;
4296 if (pstrWFIDrv == NULL) {
4298 PRINT_ER("driver is null\n");
4302 /* prepare the Key Message */
4303 memset(&msg, 0, sizeof(struct host_if_msg));
4306 msg.id = HOST_IF_MSG_KEY;
4307 msg.body.key_info.enuKeyType = WEP;
4308 msg.body.key_info.u8KeyAction = ADDKEY;
4309 msg.drvHandler = hWFIDrv;
4313 uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey = kmalloc(u8WepKeylen, GFP_KERNEL);
4315 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey,
4316 pu8WepKey, u8WepKeylen);
4320 uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen = (u8WepKeylen);
4323 uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = u8Keyidx;
4325 /* send the message */
4326 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4328 PRINT_ER("Error in sending message queue :WEP Key\n");
4329 down(&(pstrWFIDrv->hSemTestKeyBlock));
4337 * @brief host_int_add_wep_key_bss_ap
4338 * @details valid only in BSS AP mode if External Supplicant support is enabled.
4339 * sets WEP key entry into MAC hardware when it receives the
4341 * corresponding request from NDIS.
4342 * @param[in,out] handle to the wifi driver
4345 * @return Error code indicating success/failure
4351 s32 host_int_add_wep_key_bss_ap(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8WepKey, u8 u8WepKeylen, u8 u8Keyidx, u8 u8mode, enum AUTHTYPE tenuAuth_type)
4355 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
4356 struct host_if_msg msg;
4359 if (pstrWFIDrv == NULL) {
4361 PRINT_ER("driver is null\n");
4365 /* prepare the Key Message */
4366 memset(&msg, 0, sizeof(struct host_if_msg));
4369 for (i = 0; i < u8WepKeylen; i++)
4370 PRINT_INFO(HOSTAPD_DBG, "KEY is %x\n", pu8WepKey[i]);
4372 msg.id = HOST_IF_MSG_KEY;
4373 msg.body.key_info.enuKeyType = WEP;
4374 msg.body.key_info.u8KeyAction = ADDKEY_AP;
4375 msg.drvHandler = hWFIDrv;
4379 uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey = kmalloc(u8WepKeylen, GFP_KERNEL);
4382 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey,
4383 pu8WepKey, (u8WepKeylen));
4387 uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen = (u8WepKeylen);
4390 uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = u8Keyidx;
4393 uniHostIFkeyAttr.strHostIFwepAttr.u8mode = u8mode;
4396 uniHostIFkeyAttr.strHostIFwepAttr.tenuAuth_type = tenuAuth_type;
4397 /* send the message */
4398 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4401 PRINT_ER("Error in sending message queue :WEP Key\n");
4402 down(&(pstrWFIDrv->hSemTestKeyBlock));
4409 * @brief adds ptk Key
4411 * @param[in,out] handle to the wifi driver
4412 * @param[in] message containing PTK Key in the following format
4413 *|-----------------------------------------------------------------------------|
4414 *|Station address | Key Length | Temporal Key | Rx Michael Key |Tx Michael Key |
4415 *|----------------|------------|--------------|----------------|---------------|
4416 | 6 bytes | 1byte | 16 bytes | 8 bytes | 8 bytes |
4417 ||-----------------------------------------------------------------------------|
4418 * @return Error code indicating success/failure
4421 * @date 8 March 2012
4424 s32 host_int_add_ptk(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8Ptk, u8 u8PtkKeylen,
4425 const u8 *mac_addr, const u8 *pu8RxMic, const u8 *pu8TxMic, u8 mode, u8 u8Ciphermode, u8 u8Idx)
4428 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
4429 struct host_if_msg msg;
4430 u8 u8KeyLen = u8PtkKeylen;
4433 if (pstrWFIDrv == NULL) {
4435 PRINT_ER("driver is null\n");
4438 if (pu8RxMic != NULL)
4439 u8KeyLen += RX_MIC_KEY_LEN;
4440 if (pu8TxMic != NULL)
4441 u8KeyLen += TX_MIC_KEY_LEN;
4443 /* prepare the Key Message */
4444 memset(&msg, 0, sizeof(struct host_if_msg));
4447 msg.id = HOST_IF_MSG_KEY;
4448 msg.body.key_info.enuKeyType = WPAPtk;
4449 if (mode == AP_MODE) {
4450 msg.body.key_info.u8KeyAction = ADDKEY_AP;
4452 uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx = u8Idx;
4454 if (mode == STATION_MODE)
4455 msg.body.key_info.u8KeyAction = ADDKEY;
4459 uniHostIFkeyAttr.strHostIFwpaAttr.pu8key = kmalloc(u8PtkKeylen, GFP_KERNEL);
4462 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
4463 pu8Ptk, u8PtkKeylen);
4465 if (pu8RxMic != NULL) {
4467 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 16,
4468 pu8RxMic, RX_MIC_KEY_LEN);
4470 for (i = 0; i < RX_MIC_KEY_LEN; i++)
4471 PRINT_INFO(CFG80211_DBG, "PairwiseRx[%d] = %x\n", i, pu8RxMic[i]);
4474 if (pu8TxMic != NULL) {
4476 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 24,
4477 pu8TxMic, TX_MIC_KEY_LEN);
4479 for (i = 0; i < TX_MIC_KEY_LEN; i++)
4480 PRINT_INFO(CFG80211_DBG, "PairwiseTx[%d] = %x\n", i, pu8TxMic[i]);
4485 uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen = u8KeyLen;
4488 uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode = u8Ciphermode;
4490 uniHostIFkeyAttr.strHostIFwpaAttr.pu8macaddr = mac_addr;
4491 msg.drvHandler = hWFIDrv;
4493 /* send the message */
4494 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4497 PRINT_ER("Error in sending message queue: PTK Key\n");
4499 /* ////////////// */
4500 down(&(pstrWFIDrv->hSemTestKeyBlock));
4507 * @brief adds Rx GTk Key
4509 * @param[in,out] handle to the wifi driver
4510 * @param[in] pu8RxGtk : contains temporal key | Rx Mic | Tx Mic
4511 * u8GtkKeylen :The total key length
4513 * @return Error code indicating success/failure
4516 * @date 8 March 2012
4519 s32 host_int_add_rx_gtk(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8RxGtk, u8 u8GtkKeylen,
4520 u8 u8KeyIdx, u32 u32KeyRSClen, const u8 *KeyRSC,
4521 const u8 *pu8RxMic, const u8 *pu8TxMic, u8 mode, u8 u8Ciphermode)
4524 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
4525 struct host_if_msg msg;
4526 u8 u8KeyLen = u8GtkKeylen;
4528 if (pstrWFIDrv == NULL) {
4530 PRINT_ER("driver is null\n");
4533 /* prepare the Key Message */
4534 memset(&msg, 0, sizeof(struct host_if_msg));
4537 if (pu8RxMic != NULL)
4538 u8KeyLen += RX_MIC_KEY_LEN;
4539 if (pu8TxMic != NULL)
4540 u8KeyLen += TX_MIC_KEY_LEN;
4541 if (KeyRSC != NULL) {
4543 uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq = kmalloc(u32KeyRSClen, GFP_KERNEL);
4545 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq,
4546 KeyRSC, u32KeyRSClen);
4550 msg.id = HOST_IF_MSG_KEY;
4551 msg.body.key_info.enuKeyType = WPARxGtk;
4552 msg.drvHandler = hWFIDrv;
4554 if (mode == AP_MODE) {
4555 msg.body.key_info.u8KeyAction = ADDKEY_AP;
4556 msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode = u8Ciphermode;
4558 if (mode == STATION_MODE)
4559 msg.body.key_info.u8KeyAction = ADDKEY;
4563 uniHostIFkeyAttr.strHostIFwpaAttr.pu8key = kmalloc(u8KeyLen, GFP_KERNEL);
4565 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
4566 pu8RxGtk, u8GtkKeylen);
4568 if (pu8RxMic != NULL) {
4570 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 16,
4571 pu8RxMic, RX_MIC_KEY_LEN);
4574 if (pu8TxMic != NULL) {
4576 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 24,
4577 pu8TxMic, TX_MIC_KEY_LEN);
4582 uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx = u8KeyIdx;
4584 uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen = u8KeyLen;
4587 uniHostIFkeyAttr.strHostIFwpaAttr.u8seqlen = u32KeyRSClen;
4591 /* send the message */
4592 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4594 PRINT_ER("Error in sending message queue: RX GTK\n");
4595 /* ////////////// */
4596 down(&(pstrWFIDrv->hSemTestKeyBlock));
4603 * @brief host_int_set_pmkid_info
4604 * @details caches the pmkid valid only in BSS STA mode if External Supplicant
4605 * support is enabled. This Function sets the PMKID in firmware
4606 * when host drivr receives the corresponding request from NDIS.
4607 * The firmware then includes theset PMKID in the appropriate
4609 * @param[in,out] handle to the wifi driver
4610 * @param[in] message containing PMKID Info in the following format
4611 *|-----------------------------------------------------------------|
4612 *|NumEntries | BSSID[1] | PMKID[1] | ... | BSSID[K] | PMKID[K] |
4613 *|-----------|------------|----------|-------|----------|----------|
4614 | 1 | 6 | 16 | ... | 6 | 16 |
4615 ||-----------------------------------------------------------------|
4616 * @return Error code indicating success/failure
4619 * @date 8 March 2012
4622 s32 host_int_set_pmkid_info(tstrWILC_WFIDrv *hWFIDrv, struct host_if_pmkid_attr *pu8PmkidInfoArray)
4625 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
4626 struct host_if_msg msg;
4630 if (pstrWFIDrv == NULL) {
4632 PRINT_ER("driver is null\n");
4636 /* prepare the Key Message */
4637 memset(&msg, 0, sizeof(struct host_if_msg));
4639 msg.id = HOST_IF_MSG_KEY;
4640 msg.body.key_info.enuKeyType = PMKSA;
4641 msg.body.key_info.u8KeyAction = ADDKEY;
4642 msg.drvHandler = hWFIDrv;
4644 for (i = 0; i < pu8PmkidInfoArray->numpmkid; i++) {
4646 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].bssid, &pu8PmkidInfoArray->pmkidlist[i].bssid,
4649 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].pmkid, &pu8PmkidInfoArray->pmkidlist[i].pmkid,
4653 /* send the message */
4654 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4656 PRINT_ER(" Error in sending messagequeue: PMKID Info\n");
4662 * @brief gets the cached the pmkid info
4663 * @details valid only in BSS STA mode if External Supplicant
4664 * support is enabled. This Function sets the PMKID in firmware
4665 * when host drivr receives the corresponding request from NDIS.
4666 * The firmware then includes theset PMKID in the appropriate
4668 * @param[in,out] handle to the wifi driver,
4669 * message containing PMKID Info in the following format
4670 *|-----------------------------------------------------------------|
4671 *|NumEntries | BSSID[1] | PMKID[1] | ... | BSSID[K] | PMKID[K] |
4672 *|-----------|------------|----------|-------|----------|----------|
4673 | 1 | 6 | 16 | ... | 6 | 16 |
4674 ||-----------------------------------------------------------------|
4676 * @return Error code indicating success/failure
4679 * @date 8 March 2012
4682 s32 host_int_get_pmkid_info(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8PmkidInfoArray,
4683 u32 u32PmkidInfoLen)
4687 /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */
4689 strWID.u16WIDid = (u16)WID_PMKID_INFO;
4690 strWID.enuWIDtype = WID_STR;
4691 strWID.s32ValueSize = u32PmkidInfoLen;
4692 strWID.ps8WidVal = pu8PmkidInfoArray;
4698 * @brief sets the pass phrase
4699 * @details AP/STA mode. This function gives the pass phrase used to
4700 * generate the Pre-Shared Key when WPA/WPA2 is enabled
4701 * The length of the field can vary from 8 to 64 bytes,
4702 * the lower layer should get the
4703 * @param[in,out] handle to the wifi driver,
4704 * @param[in] String containing PSK
4705 * @return Error code indicating success/failure
4708 * @date 8 March 2012
4711 s32 host_int_set_RSNAConfigPSKPassPhrase(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8PassPhrase,
4717 /*validating psk length*/
4718 if ((u8Psklength > 7) && (u8Psklength < 65)) {
4719 strWID.u16WIDid = (u16)WID_11I_PSK;
4720 strWID.enuWIDtype = WID_STR;
4721 strWID.ps8WidVal = pu8PassPhrase;
4722 strWID.s32ValueSize = u8Psklength;
4728 * @brief host_int_get_MacAddress
4729 * @details gets mac address
4730 * @param[in,out] handle to the wifi driver,
4732 * @return Error code indicating success/failure
4735 * @date 19 April 2012
4738 s32 host_int_get_MacAddress(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8MacAddress)
4741 struct host_if_msg msg;
4744 /* prepare the Message */
4745 memset(&msg, 0, sizeof(struct host_if_msg));
4747 msg.id = HOST_IF_MSG_GET_MAC_ADDRESS;
4748 msg.body.get_mac_info.u8MacAddress = pu8MacAddress;
4749 msg.drvHandler = hWFIDrv;
4750 /* send the message */
4751 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4753 PRINT_ER("Failed to send get mac address\n");
4757 down(&hWaitResponse);
4762 * @brief host_int_set_MacAddress
4763 * @details sets mac address
4764 * @param[in,out] handle to the wifi driver,
4766 * @return Error code indicating success/failure
4769 * @date 16 July 2012
4772 s32 host_int_set_MacAddress(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8MacAddress)
4775 struct host_if_msg msg;
4777 PRINT_D(GENERIC_DBG, "mac addr = %x:%x:%x\n", pu8MacAddress[0], pu8MacAddress[1], pu8MacAddress[2]);
4779 /* prepare setting mac address message */
4780 memset(&msg, 0, sizeof(struct host_if_msg));
4781 msg.id = HOST_IF_MSG_SET_MAC_ADDRESS;
4782 memcpy(msg.body.set_mac_info.u8MacAddress, pu8MacAddress, ETH_ALEN);
4783 msg.drvHandler = hWFIDrv;
4785 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4787 PRINT_ER("Failed to send message queue: Set mac address\n");
4794 * @brief host_int_get_RSNAConfigPSKPassPhrase
4795 * @details gets the pass phrase:AP/STA mode. This function gets the pass phrase used to
4796 * generate the Pre-Shared Key when WPA/WPA2 is enabled
4797 * The length of the field can vary from 8 to 64 bytes,
4798 * the lower layer should get the
4799 * @param[in,out] handle to the wifi driver,
4800 * String containing PSK
4801 * @return Error code indicating success/failure
4804 * @date 8 March 2012
4807 s32 host_int_get_RSNAConfigPSKPassPhrase(tstrWILC_WFIDrv *hWFIDrv,
4808 u8 *pu8PassPhrase, u8 u8Psklength)
4812 /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */
4814 strWID.u16WIDid = (u16)WID_11I_PSK;
4815 strWID.enuWIDtype = WID_STR;
4816 strWID.s32ValueSize = u8Psklength;
4817 strWID.ps8WidVal = pu8PassPhrase;
4823 * @brief sets a start scan request
4825 * @param[in,out] handle to the wifi driver,
4826 * @param[in] Scan Source one of the following values
4829 * OBSS_PERIODIC_SCAN BIT1
4830 * OBSS_ONETIME_SCAN BIT2
4831 * @return Error code indicating success/failure
4834 * @date 8 March 2012
4837 s32 host_int_set_start_scan_req(tstrWILC_WFIDrv *hWFIDrv, u8 scanSource)
4841 /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */
4843 strWID.u16WIDid = (u16)WID_START_SCAN_REQ;
4844 strWID.enuWIDtype = WID_CHAR;
4845 strWID.ps8WidVal = (s8 *)&scanSource;
4846 strWID.s32ValueSize = sizeof(char);
4852 * @brief host_int_get_start_scan_req
4853 * @details gets a start scan request
4854 * @param[in,out] handle to the wifi driver,
4855 * @param[in] Scan Source one of the following values
4858 * OBSS_PERIODIC_SCAN BIT1
4859 * OBSS_ONETIME_SCAN BIT2
4860 * @return Error code indicating success/failure
4863 * @date 8 March 2012
4867 s32 host_int_get_start_scan_req(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8ScanSource)
4871 /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */
4873 strWID.u16WIDid = (u16)WID_START_SCAN_REQ;
4874 strWID.enuWIDtype = WID_CHAR;
4875 strWID.ps8WidVal = (s8 *)pu8ScanSource;
4876 strWID.s32ValueSize = sizeof(char);
4882 * @brief host_int_set_join_req
4883 * @details sets a join request
4884 * @param[in,out] handle to the wifi driver,
4885 * @param[in] Index of the bss descriptor
4886 * @return Error code indicating success/failure
4889 * @date 8 March 2012
4892 s32 host_int_set_join_req(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8bssid,
4893 const u8 *pu8ssid, size_t ssidLen,
4894 const u8 *pu8IEs, size_t IEsLen,
4895 wilc_connect_result pfConnectResult, void *pvUserArg,
4896 u8 u8security, enum AUTHTYPE tenuAuth_type,
4901 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
4902 struct host_if_msg msg;
4903 tenuScanConnTimer enuScanConnTimer;
4905 if (pstrWFIDrv == NULL || pfConnectResult == NULL) {
4907 PRINT_ER("Driver is null\n");
4911 if (hWFIDrv == NULL) {
4912 PRINT_ER("Driver is null\n");
4916 if (pJoinParams == NULL) {
4917 PRINT_ER("Unable to Join - JoinParams is NULL\n");
4921 /* prepare the Connect Message */
4922 memset(&msg, 0, sizeof(struct host_if_msg));
4924 msg.id = HOST_IF_MSG_CONNECT;
4926 msg.body.con_info.u8security = u8security;
4927 msg.body.con_info.tenuAuth_type = tenuAuth_type;
4928 msg.body.con_info.u8channel = u8channel;
4929 msg.body.con_info.pfConnectResult = pfConnectResult;
4930 msg.body.con_info.pvUserArg = pvUserArg;
4931 msg.body.con_info.pJoinParams = pJoinParams;
4932 msg.drvHandler = hWFIDrv;
4934 if (pu8bssid != NULL) {
4935 msg.body.con_info.pu8bssid = kmalloc(6, GFP_KERNEL); /* will be deallocated by the receiving thread */
4936 memcpy(msg.body.con_info.pu8bssid,
4940 if (pu8ssid != NULL) {
4941 msg.body.con_info.ssidLen = ssidLen;
4942 msg.body.con_info.pu8ssid = kmalloc(ssidLen, GFP_KERNEL); /* will be deallocated by the receiving thread */
4943 memcpy(msg.body.con_info.pu8ssid,
4948 if (pu8IEs != NULL) {
4949 msg.body.con_info.IEsLen = IEsLen;
4950 msg.body.con_info.pu8IEs = kmalloc(IEsLen, GFP_KERNEL); /* will be deallocated by the receiving thread */
4951 memcpy(msg.body.con_info.pu8IEs,
4954 if (pstrWFIDrv->enuHostIFstate < HOST_IF_CONNECTING)
4955 pstrWFIDrv->enuHostIFstate = HOST_IF_CONNECTING;
4957 PRINT_D(GENERIC_DBG, "Don't set state to 'connecting' as state is %d\n", pstrWFIDrv->enuHostIFstate);
4959 /* send the message */
4960 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4962 PRINT_ER("Failed to send message queue: Set join request\n");
4966 enuScanConnTimer = CONNECT_TIMER;
4967 pstrWFIDrv->hConnectTimer.data = (unsigned long)hWFIDrv;
4968 mod_timer(&pstrWFIDrv->hConnectTimer,
4969 jiffies + msecs_to_jiffies(HOST_IF_CONNECT_TIMEOUT));
4975 * @brief Flush a join request parameters to FW, but actual connection
4976 * @details The function is called in situation where WILC is connected to AP and
4977 * required to switch to hybrid FW for P2P connection
4978 * @param[in] handle to the wifi driver,
4979 * @return Error code indicating success/failure
4981 * @author Amr Abdel-Moghny
4986 s32 host_int_flush_join_req(tstrWILC_WFIDrv *hWFIDrv)
4989 struct host_if_msg msg;
4991 if (!gu8FlushedJoinReq) {
4997 if (hWFIDrv == NULL) {
4999 PRINT_ER("Driver is null\n");
5003 msg.id = HOST_IF_MSG_FLUSH_CONNECT;
5004 msg.drvHandler = hWFIDrv;
5006 /* send the message */
5007 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5009 PRINT_ER("Failed to send message queue: Flush join request\n");
5017 * @brief host_int_disconnect
5018 * @details disconnects from the currently associated network
5019 * @param[in,out] handle to the wifi driver,
5020 * @param[in] Reason Code of the Disconnection
5021 * @return Error code indicating success/failure
5024 * @date 8 March 2012
5027 s32 host_int_disconnect(tstrWILC_WFIDrv *hWFIDrv, u16 u16ReasonCode)
5030 struct host_if_msg msg;
5031 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
5033 if (pstrWFIDrv == NULL) {
5034 PRINT_ER("Driver is null\n");
5038 /* prepare the Disconnect Message */
5039 memset(&msg, 0, sizeof(struct host_if_msg));
5041 msg.id = HOST_IF_MSG_DISCONNECT;
5042 msg.drvHandler = hWFIDrv;
5044 /* send the message */
5045 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5047 PRINT_ER("Failed to send message queue: disconnect\n");
5048 /* ////////////// */
5049 down(&(pstrWFIDrv->hSemTestDisconnectBlock));
5056 * @brief host_int_disconnect_station
5057 * @details disconnects a sta
5058 * @param[in,out] handle to the wifi driver,
5059 * @param[in] Association Id of the station to be disconnected
5060 * @return Error code indicating success/failure
5063 * @date 8 March 2012
5066 s32 host_int_disconnect_station(tstrWILC_WFIDrv *hWFIDrv, u8 assoc_id)
5070 /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */
5072 strWID.u16WIDid = (u16)WID_DISCONNECT;
5073 strWID.enuWIDtype = WID_CHAR;
5074 strWID.ps8WidVal = (s8 *)&assoc_id;
5075 strWID.s32ValueSize = sizeof(char);
5081 * @brief host_int_get_assoc_req_info
5082 * @details gets a Association request info
5083 * @param[in,out] handle to the wifi driver,
5084 * Message containg assoc. req info in the following format
5085 * ------------------------------------------------------------------------
5086 | Management Frame Format |
5087 ||-------------------------------------------------------------------|
5088 ||Frame Control|Duration|DA|SA|BSSID|Sequence Control|Frame Body|FCS |
5089 ||-------------|--------|--|--|-----|----------------|----------|----|
5090 | 2 |2 |6 |6 |6 | 2 |0 - 2312 | 4 |
5091 ||-------------------------------------------------------------------|
5093 | Association Request Frame - Frame Body |
5094 ||-------------------------------------------------------------------|
5095 | Capability Information | Listen Interval | SSID | Supported Rates |
5096 ||------------------------|-----------------|------|-----------------|
5097 | 2 | 2 | 2-34 | 3-10 |
5098 | ---------------------------------------------------------------------
5099 * @return Error code indicating success/failure
5102 * @date 8 March 2012
5106 s32 host_int_get_assoc_req_info(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8AssocReqInfo,
5107 u32 u32AssocReqInfoLen)
5111 /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */
5113 strWID.u16WIDid = (u16)WID_ASSOC_REQ_INFO;
5114 strWID.enuWIDtype = WID_STR;
5115 strWID.ps8WidVal = pu8AssocReqInfo;
5116 strWID.s32ValueSize = u32AssocReqInfoLen;
5123 * @brief gets a Association Response info
5125 * @param[in,out] handle to the wifi driver,
5126 * Message containg assoc. resp info
5127 * @return Error code indicating success/failure
5130 * @date 8 March 2012
5133 s32 host_int_get_assoc_res_info(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8AssocRespInfo,
5134 u32 u32MaxAssocRespInfoLen, u32 *pu32RcvdAssocRespInfoLen)
5138 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
5140 if (pstrWFIDrv == NULL) {
5141 PRINT_ER("Driver is null\n");
5145 strWID.u16WIDid = (u16)WID_ASSOC_RES_INFO;
5146 strWID.enuWIDtype = WID_STR;
5147 strWID.ps8WidVal = pu8AssocRespInfo;
5148 strWID.s32ValueSize = u32MaxAssocRespInfoLen;
5151 /* Sending Configuration packet */
5152 s32Error = send_config_pkt(GET_CFG, &strWID, 1, true,
5153 get_id_from_handler(pstrWFIDrv));
5155 *pu32RcvdAssocRespInfoLen = 0;
5156 PRINT_ER("Failed to send association response config packet\n");
5159 *pu32RcvdAssocRespInfoLen = strWID.s32ValueSize;
5166 * @brief gets a Association Response info
5167 * @details Valid only in STA mode. This function gives the RSSI
5168 * values observed in all the channels at the time of scanning.
5169 * The length of the field is 1 greater that the total number of
5170 * channels supported. Byte 0 contains the number of channels while
5171 * each of Byte N contains the observed RSSI value for the channel index N.
5172 * @param[in,out] handle to the wifi driver,
5173 * array of scanned channels' RSSI
5174 * @return Error code indicating success/failure
5177 * @date 8 March 2012
5180 s32 host_int_get_rx_power_level(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8RxPowerLevel,
5181 u32 u32RxPowerLevelLen)
5185 /* tstrWILC_WFIDrv * pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv; */
5187 strWID.u16WIDid = (u16)WID_RX_POWER_LEVEL;
5188 strWID.enuWIDtype = WID_STR;
5189 strWID.ps8WidVal = pu8RxPowerLevel;
5190 strWID.s32ValueSize = u32RxPowerLevelLen;
5197 * @brief sets a channel
5199 * @param[in,out] handle to the wifi driver,
5200 * @param[in] Index of the channel to be set
5201 *|-------------------------------------------------------------------|
5202 | CHANNEL1 CHANNEL2 .... CHANNEL14 |
5204 ||-------------------------------------------------------------------|
5205 * @return Error code indicating success/failure
5208 * @date 8 March 2012
5211 int host_int_set_mac_chnl_num(tstrWILC_WFIDrv *wfi_drv, u8 channel)
5214 struct host_if_msg msg;
5217 PRINT_ER("driver is null\n");
5221 /* prepare the set channel message */
5222 memset(&msg, 0, sizeof(struct host_if_msg));
5223 msg.id = HOST_IF_MSG_SET_CHANNEL;
5224 msg.body.channel_info.u8SetChan = channel;
5225 msg.drvHandler = wfi_drv;
5227 result = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5229 PRINT_ER("wilc mq send fail\n");
5236 int host_int_wait_msg_queue_idle(void)
5240 struct host_if_msg msg;
5242 /* prepare the set driver handler message */
5244 memset(&msg, 0, sizeof(struct host_if_msg));
5245 msg.id = HOST_IF_MSG_Q_IDLE;
5246 result = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5248 PRINT_ER("wilc mq send fail\n");
5252 /* wait untill MSG Q is empty */
5253 down(&hWaitResponse);
5258 int host_int_set_wfi_drv_handler(tstrWILC_WFIDrv *address)
5262 struct host_if_msg msg;
5264 /* prepare the set driver handler message */
5266 memset(&msg, 0, sizeof(struct host_if_msg));
5267 msg.id = HOST_IF_MSG_SET_WFIDRV_HANDLER;
5268 msg.body.drv.u32Address = get_id_from_handler(address);
5269 msg.drvHandler = address;
5271 result = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5273 PRINT_ER("wilc mq send fail\n");
5280 int host_int_set_operation_mode(tstrWILC_WFIDrv *wfi_drv, u32 mode)
5284 struct host_if_msg msg;
5286 /* prepare the set driver handler message */
5288 memset(&msg, 0, sizeof(struct host_if_msg));
5289 msg.id = HOST_IF_MSG_SET_OPERATION_MODE;
5290 msg.body.mode.u32Mode = mode;
5291 msg.drvHandler = wfi_drv;
5293 result = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5295 PRINT_ER("wilc mq send fail\n");
5303 * @brief gets the current channel index
5305 * @param[in,out] handle to the wifi driver,
5306 * current channel index
5307 *|-----------------------------------------------------------------------|
5308 | CHANNEL1 CHANNEL2 .... CHANNEL14 |
5310 ||-----------------------------------------------------------------------|
5311 * @return Error code indicating success/failure
5314 * @date 8 March 2012
5317 s32 host_int_get_host_chnl_num(tstrWILC_WFIDrv *hWFIDrv, u8 *pu8ChNo)
5320 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
5321 struct host_if_msg msg;
5323 if (pstrWFIDrv == NULL) {
5324 PRINT_ER("driver is null\n");
5328 /* prepare the Get Channel Message */
5329 memset(&msg, 0, sizeof(struct host_if_msg));
5331 msg.id = HOST_IF_MSG_GET_CHNL;
5332 msg.drvHandler = hWFIDrv;
5334 /* send the message */
5335 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5337 PRINT_ER("wilc mq send fail\n");
5338 down(&(pstrWFIDrv->hSemGetCHNL));
5349 * @brief host_int_get_inactive_time
5351 * @param[in,out] handle to the wifi driver,
5352 * current sta macaddress, inactive_time
5359 s32 host_int_get_inactive_time(tstrWILC_WFIDrv *hWFIDrv, const u8 *mac, u32 *pu32InactiveTime)
5362 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
5363 struct host_if_msg msg;
5365 if (pstrWFIDrv == NULL) {
5366 PRINT_ER("driver is null\n");
5370 memset(&msg, 0, sizeof(struct host_if_msg));
5373 memcpy(msg.body.mac_info.mac,
5376 msg.id = HOST_IF_MSG_GET_INACTIVETIME;
5377 msg.drvHandler = hWFIDrv;
5379 /* send the message */
5380 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5382 PRINT_ER("Failed to send get host channel param's message queue ");
5384 down(&(pstrWFIDrv->hSemInactiveTime));
5386 *pu32InactiveTime = gu32InactiveTime;
5392 * @brief host_int_test_get_int_wid
5393 * @details Test function for getting wids
5394 * @param[in,out] WILC_WFIDrvHandle hWFIDrv, u32* pu32TestMemAddr
5395 * @return Error code indicating success/failure
5398 * @date 8 March 2012
5401 s32 host_int_test_get_int_wid(tstrWILC_WFIDrv *hWFIDrv, u32 *pu32TestMemAddr)
5406 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
5409 if (pstrWFIDrv == NULL) {
5410 PRINT_ER("driver is null\n");
5414 strWID.u16WIDid = (u16)WID_MEMORY_ADDRESS;
5415 strWID.enuWIDtype = WID_INT;
5416 strWID.ps8WidVal = (s8 *)pu32TestMemAddr;
5417 strWID.s32ValueSize = sizeof(u32);
5419 s32Error = send_config_pkt(GET_CFG, &strWID, 1, true,
5420 get_id_from_handler(pstrWFIDrv));
5421 /*get the value by searching the local copy*/
5423 PRINT_ER("Failed to get wid value\n");
5426 PRINT_D(HOSTINF_DBG, "Successfully got wid value\n");
5435 * @brief host_int_get_rssi
5436 * @details gets the currently maintained RSSI value for the station.
5437 * The received signal strength value in dB.
5438 * The range of valid values is -128 to 0.
5439 * @param[in,out] handle to the wifi driver,
5441 * @return Error code indicating success/failure
5444 * @date 8 March 2012
5447 s32 host_int_get_rssi(tstrWILC_WFIDrv *hWFIDrv, s8 *ps8Rssi)
5450 struct host_if_msg msg;
5451 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
5454 /* prepare the Get RSSI Message */
5455 memset(&msg, 0, sizeof(struct host_if_msg));
5457 msg.id = HOST_IF_MSG_GET_RSSI;
5458 msg.drvHandler = hWFIDrv;
5460 /* send the message */
5461 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5463 PRINT_ER("Failed to send get host channel param's message queue ");
5467 down(&(pstrWFIDrv->hSemGetRSSI));
5470 if (ps8Rssi == NULL) {
5471 PRINT_ER("RSS pointer value is null");
5482 s32 host_int_get_link_speed(tstrWILC_WFIDrv *hWFIDrv, s8 *ps8lnkspd)
5484 struct host_if_msg msg;
5487 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
5491 /* prepare the Get LINKSPEED Message */
5492 memset(&msg, 0, sizeof(struct host_if_msg));
5494 msg.id = HOST_IF_MSG_GET_LINKSPEED;
5495 msg.drvHandler = hWFIDrv;
5497 /* send the message */
5498 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5500 PRINT_ER("Failed to send GET_LINKSPEED to message queue ");
5504 down(&(pstrWFIDrv->hSemGetLINKSPEED));
5507 if (ps8lnkspd == NULL) {
5508 PRINT_ER("LINKSPEED pointer value is null");
5513 *ps8lnkspd = gs8lnkspd;
5519 s32 host_int_get_statistics(tstrWILC_WFIDrv *hWFIDrv, tstrStatistics *pstrStatistics)
5522 struct host_if_msg msg;
5525 /* prepare the Get RSSI Message */
5526 memset(&msg, 0, sizeof(struct host_if_msg));
5528 msg.id = HOST_IF_MSG_GET_STATISTICS;
5529 msg.body.data = (char *)pstrStatistics;
5530 msg.drvHandler = hWFIDrv;
5531 /* send the message */
5532 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5534 PRINT_ER("Failed to send get host channel param's message queue ");
5538 down(&hWaitResponse);
5544 * @brief host_int_scan
5545 * @details scans a set of channels
5546 * @param[in,out] handle to the wifi driver,
5547 * @param[in] Scan source
5548 * Scan Type PASSIVE_SCAN = 0,
5551 * Channels Array length
5552 * Scan Callback function
5553 * @return Error code indicating success/failure
5556 * @date 8 March 2012
5559 s32 host_int_scan(tstrWILC_WFIDrv *hWFIDrv, u8 u8ScanSource,
5560 u8 u8ScanType, u8 *pu8ChnlFreqList,
5561 u8 u8ChnlListLen, const u8 *pu8IEs,
5562 size_t IEsLen, wilc_scan_result ScanResult,
5564 struct hidden_network *pstrHiddenNetwork)
5567 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
5568 struct host_if_msg msg;
5569 tenuScanConnTimer enuScanConnTimer;
5571 if (pstrWFIDrv == NULL || ScanResult == NULL) {
5572 PRINT_ER("pstrWFIDrv or ScanResult = NULL\n");
5576 /* prepare the Scan Message */
5577 memset(&msg, 0, sizeof(struct host_if_msg));
5579 msg.id = HOST_IF_MSG_SCAN;
5581 if (pstrHiddenNetwork != NULL) {
5582 msg.body.scan_info.strHiddenNetwork.pstrHiddenNetworkInfo = pstrHiddenNetwork->pstrHiddenNetworkInfo;
5583 msg.body.scan_info.strHiddenNetwork.u8ssidnum = pstrHiddenNetwork->u8ssidnum;
5586 PRINT_D(HOSTINF_DBG, "pstrHiddenNetwork IS EQUAL TO NULL\n");
5588 msg.drvHandler = hWFIDrv;
5589 msg.body.scan_info.u8ScanSource = u8ScanSource;
5590 msg.body.scan_info.u8ScanType = u8ScanType;
5591 msg.body.scan_info.pfScanResult = ScanResult;
5592 msg.body.scan_info.pvUserArg = pvUserArg;
5594 msg.body.scan_info.u8ChnlListLen = u8ChnlListLen;
5595 msg.body.scan_info.pu8ChnlFreqList = kmalloc(u8ChnlListLen, GFP_KERNEL); /* will be deallocated by the receiving thread */
5596 memcpy(msg.body.scan_info.pu8ChnlFreqList,
5597 pu8ChnlFreqList, u8ChnlListLen);
5599 msg.body.scan_info.IEsLen = IEsLen;
5600 msg.body.scan_info.pu8IEs = kmalloc(IEsLen, GFP_KERNEL); /* will be deallocated by the receiving thread */
5601 memcpy(msg.body.scan_info.pu8IEs,
5604 /* send the message */
5605 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5607 PRINT_ER("Error in sending message queue\n");
5611 enuScanConnTimer = SCAN_TIMER;
5612 PRINT_D(HOSTINF_DBG, ">> Starting the SCAN timer\n");
5613 pstrWFIDrv->hScanTimer.data = (unsigned long)hWFIDrv;
5614 mod_timer(&pstrWFIDrv->hScanTimer,
5615 jiffies + msecs_to_jiffies(HOST_IF_SCAN_TIMEOUT));
5621 * @brief hif_set_cfg
5622 * @details sets configuration wids values
5623 * @param[in,out] handle to the wifi driver,
5624 * @param[in] WID, WID value
5625 * @return Error code indicating success/failure
5628 * @date 8 March 2012
5631 s32 hif_set_cfg(tstrWILC_WFIDrv *hWFIDrv, struct cfg_param_val *pstrCfgParamVal)
5635 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
5637 struct host_if_msg msg;
5640 if (pstrWFIDrv == NULL) {
5641 PRINT_ER("pstrWFIDrv NULL\n");
5644 /* prepare the WiphyParams Message */
5645 memset(&msg, 0, sizeof(struct host_if_msg));
5646 msg.id = HOST_IF_MSG_CFG_PARAMS;
5647 msg.body.cfg_info.pstrCfgParamVal = *pstrCfgParamVal;
5648 msg.drvHandler = hWFIDrv;
5650 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5658 * @brief hif_get_cfg
5659 * @details gets configuration wids values
5660 * @param[in,out] handle to the wifi driver,
5663 * @return Error code indicating success/failure
5667 * @date 8 March 2012
5670 s32 hif_get_cfg(tstrWILC_WFIDrv *hWFIDrv, u16 u16WID, u16 *pu16WID_Value)
5673 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
5675 down(&(pstrWFIDrv->gtOsCfgValuesSem));
5677 if (pstrWFIDrv == NULL) {
5678 PRINT_ER("pstrWFIDrv NULL\n");
5681 PRINT_D(HOSTINF_DBG, "Getting configuration parameters\n");
5685 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.bss_type;
5689 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.auth_type;
5692 case WID_AUTH_TIMEOUT:
5693 *pu16WID_Value = pstrWFIDrv->strCfgValues.auth_timeout;
5696 case WID_POWER_MANAGEMENT:
5697 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.power_mgmt_mode;
5700 case WID_SHORT_RETRY_LIMIT:
5701 *pu16WID_Value = pstrWFIDrv->strCfgValues.short_retry_limit;
5704 case WID_LONG_RETRY_LIMIT:
5705 *pu16WID_Value = pstrWFIDrv->strCfgValues.long_retry_limit;
5708 case WID_FRAG_THRESHOLD:
5709 *pu16WID_Value = pstrWFIDrv->strCfgValues.frag_threshold;
5712 case WID_RTS_THRESHOLD:
5713 *pu16WID_Value = pstrWFIDrv->strCfgValues.rts_threshold;
5717 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.preamble_type;
5720 case WID_SHORT_SLOT_ALLOWED:
5721 *pu16WID_Value = (u16) pstrWFIDrv->strCfgValues.short_slot_allowed;
5724 case WID_11N_TXOP_PROT_DISABLE:
5725 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.txop_prot_disabled;
5728 case WID_BEACON_INTERVAL:
5729 *pu16WID_Value = pstrWFIDrv->strCfgValues.beacon_interval;
5732 case WID_DTIM_PERIOD:
5733 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.dtim_period;
5736 case WID_SITE_SURVEY:
5737 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.site_survey_enabled;
5740 case WID_SITE_SURVEY_SCAN_TIME:
5741 *pu16WID_Value = pstrWFIDrv->strCfgValues.site_survey_scan_time;
5744 case WID_ACTIVE_SCAN_TIME:
5745 *pu16WID_Value = pstrWFIDrv->strCfgValues.active_scan_time;
5748 case WID_PASSIVE_SCAN_TIME:
5749 *pu16WID_Value = pstrWFIDrv->strCfgValues.passive_scan_time;
5752 case WID_CURRENT_TX_RATE:
5753 *pu16WID_Value = pstrWFIDrv->strCfgValues.curr_tx_rate;
5760 up(&(pstrWFIDrv->gtOsCfgValuesSem));
5766 /*****************************************************************************/
5767 /* Notification Functions */
5768 /*****************************************************************************/
5770 * @brief notifies host with join and leave requests
5771 * @details This function prepares an Information frame having the
5772 * information about a joining/leaving station.
5773 * @param[in,out] handle to the wifi driver,
5774 * @param[in] 6 byte Sta Adress
5775 * Join or leave flag:
5778 * @return Error code indicating success/failure
5781 * @date 8 March 2012
5784 void host_int_send_join_leave_info_to_host
5785 (u16 assocId, u8 *stationAddr, bool joining)
5789 * @brief notifies host with stations found in scan
5790 * @details sends the beacon/probe response from scan
5791 * @param[in,out] handle to the wifi driver,
5792 * @param[in] Sta Address,
5794 * Rssi of the Station found
5795 * @return Error code indicating success/failure
5798 * @date 8 March 2012
5802 static void GetPeriodicRSSI(unsigned long arg)
5804 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)arg;
5806 if (pstrWFIDrv == NULL) {
5807 PRINT_ER("Driver handler is NULL\n");
5811 if (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED) {
5813 struct host_if_msg msg;
5815 /* prepare the Get RSSI Message */
5816 memset(&msg, 0, sizeof(struct host_if_msg));
5818 msg.id = HOST_IF_MSG_GET_RSSI;
5819 msg.drvHandler = pstrWFIDrv;
5821 /* send the message */
5822 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5824 PRINT_ER("Failed to send get host channel param's message queue ");
5828 g_hPeriodicRSSI.data = (unsigned long)pstrWFIDrv;
5829 mod_timer(&g_hPeriodicRSSI, jiffies + msecs_to_jiffies(5000));
5833 void host_int_send_network_info_to_host
5834 (u8 *macStartAddress, u16 u16RxFrameLen, s8 s8Rssi)
5838 * @brief host_int_init
5839 * @details host interface initialization function
5840 * @param[in,out] handle to the wifi driver,
5843 * @date 8 March 2012
5846 static u32 clients_count;
5848 s32 host_int_init(tstrWILC_WFIDrv **phWFIDrv)
5851 tstrWILC_WFIDrv *pstrWFIDrv;
5854 PRINT_D(HOSTINF_DBG, "Initializing host interface for client %d\n", clients_count + 1);
5856 gbScanWhileConnected = false;
5858 sema_init(&hWaitResponse, 0);
5860 /*Allocate host interface private structure*/
5861 pstrWFIDrv = kzalloc(sizeof(tstrWILC_WFIDrv), GFP_KERNEL);
5866 *phWFIDrv = pstrWFIDrv;
5867 err = add_handler_in_list(pstrWFIDrv);
5873 g_obtainingIP = false;
5875 PRINT_D(HOSTINF_DBG, "Global handle pointer value=%p\n", pstrWFIDrv);
5876 if (clients_count == 0) {
5877 sema_init(&hSemHostIFthrdEnd, 0);
5878 sema_init(&hSemDeinitDrvHandle, 0);
5879 sema_init(&hSemHostIntDeinit, 1);
5882 sema_init(&pstrWFIDrv->hSemTestKeyBlock, 0);
5883 sema_init(&pstrWFIDrv->hSemTestDisconnectBlock, 0);
5884 sema_init(&pstrWFIDrv->hSemGetRSSI, 0);
5885 sema_init(&pstrWFIDrv->hSemGetLINKSPEED, 0);
5886 sema_init(&pstrWFIDrv->hSemGetCHNL, 0);
5887 sema_init(&pstrWFIDrv->hSemInactiveTime, 0);
5889 PRINT_D(HOSTINF_DBG, "INIT: CLIENT COUNT %d\n", clients_count);
5891 if (clients_count == 0) {
5892 result = wilc_mq_create(&gMsgQHostIF);
5895 PRINT_ER("Failed to creat MQ\n");
5898 HostIFthreadHandler = kthread_run(hostIFthread, NULL, "WILC_kthread");
5899 if (IS_ERR(HostIFthreadHandler)) {
5900 PRINT_ER("Failed to creat Thread\n");
5904 setup_timer(&g_hPeriodicRSSI, GetPeriodicRSSI,
5905 (unsigned long)pstrWFIDrv);
5906 mod_timer(&g_hPeriodicRSSI, jiffies + msecs_to_jiffies(5000));
5909 setup_timer(&pstrWFIDrv->hScanTimer, TimerCB_Scan, 0);
5911 setup_timer(&pstrWFIDrv->hConnectTimer, TimerCB_Connect, 0);
5913 /*Remain on channel timer*/
5914 setup_timer(&pstrWFIDrv->hRemainOnChannel, ListenTimerCB, 0);
5916 sema_init(&(pstrWFIDrv->gtOsCfgValuesSem), 1);
5917 down(&pstrWFIDrv->gtOsCfgValuesSem);
5919 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
5921 /*Initialize CFG WIDS Defualt Values*/
5923 pstrWFIDrv->strCfgValues.site_survey_enabled = SITE_SURVEY_OFF;
5924 pstrWFIDrv->strCfgValues.scan_source = DEFAULT_SCAN;
5925 pstrWFIDrv->strCfgValues.active_scan_time = ACTIVE_SCAN_TIME;
5926 pstrWFIDrv->strCfgValues.passive_scan_time = PASSIVE_SCAN_TIME;
5927 pstrWFIDrv->strCfgValues.curr_tx_rate = AUTORATE;
5929 pstrWFIDrv->u64P2p_MgmtTimeout = 0;
5931 PRINT_INFO(HOSTINF_DBG, "Initialization values, Site survey value: %d\n Scan source: %d\n Active scan time: %d\n Passive scan time: %d\nCurrent tx Rate = %d\n",
5933 pstrWFIDrv->strCfgValues.site_survey_enabled, pstrWFIDrv->strCfgValues.scan_source,
5934 pstrWFIDrv->strCfgValues.active_scan_time, pstrWFIDrv->strCfgValues.passive_scan_time,
5935 pstrWFIDrv->strCfgValues.curr_tx_rate);
5937 up(&pstrWFIDrv->gtOsCfgValuesSem);
5939 clients_count++; /* increase number of created entities */
5944 up(&pstrWFIDrv->gtOsCfgValuesSem);
5945 del_timer_sync(&pstrWFIDrv->hConnectTimer);
5946 del_timer_sync(&pstrWFIDrv->hScanTimer);
5947 kthread_stop(HostIFthreadHandler);
5949 wilc_mq_destroy(&gMsgQHostIF);
5954 * @brief host_int_deinit
5955 * @details host interface initialization function
5956 * @param[in,out] handle to the wifi driver,
5959 * @date 8 March 2012
5963 s32 host_int_deinit(tstrWILC_WFIDrv *hWFIDrv)
5966 struct host_if_msg msg;
5969 /*obtain driver handle*/
5970 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
5972 if (pstrWFIDrv == NULL) {
5973 PRINT_ER("pstrWFIDrv = NULL\n");
5977 down(&hSemHostIntDeinit);
5979 terminated_handle = pstrWFIDrv;
5980 PRINT_D(HOSTINF_DBG, "De-initializing host interface for client %d\n", clients_count);
5982 /*Destroy all timers before acquiring hSemDeinitDrvHandle*/
5983 /*to guarantee handling all messages befor proceeding*/
5984 if (del_timer_sync(&pstrWFIDrv->hScanTimer)) {
5985 PRINT_D(HOSTINF_DBG, ">> Scan timer is active\n");
5986 /* msleep(HOST_IF_SCAN_TIMEOUT+1000); */
5989 if (del_timer_sync(&pstrWFIDrv->hConnectTimer)) {
5990 PRINT_D(HOSTINF_DBG, ">> Connect timer is active\n");
5991 /* msleep(HOST_IF_CONNECT_TIMEOUT+1000); */
5995 if (del_timer_sync(&g_hPeriodicRSSI)) {
5996 PRINT_D(HOSTINF_DBG, ">> Connect timer is active\n");
5997 /* msleep(HOST_IF_CONNECT_TIMEOUT+1000); */
6000 /*Destroy Remain-onchannel Timer*/
6001 del_timer_sync(&pstrWFIDrv->hRemainOnChannel);
6003 host_int_set_wfi_drv_handler(NULL);
6004 down(&hSemDeinitDrvHandle);
6007 /*Calling the CFG80211 scan done function with the abort flag set to true*/
6008 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
6009 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_ABORTED, NULL,
6010 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL);
6012 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = NULL;
6015 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
6017 gbScanWhileConnected = false;
6019 memset(&msg, 0, sizeof(struct host_if_msg));
6021 if (clients_count == 1) {
6022 if (del_timer_sync(&g_hPeriodicRSSI)) {
6023 PRINT_D(HOSTINF_DBG, ">> Connect timer is active\n");
6024 /* msleep(HOST_IF_CONNECT_TIMEOUT+1000); */
6026 msg.id = HOST_IF_MSG_EXIT;
6027 msg.drvHandler = hWFIDrv;
6030 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6032 PRINT_ER("Error in sending deinit's message queue message function: Error(%d)\n", s32Error);
6034 down(&hSemHostIFthrdEnd);
6036 wilc_mq_destroy(&gMsgQHostIF);
6039 down(&(pstrWFIDrv->gtOsCfgValuesSem));
6041 /*Setting the gloabl driver handler with NULL*/
6042 /* gWFiDrvHandle = NULL; */
6043 ret = remove_handler_in_list(pstrWFIDrv);
6047 if (pstrWFIDrv != NULL) {
6049 /* pstrWFIDrv=NULL; */
6053 clients_count--; /* Decrease number of created entities */
6054 terminated_handle = NULL;
6055 up(&hSemHostIntDeinit);
6061 * @brief NetworkInfoReceived
6062 * @details function to to be called when network info packet is received
6063 * @param[in] pu8Buffer the received packet
6064 * @param[in] u32Length length of the received packet
6071 void NetworkInfoReceived(u8 *pu8Buffer, u32 u32Length)
6074 struct host_if_msg msg;
6076 tstrWILC_WFIDrv *pstrWFIDrv = NULL;
6078 id = ((pu8Buffer[u32Length - 4]) | (pu8Buffer[u32Length - 3] << 8) | (pu8Buffer[u32Length - 2] << 16) | (pu8Buffer[u32Length - 1] << 24));
6079 pstrWFIDrv = get_handler_from_id(id);
6084 if (pstrWFIDrv == NULL || pstrWFIDrv == terminated_handle) {
6085 PRINT_ER("NetworkInfo received but driver not init[%p]\n", pstrWFIDrv);
6089 /* prepare the Asynchronous Network Info message */
6090 memset(&msg, 0, sizeof(struct host_if_msg));
6092 msg.id = HOST_IF_MSG_RCVD_NTWRK_INFO;
6093 msg.drvHandler = pstrWFIDrv;
6095 msg.body.net_info.u32Length = u32Length;
6096 msg.body.net_info.pu8Buffer = kmalloc(u32Length, GFP_KERNEL); /* will be deallocated by the receiving thread */
6097 memcpy(msg.body.net_info.pu8Buffer,
6098 pu8Buffer, u32Length);
6100 /* send the message */
6101 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6103 PRINT_ER("Error in sending network info message queue message parameters: Error(%d)\n", s32Error);
6107 * @brief GnrlAsyncInfoReceived
6108 * @details function to be called when general Asynchronous info packet is received
6109 * @param[in] pu8Buffer the received packet
6110 * @param[in] u32Length length of the received packet
6117 void GnrlAsyncInfoReceived(u8 *pu8Buffer, u32 u32Length)
6120 struct host_if_msg msg;
6122 tstrWILC_WFIDrv *pstrWFIDrv = NULL;
6124 down(&hSemHostIntDeinit);
6126 id = ((pu8Buffer[u32Length - 4]) | (pu8Buffer[u32Length - 3] << 8) | (pu8Buffer[u32Length - 2] << 16) | (pu8Buffer[u32Length - 1] << 24));
6127 pstrWFIDrv = get_handler_from_id(id);
6128 PRINT_D(HOSTINF_DBG, "General asynchronous info packet received\n");
6131 if (pstrWFIDrv == NULL || pstrWFIDrv == terminated_handle) {
6132 PRINT_D(HOSTINF_DBG, "Wifi driver handler is equal to NULL\n");
6133 up(&hSemHostIntDeinit);
6137 if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult == NULL) {
6138 /* received mac status is not needed when there is no current Connect Request */
6139 PRINT_ER("Received mac status is not needed when there is no current Connect Reques\n");
6140 up(&hSemHostIntDeinit);
6144 /* prepare the General Asynchronous Info message */
6145 memset(&msg, 0, sizeof(struct host_if_msg));
6148 msg.id = HOST_IF_MSG_RCVD_GNRL_ASYNC_INFO;
6149 msg.drvHandler = pstrWFIDrv;
6152 msg.body.async_info.u32Length = u32Length;
6153 msg.body.async_info.pu8Buffer = kmalloc(u32Length, GFP_KERNEL); /* will be deallocated by the receiving thread */
6154 memcpy(msg.body.async_info.pu8Buffer,
6155 pu8Buffer, u32Length);
6157 /* send the message */
6158 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6160 PRINT_ER("Error in sending message queue asynchronous message info: Error(%d)\n", s32Error);
6162 up(&hSemHostIntDeinit);
6166 * @brief host_int_ScanCompleteReceived
6167 * @details Setting scan complete received notifcation in message queue
6168 * @param[in] u8* pu8Buffer, u32 u32Length
6169 * @return Error code.
6174 void host_int_ScanCompleteReceived(u8 *pu8Buffer, u32 u32Length)
6177 struct host_if_msg msg;
6179 tstrWILC_WFIDrv *pstrWFIDrv = NULL;
6181 id = ((pu8Buffer[u32Length - 4]) | (pu8Buffer[u32Length - 3] << 8) | (pu8Buffer[u32Length - 2] << 16) | (pu8Buffer[u32Length - 1] << 24));
6182 pstrWFIDrv = get_handler_from_id(id);
6185 PRINT_D(GENERIC_DBG, "Scan notification received %p\n", pstrWFIDrv);
6187 if (pstrWFIDrv == NULL || pstrWFIDrv == terminated_handle)
6190 /*if there is an ongoing scan request*/
6191 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
6192 /* prepare theScan Done message */
6193 memset(&msg, 0, sizeof(struct host_if_msg));
6195 msg.id = HOST_IF_MSG_RCVD_SCAN_COMPLETE;
6196 msg.drvHandler = pstrWFIDrv;
6199 /* will be deallocated by the receiving thread */
6200 /*no need to send message body*/
6202 /*msg.body.strScanComplete.u32Length = u32Length;
6203 * msg.body.strScanComplete.pu8Buffer = (u8*)WILC_MALLOC(u32Length);
6204 * memcpy(msg.body.strScanComplete.pu8Buffer,
6205 * pu8Buffer, u32Length); */
6207 /* send the message */
6208 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6210 PRINT_ER("Error in sending message queue scan complete parameters: Error(%d)\n", s32Error);
6219 * @brief host_int_remain_on_channel
6221 * @param[in] Handle to wifi driver
6222 * Duration to remain on channel
6223 * Channel to remain on
6224 * Pointer to fn to be called on receive frames in listen state
6225 * Pointer to remain-on-channel expired fn
6227 * @return Error code.
6232 s32 host_int_remain_on_channel(tstrWILC_WFIDrv *hWFIDrv, u32 u32SessionID, u32 u32duration, u16 chan, wilc_remain_on_chan_expired RemainOnChanExpired, wilc_remain_on_chan_ready RemainOnChanReady, void *pvUserArg)
6235 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6236 struct host_if_msg msg;
6238 if (pstrWFIDrv == NULL) {
6239 PRINT_ER("driver is null\n");
6243 /* prepare the remainonchan Message */
6244 memset(&msg, 0, sizeof(struct host_if_msg));
6246 /* prepare the WiphyParams Message */
6247 msg.id = HOST_IF_MSG_REMAIN_ON_CHAN;
6248 msg.body.remain_on_ch.u16Channel = chan;
6249 msg.body.remain_on_ch.pRemainOnChanExpired = RemainOnChanExpired;
6250 msg.body.remain_on_ch.pRemainOnChanReady = RemainOnChanReady;
6251 msg.body.remain_on_ch.pVoid = pvUserArg;
6252 msg.body.remain_on_ch.u32duration = u32duration;
6253 msg.body.remain_on_ch.u32ListenSessionID = u32SessionID;
6254 msg.drvHandler = hWFIDrv;
6256 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6258 PRINT_ER("wilc mq send fail\n");
6264 * @brief host_int_ListenStateExpired
6266 * @param[in] Handle to wifi driver
6267 * Duration to remain on channel
6268 * Channel to remain on
6269 * Pointer to fn to be called on receive frames in listen state
6270 * Pointer to remain-on-channel expired fn
6272 * @return Error code.
6277 s32 host_int_ListenStateExpired(tstrWILC_WFIDrv *hWFIDrv, u32 u32SessionID)
6280 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6281 struct host_if_msg msg;
6283 if (pstrWFIDrv == NULL) {
6284 PRINT_ER("driver is null\n");
6288 /*Stopping remain-on-channel timer*/
6289 del_timer(&pstrWFIDrv->hRemainOnChannel);
6291 /* prepare the timer fire Message */
6292 memset(&msg, 0, sizeof(struct host_if_msg));
6293 msg.id = HOST_IF_MSG_LISTEN_TIMER_FIRED;
6294 msg.drvHandler = hWFIDrv;
6295 msg.body.remain_on_ch.u32ListenSessionID = u32SessionID;
6297 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6299 PRINT_ER("wilc mq send fail\n");
6305 * @brief host_int_frame_register
6307 * @param[in] Handle to wifi driver
6308 * @return Error code.
6312 s32 host_int_frame_register(tstrWILC_WFIDrv *hWFIDrv, u16 u16FrameType, bool bReg)
6315 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6316 struct host_if_msg msg;
6318 if (pstrWFIDrv == NULL) {
6319 PRINT_ER("driver is null\n");
6323 memset(&msg, 0, sizeof(struct host_if_msg));
6325 /* prepare the WiphyParams Message */
6326 msg.id = HOST_IF_MSG_REGISTER_FRAME;
6327 switch (u16FrameType) {
6329 PRINT_D(HOSTINF_DBG, "ACTION\n");
6330 msg.body.reg_frame.u8Regid = ACTION_FRM_IDX;
6334 PRINT_D(HOSTINF_DBG, "PROBE REQ\n");
6335 msg.body.reg_frame.u8Regid = PROBE_REQ_IDX;
6339 PRINT_D(HOSTINF_DBG, "Not valid frame type\n");
6342 msg.body.reg_frame.u16FrameType = u16FrameType;
6343 msg.body.reg_frame.bReg = bReg;
6344 msg.drvHandler = hWFIDrv;
6346 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6348 PRINT_ER("wilc mq send fail\n");
6356 * @brief host_int_add_beacon
6357 * @details Setting add beacon params in message queue
6358 * @param[in] WILC_WFIDrvHandle hWFIDrv, u32 u32Interval,
6359 * u32 u32DTIMPeriod,u32 u32HeadLen, u8* pu8Head,
6360 * u32 u32TailLen, u8* pu8Tail
6361 * @return Error code.
6366 s32 host_int_add_beacon(tstrWILC_WFIDrv *hWFIDrv, u32 u32Interval,
6368 u32 u32HeadLen, u8 *pu8Head,
6369 u32 u32TailLen, u8 *pu8Tail)
6372 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6373 struct host_if_msg msg;
6374 struct beacon_attr *pstrSetBeaconParam = &msg.body.beacon_info;
6376 if (pstrWFIDrv == NULL) {
6377 PRINT_ER("driver is null\n");
6381 memset(&msg, 0, sizeof(struct host_if_msg));
6383 PRINT_D(HOSTINF_DBG, "Setting adding beacon message queue params\n");
6386 /* prepare the WiphyParams Message */
6387 msg.id = HOST_IF_MSG_ADD_BEACON;
6388 msg.drvHandler = hWFIDrv;
6389 pstrSetBeaconParam->u32Interval = u32Interval;
6390 pstrSetBeaconParam->u32DTIMPeriod = u32DTIMPeriod;
6391 pstrSetBeaconParam->u32HeadLen = u32HeadLen;
6392 pstrSetBeaconParam->pu8Head = kmalloc(u32HeadLen, GFP_KERNEL);
6393 if (pstrSetBeaconParam->pu8Head == NULL) {
6397 memcpy(pstrSetBeaconParam->pu8Head, pu8Head, u32HeadLen);
6398 pstrSetBeaconParam->u32TailLen = u32TailLen;
6400 if (u32TailLen > 0) {
6401 pstrSetBeaconParam->pu8Tail = kmalloc(u32TailLen, GFP_KERNEL);
6402 if (pstrSetBeaconParam->pu8Tail == NULL) {
6406 memcpy(pstrSetBeaconParam->pu8Tail, pu8Tail, u32TailLen);
6408 pstrSetBeaconParam->pu8Tail = NULL;
6411 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6413 PRINT_ER("wilc mq send fail\n");
6417 if (pstrSetBeaconParam->pu8Head != NULL)
6418 kfree(pstrSetBeaconParam->pu8Head);
6420 if (pstrSetBeaconParam->pu8Tail != NULL)
6421 kfree(pstrSetBeaconParam->pu8Tail);
6430 * @brief host_int_del_beacon
6431 * @details Setting add beacon params in message queue
6432 * @param[in] WILC_WFIDrvHandle hWFIDrv
6433 * @return Error code.
6438 s32 host_int_del_beacon(tstrWILC_WFIDrv *hWFIDrv)
6441 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6442 struct host_if_msg msg;
6444 if (pstrWFIDrv == NULL) {
6445 PRINT_ER("driver is null\n");
6449 /* prepare the WiphyParams Message */
6450 msg.id = HOST_IF_MSG_DEL_BEACON;
6451 msg.drvHandler = hWFIDrv;
6452 PRINT_D(HOSTINF_DBG, "Setting deleting beacon message queue params\n");
6454 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6456 PRINT_ER("wilc_mq_send fail\n");
6463 * @brief host_int_add_station
6464 * @details Setting add station params in message queue
6465 * @param[in] WILC_WFIDrvHandle hWFIDrv, struct add_sta_param *pstrStaParams
6466 * @return Error code.
6471 s32 host_int_add_station(tstrWILC_WFIDrv *hWFIDrv,
6472 struct add_sta_param *pstrStaParams)
6475 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6476 struct host_if_msg msg;
6477 struct add_sta_param *pstrAddStationMsg = &msg.body.add_sta_info;
6480 if (pstrWFIDrv == NULL) {
6481 PRINT_ER("driver is null\n");
6485 memset(&msg, 0, sizeof(struct host_if_msg));
6487 PRINT_D(HOSTINF_DBG, "Setting adding station message queue params\n");
6490 /* prepare the WiphyParams Message */
6491 msg.id = HOST_IF_MSG_ADD_STATION;
6492 msg.drvHandler = hWFIDrv;
6494 memcpy(pstrAddStationMsg, pstrStaParams, sizeof(struct add_sta_param));
6495 if (pstrAddStationMsg->u8NumRates > 0) {
6496 u8 *rates = kmalloc(pstrAddStationMsg->u8NumRates, GFP_KERNEL);
6501 memcpy(rates, pstrStaParams->pu8Rates, pstrAddStationMsg->u8NumRates);
6502 pstrAddStationMsg->pu8Rates = rates;
6506 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6508 PRINT_ER("wilc_mq_send fail\n");
6513 * @brief host_int_del_station
6514 * @details Setting delete station params in message queue
6515 * @param[in] WILC_WFIDrvHandle hWFIDrv, u8* pu8MacAddr
6516 * @return Error code.
6521 s32 host_int_del_station(tstrWILC_WFIDrv *hWFIDrv, const u8 *pu8MacAddr)
6524 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6525 struct host_if_msg msg;
6526 struct del_sta *pstrDelStationMsg = &msg.body.del_sta_info;
6528 if (pstrWFIDrv == NULL) {
6529 PRINT_ER("driver is null\n");
6533 memset(&msg, 0, sizeof(struct host_if_msg));
6535 PRINT_D(HOSTINF_DBG, "Setting deleting station message queue params\n");
6539 /* prepare the WiphyParams Message */
6540 msg.id = HOST_IF_MSG_DEL_STATION;
6541 msg.drvHandler = hWFIDrv;
6543 if (pu8MacAddr == NULL)
6544 memset(pstrDelStationMsg->au8MacAddr, 255, ETH_ALEN);
6546 memcpy(pstrDelStationMsg->au8MacAddr, pu8MacAddr, ETH_ALEN);
6548 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6550 PRINT_ER("wilc_mq_send fail\n");
6554 * @brief host_int_del_allstation
6555 * @details Setting del station params in message queue
6556 * @param[in] WILC_WFIDrvHandle hWFIDrv, u8 pu8MacAddr[][ETH_ALEN]s
6557 * @return Error code.
6562 s32 host_int_del_allstation(tstrWILC_WFIDrv *hWFIDrv, u8 pu8MacAddr[][ETH_ALEN])
6565 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6566 struct host_if_msg msg;
6567 struct del_all_sta *pstrDelAllStationMsg = &msg.body.del_all_sta_info;
6568 u8 au8Zero_Buff[ETH_ALEN] = {0};
6573 if (pstrWFIDrv == NULL) {
6574 PRINT_ER("driver is null\n");
6578 memset(&msg, 0, sizeof(struct host_if_msg));
6580 PRINT_D(HOSTINF_DBG, "Setting deauthenticating station message queue params\n");
6582 /* prepare the WiphyParams Message */
6583 msg.id = HOST_IF_MSG_DEL_ALL_STA;
6584 msg.drvHandler = hWFIDrv;
6586 /* Handling situation of deauthenticing all associated stations*/
6587 for (i = 0; i < MAX_NUM_STA; i++) {
6588 if (memcmp(pu8MacAddr[i], au8Zero_Buff, ETH_ALEN)) {
6589 memcpy(pstrDelAllStationMsg->au8Sta_DelAllSta[i], pu8MacAddr[i], ETH_ALEN);
6590 PRINT_D(CFG80211_DBG, "BSSID = %x%x%x%x%x%x\n", pstrDelAllStationMsg->au8Sta_DelAllSta[i][0], pstrDelAllStationMsg->au8Sta_DelAllSta[i][1], pstrDelAllStationMsg->au8Sta_DelAllSta[i][2], pstrDelAllStationMsg->au8Sta_DelAllSta[i][3], pstrDelAllStationMsg->au8Sta_DelAllSta[i][4],
6591 pstrDelAllStationMsg->au8Sta_DelAllSta[i][5]);
6596 PRINT_D(CFG80211_DBG, "NO ASSOCIATED STAS\n");
6600 pstrDelAllStationMsg->u8Num_AssocSta = u8AssocNumb;
6601 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6605 PRINT_ER("wilc_mq_send fail\n");
6607 down(&hWaitResponse);
6614 * @brief host_int_edit_station
6615 * @details Setting edit station params in message queue
6616 * @param[in] WILC_WFIDrvHandle hWFIDrv, struct add_sta_param *pstrStaParams
6617 * @return Error code.
6622 s32 host_int_edit_station(tstrWILC_WFIDrv *hWFIDrv,
6623 struct add_sta_param *pstrStaParams)
6626 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6627 struct host_if_msg msg;
6628 struct add_sta_param *pstrAddStationMsg = &msg.body.add_sta_info;
6630 if (pstrWFIDrv == NULL) {
6631 PRINT_ER("driver is null\n");
6635 PRINT_D(HOSTINF_DBG, "Setting editing station message queue params\n");
6637 memset(&msg, 0, sizeof(struct host_if_msg));
6640 /* prepare the WiphyParams Message */
6641 msg.id = HOST_IF_MSG_EDIT_STATION;
6642 msg.drvHandler = hWFIDrv;
6644 memcpy(pstrAddStationMsg, pstrStaParams, sizeof(struct add_sta_param));
6645 if (pstrAddStationMsg->u8NumRates > 0) {
6646 u8 *rates = kmalloc(pstrAddStationMsg->u8NumRates, GFP_KERNEL);
6651 memcpy(rates, pstrStaParams->pu8Rates, pstrAddStationMsg->u8NumRates);
6652 pstrAddStationMsg->pu8Rates = rates;
6655 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6657 PRINT_ER("wilc_mq_send fail\n");
6662 s32 host_int_set_power_mgmt(tstrWILC_WFIDrv *hWFIDrv, bool bIsEnabled, u32 u32Timeout)
6665 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6666 struct host_if_msg msg;
6667 struct power_mgmt_param *pstrPowerMgmtParam = &msg.body.pwr_mgmt_info;
6669 PRINT_INFO(HOSTINF_DBG, "\n\n>> Setting PS to %d <<\n\n", bIsEnabled);
6671 if (pstrWFIDrv == NULL) {
6672 PRINT_ER("driver is null\n");
6676 PRINT_D(HOSTINF_DBG, "Setting Power management message queue params\n");
6678 memset(&msg, 0, sizeof(struct host_if_msg));
6681 /* prepare the WiphyParams Message */
6682 msg.id = HOST_IF_MSG_POWER_MGMT;
6683 msg.drvHandler = hWFIDrv;
6685 pstrPowerMgmtParam->bIsEnabled = bIsEnabled;
6686 pstrPowerMgmtParam->u32Timeout = u32Timeout;
6689 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6691 PRINT_ER("wilc_mq_send fail\n");
6695 s32 host_int_setup_multicast_filter(tstrWILC_WFIDrv *hWFIDrv, bool bIsEnabled, u32 u32count)
6699 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6700 struct host_if_msg msg;
6701 struct set_multicast *pstrMulticastFilterParam = &msg.body.multicast_info;
6704 if (pstrWFIDrv == NULL) {
6705 PRINT_ER("driver is null\n");
6709 PRINT_D(HOSTINF_DBG, "Setting Multicast Filter params\n");
6711 memset(&msg, 0, sizeof(struct host_if_msg));
6714 /* prepare the WiphyParams Message */
6715 msg.id = HOST_IF_MSG_SET_MULTICAST_FILTER;
6716 msg.drvHandler = hWFIDrv;
6718 pstrMulticastFilterParam->bIsEnabled = bIsEnabled;
6719 pstrMulticastFilterParam->u32count = u32count;
6721 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6723 PRINT_ER("wilc_mq_send fail\n");
6728 * @brief host_int_ParseJoinBssParam
6729 * @details Parse Needed Join Parameters and save it in a new JoinBssParam entry
6730 * @param[in] tstrNetworkInfo* ptstrNetworkInfo
6735 static void *host_int_ParseJoinBssParam(tstrNetworkInfo *ptstrNetworkInfo)
6737 tstrJoinBssParam *pNewJoinBssParam = NULL;
6746 u8 pcipherTotalCount = 0;
6747 u8 authTotalCount = 0;
6750 pu8IEs = ptstrNetworkInfo->pu8IEs;
6751 u16IEsLen = ptstrNetworkInfo->u16IEsLen;
6753 pNewJoinBssParam = kmalloc(sizeof(tstrJoinBssParam), GFP_KERNEL);
6754 if (pNewJoinBssParam != NULL) {
6755 memset(pNewJoinBssParam, 0, sizeof(tstrJoinBssParam));
6756 pNewJoinBssParam->dtim_period = ptstrNetworkInfo->u8DtimPeriod;
6757 pNewJoinBssParam->beacon_period = ptstrNetworkInfo->u16BeaconPeriod;
6758 pNewJoinBssParam->cap_info = ptstrNetworkInfo->u16CapInfo;
6759 memcpy(pNewJoinBssParam->au8bssid, ptstrNetworkInfo->au8bssid, 6);
6761 * PRINT_D(HOSTINF_DBG,"%c",pNewJoinBssParam->au8bssid[i]);*/
6762 memcpy((u8 *)pNewJoinBssParam->ssid, ptstrNetworkInfo->au8ssid, ptstrNetworkInfo->u8SsidLen + 1);
6763 pNewJoinBssParam->ssidLen = ptstrNetworkInfo->u8SsidLen;
6764 memset(pNewJoinBssParam->rsn_pcip_policy, 0xFF, 3);
6765 memset(pNewJoinBssParam->rsn_auth_policy, 0xFF, 3);
6766 /*for(i=0; i<pNewJoinBssParam->ssidLen;i++)
6767 * PRINT_D(HOSTINF_DBG,"%c",pNewJoinBssParam->ssid[i]);*/
6769 /* parse supported rates: */
6770 while (index < u16IEsLen) {
6771 /* supportedRates IE */
6772 if (pu8IEs[index] == SUPP_RATES_IE) {
6773 /* PRINT_D(HOSTINF_DBG, "Supported Rates\n"); */
6774 suppRatesNo = pu8IEs[index + 1];
6775 pNewJoinBssParam->supp_rates[0] = suppRatesNo;
6776 index += 2; /* skipping ID and length bytes; */
6778 for (i = 0; i < suppRatesNo; i++) {
6779 pNewJoinBssParam->supp_rates[i + 1] = pu8IEs[index + i];
6780 /* PRINT_D(HOSTINF_DBG,"%0x ",pNewJoinBssParam->supp_rates[i+1]); */
6782 index += suppRatesNo;
6785 /* Ext SupportedRates IE */
6786 else if (pu8IEs[index] == EXT_SUPP_RATES_IE) {
6787 /* PRINT_D(HOSTINF_DBG, "Extended Supported Rates\n"); */
6788 /* checking if no of ext. supp and supp rates < max limit */
6789 extSuppRatesNo = pu8IEs[index + 1];
6790 if (extSuppRatesNo > (MAX_RATES_SUPPORTED - suppRatesNo))
6791 pNewJoinBssParam->supp_rates[0] = MAX_RATES_SUPPORTED;
6793 pNewJoinBssParam->supp_rates[0] += extSuppRatesNo;
6795 /* pNewJoinBssParam.supp_rates[0] contains now old number not the ext. no */
6796 for (i = 0; i < (pNewJoinBssParam->supp_rates[0] - suppRatesNo); i++) {
6797 pNewJoinBssParam->supp_rates[suppRatesNo + i + 1] = pu8IEs[index + i];
6798 /* PRINT_D(HOSTINF_DBG,"%0x ",pNewJoinBssParam->supp_rates[suppRatesNo+i+1]); */
6800 index += extSuppRatesNo;
6804 else if (pu8IEs[index] == HT_CAPABILITY_IE) {
6805 /* if IE found set the flag */
6806 pNewJoinBssParam->ht_capable = true;
6807 index += pu8IEs[index + 1] + 2; /* ID,Length bytes and IE body */
6808 /* PRINT_D(HOSTINF_DBG,"HT_CAPABALE\n"); */
6810 } else if ((pu8IEs[index] == WMM_IE) && /* WMM Element ID */
6811 (pu8IEs[index + 2] == 0x00) && (pu8IEs[index + 3] == 0x50) &&
6812 (pu8IEs[index + 4] == 0xF2) && /* OUI */
6813 (pu8IEs[index + 5] == 0x02) && /* OUI Type */
6814 ((pu8IEs[index + 6] == 0x00) || (pu8IEs[index + 6] == 0x01)) && /* OUI Sub Type */
6815 (pu8IEs[index + 7] == 0x01)) {
6816 /* Presence of WMM Info/Param element indicates WMM capability */
6817 pNewJoinBssParam->wmm_cap = true;
6819 /* Check if Bit 7 is set indicating U-APSD capability */
6820 if (pu8IEs[index + 8] & BIT(7))
6821 pNewJoinBssParam->uapsd_cap = true;
6822 index += pu8IEs[index + 1] + 2;
6825 else if ((pu8IEs[index] == P2P_IE) && /* P2P Element ID */
6826 (pu8IEs[index + 2] == 0x50) && (pu8IEs[index + 3] == 0x6f) &&
6827 (pu8IEs[index + 4] == 0x9a) && /* OUI */
6828 (pu8IEs[index + 5] == 0x09) && (pu8IEs[index + 6] == 0x0c)) { /* OUI Type */
6831 pNewJoinBssParam->tsf = ptstrNetworkInfo->u32Tsf;
6832 pNewJoinBssParam->u8NoaEnbaled = 1;
6833 pNewJoinBssParam->u8Index = pu8IEs[index + 9];
6835 /* Check if Bit 7 is set indicating Opss capability */
6836 if (pu8IEs[index + 10] & BIT(7)) {
6837 pNewJoinBssParam->u8OppEnable = 1;
6838 pNewJoinBssParam->u8CtWindow = pu8IEs[index + 10];
6840 pNewJoinBssParam->u8OppEnable = 0;
6842 PRINT_D(GENERIC_DBG, "P2P Dump\n");
6843 for (i = 0; i < pu8IEs[index + 7]; i++)
6844 PRINT_D(GENERIC_DBG, " %x\n", pu8IEs[index + 9 + i]);
6846 pNewJoinBssParam->u8Count = pu8IEs[index + 11];
6847 u16P2P_count = index + 12;
6849 memcpy(pNewJoinBssParam->au8Duration, pu8IEs + u16P2P_count, 4);
6852 memcpy(pNewJoinBssParam->au8Interval, pu8IEs + u16P2P_count, 4);
6855 memcpy(pNewJoinBssParam->au8StartTime, pu8IEs + u16P2P_count, 4);
6857 index += pu8IEs[index + 1] + 2;
6861 else if ((pu8IEs[index] == RSN_IE) ||
6862 ((pu8IEs[index] == WPA_IE) && (pu8IEs[index + 2] == 0x00) &&
6863 (pu8IEs[index + 3] == 0x50) && (pu8IEs[index + 4] == 0xF2) &&
6864 (pu8IEs[index + 5] == 0x01))) {
6865 u16 rsnIndex = index;
6866 /*PRINT_D(HOSTINF_DBG,"RSN IE Length:%d\n",pu8IEs[rsnIndex+1]);
6867 * for(i=0; i<pu8IEs[rsnIndex+1]; i++)
6869 * PRINT_D(HOSTINF_DBG,"%0x ",pu8IEs[rsnIndex+2+i]);
6871 if (pu8IEs[rsnIndex] == RSN_IE) {
6872 pNewJoinBssParam->mode_802_11i = 2;
6873 /* PRINT_D(HOSTINF_DBG,"\nRSN_IE\n"); */
6874 } else { /* check if rsn was previously parsed */
6875 if (pNewJoinBssParam->mode_802_11i == 0)
6876 pNewJoinBssParam->mode_802_11i = 1;
6877 /* PRINT_D(HOSTINF_DBG,"\nWPA_IE\n"); */
6880 rsnIndex += 7; /* skipping id, length, version(2B) and first 3 bytes of gcipher */
6881 pNewJoinBssParam->rsn_grp_policy = pu8IEs[rsnIndex];
6883 /* PRINT_D(HOSTINF_DBG,"Group Policy: %0x\n",pNewJoinBssParam->rsn_grp_policy); */
6884 /* initialize policies with invalid values */
6886 jumpOffset = pu8IEs[rsnIndex] * 4; /* total no.of bytes of pcipher field (count*4) */
6888 /*parsing pairwise cipher*/
6890 /* saving 3 pcipher max. */
6891 pcipherCount = (pu8IEs[rsnIndex] > 3) ? 3 : pu8IEs[rsnIndex];
6892 rsnIndex += 2; /* jump 2 bytes of pcipher count */
6894 /* PRINT_D(HOSTINF_DBG,"\npcipher:%d\n",pcipherCount); */
6895 for (i = pcipherTotalCount, j = 0; i < pcipherCount + pcipherTotalCount && i < 3; i++, j++) {
6896 /* each count corresponds to 4 bytes, only last byte is saved */
6897 pNewJoinBssParam->rsn_pcip_policy[i] = pu8IEs[rsnIndex + ((j + 1) * 4) - 1];
6898 /* PRINT_D(HOSTINF_DBG,"PAIR policy = [%0x,%0x]\n",pNewJoinBssParam->rsn_pcip_policy[i],i); */
6900 pcipherTotalCount += pcipherCount;
6901 rsnIndex += jumpOffset;
6903 jumpOffset = pu8IEs[rsnIndex] * 4;
6905 /*parsing AKM suite (auth_policy)*/
6906 /* saving 3 auth policies max. */
6907 authCount = (pu8IEs[rsnIndex] > 3) ? 3 : pu8IEs[rsnIndex];
6908 rsnIndex += 2; /* jump 2 bytes of pcipher count */
6910 for (i = authTotalCount, j = 0; i < authTotalCount + authCount; i++, j++) {
6911 /* each count corresponds to 4 bytes, only last byte is saved */
6912 pNewJoinBssParam->rsn_auth_policy[i] = pu8IEs[rsnIndex + ((j + 1) * 4) - 1];
6914 authTotalCount += authCount;
6915 rsnIndex += jumpOffset;
6916 /*pasring rsn cap. only if rsn IE*/
6917 if (pu8IEs[index] == RSN_IE) {
6918 pNewJoinBssParam->rsn_cap[0] = pu8IEs[rsnIndex];
6919 pNewJoinBssParam->rsn_cap[1] = pu8IEs[rsnIndex + 1];
6922 pNewJoinBssParam->rsn_found = true;
6923 index += pu8IEs[index + 1] + 2; /* ID,Length bytes and IE body */
6926 index += pu8IEs[index + 1] + 2; /* ID,Length bytes and IE body */
6933 return (void *)pNewJoinBssParam;
6937 void host_int_freeJoinParams(void *pJoinParams)
6939 if ((tstrJoinBssParam *)pJoinParams != NULL)
6940 kfree((tstrJoinBssParam *)pJoinParams);
6942 PRINT_ER("Unable to FREE null pointer\n");
6945 s32 host_int_delBASession(tstrWILC_WFIDrv *hWFIDrv, char *pBSSID, char TID)
6948 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6949 struct host_if_msg msg;
6950 struct ba_session_info *pBASessionInfo = &msg.body.session_info;
6952 if (pstrWFIDrv == NULL) {
6953 PRINT_ER("driver is null\n");
6957 memset(&msg, 0, sizeof(struct host_if_msg));
6959 /* prepare the WiphyParams Message */
6960 msg.id = HOST_IF_MSG_DEL_BA_SESSION;
6962 memcpy(pBASessionInfo->au8Bssid, pBSSID, ETH_ALEN);
6963 pBASessionInfo->u8Ted = TID;
6964 msg.drvHandler = hWFIDrv;
6966 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6968 PRINT_ER("wilc_mq_send fail\n");
6970 down(&hWaitResponse);
6975 s32 host_int_del_All_Rx_BASession(tstrWILC_WFIDrv *hWFIDrv, char *pBSSID, char TID)
6978 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
6979 struct host_if_msg msg;
6980 struct ba_session_info *pBASessionInfo = &msg.body.session_info;
6982 if (pstrWFIDrv == NULL) {
6983 PRINT_ER("driver is null\n");
6987 memset(&msg, 0, sizeof(struct host_if_msg));
6989 /* prepare the WiphyParams Message */
6990 msg.id = HOST_IF_MSG_DEL_ALL_RX_BA_SESSIONS;
6992 memcpy(pBASessionInfo->au8Bssid, pBSSID, ETH_ALEN);
6993 pBASessionInfo->u8Ted = TID;
6994 msg.drvHandler = hWFIDrv;
6996 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6998 PRINT_ER("wilc_mq_send fail\n");
7000 down(&hWaitResponse);
7006 * @brief host_int_setup_ipaddress
7007 * @details setup IP in firmware
7008 * @param[in] Handle to wifi driver
7009 * @return Error code.
7010 * @author Abdelrahman Sobhy
7013 s32 host_int_setup_ipaddress(tstrWILC_WFIDrv *hWFIDrv, u8 *u16ipadd, u8 idx)
7016 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
7017 struct host_if_msg msg;
7019 /* TODO: Enable This feature on softap firmware */
7022 if (pstrWFIDrv == NULL) {
7023 PRINT_ER("driver is null\n");
7027 memset(&msg, 0, sizeof(struct host_if_msg));
7029 /* prepare the WiphyParams Message */
7030 msg.id = HOST_IF_MSG_SET_IPADDRESS;
7032 msg.body.ip_info.au8IPAddr = u16ipadd;
7033 msg.drvHandler = hWFIDrv;
7034 msg.body.ip_info.idx = idx;
7036 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
7038 PRINT_ER("wilc_mq_send fail\n");
7046 * @brief host_int_get_ipaddress
7047 * @details Get IP from firmware
7048 * @param[in] Handle to wifi driver
7049 * @return Error code.
7050 * @author Abdelrahman Sobhy
7053 s32 host_int_get_ipaddress(tstrWILC_WFIDrv *hWFIDrv, u8 *u16ipadd, u8 idx)
7056 tstrWILC_WFIDrv *pstrWFIDrv = (tstrWILC_WFIDrv *)hWFIDrv;
7057 struct host_if_msg msg;
7059 if (pstrWFIDrv == NULL) {
7060 PRINT_ER("driver is null\n");
7064 memset(&msg, 0, sizeof(struct host_if_msg));
7066 /* prepare the WiphyParams Message */
7067 msg.id = HOST_IF_MSG_GET_IPADDRESS;
7069 msg.body.ip_info.au8IPAddr = u16ipadd;
7070 msg.drvHandler = hWFIDrv;
7071 msg.body.ip_info.idx = idx;
7073 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
7075 PRINT_ER("wilc_mq_send fail\n");