p2p_fsm.c 98 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089
  1. /*
  2. ** Id: //Department/DaVinci/TRUNK/WiFi_P2P_Driver/mgmt/p2p_fsm.c#61
  3. */
  4. /*! \file "p2p_fsm.c"
  5. \brief This file defines the FSM for P2P Module.
  6. This file defines the FSM for P2P Module.
  7. */
  8. /*
  9. ** Log: p2p_fsm.c
  10. **
  11. ** 12 20 2012 yuche.tsai
  12. ** [ALPS00410124] [Rose][Free Test][KE][rlmUpdateParamsForAP]The device reboot automatically
  13. ** and then "Fatal/Kernel" pops up during use data service.(Once)
  14. ** Fix possible NULL station record cause KE under AP mode.
  15. ** May due to variable uninitial.
  16. ** Review: http://mtksap20:8080/go?page=NewReview&reviewid=49970
  17. **
  18. ** 09 12 2012 wcpadmin
  19. ** [ALPS00276400] Remove MTK copyright and legal header on GPL/LGPL related packages
  20. ** .
  21. **
  22. ** 08 31 2012 yuche.tsai
  23. ** [ALPS00349585] [6577JB][WiFi direct][KE]Establish p2p connection while both device have connected
  24. **to AP previously,one device reboots automatically with KE
  25. ** Fix possible KE when concurrent & disconnect.
  26. **
  27. ** 08 21 2012 yuche.tsai
  28. ** NULL
  29. ** fix disconnect indication.
  30. **
  31. ** 08 16 2012 yuche.tsai
  32. ** NULL
  33. ** Fix compile warning.
  34. **
  35. ** 08 14 2012 yuche.tsai
  36. ** NULL
  37. ** Fix p2p bug find on ALPS.JB trunk.
  38. **
  39. ** 07 27 2012 yuche.tsai
  40. ** [ALPS00324337] [ALPS.JB][Hot-Spot] Driver update for Hot-Spot
  41. ** Update for driver unload KE issue.
  42. **
  43. ** 07 26 2012 yuche.tsai
  44. ** [ALPS00324337] [ALPS.JB][Hot-Spot] Driver update for Hot-Spot
  45. ** Update driver code of ALPS.JB for hot-spot.
  46. **
  47. ** 07 19 2012 yuche.tsai
  48. ** NULL
  49. ** Code update for JB.
  50. *
  51. * 07 17 2012 yuche.tsai
  52. * NULL
  53. * Compile no error before trial run.
  54. *
  55. * 07 05 2011 yuche.tsai
  56. * [WCXRP00000821] [Volunteer Patch][WiFi Direct][Driver] WiFi Direct Connection Speed Issue
  57. * Fix the compile flag of enhancement.
  58. *
  59. * 07 05 2011 yuche.tsai
  60. * [WCXRP00000808] [Volunteer Patch][MT6620][Driver/FW] Device discoverability issue fix
  61. * Change device discoverability methodology. From driver SCAN to FW lock channel.
  62. *
  63. * 07 05 2011 yuche.tsai
  64. * [WCXRP00000821] [Volunteer Patch][WiFi Direct][Driver] WiFi Direct Connection Speed Issue
  65. * Add wifi direct connection enhancement method I, II & VI.
  66. *
  67. * 07 05 2011 yuche.tsai
  68. * [WCXRP00000833] [Volunteer Patch][WiFi Direct][Driver] Service Discovery Frame RX Indicate Issue
  69. * Fix Service Discovery Race Condition Issue.
  70. *
  71. * 06 23 2011 cp.wu
  72. * [WCXRP00000798] [MT6620 Wi-Fi][Firmware] Follow-ups for WAPI frequency offset workaround in firmware SCN module
  73. * change parameter name from PeerAddr to BSSID
  74. *
  75. * 06 21 2011 yuche.tsai
  76. * [WCXRP00000799] [Volunteer Patch][MT6620][Driver] Connection Indication Twice Issue.
  77. * Fix an issue of accepting connection of GO.
  78. *
  79. * 06 21 2011 yuche.tsai
  80. * [WCXRP00000775] [Volunteer Patch][MT6620][Driver] Dynamic enable SD capability
  81. * Drop GAS frame when SD is not enabled.
  82. *
  83. * 06 20 2011 yuche.tsai
  84. * NULL
  85. * Fix compile error.
  86. *
  87. * 06 20 2011 yuche.tsai
  88. * [WCXRP00000799] [Volunteer Patch][MT6620][Driver] Connection Indication Twice Issue.
  89. * Fix connection indication twice issue.
  90. *
  91. * 06 20 2011 cp.wu
  92. * [WCXRP00000798] [MT6620 Wi-Fi][Firmware] Follow-ups for WAPI frequency offset workaround in firmware SCN module
  93. * 1. specify target's BSSID when requesting channel privilege.
  94. * 2. pass BSSID information to firmware domain
  95. *
  96. * 06 20 2011 yuche.tsai
  97. * [WCXRP00000795] [Volunteer Patch][MT6620][Driver] GO can not connect second device issue
  98. * Solve P2P GO can not formation with second device issue.
  99. *
  100. * 06 14 2011 yuche.tsai
  101. * NULL
  102. * Change disconnect feature.
  103. *
  104. * 06 10 2011 yuche.tsai
  105. * [WCXRP00000775] [Volunteer Patch][MT6620][Driver] Dynamic enable SD capability[WCXRP00000776]
  106. * [Need Patch][MT6620][Driver] MT6620 response probe request of P2P device with P2P IE under Hot Spot mode.
  107. * 1. Dynamic enable SD capability after P2P supplicant ready.
  108. * 2. Avoid response probe respone with p2p IE when under hot spot mode.
  109. *
  110. * 06 07 2011 yuche.tsai
  111. * [WCXRP00000763] [Volunteer Patch][MT6620][Driver] RX Service Discovery Frame under AP mode Issue
  112. * Fix RX SD request under AP mode issue.
  113. *
  114. * 06 02 2011 cp.wu
  115. * [WCXRP00000681] [MT5931][Firmware] HIF code size reduction
  116. * eliminate unused parameters for SAA-FSM
  117. *
  118. * 05 26 2011 yuche.tsai
  119. * [WCXRP00000745] Support accepting connection after one Group Connection Lost.
  120. After Group Formation & lost connection, if MT6620 behave as:
  121. 1. GO: It would keep under GO state until been dissolved by supplicant.
  122. At this time, other P2P device can use join method to join this group.
  123. 2. GC: It would keep on searching target GO or target device until been dissolved by supplicant.
  124. At this time, it would ignore other P2P device formation request.
  125. --
  126. Modification: Make driver to accept GO NEGO REQ at this time, to let user decide to accept new connection or not.
  127. * [Volunteer Patch][MT6620][Driver]
  128. * Driver would indicate connection request, if password ID is not ready but connection request is issued.
  129. *
  130. * 05 18 2011 yuche.tsai
  131. * [WCXRP00000728] [Volunteer Patch][MT6620][Driver] Service Discovery Request TX issue.
  132. * A solution for both connection request & IO control.
  133. *
  134. * 05 16 2011 yuche.tsai
  135. * [WCXRP00000728] [Volunteer Patch][MT6620][Driver] Service Discovery Request TX issue.
  136. * Fix SD request can not send out issue.
  137. *
  138. * 05 09 2011 terry.wu
  139. * [WCXRP00000711] [MT6620 Wi-Fi][Driver] Set Initial value of StaType in StaRec for Hotspot Client
  140. * Set initial value of StaType in StaRec for hotspot client.
  141. *
  142. * 05 04 2011 yuche.tsai
  143. * [WCXRP00000697] [Volunteer Patch][MT6620][Driver]
  144. * Bug fix for p2p descriptor is NULL if BSS descriptor is found first.
  145. *
  146. * 05 04 2011 yuche.tsai
  147. * NULL
  148. * Support partial persistent group function.
  149. *
  150. * 05 02 2011 yuche.tsai
  151. * [WCXRP00000693] [Volunteer Patch][MT6620][Driver] Clear Formation Flag after TX lifetime timeout.
  152. * Clear formation flag after formation timeout.
  153. *
  154. * 04 20 2011 yuche.tsai
  155. * [WCXRP00000668] [Volunteer Patch][MT6620][Driver] Possible race condition
  156. * when add scan & query scan result at the same time.
  157. * Fix side effect while starting ATGO.
  158. *
  159. * 04 20 2011 yuche.tsai
  160. * NULL
  161. * Fix ASSERT issue in FW, side effect of last change.
  162. *
  163. * 04 19 2011 yuche.tsai
  164. * [WCXRP00000668] [Volunteer Patch][MT6620][Driver] Possible race condition
  165. * when add scan & query scan result at the same time.
  166. * Workaround for multiple device connection, before invitation ready.
  167. *
  168. * 04 19 2011 yuche.tsai
  169. * [WCXRP00000665] [Wifi Direct][MT6620 E4] When use Ralink's dongle to establish wifi direct connection with PBC.
  170. * But 6573 always not pop accept option to establish connection.
  171. * Support connection indication when GO NEGO REQ doesn't have configure method, instead it has PasswordID.
  172. *
  173. * 04 18 2011 yuche.tsai
  174. * NULL
  175. * Fix error.
  176. *
  177. * 04 14 2011 yuche.tsai
  178. * [WCXRP00000646] [Volunteer Patch][MT6620][FW/Driver] Sigma Test Modification for some test case.
  179. * Fix a connection issue.
  180. *
  181. * 04 14 2011 yuche.tsai
  182. * [WCXRP00000646] [Volunteer Patch][MT6620][FW/Driver] Sigma Test Modification for some test case.
  183. * Fix the channel issue of AP mode.
  184. *
  185. * 04 14 2011 yuche.tsai
  186. * [WCXRP00000646] [Volunteer Patch][MT6620][FW/Driver] Sigma Test Modification for some test case.
  187. * Connection flow refine for Sigma test.
  188. *
  189. * 04 09 2011 yuche.tsai
  190. * [WCXRP00000624] [Volunteer Patch][MT6620][Driver] Add device discoverability support for GO.
  191. * Fix Device discoverability related issue.
  192. *
  193. * 04 09 2011 yuche.tsai
  194. * [WCXRP00000624] [Volunteer Patch][MT6620][Driver] Add device discoverability support for GO.
  195. * Fix bug for Device Discoverability.
  196. *
  197. * 04 08 2011 yuche.tsai
  198. * [WCXRP00000624] [Volunteer Patch][MT6620][Driver] Add device discoverability support for GO.
  199. * Fix compile error.
  200. *
  201. * 04 08 2011 yuche.tsai
  202. * [WCXRP00000624] [Volunteer Patch][MT6620][Driver] Add device discoverability support for GO.
  203. * Add device discoverability support.
  204. *
  205. * 03 28 2011 yuche.tsai
  206. * NULL
  207. * Fix a possible issue for retry join when media status connected.
  208. *
  209. * 03 25 2011 yuche.tsai
  210. * NULL
  211. * Improve some error handleing.
  212. *
  213. * 03 24 2011 yuche.tsai
  214. * NULL
  215. * Assign AID before change STA_REC state to state 3.
  216. *
  217. * 03 23 2011 yuche.tsai
  218. * NULL
  219. * Fix Response Rate Issue when TX Auth Rsp Frame under P2P Mode.
  220. *
  221. * 03 23 2011 yuche.tsai
  222. * NULL
  223. * Fix issue of connection to one GC.
  224. *
  225. * 03 23 2011 yuche.tsai
  226. * NULL
  227. * Fix ASSERT issue when starting Hot-spot.
  228. *
  229. * 03 22 2011 yuche.tsai
  230. * NULL
  231. * When Target Information is not available, change to passive mode.
  232. *
  233. * 03 22 2011 yuche.tsai
  234. * NULL
  235. * Fix one connection issue while using Keypad to connect a GO.
  236. *
  237. * 03 22 2011 yuche.tsai
  238. * NULL
  239. * 1. Fix two issues that may cause kernel panic.
  240. *
  241. * 03 22 2011 yuche.tsai
  242. * NULL
  243. * Fix GC connect to other device issue.
  244. *
  245. * 03 22 2011 yuche.tsai
  246. * NULL
  247. * 1.Shorten the LISTEN interval.
  248. * 2. Fix IF address issue when we are GO
  249. * 3. Fix LISTEN channel issue.
  250. *
  251. * 03 22 2011 yuche.tsai
  252. * NULL
  253. * Modify formation policy setting.
  254. *
  255. * 03 21 2011 yuche.tsai
  256. * NULL
  257. * Solve Listen State doesn't response probe response issue.
  258. *
  259. * 03 21 2011 yuche.tsai
  260. * NULL
  261. * Change P2P Connection Request Flow.
  262. *
  263. * 03 19 2011 yuche.tsai
  264. * [WCXRP00000584] [Volunteer Patch][MT6620][Driver] Add beacon timeout support for WiFi Direct.
  265. * Add beacon timeout support.
  266. *
  267. * 03 19 2011 yuche.tsai
  268. * [WCXRP00000583] [Volunteer Patch][MT6620][Driver] P2P connection of the third peer issue
  269. * Indicate the correct Group SSID when join on Group.
  270. *
  271. * 03 19 2011 yuche.tsai
  272. * [WCXRP00000583] [Volunteer Patch][MT6620][Driver] P2P connection of the third peer issue
  273. * Support the third P2P device to join GO/GC group.
  274. *
  275. * 03 19 2011 yuche.tsai
  276. * [WCXRP00000581] [Volunteer Patch][MT6620][Driver] P2P IE in Assoc Req Issue
  277. * Append P2P IE in Assoc Req, so that GC can be discovered in probe response of GO.
  278. *
  279. * 03 18 2011 yuche.tsai
  280. * [WCXRP00000578] [Volunteer Patch][MT6620][Driver] Separate Connection Request from general IOCTL
  281. * Separate connection request from general IOCTL.
  282. *
  283. * 03 18 2011 yuche.tsai
  284. * [WCXRP00000574] [Volunteer Patch][MT6620][Driver] Modify P2P FSM Connection Flow
  285. * Modify connection flow after Group Formation Complete, or device connect to a GO.
  286. * Instead of request channel & connect directly, we use scan to allocate channel bandwidth & connect after RX BCN.
  287. *
  288. * 03 17 2011 yuche.tsai
  289. * NULL
  290. * When AIS is connect to an AP, Hot Spot would be enabled under fixed same channel.
  291. *
  292. * 03 17 2011 yuche.tsai
  293. * NULL
  294. * Solve the Group Info IE in Probe Response incorrect issue.
  295. *
  296. * 03 17 2011 yuche.tsai
  297. * NULL
  298. * Release Channel after Join Complete.
  299. *
  300. * 03 16 2011 wh.su
  301. * [WCXRP00000530] [MT6620 Wi-Fi] [Driver] skip doing p2pRunEventAAAComplete after send assoc response Tx Done
  302. * enable the protected while at P2P start GO, and skip some security check .
  303. *
  304. * 03 15 2011 yuche.tsai
  305. * [WCXRP00000560] [Volunteer Patch][MT6620][Driver] P2P Connection from UI using KEY/DISPLAY issue
  306. * Fix local configure method issue.
  307. *
  308. * 03 15 2011 yuche.tsai
  309. * [WCXRP00000560] [Volunteer Patch][MT6620][Driver] P2P Connection from UI using KEY/DISPLAY issue
  310. * Fix some configure method issue.
  311. *
  312. * 03 14 2011 yuche.tsai
  313. * NULL
  314. * .
  315. *
  316. * 03 14 2011 yuche.tsai
  317. * NULL
  318. * Fix password ID issue.
  319. *
  320. * 03 10 2011 yuche.tsai
  321. * NULL
  322. * Add P2P API.
  323. *
  324. * 03 08 2011 yuche.tsai
  325. * [WCXRP00000480] [Volunteer Patch][MT6620][Driver] WCS IE format issue[WCXRP00000509]
  326. * [Volunteer Patch][MT6620][Driver] Kernal panic when remove p2p module.
  327. * .
  328. *
  329. * 03 07 2011 yuche.tsai
  330. * [WCXRP00000502] [Volunteer Patch][MT6620][Driver] Fix group ID issue when doing Group Formation.
  331. * .
  332. *
  333. * 03 07 2011 wh.su
  334. * [WCXRP00000506] [MT6620 Wi-Fi][Driver][FW] Add Security check related code
  335. * rename the define to anti_pviracy.
  336. *
  337. * 03 05 2011 wh.su
  338. * [WCXRP00000506] [MT6620 Wi-Fi][Driver][FW] Add Security check related code
  339. * add the code to get the check rsponse and indicate to app.
  340. *
  341. * 03 04 2011 wh.su
  342. * [WCXRP00000510] [MT6620 Wi-Fi] [Driver] Fixed the CTIA enter test mode issue
  343. * fixed the p2p action frame type check for device request indication.
  344. *
  345. * 03 02 2011 yuche.tsai
  346. * [WCXRP00000245] 1. Invitation Request/Response.
  347. 2. Provision Discovery Request/Response
  348. * Fix Service Discovery RX packet buffer pointer.
  349. *
  350. * 03 01 2011 yuche.tsai
  351. * [WCXRP00000501] [Volunteer Patch][MT6620][Driver] No common channel issue when doing GO formation
  352. * Update channel issue when doing GO formation..
  353. *
  354. * 03 01 2011 yuche.tsai
  355. * [WCXRP00000245] 1. Invitation Request/Response.
  356. 2. Provision Discovery Request/Response
  357. * Update Service Discovery Related wlanoid function.
  358. *
  359. * 02 21 2011 yuche.tsai
  360. * [WCXRP00000481] [Volunteer Patch][MT6620][FW] Scan hang under concurrent case.
  361. * Fix all BE issue of WSC or P2P IE.
  362. *
  363. * 02 18 2011 wh.su
  364. * [WCXRP00000471] [MT6620 Wi-Fi][Driver] Add P2P Provison discovery append Config Method attribute at WSC IE
  365. * fixed the wsc config method mapping to driver used config method issue.
  366. *
  367. * 02 18 2011 yuche.tsai
  368. * [WCXRP00000479] [Volunteer Patch][MT6620][Driver] Probe Response of P2P using 11b rate.
  369. * Update basic rate to FW, after P2P is initialed.
  370. *
  371. * 02 18 2011 yuche.tsai
  372. * [WCXRP00000478] [Volunteer Patch][MT6620][Driver] Probe request frame during search
  373. * phase do not contain P2P wildcard SSID.
  374. * Use P2P Wildcard SSID when scan type of P2P_WILDCARD_SSID is set.
  375. *
  376. * 02 18 2011 yuche.tsai
  377. * [WCXRP00000480] [Volunteer Patch][MT6620][Driver] WCS IE format issue
  378. * Fix WSC IE BE format issue.
  379. *
  380. * 02 17 2011 wh.su
  381. * [WCXRP00000471] [MT6620 Wi-Fi][Driver] Add P2P Provison discovery append Config Method attribute at WSC IE
  382. * append the WSC IE config method attribute at provision discovery request.
  383. *
  384. * 02 16 2011 wh.su
  385. * [WCXRP00000448] [MT6620 Wi-Fi][Driver] Fixed WSC IE not send out at probe request
  386. * fixed the probe request send out without WSC IE issue (at P2P).
  387. *
  388. * 02 16 2011 yuche.tsai
  389. * [WCXRP00000431] [Volunteer Patch][MT6620][Driver] Add MLME support for deauthentication under AP(Hot-Spot) mode.
  390. * If two station connected to the Hot-Spot and one disconnect, FW would get into an infinite loop
  391. *
  392. * 02 15 2011 yuche.tsai
  393. * [WCXRP00000431] [Volunteer Patch][MT6620][Driver] Add MLME support for deauthentication under AP(Hot-Spot) mode.
  394. * Fix re-connection issue after RX deauthentication.
  395. *
  396. * 02 15 2011 yuche.tsai
  397. * [WCXRP00000431] [Volunteer Patch][MT6620][Driver] Add MLME support for deauthentication under AP(Hot-Spot) mode.
  398. * Fix conneciton issue after disconnect with AP.
  399. *
  400. * 02 12 2011 yuche.tsai
  401. * [WCXRP00000441] [Volunteer Patch][MT6620][Driver] BoW can not create desired station type when Hot Spot is enabled.
  402. * P2P Create Station Type according to Target BSS capability.
  403. *
  404. * 02 10 2011 yuche.tsai
  405. * [WCXRP00000431] [Volunteer Patch][MT6620][Driver] Add MLME support for deauthentication under AP(Hot-Spot) mode.
  406. * Support Disassoc & Deauthentication for Hot-Spot.
  407. *
  408. * 02 09 2011 yuche.tsai
  409. * [WCXRP00000245] 1. Invitation Request/Response.
  410. 2. Provision Discovery Request/Response
  411. * Add Service Discovery Indication Related code.
  412. *
  413. * 02 09 2011 yuche.tsai
  414. * [WCXRP00000431] [Volunteer Patch][MT6620][Driver] Add MLME support for deauthentication under AP(Hot-Spot) mode.
  415. * Add Support for MLME deauthentication for Hot-Spot.
  416. *
  417. * 02 09 2011 yuche.tsai
  418. * [WCXRP00000429] [Volunteer Patch][MT6620][Driver] Hot Spot Client Limit Issue
  419. * Fix Client Limit Issue.
  420. *
  421. * 02 08 2011 yuche.tsai
  422. * [WCXRP00000419] [Volunteer Patch][MT6620/MT5931][Driver] Provide function of disconnect
  423. * to target station for AAA module.
  424. * Disconnect every station client when disolve on P2P group.
  425. *
  426. * 02 08 2011 yuche.tsai
  427. * [WCXRP00000245] 1. Invitation Request/Response.
  428. 2. Provision Discovery Request/Response
  429. * 1. Fix Service Disocvery Logical issue.
  430. * 2. Fix a NULL pointer access violation issue when sending deauthentication packet to a class error station.
  431. *
  432. * 02 08 2011 yuche.tsai
  433. * [WCXRP00000419] [Volunteer Patch][MT6620/MT5931][Driver] Provide function of disconnect
  434. * to target station for AAA module.
  435. * Workaround of disable P2P network.
  436. *
  437. * 02 08 2011 yuche.tsai
  438. * [WCXRP00000421] [Volunteer Patch][MT6620][Driver] Fix incorrect SSID length Issue
  439. * 1. Fixed SSID wrong length issue.
  440. * 2. Under Hot Spot configuration, there won't be any P2P IE.
  441. * 3. Under Hot Spot configuration, P2P FSM won't get into LISTEN state first.
  442. *
  443. * 01 27 2011 yuche.tsai
  444. * [WCXRP00000399] [Volunteer Patch][MT6620/MT5931][Driver] Fix scan side effect after P2P module separate.
  445. * Modify Start GO flow.
  446. *
  447. * 01 27 2011 yuche.tsai
  448. * [WCXRP00000399] [Volunteer Patch][MT6620/MT5931][Driver] Fix scan side effect after P2P module separate.
  449. * Fix desire phy type set issue.
  450. *
  451. * 01 27 2011 yuche.tsai
  452. * [WCXRP00000399] [Volunteer Patch][MT6620/MT5931][Driver] Fix scan side effect after P2P module separate.
  453. * Add desire phy type set phase I.
  454. *
  455. * 01 26 2011 yuche.tsai
  456. * [WCXRP00000388] [Volunteer Patch][MT6620][Driver/Fw] change Station Type in station record.
  457. * Fix P2P Disconnect Issue.
  458. *
  459. * 01 26 2011 yuche.tsai
  460. * [WCXRP00000245] 1. Invitation Request/Response.
  461. 2. Provision Discovery Request/Response
  462. * Add Service Discovery Function.
  463. *
  464. * 01 26 2011 cm.chang
  465. * [WCXRP00000395] [MT6620 Wi-Fi][Driver][FW] Search STA_REC with additional net type index argument
  466. * .
  467. *
  468. * 01 25 2011 yuche.tsai
  469. * [WCXRP00000388] [Volunteer Patch][MT6620][Driver/Fw] change Station Type in station record.
  470. * Fix compile error when DBG is disabled.
  471. *
  472. * 01 25 2011 yuche.tsai
  473. * [WCXRP00000388] [Volunteer Patch][MT6620][Driver/Fw] change Station Type in station record.
  474. * Change Station Type Definition.
  475. *
  476. * 01 19 2011 yuche.tsai
  477. * [WCXRP00000353] [Volunteer Patch][MT6620][Driver] Desired Non-HT Rate Set update
  478. * when STA record is created under AP Mode.
  479. * Add P2P QoS Support.
  480. *
  481. * 01 19 2011 george.huang
  482. * [WCXRP00000355] [MT6620 Wi-Fi] Set WMM-PS related setting with qualifying AP capability
  483. * Null NOA attribute setting when no related parameters.
  484. *
  485. * 01 14 2011 yuche.tsai
  486. * [WCXRP00000352] [Volunteer Patch][MT6620][Driver] P2P Statsion Record Client List Issue
  487. * Modify AAA flow according to CM's comment.
  488. *
  489. * 01 13 2011 yuche.tsai
  490. * [WCXRP00000353] [Volunteer Patch][MT6620][Driver] Desired Non-HT Rate Set update
  491. * when STA record is created under AP Mode.
  492. * Resolve Channel ZERO issue. (Uninitialized default channel)
  493. *
  494. * 01 13 2011 yuche.tsai
  495. * [WCXRP00000352] [Volunteer Patch][MT6620][Driver] P2P Statsion Record Client List Issue
  496. * Update P2P State Debug Message.
  497. *
  498. * 01 12 2011 yuche.tsai
  499. * [WCXRP00000353] [Volunteer Patch][MT6620][Driver] Desired Non-HT Rate Set update
  500. * when STA record is created under AP Mode.
  501. * Fix bug when allocating message buffer.
  502. *
  503. * 01 12 2011 yuche.tsai
  504. * [WCXRP00000353] [Volunteer Patch][MT6620][Driver] Desired Non-HT Rate Set update
  505. * when STA record is created under AP Mode.
  506. * Update Phy Type Set. When legacy client is connected, it can use 11b rate,
  507. * but if the P2P device is connected, 11b rate is not allowed.
  508. *
  509. * 01 12 2011 yuche.tsai
  510. * [WCXRP00000352] [Volunteer Patch][MT6620][Driver] P2P Statsion Record Client List Issue
  511. * 1. Modify Channel Acquire Time of AP mode from 5s to 1s.
  512. * 2. Call cnmP2pIsPermit() before active P2P network.
  513. * 3. Add channel selection support for AP mode.
  514. *
  515. * 01 12 2011 yuche.tsai
  516. * [WCXRP00000352] [Volunteer Patch][MT6620][Driver] P2P Statsion Record Client List Issue
  517. * Fix Bug of reference to NULL pointer.
  518. *
  519. * 01 12 2011 yuche.tsai
  520. * [WCXRP00000352] [Volunteer Patch][MT6620][Driver] P2P Statsion Record Client List Issue
  521. * Modify some behavior of AP mode.
  522. *
  523. * 01 12 2011 yuche.tsai
  524. * [WCXRP00000352] [Volunteer Patch][MT6620][Driver] P2P Statsion Record Client List Issue
  525. * Fix bug of wrong pointer check.
  526. *
  527. * 01 12 2011 yuche.tsai
  528. * [WCXRP00000352] [Volunteer Patch][MT6620][Driver] P2P Statsion Record Client List Issue
  529. * Fix Compile Error.
  530. *
  531. * 01 11 2011 yuche.tsai
  532. * [WCXRP00000352] [Volunteer Patch][MT6620][Driver] P2P Statsion Record Client List Issue
  533. * Add station record into client list before change it state from STATE_2 to STATE_3.
  534. *
  535. * 01 05 2011 yuche.tsai
  536. * [WCXRP00000345] [MT6620][Volunteer Patch] P2P may issue a SSID specified scan request,
  537. * but the SSID length is still invalid.
  538. * Specify SSID Type when issue a scan request.
  539. *
  540. * 01 05 2011 cp.wu
  541. * [WCXRP00000338] [MT6620 Wi-Fi][Driver] Separate kalMemAlloc into kmalloc and vmalloc implementations
  542. * to ease physically continuous memory demands
  543. * correct typo
  544. *
  545. * 01 05 2011 george.huang
  546. * [WCXRP00000343] [MT6620 Wi-Fi] Add TSF reset path for concurrent operation
  547. * modify NOA update path for preventing assertion false alarm.
  548. *
  549. * 01 04 2011 cp.wu
  550. * [WCXRP00000338] [MT6620 Wi-Fi][Driver] Separate kalMemAlloc into kmalloc and vmalloc implementations
  551. * to ease physically continuous memory demands
  552. * separate kalMemAlloc() into virtually-continuous and physically-continuous type to ease slab system pressure
  553. *
  554. * 01 03 2011 wh.su
  555. * [WCXRP00000326] [MT6620][Wi-Fi][Driver] check in the binary format gl_sec.o.new instead of use change type!!!
  556. * let the p2p ap mode acept a legacy device join.
  557. *
  558. * 12 22 2010 yuche.tsai
  559. * [WCXRP00000245] 1. Invitation Request/Response.
  560. 2. Provision Discovery Request/Response
  561. * Fix Compile Error.
  562. *
  563. * 12 15 2010 yuche.tsai
  564. * [WCXRP00000245] 1. Invitation Request/Response.
  565. 2. Provision Discovery Request/Response
  566. * Refine Connection Flow.
  567. *
  568. * 12 08 2010 yuche.tsai
  569. * [WCXRP00000245] [MT6620][Driver] Invitation & Provision Discovery Feature Check-in
  570. * [WCXRP000000245][MT6620][Driver] Invitation Request Feature Add
  571. *
  572. * 12 08 2010 yuche.tsai
  573. * [WCXRP00000244] [MT6620][Driver] Add station record type for each client when in AP mode.
  574. * Change STA Type under AP mode. We would tell if client is a P2P device or a legacy client
  575. * by checking the P2P IE in assoc req frame.
  576. *
  577. * 12 07 2010 cm.chang
  578. * [WCXRP00000239] MT6620 Wi-Fi][Driver][FW] Merge concurrent branch back to maintrunk
  579. * The order of invoking nicUpdateBss() and rlm functions
  580. *
  581. * 12 02 2010 yuche.tsai
  582. * NULL
  583. * Update P2P Connection Policy for Invitation.
  584. *
  585. * 12 02 2010 yuche.tsai
  586. * NULL
  587. * Update P2P Connection Policy for Invitation & Provision Discovery.
  588. *
  589. * 11 30 2010 yuche.tsai
  590. * NULL
  591. * Invitation & Provision Discovery Indication.
  592. *
  593. * 11 30 2010 yuche.tsai
  594. * NULL
  595. * Update Configure Method indication & selection for Provision Discovery & GO_NEGO_REQ
  596. *
  597. * 11 30 2010 yuche.tsai
  598. * NULL
  599. * Update RCIP value when RX assoc request frame.
  600. *
  601. * 11 29 2010 yuche.tsai
  602. * NULL
  603. * Update P2P related function for INVITATION & PROVISION DISCOVERY.
  604. *
  605. * 11 26 2010 george.huang
  606. * [WCXRP00000152] [MT6620 Wi-Fi] AP mode power saving function
  607. * Update P2P PS for NOA function.
  608. *
  609. * 11 25 2010 yuche.tsai
  610. * NULL
  611. * Update Code for Invitation Related Function.
  612. *
  613. * 11 17 2010 wh.su
  614. * [WCXRP00000164] [MT6620 Wi-Fi][Driver] Support the p2p random SSID[WCXRP00000179] [MT6620 Wi-Fi][FW]
  615. * Set the Tx lowest rate at wlan table for normal operation
  616. * fixed some ASSERT check.
  617. *
  618. * 11 05 2010 wh.su
  619. * [WCXRP00000164] [MT6620 Wi-Fi][Driver] Support the p2p random SSID
  620. * fixed the p2p role code error.
  621. *
  622. * 11 04 2010 wh.su
  623. * [WCXRP00000164] [MT6620 Wi-Fi][Driver] Support the p2p random SSID
  624. * adding the p2p random ssid support.
  625. *
  626. * 10 20 2010 wh.su
  627. * [WCXRP00000124] [MT6620 Wi-Fi] [Driver] Support the dissolve P2P Group
  628. * fixed the ASSERT check error
  629. *
  630. * 10 20 2010 wh.su
  631. * [WCXRP00000124] [MT6620 Wi-Fi] [Driver] Support the dissolve P2P Group
  632. * Add the code to support disconnect p2p group
  633. *
  634. * 10 19 2010 wh.su
  635. * [WCXRP00000085] [MT6620 Wif-Fi] [Driver] update the modified p2p state
  636. * machine[WCXRP00000102] [MT6620 Wi-Fi] [FW] Add a compiling flag and code for support Direct GO at Android
  637. * fixed the compiling error.
  638. *
  639. * 10 14 2010 wh.su
  640. * [WCXRP00000102] [MT6620 Wi-Fi] [FW] Add a compiling flag and code for support Direct GO at Android
  641. * adding a code to support Direct GO with a compiling flag .
  642. *
  643. * 10 08 2010 cp.wu
  644. * [WCXRP00000087] [MT6620 Wi-Fi][Driver] Cannot connect to 5GHz AP, driver will cause FW assert.
  645. * correct erroneous logic: specifying eBand with incompatible eSco
  646. *
  647. * 10 08 2010 wh.su
  648. * [WCXRP00000085] [MT6620 Wif-Fi] [Driver] update the modified p2p state machine
  649. * fixed the compiling error.
  650. *
  651. * 10 08 2010 wh.su
  652. * [WCXRP00000085] [MT6620 Wif-Fi] [Driver] update the modified p2p state machine
  653. * update the frog's new p2p state machine.
  654. *
  655. * 09 10 2010 wh.su
  656. * NULL
  657. * fixed the compiling error at WinXP.
  658. *
  659. * 09 07 2010 yuche.tsai
  660. * NULL
  661. * Reset Common IE Buffer of P2P INFO when scan request is issued.
  662. * If an action frame other than public action frame is received, return direcly.
  663. *
  664. * 09 07 2010 wh.su
  665. * NULL
  666. * adding the code for beacon/probe req/ probe rsp wsc ie at p2p.
  667. *
  668. * 09 06 2010 wh.su
  669. * NULL
  670. * let the p2p can set the privacy bit at beacon and rsn ie at assoc req at key handshake state.
  671. *
  672. * 09 03 2010 kevin.huang
  673. * NULL
  674. * Refine #include sequence and solve recursive/nested #include issue
  675. *
  676. * 08 26 2010 yuche.tsai
  677. * NULL
  678. * Add P2P Connection Abort Event Message handler.
  679. *
  680. * 08 24 2010 cm.chang
  681. * NULL
  682. * Support RLM initail channel of Ad-hoc, P2P and BOW
  683. *
  684. * 08 23 2010 yuche.tsai
  685. * NULL
  686. * 1. Fix Interface Address from GO Nego Req/Rsp is not correct.
  687. * 2. Fix GO mode does not change media state after station connected.
  688. * 3. Fix STA don't response probe request when there is a connection request.
  689. *
  690. * 08 20 2010 cm.chang
  691. * NULL
  692. * Migrate RLM code to host from FW
  693. *
  694. * 08 20 2010 kevin.huang
  695. * NULL
  696. * Modify AAA Module for changing STA STATE 3 at p2p/bowRunEventAAAComplete()
  697. *
  698. * 08 20 2010 yuche.tsai
  699. * NULL
  700. * Add Glue Layer indication.
  701. *
  702. * 08 17 2010 yuche.tsai
  703. * NULL
  704. * Fix compile warning under Linux.
  705. *
  706. * 08 17 2010 yuche.tsai
  707. * NULL
  708. * Fix some P2P FSM bug.
  709. *
  710. * 08 16 2010 yuche.tsai
  711. * NULL
  712. * Add random Interface Address Generation support.
  713. *
  714. * 08 16 2010 yuche.tsai
  715. * NULL
  716. * Fix some P2P FSM bug.
  717. *
  718. * 08 16 2010 yuche.tsai
  719. * NULL
  720. * Update P2P FSM code for GO Nego.
  721. *
  722. * 08 16 2010 kevin.huang
  723. * NULL
  724. * Refine AAA functions
  725. *
  726. * 08 12 2010 kevin.huang
  727. * NULL
  728. * Refine bssProcessProbeRequest() and bssSendBeaconProbeResponse()
  729. *
  730. * 08 12 2010 yuche.tsai
  731. * NULL
  732. * Join complete indication.
  733. *
  734. * 08 11 2010 yuche.tsai
  735. * NULL
  736. * Add two boolean in connection request.
  737. * Based on these two boolean value, P2P FSM should
  738. * decide to do invitation or group formation or start a GO directly.
  739. *
  740. * 08 11 2010 yuche.tsai
  741. * NULL
  742. * Update P2P FSM, currently P2P Device Discovery is verified.
  743. *
  744. * 08 05 2010 yuche.tsai
  745. * NULL
  746. * Update P2P FSM for group formation.
  747. *
  748. * 08 03 2010 george.huang
  749. * NULL
  750. * handle event for updating NOA parameters indicated from FW
  751. *
  752. * 08 03 2010 cp.wu
  753. * NULL
  754. * limit build always needs spin-lock declaration.
  755. *
  756. * 08 02 2010 yuche.tsai
  757. * NULL
  758. * P2P Group Negotiation Code Check in.
  759. *
  760. * 07 26 2010 yuche.tsai
  761. *
  762. * Add P2P FSM code check in.
  763. *
  764. * 07 21 2010 yuche.tsai
  765. *
  766. * Add P2P Scan & Scan Result Parsing & Saving.
  767. *
  768. * 07 19 2010 yuche.tsai
  769. *
  770. * Update P2P FSM.
  771. *
  772. * 07 09 2010 george.huang
  773. *
  774. * [WPD00001556] Migrate PM variables from FW to driver: for composing QoS Info
  775. *
  776. * 07 08 2010 cp.wu
  777. *
  778. * [WPD00003833] [MT6620 and MT5931] Driver migration - move to new repository.
  779. *
  780. * 06 21 2010 yuche.tsai
  781. * [WPD00003839][MT6620 5931][P2P] Feature migration
  782. * Fix compile error while enable WIFI_DIRECT support.
  783. *
  784. * 06 21 2010 yuche.tsai
  785. * [WPD00003839][MT6620 5931][P2P] Feature migration
  786. * Update P2P Function call.
  787. *
  788. * 06 17 2010 yuche.tsai
  789. * [WPD00003839][MT6620 5931][P2P] Feature migration
  790. * First draft for migration P2P FSM from FW to Driver.
  791. *
  792. * 04 19 2010 kevin.huang
  793. * [BORA00000714][WIFISYS][New Feature]Beacon Timeout Support
  794. * Add Beacon Timeout Support and will send Null frame to diagnose connection
  795. *
  796. * 03 18 2010 kevin.huang
  797. * [BORA00000663][WIFISYS][New Feature] AdHoc Mode Support
  798. * Rename CFG flag for P2P
  799. *
  800. * 02 26 2010 kevin.huang
  801. * [BORA00000603][WIFISYS] [New Feature] AAA Module Support
  802. * Add code to test P2P GO
  803. *
  804. * 02 23 2010 kevin.huang
  805. * [BORA00000603][WIFISYS] [New Feature] AAA Module Support
  806. * Add Wi-Fi Direct SSID and P2P GO Test Mode
  807. *
  808. * 02 05 2010 kevin.huang
  809. * [BORA00000603][WIFISYS] [New Feature] AAA Module Support
  810. * Modify code due to BAND_24G define was changed
  811. *
  812. * 02 05 2010 kevin.huang
  813. * [BORA00000603][WIFISYS] [New Feature] AAA Module Support
  814. * Revise data structure to share the same BSS_INFO_T for avoiding coding error
  815. *
  816. * 02 04 2010 kevin.huang
  817. * [BORA00000603][WIFISYS] [New Feature] AAA Module Support
  818. * Add AAA Module Support, Revise Net Type to Net Type Index for array lookup
  819. */
  820. /*******************************************************************************
  821. * C O M P I L E R F L A G S
  822. ********************************************************************************
  823. */
  824. /*******************************************************************************
  825. * E X T E R N A L R E F E R E N C E S
  826. ********************************************************************************
  827. */
  828. #include "precomp.h"
  829. #if CFG_ENABLE_WIFI_DIRECT
  830. /*******************************************************************************
  831. * C O N S T A N T S
  832. ********************************************************************************
  833. */
  834. /*******************************************************************************
  835. * D A T A T Y P E S
  836. ********************************************************************************
  837. */
  838. /*******************************************************************************
  839. * P U B L I C D A T A
  840. ********************************************************************************
  841. */
  842. /*******************************************************************************
  843. * P R I V A T E D A T A
  844. ********************************************************************************
  845. */
  846. #if DBG
  847. /*lint -save -e64 Type mismatch */
  848. static PUINT_8 apucDebugP2pState[P2P_STATE_NUM] = {
  849. (PUINT_8) DISP_STRING("P2P_STATE_IDLE"),
  850. (PUINT_8) DISP_STRING("P2P_STATE_SCAN"),
  851. (PUINT_8) DISP_STRING("P2P_STATE_AP_CHANNEL_DETECT"),
  852. (PUINT_8) DISP_STRING("P2P_STATE_REQING_CHANNEL"),
  853. (PUINT_8) DISP_STRING("P2P_STATE_CHNL_ON_HAND"),
  854. (PUINT_8) DISP_STRING("P2P_STATE_GC_JOIN")
  855. };
  856. /*lint -restore */
  857. #else
  858. static UINT_8 apucDebugP2pState[P2P_STATE_NUM] = {
  859. P2P_STATE_IDLE,
  860. P2P_STATE_SCAN,
  861. P2P_STATE_AP_CHANNEL_DETECT,
  862. P2P_STATE_REQING_CHANNEL,
  863. P2P_STATE_CHNL_ON_HAND,
  864. P2P_STATE_GC_JOIN
  865. };
  866. #endif /* DBG */
  867. /*******************************************************************************
  868. * M A C R O S
  869. ********************************************************************************
  870. */
  871. /*******************************************************************************
  872. * F U N C T I O N D E C L A R A T I O N S
  873. ********************************************************************************
  874. */
  875. /*******************************************************************************
  876. * F U N C T I O N S
  877. ********************************************************************************
  878. */
  879. /* p2pStateXXX : Processing P2P FSM related action.
  880. * p2pFSMXXX : Control P2P FSM flow.
  881. * p2pFuncXXX : Function for doing one thing.
  882. */
  883. VOID p2pFsmInit(IN P_ADAPTER_T prAdapter)
  884. {
  885. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  886. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  887. do {
  888. ASSERT_BREAK(prAdapter != NULL);
  889. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  890. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  891. ASSERT_BREAK(prP2pFsmInfo != NULL);
  892. LINK_INITIALIZE(&(prP2pFsmInfo->rMsgEventQueue));
  893. LINK_INITIALIZE(&(prP2pBssInfo->rStaRecOfClientList));
  894. prP2pFsmInfo->eCurrentState = prP2pFsmInfo->ePreviousState = P2P_STATE_IDLE;
  895. prP2pFsmInfo->prTargetBss = NULL;
  896. prP2pFsmInfo->fgIsWPSMode = 0;
  897. cnmTimerInitTimer(prAdapter,
  898. &(prAdapter->rP2pFsmTimeoutTimer),
  899. (PFN_MGMT_TIMEOUT_FUNC) p2pFsmRunEventFsmTimeout, (ULONG) prP2pFsmInfo);
  900. /* 4 <2> Initiate BSS_INFO_T - common part */
  901. BSS_INFO_INIT(prAdapter, NETWORK_TYPE_P2P_INDEX);
  902. /* 4 <2.1> Initiate BSS_INFO_T - Setup HW ID */
  903. prP2pBssInfo->ucConfigAdHocAPMode = AP_MODE_11G_P2P;
  904. prP2pBssInfo->ucHwDefaultFixedRateCode = RATE_OFDM_6M;
  905. prP2pBssInfo->ucNonHTBasicPhyType = (UINT_8)
  906. rNonHTApModeAttributes[prP2pBssInfo->ucConfigAdHocAPMode].ePhyTypeIndex;
  907. prP2pBssInfo->u2BSSBasicRateSet =
  908. rNonHTApModeAttributes[prP2pBssInfo->ucConfigAdHocAPMode].u2BSSBasicRateSet;
  909. prP2pBssInfo->u2OperationalRateSet =
  910. rNonHTPhyAttributes[prP2pBssInfo->ucNonHTBasicPhyType].u2SupportedRateSet;
  911. rateGetDataRatesFromRateSet(prP2pBssInfo->u2OperationalRateSet,
  912. prP2pBssInfo->u2BSSBasicRateSet,
  913. prP2pBssInfo->aucAllSupportedRates, &prP2pBssInfo->ucAllSupportedRatesLen);
  914. prP2pBssInfo->prBeacon = cnmMgtPktAlloc(prAdapter,
  915. OFFSET_OF(WLAN_BEACON_FRAME_T, aucInfoElem[0]) + MAX_IE_LENGTH);
  916. if (prP2pBssInfo->prBeacon) {
  917. prP2pBssInfo->prBeacon->eSrc = TX_PACKET_MGMT;
  918. prP2pBssInfo->prBeacon->ucStaRecIndex = 0xFF; /* NULL STA_REC */
  919. prP2pBssInfo->prBeacon->ucNetworkType = NETWORK_TYPE_P2P_INDEX;
  920. } else {
  921. /* Out of memory. */
  922. ASSERT(FALSE);
  923. }
  924. prP2pBssInfo->eCurrentOPMode = OP_MODE_NUM;
  925. prP2pBssInfo->rPmProfSetupInfo.ucBmpDeliveryAC = PM_UAPSD_ALL;
  926. prP2pBssInfo->rPmProfSetupInfo.ucBmpTriggerAC = PM_UAPSD_ALL;
  927. prP2pBssInfo->rPmProfSetupInfo.ucUapsdSp = WMM_MAX_SP_LENGTH_2;
  928. prP2pBssInfo->ucPrimaryChannel = P2P_DEFAULT_LISTEN_CHANNEL;
  929. prP2pBssInfo->eBand = BAND_2G4;
  930. prP2pBssInfo->eBssSCO = CHNL_EXT_SCN;
  931. if (prAdapter->rWifiVar.fgSupportQoS)
  932. prP2pBssInfo->fgIsQBSS = TRUE;
  933. else
  934. prP2pBssInfo->fgIsQBSS = FALSE;
  935. SET_NET_PWR_STATE_IDLE(prAdapter, NETWORK_TYPE_P2P_INDEX);
  936. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_IDLE);
  937. } while (FALSE);
  938. } /* p2pFsmInit */
  939. /*----------------------------------------------------------------------------*/
  940. /*!
  941. * @brief The function is used to uninitialize the value in P2P_FSM_INFO_T for
  942. * P2P FSM operation
  943. *
  944. * @param (none)
  945. *
  946. * @return (none)
  947. */
  948. /*----------------------------------------------------------------------------*/
  949. VOID p2pFsmUninit(IN P_ADAPTER_T prAdapter)
  950. {
  951. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  952. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  953. do {
  954. ASSERT_BREAK(prAdapter != NULL);
  955. DEBUGFUNC("p2pFsmUninit()");
  956. DBGLOG(P2P, INFO, "->p2pFsmUninit()\n");
  957. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  958. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  959. p2pFuncSwitchOPMode(prAdapter, prP2pBssInfo, OP_MODE_P2P_DEVICE, TRUE);
  960. p2pFsmRunEventAbort(prAdapter, prP2pFsmInfo);
  961. p2pStateAbort_IDLE(prAdapter, prP2pFsmInfo, P2P_STATE_NUM);
  962. UNSET_NET_ACTIVE(prAdapter, NETWORK_TYPE_P2P_INDEX);
  963. wlanAcquirePowerControl(prAdapter);
  964. /* Release all pending CMD queue. */
  965. DBGLOG(P2P, TRACE, "p2pFsmUninit: wlanProcessCommandQueue, num of element:%d\n",
  966. (UINT_32) prAdapter->prGlueInfo->rCmdQueue.u4NumElem);
  967. wlanProcessCommandQueue(prAdapter, &prAdapter->prGlueInfo->rCmdQueue);
  968. wlanReleasePowerControl(prAdapter);
  969. /* Release pending mgmt frame,
  970. * mgmt frame may be pending by CMD without resource.
  971. */
  972. kalClearMgmtFramesByNetType(prAdapter->prGlueInfo, NETWORK_TYPE_P2P_INDEX);
  973. /* Clear PendingCmdQue */
  974. wlanReleasePendingCMDbyNetwork(prAdapter, NETWORK_TYPE_P2P_INDEX);
  975. if (prP2pBssInfo->prBeacon) {
  976. cnmMgtPktFree(prAdapter, prP2pBssInfo->prBeacon);
  977. prP2pBssInfo->prBeacon = NULL;
  978. }
  979. } while (FALSE);
  980. return;
  981. } /* end of p2pFsmUninit() */
  982. VOID p2pFsmStateTransition(IN P_ADAPTER_T prAdapter, IN P_P2P_FSM_INFO_T prP2pFsmInfo, IN ENUM_P2P_STATE_T eNextState)
  983. {
  984. BOOLEAN fgIsTransOut = (BOOLEAN) FALSE;
  985. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  986. P_P2P_SPECIFIC_BSS_INFO_T prP2pSpecificBssInfo = (P_P2P_SPECIFIC_BSS_INFO_T) NULL;
  987. do {
  988. ASSERT_BREAK((prAdapter != NULL) && (prP2pFsmInfo != NULL));
  989. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  990. prP2pSpecificBssInfo = prAdapter->rWifiVar.prP2pSpecificBssInfo;
  991. if (!IS_BSS_ACTIVE(prP2pBssInfo)) {
  992. if (!cnmP2PIsPermitted(prAdapter))
  993. return;
  994. SET_NET_ACTIVE(prAdapter, NETWORK_TYPE_P2P_INDEX);
  995. nicActivateNetwork(prAdapter, NETWORK_TYPE_P2P_INDEX);
  996. }
  997. fgIsTransOut = fgIsTransOut ? FALSE : TRUE;
  998. if (!fgIsTransOut) {
  999. #if DBG
  1000. DBGLOG(P2P, STATE, "TRANSITION: [%s] -> [%s]\n",
  1001. apucDebugP2pState[prP2pFsmInfo->eCurrentState],
  1002. apucDebugP2pState[eNextState]);
  1003. #else
  1004. DBGLOG(P2P, STATE, "[%d] TRANSITION: [%d] -> [%d]\n",
  1005. DBG_P2P_IDX, apucDebugP2pState[prP2pFsmInfo->eCurrentState],
  1006. apucDebugP2pState[eNextState]);
  1007. #endif
  1008. /* Transition into current state. */
  1009. prP2pFsmInfo->ePreviousState = prP2pFsmInfo->eCurrentState;
  1010. prP2pFsmInfo->eCurrentState = eNextState;
  1011. }
  1012. switch (prP2pFsmInfo->eCurrentState) {
  1013. case P2P_STATE_IDLE:
  1014. if (fgIsTransOut)
  1015. p2pStateAbort_IDLE(prAdapter, prP2pFsmInfo, eNextState);
  1016. else
  1017. fgIsTransOut = p2pStateInit_IDLE(prAdapter, prP2pFsmInfo, prP2pBssInfo, &eNextState);
  1018. break;
  1019. case P2P_STATE_SCAN:
  1020. if (fgIsTransOut) {
  1021. /* Scan done / scan canceled. */
  1022. p2pStateAbort_SCAN(prAdapter, prP2pFsmInfo, eNextState);
  1023. } else {
  1024. /* Initial scan request. */
  1025. p2pStateInit_SCAN(prAdapter, prP2pFsmInfo);
  1026. }
  1027. break;
  1028. case P2P_STATE_AP_CHANNEL_DETECT:
  1029. if (fgIsTransOut) {
  1030. /* Scan done */
  1031. /* Get sparse channel result. */
  1032. p2pStateAbort_AP_CHANNEL_DETECT(prAdapter,
  1033. prP2pFsmInfo, prP2pSpecificBssInfo, eNextState);
  1034. }
  1035. else {
  1036. /* Initial passive scan request. */
  1037. p2pStateInit_AP_CHANNEL_DETECT(prAdapter, prP2pFsmInfo);
  1038. }
  1039. break;
  1040. case P2P_STATE_REQING_CHANNEL:
  1041. if (fgIsTransOut) {
  1042. /* Channel on hand / Channel canceled. */
  1043. p2pStateAbort_REQING_CHANNEL(prAdapter, prP2pFsmInfo, eNextState);
  1044. } else {
  1045. /* Initial channel request. */
  1046. p2pFuncAcquireCh(prAdapter, &(prP2pFsmInfo->rChnlReqInfo));
  1047. }
  1048. break;
  1049. case P2P_STATE_CHNL_ON_HAND:
  1050. if (fgIsTransOut) {
  1051. p2pStateAbort_CHNL_ON_HAND(prAdapter, prP2pFsmInfo, prP2pBssInfo, eNextState);
  1052. } else {
  1053. /* Initial channel ready. */
  1054. /* Send channel ready event. */
  1055. /* Start a FSM timer. */
  1056. p2pStateInit_CHNL_ON_HAND(prAdapter, prP2pBssInfo, prP2pFsmInfo);
  1057. }
  1058. break;
  1059. case P2P_STATE_GC_JOIN:
  1060. if (fgIsTransOut) {
  1061. /* Join complete / join canceled. */
  1062. p2pStateAbort_GC_JOIN(prAdapter, prP2pFsmInfo, &(prP2pFsmInfo->rJoinInfo), eNextState);
  1063. } else {
  1064. if (prP2pFsmInfo->prTargetBss == NULL) {
  1065. ASSERT(FALSE);
  1066. } else {
  1067. /* Send request to SAA module. */
  1068. p2pStateInit_GC_JOIN(prAdapter,
  1069. prP2pFsmInfo,
  1070. prP2pBssInfo,
  1071. &(prP2pFsmInfo->rJoinInfo), prP2pFsmInfo->prTargetBss);
  1072. }
  1073. }
  1074. break;
  1075. default:
  1076. break;
  1077. }
  1078. } while (fgIsTransOut);
  1079. } /* p2pFsmStateTransition */
  1080. VOID p2pFsmRunEventSwitchOPMode(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1081. {
  1082. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  1083. P_MSG_P2P_SWITCH_OP_MODE_T prSwitchOpMode = (P_MSG_P2P_SWITCH_OP_MODE_T) prMsgHdr;
  1084. P_P2P_CONNECTION_SETTINGS_T prP2pConnSettings = (P_P2P_CONNECTION_SETTINGS_T) NULL;
  1085. do {
  1086. ASSERT_BREAK((prAdapter != NULL) && (prSwitchOpMode != NULL));
  1087. DBGLOG(P2P, TRACE, "p2pFsmRunEventSwitchOPMode\n");
  1088. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  1089. prP2pConnSettings = prAdapter->rWifiVar.prP2PConnSettings;
  1090. if (prSwitchOpMode->eOpMode >= OP_MODE_NUM) {
  1091. ASSERT(FALSE);
  1092. break;
  1093. }
  1094. /* P2P Device / GC. */
  1095. p2pFuncSwitchOPMode(prAdapter, prP2pBssInfo, prSwitchOpMode->eOpMode, TRUE);
  1096. } while (FALSE);
  1097. if (prMsgHdr)
  1098. cnmMemFree(prAdapter, prMsgHdr);
  1099. } /* p2pFsmRunEventSwitchOPMode */
  1100. /*----------------------------------------------------------------------------*/
  1101. /*!
  1102. * \brief This function is used to handle scan done event during Device Discovery.
  1103. *
  1104. * \param[in] prAdapter Pointer of ADAPTER_T
  1105. *
  1106. * \return none
  1107. */
  1108. /*----------------------------------------------------------------------------*/
  1109. VOID p2pFsmRunEventScanDone(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1110. {
  1111. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1112. P_P2P_SCAN_REQ_INFO_T prScanReqInfo = (P_P2P_SCAN_REQ_INFO_T) NULL;
  1113. P_MSG_SCN_SCAN_DONE prScanDoneMsg = (P_MSG_SCN_SCAN_DONE) NULL;
  1114. ENUM_P2P_STATE_T eNextState = P2P_STATE_NUM;
  1115. do {
  1116. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1117. /* This scan done event is either for "SCAN" phase or "SEARCH" state or "LISTEN" state.
  1118. * The scan done for SCAN phase & SEARCH state doesn't imply Device
  1119. * Discovery over.
  1120. */
  1121. DBGLOG(P2P, TRACE, "P2P Scan Done Event\n");
  1122. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1123. if (prP2pFsmInfo == NULL)
  1124. break;
  1125. prScanReqInfo = &(prP2pFsmInfo->rScanReqInfo);
  1126. prScanDoneMsg = (P_MSG_SCN_SCAN_DONE) prMsgHdr;
  1127. if (prScanDoneMsg->ucSeqNum != prScanReqInfo->ucSeqNumOfScnMsg) {
  1128. /* Scan Done message sequence number mismatch.
  1129. * Ignore this event. (P2P FSM issue two scan events.)
  1130. */
  1131. /* The scan request has been cancelled.
  1132. * Ignore this message. It is possible.
  1133. */
  1134. DBGLOG(P2P, TRACE, "P2P Scan Don SeqNum:%d <-> P2P Fsm SCAN Msg:%d\n",
  1135. prScanDoneMsg->ucSeqNum, prScanReqInfo->ucSeqNumOfScnMsg);
  1136. break;
  1137. }
  1138. switch (prP2pFsmInfo->eCurrentState) {
  1139. case P2P_STATE_SCAN:
  1140. {
  1141. P_P2P_CONNECTION_REQ_INFO_T prConnReqInfo = &(prP2pFsmInfo->rConnReqInfo);
  1142. prScanReqInfo->fgIsAbort = FALSE;
  1143. if (prConnReqInfo->fgIsConnRequest) {
  1144. prP2pFsmInfo->prTargetBss = p2pFuncKeepOnConnection(prAdapter,
  1145. &prP2pFsmInfo->rConnReqInfo,
  1146. &prP2pFsmInfo->rChnlReqInfo,
  1147. &prP2pFsmInfo->rScanReqInfo);
  1148. if (prP2pFsmInfo->prTargetBss == NULL)
  1149. eNextState = P2P_STATE_SCAN;
  1150. else
  1151. eNextState = P2P_STATE_REQING_CHANNEL;
  1152. } else {
  1153. eNextState = P2P_STATE_IDLE;
  1154. }
  1155. }
  1156. break;
  1157. case P2P_STATE_AP_CHANNEL_DETECT:
  1158. eNextState = P2P_STATE_REQING_CHANNEL;
  1159. break;
  1160. default:
  1161. /* Unexpected channel scan done event without being chanceled. */
  1162. ASSERT(FALSE);
  1163. break;
  1164. }
  1165. prScanReqInfo->fgIsScanRequest = FALSE;
  1166. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, eNextState);
  1167. } while (FALSE);
  1168. if (prMsgHdr)
  1169. cnmMemFree(prAdapter, prMsgHdr);
  1170. } /* p2pFsmRunEventScanDone */
  1171. /*----------------------------------------------------------------------------*/
  1172. /*!
  1173. * \brief This function is call when channel is granted by CNM module from FW.
  1174. *
  1175. * \param[in] prAdapter Pointer of ADAPTER_T
  1176. *
  1177. * \return none
  1178. */
  1179. /*----------------------------------------------------------------------------*/
  1180. VOID p2pFsmRunEventChGrant(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1181. {
  1182. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1183. P_P2P_CHNL_REQ_INFO_T prChnlReqInfo = (P_P2P_CHNL_REQ_INFO_T) NULL;
  1184. P_MSG_CH_GRANT_T prMsgChGrant = (P_MSG_CH_GRANT_T) NULL;
  1185. UINT_8 ucTokenID = 0;
  1186. do {
  1187. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1188. DBGLOG(P2P, TRACE, "P2P Run Event Channel Grant\n");
  1189. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1190. if (prP2pFsmInfo == NULL)
  1191. break;
  1192. prMsgChGrant = (P_MSG_CH_GRANT_T) prMsgHdr;
  1193. ucTokenID = prMsgChGrant->ucTokenID;
  1194. prP2pFsmInfo->u4GrantInterval = prMsgChGrant->u4GrantInterval;
  1195. prChnlReqInfo = &(prP2pFsmInfo->rChnlReqInfo);
  1196. if (ucTokenID == prChnlReqInfo->ucSeqNumOfChReq) {
  1197. ENUM_P2P_STATE_T eNextState = P2P_STATE_NUM;
  1198. switch (prP2pFsmInfo->eCurrentState) {
  1199. case P2P_STATE_REQING_CHANNEL:
  1200. switch (prChnlReqInfo->eChannelReqType) {
  1201. case CHANNEL_REQ_TYPE_REMAIN_ON_CHANNEL:
  1202. eNextState = P2P_STATE_CHNL_ON_HAND;
  1203. break;
  1204. case CHANNEL_REQ_TYPE_GC_JOIN_REQ:
  1205. eNextState = P2P_STATE_GC_JOIN;
  1206. break;
  1207. case CHANNEL_REQ_TYPE_GO_START_BSS:
  1208. eNextState = P2P_STATE_IDLE;
  1209. break;
  1210. default:
  1211. break;
  1212. }
  1213. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, eNextState);
  1214. break;
  1215. default:
  1216. /* Channel is granted under unexpected state.
  1217. * Driver should cancel channel privileagea before leaving the states.
  1218. */
  1219. ASSERT(FALSE);
  1220. break;
  1221. }
  1222. } else {
  1223. /* Channel requsted, but released. */
  1224. /* ASSERT(!prChnlReqInfo->fgIsChannelRequested); */
  1225. DBGLOG(P2P, TRACE, "Channel requsted, but released\n");
  1226. }
  1227. } while (FALSE);
  1228. if (prMsgHdr)
  1229. cnmMemFree(prAdapter, prMsgHdr);
  1230. return;
  1231. } /* p2pFsmRunEventChGrant */
  1232. VOID p2pFsmRunEventChannelRequest(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1233. {
  1234. P_P2P_CHNL_REQ_INFO_T prChnlReqInfo = (P_P2P_CHNL_REQ_INFO_T) NULL;
  1235. P_MSG_P2P_CHNL_REQUEST_T prP2pChnlReqMsg = (P_MSG_P2P_CHNL_REQUEST_T) NULL;
  1236. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1237. ENUM_P2P_STATE_T eNextState = P2P_STATE_NUM;
  1238. do {
  1239. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1240. prP2pChnlReqMsg = (P_MSG_P2P_CHNL_REQUEST_T) prMsgHdr;
  1241. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1242. if (prP2pFsmInfo == NULL)
  1243. break;
  1244. prChnlReqInfo = &(prP2pFsmInfo->rChnlReqInfo);
  1245. DBGLOG(P2P, TRACE, "p2pFsmRunEventChannelRequest\n");
  1246. /* Special case of time renewing for same frequency. */
  1247. if ((prP2pFsmInfo->eCurrentState == P2P_STATE_CHNL_ON_HAND) &&
  1248. (prChnlReqInfo->ucReqChnlNum == prP2pChnlReqMsg->rChannelInfo.ucChannelNum) &&
  1249. (prChnlReqInfo->eBand == prP2pChnlReqMsg->rChannelInfo.eBand) &&
  1250. (prChnlReqInfo->eChnlSco == prP2pChnlReqMsg->eChnlSco)) {
  1251. ASSERT(prChnlReqInfo->fgIsChannelRequested == TRUE);
  1252. ASSERT(prChnlReqInfo->eChannelReqType == CHANNEL_REQ_TYPE_REMAIN_ON_CHANNEL);
  1253. prChnlReqInfo->u8Cookie = prP2pChnlReqMsg->u8Cookie;
  1254. prChnlReqInfo->u4MaxInterval = prP2pChnlReqMsg->u4Duration;
  1255. /* Re-enter the state. */
  1256. eNextState = P2P_STATE_CHNL_ON_HAND;
  1257. } else {
  1258. /* Make sure the state is in IDLE state. */
  1259. p2pFsmRunEventAbort(prAdapter, prP2pFsmInfo);
  1260. /* Cookie can only be assign after abort.(for indication) */
  1261. prChnlReqInfo->u8Cookie = prP2pChnlReqMsg->u8Cookie;
  1262. prChnlReqInfo->ucReqChnlNum = prP2pChnlReqMsg->rChannelInfo.ucChannelNum;
  1263. prChnlReqInfo->eBand = prP2pChnlReqMsg->rChannelInfo.eBand;
  1264. prChnlReqInfo->eChnlSco = prP2pChnlReqMsg->eChnlSco;
  1265. prChnlReqInfo->u4MaxInterval = prP2pChnlReqMsg->u4Duration;
  1266. prChnlReqInfo->eChannelReqType = CHANNEL_REQ_TYPE_REMAIN_ON_CHANNEL;
  1267. eNextState = P2P_STATE_REQING_CHANNEL;
  1268. }
  1269. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, eNextState);
  1270. } while (FALSE);
  1271. if (prMsgHdr)
  1272. cnmMemFree(prAdapter, prMsgHdr);
  1273. } /* p2pFsmRunEventChannelRequest */
  1274. VOID p2pFsmRunEventChannelAbort(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1275. {
  1276. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1277. P_MSG_P2P_CHNL_ABORT_T prChnlAbortMsg = (P_MSG_P2P_CHNL_ABORT_T) NULL;
  1278. P_P2P_CHNL_REQ_INFO_T prChnlReqInfo = (P_P2P_CHNL_REQ_INFO_T) NULL;
  1279. do {
  1280. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1281. prChnlAbortMsg = (P_MSG_P2P_CHNL_ABORT_T) prMsgHdr;
  1282. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1283. if (prP2pFsmInfo == NULL)
  1284. break;
  1285. prChnlReqInfo = &prP2pFsmInfo->rChnlReqInfo;
  1286. DBGLOG(P2P, TRACE, "p2pFsmRunEventChannelAbort\n");
  1287. if ((prChnlAbortMsg->u8Cookie == prChnlReqInfo->u8Cookie) && (prChnlReqInfo->fgIsChannelRequested)) {
  1288. ASSERT((prP2pFsmInfo->eCurrentState == P2P_STATE_REQING_CHANNEL ||
  1289. (prP2pFsmInfo->eCurrentState == P2P_STATE_CHNL_ON_HAND)));
  1290. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_IDLE);
  1291. }
  1292. } while (FALSE);
  1293. if (prMsgHdr)
  1294. cnmMemFree(prAdapter, prMsgHdr);
  1295. } /* p2pFsmRunEventChannelAbort */
  1296. VOID p2pFsmRunEventScanRequest(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1297. {
  1298. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1299. P_MSG_P2P_SCAN_REQUEST_T prP2pScanReqMsg = (P_MSG_P2P_SCAN_REQUEST_T) NULL;
  1300. P_P2P_SCAN_REQ_INFO_T prScanReqInfo = (P_P2P_SCAN_REQ_INFO_T) NULL;
  1301. UINT_32 u4ChnlListSize = 0;
  1302. do {
  1303. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1304. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1305. if (prP2pFsmInfo == NULL)
  1306. break;
  1307. prP2pScanReqMsg = (P_MSG_P2P_SCAN_REQUEST_T) prMsgHdr;
  1308. prScanReqInfo = &(prP2pFsmInfo->rScanReqInfo);
  1309. DBGLOG(P2P, TRACE, "p2pFsmRunEventScanRequest\n");
  1310. /* Make sure the state is in IDLE state. */
  1311. p2pFsmRunEventAbort(prAdapter, prP2pFsmInfo);
  1312. ASSERT(prScanReqInfo->fgIsScanRequest == FALSE);
  1313. prScanReqInfo->fgIsAbort = TRUE;
  1314. prScanReqInfo->eScanType = SCAN_TYPE_ACTIVE_SCAN;
  1315. prScanReqInfo->eChannelSet = SCAN_CHANNEL_SPECIFIED;
  1316. /* Channel List */
  1317. prScanReqInfo->ucNumChannelList = prP2pScanReqMsg->u4NumChannel;
  1318. DBGLOG(P2P, TRACE, "Scan Request Channel List Number: %d\n", prScanReqInfo->ucNumChannelList);
  1319. if (prScanReqInfo->ucNumChannelList > MAXIMUM_OPERATION_CHANNEL_LIST) {
  1320. DBGLOG(P2P, TRACE, "Channel List Number Overloaded: %d, change to: %d\n",
  1321. prScanReqInfo->ucNumChannelList, MAXIMUM_OPERATION_CHANNEL_LIST);
  1322. prScanReqInfo->ucNumChannelList = MAXIMUM_OPERATION_CHANNEL_LIST;
  1323. }
  1324. u4ChnlListSize = sizeof(RF_CHANNEL_INFO_T) * prScanReqInfo->ucNumChannelList;
  1325. kalMemCopy(prScanReqInfo->arScanChannelList, prP2pScanReqMsg->arChannelListInfo, u4ChnlListSize);
  1326. /* TODO: I only take the first SSID. Multiple SSID may be needed in the future. */
  1327. /* SSID */
  1328. if (prP2pScanReqMsg->i4SsidNum >= 1)
  1329. kalMemCopy(&(prScanReqInfo->rSsidStruct), prP2pScanReqMsg->prSSID, sizeof(P2P_SSID_STRUCT_T));
  1330. else
  1331. prScanReqInfo->rSsidStruct.ucSsidLen = 0;
  1332. /* IE Buffer */
  1333. kalMemCopy(prScanReqInfo->aucIEBuf, prP2pScanReqMsg->pucIEBuf, prP2pScanReqMsg->u4IELen);
  1334. prScanReqInfo->u4BufLength = prP2pScanReqMsg->u4IELen;
  1335. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_SCAN);
  1336. } while (FALSE);
  1337. if (prMsgHdr)
  1338. cnmMemFree(prAdapter, prMsgHdr);
  1339. } /* p2pFsmRunEventScanRequest */
  1340. VOID p2pFsmRunEventScanAbort(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1341. {
  1342. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1343. do {
  1344. ASSERT_BREAK(prAdapter != NULL);
  1345. DBGLOG(P2P, TRACE, "p2pFsmRunEventScanAbort\n");
  1346. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1347. if (prP2pFsmInfo->eCurrentState == P2P_STATE_SCAN) {
  1348. P_P2P_SCAN_REQ_INFO_T prScanReqInfo = &(prP2pFsmInfo->rScanReqInfo);
  1349. prScanReqInfo->fgIsAbort = TRUE;
  1350. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_IDLE);
  1351. }
  1352. } while (FALSE);
  1353. if (prMsgHdr)
  1354. cnmMemFree(prAdapter, prMsgHdr);
  1355. } /* p2pFsmRunEventScanAbort */
  1356. VOID p2pFsmRunEventAbort(IN P_ADAPTER_T prAdapter, IN P_P2P_FSM_INFO_T prP2pFsmInfo)
  1357. {
  1358. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  1359. do {
  1360. ASSERT_BREAK((prAdapter != NULL) && (prP2pFsmInfo != NULL));
  1361. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  1362. DBGLOG(P2P, TRACE, "p2pFsmRunEventAbort\n");
  1363. if (prP2pFsmInfo->eCurrentState != P2P_STATE_IDLE) {
  1364. if (prP2pFsmInfo->eCurrentState == P2P_STATE_SCAN) {
  1365. P_P2P_SCAN_REQ_INFO_T prScanReqInfo = &(prP2pFsmInfo->rScanReqInfo);
  1366. prScanReqInfo->fgIsAbort = TRUE;
  1367. } else if (prP2pFsmInfo->eCurrentState == P2P_STATE_REQING_CHANNEL) {
  1368. /* 2012/08/06: frog
  1369. * Prevent Start GO.
  1370. */
  1371. prP2pBssInfo->eIntendOPMode = OP_MODE_NUM;
  1372. }
  1373. /* For other state, is there any special action that should be take before leaving? */
  1374. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_IDLE);
  1375. } else {
  1376. /* P2P State IDLE. */
  1377. P_P2P_CHNL_REQ_INFO_T prChnlReqInfo = &(prP2pFsmInfo->rChnlReqInfo);
  1378. if (prChnlReqInfo->fgIsChannelRequested)
  1379. p2pFuncReleaseCh(prAdapter, prChnlReqInfo);
  1380. cnmTimerStopTimer(prAdapter, &(prAdapter->rP2pFsmTimeoutTimer));
  1381. }
  1382. } while (FALSE);
  1383. } /* p2pFsmRunEventAbort */
  1384. /*----------------------------------------------------------------------------*/
  1385. /*!
  1386. * \brief This function is used to handle FSM Timeout.
  1387. *
  1388. * \param[in] prAdapter Pointer of ADAPTER_T
  1389. *
  1390. * \return none
  1391. */
  1392. /*----------------------------------------------------------------------------*/
  1393. VOID p2pFsmRunEventFsmTimeout(IN P_ADAPTER_T prAdapter, IN ULONG ulParam)
  1394. {
  1395. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) ulParam;
  1396. do {
  1397. ASSERT_BREAK((prAdapter != NULL) && (prP2pFsmInfo != NULL));
  1398. DBGLOG(P2P, TRACE, "P2P FSM Timeout Event\n");
  1399. switch (prP2pFsmInfo->eCurrentState) {
  1400. case P2P_STATE_IDLE:
  1401. {
  1402. P_P2P_CHNL_REQ_INFO_T prChnlReqInfo = &prP2pFsmInfo->rChnlReqInfo;
  1403. if (prChnlReqInfo->fgIsChannelRequested) {
  1404. p2pFuncReleaseCh(prAdapter, prChnlReqInfo);
  1405. } else if (IS_NET_PWR_STATE_IDLE(prAdapter, NETWORK_TYPE_P2P_INDEX)) {
  1406. UNSET_NET_ACTIVE(prAdapter, NETWORK_TYPE_P2P_INDEX);
  1407. nicDeactivateNetwork(prAdapter, NETWORK_TYPE_P2P_INDEX);
  1408. }
  1409. }
  1410. break;
  1411. /* case P2P_STATE_SCAN: */
  1412. /* break; */
  1413. /* case P2P_STATE_AP_CHANNEL_DETECT: */
  1414. /* break; */
  1415. /* case P2P_STATE_REQING_CHANNEL: */
  1416. /* break; */
  1417. case P2P_STATE_CHNL_ON_HAND:
  1418. {
  1419. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_IDLE);
  1420. }
  1421. break;
  1422. /* case P2P_STATE_GC_JOIN: */
  1423. /* break; */
  1424. default:
  1425. break;
  1426. }
  1427. } while (FALSE);
  1428. } /* p2pFsmRunEventFsmTimeout */
  1429. VOID p2pFsmRunEventMgmtFrameTx(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1430. {
  1431. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1432. P_MSG_P2P_MGMT_TX_REQUEST_T prMgmtTxMsg = (P_MSG_P2P_MGMT_TX_REQUEST_T) NULL;
  1433. do {
  1434. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1435. DBGLOG(P2P, TRACE, "p2pFsmRunEventMgmtFrameTx\n");
  1436. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1437. if (prP2pFsmInfo == NULL)
  1438. break;
  1439. prMgmtTxMsg = (P_MSG_P2P_MGMT_TX_REQUEST_T) prMsgHdr;
  1440. p2pFuncTxMgmtFrame(prAdapter,
  1441. &prP2pFsmInfo->rMgmtTxInfo, prMgmtTxMsg->prMgmtMsduInfo, prMgmtTxMsg->u8Cookie);
  1442. } while (FALSE);
  1443. if (prMsgHdr)
  1444. cnmMemFree(prAdapter, prMsgHdr);
  1445. return;
  1446. } /* p2pFsmRunEventMgmtTx */
  1447. VOID p2pFsmRunEventStartAP(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1448. {
  1449. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1450. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  1451. P_MSG_P2P_START_AP_T prP2pStartAPMsg = (P_MSG_P2P_START_AP_T) NULL;
  1452. P_P2P_SPECIFIC_BSS_INFO_T prP2pSpecificBssInfo = (P_P2P_SPECIFIC_BSS_INFO_T) NULL;
  1453. do {
  1454. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1455. DBGLOG(P2P, TRACE, "p2pFsmRunEventStartAP\n");
  1456. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1457. if (prP2pFsmInfo == NULL)
  1458. break;
  1459. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  1460. prP2pStartAPMsg = (P_MSG_P2P_START_AP_T) prMsgHdr;
  1461. prP2pSpecificBssInfo = prAdapter->rWifiVar.prP2pSpecificBssInfo;
  1462. if (prP2pStartAPMsg->u4BcnInterval) {
  1463. DBGLOG(P2P, TRACE, "Beacon interval updated to :%u\n", prP2pStartAPMsg->u4BcnInterval);
  1464. prP2pBssInfo->u2BeaconInterval = (UINT_16) prP2pStartAPMsg->u4BcnInterval;
  1465. } else if (prP2pBssInfo->u2BeaconInterval == 0) {
  1466. prP2pBssInfo->u2BeaconInterval = DOT11_BEACON_PERIOD_DEFAULT;
  1467. }
  1468. if (prP2pStartAPMsg->u4DtimPeriod) {
  1469. DBGLOG(P2P, TRACE, "DTIM interval updated to :%u\n", prP2pStartAPMsg->u4DtimPeriod);
  1470. prP2pBssInfo->ucDTIMPeriod = (UINT_8) prP2pStartAPMsg->u4DtimPeriod;
  1471. } else if (prP2pBssInfo->ucDTIMPeriod == 0) {
  1472. prP2pBssInfo->ucDTIMPeriod = DOT11_DTIM_PERIOD_DEFAULT;
  1473. }
  1474. if (prP2pStartAPMsg->u2SsidLen != 0) {
  1475. kalMemCopy(prP2pBssInfo->aucSSID, prP2pStartAPMsg->aucSsid, prP2pStartAPMsg->u2SsidLen);
  1476. kalMemCopy(prP2pSpecificBssInfo->aucGroupSsid, prP2pStartAPMsg->aucSsid,
  1477. prP2pStartAPMsg->u2SsidLen);
  1478. prP2pBssInfo->ucSSIDLen = prP2pSpecificBssInfo->u2GroupSsidLen = prP2pStartAPMsg->u2SsidLen;
  1479. }
  1480. prP2pBssInfo->eHiddenSsidType = prP2pStartAPMsg->ucHiddenSsidType;
  1481. /* TODO: JB */
  1482. /* Privacy & inactive timeout. */
  1483. if ((prP2pBssInfo->eCurrentOPMode != OP_MODE_ACCESS_POINT) ||
  1484. (prP2pBssInfo->eIntendOPMode != OP_MODE_NUM)) {
  1485. UINT_8 ucPreferedChnl = 0;
  1486. ENUM_BAND_T eBand = BAND_NULL;
  1487. ENUM_CHNL_EXT_T eSco = CHNL_EXT_SCN;
  1488. ENUM_P2P_STATE_T eNextState = P2P_STATE_SCAN;
  1489. P_P2P_CONNECTION_SETTINGS_T prP2pConnSettings = prAdapter->rWifiVar.prP2PConnSettings;
  1490. if (prP2pFsmInfo->eCurrentState != P2P_STATE_SCAN &&
  1491. prP2pFsmInfo->eCurrentState != P2P_STATE_IDLE) {
  1492. /* Make sure the state is in IDLE state. */
  1493. p2pFsmRunEventAbort(prAdapter, prP2pFsmInfo);
  1494. }
  1495. prAdapter->rWifiVar.prP2pFsmInfo->rScanReqInfo.fgIsGOInitialDone = 0;
  1496. DBGLOG(P2P, INFO,
  1497. "NFC:p2pFsmRunEventStartAP,fgIsGOInitialDone[%d]\n",
  1498. prAdapter->rWifiVar.prP2pFsmInfo->rScanReqInfo.fgIsGOInitialDone);
  1499. /* 20120118: Moved to p2pFuncSwitchOPMode(). */
  1500. /* SET_NET_ACTIVE(prAdapter, NETWORK_TYPE_P2P_INDEX); */
  1501. /* Leave IDLE state. */
  1502. SET_NET_PWR_STATE_ACTIVE(prAdapter, NETWORK_TYPE_P2P_INDEX);
  1503. /* sync with firmware */
  1504. /* DBGLOG(P2P, INFO, ("Activate P2P Network.\n")); */
  1505. /* nicActivateNetwork(prAdapter, NETWORK_TYPE_P2P_INDEX); */
  1506. /* Key to trigger P2P FSM to allocate channel for AP mode. */
  1507. prP2pBssInfo->eIntendOPMode = OP_MODE_ACCESS_POINT;
  1508. /* Sparse Channel to decide which channel to use. */
  1509. if ((cnmPreferredChannel(prAdapter,
  1510. &eBand,
  1511. &ucPreferedChnl,
  1512. &eSco) == FALSE) && (prP2pConnSettings->ucOperatingChnl == 0)) {
  1513. /* Sparse Channel Detection using passive mode. */
  1514. eNextState = P2P_STATE_AP_CHANNEL_DETECT;
  1515. } else {
  1516. P_P2P_SPECIFIC_BSS_INFO_T prP2pSpecificBssInfo =
  1517. prAdapter->rWifiVar.prP2pSpecificBssInfo;
  1518. P_P2P_CHNL_REQ_INFO_T prChnlReqInfo = &prP2pFsmInfo->rChnlReqInfo;
  1519. #if 1
  1520. /* 2012-01-27: frog - Channel set from upper layer is the first priority. */
  1521. /* Because the channel & beacon is decided by p2p_supplicant. */
  1522. if (prP2pConnSettings->ucOperatingChnl != 0) {
  1523. prP2pSpecificBssInfo->ucPreferredChannel = prP2pConnSettings->ucOperatingChnl;
  1524. prP2pSpecificBssInfo->eRfBand = prP2pConnSettings->eBand;
  1525. }
  1526. else {
  1527. ASSERT(ucPreferedChnl != 0);
  1528. prP2pSpecificBssInfo->ucPreferredChannel = ucPreferedChnl;
  1529. prP2pSpecificBssInfo->eRfBand = eBand;
  1530. }
  1531. #else
  1532. if (ucPreferedChnl) {
  1533. prP2pSpecificBssInfo->ucPreferredChannel = ucPreferedChnl;
  1534. prP2pSpecificBssInfo->eRfBand = eBand;
  1535. } else {
  1536. ASSERT(prP2pConnSettings->ucOperatingChnl != 0);
  1537. prP2pSpecificBssInfo->ucPreferredChannel = prP2pConnSettings->ucOperatingChnl;
  1538. prP2pSpecificBssInfo->eRfBand = prP2pConnSettings->eBand;
  1539. }
  1540. #endif
  1541. prChnlReqInfo->ucReqChnlNum = prP2pSpecificBssInfo->ucPreferredChannel;
  1542. prChnlReqInfo->eBand = prP2pSpecificBssInfo->eRfBand;
  1543. prChnlReqInfo->eChannelReqType = CHANNEL_REQ_TYPE_GO_START_BSS;
  1544. DBGLOG(P2P, INFO, "p2pFsmRunEventStartAP GO Scan\n");
  1545. }
  1546. /* If channel is specified, use active scan to shorten the scan time. */
  1547. p2pFsmStateTransition(prAdapter, prAdapter->rWifiVar.prP2pFsmInfo, eNextState);
  1548. }
  1549. } while (FALSE);
  1550. if (prMsgHdr)
  1551. cnmMemFree(prAdapter, prMsgHdr);
  1552. } /* p2pFsmRunEventStartAP */
  1553. VOID p2pFsmRunEventNetDeviceRegister(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1554. {
  1555. P_MSG_P2P_NETDEV_REGISTER_T prNetDevRegisterMsg = (P_MSG_P2P_NETDEV_REGISTER_T) NULL;
  1556. do {
  1557. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1558. DBGLOG(P2P, TRACE, "p2pFsmRunEventNetDeviceRegister\n");
  1559. prNetDevRegisterMsg = (P_MSG_P2P_NETDEV_REGISTER_T) prMsgHdr;
  1560. if (prNetDevRegisterMsg->fgIsEnable) {
  1561. p2pSetMode((prNetDevRegisterMsg->ucMode == 1) ? TRUE : FALSE);
  1562. if (p2pLaunch(prAdapter->prGlueInfo))
  1563. ASSERT(prAdapter->fgIsP2PRegistered);
  1564. } else {
  1565. if (prAdapter->fgIsP2PRegistered)
  1566. p2pRemove(prAdapter->prGlueInfo);
  1567. }
  1568. } while (FALSE);
  1569. if (prMsgHdr)
  1570. cnmMemFree(prAdapter, prMsgHdr);
  1571. } /* p2pFsmRunEventNetDeviceRegister */
  1572. VOID p2pFsmRunEventUpdateMgmtFrame(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1573. {
  1574. P_MSG_P2P_MGMT_FRAME_UPDATE_T prP2pMgmtFrameUpdateMsg = (P_MSG_P2P_MGMT_FRAME_UPDATE_T) NULL;
  1575. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1576. do {
  1577. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1578. DBGLOG(P2P, TRACE, "p2pFsmRunEventUpdateMgmtFrame\n");
  1579. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1580. if (prP2pFsmInfo == NULL)
  1581. break;
  1582. prP2pMgmtFrameUpdateMsg = (P_MSG_P2P_MGMT_FRAME_UPDATE_T) prMsgHdr;
  1583. switch (prP2pMgmtFrameUpdateMsg->eBufferType) {
  1584. case ENUM_FRAME_TYPE_EXTRA_IE_BEACON:
  1585. break;
  1586. case ENUM_FRAME_TYPE_EXTRA_IE_ASSOC_RSP:
  1587. break;
  1588. case ENUM_FRAME_TYPE_EXTRA_IE_PROBE_RSP:
  1589. break;
  1590. case ENUM_FRAME_TYPE_PROBE_RSP_TEMPLATE:
  1591. break;
  1592. case ENUM_FRAME_TYPE_BEACON_TEMPLATE:
  1593. break;
  1594. default:
  1595. break;
  1596. }
  1597. } while (FALSE);
  1598. if (prMsgHdr)
  1599. cnmMemFree(prAdapter, prMsgHdr);
  1600. } /* p2pFsmRunEventUpdateMgmtFrame */
  1601. VOID p2pFsmRunEventBeaconUpdate(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1602. {
  1603. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1604. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  1605. P_MSG_P2P_BEACON_UPDATE_T prBcnUpdateMsg = (P_MSG_P2P_BEACON_UPDATE_T) NULL;
  1606. do {
  1607. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1608. DBGLOG(P2P, TRACE, "p2pFsmRunEventBeaconUpdate\n");
  1609. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1610. if (prP2pFsmInfo == NULL)
  1611. break;
  1612. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  1613. prBcnUpdateMsg = (P_MSG_P2P_BEACON_UPDATE_T) prMsgHdr;
  1614. p2pFuncBeaconUpdate(prAdapter,
  1615. prP2pBssInfo,
  1616. &prP2pFsmInfo->rBcnContentInfo,
  1617. prBcnUpdateMsg->pucBcnHdr,
  1618. prBcnUpdateMsg->u4BcnHdrLen,
  1619. prBcnUpdateMsg->pucBcnBody, prBcnUpdateMsg->u4BcnBodyLen);
  1620. if ((prP2pBssInfo->eCurrentOPMode == OP_MODE_ACCESS_POINT) &&
  1621. (prP2pBssInfo->eIntendOPMode == OP_MODE_NUM)) {
  1622. /* AP is created, Beacon Update. */
  1623. /* nicPmIndicateBssAbort(prAdapter, NETWORK_TYPE_P2P_INDEX); */
  1624. bssUpdateBeaconContent(prAdapter, NETWORK_TYPE_P2P_INDEX);
  1625. /* nicPmIndicateBssCreated(prAdapter, NETWORK_TYPE_P2P_INDEX); */
  1626. }
  1627. } while (FALSE);
  1628. if (prMsgHdr)
  1629. cnmMemFree(prAdapter, prMsgHdr);
  1630. } /* p2pFsmRunEventBeaconUpdate */
  1631. VOID p2pFsmRunEventStopAP(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1632. {
  1633. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  1634. do {
  1635. ASSERT_BREAK((prAdapter != NULL));
  1636. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  1637. DBGLOG(P2P, TRACE, "p2pFsmRunEventStopAP\n");
  1638. if ((prP2pBssInfo->eCurrentOPMode == OP_MODE_ACCESS_POINT)
  1639. && (prP2pBssInfo->eIntendOPMode == OP_MODE_NUM)) {
  1640. /* AP is created, Beacon Update. */
  1641. p2pFuncDissolve(prAdapter, prP2pBssInfo, TRUE, REASON_CODE_DEAUTH_LEAVING_BSS);
  1642. DBGLOG(P2P, TRACE, "Stop Beaconing\n");
  1643. nicPmIndicateBssAbort(prAdapter, NETWORK_TYPE_P2P_INDEX);
  1644. /* Reset RLM related field of BSSINFO. */
  1645. rlmBssAborted(prAdapter, prP2pBssInfo);
  1646. }
  1647. /* 20120118: Moved to p2pFuncSwitchOPMode(). */
  1648. /* UNSET_NET_ACTIVE(prAdapter, NETWORK_TYPE_P2P_INDEX); */
  1649. /* Enter IDLE state. */
  1650. SET_NET_PWR_STATE_IDLE(prAdapter, NETWORK_TYPE_P2P_INDEX);
  1651. DBGLOG(P2P, INFO, "Re activate P2P Network.\n");
  1652. nicDeactivateNetwork(prAdapter, NETWORK_TYPE_P2P_INDEX);
  1653. nicActivateNetwork(prAdapter, NETWORK_TYPE_P2P_INDEX);
  1654. #if CFG_SUPPORT_WFD
  1655. p2pFsmRunEventWfdSettingUpdate(prAdapter, NULL);
  1656. #endif
  1657. /* p2pFsmRunEventAbort(prAdapter, prAdapter->rWifiVar.prP2pFsmInfo); */
  1658. p2pFsmStateTransition(prAdapter, prAdapter->rWifiVar.prP2pFsmInfo, P2P_STATE_IDLE);
  1659. } while (FALSE);
  1660. if (prMsgHdr)
  1661. cnmMemFree(prAdapter, prMsgHdr);
  1662. } /* p2pFsmRunEventStopAP */
  1663. VOID p2pFsmRunEventConnectionRequest(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1664. {
  1665. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  1666. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1667. P_P2P_CHNL_REQ_INFO_T prChnlReqInfo = (P_P2P_CHNL_REQ_INFO_T) NULL;
  1668. P_MSG_P2P_CONNECTION_REQUEST_T prConnReqMsg = (P_MSG_P2P_CONNECTION_REQUEST_T) NULL;
  1669. P_P2P_CONNECTION_REQ_INFO_T prConnReqInfo = (P_P2P_CONNECTION_REQ_INFO_T) NULL;
  1670. do {
  1671. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1672. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  1673. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1674. if (prP2pFsmInfo == NULL)
  1675. break;
  1676. prConnReqMsg = (P_MSG_P2P_CONNECTION_REQUEST_T) prMsgHdr;
  1677. prConnReqInfo = &(prP2pFsmInfo->rConnReqInfo);
  1678. prChnlReqInfo = &(prP2pFsmInfo->rChnlReqInfo);
  1679. DBGLOG(P2P, TRACE, "p2pFsmRunEventConnectionRequest\n");
  1680. if (prP2pBssInfo->eCurrentOPMode != OP_MODE_INFRASTRUCTURE)
  1681. break;
  1682. SET_NET_PWR_STATE_ACTIVE(prAdapter, NETWORK_TYPE_P2P_INDEX);
  1683. /* Make sure the state is in IDLE state. */
  1684. p2pFsmRunEventAbort(prAdapter, prP2pFsmInfo);
  1685. /* Update connection request information. */
  1686. prConnReqInfo->fgIsConnRequest = TRUE;
  1687. COPY_MAC_ADDR(prConnReqInfo->aucBssid, prConnReqMsg->aucBssid);
  1688. kalMemCopy(&(prConnReqInfo->rSsidStruct), &(prConnReqMsg->rSsid), sizeof(P2P_SSID_STRUCT_T));
  1689. kalMemCopy(prConnReqInfo->aucIEBuf, prConnReqMsg->aucIEBuf, prConnReqMsg->u4IELen);
  1690. prConnReqInfo->u4BufLength = prConnReqMsg->u4IELen;
  1691. /* Find BSS Descriptor first. */
  1692. prP2pFsmInfo->prTargetBss = scanP2pSearchDesc(prAdapter, prP2pBssInfo, prConnReqInfo);
  1693. if (prP2pFsmInfo->prTargetBss == NULL) {
  1694. /* Update scan parameter... to scan target device. */
  1695. P_P2P_SCAN_REQ_INFO_T prScanReqInfo = &(prP2pFsmInfo->rScanReqInfo);
  1696. DBGLOG(P2P, INFO, "p2pFsmRunEventConnectionRequest,Trigger New Scan\n");
  1697. prScanReqInfo->ucNumChannelList = 1;
  1698. prScanReqInfo->eScanType = SCAN_TYPE_ACTIVE_SCAN;
  1699. prScanReqInfo->eChannelSet = SCAN_CHANNEL_SPECIFIED;
  1700. prScanReqInfo->arScanChannelList[0].ucChannelNum = prConnReqMsg->rChannelInfo.ucChannelNum;
  1701. kalMemCopy(&(prScanReqInfo->rSsidStruct), &(prConnReqMsg->rSsid), sizeof(P2P_SSID_STRUCT_T));
  1702. prScanReqInfo->u4BufLength = 0; /* Prevent other P2P ID in IE. */
  1703. prScanReqInfo->fgIsAbort = TRUE;
  1704. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_SCAN);
  1705. } else {
  1706. prChnlReqInfo->u8Cookie = 0;
  1707. prChnlReqInfo->ucReqChnlNum = prConnReqMsg->rChannelInfo.ucChannelNum;
  1708. prChnlReqInfo->eBand = prConnReqMsg->rChannelInfo.eBand;
  1709. prChnlReqInfo->eChnlSco = prConnReqMsg->eChnlSco;
  1710. prChnlReqInfo->u4MaxInterval = AIS_JOIN_CH_REQUEST_INTERVAL;
  1711. prChnlReqInfo->eChannelReqType = CHANNEL_REQ_TYPE_GC_JOIN_REQ;
  1712. DBGLOG(P2P, INFO, "p2pFsmRunEventConnectionRequest, Report the Connecting BSS Again.\n");
  1713. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_REQING_CHANNEL);
  1714. }
  1715. } while (FALSE);
  1716. if (prMsgHdr)
  1717. cnmMemFree(prAdapter, prMsgHdr);
  1718. return;
  1719. } /* p2pFsmRunEventConnectionRequest */
  1720. /*----------------------------------------------------------------------------*/
  1721. /*!
  1722. * \brief This function is used to handle Connection Request from Supplicant.
  1723. *
  1724. * \param[in] prAdapter Pointer of ADAPTER_T
  1725. *
  1726. * \return none
  1727. */
  1728. /*----------------------------------------------------------------------------*/
  1729. VOID p2pFsmRunEventConnectionAbort(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1730. {
  1731. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1732. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  1733. P_MSG_P2P_CONNECTION_ABORT_T prDisconnMsg = (P_MSG_P2P_CONNECTION_ABORT_T) NULL;
  1734. /* P_STA_RECORD_T prTargetStaRec = (P_STA_RECORD_T)NULL; */
  1735. do {
  1736. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1737. DBGLOG(P2P, TRACE, "p2pFsmRunEventConnectionAbort: Connection Abort.\n");
  1738. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1739. if (prP2pFsmInfo == NULL)
  1740. break;
  1741. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  1742. prDisconnMsg = (P_MSG_P2P_CONNECTION_ABORT_T) prMsgHdr;
  1743. switch (prP2pBssInfo->eCurrentOPMode) {
  1744. case OP_MODE_INFRASTRUCTURE:
  1745. {
  1746. UINT_8 aucBCBSSID[] = BC_BSSID;
  1747. if (!prP2pBssInfo->prStaRecOfAP) {
  1748. DBGLOG(P2P, TRACE, "GO's StaRec is NULL\n");
  1749. break;
  1750. }
  1751. if (UNEQUAL_MAC_ADDR(prP2pBssInfo->prStaRecOfAP->aucMacAddr, prDisconnMsg->aucTargetID)
  1752. && UNEQUAL_MAC_ADDR(prDisconnMsg->aucTargetID, aucBCBSSID)) {
  1753. DBGLOG(P2P, TRACE,
  1754. "Unequal MAC ADDR [ %pM : %pM ]\n",
  1755. prP2pBssInfo->prStaRecOfAP->aucMacAddr,
  1756. prDisconnMsg->aucTargetID);
  1757. break;
  1758. }
  1759. kalP2PGCIndicateConnectionStatus(prAdapter->prGlueInfo, NULL, NULL, 0, 0,
  1760. WLAN_STATUS_MEDIA_DISCONNECT_LOCALLY);
  1761. /* Stop rejoin timer if it is started. */
  1762. /* TODO: If it has. */
  1763. p2pFuncDisconnect(prAdapter, prP2pBssInfo->prStaRecOfAP, prDisconnMsg->fgSendDeauth,
  1764. prDisconnMsg->u2ReasonCode);
  1765. /* prTargetStaRec = prP2pBssInfo->prStaRecOfAP; */
  1766. /* Fix possible KE when RX Beacon & call nicPmIndicateBssConnected(). */
  1767. /* hit prStaRecOfAP == NULL. */
  1768. p2pChangeMediaState(prAdapter, PARAM_MEDIA_STATE_DISCONNECTED);
  1769. prP2pBssInfo->prStaRecOfAP = NULL;
  1770. SET_NET_PWR_STATE_IDLE(prAdapter, NETWORK_TYPE_P2P_INDEX);
  1771. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_IDLE);
  1772. }
  1773. break;
  1774. case OP_MODE_ACCESS_POINT:
  1775. {
  1776. P_LINK_T prStaRecOfClientList = &prP2pBssInfo->rStaRecOfClientList;
  1777. /* Search specific client device, and disconnect. */
  1778. /* 1. Send deauthentication frame. */
  1779. /* 2. Indication: Device disconnect. */
  1780. P_LINK_ENTRY_T prLinkEntry = (P_LINK_ENTRY_T) NULL;
  1781. P_STA_RECORD_T prCurrStaRec = (P_STA_RECORD_T) NULL;
  1782. DBGLOG(P2P, TRACE,
  1783. "Disconnecting with Target ID: %pM\n",
  1784. prDisconnMsg->aucTargetID);
  1785. LINK_FOR_EACH(prLinkEntry, prStaRecOfClientList) {
  1786. prCurrStaRec = LINK_ENTRY(prLinkEntry, STA_RECORD_T, rLinkEntry);
  1787. ASSERT(prCurrStaRec);
  1788. if (EQUAL_MAC_ADDR(prCurrStaRec->aucMacAddr, prDisconnMsg->aucTargetID)) {
  1789. DBGLOG(P2P, TRACE,
  1790. "Disconnecting: %pM\n",
  1791. prCurrStaRec->aucMacAddr);
  1792. /* Remove STA from client list. */
  1793. LINK_REMOVE_KNOWN_ENTRY(prStaRecOfClientList,
  1794. &prCurrStaRec->rLinkEntry);
  1795. /* Glue layer indication. */
  1796. /* kalP2PGOStationUpdate(prAdapter->prGlueInfo, prCurrStaRec, FALSE); */
  1797. /* Send deauth & do indication. */
  1798. p2pFuncDisconnect(prAdapter, prCurrStaRec, prDisconnMsg->fgSendDeauth,
  1799. prDisconnMsg->u2ReasonCode);
  1800. /* prTargetStaRec = prCurrStaRec; */
  1801. break;
  1802. }
  1803. }
  1804. }
  1805. break;
  1806. case OP_MODE_P2P_DEVICE:
  1807. default:
  1808. ASSERT(FALSE);
  1809. break;
  1810. }
  1811. } while (FALSE);
  1812. /* 20120830 moved into p2pFuncDisconnect() */
  1813. /* if ((!prDisconnMsg->fgSendDeauth) && (prTargetStaRec)) { */
  1814. /* cnmStaRecFree(prAdapter, prTargetStaRec, TRUE); */
  1815. /* } */
  1816. if (prMsgHdr)
  1817. cnmMemFree(prAdapter, prMsgHdr);
  1818. } /* p2pFsmRunEventConnectionAbort */
  1819. VOID p2pFsmRunEventDissolve(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1820. {
  1821. /* TODO: */
  1822. DBGLOG(P2P, TRACE, "p2pFsmRunEventDissolve\n");
  1823. if (prMsgHdr)
  1824. cnmMemFree(prAdapter, prMsgHdr);
  1825. }
  1826. WLAN_STATUS
  1827. p2pFsmRunEventDeauthTxDone(IN P_ADAPTER_T prAdapter,
  1828. IN P_MSDU_INFO_T prMsduInfo, IN ENUM_TX_RESULT_CODE_T rTxDoneStatus)
  1829. {
  1830. P_STA_RECORD_T prStaRec = (P_STA_RECORD_T) NULL;
  1831. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  1832. ENUM_PARAM_MEDIA_STATE_T eOriMediaStatus;
  1833. do {
  1834. ASSERT_BREAK((prAdapter != NULL) && (prMsduInfo != NULL));
  1835. DBGLOG(P2P, INFO, "Deauth TX Done Status: %d, seqNo %d\n",
  1836. rTxDoneStatus, prMsduInfo->ucTxSeqNum);
  1837. prStaRec = cnmGetStaRecByIndex(prAdapter, prMsduInfo->ucStaRecIndex);
  1838. if (prStaRec == NULL) {
  1839. DBGLOG(P2P, TRACE, "Station Record NULL, Index:%d\n", prMsduInfo->ucStaRecIndex);
  1840. break;
  1841. }
  1842. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  1843. eOriMediaStatus = prP2pBssInfo->eConnectionState;
  1844. /* Change station state. */
  1845. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_1);
  1846. /* Reset Station Record Status. */
  1847. p2pFuncResetStaRecStatus(prAdapter, prStaRec);
  1848. bssRemoveStaRecFromClientList(prAdapter, prP2pBssInfo, prStaRec);
  1849. /**/ cnmStaRecFree(prAdapter, prStaRec, TRUE);
  1850. if ((prP2pBssInfo->eCurrentOPMode != OP_MODE_ACCESS_POINT) ||
  1851. (prP2pBssInfo->rStaRecOfClientList.u4NumElem == 0)) {
  1852. DBGLOG(P2P, TRACE, "No More Client, Media Status DISCONNECTED\n");
  1853. p2pChangeMediaState(prAdapter, PARAM_MEDIA_STATE_DISCONNECTED);
  1854. }
  1855. /* Because the eConnectionState is changed before Deauth TxDone. Dont Check eConnectionState */
  1856. /* if (eOriMediaStatus != prP2pBssInfo->eConnectionState) { */
  1857. /* Update Disconnected state to FW. */
  1858. nicUpdateBss(prAdapter, NETWORK_TYPE_P2P_INDEX);
  1859. /* } */
  1860. } while (FALSE);
  1861. return WLAN_STATUS_SUCCESS;
  1862. } /* p2pFsmRunEventDeauthTxDone */
  1863. WLAN_STATUS
  1864. p2pFsmRunEventMgmtFrameTxDone(IN P_ADAPTER_T prAdapter,
  1865. IN P_MSDU_INFO_T prMsduInfo, IN ENUM_TX_RESULT_CODE_T rTxDoneStatus)
  1866. {
  1867. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1868. P_P2P_MGMT_TX_REQ_INFO_T prMgmtTxReqInfo = (P_P2P_MGMT_TX_REQ_INFO_T) NULL;
  1869. BOOLEAN fgIsSuccess = FALSE;
  1870. do {
  1871. ASSERT_BREAK((prAdapter != NULL) && (prMsduInfo != NULL));
  1872. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1873. prMgmtTxReqInfo = &(prP2pFsmInfo->rMgmtTxInfo);
  1874. if (rTxDoneStatus != TX_RESULT_SUCCESS) {
  1875. DBGLOG(P2P, INFO, "Mgmt Frame TX Fail, Status: %d, seq NO. %d, Cookie: 0x%llx\n",
  1876. rTxDoneStatus, prMsduInfo->ucTxSeqNum, prMgmtTxReqInfo->u8Cookie);
  1877. } else {
  1878. fgIsSuccess = TRUE;
  1879. DBGLOG(P2P, TRACE, "Mgmt Frame TX Done.\n");
  1880. }
  1881. if (prMgmtTxReqInfo->prMgmtTxMsdu == prMsduInfo) {
  1882. kalP2PIndicateMgmtTxStatus(prAdapter->prGlueInfo,
  1883. prMgmtTxReqInfo->u8Cookie,
  1884. fgIsSuccess,
  1885. prMsduInfo->prPacket, (UINT_32) prMsduInfo->u2FrameLength);
  1886. prMgmtTxReqInfo->prMgmtTxMsdu = NULL;
  1887. }
  1888. } while (FALSE);
  1889. return WLAN_STATUS_SUCCESS;
  1890. } /* p2pFsmRunEventMgmtFrameTxDone */
  1891. /*----------------------------------------------------------------------------*/
  1892. /*!
  1893. * \brief This function is called when JOIN complete message event is received from SAA.
  1894. *
  1895. * \param[in] prAdapter Pointer of ADAPTER_T
  1896. *
  1897. * \return none
  1898. */
  1899. /*----------------------------------------------------------------------------*/
  1900. VOID p2pFsmRunEventJoinComplete(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  1901. {
  1902. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  1903. P_P2P_JOIN_INFO_T prJoinInfo = (P_P2P_JOIN_INFO_T) NULL;
  1904. P_MSG_JOIN_COMP_T prJoinCompMsg = (P_MSG_JOIN_COMP_T) NULL;
  1905. P_SW_RFB_T prAssocRspSwRfb = (P_SW_RFB_T) NULL;
  1906. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  1907. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  1908. DBGLOG(P2P, TRACE, "P2P Join Complete\n");
  1909. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  1910. if (prP2pFsmInfo == NULL) {
  1911. if (prMsgHdr)
  1912. cnmMemFree(prAdapter, prMsgHdr);
  1913. return;
  1914. }
  1915. prJoinInfo = &(prP2pFsmInfo->rJoinInfo);
  1916. if (prMsgHdr == NULL)
  1917. return;
  1918. prJoinCompMsg = (P_MSG_JOIN_COMP_T) prMsgHdr;
  1919. prAssocRspSwRfb = prJoinCompMsg->prSwRfb;
  1920. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  1921. if (prP2pBssInfo->eCurrentOPMode == OP_MODE_INFRASTRUCTURE) {
  1922. P_STA_RECORD_T prStaRec = (P_STA_RECORD_T) NULL;
  1923. prStaRec = prJoinCompMsg->prStaRec;
  1924. /* Check SEQ NUM */
  1925. if (prJoinCompMsg->ucSeqNum == prJoinInfo->ucSeqNumOfReqMsg) {
  1926. ASSERT(prStaRec == prJoinInfo->prTargetStaRec);
  1927. prJoinInfo->fgIsJoinComplete = TRUE;
  1928. if (prJoinCompMsg->rJoinStatus == WLAN_STATUS_SUCCESS) {
  1929. /* 4 <1.1> Change FW's Media State immediately. */
  1930. p2pChangeMediaState(prAdapter, PARAM_MEDIA_STATE_CONNECTED);
  1931. /* 4 <1.2> Deactivate previous AP's STA_RECORD_T in Driver if have. */
  1932. if ((prP2pBssInfo->prStaRecOfAP) && (prP2pBssInfo->prStaRecOfAP != prStaRec)) {
  1933. cnmStaRecChangeState(prAdapter, prP2pBssInfo->prStaRecOfAP,
  1934. STA_STATE_1);
  1935. cnmStaRecFree(prAdapter, prP2pBssInfo->prStaRecOfAP, TRUE);
  1936. prP2pBssInfo->prStaRecOfAP = NULL;
  1937. }
  1938. /* 4 <1.3> Update BSS_INFO_T */
  1939. p2pFuncUpdateBssInfoForJOIN(prAdapter, prP2pFsmInfo->prTargetBss, prStaRec,
  1940. prAssocRspSwRfb);
  1941. /* 4 <1.4> Activate current AP's STA_RECORD_T in Driver. */
  1942. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_3);
  1943. DBGLOG(P2P, INFO, "P2P GC Join Success\n");
  1944. #if CFG_SUPPORT_P2P_RSSI_QUERY
  1945. /* <1.5> Update RSSI if necessary */
  1946. nicUpdateRSSI(prAdapter, NETWORK_TYPE_P2P_INDEX,
  1947. (INT_8) (RCPI_TO_dBm(prStaRec->ucRCPI)), 0);
  1948. #endif
  1949. /* 4 <1.6> Indicate Connected Event to Host immediately. */
  1950. /* Require BSSID, Association ID, Beacon Interval.. from AIS_BSS_INFO_T */
  1951. /* p2pIndicationOfMediaStateToHost(prAdapter, PARAM_MEDIA_STATE_CONNECTED, */
  1952. /* prStaRec->aucMacAddr); */
  1953. if (prP2pFsmInfo->prTargetBss)
  1954. scanReportBss2Cfg80211(prAdapter, OP_MODE_P2P_DEVICE,
  1955. prP2pFsmInfo->prTargetBss);
  1956. kalP2PGCIndicateConnectionStatus(prAdapter->prGlueInfo,
  1957. &prP2pFsmInfo->rConnReqInfo,
  1958. prJoinInfo->aucIEBuf, prJoinInfo->u4BufLength,
  1959. prStaRec->u2StatusCode, WLAN_STATUS_MEDIA_CONNECT);
  1960. } else {
  1961. /* Join Fail */
  1962. /* 4 <2.1> Redo JOIN process with other Auth Type if possible */
  1963. if (p2pFuncRetryJOIN(prAdapter, prStaRec, prJoinInfo) == FALSE) {
  1964. P_BSS_DESC_T prBssDesc;
  1965. /* Increase Failure Count */
  1966. prStaRec->ucJoinFailureCount++;
  1967. prBssDesc = prP2pFsmInfo->prTargetBss;
  1968. ASSERT(prBssDesc);
  1969. ASSERT(prBssDesc->fgIsConnecting);
  1970. prBssDesc->fgIsConnecting = FALSE;
  1971. if (prStaRec->ucJoinFailureCount >= 3) {
  1972. kalP2PGCIndicateConnectionStatus(prAdapter->prGlueInfo,
  1973. &prP2pFsmInfo->rConnReqInfo,
  1974. prJoinInfo->aucIEBuf,
  1975. prJoinInfo->u4BufLength,
  1976. prStaRec->u2StatusCode,
  1977. WLAN_STATUS_MEDIA_DISCONNECT_LOCALLY);
  1978. } else {
  1979. /* Sometime the GO is not ready to response auth. */
  1980. /* Connect it again */
  1981. prP2pFsmInfo->prTargetBss = NULL;
  1982. }
  1983. DBGLOG(P2P, INFO, "P2P GC Join Failed\n");
  1984. }
  1985. }
  1986. }
  1987. }
  1988. if (prAssocRspSwRfb)
  1989. nicRxReturnRFB(prAdapter, prAssocRspSwRfb);
  1990. if (prP2pFsmInfo->eCurrentState == P2P_STATE_GC_JOIN) {
  1991. if (prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX].eConnectionState ==
  1992. PARAM_MEDIA_STATE_CONNECTED) {
  1993. /* Return to IDLE state. */
  1994. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_IDLE);
  1995. } else {
  1996. /* p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_IDLE); */
  1997. /* one more scan */
  1998. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_SCAN);
  1999. }
  2000. }
  2001. if (prMsgHdr)
  2002. cnmMemFree(prAdapter, prMsgHdr);
  2003. } /* p2pFsmRunEventJoinComplete */
  2004. VOID p2pFsmRunEventMgmtFrameRegister(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  2005. {
  2006. P_MSG_P2P_MGMT_FRAME_REGISTER_T prMgmtFrameRegister = (P_MSG_P2P_MGMT_FRAME_REGISTER_T) NULL;
  2007. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  2008. do {
  2009. ASSERT_BREAK((prAdapter != NULL) && (prMsgHdr != NULL));
  2010. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  2011. if (prP2pFsmInfo == NULL)
  2012. break;
  2013. prMgmtFrameRegister = (P_MSG_P2P_MGMT_FRAME_REGISTER_T) prMsgHdr;
  2014. p2pFuncMgmtFrameRegister(prAdapter,
  2015. prMgmtFrameRegister->u2FrameType,
  2016. prMgmtFrameRegister->fgIsRegister, &prP2pFsmInfo->u4P2pPacketFilter);
  2017. } while (FALSE);
  2018. if (prMsgHdr)
  2019. cnmMemFree(prAdapter, prMsgHdr);
  2020. return;
  2021. } /* p2pFsmRunEventMgmtFrameRegister */
  2022. /*----------------------------------------------------------------------------*/
  2023. /*!
  2024. * \brief This function is call when RX deauthentication frame from the AIR.
  2025. * If we are under STA mode, we would go back to P2P Device.
  2026. * If we are under AP mode, we would stay in AP mode until disconnect event from HOST.
  2027. *
  2028. * \param[in] prAdapter Pointer of ADAPTER_T
  2029. *
  2030. * \return none
  2031. */
  2032. /*----------------------------------------------------------------------------*/
  2033. VOID p2pFsmRunEventRxDeauthentication(IN P_ADAPTER_T prAdapter, IN P_STA_RECORD_T prStaRec, IN P_SW_RFB_T prSwRfb)
  2034. {
  2035. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  2036. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  2037. UINT_16 u2ReasonCode = 0;
  2038. do {
  2039. ASSERT_BREAK((prAdapter != NULL) && (prSwRfb != NULL));
  2040. if (prStaRec == NULL)
  2041. prStaRec = cnmGetStaRecByIndex(prAdapter, prSwRfb->ucStaRecIdx);
  2042. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  2043. if (prP2pFsmInfo == NULL)
  2044. break;
  2045. if (!prStaRec)
  2046. break;
  2047. prP2pBssInfo = &prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX];
  2048. if (prStaRec->ucStaState == STA_STATE_1)
  2049. break;
  2050. DBGLOG(P2P, TRACE, "RX Deauth\n");
  2051. switch (prP2pBssInfo->eCurrentOPMode) {
  2052. case OP_MODE_INFRASTRUCTURE:
  2053. if (authProcessRxDeauthFrame(prSwRfb,
  2054. prStaRec->aucMacAddr, &u2ReasonCode) == WLAN_STATUS_SUCCESS) {
  2055. P_WLAN_DEAUTH_FRAME_T prDeauthFrame = (P_WLAN_DEAUTH_FRAME_T) prSwRfb->pvHeader;
  2056. UINT_16 u2IELength = 0;
  2057. if (prP2pBssInfo->prStaRecOfAP != prStaRec)
  2058. break;
  2059. prStaRec->u2ReasonCode = u2ReasonCode;
  2060. u2IELength = prSwRfb->u2PacketLen - (WLAN_MAC_HEADER_LEN + REASON_CODE_FIELD_LEN);
  2061. ASSERT(prP2pBssInfo->prStaRecOfAP == prStaRec);
  2062. /* Indicate disconnect to Host. */
  2063. kalP2PGCIndicateConnectionStatus(prAdapter->prGlueInfo,
  2064. NULL,
  2065. prDeauthFrame->aucInfoElem, u2IELength, u2ReasonCode,
  2066. WLAN_STATUS_MEDIA_DISCONNECT);
  2067. prP2pBssInfo->prStaRecOfAP = NULL;
  2068. DBGLOG(P2P, INFO, "GC RX Deauth Reason: %d\n", u2ReasonCode);
  2069. p2pFuncDisconnect(prAdapter, prStaRec, FALSE, u2ReasonCode);
  2070. p2pChangeMediaState(prAdapter, PARAM_MEDIA_STATE_DISCONNECTED);
  2071. SET_NET_PWR_STATE_IDLE(prAdapter, NETWORK_TYPE_P2P_INDEX);
  2072. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_IDLE);
  2073. }
  2074. break;
  2075. case OP_MODE_ACCESS_POINT:
  2076. /* Delete client from client list. */
  2077. if (authProcessRxDeauthFrame(prSwRfb,
  2078. prP2pBssInfo->aucBSSID, &u2ReasonCode) == WLAN_STATUS_SUCCESS) {
  2079. P_LINK_T prStaRecOfClientList = (P_LINK_T) NULL;
  2080. P_LINK_ENTRY_T prLinkEntry = (P_LINK_ENTRY_T) NULL;
  2081. P_STA_RECORD_T prCurrStaRec = (P_STA_RECORD_T) NULL;
  2082. prStaRecOfClientList = &prP2pBssInfo->rStaRecOfClientList;
  2083. LINK_FOR_EACH(prLinkEntry, prStaRecOfClientList) {
  2084. prCurrStaRec = LINK_ENTRY(prLinkEntry, STA_RECORD_T, rLinkEntry);
  2085. ASSERT(prCurrStaRec);
  2086. if (EQUAL_MAC_ADDR(prCurrStaRec->aucMacAddr, prStaRec->aucMacAddr)) {
  2087. /* Remove STA from client list. */
  2088. LINK_REMOVE_KNOWN_ENTRY(prStaRecOfClientList,
  2089. &prCurrStaRec->rLinkEntry);
  2090. /* Indicate to Host. */
  2091. /* kalP2PGOStationUpdate(prAdapter->prGlueInfo, prStaRec, FALSE); */
  2092. /* Indicate disconnect to Host. */
  2093. DBGLOG(P2P, INFO, "GO RX Deauth Reason: %d\n", u2ReasonCode);
  2094. p2pFuncDisconnect(prAdapter, prStaRec, FALSE, u2ReasonCode);
  2095. break;
  2096. }
  2097. }
  2098. }
  2099. break;
  2100. case OP_MODE_P2P_DEVICE:
  2101. default:
  2102. /* Findout why someone sent deauthentication frame to us. */
  2103. ASSERT(FALSE);
  2104. break;
  2105. }
  2106. DBGLOG(P2P, TRACE, "Deauth Reason:%d\n", u2ReasonCode);
  2107. } while (FALSE);
  2108. } /* p2pFsmRunEventRxDeauthentication */
  2109. /*----------------------------------------------------------------------------*/
  2110. /*!
  2111. * \brief This function is call when RX deauthentication frame from the AIR.
  2112. * If we are under STA mode, we would go back to P2P Device.
  2113. * If we are under AP mode, we would stay in AP mode until disconnect event from HOST.
  2114. *
  2115. * \param[in] prAdapter Pointer of ADAPTER_T
  2116. *
  2117. * \return none
  2118. */
  2119. /*----------------------------------------------------------------------------*/
  2120. VOID p2pFsmRunEventRxDisassociation(IN P_ADAPTER_T prAdapter, IN P_STA_RECORD_T prStaRec, IN P_SW_RFB_T prSwRfb)
  2121. {
  2122. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  2123. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  2124. UINT_16 u2ReasonCode = 0;
  2125. do {
  2126. ASSERT_BREAK((prAdapter != NULL) && (prSwRfb != NULL));
  2127. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  2128. if (prP2pFsmInfo == NULL)
  2129. break;
  2130. if (prStaRec == NULL) {
  2131. prStaRec = cnmGetStaRecByIndex(prAdapter, prSwRfb->ucStaRecIdx);
  2132. if (prStaRec == NULL)
  2133. break;
  2134. }
  2135. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  2136. if (prStaRec->ucStaState == STA_STATE_1)
  2137. break;
  2138. DBGLOG(P2P, TRACE, "RX Disassoc\n");
  2139. switch (prP2pBssInfo->eCurrentOPMode) {
  2140. case OP_MODE_INFRASTRUCTURE:
  2141. if (assocProcessRxDisassocFrame(prAdapter,
  2142. prSwRfb,
  2143. prStaRec->aucMacAddr,
  2144. &prStaRec->u2ReasonCode) == WLAN_STATUS_SUCCESS) {
  2145. P_WLAN_DISASSOC_FRAME_T prDisassocFrame = (P_WLAN_DISASSOC_FRAME_T) prSwRfb->pvHeader;
  2146. UINT_16 u2IELength = 0;
  2147. ASSERT(prP2pBssInfo->prStaRecOfAP == prStaRec);
  2148. if (prP2pBssInfo->prStaRecOfAP != prStaRec)
  2149. break;
  2150. u2IELength = prSwRfb->u2PacketLen - (WLAN_MAC_HEADER_LEN + REASON_CODE_FIELD_LEN);
  2151. /* Indicate disconnect to Host. */
  2152. kalP2PGCIndicateConnectionStatus(prAdapter->prGlueInfo,
  2153. NULL,
  2154. prDisassocFrame->aucInfoElem,
  2155. u2IELength, prStaRec->u2ReasonCode,
  2156. WLAN_STATUS_MEDIA_DISCONNECT);
  2157. prP2pBssInfo->prStaRecOfAP = NULL;
  2158. DBGLOG(P2P, INFO, "GC RX Disassoc Reason %d\n", prStaRec->u2ReasonCode);
  2159. p2pFuncDisconnect(prAdapter, prStaRec, FALSE, prStaRec->u2ReasonCode);
  2160. p2pChangeMediaState(prAdapter, PARAM_MEDIA_STATE_DISCONNECTED);
  2161. SET_NET_PWR_STATE_IDLE(prAdapter, NETWORK_TYPE_P2P_INDEX);
  2162. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_IDLE);
  2163. }
  2164. break;
  2165. case OP_MODE_ACCESS_POINT:
  2166. /* Delete client from client list. */
  2167. if (assocProcessRxDisassocFrame(prAdapter,
  2168. prSwRfb,
  2169. prP2pBssInfo->aucBSSID, &u2ReasonCode) == WLAN_STATUS_SUCCESS) {
  2170. P_LINK_T prStaRecOfClientList = (P_LINK_T) NULL;
  2171. P_LINK_ENTRY_T prLinkEntry = (P_LINK_ENTRY_T) NULL;
  2172. P_STA_RECORD_T prCurrStaRec = (P_STA_RECORD_T) NULL;
  2173. prStaRecOfClientList = &prP2pBssInfo->rStaRecOfClientList;
  2174. LINK_FOR_EACH(prLinkEntry, prStaRecOfClientList) {
  2175. prCurrStaRec = LINK_ENTRY(prLinkEntry, STA_RECORD_T, rLinkEntry);
  2176. ASSERT(prCurrStaRec);
  2177. if (EQUAL_MAC_ADDR(prCurrStaRec->aucMacAddr, prStaRec->aucMacAddr)) {
  2178. /* Remove STA from client list. */
  2179. LINK_REMOVE_KNOWN_ENTRY(prStaRecOfClientList,
  2180. &prCurrStaRec->rLinkEntry);
  2181. /* Indicate to Host. */
  2182. /* kalP2PGOStationUpdate(prAdapter->prGlueInfo, prStaRec, FALSE); */
  2183. /* Indicate disconnect to Host. */
  2184. DBGLOG(P2P, INFO, "GO RX Disassoc Reason %d\n", u2ReasonCode);
  2185. p2pFuncDisconnect(prAdapter, prStaRec, FALSE, u2ReasonCode);
  2186. break;
  2187. }
  2188. }
  2189. }
  2190. break;
  2191. case OP_MODE_P2P_DEVICE:
  2192. default:
  2193. ASSERT(FALSE);
  2194. break;
  2195. }
  2196. } while (FALSE);
  2197. } /* p2pFsmRunEventRxDisassociation */
  2198. /*----------------------------------------------------------------------------*/
  2199. /*!
  2200. * \brief This function is called when a probe request frame is received.
  2201. *
  2202. * \param[in] prAdapter Pointer of ADAPTER_T
  2203. *
  2204. * \return boolean value if probe response frame is accepted & need cancel scan request.
  2205. */
  2206. /*----------------------------------------------------------------------------*/
  2207. VOID p2pFsmRunEventRxProbeResponseFrame(IN P_ADAPTER_T prAdapter, IN P_SW_RFB_T prSwRfb, IN P_BSS_DESC_T prBssDesc)
  2208. {
  2209. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  2210. P_P2P_CONNECTION_SETTINGS_T prP2pConnSettings = (P_P2P_CONNECTION_SETTINGS_T) NULL;
  2211. P_WLAN_MAC_MGMT_HEADER_T prMgtHdr = (P_WLAN_MAC_MGMT_HEADER_T) NULL;
  2212. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  2213. do {
  2214. ASSERT_BREAK((prAdapter != NULL) && (prSwRfb != NULL) && (prBssDesc != NULL));
  2215. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  2216. prP2pConnSettings = prAdapter->rWifiVar.prP2PConnSettings;
  2217. prP2pBssInfo = &prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX];
  2218. /* There is a connection request. */
  2219. prMgtHdr = (P_WLAN_MAC_MGMT_HEADER_T) prSwRfb->pvHeader;
  2220. } while (FALSE);
  2221. } /* p2pFsmRunEventRxProbeResponseFrame */
  2222. VOID p2pFsmRunEventBeaconTimeout(IN P_ADAPTER_T prAdapter)
  2223. {
  2224. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  2225. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  2226. do {
  2227. ASSERT_BREAK(prAdapter != NULL);
  2228. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  2229. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  2230. DBGLOG(P2P, TRACE, "p2pFsmRunEventBeaconTimeout: Beacon Timeout\n");
  2231. /* Only client mode would have beacon lost event. */
  2232. ASSERT(prP2pBssInfo->eCurrentOPMode == OP_MODE_INFRASTRUCTURE);
  2233. if (prP2pBssInfo->eConnectionState == PARAM_MEDIA_STATE_CONNECTED) {
  2234. /* Indicate disconnect to Host. */
  2235. kalP2PGCIndicateConnectionStatus(prAdapter->prGlueInfo,
  2236. NULL, NULL, 0, REASON_CODE_DISASSOC_INACTIVITY,
  2237. WLAN_STATUS_MEDIA_DISCONNECT_LOCALLY);
  2238. if (prP2pBssInfo->prStaRecOfAP != NULL) {
  2239. P_STA_RECORD_T prStaRec = prP2pBssInfo->prStaRecOfAP;
  2240. prP2pBssInfo->prStaRecOfAP = NULL;
  2241. p2pFuncDisconnect(prAdapter, prStaRec, FALSE, REASON_CODE_DISASSOC_LEAVING_BSS);
  2242. /* 20120830 moved into p2pFuncDisconnect() */
  2243. /* cnmStaRecFree(prAdapter, prP2pBssInfo->prStaRecOfAP, TRUE); */
  2244. p2pChangeMediaState(prAdapter, PARAM_MEDIA_STATE_DISCONNECTED);
  2245. SET_NET_PWR_STATE_IDLE(prAdapter, NETWORK_TYPE_P2P_INDEX);
  2246. p2pFsmStateTransition(prAdapter, prP2pFsmInfo, P2P_STATE_IDLE);
  2247. }
  2248. }
  2249. } while (FALSE);
  2250. } /* p2pFsmRunEventBeaconTimeout */
  2251. #if CFG_SUPPORT_WFD
  2252. VOID p2pFsmRunEventWfdSettingUpdate(IN P_ADAPTER_T prAdapter, IN P_MSG_HDR_T prMsgHdr)
  2253. {
  2254. P_WFD_CFG_SETTINGS_T prWfdCfgSettings = (P_WFD_CFG_SETTINGS_T) NULL;
  2255. P_MSG_WFD_CONFIG_SETTINGS_CHANGED_T prMsgWfdCfgSettings = (P_MSG_WFD_CONFIG_SETTINGS_CHANGED_T) NULL;
  2256. WLAN_STATUS rStatus;
  2257. DBGLOG(P2P, INFO, "p2pFsmRunEventWfdSettingUpdate\n");
  2258. do {
  2259. ASSERT_BREAK((prAdapter != NULL));
  2260. if (prMsgHdr != NULL) {
  2261. prMsgWfdCfgSettings = (P_MSG_WFD_CONFIG_SETTINGS_CHANGED_T) prMsgHdr;
  2262. prWfdCfgSettings = prMsgWfdCfgSettings->prWfdCfgSettings;
  2263. } else {
  2264. prWfdCfgSettings = &prAdapter->rWifiVar.prP2pFsmInfo->rWfdConfigureSettings;
  2265. }
  2266. DBGLOG(P2P, INFO, "WFD Enalbe %x info %x state %x flag %x adv %x\n",
  2267. prWfdCfgSettings->ucWfdEnable,
  2268. prWfdCfgSettings->u2WfdDevInfo,
  2269. (UINT_32) prWfdCfgSettings->u4WfdState,
  2270. (UINT_32) prWfdCfgSettings->u4WfdFlag,
  2271. (UINT_32) prWfdCfgSettings->u4WfdAdvancedFlag);
  2272. rStatus = wlanSendSetQueryCmd(prAdapter, /* prAdapter */
  2273. CMD_ID_SET_WFD_CTRL, /* ucCID */
  2274. TRUE, /* fgSetQuery */
  2275. FALSE, /* fgNeedResp */
  2276. FALSE, /* fgIsOid */
  2277. NULL, NULL, /* pfCmdTimeoutHandler */
  2278. sizeof(WFD_CFG_SETTINGS_T), /* u4SetQueryInfoLen */
  2279. (PUINT_8) prWfdCfgSettings, /* pucInfoBuffer */
  2280. NULL, /* pvSetQueryBuffer */
  2281. 0 /* u4SetQueryBufferLen */
  2282. );
  2283. } while (FALSE);
  2284. return;
  2285. }
  2286. /* p2pFsmRunEventWfdSettingUpdate */
  2287. #endif
  2288. /*----------------------------------------------------------------------------*/
  2289. /*!
  2290. * @brief This function is used to generate P2P IE for Beacon frame.
  2291. *
  2292. * @param[in] prMsduInfo Pointer to the composed MSDU_INFO_T.
  2293. *
  2294. * @return none
  2295. */
  2296. /*----------------------------------------------------------------------------*/
  2297. VOID p2pGenerateP2P_IEForAssocReq(IN P_ADAPTER_T prAdapter, IN P_MSDU_INFO_T prMsduInfo)
  2298. {
  2299. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  2300. P_STA_RECORD_T prStaRec = (P_STA_RECORD_T) NULL;
  2301. do {
  2302. ASSERT_BREAK((prAdapter != NULL) && (prMsduInfo != NULL));
  2303. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  2304. prStaRec = cnmGetStaRecByIndex(prAdapter, prMsduInfo->ucStaRecIndex);
  2305. if (prStaRec != NULL) {
  2306. if (IS_STA_P2P_TYPE(prStaRec)) {
  2307. /* Do nothing */
  2308. /* TODO: */
  2309. }
  2310. }
  2311. } while (FALSE);
  2312. return;
  2313. } /* end of p2pGenerateP2P_IEForAssocReq() */
  2314. /*----------------------------------------------------------------------------*/
  2315. /*!
  2316. * @brief This function is used to generate P2P IE for Probe Request frame.
  2317. *
  2318. * @param[in] prMsduInfo Pointer to the composed MSDU_INFO_T.
  2319. *
  2320. * @return none
  2321. */
  2322. /*----------------------------------------------------------------------------*/
  2323. VOID
  2324. p2pGenerateP2P_IEForProbeReq(IN P_ADAPTER_T prAdapter, IN PUINT_16 pu2Offset, IN PUINT_8 pucBuf, IN UINT_16 u2BufSize)
  2325. {
  2326. ASSERT(prAdapter);
  2327. ASSERT(pucBuf);
  2328. /* TODO: */
  2329. return;
  2330. } /* end of p2pGenerateP2P_IEForProbReq() */
  2331. /*----------------------------------------------------------------------------*/
  2332. /*!
  2333. * @brief This function is used to calculate P2P IE length for Beacon frame.
  2334. *
  2335. * @param[in] eNetTypeIndex Specify which network
  2336. * @param[in] prStaRec Pointer to the STA_RECORD_T
  2337. *
  2338. * @return The length of P2P IE added
  2339. */
  2340. /*----------------------------------------------------------------------------*/
  2341. UINT_32
  2342. p2pCalculateP2P_IELenForProbeReq(IN P_ADAPTER_T prAdapter,
  2343. IN ENUM_NETWORK_TYPE_INDEX_T eNetTypeIndex, IN P_STA_RECORD_T prStaRec)
  2344. {
  2345. if (eNetTypeIndex != NETWORK_TYPE_P2P_INDEX)
  2346. return 0;
  2347. /* TODO: */
  2348. return 0;
  2349. } /* end of p2pCalculateP2P_IELenForProbeReq() */
  2350. /*----------------------------------------------------------------------------*/
  2351. /*!
  2352. * @brief This function will indicate the Event of Tx Fail of AAA Module.
  2353. *
  2354. * @param[in] prAdapter Pointer to the Adapter structure.
  2355. * @param[in] prStaRec Pointer to the STA_RECORD_T
  2356. *
  2357. * @return (none)
  2358. */
  2359. /*----------------------------------------------------------------------------*/
  2360. VOID p2pRunEventAAATxFail(IN P_ADAPTER_T prAdapter, IN P_STA_RECORD_T prStaRec)
  2361. {
  2362. P_BSS_INFO_T prBssInfo;
  2363. ASSERT(prAdapter);
  2364. ASSERT(prStaRec);
  2365. prBssInfo = &(prAdapter->rWifiVar.arBssInfo[prStaRec->ucNetTypeIndex]);
  2366. bssRemoveStaRecFromClientList(prAdapter, prBssInfo, prStaRec);
  2367. p2pFuncDisconnect(prAdapter, prStaRec, FALSE, REASON_CODE_UNSPECIFIED);
  2368. /* 20120830 moved into p2puUncDisconnect. */
  2369. /* cnmStaRecFree(prAdapter, prStaRec, TRUE); */
  2370. } /* p2pRunEventAAATxFail */
  2371. /*----------------------------------------------------------------------------*/
  2372. /*!
  2373. * @brief This function will indicate the Event of Successful Completion of AAA Module.
  2374. *
  2375. * @param[in] prAdapter Pointer to the Adapter structure.
  2376. * @param[in] prStaRec Pointer to the STA_RECORD_T
  2377. *
  2378. * @return (none)
  2379. */
  2380. /*----------------------------------------------------------------------------*/
  2381. WLAN_STATUS p2pRunEventAAAComplete(IN P_ADAPTER_T prAdapter, IN P_STA_RECORD_T prStaRec)
  2382. {
  2383. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  2384. P_BSS_INFO_T prP2pBssInfo = (P_BSS_INFO_T) NULL;
  2385. ENUM_PARAM_MEDIA_STATE_T eOriMediaState;
  2386. do {
  2387. ASSERT_BREAK((prAdapter != NULL) && (prStaRec != NULL));
  2388. prP2pBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  2389. eOriMediaState = prP2pBssInfo->eConnectionState;
  2390. if (prStaRec != NULL)
  2391. bssRemoveStaRecFromClientList(prAdapter, prP2pBssInfo, prStaRec);
  2392. else
  2393. break;
  2394. if (prP2pBssInfo->rStaRecOfClientList.u4NumElem > P2P_MAXIMUM_CLIENT_COUNT ||
  2395. kalP2PMaxClients(prAdapter->prGlueInfo, prP2pBssInfo->rStaRecOfClientList.u4NumElem)) {
  2396. rStatus = WLAN_STATUS_RESOURCES;
  2397. break;
  2398. }
  2399. bssAddStaRecToClientList(prAdapter, prP2pBssInfo, prStaRec);
  2400. prStaRec->u2AssocId = bssAssignAssocID(prStaRec);
  2401. if (prP2pBssInfo->rStaRecOfClientList.u4NumElem > P2P_MAXIMUM_CLIENT_COUNT ||
  2402. kalP2PMaxClients(prAdapter->prGlueInfo, prP2pBssInfo->rStaRecOfClientList.u4NumElem)) {
  2403. rStatus = WLAN_STATUS_RESOURCES;
  2404. break;
  2405. }
  2406. DBGLOG(P2P, INFO, "P2P GO Join Complete\n");
  2407. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_3);
  2408. p2pChangeMediaState(prAdapter, PARAM_MEDIA_STATE_CONNECTED);
  2409. /* Update Connected state to FW. */
  2410. if (eOriMediaState != prP2pBssInfo->eConnectionState)
  2411. nicUpdateBss(prAdapter, NETWORK_TYPE_P2P_INDEX);
  2412. } while (FALSE);
  2413. return rStatus;
  2414. } /* p2pRunEventAAAComplete */
  2415. /*----------------------------------------------------------------------------*/
  2416. /*!
  2417. * @brief This function will indicate the Event of Successful Completion of AAA Module.
  2418. *
  2419. * @param[in] prAdapter Pointer to the Adapter structure.
  2420. * @param[in] prStaRec Pointer to the STA_RECORD_T
  2421. *
  2422. * @return (none)
  2423. */
  2424. /*----------------------------------------------------------------------------*/
  2425. WLAN_STATUS p2pRunEventAAASuccess(IN P_ADAPTER_T prAdapter, IN P_STA_RECORD_T prStaRec)
  2426. {
  2427. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  2428. do {
  2429. ASSERT_BREAK((prAdapter != NULL) && (prStaRec != NULL));
  2430. /* Glue layer indication. */
  2431. kalP2PGOStationUpdate(prAdapter->prGlueInfo, prStaRec, TRUE);
  2432. } while (FALSE);
  2433. return rStatus;
  2434. } /* p2pRunEventAAASuccess */
  2435. /*----------------------------------------------------------------------------*/
  2436. /*!
  2437. * \brief
  2438. *
  2439. * \param[in]
  2440. *
  2441. * \return none
  2442. */
  2443. /*----------------------------------------------------------------------------*/
  2444. WLAN_STATUS p2pRxPublicActionFrame(IN P_ADAPTER_T prAdapter, IN P_SW_RFB_T prSwRfb)
  2445. {
  2446. WLAN_STATUS rWlanStatus = WLAN_STATUS_SUCCESS;
  2447. P_P2P_PUBLIC_ACTION_FRAME_T prPublicActionFrame = (P_P2P_PUBLIC_ACTION_FRAME_T) NULL;
  2448. P_P2P_FSM_INFO_T prP2pFsmInfo = (P_P2P_FSM_INFO_T) NULL;
  2449. ASSERT(prSwRfb);
  2450. ASSERT(prAdapter);
  2451. prPublicActionFrame = (P_P2P_PUBLIC_ACTION_FRAME_T) prSwRfb->pvHeader;
  2452. prP2pFsmInfo = prAdapter->rWifiVar.prP2pFsmInfo;
  2453. DBGLOG(P2P, TRACE, "RX Public Action Frame Token:%d.\n", prPublicActionFrame->ucDialogToken);
  2454. if (prPublicActionFrame->ucCategory != CATEGORY_PUBLIC_ACTION)
  2455. return rWlanStatus;
  2456. switch (prPublicActionFrame->ucAction) {
  2457. case ACTION_PUBLIC_WIFI_DIRECT:
  2458. break;
  2459. case ACTION_GAS_INITIAL_REQUEST:
  2460. case ACTION_GAS_INITIAL_RESPONSE:
  2461. case ACTION_GAS_COMEBACK_REQUEST:
  2462. case ACTION_GAS_COMEBACK_RESPONSE:
  2463. break;
  2464. default:
  2465. break;
  2466. }
  2467. return rWlanStatus;
  2468. } /* p2pRxPublicActionFrame */
  2469. WLAN_STATUS p2pRxActionFrame(IN P_ADAPTER_T prAdapter, IN P_SW_RFB_T prSwRfb)
  2470. {
  2471. WLAN_STATUS rWlanStatus = WLAN_STATUS_SUCCESS;
  2472. P_P2P_ACTION_FRAME_T prP2pActionFrame = (P_P2P_ACTION_FRAME_T) NULL;
  2473. UINT_8 aucOui[3] = VENDOR_OUI_WFA_SPECIFIC;
  2474. do {
  2475. ASSERT_BREAK((prAdapter != NULL) && (prSwRfb != NULL));
  2476. prP2pActionFrame = (P_P2P_ACTION_FRAME_T) prSwRfb->pvHeader;
  2477. if (prP2pActionFrame->ucCategory != CATEGORY_VENDOR_SPECIFIC_ACTION) {
  2478. DBGLOG(P2P, TRACE, "RX Action Frame but not vendor specific.\n");
  2479. break;
  2480. }
  2481. if ((prP2pActionFrame->ucOuiType != VENDOR_OUI_TYPE_P2P) ||
  2482. (prP2pActionFrame->aucOui[0] != aucOui[0]) ||
  2483. (prP2pActionFrame->aucOui[1] != aucOui[1]) || (prP2pActionFrame->aucOui[2] != aucOui[2])) {
  2484. DBGLOG(P2P, TRACE, "RX Vendor Specific Action Frame but not P2P Type or not WFA OUI.\n");
  2485. break;
  2486. }
  2487. } while (FALSE);
  2488. return rWlanStatus;
  2489. } /* p2pRxActionFrame */
  2490. VOID
  2491. p2pProcessEvent_UpdateNOAParam(IN P_ADAPTER_T prAdapter,
  2492. UINT_8 ucNetTypeIndex, P_EVENT_UPDATE_NOA_PARAMS_T prEventUpdateNoaParam)
  2493. {
  2494. P_BSS_INFO_T prBssInfo = (P_BSS_INFO_T) NULL;
  2495. P_P2P_SPECIFIC_BSS_INFO_T prP2pSpecificBssInfo;
  2496. UINT_32 i;
  2497. BOOLEAN fgNoaAttrExisted = FALSE;
  2498. prBssInfo = &(prAdapter->rWifiVar.arBssInfo[ucNetTypeIndex]);
  2499. prP2pSpecificBssInfo = prAdapter->rWifiVar.prP2pSpecificBssInfo;
  2500. prP2pSpecificBssInfo->fgEnableOppPS = prEventUpdateNoaParam->fgEnableOppPS;
  2501. prP2pSpecificBssInfo->u2CTWindow = prEventUpdateNoaParam->u2CTWindow;
  2502. prP2pSpecificBssInfo->ucNoAIndex = prEventUpdateNoaParam->ucNoAIndex;
  2503. prP2pSpecificBssInfo->ucNoATimingCount = prEventUpdateNoaParam->ucNoATimingCount;
  2504. fgNoaAttrExisted |= prP2pSpecificBssInfo->fgEnableOppPS;
  2505. DBGLOG(P2P, INFO, "Update NoA Count=%d.\n", prEventUpdateNoaParam->ucNoATimingCount);
  2506. ASSERT(prP2pSpecificBssInfo->ucNoATimingCount <= P2P_MAXIMUM_NOA_COUNT);
  2507. for (i = 0; i < prP2pSpecificBssInfo->ucNoATimingCount; i++) {
  2508. /* in used */
  2509. prP2pSpecificBssInfo->arNoATiming[i].fgIsInUse = prEventUpdateNoaParam->arEventNoaTiming[i].fgIsInUse;
  2510. /* count */
  2511. prP2pSpecificBssInfo->arNoATiming[i].ucCount = prEventUpdateNoaParam->arEventNoaTiming[i].ucCount;
  2512. /* duration */
  2513. prP2pSpecificBssInfo->arNoATiming[i].u4Duration = prEventUpdateNoaParam->arEventNoaTiming[i].u4Duration;
  2514. /* interval */
  2515. prP2pSpecificBssInfo->arNoATiming[i].u4Interval = prEventUpdateNoaParam->arEventNoaTiming[i].u4Interval;
  2516. /* start time */
  2517. prP2pSpecificBssInfo->arNoATiming[i].u4StartTime =
  2518. prEventUpdateNoaParam->arEventNoaTiming[i].u4StartTime;
  2519. fgNoaAttrExisted |= prP2pSpecificBssInfo->arNoATiming[i].fgIsInUse;
  2520. }
  2521. prP2pSpecificBssInfo->fgIsNoaAttrExisted = fgNoaAttrExisted;
  2522. /* update beacon content by the change */
  2523. bssUpdateBeaconContent(prAdapter, ucNetTypeIndex);
  2524. }
  2525. #endif /* CFG_ENABLE_WIFI_DIRECT */