qcacld-3.0: Add support for roam scan mode command in connection mgr

Add changes to send roam scan mode over RSO start/stop/update_cfg
from connection manager. Update the roaming params and roam scan
params to new structure.

Refine send_roam_scan_offload_mode_cmd_tlv().

Change-Id: I6adce2e8a24ece93a079032d0e66760393fcdccd
CRs-Fixed: 2766023
This commit is contained in:
Pragaspathi Thilagaraj
2020-08-19 03:27:44 +05:30
committed by snandini
parent b971c50f23
commit 170c20e443
24 changed files with 1684 additions and 191 deletions

View File

@@ -27,6 +27,7 @@
#include <reg_services_public_struct.h>
#include <wmi_unified_param.h>
#include <sir_api.h>
#include "wlan_cm_roam_public_struct.h"
#define CFG_VALID_CHANNEL_LIST_LEN 100
@@ -524,10 +525,6 @@ struct mlme_ht_info_field_2 {
#endif
#ifdef WLAN_FEATURE_FILS_SK
#define FILS_MAX_KEYNAME_NAI_LENGTH 253
#define FILS_MAX_REALM_LEN 255
#define FILS_MAX_RRK_LENGTH 64
#define FILS_MAX_RIK_LENGTH FILS_MAX_RRK_LENGTH
/**
* struct wlan_fils_connection_info - Fils connection parameters
@@ -535,9 +532,11 @@ struct mlme_ht_info_field_2 {
* authentication algorithm as 4
* @keyname_nai: key name network access identifier
* @key_nai_length: key name network access identifier length
* @sequence_number: FILS ERP sequence number
* @erp_sequence_number: FILS ERP sequence number
* @r_rk: re-authentication Root Key length
* @r_rk_length: reauthentication root keys length
* @rik: Re-authentication integrity key
* @rik_length: Re-Authentication integrity key length
* @realm: Realm name
* @realm_len: Realm length
* @akm_type: FILS connection akm
@@ -545,21 +544,27 @@ struct mlme_ht_info_field_2 {
* @pmk: Pairwise master key
* @pmk_len: Pairwise master key length
* @pmkid: Pairwise master key ID
* @fils_ft: FILS FT key
* @fils_ft_len: Length of FILS FT
*/
struct wlan_fils_connection_info {
bool is_fils_connection;
uint8_t keyname_nai[FILS_MAX_KEYNAME_NAI_LENGTH];
uint32_t key_nai_length;
uint16_t sequence_number;
uint8_t r_rk[FILS_MAX_RRK_LENGTH];
uint32_t erp_sequence_number;
uint8_t r_rk[WLAN_FILS_MAX_RRK_LENGTH];
uint32_t r_rk_length;
uint8_t realm[FILS_MAX_REALM_LEN];
uint8_t rik[WLAN_FILS_MAX_RIK_LENGTH];
uint32_t rik_length;
uint8_t realm[WLAN_FILS_MAX_REALM_LEN];
uint32_t realm_len;
uint8_t akm_type;
uint8_t auth_type;
uint8_t pmk[MAX_PMK_LEN];
uint8_t pmk_len;
uint8_t pmkid[PMKID_LEN];
uint8_t fils_ft[WLAN_FILS_FT_MAX_LEN];
uint8_t fils_ft_len;
};
#endif