2 * Driver for KeyStream wireless LAN cards.
4 * Copyright (C) 2005-2008 KeyStream Corp.
5 * Copyright (C) 2009 Renesas Technology Corp.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
13 #include "ks_hostif.h"
14 #include "eap_packet.h"
15 #include "michael_mic.h"
17 #include <linux/if_ether.h>
18 #include <linux/if_arp.h>
20 /* Include Wireless Extension definition and check version */
21 #include <net/iw_handler.h> /* New driver API */
23 extern int ks_wlan_hw_tx(struct ks_wlan_private *priv, void *p,
25 void (*complete_handler) (void *arg1, void *arg2),
26 void *arg1, void *arg2);
27 extern void send_packet_complete(void *, void *);
29 extern void ks_wlan_hw_wakeup_request(struct ks_wlan_private *priv);
30 extern int ks_wlan_hw_power_save(struct ks_wlan_private *priv);
33 #define inc_smeqhead(priv) \
34 ( priv->sme_i.qhead = (priv->sme_i.qhead + 1) % SME_EVENT_BUFF_SIZE )
35 #define inc_smeqtail(priv) \
36 ( priv->sme_i.qtail = (priv->sme_i.qtail + 1) % SME_EVENT_BUFF_SIZE )
37 #define cnt_smeqbody(priv) \
38 (((priv->sme_i.qtail + SME_EVENT_BUFF_SIZE) - (priv->sme_i.qhead)) % SME_EVENT_BUFF_SIZE )
40 #define KS_WLAN_MEM_FLAG (GFP_ATOMIC)
43 inline u8 get_BYTE(struct ks_wlan_private *priv)
46 data = *(priv->rxp)++;
47 /* length check in advance ! */
53 inline u16 get_WORD(struct ks_wlan_private *priv)
56 data = (get_BYTE(priv) & 0xff);
57 data |= ((get_BYTE(priv) << 8) & 0xff00);
62 inline u32 get_DWORD(struct ks_wlan_private *priv)
65 data = (get_BYTE(priv) & 0xff);
66 data |= ((get_BYTE(priv) << 8) & 0x0000ff00);
67 data |= ((get_BYTE(priv) << 16) & 0x00ff0000);
68 data |= ((get_BYTE(priv) << 24) & 0xff000000);
72 void ks_wlan_hw_wakeup_task(struct work_struct *work)
74 struct ks_wlan_private *priv =
75 container_of(work, struct ks_wlan_private, ks_wlan_wakeup_task);
76 int ps_status = atomic_read(&priv->psstatus.status);
78 if (ps_status == PS_SNOOZE) {
79 ks_wlan_hw_wakeup_request(priv);
80 if (!wait_for_completion_interruptible_timeout(&priv->psstatus.wakeup_wait, HZ / 50)) { /* 20ms timeout */
81 DPRINTK(1, "wake up timeout !!!\n");
82 schedule_work(&priv->ks_wlan_wakeup_task);
86 DPRINTK(1, "ps_status=%d\n", ps_status);
90 if (atomic_read(&priv->sme_task.count) > 0) {
91 DPRINTK(4, "sme task enable.\n");
92 tasklet_enable(&priv->sme_task);
97 int ks_wlan_do_power_save(struct ks_wlan_private *priv)
101 DPRINTK(4, "psstatus.status=%d\n", atomic_read(&priv->psstatus.status));
103 if ((priv->connect_status & CONNECT_STATUS_MASK) == CONNECT_STATUS) {
104 hostif_sme_enqueue(priv, SME_POW_MNGMT_REQUEST);
106 priv->dev_state = DEVICE_STATE_READY;
112 int get_current_ap(struct ks_wlan_private *priv, struct link_ap_info_t *ap_info)
114 struct local_ap_t *ap;
115 union iwreq_data wrqu;
116 struct net_device *netdev = priv->net_dev;
120 ap = &(priv->current_ap);
122 if ((priv->connect_status & CONNECT_STATUS_MASK) == DISCONNECT_STATUS) {
123 memset(ap, 0, sizeof(struct local_ap_t));
128 memcpy(&(ap->bssid[0]), &(ap_info->bssid[0]), ETH_ALEN);
130 memcpy(&(ap->ssid.body[0]), &(priv->reg.ssid.body[0]),
131 priv->reg.ssid.size);
132 ap->ssid.size = priv->reg.ssid.size;
134 memcpy(&(ap->rate_set.body[0]), &(ap_info->rate_set.body[0]),
135 ap_info->rate_set.size);
136 ap->rate_set.size = ap_info->rate_set.size;
137 if (ap_info->ext_rate_set.size) {
139 memcpy(&(ap->rate_set.body[ap->rate_set.size]),
140 &(ap_info->ext_rate_set.body[0]),
141 ap_info->ext_rate_set.size);
142 ap->rate_set.size += ap_info->ext_rate_set.size;
145 ap->channel = ap_info->ds_parameter.channel;
147 ap->rssi = ap_info->rssi;
149 ap->sq = ap_info->sq;
151 ap->noise = ap_info->noise;
153 ap->capability = ap_info->capability;
155 if ((ap_info->rsn_mode & RSN_MODE_WPA2)
156 && (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)) {
157 ap->rsn_ie.id = 0x30;
158 if (ap_info->rsn.size <= RSN_IE_BODY_MAX) {
159 ap->rsn_ie.size = ap_info->rsn.size;
160 memcpy(&(ap->rsn_ie.body[0]), &(ap_info->rsn.body[0]),
163 ap->rsn_ie.size = RSN_IE_BODY_MAX;
164 memcpy(&(ap->rsn_ie.body[0]), &(ap_info->rsn.body[0]),
167 } else if ((ap_info->rsn_mode & RSN_MODE_WPA)
168 && (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA)) {
169 ap->wpa_ie.id = 0xdd;
170 if (ap_info->rsn.size <= RSN_IE_BODY_MAX) {
171 ap->wpa_ie.size = ap_info->rsn.size;
172 memcpy(&(ap->wpa_ie.body[0]), &(ap_info->rsn.body[0]),
175 ap->wpa_ie.size = RSN_IE_BODY_MAX;
176 memcpy(&(ap->wpa_ie.body[0]), &(ap_info->rsn.body[0]),
186 wrqu.data.length = 0;
188 wrqu.ap_addr.sa_family = ARPHRD_ETHER;
189 if ((priv->connect_status & CONNECT_STATUS_MASK) == CONNECT_STATUS) {
190 memcpy(wrqu.ap_addr.sa_data,
191 &(priv->current_ap.bssid[0]), ETH_ALEN);
193 "IWEVENT: connect bssid=%02x:%02x:%02x:%02x:%02x:%02x\n",
194 (unsigned char)wrqu.ap_addr.sa_data[0],
195 (unsigned char)wrqu.ap_addr.sa_data[1],
196 (unsigned char)wrqu.ap_addr.sa_data[2],
197 (unsigned char)wrqu.ap_addr.sa_data[3],
198 (unsigned char)wrqu.ap_addr.sa_data[4],
199 (unsigned char)wrqu.ap_addr.sa_data[5]);
200 wireless_send_event(netdev, SIOCGIWAP, &wrqu, NULL);
202 DPRINTK(4, "\n Link AP\n");
203 DPRINTK(4, " bssid=%02X:%02X:%02X:%02X:%02X:%02X\n \
204 essid=%s\n rate_set=%02X,%02X,%02X,%02X,%02X,%02X,%02X,%02X\n channel=%d\n \
205 rssi=%d\n sq=%d\n capability=%04X\n", ap->bssid[0], ap->bssid[1], ap->bssid[2], ap->bssid[3], ap->bssid[4], ap->bssid[5], &(ap->ssid.body[0]), ap->rate_set.body[0], ap->rate_set.body[1], ap->rate_set.body[2], ap->rate_set.body[3], ap->rate_set.body[4], ap->rate_set.body[5], ap->rate_set.body[6], ap->rate_set.body[7], ap->channel, ap->rssi, ap->sq, ap->capability);
206 DPRINTK(4, "\n Link AP\n rsn.mode=%d\n rsn.size=%d\n",
207 ap_info->rsn_mode, ap_info->rsn.size);
208 DPRINTK(4, "\n ext_rate_set_size=%d\n rate_set_size=%d\n",
209 ap_info->ext_rate_set.size, ap_info->rate_set.size);
215 int get_ap_information(struct ks_wlan_private *priv, struct ap_info_t *ap_info,
216 struct local_ap_t *ap)
223 memset(ap, 0, sizeof(struct local_ap_t));
226 memcpy(&(ap->bssid[0]), &(ap_info->bssid[0]), ETH_ALEN);
228 ap->rssi = ap_info->rssi;
230 ap->sq = ap_info->sq;
232 ap->noise = ap_info->noise;
234 ap->capability = ap_info->capability;
236 ap->channel = ap_info->ch_info;
238 bp = &(ap_info->body[0]);
239 bsize = ap_info->body_size;
242 while (bsize > offset) {
243 /* DPRINTK(4, "Element ID=%d \n",*bp); */
246 if (*(bp + 1) <= SSID_MAX_SIZE) {
247 ap->ssid.size = *(bp + 1);
249 DPRINTK(1, "size over :: ssid size=%d \n",
251 ap->ssid.size = SSID_MAX_SIZE;
253 memcpy(&(ap->ssid.body[0]), bp + 2, ap->ssid.size);
256 case 50: /* ext rate */
257 if ((*(bp + 1) + ap->rate_set.size) <=
259 memcpy(&(ap->rate_set.body[ap->rate_set.size]),
261 ap->rate_set.size += *(bp + 1);
263 DPRINTK(1, "size over :: rate size=%d \n",
264 (*(bp + 1) + ap->rate_set.size));
265 memcpy(&(ap->rate_set.body[ap->rate_set.size]),
267 RATE_SET_MAX_SIZE - ap->rate_set.size);
269 (RATE_SET_MAX_SIZE - ap->rate_set.size);
272 case 3: /* DS parameter */
274 case 48: /* RSN(WPA2) */
276 if (*(bp + 1) <= RSN_IE_BODY_MAX) {
277 ap->rsn_ie.size = *(bp + 1);
279 DPRINTK(1, "size over :: rsn size=%d \n",
281 ap->rsn_ie.size = RSN_IE_BODY_MAX;
283 memcpy(&(ap->rsn_ie.body[0]), bp + 2, ap->rsn_ie.size);
286 if (!memcmp(bp + 2, "\x00\x50\xf2\x01", 4)) { /* WPA OUI check */
288 if (*(bp + 1) <= RSN_IE_BODY_MAX) {
289 ap->wpa_ie.size = *(bp + 1);
292 "size over :: wpa size=%d \n",
294 ap->wpa_ie.size = RSN_IE_BODY_MAX;
296 memcpy(&(ap->wpa_ie.body[0]), bp + 2,
301 case 2: /* FH parameter */
302 case 4: /* CF parameter */
304 case 6: /* IBSS parameter */
305 case 7: /* Country */
306 case 42: /* ERP information */
307 case 47: /* Reserve ID 47 Broadcom AP */
310 DPRINTK(4, "unknown Element ID=%d \n", *bp);
313 offset += 2; /* id & size field */
314 offset += *(bp + 1); /* +size offset */
315 bp += (*(bp + 1) + 2); /* pointer update */
322 void hostif_data_indication(struct ks_wlan_private *priv)
324 unsigned int rx_ind_size; /* indicate data size */
326 unsigned short auth_type;
327 unsigned char temp[256];
329 unsigned char RecvMIC[8];
331 struct ether_hdr *eth_hdr;
332 unsigned short eth_proto;
334 struct mic_failure_t *mic_failure;
335 struct ieee802_1x_hdr *aa1x_hdr;
336 struct wpa_eapol_key *eap_key;
337 struct michel_mic_t michel_mic;
338 union iwreq_data wrqu;
342 /* min length check */
343 if (priv->rx_size <= ETH_HLEN) {
344 DPRINTK(3, "rx_size = %d\n", priv->rx_size);
345 priv->nstats.rx_errors++;
349 auth_type = get_WORD(priv); /* AuthType */
350 get_WORD(priv); /* Reserve Area */
352 eth_hdr = (struct ether_hdr *)(priv->rxp);
353 eth_proto = ntohs(eth_hdr->h_proto);
354 DPRINTK(3, "ether protocol = %04X\n", eth_proto);
356 /* source address check */
357 if (!memcmp(&priv->eth_addr[0], eth_hdr->h_source, ETH_ALEN)) {
358 DPRINTK(1, "invalid : source is own mac address !!\n");
360 "eth_hdrernet->h_dest=%02X:%02X:%02X:%02X:%02X:%02X\n",
361 eth_hdr->h_source[0], eth_hdr->h_source[1],
362 eth_hdr->h_source[2], eth_hdr->h_source[3],
363 eth_hdr->h_source[4], eth_hdr->h_source[5]);
364 priv->nstats.rx_errors++;
369 if (auth_type != TYPE_DATA && priv->wpa.rsn_enabled) {
370 if (memcmp(ð_hdr->h_source[0], &priv->eth_addr[0], ETH_ALEN)) { /* source address check */
371 if (eth_hdr->h_dest_snap != eth_hdr->h_source_snap) {
372 DPRINTK(1, "invalid data format\n");
373 priv->nstats.rx_errors++;
376 if (((auth_type == TYPE_PMK1
377 && priv->wpa.pairwise_suite ==
378 IW_AUTH_CIPHER_TKIP) || (auth_type == TYPE_GMK1
382 || (auth_type == TYPE_GMK2
383 && priv->wpa.group_suite ==
384 IW_AUTH_CIPHER_TKIP))
385 && priv->wpa.key[auth_type - 1].key_len) {
386 DPRINTK(4, "TKIP: protocol=%04X: size=%u\n",
387 eth_proto, priv->rx_size);
390 (priv->rxp) + ((priv->rx_size) - 8), 8);
391 priv->rx_size = priv->rx_size - 8;
392 if (auth_type > 0 && auth_type < 4) { /* auth_type check */
393 MichaelMICFunction(&michel_mic, (uint8_t *) priv->wpa.key[auth_type - 1].rx_mic_key, (uint8_t *) priv->rxp, (int)priv->rx_size, (uint8_t) 0, /* priority */
397 if (memcmp(michel_mic.Result, RecvMIC, 8)) {
399 mic_failure = &priv->wpa.mic_failure;
401 if (mic_failure->last_failure_time &&
403 mic_failure->last_failure_time) /
405 mic_failure->failure = 0;
407 DPRINTK(4, "MIC FAILURE \n");
408 if (mic_failure->failure == 0) {
409 mic_failure->failure = 1;
410 mic_failure->counter = 0;
411 } else if (mic_failure->failure == 1) {
412 mic_failure->failure = 2;
413 mic_failure->counter =
418 if (!mic_failure->counter) /* mic_failure counter value range 1-60 */
419 mic_failure->counter =
422 priv->wpa.mic_failure.
423 last_failure_time = now;
424 /* needed parameters: count, keyid, key type, TSC */
426 "MLME-MICHAELMICFAILURE.indication(keyid=%d %scast addr="
427 "%02x:%02x:%02x:%02x:%02x:%02x)",
430 h_dest[0] & 0x01 ? "broad" :
431 "uni", eth_hdr->h_source[0],
432 eth_hdr->h_source[1],
433 eth_hdr->h_source[2],
434 eth_hdr->h_source[3],
435 eth_hdr->h_source[4],
436 eth_hdr->h_source[5]);
437 memset(&wrqu, 0, sizeof(wrqu));
438 wrqu.data.length = strlen(buf);
440 "IWEVENT:MICHAELMICFAILURE\n");
441 wireless_send_event(priv->net_dev,
450 if ((priv->connect_status & FORCE_DISCONNECT) ||
451 priv->wpa.mic_failure.failure == 2) {
455 /* check 13th byte at rx data */
456 switch (*(priv->rxp + 12)) {
457 case 0xAA: /* SNAP */
458 rx_ind_size = priv->rx_size - 6;
459 skb = dev_alloc_skb(rx_ind_size);
460 DPRINTK(4, "SNAP, rx_ind_size = %d\n", rx_ind_size);
463 memcpy(skb_put(skb, 12), priv->rxp, 12); /* 8802/FDDI MAC copy */
464 /* (SNAP+UI..) skip */
465 memcpy(skb_put(skb, rx_ind_size - 12), priv->rxp + 18, rx_ind_size - 12); /* copy after Type */
467 aa1x_hdr = (struct ieee802_1x_hdr *)(priv->rxp + 20);
468 if (aa1x_hdr->type == IEEE802_1X_TYPE_EAPOL_KEY
469 && priv->wpa.rsn_enabled) {
471 (struct wpa_eapol_key *)(aa1x_hdr + 1);
472 atomic_set(&priv->psstatus.snooze_guard, 1);
476 skb->dev = priv->net_dev;
477 skb->protocol = eth_type_trans(skb, skb->dev);
478 priv->nstats.rx_packets++;
479 priv->nstats.rx_bytes += rx_ind_size;
480 skb->dev->last_rx = jiffies;
484 "%s: Memory squeeze, dropping packet.\n",
486 priv->nstats.rx_dropped++;
489 case 0xF0: /* NETBEUI/NetBIOS */
490 rx_ind_size = (priv->rx_size + 2);
491 skb = dev_alloc_skb(rx_ind_size);
492 DPRINTK(3, "NETBEUI/NetBIOS rx_ind_size=%d\n", rx_ind_size);
495 memcpy(skb_put(skb, 12), priv->rxp, 12); /* 8802/FDDI MAC copy */
497 temp[0] = (((rx_ind_size - 12) >> 8) & 0xff); /* NETBEUI size add */
498 temp[1] = ((rx_ind_size - 12) & 0xff);
499 memcpy(skb_put(skb, 2), temp, 2);
501 memcpy(skb_put(skb, rx_ind_size - 14), priv->rxp + 12, rx_ind_size - 14); /* copy after Type */
503 aa1x_hdr = (struct ieee802_1x_hdr *)(priv->rxp + 14);
504 if (aa1x_hdr->type == IEEE802_1X_TYPE_EAPOL_KEY
505 && priv->wpa.rsn_enabled) {
507 (struct wpa_eapol_key *)(aa1x_hdr + 1);
508 atomic_set(&priv->psstatus.snooze_guard, 1);
512 skb->dev = priv->net_dev;
513 skb->protocol = eth_type_trans(skb, skb->dev);
514 priv->nstats.rx_packets++;
515 priv->nstats.rx_bytes += rx_ind_size;
516 skb->dev->last_rx = jiffies;
520 "%s: Memory squeeze, dropping packet.\n",
522 priv->nstats.rx_dropped++;
525 default: /* other rx data */
526 DPRINTK(2, "invalid data format\n");
527 priv->nstats.rx_errors++;
532 void hostif_mib_get_confirm(struct ks_wlan_private *priv)
534 struct net_device *dev = priv->net_dev;
536 uint32_t mib_attribute;
537 uint16_t mib_val_size;
538 uint16_t mib_val_type;
542 mib_status = get_DWORD(priv); /* MIB status */
543 mib_attribute = get_DWORD(priv); /* MIB atttibute */
544 mib_val_size = get_WORD(priv); /* MIB value size */
545 mib_val_type = get_WORD(priv); /* MIB value type */
547 if (mib_status != 0) {
548 /* in case of error */
549 DPRINTK(1, "attribute=%08X, status=%08X\n", mib_attribute,
554 switch (mib_attribute) {
555 case DOT11_MAC_ADDRESS:
557 DPRINTK(3, " mib_attribute=DOT11_MAC_ADDRESS\n");
558 hostif_sme_enqueue(priv, SME_GET_MAC_ADDRESS);
559 memcpy(priv->eth_addr, priv->rxp, ETH_ALEN);
560 priv->mac_address_valid = 1;
561 dev->dev_addr[0] = priv->eth_addr[0];
562 dev->dev_addr[1] = priv->eth_addr[1];
563 dev->dev_addr[2] = priv->eth_addr[2];
564 dev->dev_addr[3] = priv->eth_addr[3];
565 dev->dev_addr[4] = priv->eth_addr[4];
566 dev->dev_addr[5] = priv->eth_addr[5];
567 dev->dev_addr[6] = 0x00;
568 dev->dev_addr[7] = 0x00;
570 "ks_wlan: MAC ADDRESS = %02x:%02x:%02x:%02x:%02x:%02x\n",
571 priv->eth_addr[0], priv->eth_addr[1], priv->eth_addr[2],
572 priv->eth_addr[3], priv->eth_addr[4], priv->eth_addr[5]);
574 case DOT11_PRODUCT_VERSION:
575 /* firmware version */
576 DPRINTK(3, " mib_attribute=DOT11_PRODUCT_VERSION\n");
577 priv->version_size = priv->rx_size;
578 memcpy(priv->firmware_version, priv->rxp, priv->rx_size);
579 priv->firmware_version[priv->rx_size] = '\0';
580 printk(KERN_INFO "ks_wlan: firmware ver. = %s\n",
581 priv->firmware_version);
582 hostif_sme_enqueue(priv, SME_GET_PRODUCT_VERSION);
583 /* wake_up_interruptible_all(&priv->confirm_wait); */
584 complete(&priv->confirm_wait);
587 memcpy(&priv->gain, priv->rxp, sizeof(priv->gain));
588 DPRINTK(3, "TxMode=%d, RxMode=%d, TxGain=%d, RxGain=%d\n",
589 priv->gain.TxMode, priv->gain.RxMode, priv->gain.TxGain,
592 case LOCAL_EEPROM_SUM:
593 memcpy(&priv->eeprom_sum, priv->rxp, sizeof(priv->eeprom_sum));
594 DPRINTK(1, "eeprom_sum.type=%x, eeprom_sum.result=%x\n",
595 priv->eeprom_sum.type, priv->eeprom_sum.result);
596 if (priv->eeprom_sum.type == 0) {
597 priv->eeprom_checksum = EEPROM_CHECKSUM_NONE;
598 } else if (priv->eeprom_sum.type == 1) {
599 if (priv->eeprom_sum.result == 0) {
600 priv->eeprom_checksum = EEPROM_NG;
601 printk("LOCAL_EEPROM_SUM NG\n");
602 } else if (priv->eeprom_sum.result == 1) {
603 priv->eeprom_checksum = EEPROM_OK;
606 printk("LOCAL_EEPROM_SUM error!\n");
610 DPRINTK(1, "mib_attribute=%08x\n", (unsigned int)mib_attribute);
616 void hostif_mib_set_confirm(struct ks_wlan_private *priv)
618 uint32_t mib_status; /* +04 MIB Status */
619 uint32_t mib_attribute; /* +08 MIB attribute */
623 mib_status = get_DWORD(priv); /* MIB Status */
624 mib_attribute = get_DWORD(priv); /* MIB attribute */
626 if (mib_status != 0) {
627 /* in case of error */
628 DPRINTK(1, "error :: attribute=%08X, status=%08X\n",
629 mib_attribute, mib_status);
632 switch (mib_attribute) {
633 case DOT11_RTS_THRESHOLD:
634 hostif_sme_enqueue(priv, SME_RTS_THRESHOLD_CONFIRM);
636 case DOT11_FRAGMENTATION_THRESHOLD:
637 hostif_sme_enqueue(priv, SME_FRAGMENTATION_THRESHOLD_CONFIRM);
639 case DOT11_WEP_DEFAULT_KEY_ID:
640 if (!priv->wpa.wpa_enabled)
641 hostif_sme_enqueue(priv, SME_WEP_INDEX_CONFIRM);
643 case DOT11_WEP_DEFAULT_KEY_VALUE1:
644 DPRINTK(2, "DOT11_WEP_DEFAULT_KEY_VALUE1:mib_status=%d\n",
646 if (priv->wpa.rsn_enabled)
647 hostif_sme_enqueue(priv, SME_SET_PMK_TSC);
649 hostif_sme_enqueue(priv, SME_WEP_KEY1_CONFIRM);
651 case DOT11_WEP_DEFAULT_KEY_VALUE2:
652 DPRINTK(2, "DOT11_WEP_DEFAULT_KEY_VALUE2:mib_status=%d\n",
654 if (priv->wpa.rsn_enabled)
655 hostif_sme_enqueue(priv, SME_SET_GMK1_TSC);
657 hostif_sme_enqueue(priv, SME_WEP_KEY2_CONFIRM);
659 case DOT11_WEP_DEFAULT_KEY_VALUE3:
660 DPRINTK(2, "DOT11_WEP_DEFAULT_KEY_VALUE3:mib_status=%d\n",
662 if (priv->wpa.rsn_enabled)
663 hostif_sme_enqueue(priv, SME_SET_GMK2_TSC);
665 hostif_sme_enqueue(priv, SME_WEP_KEY3_CONFIRM);
667 case DOT11_WEP_DEFAULT_KEY_VALUE4:
668 DPRINTK(2, "DOT11_WEP_DEFAULT_KEY_VALUE4:mib_status=%d\n",
670 if (!priv->wpa.rsn_enabled)
671 hostif_sme_enqueue(priv, SME_WEP_KEY4_CONFIRM);
673 case DOT11_PRIVACY_INVOKED:
674 if (!priv->wpa.rsn_enabled)
675 hostif_sme_enqueue(priv, SME_WEP_FLAG_CONFIRM);
677 case DOT11_RSN_ENABLED:
678 DPRINTK(2, "DOT11_RSN_ENABLED:mib_status=%d\n",
680 hostif_sme_enqueue(priv, SME_RSN_ENABLED_CONFIRM);
683 hostif_sme_enqueue(priv, SME_RSN_MODE_CONFIRM);
685 case LOCAL_MULTICAST_ADDRESS:
686 hostif_sme_enqueue(priv, SME_MULTICAST_REQUEST);
688 case LOCAL_MULTICAST_FILTER:
689 hostif_sme_enqueue(priv, SME_MULTICAST_CONFIRM);
691 case LOCAL_CURRENTADDRESS:
692 priv->mac_address_valid = 1;
694 case DOT11_RSN_CONFIG_MULTICAST_CIPHER:
695 DPRINTK(2, "DOT11_RSN_CONFIG_MULTICAST_CIPHER:mib_status=%d\n",
697 hostif_sme_enqueue(priv, SME_RSN_MCAST_CONFIRM);
699 case DOT11_RSN_CONFIG_UNICAST_CIPHER:
700 DPRINTK(2, "DOT11_RSN_CONFIG_UNICAST_CIPHER:mib_status=%d\n",
702 hostif_sme_enqueue(priv, SME_RSN_UCAST_CONFIRM);
704 case DOT11_RSN_CONFIG_AUTH_SUITE:
705 DPRINTK(2, "DOT11_RSN_CONFIG_AUTH_SUITE:mib_status=%d\n",
707 hostif_sme_enqueue(priv, SME_RSN_AUTH_CONFIRM);
710 DPRINTK(2, "DOT11_PMK_TSC:mib_status=%d\n", (int)mib_status);
713 DPRINTK(2, "DOT11_GMK1_TSC:mib_status=%d\n", (int)mib_status);
714 if (atomic_read(&priv->psstatus.snooze_guard)) {
715 atomic_set(&priv->psstatus.snooze_guard, 0);
719 DPRINTK(2, "DOT11_GMK2_TSC:mib_status=%d\n", (int)mib_status);
720 if (atomic_read(&priv->psstatus.snooze_guard)) {
721 atomic_set(&priv->psstatus.snooze_guard, 0);
725 DPRINTK(2, "LOCAL_PMK:mib_status=%d\n", (int)mib_status);
728 DPRINTK(2, "LOCAL_GAIN:mib_status=%d\n", (int)mib_status);
731 case LOCAL_WPS_ENABLE:
732 DPRINTK(2, "LOCAL_WPS_ENABLE:mib_status=%d\n", (int)mib_status);
734 case LOCAL_WPS_PROBE_REQ:
735 DPRINTK(2, "LOCAL_WPS_PROBE_REQ:mib_status=%d\n",
740 DPRINTK(2, "LOCAL_REGION:mib_status=%d\n", (int)mib_status);
747 void hostif_power_mngmt_confirm(struct ks_wlan_private *priv)
751 if (priv->reg.powermgt > POWMGT_ACTIVE_MODE &&
752 priv->reg.operation_mode == MODE_INFRASTRUCTURE) {
753 atomic_set(&priv->psstatus.confirm_wait, 0);
754 priv->dev_state = DEVICE_STATE_SLEEP;
755 ks_wlan_hw_power_save(priv);
757 priv->dev_state = DEVICE_STATE_READY;
763 void hostif_sleep_confirm(struct ks_wlan_private *priv)
767 atomic_set(&priv->sleepstatus.doze_request, 1);
768 queue_delayed_work(priv->ks_wlan_hw.ks7010sdio_wq,
769 &priv->ks_wlan_hw.rw_wq, 1);
773 void hostif_start_confirm(struct ks_wlan_private *priv)
776 union iwreq_data wrqu;
777 wrqu.data.length = 0;
779 wrqu.ap_addr.sa_family = ARPHRD_ETHER;
780 if ((priv->connect_status & CONNECT_STATUS_MASK) == CONNECT_STATUS) {
781 memset(wrqu.ap_addr.sa_data, '\0', ETH_ALEN);
782 DPRINTK(3, "IWEVENT: disconnect\n");
783 wireless_send_event(priv->net_dev, SIOCGIWAP, &wrqu, NULL);
786 DPRINTK(3, " scan_ind_count=%d\n", priv->scan_ind_count);
787 hostif_sme_enqueue(priv, SME_START_CONFIRM);
791 void hostif_connect_indication(struct ks_wlan_private *priv)
793 unsigned short connect_code;
794 unsigned int tmp = 0;
795 unsigned int old_status = priv->connect_status;
796 struct net_device *netdev = priv->net_dev;
797 union iwreq_data wrqu0;
798 connect_code = get_WORD(priv);
800 switch (connect_code) {
801 case RESULT_CONNECT: /* connect */
802 DPRINTK(3, "connect :: scan_ind_count=%d\n",
803 priv->scan_ind_count);
804 if (!(priv->connect_status & FORCE_DISCONNECT))
805 netif_carrier_on(netdev);
806 tmp = FORCE_DISCONNECT & priv->connect_status;
807 priv->connect_status = tmp + CONNECT_STATUS;
809 case RESULT_DISCONNECT: /* disconnect */
810 DPRINTK(3, "disconnect :: scan_ind_count=%d\n",
811 priv->scan_ind_count);
812 netif_carrier_off(netdev);
813 tmp = FORCE_DISCONNECT & priv->connect_status;
814 priv->connect_status = tmp + DISCONNECT_STATUS;
817 DPRINTK(1, "unknown connect_code=%d :: scan_ind_count=%d\n",
818 connect_code, priv->scan_ind_count);
819 netif_carrier_off(netdev);
820 tmp = FORCE_DISCONNECT & priv->connect_status;
821 priv->connect_status = tmp + DISCONNECT_STATUS;
825 get_current_ap(priv, (struct link_ap_info_t *)priv->rxp);
826 if ((priv->connect_status & CONNECT_STATUS_MASK) == CONNECT_STATUS &&
827 (old_status & CONNECT_STATUS_MASK) == DISCONNECT_STATUS) {
829 atomic_set(&priv->psstatus.snooze_guard, 0);
830 atomic_set(&priv->psstatus.confirm_wait, 0);
832 ks_wlan_do_power_save(priv);
834 wrqu0.data.length = 0;
835 wrqu0.data.flags = 0;
836 wrqu0.ap_addr.sa_family = ARPHRD_ETHER;
837 if ((priv->connect_status & CONNECT_STATUS_MASK) == DISCONNECT_STATUS &&
838 (old_status & CONNECT_STATUS_MASK) == CONNECT_STATUS) {
839 memset(wrqu0.ap_addr.sa_data, '\0', ETH_ALEN);
840 DPRINTK(3, "IWEVENT: disconnect\n");
841 DPRINTK(3, "disconnect :: scan_ind_count=%d\n",
842 priv->scan_ind_count);
843 wireless_send_event(netdev, SIOCGIWAP, &wrqu0, NULL);
845 priv->scan_ind_count = 0;
849 void hostif_scan_indication(struct ks_wlan_private *priv)
852 struct ap_info_t *ap_info;
854 DPRINTK(3, "scan_ind_count = %d\n", priv->scan_ind_count);
855 ap_info = (struct ap_info_t *)(priv->rxp);
857 if (priv->scan_ind_count != 0) {
858 for (i = 0; i < priv->aplist.size; i++) { /* bssid check */
860 (&(ap_info->bssid[0]),
861 &(priv->aplist.ap[i].bssid[0]), ETH_ALEN)) {
862 if (ap_info->frame_type ==
863 FRAME_TYPE_PROBE_RESP)
864 get_ap_information(priv, ap_info,
871 priv->scan_ind_count++;
872 if (priv->scan_ind_count < LOCAL_APLIST_MAX + 1) {
873 DPRINTK(4, " scan_ind_count=%d :: aplist.size=%d\n",
874 priv->scan_ind_count, priv->aplist.size);
875 get_ap_information(priv, (struct ap_info_t *)(priv->rxp),
877 ap[priv->scan_ind_count - 1]));
878 priv->aplist.size = priv->scan_ind_count;
880 DPRINTK(4, " count over :: scan_ind_count=%d\n",
881 priv->scan_ind_count);
887 void hostif_stop_confirm(struct ks_wlan_private *priv)
889 unsigned int tmp = 0;
890 unsigned int old_status = priv->connect_status;
891 struct net_device *netdev = priv->net_dev;
892 union iwreq_data wrqu0;
895 if (priv->dev_state == DEVICE_STATE_SLEEP)
896 priv->dev_state = DEVICE_STATE_READY;
898 /* disconnect indication */
899 if ((priv->connect_status & CONNECT_STATUS_MASK) == CONNECT_STATUS) {
900 netif_carrier_off(netdev);
901 tmp = FORCE_DISCONNECT & priv->connect_status;
902 priv->connect_status = tmp | DISCONNECT_STATUS;
903 printk("IWEVENT: disconnect\n");
905 wrqu0.data.length = 0;
906 wrqu0.data.flags = 0;
907 wrqu0.ap_addr.sa_family = ARPHRD_ETHER;
908 if ((priv->connect_status & CONNECT_STATUS_MASK) ==
910 && (old_status & CONNECT_STATUS_MASK) == CONNECT_STATUS) {
911 memset(wrqu0.ap_addr.sa_data, '\0', ETH_ALEN);
912 DPRINTK(3, "IWEVENT: disconnect\n");
913 printk("IWEVENT: disconnect\n");
914 DPRINTK(3, "disconnect :: scan_ind_count=%d\n",
915 priv->scan_ind_count);
916 wireless_send_event(netdev, SIOCGIWAP, &wrqu0, NULL);
918 priv->scan_ind_count = 0;
921 hostif_sme_enqueue(priv, SME_STOP_CONFIRM);
925 void hostif_ps_adhoc_set_confirm(struct ks_wlan_private *priv)
928 priv->infra_status = 0; /* infrastructure mode cancel */
929 hostif_sme_enqueue(priv, SME_MODE_SET_CONFIRM);
934 void hostif_infrastructure_set_confirm(struct ks_wlan_private *priv)
936 uint16_t result_code;
938 result_code = get_WORD(priv);
939 DPRINTK(3, "result code = %d\n", result_code);
940 priv->infra_status = 1; /* infrastructure mode set */
941 hostif_sme_enqueue(priv, SME_MODE_SET_CONFIRM);
945 void hostif_adhoc_set_confirm(struct ks_wlan_private *priv)
948 priv->infra_status = 1; /* infrastructure mode set */
949 hostif_sme_enqueue(priv, SME_MODE_SET_CONFIRM);
953 void hostif_associate_indication(struct ks_wlan_private *priv)
955 struct association_request_t *assoc_req;
956 struct association_response_t *assoc_resp;
958 union iwreq_data wrqu;
959 char buf[IW_CUSTOM_MAX];
960 char *pbuf = &buf[0];
963 static const char associnfo_leader0[] = "ASSOCINFO(ReqIEs=";
964 static const char associnfo_leader1[] = " RespIEs=";
967 assoc_req = (struct association_request_t *)(priv->rxp);
968 assoc_resp = (struct association_response_t *)(assoc_req + 1);
969 pb = (unsigned char *)(assoc_resp + 1);
971 memset(&wrqu, 0, sizeof(wrqu));
972 memcpy(pbuf, associnfo_leader0, sizeof(associnfo_leader0) - 1);
973 wrqu.data.length += sizeof(associnfo_leader0) - 1;
974 pbuf += sizeof(associnfo_leader0) - 1;
976 for (i = 0; i < assoc_req->reqIEs_size; i++)
977 pbuf += sprintf(pbuf, "%02x", *(pb + i));
978 wrqu.data.length += (assoc_req->reqIEs_size) * 2;
980 memcpy(pbuf, associnfo_leader1, sizeof(associnfo_leader1) - 1);
981 wrqu.data.length += sizeof(associnfo_leader1) - 1;
982 pbuf += sizeof(associnfo_leader1) - 1;
984 pb += assoc_req->reqIEs_size;
985 for (i = 0; i < assoc_resp->respIEs_size; i++)
986 pbuf += sprintf(pbuf, "%02x", *(pb + i));
987 wrqu.data.length += (assoc_resp->respIEs_size) * 2;
989 pbuf += sprintf(pbuf, ")");
990 wrqu.data.length += 1;
992 DPRINTK(3, "IWEVENT:ASSOCINFO\n");
993 wireless_send_event(priv->net_dev, IWEVCUSTOM, &wrqu, buf);
997 void hostif_bss_scan_confirm(struct ks_wlan_private *priv)
999 unsigned int result_code;
1000 struct net_device *dev = priv->net_dev;
1001 union iwreq_data wrqu;
1002 result_code = get_DWORD(priv);
1003 DPRINTK(2, "result=%d :: scan_ind_count=%d\n", result_code,
1004 priv->scan_ind_count);
1006 priv->sme_i.sme_flag &= ~SME_AP_SCAN;
1007 hostif_sme_enqueue(priv, SME_BSS_SCAN_CONFIRM);
1009 wrqu.data.length = 0;
1010 wrqu.data.flags = 0;
1011 DPRINTK(3, "IWEVENT: SCAN CONFIRM\n");
1012 wireless_send_event(dev, SIOCGIWSCAN, &wrqu, NULL);
1013 priv->scan_ind_count = 0;
1017 void hostif_phy_information_confirm(struct ks_wlan_private *priv)
1019 struct iw_statistics *wstats = &priv->wstats;
1020 unsigned char rssi, signal, noise;
1021 unsigned char LinkSpeed;
1022 unsigned int TransmittedFrameCount, ReceivedFragmentCount;
1023 unsigned int FailedCount, FCSErrorCount;
1026 rssi = get_BYTE(priv);
1027 signal = get_BYTE(priv);
1028 noise = get_BYTE(priv);
1029 LinkSpeed = get_BYTE(priv);
1030 TransmittedFrameCount = get_DWORD(priv);
1031 ReceivedFragmentCount = get_DWORD(priv);
1032 FailedCount = get_DWORD(priv);
1033 FCSErrorCount = get_DWORD(priv);
1035 DPRINTK(4, "phyinfo confirm rssi=%d signal=%d\n", rssi, signal);
1036 priv->current_rate = (LinkSpeed & RATE_MASK);
1037 wstats->qual.qual = signal;
1038 wstats->qual.level = 256 - rssi;
1039 wstats->qual.noise = 0; /* invalid noise value */
1040 wstats->qual.updated = IW_QUAL_ALL_UPDATED | IW_QUAL_DBM;
1042 DPRINTK(3, "\n rssi=%u\n signal=%u\n LinkSpeed=%ux500Kbps\n \
1043 TransmittedFrameCount=%u\n ReceivedFragmentCount=%u\n FailedCount=%u\n \
1044 FCSErrorCount=%u\n", rssi, signal, LinkSpeed, TransmittedFrameCount, ReceivedFragmentCount, FailedCount, FCSErrorCount);
1046 /* wake_up_interruptible_all(&priv->confirm_wait); */
1047 complete(&priv->confirm_wait);
1051 void hostif_mic_failure_confirm(struct ks_wlan_private *priv)
1053 DPRINTK(3, "mic_failure=%u\n", priv->wpa.mic_failure.failure);
1054 hostif_sme_enqueue(priv, SME_MIC_FAILURE_CONFIRM);
1058 void hostif_event_check(struct ks_wlan_private *priv)
1060 unsigned short event;
1063 event = get_WORD(priv); /* get event */
1066 hostif_data_indication(priv);
1068 case HIF_MIB_GET_CONF:
1069 hostif_mib_get_confirm(priv);
1071 case HIF_MIB_SET_CONF:
1072 hostif_mib_set_confirm(priv);
1074 case HIF_POWERMGT_CONF:
1075 hostif_power_mngmt_confirm(priv);
1077 case HIF_SLEEP_CONF:
1078 hostif_sleep_confirm(priv);
1080 case HIF_START_CONF:
1081 hostif_start_confirm(priv);
1083 case HIF_CONNECT_IND:
1084 hostif_connect_indication(priv);
1087 hostif_stop_confirm(priv);
1089 case HIF_PS_ADH_SET_CONF:
1090 hostif_ps_adhoc_set_confirm(priv);
1092 case HIF_INFRA_SET_CONF:
1093 case HIF_INFRA_SET2_CONF:
1094 hostif_infrastructure_set_confirm(priv);
1096 case HIF_ADH_SET_CONF:
1097 case HIF_ADH_SET2_CONF:
1098 hostif_adhoc_set_confirm(priv);
1100 case HIF_ASSOC_INFO_IND:
1101 hostif_associate_indication(priv);
1103 case HIF_MIC_FAILURE_CONF:
1104 hostif_mic_failure_confirm(priv);
1107 hostif_bss_scan_confirm(priv);
1109 case HIF_PHY_INFO_CONF:
1110 case HIF_PHY_INFO_IND:
1111 hostif_phy_information_confirm(priv);
1114 hostif_scan_indication(priv);
1116 case HIF_AP_SET_CONF:
1118 //DPRINTK(1, "undefined event[%04X]\n", event);
1119 printk("undefined event[%04X]\n", event);
1120 /* wake_up_all(&priv->confirm_wait); */
1121 complete(&priv->confirm_wait);
1125 /* add event to hostt buffer */
1126 priv->hostt.buff[priv->hostt.qtail] = event;
1127 priv->hostt.qtail = (priv->hostt.qtail + 1) % SME_EVENT_BUFF_SIZE;
1130 #define CHECK_ALINE(size) (size%4 ? (size+(4-(size%4))):size)
1132 int hostif_data_request(struct ks_wlan_private *priv, struct sk_buff *packet)
1134 unsigned int packet_len = 0;
1136 unsigned char *buffer = NULL;
1137 unsigned int length = 0;
1138 struct hostif_data_request_t *pp;
1141 unsigned short eth_proto;
1142 struct ether_hdr *eth_hdr;
1143 struct michel_mic_t michel_mic;
1144 unsigned short keyinfo = 0;
1145 struct ieee802_1x_hdr *aa1x_hdr;
1146 struct wpa_eapol_key *eap_key;
1149 packet_len = packet->len;
1150 if (packet_len > ETH_FRAME_LEN) {
1151 DPRINTK(1, "bad length packet_len=%d \n", packet_len);
1152 dev_kfree_skb(packet);
1156 if (((priv->connect_status & CONNECT_STATUS_MASK) == DISCONNECT_STATUS)
1157 || (priv->connect_status & FORCE_DISCONNECT)
1158 || priv->wpa.mic_failure.stop) {
1159 DPRINTK(3, " DISCONNECT\n");
1160 if (netif_queue_stopped(priv->net_dev))
1161 netif_wake_queue(priv->net_dev);
1163 dev_kfree_skb(packet);
1169 if (atomic_read(&priv->psstatus.status) == PS_SNOOZE) { /* power save wakeup */
1170 if (!netif_queue_stopped(priv->net_dev))
1171 netif_stop_queue(priv->net_dev);
1174 DPRINTK(4, "skb_buff length=%d\n", packet_len);
1175 pp = (struct hostif_data_request_t *)
1176 kmalloc(hif_align_size(sizeof(*pp) + 6 + packet_len + 8),
1180 DPRINTK(3, "allocate memory failed..\n");
1181 dev_kfree_skb(packet);
1185 p = (unsigned char *)pp->data;
1187 buffer = packet->data;
1188 length = packet->len;
1191 eth = (struct ethhdr *)packet->data;
1192 if (memcmp(&priv->eth_addr[0], eth->h_source, ETH_ALEN)) {
1193 DPRINTK(1, "invalid mac address !!\n");
1194 DPRINTK(1, "ethernet->h_source=%02X:%02X:%02X:%02X:%02X:%02X\n",
1195 eth->h_source[0], eth->h_source[1], eth->h_source[2],
1196 eth->h_source[3], eth->h_source[4], eth->h_source[5]);
1200 /* MAC address copy */
1201 memcpy(p, buffer, 12); /* DST/SRC MAC address */
1205 /* EtherType/Length check */
1206 if (*(buffer + 1) + (*buffer << 8) > 1500) {
1207 /* ProtocolEAP = *(buffer+1) + (*buffer << 8); */
1208 /* DPRINTK(2, "Send [SNAP]Type %x\n",ProtocolEAP); */
1209 /* SAP/CTL/OUI(6 byte) add */
1210 *p++ = 0xAA; /* DSAP */
1211 *p++ = 0xAA; /* SSAP */
1212 *p++ = 0x03; /* CTL */
1213 *p++ = 0x00; /* OUI ("000000") */
1214 *p++ = 0x00; /* OUI ("000000") */
1215 *p++ = 0x00; /* OUI ("000000") */
1218 DPRINTK(4, "DIX\n");
1219 /* Length(2 byte) delete */
1226 memcpy(p, buffer, length);
1231 eth_hdr = (struct ether_hdr *)&pp->data[0];
1232 eth_proto = ntohs(eth_hdr->h_proto);
1234 /* for MIC FAILUER REPORT check */
1235 if (eth_proto == ETHER_PROTOCOL_TYPE_EAP
1236 && priv->wpa.mic_failure.failure > 0) {
1237 aa1x_hdr = (struct ieee802_1x_hdr *)(eth_hdr + 1);
1238 if (aa1x_hdr->type == IEEE802_1X_TYPE_EAPOL_KEY) {
1239 eap_key = (struct wpa_eapol_key *)(aa1x_hdr + 1);
1240 keyinfo = ntohs(eap_key->key_info);
1244 if (priv->wpa.rsn_enabled && priv->wpa.key[0].key_len) {
1245 if (eth_proto == ETHER_PROTOCOL_TYPE_EAP
1246 && !(priv->wpa.key[1].key_len)
1247 && !(priv->wpa.key[2].key_len)
1248 && !(priv->wpa.key[3].key_len)) {
1249 pp->auth_type = cpu_to_le16((uint16_t) TYPE_AUTH); /* no encryption */
1251 if (priv->wpa.pairwise_suite == IW_AUTH_CIPHER_TKIP) {
1252 MichaelMICFunction(&michel_mic, (uint8_t *) priv->wpa.key[0].tx_mic_key, (uint8_t *) & pp->data[0], (int)packet_len, (uint8_t) 0, /* priority */
1253 (uint8_t *) michel_mic.
1255 memcpy(p, michel_mic.Result, 8);
1260 cpu_to_le16((uint16_t) TYPE_DATA);
1262 } else if (priv->wpa.pairwise_suite ==
1263 IW_AUTH_CIPHER_CCMP) {
1265 cpu_to_le16((uint16_t) TYPE_DATA);
1269 if (eth_proto == ETHER_PROTOCOL_TYPE_EAP)
1270 pp->auth_type = cpu_to_le16((uint16_t) TYPE_AUTH);
1272 pp->auth_type = cpu_to_le16((uint16_t) TYPE_DATA);
1275 /* header value set */
1277 cpu_to_le16((uint16_t)
1278 (sizeof(*pp) - sizeof(pp->header.size) + packet_len));
1279 pp->header.event = cpu_to_le16((uint16_t) HIF_DATA_REQ);
1283 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp) + packet_len),
1284 (void *)send_packet_complete, (void *)priv,
1287 /* MIC FAILUER REPORT check */
1288 if (eth_proto == ETHER_PROTOCOL_TYPE_EAP
1289 && priv->wpa.mic_failure.failure > 0) {
1290 if (keyinfo & WPA_KEY_INFO_ERROR
1291 && keyinfo & WPA_KEY_INFO_REQUEST) {
1292 DPRINTK(3, " MIC ERROR Report SET : %04X\n", keyinfo);
1293 hostif_sme_enqueue(priv, SME_MIC_FAILURE_REQUEST);
1295 if (priv->wpa.mic_failure.failure == 2)
1296 priv->wpa.mic_failure.stop = 1;
1302 #define ps_confirm_wait_inc(priv) do{if(atomic_read(&priv->psstatus.status) > PS_ACTIVE_SET){ \
1303 atomic_inc(&priv->psstatus.confirm_wait); \
1304 /* atomic_set(&priv->psstatus.status, PS_CONF_WAIT);*/ \
1308 void hostif_mib_get_request(struct ks_wlan_private *priv,
1309 unsigned long mib_attribute)
1311 struct hostif_mib_get_request_t *pp;
1315 /* make primitive */
1316 pp = (struct hostif_mib_get_request_t *)
1317 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1319 DPRINTK(3, "allocate memory failed..\n");
1323 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1324 pp->header.event = cpu_to_le16((uint16_t) HIF_MIB_GET_REQ);
1325 pp->mib_attribute = cpu_to_le32((uint32_t) mib_attribute);
1327 /* send to device request */
1328 ps_confirm_wait_inc(priv);
1329 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1333 void hostif_mib_set_request(struct ks_wlan_private *priv,
1334 unsigned long mib_attribute, unsigned short size,
1335 unsigned short type, void *vp)
1337 struct hostif_mib_set_request_t *pp;
1341 if (priv->dev_state < DEVICE_STATE_BOOT) {
1342 DPRINTK(3, "DeviceRemove\n");
1346 /* make primitive */
1347 pp = (struct hostif_mib_set_request_t *)
1348 kmalloc(hif_align_size(sizeof(*pp) + size), KS_WLAN_MEM_FLAG);
1350 DPRINTK(3, "allocate memory failed..\n");
1355 cpu_to_le16((uint16_t)
1356 (sizeof(*pp) - sizeof(pp->header.size) + size));
1357 pp->header.event = cpu_to_le16((uint16_t) HIF_MIB_SET_REQ);
1358 pp->mib_attribute = cpu_to_le32((uint32_t) mib_attribute);
1359 pp->mib_value.size = cpu_to_le16((uint16_t) size);
1360 pp->mib_value.type = cpu_to_le16((uint16_t) type);
1361 memcpy(&pp->mib_value.body, vp, size);
1363 /* send to device request */
1364 ps_confirm_wait_inc(priv);
1365 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp) + size), NULL, NULL,
1370 void hostif_start_request(struct ks_wlan_private *priv, unsigned char mode)
1372 struct hostif_start_request_t *pp;
1376 /* make primitive */
1377 pp = (struct hostif_start_request_t *)
1378 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1380 DPRINTK(3, "allocate memory failed..\n");
1384 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1385 pp->header.event = cpu_to_le16((uint16_t) HIF_START_REQ);
1386 pp->mode = cpu_to_le16((uint16_t) mode);
1388 /* send to device request */
1389 ps_confirm_wait_inc(priv);
1390 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1392 priv->aplist.size = 0;
1393 priv->scan_ind_count = 0;
1397 void hostif_ps_adhoc_set_request(struct ks_wlan_private *priv)
1399 struct hostif_ps_adhoc_set_request_t *pp;
1400 uint16_t capability;
1404 /* make primitive */
1405 pp = (struct hostif_ps_adhoc_set_request_t *)
1406 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1408 DPRINTK(3, "allocate memory failed..\n");
1411 memset(pp, 0, sizeof(*pp));
1413 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1414 pp->header.event = cpu_to_le16((uint16_t) HIF_PS_ADH_SET_REQ);
1415 pp->phy_type = cpu_to_le16((uint16_t) (priv->reg.phy_type));
1416 pp->cts_mode = cpu_to_le16((uint16_t) (priv->reg.cts_mode));
1417 pp->scan_type = cpu_to_le16((uint16_t) (priv->reg.scan_type));
1418 pp->channel = cpu_to_le16((uint16_t) (priv->reg.channel));
1419 pp->rate_set.size = priv->reg.rate_set.size;
1420 memcpy(&pp->rate_set.body[0], &priv->reg.rate_set.body[0],
1421 priv->reg.rate_set.size);
1423 capability = 0x0000;
1424 if (priv->reg.preamble == SHORT_PREAMBLE) {
1425 /* short preamble */
1426 capability |= BSS_CAP_SHORT_PREAMBLE;
1428 capability &= ~(BSS_CAP_PBCC); /* pbcc not support */
1429 if (priv->reg.phy_type != D_11B_ONLY_MODE) {
1430 capability |= BSS_CAP_SHORT_SLOT_TIME; /* ShortSlotTime support */
1431 capability &= ~(BSS_CAP_DSSS_OFDM); /* DSSS OFDM */
1433 pp->capability = cpu_to_le16((uint16_t) capability);
1435 /* send to device request */
1436 ps_confirm_wait_inc(priv);
1437 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1441 void hostif_infrastructure_set_request(struct ks_wlan_private *priv)
1443 struct hostif_infrastructure_set_request_t *pp;
1444 uint16_t capability;
1446 DPRINTK(3, "ssid.size=%d \n", priv->reg.ssid.size);
1448 /* make primitive */
1449 pp = (struct hostif_infrastructure_set_request_t *)
1450 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1452 DPRINTK(3, "allocate memory failed..\n");
1456 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1457 pp->header.event = cpu_to_le16((uint16_t) HIF_INFRA_SET_REQ);
1458 pp->phy_type = cpu_to_le16((uint16_t) (priv->reg.phy_type));
1459 pp->cts_mode = cpu_to_le16((uint16_t) (priv->reg.cts_mode));
1460 pp->scan_type = cpu_to_le16((uint16_t) (priv->reg.scan_type));
1462 pp->rate_set.size = priv->reg.rate_set.size;
1463 memcpy(&pp->rate_set.body[0], &priv->reg.rate_set.body[0],
1464 priv->reg.rate_set.size);
1465 pp->ssid.size = priv->reg.ssid.size;
1466 memcpy(&pp->ssid.body[0], &priv->reg.ssid.body[0], priv->reg.ssid.size);
1468 capability = 0x0000;
1469 if (priv->reg.preamble == SHORT_PREAMBLE) {
1470 /* short preamble */
1471 capability |= BSS_CAP_SHORT_PREAMBLE;
1473 capability &= ~(BSS_CAP_PBCC); /* pbcc not support */
1474 if (priv->reg.phy_type != D_11B_ONLY_MODE) {
1475 capability |= BSS_CAP_SHORT_SLOT_TIME; /* ShortSlotTime support */
1476 capability &= ~(BSS_CAP_DSSS_OFDM); /* DSSS OFDM not support */
1478 pp->capability = cpu_to_le16((uint16_t) capability);
1479 pp->beacon_lost_count =
1480 cpu_to_le16((uint16_t) (priv->reg.beacon_lost_count));
1481 pp->auth_type = cpu_to_le16((uint16_t) (priv->reg.authenticate_type));
1483 pp->channel_list.body[0] = 1;
1484 pp->channel_list.body[1] = 8;
1485 pp->channel_list.body[2] = 2;
1486 pp->channel_list.body[3] = 9;
1487 pp->channel_list.body[4] = 3;
1488 pp->channel_list.body[5] = 10;
1489 pp->channel_list.body[6] = 4;
1490 pp->channel_list.body[7] = 11;
1491 pp->channel_list.body[8] = 5;
1492 pp->channel_list.body[9] = 12;
1493 pp->channel_list.body[10] = 6;
1494 pp->channel_list.body[11] = 13;
1495 pp->channel_list.body[12] = 7;
1496 if (priv->reg.phy_type == D_11G_ONLY_MODE) {
1497 pp->channel_list.size = 13;
1499 pp->channel_list.body[13] = 14;
1500 pp->channel_list.size = 14;
1503 /* send to device request */
1504 ps_confirm_wait_inc(priv);
1505 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1508 void hostif_infrastructure_set2_request(struct ks_wlan_private *priv)
1510 struct hostif_infrastructure_set2_request_t *pp;
1511 uint16_t capability;
1513 DPRINTK(2, "ssid.size=%d \n", priv->reg.ssid.size);
1515 /* make primitive */
1516 pp = (struct hostif_infrastructure_set2_request_t *)
1517 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1519 DPRINTK(3, "allocate memory failed..\n");
1523 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1524 pp->header.event = cpu_to_le16((uint16_t) HIF_INFRA_SET2_REQ);
1525 pp->phy_type = cpu_to_le16((uint16_t) (priv->reg.phy_type));
1526 pp->cts_mode = cpu_to_le16((uint16_t) (priv->reg.cts_mode));
1527 pp->scan_type = cpu_to_le16((uint16_t) (priv->reg.scan_type));
1529 pp->rate_set.size = priv->reg.rate_set.size;
1530 memcpy(&pp->rate_set.body[0], &priv->reg.rate_set.body[0],
1531 priv->reg.rate_set.size);
1532 pp->ssid.size = priv->reg.ssid.size;
1533 memcpy(&pp->ssid.body[0], &priv->reg.ssid.body[0], priv->reg.ssid.size);
1535 capability = 0x0000;
1536 if (priv->reg.preamble == SHORT_PREAMBLE) {
1537 /* short preamble */
1538 capability |= BSS_CAP_SHORT_PREAMBLE;
1540 capability &= ~(BSS_CAP_PBCC); /* pbcc not support */
1541 if (priv->reg.phy_type != D_11B_ONLY_MODE) {
1542 capability |= BSS_CAP_SHORT_SLOT_TIME; /* ShortSlotTime support */
1543 capability &= ~(BSS_CAP_DSSS_OFDM); /* DSSS OFDM not support */
1545 pp->capability = cpu_to_le16((uint16_t) capability);
1546 pp->beacon_lost_count =
1547 cpu_to_le16((uint16_t) (priv->reg.beacon_lost_count));
1548 pp->auth_type = cpu_to_le16((uint16_t) (priv->reg.authenticate_type));
1550 pp->channel_list.body[0] = 1;
1551 pp->channel_list.body[1] = 8;
1552 pp->channel_list.body[2] = 2;
1553 pp->channel_list.body[3] = 9;
1554 pp->channel_list.body[4] = 3;
1555 pp->channel_list.body[5] = 10;
1556 pp->channel_list.body[6] = 4;
1557 pp->channel_list.body[7] = 11;
1558 pp->channel_list.body[8] = 5;
1559 pp->channel_list.body[9] = 12;
1560 pp->channel_list.body[10] = 6;
1561 pp->channel_list.body[11] = 13;
1562 pp->channel_list.body[12] = 7;
1563 if (priv->reg.phy_type == D_11G_ONLY_MODE) {
1564 pp->channel_list.size = 13;
1566 pp->channel_list.body[13] = 14;
1567 pp->channel_list.size = 14;
1570 memcpy(pp->bssid, priv->reg.bssid, ETH_ALEN);
1572 /* send to device request */
1573 ps_confirm_wait_inc(priv);
1574 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1578 void hostif_adhoc_set_request(struct ks_wlan_private *priv)
1580 struct hostif_adhoc_set_request_t *pp;
1581 uint16_t capability;
1585 /* make primitive */
1586 pp = (struct hostif_adhoc_set_request_t *)
1587 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1589 DPRINTK(3, "allocate memory failed..\n");
1592 memset(pp, 0, sizeof(*pp));
1594 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1595 pp->header.event = cpu_to_le16((uint16_t) HIF_ADH_SET_REQ);
1596 pp->phy_type = cpu_to_le16((uint16_t) (priv->reg.phy_type));
1597 pp->cts_mode = cpu_to_le16((uint16_t) (priv->reg.cts_mode));
1598 pp->scan_type = cpu_to_le16((uint16_t) (priv->reg.scan_type));
1599 pp->channel = cpu_to_le16((uint16_t) (priv->reg.channel));
1600 pp->rate_set.size = priv->reg.rate_set.size;
1601 memcpy(&pp->rate_set.body[0], &priv->reg.rate_set.body[0],
1602 priv->reg.rate_set.size);
1603 pp->ssid.size = priv->reg.ssid.size;
1604 memcpy(&pp->ssid.body[0], &priv->reg.ssid.body[0], priv->reg.ssid.size);
1606 capability = 0x0000;
1607 if (priv->reg.preamble == SHORT_PREAMBLE) {
1608 /* short preamble */
1609 capability |= BSS_CAP_SHORT_PREAMBLE;
1611 capability &= ~(BSS_CAP_PBCC); /* pbcc not support */
1612 if (priv->reg.phy_type != D_11B_ONLY_MODE) {
1613 capability |= BSS_CAP_SHORT_SLOT_TIME; /* ShortSlotTime support */
1614 capability &= ~(BSS_CAP_DSSS_OFDM); /* DSSS OFDM not support */
1616 pp->capability = cpu_to_le16((uint16_t) capability);
1618 /* send to device request */
1619 ps_confirm_wait_inc(priv);
1620 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1624 void hostif_adhoc_set2_request(struct ks_wlan_private *priv)
1626 struct hostif_adhoc_set2_request_t *pp;
1627 uint16_t capability;
1631 /* make primitive */
1632 pp = (struct hostif_adhoc_set2_request_t *)
1633 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1635 DPRINTK(3, "allocate memory failed..\n");
1638 memset(pp, 0, sizeof(*pp));
1640 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1641 pp->header.event = cpu_to_le16((uint16_t) HIF_ADH_SET_REQ);
1642 pp->phy_type = cpu_to_le16((uint16_t) (priv->reg.phy_type));
1643 pp->cts_mode = cpu_to_le16((uint16_t) (priv->reg.cts_mode));
1644 pp->scan_type = cpu_to_le16((uint16_t) (priv->reg.scan_type));
1645 pp->rate_set.size = priv->reg.rate_set.size;
1646 memcpy(&pp->rate_set.body[0], &priv->reg.rate_set.body[0],
1647 priv->reg.rate_set.size);
1648 pp->ssid.size = priv->reg.ssid.size;
1649 memcpy(&pp->ssid.body[0], &priv->reg.ssid.body[0], priv->reg.ssid.size);
1651 capability = 0x0000;
1652 if (priv->reg.preamble == SHORT_PREAMBLE) {
1653 /* short preamble */
1654 capability |= BSS_CAP_SHORT_PREAMBLE;
1656 capability &= ~(BSS_CAP_PBCC); /* pbcc not support */
1657 if (priv->reg.phy_type != D_11B_ONLY_MODE) {
1658 capability |= BSS_CAP_SHORT_SLOT_TIME; /* ShortSlotTime support */
1659 capability &= ~(BSS_CAP_DSSS_OFDM); /* DSSS OFDM not support */
1661 pp->capability = cpu_to_le16((uint16_t) capability);
1663 pp->channel_list.body[0] = priv->reg.channel;
1664 pp->channel_list.size = 1;
1665 memcpy(pp->bssid, priv->reg.bssid, ETH_ALEN);
1667 /* send to device request */
1668 ps_confirm_wait_inc(priv);
1669 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1673 void hostif_stop_request(struct ks_wlan_private *priv)
1675 struct hostif_stop_request_t *pp;
1679 /* make primitive */
1680 pp = (struct hostif_stop_request_t *)
1681 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1683 DPRINTK(3, "allocate memory failed..\n");
1687 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1688 pp->header.event = cpu_to_le16((uint16_t) HIF_STOP_REQ);
1690 /* send to device request */
1691 ps_confirm_wait_inc(priv);
1692 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1696 void hostif_phy_information_request(struct ks_wlan_private *priv)
1698 struct hostif_phy_information_request_t *pp;
1702 /* make primitive */
1703 pp = (struct hostif_phy_information_request_t *)
1704 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1706 DPRINTK(3, "allocate memory failed..\n");
1710 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1711 pp->header.event = cpu_to_le16((uint16_t) HIF_PHY_INFO_REQ);
1712 if (priv->reg.phy_info_timer) {
1713 pp->type = cpu_to_le16((uint16_t) TIME_TYPE);
1714 pp->time = cpu_to_le16((uint16_t) (priv->reg.phy_info_timer));
1716 pp->type = cpu_to_le16((uint16_t) NORMAL_TYPE);
1717 pp->time = cpu_to_le16((uint16_t) 0);
1720 /* send to device request */
1721 ps_confirm_wait_inc(priv);
1722 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1726 void hostif_power_mngmt_request(struct ks_wlan_private *priv,
1727 unsigned long mode, unsigned long wake_up,
1728 unsigned long receiveDTIMs)
1730 struct hostif_power_mngmt_request_t *pp;
1732 DPRINTK(3, "mode=%lu wake_up=%lu receiveDTIMs=%lu\n", mode, wake_up,
1734 /* make primitive */
1735 pp = (struct hostif_power_mngmt_request_t *)
1736 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1738 DPRINTK(3, "allocate memory failed..\n");
1742 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1743 pp->header.event = cpu_to_le16((uint16_t) HIF_POWERMGT_REQ);
1744 pp->mode = cpu_to_le32((uint32_t) mode);
1745 pp->wake_up = cpu_to_le32((uint32_t) wake_up);
1746 pp->receiveDTIMs = cpu_to_le32((uint32_t) receiveDTIMs);
1748 /* send to device request */
1749 ps_confirm_wait_inc(priv);
1750 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1754 void hostif_sleep_request(struct ks_wlan_private *priv, unsigned long mode)
1756 struct hostif_sleep_request_t *pp;
1758 DPRINTK(3, "mode=%lu \n", mode);
1760 if (mode == SLP_SLEEP) {
1761 /* make primitive */
1762 pp = (struct hostif_sleep_request_t *)
1763 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1765 DPRINTK(3, "allocate memory failed..\n");
1769 cpu_to_le16((uint16_t)
1770 (sizeof(*pp) - sizeof(pp->header.size)));
1771 pp->header.event = cpu_to_le16((uint16_t) HIF_SLEEP_REQ);
1773 /* send to device request */
1774 ps_confirm_wait_inc(priv);
1775 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL,
1777 } else if (mode == SLP_ACTIVE) {
1778 atomic_set(&priv->sleepstatus.wakeup_request, 1);
1779 queue_delayed_work(priv->ks_wlan_hw.ks7010sdio_wq,
1780 &priv->ks_wlan_hw.rw_wq, 1);
1782 DPRINTK(3, "invalid mode %ld \n", mode);
1788 void hostif_bss_scan_request(struct ks_wlan_private *priv,
1789 unsigned long scan_type, uint8_t * scan_ssid,
1790 uint8_t scan_ssid_len)
1792 struct hostif_bss_scan_request_t *pp;
1795 /* make primitive */
1796 pp = (struct hostif_bss_scan_request_t *)
1797 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1799 DPRINTK(3, "allocate memory failed..\n");
1803 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1804 pp->header.event = cpu_to_le16((uint16_t) HIF_SCAN_REQ);
1805 pp->scan_type = scan_type;
1807 pp->ch_time_min = cpu_to_le32((uint32_t) 110); /* default value */
1808 pp->ch_time_max = cpu_to_le32((uint32_t) 130); /* default value */
1809 pp->channel_list.body[0] = 1;
1810 pp->channel_list.body[1] = 8;
1811 pp->channel_list.body[2] = 2;
1812 pp->channel_list.body[3] = 9;
1813 pp->channel_list.body[4] = 3;
1814 pp->channel_list.body[5] = 10;
1815 pp->channel_list.body[6] = 4;
1816 pp->channel_list.body[7] = 11;
1817 pp->channel_list.body[8] = 5;
1818 pp->channel_list.body[9] = 12;
1819 pp->channel_list.body[10] = 6;
1820 pp->channel_list.body[11] = 13;
1821 pp->channel_list.body[12] = 7;
1822 if (priv->reg.phy_type == D_11G_ONLY_MODE) {
1823 pp->channel_list.size = 13;
1825 pp->channel_list.body[13] = 14;
1826 pp->channel_list.size = 14;
1830 /* specified SSID SCAN */
1831 if (scan_ssid_len > 0 && scan_ssid_len <= 32) {
1832 pp->ssid.size = scan_ssid_len;
1833 memcpy(&pp->ssid.body[0], scan_ssid, scan_ssid_len);
1836 /* send to device request */
1837 ps_confirm_wait_inc(priv);
1838 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1840 priv->aplist.size = 0;
1841 priv->scan_ind_count = 0;
1845 void hostif_mic_failure_request(struct ks_wlan_private *priv,
1846 unsigned short failure_count,
1847 unsigned short timer)
1849 struct hostif_mic_failure_request_t *pp;
1851 DPRINTK(3, "count=%d :: timer=%d\n", failure_count, timer);
1852 /* make primitive */
1853 pp = (struct hostif_mic_failure_request_t *)
1854 kmalloc(hif_align_size(sizeof(*pp)), KS_WLAN_MEM_FLAG);
1856 DPRINTK(3, "allocate memory failed..\n");
1860 cpu_to_le16((uint16_t) (sizeof(*pp) - sizeof(pp->header.size)));
1861 pp->header.event = cpu_to_le16((uint16_t) HIF_MIC_FAILURE_REQ);
1862 pp->failure_count = cpu_to_le16((uint16_t) failure_count);
1863 pp->timer = cpu_to_le16((uint16_t) timer);
1865 /* send to device request */
1866 ps_confirm_wait_inc(priv);
1867 ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp)), NULL, NULL, NULL);
1870 /* Device I/O Recieve indicate */
1871 static void devio_rec_ind(struct ks_wlan_private *priv, unsigned char *p,
1874 if (priv->device_open_status) {
1875 spin_lock(&priv->dev_read_lock); /* request spin lock */
1876 priv->dev_data[atomic_read(&priv->rec_count)] = p;
1877 priv->dev_size[atomic_read(&priv->rec_count)] = size;
1879 if (atomic_read(&priv->event_count) != DEVICE_STOCK_COUNT) {
1880 /* rx event count inc */
1881 atomic_inc(&priv->event_count);
1883 atomic_inc(&priv->rec_count);
1884 if (atomic_read(&priv->rec_count) == DEVICE_STOCK_COUNT)
1885 atomic_set(&priv->rec_count, 0);
1887 wake_up_interruptible_all(&priv->devread_wait);
1889 /* release spin lock */
1890 spin_unlock(&priv->dev_read_lock);
1894 void hostif_receive(struct ks_wlan_private *priv, unsigned char *p,
1899 devio_rec_ind(priv, p, size);
1902 priv->rx_size = size;
1904 if (get_WORD(priv) == priv->rx_size) { /* length check !! */
1905 hostif_event_check(priv); /* event check */
1910 void hostif_sme_set_wep(struct ks_wlan_private *priv, int type)
1914 case SME_WEP_INDEX_REQUEST:
1915 val = cpu_to_le32((uint32_t) (priv->reg.wep_index));
1916 hostif_mib_set_request(priv, DOT11_WEP_DEFAULT_KEY_ID,
1917 sizeof(val), MIB_VALUE_TYPE_INT, &val);
1919 case SME_WEP_KEY1_REQUEST:
1920 if (!priv->wpa.wpa_enabled)
1921 hostif_mib_set_request(priv,
1922 DOT11_WEP_DEFAULT_KEY_VALUE1,
1923 priv->reg.wep_key[0].size,
1924 MIB_VALUE_TYPE_OSTRING,
1925 &priv->reg.wep_key[0].val[0]);
1927 case SME_WEP_KEY2_REQUEST:
1928 if (!priv->wpa.wpa_enabled)
1929 hostif_mib_set_request(priv,
1930 DOT11_WEP_DEFAULT_KEY_VALUE2,
1931 priv->reg.wep_key[1].size,
1932 MIB_VALUE_TYPE_OSTRING,
1933 &priv->reg.wep_key[1].val[0]);
1935 case SME_WEP_KEY3_REQUEST:
1936 if (!priv->wpa.wpa_enabled)
1937 hostif_mib_set_request(priv,
1938 DOT11_WEP_DEFAULT_KEY_VALUE3,
1939 priv->reg.wep_key[2].size,
1940 MIB_VALUE_TYPE_OSTRING,
1941 &priv->reg.wep_key[2].val[0]);
1943 case SME_WEP_KEY4_REQUEST:
1944 if (!priv->wpa.wpa_enabled)
1945 hostif_mib_set_request(priv,
1946 DOT11_WEP_DEFAULT_KEY_VALUE4,
1947 priv->reg.wep_key[3].size,
1948 MIB_VALUE_TYPE_OSTRING,
1949 &priv->reg.wep_key[3].val[0]);
1951 case SME_WEP_FLAG_REQUEST:
1952 val = cpu_to_le32((uint32_t) (priv->reg.privacy_invoked));
1953 hostif_mib_set_request(priv, DOT11_PRIVACY_INVOKED,
1954 sizeof(val), MIB_VALUE_TYPE_BOOL, &val);
1961 struct wpa_suite_t {
1962 unsigned short size;
1963 unsigned char suite[4][CIPHER_ID_LEN];
1964 } __attribute__ ((packed));
1968 uint16_t rsn_capability;
1969 } __attribute__ ((packed));
1972 void hostif_sme_set_rsn(struct ks_wlan_private *priv, int type)
1974 struct wpa_suite_t wpa_suite;
1975 struct rsn_mode_t rsn_mode;
1978 memset(&wpa_suite, 0, sizeof(wpa_suite));
1981 case SME_RSN_UCAST_REQUEST:
1982 wpa_suite.size = cpu_to_le16((uint16_t) 1);
1983 switch (priv->wpa.pairwise_suite) {
1984 case IW_AUTH_CIPHER_NONE:
1985 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
1986 memcpy(&wpa_suite.suite[0][0],
1987 CIPHER_ID_WPA2_NONE, CIPHER_ID_LEN);
1989 memcpy(&wpa_suite.suite[0][0],
1990 CIPHER_ID_WPA_NONE, CIPHER_ID_LEN);
1992 case IW_AUTH_CIPHER_WEP40:
1993 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
1994 memcpy(&wpa_suite.suite[0][0],
1995 CIPHER_ID_WPA2_WEP40, CIPHER_ID_LEN);
1997 memcpy(&wpa_suite.suite[0][0],
1998 CIPHER_ID_WPA_WEP40, CIPHER_ID_LEN);
2000 case IW_AUTH_CIPHER_TKIP:
2001 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2002 memcpy(&wpa_suite.suite[0][0],
2003 CIPHER_ID_WPA2_TKIP, CIPHER_ID_LEN);
2005 memcpy(&wpa_suite.suite[0][0],
2006 CIPHER_ID_WPA_TKIP, CIPHER_ID_LEN);
2008 case IW_AUTH_CIPHER_CCMP:
2009 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2010 memcpy(&wpa_suite.suite[0][0],
2011 CIPHER_ID_WPA2_CCMP, CIPHER_ID_LEN);
2013 memcpy(&wpa_suite.suite[0][0],
2014 CIPHER_ID_WPA_CCMP, CIPHER_ID_LEN);
2016 case IW_AUTH_CIPHER_WEP104:
2017 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2018 memcpy(&wpa_suite.suite[0][0],
2019 CIPHER_ID_WPA2_WEP104, CIPHER_ID_LEN);
2021 memcpy(&wpa_suite.suite[0][0],
2022 CIPHER_ID_WPA_WEP104, CIPHER_ID_LEN);
2026 hostif_mib_set_request(priv, DOT11_RSN_CONFIG_UNICAST_CIPHER,
2027 sizeof(wpa_suite.size) +
2028 CIPHER_ID_LEN * wpa_suite.size,
2029 MIB_VALUE_TYPE_OSTRING, &wpa_suite);
2031 case SME_RSN_MCAST_REQUEST:
2032 switch (priv->wpa.group_suite) {
2033 case IW_AUTH_CIPHER_NONE:
2034 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2035 memcpy(&wpa_suite.suite[0][0],
2036 CIPHER_ID_WPA2_NONE, CIPHER_ID_LEN);
2038 memcpy(&wpa_suite.suite[0][0],
2039 CIPHER_ID_WPA_NONE, CIPHER_ID_LEN);
2041 case IW_AUTH_CIPHER_WEP40:
2042 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2043 memcpy(&wpa_suite.suite[0][0],
2044 CIPHER_ID_WPA2_WEP40, CIPHER_ID_LEN);
2046 memcpy(&wpa_suite.suite[0][0],
2047 CIPHER_ID_WPA_WEP40, CIPHER_ID_LEN);
2049 case IW_AUTH_CIPHER_TKIP:
2050 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2051 memcpy(&wpa_suite.suite[0][0],
2052 CIPHER_ID_WPA2_TKIP, CIPHER_ID_LEN);
2054 memcpy(&wpa_suite.suite[0][0],
2055 CIPHER_ID_WPA_TKIP, CIPHER_ID_LEN);
2057 case IW_AUTH_CIPHER_CCMP:
2058 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2059 memcpy(&wpa_suite.suite[0][0],
2060 CIPHER_ID_WPA2_CCMP, CIPHER_ID_LEN);
2062 memcpy(&wpa_suite.suite[0][0],
2063 CIPHER_ID_WPA_CCMP, CIPHER_ID_LEN);
2065 case IW_AUTH_CIPHER_WEP104:
2066 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2067 memcpy(&wpa_suite.suite[0][0],
2068 CIPHER_ID_WPA2_WEP104, CIPHER_ID_LEN);
2070 memcpy(&wpa_suite.suite[0][0],
2071 CIPHER_ID_WPA_WEP104, CIPHER_ID_LEN);
2075 hostif_mib_set_request(priv, DOT11_RSN_CONFIG_MULTICAST_CIPHER,
2076 CIPHER_ID_LEN, MIB_VALUE_TYPE_OSTRING,
2077 &wpa_suite.suite[0][0]);
2079 case SME_RSN_AUTH_REQUEST:
2080 wpa_suite.size = cpu_to_le16((uint16_t) 1);
2081 switch (priv->wpa.key_mgmt_suite) {
2082 case IW_AUTH_KEY_MGMT_802_1X:
2083 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2084 memcpy(&wpa_suite.suite[0][0],
2085 KEY_MGMT_ID_WPA2_1X, KEY_MGMT_ID_LEN);
2087 memcpy(&wpa_suite.suite[0][0],
2088 KEY_MGMT_ID_WPA_1X, KEY_MGMT_ID_LEN);
2090 case IW_AUTH_KEY_MGMT_PSK:
2091 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2092 memcpy(&wpa_suite.suite[0][0],
2093 KEY_MGMT_ID_WPA2_PSK, KEY_MGMT_ID_LEN);
2095 memcpy(&wpa_suite.suite[0][0],
2096 KEY_MGMT_ID_WPA_PSK, KEY_MGMT_ID_LEN);
2099 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2100 memcpy(&wpa_suite.suite[0][0],
2101 KEY_MGMT_ID_WPA2_NONE, KEY_MGMT_ID_LEN);
2103 memcpy(&wpa_suite.suite[0][0],
2104 KEY_MGMT_ID_WPA_NONE, KEY_MGMT_ID_LEN);
2107 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)
2108 memcpy(&wpa_suite.suite[0][0],
2109 KEY_MGMT_ID_WPA2_WPANONE,
2112 memcpy(&wpa_suite.suite[0][0],
2113 KEY_MGMT_ID_WPA_WPANONE,
2118 hostif_mib_set_request(priv, DOT11_RSN_CONFIG_AUTH_SUITE,
2119 sizeof(wpa_suite.size) +
2120 KEY_MGMT_ID_LEN * wpa_suite.size,
2121 MIB_VALUE_TYPE_OSTRING, &wpa_suite);
2123 case SME_RSN_ENABLED_REQUEST:
2124 val = cpu_to_le32((uint32_t) (priv->wpa.rsn_enabled));
2125 hostif_mib_set_request(priv, DOT11_RSN_ENABLED,
2126 sizeof(val), MIB_VALUE_TYPE_BOOL, &val);
2128 case SME_RSN_MODE_REQUEST:
2129 if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) {
2131 cpu_to_le32((uint32_t) RSN_MODE_WPA2);
2132 rsn_mode.rsn_capability = cpu_to_le16((uint16_t) 0);
2133 } else if (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA) {
2135 cpu_to_le32((uint32_t) RSN_MODE_WPA);
2136 rsn_mode.rsn_capability = cpu_to_le16((uint16_t) 0);
2139 cpu_to_le32((uint32_t) RSN_MODE_NONE);
2140 rsn_mode.rsn_capability = cpu_to_le16((uint16_t) 0);
2142 hostif_mib_set_request(priv, LOCAL_RSN_MODE, sizeof(rsn_mode),
2143 MIB_VALUE_TYPE_OSTRING, &rsn_mode);
2151 void hostif_sme_mode_setup(struct ks_wlan_private *priv)
2153 unsigned char rate_size;
2154 unsigned char rate_octet[RATE_SET_MAX_SIZE];
2157 /* rate setting if rate segging is auto for changing phy_type (#94) */
2158 if (priv->reg.tx_rate == TX_RATE_FULL_AUTO) {
2159 if (priv->reg.phy_type == D_11B_ONLY_MODE) {
2160 priv->reg.rate_set.body[3] = TX_RATE_11M;
2161 priv->reg.rate_set.body[2] = TX_RATE_5M;
2162 priv->reg.rate_set.body[1] = TX_RATE_2M | BASIC_RATE;
2163 priv->reg.rate_set.body[0] = TX_RATE_1M | BASIC_RATE;
2164 priv->reg.rate_set.size = 4;
2165 } else { /* D_11G_ONLY_MODE or D_11BG_COMPATIBLE_MODE */
2166 priv->reg.rate_set.body[11] = TX_RATE_54M;
2167 priv->reg.rate_set.body[10] = TX_RATE_48M;
2168 priv->reg.rate_set.body[9] = TX_RATE_36M;
2169 priv->reg.rate_set.body[8] = TX_RATE_18M;
2170 priv->reg.rate_set.body[7] = TX_RATE_9M;
2171 priv->reg.rate_set.body[6] = TX_RATE_24M | BASIC_RATE;
2172 priv->reg.rate_set.body[5] = TX_RATE_12M | BASIC_RATE;
2173 priv->reg.rate_set.body[4] = TX_RATE_6M | BASIC_RATE;
2174 priv->reg.rate_set.body[3] = TX_RATE_11M | BASIC_RATE;
2175 priv->reg.rate_set.body[2] = TX_RATE_5M | BASIC_RATE;
2176 priv->reg.rate_set.body[1] = TX_RATE_2M | BASIC_RATE;
2177 priv->reg.rate_set.body[0] = TX_RATE_1M | BASIC_RATE;
2178 priv->reg.rate_set.size = 12;
2182 /* rate mask by phy setting */
2183 if (priv->reg.phy_type == D_11B_ONLY_MODE) {
2184 for (i = 0; i < priv->reg.rate_set.size; i++) {
2185 if (IS_11B_RATE(priv->reg.rate_set.body[i])) {
2186 if ((priv->reg.rate_set.body[i] & RATE_MASK) >=
2190 body[i] & RATE_MASK;
2193 priv->reg.rate_set.body[i];
2198 } else { /* D_11G_ONLY_MODE or D_11BG_COMPATIBLE_MODE */
2199 for (i = 0; i < priv->reg.rate_set.size; i++) {
2200 if (IS_11BG_RATE(priv->reg.rate_set.body[i])) {
2201 if (IS_OFDM_EXT_RATE
2202 (priv->reg.rate_set.body[i]))
2205 body[i] & RATE_MASK;
2208 priv->reg.rate_set.body[i];
2214 if (rate_size == 0) {
2215 if (priv->reg.phy_type == D_11G_ONLY_MODE)
2216 rate_octet[0] = TX_RATE_6M | BASIC_RATE;
2218 rate_octet[0] = TX_RATE_2M | BASIC_RATE;
2222 /* rate set update */
2223 priv->reg.rate_set.size = rate_size;
2224 memcpy(&priv->reg.rate_set.body[0], &rate_octet[0], rate_size);
2226 switch (priv->reg.operation_mode) {
2227 case MODE_PSEUDO_ADHOC:
2228 /* Pseudo Ad-Hoc mode */
2229 hostif_ps_adhoc_set_request(priv);
2231 case MODE_INFRASTRUCTURE:
2232 /* Infrastructure mode */
2233 if (!is_valid_ether_addr((u8 *) priv->reg.bssid)) {
2234 hostif_infrastructure_set_request(priv);
2236 hostif_infrastructure_set2_request(priv);
2238 "Infra bssid = %02x:%02x:%02x:%02x:%02x:%02x\n",
2239 priv->reg.bssid[0], priv->reg.bssid[1],
2240 priv->reg.bssid[2], priv->reg.bssid[3],
2241 priv->reg.bssid[4], priv->reg.bssid[5]);
2245 /* IEEE802.11 Ad-Hoc mode */
2246 if (!is_valid_ether_addr((u8 *) priv->reg.bssid)) {
2247 hostif_adhoc_set_request(priv);
2249 hostif_adhoc_set2_request(priv);
2251 "Adhoc bssid = %02x:%02x:%02x:%02x:%02x:%02x\n",
2252 priv->reg.bssid[0], priv->reg.bssid[1],
2253 priv->reg.bssid[2], priv->reg.bssid[3],
2254 priv->reg.bssid[4], priv->reg.bssid[5]);
2265 void hostif_sme_multicast_set(struct ks_wlan_private *priv)
2268 struct net_device *dev = priv->net_dev;
2270 struct netdev_hw_addr *ha;
2271 char set_address[NIC_MAX_MCAST_LIST * ETH_ALEN];
2272 unsigned long filter_type;
2277 spin_lock(&priv->multicast_spin);
2279 memset(set_address, 0, NIC_MAX_MCAST_LIST * ETH_ALEN);
2281 if (dev->flags & IFF_PROMISC) {
2282 filter_type = cpu_to_le32((uint32_t) MCAST_FILTER_PROMISC);
2283 hostif_mib_set_request(priv, LOCAL_MULTICAST_FILTER,
2284 sizeof(filter_type), MIB_VALUE_TYPE_BOOL,
2286 } else if ((netdev_mc_count(dev) > NIC_MAX_MCAST_LIST)
2287 || (dev->flags & IFF_ALLMULTI)) {
2288 filter_type = cpu_to_le32((uint32_t) MCAST_FILTER_MCASTALL);
2289 hostif_mib_set_request(priv, LOCAL_MULTICAST_FILTER,
2290 sizeof(filter_type), MIB_VALUE_TYPE_BOOL,
2293 if (priv->sme_i.sme_flag & SME_MULTICAST) {
2294 mc_count = netdev_mc_count(dev);
2295 netdev_for_each_mc_addr(ha, dev) {
2296 memcpy(&set_address[i * ETH_ALEN], ha->addr,
2300 priv->sme_i.sme_flag &= ~SME_MULTICAST;
2301 hostif_mib_set_request(priv, LOCAL_MULTICAST_ADDRESS,
2302 (ETH_ALEN * mc_count),
2303 MIB_VALUE_TYPE_OSTRING,
2307 cpu_to_le32((uint32_t) MCAST_FILTER_MCAST);
2308 priv->sme_i.sme_flag |= SME_MULTICAST;
2309 hostif_mib_set_request(priv, LOCAL_MULTICAST_FILTER,
2310 sizeof(filter_type),
2311 MIB_VALUE_TYPE_BOOL,
2316 spin_unlock(&priv->multicast_spin);
2321 void hostif_sme_powermgt_set(struct ks_wlan_private *priv)
2323 unsigned long mode, wake_up, receiveDTIMs;
2326 switch (priv->reg.powermgt) {
2327 case POWMGT_ACTIVE_MODE:
2328 mode = POWER_ACTIVE;
2332 case POWMGT_SAVE1_MODE:
2333 if (priv->reg.operation_mode == MODE_INFRASTRUCTURE) {
2338 mode = POWER_ACTIVE;
2343 case POWMGT_SAVE2_MODE:
2344 if (priv->reg.operation_mode == MODE_INFRASTRUCTURE) {
2349 mode = POWER_ACTIVE;
2355 mode = POWER_ACTIVE;
2360 hostif_power_mngmt_request(priv, mode, wake_up, receiveDTIMs);
2366 void hostif_sme_sleep_set(struct ks_wlan_private *priv)
2369 switch (priv->sleep_mode) {
2371 hostif_sleep_request(priv, priv->sleep_mode);
2374 hostif_sleep_request(priv, priv->sleep_mode);
2384 void hostif_sme_set_key(struct ks_wlan_private *priv, int type)
2389 val = cpu_to_le32((uint32_t) (priv->reg.privacy_invoked));
2390 hostif_mib_set_request(priv, DOT11_PRIVACY_INVOKED,
2391 sizeof(val), MIB_VALUE_TYPE_BOOL, &val);
2394 val = cpu_to_le32((uint32_t) (priv->wpa.txkey));
2395 hostif_mib_set_request(priv, DOT11_WEP_DEFAULT_KEY_ID,
2396 sizeof(val), MIB_VALUE_TYPE_INT, &val);
2399 hostif_mib_set_request(priv, DOT11_WEP_DEFAULT_KEY_VALUE1,
2400 priv->wpa.key[0].key_len,
2401 MIB_VALUE_TYPE_OSTRING,
2402 &priv->wpa.key[0].key_val[0]);
2405 hostif_mib_set_request(priv, DOT11_WEP_DEFAULT_KEY_VALUE2,
2406 priv->wpa.key[1].key_len,
2407 MIB_VALUE_TYPE_OSTRING,
2408 &priv->wpa.key[1].key_val[0]);
2411 hostif_mib_set_request(priv, DOT11_WEP_DEFAULT_KEY_VALUE3,
2412 priv->wpa.key[2].key_len,
2413 MIB_VALUE_TYPE_OSTRING,
2414 &priv->wpa.key[2].key_val[0]);
2417 hostif_mib_set_request(priv, DOT11_WEP_DEFAULT_KEY_VALUE4,
2418 priv->wpa.key[3].key_len,
2419 MIB_VALUE_TYPE_OSTRING,
2420 &priv->wpa.key[3].key_val[0]);
2422 case SME_SET_PMK_TSC:
2423 hostif_mib_set_request(priv, DOT11_PMK_TSC,
2424 WPA_RX_SEQ_LEN, MIB_VALUE_TYPE_OSTRING,
2425 &priv->wpa.key[0].rx_seq[0]);
2427 case SME_SET_GMK1_TSC:
2428 hostif_mib_set_request(priv, DOT11_GMK1_TSC,
2429 WPA_RX_SEQ_LEN, MIB_VALUE_TYPE_OSTRING,
2430 &priv->wpa.key[1].rx_seq[0]);
2432 case SME_SET_GMK2_TSC:
2433 hostif_mib_set_request(priv, DOT11_GMK2_TSC,
2434 WPA_RX_SEQ_LEN, MIB_VALUE_TYPE_OSTRING,
2435 &priv->wpa.key[2].rx_seq[0]);
2442 void hostif_sme_set_pmksa(struct ks_wlan_private *priv)
2444 struct pmk_cache_t {
2447 uint8_t bssid[ETH_ALEN];
2448 uint8_t pmkid[IW_PMKID_LEN];
2449 } __attribute__ ((packed)) list[PMK_LIST_MAX];
2450 } __attribute__ ((packed)) pmkcache;
2452 struct list_head *ptr;
2455 DPRINTK(4, "pmklist.size=%d\n", priv->pmklist.size);
2457 list_for_each(ptr, &priv->pmklist.head) {
2458 pmk = list_entry(ptr, struct pmk_t, list);
2459 if (i < PMK_LIST_MAX) {
2460 memcpy(pmkcache.list[i].bssid, pmk->bssid, ETH_ALEN);
2461 memcpy(pmkcache.list[i].pmkid, pmk->pmkid,
2466 pmkcache.size = cpu_to_le16((uint16_t) (priv->pmklist.size));
2467 hostif_mib_set_request(priv, LOCAL_PMK,
2468 sizeof(priv->pmklist.size) + (ETH_ALEN +
2470 (priv->pmklist.size), MIB_VALUE_TYPE_OSTRING,
2476 void hostif_sme_execute(struct ks_wlan_private *priv, int event)
2480 DPRINTK(3, "event=%d\n", event);
2483 if (priv->dev_state == DEVICE_STATE_BOOT) {
2484 hostif_mib_get_request(priv, DOT11_MAC_ADDRESS);
2487 case SME_MULTICAST_REQUEST:
2488 hostif_sme_multicast_set(priv);
2490 case SME_MACADDRESS_SET_REQUEST:
2491 hostif_mib_set_request(priv, LOCAL_CURRENTADDRESS, ETH_ALEN,
2492 MIB_VALUE_TYPE_OSTRING,
2493 &priv->eth_addr[0]);
2495 case SME_BSS_SCAN_REQUEST:
2496 hostif_bss_scan_request(priv, priv->reg.scan_type,
2497 priv->scan_ssid, priv->scan_ssid_len);
2499 case SME_POW_MNGMT_REQUEST:
2500 hostif_sme_powermgt_set(priv);
2502 case SME_PHY_INFO_REQUEST:
2503 hostif_phy_information_request(priv);
2505 case SME_MIC_FAILURE_REQUEST:
2506 if (priv->wpa.mic_failure.failure == 1) {
2507 hostif_mic_failure_request(priv,
2508 priv->wpa.mic_failure.
2510 } else if (priv->wpa.mic_failure.failure == 2) {
2511 hostif_mic_failure_request(priv,
2512 priv->wpa.mic_failure.
2514 priv->wpa.mic_failure.
2518 "SME_MIC_FAILURE_REQUEST: failure count=%u error?\n",
2519 priv->wpa.mic_failure.failure);
2521 case SME_MIC_FAILURE_CONFIRM:
2522 if (priv->wpa.mic_failure.failure == 2) {
2523 if (priv->wpa.mic_failure.stop)
2524 priv->wpa.mic_failure.stop = 0;
2525 priv->wpa.mic_failure.failure = 0;
2526 hostif_start_request(priv, priv->reg.operation_mode);
2529 case SME_GET_MAC_ADDRESS:
2530 if (priv->dev_state == DEVICE_STATE_BOOT) {
2531 hostif_mib_get_request(priv, DOT11_PRODUCT_VERSION);
2534 case SME_GET_PRODUCT_VERSION:
2535 if (priv->dev_state == DEVICE_STATE_BOOT) {
2536 priv->dev_state = DEVICE_STATE_PREINIT;
2539 case SME_STOP_REQUEST:
2540 hostif_stop_request(priv);
2542 case SME_RTS_THRESHOLD_REQUEST:
2543 val = cpu_to_le32((uint32_t) (priv->reg.rts));
2544 hostif_mib_set_request(priv, DOT11_RTS_THRESHOLD,
2545 sizeof(val), MIB_VALUE_TYPE_INT, &val);
2547 case SME_FRAGMENTATION_THRESHOLD_REQUEST:
2548 val = cpu_to_le32((uint32_t) (priv->reg.fragment));
2549 hostif_mib_set_request(priv, DOT11_FRAGMENTATION_THRESHOLD,
2550 sizeof(val), MIB_VALUE_TYPE_INT, &val);
2552 case SME_WEP_INDEX_REQUEST:
2553 case SME_WEP_KEY1_REQUEST:
2554 case SME_WEP_KEY2_REQUEST:
2555 case SME_WEP_KEY3_REQUEST:
2556 case SME_WEP_KEY4_REQUEST:
2557 case SME_WEP_FLAG_REQUEST:
2558 hostif_sme_set_wep(priv, event);
2560 case SME_RSN_UCAST_REQUEST:
2561 case SME_RSN_MCAST_REQUEST:
2562 case SME_RSN_AUTH_REQUEST:
2563 case SME_RSN_ENABLED_REQUEST:
2564 case SME_RSN_MODE_REQUEST:
2565 hostif_sme_set_rsn(priv, event);
2573 case SME_SET_PMK_TSC:
2574 case SME_SET_GMK1_TSC:
2575 case SME_SET_GMK2_TSC:
2576 hostif_sme_set_key(priv, event);
2579 hostif_sme_set_pmksa(priv);
2582 case SME_WPS_ENABLE_REQUEST:
2583 hostif_mib_set_request(priv, LOCAL_WPS_ENABLE,
2584 sizeof(priv->wps.wps_enabled),
2586 &priv->wps.wps_enabled);
2588 case SME_WPS_PROBE_REQUEST:
2589 hostif_mib_set_request(priv, LOCAL_WPS_PROBE_REQ,
2591 MIB_VALUE_TYPE_OSTRING, priv->wps.ie);
2594 case SME_MODE_SET_REQUEST:
2595 hostif_sme_mode_setup(priv);
2598 hostif_mib_set_request(priv, LOCAL_GAIN,
2600 MIB_VALUE_TYPE_OSTRING, &priv->gain);
2603 hostif_mib_get_request(priv, LOCAL_GAIN);
2605 case SME_GET_EEPROM_CKSUM:
2606 priv->eeprom_checksum = EEPROM_FW_NOT_SUPPORT; /* initialize */
2607 hostif_mib_get_request(priv, LOCAL_EEPROM_SUM);
2609 case SME_START_REQUEST:
2610 hostif_start_request(priv, priv->reg.operation_mode);
2612 case SME_START_CONFIRM:
2613 /* for power save */
2614 atomic_set(&priv->psstatus.snooze_guard, 0);
2615 atomic_set(&priv->psstatus.confirm_wait, 0);
2616 if (priv->dev_state == DEVICE_STATE_PREINIT) {
2617 priv->dev_state = DEVICE_STATE_INIT;
2619 /* wake_up_interruptible_all(&priv->confirm_wait); */
2620 complete(&priv->confirm_wait);
2622 case SME_SLEEP_REQUEST:
2623 hostif_sme_sleep_set(priv);
2625 case SME_SET_REGION:
2626 val = cpu_to_le32((uint32_t) (priv->region));
2627 hostif_mib_set_request(priv, LOCAL_REGION,
2628 sizeof(val), MIB_VALUE_TYPE_INT, &val);
2630 case SME_MULTICAST_CONFIRM:
2631 case SME_BSS_SCAN_CONFIRM:
2632 case SME_POW_MNGMT_CONFIRM:
2633 case SME_PHY_INFO_CONFIRM:
2634 case SME_STOP_CONFIRM:
2635 case SME_RTS_THRESHOLD_CONFIRM:
2636 case SME_FRAGMENTATION_THRESHOLD_CONFIRM:
2637 case SME_WEP_INDEX_CONFIRM:
2638 case SME_WEP_KEY1_CONFIRM:
2639 case SME_WEP_KEY2_CONFIRM:
2640 case SME_WEP_KEY3_CONFIRM:
2641 case SME_WEP_KEY4_CONFIRM:
2642 case SME_WEP_FLAG_CONFIRM:
2643 case SME_RSN_UCAST_CONFIRM:
2644 case SME_RSN_MCAST_CONFIRM:
2645 case SME_RSN_AUTH_CONFIRM:
2646 case SME_RSN_ENABLED_CONFIRM:
2647 case SME_RSN_MODE_CONFIRM:
2648 case SME_MODE_SET_CONFIRM:
2657 void hostif_sme_task(unsigned long dev)
2659 struct ks_wlan_private *priv = (struct ks_wlan_private *)dev;
2663 if (priv->dev_state >= DEVICE_STATE_BOOT) {
2664 if (0 < cnt_smeqbody(priv)
2665 && priv->dev_state >= DEVICE_STATE_BOOT) {
2666 hostif_sme_execute(priv,
2667 priv->sme_i.event_buff[priv->sme_i.
2670 if (0 < cnt_smeqbody(priv))
2671 tasklet_schedule(&priv->sme_task);
2677 /* send to Station Management Entity module */
2678 void hostif_sme_enqueue(struct ks_wlan_private *priv, unsigned short event)
2682 /* enqueue sme event */
2683 if (cnt_smeqbody(priv) < (SME_EVENT_BUFF_SIZE - 1)) {
2684 priv->sme_i.event_buff[priv->sme_i.qtail] = event;
2686 //DPRINTK(3,"inc_smeqtail \n");
2687 #ifdef KS_WLAN_DEBUG
2688 if (priv->sme_i.max_event_count < cnt_smeqbody(priv))
2689 priv->sme_i.max_event_count = cnt_smeqbody(priv);
2690 #endif /* KS_WLAN_DEBUG */
2692 /* in case of buffer overflow */
2693 //DPRINTK(2,"sme queue buffer overflow\n");
2694 printk("sme queue buffer overflow\n");
2697 tasklet_schedule(&priv->sme_task);
2701 int hostif_init(struct ks_wlan_private *priv)
2708 priv->aplist.size = 0;
2709 for (i = 0; i < LOCAL_APLIST_MAX; i++)
2710 memset(&(priv->aplist.ap[i]), 0, sizeof(struct local_ap_t));
2711 priv->infra_status = 0;
2712 priv->current_rate = 4;
2713 priv->connect_status = DISCONNECT_STATUS;
2715 spin_lock_init(&priv->multicast_spin);
2717 spin_lock_init(&priv->dev_read_lock);
2718 init_waitqueue_head(&priv->devread_wait);
2719 priv->dev_count = 0;
2720 atomic_set(&priv->event_count, 0);
2721 atomic_set(&priv->rec_count, 0);
2723 /* for power save */
2724 atomic_set(&priv->psstatus.status, PS_NONE);
2725 atomic_set(&priv->psstatus.confirm_wait, 0);
2726 atomic_set(&priv->psstatus.snooze_guard, 0);
2727 /* init_waitqueue_head(&priv->psstatus.wakeup_wait); */
2728 init_completion(&priv->psstatus.wakeup_wait);
2729 //INIT_WORK(&priv->ks_wlan_wakeup_task, ks_wlan_hw_wakeup_task, (void *)priv);
2730 INIT_WORK(&priv->ks_wlan_wakeup_task, ks_wlan_hw_wakeup_task);
2733 memset(&(priv->wpa), 0, sizeof(priv->wpa));
2734 priv->wpa.rsn_enabled = 0;
2735 priv->wpa.mic_failure.failure = 0;
2736 priv->wpa.mic_failure.last_failure_time = 0;
2737 priv->wpa.mic_failure.stop = 0;
2738 memset(&(priv->pmklist), 0, sizeof(priv->pmklist));
2739 INIT_LIST_HEAD(&priv->pmklist.head);
2740 for (i = 0; i < PMK_LIST_MAX; i++)
2741 INIT_LIST_HEAD(&priv->pmklist.pmk[i].list);
2743 priv->sme_i.sme_status = SME_IDLE;
2744 priv->sme_i.qhead = priv->sme_i.qtail = 0;
2745 #ifdef KS_WLAN_DEBUG
2746 priv->sme_i.max_event_count = 0;
2748 spin_lock_init(&priv->sme_i.sme_spin);
2749 priv->sme_i.sme_flag = 0;
2751 tasklet_init(&priv->sme_task, hostif_sme_task, (unsigned long)priv);
2756 void hostif_exit(struct ks_wlan_private *priv)
2758 tasklet_kill(&priv->sme_task);