mirror of
https://github.com/lwfinger/rtl8188eu.git
synced 2025-06-23 08:34:20 +00:00
rtl8188eu: Replace wrapper for memcpy
Signed-off-by: Larry Finger <Larry.Finger@lwfinger.net>
This commit is contained in:
parent
120368c717
commit
529328fd3d
30 changed files with 921 additions and 927 deletions
|
@ -163,28 +163,28 @@ static struct ieee80211_channel rtw_5ghz_a_channels[] = {
|
|||
|
||||
static void rtw_2g_channels_init(struct ieee80211_channel *channels)
|
||||
{
|
||||
_rtw_memcpy((void*)channels, (void*)rtw_2ghz_channels,
|
||||
memcpy((void*)channels, (void*)rtw_2ghz_channels,
|
||||
sizeof(struct ieee80211_channel)*RTW_2G_CHANNELS_NUM
|
||||
);
|
||||
}
|
||||
|
||||
static void rtw_5g_channels_init(struct ieee80211_channel *channels)
|
||||
{
|
||||
_rtw_memcpy((void*)channels, (void*)rtw_5ghz_a_channels,
|
||||
memcpy((void*)channels, (void*)rtw_5ghz_a_channels,
|
||||
sizeof(struct ieee80211_channel)*RTW_5G_CHANNELS_NUM
|
||||
);
|
||||
}
|
||||
|
||||
static void rtw_2g_rates_init(struct ieee80211_rate *rates)
|
||||
{
|
||||
_rtw_memcpy(rates, rtw_g_rates,
|
||||
memcpy(rates, rtw_g_rates,
|
||||
sizeof(struct ieee80211_rate)*RTW_G_RATES_NUM
|
||||
);
|
||||
}
|
||||
|
||||
static void rtw_5g_rates_init(struct ieee80211_rate *rates)
|
||||
{
|
||||
_rtw_memcpy(rates, rtw_a_rates,
|
||||
memcpy(rates, rtw_a_rates,
|
||||
sizeof(struct ieee80211_rate)*RTW_A_RATES_NUM
|
||||
);
|
||||
}
|
||||
|
@ -446,21 +446,21 @@ struct cfg80211_bss *rtw_cfg80211_inform_bss(struct adapter *padapter, struct wl
|
|||
//pmlmeext->mgnt_seq++;
|
||||
|
||||
if (pnetwork->network.Reserved[0] == 1) { // WIFI_BEACON
|
||||
_rtw_memcpy(pwlanhdr->addr1, bc_addr, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr1, bc_addr, ETH_ALEN);
|
||||
SetFrameSubType(pbuf, WIFI_BEACON);
|
||||
} else {
|
||||
_rtw_memcpy(pwlanhdr->addr1, myid(&(padapter->eeprompriv)), ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr1, myid(&(padapter->eeprompriv)), ETH_ALEN);
|
||||
SetFrameSubType(pbuf, WIFI_PROBERSP);
|
||||
}
|
||||
|
||||
_rtw_memcpy(pwlanhdr->addr2, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
_rtw_memcpy(pwlanhdr->addr3, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr2, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr3, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
|
||||
|
||||
pbuf += sizeof(struct rtw_ieee80211_hdr_3addr);
|
||||
len = sizeof (struct rtw_ieee80211_hdr_3addr);
|
||||
|
||||
_rtw_memcpy(pbuf, pnetwork->network.IEs, pnetwork->network.IELength);
|
||||
memcpy(pbuf, pnetwork->network.IEs, pnetwork->network.IELength);
|
||||
len += pnetwork->network.IELength;
|
||||
|
||||
//#ifdef CONFIG_P2P
|
||||
|
@ -583,7 +583,7 @@ void rtw_cfg80211_ibss_indicate_connect(struct adapter *padapter)
|
|||
if(check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE)==true)
|
||||
{
|
||||
|
||||
_rtw_memcpy(&cur_network->network, pnetwork, sizeof(WLAN_BSSID_EX));
|
||||
memcpy(&cur_network->network, pnetwork, sizeof(WLAN_BSSID_EX));
|
||||
if(cur_network)
|
||||
{
|
||||
if (!rtw_cfg80211_inform_bss(padapter,cur_network))
|
||||
|
@ -813,9 +813,9 @@ static u8 set_pairwise_key(struct adapter *padapter, struct sta_info *psta)
|
|||
|
||||
psetstakey_para->algorithm = (u8)psta->dot118021XPrivacy;
|
||||
|
||||
_rtw_memcpy(psetstakey_para->addr, psta->hwaddr, ETH_ALEN);
|
||||
memcpy(psetstakey_para->addr, psta->hwaddr, ETH_ALEN);
|
||||
|
||||
_rtw_memcpy(psetstakey_para->key, &psta->dot118021x_UncstKey, 16);
|
||||
memcpy(psetstakey_para->key, &psta->dot118021x_UncstKey, 16);
|
||||
|
||||
|
||||
res = rtw_enqueue_cmd(pcmdpriv, ph2c);
|
||||
|
@ -874,7 +874,7 @@ static int set_group_key(struct adapter *padapter, u8 *key, u8 alg, int keyid)
|
|||
keylen = 16;
|
||||
}
|
||||
|
||||
_rtw_memcpy(&(psetkeyparm->key[0]), key, keylen);
|
||||
memcpy(&(psetkeyparm->key[0]), key, keylen);
|
||||
|
||||
pcmd->cmdcode = _SetKey_CMD_;
|
||||
pcmd->parmbuf = (u8 *)psetkeyparm;
|
||||
|
@ -1005,7 +1005,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx;
|
||||
}
|
||||
|
||||
_rtw_memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
|
||||
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
|
||||
|
||||
psecuritypriv->dot11DefKeylen[wep_key_idx] = wep_key_len;
|
||||
|
||||
|
@ -1024,7 +1024,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
{
|
||||
DBG_8192C("%s, set group_key, WEP\n", __FUNCTION__);
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
|
||||
if(param->u.crypt.key_len==13)
|
||||
|
@ -1039,12 +1039,12 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
|
||||
//DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len);
|
||||
//set mic key
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
psecuritypriv->busetkipkey = true;
|
||||
|
||||
|
@ -1055,7 +1055,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _AES_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
}
|
||||
else
|
||||
{
|
||||
|
@ -1091,7 +1091,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
{
|
||||
if(param->u.crypt.set_tx ==1) //pairwise key
|
||||
{
|
||||
_rtw_memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
|
||||
if(strcmp(param->u.crypt.alg, "WEP") == 0)
|
||||
{
|
||||
|
@ -1111,8 +1111,8 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
|
||||
//DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len);
|
||||
//set mic key
|
||||
_rtw_memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
psecuritypriv->busetkipkey = true;
|
||||
|
||||
|
@ -1142,7 +1142,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
{
|
||||
if(strcmp(param->u.crypt.alg, "WEP") == 0)
|
||||
{
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
|
||||
if(param->u.crypt.key_len==13)
|
||||
|
@ -1154,12 +1154,12 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
{
|
||||
psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
|
||||
//DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len);
|
||||
//set mic key
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
psecuritypriv->busetkipkey = true;
|
||||
|
||||
|
@ -1168,7 +1168,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
{
|
||||
psecuritypriv->dot118021XGrpPrivacy = _AES_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
}
|
||||
else
|
||||
{
|
||||
|
@ -1283,7 +1283,7 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx;
|
||||
}
|
||||
|
||||
_rtw_memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
|
||||
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
|
||||
|
||||
psecuritypriv->dot11DefKeylen[wep_key_idx] = wep_key_len;
|
||||
|
||||
|
@ -1324,13 +1324,13 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
|
||||
DBG_8192C("%s, : param->u.crypt.set_tx ==1 \n", __func__);
|
||||
|
||||
_rtw_memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
|
||||
if(strcmp(param->u.crypt.alg, "TKIP") == 0)//set mic key
|
||||
{
|
||||
//DEBUG_ERR(("\nset key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len));
|
||||
_rtw_memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
padapter->securitypriv.busetkipkey=false;
|
||||
//_set_timer(&padapter->securitypriv.tkip_timer, 50);
|
||||
|
@ -1345,9 +1345,9 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
{
|
||||
if(strcmp(param->u.crypt.alg, "TKIP") == 0 || strcmp(param->u.crypt.alg, "CCMP") == 0)
|
||||
{
|
||||
_rtw_memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key,(param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
_rtw_memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey,&(param->u.crypt.key[16]),8);
|
||||
_rtw_memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey,&(param->u.crypt.key[24]),8);
|
||||
memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key,(param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey,&(param->u.crypt.key[16]),8);
|
||||
memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey,&(param->u.crypt.key[24]),8);
|
||||
padapter->securitypriv.binstallGrpkey = true;
|
||||
//DEBUG_ERR((" param->u.crypt.key_len=%d\n", param->u.crypt.key_len));
|
||||
DBG_871X(" ~~~~set sta key:groupkey\n");
|
||||
|
@ -1361,7 +1361,7 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
int no;
|
||||
//DBG_871X("BIP key_len=%d , index=%d @@@@@@@@@@@@@@@@@@\n", param->u.crypt.key_len, param->u.crypt.idx);
|
||||
//save the IGTK key, length 16 bytes
|
||||
_rtw_memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key,(param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key,(param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
|
||||
/*DBG_871X("IGTK key below:\n");
|
||||
for(no=0;no<16;no++)
|
||||
printk(" %02x ", padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey[no]);
|
||||
|
@ -1422,19 +1422,19 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
list_for_each_entry(pWapiSta, &pWapiInfo->wapiSTAUsedList, list) {
|
||||
if(_rtw_memcmp(pWapiSta->PeerMacAddr,param->sta_addr,6))
|
||||
{
|
||||
_rtw_memcpy(pWapiSta->lastTxUnicastPN,WapiASUEPNInitialValueSrc,16);
|
||||
memcpy(pWapiSta->lastTxUnicastPN,WapiASUEPNInitialValueSrc,16);
|
||||
|
||||
pWapiSta->wapiUsk.bSet = true;
|
||||
_rtw_memcpy(pWapiSta->wapiUsk.dataKey,param->u.crypt.key,16);
|
||||
_rtw_memcpy(pWapiSta->wapiUsk.micKey,param->u.crypt.key+16,16);
|
||||
memcpy(pWapiSta->wapiUsk.dataKey,param->u.crypt.key,16);
|
||||
memcpy(pWapiSta->wapiUsk.micKey,param->u.crypt.key+16,16);
|
||||
pWapiSta->wapiUsk.keyId = param->u.crypt.idx ;
|
||||
pWapiSta->wapiUsk.bTxEnable = true;
|
||||
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNBEQueue,WapiAEPNInitialValueSrc,16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNBKQueue,WapiAEPNInitialValueSrc,16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNVIQueue,WapiAEPNInitialValueSrc,16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNVOQueue,WapiAEPNInitialValueSrc,16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPN,WapiAEPNInitialValueSrc,16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNBEQueue,WapiAEPNInitialValueSrc,16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNBKQueue,WapiAEPNInitialValueSrc,16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNVIQueue,WapiAEPNInitialValueSrc,16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNVOQueue,WapiAEPNInitialValueSrc,16);
|
||||
memcpy(pWapiSta->lastRxUnicastPN,WapiAEPNInitialValueSrc,16);
|
||||
pWapiSta->wapiUskUpdate.bTxEnable = false;
|
||||
pWapiSta->wapiUskUpdate.bSet = false;
|
||||
|
||||
|
@ -1452,15 +1452,15 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
if(_rtw_memcmp(pWapiSta->PeerMacAddr,get_bssid(pmlmepriv),6))
|
||||
{
|
||||
pWapiSta->wapiMsk.bSet = true;
|
||||
_rtw_memcpy(pWapiSta->wapiMsk.dataKey,param->u.crypt.key,16);
|
||||
_rtw_memcpy(pWapiSta->wapiMsk.micKey,param->u.crypt.key+16,16);
|
||||
memcpy(pWapiSta->wapiMsk.dataKey,param->u.crypt.key,16);
|
||||
memcpy(pWapiSta->wapiMsk.micKey,param->u.crypt.key+16,16);
|
||||
pWapiSta->wapiMsk.keyId = param->u.crypt.idx ;
|
||||
pWapiSta->wapiMsk.bTxEnable = false;
|
||||
if(!pWapiSta->bSetkeyOk)
|
||||
pWapiSta->bSetkeyOk = true;
|
||||
pWapiSta->bAuthenticateInProgress = false;
|
||||
|
||||
_rtw_memcpy(pWapiSta->lastRxMulticastPN, WapiAEMultiCastPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxMulticastPN, WapiAEMultiCastPNInitialValueSrc, 16);
|
||||
|
||||
if (psecuritypriv->sw_decrypt == false)
|
||||
{
|
||||
|
@ -1548,7 +1548,7 @@ static int cfg80211_rtw_add_key(struct wiphy *wiphy, struct net_device *ndev,
|
|||
ret = -ENOTSUPP;
|
||||
goto addkey_end;
|
||||
}
|
||||
_rtw_memcpy((void*)param->sta_addr, (void*)mac_addr, ETH_ALEN);
|
||||
memcpy((void*)param->sta_addr, (void*)mac_addr, ETH_ALEN);
|
||||
} else {
|
||||
DBG_871X("mac_addr is null \n");
|
||||
}
|
||||
|
@ -1577,13 +1577,13 @@ static int cfg80211_rtw_add_key(struct wiphy *wiphy, struct net_device *ndev,
|
|||
|
||||
if (params->seq_len && params->seq)
|
||||
{
|
||||
_rtw_memcpy(param->u.crypt.seq, (void *)params->seq, params->seq_len);
|
||||
memcpy(param->u.crypt.seq, (void *)params->seq, params->seq_len);
|
||||
}
|
||||
|
||||
if(params->key_len && params->key)
|
||||
{
|
||||
param->u.crypt.key_len = params->key_len;
|
||||
_rtw_memcpy(param->u.crypt.key, (void *)params->key, params->key_len);
|
||||
memcpy(param->u.crypt.key, (void *)params->key, params->key_len);
|
||||
}
|
||||
|
||||
if(check_fwstate(pmlmepriv, WIFI_STATION_STATE) == true)
|
||||
|
@ -1594,7 +1594,7 @@ static int cfg80211_rtw_add_key(struct wiphy *wiphy, struct net_device *ndev,
|
|||
{
|
||||
#ifdef CONFIG_AP_MODE
|
||||
if(mac_addr)
|
||||
_rtw_memcpy(param->sta_addr, (void*)mac_addr, ETH_ALEN);
|
||||
memcpy(param->sta_addr, (void*)mac_addr, ETH_ALEN);
|
||||
|
||||
ret = rtw_cfg80211_ap_set_encryption(ndev, param, param_len);
|
||||
#endif
|
||||
|
@ -2013,7 +2013,7 @@ static int rtw_cfg80211_set_probe_req_wpsp2pie(struct adapter *padapter, char *b
|
|||
return -EINVAL;
|
||||
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->wps_probe_req_ie, wps_ie, wps_ielen);
|
||||
memcpy(pmlmepriv->wps_probe_req_ie, wps_ie, wps_ielen);
|
||||
pmlmepriv->wps_probe_req_ie_len = wps_ielen;
|
||||
}
|
||||
|
||||
|
@ -2045,7 +2045,7 @@ static int rtw_cfg80211_set_probe_req_wpsp2pie(struct adapter *padapter, char *b
|
|||
return -EINVAL;
|
||||
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->p2p_probe_req_ie, p2p_ie, p2p_ielen);
|
||||
memcpy(pmlmepriv->p2p_probe_req_ie, p2p_ie, p2p_ielen);
|
||||
pmlmepriv->p2p_probe_req_ie_len = p2p_ielen;
|
||||
|
||||
if(rtw_get_p2p_attr_content(p2p_ie, p2p_ielen, P2P_ATTR_LISTEN_CH, (u8*)listen_ch_attr, (uint*) &attr_contentlen)
|
||||
|
@ -2239,7 +2239,7 @@ static int cfg80211_rtw_scan(struct wiphy *wiphy
|
|||
#ifdef CONFIG_DEBUG_CFG80211
|
||||
DBG_8192C("ssid=%s, len=%d\n", ssids[i].ssid, ssids[i].ssid_len);
|
||||
#endif
|
||||
_rtw_memcpy(ssid[i].Ssid, ssids[i].ssid, ssids[i].ssid_len);
|
||||
memcpy(ssid[i].Ssid, ssids[i].ssid, ssids[i].ssid_len);
|
||||
ssid[i].SsidLength = ssids[i].ssid_len;
|
||||
}
|
||||
|
||||
|
@ -2256,13 +2256,13 @@ static int cfg80211_rtw_scan(struct wiphy *wiphy
|
|||
_enter_critical_bh(&pmlmepriv->lock, &irqL);
|
||||
if (request->n_channels == 1) {
|
||||
for(i=1;i<survey_times_for_one_ch;i++)
|
||||
_rtw_memcpy(&ch[i], &ch[0], sizeof(struct rtw_ieee80211_channel));
|
||||
memcpy(&ch[i], &ch[0], sizeof(struct rtw_ieee80211_channel));
|
||||
_status = rtw_sitesurvey_cmd(padapter, ssid, RTW_SSID_SCAN_AMOUNT, ch, survey_times_for_one_ch);
|
||||
} else if (request->n_channels <= 4) {
|
||||
for(j=request->n_channels-1;j>=0;j--)
|
||||
for(i=0;i<survey_times;i++)
|
||||
{
|
||||
_rtw_memcpy(&ch[j*survey_times+i], &ch[j], sizeof(struct rtw_ieee80211_channel));
|
||||
memcpy(&ch[j*survey_times+i], &ch[j], sizeof(struct rtw_ieee80211_channel));
|
||||
}
|
||||
_status = rtw_sitesurvey_cmd(padapter, ssid, RTW_SSID_SCAN_AMOUNT, ch, survey_times * request->n_channels);
|
||||
} else {
|
||||
|
@ -2483,7 +2483,7 @@ static int rtw_cfg80211_set_wpa_ie(struct adapter *padapter, u8 *pie, size_t iel
|
|||
goto exit;
|
||||
}
|
||||
|
||||
_rtw_memcpy(buf, pie , ielen);
|
||||
memcpy(buf, pie , ielen);
|
||||
|
||||
//dump
|
||||
{
|
||||
|
@ -2507,7 +2507,7 @@ static int rtw_cfg80211_set_wpa_ie(struct adapter *padapter, u8 *pie, size_t iel
|
|||
{
|
||||
padapter->securitypriv.dot11AuthAlgrthm= dot11AuthAlgrthm_8021X;
|
||||
padapter->securitypriv.ndisauthtype=Ndis802_11AuthModeWPAPSK;
|
||||
_rtw_memcpy(padapter->securitypriv.supplicant_ie, &pwpa[0], wpa_ielen+2);
|
||||
memcpy(padapter->securitypriv.supplicant_ie, &pwpa[0], wpa_ielen+2);
|
||||
|
||||
DBG_8192C("got wpa_ie, wpa_ielen:%u\n", wpa_ielen);
|
||||
}
|
||||
|
@ -2520,7 +2520,7 @@ static int rtw_cfg80211_set_wpa_ie(struct adapter *padapter, u8 *pie, size_t iel
|
|||
{
|
||||
padapter->securitypriv.dot11AuthAlgrthm= dot11AuthAlgrthm_8021X;
|
||||
padapter->securitypriv.ndisauthtype=Ndis802_11AuthModeWPA2PSK;
|
||||
_rtw_memcpy(padapter->securitypriv.supplicant_ie, &pwpa2[0], wpa2_ielen+2);
|
||||
memcpy(padapter->securitypriv.supplicant_ie, &pwpa2[0], wpa2_ielen+2);
|
||||
|
||||
DBG_8192C("got wpa2_ie, wpa2_ielen:%u\n", wpa2_ielen);
|
||||
}
|
||||
|
@ -2591,7 +2591,7 @@ static int rtw_cfg80211_set_wpa_ie(struct adapter *padapter, u8 *pie, size_t iel
|
|||
if (wps_ie && wps_ielen > 0) {
|
||||
DBG_8192C("got wps_ie, wps_ielen:%u\n", wps_ielen);
|
||||
padapter->securitypriv.wps_ie_len = wps_ielen<MAX_WPS_IE_LEN?wps_ielen:MAX_WPS_IE_LEN;
|
||||
_rtw_memcpy(padapter->securitypriv.wps_ie, wps_ie, padapter->securitypriv.wps_ie_len);
|
||||
memcpy(padapter->securitypriv.wps_ie, wps_ie, padapter->securitypriv.wps_ie_len);
|
||||
set_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS);
|
||||
} else {
|
||||
_clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS);
|
||||
|
@ -2623,7 +2623,7 @@ static int rtw_cfg80211_set_wpa_ie(struct adapter *padapter, u8 *pie, size_t iel
|
|||
DBG_8192C("%s()-%d: rtw_malloc() ERROR!\n", __FUNCTION__, __LINE__);
|
||||
goto exit;
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->p2p_assoc_req_ie, p2p_ie, p2p_ielen);
|
||||
memcpy(pmlmepriv->p2p_assoc_req_ie, p2p_ie, p2p_ielen);
|
||||
pmlmepriv->p2p_assoc_req_ie_len = p2p_ielen;
|
||||
}
|
||||
}
|
||||
|
@ -2712,7 +2712,7 @@ static int cfg80211_rtw_join_ibss(struct wiphy *wiphy, struct net_device *ndev,
|
|||
|
||||
_rtw_memset(&ndis_ssid, 0, sizeof(NDIS_802_11_SSID));
|
||||
ndis_ssid.SsidLength = params->ssid_len;
|
||||
_rtw_memcpy(ndis_ssid.Ssid, (void *)params->ssid, params->ssid_len);
|
||||
memcpy(ndis_ssid.Ssid, (void *)params->ssid, params->ssid_len);
|
||||
|
||||
//DBG_8192C("ssid=%s, len=%zu\n", ndis_ssid.Ssid, params->ssid_len);
|
||||
|
||||
|
@ -2814,7 +2814,7 @@ static int cfg80211_rtw_connect(struct wiphy *wiphy, struct net_device *ndev,
|
|||
|
||||
_rtw_memset(&ndis_ssid, 0, sizeof(NDIS_802_11_SSID));
|
||||
ndis_ssid.SsidLength = sme->ssid_len;
|
||||
_rtw_memcpy(ndis_ssid.Ssid, (void *)sme->ssid, sme->ssid_len);
|
||||
memcpy(ndis_ssid.Ssid, (void *)sme->ssid, sme->ssid_len);
|
||||
|
||||
DBG_8192C("ssid=%s, len=%zu\n", ndis_ssid.Ssid, sme->ssid_len);
|
||||
|
||||
|
@ -2925,7 +2925,7 @@ static int cfg80211_rtw_connect(struct wiphy *wiphy, struct net_device *ndev,
|
|||
pwep->KeyIndex = wep_key_idx;
|
||||
pwep->KeyIndex |= 0x80000000;
|
||||
|
||||
_rtw_memcpy(pwep->KeyMaterial, (void *)sme->key, pwep->KeyLength);
|
||||
memcpy(pwep->KeyMaterial, (void *)sme->key, pwep->KeyLength);
|
||||
|
||||
if(rtw_set_802_11_add_wep(padapter, pwep) == (u8)_FAIL)
|
||||
{
|
||||
|
@ -3085,7 +3085,7 @@ static int cfg80211_rtw_set_pmksa(struct wiphy *wiphy,
|
|||
{ // BSSID is matched, the same AP => rewrite with new PMKID.
|
||||
DBG_871X(FUNC_NDEV_FMT" BSSID exists in the PMKList.\n", FUNC_NDEV_ARG(netdev));
|
||||
|
||||
_rtw_memcpy( psecuritypriv->PMKIDList[index].PMKID, (void *)pmksa->pmkid, WLAN_PMKID_LEN);
|
||||
memcpy( psecuritypriv->PMKIDList[index].PMKID, (void *)pmksa->pmkid, WLAN_PMKID_LEN);
|
||||
psecuritypriv->PMKIDList[index].bUsed = true;
|
||||
psecuritypriv->PMKIDIndex = index+1;
|
||||
blInserted = true;
|
||||
|
@ -3099,8 +3099,8 @@ static int cfg80211_rtw_set_pmksa(struct wiphy *wiphy,
|
|||
DBG_871X(FUNC_NDEV_FMT" Use the new entry index = %d for this PMKID.\n",
|
||||
FUNC_NDEV_ARG(netdev), psecuritypriv->PMKIDIndex );
|
||||
|
||||
_rtw_memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, (void *)pmksa->bssid, ETH_ALEN);
|
||||
_rtw_memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, (void *)pmksa->pmkid, WLAN_PMKID_LEN);
|
||||
memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, (void *)pmksa->bssid, ETH_ALEN);
|
||||
memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, (void *)pmksa->pmkid, WLAN_PMKID_LEN);
|
||||
|
||||
psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].bUsed = true;
|
||||
psecuritypriv->PMKIDIndex++ ;
|
||||
|
@ -3245,11 +3245,11 @@ void rtw_cfg80211_indicate_sta_disassoc(struct adapter *padapter, unsigned char
|
|||
fctrl = &(pwlanhdr->frame_ctl);
|
||||
*(fctrl) = 0;
|
||||
|
||||
//_rtw_memcpy(pwlanhdr->addr1, da, ETH_ALEN);
|
||||
//_rtw_memcpy(pwlanhdr->addr2, myid(&(padapter->eeprompriv)), ETH_ALEN);
|
||||
_rtw_memcpy(pwlanhdr->addr1, myid(&(padapter->eeprompriv)), ETH_ALEN);
|
||||
_rtw_memcpy(pwlanhdr->addr2, da, ETH_ALEN);
|
||||
_rtw_memcpy(pwlanhdr->addr3, get_my_bssid(&(pmlmeinfo->network)), ETH_ALEN);
|
||||
//memcpy(pwlanhdr->addr1, da, ETH_ALEN);
|
||||
//memcpy(pwlanhdr->addr2, myid(&(padapter->eeprompriv)), ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr1, myid(&(padapter->eeprompriv)), ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr2, da, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr3, get_my_bssid(&(pmlmeinfo->network)), ETH_ALEN);
|
||||
|
||||
SetSeqNum(pwlanhdr, pmlmeext->mgnt_seq);
|
||||
pmlmeext->mgnt_seq++;
|
||||
|
@ -3412,7 +3412,7 @@ dump:
|
|||
|
||||
pframe = (u8 *)(pmgntframe->buf_addr) + TXDESC_OFFSET;
|
||||
|
||||
_rtw_memcpy(pframe, (void*)buf, len);
|
||||
memcpy(pframe, (void*)buf, len);
|
||||
#ifdef CONFIG_WFD
|
||||
if (type >= 0)
|
||||
{
|
||||
|
@ -3545,7 +3545,7 @@ static int rtw_cfg80211_add_monitor_if(struct adapter *padapter, char *name, str
|
|||
}
|
||||
|
||||
*ndev = pwdev_priv->pmon_ndev = mon_ndev;
|
||||
_rtw_memcpy(pwdev_priv->ifname_mon, name, IFNAMSIZ+1);
|
||||
memcpy(pwdev_priv->ifname_mon, name, IFNAMSIZ+1);
|
||||
|
||||
out:
|
||||
if (ret && mon_wdev) {
|
||||
|
@ -3681,14 +3681,14 @@ static int rtw_add_beacon(struct adapter *adapter, const u8 *head, size_t head_l
|
|||
return -ENOMEM;
|
||||
|
||||
|
||||
//_rtw_memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2);
|
||||
//memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2);
|
||||
|
||||
//if((pstapriv->max_num_sta>NUM_STA) || (pstapriv->max_num_sta<=0))
|
||||
// pstapriv->max_num_sta = NUM_STA;
|
||||
|
||||
|
||||
_rtw_memcpy(pbuf, (void *)head+24, head_len-24);// 24=beacon header len.
|
||||
_rtw_memcpy(pbuf+head_len-24, (void *)tail, tail_len);
|
||||
memcpy(pbuf, (void *)head+24, head_len-24);// 24=beacon header len.
|
||||
memcpy(pbuf+head_len-24, (void *)tail, tail_len);
|
||||
|
||||
len = head_len+tail_len-24;
|
||||
|
||||
|
@ -3808,9 +3808,9 @@ static int cfg80211_rtw_start_ap(struct wiphy *wiphy, struct net_device *ndev,
|
|||
WLAN_BSSID_EX *pbss_network = &adapter->mlmepriv.cur_network.network;
|
||||
WLAN_BSSID_EX *pbss_network_ext = &adapter->mlmeextpriv.mlmext_info.network;
|
||||
|
||||
_rtw_memcpy(pbss_network->Ssid.Ssid, (void *)settings->ssid, settings->ssid_len);
|
||||
memcpy(pbss_network->Ssid.Ssid, (void *)settings->ssid, settings->ssid_len);
|
||||
pbss_network->Ssid.SsidLength = settings->ssid_len;
|
||||
_rtw_memcpy(pbss_network_ext->Ssid.Ssid, (void *)settings->ssid, settings->ssid_len);
|
||||
memcpy(pbss_network_ext->Ssid.Ssid, (void *)settings->ssid, settings->ssid_len);
|
||||
pbss_network_ext->Ssid.SsidLength = settings->ssid_len;
|
||||
}
|
||||
|
||||
|
@ -4171,8 +4171,8 @@ void rtw_cfg80211_issue_p2p_provision_request(struct adapter *padapter, const u8
|
|||
DBG_871X( "[%s] In\n", __FUNCTION__ );
|
||||
|
||||
//prepare for building provision_request frame
|
||||
_rtw_memcpy(pwdinfo->tx_prov_disc_info.peerIFAddr, GetAddr1Ptr(buf), ETH_ALEN);
|
||||
_rtw_memcpy(pwdinfo->tx_prov_disc_info.peerDevAddr, GetAddr1Ptr(buf), ETH_ALEN);
|
||||
memcpy(pwdinfo->tx_prov_disc_info.peerIFAddr, GetAddr1Ptr(buf), ETH_ALEN);
|
||||
memcpy(pwdinfo->tx_prov_disc_info.peerDevAddr, GetAddr1Ptr(buf), ETH_ALEN);
|
||||
|
||||
pwdinfo->tx_prov_disc_info.wps_config_method_request = WPS_CM_PUSH_BUTTON;
|
||||
|
||||
|
@ -4230,9 +4230,9 @@ void rtw_cfg80211_issue_p2p_provision_request(struct adapter *padapter, const u8
|
|||
fctrl = &(pwlanhdr->frame_ctl);
|
||||
*(fctrl) = 0;
|
||||
|
||||
_rtw_memcpy(pwlanhdr->addr1, pwdinfo->tx_prov_disc_info.peerDevAddr, ETH_ALEN);
|
||||
_rtw_memcpy(pwlanhdr->addr2, myid(&(padapter->eeprompriv)), ETH_ALEN);
|
||||
_rtw_memcpy(pwlanhdr->addr3, pwdinfo->tx_prov_disc_info.peerDevAddr, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr1, pwdinfo->tx_prov_disc_info.peerDevAddr, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr2, myid(&(padapter->eeprompriv)), ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr3, pwdinfo->tx_prov_disc_info.peerDevAddr, ETH_ALEN);
|
||||
|
||||
SetSeqNum(pwlanhdr, pmlmeext->mgnt_seq);
|
||||
pmlmeext->mgnt_seq++;
|
||||
|
@ -4274,7 +4274,7 @@ void rtw_cfg80211_issue_p2p_provision_request(struct adapter *padapter, const u8
|
|||
// Value:
|
||||
// Device Capability Bitmap, 1 byte
|
||||
// Group Capability Bitmap, 1 byte
|
||||
_rtw_memcpy(p2p_ie + p2pielen, &capability, 2);
|
||||
memcpy(p2p_ie + p2pielen, &capability, 2);
|
||||
p2pielen += 2;
|
||||
|
||||
|
||||
|
@ -4290,7 +4290,7 @@ void rtw_cfg80211_issue_p2p_provision_request(struct adapter *padapter, const u8
|
|||
p2pielen += 2;
|
||||
|
||||
// Value:
|
||||
_rtw_memcpy(p2p_ie + p2pielen, devinfo_content, devinfo_contentlen);
|
||||
memcpy(p2p_ie + p2pielen, devinfo_content, devinfo_contentlen);
|
||||
p2pielen += devinfo_contentlen;
|
||||
|
||||
|
||||
|
@ -4391,7 +4391,7 @@ static s32 cfg80211_rtw_remain_on_channel(struct wiphy *wiphy,
|
|||
goto exit;
|
||||
}
|
||||
|
||||
_rtw_memcpy(&pcfg80211_wdinfo->remain_on_ch_channel, channel, sizeof(struct ieee80211_channel));
|
||||
memcpy(&pcfg80211_wdinfo->remain_on_ch_channel, channel, sizeof(struct ieee80211_channel));
|
||||
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3,8,0))
|
||||
pcfg80211_wdinfo->remain_on_ch_type= channel_type;
|
||||
#endif
|
||||
|
@ -4535,7 +4535,7 @@ static int _cfg80211_rtw_mgmt_tx(struct adapter *padapter, u8 tx_ch, const u8 *b
|
|||
|
||||
pframe = (u8 *)(pmgntframe->buf_addr) + TXDESC_OFFSET;
|
||||
|
||||
_rtw_memcpy(pframe, (void*)buf, len);
|
||||
memcpy(pframe, (void*)buf, len);
|
||||
pattrib->pktlen = len;
|
||||
|
||||
pwlanhdr = (struct rtw_ieee80211_hdr *)pframe;
|
||||
|
@ -4776,7 +4776,7 @@ static int rtw_cfg80211_set_beacon_wpsp2pie(struct net_device *ndev, char *buf,
|
|||
|
||||
}
|
||||
|
||||
_rtw_memcpy(pmlmepriv->wps_beacon_ie, wps_ie, wps_ielen);
|
||||
memcpy(pmlmepriv->wps_beacon_ie, wps_ie, wps_ielen);
|
||||
pmlmepriv->wps_beacon_ie_len = wps_ielen;
|
||||
|
||||
update_beacon(padapter, _VENDOR_SPECIFIC_IE_, wps_oui, true);
|
||||
|
@ -4808,7 +4808,7 @@ static int rtw_cfg80211_set_beacon_wpsp2pie(struct net_device *ndev, char *buf,
|
|||
|
||||
}
|
||||
|
||||
_rtw_memcpy(pmlmepriv->p2p_beacon_ie, p2p_ie, p2p_ielen);
|
||||
memcpy(pmlmepriv->p2p_beacon_ie, p2p_ie, p2p_ielen);
|
||||
pmlmepriv->p2p_beacon_ie_len = p2p_ielen;
|
||||
|
||||
}
|
||||
|
@ -4920,7 +4920,7 @@ static int rtw_cfg80211_set_probe_resp_wpsp2pie(struct net_device *net, char *bu
|
|||
*puconfig_method |= uconfig_method;
|
||||
}
|
||||
|
||||
_rtw_memcpy(pmlmepriv->wps_probe_resp_ie, wps_ie, wps_ielen);
|
||||
memcpy(pmlmepriv->wps_probe_resp_ie, wps_ie, wps_ielen);
|
||||
pmlmepriv->wps_probe_resp_ie_len = wps_ielen;
|
||||
|
||||
}
|
||||
|
@ -4971,7 +4971,7 @@ static int rtw_cfg80211_set_probe_resp_wpsp2pie(struct net_device *net, char *bu
|
|||
return -EINVAL;
|
||||
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->p2p_probe_resp_ie, p2p_ie, p2p_ielen);
|
||||
memcpy(pmlmepriv->p2p_probe_resp_ie, p2p_ie, p2p_ielen);
|
||||
pmlmepriv->p2p_probe_resp_ie_len = p2p_ielen;
|
||||
}
|
||||
else
|
||||
|
@ -4990,7 +4990,7 @@ static int rtw_cfg80211_set_probe_resp_wpsp2pie(struct net_device *net, char *bu
|
|||
return -EINVAL;
|
||||
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->p2p_go_probe_resp_ie, p2p_ie, p2p_ielen);
|
||||
memcpy(pmlmepriv->p2p_go_probe_resp_ie, p2p_ie, p2p_ielen);
|
||||
pmlmepriv->p2p_go_probe_resp_ie_len = p2p_ielen;
|
||||
}
|
||||
|
||||
|
@ -5055,7 +5055,7 @@ static int rtw_cfg80211_set_assoc_resp_wpsp2pie(struct net_device *net, char *bu
|
|||
return -EINVAL;
|
||||
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->wps_assoc_resp_ie, buf, len);
|
||||
memcpy(pmlmepriv->wps_assoc_resp_ie, buf, len);
|
||||
pmlmepriv->wps_assoc_resp_ie_len = len;
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue