Merge tag 'mailbox-v5.11' of git://git.linaro.org/landing-teams/working/fujitsu/integ...
[linux-2.6-microblaze.git] / drivers / staging / ks7010 / ks_hostif.c
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  *   Driver for KeyStream wireless LAN cards.
4  *
5  *   Copyright (C) 2005-2008 KeyStream Corp.
6  *   Copyright (C) 2009 Renesas Technology Corp.
7  */
8
9 #include <crypto/hash.h>
10 #include <linux/circ_buf.h>
11 #include <linux/if_arp.h>
12 #include <net/iw_handler.h>
13 #include <uapi/linux/llc.h>
14 #include "eap_packet.h"
15 #include "ks_wlan.h"
16 #include "ks_hostif.h"
17
18 #define MICHAEL_MIC_KEY_LEN 8
19 #define MICHAEL_MIC_LEN     8
20
21 static inline void inc_smeqhead(struct ks_wlan_private *priv)
22 {
23         priv->sme_i.qhead = (priv->sme_i.qhead + 1) % SME_EVENT_BUFF_SIZE;
24 }
25
26 static inline void inc_smeqtail(struct ks_wlan_private *priv)
27 {
28         priv->sme_i.qtail = (priv->sme_i.qtail + 1) % SME_EVENT_BUFF_SIZE;
29 }
30
31 static inline unsigned int cnt_smeqbody(struct ks_wlan_private *priv)
32 {
33         return CIRC_CNT_TO_END(priv->sme_i.qhead, priv->sme_i.qtail,
34                                SME_EVENT_BUFF_SIZE);
35 }
36
37 static inline u8 get_byte(struct ks_wlan_private *priv)
38 {
39         u8 data;
40
41         data = *priv->rxp++;
42         /* length check in advance ! */
43         --(priv->rx_size);
44         return data;
45 }
46
47 static inline u16 get_word(struct ks_wlan_private *priv)
48 {
49         u16 data;
50
51         data = (get_byte(priv) & 0xff);
52         data |= ((get_byte(priv) << 8) & 0xff00);
53         return data;
54 }
55
56 static inline u32 get_dword(struct ks_wlan_private *priv)
57 {
58         u32 data;
59
60         data = (get_byte(priv) & 0xff);
61         data |= ((get_byte(priv) << 8) & 0x0000ff00);
62         data |= ((get_byte(priv) << 16) & 0x00ff0000);
63         data |= ((get_byte(priv) << 24) & 0xff000000);
64         return data;
65 }
66
67 static void ks_wlan_hw_wakeup_task(struct work_struct *work)
68 {
69         struct ks_wlan_private *priv;
70         int ps_status;
71         long time_left;
72
73         priv = container_of(work, struct ks_wlan_private, wakeup_work);
74         ps_status = atomic_read(&priv->psstatus.status);
75
76         if (ps_status == PS_SNOOZE) {
77                 ks_wlan_hw_wakeup_request(priv);
78                 time_left = wait_for_completion_interruptible_timeout(
79                                 &priv->psstatus.wakeup_wait,
80                                 msecs_to_jiffies(20));
81                 if (time_left <= 0) {
82                         netdev_dbg(priv->net_dev, "wake up timeout or interrupted !!!\n");
83                         schedule_work(&priv->wakeup_work);
84                         return;
85                 }
86         }
87
88         /* power save */
89         if (atomic_read(&priv->sme_task.count) > 0)
90                 tasklet_enable(&priv->sme_task);
91 }
92
93 static void ks_wlan_do_power_save(struct ks_wlan_private *priv)
94 {
95         if (is_connect_status(priv->connect_status))
96                 hostif_sme_enqueue(priv, SME_POW_MNGMT_REQUEST);
97         else
98                 priv->dev_state = DEVICE_STATE_READY;
99 }
100
101 static
102 int get_current_ap(struct ks_wlan_private *priv, struct link_ap_info *ap_info)
103 {
104         struct local_ap *ap;
105         union iwreq_data wrqu;
106         struct net_device *netdev = priv->net_dev;
107         u8 size;
108
109         ap = &priv->current_ap;
110
111         if (is_disconnect_status(priv->connect_status)) {
112                 memset(ap, 0, sizeof(struct local_ap));
113                 return -EPERM;
114         }
115
116         ether_addr_copy(ap->bssid, ap_info->bssid);
117         memcpy(ap->ssid.body, priv->reg.ssid.body,
118                priv->reg.ssid.size);
119         ap->ssid.size = priv->reg.ssid.size;
120         memcpy(ap->rate_set.body, ap_info->rate_set.body,
121                ap_info->rate_set.size);
122         ap->rate_set.size = ap_info->rate_set.size;
123         if (ap_info->ext_rate_set.size != 0) {
124                 memcpy(&ap->rate_set.body[ap->rate_set.size],
125                        ap_info->ext_rate_set.body,
126                        ap_info->ext_rate_set.size);
127                 ap->rate_set.size += ap_info->ext_rate_set.size;
128         }
129         ap->channel = ap_info->ds_parameter.channel;
130         ap->rssi = ap_info->rssi;
131         ap->sq = ap_info->sq;
132         ap->noise = ap_info->noise;
133         ap->capability = le16_to_cpu(ap_info->capability);
134         size = (ap_info->rsn.size <= RSN_IE_BODY_MAX) ?
135                 ap_info->rsn.size : RSN_IE_BODY_MAX;
136         if ((ap_info->rsn_mode & RSN_MODE_WPA2) &&
137             (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)) {
138                 ap->rsn_ie.id = RSN_INFO_ELEM_ID;
139                 ap->rsn_ie.size = size;
140                 memcpy(ap->rsn_ie.body, ap_info->rsn.body, size);
141         } else if ((ap_info->rsn_mode & RSN_MODE_WPA) &&
142                    (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA)) {
143                 ap->wpa_ie.id = WPA_INFO_ELEM_ID;
144                 ap->wpa_ie.size = size;
145                 memcpy(ap->wpa_ie.body, ap_info->rsn.body, size);
146         } else {
147                 ap->rsn_ie.id = 0;
148                 ap->rsn_ie.size = 0;
149                 ap->wpa_ie.id = 0;
150                 ap->wpa_ie.size = 0;
151         }
152
153         wrqu.data.length = 0;
154         wrqu.data.flags = 0;
155         wrqu.ap_addr.sa_family = ARPHRD_ETHER;
156         if (is_connect_status(priv->connect_status)) {
157                 ether_addr_copy(wrqu.ap_addr.sa_data, priv->current_ap.bssid);
158                 netdev_dbg(priv->net_dev,
159                            "IWEVENT: connect bssid=%pM\n",
160                            wrqu.ap_addr.sa_data);
161                 wireless_send_event(netdev, SIOCGIWAP, &wrqu, NULL);
162         }
163         netdev_dbg(priv->net_dev, "Link AP\n"
164                    "- bssid=%pM\n"
165                    "- essid=%s\n"
166                    "- rate_set=%02X,%02X,%02X,%02X,%02X,%02X,%02X,%02X\n"
167                    "- channel=%d\n"
168                    "- rssi=%d\n"
169                    "- sq=%d\n"
170                    "- capability=%04X\n"
171                    "- rsn.mode=%d\n"
172                    "- rsn.size=%d\n"
173                    "- ext_rate_set_size=%d\n"
174                    "- rate_set_size=%d\n",
175                    ap->bssid,
176                    &ap->ssid.body[0],
177                    ap->rate_set.body[0], ap->rate_set.body[1],
178                    ap->rate_set.body[2], ap->rate_set.body[3],
179                    ap->rate_set.body[4], ap->rate_set.body[5],
180                    ap->rate_set.body[6], ap->rate_set.body[7],
181                    ap->channel, ap->rssi, ap->sq, ap->capability,
182                    ap_info->rsn_mode, ap_info->rsn.size,
183                    ap_info->ext_rate_set.size, ap_info->rate_set.size);
184
185         return 0;
186 }
187
188 static u8 read_ie(unsigned char *bp, u8 max, u8 *body)
189 {
190         u8 size = (*(bp + 1) <= max) ? *(bp + 1) : max;
191
192         memcpy(body, bp + 2, size);
193         return size;
194 }
195
196 static int
197 michael_mic(u8 *key, u8 *data, unsigned int len, u8 priority, u8 *result)
198 {
199         u8 pad_data[4] = { priority, 0, 0, 0 };
200         struct crypto_shash *tfm = NULL;
201         struct shash_desc *desc = NULL;
202         int ret;
203
204         tfm = crypto_alloc_shash("michael_mic", 0, 0);
205         if (IS_ERR(tfm)) {
206                 ret = PTR_ERR(tfm);
207                 goto err;
208         }
209
210         ret = crypto_shash_setkey(tfm, key, MICHAEL_MIC_KEY_LEN);
211         if (ret < 0)
212                 goto err_free_tfm;
213
214         desc = kmalloc(sizeof(*desc) + crypto_shash_descsize(tfm), GFP_KERNEL);
215         if (!desc) {
216                 ret = -ENOMEM;
217                 goto err_free_tfm;
218         }
219
220         desc->tfm = tfm;
221
222         ret = crypto_shash_init(desc);
223         if (ret < 0)
224                 goto err_free_desc;
225
226         // Compute the MIC value
227         /*
228          * IEEE802.11i  page 47
229          * Figure 43g TKIP MIC processing format
230          * +--+--+--------+--+----+--+--+--+--+--+--+--+--+
231          * |6 |6 |1       |3 |M   |1 |1 |1 |1 |1 |1 |1 |1 | Octet
232          * +--+--+--------+--+----+--+--+--+--+--+--+--+--+
233          * |DA|SA|Priority|0 |Data|M0|M1|M2|M3|M4|M5|M6|M7|
234          * +--+--+--------+--+----+--+--+--+--+--+--+--+--+
235          */
236
237         ret = crypto_shash_update(desc, data, 12);
238         if (ret < 0)
239                 goto err_free_desc;
240
241         ret = crypto_shash_update(desc, pad_data, 4);
242         if (ret < 0)
243                 goto err_free_desc;
244
245         ret = crypto_shash_finup(desc, data + 12, len - 12, result);
246
247 err_free_desc:
248         kfree_sensitive(desc);
249
250 err_free_tfm:
251         crypto_free_shash(tfm);
252
253 err:
254         return ret;
255 }
256
257 static
258 int get_ap_information(struct ks_wlan_private *priv, struct ap_info *ap_info,
259                        struct local_ap *ap)
260 {
261         unsigned char *bp;
262         int bsize, offset;
263
264         memset(ap, 0, sizeof(struct local_ap));
265
266         ether_addr_copy(ap->bssid, ap_info->bssid);
267         ap->rssi = ap_info->rssi;
268         ap->sq = ap_info->sq;
269         ap->noise = ap_info->noise;
270         ap->capability = le16_to_cpu(ap_info->capability);
271         ap->channel = ap_info->ch_info;
272
273         bp = ap_info->body;
274         bsize = le16_to_cpu(ap_info->body_size);
275         offset = 0;
276
277         while (bsize > offset) {
278                 switch (*bp) { /* Information Element ID */
279                 case WLAN_EID_SSID:
280                         ap->ssid.size = read_ie(bp, IEEE80211_MAX_SSID_LEN,
281                                                 ap->ssid.body);
282                         break;
283                 case WLAN_EID_SUPP_RATES:
284                 case WLAN_EID_EXT_SUPP_RATES:
285                         if ((*(bp + 1) + ap->rate_set.size) <=
286                             RATE_SET_MAX_SIZE) {
287                                 memcpy(&ap->rate_set.body[ap->rate_set.size],
288                                        bp + 2, *(bp + 1));
289                                 ap->rate_set.size += *(bp + 1);
290                         } else {
291                                 memcpy(&ap->rate_set.body[ap->rate_set.size],
292                                        bp + 2,
293                                        RATE_SET_MAX_SIZE - ap->rate_set.size);
294                                 ap->rate_set.size +=
295                                     (RATE_SET_MAX_SIZE - ap->rate_set.size);
296                         }
297                         break;
298                 case WLAN_EID_RSN:
299                         ap->rsn_ie.id = *bp;
300                         ap->rsn_ie.size = read_ie(bp, RSN_IE_BODY_MAX,
301                                                   ap->rsn_ie.body);
302                         break;
303                 case WLAN_EID_VENDOR_SPECIFIC: /* WPA */
304                         /* WPA OUI check */
305                         if (memcmp(bp + 2, CIPHER_ID_WPA_WEP40, 4) == 0) {
306                                 ap->wpa_ie.id = *bp;
307                                 ap->wpa_ie.size = read_ie(bp, RSN_IE_BODY_MAX,
308                                                           ap->wpa_ie.body);
309                         }
310                         break;
311                 case WLAN_EID_DS_PARAMS:
312                 case WLAN_EID_FH_PARAMS:
313                 case WLAN_EID_CF_PARAMS:
314                 case WLAN_EID_TIM:
315                 case WLAN_EID_IBSS_PARAMS:
316                 case WLAN_EID_COUNTRY:
317                 case WLAN_EID_ERP_INFO:
318                         break;
319                 default:
320                         netdev_err(priv->net_dev,
321                                    "unknown Element ID=%d\n", *bp);
322                         break;
323                 }
324
325                 offset += 2;    /* id & size field */
326                 offset += *(bp + 1);    /* +size offset */
327                 bp += (*(bp + 1) + 2);  /* pointer update */
328         }
329
330         return 0;
331 }
332
333 static
334 int hostif_data_indication_wpa(struct ks_wlan_private *priv,
335                                unsigned short auth_type)
336 {
337         struct ether_hdr *eth_hdr;
338         unsigned short eth_proto;
339         unsigned char recv_mic[MICHAEL_MIC_LEN];
340         char buf[128];
341         unsigned long now;
342         struct mic_failure *mic_failure;
343         u8 mic[MICHAEL_MIC_LEN];
344         union iwreq_data wrqu;
345         unsigned int key_index = auth_type - 1;
346         struct wpa_key *key = &priv->wpa.key[key_index];
347
348         eth_hdr = (struct ether_hdr *)(priv->rxp);
349         eth_proto = ntohs(eth_hdr->h_proto);
350
351         if (eth_hdr->h_dest_snap != eth_hdr->h_source_snap) {
352                 netdev_err(priv->net_dev, "invalid data format\n");
353                 priv->nstats.rx_errors++;
354                 return -EINVAL;
355         }
356         if (((auth_type == TYPE_PMK1 &&
357               priv->wpa.pairwise_suite == IW_AUTH_CIPHER_TKIP) ||
358              (auth_type == TYPE_GMK1 &&
359               priv->wpa.group_suite == IW_AUTH_CIPHER_TKIP) ||
360              (auth_type == TYPE_GMK2 &&
361               priv->wpa.group_suite == IW_AUTH_CIPHER_TKIP)) &&
362             key->key_len) {
363                 int ret;
364
365                 netdev_dbg(priv->net_dev, "TKIP: protocol=%04X: size=%u\n",
366                            eth_proto, priv->rx_size);
367                 /* MIC save */
368                 memcpy(&recv_mic[0],
369                        (priv->rxp) + ((priv->rx_size) - sizeof(recv_mic)),
370                        sizeof(recv_mic));
371                 priv->rx_size = priv->rx_size - sizeof(recv_mic);
372
373                 ret = michael_mic(key->rx_mic_key, priv->rxp, priv->rx_size,
374                                   0, mic);
375                 if (ret < 0)
376                         return ret;
377                 if (memcmp(mic, recv_mic, sizeof(mic)) != 0) {
378                         now = jiffies;
379                         mic_failure = &priv->wpa.mic_failure;
380                         /* MIC FAILURE */
381                         if (mic_failure->last_failure_time &&
382                             (now - mic_failure->last_failure_time) / HZ >= 60) {
383                                 mic_failure->failure = 0;
384                         }
385                         netdev_err(priv->net_dev, "MIC FAILURE\n");
386                         if (mic_failure->failure == 0) {
387                                 mic_failure->failure = 1;
388                                 mic_failure->counter = 0;
389                         } else if (mic_failure->failure == 1) {
390                                 mic_failure->failure = 2;
391                                 mic_failure->counter =
392                                         (u16)((now - mic_failure->last_failure_time) / HZ);
393                                 /*  range 1-60 */
394                                 if (!mic_failure->counter)
395                                         mic_failure->counter = 1;
396                         }
397                         priv->wpa.mic_failure.last_failure_time = now;
398
399                         /*  needed parameters: count, keyid, key type, TSC */
400                         sprintf(buf,
401                                 "MLME-MICHAELMICFAILURE.indication(keyid=%d %scast addr=%pM)",
402                                 key_index,
403                                 eth_hdr->h_dest[0] & 0x01 ? "broad" : "uni",
404                                 eth_hdr->h_source);
405                         memset(&wrqu, 0, sizeof(wrqu));
406                         wrqu.data.length = strlen(buf);
407                         wireless_send_event(priv->net_dev, IWEVCUSTOM, &wrqu,
408                                             buf);
409                         return -EINVAL;
410                 }
411         }
412         return 0;
413 }
414
415 static
416 void hostif_data_indication(struct ks_wlan_private *priv)
417 {
418         unsigned int rx_ind_size;       /* indicate data size */
419         struct sk_buff *skb;
420         u16 auth_type;
421         unsigned char temp[256];
422         struct ether_hdr *eth_hdr;
423         struct ieee802_1x_hdr *aa1x_hdr;
424         size_t size;
425         int ret;
426
427         /* min length check */
428         if (priv->rx_size <= ETH_HLEN) {
429                 priv->nstats.rx_errors++;
430                 return;
431         }
432
433         auth_type = get_word(priv);     /* AuthType */
434         get_word(priv); /* Reserve Area */
435
436         eth_hdr = (struct ether_hdr *)(priv->rxp);
437
438         /* source address check */
439         if (ether_addr_equal(&priv->eth_addr[0], eth_hdr->h_source)) {
440                 netdev_err(priv->net_dev, "invalid : source is own mac address !!\n");
441                 netdev_err(priv->net_dev, "eth_hdrernet->h_dest=%pM\n", eth_hdr->h_source);
442                 priv->nstats.rx_errors++;
443                 return;
444         }
445
446         /*  for WPA */
447         if (auth_type != TYPE_DATA && priv->wpa.rsn_enabled) {
448                 ret = hostif_data_indication_wpa(priv, auth_type);
449                 if (ret)
450                         return;
451         }
452
453         if ((priv->connect_status & FORCE_DISCONNECT) ||
454             priv->wpa.mic_failure.failure == 2) {
455                 return;
456         }
457
458         /* check 13th byte at rx data */
459         switch (*(priv->rxp + 12)) {
460         case LLC_SAP_SNAP:
461                 rx_ind_size = priv->rx_size - 6;
462                 skb = dev_alloc_skb(rx_ind_size);
463                 if (!skb) {
464                         priv->nstats.rx_dropped++;
465                         return;
466                 }
467                 netdev_dbg(priv->net_dev, "SNAP, rx_ind_size = %d\n",
468                            rx_ind_size);
469
470                 size = ETH_ALEN * 2;
471                 skb_put_data(skb, priv->rxp, size);
472
473                 /* (SNAP+UI..) skip */
474
475                 size = rx_ind_size - (ETH_ALEN * 2);
476                 skb_put_data(skb, &eth_hdr->h_proto, size);
477
478                 aa1x_hdr = (struct ieee802_1x_hdr *)(priv->rxp + ETHER_HDR_SIZE);
479                 break;
480         case LLC_SAP_NETBEUI:
481                 rx_ind_size = (priv->rx_size + 2);
482                 skb = dev_alloc_skb(rx_ind_size);
483                 if (!skb) {
484                         priv->nstats.rx_dropped++;
485                         return;
486                 }
487                 netdev_dbg(priv->net_dev, "NETBEUI/NetBIOS rx_ind_size=%d\n",
488                            rx_ind_size);
489
490                 /* 8802/FDDI MAC copy */
491                 skb_put_data(skb, priv->rxp, 12);
492
493                 /* NETBEUI size add */
494                 temp[0] = (((rx_ind_size - 12) >> 8) & 0xff);
495                 temp[1] = ((rx_ind_size - 12) & 0xff);
496                 skb_put_data(skb, temp, 2);
497
498                 /* copy after Type */
499                 skb_put_data(skb, priv->rxp + 12, rx_ind_size - 14);
500
501                 aa1x_hdr = (struct ieee802_1x_hdr *)(priv->rxp + 14);
502                 break;
503         default:        /* other rx data */
504                 netdev_err(priv->net_dev, "invalid data format\n");
505                 priv->nstats.rx_errors++;
506                 return;
507         }
508
509         if (aa1x_hdr->type == IEEE802_1X_TYPE_EAPOL_KEY &&
510             priv->wpa.rsn_enabled)
511                 atomic_set(&priv->psstatus.snooze_guard, 1);
512
513         /* rx indication */
514         skb->dev = priv->net_dev;
515         skb->protocol = eth_type_trans(skb, skb->dev);
516         priv->nstats.rx_packets++;
517         priv->nstats.rx_bytes += rx_ind_size;
518         netif_rx(skb);
519 }
520
521 static
522 void hostif_mib_get_confirm(struct ks_wlan_private *priv)
523 {
524         struct net_device *dev = priv->net_dev;
525         u32 mib_status;
526         u32 mib_attribute;
527         u16 mib_val_size;
528         u16 mib_val_type;
529
530         mib_status = get_dword(priv);
531         mib_attribute = get_dword(priv);
532         mib_val_size = get_word(priv);
533         mib_val_type = get_word(priv);
534
535         if (mib_status) {
536                 netdev_err(priv->net_dev, "attribute=%08X, status=%08X\n",
537                            mib_attribute, mib_status);
538                 return;
539         }
540
541         switch (mib_attribute) {
542         case DOT11_MAC_ADDRESS:
543                 hostif_sme_enqueue(priv, SME_GET_MAC_ADDRESS);
544                 ether_addr_copy(priv->eth_addr, priv->rxp);
545                 priv->mac_address_valid = true;
546                 ether_addr_copy(dev->dev_addr, priv->eth_addr);
547                 netdev_info(dev, "MAC ADDRESS = %pM\n", priv->eth_addr);
548                 break;
549         case DOT11_PRODUCT_VERSION:
550                 priv->version_size = priv->rx_size;
551                 memcpy(priv->firmware_version, priv->rxp, priv->rx_size);
552                 priv->firmware_version[priv->rx_size] = '\0';
553                 netdev_info(dev, "firmware ver. = %s\n",
554                             priv->firmware_version);
555                 hostif_sme_enqueue(priv, SME_GET_PRODUCT_VERSION);
556                 /* wake_up_interruptible_all(&priv->confirm_wait); */
557                 complete(&priv->confirm_wait);
558                 break;
559         case LOCAL_GAIN:
560                 memcpy(&priv->gain, priv->rxp, sizeof(priv->gain));
561                 netdev_dbg(priv->net_dev, "tx_mode=%d, rx_mode=%d, tx_gain=%d, rx_gain=%d\n",
562                            priv->gain.tx_mode, priv->gain.rx_mode,
563                            priv->gain.tx_gain, priv->gain.rx_gain);
564                 break;
565         case LOCAL_EEPROM_SUM:
566                 memcpy(&priv->eeprom_sum, priv->rxp, sizeof(priv->eeprom_sum));
567                 if (priv->eeprom_sum.type != 0 &&
568                     priv->eeprom_sum.type != 1) {
569                         netdev_err(dev, "LOCAL_EEPROM_SUM error!\n");
570                         return;
571                 }
572                 priv->eeprom_checksum = (priv->eeprom_sum.type == 0) ?
573                                          EEPROM_CHECKSUM_NONE :
574                                          (priv->eeprom_sum.result == 0) ?
575                                          EEPROM_NG : EEPROM_OK;
576                 break;
577         default:
578                 netdev_err(priv->net_dev, "mib_attribute=%08x\n",
579                            (unsigned int)mib_attribute);
580                 break;
581         }
582 }
583
584 static
585 void hostif_mib_set_confirm(struct ks_wlan_private *priv)
586 {
587         u32 mib_status;
588         u32 mib_attribute;
589
590         mib_status = get_dword(priv);
591         mib_attribute = get_dword(priv);
592
593         if (mib_status) {
594                 /* in case of error */
595                 netdev_err(priv->net_dev, "error :: attribute=%08X, status=%08X\n",
596                            mib_attribute, mib_status);
597         }
598
599         switch (mib_attribute) {
600         case DOT11_RTS_THRESHOLD:
601                 hostif_sme_enqueue(priv, SME_RTS_THRESHOLD_CONFIRM);
602                 break;
603         case DOT11_FRAGMENTATION_THRESHOLD:
604                 hostif_sme_enqueue(priv, SME_FRAGMENTATION_THRESHOLD_CONFIRM);
605                 break;
606         case DOT11_WEP_DEFAULT_KEY_ID:
607                 if (!priv->wpa.wpa_enabled)
608                         hostif_sme_enqueue(priv, SME_WEP_INDEX_CONFIRM);
609                 break;
610         case DOT11_WEP_DEFAULT_KEY_VALUE1:
611                 if (priv->wpa.rsn_enabled)
612                         hostif_sme_enqueue(priv, SME_SET_PMK_TSC);
613                 else
614                         hostif_sme_enqueue(priv, SME_WEP_KEY1_CONFIRM);
615                 break;
616         case DOT11_WEP_DEFAULT_KEY_VALUE2:
617                 if (priv->wpa.rsn_enabled)
618                         hostif_sme_enqueue(priv, SME_SET_GMK1_TSC);
619                 else
620                         hostif_sme_enqueue(priv, SME_WEP_KEY2_CONFIRM);
621                 break;
622         case DOT11_WEP_DEFAULT_KEY_VALUE3:
623                 if (priv->wpa.rsn_enabled)
624                         hostif_sme_enqueue(priv, SME_SET_GMK2_TSC);
625                 else
626                         hostif_sme_enqueue(priv, SME_WEP_KEY3_CONFIRM);
627                 break;
628         case DOT11_WEP_DEFAULT_KEY_VALUE4:
629                 if (!priv->wpa.rsn_enabled)
630                         hostif_sme_enqueue(priv, SME_WEP_KEY4_CONFIRM);
631                 break;
632         case DOT11_PRIVACY_INVOKED:
633                 if (!priv->wpa.rsn_enabled)
634                         hostif_sme_enqueue(priv, SME_WEP_FLAG_CONFIRM);
635                 break;
636         case DOT11_RSN_ENABLED:
637                 hostif_sme_enqueue(priv, SME_RSN_ENABLED_CONFIRM);
638                 break;
639         case LOCAL_RSN_MODE:
640                 hostif_sme_enqueue(priv, SME_RSN_MODE_CONFIRM);
641                 break;
642         case LOCAL_MULTICAST_ADDRESS:
643                 hostif_sme_enqueue(priv, SME_MULTICAST_REQUEST);
644                 break;
645         case LOCAL_MULTICAST_FILTER:
646                 hostif_sme_enqueue(priv, SME_MULTICAST_CONFIRM);
647                 break;
648         case LOCAL_CURRENTADDRESS:
649                 priv->mac_address_valid = true;
650                 break;
651         case DOT11_RSN_CONFIG_MULTICAST_CIPHER:
652                 hostif_sme_enqueue(priv, SME_RSN_MCAST_CONFIRM);
653                 break;
654         case DOT11_RSN_CONFIG_UNICAST_CIPHER:
655                 hostif_sme_enqueue(priv, SME_RSN_UCAST_CONFIRM);
656                 break;
657         case DOT11_RSN_CONFIG_AUTH_SUITE:
658                 hostif_sme_enqueue(priv, SME_RSN_AUTH_CONFIRM);
659                 break;
660         case DOT11_GMK1_TSC:
661                 if (atomic_read(&priv->psstatus.snooze_guard))
662                         atomic_set(&priv->psstatus.snooze_guard, 0);
663                 break;
664         case DOT11_GMK2_TSC:
665                 if (atomic_read(&priv->psstatus.snooze_guard))
666                         atomic_set(&priv->psstatus.snooze_guard, 0);
667                 break;
668         case DOT11_PMK_TSC:
669         case LOCAL_PMK:
670         case LOCAL_GAIN:
671         case LOCAL_WPS_ENABLE:
672         case LOCAL_WPS_PROBE_REQ:
673         case LOCAL_REGION:
674         default:
675                 break;
676         }
677 }
678
679 static
680 void hostif_power_mgmt_confirm(struct ks_wlan_private *priv)
681 {
682         if (priv->reg.power_mgmt > POWER_MGMT_ACTIVE &&
683             priv->reg.operation_mode == MODE_INFRASTRUCTURE) {
684                 atomic_set(&priv->psstatus.confirm_wait, 0);
685                 priv->dev_state = DEVICE_STATE_SLEEP;
686                 ks_wlan_hw_power_save(priv);
687         } else {
688                 priv->dev_state = DEVICE_STATE_READY;
689         }
690 }
691
692 static
693 void hostif_sleep_confirm(struct ks_wlan_private *priv)
694 {
695         atomic_set(&priv->sleepstatus.doze_request, 1);
696         queue_delayed_work(priv->wq, &priv->rw_dwork, 1);
697 }
698
699 static
700 void hostif_start_confirm(struct ks_wlan_private *priv)
701 {
702         union iwreq_data wrqu;
703
704         wrqu.data.length = 0;
705         wrqu.data.flags = 0;
706         wrqu.ap_addr.sa_family = ARPHRD_ETHER;
707         if (is_connect_status(priv->connect_status)) {
708                 eth_zero_addr(wrqu.ap_addr.sa_data);
709                 wireless_send_event(priv->net_dev, SIOCGIWAP, &wrqu, NULL);
710         }
711         netdev_dbg(priv->net_dev, " scan_ind_count=%d\n", priv->scan_ind_count);
712         hostif_sme_enqueue(priv, SME_START_CONFIRM);
713 }
714
715 static
716 void hostif_connect_indication(struct ks_wlan_private *priv)
717 {
718         u16 connect_code;
719         unsigned int tmp = 0;
720         unsigned int old_status = priv->connect_status;
721         struct net_device *netdev = priv->net_dev;
722         union iwreq_data wrqu0;
723
724         connect_code = get_word(priv);
725
726         switch (connect_code) {
727         case RESULT_CONNECT:
728                 if (!(priv->connect_status & FORCE_DISCONNECT))
729                         netif_carrier_on(netdev);
730                 tmp = FORCE_DISCONNECT & priv->connect_status;
731                 priv->connect_status = tmp + CONNECT_STATUS;
732                 break;
733         case RESULT_DISCONNECT:
734                 netif_carrier_off(netdev);
735                 tmp = FORCE_DISCONNECT & priv->connect_status;
736                 priv->connect_status = tmp + DISCONNECT_STATUS;
737                 break;
738         default:
739                 netdev_dbg(priv->net_dev, "unknown connect_code=%d :: scan_ind_count=%d\n",
740                            connect_code, priv->scan_ind_count);
741                 netif_carrier_off(netdev);
742                 tmp = FORCE_DISCONNECT & priv->connect_status;
743                 priv->connect_status = tmp + DISCONNECT_STATUS;
744                 break;
745         }
746
747         get_current_ap(priv, (struct link_ap_info *)priv->rxp);
748         if (is_connect_status(priv->connect_status) &&
749             is_disconnect_status(old_status)) {
750                 /* for power save */
751                 atomic_set(&priv->psstatus.snooze_guard, 0);
752                 atomic_set(&priv->psstatus.confirm_wait, 0);
753         }
754         ks_wlan_do_power_save(priv);
755
756         wrqu0.data.length = 0;
757         wrqu0.data.flags = 0;
758         wrqu0.ap_addr.sa_family = ARPHRD_ETHER;
759         if (is_disconnect_status(priv->connect_status) &&
760             is_connect_status(old_status)) {
761                 eth_zero_addr(wrqu0.ap_addr.sa_data);
762                 netdev_dbg(priv->net_dev, "disconnect :: scan_ind_count=%d\n",
763                            priv->scan_ind_count);
764                 wireless_send_event(netdev, SIOCGIWAP, &wrqu0, NULL);
765         }
766         priv->scan_ind_count = 0;
767 }
768
769 static
770 void hostif_scan_indication(struct ks_wlan_private *priv)
771 {
772         int i;
773         struct ap_info *ap_info;
774
775         netdev_dbg(priv->net_dev,
776                    "scan_ind_count = %d\n", priv->scan_ind_count);
777         ap_info = (struct ap_info *)(priv->rxp);
778
779         if (priv->scan_ind_count) {
780                 /* bssid check */
781                 for (i = 0; i < priv->aplist.size; i++) {
782                         u8 *bssid = priv->aplist.ap[i].bssid;
783
784                         if (ether_addr_equal(ap_info->bssid, bssid))
785                                 continue;
786
787                         if (ap_info->frame_type == IEEE80211_STYPE_PROBE_RESP)
788                                 get_ap_information(priv, ap_info,
789                                                    &priv->aplist.ap[i]);
790                         return;
791                 }
792         }
793         priv->scan_ind_count++;
794         if (priv->scan_ind_count < LOCAL_APLIST_MAX + 1) {
795                 netdev_dbg(priv->net_dev, " scan_ind_count=%d :: aplist.size=%d\n",
796                            priv->scan_ind_count, priv->aplist.size);
797                 get_ap_information(priv, (struct ap_info *)(priv->rxp),
798                                    &priv->aplist.ap[priv->scan_ind_count - 1]);
799                 priv->aplist.size = priv->scan_ind_count;
800         } else {
801                 netdev_dbg(priv->net_dev, " count over :: scan_ind_count=%d\n",
802                            priv->scan_ind_count);
803         }
804 }
805
806 static
807 void hostif_stop_confirm(struct ks_wlan_private *priv)
808 {
809         unsigned int tmp = 0;
810         unsigned int old_status = priv->connect_status;
811         struct net_device *netdev = priv->net_dev;
812         union iwreq_data wrqu0;
813
814         if (priv->dev_state == DEVICE_STATE_SLEEP)
815                 priv->dev_state = DEVICE_STATE_READY;
816
817         /* disconnect indication */
818         if (is_connect_status(priv->connect_status)) {
819                 netif_carrier_off(netdev);
820                 tmp = FORCE_DISCONNECT & priv->connect_status;
821                 priv->connect_status = tmp | DISCONNECT_STATUS;
822                 netdev_info(netdev, "IWEVENT: disconnect\n");
823
824                 wrqu0.data.length = 0;
825                 wrqu0.data.flags = 0;
826                 wrqu0.ap_addr.sa_family = ARPHRD_ETHER;
827                 if (is_disconnect_status(priv->connect_status) &&
828                     is_connect_status(old_status)) {
829                         eth_zero_addr(wrqu0.ap_addr.sa_data);
830                         netdev_info(netdev, "IWEVENT: disconnect\n");
831                         wireless_send_event(netdev, SIOCGIWAP, &wrqu0, NULL);
832                 }
833                 priv->scan_ind_count = 0;
834         }
835
836         hostif_sme_enqueue(priv, SME_STOP_CONFIRM);
837 }
838
839 static
840 void hostif_ps_adhoc_set_confirm(struct ks_wlan_private *priv)
841 {
842         priv->infra_status = 0; /* infrastructure mode cancel */
843         hostif_sme_enqueue(priv, SME_MODE_SET_CONFIRM);
844 }
845
846 static
847 void hostif_infrastructure_set_confirm(struct ks_wlan_private *priv)
848 {
849         u16 result_code;
850
851         result_code = get_word(priv);
852         priv->infra_status = 1; /* infrastructure mode set */
853         hostif_sme_enqueue(priv, SME_MODE_SET_CONFIRM);
854 }
855
856 static
857 void hostif_adhoc_set_confirm(struct ks_wlan_private *priv)
858 {
859         priv->infra_status = 1; /* infrastructure mode set */
860         hostif_sme_enqueue(priv, SME_MODE_SET_CONFIRM);
861 }
862
863 static
864 void hostif_associate_indication(struct ks_wlan_private *priv)
865 {
866         struct association_request *assoc_req;
867         struct association_response *assoc_resp;
868         unsigned char *pb;
869         union iwreq_data wrqu;
870         char buf[IW_CUSTOM_MAX];
871         char *pbuf = &buf[0];
872         int i;
873
874         static const char associnfo_leader0[] = "ASSOCINFO(ReqIEs=";
875         static const char associnfo_leader1[] = " RespIEs=";
876
877         assoc_req = (struct association_request *)(priv->rxp);
878         assoc_resp = (struct association_response *)(assoc_req + 1);
879         pb = (unsigned char *)(assoc_resp + 1);
880
881         memset(&wrqu, 0, sizeof(wrqu));
882         memcpy(pbuf, associnfo_leader0, sizeof(associnfo_leader0) - 1);
883         wrqu.data.length += sizeof(associnfo_leader0) - 1;
884         pbuf += sizeof(associnfo_leader0) - 1;
885
886         for (i = 0; i < le16_to_cpu(assoc_req->req_ies_size); i++)
887                 pbuf += sprintf(pbuf, "%02x", *(pb + i));
888         wrqu.data.length += (le16_to_cpu(assoc_req->req_ies_size)) * 2;
889
890         memcpy(pbuf, associnfo_leader1, sizeof(associnfo_leader1) - 1);
891         wrqu.data.length += sizeof(associnfo_leader1) - 1;
892         pbuf += sizeof(associnfo_leader1) - 1;
893
894         pb += le16_to_cpu(assoc_req->req_ies_size);
895         for (i = 0; i < le16_to_cpu(assoc_resp->resp_ies_size); i++)
896                 pbuf += sprintf(pbuf, "%02x", *(pb + i));
897         wrqu.data.length += (le16_to_cpu(assoc_resp->resp_ies_size)) * 2;
898
899         pbuf += sprintf(pbuf, ")");
900         wrqu.data.length += 1;
901
902         wireless_send_event(priv->net_dev, IWEVCUSTOM, &wrqu, buf);
903 }
904
905 static
906 void hostif_bss_scan_confirm(struct ks_wlan_private *priv)
907 {
908         u32 result_code;
909         struct net_device *dev = priv->net_dev;
910         union iwreq_data wrqu;
911
912         result_code = get_dword(priv);
913         netdev_dbg(priv->net_dev, "result=%d :: scan_ind_count=%d\n",
914                    result_code, priv->scan_ind_count);
915
916         priv->sme_i.sme_flag &= ~SME_AP_SCAN;
917         hostif_sme_enqueue(priv, SME_BSS_SCAN_CONFIRM);
918
919         wrqu.data.length = 0;
920         wrqu.data.flags = 0;
921         wireless_send_event(dev, SIOCGIWSCAN, &wrqu, NULL);
922         priv->scan_ind_count = 0;
923 }
924
925 static
926 void hostif_phy_information_confirm(struct ks_wlan_private *priv)
927 {
928         struct iw_statistics *wstats = &priv->wstats;
929         u8 rssi, signal, noise;
930         u8 link_speed;
931         u32 transmitted_frame_count, received_fragment_count;
932         u32 failed_count, fcs_error_count;
933
934         rssi = get_byte(priv);
935         signal = get_byte(priv);
936         noise = get_byte(priv);
937         link_speed = get_byte(priv);
938         transmitted_frame_count = get_dword(priv);
939         received_fragment_count = get_dword(priv);
940         failed_count = get_dword(priv);
941         fcs_error_count = get_dword(priv);
942
943         netdev_dbg(priv->net_dev, "phyinfo confirm rssi=%d signal=%d\n",
944                    rssi, signal);
945         priv->current_rate = (link_speed & RATE_MASK);
946         wstats->qual.qual = signal;
947         wstats->qual.level = 256 - rssi;
948         wstats->qual.noise = 0; /* invalid noise value */
949         wstats->qual.updated = IW_QUAL_ALL_UPDATED | IW_QUAL_DBM;
950
951         netdev_dbg(priv->net_dev, "\n    rssi=%u\n"
952                    "    signal=%u\n"
953                    "    link_speed=%ux500Kbps\n"
954                    "    transmitted_frame_count=%u\n"
955                    "    received_fragment_count=%u\n"
956                    "    failed_count=%u\n"
957                    "    fcs_error_count=%u\n",
958                    rssi, signal, link_speed, transmitted_frame_count,
959                    received_fragment_count, failed_count, fcs_error_count);
960         /* wake_up_interruptible_all(&priv->confirm_wait); */
961         complete(&priv->confirm_wait);
962 }
963
964 static
965 void hostif_mic_failure_confirm(struct ks_wlan_private *priv)
966 {
967         netdev_dbg(priv->net_dev, "mic_failure=%u\n",
968                    priv->wpa.mic_failure.failure);
969         hostif_sme_enqueue(priv, SME_MIC_FAILURE_CONFIRM);
970 }
971
972 static
973 void hostif_event_check(struct ks_wlan_private *priv)
974 {
975         u16 event;
976
977         event = get_word(priv);
978         switch (event) {
979         case HIF_DATA_IND:
980                 hostif_data_indication(priv);
981                 break;
982         case HIF_MIB_GET_CONF:
983                 hostif_mib_get_confirm(priv);
984                 break;
985         case HIF_MIB_SET_CONF:
986                 hostif_mib_set_confirm(priv);
987                 break;
988         case HIF_POWER_MGMT_CONF:
989                 hostif_power_mgmt_confirm(priv);
990                 break;
991         case HIF_SLEEP_CONF:
992                 hostif_sleep_confirm(priv);
993                 break;
994         case HIF_START_CONF:
995                 hostif_start_confirm(priv);
996                 break;
997         case HIF_CONNECT_IND:
998                 hostif_connect_indication(priv);
999                 break;
1000         case HIF_STOP_CONF:
1001                 hostif_stop_confirm(priv);
1002                 break;
1003         case HIF_PS_ADH_SET_CONF:
1004                 hostif_ps_adhoc_set_confirm(priv);
1005                 break;
1006         case HIF_INFRA_SET_CONF:
1007         case HIF_INFRA_SET2_CONF:
1008                 hostif_infrastructure_set_confirm(priv);
1009                 break;
1010         case HIF_ADH_SET_CONF:
1011         case HIF_ADH_SET2_CONF:
1012                 hostif_adhoc_set_confirm(priv);
1013                 break;
1014         case HIF_ASSOC_INFO_IND:
1015                 hostif_associate_indication(priv);
1016                 break;
1017         case HIF_MIC_FAILURE_CONF:
1018                 hostif_mic_failure_confirm(priv);
1019                 break;
1020         case HIF_SCAN_CONF:
1021                 hostif_bss_scan_confirm(priv);
1022                 break;
1023         case HIF_PHY_INFO_CONF:
1024         case HIF_PHY_INFO_IND:
1025                 hostif_phy_information_confirm(priv);
1026                 break;
1027         case HIF_SCAN_IND:
1028                 hostif_scan_indication(priv);
1029                 break;
1030         case HIF_AP_SET_CONF:
1031         default:
1032                 netdev_err(priv->net_dev, "undefined event[%04X]\n", event);
1033                 /* wake_up_all(&priv->confirm_wait); */
1034                 complete(&priv->confirm_wait);
1035                 break;
1036         }
1037
1038         /* add event to hostt buffer */
1039         priv->hostt.buff[priv->hostt.qtail] = event;
1040         priv->hostt.qtail = (priv->hostt.qtail + 1) % SME_EVENT_BUFF_SIZE;
1041 }
1042
1043 /* allocate size bytes, set header size and event */
1044 static void *hostif_generic_request(size_t size, int event)
1045 {
1046         struct hostif_hdr *p;
1047
1048         p = kzalloc(hif_align_size(size), GFP_ATOMIC);
1049         if (!p)
1050                 return NULL;
1051
1052         p->size = cpu_to_le16(size - sizeof(p->size));
1053         p->event = cpu_to_le16(event);
1054
1055         return p;
1056 }
1057
1058 int hostif_data_request(struct ks_wlan_private *priv, struct sk_buff *skb)
1059 {
1060         unsigned int skb_len = 0;
1061         unsigned char *buffer = NULL;
1062         unsigned int length = 0;
1063         struct hostif_data_request *pp;
1064         unsigned char *p;
1065         unsigned short eth_proto;
1066         struct ether_hdr *eth_hdr;
1067         unsigned short keyinfo = 0;
1068         struct ieee802_1x_hdr *aa1x_hdr;
1069         struct wpa_eapol_key *eap_key;
1070         struct ethhdr *eth;
1071         size_t size;
1072         int ret;
1073
1074         skb_len = skb->len;
1075         if (skb_len > ETH_FRAME_LEN) {
1076                 netdev_err(priv->net_dev, "bad length skb_len=%d\n", skb_len);
1077                 ret = -EOVERFLOW;
1078                 goto err_kfree_skb;
1079         }
1080
1081         if (is_disconnect_status(priv->connect_status) ||
1082             (priv->connect_status & FORCE_DISCONNECT) ||
1083             priv->wpa.mic_failure.stop) {
1084                 if (netif_queue_stopped(priv->net_dev))
1085                         netif_wake_queue(priv->net_dev);
1086
1087                 dev_kfree_skb(skb);
1088
1089                 return 0;
1090         }
1091
1092         /* power save wakeup */
1093         if (atomic_read(&priv->psstatus.status) == PS_SNOOZE) {
1094                 if (!netif_queue_stopped(priv->net_dev))
1095                         netif_stop_queue(priv->net_dev);
1096         }
1097
1098         size = sizeof(*pp) + 6 + skb_len + 8;
1099         pp = kmalloc(hif_align_size(size), GFP_ATOMIC);
1100         if (!pp) {
1101                 ret = -ENOMEM;
1102                 goto err_kfree_skb;
1103         }
1104
1105         p = (unsigned char *)pp->data;
1106
1107         buffer = skb->data;
1108         length = skb->len;
1109
1110         /* skb check */
1111         eth = (struct ethhdr *)skb->data;
1112         if (!ether_addr_equal(&priv->eth_addr[0], eth->h_source)) {
1113                 netdev_err(priv->net_dev,
1114                            "Invalid mac address: ethernet->h_source=%pM\n",
1115                            eth->h_source);
1116                 ret = -ENXIO;
1117                 goto err_kfree;
1118         }
1119
1120         /* dest and src MAC address copy */
1121         size = ETH_ALEN * 2;
1122         memcpy(p, buffer, size);
1123         p += size;
1124         buffer += size;
1125         length -= size;
1126
1127         /* EtherType/Length check */
1128         if (*(buffer + 1) + (*buffer << 8) > 1500) {
1129                 /* ProtocolEAP = *(buffer+1) + (*buffer << 8); */
1130                 /* SAP/CTL/OUI(6 byte) add */
1131                 *p++ = 0xAA;    /* DSAP */
1132                 *p++ = 0xAA;    /* SSAP */
1133                 *p++ = 0x03;    /* CTL */
1134                 *p++ = 0x00;    /* OUI ("000000") */
1135                 *p++ = 0x00;    /* OUI ("000000") */
1136                 *p++ = 0x00;    /* OUI ("000000") */
1137                 skb_len += 6;
1138         } else {
1139                 /* Length(2 byte) delete */
1140                 buffer += 2;
1141                 length -= 2;
1142                 skb_len -= 2;
1143         }
1144
1145         /* pp->data copy */
1146         memcpy(p, buffer, length);
1147
1148         p += length;
1149
1150         /* for WPA */
1151         eth_hdr = (struct ether_hdr *)&pp->data[0];
1152         eth_proto = ntohs(eth_hdr->h_proto);
1153
1154         /* for MIC FAILURE REPORT check */
1155         if (eth_proto == ETH_P_PAE &&
1156             priv->wpa.mic_failure.failure > 0) {
1157                 aa1x_hdr = (struct ieee802_1x_hdr *)(eth_hdr + 1);
1158                 if (aa1x_hdr->type == IEEE802_1X_TYPE_EAPOL_KEY) {
1159                         eap_key = (struct wpa_eapol_key *)(aa1x_hdr + 1);
1160                         keyinfo = ntohs(eap_key->key_info);
1161                 }
1162         }
1163
1164         if (priv->wpa.rsn_enabled && priv->wpa.key[0].key_len) {
1165                 /* no encryption */
1166                 if (eth_proto == ETH_P_PAE &&
1167                     priv->wpa.key[1].key_len == 0 &&
1168                     priv->wpa.key[2].key_len == 0 &&
1169                     priv->wpa.key[3].key_len == 0) {
1170                         pp->auth_type = cpu_to_le16(TYPE_AUTH);
1171                 } else {
1172                         if (priv->wpa.pairwise_suite == IW_AUTH_CIPHER_TKIP) {
1173                                 u8 mic[MICHAEL_MIC_LEN];
1174
1175                                 ret = michael_mic(priv->wpa.key[0].tx_mic_key,
1176                                                   &pp->data[0], skb_len,
1177                                                   0, mic);
1178                                 if (ret < 0)
1179                                         goto err_kfree;
1180
1181                                 memcpy(p, mic, sizeof(mic));
1182                                 length += sizeof(mic);
1183                                 skb_len += sizeof(mic);
1184                                 p += sizeof(mic);
1185                                 pp->auth_type =
1186                                     cpu_to_le16(TYPE_DATA);
1187                         } else if (priv->wpa.pairwise_suite ==
1188                                    IW_AUTH_CIPHER_CCMP) {
1189                                 pp->auth_type =
1190                                     cpu_to_le16(TYPE_DATA);
1191                         }
1192                 }
1193         } else {
1194                 if (eth_proto == ETH_P_PAE)
1195                         pp->auth_type = cpu_to_le16(TYPE_AUTH);
1196                 else
1197                         pp->auth_type = cpu_to_le16(TYPE_DATA);
1198         }
1199
1200         /* header value set */
1201         pp->header.size =
1202             cpu_to_le16((sizeof(*pp) - sizeof(pp->header.size) + skb_len));
1203         pp->header.event = cpu_to_le16(HIF_DATA_REQ);
1204
1205         /* tx request */
1206         ret = ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp) + skb_len),
1207                             send_packet_complete, skb);
1208
1209         /* MIC FAILURE REPORT check */
1210         if (eth_proto == ETH_P_PAE &&
1211             priv->wpa.mic_failure.failure > 0) {
1212                 if (keyinfo & WPA_KEY_INFO_ERROR &&
1213                     keyinfo & WPA_KEY_INFO_REQUEST) {
1214                         netdev_err(priv->net_dev,
1215                                    "MIC ERROR Report SET : %04X\n", keyinfo);
1216                         hostif_sme_enqueue(priv, SME_MIC_FAILURE_REQUEST);
1217                 }
1218                 if (priv->wpa.mic_failure.failure == 2)
1219                         priv->wpa.mic_failure.stop = 1;
1220         }
1221
1222         return ret;
1223
1224 err_kfree:
1225         kfree(pp);
1226 err_kfree_skb:
1227         dev_kfree_skb(skb);
1228
1229         return ret;
1230 }
1231
1232 static inline void ps_confirm_wait_inc(struct ks_wlan_private *priv)
1233 {
1234         if (atomic_read(&priv->psstatus.status) > PS_ACTIVE_SET)
1235                 atomic_inc(&priv->psstatus.confirm_wait);
1236 }
1237
1238 static inline void send_request_to_device(struct ks_wlan_private *priv,
1239                                           void *data, size_t size)
1240 {
1241         ps_confirm_wait_inc(priv);
1242         ks_wlan_hw_tx(priv, data, size, NULL, NULL);
1243 }
1244
1245 static void hostif_mib_get_request(struct ks_wlan_private *priv,
1246                                    u32 mib_attribute)
1247 {
1248         struct hostif_mib_get_request *pp;
1249
1250         pp = hostif_generic_request(sizeof(*pp), HIF_MIB_GET_REQ);
1251         if (!pp)
1252                 return;
1253
1254         pp->mib_attribute = cpu_to_le32(mib_attribute);
1255
1256         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1257 }
1258
1259 static void hostif_mib_set_request(struct ks_wlan_private *priv,
1260                                    enum mib_attribute attr,
1261                                    enum mib_data_type type,
1262                                    void *data, size_t size)
1263 {
1264         struct hostif_mib_set_request_t *pp;
1265
1266         if (priv->dev_state < DEVICE_STATE_BOOT)
1267                 return;
1268
1269         pp = hostif_generic_request(sizeof(*pp), HIF_MIB_SET_REQ);
1270         if (!pp)
1271                 return;
1272
1273         pp->mib_attribute = cpu_to_le32(attr);
1274         pp->mib_value.size = cpu_to_le16(size);
1275         pp->mib_value.type = cpu_to_le16(type);
1276         memcpy(&pp->mib_value.body, data, size);
1277
1278         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp) + size));
1279 }
1280
1281 static inline void hostif_mib_set_request_int(struct ks_wlan_private *priv,
1282                                               enum mib_attribute attr, int val)
1283 {
1284         __le32 v = cpu_to_le32(val);
1285         size_t size = sizeof(v);
1286
1287         hostif_mib_set_request(priv, attr, MIB_VALUE_TYPE_INT, &v, size);
1288 }
1289
1290 static inline void hostif_mib_set_request_bool(struct ks_wlan_private *priv,
1291                                                enum mib_attribute attr,
1292                                                bool val)
1293 {
1294         __le32 v = cpu_to_le32(val);
1295         size_t size = sizeof(v);
1296
1297         hostif_mib_set_request(priv, attr, MIB_VALUE_TYPE_BOOL, &v, size);
1298 }
1299
1300 static inline void hostif_mib_set_request_ostring(struct ks_wlan_private *priv,
1301                                                   enum mib_attribute attr,
1302                                                   void *data, size_t size)
1303 {
1304         hostif_mib_set_request(priv, attr, MIB_VALUE_TYPE_OSTRING, data, size);
1305 }
1306
1307 static
1308 void hostif_start_request(struct ks_wlan_private *priv, unsigned char mode)
1309 {
1310         struct hostif_start_request *pp;
1311
1312         pp = hostif_generic_request(sizeof(*pp), HIF_START_REQ);
1313         if (!pp)
1314                 return;
1315
1316         pp->mode = cpu_to_le16(mode);
1317
1318         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1319
1320         priv->aplist.size = 0;
1321         priv->scan_ind_count = 0;
1322 }
1323
1324 static __le16 ks_wlan_cap(struct ks_wlan_private *priv)
1325 {
1326         u16 capability = 0x0000;
1327
1328         if (priv->reg.preamble == SHORT_PREAMBLE)
1329                 capability |= WLAN_CAPABILITY_SHORT_PREAMBLE;
1330
1331         capability &= ~(WLAN_CAPABILITY_PBCC);  /* pbcc not support */
1332
1333         if (priv->reg.phy_type != D_11B_ONLY_MODE) {
1334                 capability |= WLAN_CAPABILITY_SHORT_SLOT_TIME;
1335                 capability &= ~(WLAN_CAPABILITY_DSSS_OFDM);
1336         }
1337
1338         return cpu_to_le16(capability);
1339 }
1340
1341 static void init_request(struct ks_wlan_private *priv,
1342                          struct hostif_request *req)
1343 {
1344         req->phy_type = cpu_to_le16(priv->reg.phy_type);
1345         req->cts_mode = cpu_to_le16(priv->reg.cts_mode);
1346         req->scan_type = cpu_to_le16(priv->reg.scan_type);
1347         req->rate_set.size = priv->reg.rate_set.size;
1348         req->capability = ks_wlan_cap(priv);
1349         memcpy(&req->rate_set.body[0], &priv->reg.rate_set.body[0],
1350                priv->reg.rate_set.size);
1351 }
1352
1353 static
1354 void hostif_ps_adhoc_set_request(struct ks_wlan_private *priv)
1355 {
1356         struct hostif_ps_adhoc_set_request *pp;
1357
1358         pp = hostif_generic_request(sizeof(*pp), HIF_PS_ADH_SET_REQ);
1359         if (!pp)
1360                 return;
1361
1362         init_request(priv, &pp->request);
1363         pp->channel = cpu_to_le16(priv->reg.channel);
1364
1365         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1366 }
1367
1368 static
1369 void hostif_infrastructure_set_request(struct ks_wlan_private *priv, int event)
1370 {
1371         struct hostif_infrastructure_set_request *pp;
1372
1373         pp = hostif_generic_request(sizeof(*pp), event);
1374         if (!pp)
1375                 return;
1376
1377         init_request(priv, &pp->request);
1378         pp->ssid.size = priv->reg.ssid.size;
1379         memcpy(&pp->ssid.body[0], &priv->reg.ssid.body[0], priv->reg.ssid.size);
1380         pp->beacon_lost_count =
1381             cpu_to_le16(priv->reg.beacon_lost_count);
1382         pp->auth_type = cpu_to_le16(priv->reg.authenticate_type);
1383
1384         pp->channel_list.body[0] = 1;
1385         pp->channel_list.body[1] = 8;
1386         pp->channel_list.body[2] = 2;
1387         pp->channel_list.body[3] = 9;
1388         pp->channel_list.body[4] = 3;
1389         pp->channel_list.body[5] = 10;
1390         pp->channel_list.body[6] = 4;
1391         pp->channel_list.body[7] = 11;
1392         pp->channel_list.body[8] = 5;
1393         pp->channel_list.body[9] = 12;
1394         pp->channel_list.body[10] = 6;
1395         pp->channel_list.body[11] = 13;
1396         pp->channel_list.body[12] = 7;
1397         if (priv->reg.phy_type == D_11G_ONLY_MODE) {
1398                 pp->channel_list.size = 13;
1399         } else {
1400                 pp->channel_list.body[13] = 14;
1401                 pp->channel_list.size = 14;
1402         }
1403
1404         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1405 }
1406
1407 static
1408 void hostif_adhoc_set_request(struct ks_wlan_private *priv)
1409 {
1410         struct hostif_adhoc_set_request *pp;
1411
1412         pp = hostif_generic_request(sizeof(*pp), HIF_ADH_SET_REQ);
1413         if (!pp)
1414                 return;
1415
1416         init_request(priv, &pp->request);
1417         pp->channel = cpu_to_le16(priv->reg.channel);
1418         pp->ssid.size = priv->reg.ssid.size;
1419         memcpy(&pp->ssid.body[0], &priv->reg.ssid.body[0], priv->reg.ssid.size);
1420
1421         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1422 }
1423
1424 static
1425 void hostif_adhoc_set2_request(struct ks_wlan_private *priv)
1426 {
1427         struct hostif_adhoc_set2_request *pp;
1428
1429         pp = hostif_generic_request(sizeof(*pp), HIF_ADH_SET_REQ);
1430         if (!pp)
1431                 return;
1432
1433         init_request(priv, &pp->request);
1434         pp->ssid.size = priv->reg.ssid.size;
1435         memcpy(&pp->ssid.body[0], &priv->reg.ssid.body[0], priv->reg.ssid.size);
1436
1437         pp->channel_list.body[0] = priv->reg.channel;
1438         pp->channel_list.size = 1;
1439         memcpy(pp->bssid, priv->reg.bssid, ETH_ALEN);
1440
1441         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1442 }
1443
1444 static
1445 void hostif_stop_request(struct ks_wlan_private *priv)
1446 {
1447         struct hostif_stop_request *pp;
1448
1449         pp = hostif_generic_request(sizeof(*pp), HIF_STOP_REQ);
1450         if (!pp)
1451                 return;
1452
1453         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1454 }
1455
1456 static
1457 void hostif_phy_information_request(struct ks_wlan_private *priv)
1458 {
1459         struct hostif_phy_information_request *pp;
1460
1461         pp = hostif_generic_request(sizeof(*pp), HIF_PHY_INFO_REQ);
1462         if (!pp)
1463                 return;
1464
1465         if (priv->reg.phy_info_timer) {
1466                 pp->type = cpu_to_le16(TIME_TYPE);
1467                 pp->time = cpu_to_le16(priv->reg.phy_info_timer);
1468         } else {
1469                 pp->type = cpu_to_le16(NORMAL_TYPE);
1470                 pp->time = cpu_to_le16(0);
1471         }
1472
1473         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1474 }
1475
1476 static
1477 void hostif_power_mgmt_request(struct ks_wlan_private *priv,
1478                                u32 mode, u32 wake_up, u32 receive_dtims)
1479 {
1480         struct hostif_power_mgmt_request *pp;
1481
1482         pp = hostif_generic_request(sizeof(*pp), HIF_POWER_MGMT_REQ);
1483         if (!pp)
1484                 return;
1485
1486         pp->mode = cpu_to_le32(mode);
1487         pp->wake_up = cpu_to_le32(wake_up);
1488         pp->receive_dtims = cpu_to_le32(receive_dtims);
1489
1490         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1491 }
1492
1493 static
1494 void hostif_sleep_request(struct ks_wlan_private *priv,
1495                           enum sleep_mode_type mode)
1496 {
1497         struct hostif_sleep_request *pp;
1498
1499         if (mode == SLP_SLEEP) {
1500                 pp = hostif_generic_request(sizeof(*pp), HIF_SLEEP_REQ);
1501                 if (!pp)
1502                         return;
1503
1504                 send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1505         } else if (mode == SLP_ACTIVE) {
1506                 atomic_set(&priv->sleepstatus.wakeup_request, 1);
1507                 queue_delayed_work(priv->wq, &priv->rw_dwork, 1);
1508         } else {
1509                 netdev_err(priv->net_dev, "invalid mode %ld\n", (long)mode);
1510                 return;
1511         }
1512 }
1513
1514 static
1515 void hostif_bss_scan_request(struct ks_wlan_private *priv,
1516                              unsigned long scan_type, u8 *scan_ssid,
1517                              u8 scan_ssid_len)
1518 {
1519         struct hostif_bss_scan_request *pp;
1520
1521         pp = hostif_generic_request(sizeof(*pp), HIF_SCAN_REQ);
1522         if (!pp)
1523                 return;
1524
1525         pp->scan_type = scan_type;
1526
1527         pp->ch_time_min = cpu_to_le32(110);     /* default value */
1528         pp->ch_time_max = cpu_to_le32(130);     /* default value */
1529         pp->channel_list.body[0] = 1;
1530         pp->channel_list.body[1] = 8;
1531         pp->channel_list.body[2] = 2;
1532         pp->channel_list.body[3] = 9;
1533         pp->channel_list.body[4] = 3;
1534         pp->channel_list.body[5] = 10;
1535         pp->channel_list.body[6] = 4;
1536         pp->channel_list.body[7] = 11;
1537         pp->channel_list.body[8] = 5;
1538         pp->channel_list.body[9] = 12;
1539         pp->channel_list.body[10] = 6;
1540         pp->channel_list.body[11] = 13;
1541         pp->channel_list.body[12] = 7;
1542         if (priv->reg.phy_type == D_11G_ONLY_MODE) {
1543                 pp->channel_list.size = 13;
1544         } else {
1545                 pp->channel_list.body[13] = 14;
1546                 pp->channel_list.size = 14;
1547         }
1548         pp->ssid.size = 0;
1549
1550         /* specified SSID SCAN */
1551         if (scan_ssid_len > 0 && scan_ssid_len <= 32) {
1552                 pp->ssid.size = scan_ssid_len;
1553                 memcpy(&pp->ssid.body[0], scan_ssid, scan_ssid_len);
1554         }
1555
1556         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1557
1558         priv->aplist.size = 0;
1559         priv->scan_ind_count = 0;
1560 }
1561
1562 static
1563 void hostif_mic_failure_request(struct ks_wlan_private *priv,
1564                                 u16 failure_count, u16 timer)
1565 {
1566         struct hostif_mic_failure_request *pp;
1567
1568         pp = hostif_generic_request(sizeof(*pp), HIF_MIC_FAILURE_REQ);
1569         if (!pp)
1570                 return;
1571
1572         pp->failure_count = cpu_to_le16(failure_count);
1573         pp->timer = cpu_to_le16(timer);
1574
1575         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1576 }
1577
1578 /* Device I/O Receive indicate */
1579 static void devio_rec_ind(struct ks_wlan_private *priv, unsigned char *p,
1580                           unsigned int size)
1581 {
1582         if (!priv->is_device_open)
1583                 return;
1584
1585         spin_lock(&priv->dev_read_lock);
1586         priv->dev_data[atomic_read(&priv->rec_count)] = p;
1587         priv->dev_size[atomic_read(&priv->rec_count)] = size;
1588
1589         if (atomic_read(&priv->event_count) != DEVICE_STOCK_COUNT) {
1590                 /* rx event count inc */
1591                 atomic_inc(&priv->event_count);
1592         }
1593         atomic_inc(&priv->rec_count);
1594         if (atomic_read(&priv->rec_count) == DEVICE_STOCK_COUNT)
1595                 atomic_set(&priv->rec_count, 0);
1596
1597         wake_up_interruptible_all(&priv->devread_wait);
1598
1599         spin_unlock(&priv->dev_read_lock);
1600 }
1601
1602 void hostif_receive(struct ks_wlan_private *priv, unsigned char *p,
1603                     unsigned int size)
1604 {
1605         devio_rec_ind(priv, p, size);
1606
1607         priv->rxp = p;
1608         priv->rx_size = size;
1609
1610         if (get_word(priv) == priv->rx_size)
1611                 hostif_event_check(priv);
1612 }
1613
1614 static void hostif_sme_set_wep(struct ks_wlan_private *priv, int type)
1615 {
1616         switch (type) {
1617         case SME_WEP_INDEX_REQUEST:
1618                 hostif_mib_set_request_int(priv, DOT11_WEP_DEFAULT_KEY_ID,
1619                                            priv->reg.wep_index);
1620                 break;
1621         case SME_WEP_KEY1_REQUEST:
1622                 if (priv->wpa.wpa_enabled)
1623                         return;
1624                 hostif_mib_set_request_ostring(priv,
1625                                                DOT11_WEP_DEFAULT_KEY_VALUE1,
1626                                                &priv->reg.wep_key[0].val[0],
1627                                                priv->reg.wep_key[0].size);
1628                 break;
1629         case SME_WEP_KEY2_REQUEST:
1630                 if (priv->wpa.wpa_enabled)
1631                         return;
1632                 hostif_mib_set_request_ostring(priv,
1633                                                DOT11_WEP_DEFAULT_KEY_VALUE2,
1634                                                &priv->reg.wep_key[1].val[0],
1635                                                priv->reg.wep_key[1].size);
1636                 break;
1637         case SME_WEP_KEY3_REQUEST:
1638                 if (priv->wpa.wpa_enabled)
1639                         return;
1640                 hostif_mib_set_request_ostring(priv,
1641                                                DOT11_WEP_DEFAULT_KEY_VALUE3,
1642                                                &priv->reg.wep_key[2].val[0],
1643                                                priv->reg.wep_key[2].size);
1644                 break;
1645         case SME_WEP_KEY4_REQUEST:
1646                 if (priv->wpa.wpa_enabled)
1647                         return;
1648                 hostif_mib_set_request_ostring(priv,
1649                                                DOT11_WEP_DEFAULT_KEY_VALUE4,
1650                                                &priv->reg.wep_key[3].val[0],
1651                                                priv->reg.wep_key[3].size);
1652                 break;
1653         case SME_WEP_FLAG_REQUEST:
1654                 hostif_mib_set_request_bool(priv, DOT11_PRIVACY_INVOKED,
1655                                             priv->reg.privacy_invoked);
1656                 break;
1657         }
1658 }
1659
1660 struct wpa_suite {
1661         __le16 size;
1662         unsigned char suite[4][CIPHER_ID_LEN];
1663 } __packed;
1664
1665 struct rsn_mode {
1666         __le32 rsn_mode;
1667         __le16 rsn_capability;
1668 } __packed;
1669
1670 static void hostif_sme_set_rsn(struct ks_wlan_private *priv, int type)
1671 {
1672         struct wpa_suite wpa_suite;
1673         struct rsn_mode rsn_mode;
1674         size_t size;
1675         u32 mode;
1676         const u8 *buf = NULL;
1677
1678         memset(&wpa_suite, 0, sizeof(wpa_suite));
1679
1680         switch (type) {
1681         case SME_RSN_UCAST_REQUEST:
1682                 wpa_suite.size = cpu_to_le16(1);
1683                 switch (priv->wpa.pairwise_suite) {
1684                 case IW_AUTH_CIPHER_NONE:
1685                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1686                                 CIPHER_ID_WPA2_NONE : CIPHER_ID_WPA_NONE;
1687                         break;
1688                 case IW_AUTH_CIPHER_WEP40:
1689                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1690                                 CIPHER_ID_WPA2_WEP40 : CIPHER_ID_WPA_WEP40;
1691                         break;
1692                 case IW_AUTH_CIPHER_TKIP:
1693                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1694                                 CIPHER_ID_WPA2_TKIP : CIPHER_ID_WPA_TKIP;
1695                         break;
1696                 case IW_AUTH_CIPHER_CCMP:
1697                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1698                                 CIPHER_ID_WPA2_CCMP : CIPHER_ID_WPA_CCMP;
1699                         break;
1700                 case IW_AUTH_CIPHER_WEP104:
1701                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1702                                 CIPHER_ID_WPA2_WEP104 : CIPHER_ID_WPA_WEP104;
1703                         break;
1704                 }
1705
1706                 if (buf)
1707                         memcpy(&wpa_suite.suite[0][0], buf, CIPHER_ID_LEN);
1708                 size = sizeof(wpa_suite.size) +
1709                        (CIPHER_ID_LEN * le16_to_cpu(wpa_suite.size));
1710                 hostif_mib_set_request_ostring(priv,
1711                                                DOT11_RSN_CONFIG_UNICAST_CIPHER,
1712                                                &wpa_suite, size);
1713                 break;
1714         case SME_RSN_MCAST_REQUEST:
1715                 switch (priv->wpa.group_suite) {
1716                 case IW_AUTH_CIPHER_NONE:
1717                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1718                                 CIPHER_ID_WPA2_NONE : CIPHER_ID_WPA_NONE;
1719                         break;
1720                 case IW_AUTH_CIPHER_WEP40:
1721                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1722                                 CIPHER_ID_WPA2_WEP40 : CIPHER_ID_WPA_WEP40;
1723                         break;
1724                 case IW_AUTH_CIPHER_TKIP:
1725                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1726                                 CIPHER_ID_WPA2_TKIP : CIPHER_ID_WPA_TKIP;
1727                         break;
1728                 case IW_AUTH_CIPHER_CCMP:
1729                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1730                                 CIPHER_ID_WPA2_CCMP : CIPHER_ID_WPA_CCMP;
1731                         break;
1732                 case IW_AUTH_CIPHER_WEP104:
1733                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1734                                 CIPHER_ID_WPA2_WEP104 : CIPHER_ID_WPA_WEP104;
1735                         break;
1736                 }
1737                 if (buf)
1738                         memcpy(&wpa_suite.suite[0][0], buf, CIPHER_ID_LEN);
1739                 hostif_mib_set_request_ostring(priv,
1740                                                DOT11_RSN_CONFIG_MULTICAST_CIPHER,
1741                                                &wpa_suite.suite[0][0],
1742                                                CIPHER_ID_LEN);
1743                 break;
1744         case SME_RSN_AUTH_REQUEST:
1745                 wpa_suite.size = cpu_to_le16(1);
1746                 switch (priv->wpa.key_mgmt_suite) {
1747                 case IW_AUTH_KEY_MGMT_802_1X:
1748                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1749                                 KEY_MGMT_ID_WPA2_1X : KEY_MGMT_ID_WPA_1X;
1750                         break;
1751                 case IW_AUTH_KEY_MGMT_PSK:
1752                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1753                                 KEY_MGMT_ID_WPA2_PSK : KEY_MGMT_ID_WPA_PSK;
1754                         break;
1755                 case 0:
1756                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1757                                 KEY_MGMT_ID_WPA2_NONE : KEY_MGMT_ID_WPA_NONE;
1758                         break;
1759                 case 4:
1760                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1761                                 KEY_MGMT_ID_WPA2_WPANONE :
1762                                 KEY_MGMT_ID_WPA_WPANONE;
1763                         break;
1764                 }
1765
1766                 if (buf)
1767                         memcpy(&wpa_suite.suite[0][0], buf, KEY_MGMT_ID_LEN);
1768                 size = sizeof(wpa_suite.size) +
1769                        (KEY_MGMT_ID_LEN * le16_to_cpu(wpa_suite.size));
1770                 hostif_mib_set_request_ostring(priv,
1771                                                DOT11_RSN_CONFIG_AUTH_SUITE,
1772                                                &wpa_suite, size);
1773                 break;
1774         case SME_RSN_ENABLED_REQUEST:
1775                 hostif_mib_set_request_bool(priv, DOT11_RSN_ENABLED,
1776                                             priv->wpa.rsn_enabled);
1777                 break;
1778         case SME_RSN_MODE_REQUEST:
1779                 mode = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1780                         RSN_MODE_WPA2 :
1781                         (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA) ?
1782                          RSN_MODE_WPA : RSN_MODE_NONE;
1783                 rsn_mode.rsn_mode = cpu_to_le32(mode);
1784                 rsn_mode.rsn_capability = cpu_to_le16(0);
1785                 hostif_mib_set_request_ostring(priv, LOCAL_RSN_MODE,
1786                                                &rsn_mode, sizeof(rsn_mode));
1787                 break;
1788         }
1789 }
1790
1791 static
1792 void hostif_sme_mode_setup(struct ks_wlan_private *priv)
1793 {
1794         unsigned char rate_size;
1795         unsigned char rate_octet[RATE_SET_MAX_SIZE];
1796         int i = 0;
1797
1798         /* rate setting if rate segging is auto for changing phy_type (#94) */
1799         if (priv->reg.tx_rate == TX_RATE_FULL_AUTO) {
1800                 if (priv->reg.phy_type == D_11B_ONLY_MODE) {
1801                         priv->reg.rate_set.body[3] = TX_RATE_11M;
1802                         priv->reg.rate_set.body[2] = TX_RATE_5M;
1803                         priv->reg.rate_set.body[1] = TX_RATE_2M | BASIC_RATE;
1804                         priv->reg.rate_set.body[0] = TX_RATE_1M | BASIC_RATE;
1805                         priv->reg.rate_set.size = 4;
1806                 } else {        /* D_11G_ONLY_MODE or D_11BG_COMPATIBLE_MODE */
1807                         priv->reg.rate_set.body[11] = TX_RATE_54M;
1808                         priv->reg.rate_set.body[10] = TX_RATE_48M;
1809                         priv->reg.rate_set.body[9] = TX_RATE_36M;
1810                         priv->reg.rate_set.body[8] = TX_RATE_18M;
1811                         priv->reg.rate_set.body[7] = TX_RATE_9M;
1812                         priv->reg.rate_set.body[6] = TX_RATE_24M | BASIC_RATE;
1813                         priv->reg.rate_set.body[5] = TX_RATE_12M | BASIC_RATE;
1814                         priv->reg.rate_set.body[4] = TX_RATE_6M | BASIC_RATE;
1815                         priv->reg.rate_set.body[3] = TX_RATE_11M | BASIC_RATE;
1816                         priv->reg.rate_set.body[2] = TX_RATE_5M | BASIC_RATE;
1817                         priv->reg.rate_set.body[1] = TX_RATE_2M | BASIC_RATE;
1818                         priv->reg.rate_set.body[0] = TX_RATE_1M | BASIC_RATE;
1819                         priv->reg.rate_set.size = 12;
1820                 }
1821         }
1822
1823         /* rate mask by phy setting */
1824         if (priv->reg.phy_type == D_11B_ONLY_MODE) {
1825                 for (i = 0; i < priv->reg.rate_set.size; i++) {
1826                         if (!is_11b_rate(priv->reg.rate_set.body[i]))
1827                                 break;
1828
1829                         if ((priv->reg.rate_set.body[i] & RATE_MASK) >= TX_RATE_5M) {
1830                                 rate_octet[i] = priv->reg.rate_set.body[i] &
1831                                                 RATE_MASK;
1832                         } else {
1833                                 rate_octet[i] = priv->reg.rate_set.body[i];
1834                         }
1835                 }
1836
1837         } else {        /* D_11G_ONLY_MODE or D_11BG_COMPATIBLE_MODE */
1838                 for (i = 0; i < priv->reg.rate_set.size; i++) {
1839                         if (!is_11bg_rate(priv->reg.rate_set.body[i]))
1840                                 break;
1841
1842                         if (is_ofdm_ext_rate(priv->reg.rate_set.body[i])) {
1843                                 rate_octet[i] = priv->reg.rate_set.body[i] &
1844                                                 RATE_MASK;
1845                         } else {
1846                                 rate_octet[i] = priv->reg.rate_set.body[i];
1847                         }
1848                 }
1849         }
1850         rate_size = i;
1851         if (rate_size == 0) {
1852                 if (priv->reg.phy_type == D_11G_ONLY_MODE)
1853                         rate_octet[0] = TX_RATE_6M | BASIC_RATE;
1854                 else
1855                         rate_octet[0] = TX_RATE_2M | BASIC_RATE;
1856                 rate_size = 1;
1857         }
1858
1859         /* rate set update */
1860         priv->reg.rate_set.size = rate_size;
1861         memcpy(&priv->reg.rate_set.body[0], &rate_octet[0], rate_size);
1862
1863         switch (priv->reg.operation_mode) {
1864         case MODE_PSEUDO_ADHOC:
1865                 hostif_ps_adhoc_set_request(priv);
1866                 break;
1867         case MODE_INFRASTRUCTURE:
1868                 if (!is_valid_ether_addr((u8 *)priv->reg.bssid)) {
1869                         hostif_infrastructure_set_request(priv,
1870                                                           HIF_INFRA_SET_REQ);
1871                 } else {
1872                         hostif_infrastructure_set_request(priv,
1873                                                           HIF_INFRA_SET2_REQ);
1874                         netdev_dbg(priv->net_dev,
1875                                    "Infra bssid = %pM\n", priv->reg.bssid);
1876                 }
1877                 break;
1878         case MODE_ADHOC:
1879                 if (!is_valid_ether_addr((u8 *)priv->reg.bssid)) {
1880                         hostif_adhoc_set_request(priv);
1881                 } else {
1882                         hostif_adhoc_set2_request(priv);
1883                         netdev_dbg(priv->net_dev,
1884                                    "Adhoc bssid = %pM\n", priv->reg.bssid);
1885                 }
1886                 break;
1887         default:
1888                 break;
1889         }
1890 }
1891
1892 static
1893 void hostif_sme_multicast_set(struct ks_wlan_private *priv)
1894 {
1895         struct net_device *dev = priv->net_dev;
1896         int mc_count;
1897         struct netdev_hw_addr *ha;
1898         char set_address[NIC_MAX_MCAST_LIST * ETH_ALEN];
1899         int i = 0;
1900
1901         spin_lock(&priv->multicast_spin);
1902
1903         memset(set_address, 0, NIC_MAX_MCAST_LIST * ETH_ALEN);
1904
1905         if (dev->flags & IFF_PROMISC) {
1906                 hostif_mib_set_request_int(priv, LOCAL_MULTICAST_FILTER,
1907                                            MCAST_FILTER_PROMISC);
1908                 goto spin_unlock;
1909         }
1910
1911         if ((netdev_mc_count(dev) > NIC_MAX_MCAST_LIST) ||
1912             (dev->flags & IFF_ALLMULTI)) {
1913                 hostif_mib_set_request_int(priv, LOCAL_MULTICAST_FILTER,
1914                                            MCAST_FILTER_MCASTALL);
1915                 goto spin_unlock;
1916         }
1917
1918         if (priv->sme_i.sme_flag & SME_MULTICAST) {
1919                 mc_count = netdev_mc_count(dev);
1920                 netdev_for_each_mc_addr(ha, dev) {
1921                         ether_addr_copy(&set_address[i * ETH_ALEN], ha->addr);
1922                         i++;
1923                 }
1924                 priv->sme_i.sme_flag &= ~SME_MULTICAST;
1925                 hostif_mib_set_request_ostring(priv, LOCAL_MULTICAST_ADDRESS,
1926                                                &set_address[0],
1927                                                ETH_ALEN * mc_count);
1928         } else {
1929                 priv->sme_i.sme_flag |= SME_MULTICAST;
1930                 hostif_mib_set_request_int(priv, LOCAL_MULTICAST_FILTER,
1931                                            MCAST_FILTER_MCAST);
1932         }
1933
1934 spin_unlock:
1935         spin_unlock(&priv->multicast_spin);
1936 }
1937
1938 static void hostif_sme_power_mgmt_set(struct ks_wlan_private *priv)
1939 {
1940         u32 mode, wake_up, receive_dtims;
1941
1942         if (priv->reg.power_mgmt != POWER_MGMT_SAVE1 &&
1943             priv->reg.power_mgmt != POWER_MGMT_SAVE2) {
1944                 mode = POWER_ACTIVE;
1945                 wake_up = 0;
1946                 receive_dtims = 0;
1947         } else {
1948                 mode = (priv->reg.operation_mode == MODE_INFRASTRUCTURE) ?
1949                         POWER_SAVE : POWER_ACTIVE;
1950                 wake_up = 0;
1951                 receive_dtims = (priv->reg.operation_mode == MODE_INFRASTRUCTURE &&
1952                                  priv->reg.power_mgmt == POWER_MGMT_SAVE2);
1953         }
1954
1955         hostif_power_mgmt_request(priv, mode, wake_up, receive_dtims);
1956 }
1957
1958 static void hostif_sme_sleep_set(struct ks_wlan_private *priv)
1959 {
1960         if (priv->sleep_mode != SLP_SLEEP &&
1961             priv->sleep_mode != SLP_ACTIVE)
1962                 return;
1963
1964         hostif_sleep_request(priv, priv->sleep_mode);
1965 }
1966
1967 static
1968 void hostif_sme_set_key(struct ks_wlan_private *priv, int type)
1969 {
1970         switch (type) {
1971         case SME_SET_FLAG:
1972                 hostif_mib_set_request_bool(priv, DOT11_PRIVACY_INVOKED,
1973                                             priv->reg.privacy_invoked);
1974                 break;
1975         case SME_SET_TXKEY:
1976                 hostif_mib_set_request_int(priv, DOT11_WEP_DEFAULT_KEY_ID,
1977                                            priv->wpa.txkey);
1978                 break;
1979         case SME_SET_KEY1:
1980                 hostif_mib_set_request_ostring(priv,
1981                                                DOT11_WEP_DEFAULT_KEY_VALUE1,
1982                                                &priv->wpa.key[0].key_val[0],
1983                                                priv->wpa.key[0].key_len);
1984                 break;
1985         case SME_SET_KEY2:
1986                 hostif_mib_set_request_ostring(priv,
1987                                                DOT11_WEP_DEFAULT_KEY_VALUE2,
1988                                                &priv->wpa.key[1].key_val[0],
1989                                                priv->wpa.key[1].key_len);
1990                 break;
1991         case SME_SET_KEY3:
1992                 hostif_mib_set_request_ostring(priv,
1993                                                DOT11_WEP_DEFAULT_KEY_VALUE3,
1994                                                &priv->wpa.key[2].key_val[0],
1995                                                priv->wpa.key[2].key_len);
1996                 break;
1997         case SME_SET_KEY4:
1998                 hostif_mib_set_request_ostring(priv,
1999                                                DOT11_WEP_DEFAULT_KEY_VALUE4,
2000                                                &priv->wpa.key[3].key_val[0],
2001                                                priv->wpa.key[3].key_len);
2002                 break;
2003         case SME_SET_PMK_TSC:
2004                 hostif_mib_set_request_ostring(priv, DOT11_PMK_TSC,
2005                                                &priv->wpa.key[0].rx_seq[0],
2006                                                WPA_RX_SEQ_LEN);
2007                 break;
2008         case SME_SET_GMK1_TSC:
2009                 hostif_mib_set_request_ostring(priv, DOT11_GMK1_TSC,
2010                                                &priv->wpa.key[1].rx_seq[0],
2011                                                WPA_RX_SEQ_LEN);
2012                 break;
2013         case SME_SET_GMK2_TSC:
2014                 hostif_mib_set_request_ostring(priv, DOT11_GMK2_TSC,
2015                                                &priv->wpa.key[2].rx_seq[0],
2016                                                WPA_RX_SEQ_LEN);
2017                 break;
2018         }
2019 }
2020
2021 static
2022 void hostif_sme_set_pmksa(struct ks_wlan_private *priv)
2023 {
2024         struct pmk_cache {
2025                 __le16 size;
2026                 struct {
2027                         u8 bssid[ETH_ALEN];
2028                         u8 pmkid[IW_PMKID_LEN];
2029                 } __packed list[PMK_LIST_MAX];
2030         } __packed pmkcache;
2031         struct pmk *pmk;
2032         size_t size;
2033         int i = 0;
2034
2035         list_for_each_entry(pmk, &priv->pmklist.head, list) {
2036                 if (i >= PMK_LIST_MAX)
2037                         break;
2038                 ether_addr_copy(pmkcache.list[i].bssid, pmk->bssid);
2039                 memcpy(pmkcache.list[i].pmkid, pmk->pmkid, IW_PMKID_LEN);
2040                 i++;
2041         }
2042         pmkcache.size = cpu_to_le16(priv->pmklist.size);
2043         size = sizeof(priv->pmklist.size) +
2044                ((ETH_ALEN + IW_PMKID_LEN) * priv->pmklist.size);
2045         hostif_mib_set_request_ostring(priv, LOCAL_PMK, &pmkcache, size);
2046 }
2047
2048 /* execute sme */
2049 static void hostif_sme_execute(struct ks_wlan_private *priv, int event)
2050 {
2051         u16 failure;
2052
2053         switch (event) {
2054         case SME_START:
2055                 if (priv->dev_state == DEVICE_STATE_BOOT)
2056                         hostif_mib_get_request(priv, DOT11_MAC_ADDRESS);
2057                 break;
2058         case SME_MULTICAST_REQUEST:
2059                 hostif_sme_multicast_set(priv);
2060                 break;
2061         case SME_MACADDRESS_SET_REQUEST:
2062                 hostif_mib_set_request_ostring(priv, LOCAL_CURRENTADDRESS,
2063                                                &priv->eth_addr[0], ETH_ALEN);
2064                 break;
2065         case SME_BSS_SCAN_REQUEST:
2066                 hostif_bss_scan_request(priv, priv->reg.scan_type,
2067                                         priv->scan_ssid, priv->scan_ssid_len);
2068                 break;
2069         case SME_POW_MNGMT_REQUEST:
2070                 hostif_sme_power_mgmt_set(priv);
2071                 break;
2072         case SME_PHY_INFO_REQUEST:
2073                 hostif_phy_information_request(priv);
2074                 break;
2075         case SME_MIC_FAILURE_REQUEST:
2076                 failure = priv->wpa.mic_failure.failure;
2077                 if (failure != 1 && failure != 2) {
2078                         netdev_err(priv->net_dev,
2079                                    "SME_MIC_FAILURE_REQUEST: failure count=%u error?\n",
2080                                    failure);
2081                         return;
2082                 }
2083                 hostif_mic_failure_request(priv, failure - 1, (failure == 1) ?
2084                                             0 : priv->wpa.mic_failure.counter);
2085                 break;
2086         case SME_MIC_FAILURE_CONFIRM:
2087                 if (priv->wpa.mic_failure.failure == 2) {
2088                         if (priv->wpa.mic_failure.stop)
2089                                 priv->wpa.mic_failure.stop = 0;
2090                         priv->wpa.mic_failure.failure = 0;
2091                         hostif_start_request(priv, priv->reg.operation_mode);
2092                 }
2093                 break;
2094         case SME_GET_MAC_ADDRESS:
2095                 if (priv->dev_state == DEVICE_STATE_BOOT)
2096                         hostif_mib_get_request(priv, DOT11_PRODUCT_VERSION);
2097                 break;
2098         case SME_GET_PRODUCT_VERSION:
2099                 if (priv->dev_state == DEVICE_STATE_BOOT)
2100                         priv->dev_state = DEVICE_STATE_PREINIT;
2101                 break;
2102         case SME_STOP_REQUEST:
2103                 hostif_stop_request(priv);
2104                 break;
2105         case SME_RTS_THRESHOLD_REQUEST:
2106                 hostif_mib_set_request_int(priv, DOT11_RTS_THRESHOLD,
2107                                            priv->reg.rts);
2108                 break;
2109         case SME_FRAGMENTATION_THRESHOLD_REQUEST:
2110                 hostif_mib_set_request_int(priv, DOT11_FRAGMENTATION_THRESHOLD,
2111                                            priv->reg.fragment);
2112                 break;
2113         case SME_WEP_INDEX_REQUEST:
2114         case SME_WEP_KEY1_REQUEST:
2115         case SME_WEP_KEY2_REQUEST:
2116         case SME_WEP_KEY3_REQUEST:
2117         case SME_WEP_KEY4_REQUEST:
2118         case SME_WEP_FLAG_REQUEST:
2119                 hostif_sme_set_wep(priv, event);
2120                 break;
2121         case SME_RSN_UCAST_REQUEST:
2122         case SME_RSN_MCAST_REQUEST:
2123         case SME_RSN_AUTH_REQUEST:
2124         case SME_RSN_ENABLED_REQUEST:
2125         case SME_RSN_MODE_REQUEST:
2126                 hostif_sme_set_rsn(priv, event);
2127                 break;
2128         case SME_SET_FLAG:
2129         case SME_SET_TXKEY:
2130         case SME_SET_KEY1:
2131         case SME_SET_KEY2:
2132         case SME_SET_KEY3:
2133         case SME_SET_KEY4:
2134         case SME_SET_PMK_TSC:
2135         case SME_SET_GMK1_TSC:
2136         case SME_SET_GMK2_TSC:
2137                 hostif_sme_set_key(priv, event);
2138                 break;
2139         case SME_SET_PMKSA:
2140                 hostif_sme_set_pmksa(priv);
2141                 break;
2142         case SME_WPS_ENABLE_REQUEST:
2143                 hostif_mib_set_request_int(priv, LOCAL_WPS_ENABLE,
2144                                            priv->wps.wps_enabled);
2145                 break;
2146         case SME_WPS_PROBE_REQUEST:
2147                 hostif_mib_set_request_ostring(priv, LOCAL_WPS_PROBE_REQ,
2148                                                priv->wps.ie, priv->wps.ielen);
2149                 break;
2150         case SME_MODE_SET_REQUEST:
2151                 hostif_sme_mode_setup(priv);
2152                 break;
2153         case SME_SET_GAIN:
2154                 hostif_mib_set_request_ostring(priv, LOCAL_GAIN,
2155                                                &priv->gain, sizeof(priv->gain));
2156                 break;
2157         case SME_GET_GAIN:
2158                 hostif_mib_get_request(priv, LOCAL_GAIN);
2159                 break;
2160         case SME_GET_EEPROM_CKSUM:
2161                 priv->eeprom_checksum = EEPROM_FW_NOT_SUPPORT;  /* initialize */
2162                 hostif_mib_get_request(priv, LOCAL_EEPROM_SUM);
2163                 break;
2164         case SME_START_REQUEST:
2165                 hostif_start_request(priv, priv->reg.operation_mode);
2166                 break;
2167         case SME_START_CONFIRM:
2168                 /* for power save */
2169                 atomic_set(&priv->psstatus.snooze_guard, 0);
2170                 atomic_set(&priv->psstatus.confirm_wait, 0);
2171                 if (priv->dev_state == DEVICE_STATE_PREINIT)
2172                         priv->dev_state = DEVICE_STATE_INIT;
2173                 /* wake_up_interruptible_all(&priv->confirm_wait); */
2174                 complete(&priv->confirm_wait);
2175                 break;
2176         case SME_SLEEP_REQUEST:
2177                 hostif_sme_sleep_set(priv);
2178                 break;
2179         case SME_SET_REGION:
2180                 hostif_mib_set_request_int(priv, LOCAL_REGION, priv->region);
2181                 break;
2182         case SME_MULTICAST_CONFIRM:
2183         case SME_BSS_SCAN_CONFIRM:
2184         case SME_POW_MNGMT_CONFIRM:
2185         case SME_PHY_INFO_CONFIRM:
2186         case SME_STOP_CONFIRM:
2187         case SME_RTS_THRESHOLD_CONFIRM:
2188         case SME_FRAGMENTATION_THRESHOLD_CONFIRM:
2189         case SME_WEP_INDEX_CONFIRM:
2190         case SME_WEP_KEY1_CONFIRM:
2191         case SME_WEP_KEY2_CONFIRM:
2192         case SME_WEP_KEY3_CONFIRM:
2193         case SME_WEP_KEY4_CONFIRM:
2194         case SME_WEP_FLAG_CONFIRM:
2195         case SME_RSN_UCAST_CONFIRM:
2196         case SME_RSN_MCAST_CONFIRM:
2197         case SME_RSN_AUTH_CONFIRM:
2198         case SME_RSN_ENABLED_CONFIRM:
2199         case SME_RSN_MODE_CONFIRM:
2200         case SME_MODE_SET_CONFIRM:
2201         case SME_TERMINATE:
2202         default:
2203                 break;
2204         }
2205 }
2206
2207 static
2208 void hostif_sme_task(struct tasklet_struct *t)
2209 {
2210         struct ks_wlan_private *priv = from_tasklet(priv, t, sme_task);
2211
2212         if (priv->dev_state < DEVICE_STATE_BOOT)
2213                 return;
2214
2215         if (cnt_smeqbody(priv) <= 0)
2216                 return;
2217
2218         hostif_sme_execute(priv, priv->sme_i.event_buff[priv->sme_i.qhead]);
2219         inc_smeqhead(priv);
2220         if (cnt_smeqbody(priv) > 0)
2221                 tasklet_schedule(&priv->sme_task);
2222 }
2223
2224 /* send to Station Management Entity module */
2225 void hostif_sme_enqueue(struct ks_wlan_private *priv, u16 event)
2226 {
2227         /* enqueue sme event */
2228         if (cnt_smeqbody(priv) < (SME_EVENT_BUFF_SIZE - 1)) {
2229                 priv->sme_i.event_buff[priv->sme_i.qtail] = event;
2230                 inc_smeqtail(priv);
2231         } else {
2232                 /* in case of buffer overflow */
2233                 netdev_err(priv->net_dev, "sme queue buffer overflow\n");
2234         }
2235
2236         tasklet_schedule(&priv->sme_task);
2237 }
2238
2239 static inline void hostif_aplist_init(struct ks_wlan_private *priv)
2240 {
2241         size_t size = LOCAL_APLIST_MAX * sizeof(struct local_ap);
2242
2243         priv->aplist.size = 0;
2244         memset(&priv->aplist.ap[0], 0, size);
2245 }
2246
2247 static inline void hostif_status_init(struct ks_wlan_private *priv)
2248 {
2249         priv->infra_status = 0;
2250         priv->current_rate = 4;
2251         priv->connect_status = DISCONNECT_STATUS;
2252 }
2253
2254 static inline void hostif_sme_init(struct ks_wlan_private *priv)
2255 {
2256         priv->sme_i.sme_status = SME_IDLE;
2257         priv->sme_i.qhead = 0;
2258         priv->sme_i.qtail = 0;
2259         spin_lock_init(&priv->sme_i.sme_spin);
2260         priv->sme_i.sme_flag = 0;
2261         tasklet_setup(&priv->sme_task, hostif_sme_task);
2262 }
2263
2264 static inline void hostif_wpa_init(struct ks_wlan_private *priv)
2265 {
2266         memset(&priv->wpa, 0, sizeof(priv->wpa));
2267         priv->wpa.rsn_enabled = false;
2268         priv->wpa.mic_failure.failure = 0;
2269         priv->wpa.mic_failure.last_failure_time = 0;
2270         priv->wpa.mic_failure.stop = 0;
2271 }
2272
2273 static inline void hostif_power_save_init(struct ks_wlan_private *priv)
2274 {
2275         atomic_set(&priv->psstatus.status, PS_NONE);
2276         atomic_set(&priv->psstatus.confirm_wait, 0);
2277         atomic_set(&priv->psstatus.snooze_guard, 0);
2278         init_completion(&priv->psstatus.wakeup_wait);
2279         INIT_WORK(&priv->wakeup_work, ks_wlan_hw_wakeup_task);
2280 }
2281
2282 static inline void hostif_pmklist_init(struct ks_wlan_private *priv)
2283 {
2284         int i;
2285
2286         memset(&priv->pmklist, 0, sizeof(priv->pmklist));
2287         INIT_LIST_HEAD(&priv->pmklist.head);
2288         for (i = 0; i < PMK_LIST_MAX; i++)
2289                 INIT_LIST_HEAD(&priv->pmklist.pmk[i].list);
2290 }
2291
2292 static inline void hostif_counters_init(struct ks_wlan_private *priv)
2293 {
2294         priv->dev_count = 0;
2295         atomic_set(&priv->event_count, 0);
2296         atomic_set(&priv->rec_count, 0);
2297 }
2298
2299 int hostif_init(struct ks_wlan_private *priv)
2300 {
2301         hostif_aplist_init(priv);
2302         hostif_status_init(priv);
2303
2304         spin_lock_init(&priv->multicast_spin);
2305         spin_lock_init(&priv->dev_read_lock);
2306         init_waitqueue_head(&priv->devread_wait);
2307
2308         hostif_counters_init(priv);
2309         hostif_power_save_init(priv);
2310         hostif_wpa_init(priv);
2311         hostif_pmklist_init(priv);
2312         hostif_sme_init(priv);
2313
2314         return 0;
2315 }
2316
2317 void hostif_exit(struct ks_wlan_private *priv)
2318 {
2319         tasklet_kill(&priv->sme_task);
2320 }