GNU Linux-libre 6.1.24-gnu
[releases.git] / drivers / staging / ks7010 / ks_hostif.c
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  *   Driver for KeyStream wireless LAN cards.
4  *
5  *   Copyright (C) 2005-2008 KeyStream Corp.
6  *   Copyright (C) 2009 Renesas Technology Corp.
7  */
8
9 #include <crypto/hash.h>
10 #include <linux/circ_buf.h>
11 #include <linux/if_arp.h>
12 #include <net/iw_handler.h>
13 #include <uapi/linux/llc.h>
14 #include "eap_packet.h"
15 #include "ks_wlan.h"
16 #include "ks_hostif.h"
17
18 #define MICHAEL_MIC_KEY_LEN 8
19 #define MICHAEL_MIC_LEN     8
20
21 static inline void inc_smeqhead(struct ks_wlan_private *priv)
22 {
23         priv->sme_i.qhead = (priv->sme_i.qhead + 1) % SME_EVENT_BUFF_SIZE;
24 }
25
26 static inline void inc_smeqtail(struct ks_wlan_private *priv)
27 {
28         priv->sme_i.qtail = (priv->sme_i.qtail + 1) % SME_EVENT_BUFF_SIZE;
29 }
30
31 static inline unsigned int cnt_smeqbody(struct ks_wlan_private *priv)
32 {
33         return CIRC_CNT_TO_END(priv->sme_i.qhead, priv->sme_i.qtail,
34                                SME_EVENT_BUFF_SIZE);
35 }
36
37 static inline u8 get_byte(struct ks_wlan_private *priv)
38 {
39         u8 data;
40
41         data = *priv->rxp++;
42         /* length check in advance ! */
43         --(priv->rx_size);
44         return data;
45 }
46
47 static inline u16 get_word(struct ks_wlan_private *priv)
48 {
49         u16 data;
50
51         data = (get_byte(priv) & 0xff);
52         data |= ((get_byte(priv) << 8) & 0xff00);
53         return data;
54 }
55
56 static inline u32 get_dword(struct ks_wlan_private *priv)
57 {
58         u32 data;
59
60         data = (get_byte(priv) & 0xff);
61         data |= ((get_byte(priv) << 8) & 0x0000ff00);
62         data |= ((get_byte(priv) << 16) & 0x00ff0000);
63         data |= ((get_byte(priv) << 24) & 0xff000000);
64         return data;
65 }
66
67 static void ks_wlan_hw_wakeup_task(struct work_struct *work)
68 {
69         struct ks_wlan_private *priv;
70         int ps_status;
71         long time_left;
72
73         priv = container_of(work, struct ks_wlan_private, wakeup_work);
74         ps_status = atomic_read(&priv->psstatus.status);
75
76         if (ps_status == PS_SNOOZE) {
77                 ks_wlan_hw_wakeup_request(priv);
78                 time_left = wait_for_completion_interruptible_timeout(
79                                 &priv->psstatus.wakeup_wait,
80                                 msecs_to_jiffies(20));
81                 if (time_left <= 0) {
82                         netdev_dbg(priv->net_dev, "wake up timeout or interrupted !!!\n");
83                         schedule_work(&priv->wakeup_work);
84                         return;
85                 }
86         }
87 }
88
89 static void ks_wlan_do_power_save(struct ks_wlan_private *priv)
90 {
91         if (is_connect_status(priv->connect_status))
92                 hostif_sme_enqueue(priv, SME_POW_MNGMT_REQUEST);
93         else
94                 priv->dev_state = DEVICE_STATE_READY;
95 }
96
97 static
98 int get_current_ap(struct ks_wlan_private *priv, struct link_ap_info *ap_info)
99 {
100         struct local_ap *ap;
101         union iwreq_data wrqu;
102         struct net_device *netdev = priv->net_dev;
103         u8 size;
104
105         ap = &priv->current_ap;
106
107         if (is_disconnect_status(priv->connect_status)) {
108                 memset(ap, 0, sizeof(struct local_ap));
109                 return -EPERM;
110         }
111
112         ether_addr_copy(ap->bssid, ap_info->bssid);
113         memcpy(ap->ssid.body, priv->reg.ssid.body,
114                priv->reg.ssid.size);
115         ap->ssid.size = priv->reg.ssid.size;
116         memcpy(ap->rate_set.body, ap_info->rate_set.body,
117                ap_info->rate_set.size);
118         ap->rate_set.size = ap_info->rate_set.size;
119         if (ap_info->ext_rate_set.size != 0) {
120                 memcpy(&ap->rate_set.body[ap->rate_set.size],
121                        ap_info->ext_rate_set.body,
122                        ap_info->ext_rate_set.size);
123                 ap->rate_set.size += ap_info->ext_rate_set.size;
124         }
125         ap->channel = ap_info->ds_parameter.channel;
126         ap->rssi = ap_info->rssi;
127         ap->sq = ap_info->sq;
128         ap->noise = ap_info->noise;
129         ap->capability = le16_to_cpu(ap_info->capability);
130         size = (ap_info->rsn.size <= RSN_IE_BODY_MAX) ?
131                 ap_info->rsn.size : RSN_IE_BODY_MAX;
132         if ((ap_info->rsn_mode & RSN_MODE_WPA2) &&
133             (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2)) {
134                 ap->rsn_ie.id = RSN_INFO_ELEM_ID;
135                 ap->rsn_ie.size = size;
136                 memcpy(ap->rsn_ie.body, ap_info->rsn.body, size);
137         } else if ((ap_info->rsn_mode & RSN_MODE_WPA) &&
138                    (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA)) {
139                 ap->wpa_ie.id = WPA_INFO_ELEM_ID;
140                 ap->wpa_ie.size = size;
141                 memcpy(ap->wpa_ie.body, ap_info->rsn.body, size);
142         } else {
143                 ap->rsn_ie.id = 0;
144                 ap->rsn_ie.size = 0;
145                 ap->wpa_ie.id = 0;
146                 ap->wpa_ie.size = 0;
147         }
148
149         wrqu.data.length = 0;
150         wrqu.data.flags = 0;
151         wrqu.ap_addr.sa_family = ARPHRD_ETHER;
152         if (is_connect_status(priv->connect_status)) {
153                 ether_addr_copy(wrqu.ap_addr.sa_data, priv->current_ap.bssid);
154                 netdev_dbg(priv->net_dev,
155                            "IWEVENT: connect bssid=%pM\n",
156                            wrqu.ap_addr.sa_data);
157                 wireless_send_event(netdev, SIOCGIWAP, &wrqu, NULL);
158         }
159         netdev_dbg(priv->net_dev, "Link AP\n"
160                    "- bssid=%pM\n"
161                    "- essid=%s\n"
162                    "- rate_set=%02X,%02X,%02X,%02X,%02X,%02X,%02X,%02X\n"
163                    "- channel=%d\n"
164                    "- rssi=%d\n"
165                    "- sq=%d\n"
166                    "- capability=%04X\n"
167                    "- rsn.mode=%d\n"
168                    "- rsn.size=%d\n"
169                    "- ext_rate_set_size=%d\n"
170                    "- rate_set_size=%d\n",
171                    ap->bssid,
172                    &ap->ssid.body[0],
173                    ap->rate_set.body[0], ap->rate_set.body[1],
174                    ap->rate_set.body[2], ap->rate_set.body[3],
175                    ap->rate_set.body[4], ap->rate_set.body[5],
176                    ap->rate_set.body[6], ap->rate_set.body[7],
177                    ap->channel, ap->rssi, ap->sq, ap->capability,
178                    ap_info->rsn_mode, ap_info->rsn.size,
179                    ap_info->ext_rate_set.size, ap_info->rate_set.size);
180
181         return 0;
182 }
183
184 static u8 read_ie(unsigned char *bp, u8 max, u8 *body)
185 {
186         u8 size = (*(bp + 1) <= max) ? *(bp + 1) : max;
187
188         memcpy(body, bp + 2, size);
189         return size;
190 }
191
192 static int
193 michael_mic(u8 *key, u8 *data, unsigned int len, u8 priority, u8 *result)
194 {
195         u8 pad_data[4] = { priority, 0, 0, 0 };
196         struct crypto_shash *tfm = NULL;
197         struct shash_desc *desc = NULL;
198         int ret;
199
200         tfm = crypto_alloc_shash("michael_mic", 0, 0);
201         if (IS_ERR(tfm)) {
202                 ret = PTR_ERR(tfm);
203                 goto err;
204         }
205
206         ret = crypto_shash_setkey(tfm, key, MICHAEL_MIC_KEY_LEN);
207         if (ret < 0)
208                 goto err_free_tfm;
209
210         desc = kmalloc(sizeof(*desc) + crypto_shash_descsize(tfm), GFP_KERNEL);
211         if (!desc) {
212                 ret = -ENOMEM;
213                 goto err_free_tfm;
214         }
215
216         desc->tfm = tfm;
217
218         ret = crypto_shash_init(desc);
219         if (ret < 0)
220                 goto err_free_desc;
221
222         // Compute the MIC value
223         /*
224          * IEEE802.11i  page 47
225          * Figure 43g TKIP MIC processing format
226          * +--+--+--------+--+----+--+--+--+--+--+--+--+--+
227          * |6 |6 |1       |3 |M   |1 |1 |1 |1 |1 |1 |1 |1 | Octet
228          * +--+--+--------+--+----+--+--+--+--+--+--+--+--+
229          * |DA|SA|Priority|0 |Data|M0|M1|M2|M3|M4|M5|M6|M7|
230          * +--+--+--------+--+----+--+--+--+--+--+--+--+--+
231          */
232
233         ret = crypto_shash_update(desc, data, 12);
234         if (ret < 0)
235                 goto err_free_desc;
236
237         ret = crypto_shash_update(desc, pad_data, 4);
238         if (ret < 0)
239                 goto err_free_desc;
240
241         ret = crypto_shash_finup(desc, data + 12, len - 12, result);
242
243 err_free_desc:
244         kfree_sensitive(desc);
245
246 err_free_tfm:
247         crypto_free_shash(tfm);
248
249 err:
250         return ret;
251 }
252
253 static
254 int get_ap_information(struct ks_wlan_private *priv, struct ap_info *ap_info,
255                        struct local_ap *ap)
256 {
257         unsigned char *bp;
258         int bsize, offset;
259
260         memset(ap, 0, sizeof(struct local_ap));
261
262         ether_addr_copy(ap->bssid, ap_info->bssid);
263         ap->rssi = ap_info->rssi;
264         ap->sq = ap_info->sq;
265         ap->noise = ap_info->noise;
266         ap->capability = le16_to_cpu(ap_info->capability);
267         ap->channel = ap_info->ch_info;
268
269         bp = ap_info->body;
270         bsize = le16_to_cpu(ap_info->body_size);
271         offset = 0;
272
273         while (bsize > offset) {
274                 switch (*bp) { /* Information Element ID */
275                 case WLAN_EID_SSID:
276                         ap->ssid.size = read_ie(bp, IEEE80211_MAX_SSID_LEN,
277                                                 ap->ssid.body);
278                         break;
279                 case WLAN_EID_SUPP_RATES:
280                 case WLAN_EID_EXT_SUPP_RATES:
281                         if ((*(bp + 1) + ap->rate_set.size) <=
282                             RATE_SET_MAX_SIZE) {
283                                 memcpy(&ap->rate_set.body[ap->rate_set.size],
284                                        bp + 2, *(bp + 1));
285                                 ap->rate_set.size += *(bp + 1);
286                         } else {
287                                 memcpy(&ap->rate_set.body[ap->rate_set.size],
288                                        bp + 2,
289                                        RATE_SET_MAX_SIZE - ap->rate_set.size);
290                                 ap->rate_set.size +=
291                                     (RATE_SET_MAX_SIZE - ap->rate_set.size);
292                         }
293                         break;
294                 case WLAN_EID_RSN:
295                         ap->rsn_ie.id = *bp;
296                         ap->rsn_ie.size = read_ie(bp, RSN_IE_BODY_MAX,
297                                                   ap->rsn_ie.body);
298                         break;
299                 case WLAN_EID_VENDOR_SPECIFIC: /* WPA */
300                         /* WPA OUI check */
301                         if (memcmp(bp + 2, CIPHER_ID_WPA_WEP40, 4) == 0) {
302                                 ap->wpa_ie.id = *bp;
303                                 ap->wpa_ie.size = read_ie(bp, RSN_IE_BODY_MAX,
304                                                           ap->wpa_ie.body);
305                         }
306                         break;
307                 case WLAN_EID_DS_PARAMS:
308                 case WLAN_EID_FH_PARAMS:
309                 case WLAN_EID_CF_PARAMS:
310                 case WLAN_EID_TIM:
311                 case WLAN_EID_IBSS_PARAMS:
312                 case WLAN_EID_COUNTRY:
313                 case WLAN_EID_ERP_INFO:
314                         break;
315                 default:
316                         netdev_err(priv->net_dev,
317                                    "unknown Element ID=%d\n", *bp);
318                         break;
319                 }
320
321                 offset += 2;    /* id & size field */
322                 offset += *(bp + 1);    /* +size offset */
323                 bp += (*(bp + 1) + 2);  /* pointer update */
324         }
325
326         return 0;
327 }
328
329 static
330 int hostif_data_indication_wpa(struct ks_wlan_private *priv,
331                                unsigned short auth_type)
332 {
333         struct ether_hdr *eth_hdr;
334         unsigned short eth_proto;
335         unsigned char recv_mic[MICHAEL_MIC_LEN];
336         char buf[128];
337         unsigned long now;
338         struct mic_failure *mic_failure;
339         u8 mic[MICHAEL_MIC_LEN];
340         union iwreq_data wrqu;
341         unsigned int key_index = auth_type - 1;
342         struct wpa_key *key = &priv->wpa.key[key_index];
343
344         eth_hdr = (struct ether_hdr *)(priv->rxp);
345         eth_proto = ntohs(eth_hdr->h_proto);
346
347         if (eth_hdr->h_dest_snap != eth_hdr->h_source_snap) {
348                 netdev_err(priv->net_dev, "invalid data format\n");
349                 priv->nstats.rx_errors++;
350                 return -EINVAL;
351         }
352         if (((auth_type == TYPE_PMK1 &&
353               priv->wpa.pairwise_suite == IW_AUTH_CIPHER_TKIP) ||
354              (auth_type == TYPE_GMK1 &&
355               priv->wpa.group_suite == IW_AUTH_CIPHER_TKIP) ||
356              (auth_type == TYPE_GMK2 &&
357               priv->wpa.group_suite == IW_AUTH_CIPHER_TKIP)) &&
358             key->key_len) {
359                 int ret;
360
361                 netdev_dbg(priv->net_dev, "TKIP: protocol=%04X: size=%u\n",
362                            eth_proto, priv->rx_size);
363                 /* MIC save */
364                 memcpy(&recv_mic[0],
365                        (priv->rxp) + ((priv->rx_size) - sizeof(recv_mic)),
366                        sizeof(recv_mic));
367                 priv->rx_size = priv->rx_size - sizeof(recv_mic);
368
369                 ret = michael_mic(key->rx_mic_key, priv->rxp, priv->rx_size,
370                                   0, mic);
371                 if (ret < 0)
372                         return ret;
373                 if (memcmp(mic, recv_mic, sizeof(mic)) != 0) {
374                         now = jiffies;
375                         mic_failure = &priv->wpa.mic_failure;
376                         /* MIC FAILURE */
377                         if (mic_failure->last_failure_time &&
378                             (now - mic_failure->last_failure_time) / HZ >= 60) {
379                                 mic_failure->failure = 0;
380                         }
381                         netdev_err(priv->net_dev, "MIC FAILURE\n");
382                         if (mic_failure->failure == 0) {
383                                 mic_failure->failure = 1;
384                                 mic_failure->counter = 0;
385                         } else if (mic_failure->failure == 1) {
386                                 mic_failure->failure = 2;
387                                 mic_failure->counter =
388                                         (u16)((now - mic_failure->last_failure_time) / HZ);
389                                 /*  range 1-60 */
390                                 if (!mic_failure->counter)
391                                         mic_failure->counter = 1;
392                         }
393                         priv->wpa.mic_failure.last_failure_time = now;
394
395                         /*  needed parameters: count, keyid, key type, TSC */
396                         sprintf(buf,
397                                 "MLME-MICHAELMICFAILURE.indication(keyid=%d %scast addr=%pM)",
398                                 key_index,
399                                 eth_hdr->h_dest[0] & 0x01 ? "broad" : "uni",
400                                 eth_hdr->h_source);
401                         memset(&wrqu, 0, sizeof(wrqu));
402                         wrqu.data.length = strlen(buf);
403                         wireless_send_event(priv->net_dev, IWEVCUSTOM, &wrqu,
404                                             buf);
405                         return -EINVAL;
406                 }
407         }
408         return 0;
409 }
410
411 static
412 void hostif_data_indication(struct ks_wlan_private *priv)
413 {
414         unsigned int rx_ind_size;       /* indicate data size */
415         struct sk_buff *skb;
416         u16 auth_type;
417         unsigned char temp[256];
418         struct ether_hdr *eth_hdr;
419         struct ieee802_1x_hdr *aa1x_hdr;
420         size_t size;
421         int ret;
422
423         /* min length check */
424         if (priv->rx_size <= ETH_HLEN) {
425                 priv->nstats.rx_errors++;
426                 return;
427         }
428
429         auth_type = get_word(priv);     /* AuthType */
430         get_word(priv); /* Reserve Area */
431
432         eth_hdr = (struct ether_hdr *)(priv->rxp);
433
434         /* source address check */
435         if (ether_addr_equal(&priv->eth_addr[0], eth_hdr->h_source)) {
436                 netdev_err(priv->net_dev, "invalid : source is own mac address !!\n");
437                 netdev_err(priv->net_dev, "eth_hdrernet->h_dest=%pM\n", eth_hdr->h_source);
438                 priv->nstats.rx_errors++;
439                 return;
440         }
441
442         /*  for WPA */
443         if (auth_type != TYPE_DATA && priv->wpa.rsn_enabled) {
444                 ret = hostif_data_indication_wpa(priv, auth_type);
445                 if (ret)
446                         return;
447         }
448
449         if ((priv->connect_status & FORCE_DISCONNECT) ||
450             priv->wpa.mic_failure.failure == 2) {
451                 return;
452         }
453
454         /* check 13th byte at rx data */
455         switch (*(priv->rxp + 12)) {
456         case LLC_SAP_SNAP:
457                 rx_ind_size = priv->rx_size - 6;
458                 skb = dev_alloc_skb(rx_ind_size);
459                 if (!skb) {
460                         priv->nstats.rx_dropped++;
461                         return;
462                 }
463                 netdev_dbg(priv->net_dev, "SNAP, rx_ind_size = %d\n",
464                            rx_ind_size);
465
466                 size = ETH_ALEN * 2;
467                 skb_put_data(skb, priv->rxp, size);
468
469                 /* (SNAP+UI..) skip */
470
471                 size = rx_ind_size - (ETH_ALEN * 2);
472                 skb_put_data(skb, &eth_hdr->h_proto, size);
473
474                 aa1x_hdr = (struct ieee802_1x_hdr *)(priv->rxp + ETHER_HDR_SIZE);
475                 break;
476         case LLC_SAP_NETBEUI:
477                 rx_ind_size = (priv->rx_size + 2);
478                 skb = dev_alloc_skb(rx_ind_size);
479                 if (!skb) {
480                         priv->nstats.rx_dropped++;
481                         return;
482                 }
483                 netdev_dbg(priv->net_dev, "NETBEUI/NetBIOS rx_ind_size=%d\n",
484                            rx_ind_size);
485
486                 /* 8802/FDDI MAC copy */
487                 skb_put_data(skb, priv->rxp, 12);
488
489                 /* NETBEUI size add */
490                 temp[0] = (((rx_ind_size - 12) >> 8) & 0xff);
491                 temp[1] = ((rx_ind_size - 12) & 0xff);
492                 skb_put_data(skb, temp, 2);
493
494                 /* copy after Type */
495                 skb_put_data(skb, priv->rxp + 12, rx_ind_size - 14);
496
497                 aa1x_hdr = (struct ieee802_1x_hdr *)(priv->rxp + 14);
498                 break;
499         default:        /* other rx data */
500                 netdev_err(priv->net_dev, "invalid data format\n");
501                 priv->nstats.rx_errors++;
502                 return;
503         }
504
505         if (aa1x_hdr->type == IEEE802_1X_TYPE_EAPOL_KEY &&
506             priv->wpa.rsn_enabled)
507                 atomic_set(&priv->psstatus.snooze_guard, 1);
508
509         /* rx indication */
510         skb->dev = priv->net_dev;
511         skb->protocol = eth_type_trans(skb, skb->dev);
512         priv->nstats.rx_packets++;
513         priv->nstats.rx_bytes += rx_ind_size;
514         netif_rx(skb);
515 }
516
517 static
518 void hostif_mib_get_confirm(struct ks_wlan_private *priv)
519 {
520         struct net_device *dev = priv->net_dev;
521         u32 mib_status;
522         u32 mib_attribute;
523
524         mib_status = get_dword(priv);
525         mib_attribute = get_dword(priv);
526         get_word(priv); /* mib_val_size */
527         get_word(priv); /* mib_val_type */
528
529         if (mib_status) {
530                 netdev_err(priv->net_dev, "attribute=%08X, status=%08X\n",
531                            mib_attribute, mib_status);
532                 return;
533         }
534
535         switch (mib_attribute) {
536         case DOT11_MAC_ADDRESS:
537                 hostif_sme_enqueue(priv, SME_GET_MAC_ADDRESS);
538                 ether_addr_copy(priv->eth_addr, priv->rxp);
539                 priv->mac_address_valid = true;
540                 eth_hw_addr_set(dev, priv->eth_addr);
541                 netdev_info(dev, "MAC ADDRESS = %pM\n", priv->eth_addr);
542                 break;
543         case DOT11_PRODUCT_VERSION:
544                 priv->version_size = priv->rx_size;
545                 memcpy(priv->firmware_version, priv->rxp, priv->rx_size);
546                 priv->firmware_version[priv->rx_size] = '\0';
547                 netdev_info(dev, "firmware ver. = %s\n",
548                             priv->firmware_version);
549                 hostif_sme_enqueue(priv, SME_GET_PRODUCT_VERSION);
550                 /* wake_up_interruptible_all(&priv->confirm_wait); */
551                 complete(&priv->confirm_wait);
552                 break;
553         case LOCAL_GAIN:
554                 memcpy(&priv->gain, priv->rxp, sizeof(priv->gain));
555                 netdev_dbg(priv->net_dev, "tx_mode=%d, rx_mode=%d, tx_gain=%d, rx_gain=%d\n",
556                            priv->gain.tx_mode, priv->gain.rx_mode,
557                            priv->gain.tx_gain, priv->gain.rx_gain);
558                 break;
559         case LOCAL_EEPROM_SUM:
560                 memcpy(&priv->eeprom_sum, priv->rxp, sizeof(priv->eeprom_sum));
561                 if (priv->eeprom_sum.type != 0 &&
562                     priv->eeprom_sum.type != 1) {
563                         netdev_err(dev, "LOCAL_EEPROM_SUM error!\n");
564                         return;
565                 }
566                 priv->eeprom_checksum = (priv->eeprom_sum.type == 0) ?
567                                          EEPROM_CHECKSUM_NONE :
568                                          (priv->eeprom_sum.result == 0) ?
569                                          EEPROM_NG : EEPROM_OK;
570                 break;
571         default:
572                 netdev_err(priv->net_dev, "mib_attribute=%08x\n",
573                            (unsigned int)mib_attribute);
574                 break;
575         }
576 }
577
578 static
579 void hostif_mib_set_confirm(struct ks_wlan_private *priv)
580 {
581         u32 mib_status;
582         u32 mib_attribute;
583
584         mib_status = get_dword(priv);
585         mib_attribute = get_dword(priv);
586
587         if (mib_status) {
588                 /* in case of error */
589                 netdev_err(priv->net_dev, "error :: attribute=%08X, status=%08X\n",
590                            mib_attribute, mib_status);
591         }
592
593         switch (mib_attribute) {
594         case DOT11_RTS_THRESHOLD:
595                 hostif_sme_enqueue(priv, SME_RTS_THRESHOLD_CONFIRM);
596                 break;
597         case DOT11_FRAGMENTATION_THRESHOLD:
598                 hostif_sme_enqueue(priv, SME_FRAGMENTATION_THRESHOLD_CONFIRM);
599                 break;
600         case DOT11_WEP_DEFAULT_KEY_ID:
601                 if (!priv->wpa.wpa_enabled)
602                         hostif_sme_enqueue(priv, SME_WEP_INDEX_CONFIRM);
603                 break;
604         case DOT11_WEP_DEFAULT_KEY_VALUE1:
605                 if (priv->wpa.rsn_enabled)
606                         hostif_sme_enqueue(priv, SME_SET_PMK_TSC);
607                 else
608                         hostif_sme_enqueue(priv, SME_WEP_KEY1_CONFIRM);
609                 break;
610         case DOT11_WEP_DEFAULT_KEY_VALUE2:
611                 if (priv->wpa.rsn_enabled)
612                         hostif_sme_enqueue(priv, SME_SET_GMK1_TSC);
613                 else
614                         hostif_sme_enqueue(priv, SME_WEP_KEY2_CONFIRM);
615                 break;
616         case DOT11_WEP_DEFAULT_KEY_VALUE3:
617                 if (priv->wpa.rsn_enabled)
618                         hostif_sme_enqueue(priv, SME_SET_GMK2_TSC);
619                 else
620                         hostif_sme_enqueue(priv, SME_WEP_KEY3_CONFIRM);
621                 break;
622         case DOT11_WEP_DEFAULT_KEY_VALUE4:
623                 if (!priv->wpa.rsn_enabled)
624                         hostif_sme_enqueue(priv, SME_WEP_KEY4_CONFIRM);
625                 break;
626         case DOT11_PRIVACY_INVOKED:
627                 if (!priv->wpa.rsn_enabled)
628                         hostif_sme_enqueue(priv, SME_WEP_FLAG_CONFIRM);
629                 break;
630         case DOT11_RSN_ENABLED:
631                 hostif_sme_enqueue(priv, SME_RSN_ENABLED_CONFIRM);
632                 break;
633         case LOCAL_RSN_MODE:
634                 hostif_sme_enqueue(priv, SME_RSN_MODE_CONFIRM);
635                 break;
636         case LOCAL_MULTICAST_ADDRESS:
637                 hostif_sme_enqueue(priv, SME_MULTICAST_REQUEST);
638                 break;
639         case LOCAL_MULTICAST_FILTER:
640                 hostif_sme_enqueue(priv, SME_MULTICAST_CONFIRM);
641                 break;
642         case LOCAL_CURRENTADDRESS:
643                 priv->mac_address_valid = true;
644                 break;
645         case DOT11_RSN_CONFIG_MULTICAST_CIPHER:
646                 hostif_sme_enqueue(priv, SME_RSN_MCAST_CONFIRM);
647                 break;
648         case DOT11_RSN_CONFIG_UNICAST_CIPHER:
649                 hostif_sme_enqueue(priv, SME_RSN_UCAST_CONFIRM);
650                 break;
651         case DOT11_RSN_CONFIG_AUTH_SUITE:
652                 hostif_sme_enqueue(priv, SME_RSN_AUTH_CONFIRM);
653                 break;
654         case DOT11_GMK1_TSC:
655                 if (atomic_read(&priv->psstatus.snooze_guard))
656                         atomic_set(&priv->psstatus.snooze_guard, 0);
657                 break;
658         case DOT11_GMK2_TSC:
659                 if (atomic_read(&priv->psstatus.snooze_guard))
660                         atomic_set(&priv->psstatus.snooze_guard, 0);
661                 break;
662         case DOT11_PMK_TSC:
663         case LOCAL_PMK:
664         case LOCAL_GAIN:
665         case LOCAL_WPS_ENABLE:
666         case LOCAL_WPS_PROBE_REQ:
667         case LOCAL_REGION:
668         default:
669                 break;
670         }
671 }
672
673 static
674 void hostif_power_mgmt_confirm(struct ks_wlan_private *priv)
675 {
676         if (priv->reg.power_mgmt > POWER_MGMT_ACTIVE &&
677             priv->reg.operation_mode == MODE_INFRASTRUCTURE) {
678                 atomic_set(&priv->psstatus.confirm_wait, 0);
679                 priv->dev_state = DEVICE_STATE_SLEEP;
680                 ks_wlan_hw_power_save(priv);
681         } else {
682                 priv->dev_state = DEVICE_STATE_READY;
683         }
684 }
685
686 static
687 void hostif_sleep_confirm(struct ks_wlan_private *priv)
688 {
689         atomic_set(&priv->sleepstatus.doze_request, 1);
690         queue_delayed_work(priv->wq, &priv->rw_dwork, 1);
691 }
692
693 static
694 void hostif_start_confirm(struct ks_wlan_private *priv)
695 {
696         union iwreq_data wrqu;
697
698         wrqu.data.length = 0;
699         wrqu.data.flags = 0;
700         wrqu.ap_addr.sa_family = ARPHRD_ETHER;
701         if (is_connect_status(priv->connect_status)) {
702                 eth_zero_addr(wrqu.ap_addr.sa_data);
703                 wireless_send_event(priv->net_dev, SIOCGIWAP, &wrqu, NULL);
704         }
705         netdev_dbg(priv->net_dev, " scan_ind_count=%d\n", priv->scan_ind_count);
706         hostif_sme_enqueue(priv, SME_START_CONFIRM);
707 }
708
709 static
710 void hostif_connect_indication(struct ks_wlan_private *priv)
711 {
712         u16 connect_code;
713         unsigned int tmp = 0;
714         unsigned int old_status = priv->connect_status;
715         struct net_device *netdev = priv->net_dev;
716         union iwreq_data wrqu0;
717
718         connect_code = get_word(priv);
719
720         switch (connect_code) {
721         case RESULT_CONNECT:
722                 if (!(priv->connect_status & FORCE_DISCONNECT))
723                         netif_carrier_on(netdev);
724                 tmp = FORCE_DISCONNECT & priv->connect_status;
725                 priv->connect_status = tmp + CONNECT_STATUS;
726                 break;
727         case RESULT_DISCONNECT:
728                 netif_carrier_off(netdev);
729                 tmp = FORCE_DISCONNECT & priv->connect_status;
730                 priv->connect_status = tmp + DISCONNECT_STATUS;
731                 break;
732         default:
733                 netdev_dbg(priv->net_dev, "unknown connect_code=%d :: scan_ind_count=%d\n",
734                            connect_code, priv->scan_ind_count);
735                 netif_carrier_off(netdev);
736                 tmp = FORCE_DISCONNECT & priv->connect_status;
737                 priv->connect_status = tmp + DISCONNECT_STATUS;
738                 break;
739         }
740
741         get_current_ap(priv, (struct link_ap_info *)priv->rxp);
742         if (is_connect_status(priv->connect_status) &&
743             is_disconnect_status(old_status)) {
744                 /* for power save */
745                 atomic_set(&priv->psstatus.snooze_guard, 0);
746                 atomic_set(&priv->psstatus.confirm_wait, 0);
747         }
748         ks_wlan_do_power_save(priv);
749
750         wrqu0.data.length = 0;
751         wrqu0.data.flags = 0;
752         wrqu0.ap_addr.sa_family = ARPHRD_ETHER;
753         if (is_disconnect_status(priv->connect_status) &&
754             is_connect_status(old_status)) {
755                 eth_zero_addr(wrqu0.ap_addr.sa_data);
756                 netdev_dbg(priv->net_dev, "disconnect :: scan_ind_count=%d\n",
757                            priv->scan_ind_count);
758                 wireless_send_event(netdev, SIOCGIWAP, &wrqu0, NULL);
759         }
760         priv->scan_ind_count = 0;
761 }
762
763 static
764 void hostif_scan_indication(struct ks_wlan_private *priv)
765 {
766         int i;
767         struct ap_info *ap_info;
768
769         netdev_dbg(priv->net_dev,
770                    "scan_ind_count = %d\n", priv->scan_ind_count);
771         ap_info = (struct ap_info *)(priv->rxp);
772
773         if (priv->scan_ind_count) {
774                 /* bssid check */
775                 for (i = 0; i < priv->aplist.size; i++) {
776                         u8 *bssid = priv->aplist.ap[i].bssid;
777
778                         if (ether_addr_equal(ap_info->bssid, bssid))
779                                 continue;
780
781                         if (ap_info->frame_type == IEEE80211_STYPE_PROBE_RESP)
782                                 get_ap_information(priv, ap_info,
783                                                    &priv->aplist.ap[i]);
784                         return;
785                 }
786         }
787         priv->scan_ind_count++;
788         if (priv->scan_ind_count < LOCAL_APLIST_MAX + 1) {
789                 netdev_dbg(priv->net_dev, " scan_ind_count=%d :: aplist.size=%d\n",
790                            priv->scan_ind_count, priv->aplist.size);
791                 get_ap_information(priv, (struct ap_info *)(priv->rxp),
792                                    &priv->aplist.ap[priv->scan_ind_count - 1]);
793                 priv->aplist.size = priv->scan_ind_count;
794         } else {
795                 netdev_dbg(priv->net_dev, " count over :: scan_ind_count=%d\n",
796                            priv->scan_ind_count);
797         }
798 }
799
800 static
801 void hostif_stop_confirm(struct ks_wlan_private *priv)
802 {
803         unsigned int tmp = 0;
804         unsigned int old_status = priv->connect_status;
805         struct net_device *netdev = priv->net_dev;
806         union iwreq_data wrqu0;
807
808         if (priv->dev_state == DEVICE_STATE_SLEEP)
809                 priv->dev_state = DEVICE_STATE_READY;
810
811         /* disconnect indication */
812         if (is_connect_status(priv->connect_status)) {
813                 netif_carrier_off(netdev);
814                 tmp = FORCE_DISCONNECT & priv->connect_status;
815                 priv->connect_status = tmp | DISCONNECT_STATUS;
816                 netdev_info(netdev, "IWEVENT: disconnect\n");
817
818                 wrqu0.data.length = 0;
819                 wrqu0.data.flags = 0;
820                 wrqu0.ap_addr.sa_family = ARPHRD_ETHER;
821                 if (is_disconnect_status(priv->connect_status) &&
822                     is_connect_status(old_status)) {
823                         eth_zero_addr(wrqu0.ap_addr.sa_data);
824                         netdev_info(netdev, "IWEVENT: disconnect\n");
825                         wireless_send_event(netdev, SIOCGIWAP, &wrqu0, NULL);
826                 }
827                 priv->scan_ind_count = 0;
828         }
829
830         hostif_sme_enqueue(priv, SME_STOP_CONFIRM);
831 }
832
833 static
834 void hostif_ps_adhoc_set_confirm(struct ks_wlan_private *priv)
835 {
836         priv->infra_status = 0; /* infrastructure mode cancel */
837         hostif_sme_enqueue(priv, SME_MODE_SET_CONFIRM);
838 }
839
840 static
841 void hostif_infrastructure_set_confirm(struct ks_wlan_private *priv)
842 {
843         get_word(priv); /* result_code */
844         priv->infra_status = 1; /* infrastructure mode set */
845         hostif_sme_enqueue(priv, SME_MODE_SET_CONFIRM);
846 }
847
848 static
849 void hostif_adhoc_set_confirm(struct ks_wlan_private *priv)
850 {
851         priv->infra_status = 1; /* infrastructure mode set */
852         hostif_sme_enqueue(priv, SME_MODE_SET_CONFIRM);
853 }
854
855 static
856 void hostif_associate_indication(struct ks_wlan_private *priv)
857 {
858         struct association_request *assoc_req;
859         struct association_response *assoc_resp;
860         unsigned char *pb;
861         union iwreq_data wrqu;
862         char buf[IW_CUSTOM_MAX];
863         char *pbuf = &buf[0];
864         int i;
865
866         static const char associnfo_leader0[] = "ASSOCINFO(ReqIEs=";
867         static const char associnfo_leader1[] = " RespIEs=";
868
869         assoc_req = (struct association_request *)(priv->rxp);
870         assoc_resp = (struct association_response *)(assoc_req + 1);
871         pb = (unsigned char *)(assoc_resp + 1);
872
873         memset(&wrqu, 0, sizeof(wrqu));
874         memcpy(pbuf, associnfo_leader0, sizeof(associnfo_leader0) - 1);
875         wrqu.data.length += sizeof(associnfo_leader0) - 1;
876         pbuf += sizeof(associnfo_leader0) - 1;
877
878         for (i = 0; i < le16_to_cpu(assoc_req->req_ies_size); i++)
879                 pbuf += sprintf(pbuf, "%02x", *(pb + i));
880         wrqu.data.length += (le16_to_cpu(assoc_req->req_ies_size)) * 2;
881
882         memcpy(pbuf, associnfo_leader1, sizeof(associnfo_leader1) - 1);
883         wrqu.data.length += sizeof(associnfo_leader1) - 1;
884         pbuf += sizeof(associnfo_leader1) - 1;
885
886         pb += le16_to_cpu(assoc_req->req_ies_size);
887         for (i = 0; i < le16_to_cpu(assoc_resp->resp_ies_size); i++)
888                 pbuf += sprintf(pbuf, "%02x", *(pb + i));
889         wrqu.data.length += (le16_to_cpu(assoc_resp->resp_ies_size)) * 2;
890
891         pbuf += sprintf(pbuf, ")");
892         wrqu.data.length += 1;
893
894         wireless_send_event(priv->net_dev, IWEVCUSTOM, &wrqu, buf);
895 }
896
897 static
898 void hostif_bss_scan_confirm(struct ks_wlan_private *priv)
899 {
900         u32 result_code;
901         struct net_device *dev = priv->net_dev;
902         union iwreq_data wrqu;
903
904         result_code = get_dword(priv);
905         netdev_dbg(priv->net_dev, "result=%d :: scan_ind_count=%d\n",
906                    result_code, priv->scan_ind_count);
907
908         priv->sme_i.sme_flag &= ~SME_AP_SCAN;
909         hostif_sme_enqueue(priv, SME_BSS_SCAN_CONFIRM);
910
911         wrqu.data.length = 0;
912         wrqu.data.flags = 0;
913         wireless_send_event(dev, SIOCGIWSCAN, &wrqu, NULL);
914         priv->scan_ind_count = 0;
915 }
916
917 static
918 void hostif_phy_information_confirm(struct ks_wlan_private *priv)
919 {
920         struct iw_statistics *wstats = &priv->wstats;
921         u8 rssi, signal;
922         u8 link_speed;
923         u32 transmitted_frame_count, received_fragment_count;
924         u32 failed_count, fcs_error_count;
925
926         rssi = get_byte(priv);
927         signal = get_byte(priv);
928         get_byte(priv); /* noise */
929         link_speed = get_byte(priv);
930         transmitted_frame_count = get_dword(priv);
931         received_fragment_count = get_dword(priv);
932         failed_count = get_dword(priv);
933         fcs_error_count = get_dword(priv);
934
935         netdev_dbg(priv->net_dev, "phyinfo confirm rssi=%d signal=%d\n",
936                    rssi, signal);
937         priv->current_rate = (link_speed & RATE_MASK);
938         wstats->qual.qual = signal;
939         wstats->qual.level = 256 - rssi;
940         wstats->qual.noise = 0; /* invalid noise value */
941         wstats->qual.updated = IW_QUAL_ALL_UPDATED | IW_QUAL_DBM;
942
943         netdev_dbg(priv->net_dev, "\n    rssi=%u\n"
944                    "    signal=%u\n"
945                    "    link_speed=%ux500Kbps\n"
946                    "    transmitted_frame_count=%u\n"
947                    "    received_fragment_count=%u\n"
948                    "    failed_count=%u\n"
949                    "    fcs_error_count=%u\n",
950                    rssi, signal, link_speed, transmitted_frame_count,
951                    received_fragment_count, failed_count, fcs_error_count);
952         /* wake_up_interruptible_all(&priv->confirm_wait); */
953         complete(&priv->confirm_wait);
954 }
955
956 static
957 void hostif_mic_failure_confirm(struct ks_wlan_private *priv)
958 {
959         netdev_dbg(priv->net_dev, "mic_failure=%u\n",
960                    priv->wpa.mic_failure.failure);
961         hostif_sme_enqueue(priv, SME_MIC_FAILURE_CONFIRM);
962 }
963
964 static
965 void hostif_event_check(struct ks_wlan_private *priv)
966 {
967         u16 event;
968
969         event = get_word(priv);
970         switch (event) {
971         case HIF_DATA_IND:
972                 hostif_data_indication(priv);
973                 break;
974         case HIF_MIB_GET_CONF:
975                 hostif_mib_get_confirm(priv);
976                 break;
977         case HIF_MIB_SET_CONF:
978                 hostif_mib_set_confirm(priv);
979                 break;
980         case HIF_POWER_MGMT_CONF:
981                 hostif_power_mgmt_confirm(priv);
982                 break;
983         case HIF_SLEEP_CONF:
984                 hostif_sleep_confirm(priv);
985                 break;
986         case HIF_START_CONF:
987                 hostif_start_confirm(priv);
988                 break;
989         case HIF_CONNECT_IND:
990                 hostif_connect_indication(priv);
991                 break;
992         case HIF_STOP_CONF:
993                 hostif_stop_confirm(priv);
994                 break;
995         case HIF_PS_ADH_SET_CONF:
996                 hostif_ps_adhoc_set_confirm(priv);
997                 break;
998         case HIF_INFRA_SET_CONF:
999         case HIF_INFRA_SET2_CONF:
1000                 hostif_infrastructure_set_confirm(priv);
1001                 break;
1002         case HIF_ADH_SET_CONF:
1003         case HIF_ADH_SET2_CONF:
1004                 hostif_adhoc_set_confirm(priv);
1005                 break;
1006         case HIF_ASSOC_INFO_IND:
1007                 hostif_associate_indication(priv);
1008                 break;
1009         case HIF_MIC_FAILURE_CONF:
1010                 hostif_mic_failure_confirm(priv);
1011                 break;
1012         case HIF_SCAN_CONF:
1013                 hostif_bss_scan_confirm(priv);
1014                 break;
1015         case HIF_PHY_INFO_CONF:
1016         case HIF_PHY_INFO_IND:
1017                 hostif_phy_information_confirm(priv);
1018                 break;
1019         case HIF_SCAN_IND:
1020                 hostif_scan_indication(priv);
1021                 break;
1022         case HIF_AP_SET_CONF:
1023         default:
1024                 netdev_err(priv->net_dev, "undefined event[%04X]\n", event);
1025                 /* wake_up_all(&priv->confirm_wait); */
1026                 complete(&priv->confirm_wait);
1027                 break;
1028         }
1029
1030         /* add event to hostt buffer */
1031         priv->hostt.buff[priv->hostt.qtail] = event;
1032         priv->hostt.qtail = (priv->hostt.qtail + 1) % SME_EVENT_BUFF_SIZE;
1033 }
1034
1035 /* allocate size bytes, set header size and event */
1036 static void *hostif_generic_request(size_t size, int event)
1037 {
1038         struct hostif_hdr *p;
1039
1040         p = kzalloc(hif_align_size(size), GFP_ATOMIC);
1041         if (!p)
1042                 return NULL;
1043
1044         p->size = cpu_to_le16(size - sizeof(p->size));
1045         p->event = cpu_to_le16(event);
1046
1047         return p;
1048 }
1049
1050 int hostif_data_request(struct ks_wlan_private *priv, struct sk_buff *skb)
1051 {
1052         unsigned int skb_len = 0;
1053         unsigned char *buffer = NULL;
1054         unsigned int length = 0;
1055         struct hostif_data_request *pp;
1056         unsigned char *p;
1057         unsigned short eth_proto;
1058         struct ether_hdr *eth_hdr;
1059         unsigned short keyinfo = 0;
1060         struct ieee802_1x_hdr *aa1x_hdr;
1061         struct wpa_eapol_key *eap_key;
1062         struct ethhdr *eth;
1063         size_t size;
1064         int ret;
1065
1066         skb_len = skb->len;
1067         if (skb_len > ETH_FRAME_LEN) {
1068                 netdev_err(priv->net_dev, "bad length skb_len=%d\n", skb_len);
1069                 ret = -EOVERFLOW;
1070                 goto err_kfree_skb;
1071         }
1072
1073         if (is_disconnect_status(priv->connect_status) ||
1074             (priv->connect_status & FORCE_DISCONNECT) ||
1075             priv->wpa.mic_failure.stop) {
1076                 if (netif_queue_stopped(priv->net_dev))
1077                         netif_wake_queue(priv->net_dev);
1078
1079                 dev_kfree_skb(skb);
1080
1081                 return 0;
1082         }
1083
1084         /* power save wakeup */
1085         if (atomic_read(&priv->psstatus.status) == PS_SNOOZE) {
1086                 if (!netif_queue_stopped(priv->net_dev))
1087                         netif_stop_queue(priv->net_dev);
1088         }
1089
1090         size = sizeof(*pp) + 6 + skb_len + 8;
1091         pp = kmalloc(hif_align_size(size), GFP_ATOMIC);
1092         if (!pp) {
1093                 ret = -ENOMEM;
1094                 goto err_kfree_skb;
1095         }
1096
1097         p = (unsigned char *)pp->data;
1098
1099         buffer = skb->data;
1100         length = skb->len;
1101
1102         /* skb check */
1103         eth = (struct ethhdr *)skb->data;
1104         if (!ether_addr_equal(&priv->eth_addr[0], eth->h_source)) {
1105                 netdev_err(priv->net_dev,
1106                            "Invalid mac address: ethernet->h_source=%pM\n",
1107                            eth->h_source);
1108                 ret = -ENXIO;
1109                 goto err_kfree;
1110         }
1111
1112         /* dest and src MAC address copy */
1113         size = ETH_ALEN * 2;
1114         memcpy(p, buffer, size);
1115         p += size;
1116         buffer += size;
1117         length -= size;
1118
1119         /* EtherType/Length check */
1120         if (*(buffer + 1) + (*buffer << 8) > 1500) {
1121                 /* ProtocolEAP = *(buffer+1) + (*buffer << 8); */
1122                 /* SAP/CTL/OUI(6 byte) add */
1123                 *p++ = 0xAA;    /* DSAP */
1124                 *p++ = 0xAA;    /* SSAP */
1125                 *p++ = 0x03;    /* CTL */
1126                 *p++ = 0x00;    /* OUI ("000000") */
1127                 *p++ = 0x00;    /* OUI ("000000") */
1128                 *p++ = 0x00;    /* OUI ("000000") */
1129                 skb_len += 6;
1130         } else {
1131                 /* Length(2 byte) delete */
1132                 buffer += 2;
1133                 length -= 2;
1134                 skb_len -= 2;
1135         }
1136
1137         /* pp->data copy */
1138         memcpy(p, buffer, length);
1139
1140         p += length;
1141
1142         /* for WPA */
1143         eth_hdr = (struct ether_hdr *)&pp->data[0];
1144         eth_proto = ntohs(eth_hdr->h_proto);
1145
1146         /* for MIC FAILURE REPORT check */
1147         if (eth_proto == ETH_P_PAE &&
1148             priv->wpa.mic_failure.failure > 0) {
1149                 aa1x_hdr = (struct ieee802_1x_hdr *)(eth_hdr + 1);
1150                 if (aa1x_hdr->type == IEEE802_1X_TYPE_EAPOL_KEY) {
1151                         eap_key = (struct wpa_eapol_key *)(aa1x_hdr + 1);
1152                         keyinfo = ntohs(eap_key->key_info);
1153                 }
1154         }
1155
1156         if (priv->wpa.rsn_enabled && priv->wpa.key[0].key_len) {
1157                 /* no encryption */
1158                 if (eth_proto == ETH_P_PAE &&
1159                     priv->wpa.key[1].key_len == 0 &&
1160                     priv->wpa.key[2].key_len == 0 &&
1161                     priv->wpa.key[3].key_len == 0) {
1162                         pp->auth_type = cpu_to_le16(TYPE_AUTH);
1163                 } else {
1164                         if (priv->wpa.pairwise_suite == IW_AUTH_CIPHER_TKIP) {
1165                                 u8 mic[MICHAEL_MIC_LEN];
1166
1167                                 ret = michael_mic(priv->wpa.key[0].tx_mic_key,
1168                                                   &pp->data[0], skb_len,
1169                                                   0, mic);
1170                                 if (ret < 0)
1171                                         goto err_kfree;
1172
1173                                 memcpy(p, mic, sizeof(mic));
1174                                 length += sizeof(mic);
1175                                 skb_len += sizeof(mic);
1176                                 p += sizeof(mic);
1177                                 pp->auth_type =
1178                                     cpu_to_le16(TYPE_DATA);
1179                         } else if (priv->wpa.pairwise_suite ==
1180                                    IW_AUTH_CIPHER_CCMP) {
1181                                 pp->auth_type =
1182                                     cpu_to_le16(TYPE_DATA);
1183                         }
1184                 }
1185         } else {
1186                 if (eth_proto == ETH_P_PAE)
1187                         pp->auth_type = cpu_to_le16(TYPE_AUTH);
1188                 else
1189                         pp->auth_type = cpu_to_le16(TYPE_DATA);
1190         }
1191
1192         /* header value set */
1193         pp->header.size =
1194             cpu_to_le16((sizeof(*pp) - sizeof(pp->header.size) + skb_len));
1195         pp->header.event = cpu_to_le16(HIF_DATA_REQ);
1196
1197         /* tx request */
1198         ret = ks_wlan_hw_tx(priv, pp, hif_align_size(sizeof(*pp) + skb_len),
1199                             send_packet_complete, skb);
1200
1201         /* MIC FAILURE REPORT check */
1202         if (eth_proto == ETH_P_PAE &&
1203             priv->wpa.mic_failure.failure > 0) {
1204                 if (keyinfo & WPA_KEY_INFO_ERROR &&
1205                     keyinfo & WPA_KEY_INFO_REQUEST) {
1206                         netdev_err(priv->net_dev,
1207                                    "MIC ERROR Report SET : %04X\n", keyinfo);
1208                         hostif_sme_enqueue(priv, SME_MIC_FAILURE_REQUEST);
1209                 }
1210                 if (priv->wpa.mic_failure.failure == 2)
1211                         priv->wpa.mic_failure.stop = 1;
1212         }
1213
1214         return ret;
1215
1216 err_kfree:
1217         kfree(pp);
1218 err_kfree_skb:
1219         dev_kfree_skb(skb);
1220
1221         return ret;
1222 }
1223
1224 static inline void ps_confirm_wait_inc(struct ks_wlan_private *priv)
1225 {
1226         if (atomic_read(&priv->psstatus.status) > PS_ACTIVE_SET)
1227                 atomic_inc(&priv->psstatus.confirm_wait);
1228 }
1229
1230 static inline void send_request_to_device(struct ks_wlan_private *priv,
1231                                           void *data, size_t size)
1232 {
1233         ps_confirm_wait_inc(priv);
1234         ks_wlan_hw_tx(priv, data, size, NULL, NULL);
1235 }
1236
1237 static void hostif_mib_get_request(struct ks_wlan_private *priv,
1238                                    u32 mib_attribute)
1239 {
1240         struct hostif_mib_get_request *pp;
1241
1242         pp = hostif_generic_request(sizeof(*pp), HIF_MIB_GET_REQ);
1243         if (!pp)
1244                 return;
1245
1246         pp->mib_attribute = cpu_to_le32(mib_attribute);
1247
1248         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1249 }
1250
1251 static void hostif_mib_set_request(struct ks_wlan_private *priv,
1252                                    enum mib_attribute attr,
1253                                    enum mib_data_type type,
1254                                    void *data, size_t size)
1255 {
1256         struct hostif_mib_set_request_t *pp;
1257
1258         if (priv->dev_state < DEVICE_STATE_BOOT)
1259                 return;
1260
1261         pp = hostif_generic_request(sizeof(*pp), HIF_MIB_SET_REQ);
1262         if (!pp)
1263                 return;
1264
1265         pp->mib_attribute = cpu_to_le32(attr);
1266         pp->mib_value.size = cpu_to_le16(size);
1267         pp->mib_value.type = cpu_to_le16(type);
1268         memcpy(&pp->mib_value.body, data, size);
1269
1270         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp) + size));
1271 }
1272
1273 static inline void hostif_mib_set_request_int(struct ks_wlan_private *priv,
1274                                               enum mib_attribute attr, int val)
1275 {
1276         __le32 v = cpu_to_le32(val);
1277         size_t size = sizeof(v);
1278
1279         hostif_mib_set_request(priv, attr, MIB_VALUE_TYPE_INT, &v, size);
1280 }
1281
1282 static inline void hostif_mib_set_request_bool(struct ks_wlan_private *priv,
1283                                                enum mib_attribute attr,
1284                                                bool val)
1285 {
1286         __le32 v = cpu_to_le32(val);
1287         size_t size = sizeof(v);
1288
1289         hostif_mib_set_request(priv, attr, MIB_VALUE_TYPE_BOOL, &v, size);
1290 }
1291
1292 static inline void hostif_mib_set_request_ostring(struct ks_wlan_private *priv,
1293                                                   enum mib_attribute attr,
1294                                                   void *data, size_t size)
1295 {
1296         hostif_mib_set_request(priv, attr, MIB_VALUE_TYPE_OSTRING, data, size);
1297 }
1298
1299 static
1300 void hostif_start_request(struct ks_wlan_private *priv, unsigned char mode)
1301 {
1302         struct hostif_start_request *pp;
1303
1304         pp = hostif_generic_request(sizeof(*pp), HIF_START_REQ);
1305         if (!pp)
1306                 return;
1307
1308         pp->mode = cpu_to_le16(mode);
1309
1310         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1311
1312         priv->aplist.size = 0;
1313         priv->scan_ind_count = 0;
1314 }
1315
1316 static __le16 ks_wlan_cap(struct ks_wlan_private *priv)
1317 {
1318         u16 capability = 0x0000;
1319
1320         if (priv->reg.preamble == SHORT_PREAMBLE)
1321                 capability |= WLAN_CAPABILITY_SHORT_PREAMBLE;
1322
1323         capability &= ~(WLAN_CAPABILITY_PBCC);  /* pbcc not support */
1324
1325         if (priv->reg.phy_type != D_11B_ONLY_MODE) {
1326                 capability |= WLAN_CAPABILITY_SHORT_SLOT_TIME;
1327                 capability &= ~(WLAN_CAPABILITY_DSSS_OFDM);
1328         }
1329
1330         return cpu_to_le16(capability);
1331 }
1332
1333 static void init_request(struct ks_wlan_private *priv,
1334                          struct hostif_request *req)
1335 {
1336         req->phy_type = cpu_to_le16(priv->reg.phy_type);
1337         req->cts_mode = cpu_to_le16(priv->reg.cts_mode);
1338         req->scan_type = cpu_to_le16(priv->reg.scan_type);
1339         req->rate_set.size = priv->reg.rate_set.size;
1340         req->capability = ks_wlan_cap(priv);
1341         memcpy(&req->rate_set.body[0], &priv->reg.rate_set.body[0],
1342                priv->reg.rate_set.size);
1343 }
1344
1345 static
1346 void hostif_ps_adhoc_set_request(struct ks_wlan_private *priv)
1347 {
1348         struct hostif_ps_adhoc_set_request *pp;
1349
1350         pp = hostif_generic_request(sizeof(*pp), HIF_PS_ADH_SET_REQ);
1351         if (!pp)
1352                 return;
1353
1354         init_request(priv, &pp->request);
1355         pp->channel = cpu_to_le16(priv->reg.channel);
1356
1357         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1358 }
1359
1360 static
1361 void hostif_infrastructure_set_request(struct ks_wlan_private *priv, int event)
1362 {
1363         struct hostif_infrastructure_set_request *pp;
1364
1365         pp = hostif_generic_request(sizeof(*pp), event);
1366         if (!pp)
1367                 return;
1368
1369         init_request(priv, &pp->request);
1370         pp->ssid.size = priv->reg.ssid.size;
1371         memcpy(&pp->ssid.body[0], &priv->reg.ssid.body[0], priv->reg.ssid.size);
1372         pp->beacon_lost_count =
1373             cpu_to_le16(priv->reg.beacon_lost_count);
1374         pp->auth_type = cpu_to_le16(priv->reg.authenticate_type);
1375
1376         pp->channel_list.body[0] = 1;
1377         pp->channel_list.body[1] = 8;
1378         pp->channel_list.body[2] = 2;
1379         pp->channel_list.body[3] = 9;
1380         pp->channel_list.body[4] = 3;
1381         pp->channel_list.body[5] = 10;
1382         pp->channel_list.body[6] = 4;
1383         pp->channel_list.body[7] = 11;
1384         pp->channel_list.body[8] = 5;
1385         pp->channel_list.body[9] = 12;
1386         pp->channel_list.body[10] = 6;
1387         pp->channel_list.body[11] = 13;
1388         pp->channel_list.body[12] = 7;
1389         if (priv->reg.phy_type == D_11G_ONLY_MODE) {
1390                 pp->channel_list.size = 13;
1391         } else {
1392                 pp->channel_list.body[13] = 14;
1393                 pp->channel_list.size = 14;
1394         }
1395
1396         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1397 }
1398
1399 static
1400 void hostif_adhoc_set_request(struct ks_wlan_private *priv)
1401 {
1402         struct hostif_adhoc_set_request *pp;
1403
1404         pp = hostif_generic_request(sizeof(*pp), HIF_ADH_SET_REQ);
1405         if (!pp)
1406                 return;
1407
1408         init_request(priv, &pp->request);
1409         pp->channel = cpu_to_le16(priv->reg.channel);
1410         pp->ssid.size = priv->reg.ssid.size;
1411         memcpy(&pp->ssid.body[0], &priv->reg.ssid.body[0], priv->reg.ssid.size);
1412
1413         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1414 }
1415
1416 static
1417 void hostif_adhoc_set2_request(struct ks_wlan_private *priv)
1418 {
1419         struct hostif_adhoc_set2_request *pp;
1420
1421         pp = hostif_generic_request(sizeof(*pp), HIF_ADH_SET_REQ);
1422         if (!pp)
1423                 return;
1424
1425         init_request(priv, &pp->request);
1426         pp->ssid.size = priv->reg.ssid.size;
1427         memcpy(&pp->ssid.body[0], &priv->reg.ssid.body[0], priv->reg.ssid.size);
1428
1429         pp->channel_list.body[0] = priv->reg.channel;
1430         pp->channel_list.size = 1;
1431         memcpy(pp->bssid, priv->reg.bssid, ETH_ALEN);
1432
1433         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1434 }
1435
1436 static
1437 void hostif_stop_request(struct ks_wlan_private *priv)
1438 {
1439         struct hostif_stop_request *pp;
1440
1441         pp = hostif_generic_request(sizeof(*pp), HIF_STOP_REQ);
1442         if (!pp)
1443                 return;
1444
1445         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1446 }
1447
1448 static
1449 void hostif_phy_information_request(struct ks_wlan_private *priv)
1450 {
1451         struct hostif_phy_information_request *pp;
1452
1453         pp = hostif_generic_request(sizeof(*pp), HIF_PHY_INFO_REQ);
1454         if (!pp)
1455                 return;
1456
1457         if (priv->reg.phy_info_timer) {
1458                 pp->type = cpu_to_le16(TIME_TYPE);
1459                 pp->time = cpu_to_le16(priv->reg.phy_info_timer);
1460         } else {
1461                 pp->type = cpu_to_le16(NORMAL_TYPE);
1462                 pp->time = cpu_to_le16(0);
1463         }
1464
1465         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1466 }
1467
1468 static
1469 void hostif_power_mgmt_request(struct ks_wlan_private *priv,
1470                                u32 mode, u32 wake_up, u32 receive_dtims)
1471 {
1472         struct hostif_power_mgmt_request *pp;
1473
1474         pp = hostif_generic_request(sizeof(*pp), HIF_POWER_MGMT_REQ);
1475         if (!pp)
1476                 return;
1477
1478         pp->mode = cpu_to_le32(mode);
1479         pp->wake_up = cpu_to_le32(wake_up);
1480         pp->receive_dtims = cpu_to_le32(receive_dtims);
1481
1482         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1483 }
1484
1485 static
1486 void hostif_sleep_request(struct ks_wlan_private *priv,
1487                           enum sleep_mode_type mode)
1488 {
1489         struct hostif_sleep_request *pp;
1490
1491         if (mode == SLP_SLEEP) {
1492                 pp = hostif_generic_request(sizeof(*pp), HIF_SLEEP_REQ);
1493                 if (!pp)
1494                         return;
1495
1496                 send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1497         } else if (mode == SLP_ACTIVE) {
1498                 atomic_set(&priv->sleepstatus.wakeup_request, 1);
1499                 queue_delayed_work(priv->wq, &priv->rw_dwork, 1);
1500         } else {
1501                 netdev_err(priv->net_dev, "invalid mode %ld\n", (long)mode);
1502                 return;
1503         }
1504 }
1505
1506 static
1507 void hostif_bss_scan_request(struct ks_wlan_private *priv,
1508                              unsigned long scan_type, u8 *scan_ssid,
1509                              u8 scan_ssid_len)
1510 {
1511         struct hostif_bss_scan_request *pp;
1512
1513         pp = hostif_generic_request(sizeof(*pp), HIF_SCAN_REQ);
1514         if (!pp)
1515                 return;
1516
1517         pp->scan_type = scan_type;
1518
1519         pp->ch_time_min = cpu_to_le32(110);     /* default value */
1520         pp->ch_time_max = cpu_to_le32(130);     /* default value */
1521         pp->channel_list.body[0] = 1;
1522         pp->channel_list.body[1] = 8;
1523         pp->channel_list.body[2] = 2;
1524         pp->channel_list.body[3] = 9;
1525         pp->channel_list.body[4] = 3;
1526         pp->channel_list.body[5] = 10;
1527         pp->channel_list.body[6] = 4;
1528         pp->channel_list.body[7] = 11;
1529         pp->channel_list.body[8] = 5;
1530         pp->channel_list.body[9] = 12;
1531         pp->channel_list.body[10] = 6;
1532         pp->channel_list.body[11] = 13;
1533         pp->channel_list.body[12] = 7;
1534         if (priv->reg.phy_type == D_11G_ONLY_MODE) {
1535                 pp->channel_list.size = 13;
1536         } else {
1537                 pp->channel_list.body[13] = 14;
1538                 pp->channel_list.size = 14;
1539         }
1540         pp->ssid.size = 0;
1541
1542         /* specified SSID SCAN */
1543         if (scan_ssid_len > 0 && scan_ssid_len <= 32) {
1544                 pp->ssid.size = scan_ssid_len;
1545                 memcpy(&pp->ssid.body[0], scan_ssid, scan_ssid_len);
1546         }
1547
1548         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1549
1550         priv->aplist.size = 0;
1551         priv->scan_ind_count = 0;
1552 }
1553
1554 static
1555 void hostif_mic_failure_request(struct ks_wlan_private *priv,
1556                                 u16 failure_count, u16 timer)
1557 {
1558         struct hostif_mic_failure_request *pp;
1559
1560         pp = hostif_generic_request(sizeof(*pp), HIF_MIC_FAILURE_REQ);
1561         if (!pp)
1562                 return;
1563
1564         pp->failure_count = cpu_to_le16(failure_count);
1565         pp->timer = cpu_to_le16(timer);
1566
1567         send_request_to_device(priv, pp, hif_align_size(sizeof(*pp)));
1568 }
1569
1570 /* Device I/O Receive indicate */
1571 static void devio_rec_ind(struct ks_wlan_private *priv, unsigned char *p,
1572                           unsigned int size)
1573 {
1574         if (!priv->is_device_open)
1575                 return;
1576
1577         spin_lock(&priv->dev_read_lock);
1578         priv->dev_data[atomic_read(&priv->rec_count)] = p;
1579         priv->dev_size[atomic_read(&priv->rec_count)] = size;
1580
1581         if (atomic_read(&priv->event_count) != DEVICE_STOCK_COUNT) {
1582                 /* rx event count inc */
1583                 atomic_inc(&priv->event_count);
1584         }
1585         atomic_inc(&priv->rec_count);
1586         if (atomic_read(&priv->rec_count) == DEVICE_STOCK_COUNT)
1587                 atomic_set(&priv->rec_count, 0);
1588
1589         wake_up_interruptible_all(&priv->devread_wait);
1590
1591         spin_unlock(&priv->dev_read_lock);
1592 }
1593
1594 void hostif_receive(struct ks_wlan_private *priv, unsigned char *p,
1595                     unsigned int size)
1596 {
1597         devio_rec_ind(priv, p, size);
1598
1599         priv->rxp = p;
1600         priv->rx_size = size;
1601
1602         if (get_word(priv) == priv->rx_size)
1603                 hostif_event_check(priv);
1604 }
1605
1606 static void hostif_sme_set_wep(struct ks_wlan_private *priv, int type)
1607 {
1608         switch (type) {
1609         case SME_WEP_INDEX_REQUEST:
1610                 hostif_mib_set_request_int(priv, DOT11_WEP_DEFAULT_KEY_ID,
1611                                            priv->reg.wep_index);
1612                 break;
1613         case SME_WEP_KEY1_REQUEST:
1614                 if (priv->wpa.wpa_enabled)
1615                         return;
1616                 hostif_mib_set_request_ostring(priv,
1617                                                DOT11_WEP_DEFAULT_KEY_VALUE1,
1618                                                &priv->reg.wep_key[0].val[0],
1619                                                priv->reg.wep_key[0].size);
1620                 break;
1621         case SME_WEP_KEY2_REQUEST:
1622                 if (priv->wpa.wpa_enabled)
1623                         return;
1624                 hostif_mib_set_request_ostring(priv,
1625                                                DOT11_WEP_DEFAULT_KEY_VALUE2,
1626                                                &priv->reg.wep_key[1].val[0],
1627                                                priv->reg.wep_key[1].size);
1628                 break;
1629         case SME_WEP_KEY3_REQUEST:
1630                 if (priv->wpa.wpa_enabled)
1631                         return;
1632                 hostif_mib_set_request_ostring(priv,
1633                                                DOT11_WEP_DEFAULT_KEY_VALUE3,
1634                                                &priv->reg.wep_key[2].val[0],
1635                                                priv->reg.wep_key[2].size);
1636                 break;
1637         case SME_WEP_KEY4_REQUEST:
1638                 if (priv->wpa.wpa_enabled)
1639                         return;
1640                 hostif_mib_set_request_ostring(priv,
1641                                                DOT11_WEP_DEFAULT_KEY_VALUE4,
1642                                                &priv->reg.wep_key[3].val[0],
1643                                                priv->reg.wep_key[3].size);
1644                 break;
1645         case SME_WEP_FLAG_REQUEST:
1646                 hostif_mib_set_request_bool(priv, DOT11_PRIVACY_INVOKED,
1647                                             priv->reg.privacy_invoked);
1648                 break;
1649         }
1650 }
1651
1652 struct wpa_suite {
1653         __le16 size;
1654         unsigned char suite[4][CIPHER_ID_LEN];
1655 } __packed;
1656
1657 struct rsn_mode {
1658         __le32 rsn_mode;
1659         __le16 rsn_capability;
1660 } __packed;
1661
1662 static void hostif_sme_set_rsn(struct ks_wlan_private *priv, int type)
1663 {
1664         struct wpa_suite wpa_suite;
1665         struct rsn_mode rsn_mode;
1666         size_t size;
1667         u32 mode;
1668         const u8 *buf = NULL;
1669
1670         memset(&wpa_suite, 0, sizeof(wpa_suite));
1671
1672         switch (type) {
1673         case SME_RSN_UCAST_REQUEST:
1674                 wpa_suite.size = cpu_to_le16(1);
1675                 switch (priv->wpa.pairwise_suite) {
1676                 case IW_AUTH_CIPHER_NONE:
1677                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1678                                 CIPHER_ID_WPA2_NONE : CIPHER_ID_WPA_NONE;
1679                         break;
1680                 case IW_AUTH_CIPHER_WEP40:
1681                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1682                                 CIPHER_ID_WPA2_WEP40 : CIPHER_ID_WPA_WEP40;
1683                         break;
1684                 case IW_AUTH_CIPHER_TKIP:
1685                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1686                                 CIPHER_ID_WPA2_TKIP : CIPHER_ID_WPA_TKIP;
1687                         break;
1688                 case IW_AUTH_CIPHER_CCMP:
1689                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1690                                 CIPHER_ID_WPA2_CCMP : CIPHER_ID_WPA_CCMP;
1691                         break;
1692                 case IW_AUTH_CIPHER_WEP104:
1693                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1694                                 CIPHER_ID_WPA2_WEP104 : CIPHER_ID_WPA_WEP104;
1695                         break;
1696                 }
1697
1698                 if (buf)
1699                         memcpy(&wpa_suite.suite[0][0], buf, CIPHER_ID_LEN);
1700                 size = sizeof(wpa_suite.size) +
1701                        (CIPHER_ID_LEN * le16_to_cpu(wpa_suite.size));
1702                 hostif_mib_set_request_ostring(priv,
1703                                                DOT11_RSN_CONFIG_UNICAST_CIPHER,
1704                                                &wpa_suite, size);
1705                 break;
1706         case SME_RSN_MCAST_REQUEST:
1707                 switch (priv->wpa.group_suite) {
1708                 case IW_AUTH_CIPHER_NONE:
1709                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1710                                 CIPHER_ID_WPA2_NONE : CIPHER_ID_WPA_NONE;
1711                         break;
1712                 case IW_AUTH_CIPHER_WEP40:
1713                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1714                                 CIPHER_ID_WPA2_WEP40 : CIPHER_ID_WPA_WEP40;
1715                         break;
1716                 case IW_AUTH_CIPHER_TKIP:
1717                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1718                                 CIPHER_ID_WPA2_TKIP : CIPHER_ID_WPA_TKIP;
1719                         break;
1720                 case IW_AUTH_CIPHER_CCMP:
1721                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1722                                 CIPHER_ID_WPA2_CCMP : CIPHER_ID_WPA_CCMP;
1723                         break;
1724                 case IW_AUTH_CIPHER_WEP104:
1725                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1726                                 CIPHER_ID_WPA2_WEP104 : CIPHER_ID_WPA_WEP104;
1727                         break;
1728                 }
1729                 if (buf)
1730                         memcpy(&wpa_suite.suite[0][0], buf, CIPHER_ID_LEN);
1731                 hostif_mib_set_request_ostring(priv,
1732                                                DOT11_RSN_CONFIG_MULTICAST_CIPHER,
1733                                                &wpa_suite.suite[0][0],
1734                                                CIPHER_ID_LEN);
1735                 break;
1736         case SME_RSN_AUTH_REQUEST:
1737                 wpa_suite.size = cpu_to_le16(1);
1738                 switch (priv->wpa.key_mgmt_suite) {
1739                 case IW_AUTH_KEY_MGMT_802_1X:
1740                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1741                                 KEY_MGMT_ID_WPA2_1X : KEY_MGMT_ID_WPA_1X;
1742                         break;
1743                 case IW_AUTH_KEY_MGMT_PSK:
1744                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1745                                 KEY_MGMT_ID_WPA2_PSK : KEY_MGMT_ID_WPA_PSK;
1746                         break;
1747                 case 0:
1748                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1749                                 KEY_MGMT_ID_WPA2_NONE : KEY_MGMT_ID_WPA_NONE;
1750                         break;
1751                 case 4:
1752                         buf = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1753                                 KEY_MGMT_ID_WPA2_WPANONE :
1754                                 KEY_MGMT_ID_WPA_WPANONE;
1755                         break;
1756                 }
1757
1758                 if (buf)
1759                         memcpy(&wpa_suite.suite[0][0], buf, KEY_MGMT_ID_LEN);
1760                 size = sizeof(wpa_suite.size) +
1761                        (KEY_MGMT_ID_LEN * le16_to_cpu(wpa_suite.size));
1762                 hostif_mib_set_request_ostring(priv,
1763                                                DOT11_RSN_CONFIG_AUTH_SUITE,
1764                                                &wpa_suite, size);
1765                 break;
1766         case SME_RSN_ENABLED_REQUEST:
1767                 hostif_mib_set_request_bool(priv, DOT11_RSN_ENABLED,
1768                                             priv->wpa.rsn_enabled);
1769                 break;
1770         case SME_RSN_MODE_REQUEST:
1771                 mode = (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA2) ?
1772                         RSN_MODE_WPA2 :
1773                         (priv->wpa.version == IW_AUTH_WPA_VERSION_WPA) ?
1774                          RSN_MODE_WPA : RSN_MODE_NONE;
1775                 rsn_mode.rsn_mode = cpu_to_le32(mode);
1776                 rsn_mode.rsn_capability = cpu_to_le16(0);
1777                 hostif_mib_set_request_ostring(priv, LOCAL_RSN_MODE,
1778                                                &rsn_mode, sizeof(rsn_mode));
1779                 break;
1780         }
1781 }
1782
1783 static
1784 void hostif_sme_mode_setup(struct ks_wlan_private *priv)
1785 {
1786         unsigned char rate_size;
1787         unsigned char rate_octet[RATE_SET_MAX_SIZE];
1788         int i = 0;
1789
1790         /* rate setting if rate segging is auto for changing phy_type (#94) */
1791         if (priv->reg.tx_rate == TX_RATE_FULL_AUTO) {
1792                 if (priv->reg.phy_type == D_11B_ONLY_MODE) {
1793                         priv->reg.rate_set.body[3] = TX_RATE_11M;
1794                         priv->reg.rate_set.body[2] = TX_RATE_5M;
1795                         priv->reg.rate_set.body[1] = TX_RATE_2M | BASIC_RATE;
1796                         priv->reg.rate_set.body[0] = TX_RATE_1M | BASIC_RATE;
1797                         priv->reg.rate_set.size = 4;
1798                 } else {        /* D_11G_ONLY_MODE or D_11BG_COMPATIBLE_MODE */
1799                         priv->reg.rate_set.body[11] = TX_RATE_54M;
1800                         priv->reg.rate_set.body[10] = TX_RATE_48M;
1801                         priv->reg.rate_set.body[9] = TX_RATE_36M;
1802                         priv->reg.rate_set.body[8] = TX_RATE_18M;
1803                         priv->reg.rate_set.body[7] = TX_RATE_9M;
1804                         priv->reg.rate_set.body[6] = TX_RATE_24M | BASIC_RATE;
1805                         priv->reg.rate_set.body[5] = TX_RATE_12M | BASIC_RATE;
1806                         priv->reg.rate_set.body[4] = TX_RATE_6M | BASIC_RATE;
1807                         priv->reg.rate_set.body[3] = TX_RATE_11M | BASIC_RATE;
1808                         priv->reg.rate_set.body[2] = TX_RATE_5M | BASIC_RATE;
1809                         priv->reg.rate_set.body[1] = TX_RATE_2M | BASIC_RATE;
1810                         priv->reg.rate_set.body[0] = TX_RATE_1M | BASIC_RATE;
1811                         priv->reg.rate_set.size = 12;
1812                 }
1813         }
1814
1815         /* rate mask by phy setting */
1816         if (priv->reg.phy_type == D_11B_ONLY_MODE) {
1817                 for (i = 0; i < priv->reg.rate_set.size; i++) {
1818                         if (!is_11b_rate(priv->reg.rate_set.body[i]))
1819                                 break;
1820
1821                         if ((priv->reg.rate_set.body[i] & RATE_MASK) >= TX_RATE_5M) {
1822                                 rate_octet[i] = priv->reg.rate_set.body[i] &
1823                                                 RATE_MASK;
1824                         } else {
1825                                 rate_octet[i] = priv->reg.rate_set.body[i];
1826                         }
1827                 }
1828
1829         } else {        /* D_11G_ONLY_MODE or D_11BG_COMPATIBLE_MODE */
1830                 for (i = 0; i < priv->reg.rate_set.size; i++) {
1831                         if (!is_11bg_rate(priv->reg.rate_set.body[i]))
1832                                 break;
1833
1834                         if (is_ofdm_ext_rate(priv->reg.rate_set.body[i])) {
1835                                 rate_octet[i] = priv->reg.rate_set.body[i] &
1836                                                 RATE_MASK;
1837                         } else {
1838                                 rate_octet[i] = priv->reg.rate_set.body[i];
1839                         }
1840                 }
1841         }
1842         rate_size = i;
1843         if (rate_size == 0) {
1844                 if (priv->reg.phy_type == D_11G_ONLY_MODE)
1845                         rate_octet[0] = TX_RATE_6M | BASIC_RATE;
1846                 else
1847                         rate_octet[0] = TX_RATE_2M | BASIC_RATE;
1848                 rate_size = 1;
1849         }
1850
1851         /* rate set update */
1852         priv->reg.rate_set.size = rate_size;
1853         memcpy(&priv->reg.rate_set.body[0], &rate_octet[0], rate_size);
1854
1855         switch (priv->reg.operation_mode) {
1856         case MODE_PSEUDO_ADHOC:
1857                 hostif_ps_adhoc_set_request(priv);
1858                 break;
1859         case MODE_INFRASTRUCTURE:
1860                 if (!is_valid_ether_addr((u8 *)priv->reg.bssid)) {
1861                         hostif_infrastructure_set_request(priv,
1862                                                           HIF_INFRA_SET_REQ);
1863                 } else {
1864                         hostif_infrastructure_set_request(priv,
1865                                                           HIF_INFRA_SET2_REQ);
1866                         netdev_dbg(priv->net_dev,
1867                                    "Infra bssid = %pM\n", priv->reg.bssid);
1868                 }
1869                 break;
1870         case MODE_ADHOC:
1871                 if (!is_valid_ether_addr((u8 *)priv->reg.bssid)) {
1872                         hostif_adhoc_set_request(priv);
1873                 } else {
1874                         hostif_adhoc_set2_request(priv);
1875                         netdev_dbg(priv->net_dev,
1876                                    "Adhoc bssid = %pM\n", priv->reg.bssid);
1877                 }
1878                 break;
1879         default:
1880                 break;
1881         }
1882 }
1883
1884 static
1885 void hostif_sme_multicast_set(struct ks_wlan_private *priv)
1886 {
1887         struct net_device *dev = priv->net_dev;
1888         int mc_count;
1889         struct netdev_hw_addr *ha;
1890         char set_address[NIC_MAX_MCAST_LIST * ETH_ALEN];
1891         int i = 0;
1892
1893         spin_lock(&priv->multicast_spin);
1894
1895         memset(set_address, 0, NIC_MAX_MCAST_LIST * ETH_ALEN);
1896
1897         if (dev->flags & IFF_PROMISC) {
1898                 hostif_mib_set_request_int(priv, LOCAL_MULTICAST_FILTER,
1899                                            MCAST_FILTER_PROMISC);
1900                 goto spin_unlock;
1901         }
1902
1903         if ((netdev_mc_count(dev) > NIC_MAX_MCAST_LIST) ||
1904             (dev->flags & IFF_ALLMULTI)) {
1905                 hostif_mib_set_request_int(priv, LOCAL_MULTICAST_FILTER,
1906                                            MCAST_FILTER_MCASTALL);
1907                 goto spin_unlock;
1908         }
1909
1910         if (priv->sme_i.sme_flag & SME_MULTICAST) {
1911                 mc_count = netdev_mc_count(dev);
1912                 netdev_for_each_mc_addr(ha, dev) {
1913                         ether_addr_copy(&set_address[i * ETH_ALEN], ha->addr);
1914                         i++;
1915                 }
1916                 priv->sme_i.sme_flag &= ~SME_MULTICAST;
1917                 hostif_mib_set_request_ostring(priv, LOCAL_MULTICAST_ADDRESS,
1918                                                &set_address[0],
1919                                                ETH_ALEN * mc_count);
1920         } else {
1921                 priv->sme_i.sme_flag |= SME_MULTICAST;
1922                 hostif_mib_set_request_int(priv, LOCAL_MULTICAST_FILTER,
1923                                            MCAST_FILTER_MCAST);
1924         }
1925
1926 spin_unlock:
1927         spin_unlock(&priv->multicast_spin);
1928 }
1929
1930 static void hostif_sme_power_mgmt_set(struct ks_wlan_private *priv)
1931 {
1932         u32 mode, wake_up, receive_dtims;
1933
1934         if (priv->reg.power_mgmt != POWER_MGMT_SAVE1 &&
1935             priv->reg.power_mgmt != POWER_MGMT_SAVE2) {
1936                 mode = POWER_ACTIVE;
1937                 wake_up = 0;
1938                 receive_dtims = 0;
1939         } else {
1940                 mode = (priv->reg.operation_mode == MODE_INFRASTRUCTURE) ?
1941                         POWER_SAVE : POWER_ACTIVE;
1942                 wake_up = 0;
1943                 receive_dtims = (priv->reg.operation_mode == MODE_INFRASTRUCTURE &&
1944                                  priv->reg.power_mgmt == POWER_MGMT_SAVE2);
1945         }
1946
1947         hostif_power_mgmt_request(priv, mode, wake_up, receive_dtims);
1948 }
1949
1950 static void hostif_sme_sleep_set(struct ks_wlan_private *priv)
1951 {
1952         if (priv->sleep_mode != SLP_SLEEP &&
1953             priv->sleep_mode != SLP_ACTIVE)
1954                 return;
1955
1956         hostif_sleep_request(priv, priv->sleep_mode);
1957 }
1958
1959 static
1960 void hostif_sme_set_key(struct ks_wlan_private *priv, int type)
1961 {
1962         switch (type) {
1963         case SME_SET_FLAG:
1964                 hostif_mib_set_request_bool(priv, DOT11_PRIVACY_INVOKED,
1965                                             priv->reg.privacy_invoked);
1966                 break;
1967         case SME_SET_TXKEY:
1968                 hostif_mib_set_request_int(priv, DOT11_WEP_DEFAULT_KEY_ID,
1969                                            priv->wpa.txkey);
1970                 break;
1971         case SME_SET_KEY1:
1972                 hostif_mib_set_request_ostring(priv,
1973                                                DOT11_WEP_DEFAULT_KEY_VALUE1,
1974                                                &priv->wpa.key[0].key_val[0],
1975                                                priv->wpa.key[0].key_len);
1976                 break;
1977         case SME_SET_KEY2:
1978                 hostif_mib_set_request_ostring(priv,
1979                                                DOT11_WEP_DEFAULT_KEY_VALUE2,
1980                                                &priv->wpa.key[1].key_val[0],
1981                                                priv->wpa.key[1].key_len);
1982                 break;
1983         case SME_SET_KEY3:
1984                 hostif_mib_set_request_ostring(priv,
1985                                                DOT11_WEP_DEFAULT_KEY_VALUE3,
1986                                                &priv->wpa.key[2].key_val[0],
1987                                                priv->wpa.key[2].key_len);
1988                 break;
1989         case SME_SET_KEY4:
1990                 hostif_mib_set_request_ostring(priv,
1991                                                DOT11_WEP_DEFAULT_KEY_VALUE4,
1992                                                &priv->wpa.key[3].key_val[0],
1993                                                priv->wpa.key[3].key_len);
1994                 break;
1995         case SME_SET_PMK_TSC:
1996                 hostif_mib_set_request_ostring(priv, DOT11_PMK_TSC,
1997                                                &priv->wpa.key[0].rx_seq[0],
1998                                                WPA_RX_SEQ_LEN);
1999                 break;
2000         case SME_SET_GMK1_TSC:
2001                 hostif_mib_set_request_ostring(priv, DOT11_GMK1_TSC,
2002                                                &priv->wpa.key[1].rx_seq[0],
2003                                                WPA_RX_SEQ_LEN);
2004                 break;
2005         case SME_SET_GMK2_TSC:
2006                 hostif_mib_set_request_ostring(priv, DOT11_GMK2_TSC,
2007                                                &priv->wpa.key[2].rx_seq[0],
2008                                                WPA_RX_SEQ_LEN);
2009                 break;
2010         }
2011 }
2012
2013 static
2014 void hostif_sme_set_pmksa(struct ks_wlan_private *priv)
2015 {
2016         struct pmk_cache {
2017                 __le16 size;
2018                 struct {
2019                         u8 bssid[ETH_ALEN];
2020                         u8 pmkid[IW_PMKID_LEN];
2021                 } __packed list[PMK_LIST_MAX];
2022         } __packed pmkcache;
2023         struct pmk *pmk;
2024         size_t size;
2025         int i = 0;
2026
2027         list_for_each_entry(pmk, &priv->pmklist.head, list) {
2028                 if (i >= PMK_LIST_MAX)
2029                         break;
2030                 ether_addr_copy(pmkcache.list[i].bssid, pmk->bssid);
2031                 memcpy(pmkcache.list[i].pmkid, pmk->pmkid, IW_PMKID_LEN);
2032                 i++;
2033         }
2034         pmkcache.size = cpu_to_le16(priv->pmklist.size);
2035         size = sizeof(priv->pmklist.size) +
2036                ((ETH_ALEN + IW_PMKID_LEN) * priv->pmklist.size);
2037         hostif_mib_set_request_ostring(priv, LOCAL_PMK, &pmkcache, size);
2038 }
2039
2040 /* execute sme */
2041 static void hostif_sme_execute(struct ks_wlan_private *priv, int event)
2042 {
2043         u16 failure;
2044
2045         switch (event) {
2046         case SME_START:
2047                 if (priv->dev_state == DEVICE_STATE_BOOT)
2048                         hostif_mib_get_request(priv, DOT11_MAC_ADDRESS);
2049                 break;
2050         case SME_MULTICAST_REQUEST:
2051                 hostif_sme_multicast_set(priv);
2052                 break;
2053         case SME_MACADDRESS_SET_REQUEST:
2054                 hostif_mib_set_request_ostring(priv, LOCAL_CURRENTADDRESS,
2055                                                &priv->eth_addr[0], ETH_ALEN);
2056                 break;
2057         case SME_BSS_SCAN_REQUEST:
2058                 hostif_bss_scan_request(priv, priv->reg.scan_type,
2059                                         priv->scan_ssid, priv->scan_ssid_len);
2060                 break;
2061         case SME_POW_MNGMT_REQUEST:
2062                 hostif_sme_power_mgmt_set(priv);
2063                 break;
2064         case SME_PHY_INFO_REQUEST:
2065                 hostif_phy_information_request(priv);
2066                 break;
2067         case SME_MIC_FAILURE_REQUEST:
2068                 failure = priv->wpa.mic_failure.failure;
2069                 if (failure != 1 && failure != 2) {
2070                         netdev_err(priv->net_dev,
2071                                    "SME_MIC_FAILURE_REQUEST: failure count=%u error?\n",
2072                                    failure);
2073                         return;
2074                 }
2075                 hostif_mic_failure_request(priv, failure - 1, (failure == 1) ?
2076                                             0 : priv->wpa.mic_failure.counter);
2077                 break;
2078         case SME_MIC_FAILURE_CONFIRM:
2079                 if (priv->wpa.mic_failure.failure == 2) {
2080                         if (priv->wpa.mic_failure.stop)
2081                                 priv->wpa.mic_failure.stop = 0;
2082                         priv->wpa.mic_failure.failure = 0;
2083                         hostif_start_request(priv, priv->reg.operation_mode);
2084                 }
2085                 break;
2086         case SME_GET_MAC_ADDRESS:
2087                 if (priv->dev_state == DEVICE_STATE_BOOT)
2088                         hostif_mib_get_request(priv, DOT11_PRODUCT_VERSION);
2089                 break;
2090         case SME_GET_PRODUCT_VERSION:
2091                 if (priv->dev_state == DEVICE_STATE_BOOT)
2092                         priv->dev_state = DEVICE_STATE_PREINIT;
2093                 break;
2094         case SME_STOP_REQUEST:
2095                 hostif_stop_request(priv);
2096                 break;
2097         case SME_RTS_THRESHOLD_REQUEST:
2098                 hostif_mib_set_request_int(priv, DOT11_RTS_THRESHOLD,
2099                                            priv->reg.rts);
2100                 break;
2101         case SME_FRAGMENTATION_THRESHOLD_REQUEST:
2102                 hostif_mib_set_request_int(priv, DOT11_FRAGMENTATION_THRESHOLD,
2103                                            priv->reg.fragment);
2104                 break;
2105         case SME_WEP_INDEX_REQUEST:
2106         case SME_WEP_KEY1_REQUEST:
2107         case SME_WEP_KEY2_REQUEST:
2108         case SME_WEP_KEY3_REQUEST:
2109         case SME_WEP_KEY4_REQUEST:
2110         case SME_WEP_FLAG_REQUEST:
2111                 hostif_sme_set_wep(priv, event);
2112                 break;
2113         case SME_RSN_UCAST_REQUEST:
2114         case SME_RSN_MCAST_REQUEST:
2115         case SME_RSN_AUTH_REQUEST:
2116         case SME_RSN_ENABLED_REQUEST:
2117         case SME_RSN_MODE_REQUEST:
2118                 hostif_sme_set_rsn(priv, event);
2119                 break;
2120         case SME_SET_FLAG:
2121         case SME_SET_TXKEY:
2122         case SME_SET_KEY1:
2123         case SME_SET_KEY2:
2124         case SME_SET_KEY3:
2125         case SME_SET_KEY4:
2126         case SME_SET_PMK_TSC:
2127         case SME_SET_GMK1_TSC:
2128         case SME_SET_GMK2_TSC:
2129                 hostif_sme_set_key(priv, event);
2130                 break;
2131         case SME_SET_PMKSA:
2132                 hostif_sme_set_pmksa(priv);
2133                 break;
2134         case SME_WPS_ENABLE_REQUEST:
2135                 hostif_mib_set_request_int(priv, LOCAL_WPS_ENABLE,
2136                                            priv->wps.wps_enabled);
2137                 break;
2138         case SME_WPS_PROBE_REQUEST:
2139                 hostif_mib_set_request_ostring(priv, LOCAL_WPS_PROBE_REQ,
2140                                                priv->wps.ie, priv->wps.ielen);
2141                 break;
2142         case SME_MODE_SET_REQUEST:
2143                 hostif_sme_mode_setup(priv);
2144                 break;
2145         case SME_SET_GAIN:
2146                 hostif_mib_set_request_ostring(priv, LOCAL_GAIN,
2147                                                &priv->gain, sizeof(priv->gain));
2148                 break;
2149         case SME_GET_GAIN:
2150                 hostif_mib_get_request(priv, LOCAL_GAIN);
2151                 break;
2152         case SME_GET_EEPROM_CKSUM:
2153                 priv->eeprom_checksum = EEPROM_FW_NOT_SUPPORT;  /* initialize */
2154                 hostif_mib_get_request(priv, LOCAL_EEPROM_SUM);
2155                 break;
2156         case SME_START_REQUEST:
2157                 hostif_start_request(priv, priv->reg.operation_mode);
2158                 break;
2159         case SME_START_CONFIRM:
2160                 /* for power save */
2161                 atomic_set(&priv->psstatus.snooze_guard, 0);
2162                 atomic_set(&priv->psstatus.confirm_wait, 0);
2163                 if (priv->dev_state == DEVICE_STATE_PREINIT)
2164                         priv->dev_state = DEVICE_STATE_INIT;
2165                 /* wake_up_interruptible_all(&priv->confirm_wait); */
2166                 complete(&priv->confirm_wait);
2167                 break;
2168         case SME_SLEEP_REQUEST:
2169                 hostif_sme_sleep_set(priv);
2170                 break;
2171         case SME_SET_REGION:
2172                 hostif_mib_set_request_int(priv, LOCAL_REGION, priv->region);
2173                 break;
2174         case SME_MULTICAST_CONFIRM:
2175         case SME_BSS_SCAN_CONFIRM:
2176         case SME_POW_MNGMT_CONFIRM:
2177         case SME_PHY_INFO_CONFIRM:
2178         case SME_STOP_CONFIRM:
2179         case SME_RTS_THRESHOLD_CONFIRM:
2180         case SME_FRAGMENTATION_THRESHOLD_CONFIRM:
2181         case SME_WEP_INDEX_CONFIRM:
2182         case SME_WEP_KEY1_CONFIRM:
2183         case SME_WEP_KEY2_CONFIRM:
2184         case SME_WEP_KEY3_CONFIRM:
2185         case SME_WEP_KEY4_CONFIRM:
2186         case SME_WEP_FLAG_CONFIRM:
2187         case SME_RSN_UCAST_CONFIRM:
2188         case SME_RSN_MCAST_CONFIRM:
2189         case SME_RSN_AUTH_CONFIRM:
2190         case SME_RSN_ENABLED_CONFIRM:
2191         case SME_RSN_MODE_CONFIRM:
2192         case SME_MODE_SET_CONFIRM:
2193         case SME_TERMINATE:
2194         default:
2195                 break;
2196         }
2197 }
2198
2199 static void hostif_sme_work(struct work_struct *work)
2200 {
2201         struct ks_wlan_private *priv;
2202
2203         priv = container_of(work, struct ks_wlan_private, sme_work);
2204
2205         if (priv->dev_state < DEVICE_STATE_BOOT)
2206                 return;
2207
2208         if (cnt_smeqbody(priv) <= 0)
2209                 return;
2210
2211         hostif_sme_execute(priv, priv->sme_i.event_buff[priv->sme_i.qhead]);
2212         inc_smeqhead(priv);
2213         if (cnt_smeqbody(priv) > 0)
2214                 schedule_work(&priv->sme_work);
2215 }
2216
2217 /* send to Station Management Entity module */
2218 void hostif_sme_enqueue(struct ks_wlan_private *priv, u16 event)
2219 {
2220         /* enqueue sme event */
2221         if (cnt_smeqbody(priv) < (SME_EVENT_BUFF_SIZE - 1)) {
2222                 priv->sme_i.event_buff[priv->sme_i.qtail] = event;
2223                 inc_smeqtail(priv);
2224         } else {
2225                 /* in case of buffer overflow */
2226                 netdev_err(priv->net_dev, "sme queue buffer overflow\n");
2227         }
2228
2229         schedule_work(&priv->sme_work);
2230 }
2231
2232 static inline void hostif_aplist_init(struct ks_wlan_private *priv)
2233 {
2234         size_t size = LOCAL_APLIST_MAX * sizeof(struct local_ap);
2235
2236         priv->aplist.size = 0;
2237         memset(&priv->aplist.ap[0], 0, size);
2238 }
2239
2240 static inline void hostif_status_init(struct ks_wlan_private *priv)
2241 {
2242         priv->infra_status = 0;
2243         priv->current_rate = 4;
2244         priv->connect_status = DISCONNECT_STATUS;
2245 }
2246
2247 static inline void hostif_sme_init(struct ks_wlan_private *priv)
2248 {
2249         priv->sme_i.sme_status = SME_IDLE;
2250         priv->sme_i.qhead = 0;
2251         priv->sme_i.qtail = 0;
2252         spin_lock_init(&priv->sme_i.sme_spin);
2253         priv->sme_i.sme_flag = 0;
2254         INIT_WORK(&priv->sme_work, hostif_sme_work);
2255 }
2256
2257 static inline void hostif_wpa_init(struct ks_wlan_private *priv)
2258 {
2259         memset(&priv->wpa, 0, sizeof(priv->wpa));
2260         priv->wpa.rsn_enabled = false;
2261         priv->wpa.mic_failure.failure = 0;
2262         priv->wpa.mic_failure.last_failure_time = 0;
2263         priv->wpa.mic_failure.stop = 0;
2264 }
2265
2266 static inline void hostif_power_save_init(struct ks_wlan_private *priv)
2267 {
2268         atomic_set(&priv->psstatus.status, PS_NONE);
2269         atomic_set(&priv->psstatus.confirm_wait, 0);
2270         atomic_set(&priv->psstatus.snooze_guard, 0);
2271         init_completion(&priv->psstatus.wakeup_wait);
2272         INIT_WORK(&priv->wakeup_work, ks_wlan_hw_wakeup_task);
2273 }
2274
2275 static inline void hostif_pmklist_init(struct ks_wlan_private *priv)
2276 {
2277         int i;
2278
2279         memset(&priv->pmklist, 0, sizeof(priv->pmklist));
2280         INIT_LIST_HEAD(&priv->pmklist.head);
2281         for (i = 0; i < PMK_LIST_MAX; i++)
2282                 INIT_LIST_HEAD(&priv->pmklist.pmk[i].list);
2283 }
2284
2285 static inline void hostif_counters_init(struct ks_wlan_private *priv)
2286 {
2287         priv->dev_count = 0;
2288         atomic_set(&priv->event_count, 0);
2289         atomic_set(&priv->rec_count, 0);
2290 }
2291
2292 int hostif_init(struct ks_wlan_private *priv)
2293 {
2294         hostif_aplist_init(priv);
2295         hostif_status_init(priv);
2296
2297         spin_lock_init(&priv->multicast_spin);
2298         spin_lock_init(&priv->dev_read_lock);
2299         init_waitqueue_head(&priv->devread_wait);
2300
2301         hostif_counters_init(priv);
2302         hostif_power_save_init(priv);
2303         hostif_wpa_init(priv);
2304         hostif_pmklist_init(priv);
2305         hostif_sme_init(priv);
2306
2307         return 0;
2308 }
2309
2310 void hostif_exit(struct ks_wlan_private *priv)
2311 {
2312         cancel_work_sync(&priv->sme_work);
2313 }