1 #include <linux/slab.h>
2 #include <linux/time.h>
3 #include <linux/kthread.h>
4 #include <linux/delay.h>
5 #include "host_interface.h"
6 #include "coreconfigurator.h"
7 #include "wilc_wlan_if.h"
8 #include "wilc_msgqueue.h"
9 #include <linux/etherdevice.h>
13 extern struct timer_list hDuringIpTimer;
15 extern u8 g_wilc_initialized;
17 /* Message types of the Host IF Message Queue*/
18 #define HOST_IF_MSG_SCAN 0
19 #define HOST_IF_MSG_CONNECT 1
20 #define HOST_IF_MSG_RCVD_GNRL_ASYNC_INFO 2
21 #define HOST_IF_MSG_KEY 3
22 #define HOST_IF_MSG_RCVD_NTWRK_INFO 4
23 #define HOST_IF_MSG_RCVD_SCAN_COMPLETE 5
24 #define HOST_IF_MSG_CFG_PARAMS 6
25 #define HOST_IF_MSG_SET_CHANNEL 7
26 #define HOST_IF_MSG_DISCONNECT 8
27 #define HOST_IF_MSG_GET_RSSI 9
28 #define HOST_IF_MSG_GET_CHNL 10
29 #define HOST_IF_MSG_ADD_BEACON 11
30 #define HOST_IF_MSG_DEL_BEACON 12
31 #define HOST_IF_MSG_ADD_STATION 13
32 #define HOST_IF_MSG_DEL_STATION 14
33 #define HOST_IF_MSG_EDIT_STATION 15
34 #define HOST_IF_MSG_SCAN_TIMER_FIRED 16
35 #define HOST_IF_MSG_CONNECT_TIMER_FIRED 17
36 #define HOST_IF_MSG_POWER_MGMT 18
37 #define HOST_IF_MSG_GET_INACTIVETIME 19
38 #define HOST_IF_MSG_REMAIN_ON_CHAN 20
39 #define HOST_IF_MSG_REGISTER_FRAME 21
40 #define HOST_IF_MSG_LISTEN_TIMER_FIRED 22
41 #define HOST_IF_MSG_GET_LINKSPEED 23
42 #define HOST_IF_MSG_SET_WFIDRV_HANDLER 24
43 #define HOST_IF_MSG_SET_MAC_ADDRESS 25
44 #define HOST_IF_MSG_GET_MAC_ADDRESS 26
45 #define HOST_IF_MSG_SET_OPERATION_MODE 27
46 #define HOST_IF_MSG_SET_IPADDRESS 28
47 #define HOST_IF_MSG_GET_IPADDRESS 29
48 #define HOST_IF_MSG_FLUSH_CONNECT 30
49 #define HOST_IF_MSG_GET_STATISTICS 31
50 #define HOST_IF_MSG_SET_MULTICAST_FILTER 32
51 #define HOST_IF_MSG_ADD_BA_SESSION 33
52 #define HOST_IF_MSG_DEL_BA_SESSION 34
53 #define HOST_IF_MSG_Q_IDLE 35
54 #define HOST_IF_MSG_DEL_ALL_STA 36
55 #define HOST_IF_MSG_DEL_ALL_RX_BA_SESSIONS 34
56 #define HOST_IF_MSG_EXIT 100
58 #define HOST_IF_SCAN_TIMEOUT 4000
59 #define HOST_IF_CONNECT_TIMEOUT 9500
61 #define BA_SESSION_DEFAULT_BUFFER_SIZE 16
62 #define BA_SESSION_DEFAULT_TIMEOUT 1000
63 #define BLOCK_ACK_REQ_SIZE 0x14
66 * @struct cfg_param_attr
67 * @brief Structure to hold Host IF CFG Params Attributes
71 * @author Mai Daftedar
75 struct cfg_param_attr {
76 struct cfg_param_val pstrCfgParamVal;
80 * @struct host_if_wpa_attr
81 * @brief Structure to hold Host IF Scan Attributes
85 * @author Mai Daftedar
89 struct host_if_wpa_attr {
101 * @struct host_if_wep_attr
102 * @brief Structure to hold Host IF Scan Attributes
106 * @author Mai Daftedar
107 * @date 25 March 2012
110 struct host_if_wep_attr {
115 enum AUTHTYPE tenuAuth_type;
119 * @struct host_if_key_attr
120 * @brief Structure to hold Host IF Scan Attributes
124 * @author Mai Daftedar
125 * @date 25 March 2012
128 union host_if_key_attr {
129 struct host_if_wep_attr strHostIFwepAttr;
130 struct host_if_wpa_attr strHostIFwpaAttr;
131 struct host_if_pmkid_attr strHostIFpmkidAttr;
136 * @brief Structure to hold Host IF Scan Attributes
140 * @author Mai Daftedar
141 * @date 25 March 2012
145 enum KEY_TYPE enuKeyType;
147 union host_if_key_attr uniHostIFkeyAttr;
155 * @brief Structure to hold Host IF Scan Attributes
159 * @author Mostafa Abu Bakr
160 * @date 25 March 2012
170 wilc_scan_result pfScanResult;
172 struct hidden_network strHiddenNetwork;
176 * @struct connect_attr
177 * @brief Structure to hold Host IF Connect Attributes
181 * @author Mostafa Abu Bakr
182 * @date 25 March 2012
185 struct connect_attr {
192 wilc_connect_result pfConnectResult;
194 enum AUTHTYPE tenuAuth_type;
200 * @struct rcvd_async_info
201 * @brief Structure to hold Received General Asynchronous info
205 * @author Mostafa Abu Bakr
206 * @date 25 March 2012
209 struct rcvd_async_info {
215 * @struct channel_attr
216 * @brief Set Channel message body
220 * @author Mai Daftedar
221 * @date 25 March 2012
224 struct channel_attr {
229 * @struct tstrScanComplete
230 * @brief hold received Async. Scan Complete message body
235 * @date 25 March 2012
238 /*typedef struct _tstrScanComplete
242 * } tstrScanComplete;*/
245 * @struct beacon_attr
246 * @brief Set Beacon message body
250 * @author Adham Abozaeid
255 u32 u32Interval; /*!< Beacon Interval. Period between two successive beacons on air */
256 u32 u32DTIMPeriod; /*!< DTIM Period. Indicates how many Beacon frames
257 * (including the current frame) appear before the next DTIM */
258 u32 u32HeadLen; /*!< Length of the head buffer in bytes */
259 u8 *pu8Head; /*!< Pointer to the beacon's head buffer. Beacon's head is the part
260 * from the beacon's start till the TIM element, NOT including the TIM */
261 u32 u32TailLen; /*!< Length of the tail buffer in bytes */
262 u8 *pu8Tail; /*!< Pointer to the beacon's tail buffer. Beacon's tail starts just
263 * after the TIM inormation element */
267 * @struct set_multicast
268 * @brief set Multicast filter Address
272 * @author Abdelrahman Sobhy
273 * @date 30 August 2013
274 * @version 1.0 Description
277 struct set_multicast {
283 * @struct del_all_sta
284 * @brief Deauth station message body
288 * @author Mai Daftedar
289 * @date 09 April 2014
290 * @version 1.0 Description
293 u8 au8Sta_DelAllSta[MAX_NUM_STA][ETH_ALEN];
299 * @brief Delete station message body
303 * @author Adham Abozaeid
305 * @version 1.0 Description
308 u8 au8MacAddr[ETH_ALEN];
312 * @struct power_mgmt_param
313 * @brief Power management message body
317 * @author Adham Abozaeid
318 * @date 24 November 2012
321 struct power_mgmt_param {
328 * @struct set_ip_addr
329 * @brief set IP Address message body
333 * @author Abdelrahman Sobhy
334 * @date 30 August 2013
335 * @version 1.0 Description
343 * @struct sta_inactive_t
344 * @brief Get station message body
348 * @author Mai Daftedar
349 * @date 16 April 2013
352 struct sta_inactive_t {
357 * @union message_body
358 * @brief Message body for the Host Interface message_q
362 * @author Mostafa Abu Bakr
363 * @date 25 March 2012
367 struct scan_attr scan_info;
368 struct connect_attr con_info;
369 struct rcvd_net_info net_info;
370 struct rcvd_async_info async_info;
371 struct key_attr key_info;
372 struct cfg_param_attr cfg_info;
373 struct channel_attr channel_info;
374 struct beacon_attr beacon_info;
375 struct add_sta_param add_sta_info;
376 struct del_sta del_sta_info;
377 struct add_sta_param edit_sta_info;
378 struct power_mgmt_param pwr_mgmt_info;
379 struct sta_inactive_t mac_info;
380 struct set_ip_addr ip_info;
381 struct drv_handler drv;
382 struct set_multicast multicast_info;
384 struct set_mac_addr set_mac_info;
385 struct get_mac_addr get_mac_info;
386 struct ba_session_info session_info;
387 struct remain_ch remain_on_ch;
388 struct reg_frame reg_frame;
390 struct del_all_sta del_all_sta_info;
394 * @struct struct host_if_msg
395 * @brief Host Interface message
399 * @author Mostafa Abu Bakr
400 * @date 25 March 2012
404 u16 id; /*!< Message ID */
405 union message_body body; /*!< Message body */
406 struct host_if_drv *drv;
409 typedef struct _tstrWidJoinReqExt {
410 char SSID[MAX_SSID_LEN];
415 /*Struct containg joinParam of each AP*/
416 typedef struct _tstrJoinBssParam {
422 char ssid[MAX_SSID_LEN];
424 u8 supp_rates[MAX_RATES_SUPPORTED + 1];
431 u8 rsn_pcip_policy[3];
432 u8 rsn_auth_policy[3];
434 struct _tstrJoinParam *nextJoinBss;
445 /*a linked list table containing needed join parameters entries for each AP found in most recent scan*/
446 typedef struct _tstrBssTable {
448 tstrJoinBssParam *head;
449 tstrJoinBssParam *tail;
455 SCAN_CONNECT_TIMER_FORCE_32BIT = 0xFFFFFFFF
458 /*****************************************************************************/
460 /* Global Variabls */
462 /*****************************************************************************/
463 /* Zero is not used, because a zero ID means termination */
464 static struct host_if_drv *wfidrv_list[NUM_CONCURRENT_IFC + 1];
465 struct host_if_drv *terminated_handle;
466 struct host_if_drv *gWFiDrvHandle;
467 bool g_obtainingIP = false;
469 static struct task_struct *HostIFthreadHandler;
470 static WILC_MsgQueueHandle gMsgQHostIF;
471 static struct semaphore hSemHostIFthrdEnd;
473 struct semaphore hSemDeinitDrvHandle;
474 static struct semaphore hWaitResponse;
475 struct semaphore hSemHostIntDeinit;
476 struct timer_list g_hPeriodicRSSI;
480 u8 gau8MulticastMacAddrList[WILC_MULTICAST_TABLE_SIZE][ETH_ALEN];
482 static u8 gapu8RcvdAssocResp[MAX_ASSOC_RESP_FRAME_SIZE];
484 bool gbScanWhileConnected = false;
489 static u8 gs8SetIP[2][4];
490 static u8 gs8GetIP[2][4];
491 static u32 gu32InactiveTime;
493 static u32 gu32WidConnRstHack;
495 u8 *gu8FlushedJoinReq;
496 u8 *gu8FlushedInfoElemAsoc;
497 u8 gu8Flushed11iMode;
498 u8 gu8FlushedAuthType;
499 u32 gu32FlushedJoinReqSize;
500 u32 gu32FlushedInfoElemAsocSize;
501 struct host_if_drv *gu8FlushedJoinReqDrvHandler;
502 #define REAL_JOIN_REQ 0
503 #define FLUSHED_JOIN_REQ 1
504 #define FLUSHED_BYTE_POS 79 /* Position the byte indicating flushing in the flushed request */
506 static void *host_int_ParseJoinBssParam(tstrNetworkInfo *ptstrNetworkInfo);
508 extern void chip_sleep_manually(u32 u32SleepTime);
509 extern int linux_wlan_get_num_conn_ifcs(void);
511 static int add_handler_in_list(struct host_if_drv *handler)
515 for (i = 1; i < ARRAY_SIZE(wfidrv_list); i++) {
516 if (!wfidrv_list[i]) {
517 wfidrv_list[i] = handler;
525 static int remove_handler_in_list(struct host_if_drv *handler)
529 for (i = 1; i < ARRAY_SIZE(wfidrv_list); i++) {
530 if (wfidrv_list[i] == handler) {
531 wfidrv_list[i] = NULL;
539 static int get_id_from_handler(struct host_if_drv *handler)
546 for (i = 1; i < ARRAY_SIZE(wfidrv_list); i++) {
547 if (wfidrv_list[i] == handler)
554 static struct host_if_drv *get_handler_from_id(int id)
556 if (id <= 0 || id >= ARRAY_SIZE(wfidrv_list))
558 return wfidrv_list[id];
562 * @brief Handle_SetChannel
563 * @details Sending config packet to firmware to set channel
564 * @param[in] struct channel_attr *pstrHostIFSetChan
565 * @return Error code.
570 static s32 Handle_SetChannel(struct host_if_drv *drvHandler,
571 struct channel_attr *pstrHostIFSetChan)
576 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
578 /*prepare configuration packet*/
579 strWID.id = (u16)WID_CURRENT_CHANNEL;
580 strWID.type = WID_CHAR;
581 strWID.ps8WidVal = (char *)&(pstrHostIFSetChan->u8SetChan);
582 strWID.size = sizeof(char);
584 PRINT_D(HOSTINF_DBG, "Setting channel\n");
586 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
587 get_id_from_handler(pstrWFIDrv));
589 PRINT_ER("Failed to set channel\n");
596 * @brief Handle_SetWfiDrvHandler
597 * @details Sending config packet to firmware to set driver handler
598 * @param[in] void * drvHandler,
599 * struct drv_handler *pstrHostIfSetDrvHandler
600 * @return Error code.
605 static s32 Handle_SetWfiDrvHandler(struct host_if_drv *drvHandler,
606 struct drv_handler *pstrHostIfSetDrvHandler)
611 struct host_if_drv *pstrWFIDrv = drvHandler;
614 /*prepare configuration packet*/
615 strWID.id = (u16)WID_SET_DRV_HANDLER;
616 strWID.type = WID_INT;
617 strWID.ps8WidVal = (s8 *)&(pstrHostIfSetDrvHandler->u32Address);
618 strWID.size = sizeof(u32);
622 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
623 pstrHostIfSetDrvHandler->u32Address);
625 if (pstrWFIDrv == NULL)
626 up(&hSemDeinitDrvHandle);
630 PRINT_ER("Failed to set driver handler\n");
638 * @brief Handle_SetWfiAPDrvHandler
639 * @details Sending config packet to firmware to set driver handler
640 * @param[in] void * drvHandler,tstrHostIfSetDrvHandler* pstrHostIfSetDrvHandler
641 * @return Error code.
646 static s32 Handle_SetOperationMode(struct host_if_drv *drvHandler,
647 struct op_mode *pstrHostIfSetOperationMode)
652 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
655 /*prepare configuration packet*/
656 strWID.id = (u16)WID_SET_OPERATION_MODE;
657 strWID.type = WID_INT;
658 strWID.ps8WidVal = (s8 *)&(pstrHostIfSetOperationMode->u32Mode);
659 strWID.size = sizeof(u32);
662 PRINT_INFO(HOSTINF_DBG, "pstrWFIDrv= %p\n", pstrWFIDrv);
664 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
665 get_id_from_handler(pstrWFIDrv));
668 if ((pstrHostIfSetOperationMode->u32Mode) == IDLE_MODE)
669 up(&hSemDeinitDrvHandle);
673 PRINT_ER("Failed to set driver handler\n");
681 * @brief host_int_set_IPAddress
682 * @details Setting IP address params in message queue
683 * @param[in] WILC_WFIDrvHandle hWFIDrv, u8* pu8IPAddr
684 * @return Error code.
689 s32 Handle_set_IPAddress(struct host_if_drv *drvHandler, u8 *pu8IPAddr, u8 idx)
694 char firmwareIPAddress[4] = {0};
695 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
697 if (pu8IPAddr[0] < 192)
700 PRINT_INFO(HOSTINF_DBG, "Indx = %d, Handling set IP = %pI4\n", idx, pu8IPAddr);
702 memcpy(gs8SetIP[idx], pu8IPAddr, IP_ALEN);
704 /*prepare configuration packet*/
705 strWID.id = (u16)WID_IP_ADDRESS;
706 strWID.type = WID_STR;
707 strWID.ps8WidVal = (u8 *)pu8IPAddr;
708 strWID.size = IP_ALEN;
710 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
711 get_id_from_handler(pstrWFIDrv));
714 host_int_get_ipaddress(drvHandler, firmwareIPAddress, idx);
717 PRINT_ER("Failed to set IP address\n");
721 PRINT_INFO(HOSTINF_DBG, "IP address set\n");
728 * @brief Handle_get_IPAddress
729 * @details Setting IP address params in message queue
730 * @param[in] WILC_WFIDrvHandle hWFIDrv, u8* pu8IPAddr
731 * @return Error code.
736 s32 Handle_get_IPAddress(struct host_if_drv *drvHandler, u8 *pu8IPAddr, u8 idx)
741 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
743 /*prepare configuration packet*/
744 strWID.id = (u16)WID_IP_ADDRESS;
745 strWID.type = WID_STR;
746 strWID.ps8WidVal = kmalloc(IP_ALEN, GFP_KERNEL);
747 strWID.size = IP_ALEN;
749 s32Error = send_config_pkt(GET_CFG, &strWID, 1,
750 get_id_from_handler(pstrWFIDrv));
752 PRINT_INFO(HOSTINF_DBG, "%pI4\n", strWID.ps8WidVal);
754 memcpy(gs8GetIP[idx], strWID.ps8WidVal, IP_ALEN);
756 /*get the value by searching the local copy*/
757 kfree(strWID.ps8WidVal);
759 if (memcmp(gs8GetIP[idx], gs8SetIP[idx], IP_ALEN) != 0)
760 host_int_setup_ipaddress(pstrWFIDrv, gs8SetIP[idx], idx);
763 PRINT_ER("Failed to get IP address\n");
767 PRINT_INFO(HOSTINF_DBG, "IP address retrieved:: u8IfIdx = %d\n", idx);
768 PRINT_INFO(HOSTINF_DBG, "%pI4\n", gs8GetIP[idx]);
769 PRINT_INFO(HOSTINF_DBG, "\n");
776 * @brief Handle_SetMacAddress
777 * @details Setting mac address
778 * @param[in] void * drvHandler,tstrHostIfSetDrvHandler* pstrHostIfSetDrvHandler
779 * @return Error code.
780 * @author Amr Abdel-Moghny
781 * @date November 2013
784 static s32 Handle_SetMacAddress(struct host_if_drv *drvHandler,
785 struct set_mac_addr *pstrHostIfSetMacAddress)
790 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
791 u8 *mac_buf = kmalloc(ETH_ALEN, GFP_KERNEL);
793 if (mac_buf == NULL) {
794 PRINT_ER("No buffer to send mac address\n");
797 memcpy(mac_buf, pstrHostIfSetMacAddress->u8MacAddress, ETH_ALEN);
799 /*prepare configuration packet*/
800 strWID.id = (u16)WID_MAC_ADDR;
801 strWID.type = WID_STR;
802 strWID.ps8WidVal = mac_buf;
803 strWID.size = ETH_ALEN;
804 PRINT_D(GENERIC_DBG, "mac addr = :%pM\n", strWID.ps8WidVal);
806 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
807 get_id_from_handler(pstrWFIDrv));
809 PRINT_ER("Failed to set mac address\n");
819 * @brief Handle_GetMacAddress
820 * @details Getting mac address
821 * @param[in] void * drvHandler,tstrHostIfSetDrvHandler* pstrHostIfSetDrvHandler
822 * @return Error code.
823 * @author Amr Abdel-Moghny
827 static s32 Handle_GetMacAddress(struct host_if_drv *drvHandler,
828 struct get_mac_addr *pstrHostIfGetMacAddress)
834 /*prepare configuration packet*/
835 strWID.id = (u16)WID_MAC_ADDR;
836 strWID.type = WID_STR;
837 strWID.ps8WidVal = pstrHostIfGetMacAddress->u8MacAddress;
838 strWID.size = ETH_ALEN;
841 s32Error = send_config_pkt(GET_CFG, &strWID, 1,
842 get_id_from_handler(drvHandler));
844 PRINT_ER("Failed to get mac address\n");
854 * @brief Handle_CfgParam
855 * @details Sending config packet to firmware to set CFG params
856 * @param[in] struct cfg_param_attr *strHostIFCfgParamAttr
857 * @return Error code.
862 static s32 Handle_CfgParam(struct host_if_drv *drvHandler,
863 struct cfg_param_attr *strHostIFCfgParamAttr)
866 struct wid strWIDList[32];
868 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
871 down(&(pstrWFIDrv->gtOsCfgValuesSem));
874 PRINT_D(HOSTINF_DBG, "Setting CFG params\n");
876 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & BSS_TYPE) {
877 /*----------------------------------------------------------*/
878 /*Input Value: INFRASTRUCTURE = 1, */
879 /* INDEPENDENT= 2, */
881 /*----------------------------------------------------------*/
882 /* validate input then copy>> need to check value 4 and 5 */
883 if (strHostIFCfgParamAttr->pstrCfgParamVal.bss_type < 6) {
884 strWIDList[u8WidCnt].id = WID_BSS_TYPE;
885 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.bss_type;
886 strWIDList[u8WidCnt].type = WID_CHAR;
887 strWIDList[u8WidCnt].size = sizeof(char);
888 pstrWFIDrv->strCfgValues.bss_type = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.bss_type;
890 PRINT_ER("check value 6 over\n");
896 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & AUTH_TYPE) {
897 /*------------------------------------------------------*/
898 /*Input Values: OPEN_SYSTEM = 0, */
899 /* SHARED_KEY = 1, */
901 /*------------------------------------------------------*/
902 /*validate Possible values*/
903 if ((strHostIFCfgParamAttr->pstrCfgParamVal.auth_type) == 1 || (strHostIFCfgParamAttr->pstrCfgParamVal.auth_type) == 2 || (strHostIFCfgParamAttr->pstrCfgParamVal.auth_type) == 5) {
904 strWIDList[u8WidCnt].id = WID_AUTH_TYPE;
905 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.auth_type;
906 strWIDList[u8WidCnt].type = WID_CHAR;
907 strWIDList[u8WidCnt].size = sizeof(char);
908 pstrWFIDrv->strCfgValues.auth_type = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.auth_type;
910 PRINT_ER("Impossible value \n");
916 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & AUTHEN_TIMEOUT) {
917 /* range is 1 to 65535. */
918 if (strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout < 65536) {
919 strWIDList[u8WidCnt].id = WID_AUTH_TIMEOUT;
920 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout;
921 strWIDList[u8WidCnt].type = WID_SHORT;
922 strWIDList[u8WidCnt].size = sizeof(u16);
923 pstrWFIDrv->strCfgValues.auth_timeout = strHostIFCfgParamAttr->pstrCfgParamVal.auth_timeout;
925 PRINT_ER("Range(1 ~ 65535) over\n");
931 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & POWER_MANAGEMENT) {
932 /*-----------------------------------------------------------*/
933 /*Input Values: NO_POWERSAVE = 0, */
934 /* MIN_FAST_PS = 1, */
935 /* MAX_FAST_PS = 2, */
936 /* MIN_PSPOLL_PS = 3, */
937 /* MAX_PSPOLL_PS = 4 */
938 /*----------------------------------------------------------*/
939 if (strHostIFCfgParamAttr->pstrCfgParamVal.power_mgmt_mode < 5) {
940 strWIDList[u8WidCnt].id = WID_POWER_MANAGEMENT;
941 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.power_mgmt_mode;
942 strWIDList[u8WidCnt].type = WID_CHAR;
943 strWIDList[u8WidCnt].size = sizeof(char);
944 pstrWFIDrv->strCfgValues.power_mgmt_mode = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.power_mgmt_mode;
946 PRINT_ER("Invalide power mode\n");
952 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & RETRY_SHORT) {
953 /* range from 1 to 256 */
954 if ((strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit > 0) && (strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit < 256)) {
955 strWIDList[u8WidCnt].id = WID_SHORT_RETRY_LIMIT;
956 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit;
957 strWIDList[u8WidCnt].type = WID_SHORT;
958 strWIDList[u8WidCnt].size = sizeof(u16);
959 pstrWFIDrv->strCfgValues.short_retry_limit = strHostIFCfgParamAttr->pstrCfgParamVal.short_retry_limit;
961 PRINT_ER("Range(1~256) over\n");
967 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & RETRY_LONG) {
968 /* range from 1 to 256 */
969 if ((strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit > 0) && (strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit < 256)) {
970 strWIDList[u8WidCnt].id = WID_LONG_RETRY_LIMIT;
971 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit;
973 strWIDList[u8WidCnt].type = WID_SHORT;
974 strWIDList[u8WidCnt].size = sizeof(u16);
975 pstrWFIDrv->strCfgValues.long_retry_limit = strHostIFCfgParamAttr->pstrCfgParamVal.long_retry_limit;
977 PRINT_ER("Range(1~256) over\n");
983 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & FRAG_THRESHOLD) {
985 if (strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold > 255 && strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold < 7937) {
986 strWIDList[u8WidCnt].id = WID_FRAG_THRESHOLD;
987 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold;
988 strWIDList[u8WidCnt].type = WID_SHORT;
989 strWIDList[u8WidCnt].size = sizeof(u16);
990 pstrWFIDrv->strCfgValues.frag_threshold = strHostIFCfgParamAttr->pstrCfgParamVal.frag_threshold;
992 PRINT_ER("Threshold Range fail\n");
998 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & RTS_THRESHOLD) {
999 /* range 256 to 65535 */
1000 if (strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold > 255 && strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold < 65536) {
1001 strWIDList[u8WidCnt].id = WID_RTS_THRESHOLD;
1002 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold;
1003 strWIDList[u8WidCnt].type = WID_SHORT;
1004 strWIDList[u8WidCnt].size = sizeof(u16);
1005 pstrWFIDrv->strCfgValues.rts_threshold = strHostIFCfgParamAttr->pstrCfgParamVal.rts_threshold;
1007 PRINT_ER("Threshold Range fail\n");
1013 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & PREAMBLE) {
1014 /*-----------------------------------------------------*/
1015 /*Input Values: Short= 0, */
1018 /*------------------------------------------------------*/
1019 if (strHostIFCfgParamAttr->pstrCfgParamVal.preamble_type < 3) {
1020 strWIDList[u8WidCnt].id = WID_PREAMBLE;
1021 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.preamble_type;
1022 strWIDList[u8WidCnt].type = WID_CHAR;
1023 strWIDList[u8WidCnt].size = sizeof(char);
1024 pstrWFIDrv->strCfgValues.preamble_type = strHostIFCfgParamAttr->pstrCfgParamVal.preamble_type;
1026 PRINT_ER("Preamle Range(0~2) over\n");
1032 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & SHORT_SLOT_ALLOWED) {
1033 if (strHostIFCfgParamAttr->pstrCfgParamVal.short_slot_allowed < 2) {
1034 strWIDList[u8WidCnt].id = WID_SHORT_SLOT_ALLOWED;
1035 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.short_slot_allowed;
1036 strWIDList[u8WidCnt].type = WID_CHAR;
1037 strWIDList[u8WidCnt].size = sizeof(char);
1038 pstrWFIDrv->strCfgValues.short_slot_allowed = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.short_slot_allowed;
1040 PRINT_ER("Short slot(2) over\n");
1046 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & TXOP_PROT_DISABLE) {
1047 /*Description: used to Disable RTS-CTS protection for TXOP burst*/
1048 /*transmission when the acknowledgement policy is No-Ack or Block-Ack */
1049 /* this information is useful for external supplicant */
1050 /*Input Values: 1 for enable and 0 for disable. */
1051 if (strHostIFCfgParamAttr->pstrCfgParamVal.txop_prot_disabled < 2) {
1052 strWIDList[u8WidCnt].id = WID_11N_TXOP_PROT_DISABLE;
1053 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.txop_prot_disabled;
1054 strWIDList[u8WidCnt].type = WID_CHAR;
1055 strWIDList[u8WidCnt].size = sizeof(char);
1056 pstrWFIDrv->strCfgValues.txop_prot_disabled = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.txop_prot_disabled;
1058 PRINT_ER("TXOP prot disable\n");
1064 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & BEACON_INTERVAL) {
1065 /* range is 1 to 65535. */
1066 if (strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval < 65536) {
1067 strWIDList[u8WidCnt].id = WID_BEACON_INTERVAL;
1068 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval;
1069 strWIDList[u8WidCnt].type = WID_SHORT;
1070 strWIDList[u8WidCnt].size = sizeof(u16);
1071 pstrWFIDrv->strCfgValues.beacon_interval = strHostIFCfgParamAttr->pstrCfgParamVal.beacon_interval;
1073 PRINT_ER("Beacon interval(1~65535) fail\n");
1079 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & DTIM_PERIOD) {
1080 /* range is 1 to 255. */
1081 if (strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period < 256) {
1082 strWIDList[u8WidCnt].id = WID_DTIM_PERIOD;
1083 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period;
1084 strWIDList[u8WidCnt].type = WID_CHAR;
1085 strWIDList[u8WidCnt].size = sizeof(char);
1086 pstrWFIDrv->strCfgValues.dtim_period = strHostIFCfgParamAttr->pstrCfgParamVal.dtim_period;
1088 PRINT_ER("DTIM range(1~255) fail\n");
1094 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & SITE_SURVEY) {
1095 /*----------------------------------------------------------------------*/
1096 /*Input Values: SITE_SURVEY_1CH = 0, i.e.: currently set channel */
1097 /* SITE_SURVEY_ALL_CH = 1, */
1098 /* SITE_SURVEY_OFF = 2 */
1099 /*----------------------------------------------------------------------*/
1100 if (strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_enabled < 3) {
1101 strWIDList[u8WidCnt].id = WID_SITE_SURVEY;
1102 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_enabled;
1103 strWIDList[u8WidCnt].type = WID_CHAR;
1104 strWIDList[u8WidCnt].size = sizeof(char);
1105 pstrWFIDrv->strCfgValues.site_survey_enabled = (u8)strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_enabled;
1107 PRINT_ER("Site survey disable\n");
1113 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & SITE_SURVEY_SCAN_TIME) {
1114 /* range is 1 to 65535. */
1115 if (strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time < 65536) {
1116 strWIDList[u8WidCnt].id = WID_SITE_SURVEY_SCAN_TIME;
1117 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time;
1118 strWIDList[u8WidCnt].type = WID_SHORT;
1119 strWIDList[u8WidCnt].size = sizeof(u16);
1120 pstrWFIDrv->strCfgValues.site_survey_scan_time = strHostIFCfgParamAttr->pstrCfgParamVal.site_survey_scan_time;
1122 PRINT_ER("Site survey scan time(1~65535) over\n");
1128 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & ACTIVE_SCANTIME) {
1129 /* range is 1 to 65535. */
1130 if (strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time < 65536) {
1131 strWIDList[u8WidCnt].id = WID_ACTIVE_SCAN_TIME;
1132 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time;
1133 strWIDList[u8WidCnt].type = WID_SHORT;
1134 strWIDList[u8WidCnt].size = sizeof(u16);
1135 pstrWFIDrv->strCfgValues.active_scan_time = strHostIFCfgParamAttr->pstrCfgParamVal.active_scan_time;
1137 PRINT_ER("Active scan time(1~65535) over\n");
1143 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & PASSIVE_SCANTIME) {
1144 /* range is 1 to 65535. */
1145 if (strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time > 0 && strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time < 65536) {
1146 strWIDList[u8WidCnt].id = WID_PASSIVE_SCAN_TIME;
1147 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time;
1148 strWIDList[u8WidCnt].type = WID_SHORT;
1149 strWIDList[u8WidCnt].size = sizeof(u16);
1150 pstrWFIDrv->strCfgValues.passive_scan_time = strHostIFCfgParamAttr->pstrCfgParamVal.passive_scan_time;
1152 PRINT_ER("Passive scan time(1~65535) over\n");
1158 if (strHostIFCfgParamAttr->pstrCfgParamVal.u32SetCfgFlag & CURRENT_TX_RATE) {
1159 enum CURRENT_TXRATE curr_tx_rate = strHostIFCfgParamAttr->pstrCfgParamVal.curr_tx_rate;
1160 /*----------------------------------------------------------------------*/
1161 /*Rates: 1 2 5.5 11 6 9 12 18 24 36 48 54 Auto */
1162 /*InputValues: 1 2 3 4 5 6 7 8 9 10 11 12 0 */
1163 /*----------------------------------------------------------------------*/
1165 if (curr_tx_rate == AUTORATE || curr_tx_rate == MBPS_1
1166 || curr_tx_rate == MBPS_2 || curr_tx_rate == MBPS_5_5
1167 || curr_tx_rate == MBPS_11 || curr_tx_rate == MBPS_6
1168 || curr_tx_rate == MBPS_9 || curr_tx_rate == MBPS_12
1169 || curr_tx_rate == MBPS_18 || curr_tx_rate == MBPS_24
1170 || curr_tx_rate == MBPS_36 || curr_tx_rate == MBPS_48 || curr_tx_rate == MBPS_54) {
1171 strWIDList[u8WidCnt].id = WID_CURRENT_TX_RATE;
1172 strWIDList[u8WidCnt].ps8WidVal = (s8 *)&curr_tx_rate;
1173 strWIDList[u8WidCnt].type = WID_SHORT;
1174 strWIDList[u8WidCnt].size = sizeof(u16);
1175 pstrWFIDrv->strCfgValues.curr_tx_rate = (u8)curr_tx_rate;
1177 PRINT_ER("out of TX rate\n");
1183 s32Error = send_config_pkt(SET_CFG, strWIDList, u8WidCnt,
1184 get_id_from_handler(pstrWFIDrv));
1187 PRINT_ER("Error in setting CFG params\n");
1190 up(&(pstrWFIDrv->gtOsCfgValuesSem));
1196 * @brief Handle_wait_msg_q_empty
1197 * @details this should be the last msg and then the msg Q becomes idle
1198 * @param[in] tstrHostIFscanAttr* pstrHostIFscanAttr
1199 * @return Error code.
1204 static s32 Handle_wait_msg_q_empty(void)
1206 g_wilc_initialized = 0;
1212 * @brief Handle_Scan
1213 * @details Sending config packet to firmware to set the scan params
1214 * @param[in] struct scan_attr *pstrHostIFscanAttr
1215 * @return Error code.
1220 static s32 Handle_Scan(struct host_if_drv *drvHandler,
1221 struct scan_attr *pstrHostIFscanAttr)
1224 struct wid strWIDList[5];
1225 u32 u32WidsCount = 0;
1229 u8 *pu8HdnNtwrksWidVal = NULL;
1230 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *) drvHandler;
1232 PRINT_D(HOSTINF_DBG, "Setting SCAN params\n");
1233 PRINT_D(HOSTINF_DBG, "Scanning: In [%d] state\n", pstrWFIDrv->enuHostIFstate);
1235 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = pstrHostIFscanAttr->pfScanResult;
1236 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid = pstrHostIFscanAttr->pvUserArg;
1238 if ((pstrWFIDrv->enuHostIFstate >= HOST_IF_SCANNING) && (pstrWFIDrv->enuHostIFstate < HOST_IF_CONNECTED)) {
1239 /* here we either in HOST_IF_SCANNING, HOST_IF_WAITING_CONN_REQ or HOST_IF_WAITING_CONN_RESP */
1240 PRINT_D(GENERIC_DBG, "Don't scan we are already in [%d] state\n", pstrWFIDrv->enuHostIFstate);
1241 PRINT_ER("Already scan\n");
1246 if (g_obtainingIP || connecting) {
1247 PRINT_D(GENERIC_DBG, "[handle_scan]: Don't do obss scan until IP adresss is obtained\n");
1248 PRINT_ER("Don't do obss scan\n");
1253 PRINT_D(HOSTINF_DBG, "Setting SCAN params\n");
1256 pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount = 0;
1258 strWIDList[u32WidsCount].id = (u16)WID_SSID_PROBE_REQ;
1259 strWIDList[u32WidsCount].type = WID_STR;
1261 for (i = 0; i < pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum; i++)
1262 valuesize += ((pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen) + 1);
1263 pu8HdnNtwrksWidVal = kmalloc(valuesize + 1, GFP_KERNEL);
1264 strWIDList[u32WidsCount].ps8WidVal = pu8HdnNtwrksWidVal;
1265 if (strWIDList[u32WidsCount].ps8WidVal != NULL) {
1266 pu8Buffer = strWIDList[u32WidsCount].ps8WidVal;
1268 *pu8Buffer++ = pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum;
1270 PRINT_D(HOSTINF_DBG, "In Handle_ProbeRequest number of ssid %d\n", pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum);
1272 for (i = 0; i < pstrHostIFscanAttr->strHiddenNetwork.u8ssidnum; i++) {
1273 *pu8Buffer++ = pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen;
1274 memcpy(pu8Buffer, pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].pu8ssid, pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen);
1275 pu8Buffer += pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo[i].u8ssidlen;
1280 strWIDList[u32WidsCount].size = (s32)(valuesize + 1);
1284 /*filling cfg param array*/
1286 /* if((pstrHostIFscanAttr->pu8IEs != NULL) && (pstrHostIFscanAttr->IEsLen != 0)) */
1288 /* IEs to be inserted in Probe Request */
1289 strWIDList[u32WidsCount].id = WID_INFO_ELEMENT_PROBE;
1290 strWIDList[u32WidsCount].type = WID_BIN_DATA;
1291 strWIDList[u32WidsCount].ps8WidVal = pstrHostIFscanAttr->pu8IEs;
1292 strWIDList[u32WidsCount].size = pstrHostIFscanAttr->IEsLen;
1297 strWIDList[u32WidsCount].id = WID_SCAN_TYPE;
1298 strWIDList[u32WidsCount].type = WID_CHAR;
1299 strWIDList[u32WidsCount].size = sizeof(char);
1300 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrHostIFscanAttr->u8ScanType));
1303 /*list of channels to be scanned*/
1304 strWIDList[u32WidsCount].id = WID_SCAN_CHANNEL_LIST;
1305 strWIDList[u32WidsCount].type = WID_BIN_DATA;
1307 if (pstrHostIFscanAttr->pu8ChnlFreqList != NULL && pstrHostIFscanAttr->u8ChnlListLen > 0) {
1310 for (i = 0; i < pstrHostIFscanAttr->u8ChnlListLen; i++) {
1311 if (pstrHostIFscanAttr->pu8ChnlFreqList[i] > 0)
1312 pstrHostIFscanAttr->pu8ChnlFreqList[i] = pstrHostIFscanAttr->pu8ChnlFreqList[i] - 1;
1316 strWIDList[u32WidsCount].ps8WidVal = pstrHostIFscanAttr->pu8ChnlFreqList;
1317 strWIDList[u32WidsCount].size = pstrHostIFscanAttr->u8ChnlListLen;
1321 strWIDList[u32WidsCount].id = WID_START_SCAN_REQ;
1322 strWIDList[u32WidsCount].type = WID_CHAR;
1323 strWIDList[u32WidsCount].size = sizeof(char);
1324 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrHostIFscanAttr->u8ScanSource));
1327 /*keep the state as is , no need to change it*/
1328 /* gWFiDrvHandle->enuHostIFstate = HOST_IF_SCANNING; */
1330 if (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED)
1331 gbScanWhileConnected = true;
1332 else if (pstrWFIDrv->enuHostIFstate == HOST_IF_IDLE)
1333 gbScanWhileConnected = false;
1335 s32Error = send_config_pkt(SET_CFG, strWIDList, u32WidsCount,
1336 get_id_from_handler(pstrWFIDrv));
1339 PRINT_ER("Failed to send scan paramters config packet\n");
1341 PRINT_D(HOSTINF_DBG, "Successfully sent SCAN params config packet\n");
1345 del_timer(&pstrWFIDrv->hScanTimer);
1346 /*if there is an ongoing scan request*/
1347 Handle_ScanDone(drvHandler, SCAN_EVENT_ABORTED);
1350 /* Deallocate pstrHostIFscanAttr->u8ChnlListLen which was prevoisuly allocated by the sending thread */
1351 if (pstrHostIFscanAttr->pu8ChnlFreqList != NULL) {
1352 kfree(pstrHostIFscanAttr->pu8ChnlFreqList);
1353 pstrHostIFscanAttr->pu8ChnlFreqList = NULL;
1356 /* Deallocate pstrHostIFscanAttr->pu8IEs which was previously allocated by the sending thread */
1357 if (pstrHostIFscanAttr->pu8IEs != NULL) {
1358 kfree(pstrHostIFscanAttr->pu8IEs);
1359 pstrHostIFscanAttr->pu8IEs = NULL;
1361 if (pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo != NULL) {
1362 kfree(pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo);
1363 pstrHostIFscanAttr->strHiddenNetwork.pstrHiddenNetworkInfo = NULL;
1366 /* Deallocate pstrHostIFscanAttr->u8ChnlListLen which was prevoisuly allocated by the sending thread */
1367 if (pstrHostIFscanAttr->pu8ChnlFreqList != NULL) {
1368 kfree(pstrHostIFscanAttr->pu8ChnlFreqList);
1369 pstrHostIFscanAttr->pu8ChnlFreqList = NULL;
1372 if (pu8HdnNtwrksWidVal != NULL)
1373 kfree(pu8HdnNtwrksWidVal);
1379 * @brief Handle_ScanDone
1380 * @details Call scan notification callback function
1382 * @return Error code.
1387 static s32 Handle_ScanDone(struct host_if_drv *drvHandler, tenuScanEvent enuEvent)
1391 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
1394 u8 u8abort_running_scan;
1398 PRINT_D(HOSTINF_DBG, "in Handle_ScanDone()\n");
1400 /*Ask FW to abort the running scan, if any*/
1401 if (enuEvent == SCAN_EVENT_ABORTED) {
1402 PRINT_D(GENERIC_DBG, "Abort running scan\n");
1403 u8abort_running_scan = 1;
1404 strWID.id = (u16)WID_ABORT_RUNNING_SCAN;
1405 strWID.type = WID_CHAR;
1406 strWID.ps8WidVal = (s8 *)&u8abort_running_scan;
1407 strWID.size = sizeof(char);
1410 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
1411 get_id_from_handler(pstrWFIDrv));
1413 PRINT_ER("Failed to set abort running scan\n");
1418 if (pstrWFIDrv == NULL) {
1419 PRINT_ER("Driver handler is NULL\n");
1423 /*if there is an ongoing scan request*/
1424 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
1425 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(enuEvent, NULL,
1426 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL);
1427 /*delete current scan request*/
1428 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = NULL;
1435 * @brief Handle_Connect
1436 * @details Sending config packet to firmware to starting connection
1437 * @param[in] struct connect_attr *pstrHostIFconnectAttr
1438 * @return Error code.
1443 u8 u8ConnectedSSID[6] = {0};
1444 static s32 Handle_Connect(struct host_if_drv *drvHandler,
1445 struct connect_attr *pstrHostIFconnectAttr)
1447 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *) drvHandler;
1449 struct wid strWIDList[8];
1450 u32 u32WidsCount = 0, dummyval = 0;
1451 /* char passphrase[] = "12345678"; */
1452 u8 *pu8CurrByte = NULL;
1453 tstrJoinBssParam *ptstrJoinBssParam;
1455 PRINT_D(GENERIC_DBG, "Handling connect request\n");
1457 /* if we try to connect to an already connected AP then discard the request */
1459 if (memcmp(pstrHostIFconnectAttr->pu8bssid, u8ConnectedSSID, ETH_ALEN) == 0) {
1462 PRINT_ER("Trying to connect to an already connected AP, Discard connect request\n");
1466 PRINT_INFO(HOSTINF_DBG, "Saving connection parameters in global structure\n");
1468 ptstrJoinBssParam = (tstrJoinBssParam *)pstrHostIFconnectAttr->pJoinParams;
1469 if (ptstrJoinBssParam == NULL) {
1470 PRINT_ER("Required BSSID not found\n");
1475 if (pstrHostIFconnectAttr->pu8bssid != NULL) {
1476 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = kmalloc(6, GFP_KERNEL);
1477 memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, pstrHostIFconnectAttr->pu8bssid, 6);
1480 pstrWFIDrv->strWILC_UsrConnReq.ssidLen = pstrHostIFconnectAttr->ssidLen;
1481 if (pstrHostIFconnectAttr->pu8ssid != NULL) {
1482 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = kmalloc(pstrHostIFconnectAttr->ssidLen + 1, GFP_KERNEL);
1483 memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid, pstrHostIFconnectAttr->pu8ssid,
1484 pstrHostIFconnectAttr->ssidLen);
1485 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid[pstrHostIFconnectAttr->ssidLen] = '\0';
1488 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = pstrHostIFconnectAttr->IEsLen;
1489 if (pstrHostIFconnectAttr->pu8IEs != NULL) {
1490 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = kmalloc(pstrHostIFconnectAttr->IEsLen, GFP_KERNEL);
1491 memcpy(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs, pstrHostIFconnectAttr->pu8IEs,
1492 pstrHostIFconnectAttr->IEsLen);
1495 pstrWFIDrv->strWILC_UsrConnReq.u8security = pstrHostIFconnectAttr->u8security;
1496 pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type = pstrHostIFconnectAttr->tenuAuth_type;
1497 pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult = pstrHostIFconnectAttr->pfConnectResult;
1498 pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid = pstrHostIFconnectAttr->pvUserArg;
1500 strWIDList[u32WidsCount].id = WID_SUCCESS_FRAME_COUNT;
1501 strWIDList[u32WidsCount].type = WID_INT;
1502 strWIDList[u32WidsCount].size = sizeof(u32);
1503 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(dummyval));
1506 strWIDList[u32WidsCount].id = WID_RECEIVED_FRAGMENT_COUNT;
1507 strWIDList[u32WidsCount].type = WID_INT;
1508 strWIDList[u32WidsCount].size = sizeof(u32);
1509 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(dummyval));
1512 strWIDList[u32WidsCount].id = WID_FAILED_COUNT;
1513 strWIDList[u32WidsCount].type = WID_INT;
1514 strWIDList[u32WidsCount].size = sizeof(u32);
1515 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(dummyval));
1518 /* if((gWFiDrvHandle->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) && */
1519 /* (gWFiDrvHandle->strWILC_UsrConnReq.ConnReqIEsLen != 0)) */
1521 /* IEs to be inserted in Association Request */
1522 strWIDList[u32WidsCount].id = WID_INFO_ELEMENT_ASSOCIATE;
1523 strWIDList[u32WidsCount].type = WID_BIN_DATA;
1524 strWIDList[u32WidsCount].ps8WidVal = pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs;
1525 strWIDList[u32WidsCount].size = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen;
1528 if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7)) {
1530 gu32FlushedInfoElemAsocSize = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen;
1531 gu8FlushedInfoElemAsoc = kmalloc(gu32FlushedInfoElemAsocSize, GFP_KERNEL);
1532 memcpy(gu8FlushedInfoElemAsoc, pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs,
1533 gu32FlushedInfoElemAsocSize);
1536 strWIDList[u32WidsCount].id = (u16)WID_11I_MODE;
1537 strWIDList[u32WidsCount].type = WID_CHAR;
1538 strWIDList[u32WidsCount].size = sizeof(char);
1539 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrWFIDrv->strWILC_UsrConnReq.u8security));
1542 if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7))
1543 gu8Flushed11iMode = pstrWFIDrv->strWILC_UsrConnReq.u8security;
1545 PRINT_INFO(HOSTINF_DBG, "Encrypt Mode = %x\n", pstrWFIDrv->strWILC_UsrConnReq.u8security);
1548 strWIDList[u32WidsCount].id = (u16)WID_AUTH_TYPE;
1549 strWIDList[u32WidsCount].type = WID_CHAR;
1550 strWIDList[u32WidsCount].size = sizeof(char);
1551 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type);
1554 if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7))
1555 gu8FlushedAuthType = (u8)pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type;
1557 PRINT_INFO(HOSTINF_DBG, "Authentication Type = %x\n", pstrWFIDrv->strWILC_UsrConnReq.tenuAuth_type);
1559 * strWIDList[u32WidsCount].u16WIDid = (u16)WID_11I_PSK;
1560 * strWIDList[u32WidsCount].enuWIDtype = WID_STR;
1561 * strWIDList[u32WidsCount].s32ValueSize = sizeof(passphrase);
1562 * strWIDList[u32WidsCount].ps8WidVal = (s8*)(passphrase);
1566 PRINT_D(HOSTINF_DBG, "Connecting to network of SSID %s on channel %d\n",
1567 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid, pstrHostIFconnectAttr->u8channel);
1569 strWIDList[u32WidsCount].id = (u16)WID_JOIN_REQ_EXTENDED;
1570 strWIDList[u32WidsCount].type = WID_STR;
1572 /*Sending NoA attributes during connection*/
1573 strWIDList[u32WidsCount].size = 112; /* 79; */
1574 strWIDList[u32WidsCount].ps8WidVal = kmalloc(strWIDList[u32WidsCount].size, GFP_KERNEL);
1576 if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7)) {
1577 gu32FlushedJoinReqSize = strWIDList[u32WidsCount].size;
1578 gu8FlushedJoinReq = kmalloc(gu32FlushedJoinReqSize, GFP_KERNEL);
1580 if (strWIDList[u32WidsCount].ps8WidVal == NULL) {
1585 pu8CurrByte = strWIDList[u32WidsCount].ps8WidVal;
1588 if (pstrHostIFconnectAttr->pu8ssid != NULL) {
1589 memcpy(pu8CurrByte, pstrHostIFconnectAttr->pu8ssid, pstrHostIFconnectAttr->ssidLen);
1590 pu8CurrByte[pstrHostIFconnectAttr->ssidLen] = '\0';
1592 pu8CurrByte += MAX_SSID_LEN;
1595 *(pu8CurrByte++) = INFRASTRUCTURE;
1597 if ((pstrHostIFconnectAttr->u8channel >= 1) && (pstrHostIFconnectAttr->u8channel <= 14)) {
1598 *(pu8CurrByte++) = pstrHostIFconnectAttr->u8channel;
1600 PRINT_ER("Channel out of range\n");
1601 *(pu8CurrByte++) = 0xFF;
1604 *(pu8CurrByte++) = (ptstrJoinBssParam->cap_info) & 0xFF;
1605 *(pu8CurrByte++) = ((ptstrJoinBssParam->cap_info) >> 8) & 0xFF;
1606 PRINT_D(HOSTINF_DBG, "* Cap Info %0x*\n", (*(pu8CurrByte - 2) | ((*(pu8CurrByte - 1)) << 8)));
1609 if (pstrHostIFconnectAttr->pu8bssid != NULL)
1610 memcpy(pu8CurrByte, pstrHostIFconnectAttr->pu8bssid, 6);
1614 if (pstrHostIFconnectAttr->pu8bssid != NULL)
1615 memcpy(pu8CurrByte, pstrHostIFconnectAttr->pu8bssid, 6);
1619 *(pu8CurrByte++) = (ptstrJoinBssParam->beacon_period) & 0xFF;
1620 *(pu8CurrByte++) = ((ptstrJoinBssParam->beacon_period) >> 8) & 0xFF;
1621 PRINT_D(HOSTINF_DBG, "* Beacon Period %d*\n", (*(pu8CurrByte - 2) | ((*(pu8CurrByte - 1)) << 8)));
1623 *(pu8CurrByte++) = ptstrJoinBssParam->dtim_period;
1624 PRINT_D(HOSTINF_DBG, "* DTIM Period %d*\n", (*(pu8CurrByte - 1)));
1625 /* Supported rates*/
1626 memcpy(pu8CurrByte, ptstrJoinBssParam->supp_rates, MAX_RATES_SUPPORTED + 1);
1627 pu8CurrByte += (MAX_RATES_SUPPORTED + 1);
1630 *(pu8CurrByte++) = ptstrJoinBssParam->wmm_cap;
1631 PRINT_D(HOSTINF_DBG, "* wmm cap%d*\n", (*(pu8CurrByte - 1)));
1633 *(pu8CurrByte++) = ptstrJoinBssParam->uapsd_cap;
1636 *(pu8CurrByte++) = ptstrJoinBssParam->ht_capable;
1637 /* copy this information to the user request */
1638 pstrWFIDrv->strWILC_UsrConnReq.IsHTCapable = ptstrJoinBssParam->ht_capable;
1641 *(pu8CurrByte++) = ptstrJoinBssParam->rsn_found;
1642 PRINT_D(HOSTINF_DBG, "* rsn found %d*\n", *(pu8CurrByte - 1));
1643 /* rsn group policy*/
1644 *(pu8CurrByte++) = ptstrJoinBssParam->rsn_grp_policy;
1645 PRINT_D(HOSTINF_DBG, "* rsn group policy %0x*\n", (*(pu8CurrByte - 1)));
1647 *(pu8CurrByte++) = ptstrJoinBssParam->mode_802_11i;
1648 PRINT_D(HOSTINF_DBG, "* mode_802_11i %d*\n", (*(pu8CurrByte - 1)));
1649 /* rsn pcip policy*/
1650 memcpy(pu8CurrByte, ptstrJoinBssParam->rsn_pcip_policy, sizeof(ptstrJoinBssParam->rsn_pcip_policy));
1651 pu8CurrByte += sizeof(ptstrJoinBssParam->rsn_pcip_policy);
1653 /* rsn auth policy*/
1654 memcpy(pu8CurrByte, ptstrJoinBssParam->rsn_auth_policy, sizeof(ptstrJoinBssParam->rsn_auth_policy));
1655 pu8CurrByte += sizeof(ptstrJoinBssParam->rsn_auth_policy);
1657 /* rsn auth policy*/
1658 memcpy(pu8CurrByte, ptstrJoinBssParam->rsn_cap, sizeof(ptstrJoinBssParam->rsn_cap));
1659 pu8CurrByte += sizeof(ptstrJoinBssParam->rsn_cap);
1661 *(pu8CurrByte++) = REAL_JOIN_REQ;
1663 *(pu8CurrByte++) = ptstrJoinBssParam->u8NoaEnbaled;
1664 if (ptstrJoinBssParam->u8NoaEnbaled) {
1665 PRINT_D(HOSTINF_DBG, "NOA present\n");
1667 *(pu8CurrByte++) = (ptstrJoinBssParam->tsf) & 0xFF;
1668 *(pu8CurrByte++) = ((ptstrJoinBssParam->tsf) >> 8) & 0xFF;
1669 *(pu8CurrByte++) = ((ptstrJoinBssParam->tsf) >> 16) & 0xFF;
1670 *(pu8CurrByte++) = ((ptstrJoinBssParam->tsf) >> 24) & 0xFF;
1672 *(pu8CurrByte++) = ptstrJoinBssParam->u8Index;
1674 *(pu8CurrByte++) = ptstrJoinBssParam->u8OppEnable;
1676 if (ptstrJoinBssParam->u8OppEnable)
1677 *(pu8CurrByte++) = ptstrJoinBssParam->u8CtWindow;
1679 *(pu8CurrByte++) = ptstrJoinBssParam->u8Count;
1681 memcpy(pu8CurrByte, ptstrJoinBssParam->au8Duration, sizeof(ptstrJoinBssParam->au8Duration));
1683 pu8CurrByte += sizeof(ptstrJoinBssParam->au8Duration);
1685 memcpy(pu8CurrByte, ptstrJoinBssParam->au8Interval, sizeof(ptstrJoinBssParam->au8Interval));
1687 pu8CurrByte += sizeof(ptstrJoinBssParam->au8Interval);
1689 memcpy(pu8CurrByte, ptstrJoinBssParam->au8StartTime, sizeof(ptstrJoinBssParam->au8StartTime));
1691 pu8CurrByte += sizeof(ptstrJoinBssParam->au8StartTime);
1694 PRINT_D(HOSTINF_DBG, "NOA not present\n");
1696 /* keep the buffer at the start of the allocated pointer to use it with the free*/
1697 pu8CurrByte = strWIDList[u32WidsCount].ps8WidVal;
1700 /* A temporary workaround to avoid handling the misleading MAC_DISCONNECTED raised from the
1701 * firmware at chip reset when processing the WIDs of the Connect Request.
1702 * (This workaround should be removed in the future when the Chip reset of the Connect WIDs is disabled) */
1703 /* ////////////////////// */
1704 gu32WidConnRstHack = 0;
1705 /* ////////////////////// */
1707 if (memcmp("DIRECT-", pstrHostIFconnectAttr->pu8ssid, 7)) {
1708 memcpy(gu8FlushedJoinReq, pu8CurrByte, gu32FlushedJoinReqSize);
1709 gu8FlushedJoinReqDrvHandler = pstrWFIDrv;
1712 PRINT_D(GENERIC_DBG, "send HOST_IF_WAITING_CONN_RESP\n");
1714 if (pstrHostIFconnectAttr->pu8bssid != NULL) {
1715 memcpy(u8ConnectedSSID, pstrHostIFconnectAttr->pu8bssid, ETH_ALEN);
1717 PRINT_D(GENERIC_DBG, "save Bssid = %pM\n", pstrHostIFconnectAttr->pu8bssid);
1718 PRINT_D(GENERIC_DBG, "save bssid = %pM\n", u8ConnectedSSID);
1721 s32Error = send_config_pkt(SET_CFG, strWIDList, u32WidsCount,
1722 get_id_from_handler(pstrWFIDrv));
1724 PRINT_ER("failed to send config packet\n");
1728 PRINT_D(GENERIC_DBG, "set HOST_IF_WAITING_CONN_RESP\n");
1729 pstrWFIDrv->enuHostIFstate = HOST_IF_WAITING_CONN_RESP;
1734 tstrConnectInfo strConnectInfo;
1736 del_timer(&pstrWFIDrv->hConnectTimer);
1738 PRINT_D(HOSTINF_DBG, "could not start connecting to the required network\n");
1740 memset(&strConnectInfo, 0, sizeof(tstrConnectInfo));
1742 if (pstrHostIFconnectAttr->pfConnectResult != NULL) {
1743 if (pstrHostIFconnectAttr->pu8bssid != NULL)
1744 memcpy(strConnectInfo.au8bssid, pstrHostIFconnectAttr->pu8bssid, 6);
1746 if (pstrHostIFconnectAttr->pu8IEs != NULL) {
1747 strConnectInfo.ReqIEsLen = pstrHostIFconnectAttr->IEsLen;
1748 strConnectInfo.pu8ReqIEs = kmalloc(pstrHostIFconnectAttr->IEsLen, GFP_KERNEL);
1749 memcpy(strConnectInfo.pu8ReqIEs,
1750 pstrHostIFconnectAttr->pu8IEs,
1751 pstrHostIFconnectAttr->IEsLen);
1754 pstrHostIFconnectAttr->pfConnectResult(CONN_DISCONN_EVENT_CONN_RESP,
1758 pstrHostIFconnectAttr->pvUserArg);
1759 /*Change state to idle*/
1760 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
1762 if (strConnectInfo.pu8ReqIEs != NULL) {
1763 kfree(strConnectInfo.pu8ReqIEs);
1764 strConnectInfo.pu8ReqIEs = NULL;
1768 PRINT_ER("Connect callback function pointer is NULL\n");
1772 PRINT_D(HOSTINF_DBG, "Deallocating connection parameters\n");
1773 /* Deallocate pstrHostIFconnectAttr->pu8bssid which was prevoisuly allocated by the sending thread */
1774 if (pstrHostIFconnectAttr->pu8bssid != NULL) {
1775 kfree(pstrHostIFconnectAttr->pu8bssid);
1776 pstrHostIFconnectAttr->pu8bssid = NULL;
1779 /* Deallocate pstrHostIFconnectAttr->pu8ssid which was prevoisuly allocated by the sending thread */
1780 if (pstrHostIFconnectAttr->pu8ssid != NULL) {
1781 kfree(pstrHostIFconnectAttr->pu8ssid);
1782 pstrHostIFconnectAttr->pu8ssid = NULL;
1785 /* Deallocate pstrHostIFconnectAttr->pu8IEs which was prevoisuly allocated by the sending thread */
1786 if (pstrHostIFconnectAttr->pu8IEs != NULL) {
1787 kfree(pstrHostIFconnectAttr->pu8IEs);
1788 pstrHostIFconnectAttr->pu8IEs = NULL;
1791 if (pu8CurrByte != NULL)
1797 * @brief Handle_FlushConnect
1798 * @details Sending config packet to firmware to flush an old connection
1799 * after switching FW from station one to hybrid one
1800 * @param[in] void * drvHandler
1801 * @return Error code.
1802 * @author Amr Abdel-Moghny
1807 static s32 Handle_FlushConnect(struct host_if_drv *drvHandler)
1810 struct wid strWIDList[5];
1811 u32 u32WidsCount = 0;
1812 u8 *pu8CurrByte = NULL;
1815 /* IEs to be inserted in Association Request */
1816 strWIDList[u32WidsCount].id = WID_INFO_ELEMENT_ASSOCIATE;
1817 strWIDList[u32WidsCount].type = WID_BIN_DATA;
1818 strWIDList[u32WidsCount].ps8WidVal = gu8FlushedInfoElemAsoc;
1819 strWIDList[u32WidsCount].size = gu32FlushedInfoElemAsocSize;
1822 strWIDList[u32WidsCount].id = (u16)WID_11I_MODE;
1823 strWIDList[u32WidsCount].type = WID_CHAR;
1824 strWIDList[u32WidsCount].size = sizeof(char);
1825 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(gu8Flushed11iMode));
1830 strWIDList[u32WidsCount].id = (u16)WID_AUTH_TYPE;
1831 strWIDList[u32WidsCount].type = WID_CHAR;
1832 strWIDList[u32WidsCount].size = sizeof(char);
1833 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&gu8FlushedAuthType);
1836 strWIDList[u32WidsCount].id = (u16)WID_JOIN_REQ_EXTENDED;
1837 strWIDList[u32WidsCount].type = WID_STR;
1838 strWIDList[u32WidsCount].size = gu32FlushedJoinReqSize;
1839 strWIDList[u32WidsCount].ps8WidVal = (s8 *)gu8FlushedJoinReq;
1840 pu8CurrByte = strWIDList[u32WidsCount].ps8WidVal;
1842 pu8CurrByte += FLUSHED_BYTE_POS;
1843 *(pu8CurrByte) = FLUSHED_JOIN_REQ;
1847 s32Error = send_config_pkt(SET_CFG, strWIDList, u32WidsCount,
1848 get_id_from_handler(gu8FlushedJoinReqDrvHandler));
1850 PRINT_ER("failed to send config packet\n");
1858 * @brief Handle_ConnectTimeout
1859 * @details Call connect notification callback function indicating connection failure
1861 * @return Error code.
1866 static s32 Handle_ConnectTimeout(struct host_if_drv *drvHandler)
1869 tstrConnectInfo strConnectInfo;
1871 u16 u16DummyReasonCode = 0;
1872 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *) drvHandler;
1874 if (pstrWFIDrv == NULL) {
1875 PRINT_ER("Driver handler is NULL\n");
1879 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
1881 gbScanWhileConnected = false;
1884 memset(&strConnectInfo, 0, sizeof(tstrConnectInfo));
1887 /* First, we will notify the upper layer with the Connection failure {through the Connect Callback function},
1888 * then we will notify our firmware also with the Connection failure {through sending to it Cfg packet carrying
1889 * WID_DISCONNECT} */
1890 if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult != NULL) {
1891 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
1892 memcpy(strConnectInfo.au8bssid,
1893 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, 6);
1896 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
1897 strConnectInfo.ReqIEsLen = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen;
1898 strConnectInfo.pu8ReqIEs = kmalloc(pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen, GFP_KERNEL);
1899 memcpy(strConnectInfo.pu8ReqIEs,
1900 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs,
1901 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen);
1904 pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_CONN_RESP,
1908 pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid);
1910 /* Deallocation of strConnectInfo.pu8ReqIEs */
1911 if (strConnectInfo.pu8ReqIEs != NULL) {
1912 kfree(strConnectInfo.pu8ReqIEs);
1913 strConnectInfo.pu8ReqIEs = NULL;
1916 PRINT_ER("Connect callback function pointer is NULL\n");
1919 /* Here we will notify our firmware also with the Connection failure {through sending to it Cfg packet carrying
1920 * WID_DISCONNECT} */
1921 strWID.id = (u16)WID_DISCONNECT;
1922 strWID.type = WID_CHAR;
1923 strWID.ps8WidVal = (s8 *)&u16DummyReasonCode;
1924 strWID.size = sizeof(char);
1926 PRINT_D(HOSTINF_DBG, "Sending disconnect request\n");
1928 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
1929 get_id_from_handler(pstrWFIDrv));
1931 PRINT_ER("Failed to send dissconect config packet\n");
1933 /* Deallocation of the Saved Connect Request in the global Handle */
1934 pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0;
1935 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) {
1936 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid);
1937 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL;
1940 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
1941 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid);
1942 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL;
1945 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0;
1946 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
1947 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs);
1948 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL;
1951 eth_zero_addr(u8ConnectedSSID);
1952 /*Freeing flushed join request params on connect timeout*/
1953 if (gu8FlushedJoinReq != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
1954 kfree(gu8FlushedJoinReq);
1955 gu8FlushedJoinReq = NULL;
1957 if (gu8FlushedInfoElemAsoc != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
1958 kfree(gu8FlushedInfoElemAsoc);
1959 gu8FlushedInfoElemAsoc = NULL;
1966 * @brief Handle_RcvdNtwrkInfo
1967 * @details Handling received network information
1968 * @param[in] struct rcvd_net_info *pstrRcvdNetworkInfo
1969 * @return Error code.
1974 static s32 Handle_RcvdNtwrkInfo(struct host_if_drv *drvHandler,
1975 struct rcvd_net_info *pstrRcvdNetworkInfo)
1978 bool bNewNtwrkFound;
1983 tstrNetworkInfo *pstrNetworkInfo = NULL;
1984 void *pJoinParams = NULL;
1986 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
1990 bNewNtwrkFound = true;
1991 PRINT_INFO(HOSTINF_DBG, "Handling received network info\n");
1993 /*if there is a an ongoing scan request*/
1994 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
1995 PRINT_D(HOSTINF_DBG, "State: Scanning, parsing network information received\n");
1996 parse_network_info(pstrRcvdNetworkInfo->pu8Buffer, &pstrNetworkInfo);
1997 if ((pstrNetworkInfo == NULL)
1998 || (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult == NULL)) {
1999 PRINT_ER("driver is null\n");
2004 /* check whether this network is discovered before */
2005 for (i = 0; i < pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount; i++) {
2007 if ((pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].au8bssid != NULL) &&
2008 (pstrNetworkInfo->au8bssid != NULL)) {
2009 if (memcmp(pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].au8bssid,
2010 pstrNetworkInfo->au8bssid, 6) == 0) {
2011 if (pstrNetworkInfo->s8rssi <= pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].s8rssi) {
2012 /*we have already found this network with better rssi, so keep the old cached one and don't
2013 * send anything to the upper layer */
2014 PRINT_D(HOSTINF_DBG, "Network previously discovered\n");
2017 /* here the same already found network is found again but with a better rssi, so just update
2018 * the rssi for this cached network and send this updated network to the upper layer but
2019 * don't add a new record for it */
2020 pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[i].s8rssi = pstrNetworkInfo->s8rssi;
2021 bNewNtwrkFound = false;
2028 if (bNewNtwrkFound == true) {
2029 /* here it is confirmed that it is a new discovered network,
2030 * so add its record then call the User CallBack function */
2032 PRINT_D(HOSTINF_DBG, "New network found\n");
2034 if (pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount < MAX_NUM_SCANNED_NETWORKS) {
2035 pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount].s8rssi = pstrNetworkInfo->s8rssi;
2037 if ((pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount].au8bssid != NULL)
2038 && (pstrNetworkInfo->au8bssid != NULL)) {
2039 memcpy(pstrWFIDrv->strWILC_UsrScanReq.astrFoundNetworkInfo[pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount].au8bssid,
2040 pstrNetworkInfo->au8bssid, 6);
2042 pstrWFIDrv->strWILC_UsrScanReq.u32RcvdChCount++;
2044 pstrNetworkInfo->bNewNetwork = true;
2045 /* add new BSS to JoinBssTable */
2046 pJoinParams = host_int_ParseJoinBssParam(pstrNetworkInfo);
2048 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_NETWORK_FOUND, pstrNetworkInfo,
2049 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid,
2055 PRINT_WRN(HOSTINF_DBG, "Discovered networks exceeded max. limit\n");
2058 pstrNetworkInfo->bNewNetwork = false;
2059 /* just call the User CallBack function to send the same discovered network with its updated RSSI */
2060 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_NETWORK_FOUND, pstrNetworkInfo,
2061 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL);
2066 /* Deallocate pstrRcvdNetworkInfo->pu8Buffer which was prevoisuly allocated by the sending thread */
2067 if (pstrRcvdNetworkInfo->pu8Buffer != NULL) {
2068 kfree(pstrRcvdNetworkInfo->pu8Buffer);
2069 pstrRcvdNetworkInfo->pu8Buffer = NULL;
2072 /*free structure allocated*/
2073 if (pstrNetworkInfo != NULL) {
2074 DeallocateNetworkInfo(pstrNetworkInfo);
2075 pstrNetworkInfo = NULL;
2082 * @brief Handle_RcvdGnrlAsyncInfo
2083 * @details Handling received asynchrous general network information
2084 * @param[in] struct rcvd_async_info *pstrRcvdGnrlAsyncInfo
2085 * @return Error code.
2090 static s32 Handle_RcvdGnrlAsyncInfo(struct host_if_drv *drvHandler,
2091 struct rcvd_async_info *pstrRcvdGnrlAsyncInfo)
2093 /* TODO: mostafa: till now, this function just handles only the received mac status msg, */
2094 /* which carries only 1 WID which have WID ID = WID_STATUS */
2099 u16 u16WidID = (u16)WID_NIL;
2102 u8 u8MacStatusReasonCode;
2103 u8 u8MacStatusAdditionalInfo;
2104 tstrConnectInfo strConnectInfo;
2105 tstrDisconnectNotifInfo strDisconnectNotifInfo;
2107 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *) drvHandler;
2110 PRINT_ER("Driver handler is NULL\n");
2113 PRINT_D(GENERIC_DBG, "Current State = %d,Received state = %d\n", pstrWFIDrv->enuHostIFstate,
2114 pstrRcvdGnrlAsyncInfo->pu8Buffer[7]);
2116 if ((pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) ||
2117 (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED) ||
2118 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
2119 if ((pstrRcvdGnrlAsyncInfo->pu8Buffer == NULL) ||
2120 (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult == NULL)) {
2121 PRINT_ER("driver is null\n");
2125 u8MsgType = pstrRcvdGnrlAsyncInfo->pu8Buffer[0];
2127 /* Check whether the received message type is 'I' */
2128 if ('I' != u8MsgType) {
2129 PRINT_ER("Received Message format incorrect.\n");
2133 /* Extract message ID */
2134 u8MsgID = pstrRcvdGnrlAsyncInfo->pu8Buffer[1];
2136 /* Extract message Length */
2137 u16MsgLen = MAKE_WORD16(pstrRcvdGnrlAsyncInfo->pu8Buffer[2], pstrRcvdGnrlAsyncInfo->pu8Buffer[3]);
2139 /* Extract WID ID [expected to be = WID_STATUS] */
2140 u16WidID = MAKE_WORD16(pstrRcvdGnrlAsyncInfo->pu8Buffer[4], pstrRcvdGnrlAsyncInfo->pu8Buffer[5]);
2142 /* Extract WID Length [expected to be = 1] */
2143 u8WidLen = pstrRcvdGnrlAsyncInfo->pu8Buffer[6];
2145 /* get the WID value [expected to be one of two values: either MAC_CONNECTED = (1) or MAC_DISCONNECTED = (0)] */
2146 u8MacStatus = pstrRcvdGnrlAsyncInfo->pu8Buffer[7];
2147 u8MacStatusReasonCode = pstrRcvdGnrlAsyncInfo->pu8Buffer[8];
2148 u8MacStatusAdditionalInfo = pstrRcvdGnrlAsyncInfo->pu8Buffer[9];
2149 PRINT_INFO(HOSTINF_DBG, "Recieved MAC status = %d with Reason = %d , Info = %d\n", u8MacStatus, u8MacStatusReasonCode, u8MacStatusAdditionalInfo);
2150 if (pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) {
2151 /* our station had sent Association Request frame, so here it will get the Association Response frame then parse it */
2152 u32 u32RcvdAssocRespInfoLen;
2153 tstrConnectRespInfo *pstrConnectRespInfo = NULL;
2155 PRINT_D(HOSTINF_DBG, "Recieved MAC status = %d with Reason = %d , Code = %d\n", u8MacStatus, u8MacStatusReasonCode, u8MacStatusAdditionalInfo);
2157 memset(&strConnectInfo, 0, sizeof(tstrConnectInfo));
2159 if (u8MacStatus == MAC_CONNECTED) {
2160 memset(gapu8RcvdAssocResp, 0, MAX_ASSOC_RESP_FRAME_SIZE);
2162 host_int_get_assoc_res_info(pstrWFIDrv,
2164 MAX_ASSOC_RESP_FRAME_SIZE,
2165 &u32RcvdAssocRespInfoLen);
2167 PRINT_INFO(HOSTINF_DBG, "Received association response with length = %d\n", u32RcvdAssocRespInfoLen);
2169 if (u32RcvdAssocRespInfoLen != 0) {
2171 PRINT_D(HOSTINF_DBG, "Parsing association response\n");
2172 s32Err = ParseAssocRespInfo(gapu8RcvdAssocResp, u32RcvdAssocRespInfoLen,
2173 &pstrConnectRespInfo);
2175 PRINT_ER("ParseAssocRespInfo() returned error %d\n", s32Err);
2177 /* use the necessary parsed Info from the Received Association Response */
2178 strConnectInfo.u16ConnectStatus = pstrConnectRespInfo->u16ConnectStatus;
2180 if (strConnectInfo.u16ConnectStatus == SUCCESSFUL_STATUSCODE) {
2181 PRINT_INFO(HOSTINF_DBG, "Association response received : Successful connection status\n");
2182 if (pstrConnectRespInfo->pu8RespIEs != NULL) {
2183 strConnectInfo.u16RespIEsLen = pstrConnectRespInfo->u16RespIEsLen;
2186 strConnectInfo.pu8RespIEs = kmalloc(pstrConnectRespInfo->u16RespIEsLen, GFP_KERNEL);
2187 memcpy(strConnectInfo.pu8RespIEs, pstrConnectRespInfo->pu8RespIEs,
2188 pstrConnectRespInfo->u16RespIEsLen);
2192 /* deallocate the Assoc. Resp. parsed structure as it is not needed anymore */
2193 if (pstrConnectRespInfo != NULL) {
2194 DeallocateAssocRespInfo(pstrConnectRespInfo);
2195 pstrConnectRespInfo = NULL;
2201 /* The station has just received mac status and it also received assoc. response which
2202 * it was waiting for.
2203 * So check first the matching between the received mac status and the received status code in Asoc Resp */
2204 if ((u8MacStatus == MAC_CONNECTED) &&
2205 (strConnectInfo.u16ConnectStatus != SUCCESSFUL_STATUSCODE)) {
2206 PRINT_ER("Received MAC status is MAC_CONNECTED while the received status code in Asoc Resp is not SUCCESSFUL_STATUSCODE\n");
2207 eth_zero_addr(u8ConnectedSSID);
2209 } else if (u8MacStatus == MAC_DISCONNECTED) {
2210 PRINT_ER("Received MAC status is MAC_DISCONNECTED\n");
2211 eth_zero_addr(u8ConnectedSSID);
2214 /* TODO: mostafa: correct BSSID should be retrieved from actual BSSID received from AP */
2215 /* through a structure of type tstrConnectRespInfo */
2216 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
2217 PRINT_D(HOSTINF_DBG, "Retrieving actual BSSID from AP\n");
2218 memcpy(strConnectInfo.au8bssid, pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, 6);
2220 if ((u8MacStatus == MAC_CONNECTED) &&
2221 (strConnectInfo.u16ConnectStatus == SUCCESSFUL_STATUSCODE)) {
2222 memcpy(pstrWFIDrv->au8AssociatedBSSID,
2223 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid, ETH_ALEN);
2228 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
2229 strConnectInfo.ReqIEsLen = pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen;
2230 strConnectInfo.pu8ReqIEs = kmalloc(pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen, GFP_KERNEL);
2231 memcpy(strConnectInfo.pu8ReqIEs,
2232 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs,
2233 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen);
2237 del_timer(&pstrWFIDrv->hConnectTimer);
2238 pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_CONN_RESP,
2242 pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid);
2245 /* if received mac status is MAC_CONNECTED and
2246 * received status code in Asoc Resp is SUCCESSFUL_STATUSCODE, change state to CONNECTED
2247 * else change state to IDLE */
2248 if ((u8MacStatus == MAC_CONNECTED) &&
2249 (strConnectInfo.u16ConnectStatus == SUCCESSFUL_STATUSCODE)) {
2250 host_int_set_power_mgmt(pstrWFIDrv, 0, 0);
2252 PRINT_D(HOSTINF_DBG, "MAC status : CONNECTED and Connect Status : Successful\n");
2253 pstrWFIDrv->enuHostIFstate = HOST_IF_CONNECTED;
2255 PRINT_D(GENERIC_DBG, "Obtaining an IP, Disable Scan\n");
2256 g_obtainingIP = true;
2257 mod_timer(&hDuringIpTimer,
2258 jiffies + msecs_to_jiffies(10000));
2260 /* open a BA session if possible */
2261 /* if(pstrWFIDrv->strWILC_UsrConnReq.IsHTCapable) */
2262 /* BA_SESSION_DEFAULT_BUFFER_SIZE,BA_SESSION_DEFAULT_TIMEOUT); */
2264 PRINT_D(HOSTINF_DBG, "MAC status : %d and Connect Status : %d\n", u8MacStatus, strConnectInfo.u16ConnectStatus);
2265 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
2266 gbScanWhileConnected = false;
2270 if (strConnectInfo.pu8RespIEs != NULL) {
2271 kfree(strConnectInfo.pu8RespIEs);
2272 strConnectInfo.pu8RespIEs = NULL;
2275 if (strConnectInfo.pu8ReqIEs != NULL) {
2276 kfree(strConnectInfo.pu8ReqIEs);
2277 strConnectInfo.pu8ReqIEs = NULL;
2281 pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0;
2282 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) {
2283 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid);
2284 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL;
2287 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
2288 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid);
2289 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL;
2292 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0;
2293 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
2294 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs);
2295 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL;
2298 } else if ((u8MacStatus == MAC_DISCONNECTED) &&
2299 (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED)) {
2300 /* Disassociation or Deauthentication frame has been received */
2301 PRINT_D(HOSTINF_DBG, "Received MAC_DISCONNECTED from the FW\n");
2303 memset(&strDisconnectNotifInfo, 0, sizeof(tstrDisconnectNotifInfo));
2305 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
2306 PRINT_D(HOSTINF_DBG, "\n\n<< Abort the running OBSS Scan >>\n\n");
2307 del_timer(&pstrWFIDrv->hScanTimer);
2308 Handle_ScanDone((void *)pstrWFIDrv, SCAN_EVENT_ABORTED);
2311 strDisconnectNotifInfo.u16reason = 0;
2312 strDisconnectNotifInfo.ie = NULL;
2313 strDisconnectNotifInfo.ie_len = 0;
2315 if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult != NULL) {
2316 g_obtainingIP = false;
2317 host_int_set_power_mgmt(pstrWFIDrv, 0, 0);
2319 pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_DISCONN_NOTIF,
2322 &strDisconnectNotifInfo,
2323 pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid);
2326 PRINT_ER("Connect result callback function is NULL\n");
2329 eth_zero_addr(pstrWFIDrv->au8AssociatedBSSID);
2334 /* if Information Elements were retrieved from the Received deauth/disassoc frame, then they
2335 * should be deallocated here */
2337 * if(strDisconnectNotifInfo.ie != NULL)
2339 * kfree(strDisconnectNotifInfo.ie);
2340 * strDisconnectNotifInfo.ie = NULL;
2344 pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0;
2345 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) {
2346 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid);
2347 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL;
2350 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
2351 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid);
2352 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL;
2355 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0;
2356 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
2357 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs);
2358 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL;
2361 /*Freeing flushed join request params on receiving*/
2362 /*MAC_DISCONNECTED while connected*/
2363 if (gu8FlushedJoinReq != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
2364 kfree(gu8FlushedJoinReq);
2365 gu8FlushedJoinReq = NULL;
2367 if (gu8FlushedInfoElemAsoc != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
2368 kfree(gu8FlushedInfoElemAsoc);
2369 gu8FlushedInfoElemAsoc = NULL;
2372 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
2373 gbScanWhileConnected = false;
2375 } else if ((u8MacStatus == MAC_DISCONNECTED) &&
2376 (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult != NULL)) {
2377 PRINT_D(HOSTINF_DBG, "Received MAC_DISCONNECTED from the FW while scanning\n");
2378 PRINT_D(HOSTINF_DBG, "\n\n<< Abort the running Scan >>\n\n");
2379 /*Abort the running scan*/
2380 del_timer(&pstrWFIDrv->hScanTimer);
2381 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult)
2382 Handle_ScanDone(pstrWFIDrv, SCAN_EVENT_ABORTED);
2388 /* Deallocate pstrRcvdGnrlAsyncInfo->pu8Buffer which was prevoisuly allocated by the sending thread */
2389 if (pstrRcvdGnrlAsyncInfo->pu8Buffer != NULL) {
2390 kfree(pstrRcvdGnrlAsyncInfo->pu8Buffer);
2391 pstrRcvdGnrlAsyncInfo->pu8Buffer = NULL;
2399 * @details Sending config packet to firmware to set key
2400 * @param[in] struct key_attr *pstrHostIFkeyAttr
2401 * @return Error code.
2406 static int Handle_Key(struct host_if_drv *drvHandler,
2407 struct key_attr *pstrHostIFkeyAttr)
2411 struct wid strWIDList[5];
2416 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
2419 switch (pstrHostIFkeyAttr->enuKeyType) {
2424 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY_AP) {
2426 PRINT_D(HOSTINF_DBG, "Handling WEP key\n");
2427 PRINT_D(GENERIC_DBG, "ID Hostint is %d\n", (pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx));
2428 strWIDList[0].id = (u16)WID_11I_MODE;
2429 strWIDList[0].type = WID_CHAR;
2430 strWIDList[0].size = sizeof(char);
2431 strWIDList[0].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8mode));
2433 strWIDList[1].id = WID_AUTH_TYPE;
2434 strWIDList[1].type = WID_CHAR;
2435 strWIDList[1].size = sizeof(char);
2436 strWIDList[1].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.tenuAuth_type));
2438 strWIDList[2].id = (u16)WID_KEY_ID;
2439 strWIDList[2].type = WID_CHAR;
2441 strWIDList[2].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx));
2442 strWIDList[2].size = sizeof(char);
2445 pu8keybuf = kmalloc(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen, GFP_KERNEL);
2448 if (pu8keybuf == NULL) {
2449 PRINT_ER("No buffer to send Key\n");
2453 memcpy(pu8keybuf, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey,
2454 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen);
2457 kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey);
2459 strWIDList[3].id = (u16)WID_WEP_KEY_VALUE;
2460 strWIDList[3].type = WID_STR;
2461 strWIDList[3].size = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen;
2462 strWIDList[3].ps8WidVal = (s8 *)pu8keybuf;
2465 s32Error = send_config_pkt(SET_CFG, strWIDList, 4,
2466 get_id_from_handler(pstrWFIDrv));
2472 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY) {
2473 PRINT_D(HOSTINF_DBG, "Handling WEP key\n");
2474 pu8keybuf = kmalloc(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen + 2, GFP_KERNEL);
2475 if (pu8keybuf == NULL) {
2476 PRINT_ER("No buffer to send Key\n");
2479 pu8keybuf[0] = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx;
2481 memcpy(pu8keybuf + 1, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen, 1);
2483 memcpy(pu8keybuf + 2, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey,
2484 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen);
2486 kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey);
2488 strWID.id = (u16)WID_ADD_WEP_KEY;
2489 strWID.type = WID_STR;
2490 strWID.ps8WidVal = (s8 *)pu8keybuf;
2491 strWID.size = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen + 2;
2493 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
2494 get_id_from_handler(pstrWFIDrv));
2496 } else if (pstrHostIFkeyAttr->u8KeyAction & REMOVEKEY) {
2498 PRINT_D(HOSTINF_DBG, "Removing key\n");
2499 strWID.id = (u16)WID_REMOVE_WEP_KEY;
2500 strWID.type = WID_STR;
2502 s8idxarray[0] = (s8)pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx;
2503 strWID.ps8WidVal = s8idxarray;
2506 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
2507 get_id_from_handler(pstrWFIDrv));
2509 strWID.id = (u16)WID_KEY_ID;
2510 strWID.type = WID_CHAR;
2511 strWID.ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx));
2512 strWID.size = sizeof(char);
2514 PRINT_D(HOSTINF_DBG, "Setting default key index\n");
2516 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
2517 get_id_from_handler(pstrWFIDrv));
2519 up(&(pstrWFIDrv->hSemTestKeyBlock));
2523 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY_AP) {
2524 pu8keybuf = kmalloc(RX_MIC_KEY_MSG_LEN, GFP_KERNEL);
2525 if (pu8keybuf == NULL) {
2526 PRINT_ER("No buffer to send RxGTK Key\n");
2528 goto _WPARxGtk_end_case_;
2531 memset(pu8keybuf, 0, RX_MIC_KEY_MSG_LEN);
2534 /*|----------------------------------------------------------------------------|
2535 * |Sta Address | Key RSC | KeyID | Key Length | Temporal Key | Rx Michael Key |
2536 * |------------|---------|-------|------------|---------------|----------------|
2537 | 6 bytes | 8 byte |1 byte | 1 byte | 16 bytes | 8 bytes |*/
2541 if (pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq != NULL)
2542 memcpy(pu8keybuf + 6, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq, 8);
2545 memcpy(pu8keybuf + 14, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx, 1);
2547 memcpy(pu8keybuf + 15, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1);
2549 memcpy(pu8keybuf + 16, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
2550 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen);
2551 /* pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode = 0X51; */
2552 strWIDList[0].id = (u16)WID_11I_MODE;
2553 strWIDList[0].type = WID_CHAR;
2554 strWIDList[0].size = sizeof(char);
2555 strWIDList[0].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode));
2557 strWIDList[1].id = (u16)WID_ADD_RX_GTK;
2558 strWIDList[1].type = WID_STR;
2559 strWIDList[1].ps8WidVal = (s8 *)pu8keybuf;
2560 strWIDList[1].size = RX_MIC_KEY_MSG_LEN;
2562 s32Error = send_config_pkt(SET_CFG, strWIDList, 2,
2563 get_id_from_handler(pstrWFIDrv));
2567 /* ////////////////////////// */
2568 up(&(pstrWFIDrv->hSemTestKeyBlock));
2569 /* ///////////////////////// */
2572 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY) {
2573 PRINT_D(HOSTINF_DBG, "Handling group key(Rx) function\n");
2575 pu8keybuf = kmalloc(RX_MIC_KEY_MSG_LEN, GFP_KERNEL);
2576 if (pu8keybuf == NULL) {
2577 PRINT_ER("No buffer to send RxGTK Key\n");
2579 goto _WPARxGtk_end_case_;
2582 memset(pu8keybuf, 0, RX_MIC_KEY_MSG_LEN);
2585 /*|----------------------------------------------------------------------------|
2586 * |Sta Address | Key RSC | KeyID | Key Length | Temporal Key | Rx Michael Key |
2587 * |------------|---------|-------|------------|---------------|----------------|
2588 | 6 bytes | 8 byte |1 byte | 1 byte | 16 bytes | 8 bytes |*/
2590 if (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED)
2591 memcpy(pu8keybuf, pstrWFIDrv->au8AssociatedBSSID, ETH_ALEN);
2593 PRINT_ER("Couldn't handle WPARxGtk while enuHostIFstate is not HOST_IF_CONNECTED\n");
2595 memcpy(pu8keybuf + 6, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq, 8);
2597 memcpy(pu8keybuf + 14, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx, 1);
2599 memcpy(pu8keybuf + 15, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1);
2600 memcpy(pu8keybuf + 16, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
2601 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen);
2603 strWID.id = (u16)WID_ADD_RX_GTK;
2604 strWID.type = WID_STR;
2605 strWID.ps8WidVal = (s8 *)pu8keybuf;
2606 strWID.size = RX_MIC_KEY_MSG_LEN;
2608 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
2609 get_id_from_handler(pstrWFIDrv));
2613 /* ////////////////////////// */
2614 up(&(pstrWFIDrv->hSemTestKeyBlock));
2615 /* ///////////////////////// */
2617 _WPARxGtk_end_case_:
2618 kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key);
2619 kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq);
2626 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY_AP) {
2629 pu8keybuf = kmalloc(PTK_KEY_MSG_LEN + 1, GFP_KERNEL);
2633 if (pu8keybuf == NULL) {
2634 PRINT_ER("No buffer to send PTK Key\n");
2636 goto _WPAPtk_end_case_;
2640 /*|-----------------------------------------------------------------------------|
2641 * |Station address | keyidx |Key Length |Temporal Key | Rx Michael Key |Tx Michael Key |
2642 * |----------------|------------ |--------------|----------------|---------------|
2643 | 6 bytes | 1 byte | 1byte | 16 bytes | 8 bytes | 8 bytes |
2644 |-----------------------------------------------------------------------------|*/
2646 memcpy(pu8keybuf, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8macaddr, 6); /*1 bytes Key Length */
2648 memcpy(pu8keybuf + 6, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx, 1);
2649 memcpy(pu8keybuf + 7, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1);
2651 memcpy(pu8keybuf + 8, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
2652 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen);
2655 strWIDList[0].id = (u16)WID_11I_MODE;
2656 strWIDList[0].type = WID_CHAR;
2657 strWIDList[0].size = sizeof(char);
2658 strWIDList[0].ps8WidVal = (s8 *)(&(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode));
2660 strWIDList[1].id = (u16)WID_ADD_PTK;
2661 strWIDList[1].type = WID_STR;
2662 strWIDList[1].ps8WidVal = (s8 *)pu8keybuf;
2663 strWIDList[1].size = PTK_KEY_MSG_LEN + 1;
2665 s32Error = send_config_pkt(SET_CFG, strWIDList, 2,
2666 get_id_from_handler(pstrWFIDrv));
2669 /* ////////////////////////// */
2670 up(&(pstrWFIDrv->hSemTestKeyBlock));
2671 /* ///////////////////////// */
2673 if (pstrHostIFkeyAttr->u8KeyAction & ADDKEY) {
2676 pu8keybuf = kmalloc(PTK_KEY_MSG_LEN, GFP_KERNEL);
2680 if (pu8keybuf == NULL) {
2681 PRINT_ER("No buffer to send PTK Key\n");
2683 goto _WPAPtk_end_case_;
2687 /*|-----------------------------------------------------------------------------|
2688 * |Station address | Key Length | Temporal Key | Rx Michael Key |Tx Michael Key |
2689 * |----------------|------------|--------------|----------------|---------------|
2690 | 6 bytes | 1byte | 16 bytes | 8 bytes | 8 bytes |
2691 |-----------------------------------------------------------------------------|*/
2693 memcpy(pu8keybuf, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8macaddr, 6); /*1 bytes Key Length */
2695 memcpy(pu8keybuf + 6, &pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen, 1);
2697 memcpy(pu8keybuf + 7, pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
2698 pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen);
2701 strWID.id = (u16)WID_ADD_PTK;
2702 strWID.type = WID_STR;
2703 strWID.ps8WidVal = (s8 *)pu8keybuf;
2704 strWID.size = PTK_KEY_MSG_LEN;
2706 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
2707 get_id_from_handler(pstrWFIDrv));
2710 /* ////////////////////////// */
2711 up(&(pstrWFIDrv->hSemTestKeyBlock));
2712 /* ///////////////////////// */
2716 kfree(pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFwpaAttr.pu8key);
2725 PRINT_D(HOSTINF_DBG, "Handling PMKSA key\n");
2727 pu8keybuf = kmalloc((pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid * PMKSA_KEY_LEN) + 1, GFP_KERNEL);
2728 if (pu8keybuf == NULL) {
2729 PRINT_ER("No buffer to send PMKSA Key\n");
2733 pu8keybuf[0] = pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid;
2735 for (i = 0; i < pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid; i++) {
2737 memcpy(pu8keybuf + ((PMKSA_KEY_LEN * i) + 1), pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].bssid, ETH_ALEN);
2738 memcpy(pu8keybuf + ((PMKSA_KEY_LEN * i) + ETH_ALEN + 1), pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].pmkid, PMKID_LEN);
2741 strWID.id = (u16)WID_PMKID_INFO;
2742 strWID.type = WID_STR;
2743 strWID.ps8WidVal = (s8 *)pu8keybuf;
2744 strWID.size = (pstrHostIFkeyAttr->uniHostIFkeyAttr.strHostIFpmkidAttr.numpmkid * PMKSA_KEY_LEN) + 1;
2746 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
2747 get_id_from_handler(pstrWFIDrv));
2754 PRINT_ER("Failed to send key config packet\n");
2762 * @brief Handle_Disconnect
2763 * @details Sending config packet to firmware to disconnect
2770 static void Handle_Disconnect(struct host_if_drv *drvHandler)
2775 u16 u16DummyReasonCode = 0;
2776 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
2779 strWID.id = (u16)WID_DISCONNECT;
2780 strWID.type = WID_CHAR;
2781 strWID.ps8WidVal = (s8 *)&u16DummyReasonCode;
2782 strWID.size = sizeof(char);
2786 PRINT_D(HOSTINF_DBG, "Sending disconnect request\n");
2788 g_obtainingIP = false;
2789 host_int_set_power_mgmt(pstrWFIDrv, 0, 0);
2791 eth_zero_addr(u8ConnectedSSID);
2793 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
2794 get_id_from_handler(pstrWFIDrv));
2797 PRINT_ER("Failed to send dissconect config packet\n");
2799 tstrDisconnectNotifInfo strDisconnectNotifInfo;
2801 memset(&strDisconnectNotifInfo, 0, sizeof(tstrDisconnectNotifInfo));
2803 strDisconnectNotifInfo.u16reason = 0;
2804 strDisconnectNotifInfo.ie = NULL;
2805 strDisconnectNotifInfo.ie_len = 0;
2807 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
2808 del_timer(&pstrWFIDrv->hScanTimer);
2809 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_ABORTED, NULL,
2810 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL);
2812 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = NULL;
2815 if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult != NULL) {
2817 /*Stop connect timer, if connection in progress*/
2818 if (pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) {
2819 PRINT_D(HOSTINF_DBG, "Upper layer requested termination of connection\n");
2820 del_timer(&pstrWFIDrv->hConnectTimer);
2823 pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult(CONN_DISCONN_EVENT_DISCONN_NOTIF, NULL,
2824 0, &strDisconnectNotifInfo, pstrWFIDrv->strWILC_UsrConnReq.u32UserConnectPvoid);
2826 PRINT_ER("strWILC_UsrConnReq.pfUserConnectResult = NULL\n");
2829 gbScanWhileConnected = false;
2831 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
2833 eth_zero_addr(pstrWFIDrv->au8AssociatedBSSID);
2837 pstrWFIDrv->strWILC_UsrConnReq.ssidLen = 0;
2838 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ssid != NULL) {
2839 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ssid);
2840 pstrWFIDrv->strWILC_UsrConnReq.pu8ssid = NULL;
2843 if (pstrWFIDrv->strWILC_UsrConnReq.pu8bssid != NULL) {
2844 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8bssid);
2845 pstrWFIDrv->strWILC_UsrConnReq.pu8bssid = NULL;
2848 pstrWFIDrv->strWILC_UsrConnReq.ConnReqIEsLen = 0;
2849 if (pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs != NULL) {
2850 kfree(pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs);
2851 pstrWFIDrv->strWILC_UsrConnReq.pu8ConnReqIEs = NULL;
2855 if (gu8FlushedJoinReq != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
2856 kfree(gu8FlushedJoinReq);
2857 gu8FlushedJoinReq = NULL;
2859 if (gu8FlushedInfoElemAsoc != NULL && gu8FlushedJoinReqDrvHandler == drvHandler) {
2860 kfree(gu8FlushedInfoElemAsoc);
2861 gu8FlushedInfoElemAsoc = NULL;
2866 /* ////////////////////////// */
2867 up(&(pstrWFIDrv->hSemTestDisconnectBlock));
2868 /* ///////////////////////// */
2873 void resolve_disconnect_aberration(struct host_if_drv *drvHandler)
2875 struct host_if_drv *pstrWFIDrv;
2877 pstrWFIDrv = (struct host_if_drv *)drvHandler;
2878 if (pstrWFIDrv == NULL)
2880 if ((pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) || (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTING)) {
2881 PRINT_D(HOSTINF_DBG, "\n\n<< correcting Supplicant state machine >>\n\n");
2882 host_int_disconnect(pstrWFIDrv, 1);
2887 * @brief Handle_GetChnl
2888 * @details Sending config packet to get channel
2896 static s32 Handle_GetChnl(struct host_if_drv *drvHandler)
2901 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
2903 strWID.id = (u16)WID_CURRENT_CHANNEL;
2904 strWID.type = WID_CHAR;
2905 strWID.ps8WidVal = (s8 *)&gu8Chnl;
2906 strWID.size = sizeof(char);
2908 PRINT_D(HOSTINF_DBG, "Getting channel value\n");
2910 s32Error = send_config_pkt(GET_CFG, &strWID, 1,
2911 get_id_from_handler(pstrWFIDrv));
2912 /*get the value by searching the local copy*/
2914 PRINT_ER("Failed to get channel number\n");
2918 up(&(pstrWFIDrv->hSemGetCHNL));
2928 * @brief Handle_GetRssi
2929 * @details Sending config packet to get RSSI
2936 static void Handle_GetRssi(struct host_if_drv *drvHandler)
2940 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
2942 strWID.id = (u16)WID_RSSI;
2943 strWID.type = WID_CHAR;
2944 strWID.ps8WidVal = &gs8Rssi;
2945 strWID.size = sizeof(char);
2948 PRINT_D(HOSTINF_DBG, "Getting RSSI value\n");
2950 s32Error = send_config_pkt(GET_CFG, &strWID, 1,
2951 get_id_from_handler(pstrWFIDrv));
2953 PRINT_ER("Failed to get RSSI value\n");
2957 up(&(pstrWFIDrv->hSemGetRSSI));
2963 static void Handle_GetLinkspeed(struct host_if_drv *drvHandler)
2967 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
2971 strWID.id = (u16)WID_LINKSPEED;
2972 strWID.type = WID_CHAR;
2973 strWID.ps8WidVal = &gs8lnkspd;
2974 strWID.size = sizeof(char);
2976 PRINT_D(HOSTINF_DBG, "Getting LINKSPEED value\n");
2978 s32Error = send_config_pkt(GET_CFG, &strWID, 1,
2979 get_id_from_handler(pstrWFIDrv));
2981 PRINT_ER("Failed to get LINKSPEED value\n");
2985 up(&(pstrWFIDrv->hSemGetLINKSPEED));
2990 s32 Handle_GetStatistics(struct host_if_drv *drvHandler, tstrStatistics *pstrStatistics)
2992 struct wid strWIDList[5];
2993 u32 u32WidsCount = 0, s32Error = 0;
2995 strWIDList[u32WidsCount].id = WID_LINKSPEED;
2996 strWIDList[u32WidsCount].type = WID_CHAR;
2997 strWIDList[u32WidsCount].size = sizeof(char);
2998 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u8LinkSpeed));
3001 strWIDList[u32WidsCount].id = WID_RSSI;
3002 strWIDList[u32WidsCount].type = WID_CHAR;
3003 strWIDList[u32WidsCount].size = sizeof(char);
3004 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->s8RSSI));
3007 strWIDList[u32WidsCount].id = WID_SUCCESS_FRAME_COUNT;
3008 strWIDList[u32WidsCount].type = WID_INT;
3009 strWIDList[u32WidsCount].size = sizeof(u32);
3010 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u32TxCount));
3013 strWIDList[u32WidsCount].id = WID_RECEIVED_FRAGMENT_COUNT;
3014 strWIDList[u32WidsCount].type = WID_INT;
3015 strWIDList[u32WidsCount].size = sizeof(u32);
3016 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u32RxCount));
3019 strWIDList[u32WidsCount].id = WID_FAILED_COUNT;
3020 strWIDList[u32WidsCount].type = WID_INT;
3021 strWIDList[u32WidsCount].size = sizeof(u32);
3022 strWIDList[u32WidsCount].ps8WidVal = (s8 *)(&(pstrStatistics->u32TxFailureCount));
3025 s32Error = send_config_pkt(GET_CFG, strWIDList, u32WidsCount,
3026 get_id_from_handler(drvHandler));
3029 PRINT_ER("Failed to send scan paramters config packet\n");
3037 * @brief Handle_Get_InActiveTime
3038 * @details Sending config packet to set mac adddress for station and
3047 static s32 Handle_Get_InActiveTime(struct host_if_drv *drvHandler,
3048 struct sta_inactive_t *strHostIfStaInactiveT)
3054 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
3057 strWID.id = (u16)WID_SET_STA_MAC_INACTIVE_TIME;
3058 strWID.type = WID_STR;
3059 strWID.size = ETH_ALEN;
3060 strWID.ps8WidVal = kmalloc(strWID.size, GFP_KERNEL);
3063 stamac = strWID.ps8WidVal;
3064 memcpy(stamac, strHostIfStaInactiveT->mac, ETH_ALEN);
3067 PRINT_D(CFG80211_DBG, "SETING STA inactive time\n");
3070 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3071 get_id_from_handler(pstrWFIDrv));
3072 /*get the value by searching the local copy*/
3074 PRINT_ER("Failed to SET incative time\n");
3079 strWID.id = (u16)WID_GET_INACTIVE_TIME;
3080 strWID.type = WID_INT;
3081 strWID.ps8WidVal = (s8 *)&gu32InactiveTime;
3082 strWID.size = sizeof(u32);
3085 s32Error = send_config_pkt(GET_CFG, &strWID, 1,
3086 get_id_from_handler(pstrWFIDrv));
3087 /*get the value by searching the local copy*/
3089 PRINT_ER("Failed to get incative time\n");
3094 PRINT_D(CFG80211_DBG, "Getting inactive time : %d\n", gu32InactiveTime);
3096 up(&(pstrWFIDrv->hSemInactiveTime));
3106 * @brief Handle_AddBeacon
3107 * @details Sending config packet to add beacon
3108 * @param[in] struct beacon_attr *pstrSetBeaconParam
3114 static void Handle_AddBeacon(struct host_if_drv *drvHandler,
3115 struct beacon_attr *pstrSetBeaconParam)
3120 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
3122 PRINT_D(HOSTINF_DBG, "Adding BEACON\n");
3124 strWID.id = (u16)WID_ADD_BEACON;
3125 strWID.type = WID_BIN;
3126 strWID.size = pstrSetBeaconParam->u32HeadLen + pstrSetBeaconParam->u32TailLen + 16;
3127 strWID.ps8WidVal = kmalloc(strWID.size, GFP_KERNEL);
3128 if (strWID.ps8WidVal == NULL)
3131 pu8CurrByte = strWID.ps8WidVal;
3132 *pu8CurrByte++ = (pstrSetBeaconParam->u32Interval & 0xFF);
3133 *pu8CurrByte++ = ((pstrSetBeaconParam->u32Interval >> 8) & 0xFF);
3134 *pu8CurrByte++ = ((pstrSetBeaconParam->u32Interval >> 16) & 0xFF);
3135 *pu8CurrByte++ = ((pstrSetBeaconParam->u32Interval >> 24) & 0xFF);
3137 *pu8CurrByte++ = (pstrSetBeaconParam->u32DTIMPeriod & 0xFF);
3138 *pu8CurrByte++ = ((pstrSetBeaconParam->u32DTIMPeriod >> 8) & 0xFF);
3139 *pu8CurrByte++ = ((pstrSetBeaconParam->u32DTIMPeriod >> 16) & 0xFF);
3140 *pu8CurrByte++ = ((pstrSetBeaconParam->u32DTIMPeriod >> 24) & 0xFF);
3142 *pu8CurrByte++ = (pstrSetBeaconParam->u32HeadLen & 0xFF);
3143 *pu8CurrByte++ = ((pstrSetBeaconParam->u32HeadLen >> 8) & 0xFF);
3144 *pu8CurrByte++ = ((pstrSetBeaconParam->u32HeadLen >> 16) & 0xFF);
3145 *pu8CurrByte++ = ((pstrSetBeaconParam->u32HeadLen >> 24) & 0xFF);
3147 memcpy(pu8CurrByte, pstrSetBeaconParam->pu8Head, pstrSetBeaconParam->u32HeadLen);
3148 pu8CurrByte += pstrSetBeaconParam->u32HeadLen;
3150 *pu8CurrByte++ = (pstrSetBeaconParam->u32TailLen & 0xFF);
3151 *pu8CurrByte++ = ((pstrSetBeaconParam->u32TailLen >> 8) & 0xFF);
3152 *pu8CurrByte++ = ((pstrSetBeaconParam->u32TailLen >> 16) & 0xFF);
3153 *pu8CurrByte++ = ((pstrSetBeaconParam->u32TailLen >> 24) & 0xFF);
3155 if (pstrSetBeaconParam->pu8Tail > 0)
3156 memcpy(pu8CurrByte, pstrSetBeaconParam->pu8Tail, pstrSetBeaconParam->u32TailLen);
3157 pu8CurrByte += pstrSetBeaconParam->u32TailLen;
3162 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3163 get_id_from_handler(pstrWFIDrv));
3165 PRINT_ER("Failed to send add beacon config packet\n");
3168 kfree(strWID.ps8WidVal);
3169 kfree(pstrSetBeaconParam->pu8Head);
3170 kfree(pstrSetBeaconParam->pu8Tail);
3175 * @brief Handle_AddBeacon
3176 * @details Sending config packet to delete beacon
3177 * @param[in] struct host_if_drv *drvHandler
3183 static void Handle_DelBeacon(struct host_if_drv *drvHandler)
3188 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
3190 strWID.id = (u16)WID_DEL_BEACON;
3191 strWID.type = WID_CHAR;
3192 strWID.size = sizeof(char);
3193 strWID.ps8WidVal = &gu8DelBcn;
3195 if (strWID.ps8WidVal == NULL)
3198 pu8CurrByte = strWID.ps8WidVal;
3200 PRINT_D(HOSTINF_DBG, "Deleting BEACON\n");
3201 /* TODO: build del beacon message*/
3204 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3205 get_id_from_handler(pstrWFIDrv));
3207 PRINT_ER("Failed to send delete beacon config packet\n");
3212 * @brief WILC_HostIf_PackStaParam
3213 * @details Handling packing of the station params in a buffer
3214 * @param[in] u8* pu8Buffer, struct add_sta_param *pstrStationParam
3220 static u32 WILC_HostIf_PackStaParam(u8 *pu8Buffer,
3221 struct add_sta_param *pstrStationParam)
3225 pu8CurrByte = pu8Buffer;
3227 PRINT_D(HOSTINF_DBG, "Packing STA params\n");
3228 memcpy(pu8CurrByte, pstrStationParam->au8BSSID, ETH_ALEN);
3229 pu8CurrByte += ETH_ALEN;
3231 *pu8CurrByte++ = pstrStationParam->u16AssocID & 0xFF;
3232 *pu8CurrByte++ = (pstrStationParam->u16AssocID >> 8) & 0xFF;
3234 *pu8CurrByte++ = pstrStationParam->u8NumRates;
3235 if (pstrStationParam->u8NumRates > 0)
3236 memcpy(pu8CurrByte, pstrStationParam->pu8Rates, pstrStationParam->u8NumRates);
3237 pu8CurrByte += pstrStationParam->u8NumRates;
3239 *pu8CurrByte++ = pstrStationParam->bIsHTSupported;
3240 *pu8CurrByte++ = pstrStationParam->u16HTCapInfo & 0xFF;
3241 *pu8CurrByte++ = (pstrStationParam->u16HTCapInfo >> 8) & 0xFF;
3243 *pu8CurrByte++ = pstrStationParam->u8AmpduParams;
3244 memcpy(pu8CurrByte, pstrStationParam->au8SuppMCsSet, WILC_SUPP_MCS_SET_SIZE);
3245 pu8CurrByte += WILC_SUPP_MCS_SET_SIZE;
3247 *pu8CurrByte++ = pstrStationParam->u16HTExtParams & 0xFF;
3248 *pu8CurrByte++ = (pstrStationParam->u16HTExtParams >> 8) & 0xFF;
3250 *pu8CurrByte++ = pstrStationParam->u32TxBeamformingCap & 0xFF;
3251 *pu8CurrByte++ = (pstrStationParam->u32TxBeamformingCap >> 8) & 0xFF;
3252 *pu8CurrByte++ = (pstrStationParam->u32TxBeamformingCap >> 16) & 0xFF;
3253 *pu8CurrByte++ = (pstrStationParam->u32TxBeamformingCap >> 24) & 0xFF;
3255 *pu8CurrByte++ = pstrStationParam->u8ASELCap;
3257 *pu8CurrByte++ = pstrStationParam->u16FlagsMask & 0xFF;
3258 *pu8CurrByte++ = (pstrStationParam->u16FlagsMask >> 8) & 0xFF;
3260 *pu8CurrByte++ = pstrStationParam->u16FlagsSet & 0xFF;
3261 *pu8CurrByte++ = (pstrStationParam->u16FlagsSet >> 8) & 0xFF;
3263 return pu8CurrByte - pu8Buffer;
3267 * @brief Handle_AddStation
3268 * @details Sending config packet to add station
3269 * @param[in] struct add_sta_param *pstrStationParam
3275 static void Handle_AddStation(struct host_if_drv *drvHandler,
3276 struct add_sta_param *pstrStationParam)
3281 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
3283 PRINT_D(HOSTINF_DBG, "Handling add station\n");
3284 strWID.id = (u16)WID_ADD_STA;
3285 strWID.type = WID_BIN;
3286 strWID.size = WILC_ADD_STA_LENGTH + pstrStationParam->u8NumRates;
3288 strWID.ps8WidVal = kmalloc(strWID.size, GFP_KERNEL);
3289 if (strWID.ps8WidVal == NULL)
3292 pu8CurrByte = strWID.ps8WidVal;
3293 pu8CurrByte += WILC_HostIf_PackStaParam(pu8CurrByte, pstrStationParam);
3296 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3297 get_id_from_handler(pstrWFIDrv));
3299 PRINT_ER("Failed to send add station config packet\n");
3302 kfree(pstrStationParam->pu8Rates);
3303 kfree(strWID.ps8WidVal);
3307 * @brief Handle_DelAllSta
3308 * @details Sending config packet to delete station
3309 * @param[in] tstrHostIFDelSta* pstrDelStaParam
3315 static void Handle_DelAllSta(struct host_if_drv *drvHandler,
3316 struct del_all_sta *pstrDelAllStaParam)
3322 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
3324 u8 au8Zero_Buff[6] = {0};
3326 strWID.id = (u16)WID_DEL_ALL_STA;
3327 strWID.type = WID_STR;
3328 strWID.size = (pstrDelAllStaParam->u8Num_AssocSta * ETH_ALEN) + 1;
3330 PRINT_D(HOSTINF_DBG, "Handling delete station\n");
3332 strWID.ps8WidVal = kmalloc((pstrDelAllStaParam->u8Num_AssocSta * ETH_ALEN) + 1, GFP_KERNEL);
3333 if (strWID.ps8WidVal == NULL)
3336 pu8CurrByte = strWID.ps8WidVal;
3338 *(pu8CurrByte++) = pstrDelAllStaParam->u8Num_AssocSta;
3340 for (i = 0; i < MAX_NUM_STA; i++) {
3341 if (memcmp(pstrDelAllStaParam->au8Sta_DelAllSta[i], au8Zero_Buff, ETH_ALEN))
3342 memcpy(pu8CurrByte, pstrDelAllStaParam->au8Sta_DelAllSta[i], ETH_ALEN);
3346 pu8CurrByte += ETH_ALEN;
3350 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3351 get_id_from_handler(pstrWFIDrv));
3353 PRINT_ER("Failed to send add station config packet\n");
3356 kfree(strWID.ps8WidVal);
3363 * @brief Handle_DelStation
3364 * @details Sending config packet to delete station
3365 * @param[in] struct del_sta *pstrDelStaParam
3371 static void Handle_DelStation(struct host_if_drv *drvHandler,
3372 struct del_sta *pstrDelStaParam)
3377 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
3379 strWID.id = (u16)WID_REMOVE_STA;
3380 strWID.type = WID_BIN;
3381 strWID.size = ETH_ALEN;
3383 PRINT_D(HOSTINF_DBG, "Handling delete station\n");
3385 strWID.ps8WidVal = kmalloc(strWID.size, GFP_KERNEL);
3386 if (strWID.ps8WidVal == NULL)
3389 pu8CurrByte = strWID.ps8WidVal;
3391 memcpy(pu8CurrByte, pstrDelStaParam->au8MacAddr, ETH_ALEN);
3394 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3395 get_id_from_handler(pstrWFIDrv));
3397 PRINT_ER("Failed to send add station config packet\n");
3400 kfree(strWID.ps8WidVal);
3405 * @brief Handle_EditStation
3406 * @details Sending config packet to edit station
3407 * @param[in] struct add_sta_param *pstrStationParam
3413 static void Handle_EditStation(struct host_if_drv *drvHandler,
3414 struct add_sta_param *pstrStationParam)
3419 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
3421 strWID.id = (u16)WID_EDIT_STA;
3422 strWID.type = WID_BIN;
3423 strWID.size = WILC_ADD_STA_LENGTH + pstrStationParam->u8NumRates;
3425 PRINT_D(HOSTINF_DBG, "Handling edit station\n");
3426 strWID.ps8WidVal = kmalloc(strWID.size, GFP_KERNEL);
3427 if (strWID.ps8WidVal == NULL)
3430 pu8CurrByte = strWID.ps8WidVal;
3431 pu8CurrByte += WILC_HostIf_PackStaParam(pu8CurrByte, pstrStationParam);
3434 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3435 get_id_from_handler(pstrWFIDrv));
3437 PRINT_ER("Failed to send edit station config packet\n");
3440 kfree(pstrStationParam->pu8Rates);
3441 kfree(strWID.ps8WidVal);
3445 * @brief Handle_RemainOnChan
3446 * @details Sending config packet to edit station
3447 * @param[in] tstrWILC_AddStaParam* pstrStationParam
3453 static int Handle_RemainOnChan(struct host_if_drv *drvHandler,
3454 struct remain_ch *pstrHostIfRemainOnChan)
3457 u8 u8remain_on_chan_flag;
3459 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *) drvHandler;
3461 /*If it's a pendig remain-on-channel, don't overwrite gWFiDrvHandle values (since incoming msg is garbbage)*/
3462 if (!pstrWFIDrv->u8RemainOnChan_pendingreq) {
3463 pstrWFIDrv->strHostIfRemainOnChan.pVoid = pstrHostIfRemainOnChan->pVoid;
3464 pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanExpired = pstrHostIfRemainOnChan->pRemainOnChanExpired;
3465 pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanReady = pstrHostIfRemainOnChan->pRemainOnChanReady;
3466 pstrWFIDrv->strHostIfRemainOnChan.u16Channel = pstrHostIfRemainOnChan->u16Channel;
3467 pstrWFIDrv->strHostIfRemainOnChan.u32ListenSessionID = pstrHostIfRemainOnChan->u32ListenSessionID;
3469 /*Set the channel to use it as a wid val*/
3470 pstrHostIfRemainOnChan->u16Channel = pstrWFIDrv->strHostIfRemainOnChan.u16Channel;
3473 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult != NULL) {
3474 PRINT_INFO(GENERIC_DBG, "Required to remain on chan while scanning return\n");
3475 pstrWFIDrv->u8RemainOnChan_pendingreq = 1;
3479 if (pstrWFIDrv->enuHostIFstate == HOST_IF_WAITING_CONN_RESP) {
3480 PRINT_INFO(GENERIC_DBG, "Required to remain on chan while connecting return\n");
3485 if (g_obtainingIP || connecting) {
3486 PRINT_D(GENERIC_DBG, "[handle_scan]: Don't do obss scan until IP adresss is obtained\n");
3491 PRINT_D(HOSTINF_DBG, "Setting channel :%d\n", pstrHostIfRemainOnChan->u16Channel);
3493 u8remain_on_chan_flag = true;
3494 strWID.id = (u16)WID_REMAIN_ON_CHAN;
3495 strWID.type = WID_STR;
3497 strWID.ps8WidVal = kmalloc(strWID.size, GFP_KERNEL);
3499 if (strWID.ps8WidVal == NULL) {
3504 strWID.ps8WidVal[0] = u8remain_on_chan_flag;
3505 strWID.ps8WidVal[1] = (s8)pstrHostIfRemainOnChan->u16Channel;
3508 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3509 get_id_from_handler(pstrWFIDrv));
3511 PRINT_ER("Failed to set remain on channel\n");
3515 P2P_LISTEN_STATE = 1;
3516 pstrWFIDrv->hRemainOnChannel.data = (unsigned long)pstrWFIDrv;
3517 mod_timer(&pstrWFIDrv->hRemainOnChannel,
3519 msecs_to_jiffies(pstrHostIfRemainOnChan->u32duration));
3521 /*Calling CFG ready_on_channel*/
3522 if (pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanReady)
3523 pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanReady(pstrWFIDrv->strHostIfRemainOnChan.pVoid);
3525 if (pstrWFIDrv->u8RemainOnChan_pendingreq)
3526 pstrWFIDrv->u8RemainOnChan_pendingreq = 0;
3532 * @brief Handle_RegisterFrame
3540 static int Handle_RegisterFrame(struct host_if_drv *drvHandler,
3541 struct reg_frame *pstrHostIfRegisterFrame)
3546 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
3548 PRINT_D(HOSTINF_DBG, "Handling frame register Flag : %d FrameType: %d\n", pstrHostIfRegisterFrame->bReg, pstrHostIfRegisterFrame->u16FrameType);
3550 /*prepare configuration packet*/
3551 strWID.id = (u16)WID_REGISTER_FRAME;
3552 strWID.type = WID_STR;
3553 strWID.ps8WidVal = kmalloc(sizeof(u16) + 2, GFP_KERNEL);
3554 if (strWID.ps8WidVal == NULL)
3557 pu8CurrByte = strWID.ps8WidVal;
3559 *pu8CurrByte++ = pstrHostIfRegisterFrame->bReg;
3560 *pu8CurrByte++ = pstrHostIfRegisterFrame->u8Regid;
3561 memcpy(pu8CurrByte, &(pstrHostIfRegisterFrame->u16FrameType), sizeof(u16));
3564 strWID.size = sizeof(u16) + 2;
3568 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3569 get_id_from_handler(pstrWFIDrv));
3571 PRINT_ER("Failed to frame register config packet\n");
3580 * @brief Handle_ListenStateExpired
3581 * @details Handle of listen state expiration
3583 * @return Error code.
3588 #define FALSE_FRMWR_CHANNEL 100
3589 static u32 Handle_ListenStateExpired(struct host_if_drv *drvHandler,
3590 struct remain_ch *pstrHostIfRemainOnChan)
3592 u8 u8remain_on_chan_flag;
3595 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *) drvHandler;
3597 PRINT_D(HOSTINF_DBG, "CANCEL REMAIN ON CHAN\n");
3599 /*Make sure we are already in listen state*/
3600 /*This is to handle duplicate expiry messages (listen timer fired and supplicant called cancel_remain_on_channel())*/
3601 if (P2P_LISTEN_STATE) {
3602 u8remain_on_chan_flag = false;
3603 strWID.id = (u16)WID_REMAIN_ON_CHAN;
3604 strWID.type = WID_STR;
3606 strWID.ps8WidVal = kmalloc(strWID.size, GFP_KERNEL);
3608 if (strWID.ps8WidVal == NULL)
3609 PRINT_ER("Failed to allocate memory\n");
3611 strWID.ps8WidVal[0] = u8remain_on_chan_flag;
3612 strWID.ps8WidVal[1] = FALSE_FRMWR_CHANNEL;
3615 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3616 get_id_from_handler(pstrWFIDrv));
3617 if (s32Error != 0) {
3618 PRINT_ER("Failed to set remain on channel\n");
3622 if (pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanExpired) {
3623 pstrWFIDrv->strHostIfRemainOnChan.pRemainOnChanExpired(pstrWFIDrv->strHostIfRemainOnChan.pVoid
3624 , pstrHostIfRemainOnChan->u32ListenSessionID);
3626 P2P_LISTEN_STATE = 0;
3628 PRINT_D(GENERIC_DBG, "Not in listen state\n");
3638 * @brief ListenTimerCB
3639 * @details Callback function of remain-on-channel timer
3641 * @return Error code.
3646 static void ListenTimerCB(unsigned long arg)
3649 struct host_if_msg msg;
3650 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)arg;
3651 /*Stopping remain-on-channel timer*/
3652 del_timer(&pstrWFIDrv->hRemainOnChannel);
3654 /* prepare the Timer Callback message */
3655 memset(&msg, 0, sizeof(struct host_if_msg));
3656 msg.id = HOST_IF_MSG_LISTEN_TIMER_FIRED;
3657 msg.drv = pstrWFIDrv;
3658 msg.body.remain_on_ch.u32ListenSessionID = pstrWFIDrv->strHostIfRemainOnChan.u32ListenSessionID;
3660 /* send the message */
3661 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
3663 PRINT_ER("wilc_mq_send fail\n");
3667 * @brief Handle_EditStation
3668 * @details Sending config packet to edit station
3669 * @param[in] tstrWILC_AddStaParam* pstrStationParam
3675 static void Handle_PowerManagement(struct host_if_drv *drvHandler,
3676 struct power_mgmt_param *strPowerMgmtParam)
3681 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
3683 strWID.id = (u16)WID_POWER_MANAGEMENT;
3685 if (strPowerMgmtParam->bIsEnabled == true)
3686 s8PowerMode = MIN_FAST_PS;
3688 s8PowerMode = NO_POWERSAVE;
3689 PRINT_D(HOSTINF_DBG, "Handling power mgmt to %d\n", s8PowerMode);
3690 strWID.ps8WidVal = &s8PowerMode;
3691 strWID.size = sizeof(char);
3693 PRINT_D(HOSTINF_DBG, "Handling Power Management\n");
3696 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3697 get_id_from_handler(pstrWFIDrv));
3699 PRINT_ER("Failed to send power management config packet\n");
3703 * @brief Handle_SetMulticastFilter
3704 * @details Set Multicast filter in firmware
3705 * @param[in] struct set_multicast *strHostIfSetMulti
3711 static void Handle_SetMulticastFilter(struct host_if_drv *drvHandler,
3712 struct set_multicast *strHostIfSetMulti)
3718 PRINT_D(HOSTINF_DBG, "Setup Multicast Filter\n");
3720 strWID.id = (u16)WID_SETUP_MULTICAST_FILTER;
3721 strWID.type = WID_BIN;
3722 strWID.size = sizeof(struct set_multicast) + ((strHostIfSetMulti->u32count) * ETH_ALEN);
3723 strWID.ps8WidVal = kmalloc(strWID.size, GFP_KERNEL);
3724 if (strWID.ps8WidVal == NULL)
3727 pu8CurrByte = strWID.ps8WidVal;
3728 *pu8CurrByte++ = (strHostIfSetMulti->bIsEnabled & 0xFF);
3729 *pu8CurrByte++ = ((strHostIfSetMulti->bIsEnabled >> 8) & 0xFF);
3730 *pu8CurrByte++ = ((strHostIfSetMulti->bIsEnabled >> 16) & 0xFF);
3731 *pu8CurrByte++ = ((strHostIfSetMulti->bIsEnabled >> 24) & 0xFF);
3733 *pu8CurrByte++ = (strHostIfSetMulti->u32count & 0xFF);
3734 *pu8CurrByte++ = ((strHostIfSetMulti->u32count >> 8) & 0xFF);
3735 *pu8CurrByte++ = ((strHostIfSetMulti->u32count >> 16) & 0xFF);
3736 *pu8CurrByte++ = ((strHostIfSetMulti->u32count >> 24) & 0xFF);
3738 if ((strHostIfSetMulti->u32count) > 0)
3739 memcpy(pu8CurrByte, gau8MulticastMacAddrList, ((strHostIfSetMulti->u32count) * ETH_ALEN));
3742 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3743 get_id_from_handler(drvHandler));
3745 PRINT_ER("Failed to send setup multicast config packet\n");
3748 kfree(strWID.ps8WidVal);
3754 * @brief Handle_AddBASession
3755 * @details Add block ack session
3756 * @param[in] tstrHostIFSetMulti* strHostIfSetMulti
3758 * @author Amr Abdel-Moghny
3762 static s32 Handle_AddBASession(struct host_if_drv *drvHandler,
3763 struct ba_session_info *strHostIfBASessionInfo)
3767 int AddbaTimeout = 100;
3769 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
3771 PRINT_D(HOSTINF_DBG, "Opening Block Ack session with\nBSSID = %.2x:%.2x:%.2x\nTID=%d\nBufferSize == %d\nSessionTimeOut = %d\n",
3772 strHostIfBASessionInfo->au8Bssid[0],
3773 strHostIfBASessionInfo->au8Bssid[1],
3774 strHostIfBASessionInfo->au8Bssid[2],
3775 strHostIfBASessionInfo->u16BufferSize,
3776 strHostIfBASessionInfo->u16SessionTimeout,
3777 strHostIfBASessionInfo->u8Ted);
3779 strWID.id = (u16)WID_11E_P_ACTION_REQ;
3780 strWID.type = WID_STR;
3781 strWID.ps8WidVal = kmalloc(BLOCK_ACK_REQ_SIZE, GFP_KERNEL);
3782 strWID.size = BLOCK_ACK_REQ_SIZE;
3783 ptr = strWID.ps8WidVal;
3784 /* *ptr++ = 0x14; */
3788 memcpy(ptr, strHostIfBASessionInfo->au8Bssid, ETH_ALEN);
3790 *ptr++ = strHostIfBASessionInfo->u8Ted;
3794 *ptr++ = (strHostIfBASessionInfo->u16BufferSize & 0xFF);
3795 *ptr++ = ((strHostIfBASessionInfo->u16BufferSize >> 16) & 0xFF);
3797 *ptr++ = (strHostIfBASessionInfo->u16SessionTimeout & 0xFF);
3798 *ptr++ = ((strHostIfBASessionInfo->u16SessionTimeout >> 16) & 0xFF);
3800 *ptr++ = (AddbaTimeout & 0xFF);
3801 *ptr++ = ((AddbaTimeout >> 16) & 0xFF);
3802 /* Group Buffer Max Frames*/
3804 /* Group Buffer Timeout */
3807 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3808 get_id_from_handler(pstrWFIDrv));
3810 PRINT_D(HOSTINF_DBG, "Couldn't open BA Session\n");
3813 strWID.id = (u16)WID_11E_P_ACTION_REQ;
3814 strWID.type = WID_STR;
3816 ptr = strWID.ps8WidVal;
3817 /* *ptr++ = 0x14; */
3821 memcpy(ptr, strHostIfBASessionInfo->au8Bssid, ETH_ALEN);
3824 *ptr++ = strHostIfBASessionInfo->u8Ted;
3828 *ptr++ = (strHostIfBASessionInfo->u16BufferSize & 0xFF);
3829 *ptr++ = ((strHostIfBASessionInfo->u16SessionTimeout >> 16) & 0xFF);
3832 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3833 get_id_from_handler(pstrWFIDrv));
3835 if (strWID.ps8WidVal != NULL)
3836 kfree(strWID.ps8WidVal);
3843 * @brief Handle_DelAllRxBASessions
3844 * @details Delete all Rx BA sessions
3845 * @param[in] tstrHostIFSetMulti* strHostIfSetMulti
3847 * @author Abdelrahman Sobhy
3851 static s32 Handle_DelAllRxBASessions(struct host_if_drv *drvHandler,
3852 struct ba_session_info *strHostIfBASessionInfo)
3857 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)drvHandler;
3859 PRINT_D(GENERIC_DBG, "Delete Block Ack session with\nBSSID = %.2x:%.2x:%.2x\nTID=%d\n",
3860 strHostIfBASessionInfo->au8Bssid[0],
3861 strHostIfBASessionInfo->au8Bssid[1],
3862 strHostIfBASessionInfo->au8Bssid[2],
3863 strHostIfBASessionInfo->u8Ted);
3865 strWID.id = (u16)WID_DEL_ALL_RX_BA;
3866 strWID.type = WID_STR;
3867 strWID.ps8WidVal = kmalloc(BLOCK_ACK_REQ_SIZE, GFP_KERNEL);
3868 strWID.size = BLOCK_ACK_REQ_SIZE;
3869 ptr = strWID.ps8WidVal;
3873 memcpy(ptr, strHostIfBASessionInfo->au8Bssid, ETH_ALEN);
3875 *ptr++ = strHostIfBASessionInfo->u8Ted;
3876 /* BA direction = recipent*/
3879 *ptr++ = 32; /* Unspecific QOS reason */
3881 s32Error = send_config_pkt(SET_CFG, &strWID, 1,
3882 get_id_from_handler(pstrWFIDrv));
3884 PRINT_D(HOSTINF_DBG, "Couldn't delete BA Session\n");
3887 if (strWID.ps8WidVal != NULL)
3888 kfree(strWID.ps8WidVal);
3897 * @brief hostIFthread
3898 * @details Main thread to handle message queue requests
3899 * @param[in] void* pvArg
3905 static int hostIFthread(void *pvArg)
3908 struct host_if_msg msg;
3909 struct host_if_drv *pstrWFIDrv;
3911 memset(&msg, 0, sizeof(struct host_if_msg));
3914 wilc_mq_recv(&gMsgQHostIF, &msg, sizeof(struct host_if_msg), &u32Ret);
3915 pstrWFIDrv = (struct host_if_drv *)msg.drv;
3916 if (msg.id == HOST_IF_MSG_EXIT) {
3917 PRINT_D(GENERIC_DBG, "THREAD: Exiting HostIfThread\n");
3922 /*Re-Queue HIF message*/
3923 if ((!g_wilc_initialized)) {
3924 PRINT_D(GENERIC_DBG, "--WAIT--");
3925 usleep_range(200 * 1000, 200 * 1000);
3926 wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
3930 if (msg.id == HOST_IF_MSG_CONNECT && pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult != NULL) {
3931 PRINT_D(HOSTINF_DBG, "Requeue connect request till scan done received\n");
3932 wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
3933 usleep_range(2 * 1000, 2 * 1000);
3938 case HOST_IF_MSG_Q_IDLE:
3939 Handle_wait_msg_q_empty();
3942 case HOST_IF_MSG_SCAN:
3943 Handle_Scan(msg.drv, &msg.body.scan_info);
3946 case HOST_IF_MSG_CONNECT:
3947 Handle_Connect(msg.drv, &msg.body.con_info);
3950 case HOST_IF_MSG_FLUSH_CONNECT:
3951 Handle_FlushConnect(msg.drv);
3954 case HOST_IF_MSG_RCVD_NTWRK_INFO:
3955 Handle_RcvdNtwrkInfo(msg.drv, &msg.body.net_info);
3958 case HOST_IF_MSG_RCVD_GNRL_ASYNC_INFO:
3959 Handle_RcvdGnrlAsyncInfo(msg.drv, &msg.body.async_info);
3962 case HOST_IF_MSG_KEY:
3963 Handle_Key(msg.drv, &msg.body.key_info);
3966 case HOST_IF_MSG_CFG_PARAMS:
3968 Handle_CfgParam(msg.drv, &msg.body.cfg_info);
3971 case HOST_IF_MSG_SET_CHANNEL:
3972 Handle_SetChannel(msg.drv, &msg.body.channel_info);
3975 case HOST_IF_MSG_DISCONNECT:
3976 Handle_Disconnect(msg.drv);
3979 case HOST_IF_MSG_RCVD_SCAN_COMPLETE:
3980 del_timer(&pstrWFIDrv->hScanTimer);
3981 PRINT_D(HOSTINF_DBG, "scan completed successfully\n");
3983 /*Allow chip sleep, only if both interfaces are not connected*/
3984 if (!linux_wlan_get_num_conn_ifcs())
3985 chip_sleep_manually(INFINITE_SLEEP_TIME);
3987 Handle_ScanDone(msg.drv, SCAN_EVENT_DONE);
3989 if (pstrWFIDrv->u8RemainOnChan_pendingreq)
3990 Handle_RemainOnChan(msg.drv, &msg.body.remain_on_ch);
3994 case HOST_IF_MSG_GET_RSSI:
3995 Handle_GetRssi(msg.drv);
3998 case HOST_IF_MSG_GET_LINKSPEED:
3999 Handle_GetLinkspeed(msg.drv);
4002 case HOST_IF_MSG_GET_STATISTICS:
4003 Handle_GetStatistics(msg.drv, (tstrStatistics *)msg.body.data);
4006 case HOST_IF_MSG_GET_CHNL:
4007 Handle_GetChnl(msg.drv);
4010 case HOST_IF_MSG_ADD_BEACON:
4011 Handle_AddBeacon(msg.drv, &msg.body.beacon_info);
4014 case HOST_IF_MSG_DEL_BEACON:
4015 Handle_DelBeacon(msg.drv);
4018 case HOST_IF_MSG_ADD_STATION:
4019 Handle_AddStation(msg.drv, &msg.body.add_sta_info);
4022 case HOST_IF_MSG_DEL_STATION:
4023 Handle_DelStation(msg.drv, &msg.body.del_sta_info);
4026 case HOST_IF_MSG_EDIT_STATION:
4027 Handle_EditStation(msg.drv, &msg.body.edit_sta_info);
4030 case HOST_IF_MSG_GET_INACTIVETIME:
4031 Handle_Get_InActiveTime(msg.drv, &msg.body.mac_info);
4034 case HOST_IF_MSG_SCAN_TIMER_FIRED:
4035 PRINT_D(HOSTINF_DBG, "Scan Timeout\n");
4037 Handle_ScanDone(msg.drv, SCAN_EVENT_ABORTED);
4040 case HOST_IF_MSG_CONNECT_TIMER_FIRED:
4041 PRINT_D(HOSTINF_DBG, "Connect Timeout\n");
4042 Handle_ConnectTimeout(msg.drv);
4045 case HOST_IF_MSG_POWER_MGMT:
4046 Handle_PowerManagement(msg.drv, &msg.body.pwr_mgmt_info);
4049 case HOST_IF_MSG_SET_WFIDRV_HANDLER:
4050 Handle_SetWfiDrvHandler(msg.drv,
4054 case HOST_IF_MSG_SET_OPERATION_MODE:
4055 Handle_SetOperationMode(msg.drv, &msg.body.mode);
4058 case HOST_IF_MSG_SET_IPADDRESS:
4059 PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_SET_IPADDRESS\n");
4060 Handle_set_IPAddress(msg.drv, msg.body.ip_info.au8IPAddr, msg.body.ip_info.idx);
4063 case HOST_IF_MSG_GET_IPADDRESS:
4064 PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_SET_IPADDRESS\n");
4065 Handle_get_IPAddress(msg.drv, msg.body.ip_info.au8IPAddr, msg.body.ip_info.idx);
4068 case HOST_IF_MSG_SET_MAC_ADDRESS:
4069 Handle_SetMacAddress(msg.drv, &msg.body.set_mac_info);
4072 case HOST_IF_MSG_GET_MAC_ADDRESS:
4073 Handle_GetMacAddress(msg.drv, &msg.body.get_mac_info);
4076 case HOST_IF_MSG_REMAIN_ON_CHAN:
4077 PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_REMAIN_ON_CHAN\n");
4078 Handle_RemainOnChan(msg.drv, &msg.body.remain_on_ch);
4081 case HOST_IF_MSG_REGISTER_FRAME:
4082 PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_REGISTER_FRAME\n");
4083 Handle_RegisterFrame(msg.drv, &msg.body.reg_frame);
4086 case HOST_IF_MSG_LISTEN_TIMER_FIRED:
4087 Handle_ListenStateExpired(msg.drv, &msg.body.remain_on_ch);
4090 case HOST_IF_MSG_SET_MULTICAST_FILTER:
4091 PRINT_D(HOSTINF_DBG, "HOST_IF_MSG_SET_MULTICAST_FILTER\n");
4092 Handle_SetMulticastFilter(msg.drv, &msg.body.multicast_info);
4095 case HOST_IF_MSG_ADD_BA_SESSION:
4096 Handle_AddBASession(msg.drv, &msg.body.session_info);
4099 case HOST_IF_MSG_DEL_ALL_RX_BA_SESSIONS:
4100 Handle_DelAllRxBASessions(msg.drv, &msg.body.session_info);
4103 case HOST_IF_MSG_DEL_ALL_STA:
4104 Handle_DelAllSta(msg.drv, &msg.body.del_all_sta_info);
4108 PRINT_ER("[Host Interface] undefined Received Msg ID\n");
4113 PRINT_D(HOSTINF_DBG, "Releasing thread exit semaphore\n");
4114 up(&hSemHostIFthrdEnd);
4118 static void TimerCB_Scan(unsigned long arg)
4120 void *pvArg = (void *)arg;
4121 struct host_if_msg msg;
4123 /* prepare the Timer Callback message */
4124 memset(&msg, 0, sizeof(struct host_if_msg));
4126 msg.id = HOST_IF_MSG_SCAN_TIMER_FIRED;
4128 /* send the message */
4129 wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4132 static void TimerCB_Connect(unsigned long arg)
4134 void *pvArg = (void *)arg;
4135 struct host_if_msg msg;
4137 /* prepare the Timer Callback message */
4138 memset(&msg, 0, sizeof(struct host_if_msg));
4140 msg.id = HOST_IF_MSG_CONNECT_TIMER_FIRED;
4142 /* send the message */
4143 wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4148 * @brief removes wpa/wpa2 keys
4149 * @details only in BSS STA mode if External Supplicant support is enabled.
4150 * removes all WPA/WPA2 station key entries from MAC hardware.
4151 * @param[in,out] handle to the wifi driver
4152 * @param[in] 6 bytes of Station Adress in the station entry table
4153 * @return Error code indicating success/failure
4156 * @date 8 March 2012
4159 /* Check implementation in core adding 9 bytes to the input! */
4160 s32 host_int_remove_key(struct host_if_drv *hWFIDrv, const u8 *pu8StaAddress)
4164 strWID.id = (u16)WID_REMOVE_KEY;
4165 strWID.type = WID_STR;
4166 strWID.ps8WidVal = (s8 *)pu8StaAddress;
4173 * @brief removes WEP key
4174 * @details valid only in BSS STA mode if External Supplicant support is enabled.
4175 * remove a WEP key entry from MAC HW.
4176 * The BSS Station automatically finds the index of the entry using its
4177 * BSS ID and removes that entry from the MAC hardware.
4178 * @param[in,out] handle to the wifi driver
4179 * @param[in] 6 bytes of Station Adress in the station entry table
4180 * @return Error code indicating success/failure
4181 * @note NO need for the STA add since it is not used for processing
4183 * @date 8 March 2012
4186 int host_int_remove_wep_key(struct host_if_drv *wfi_drv, u8 index)
4189 struct host_if_msg msg;
4193 PRINT_ER("Failed to send setup multicast config packet\n");
4197 /* prepare the Remove Wep Key Message */
4198 memset(&msg, 0, sizeof(struct host_if_msg));
4200 msg.id = HOST_IF_MSG_KEY;
4201 msg.body.key_info.enuKeyType = WEP;
4202 msg.body.key_info.u8KeyAction = REMOVEKEY;
4206 uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = index;
4208 /* send the message */
4209 result = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4211 PRINT_ER("Error in sending message queue : Request to remove WEP key\n");
4212 down(&wfi_drv->hSemTestKeyBlock);
4218 * @brief sets WEP default key
4219 * @details Sets the index of the WEP encryption key in use,
4221 * @param[in,out] handle to the wifi driver
4222 * @param[in] key index ( 0, 1, 2, 3)
4223 * @return Error code indicating success/failure
4226 * @date 8 March 2012
4229 s32 host_int_set_WEPDefaultKeyID(struct host_if_drv *hWFIDrv, u8 u8Index)
4232 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
4233 struct host_if_msg msg;
4236 if (pstrWFIDrv == NULL) {
4238 PRINT_ER("driver is null\n");
4242 /* prepare the Key Message */
4243 memset(&msg, 0, sizeof(struct host_if_msg));
4246 msg.id = HOST_IF_MSG_KEY;
4247 msg.body.key_info.enuKeyType = WEP;
4248 msg.body.key_info.u8KeyAction = DEFAULTKEY;
4253 uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = u8Index;
4255 /* send the message */
4256 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4258 PRINT_ER("Error in sending message queue : Default key index\n");
4259 down(&(pstrWFIDrv->hSemTestKeyBlock));
4265 * @brief sets WEP deafault key
4266 * @details valid only in BSS STA mode if External Supplicant support is enabled.
4267 * sets WEP key entry into MAC hardware when it receives the
4268 * corresponding request from NDIS.
4269 * @param[in,out] handle to the wifi driver
4270 * @param[in] message containing WEP Key in the following format
4271 *|---------------------------------------|
4272 *|Key ID Value | Key Length | Key |
4273 *|-------------|------------|------------|
4274 | 1byte | 1byte | Key Length |
4275 ||---------------------------------------|
4277 * @return Error code indicating success/failure
4280 * @date 8 March 2012
4283 s32 host_int_add_wep_key_bss_sta(struct host_if_drv *hWFIDrv, const u8 *pu8WepKey, u8 u8WepKeylen, u8 u8Keyidx)
4287 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
4288 struct host_if_msg msg;
4290 if (pstrWFIDrv == NULL) {
4292 PRINT_ER("driver is null\n");
4296 /* prepare the Key Message */
4297 memset(&msg, 0, sizeof(struct host_if_msg));
4300 msg.id = HOST_IF_MSG_KEY;
4301 msg.body.key_info.enuKeyType = WEP;
4302 msg.body.key_info.u8KeyAction = ADDKEY;
4307 uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey = kmalloc(u8WepKeylen, GFP_KERNEL);
4309 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey,
4310 pu8WepKey, u8WepKeylen);
4314 uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen = (u8WepKeylen);
4317 uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = u8Keyidx;
4319 /* send the message */
4320 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4322 PRINT_ER("Error in sending message queue :WEP Key\n");
4323 down(&(pstrWFIDrv->hSemTestKeyBlock));
4331 * @brief host_int_add_wep_key_bss_ap
4332 * @details valid only in BSS AP mode if External Supplicant support is enabled.
4333 * sets WEP key entry into MAC hardware when it receives the
4335 * corresponding request from NDIS.
4336 * @param[in,out] handle to the wifi driver
4339 * @return Error code indicating success/failure
4345 s32 host_int_add_wep_key_bss_ap(struct host_if_drv *hWFIDrv, const u8 *pu8WepKey, u8 u8WepKeylen, u8 u8Keyidx, u8 u8mode, enum AUTHTYPE tenuAuth_type)
4349 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
4350 struct host_if_msg msg;
4353 if (pstrWFIDrv == NULL) {
4355 PRINT_ER("driver is null\n");
4359 /* prepare the Key Message */
4360 memset(&msg, 0, sizeof(struct host_if_msg));
4363 for (i = 0; i < u8WepKeylen; i++)
4364 PRINT_INFO(HOSTAPD_DBG, "KEY is %x\n", pu8WepKey[i]);
4366 msg.id = HOST_IF_MSG_KEY;
4367 msg.body.key_info.enuKeyType = WEP;
4368 msg.body.key_info.u8KeyAction = ADDKEY_AP;
4373 uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey = kmalloc(u8WepKeylen, GFP_KERNEL);
4376 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwepAttr.pu8WepKey,
4377 pu8WepKey, (u8WepKeylen));
4381 uniHostIFkeyAttr.strHostIFwepAttr.u8WepKeylen = (u8WepKeylen);
4384 uniHostIFkeyAttr.strHostIFwepAttr.u8Wepidx = u8Keyidx;
4387 uniHostIFkeyAttr.strHostIFwepAttr.u8mode = u8mode;
4390 uniHostIFkeyAttr.strHostIFwepAttr.tenuAuth_type = tenuAuth_type;
4391 /* send the message */
4392 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4395 PRINT_ER("Error in sending message queue :WEP Key\n");
4396 down(&(pstrWFIDrv->hSemTestKeyBlock));
4403 * @brief adds ptk Key
4405 * @param[in,out] handle to the wifi driver
4406 * @param[in] message containing PTK Key in the following format
4407 *|-----------------------------------------------------------------------------|
4408 *|Station address | Key Length | Temporal Key | Rx Michael Key |Tx Michael Key |
4409 *|----------------|------------|--------------|----------------|---------------|
4410 | 6 bytes | 1byte | 16 bytes | 8 bytes | 8 bytes |
4411 ||-----------------------------------------------------------------------------|
4412 * @return Error code indicating success/failure
4415 * @date 8 March 2012
4418 s32 host_int_add_ptk(struct host_if_drv *hWFIDrv, const u8 *pu8Ptk, u8 u8PtkKeylen,
4419 const u8 *mac_addr, const u8 *pu8RxMic, const u8 *pu8TxMic, u8 mode, u8 u8Ciphermode, u8 u8Idx)
4422 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
4423 struct host_if_msg msg;
4424 u8 u8KeyLen = u8PtkKeylen;
4427 if (pstrWFIDrv == NULL) {
4429 PRINT_ER("driver is null\n");
4432 if (pu8RxMic != NULL)
4433 u8KeyLen += RX_MIC_KEY_LEN;
4434 if (pu8TxMic != NULL)
4435 u8KeyLen += TX_MIC_KEY_LEN;
4437 /* prepare the Key Message */
4438 memset(&msg, 0, sizeof(struct host_if_msg));
4441 msg.id = HOST_IF_MSG_KEY;
4442 msg.body.key_info.enuKeyType = WPAPtk;
4443 if (mode == AP_MODE) {
4444 msg.body.key_info.u8KeyAction = ADDKEY_AP;
4446 uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx = u8Idx;
4448 if (mode == STATION_MODE)
4449 msg.body.key_info.u8KeyAction = ADDKEY;
4453 uniHostIFkeyAttr.strHostIFwpaAttr.pu8key = kmalloc(u8PtkKeylen, GFP_KERNEL);
4456 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
4457 pu8Ptk, u8PtkKeylen);
4459 if (pu8RxMic != NULL) {
4461 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 16,
4462 pu8RxMic, RX_MIC_KEY_LEN);
4464 for (i = 0; i < RX_MIC_KEY_LEN; i++)
4465 PRINT_INFO(CFG80211_DBG, "PairwiseRx[%d] = %x\n", i, pu8RxMic[i]);
4468 if (pu8TxMic != NULL) {
4470 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 24,
4471 pu8TxMic, TX_MIC_KEY_LEN);
4473 for (i = 0; i < TX_MIC_KEY_LEN; i++)
4474 PRINT_INFO(CFG80211_DBG, "PairwiseTx[%d] = %x\n", i, pu8TxMic[i]);
4479 uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen = u8KeyLen;
4482 uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode = u8Ciphermode;
4484 uniHostIFkeyAttr.strHostIFwpaAttr.pu8macaddr = mac_addr;
4487 /* send the message */
4488 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4491 PRINT_ER("Error in sending message queue: PTK Key\n");
4493 /* ////////////// */
4494 down(&(pstrWFIDrv->hSemTestKeyBlock));
4501 * @brief adds Rx GTk Key
4503 * @param[in,out] handle to the wifi driver
4504 * @param[in] pu8RxGtk : contains temporal key | Rx Mic | Tx Mic
4505 * u8GtkKeylen :The total key length
4507 * @return Error code indicating success/failure
4510 * @date 8 March 2012
4513 s32 host_int_add_rx_gtk(struct host_if_drv *hWFIDrv, const u8 *pu8RxGtk, u8 u8GtkKeylen,
4514 u8 u8KeyIdx, u32 u32KeyRSClen, const u8 *KeyRSC,
4515 const u8 *pu8RxMic, const u8 *pu8TxMic, u8 mode, u8 u8Ciphermode)
4518 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
4519 struct host_if_msg msg;
4520 u8 u8KeyLen = u8GtkKeylen;
4522 if (pstrWFIDrv == NULL) {
4524 PRINT_ER("driver is null\n");
4527 /* prepare the Key Message */
4528 memset(&msg, 0, sizeof(struct host_if_msg));
4531 if (pu8RxMic != NULL)
4532 u8KeyLen += RX_MIC_KEY_LEN;
4533 if (pu8TxMic != NULL)
4534 u8KeyLen += TX_MIC_KEY_LEN;
4535 if (KeyRSC != NULL) {
4537 uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq = kmalloc(u32KeyRSClen, GFP_KERNEL);
4539 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8seq,
4540 KeyRSC, u32KeyRSClen);
4544 msg.id = HOST_IF_MSG_KEY;
4545 msg.body.key_info.enuKeyType = WPARxGtk;
4548 if (mode == AP_MODE) {
4549 msg.body.key_info.u8KeyAction = ADDKEY_AP;
4550 msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.u8Ciphermode = u8Ciphermode;
4552 if (mode == STATION_MODE)
4553 msg.body.key_info.u8KeyAction = ADDKEY;
4557 uniHostIFkeyAttr.strHostIFwpaAttr.pu8key = kmalloc(u8KeyLen, GFP_KERNEL);
4559 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key,
4560 pu8RxGtk, u8GtkKeylen);
4562 if (pu8RxMic != NULL) {
4564 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 16,
4565 pu8RxMic, RX_MIC_KEY_LEN);
4568 if (pu8TxMic != NULL) {
4570 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFwpaAttr.pu8key + 24,
4571 pu8TxMic, TX_MIC_KEY_LEN);
4576 uniHostIFkeyAttr.strHostIFwpaAttr.u8keyidx = u8KeyIdx;
4578 uniHostIFkeyAttr.strHostIFwpaAttr.u8Keylen = u8KeyLen;
4581 uniHostIFkeyAttr.strHostIFwpaAttr.u8seqlen = u32KeyRSClen;
4585 /* send the message */
4586 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4588 PRINT_ER("Error in sending message queue: RX GTK\n");
4589 /* ////////////// */
4590 down(&(pstrWFIDrv->hSemTestKeyBlock));
4597 * @brief host_int_set_pmkid_info
4598 * @details caches the pmkid valid only in BSS STA mode if External Supplicant
4599 * support is enabled. This Function sets the PMKID in firmware
4600 * when host drivr receives the corresponding request from NDIS.
4601 * The firmware then includes theset PMKID in the appropriate
4603 * @param[in,out] handle to the wifi driver
4604 * @param[in] message containing PMKID Info in the following format
4605 *|-----------------------------------------------------------------|
4606 *|NumEntries | BSSID[1] | PMKID[1] | ... | BSSID[K] | PMKID[K] |
4607 *|-----------|------------|----------|-------|----------|----------|
4608 | 1 | 6 | 16 | ... | 6 | 16 |
4609 ||-----------------------------------------------------------------|
4610 * @return Error code indicating success/failure
4613 * @date 8 March 2012
4616 s32 host_int_set_pmkid_info(struct host_if_drv *hWFIDrv, struct host_if_pmkid_attr *pu8PmkidInfoArray)
4619 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
4620 struct host_if_msg msg;
4624 if (pstrWFIDrv == NULL) {
4626 PRINT_ER("driver is null\n");
4630 /* prepare the Key Message */
4631 memset(&msg, 0, sizeof(struct host_if_msg));
4633 msg.id = HOST_IF_MSG_KEY;
4634 msg.body.key_info.enuKeyType = PMKSA;
4635 msg.body.key_info.u8KeyAction = ADDKEY;
4638 for (i = 0; i < pu8PmkidInfoArray->numpmkid; i++) {
4640 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].bssid, &pu8PmkidInfoArray->pmkidlist[i].bssid,
4643 memcpy(msg.body.key_info.uniHostIFkeyAttr.strHostIFpmkidAttr.pmkidlist[i].pmkid, &pu8PmkidInfoArray->pmkidlist[i].pmkid,
4647 /* send the message */
4648 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4650 PRINT_ER(" Error in sending messagequeue: PMKID Info\n");
4656 * @brief gets the cached the pmkid info
4657 * @details valid only in BSS STA mode if External Supplicant
4658 * support is enabled. This Function sets the PMKID in firmware
4659 * when host drivr receives the corresponding request from NDIS.
4660 * The firmware then includes theset PMKID in the appropriate
4662 * @param[in,out] handle to the wifi driver,
4663 * message containing PMKID Info in the following format
4664 *|-----------------------------------------------------------------|
4665 *|NumEntries | BSSID[1] | PMKID[1] | ... | BSSID[K] | PMKID[K] |
4666 *|-----------|------------|----------|-------|----------|----------|
4667 | 1 | 6 | 16 | ... | 6 | 16 |
4668 ||-----------------------------------------------------------------|
4670 * @return Error code indicating success/failure
4673 * @date 8 March 2012
4676 s32 host_int_get_pmkid_info(struct host_if_drv *hWFIDrv, u8 *pu8PmkidInfoArray,
4677 u32 u32PmkidInfoLen)
4681 strWID.id = (u16)WID_PMKID_INFO;
4682 strWID.type = WID_STR;
4683 strWID.size = u32PmkidInfoLen;
4684 strWID.ps8WidVal = pu8PmkidInfoArray;
4690 * @brief sets the pass phrase
4691 * @details AP/STA mode. This function gives the pass phrase used to
4692 * generate the Pre-Shared Key when WPA/WPA2 is enabled
4693 * The length of the field can vary from 8 to 64 bytes,
4694 * the lower layer should get the
4695 * @param[in,out] handle to the wifi driver,
4696 * @param[in] String containing PSK
4697 * @return Error code indicating success/failure
4700 * @date 8 March 2012
4703 s32 host_int_set_RSNAConfigPSKPassPhrase(struct host_if_drv *hWFIDrv, u8 *pu8PassPhrase,
4708 /*validating psk length*/
4709 if ((u8Psklength > 7) && (u8Psklength < 65)) {
4710 strWID.id = (u16)WID_11I_PSK;
4711 strWID.type = WID_STR;
4712 strWID.ps8WidVal = pu8PassPhrase;
4713 strWID.size = u8Psklength;
4719 * @brief host_int_get_MacAddress
4720 * @details gets mac address
4721 * @param[in,out] handle to the wifi driver,
4723 * @return Error code indicating success/failure
4726 * @date 19 April 2012
4729 s32 host_int_get_MacAddress(struct host_if_drv *hWFIDrv, u8 *pu8MacAddress)
4732 struct host_if_msg msg;
4735 /* prepare the Message */
4736 memset(&msg, 0, sizeof(struct host_if_msg));
4738 msg.id = HOST_IF_MSG_GET_MAC_ADDRESS;
4739 msg.body.get_mac_info.u8MacAddress = pu8MacAddress;
4741 /* send the message */
4742 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4744 PRINT_ER("Failed to send get mac address\n");
4748 down(&hWaitResponse);
4753 * @brief host_int_set_MacAddress
4754 * @details sets mac address
4755 * @param[in,out] handle to the wifi driver,
4757 * @return Error code indicating success/failure
4760 * @date 16 July 2012
4763 s32 host_int_set_MacAddress(struct host_if_drv *hWFIDrv, u8 *pu8MacAddress)
4766 struct host_if_msg msg;
4768 PRINT_D(GENERIC_DBG, "mac addr = %x:%x:%x\n", pu8MacAddress[0], pu8MacAddress[1], pu8MacAddress[2]);
4770 /* prepare setting mac address message */
4771 memset(&msg, 0, sizeof(struct host_if_msg));
4772 msg.id = HOST_IF_MSG_SET_MAC_ADDRESS;
4773 memcpy(msg.body.set_mac_info.u8MacAddress, pu8MacAddress, ETH_ALEN);
4776 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4778 PRINT_ER("Failed to send message queue: Set mac address\n");
4785 * @brief host_int_get_RSNAConfigPSKPassPhrase
4786 * @details gets the pass phrase:AP/STA mode. This function gets the pass phrase used to
4787 * generate the Pre-Shared Key when WPA/WPA2 is enabled
4788 * The length of the field can vary from 8 to 64 bytes,
4789 * the lower layer should get the
4790 * @param[in,out] handle to the wifi driver,
4791 * String containing PSK
4792 * @return Error code indicating success/failure
4795 * @date 8 March 2012
4798 s32 host_int_get_RSNAConfigPSKPassPhrase(struct host_if_drv *hWFIDrv,
4799 u8 *pu8PassPhrase, u8 u8Psklength)
4803 strWID.id = (u16)WID_11I_PSK;
4804 strWID.type = WID_STR;
4805 strWID.size = u8Psklength;
4806 strWID.ps8WidVal = pu8PassPhrase;
4812 * @brief sets a start scan request
4814 * @param[in,out] handle to the wifi driver,
4815 * @param[in] Scan Source one of the following values
4818 * OBSS_PERIODIC_SCAN BIT1
4819 * OBSS_ONETIME_SCAN BIT2
4820 * @return Error code indicating success/failure
4823 * @date 8 March 2012
4826 s32 host_int_set_start_scan_req(struct host_if_drv *hWFIDrv, u8 scanSource)
4830 strWID.id = (u16)WID_START_SCAN_REQ;
4831 strWID.type = WID_CHAR;
4832 strWID.ps8WidVal = (s8 *)&scanSource;
4833 strWID.size = sizeof(char);
4839 * @brief host_int_get_start_scan_req
4840 * @details gets a start scan request
4841 * @param[in,out] handle to the wifi driver,
4842 * @param[in] Scan Source one of the following values
4845 * OBSS_PERIODIC_SCAN BIT1
4846 * OBSS_ONETIME_SCAN BIT2
4847 * @return Error code indicating success/failure
4850 * @date 8 March 2012
4854 s32 host_int_get_start_scan_req(struct host_if_drv *hWFIDrv, u8 *pu8ScanSource)
4858 strWID.id = (u16)WID_START_SCAN_REQ;
4859 strWID.type = WID_CHAR;
4860 strWID.ps8WidVal = (s8 *)pu8ScanSource;
4861 strWID.size = sizeof(char);
4867 * @brief host_int_set_join_req
4868 * @details sets a join request
4869 * @param[in,out] handle to the wifi driver,
4870 * @param[in] Index of the bss descriptor
4871 * @return Error code indicating success/failure
4874 * @date 8 March 2012
4877 s32 host_int_set_join_req(struct host_if_drv *hWFIDrv, u8 *pu8bssid,
4878 const u8 *pu8ssid, size_t ssidLen,
4879 const u8 *pu8IEs, size_t IEsLen,
4880 wilc_connect_result pfConnectResult, void *pvUserArg,
4881 u8 u8security, enum AUTHTYPE tenuAuth_type,
4886 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
4887 struct host_if_msg msg;
4888 tenuScanConnTimer enuScanConnTimer;
4890 if (pstrWFIDrv == NULL || pfConnectResult == NULL) {
4892 PRINT_ER("Driver is null\n");
4896 if (hWFIDrv == NULL) {
4897 PRINT_ER("Driver is null\n");
4901 if (pJoinParams == NULL) {
4902 PRINT_ER("Unable to Join - JoinParams is NULL\n");
4906 /* prepare the Connect Message */
4907 memset(&msg, 0, sizeof(struct host_if_msg));
4909 msg.id = HOST_IF_MSG_CONNECT;
4911 msg.body.con_info.u8security = u8security;
4912 msg.body.con_info.tenuAuth_type = tenuAuth_type;
4913 msg.body.con_info.u8channel = u8channel;
4914 msg.body.con_info.pfConnectResult = pfConnectResult;
4915 msg.body.con_info.pvUserArg = pvUserArg;
4916 msg.body.con_info.pJoinParams = pJoinParams;
4919 if (pu8bssid != NULL) {
4920 msg.body.con_info.pu8bssid = kmalloc(6, GFP_KERNEL); /* will be deallocated by the receiving thread */
4921 memcpy(msg.body.con_info.pu8bssid,
4925 if (pu8ssid != NULL) {
4926 msg.body.con_info.ssidLen = ssidLen;
4927 msg.body.con_info.pu8ssid = kmalloc(ssidLen, GFP_KERNEL); /* will be deallocated by the receiving thread */
4928 memcpy(msg.body.con_info.pu8ssid,
4933 if (pu8IEs != NULL) {
4934 msg.body.con_info.IEsLen = IEsLen;
4935 msg.body.con_info.pu8IEs = kmalloc(IEsLen, GFP_KERNEL); /* will be deallocated by the receiving thread */
4936 memcpy(msg.body.con_info.pu8IEs,
4939 if (pstrWFIDrv->enuHostIFstate < HOST_IF_CONNECTING)
4940 pstrWFIDrv->enuHostIFstate = HOST_IF_CONNECTING;
4942 PRINT_D(GENERIC_DBG, "Don't set state to 'connecting' as state is %d\n", pstrWFIDrv->enuHostIFstate);
4944 /* send the message */
4945 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4947 PRINT_ER("Failed to send message queue: Set join request\n");
4951 enuScanConnTimer = CONNECT_TIMER;
4952 pstrWFIDrv->hConnectTimer.data = (unsigned long)hWFIDrv;
4953 mod_timer(&pstrWFIDrv->hConnectTimer,
4954 jiffies + msecs_to_jiffies(HOST_IF_CONNECT_TIMEOUT));
4960 * @brief Flush a join request parameters to FW, but actual connection
4961 * @details The function is called in situation where WILC is connected to AP and
4962 * required to switch to hybrid FW for P2P connection
4963 * @param[in] handle to the wifi driver,
4964 * @return Error code indicating success/failure
4966 * @author Amr Abdel-Moghny
4971 s32 host_int_flush_join_req(struct host_if_drv *hWFIDrv)
4974 struct host_if_msg msg;
4976 if (!gu8FlushedJoinReq) {
4982 if (hWFIDrv == NULL) {
4984 PRINT_ER("Driver is null\n");
4988 msg.id = HOST_IF_MSG_FLUSH_CONNECT;
4991 /* send the message */
4992 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
4994 PRINT_ER("Failed to send message queue: Flush join request\n");
5002 * @brief host_int_disconnect
5003 * @details disconnects from the currently associated network
5004 * @param[in,out] handle to the wifi driver,
5005 * @param[in] Reason Code of the Disconnection
5006 * @return Error code indicating success/failure
5009 * @date 8 March 2012
5012 s32 host_int_disconnect(struct host_if_drv *hWFIDrv, u16 u16ReasonCode)
5015 struct host_if_msg msg;
5016 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
5018 if (pstrWFIDrv == NULL) {
5019 PRINT_ER("Driver is null\n");
5023 /* prepare the Disconnect Message */
5024 memset(&msg, 0, sizeof(struct host_if_msg));
5026 msg.id = HOST_IF_MSG_DISCONNECT;
5029 /* send the message */
5030 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5032 PRINT_ER("Failed to send message queue: disconnect\n");
5033 /* ////////////// */
5034 down(&(pstrWFIDrv->hSemTestDisconnectBlock));
5041 * @brief host_int_disconnect_station
5042 * @details disconnects a sta
5043 * @param[in,out] handle to the wifi driver,
5044 * @param[in] Association Id of the station to be disconnected
5045 * @return Error code indicating success/failure
5048 * @date 8 March 2012
5051 s32 host_int_disconnect_station(struct host_if_drv *hWFIDrv, u8 assoc_id)
5055 strWID.id = (u16)WID_DISCONNECT;
5056 strWID.type = WID_CHAR;
5057 strWID.ps8WidVal = (s8 *)&assoc_id;
5058 strWID.size = sizeof(char);
5064 * @brief host_int_get_assoc_req_info
5065 * @details gets a Association request info
5066 * @param[in,out] handle to the wifi driver,
5067 * Message containg assoc. req info in the following format
5068 * ------------------------------------------------------------------------
5069 | Management Frame Format |
5070 ||-------------------------------------------------------------------|
5071 ||Frame Control|Duration|DA|SA|BSSID|Sequence Control|Frame Body|FCS |
5072 ||-------------|--------|--|--|-----|----------------|----------|----|
5073 | 2 |2 |6 |6 |6 | 2 |0 - 2312 | 4 |
5074 ||-------------------------------------------------------------------|
5076 | Association Request Frame - Frame Body |
5077 ||-------------------------------------------------------------------|
5078 | Capability Information | Listen Interval | SSID | Supported Rates |
5079 ||------------------------|-----------------|------|-----------------|
5080 | 2 | 2 | 2-34 | 3-10 |
5081 | ---------------------------------------------------------------------
5082 * @return Error code indicating success/failure
5085 * @date 8 March 2012
5089 s32 host_int_get_assoc_req_info(struct host_if_drv *hWFIDrv, u8 *pu8AssocReqInfo,
5090 u32 u32AssocReqInfoLen)
5094 strWID.id = (u16)WID_ASSOC_REQ_INFO;
5095 strWID.type = WID_STR;
5096 strWID.ps8WidVal = pu8AssocReqInfo;
5097 strWID.size = u32AssocReqInfoLen;
5103 * @brief gets a Association Response info
5105 * @param[in,out] handle to the wifi driver,
5106 * Message containg assoc. resp info
5107 * @return Error code indicating success/failure
5110 * @date 8 March 2012
5113 s32 host_int_get_assoc_res_info(struct host_if_drv *hWFIDrv, u8 *pu8AssocRespInfo,
5114 u32 u32MaxAssocRespInfoLen, u32 *pu32RcvdAssocRespInfoLen)
5118 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
5120 if (pstrWFIDrv == NULL) {
5121 PRINT_ER("Driver is null\n");
5125 strWID.id = (u16)WID_ASSOC_RES_INFO;
5126 strWID.type = WID_STR;
5127 strWID.ps8WidVal = pu8AssocRespInfo;
5128 strWID.size = u32MaxAssocRespInfoLen;
5131 /* Sending Configuration packet */
5132 s32Error = send_config_pkt(GET_CFG, &strWID, 1,
5133 get_id_from_handler(pstrWFIDrv));
5135 *pu32RcvdAssocRespInfoLen = 0;
5136 PRINT_ER("Failed to send association response config packet\n");
5139 *pu32RcvdAssocRespInfoLen = strWID.size;
5146 * @brief gets a Association Response info
5147 * @details Valid only in STA mode. This function gives the RSSI
5148 * values observed in all the channels at the time of scanning.
5149 * The length of the field is 1 greater that the total number of
5150 * channels supported. Byte 0 contains the number of channels while
5151 * each of Byte N contains the observed RSSI value for the channel index N.
5152 * @param[in,out] handle to the wifi driver,
5153 * array of scanned channels' RSSI
5154 * @return Error code indicating success/failure
5157 * @date 8 March 2012
5160 s32 host_int_get_rx_power_level(struct host_if_drv *hWFIDrv, u8 *pu8RxPowerLevel,
5161 u32 u32RxPowerLevelLen)
5165 strWID.id = (u16)WID_RX_POWER_LEVEL;
5166 strWID.type = WID_STR;
5167 strWID.ps8WidVal = pu8RxPowerLevel;
5168 strWID.size = u32RxPowerLevelLen;
5174 * @brief sets a channel
5176 * @param[in,out] handle to the wifi driver,
5177 * @param[in] Index of the channel to be set
5178 *|-------------------------------------------------------------------|
5179 | CHANNEL1 CHANNEL2 .... CHANNEL14 |
5181 ||-------------------------------------------------------------------|
5182 * @return Error code indicating success/failure
5185 * @date 8 March 2012
5188 int host_int_set_mac_chnl_num(struct host_if_drv *wfi_drv, u8 channel)
5191 struct host_if_msg msg;
5194 PRINT_ER("driver is null\n");
5198 /* prepare the set channel message */
5199 memset(&msg, 0, sizeof(struct host_if_msg));
5200 msg.id = HOST_IF_MSG_SET_CHANNEL;
5201 msg.body.channel_info.u8SetChan = channel;
5204 result = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5206 PRINT_ER("wilc mq send fail\n");
5213 int host_int_wait_msg_queue_idle(void)
5217 struct host_if_msg msg;
5219 /* prepare the set driver handler message */
5221 memset(&msg, 0, sizeof(struct host_if_msg));
5222 msg.id = HOST_IF_MSG_Q_IDLE;
5223 result = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5225 PRINT_ER("wilc mq send fail\n");
5229 /* wait untill MSG Q is empty */
5230 down(&hWaitResponse);
5235 int host_int_set_wfi_drv_handler(struct host_if_drv *address)
5239 struct host_if_msg msg;
5241 /* prepare the set driver handler message */
5243 memset(&msg, 0, sizeof(struct host_if_msg));
5244 msg.id = HOST_IF_MSG_SET_WFIDRV_HANDLER;
5245 msg.body.drv.u32Address = get_id_from_handler(address);
5248 result = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5250 PRINT_ER("wilc mq send fail\n");
5257 int host_int_set_operation_mode(struct host_if_drv *wfi_drv, u32 mode)
5261 struct host_if_msg msg;
5263 /* prepare the set driver handler message */
5265 memset(&msg, 0, sizeof(struct host_if_msg));
5266 msg.id = HOST_IF_MSG_SET_OPERATION_MODE;
5267 msg.body.mode.u32Mode = mode;
5270 result = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5272 PRINT_ER("wilc mq send fail\n");
5280 * @brief gets the current channel index
5282 * @param[in,out] handle to the wifi driver,
5283 * current channel index
5284 *|-----------------------------------------------------------------------|
5285 | CHANNEL1 CHANNEL2 .... CHANNEL14 |
5287 ||-----------------------------------------------------------------------|
5288 * @return Error code indicating success/failure
5291 * @date 8 March 2012
5294 s32 host_int_get_host_chnl_num(struct host_if_drv *hWFIDrv, u8 *pu8ChNo)
5297 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
5298 struct host_if_msg msg;
5300 if (pstrWFIDrv == NULL) {
5301 PRINT_ER("driver is null\n");
5305 /* prepare the Get Channel Message */
5306 memset(&msg, 0, sizeof(struct host_if_msg));
5308 msg.id = HOST_IF_MSG_GET_CHNL;
5311 /* send the message */
5312 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5314 PRINT_ER("wilc mq send fail\n");
5315 down(&(pstrWFIDrv->hSemGetCHNL));
5326 * @brief host_int_get_inactive_time
5328 * @param[in,out] handle to the wifi driver,
5329 * current sta macaddress, inactive_time
5336 s32 host_int_get_inactive_time(struct host_if_drv *hWFIDrv, const u8 *mac, u32 *pu32InactiveTime)
5339 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
5340 struct host_if_msg msg;
5342 if (pstrWFIDrv == NULL) {
5343 PRINT_ER("driver is null\n");
5347 memset(&msg, 0, sizeof(struct host_if_msg));
5350 memcpy(msg.body.mac_info.mac,
5353 msg.id = HOST_IF_MSG_GET_INACTIVETIME;
5356 /* send the message */
5357 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5359 PRINT_ER("Failed to send get host channel param's message queue ");
5361 down(&(pstrWFIDrv->hSemInactiveTime));
5363 *pu32InactiveTime = gu32InactiveTime;
5369 * @brief host_int_test_get_int_wid
5370 * @details Test function for getting wids
5371 * @param[in,out] WILC_WFIDrvHandle hWFIDrv, u32* pu32TestMemAddr
5372 * @return Error code indicating success/failure
5375 * @date 8 March 2012
5378 s32 host_int_test_get_int_wid(struct host_if_drv *hWFIDrv, u32 *pu32TestMemAddr)
5383 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
5386 if (pstrWFIDrv == NULL) {
5387 PRINT_ER("driver is null\n");
5391 strWID.id = (u16)WID_MEMORY_ADDRESS;
5392 strWID.type = WID_INT;
5393 strWID.ps8WidVal = (s8 *)pu32TestMemAddr;
5394 strWID.size = sizeof(u32);
5396 s32Error = send_config_pkt(GET_CFG, &strWID, 1,
5397 get_id_from_handler(pstrWFIDrv));
5398 /*get the value by searching the local copy*/
5400 PRINT_ER("Failed to get wid value\n");
5403 PRINT_D(HOSTINF_DBG, "Successfully got wid value\n");
5412 * @brief host_int_get_rssi
5413 * @details gets the currently maintained RSSI value for the station.
5414 * The received signal strength value in dB.
5415 * The range of valid values is -128 to 0.
5416 * @param[in,out] handle to the wifi driver,
5418 * @return Error code indicating success/failure
5421 * @date 8 March 2012
5424 s32 host_int_get_rssi(struct host_if_drv *hWFIDrv, s8 *ps8Rssi)
5427 struct host_if_msg msg;
5428 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
5431 /* prepare the Get RSSI Message */
5432 memset(&msg, 0, sizeof(struct host_if_msg));
5434 msg.id = HOST_IF_MSG_GET_RSSI;
5437 /* send the message */
5438 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5440 PRINT_ER("Failed to send get host channel param's message queue ");
5444 down(&(pstrWFIDrv->hSemGetRSSI));
5447 if (ps8Rssi == NULL) {
5448 PRINT_ER("RSS pointer value is null");
5459 s32 host_int_get_link_speed(struct host_if_drv *hWFIDrv, s8 *ps8lnkspd)
5461 struct host_if_msg msg;
5464 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
5468 /* prepare the Get LINKSPEED Message */
5469 memset(&msg, 0, sizeof(struct host_if_msg));
5471 msg.id = HOST_IF_MSG_GET_LINKSPEED;
5474 /* send the message */
5475 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5477 PRINT_ER("Failed to send GET_LINKSPEED to message queue ");
5481 down(&(pstrWFIDrv->hSemGetLINKSPEED));
5484 if (ps8lnkspd == NULL) {
5485 PRINT_ER("LINKSPEED pointer value is null");
5490 *ps8lnkspd = gs8lnkspd;
5496 s32 host_int_get_statistics(struct host_if_drv *hWFIDrv, tstrStatistics *pstrStatistics)
5499 struct host_if_msg msg;
5502 /* prepare the Get RSSI Message */
5503 memset(&msg, 0, sizeof(struct host_if_msg));
5505 msg.id = HOST_IF_MSG_GET_STATISTICS;
5506 msg.body.data = (char *)pstrStatistics;
5508 /* send the message */
5509 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5511 PRINT_ER("Failed to send get host channel param's message queue ");
5515 down(&hWaitResponse);
5521 * @brief host_int_scan
5522 * @details scans a set of channels
5523 * @param[in,out] handle to the wifi driver,
5524 * @param[in] Scan source
5525 * Scan Type PASSIVE_SCAN = 0,
5528 * Channels Array length
5529 * Scan Callback function
5530 * @return Error code indicating success/failure
5533 * @date 8 March 2012
5536 s32 host_int_scan(struct host_if_drv *hWFIDrv, u8 u8ScanSource,
5537 u8 u8ScanType, u8 *pu8ChnlFreqList,
5538 u8 u8ChnlListLen, const u8 *pu8IEs,
5539 size_t IEsLen, wilc_scan_result ScanResult,
5541 struct hidden_network *pstrHiddenNetwork)
5544 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
5545 struct host_if_msg msg;
5546 tenuScanConnTimer enuScanConnTimer;
5548 if (pstrWFIDrv == NULL || ScanResult == NULL) {
5549 PRINT_ER("pstrWFIDrv or ScanResult = NULL\n");
5553 /* prepare the Scan Message */
5554 memset(&msg, 0, sizeof(struct host_if_msg));
5556 msg.id = HOST_IF_MSG_SCAN;
5558 if (pstrHiddenNetwork != NULL) {
5559 msg.body.scan_info.strHiddenNetwork.pstrHiddenNetworkInfo = pstrHiddenNetwork->pstrHiddenNetworkInfo;
5560 msg.body.scan_info.strHiddenNetwork.u8ssidnum = pstrHiddenNetwork->u8ssidnum;
5563 PRINT_D(HOSTINF_DBG, "pstrHiddenNetwork IS EQUAL TO NULL\n");
5566 msg.body.scan_info.u8ScanSource = u8ScanSource;
5567 msg.body.scan_info.u8ScanType = u8ScanType;
5568 msg.body.scan_info.pfScanResult = ScanResult;
5569 msg.body.scan_info.pvUserArg = pvUserArg;
5571 msg.body.scan_info.u8ChnlListLen = u8ChnlListLen;
5572 msg.body.scan_info.pu8ChnlFreqList = kmalloc(u8ChnlListLen, GFP_KERNEL); /* will be deallocated by the receiving thread */
5573 memcpy(msg.body.scan_info.pu8ChnlFreqList,
5574 pu8ChnlFreqList, u8ChnlListLen);
5576 msg.body.scan_info.IEsLen = IEsLen;
5577 msg.body.scan_info.pu8IEs = kmalloc(IEsLen, GFP_KERNEL); /* will be deallocated by the receiving thread */
5578 memcpy(msg.body.scan_info.pu8IEs,
5581 /* send the message */
5582 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5584 PRINT_ER("Error in sending message queue\n");
5588 enuScanConnTimer = SCAN_TIMER;
5589 PRINT_D(HOSTINF_DBG, ">> Starting the SCAN timer\n");
5590 pstrWFIDrv->hScanTimer.data = (unsigned long)hWFIDrv;
5591 mod_timer(&pstrWFIDrv->hScanTimer,
5592 jiffies + msecs_to_jiffies(HOST_IF_SCAN_TIMEOUT));
5598 * @brief hif_set_cfg
5599 * @details sets configuration wids values
5600 * @param[in,out] handle to the wifi driver,
5601 * @param[in] WID, WID value
5602 * @return Error code indicating success/failure
5605 * @date 8 March 2012
5608 s32 hif_set_cfg(struct host_if_drv *hWFIDrv, struct cfg_param_val *pstrCfgParamVal)
5612 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
5614 struct host_if_msg msg;
5617 if (pstrWFIDrv == NULL) {
5618 PRINT_ER("pstrWFIDrv NULL\n");
5621 /* prepare the WiphyParams Message */
5622 memset(&msg, 0, sizeof(struct host_if_msg));
5623 msg.id = HOST_IF_MSG_CFG_PARAMS;
5624 msg.body.cfg_info.pstrCfgParamVal = *pstrCfgParamVal;
5627 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5635 * @brief hif_get_cfg
5636 * @details gets configuration wids values
5637 * @param[in,out] handle to the wifi driver,
5640 * @return Error code indicating success/failure
5644 * @date 8 March 2012
5647 s32 hif_get_cfg(struct host_if_drv *hWFIDrv, u16 u16WID, u16 *pu16WID_Value)
5650 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
5652 down(&(pstrWFIDrv->gtOsCfgValuesSem));
5654 if (pstrWFIDrv == NULL) {
5655 PRINT_ER("pstrWFIDrv NULL\n");
5658 PRINT_D(HOSTINF_DBG, "Getting configuration parameters\n");
5662 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.bss_type;
5666 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.auth_type;
5669 case WID_AUTH_TIMEOUT:
5670 *pu16WID_Value = pstrWFIDrv->strCfgValues.auth_timeout;
5673 case WID_POWER_MANAGEMENT:
5674 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.power_mgmt_mode;
5677 case WID_SHORT_RETRY_LIMIT:
5678 *pu16WID_Value = pstrWFIDrv->strCfgValues.short_retry_limit;
5681 case WID_LONG_RETRY_LIMIT:
5682 *pu16WID_Value = pstrWFIDrv->strCfgValues.long_retry_limit;
5685 case WID_FRAG_THRESHOLD:
5686 *pu16WID_Value = pstrWFIDrv->strCfgValues.frag_threshold;
5689 case WID_RTS_THRESHOLD:
5690 *pu16WID_Value = pstrWFIDrv->strCfgValues.rts_threshold;
5694 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.preamble_type;
5697 case WID_SHORT_SLOT_ALLOWED:
5698 *pu16WID_Value = (u16) pstrWFIDrv->strCfgValues.short_slot_allowed;
5701 case WID_11N_TXOP_PROT_DISABLE:
5702 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.txop_prot_disabled;
5705 case WID_BEACON_INTERVAL:
5706 *pu16WID_Value = pstrWFIDrv->strCfgValues.beacon_interval;
5709 case WID_DTIM_PERIOD:
5710 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.dtim_period;
5713 case WID_SITE_SURVEY:
5714 *pu16WID_Value = (u16)pstrWFIDrv->strCfgValues.site_survey_enabled;
5717 case WID_SITE_SURVEY_SCAN_TIME:
5718 *pu16WID_Value = pstrWFIDrv->strCfgValues.site_survey_scan_time;
5721 case WID_ACTIVE_SCAN_TIME:
5722 *pu16WID_Value = pstrWFIDrv->strCfgValues.active_scan_time;
5725 case WID_PASSIVE_SCAN_TIME:
5726 *pu16WID_Value = pstrWFIDrv->strCfgValues.passive_scan_time;
5729 case WID_CURRENT_TX_RATE:
5730 *pu16WID_Value = pstrWFIDrv->strCfgValues.curr_tx_rate;
5737 up(&(pstrWFIDrv->gtOsCfgValuesSem));
5743 /*****************************************************************************/
5744 /* Notification Functions */
5745 /*****************************************************************************/
5747 * @brief notifies host with join and leave requests
5748 * @details This function prepares an Information frame having the
5749 * information about a joining/leaving station.
5750 * @param[in,out] handle to the wifi driver,
5751 * @param[in] 6 byte Sta Adress
5752 * Join or leave flag:
5755 * @return Error code indicating success/failure
5758 * @date 8 March 2012
5761 void host_int_send_join_leave_info_to_host
5762 (u16 assocId, u8 *stationAddr, bool joining)
5766 * @brief notifies host with stations found in scan
5767 * @details sends the beacon/probe response from scan
5768 * @param[in,out] handle to the wifi driver,
5769 * @param[in] Sta Address,
5771 * Rssi of the Station found
5772 * @return Error code indicating success/failure
5775 * @date 8 March 2012
5779 static void GetPeriodicRSSI(unsigned long arg)
5781 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)arg;
5783 if (pstrWFIDrv == NULL) {
5784 PRINT_ER("Driver handler is NULL\n");
5788 if (pstrWFIDrv->enuHostIFstate == HOST_IF_CONNECTED) {
5790 struct host_if_msg msg;
5792 /* prepare the Get RSSI Message */
5793 memset(&msg, 0, sizeof(struct host_if_msg));
5795 msg.id = HOST_IF_MSG_GET_RSSI;
5796 msg.drv = pstrWFIDrv;
5798 /* send the message */
5799 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
5801 PRINT_ER("Failed to send get host channel param's message queue ");
5805 g_hPeriodicRSSI.data = (unsigned long)pstrWFIDrv;
5806 mod_timer(&g_hPeriodicRSSI, jiffies + msecs_to_jiffies(5000));
5810 void host_int_send_network_info_to_host
5811 (u8 *macStartAddress, u16 u16RxFrameLen, s8 s8Rssi)
5815 * @brief host_int_init
5816 * @details host interface initialization function
5817 * @param[in,out] handle to the wifi driver,
5820 * @date 8 March 2012
5823 static u32 clients_count;
5825 s32 host_int_init(struct host_if_drv **phWFIDrv)
5828 struct host_if_drv *pstrWFIDrv;
5831 PRINT_D(HOSTINF_DBG, "Initializing host interface for client %d\n", clients_count + 1);
5833 gbScanWhileConnected = false;
5835 sema_init(&hWaitResponse, 0);
5837 /*Allocate host interface private structure*/
5838 pstrWFIDrv = kzalloc(sizeof(struct host_if_drv), GFP_KERNEL);
5843 *phWFIDrv = pstrWFIDrv;
5844 err = add_handler_in_list(pstrWFIDrv);
5850 g_obtainingIP = false;
5852 PRINT_D(HOSTINF_DBG, "Global handle pointer value=%p\n", pstrWFIDrv);
5853 if (clients_count == 0) {
5854 sema_init(&hSemHostIFthrdEnd, 0);
5855 sema_init(&hSemDeinitDrvHandle, 0);
5856 sema_init(&hSemHostIntDeinit, 1);
5859 sema_init(&pstrWFIDrv->hSemTestKeyBlock, 0);
5860 sema_init(&pstrWFIDrv->hSemTestDisconnectBlock, 0);
5861 sema_init(&pstrWFIDrv->hSemGetRSSI, 0);
5862 sema_init(&pstrWFIDrv->hSemGetLINKSPEED, 0);
5863 sema_init(&pstrWFIDrv->hSemGetCHNL, 0);
5864 sema_init(&pstrWFIDrv->hSemInactiveTime, 0);
5866 PRINT_D(HOSTINF_DBG, "INIT: CLIENT COUNT %d\n", clients_count);
5868 if (clients_count == 0) {
5869 result = wilc_mq_create(&gMsgQHostIF);
5872 PRINT_ER("Failed to creat MQ\n");
5875 HostIFthreadHandler = kthread_run(hostIFthread, NULL, "WILC_kthread");
5876 if (IS_ERR(HostIFthreadHandler)) {
5877 PRINT_ER("Failed to creat Thread\n");
5881 setup_timer(&g_hPeriodicRSSI, GetPeriodicRSSI,
5882 (unsigned long)pstrWFIDrv);
5883 mod_timer(&g_hPeriodicRSSI, jiffies + msecs_to_jiffies(5000));
5886 setup_timer(&pstrWFIDrv->hScanTimer, TimerCB_Scan, 0);
5888 setup_timer(&pstrWFIDrv->hConnectTimer, TimerCB_Connect, 0);
5890 /*Remain on channel timer*/
5891 setup_timer(&pstrWFIDrv->hRemainOnChannel, ListenTimerCB, 0);
5893 sema_init(&(pstrWFIDrv->gtOsCfgValuesSem), 1);
5894 down(&pstrWFIDrv->gtOsCfgValuesSem);
5896 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
5898 /*Initialize CFG WIDS Defualt Values*/
5900 pstrWFIDrv->strCfgValues.site_survey_enabled = SITE_SURVEY_OFF;
5901 pstrWFIDrv->strCfgValues.scan_source = DEFAULT_SCAN;
5902 pstrWFIDrv->strCfgValues.active_scan_time = ACTIVE_SCAN_TIME;
5903 pstrWFIDrv->strCfgValues.passive_scan_time = PASSIVE_SCAN_TIME;
5904 pstrWFIDrv->strCfgValues.curr_tx_rate = AUTORATE;
5906 pstrWFIDrv->u64P2p_MgmtTimeout = 0;
5908 PRINT_INFO(HOSTINF_DBG, "Initialization values, Site survey value: %d\n Scan source: %d\n Active scan time: %d\n Passive scan time: %d\nCurrent tx Rate = %d\n",
5910 pstrWFIDrv->strCfgValues.site_survey_enabled, pstrWFIDrv->strCfgValues.scan_source,
5911 pstrWFIDrv->strCfgValues.active_scan_time, pstrWFIDrv->strCfgValues.passive_scan_time,
5912 pstrWFIDrv->strCfgValues.curr_tx_rate);
5914 up(&pstrWFIDrv->gtOsCfgValuesSem);
5916 clients_count++; /* increase number of created entities */
5921 up(&pstrWFIDrv->gtOsCfgValuesSem);
5922 del_timer_sync(&pstrWFIDrv->hConnectTimer);
5923 del_timer_sync(&pstrWFIDrv->hScanTimer);
5924 kthread_stop(HostIFthreadHandler);
5926 wilc_mq_destroy(&gMsgQHostIF);
5931 * @brief host_int_deinit
5932 * @details host interface initialization function
5933 * @param[in,out] handle to the wifi driver,
5936 * @date 8 March 2012
5940 s32 host_int_deinit(struct host_if_drv *hWFIDrv)
5943 struct host_if_msg msg;
5946 /*obtain driver handle*/
5947 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
5949 if (pstrWFIDrv == NULL) {
5950 PRINT_ER("pstrWFIDrv = NULL\n");
5954 down(&hSemHostIntDeinit);
5956 terminated_handle = pstrWFIDrv;
5957 PRINT_D(HOSTINF_DBG, "De-initializing host interface for client %d\n", clients_count);
5959 /*Destroy all timers before acquiring hSemDeinitDrvHandle*/
5960 /*to guarantee handling all messages befor proceeding*/
5961 if (del_timer_sync(&pstrWFIDrv->hScanTimer)) {
5962 PRINT_D(HOSTINF_DBG, ">> Scan timer is active\n");
5963 /* msleep(HOST_IF_SCAN_TIMEOUT+1000); */
5966 if (del_timer_sync(&pstrWFIDrv->hConnectTimer)) {
5967 PRINT_D(HOSTINF_DBG, ">> Connect timer is active\n");
5968 /* msleep(HOST_IF_CONNECT_TIMEOUT+1000); */
5972 if (del_timer_sync(&g_hPeriodicRSSI)) {
5973 PRINT_D(HOSTINF_DBG, ">> Connect timer is active\n");
5974 /* msleep(HOST_IF_CONNECT_TIMEOUT+1000); */
5977 /*Destroy Remain-onchannel Timer*/
5978 del_timer_sync(&pstrWFIDrv->hRemainOnChannel);
5980 host_int_set_wfi_drv_handler(NULL);
5981 down(&hSemDeinitDrvHandle);
5984 /*Calling the CFG80211 scan done function with the abort flag set to true*/
5985 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
5986 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult(SCAN_EVENT_ABORTED, NULL,
5987 pstrWFIDrv->strWILC_UsrScanReq.u32UserScanPvoid, NULL);
5989 pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult = NULL;
5992 pstrWFIDrv->enuHostIFstate = HOST_IF_IDLE;
5994 gbScanWhileConnected = false;
5996 memset(&msg, 0, sizeof(struct host_if_msg));
5998 if (clients_count == 1) {
5999 if (del_timer_sync(&g_hPeriodicRSSI)) {
6000 PRINT_D(HOSTINF_DBG, ">> Connect timer is active\n");
6001 /* msleep(HOST_IF_CONNECT_TIMEOUT+1000); */
6003 msg.id = HOST_IF_MSG_EXIT;
6007 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6009 PRINT_ER("Error in sending deinit's message queue message function: Error(%d)\n", s32Error);
6011 down(&hSemHostIFthrdEnd);
6013 wilc_mq_destroy(&gMsgQHostIF);
6016 down(&(pstrWFIDrv->gtOsCfgValuesSem));
6018 /*Setting the gloabl driver handler with NULL*/
6019 /* gWFiDrvHandle = NULL; */
6020 ret = remove_handler_in_list(pstrWFIDrv);
6024 if (pstrWFIDrv != NULL) {
6026 /* pstrWFIDrv=NULL; */
6030 clients_count--; /* Decrease number of created entities */
6031 terminated_handle = NULL;
6032 up(&hSemHostIntDeinit);
6038 * @brief NetworkInfoReceived
6039 * @details function to to be called when network info packet is received
6040 * @param[in] pu8Buffer the received packet
6041 * @param[in] u32Length length of the received packet
6048 void NetworkInfoReceived(u8 *pu8Buffer, u32 u32Length)
6051 struct host_if_msg msg;
6053 struct host_if_drv *pstrWFIDrv = NULL;
6055 id = ((pu8Buffer[u32Length - 4]) | (pu8Buffer[u32Length - 3] << 8) | (pu8Buffer[u32Length - 2] << 16) | (pu8Buffer[u32Length - 1] << 24));
6056 pstrWFIDrv = get_handler_from_id(id);
6061 if (pstrWFIDrv == NULL || pstrWFIDrv == terminated_handle) {
6062 PRINT_ER("NetworkInfo received but driver not init[%p]\n", pstrWFIDrv);
6066 /* prepare the Asynchronous Network Info message */
6067 memset(&msg, 0, sizeof(struct host_if_msg));
6069 msg.id = HOST_IF_MSG_RCVD_NTWRK_INFO;
6070 msg.drv = pstrWFIDrv;
6072 msg.body.net_info.u32Length = u32Length;
6073 msg.body.net_info.pu8Buffer = kmalloc(u32Length, GFP_KERNEL); /* will be deallocated by the receiving thread */
6074 memcpy(msg.body.net_info.pu8Buffer,
6075 pu8Buffer, u32Length);
6077 /* send the message */
6078 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6080 PRINT_ER("Error in sending network info message queue message parameters: Error(%d)\n", s32Error);
6084 * @brief GnrlAsyncInfoReceived
6085 * @details function to be called when general Asynchronous info packet is received
6086 * @param[in] pu8Buffer the received packet
6087 * @param[in] u32Length length of the received packet
6094 void GnrlAsyncInfoReceived(u8 *pu8Buffer, u32 u32Length)
6097 struct host_if_msg msg;
6099 struct host_if_drv *pstrWFIDrv = NULL;
6101 down(&hSemHostIntDeinit);
6103 id = ((pu8Buffer[u32Length - 4]) | (pu8Buffer[u32Length - 3] << 8) | (pu8Buffer[u32Length - 2] << 16) | (pu8Buffer[u32Length - 1] << 24));
6104 pstrWFIDrv = get_handler_from_id(id);
6105 PRINT_D(HOSTINF_DBG, "General asynchronous info packet received\n");
6108 if (pstrWFIDrv == NULL || pstrWFIDrv == terminated_handle) {
6109 PRINT_D(HOSTINF_DBG, "Wifi driver handler is equal to NULL\n");
6110 up(&hSemHostIntDeinit);
6114 if (pstrWFIDrv->strWILC_UsrConnReq.pfUserConnectResult == NULL) {
6115 /* received mac status is not needed when there is no current Connect Request */
6116 PRINT_ER("Received mac status is not needed when there is no current Connect Reques\n");
6117 up(&hSemHostIntDeinit);
6121 /* prepare the General Asynchronous Info message */
6122 memset(&msg, 0, sizeof(struct host_if_msg));
6125 msg.id = HOST_IF_MSG_RCVD_GNRL_ASYNC_INFO;
6126 msg.drv = pstrWFIDrv;
6129 msg.body.async_info.u32Length = u32Length;
6130 msg.body.async_info.pu8Buffer = kmalloc(u32Length, GFP_KERNEL); /* will be deallocated by the receiving thread */
6131 memcpy(msg.body.async_info.pu8Buffer,
6132 pu8Buffer, u32Length);
6134 /* send the message */
6135 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6137 PRINT_ER("Error in sending message queue asynchronous message info: Error(%d)\n", s32Error);
6139 up(&hSemHostIntDeinit);
6143 * @brief host_int_ScanCompleteReceived
6144 * @details Setting scan complete received notifcation in message queue
6145 * @param[in] u8* pu8Buffer, u32 u32Length
6146 * @return Error code.
6151 void host_int_ScanCompleteReceived(u8 *pu8Buffer, u32 u32Length)
6154 struct host_if_msg msg;
6156 struct host_if_drv *pstrWFIDrv = NULL;
6158 id = ((pu8Buffer[u32Length - 4]) | (pu8Buffer[u32Length - 3] << 8) | (pu8Buffer[u32Length - 2] << 16) | (pu8Buffer[u32Length - 1] << 24));
6159 pstrWFIDrv = get_handler_from_id(id);
6162 PRINT_D(GENERIC_DBG, "Scan notification received %p\n", pstrWFIDrv);
6164 if (pstrWFIDrv == NULL || pstrWFIDrv == terminated_handle)
6167 /*if there is an ongoing scan request*/
6168 if (pstrWFIDrv->strWILC_UsrScanReq.pfUserScanResult) {
6169 /* prepare theScan Done message */
6170 memset(&msg, 0, sizeof(struct host_if_msg));
6172 msg.id = HOST_IF_MSG_RCVD_SCAN_COMPLETE;
6173 msg.drv = pstrWFIDrv;
6176 /* will be deallocated by the receiving thread */
6177 /*no need to send message body*/
6179 /*msg.body.strScanComplete.u32Length = u32Length;
6180 * msg.body.strScanComplete.pu8Buffer = (u8*)WILC_MALLOC(u32Length);
6181 * memcpy(msg.body.strScanComplete.pu8Buffer,
6182 * pu8Buffer, u32Length); */
6184 /* send the message */
6185 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6187 PRINT_ER("Error in sending message queue scan complete parameters: Error(%d)\n", s32Error);
6196 * @brief host_int_remain_on_channel
6198 * @param[in] Handle to wifi driver
6199 * Duration to remain on channel
6200 * Channel to remain on
6201 * Pointer to fn to be called on receive frames in listen state
6202 * Pointer to remain-on-channel expired fn
6204 * @return Error code.
6209 s32 host_int_remain_on_channel(struct host_if_drv *hWFIDrv, u32 u32SessionID, u32 u32duration, u16 chan, wilc_remain_on_chan_expired RemainOnChanExpired, wilc_remain_on_chan_ready RemainOnChanReady, void *pvUserArg)
6212 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6213 struct host_if_msg msg;
6215 if (pstrWFIDrv == NULL) {
6216 PRINT_ER("driver is null\n");
6220 /* prepare the remainonchan Message */
6221 memset(&msg, 0, sizeof(struct host_if_msg));
6223 /* prepare the WiphyParams Message */
6224 msg.id = HOST_IF_MSG_REMAIN_ON_CHAN;
6225 msg.body.remain_on_ch.u16Channel = chan;
6226 msg.body.remain_on_ch.pRemainOnChanExpired = RemainOnChanExpired;
6227 msg.body.remain_on_ch.pRemainOnChanReady = RemainOnChanReady;
6228 msg.body.remain_on_ch.pVoid = pvUserArg;
6229 msg.body.remain_on_ch.u32duration = u32duration;
6230 msg.body.remain_on_ch.u32ListenSessionID = u32SessionID;
6233 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6235 PRINT_ER("wilc mq send fail\n");
6241 * @brief host_int_ListenStateExpired
6243 * @param[in] Handle to wifi driver
6244 * Duration to remain on channel
6245 * Channel to remain on
6246 * Pointer to fn to be called on receive frames in listen state
6247 * Pointer to remain-on-channel expired fn
6249 * @return Error code.
6254 s32 host_int_ListenStateExpired(struct host_if_drv *hWFIDrv, u32 u32SessionID)
6257 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6258 struct host_if_msg msg;
6260 if (pstrWFIDrv == NULL) {
6261 PRINT_ER("driver is null\n");
6265 /*Stopping remain-on-channel timer*/
6266 del_timer(&pstrWFIDrv->hRemainOnChannel);
6268 /* prepare the timer fire Message */
6269 memset(&msg, 0, sizeof(struct host_if_msg));
6270 msg.id = HOST_IF_MSG_LISTEN_TIMER_FIRED;
6272 msg.body.remain_on_ch.u32ListenSessionID = u32SessionID;
6274 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6276 PRINT_ER("wilc mq send fail\n");
6282 * @brief host_int_frame_register
6284 * @param[in] Handle to wifi driver
6285 * @return Error code.
6289 s32 host_int_frame_register(struct host_if_drv *hWFIDrv, u16 u16FrameType, bool bReg)
6292 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6293 struct host_if_msg msg;
6295 if (pstrWFIDrv == NULL) {
6296 PRINT_ER("driver is null\n");
6300 memset(&msg, 0, sizeof(struct host_if_msg));
6302 /* prepare the WiphyParams Message */
6303 msg.id = HOST_IF_MSG_REGISTER_FRAME;
6304 switch (u16FrameType) {
6306 PRINT_D(HOSTINF_DBG, "ACTION\n");
6307 msg.body.reg_frame.u8Regid = ACTION_FRM_IDX;
6311 PRINT_D(HOSTINF_DBG, "PROBE REQ\n");
6312 msg.body.reg_frame.u8Regid = PROBE_REQ_IDX;
6316 PRINT_D(HOSTINF_DBG, "Not valid frame type\n");
6319 msg.body.reg_frame.u16FrameType = u16FrameType;
6320 msg.body.reg_frame.bReg = bReg;
6323 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6325 PRINT_ER("wilc mq send fail\n");
6333 * @brief host_int_add_beacon
6334 * @details Setting add beacon params in message queue
6335 * @param[in] WILC_WFIDrvHandle hWFIDrv, u32 u32Interval,
6336 * u32 u32DTIMPeriod,u32 u32HeadLen, u8* pu8Head,
6337 * u32 u32TailLen, u8* pu8Tail
6338 * @return Error code.
6343 s32 host_int_add_beacon(struct host_if_drv *hWFIDrv, u32 u32Interval,
6345 u32 u32HeadLen, u8 *pu8Head,
6346 u32 u32TailLen, u8 *pu8Tail)
6349 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6350 struct host_if_msg msg;
6351 struct beacon_attr *pstrSetBeaconParam = &msg.body.beacon_info;
6353 if (pstrWFIDrv == NULL) {
6354 PRINT_ER("driver is null\n");
6358 memset(&msg, 0, sizeof(struct host_if_msg));
6360 PRINT_D(HOSTINF_DBG, "Setting adding beacon message queue params\n");
6363 /* prepare the WiphyParams Message */
6364 msg.id = HOST_IF_MSG_ADD_BEACON;
6366 pstrSetBeaconParam->u32Interval = u32Interval;
6367 pstrSetBeaconParam->u32DTIMPeriod = u32DTIMPeriod;
6368 pstrSetBeaconParam->u32HeadLen = u32HeadLen;
6369 pstrSetBeaconParam->pu8Head = kmalloc(u32HeadLen, GFP_KERNEL);
6370 if (pstrSetBeaconParam->pu8Head == NULL) {
6374 memcpy(pstrSetBeaconParam->pu8Head, pu8Head, u32HeadLen);
6375 pstrSetBeaconParam->u32TailLen = u32TailLen;
6377 if (u32TailLen > 0) {
6378 pstrSetBeaconParam->pu8Tail = kmalloc(u32TailLen, GFP_KERNEL);
6379 if (pstrSetBeaconParam->pu8Tail == NULL) {
6383 memcpy(pstrSetBeaconParam->pu8Tail, pu8Tail, u32TailLen);
6385 pstrSetBeaconParam->pu8Tail = NULL;
6388 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6390 PRINT_ER("wilc mq send fail\n");
6394 if (pstrSetBeaconParam->pu8Head != NULL)
6395 kfree(pstrSetBeaconParam->pu8Head);
6397 if (pstrSetBeaconParam->pu8Tail != NULL)
6398 kfree(pstrSetBeaconParam->pu8Tail);
6407 * @brief host_int_del_beacon
6408 * @details Setting add beacon params in message queue
6409 * @param[in] WILC_WFIDrvHandle hWFIDrv
6410 * @return Error code.
6415 s32 host_int_del_beacon(struct host_if_drv *hWFIDrv)
6418 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6419 struct host_if_msg msg;
6421 if (pstrWFIDrv == NULL) {
6422 PRINT_ER("driver is null\n");
6426 /* prepare the WiphyParams Message */
6427 msg.id = HOST_IF_MSG_DEL_BEACON;
6429 PRINT_D(HOSTINF_DBG, "Setting deleting beacon message queue params\n");
6431 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6433 PRINT_ER("wilc_mq_send fail\n");
6440 * @brief host_int_add_station
6441 * @details Setting add station params in message queue
6442 * @param[in] WILC_WFIDrvHandle hWFIDrv, struct add_sta_param *pstrStaParams
6443 * @return Error code.
6448 s32 host_int_add_station(struct host_if_drv *hWFIDrv,
6449 struct add_sta_param *pstrStaParams)
6452 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6453 struct host_if_msg msg;
6454 struct add_sta_param *pstrAddStationMsg = &msg.body.add_sta_info;
6457 if (pstrWFIDrv == NULL) {
6458 PRINT_ER("driver is null\n");
6462 memset(&msg, 0, sizeof(struct host_if_msg));
6464 PRINT_D(HOSTINF_DBG, "Setting adding station message queue params\n");
6467 /* prepare the WiphyParams Message */
6468 msg.id = HOST_IF_MSG_ADD_STATION;
6471 memcpy(pstrAddStationMsg, pstrStaParams, sizeof(struct add_sta_param));
6472 if (pstrAddStationMsg->u8NumRates > 0) {
6473 u8 *rates = kmalloc(pstrAddStationMsg->u8NumRates, GFP_KERNEL);
6478 memcpy(rates, pstrStaParams->pu8Rates, pstrAddStationMsg->u8NumRates);
6479 pstrAddStationMsg->pu8Rates = rates;
6483 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6485 PRINT_ER("wilc_mq_send fail\n");
6490 * @brief host_int_del_station
6491 * @details Setting delete station params in message queue
6492 * @param[in] WILC_WFIDrvHandle hWFIDrv, u8* pu8MacAddr
6493 * @return Error code.
6498 s32 host_int_del_station(struct host_if_drv *hWFIDrv, const u8 *pu8MacAddr)
6501 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6502 struct host_if_msg msg;
6503 struct del_sta *pstrDelStationMsg = &msg.body.del_sta_info;
6505 if (pstrWFIDrv == NULL) {
6506 PRINT_ER("driver is null\n");
6510 memset(&msg, 0, sizeof(struct host_if_msg));
6512 PRINT_D(HOSTINF_DBG, "Setting deleting station message queue params\n");
6516 /* prepare the WiphyParams Message */
6517 msg.id = HOST_IF_MSG_DEL_STATION;
6520 if (pu8MacAddr == NULL)
6521 memset(pstrDelStationMsg->au8MacAddr, 255, ETH_ALEN);
6523 memcpy(pstrDelStationMsg->au8MacAddr, pu8MacAddr, ETH_ALEN);
6525 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6527 PRINT_ER("wilc_mq_send fail\n");
6531 * @brief host_int_del_allstation
6532 * @details Setting del station params in message queue
6533 * @param[in] WILC_WFIDrvHandle hWFIDrv, u8 pu8MacAddr[][ETH_ALEN]s
6534 * @return Error code.
6539 s32 host_int_del_allstation(struct host_if_drv *hWFIDrv,
6540 u8 pu8MacAddr[][ETH_ALEN])
6543 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6544 struct host_if_msg msg;
6545 struct del_all_sta *pstrDelAllStationMsg = &msg.body.del_all_sta_info;
6546 u8 au8Zero_Buff[ETH_ALEN] = {0};
6551 if (pstrWFIDrv == NULL) {
6552 PRINT_ER("driver is null\n");
6556 memset(&msg, 0, sizeof(struct host_if_msg));
6558 PRINT_D(HOSTINF_DBG, "Setting deauthenticating station message queue params\n");
6560 /* prepare the WiphyParams Message */
6561 msg.id = HOST_IF_MSG_DEL_ALL_STA;
6564 /* Handling situation of deauthenticing all associated stations*/
6565 for (i = 0; i < MAX_NUM_STA; i++) {
6566 if (memcmp(pu8MacAddr[i], au8Zero_Buff, ETH_ALEN)) {
6567 memcpy(pstrDelAllStationMsg->au8Sta_DelAllSta[i], pu8MacAddr[i], ETH_ALEN);
6568 PRINT_D(CFG80211_DBG, "BSSID = %x%x%x%x%x%x\n", pstrDelAllStationMsg->au8Sta_DelAllSta[i][0], pstrDelAllStationMsg->au8Sta_DelAllSta[i][1], pstrDelAllStationMsg->au8Sta_DelAllSta[i][2], pstrDelAllStationMsg->au8Sta_DelAllSta[i][3], pstrDelAllStationMsg->au8Sta_DelAllSta[i][4],
6569 pstrDelAllStationMsg->au8Sta_DelAllSta[i][5]);
6574 PRINT_D(CFG80211_DBG, "NO ASSOCIATED STAS\n");
6578 pstrDelAllStationMsg->u8Num_AssocSta = u8AssocNumb;
6579 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6583 PRINT_ER("wilc_mq_send fail\n");
6585 down(&hWaitResponse);
6592 * @brief host_int_edit_station
6593 * @details Setting edit station params in message queue
6594 * @param[in] WILC_WFIDrvHandle hWFIDrv, struct add_sta_param *pstrStaParams
6595 * @return Error code.
6600 s32 host_int_edit_station(struct host_if_drv *hWFIDrv,
6601 struct add_sta_param *pstrStaParams)
6604 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6605 struct host_if_msg msg;
6606 struct add_sta_param *pstrAddStationMsg = &msg.body.add_sta_info;
6608 if (pstrWFIDrv == NULL) {
6609 PRINT_ER("driver is null\n");
6613 PRINT_D(HOSTINF_DBG, "Setting editing station message queue params\n");
6615 memset(&msg, 0, sizeof(struct host_if_msg));
6618 /* prepare the WiphyParams Message */
6619 msg.id = HOST_IF_MSG_EDIT_STATION;
6622 memcpy(pstrAddStationMsg, pstrStaParams, sizeof(struct add_sta_param));
6623 if (pstrAddStationMsg->u8NumRates > 0) {
6624 u8 *rates = kmalloc(pstrAddStationMsg->u8NumRates, GFP_KERNEL);
6629 memcpy(rates, pstrStaParams->pu8Rates, pstrAddStationMsg->u8NumRates);
6630 pstrAddStationMsg->pu8Rates = rates;
6633 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6635 PRINT_ER("wilc_mq_send fail\n");
6640 s32 host_int_set_power_mgmt(struct host_if_drv *hWFIDrv, bool bIsEnabled, u32 u32Timeout)
6643 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6644 struct host_if_msg msg;
6645 struct power_mgmt_param *pstrPowerMgmtParam = &msg.body.pwr_mgmt_info;
6647 PRINT_INFO(HOSTINF_DBG, "\n\n>> Setting PS to %d <<\n\n", bIsEnabled);
6649 if (pstrWFIDrv == NULL) {
6650 PRINT_ER("driver is null\n");
6654 PRINT_D(HOSTINF_DBG, "Setting Power management message queue params\n");
6656 memset(&msg, 0, sizeof(struct host_if_msg));
6659 /* prepare the WiphyParams Message */
6660 msg.id = HOST_IF_MSG_POWER_MGMT;
6663 pstrPowerMgmtParam->bIsEnabled = bIsEnabled;
6664 pstrPowerMgmtParam->u32Timeout = u32Timeout;
6667 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6669 PRINT_ER("wilc_mq_send fail\n");
6673 s32 host_int_setup_multicast_filter(struct host_if_drv *hWFIDrv, bool bIsEnabled, u32 u32count)
6677 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6678 struct host_if_msg msg;
6679 struct set_multicast *pstrMulticastFilterParam = &msg.body.multicast_info;
6682 if (pstrWFIDrv == NULL) {
6683 PRINT_ER("driver is null\n");
6687 PRINT_D(HOSTINF_DBG, "Setting Multicast Filter params\n");
6689 memset(&msg, 0, sizeof(struct host_if_msg));
6692 /* prepare the WiphyParams Message */
6693 msg.id = HOST_IF_MSG_SET_MULTICAST_FILTER;
6696 pstrMulticastFilterParam->bIsEnabled = bIsEnabled;
6697 pstrMulticastFilterParam->u32count = u32count;
6699 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6701 PRINT_ER("wilc_mq_send fail\n");
6706 * @brief host_int_ParseJoinBssParam
6707 * @details Parse Needed Join Parameters and save it in a new JoinBssParam entry
6708 * @param[in] tstrNetworkInfo* ptstrNetworkInfo
6713 static void *host_int_ParseJoinBssParam(tstrNetworkInfo *ptstrNetworkInfo)
6715 tstrJoinBssParam *pNewJoinBssParam = NULL;
6724 u8 pcipherTotalCount = 0;
6725 u8 authTotalCount = 0;
6728 pu8IEs = ptstrNetworkInfo->pu8IEs;
6729 u16IEsLen = ptstrNetworkInfo->u16IEsLen;
6731 pNewJoinBssParam = kmalloc(sizeof(tstrJoinBssParam), GFP_KERNEL);
6732 if (pNewJoinBssParam != NULL) {
6733 memset(pNewJoinBssParam, 0, sizeof(tstrJoinBssParam));
6734 pNewJoinBssParam->dtim_period = ptstrNetworkInfo->u8DtimPeriod;
6735 pNewJoinBssParam->beacon_period = ptstrNetworkInfo->u16BeaconPeriod;
6736 pNewJoinBssParam->cap_info = ptstrNetworkInfo->u16CapInfo;
6737 memcpy(pNewJoinBssParam->au8bssid, ptstrNetworkInfo->au8bssid, 6);
6739 * PRINT_D(HOSTINF_DBG,"%c",pNewJoinBssParam->au8bssid[i]);*/
6740 memcpy((u8 *)pNewJoinBssParam->ssid, ptstrNetworkInfo->au8ssid, ptstrNetworkInfo->u8SsidLen + 1);
6741 pNewJoinBssParam->ssidLen = ptstrNetworkInfo->u8SsidLen;
6742 memset(pNewJoinBssParam->rsn_pcip_policy, 0xFF, 3);
6743 memset(pNewJoinBssParam->rsn_auth_policy, 0xFF, 3);
6744 /*for(i=0; i<pNewJoinBssParam->ssidLen;i++)
6745 * PRINT_D(HOSTINF_DBG,"%c",pNewJoinBssParam->ssid[i]);*/
6747 /* parse supported rates: */
6748 while (index < u16IEsLen) {
6749 /* supportedRates IE */
6750 if (pu8IEs[index] == SUPP_RATES_IE) {
6751 /* PRINT_D(HOSTINF_DBG, "Supported Rates\n"); */
6752 suppRatesNo = pu8IEs[index + 1];
6753 pNewJoinBssParam->supp_rates[0] = suppRatesNo;
6754 index += 2; /* skipping ID and length bytes; */
6756 for (i = 0; i < suppRatesNo; i++) {
6757 pNewJoinBssParam->supp_rates[i + 1] = pu8IEs[index + i];
6758 /* PRINT_D(HOSTINF_DBG,"%0x ",pNewJoinBssParam->supp_rates[i+1]); */
6760 index += suppRatesNo;
6763 /* Ext SupportedRates IE */
6764 else if (pu8IEs[index] == EXT_SUPP_RATES_IE) {
6765 /* PRINT_D(HOSTINF_DBG, "Extended Supported Rates\n"); */
6766 /* checking if no of ext. supp and supp rates < max limit */
6767 extSuppRatesNo = pu8IEs[index + 1];
6768 if (extSuppRatesNo > (MAX_RATES_SUPPORTED - suppRatesNo))
6769 pNewJoinBssParam->supp_rates[0] = MAX_RATES_SUPPORTED;
6771 pNewJoinBssParam->supp_rates[0] += extSuppRatesNo;
6773 /* pNewJoinBssParam.supp_rates[0] contains now old number not the ext. no */
6774 for (i = 0; i < (pNewJoinBssParam->supp_rates[0] - suppRatesNo); i++) {
6775 pNewJoinBssParam->supp_rates[suppRatesNo + i + 1] = pu8IEs[index + i];
6776 /* PRINT_D(HOSTINF_DBG,"%0x ",pNewJoinBssParam->supp_rates[suppRatesNo+i+1]); */
6778 index += extSuppRatesNo;
6782 else if (pu8IEs[index] == HT_CAPABILITY_IE) {
6783 /* if IE found set the flag */
6784 pNewJoinBssParam->ht_capable = true;
6785 index += pu8IEs[index + 1] + 2; /* ID,Length bytes and IE body */
6786 /* PRINT_D(HOSTINF_DBG,"HT_CAPABALE\n"); */
6788 } else if ((pu8IEs[index] == WMM_IE) && /* WMM Element ID */
6789 (pu8IEs[index + 2] == 0x00) && (pu8IEs[index + 3] == 0x50) &&
6790 (pu8IEs[index + 4] == 0xF2) && /* OUI */
6791 (pu8IEs[index + 5] == 0x02) && /* OUI Type */
6792 ((pu8IEs[index + 6] == 0x00) || (pu8IEs[index + 6] == 0x01)) && /* OUI Sub Type */
6793 (pu8IEs[index + 7] == 0x01)) {
6794 /* Presence of WMM Info/Param element indicates WMM capability */
6795 pNewJoinBssParam->wmm_cap = true;
6797 /* Check if Bit 7 is set indicating U-APSD capability */
6798 if (pu8IEs[index + 8] & BIT(7))
6799 pNewJoinBssParam->uapsd_cap = true;
6800 index += pu8IEs[index + 1] + 2;
6803 else if ((pu8IEs[index] == P2P_IE) && /* P2P Element ID */
6804 (pu8IEs[index + 2] == 0x50) && (pu8IEs[index + 3] == 0x6f) &&
6805 (pu8IEs[index + 4] == 0x9a) && /* OUI */
6806 (pu8IEs[index + 5] == 0x09) && (pu8IEs[index + 6] == 0x0c)) { /* OUI Type */
6809 pNewJoinBssParam->tsf = ptstrNetworkInfo->u32Tsf;
6810 pNewJoinBssParam->u8NoaEnbaled = 1;
6811 pNewJoinBssParam->u8Index = pu8IEs[index + 9];
6813 /* Check if Bit 7 is set indicating Opss capability */
6814 if (pu8IEs[index + 10] & BIT(7)) {
6815 pNewJoinBssParam->u8OppEnable = 1;
6816 pNewJoinBssParam->u8CtWindow = pu8IEs[index + 10];
6818 pNewJoinBssParam->u8OppEnable = 0;
6820 PRINT_D(GENERIC_DBG, "P2P Dump\n");
6821 for (i = 0; i < pu8IEs[index + 7]; i++)
6822 PRINT_D(GENERIC_DBG, " %x\n", pu8IEs[index + 9 + i]);
6824 pNewJoinBssParam->u8Count = pu8IEs[index + 11];
6825 u16P2P_count = index + 12;
6827 memcpy(pNewJoinBssParam->au8Duration, pu8IEs + u16P2P_count, 4);
6830 memcpy(pNewJoinBssParam->au8Interval, pu8IEs + u16P2P_count, 4);
6833 memcpy(pNewJoinBssParam->au8StartTime, pu8IEs + u16P2P_count, 4);
6835 index += pu8IEs[index + 1] + 2;
6839 else if ((pu8IEs[index] == RSN_IE) ||
6840 ((pu8IEs[index] == WPA_IE) && (pu8IEs[index + 2] == 0x00) &&
6841 (pu8IEs[index + 3] == 0x50) && (pu8IEs[index + 4] == 0xF2) &&
6842 (pu8IEs[index + 5] == 0x01))) {
6843 u16 rsnIndex = index;
6844 /*PRINT_D(HOSTINF_DBG,"RSN IE Length:%d\n",pu8IEs[rsnIndex+1]);
6845 * for(i=0; i<pu8IEs[rsnIndex+1]; i++)
6847 * PRINT_D(HOSTINF_DBG,"%0x ",pu8IEs[rsnIndex+2+i]);
6849 if (pu8IEs[rsnIndex] == RSN_IE) {
6850 pNewJoinBssParam->mode_802_11i = 2;
6851 /* PRINT_D(HOSTINF_DBG,"\nRSN_IE\n"); */
6852 } else { /* check if rsn was previously parsed */
6853 if (pNewJoinBssParam->mode_802_11i == 0)
6854 pNewJoinBssParam->mode_802_11i = 1;
6855 /* PRINT_D(HOSTINF_DBG,"\nWPA_IE\n"); */
6858 rsnIndex += 7; /* skipping id, length, version(2B) and first 3 bytes of gcipher */
6859 pNewJoinBssParam->rsn_grp_policy = pu8IEs[rsnIndex];
6861 /* PRINT_D(HOSTINF_DBG,"Group Policy: %0x\n",pNewJoinBssParam->rsn_grp_policy); */
6862 /* initialize policies with invalid values */
6864 jumpOffset = pu8IEs[rsnIndex] * 4; /* total no.of bytes of pcipher field (count*4) */
6866 /*parsing pairwise cipher*/
6868 /* saving 3 pcipher max. */
6869 pcipherCount = (pu8IEs[rsnIndex] > 3) ? 3 : pu8IEs[rsnIndex];
6870 rsnIndex += 2; /* jump 2 bytes of pcipher count */
6872 /* PRINT_D(HOSTINF_DBG,"\npcipher:%d\n",pcipherCount); */
6873 for (i = pcipherTotalCount, j = 0; i < pcipherCount + pcipherTotalCount && i < 3; i++, j++) {
6874 /* each count corresponds to 4 bytes, only last byte is saved */
6875 pNewJoinBssParam->rsn_pcip_policy[i] = pu8IEs[rsnIndex + ((j + 1) * 4) - 1];
6876 /* PRINT_D(HOSTINF_DBG,"PAIR policy = [%0x,%0x]\n",pNewJoinBssParam->rsn_pcip_policy[i],i); */
6878 pcipherTotalCount += pcipherCount;
6879 rsnIndex += jumpOffset;
6881 jumpOffset = pu8IEs[rsnIndex] * 4;
6883 /*parsing AKM suite (auth_policy)*/
6884 /* saving 3 auth policies max. */
6885 authCount = (pu8IEs[rsnIndex] > 3) ? 3 : pu8IEs[rsnIndex];
6886 rsnIndex += 2; /* jump 2 bytes of pcipher count */
6888 for (i = authTotalCount, j = 0; i < authTotalCount + authCount; i++, j++) {
6889 /* each count corresponds to 4 bytes, only last byte is saved */
6890 pNewJoinBssParam->rsn_auth_policy[i] = pu8IEs[rsnIndex + ((j + 1) * 4) - 1];
6892 authTotalCount += authCount;
6893 rsnIndex += jumpOffset;
6894 /*pasring rsn cap. only if rsn IE*/
6895 if (pu8IEs[index] == RSN_IE) {
6896 pNewJoinBssParam->rsn_cap[0] = pu8IEs[rsnIndex];
6897 pNewJoinBssParam->rsn_cap[1] = pu8IEs[rsnIndex + 1];
6900 pNewJoinBssParam->rsn_found = true;
6901 index += pu8IEs[index + 1] + 2; /* ID,Length bytes and IE body */
6904 index += pu8IEs[index + 1] + 2; /* ID,Length bytes and IE body */
6911 return (void *)pNewJoinBssParam;
6915 void host_int_freeJoinParams(void *pJoinParams)
6917 if ((tstrJoinBssParam *)pJoinParams != NULL)
6918 kfree((tstrJoinBssParam *)pJoinParams);
6920 PRINT_ER("Unable to FREE null pointer\n");
6923 s32 host_int_delBASession(struct host_if_drv *hWFIDrv, char *pBSSID, char TID)
6926 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6927 struct host_if_msg msg;
6928 struct ba_session_info *pBASessionInfo = &msg.body.session_info;
6930 if (pstrWFIDrv == NULL) {
6931 PRINT_ER("driver is null\n");
6935 memset(&msg, 0, sizeof(struct host_if_msg));
6937 /* prepare the WiphyParams Message */
6938 msg.id = HOST_IF_MSG_DEL_BA_SESSION;
6940 memcpy(pBASessionInfo->au8Bssid, pBSSID, ETH_ALEN);
6941 pBASessionInfo->u8Ted = TID;
6944 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6946 PRINT_ER("wilc_mq_send fail\n");
6948 down(&hWaitResponse);
6953 s32 host_int_del_All_Rx_BASession(struct host_if_drv *hWFIDrv, char *pBSSID, char TID)
6956 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6957 struct host_if_msg msg;
6958 struct ba_session_info *pBASessionInfo = &msg.body.session_info;
6960 if (pstrWFIDrv == NULL) {
6961 PRINT_ER("driver is null\n");
6965 memset(&msg, 0, sizeof(struct host_if_msg));
6967 /* prepare the WiphyParams Message */
6968 msg.id = HOST_IF_MSG_DEL_ALL_RX_BA_SESSIONS;
6970 memcpy(pBASessionInfo->au8Bssid, pBSSID, ETH_ALEN);
6971 pBASessionInfo->u8Ted = TID;
6974 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
6976 PRINT_ER("wilc_mq_send fail\n");
6978 down(&hWaitResponse);
6984 * @brief host_int_setup_ipaddress
6985 * @details setup IP in firmware
6986 * @param[in] Handle to wifi driver
6987 * @return Error code.
6988 * @author Abdelrahman Sobhy
6991 s32 host_int_setup_ipaddress(struct host_if_drv *hWFIDrv, u8 *u16ipadd, u8 idx)
6994 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
6995 struct host_if_msg msg;
6997 /* TODO: Enable This feature on softap firmware */
7000 if (pstrWFIDrv == NULL) {
7001 PRINT_ER("driver is null\n");
7005 memset(&msg, 0, sizeof(struct host_if_msg));
7007 /* prepare the WiphyParams Message */
7008 msg.id = HOST_IF_MSG_SET_IPADDRESS;
7010 msg.body.ip_info.au8IPAddr = u16ipadd;
7012 msg.body.ip_info.idx = idx;
7014 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
7016 PRINT_ER("wilc_mq_send fail\n");
7024 * @brief host_int_get_ipaddress
7025 * @details Get IP from firmware
7026 * @param[in] Handle to wifi driver
7027 * @return Error code.
7028 * @author Abdelrahman Sobhy
7031 s32 host_int_get_ipaddress(struct host_if_drv *hWFIDrv, u8 *u16ipadd, u8 idx)
7034 struct host_if_drv *pstrWFIDrv = (struct host_if_drv *)hWFIDrv;
7035 struct host_if_msg msg;
7037 if (pstrWFIDrv == NULL) {
7038 PRINT_ER("driver is null\n");
7042 memset(&msg, 0, sizeof(struct host_if_msg));
7044 /* prepare the WiphyParams Message */
7045 msg.id = HOST_IF_MSG_GET_IPADDRESS;
7047 msg.body.ip_info.au8IPAddr = u16ipadd;
7049 msg.body.ip_info.idx = idx;
7051 s32Error = wilc_mq_send(&gMsgQHostIF, &msg, sizeof(struct host_if_msg));
7053 PRINT_ER("wilc_mq_send fail\n");