pev_cm_slac_match.c 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148
  1. /*====================================================================*
  2. Copyright (c) 2013,2021 Qualcomm Technologies, Inc.
  3. All Rights Reserved.
  4. Confidential and Proprietary - Qualcomm Technologies, Inc.
  5. ******************************************************************
  6. 2013 Qualcomm Atheros, Inc.
  7. *--------------------------------------------------------------------*/
  8. /*====================================================================*
  9. *
  10. * signed pev_cm_slac_match (struct session * session, struct channel * channel, struct message * message);
  11. *
  12. * slac.h
  13. *
  14. * send CM_SLAC_MATCH.REQ and receive CM_SLAC_MATCH.CNF; store NMK
  15. * and NID in the session variable so that PEV-HLE can configure
  16. * PEV-PLC to form a network with EVSE-PLC;
  17. *
  18. *--------------------------------------------------------------------*/
  19. #ifndef PEV_CM_SLAC_MATCH_SOURCE
  20. #define PEV_CM_SLAC_MATCH_SOURCE
  21. #include <string.h>
  22. #include <errno.h>
  23. #include "../ether/channel.h"
  24. #include "../tools/memory.h"
  25. #include "../tools/error.h"
  26. #include "../tools/flags.h"
  27. #include "../slac/slac.h"
  28. signed pev_cm_slac_match (struct session * session, struct channel * channel, struct message * message)
  29. {
  30. struct cm_slac_match_request * request = (struct cm_slac_match_request *) (message);
  31. struct cm_slac_match_confirm * confirm = (struct cm_slac_match_confirm *) (message);
  32. debug (0, __func__, "--> CM_SLAC_MATCH.REQ");
  33. memset (message, 0, sizeof (* message));
  34. EthernetHeader (& request->ethernet, session->EVSE_MAC, channel->host, channel->type);
  35. HomePlugHeader1 (& request->homeplug, HOMEPLUG_MMV, (CM_SLAC_MATCH | MMTYPE_REQ));
  36. request->APPLICATION_TYPE = session->APPLICATION_TYPE;
  37. request->SECURITY_TYPE = session->SECURITY_TYPE;
  38. request->MVFLength = HTOLE16 (sizeof (request->MatchVarField));
  39. memcpy (request->MatchVarField.PEV_ID, session->PEV_ID, sizeof (request->MatchVarField.PEV_ID));
  40. memcpy (request->MatchVarField.PEV_MAC, session->PEV_MAC, sizeof (request->MatchVarField.PEV_MAC));
  41. memcpy (request->MatchVarField.RunID, session->RunID, sizeof (request->MatchVarField.RunID));
  42. if (sendmessage (channel, message, sizeof (* request)) <= 0)
  43. {
  44. return (debug (1, __func__, CHANNEL_CANTSEND));
  45. }
  46. if (readmessage (channel, message, HOMEPLUG_MMV, (CM_SLAC_MATCH | MMTYPE_CNF)) > 0)
  47. {
  48. if (! memcmp (session->RunID, confirm->MatchVarField.RunID, sizeof (session->RunID)))
  49. {
  50. debug (0, __func__, "<-- CM_SLAC_MATCH.CNF");
  51. #if SLAC_DEBUG
  52. if (_anyset (session->flags, SLAC_VERBOSE))
  53. {
  54. char string [256];
  55. debug (0, __func__, "CM_SLAC_MATCH.CNF.APPLICATION_TYPE %d", confirm->APPLICATION_TYPE);
  56. debug (0, __func__, "CM_SLAC_MATCH.CNF.SECURITY_TYPE %d", confirm->SECURITY_TYPE);
  57. debug (0, __func__, "CM_SLAC_MATCH.CNF.MVFLength %d", LE16TOH (confirm->MVFLength));
  58. debug (0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.PEV_ID %s", HEXSTRING (string, confirm->MatchVarField.PEV_ID));
  59. debug (0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.PEV_MAC %s", HEXSTRING (string, confirm->MatchVarField.PEV_MAC));
  60. debug (0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.EVSE_ID %s", HEXSTRING (string, confirm->MatchVarField.EVSE_ID));
  61. debug (0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.EVSE_MAC %s", HEXSTRING (string, confirm->MatchVarField.EVSE_MAC));
  62. debug (0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.RunID %s", HEXSTRING (string, confirm->MatchVarField.RunID));
  63. debug (0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.NID %s", HEXSTRING (string, confirm->MatchVarField.NID));
  64. debug (0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.NMK %s", HEXSTRING (string, confirm->MatchVarField.NMK));
  65. }
  66. #endif
  67. memcpy (session->EVSE_ID, confirm->MatchVarField.EVSE_ID, sizeof (session->EVSE_ID));
  68. memcpy (session->EVSE_MAC, confirm->MatchVarField.EVSE_MAC, sizeof (session->EVSE_MAC));
  69. memcpy (session->NMK, confirm->MatchVarField.NMK, sizeof (session->NMK));
  70. memcpy (session->NID, confirm->MatchVarField.NID, sizeof (session->NID));
  71. return (0);
  72. }
  73. }
  74. return (debug (session->exit, __func__, "<-- CM_SLAC_MATCH.CNF ?"));
  75. }
  76. signed pev_cm_slac_match_req(struct session* session, struct channel* channel, struct message* message)
  77. {
  78. struct cm_slac_match_request* request = (struct cm_slac_match_request*)(message);
  79. debug(0, __func__, "--> CM_SLAC_MATCH.REQ");
  80. memset(message, 0, sizeof(*message));
  81. EthernetHeader(&request->ethernet, session->EVSE_MAC, channel->host, channel->type);
  82. HomePlugHeader1(&request->homeplug, HOMEPLUG_MMV, (CM_SLAC_MATCH | MMTYPE_REQ));
  83. request->APPLICATION_TYPE = session->APPLICATION_TYPE;
  84. request->SECURITY_TYPE = session->SECURITY_TYPE;
  85. request->MVFLength = HTOLE16(sizeof(request->MatchVarField));
  86. memcpy(request->MatchVarField.PEV_ID, session->PEV_ID, sizeof(request->MatchVarField.PEV_ID));
  87. memcpy(request->MatchVarField.PEV_MAC, session->PEV_MAC, sizeof(request->MatchVarField.PEV_MAC));
  88. memcpy(request->MatchVarField.RunID, session->RunID, sizeof(request->MatchVarField.RunID));
  89. if (sendmessage(channel, message, sizeof(*request)) <= 0)
  90. {
  91. return (debug(1, __func__, CHANNEL_CANTSEND));
  92. }
  93. return 0;
  94. }
  95. signed pev_cm_slac_match_cnf(struct session* session, struct channel* channel, struct message* message)
  96. {
  97. struct cm_slac_match_confirm* confirm = (struct cm_slac_match_confirm*)(message);
  98. if (!memcmp(session->RunID, confirm->MatchVarField.RunID, sizeof(session->RunID)))
  99. {
  100. debug(0, __func__, "<-- CM_SLAC_MATCH.CNF");
  101. #if SLAC_DEBUG
  102. if (_anyset(session->flags, SLAC_VERBOSE))
  103. {
  104. char string[256];
  105. debug(0, __func__, "CM_SLAC_MATCH.CNF.APPLICATION_TYPE %d", confirm->APPLICATION_TYPE);
  106. debug(0, __func__, "CM_SLAC_MATCH.CNF.SECURITY_TYPE %d", confirm->SECURITY_TYPE);
  107. debug(0, __func__, "CM_SLAC_MATCH.CNF.MVFLength %d", LE16TOH(confirm->MVFLength));
  108. debug(0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.PEV_ID %s", HEXSTRING(string, confirm->MatchVarField.PEV_ID));
  109. debug(0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.PEV_MAC %s", HEXSTRING(string, confirm->MatchVarField.PEV_MAC));
  110. debug(0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.EVSE_ID %s", HEXSTRING(string, confirm->MatchVarField.EVSE_ID));
  111. debug(0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.EVSE_MAC %s", HEXSTRING(string, confirm->MatchVarField.EVSE_MAC));
  112. debug(0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.RunID %s", HEXSTRING(string, confirm->MatchVarField.RunID));
  113. debug(0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.NID %s", HEXSTRING(string, confirm->MatchVarField.NID));
  114. debug(0, __func__, "CM_SLAC_MATCH.CNF.MatchVarField.NMK %s", HEXSTRING(string, confirm->MatchVarField.NMK));
  115. }
  116. #endif
  117. memcpy(session->EVSE_ID, confirm->MatchVarField.EVSE_ID, sizeof(session->EVSE_ID));
  118. memcpy(session->EVSE_MAC, confirm->MatchVarField.EVSE_MAC, sizeof(session->EVSE_MAC));
  119. memcpy(session->NMK, confirm->MatchVarField.NMK, sizeof(session->NMK));
  120. memcpy(session->NID, confirm->MatchVarField.NID, sizeof(session->NID));
  121. return (0);
  122. }
  123. return (debug(session->exit, __func__, "<-- CM_SLAC_MATCH.CNF ?"));
  124. }
  125. #endif