mirror of
https://github.com/lwfinger/rtl8188eu.git
synced 2025-05-08 22:43:04 +00:00
rtl8188eu: Remove wrappers around memcpy() and memmove()
Signed-off-by: Larry Finger <Larry.Finger@lwfinger.net>
This commit is contained in:
parent
a010d15b64
commit
92b97f0a67
42 changed files with 1287 additions and 1301 deletions
|
@ -189,28 +189,28 @@ static struct ieee80211_channel rtw_5ghz_a_channels[] = {
|
|||
|
||||
static void rtw_2g_channels_init(struct ieee80211_channel *channels)
|
||||
{
|
||||
_rtw_memcpy((void *)channels, (void *)rtw_2ghz_channels,
|
||||
memcpy((void *)channels, (void *)rtw_2ghz_channels,
|
||||
sizeof(struct ieee80211_channel) * RTW_2G_CHANNELS_NUM
|
||||
);
|
||||
}
|
||||
|
||||
static void rtw_5g_channels_init(struct ieee80211_channel *channels)
|
||||
{
|
||||
_rtw_memcpy((void *)channels, (void *)rtw_5ghz_a_channels,
|
||||
memcpy((void *)channels, (void *)rtw_5ghz_a_channels,
|
||||
sizeof(struct ieee80211_channel) * RTW_5G_CHANNELS_NUM
|
||||
);
|
||||
}
|
||||
|
||||
static void rtw_2g_rates_init(struct ieee80211_rate *rates)
|
||||
{
|
||||
_rtw_memcpy(rates, rtw_g_rates,
|
||||
memcpy(rates, rtw_g_rates,
|
||||
sizeof(struct ieee80211_rate) * RTW_G_RATES_NUM
|
||||
);
|
||||
}
|
||||
|
||||
static void rtw_5g_rates_init(struct ieee80211_rate *rates)
|
||||
{
|
||||
_rtw_memcpy(rates, rtw_a_rates,
|
||||
memcpy(rates, rtw_a_rates,
|
||||
sizeof(struct ieee80211_rate) * RTW_A_RATES_NUM
|
||||
);
|
||||
}
|
||||
|
@ -477,20 +477,20 @@ struct cfg80211_bss *rtw_cfg80211_inform_bss(_adapter *padapter, struct wlan_net
|
|||
/* pmlmeext->mgnt_seq++; */
|
||||
|
||||
if (pnetwork->network.Reserved[0] == 1) { /* WIFI_BEACON */
|
||||
_rtw_memcpy(pwlanhdr->addr1, bc_addr, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr1, bc_addr, ETH_ALEN);
|
||||
set_frame_sub_type(pbuf, WIFI_BEACON);
|
||||
} else {
|
||||
_rtw_memcpy(pwlanhdr->addr1, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr1, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
set_frame_sub_type(pbuf, WIFI_PROBERSP);
|
||||
}
|
||||
|
||||
_rtw_memcpy(pwlanhdr->addr2, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
_rtw_memcpy(pwlanhdr->addr3, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr2, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr3, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
|
||||
|
||||
/* pbuf += sizeof(struct rtw_ieee80211_hdr_3addr); */
|
||||
len = sizeof(struct rtw_ieee80211_hdr_3addr);
|
||||
_rtw_memcpy((pbuf + len), pnetwork->network.IEs, pnetwork->network.IELength);
|
||||
memcpy((pbuf + len), pnetwork->network.IEs, pnetwork->network.IELength);
|
||||
*((__le64 *)(pbuf + len)) = cpu_to_le64(notify_timestamp);
|
||||
|
||||
len += pnetwork->network.IELength;
|
||||
|
@ -600,7 +600,7 @@ void rtw_cfg80211_ibss_indicate_connect(_adapter *padapter)
|
|||
|
||||
if (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) ) {
|
||||
|
||||
_rtw_memcpy(&cur_network->network, pnetwork, sizeof(WLAN_BSSID_EX));
|
||||
memcpy(&cur_network->network, pnetwork, sizeof(WLAN_BSSID_EX));
|
||||
if (cur_network) {
|
||||
if (!rtw_cfg80211_inform_bss(padapter, cur_network))
|
||||
RTW_INFO(FUNC_ADPT_FMT" inform fail !!\n", FUNC_ADPT_ARG(padapter));
|
||||
|
@ -927,7 +927,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx;
|
||||
}
|
||||
|
||||
_rtw_memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
|
||||
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
|
||||
|
||||
psecuritypriv->dot11DefKeylen[wep_key_idx] = wep_key_len;
|
||||
|
||||
|
@ -943,7 +943,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
if (strcmp(param->u.crypt.alg, "WEP") == 0) {
|
||||
RTW_INFO("%s, set group_key, WEP\n", __func__);
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
|
||||
if (param->u.crypt.key_len == 13)
|
||||
|
@ -954,12 +954,12 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
/* DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len); */
|
||||
/* set mic key */
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
psecuritypriv->busetkipkey = true;
|
||||
|
||||
|
@ -968,7 +968,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _AES_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
}
|
||||
#ifdef CONFIG_IEEE80211W
|
||||
else if (strcmp(param->u.crypt.alg, "BIP") == 0) {
|
||||
|
@ -976,7 +976,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
|
||||
RTW_INFO("BIP key_len=%d , index=%d\n", param->u.crypt.key_len, param->u.crypt.idx);
|
||||
/* save the IGTK key, length 16 bytes */
|
||||
_rtw_memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
/* RTW_INFO("IGTK key below:\n");
|
||||
for(no=0;no<16;no++)
|
||||
printk(" %02x ", padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey[no]);
|
||||
|
@ -1016,7 +1016,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
if (psecuritypriv->dot11AuthAlgrthm == dot11AuthAlgrthm_8021X && psta) { /* psk/802_1x */
|
||||
if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) {
|
||||
if (param->u.crypt.set_tx == 1) { /* pairwise key */
|
||||
_rtw_memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
if (strcmp(param->u.crypt.alg, "WEP") == 0) {
|
||||
RTW_INFO("%s, set pairwise key, WEP\n", __func__);
|
||||
|
@ -1031,8 +1031,8 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
|
||||
/* DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len); */
|
||||
/* set mic key */
|
||||
_rtw_memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
psecuritypriv->busetkipkey = true;
|
||||
|
||||
|
@ -1055,7 +1055,7 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
|
||||
} else { /* group key??? */
|
||||
if (strcmp(param->u.crypt.alg, "WEP") == 0) {
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
|
||||
if (param->u.crypt.key_len == 13)
|
||||
|
@ -1063,19 +1063,19 @@ static int rtw_cfg80211_ap_set_encryption(struct net_device *dev, struct ieee_pa
|
|||
} else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
|
||||
psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
/* DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len); */
|
||||
/* set mic key */
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
psecuritypriv->busetkipkey = true;
|
||||
|
||||
} else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
|
||||
psecuritypriv->dot118021XGrpPrivacy = _AES_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
} else
|
||||
psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
|
||||
|
||||
|
@ -1177,7 +1177,7 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx;
|
||||
}
|
||||
|
||||
_rtw_memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
|
||||
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
|
||||
|
||||
psecuritypriv->dot11DefKeylen[wep_key_idx] = wep_key_len;
|
||||
|
||||
|
@ -1216,12 +1216,12 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
|
||||
RTW_INFO("%s, : param->u.crypt.set_tx ==1\n", __func__);
|
||||
|
||||
_rtw_memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
if (strcmp(param->u.crypt.alg, "TKIP") == 0) { /* set mic key */
|
||||
/* DEBUG_ERR(("\nset key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len)); */
|
||||
_rtw_memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
padapter->securitypriv.busetkipkey = false;
|
||||
/* _set_timer(&padapter->securitypriv.tkip_timer, 50); */
|
||||
|
@ -1236,13 +1236,13 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
rtw_setstakey_cmd(padapter, psta, UNICAST_KEY, true);
|
||||
} else { /* group key */
|
||||
if (strcmp(param->u.crypt.alg, "TKIP") == 0 || strcmp(param->u.crypt.alg, "CCMP") == 0) {
|
||||
_rtw_memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key,
|
||||
memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key,
|
||||
(param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
_rtw_memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
padapter->securitypriv.binstallGrpkey = true;
|
||||
if (param->u.crypt.idx < 4)
|
||||
_rtw_memcpy(padapter->securitypriv.iv_seq[param->u.crypt.idx], param->u.crypt.seq, 8);
|
||||
memcpy(padapter->securitypriv.iv_seq[param->u.crypt.idx], param->u.crypt.seq, 8);
|
||||
|
||||
/* DEBUG_ERR((" param->u.crypt.key_len=%d\n", param->u.crypt.key_len)); */
|
||||
RTW_INFO(" ~~~~set sta key:groupkey\n");
|
||||
|
@ -1255,7 +1255,7 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
int no;
|
||||
/* RTW_INFO("BIP key_len=%d , index=%d @@@@@@@@@@@@@@@@@@\n", param->u.crypt.key_len, param->u.crypt.idx); */
|
||||
/* save the IGTK key, length 16 bytes */
|
||||
_rtw_memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key,
|
||||
memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key,
|
||||
(param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
/*RTW_INFO("IGTK key below:\n");
|
||||
for(no=0;no<16;no++)
|
||||
|
@ -1304,19 +1304,19 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
if (param->u.crypt.set_tx == 1) {
|
||||
list_for_each_entry(pWapiSta, &pWapiInfo->wapiSTAUsedList, list) {
|
||||
if (!memcmp(pWapiSta->PeerMacAddr, param->sta_addr, 6)) {
|
||||
_rtw_memcpy(pWapiSta->lastTxUnicastPN, WapiASUEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastTxUnicastPN, WapiASUEPNInitialValueSrc, 16);
|
||||
|
||||
pWapiSta->wapiUsk.bSet = true;
|
||||
_rtw_memcpy(pWapiSta->wapiUsk.dataKey, param->u.crypt.key, 16);
|
||||
_rtw_memcpy(pWapiSta->wapiUsk.micKey, param->u.crypt.key + 16, 16);
|
||||
memcpy(pWapiSta->wapiUsk.dataKey, param->u.crypt.key, 16);
|
||||
memcpy(pWapiSta->wapiUsk.micKey, param->u.crypt.key + 16, 16);
|
||||
pWapiSta->wapiUsk.keyId = param->u.crypt.idx ;
|
||||
pWapiSta->wapiUsk.bTxEnable = true;
|
||||
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNBEQueue, WapiAEPNInitialValueSrc, 16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNBKQueue, WapiAEPNInitialValueSrc, 16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNVIQueue, WapiAEPNInitialValueSrc, 16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNVOQueue, WapiAEPNInitialValueSrc, 16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPN, WapiAEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNBEQueue, WapiAEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNBKQueue, WapiAEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNVIQueue, WapiAEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNVOQueue, WapiAEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxUnicastPN, WapiAEPNInitialValueSrc, 16);
|
||||
pWapiSta->wapiUskUpdate.bTxEnable = false;
|
||||
pWapiSta->wapiUskUpdate.bSet = false;
|
||||
|
||||
|
@ -1330,15 +1330,15 @@ static int rtw_cfg80211_set_encryption(struct net_device *dev, struct ieee_param
|
|||
list_for_each_entry(pWapiSta, &pWapiInfo->wapiSTAUsedList, list) {
|
||||
if (!memcmp(pWapiSta->PeerMacAddr, get_bssid(pmlmepriv), 6)) {
|
||||
pWapiSta->wapiMsk.bSet = true;
|
||||
_rtw_memcpy(pWapiSta->wapiMsk.dataKey, param->u.crypt.key, 16);
|
||||
_rtw_memcpy(pWapiSta->wapiMsk.micKey, param->u.crypt.key + 16, 16);
|
||||
memcpy(pWapiSta->wapiMsk.dataKey, param->u.crypt.key, 16);
|
||||
memcpy(pWapiSta->wapiMsk.micKey, param->u.crypt.key + 16, 16);
|
||||
pWapiSta->wapiMsk.keyId = param->u.crypt.idx ;
|
||||
pWapiSta->wapiMsk.bTxEnable = false;
|
||||
if (!pWapiSta->bSetkeyOk)
|
||||
pWapiSta->bSetkeyOk = true;
|
||||
pWapiSta->bAuthenticateInProgress = false;
|
||||
|
||||
_rtw_memcpy(pWapiSta->lastRxMulticastPN, WapiAEMultiCastPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxMulticastPN, WapiAEMultiCastPNInitialValueSrc, 16);
|
||||
|
||||
if (psecuritypriv->sw_decrypt == false) {
|
||||
/* set rx broadcast key for ASUE */
|
||||
|
@ -1427,7 +1427,7 @@ static int cfg80211_rtw_add_key(struct wiphy *wiphy, struct net_device *ndev,
|
|||
ret = -ENOTSUPP;
|
||||
goto addkey_end;
|
||||
}
|
||||
_rtw_memcpy((void *)param->sta_addr, (void *)mac_addr, ETH_ALEN);
|
||||
memcpy((void *)param->sta_addr, (void *)mac_addr, ETH_ALEN);
|
||||
} else
|
||||
RTW_INFO("mac_addr is null\n");
|
||||
RTW_INFO("rtw_wx_set_enc_ext: SMS4 case\n");
|
||||
|
@ -1453,11 +1453,11 @@ static int cfg80211_rtw_add_key(struct wiphy *wiphy, struct net_device *ndev,
|
|||
param->u.crypt.idx = key_index;
|
||||
|
||||
if (params->seq_len && params->seq)
|
||||
_rtw_memcpy(param->u.crypt.seq, (u8 *)params->seq, params->seq_len);
|
||||
memcpy(param->u.crypt.seq, (u8 *)params->seq, params->seq_len);
|
||||
|
||||
if (params->key_len && params->key) {
|
||||
param->u.crypt.key_len = params->key_len;
|
||||
_rtw_memcpy(param->u.crypt.key, (u8 *)params->key, params->key_len);
|
||||
memcpy(param->u.crypt.key, (u8 *)params->key, params->key_len);
|
||||
}
|
||||
|
||||
if (check_fwstate(pmlmepriv, WIFI_STATION_STATE) ) {
|
||||
|
@ -1465,7 +1465,7 @@ static int cfg80211_rtw_add_key(struct wiphy *wiphy, struct net_device *ndev,
|
|||
if (rtw_tdls_is_driver_setup(padapter) == false && mac_addr) {
|
||||
ptdls_sta = rtw_get_stainfo(&padapter->stapriv, (void *)mac_addr);
|
||||
if (ptdls_sta != NULL && ptdls_sta->tdls_sta_state) {
|
||||
_rtw_memcpy(ptdls_sta->tpk.tk, params->key, params->key_len);
|
||||
memcpy(ptdls_sta->tpk.tk, params->key, params->key_len);
|
||||
rtw_tdls_set_key(padapter, ptdls_sta);
|
||||
goto addkey_end;
|
||||
}
|
||||
|
@ -1476,7 +1476,7 @@ static int cfg80211_rtw_add_key(struct wiphy *wiphy, struct net_device *ndev,
|
|||
} else if (check_fwstate(pmlmepriv, WIFI_AP_STATE) ) {
|
||||
#ifdef CONFIG_AP_MODE
|
||||
if (mac_addr)
|
||||
_rtw_memcpy(param->sta_addr, (void *)mac_addr, ETH_ALEN);
|
||||
memcpy(param->sta_addr, (void *)mac_addr, ETH_ALEN);
|
||||
|
||||
ret = rtw_cfg80211_ap_set_encryption(ndev, param, param_len);
|
||||
#endif
|
||||
|
@ -1594,15 +1594,15 @@ static int cfg80211_rtw_set_rekey_data(struct wiphy *wiphy,
|
|||
return -1;
|
||||
}
|
||||
|
||||
_rtw_memcpy(psta->kek, data->kek, NL80211_KEK_LEN);
|
||||
memcpy(psta->kek, data->kek, NL80211_KEK_LEN);
|
||||
/*printk("\ncfg80211_rtw_set_rekey_data KEK:");
|
||||
for(i=0;i<NL80211_KEK_LEN; i++)
|
||||
printk(" %02x ", psta->kek[i]);*/
|
||||
_rtw_memcpy(psta->kck, data->kck, NL80211_KCK_LEN);
|
||||
memcpy(psta->kck, data->kck, NL80211_KCK_LEN);
|
||||
/*printk("\ncfg80211_rtw_set_rekey_data KCK:");
|
||||
for(i=0;i<NL80211_KCK_LEN; i++)
|
||||
printk(" %02x ", psta->kck[i]);*/
|
||||
_rtw_memcpy(psta->replay_ctr, data->replay_ctr, NL80211_REPLAY_CTR_LEN);
|
||||
memcpy(psta->replay_ctr, data->replay_ctr, NL80211_REPLAY_CTR_LEN);
|
||||
psecuritypriv->binstallKCK_KEK = true;
|
||||
/*printk("\nREPLAY_CTR: ");
|
||||
for(i=0;i<RTW_REPLAY_CTR_LEN; i++)
|
||||
|
@ -1943,7 +1943,7 @@ static int rtw_cfg80211_is_target_wps_scan(struct cfg80211_scan_request *scan_re
|
|||
goto exit;
|
||||
|
||||
/* under target WPS scan */
|
||||
_rtw_memcpy(target_ssid, scan_req->ssids, sizeof(struct cfg80211_ssid));
|
||||
memcpy(target_ssid, scan_req->ssids, sizeof(struct cfg80211_ssid));
|
||||
ret = 1;
|
||||
|
||||
exit:
|
||||
|
@ -2044,7 +2044,7 @@ static int rtw_cfg80211_set_probe_req_wpsp2pie(_adapter *padapter, char *buf, in
|
|||
return -EINVAL;
|
||||
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->wps_probe_req_ie, wps_ie, wps_ielen);
|
||||
memcpy(pmlmepriv->wps_probe_req_ie, wps_ie, wps_ielen);
|
||||
pmlmepriv->wps_probe_req_ie_len = wps_ielen;
|
||||
}
|
||||
|
||||
|
@ -2075,7 +2075,7 @@ static int rtw_cfg80211_set_probe_req_wpsp2pie(_adapter *padapter, char *buf, in
|
|||
return -EINVAL;
|
||||
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->p2p_probe_req_ie, p2p_ie, p2p_ielen);
|
||||
memcpy(pmlmepriv->p2p_probe_req_ie, p2p_ie, p2p_ielen);
|
||||
pmlmepriv->p2p_probe_req_ie_len = p2p_ielen;
|
||||
|
||||
if (rtw_get_p2p_attr_content(p2p_ie, p2p_ielen, P2P_ATTR_LISTEN_CH, (u8 *)listen_ch_attr, (uint *) &attr_contentlen)
|
||||
|
@ -2386,7 +2386,7 @@ static int cfg80211_rtw_scan(struct wiphy *wiphy
|
|||
#ifdef CONFIG_DEBUG_CFG80211
|
||||
RTW_INFO("ssid=%s, len=%d\n", ssids[i].ssid, ssids[i].ssid_len);
|
||||
#endif
|
||||
_rtw_memcpy(ssid[i].Ssid, ssids[i].ssid, ssids[i].ssid_len);
|
||||
memcpy(ssid[i].Ssid, ssids[i].ssid, ssids[i].ssid_len);
|
||||
ssid[i].SsidLength = ssids[i].ssid_len;
|
||||
}
|
||||
|
||||
|
@ -2402,13 +2402,13 @@ static int cfg80211_rtw_scan(struct wiphy *wiphy
|
|||
|
||||
if (request->n_channels == 1) {
|
||||
for (i = 1; i < survey_times_for_one_ch; i++)
|
||||
_rtw_memcpy(&ch[i], &ch[0], sizeof(struct rtw_ieee80211_channel));
|
||||
memcpy(&ch[i], &ch[0], sizeof(struct rtw_ieee80211_channel));
|
||||
pch = ch;
|
||||
chan_num = survey_times_for_one_ch;
|
||||
} else if (request->n_channels <= 4) {
|
||||
for (j = request->n_channels - 1; j >= 0; j--)
|
||||
for (i = 0; i < survey_times; i++)
|
||||
_rtw_memcpy(&ch[j * survey_times + i], &ch[j], sizeof(struct rtw_ieee80211_channel));
|
||||
memcpy(&ch[j * survey_times + i], &ch[j], sizeof(struct rtw_ieee80211_channel));
|
||||
pch = ch;
|
||||
chan_num = survey_times * request->n_channels;
|
||||
} else {
|
||||
|
@ -2648,7 +2648,7 @@ static int rtw_cfg80211_set_wpa_ie(_adapter *padapter, u8 *pie, size_t ielen)
|
|||
goto exit;
|
||||
}
|
||||
|
||||
_rtw_memcpy(buf, pie , ielen);
|
||||
memcpy(buf, pie , ielen);
|
||||
|
||||
/* dump */
|
||||
{
|
||||
|
@ -2669,7 +2669,7 @@ static int rtw_cfg80211_set_wpa_ie(_adapter *padapter, u8 *pie, size_t ielen)
|
|||
if (rtw_parse_wpa_ie(pwpa, wpa_ielen + 2, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
|
||||
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
|
||||
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK;
|
||||
_rtw_memcpy(padapter->securitypriv.supplicant_ie, &pwpa[0], wpa_ielen + 2);
|
||||
memcpy(padapter->securitypriv.supplicant_ie, &pwpa[0], wpa_ielen + 2);
|
||||
|
||||
RTW_INFO("got wpa_ie, wpa_ielen:%u\n", wpa_ielen);
|
||||
}
|
||||
|
@ -2680,7 +2680,7 @@ static int rtw_cfg80211_set_wpa_ie(_adapter *padapter, u8 *pie, size_t ielen)
|
|||
if (rtw_parse_wpa2_ie(pwpa2, wpa2_ielen + 2, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
|
||||
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
|
||||
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK;
|
||||
_rtw_memcpy(padapter->securitypriv.supplicant_ie, &pwpa2[0], wpa2_ielen + 2);
|
||||
memcpy(padapter->securitypriv.supplicant_ie, &pwpa2[0], wpa2_ielen + 2);
|
||||
|
||||
RTW_INFO("got wpa2_ie, wpa2_ielen:%u\n", wpa2_ielen);
|
||||
}
|
||||
|
@ -2745,7 +2745,7 @@ static int rtw_cfg80211_set_wpa_ie(_adapter *padapter, u8 *pie, size_t ielen)
|
|||
if (wps_ie && wps_ielen > 0) {
|
||||
RTW_INFO("got wps_ie, wps_ielen:%u\n", wps_ielen);
|
||||
padapter->securitypriv.wps_ie_len = wps_ielen < MAX_WPS_IE_LEN ? wps_ielen : MAX_WPS_IE_LEN;
|
||||
_rtw_memcpy(padapter->securitypriv.wps_ie, wps_ie, padapter->securitypriv.wps_ie_len);
|
||||
memcpy(padapter->securitypriv.wps_ie, wps_ie, padapter->securitypriv.wps_ie_len);
|
||||
set_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS);
|
||||
} else
|
||||
_clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS);
|
||||
|
@ -2775,7 +2775,7 @@ static int rtw_cfg80211_set_wpa_ie(_adapter *padapter, u8 *pie, size_t ielen)
|
|||
RTW_INFO("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
|
||||
goto exit;
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->p2p_assoc_req_ie, p2p_ie, p2p_ielen);
|
||||
memcpy(pmlmepriv->p2p_assoc_req_ie, p2p_ie, p2p_ielen);
|
||||
pmlmepriv->p2p_assoc_req_ie_len = p2p_ielen;
|
||||
}
|
||||
}
|
||||
|
@ -2873,7 +2873,7 @@ static int cfg80211_rtw_join_ibss(struct wiphy *wiphy, struct net_device *ndev,
|
|||
|
||||
memset(&ndis_ssid, 0, sizeof(NDIS_802_11_SSID));
|
||||
ndis_ssid.SsidLength = params->ssid_len;
|
||||
_rtw_memcpy(ndis_ssid.Ssid, (u8 *)params->ssid, params->ssid_len);
|
||||
memcpy(ndis_ssid.Ssid, (u8 *)params->ssid, params->ssid_len);
|
||||
|
||||
/* RTW_INFO("ssid=%s, len=%zu\n", ndis_ssid.Ssid, params->ssid_len); */
|
||||
|
||||
|
@ -3026,7 +3026,7 @@ static int cfg80211_rtw_connect(struct wiphy *wiphy, struct net_device *ndev,
|
|||
|
||||
memset(&ndis_ssid, 0, sizeof(NDIS_802_11_SSID));
|
||||
ndis_ssid.SsidLength = sme->ssid_len;
|
||||
_rtw_memcpy(ndis_ssid.Ssid, (u8 *)sme->ssid, sme->ssid_len);
|
||||
memcpy(ndis_ssid.Ssid, (u8 *)sme->ssid, sme->ssid_len);
|
||||
|
||||
RTW_INFO("ssid=%s, len=%zu\n", ndis_ssid.Ssid, sme->ssid_len);
|
||||
|
||||
|
@ -3121,7 +3121,7 @@ static int cfg80211_rtw_connect(struct wiphy *wiphy, struct net_device *ndev,
|
|||
pwep->KeyIndex = wep_key_idx;
|
||||
pwep->KeyIndex |= 0x80000000;
|
||||
|
||||
_rtw_memcpy(pwep->KeyMaterial, (void *)sme->key, pwep->KeyLength);
|
||||
memcpy(pwep->KeyMaterial, (void *)sme->key, pwep->KeyLength);
|
||||
|
||||
if (rtw_set_802_11_add_wep(padapter, pwep) == (u8)_FAIL)
|
||||
ret = -EOPNOTSUPP ;
|
||||
|
@ -3300,7 +3300,7 @@ static int cfg80211_rtw_set_pmksa(struct wiphy *wiphy,
|
|||
/* BSSID is matched, the same AP => rewrite with new PMKID. */
|
||||
RTW_INFO(FUNC_NDEV_FMT" BSSID exists in the PMKList.\n", FUNC_NDEV_ARG(ndev));
|
||||
|
||||
_rtw_memcpy(psecuritypriv->PMKIDList[index].PMKID, (u8 *)pmksa->pmkid, WLAN_PMKID_LEN);
|
||||
memcpy(psecuritypriv->PMKIDList[index].PMKID, (u8 *)pmksa->pmkid, WLAN_PMKID_LEN);
|
||||
psecuritypriv->PMKIDList[index].bUsed = true;
|
||||
psecuritypriv->PMKIDIndex = index + 1;
|
||||
blInserted = true;
|
||||
|
@ -3313,8 +3313,8 @@ static int cfg80211_rtw_set_pmksa(struct wiphy *wiphy,
|
|||
RTW_INFO(FUNC_NDEV_FMT" Use the new entry index = %d for this PMKID.\n",
|
||||
FUNC_NDEV_ARG(ndev), psecuritypriv->PMKIDIndex);
|
||||
|
||||
_rtw_memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, (u8 *)pmksa->bssid, ETH_ALEN);
|
||||
_rtw_memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, (u8 *)pmksa->pmkid, WLAN_PMKID_LEN);
|
||||
memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, (u8 *)pmksa->bssid, ETH_ALEN);
|
||||
memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, (u8 *)pmksa->pmkid, WLAN_PMKID_LEN);
|
||||
|
||||
psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].bUsed = true;
|
||||
psecuritypriv->PMKIDIndex++ ;
|
||||
|
@ -3450,9 +3450,9 @@ void rtw_cfg80211_indicate_sta_disassoc(_adapter *padapter, unsigned char *da, u
|
|||
fctrl = &(pwlanhdr->frame_ctl);
|
||||
*(fctrl) = 0;
|
||||
|
||||
_rtw_memcpy(pwlanhdr->addr1, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
_rtw_memcpy(pwlanhdr->addr2, da, ETH_ALEN);
|
||||
_rtw_memcpy(pwlanhdr->addr3, get_my_bssid(&(pmlmeinfo->network)), ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr1, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr2, da, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr3, get_my_bssid(&(pmlmeinfo->network)), ETH_ALEN);
|
||||
|
||||
SetSeqNum(pwlanhdr, pmlmeext->mgnt_seq);
|
||||
pmlmeext->mgnt_seq++;
|
||||
|
@ -3612,7 +3612,7 @@ dump:
|
|||
|
||||
pframe = (u8 *)(pmgntframe->buf_addr) + TXDESC_OFFSET;
|
||||
|
||||
_rtw_memcpy(pframe, (void *)buf, len);
|
||||
memcpy(pframe, (void *)buf, len);
|
||||
pattrib->pktlen = len;
|
||||
|
||||
#ifdef CONFIG_P2P
|
||||
|
@ -3738,7 +3738,7 @@ static int rtw_cfg80211_add_monitor_if(_adapter *padapter, char *name, struct ne
|
|||
goto out;
|
||||
|
||||
*ndev = pwdev_priv->pmon_ndev = mon_ndev;
|
||||
_rtw_memcpy(pwdev_priv->ifname_mon, name, IFNAMSIZ + 1);
|
||||
memcpy(pwdev_priv->ifname_mon, name, IFNAMSIZ + 1);
|
||||
|
||||
out:
|
||||
if (ret && mon_wdev) {
|
||||
|
@ -3930,14 +3930,14 @@ static int rtw_add_beacon(_adapter *adapter, const u8 *head, size_t head_len, co
|
|||
return -ENOMEM;
|
||||
|
||||
|
||||
/* _rtw_memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2); */
|
||||
/* memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2); */
|
||||
|
||||
/* if((pstapriv->max_num_sta>NUM_STA) || (pstapriv->max_num_sta<=0)) */
|
||||
/* pstapriv->max_num_sta = NUM_STA; */
|
||||
|
||||
|
||||
_rtw_memcpy(pbuf, (void *)head + 24, head_len - 24); /* 24=beacon header len. */
|
||||
_rtw_memcpy(pbuf + head_len - 24, (void *)tail, tail_len);
|
||||
memcpy(pbuf, (void *)head + 24, head_len - 24); /* 24=beacon header len. */
|
||||
memcpy(pbuf + head_len - 24, (void *)tail, tail_len);
|
||||
|
||||
len = head_len + tail_len - 24;
|
||||
|
||||
|
@ -4053,9 +4053,9 @@ static int cfg80211_rtw_start_ap(struct wiphy *wiphy, struct net_device *ndev,
|
|||
settings->ssid, settings->ssid_len,
|
||||
pbss_network->Ssid.Ssid, pbss_network->Ssid.SsidLength);
|
||||
|
||||
_rtw_memcpy(pbss_network->Ssid.Ssid, (void *)settings->ssid, settings->ssid_len);
|
||||
memcpy(pbss_network->Ssid.Ssid, (void *)settings->ssid, settings->ssid_len);
|
||||
pbss_network->Ssid.SsidLength = settings->ssid_len;
|
||||
_rtw_memcpy(pbss_network_ext->Ssid.Ssid, (void *)settings->ssid, settings->ssid_len);
|
||||
memcpy(pbss_network_ext->Ssid.Ssid, (void *)settings->ssid, settings->ssid_len);
|
||||
pbss_network_ext->Ssid.SsidLength = settings->ssid_len;
|
||||
|
||||
if (0)
|
||||
|
@ -4314,7 +4314,7 @@ static int cfg80211_rtw_dump_station(struct wiphy *wiphy, struct net_device *nde
|
|||
ret = -ENOENT;
|
||||
goto exit;
|
||||
}
|
||||
_rtw_memcpy(mac, psta->hwaddr, ETH_ALEN);
|
||||
memcpy(mac, psta->hwaddr, ETH_ALEN);
|
||||
sinfo->filled = 0;
|
||||
sinfo->filled |= STATION_INFO_SIGNAL;
|
||||
sinfo->signal = psta->rssi;
|
||||
|
@ -4695,8 +4695,8 @@ void rtw_cfg80211_issue_p2p_provision_request(_adapter *padapter, const u8 *buf,
|
|||
RTW_INFO("[%s] In\n", __func__);
|
||||
|
||||
/* prepare for building provision_request frame */
|
||||
_rtw_memcpy(pwdinfo->tx_prov_disc_info.peerIFAddr, GetAddr1Ptr(buf), ETH_ALEN);
|
||||
_rtw_memcpy(pwdinfo->tx_prov_disc_info.peerDevAddr, GetAddr1Ptr(buf), ETH_ALEN);
|
||||
memcpy(pwdinfo->tx_prov_disc_info.peerIFAddr, GetAddr1Ptr(buf), ETH_ALEN);
|
||||
memcpy(pwdinfo->tx_prov_disc_info.peerDevAddr, GetAddr1Ptr(buf), ETH_ALEN);
|
||||
|
||||
pwdinfo->tx_prov_disc_info.wps_config_method_request = WPS_CM_PUSH_BUTTON;
|
||||
|
||||
|
@ -4751,9 +4751,9 @@ void rtw_cfg80211_issue_p2p_provision_request(_adapter *padapter, const u8 *buf,
|
|||
fctrl = &(pwlanhdr->frame_ctl);
|
||||
*(fctrl) = 0;
|
||||
|
||||
_rtw_memcpy(pwlanhdr->addr1, pwdinfo->tx_prov_disc_info.peerDevAddr, ETH_ALEN);
|
||||
_rtw_memcpy(pwlanhdr->addr2, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
_rtw_memcpy(pwlanhdr->addr3, pwdinfo->tx_prov_disc_info.peerDevAddr, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr1, pwdinfo->tx_prov_disc_info.peerDevAddr, ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr2, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
memcpy(pwlanhdr->addr3, pwdinfo->tx_prov_disc_info.peerDevAddr, ETH_ALEN);
|
||||
|
||||
SetSeqNum(pwlanhdr, pmlmeext->mgnt_seq);
|
||||
pmlmeext->mgnt_seq++;
|
||||
|
@ -4795,7 +4795,7 @@ void rtw_cfg80211_issue_p2p_provision_request(_adapter *padapter, const u8 *buf,
|
|||
/* Value: */
|
||||
/* Device Capability Bitmap, 1 byte */
|
||||
/* Group Capability Bitmap, 1 byte */
|
||||
_rtw_memcpy(p2p_ie + p2pielen, &capability, 2);
|
||||
memcpy(p2p_ie + p2pielen, &capability, 2);
|
||||
p2pielen += 2;
|
||||
|
||||
|
||||
|
@ -4811,7 +4811,7 @@ void rtw_cfg80211_issue_p2p_provision_request(_adapter *padapter, const u8 *buf,
|
|||
p2pielen += 2;
|
||||
|
||||
/* Value: */
|
||||
_rtw_memcpy(p2p_ie + p2pielen, devinfo_content, devinfo_contentlen);
|
||||
memcpy(p2p_ie + p2pielen, devinfo_content, devinfo_contentlen);
|
||||
p2pielen += devinfo_contentlen;
|
||||
|
||||
|
||||
|
@ -4889,7 +4889,7 @@ static s32 cfg80211_rtw_update_ft_ies(struct wiphy *wiphy,
|
|||
p = (u8 *)ftie->ie;
|
||||
if (ftie->ie_len <= sizeof(pftpriv->updated_ft_ies)) {
|
||||
_enter_critical_bh(&pmlmepriv->lock, &irqL);
|
||||
_rtw_memcpy(pftpriv->updated_ft_ies, ftie->ie, ftie->ie_len);
|
||||
memcpy(pftpriv->updated_ft_ies, ftie->ie, ftie->ie_len);
|
||||
pftpriv->updated_ft_ies_len = ftie->ie_len;
|
||||
_exit_critical_bh(&pmlmepriv->lock, &irqL);
|
||||
} else {
|
||||
|
@ -5070,7 +5070,7 @@ static s32 cfg80211_rtw_remain_on_channel(struct wiphy *wiphy,
|
|||
pcfg80211_wdinfo->ro_ch_wdev = wdev;
|
||||
pcfg80211_wdinfo->remain_on_ch_cookie = *cookie;
|
||||
pcfg80211_wdinfo->last_ro_ch_time = rtw_get_current_time();
|
||||
_rtw_memcpy(&pcfg80211_wdinfo->remain_on_ch_channel, channel, sizeof(struct ieee80211_channel));
|
||||
memcpy(&pcfg80211_wdinfo->remain_on_ch_channel, channel, sizeof(struct ieee80211_channel));
|
||||
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 8, 0))
|
||||
pcfg80211_wdinfo->remain_on_ch_type = channel_type;
|
||||
#endif
|
||||
|
@ -5260,7 +5260,7 @@ int rtw_pd_iface_alloc(struct wiphy *wiphy, const char *name, struct wireless_de
|
|||
|
||||
wdev->wiphy = wiphy;
|
||||
wdev->iftype = NL80211_IFTYPE_P2P_DEVICE;
|
||||
_rtw_memcpy(wdev->address, adapter_mac_addr(primary_adpt), ETH_ALEN);
|
||||
memcpy(wdev->address, adapter_mac_addr(primary_adpt), ETH_ALEN);
|
||||
|
||||
wiphy_data->pd_wdev = wdev;
|
||||
*pd_wdev = wdev;
|
||||
|
@ -5486,7 +5486,7 @@ issue_mgmt_frame:
|
|||
|
||||
pframe = (u8 *)(pmgntframe->buf_addr) + TXDESC_OFFSET;
|
||||
|
||||
_rtw_memcpy(pframe, (void *)buf, len);
|
||||
memcpy(pframe, (void *)buf, len);
|
||||
pattrib->pktlen = len;
|
||||
|
||||
pwlanhdr = (struct rtw_ieee80211_hdr *)pframe;
|
||||
|
@ -5845,7 +5845,7 @@ static int cfg80211_rtw_tdls_mgmt(struct wiphy *wiphy,
|
|||
}
|
||||
|
||||
memset(&txmgmt, 0x00, sizeof(struct tdls_txmgmt));
|
||||
_rtw_memcpy(txmgmt.peer, peer, ETH_ALEN);
|
||||
memcpy(txmgmt.peer, peer, ETH_ALEN);
|
||||
txmgmt.action_code = action_code;
|
||||
txmgmt.dialog_token = dialog_token;
|
||||
txmgmt.status_code = status_code;
|
||||
|
@ -5855,7 +5855,7 @@ static int cfg80211_rtw_tdls_mgmt(struct wiphy *wiphy,
|
|||
ret = -ENOMEM;
|
||||
goto bad;
|
||||
}
|
||||
_rtw_memcpy(txmgmt.buf, (void *)buf, txmgmt.len);
|
||||
memcpy(txmgmt.buf, (void *)buf, txmgmt.len);
|
||||
|
||||
/* Debug purpose */
|
||||
RTW_INFO("%s %d\n", __func__, __LINE__);
|
||||
|
@ -5925,7 +5925,7 @@ static int cfg80211_rtw_tdls_oper(struct wiphy *wiphy,
|
|||
|
||||
memset(&txmgmt, 0x00, sizeof(struct tdls_txmgmt));
|
||||
if (peer)
|
||||
_rtw_memcpy(txmgmt.peer, peer, ETH_ALEN);
|
||||
memcpy(txmgmt.peer, peer, ETH_ALEN);
|
||||
|
||||
if (rtw_tdls_is_driver_setup(padapter)) {
|
||||
/* these two cases are done by driver itself */
|
||||
|
@ -6067,7 +6067,7 @@ static int rtw_cfg80211_set_beacon_wpsp2pie(struct net_device *ndev, char *buf,
|
|||
|
||||
}
|
||||
|
||||
_rtw_memcpy(pmlmepriv->wps_beacon_ie, wps_ie, wps_ielen);
|
||||
memcpy(pmlmepriv->wps_beacon_ie, wps_ie, wps_ielen);
|
||||
pmlmepriv->wps_beacon_ie_len = wps_ielen;
|
||||
|
||||
update_beacon(padapter, _VENDOR_SPECIFIC_IE_, wps_oui, true);
|
||||
|
@ -6098,7 +6098,7 @@ static int rtw_cfg80211_set_beacon_wpsp2pie(struct net_device *ndev, char *buf,
|
|||
|
||||
}
|
||||
|
||||
_rtw_memcpy(pmlmepriv->p2p_beacon_ie, p2p_ie, p2p_ielen);
|
||||
memcpy(pmlmepriv->p2p_beacon_ie, p2p_ie, p2p_ielen);
|
||||
pmlmepriv->p2p_beacon_ie_len = p2p_ielen;
|
||||
|
||||
}
|
||||
|
@ -6197,7 +6197,7 @@ static int rtw_cfg80211_set_probe_resp_wpsp2pie(struct net_device *net, char *bu
|
|||
#endif
|
||||
}
|
||||
|
||||
_rtw_memcpy(pmlmepriv->wps_probe_resp_ie, wps_ie, wps_ielen);
|
||||
memcpy(pmlmepriv->wps_probe_resp_ie, wps_ie, wps_ielen);
|
||||
pmlmepriv->wps_probe_resp_ie_len = wps_ielen;
|
||||
|
||||
}
|
||||
|
@ -6245,7 +6245,7 @@ static int rtw_cfg80211_set_probe_resp_wpsp2pie(struct net_device *net, char *bu
|
|||
return -EINVAL;
|
||||
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->p2p_probe_resp_ie, p2p_ie, p2p_ielen);
|
||||
memcpy(pmlmepriv->p2p_probe_resp_ie, p2p_ie, p2p_ielen);
|
||||
pmlmepriv->p2p_probe_resp_ie_len = p2p_ielen;
|
||||
} else {
|
||||
if (pmlmepriv->p2p_go_probe_resp_ie) {
|
||||
|
@ -6261,7 +6261,7 @@ static int rtw_cfg80211_set_probe_resp_wpsp2pie(struct net_device *net, char *bu
|
|||
return -EINVAL;
|
||||
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->p2p_go_probe_resp_ie, p2p_ie, p2p_ielen);
|
||||
memcpy(pmlmepriv->p2p_go_probe_resp_ie, p2p_ie, p2p_ielen);
|
||||
pmlmepriv->p2p_go_probe_resp_ie_len = p2p_ielen;
|
||||
}
|
||||
|
||||
|
@ -6315,7 +6315,7 @@ static int rtw_cfg80211_set_assoc_resp_wpsp2pie(struct net_device *net, char *bu
|
|||
RTW_INFO("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
|
||||
return -EINVAL;
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->wps_assoc_resp_ie, ie, ie_len);
|
||||
memcpy(pmlmepriv->wps_assoc_resp_ie, ie, ie_len);
|
||||
pmlmepriv->wps_assoc_resp_ie_len = ie_len;
|
||||
}
|
||||
|
||||
|
@ -6334,7 +6334,7 @@ static int rtw_cfg80211_set_assoc_resp_wpsp2pie(struct net_device *net, char *bu
|
|||
RTW_INFO("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
|
||||
return -EINVAL;
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->p2p_assoc_resp_ie, ie, ie_len);
|
||||
memcpy(pmlmepriv->p2p_assoc_resp_ie, ie, ie_len);
|
||||
pmlmepriv->p2p_assoc_resp_ie_len = ie_len;
|
||||
}
|
||||
|
||||
|
@ -6530,7 +6530,7 @@ void rtw_cfg80211_init_wiphy(_adapter *padapter)
|
|||
rtw_regd_init(padapter);
|
||||
|
||||
/* copy mac_addr to wiphy */
|
||||
_rtw_memcpy(wiphy->perm_addr, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
memcpy(wiphy->perm_addr, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
|
||||
}
|
||||
|
||||
|
|
|
@ -131,7 +131,7 @@ static void indicate_wx_custom_event(_adapter *padapter, char *msg)
|
|||
if (!buff)
|
||||
return;
|
||||
|
||||
_rtw_memcpy(buff, msg, strlen(msg));
|
||||
memcpy(buff, msg, strlen(msg));
|
||||
|
||||
memset(&wrqu, 0, sizeof(wrqu));
|
||||
wrqu.data.length = strlen(msg);
|
||||
|
@ -230,9 +230,9 @@ void rtw_indicate_wx_assoc_event(_adapter *padapter)
|
|||
wrqu.ap_addr.sa_family = ARPHRD_ETHER;
|
||||
|
||||
if (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE))
|
||||
_rtw_memcpy(wrqu.ap_addr.sa_data, pnetwork->MacAddress, ETH_ALEN);
|
||||
memcpy(wrqu.ap_addr.sa_data, pnetwork->MacAddress, ETH_ALEN);
|
||||
else
|
||||
_rtw_memcpy(wrqu.ap_addr.sa_data, pmlmepriv->cur_network.network.MacAddress, ETH_ALEN);
|
||||
memcpy(wrqu.ap_addr.sa_data, pmlmepriv->cur_network.network.MacAddress, ETH_ALEN);
|
||||
|
||||
RTW_INFO("assoc success\n");
|
||||
#ifndef CONFIG_IOCTL_CFG80211
|
||||
|
@ -368,7 +368,7 @@ static inline char *iwe_stream_mac_addr_proess(_adapter *padapter,
|
|||
iwe->cmd = SIOCGIWAP;
|
||||
iwe->u.ap_addr.sa_family = ARPHRD_ETHER;
|
||||
|
||||
_rtw_memcpy(iwe->u.ap_addr.sa_data, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
memcpy(iwe->u.ap_addr.sa_data, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
start = iwe_stream_add_event(info, start, stop, iwe, IW_EV_ADDR_LEN);
|
||||
return start;
|
||||
}
|
||||
|
@ -496,7 +496,7 @@ static inline char *iwe_stream_rate_process(_adapter *padapter,
|
|||
|
||||
ht_cap = true;
|
||||
pht_capie = (struct rtw_ieee80211_ht_cap *)(p + 2);
|
||||
_rtw_memcpy(&mcs_rate , pht_capie->supp_mcs_set, 2);
|
||||
memcpy(&mcs_rate , pht_capie->supp_mcs_set, 2);
|
||||
bw_40MHz = (le16_to_cpu(pht_capie->cap_info) & IEEE80211_HT_CAP_SUP_WIDTH) ? 1 : 0;
|
||||
short_GI = (le16_to_cpu(pht_capie->cap_info) & (IEEE80211_HT_CAP_SGI_20 | IEEE80211_HT_CAP_SGI_40)) ? 1 : 0;
|
||||
}
|
||||
|
@ -779,7 +779,7 @@ static char *translate_scan(_adapter *padapter,
|
|||
start = iwe_stream_essid_proess(padapter, info, pnetwork, start, stop, &iwe);
|
||||
start = iwe_stream_protocol_process(padapter, info, pnetwork, start, stop, &iwe);
|
||||
if (pnetwork->network.Reserved[0] != 2) { /* Probe Request */
|
||||
_rtw_memcpy((u8 *)&le_tmp, rtw_get_capability_from_ie(pnetwork->network.IEs), 2);
|
||||
memcpy((u8 *)&le_tmp, rtw_get_capability_from_ie(pnetwork->network.IEs), 2);
|
||||
cap = le16_to_cpu(le_tmp);
|
||||
}
|
||||
|
||||
|
@ -911,7 +911,7 @@ static int wpa_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx;
|
||||
}
|
||||
|
||||
_rtw_memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
|
||||
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len);
|
||||
|
||||
psecuritypriv->dot11DefKeylen[wep_key_idx] = wep_key_len;
|
||||
|
||||
|
@ -938,12 +938,12 @@ static int wpa_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
psta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm;
|
||||
|
||||
if (param->u.crypt.set_tx == 1) { /* pairwise key */
|
||||
_rtw_memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
if (strcmp(param->u.crypt.alg, "TKIP") == 0) { /* set mic key */
|
||||
/* DEBUG_ERR(("\nset key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len)); */
|
||||
_rtw_memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
padapter->securitypriv.busetkipkey = false;
|
||||
/* _set_timer(&padapter->securitypriv.tkip_timer, 50); */
|
||||
|
@ -958,17 +958,17 @@ static int wpa_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
|
||||
} else { /* group key */
|
||||
if (strcmp(param->u.crypt.alg, "TKIP") == 0 || strcmp(param->u.crypt.alg, "CCMP") == 0) {
|
||||
_rtw_memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key,
|
||||
memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key,
|
||||
(param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
/* only TKIP group key need to install this */
|
||||
if (param->u.crypt.key_len > 16) {
|
||||
_rtw_memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
}
|
||||
padapter->securitypriv.binstallGrpkey = true;
|
||||
/* DEBUG_ERR((" param->u.crypt.key_len=%d\n", param->u.crypt.key_len)); */
|
||||
if (param->u.crypt.idx < 4)
|
||||
_rtw_memcpy(padapter->securitypriv.iv_seq[param->u.crypt.idx], param->u.crypt.seq, 8);
|
||||
memcpy(padapter->securitypriv.iv_seq[param->u.crypt.idx], param->u.crypt.seq, 8);
|
||||
RTW_INFO(" ~~~~set sta key:groupkey\n");
|
||||
|
||||
padapter->securitypriv.dot118021XGrpKeyid = param->u.crypt.idx;
|
||||
|
@ -980,7 +980,7 @@ static int wpa_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
int no;
|
||||
/* printk("BIP key_len=%d , index=%d @@@@@@@@@@@@@@@@@@\n", param->u.crypt.key_len, param->u.crypt.idx); */
|
||||
/* save the IGTK key, length 16 bytes */
|
||||
_rtw_memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key,
|
||||
memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key,
|
||||
(param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
/*printk("IGTK key below:\n");
|
||||
for(no=0;no<16;no++)
|
||||
|
@ -1027,19 +1027,19 @@ static int wpa_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
if (param->u.crypt.set_tx == 1) {
|
||||
list_for_each_entry(pWapiSta, &pWapiInfo->wapiSTAUsedList, list) {
|
||||
if (!memcmp(pWapiSta->PeerMacAddr, param->sta_addr, 6)) {
|
||||
_rtw_memcpy(pWapiSta->lastTxUnicastPN, WapiASUEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastTxUnicastPN, WapiASUEPNInitialValueSrc, 16);
|
||||
|
||||
pWapiSta->wapiUsk.bSet = true;
|
||||
_rtw_memcpy(pWapiSta->wapiUsk.dataKey, param->u.crypt.key, 16);
|
||||
_rtw_memcpy(pWapiSta->wapiUsk.micKey, param->u.crypt.key + 16, 16);
|
||||
memcpy(pWapiSta->wapiUsk.dataKey, param->u.crypt.key, 16);
|
||||
memcpy(pWapiSta->wapiUsk.micKey, param->u.crypt.key + 16, 16);
|
||||
pWapiSta->wapiUsk.keyId = param->u.crypt.idx ;
|
||||
pWapiSta->wapiUsk.bTxEnable = true;
|
||||
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNBEQueue, WapiAEPNInitialValueSrc, 16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNBKQueue, WapiAEPNInitialValueSrc, 16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNVIQueue, WapiAEPNInitialValueSrc, 16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPNVOQueue, WapiAEPNInitialValueSrc, 16);
|
||||
_rtw_memcpy(pWapiSta->lastRxUnicastPN, WapiAEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNBEQueue, WapiAEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNBKQueue, WapiAEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNVIQueue, WapiAEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxUnicastPNVOQueue, WapiAEPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxUnicastPN, WapiAEPNInitialValueSrc, 16);
|
||||
pWapiSta->wapiUskUpdate.bTxEnable = false;
|
||||
pWapiSta->wapiUskUpdate.bSet = false;
|
||||
|
||||
|
@ -1053,15 +1053,15 @@ static int wpa_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
list_for_each_entry(pWapiSta, &pWapiInfo->wapiSTAUsedList, list) {
|
||||
if (!memcmp(pWapiSta->PeerMacAddr, get_bssid(pmlmepriv), 6)) {
|
||||
pWapiSta->wapiMsk.bSet = true;
|
||||
_rtw_memcpy(pWapiSta->wapiMsk.dataKey, param->u.crypt.key, 16);
|
||||
_rtw_memcpy(pWapiSta->wapiMsk.micKey, param->u.crypt.key + 16, 16);
|
||||
memcpy(pWapiSta->wapiMsk.dataKey, param->u.crypt.key, 16);
|
||||
memcpy(pWapiSta->wapiMsk.micKey, param->u.crypt.key + 16, 16);
|
||||
pWapiSta->wapiMsk.keyId = param->u.crypt.idx ;
|
||||
pWapiSta->wapiMsk.bTxEnable = false;
|
||||
if (!pWapiSta->bSetkeyOk)
|
||||
pWapiSta->bSetkeyOk = true;
|
||||
pWapiSta->bAuthenticateInProgress = false;
|
||||
|
||||
_rtw_memcpy(pWapiSta->lastRxMulticastPN, WapiAEMultiCastPNInitialValueSrc, 16);
|
||||
memcpy(pWapiSta->lastRxMulticastPN, WapiAEMultiCastPNInitialValueSrc, 16);
|
||||
|
||||
if (psecuritypriv->sw_decrypt == false) {
|
||||
/* set rx broadcast key for ASUE */
|
||||
|
@ -1106,7 +1106,7 @@ static int rtw_set_wpa_ie(_adapter *padapter, char *pie, unsigned short ielen)
|
|||
goto exit;
|
||||
}
|
||||
|
||||
_rtw_memcpy(buf, pie , ielen);
|
||||
memcpy(buf, pie , ielen);
|
||||
|
||||
/* dump */
|
||||
{
|
||||
|
@ -1128,13 +1128,13 @@ static int rtw_set_wpa_ie(_adapter *padapter, char *pie, unsigned short ielen)
|
|||
if (rtw_parse_wpa_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
|
||||
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
|
||||
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK;
|
||||
_rtw_memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
|
||||
memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
|
||||
}
|
||||
|
||||
if (rtw_parse_wpa2_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
|
||||
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
|
||||
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK;
|
||||
_rtw_memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
|
||||
memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
|
||||
}
|
||||
|
||||
if (group_cipher == 0)
|
||||
|
@ -1201,7 +1201,7 @@ static int rtw_set_wpa_ie(_adapter *padapter, char *pie, unsigned short ielen)
|
|||
|
||||
padapter->securitypriv.wps_ie_len = ((buf[cnt + 1] + 2) < MAX_WPS_IE_LEN) ? (buf[cnt + 1] + 2) : MAX_WPS_IE_LEN;
|
||||
|
||||
_rtw_memcpy(padapter->securitypriv.wps_ie, &buf[cnt], padapter->securitypriv.wps_ie_len);
|
||||
memcpy(padapter->securitypriv.wps_ie, &buf[cnt], padapter->securitypriv.wps_ie_len);
|
||||
|
||||
set_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS);
|
||||
|
||||
|
@ -1508,7 +1508,7 @@ static int rtw_wx_set_pmkid(struct net_device *dev,
|
|||
u8 strZeroMacAddress[ETH_ALEN] = { 0x00 };
|
||||
u8 strIssueBssid[ETH_ALEN] = { 0x00 };
|
||||
|
||||
_rtw_memcpy(strIssueBssid, pPMK->bssid.sa_data, ETH_ALEN);
|
||||
memcpy(strIssueBssid, pPMK->bssid.sa_data, ETH_ALEN);
|
||||
if (pPMK->cmd == IW_PMKSA_ADD) {
|
||||
RTW_INFO("[rtw_wx_set_pmkid] IW_PMKSA_ADD!\n");
|
||||
if (!memcmp(strIssueBssid, strZeroMacAddress, ETH_ALEN) )
|
||||
|
@ -1524,7 +1524,7 @@ static int rtw_wx_set_pmkid(struct net_device *dev,
|
|||
|
||||
RTW_INFO("[rtw_wx_set_pmkid] BSSID exists in the PMKList.\n");
|
||||
|
||||
_rtw_memcpy(psecuritypriv->PMKIDList[j].PMKID, pPMK->pmkid, IW_PMKID_LEN);
|
||||
memcpy(psecuritypriv->PMKIDList[j].PMKID, pPMK->pmkid, IW_PMKID_LEN);
|
||||
psecuritypriv->PMKIDList[j].bUsed = true;
|
||||
psecuritypriv->PMKIDIndex = j + 1;
|
||||
blInserted = true;
|
||||
|
@ -1537,8 +1537,8 @@ static int rtw_wx_set_pmkid(struct net_device *dev,
|
|||
RTW_INFO("[rtw_wx_set_pmkid] Use the new entry index = %d for this PMKID.\n",
|
||||
psecuritypriv->PMKIDIndex);
|
||||
|
||||
_rtw_memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, strIssueBssid, ETH_ALEN);
|
||||
_rtw_memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, pPMK->pmkid, IW_PMKID_LEN);
|
||||
memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, strIssueBssid, ETH_ALEN);
|
||||
memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, pPMK->pmkid, IW_PMKID_LEN);
|
||||
|
||||
psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].bUsed = true;
|
||||
psecuritypriv->PMKIDIndex++ ;
|
||||
|
@ -1871,7 +1871,7 @@ static int rtw_wx_get_wap(struct net_device *dev,
|
|||
((check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE)) ) ||
|
||||
((check_fwstate(pmlmepriv, WIFI_AP_STATE)) ))
|
||||
|
||||
_rtw_memcpy(wrqu->ap_addr.sa_data, pcur_bss->MacAddress, ETH_ALEN);
|
||||
memcpy(wrqu->ap_addr.sa_data, pcur_bss->MacAddress, ETH_ALEN);
|
||||
else
|
||||
memset(wrqu->ap_addr.sa_data, 0, ETH_ALEN);
|
||||
|
||||
|
@ -2009,7 +2009,7 @@ static int rtw_wx_set_scan(struct net_device *dev, struct iw_request_info *a,
|
|||
if (wrqu->data.flags & IW_SCAN_THIS_ESSID) {
|
||||
int len = min((int)req->essid_len, IW_ESSID_MAX_SIZE);
|
||||
|
||||
_rtw_memcpy(ssid[0].Ssid, req->essid, len);
|
||||
memcpy(ssid[0].Ssid, req->essid, len);
|
||||
ssid[0].SsidLength = len;
|
||||
|
||||
RTW_INFO("IW_SCAN_THIS_ESSID, ssid=%s, len=%d\n", req->essid, req->essid_len);
|
||||
|
@ -2050,7 +2050,7 @@ static int rtw_wx_set_scan(struct net_device *dev, struct iw_request_info *a,
|
|||
|
||||
if (sec_len > 0 && sec_len <= len) {
|
||||
ssid[ssid_index].SsidLength = sec_len;
|
||||
_rtw_memcpy(ssid[ssid_index].Ssid, pos, ssid[ssid_index].SsidLength);
|
||||
memcpy(ssid[ssid_index].Ssid, pos, ssid[ssid_index].SsidLength);
|
||||
/* RTW_INFO("%s COMBO_SCAN with specific ssid:%s, %d\n", __func__ */
|
||||
/* , ssid[ssid_index].Ssid, ssid[ssid_index].SsidLength); */
|
||||
ssid_index++;
|
||||
|
@ -2296,7 +2296,7 @@ static int rtw_wx_set_essid(struct net_device *dev,
|
|||
|
||||
memset(&ndis_ssid, 0, sizeof(NDIS_802_11_SSID));
|
||||
ndis_ssid.SsidLength = len;
|
||||
_rtw_memcpy(ndis_ssid.Ssid, extra, len);
|
||||
memcpy(ndis_ssid.Ssid, extra, len);
|
||||
src_ssid = ndis_ssid.Ssid;
|
||||
|
||||
_enter_critical_bh(&queue->lock, &irqL);
|
||||
|
@ -2372,7 +2372,7 @@ static int rtw_wx_get_essid(struct net_device *dev,
|
|||
|
||||
wrqu->essid.length = len;
|
||||
|
||||
_rtw_memcpy(extra, pcur_bss->Ssid.Ssid, len);
|
||||
memcpy(extra, pcur_bss->Ssid.Ssid, len);
|
||||
|
||||
wrqu->essid.flags = 1;
|
||||
} else {
|
||||
|
@ -2698,7 +2698,7 @@ static int rtw_wx_set_enc(struct net_device *dev,
|
|||
|
||||
wep.KeyIndex |= 0x80000000;
|
||||
|
||||
_rtw_memcpy(wep.KeyMaterial, keybuf, wep.KeyLength);
|
||||
memcpy(wep.KeyMaterial, keybuf, wep.KeyLength);
|
||||
|
||||
if (rtw_set_802_11_add_wep(padapter, &wep) == false) {
|
||||
if (rf_on == pwrpriv->rf_pwrstate)
|
||||
|
@ -2762,7 +2762,7 @@ static int rtw_wx_get_enc(struct net_device *dev,
|
|||
erq->length = padapter->securitypriv.dot11DefKeylen[key];
|
||||
|
||||
if (erq->length) {
|
||||
_rtw_memcpy(keybuf, padapter->securitypriv.dot11DefKey[key].skey, padapter->securitypriv.dot11DefKeylen[key]);
|
||||
memcpy(keybuf, padapter->securitypriv.dot11DefKey[key].skey, padapter->securitypriv.dot11DefKeylen[key]);
|
||||
|
||||
erq->flags |= IW_ENCODE_ENABLED;
|
||||
|
||||
|
@ -3017,7 +3017,7 @@ static int rtw_wx_set_enc_ext(struct net_device *dev,
|
|||
#ifndef CONFIG_IOCTL_CFG80211
|
||||
case IW_ENCODE_ALG_SM4:
|
||||
alg_name = "SMS4";
|
||||
_rtw_memcpy(param->sta_addr, pext->addr.sa_data, ETH_ALEN);
|
||||
memcpy(param->sta_addr, pext->addr.sa_data, ETH_ALEN);
|
||||
RTW_INFO("rtw_wx_set_enc_ext: SMS4 case\n");
|
||||
break;
|
||||
#endif
|
||||
|
@ -3049,17 +3049,17 @@ static int rtw_wx_set_enc_ext(struct net_device *dev,
|
|||
#ifdef CONFIG_WAPI_SUPPORT
|
||||
#ifndef CONFIG_IOCTL_CFG80211
|
||||
if (pext->alg == IW_ENCODE_ALG_SM4)
|
||||
_rtw_memcpy(param->u.crypt.seq, pext->rx_seq, 16);
|
||||
memcpy(param->u.crypt.seq, pext->rx_seq, 16);
|
||||
else
|
||||
#endif /* CONFIG_IOCTL_CFG80211 */
|
||||
#endif /* CONFIG_WAPI_SUPPORT */
|
||||
_rtw_memcpy(param->u.crypt.seq, pext->rx_seq, 8);
|
||||
memcpy(param->u.crypt.seq, pext->rx_seq, 8);
|
||||
}
|
||||
|
||||
if (pext->key_len) {
|
||||
param->u.crypt.key_len = pext->key_len;
|
||||
/* _rtw_memcpy(param + 1, pext + 1, pext->key_len); */
|
||||
_rtw_memcpy(param->u.crypt.key, pext + 1, pext->key_len);
|
||||
/* memcpy(param + 1, pext + 1, pext->key_len); */
|
||||
memcpy(param->u.crypt.key, pext + 1, pext->key_len);
|
||||
}
|
||||
|
||||
if (pencoding->flags & IW_ENCODE_DISABLED) {
|
||||
|
@ -3088,7 +3088,7 @@ static int rtw_wx_get_nick(struct net_device *dev,
|
|||
if (extra) {
|
||||
wrqu->data.length = 14;
|
||||
wrqu->data.flags = 1;
|
||||
_rtw_memcpy(extra, "<WIFI@REALTEK>", 14);
|
||||
memcpy(extra, "<WIFI@REALTEK>", 14);
|
||||
}
|
||||
|
||||
/* rtw_signal_process(pid, SIGUSR1); */ /* for test */
|
||||
|
@ -3383,7 +3383,7 @@ static int rtw_drvext_hdl(struct net_device *dev, struct iw_request_info *info,
|
|||
ret = 0;
|
||||
|
||||
if (bset == 0x00) {/* query info */
|
||||
/* _rtw_memcpy(p->pointer, pparmbuf, len); */
|
||||
/* memcpy(p->pointer, pparmbuf, len); */
|
||||
if (copy_to_user(p->pointer, pparmbuf, len))
|
||||
ret = -EFAULT;
|
||||
}
|
||||
|
@ -3856,7 +3856,7 @@ static int rtw_p2p_set_go_nego_ssid(struct net_device *dev,
|
|||
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
||||
|
||||
RTW_INFO("[%s] ssid = %s, len = %zu\n", __func__, extra, strlen(extra));
|
||||
_rtw_memcpy(pwdinfo->nego_ssid, extra, strlen(extra));
|
||||
memcpy(pwdinfo->nego_ssid, extra, strlen(extra));
|
||||
pwdinfo->nego_ssidlen = strlen(extra);
|
||||
|
||||
return ret;
|
||||
|
@ -3980,7 +3980,7 @@ static int rtw_p2p_profilefound(struct net_device *dev,
|
|||
pwdinfo->profileinfo[pwdinfo->profileindex].peermac[jj] = key_2char2num(extra[kk], extra[kk + 1]);
|
||||
|
||||
/* pwdinfo->profileinfo[pwdinfo->profileindex].ssidlen = ( extra[18] - '0' ) * 10 + ( extra[19] - '0' ); */
|
||||
/* _rtw_memcpy( pwdinfo->profileinfo[pwdinfo->profileindex].ssid, &extra[20], pwdinfo->profileinfo[pwdinfo->profileindex].ssidlen ); */
|
||||
/* memcpy( pwdinfo->profileinfo[pwdinfo->profileindex].ssid, &extra[20], pwdinfo->profileinfo[pwdinfo->profileindex].ssidlen ); */
|
||||
pwdinfo->profileindex++;
|
||||
}
|
||||
}
|
||||
|
@ -4002,7 +4002,7 @@ static int rtw_p2p_setDN(struct net_device *dev,
|
|||
|
||||
RTW_INFO("[%s] %s %d\n", __func__, extra, wrqu->data.length - 1);
|
||||
memset(pwdinfo->device_name, 0x00, WPS_MAX_DEVICE_NAME_LEN);
|
||||
_rtw_memcpy(pwdinfo->device_name, extra, wrqu->data.length - 1);
|
||||
memcpy(pwdinfo->device_name, extra, wrqu->data.length - 1);
|
||||
pwdinfo->device_name_len = wrqu->data.length - 1;
|
||||
|
||||
return ret;
|
||||
|
@ -4256,7 +4256,7 @@ static int rtw_p2p_get_wps_configmethod(struct net_device *dev,
|
|||
sprintf(attr_content_str, "\n\nM=0000");
|
||||
|
||||
wrqu->data.length = strlen(attr_content_str);
|
||||
_rtw_memcpy(extra, attr_content_str, wrqu->data.length);
|
||||
memcpy(extra, attr_content_str, wrqu->data.length);
|
||||
|
||||
return ret;
|
||||
|
||||
|
@ -4402,7 +4402,7 @@ static int rtw_p2p_get_go_device_address(struct net_device *dev,
|
|||
}
|
||||
|
||||
wrqu->data.length = strlen(go_devadd_str);
|
||||
_rtw_memcpy(extra, go_devadd_str, wrqu->data.length);
|
||||
memcpy(extra, go_devadd_str, wrqu->data.length);
|
||||
|
||||
return ret;
|
||||
|
||||
|
@ -4458,7 +4458,7 @@ static int rtw_p2p_get_device_type(struct net_device *dev,
|
|||
u16 type;
|
||||
__be16 be_tmp;
|
||||
|
||||
_rtw_memcpy(&be_tmp, dev_type, 2);
|
||||
memcpy(&be_tmp, dev_type, 2);
|
||||
type = be16_to_cpu(be_tmp);
|
||||
sprintf(dev_type_str, "\n\nN=%.2d", type);
|
||||
blnMatch = 1;
|
||||
|
@ -4477,7 +4477,7 @@ static int rtw_p2p_get_device_type(struct net_device *dev,
|
|||
sprintf(dev_type_str, "\n\nN=00");
|
||||
|
||||
wrqu->data.length = strlen(dev_type_str);
|
||||
_rtw_memcpy(extra, dev_type_str, wrqu->data.length);
|
||||
memcpy(extra, dev_type_str, wrqu->data.length);
|
||||
|
||||
return ret;
|
||||
|
||||
|
@ -4547,7 +4547,7 @@ static int rtw_p2p_get_device_name(struct net_device *dev,
|
|||
sprintf(dev_name_str, "\n\nN=0000");
|
||||
|
||||
wrqu->data.length = strlen(dev_name_str);
|
||||
_rtw_memcpy(extra, dev_name_str, wrqu->data.length);
|
||||
memcpy(extra, dev_name_str, wrqu->data.length);
|
||||
|
||||
return ret;
|
||||
|
||||
|
@ -4628,7 +4628,7 @@ static int rtw_p2p_get_invitation_procedure(struct net_device *dev,
|
|||
}
|
||||
|
||||
wrqu->data.length = strlen(inv_proc_str);
|
||||
_rtw_memcpy(extra, inv_proc_str, wrqu->data.length);
|
||||
memcpy(extra, inv_proc_str, wrqu->data.length);
|
||||
|
||||
return ret;
|
||||
|
||||
|
@ -4718,7 +4718,7 @@ static int rtw_p2p_connect(struct net_device *dev,
|
|||
memset(&pwdinfo->groupid_info, 0x00, sizeof(struct group_id_info));
|
||||
|
||||
pwdinfo->nego_req_info.peer_channel_num[0] = uintPeerChannel;
|
||||
_rtw_memcpy(pwdinfo->nego_req_info.peerDevAddr, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
memcpy(pwdinfo->nego_req_info.peerDevAddr, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
pwdinfo->nego_req_info.benable = true;
|
||||
|
||||
_cancel_timer_ex(&pwdinfo->restore_p2p_state_timer);
|
||||
|
@ -4915,7 +4915,7 @@ static int rtw_p2p_invite_req(struct net_device *dev,
|
|||
|
||||
/* Store the GO's ssid */
|
||||
pinvite_req_info->ssidlen = wrqu->data.length - 36;
|
||||
_rtw_memcpy(pinvite_req_info->go_ssid, &extra[36], (u32) pinvite_req_info->ssidlen);
|
||||
memcpy(pinvite_req_info->go_ssid, &extra[36], (u32) pinvite_req_info->ssidlen);
|
||||
pinvite_req_info->benable = true;
|
||||
pinvite_req_info->peer_ch = uintPeerChannel;
|
||||
|
||||
|
@ -5470,17 +5470,17 @@ static int rtw_p2p_prov_disc(struct net_device *dev,
|
|||
if (rtw_mi_check_status(padapter, MI_LINKED))
|
||||
_cancel_timer_ex(&pwdinfo->ap_p2p_switch_timer);
|
||||
#endif /* CONFIG_CONCURRENT_MODE */
|
||||
_rtw_memcpy(pwdinfo->tx_prov_disc_info.peerIFAddr, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
_rtw_memcpy(pwdinfo->tx_prov_disc_info.peerDevAddr, peerMAC, ETH_ALEN);
|
||||
memcpy(pwdinfo->tx_prov_disc_info.peerIFAddr, pnetwork->network.MacAddress, ETH_ALEN);
|
||||
memcpy(pwdinfo->tx_prov_disc_info.peerDevAddr, peerMAC, ETH_ALEN);
|
||||
pwdinfo->tx_prov_disc_info.peer_channel_num[0] = (u16) uintPeerChannel;
|
||||
pwdinfo->tx_prov_disc_info.benable = true;
|
||||
rtw_p2p_set_pre_state(pwdinfo, rtw_p2p_state(pwdinfo));
|
||||
rtw_p2p_set_state(pwdinfo, P2P_STATE_TX_PROVISION_DIS_REQ);
|
||||
|
||||
if (rtw_p2p_chk_role(pwdinfo, P2P_ROLE_CLIENT))
|
||||
_rtw_memcpy(&pwdinfo->tx_prov_disc_info.ssid, &pnetwork->network.Ssid, sizeof(NDIS_802_11_SSID));
|
||||
memcpy(&pwdinfo->tx_prov_disc_info.ssid, &pnetwork->network.Ssid, sizeof(NDIS_802_11_SSID));
|
||||
else if (rtw_p2p_chk_role(pwdinfo, P2P_ROLE_DEVICE) || rtw_p2p_chk_role(pwdinfo, P2P_ROLE_GO)) {
|
||||
_rtw_memcpy(pwdinfo->tx_prov_disc_info.ssid.Ssid, pwdinfo->p2p_wildcard_ssid, P2P_WILDCARD_SSID_LEN);
|
||||
memcpy(pwdinfo->tx_prov_disc_info.ssid.Ssid, pwdinfo->p2p_wildcard_ssid, P2P_WILDCARD_SSID_LEN);
|
||||
pwdinfo->tx_prov_disc_info.ssid.SsidLength = P2P_WILDCARD_SSID_LEN;
|
||||
}
|
||||
|
||||
|
@ -6883,7 +6883,7 @@ static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
|
||||
pwep->KeyIndex = wep_key_idx;
|
||||
|
||||
_rtw_memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength);
|
||||
memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength);
|
||||
|
||||
if (param->u.crypt.set_tx) {
|
||||
RTW_INFO("wep, set_tx=1\n");
|
||||
|
@ -6901,7 +6901,7 @@ static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
|
||||
psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx;
|
||||
|
||||
_rtw_memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
|
||||
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
|
||||
|
||||
psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
|
||||
|
||||
|
@ -6912,7 +6912,7 @@ static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
/* don't update "psecuritypriv->dot11PrivacyAlgrthm" and */
|
||||
/* "psecuritypriv->dot11PrivacyKeyIndex=keyid", but can rtw_set_key to cam */
|
||||
|
||||
_rtw_memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
|
||||
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
|
||||
|
||||
psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
|
||||
|
||||
|
@ -6929,7 +6929,7 @@ static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
if (strcmp(param->u.crypt.alg, "WEP") == 0) {
|
||||
RTW_INFO("%s, set group_key, WEP\n", __func__);
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
|
||||
if (param->u.crypt.key_len == 13)
|
||||
|
@ -6940,12 +6940,12 @@ static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
/* DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len); */
|
||||
/* set mic key */
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
psecuritypriv->busetkipkey = true;
|
||||
|
||||
|
@ -6954,7 +6954,7 @@ static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _AES_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
}
|
||||
#ifdef CONFIG_IEEE80211W
|
||||
else if (strcmp(param->u.crypt.alg, "BIP") == 0) {
|
||||
|
@ -6962,7 +6962,7 @@ static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
|
||||
RTW_INFO("BIP key_len=%d , index=%d\n", param->u.crypt.key_len, param->u.crypt.idx);
|
||||
/* save the IGTK key, length 16 bytes */
|
||||
_rtw_memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
/* RTW_INFO("IGTK key below:\n");
|
||||
for(no=0;no<16;no++)
|
||||
printk(" %02x ", padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey[no]);
|
||||
|
@ -7002,7 +7002,7 @@ static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
if (psecuritypriv->dot11AuthAlgrthm == dot11AuthAlgrthm_8021X && psta) { /* psk/802_1x */
|
||||
if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) {
|
||||
if (param->u.crypt.set_tx == 1) {
|
||||
_rtw_memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
if (strcmp(param->u.crypt.alg, "WEP") == 0) {
|
||||
RTW_INFO("%s, set pairwise key, WEP\n", __func__);
|
||||
|
@ -7017,8 +7017,8 @@ static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
|
||||
/* DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len); */
|
||||
/* set mic key */
|
||||
_rtw_memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
psecuritypriv->busetkipkey = true;
|
||||
|
||||
|
@ -7041,7 +7041,7 @@ static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
|
||||
} else { /* group key??? */
|
||||
if (strcmp(param->u.crypt.alg, "WEP") == 0) {
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
|
||||
if (param->u.crypt.key_len == 13)
|
||||
|
@ -7049,19 +7049,19 @@ static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param,
|
|||
} else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
|
||||
psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
|
||||
/* DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len); */
|
||||
/* set mic key */
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
||||
memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
||||
|
||||
psecuritypriv->busetkipkey = true;
|
||||
|
||||
} else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
|
||||
psecuritypriv->dot118021XGrpPrivacy = _AES_;
|
||||
|
||||
_rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
||||
} else
|
||||
psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
|
||||
|
||||
|
@ -7108,7 +7108,7 @@ static int rtw_set_beacon(struct net_device *dev, struct ieee_param *param, int
|
|||
if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
|
||||
return -EINVAL;
|
||||
|
||||
_rtw_memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2);
|
||||
memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2);
|
||||
|
||||
if ((pstapriv->max_num_sta > NUM_STA) || (pstapriv->max_num_sta <= 0))
|
||||
pstapriv->max_num_sta = NUM_STA;
|
||||
|
@ -7170,7 +7170,7 @@ static int rtw_add_sta(struct net_device *dev, struct ieee_param *param)
|
|||
|
||||
psta->aid = param->u.add_sta.aid;/* aid=1~2007 */
|
||||
|
||||
_rtw_memcpy(psta->bssrateset, param->u.add_sta.tx_supp_rates, 16);
|
||||
memcpy(psta->bssrateset, param->u.add_sta.tx_supp_rates, 16);
|
||||
|
||||
|
||||
/* check wmm cap. */
|
||||
|
@ -7186,7 +7186,7 @@ static int rtw_add_sta(struct net_device *dev, struct ieee_param *param)
|
|||
if (WLAN_STA_HT & flags) {
|
||||
psta->htpriv.ht_option = true;
|
||||
psta->qos_option = 1;
|
||||
_rtw_memcpy((void *)&psta->htpriv.ht_cap, (void *)¶m->u.add_sta.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
|
||||
memcpy((void *)&psta->htpriv.ht_cap, (void *)¶m->u.add_sta.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
|
||||
} else
|
||||
psta->htpriv.ht_option = false;
|
||||
|
||||
|
@ -7295,8 +7295,8 @@ static int rtw_ioctl_get_sta_data(struct net_device *dev, struct ieee_param *par
|
|||
(psta->ht_20mhz_set << 5));
|
||||
|
||||
psta_data->tx_supp_rates_len = psta->bssratelen;
|
||||
_rtw_memcpy(psta_data->tx_supp_rates, psta->bssrateset, psta->bssratelen);
|
||||
_rtw_memcpy(&psta_data->ht_cap, &psta->htpriv.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
|
||||
memcpy(psta_data->tx_supp_rates, psta->bssrateset, psta->bssratelen);
|
||||
memcpy(&psta_data->ht_cap, &psta->htpriv.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
|
||||
psta_data->rx_pkts = psta->sta_stats.rx_data_pkts;
|
||||
psta_data->rx_bytes = psta->sta_stats.rx_bytes;
|
||||
psta_data->rx_drops = psta->sta_stats.rx_drops;
|
||||
|
@ -7341,7 +7341,7 @@ static int rtw_get_sta_wpaie(struct net_device *dev, struct ieee_param *param)
|
|||
|
||||
param->u.wpa_ie.len = copy_len;
|
||||
|
||||
_rtw_memcpy(param->u.wpa_ie.reserved, psta->wpa_ie, copy_len);
|
||||
memcpy(param->u.wpa_ie.reserved, psta->wpa_ie, copy_len);
|
||||
} else {
|
||||
/* ret = -1; */
|
||||
RTW_INFO("sta's wpa_ie is NONE\n");
|
||||
|
@ -7384,7 +7384,7 @@ static int rtw_set_wps_beacon(struct net_device *dev, struct ieee_param *param,
|
|||
return -EINVAL;
|
||||
}
|
||||
|
||||
_rtw_memcpy(pmlmepriv->wps_beacon_ie, param->u.bcn_ie.buf, ie_len);
|
||||
memcpy(pmlmepriv->wps_beacon_ie, param->u.bcn_ie.buf, ie_len);
|
||||
|
||||
update_beacon(padapter, _VENDOR_SPECIFIC_IE_, wps_oui, true);
|
||||
|
||||
|
@ -7424,7 +7424,7 @@ static int rtw_set_wps_probe_resp(struct net_device *dev, struct ieee_param *par
|
|||
RTW_INFO("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
|
||||
return -EINVAL;
|
||||
}
|
||||
_rtw_memcpy(pmlmepriv->wps_probe_resp_ie, param->u.bcn_ie.buf, ie_len);
|
||||
memcpy(pmlmepriv->wps_probe_resp_ie, param->u.bcn_ie.buf, ie_len);
|
||||
}
|
||||
|
||||
|
||||
|
@ -7460,7 +7460,7 @@ static int rtw_set_wps_assoc_resp(struct net_device *dev, struct ieee_param *par
|
|||
return -EINVAL;
|
||||
}
|
||||
|
||||
_rtw_memcpy(pmlmepriv->wps_assoc_resp_ie, param->u.bcn_ie.buf, ie_len);
|
||||
memcpy(pmlmepriv->wps_assoc_resp_ie, param->u.bcn_ie.buf, ie_len);
|
||||
}
|
||||
|
||||
|
||||
|
@ -7496,7 +7496,7 @@ static int rtw_set_hidden_ssid(struct net_device *dev, struct ieee_param *param,
|
|||
WLAN_BSSID_EX *pbss_network = &mlmepriv->cur_network.network;
|
||||
WLAN_BSSID_EX *pbss_network_ext = &mlmeinfo->network;
|
||||
|
||||
_rtw_memcpy(ssid, ssid_ie + 2, ssid_len);
|
||||
memcpy(ssid, ssid_ie + 2, ssid_len);
|
||||
ssid[ssid_len] = 0x0;
|
||||
|
||||
if (0)
|
||||
|
@ -7505,9 +7505,9 @@ static int rtw_set_hidden_ssid(struct net_device *dev, struct ieee_param *param,
|
|||
pbss_network->Ssid.Ssid, pbss_network->Ssid.SsidLength,
|
||||
pbss_network_ext->Ssid.Ssid, pbss_network_ext->Ssid.SsidLength);
|
||||
|
||||
_rtw_memcpy(pbss_network->Ssid.Ssid, (void *)ssid, ssid_len);
|
||||
memcpy(pbss_network->Ssid.Ssid, (void *)ssid, ssid_len);
|
||||
pbss_network->Ssid.SsidLength = ssid_len;
|
||||
_rtw_memcpy(pbss_network_ext->Ssid.Ssid, (void *)ssid, ssid_len);
|
||||
memcpy(pbss_network_ext->Ssid.Ssid, (void *)ssid, ssid_len);
|
||||
pbss_network_ext->Ssid.SsidLength = ssid_len;
|
||||
|
||||
if (0)
|
||||
|
@ -7756,7 +7756,7 @@ static int rtw_wx_set_priv(struct net_device *dev,
|
|||
return -ENOMEM;
|
||||
}
|
||||
|
||||
_rtw_memcpy(ext_dbg, ext, len);
|
||||
memcpy(ext_dbg, ext, len);
|
||||
#endif
|
||||
|
||||
/* added for wps2.0 @20110524 */
|
||||
|
@ -7786,7 +7786,7 @@ static int rtw_wx_set_priv(struct net_device *dev,
|
|||
|
||||
}
|
||||
|
||||
_rtw_memcpy(pmlmepriv->wps_probe_req_ie, probereq_wpsie, cp_sz);
|
||||
memcpy(pmlmepriv->wps_probe_req_ie, probereq_wpsie, cp_sz);
|
||||
pmlmepriv->wps_probe_req_ie_len = cp_sz;
|
||||
|
||||
}
|
||||
|
@ -8819,7 +8819,7 @@ static int rtw_mp_efuse_get(struct net_device *dev,
|
|||
rtw_efuse_mask_array(padapter, mask_buf);
|
||||
|
||||
if (padapter->registrypriv.bFileMaskEfuse )
|
||||
_rtw_memcpy(mask_buf, maskfileBuffer, mask_len);
|
||||
memcpy(mask_buf, maskfileBuffer, mask_len);
|
||||
|
||||
sprintf(extra, "\n");
|
||||
for (i = 0; i < mask_len; i++)
|
||||
|
@ -9303,7 +9303,7 @@ static int rtw_mp_efuse_set(struct net_device *dev,
|
|||
rtw_read8(padapter, EFUSE_CTRL);
|
||||
BTEfuse_PowerSwitch(padapter, 1, false);
|
||||
#endif /* RTW_HALMAC */
|
||||
_rtw_memcpy(pEfuseHal->BTEfuseModifiedMap, pEfuseHal->fakeBTEfuseModifiedMap, EFUSE_BT_MAX_MAP_LEN);
|
||||
memcpy(pEfuseHal->BTEfuseModifiedMap, pEfuseHal->fakeBTEfuseModifiedMap, EFUSE_BT_MAX_MAP_LEN);
|
||||
|
||||
if (rtw_BT_efuse_map_write(padapter, 0x00, EFUSE_BT_MAX_MAP_LEN, pEfuseHal->fakeBTEfuseModifiedMap) == _FAIL) {
|
||||
RTW_INFO("%s: rtw_BT_efuse_map_write error!\n", __func__);
|
||||
|
@ -9460,7 +9460,7 @@ static int rtw_mp_efuse_set(struct net_device *dev,
|
|||
rtw_hal_read_chip_info(padapter);
|
||||
/* set mac addr*/
|
||||
rtw_macaddr_cfg(adapter_mac_addr(padapter), get_hal_mac_addr(padapter));
|
||||
_rtw_memcpy(padapter->pnetdev->dev_addr, get_hal_mac_addr(padapter), ETH_ALEN); /* set mac addr to net_device */
|
||||
memcpy(padapter->pnetdev->dev_addr, get_hal_mac_addr(padapter), ETH_ALEN); /* set mac addr to net_device */
|
||||
|
||||
#ifdef CONFIG_P2P
|
||||
rtw_init_wifidirect_addrs(padapter, adapter_mac_addr(padapter), adapter_mac_addr(padapter));
|
||||
|
@ -10142,7 +10142,7 @@ static int rtw_tdls_enable(struct net_device *dev,
|
|||
plist = get_next(plist);
|
||||
|
||||
if (psta->tdls_sta_state != TDLS_STATE_NONE)
|
||||
_rtw_memcpy(tdls_sta[index], psta->hwaddr, ETH_ALEN);
|
||||
memcpy(tdls_sta[index], psta->hwaddr, ETH_ALEN);
|
||||
}
|
||||
}
|
||||
_exit_critical_bh(&pstapriv->sta_hash_lock, &irqL);
|
||||
|
@ -10151,7 +10151,7 @@ static int rtw_tdls_enable(struct net_device *dev,
|
|||
if (memcmp(tdls_sta[index], empty_hwaddr, ETH_ALEN)) {
|
||||
RTW_INFO("issue tear down to "MAC_FMT"\n", MAC_ARG(tdls_sta[index]));
|
||||
txmgmt.status_code = _RSON_TDLS_TEAR_UN_RSN_;
|
||||
_rtw_memcpy(txmgmt.peer, tdls_sta[index], ETH_ALEN);
|
||||
memcpy(txmgmt.peer, tdls_sta[index], ETH_ALEN);
|
||||
issue_tdls_teardown(padapter, &txmgmt, true);
|
||||
}
|
||||
}
|
||||
|
@ -10966,7 +10966,7 @@ static int rtw_widi_set_probe_request(struct net_device *dev,
|
|||
if (pbuf) {
|
||||
if (copy_from_user(pbuf, wrqu->data.pointer, wrqu->data.length))
|
||||
ret = -EFAULT;
|
||||
/* _rtw_memcpy(pbuf, wrqu->data.pointer, wrqu->data.length); */
|
||||
/* memcpy(pbuf, wrqu->data.pointer, wrqu->data.length); */
|
||||
|
||||
if (wrqu->data.flags == 0)
|
||||
intel_widi_wk_cmd(padapter, INTEL_WIDI_ISSUE_PROB_WK, pbuf, sizeof(l2_msg_t));
|
||||
|
@ -11055,11 +11055,11 @@ static s32 createpseudoadhoc(PADAPTER padapter)
|
|||
passoc_ssid = &pmlmepriv->assoc_ssid;
|
||||
memset(passoc_ssid, 0, sizeof(NDIS_802_11_SSID));
|
||||
passoc_ssid->SsidLength = sizeof(ssid) - 1;
|
||||
_rtw_memcpy(passoc_ssid->Ssid, ssid, passoc_ssid->SsidLength);
|
||||
memcpy(passoc_ssid->Ssid, ssid, passoc_ssid->SsidLength);
|
||||
|
||||
pdev_network = &padapter->registrypriv.dev_network;
|
||||
pibss = padapter->registrypriv.dev_network.MacAddress;
|
||||
_rtw_memcpy(&pdev_network->Ssid, passoc_ssid, sizeof(NDIS_802_11_SSID));
|
||||
memcpy(&pdev_network->Ssid, passoc_ssid, sizeof(NDIS_802_11_SSID));
|
||||
|
||||
rtw_update_registrypriv_dev_network(padapter);
|
||||
rtw_generate_random_ibss(pibss);
|
||||
|
@ -11088,7 +11088,7 @@ static s32 createpseudoadhoc(PADAPTER padapter)
|
|||
/* 3 join psudo AdHoc */
|
||||
pcur_network->join_res = 1;
|
||||
pcur_network->aid = psta->aid = 1;
|
||||
_rtw_memcpy(&pcur_network->network, pdev_network, get_WLAN_BSSID_EX_sz(pdev_network));
|
||||
memcpy(&pcur_network->network, pdev_network, get_WLAN_BSSID_EX_sz(pdev_network));
|
||||
|
||||
/* set msr to WIFI_FW_ADHOC_STATE */
|
||||
padapter->hw_port = HW_PORT0;
|
||||
|
@ -11144,10 +11144,10 @@ static struct xmit_frame *createloopbackpkt(PADAPTER padapter, u32 size)
|
|||
memset(pattrib, 0, sizeof(struct pkt_attrib));
|
||||
|
||||
pattrib->ether_type = 0x8723;
|
||||
_rtw_memcpy(pattrib->src, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
_rtw_memcpy(pattrib->ta, pattrib->src, ETH_ALEN);
|
||||
memcpy(pattrib->src, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
memcpy(pattrib->ta, pattrib->src, ETH_ALEN);
|
||||
memset(pattrib->dst, 0xFF, ETH_ALEN);
|
||||
_rtw_memcpy(pattrib->ra, pattrib->dst, ETH_ALEN);
|
||||
memcpy(pattrib->ra, pattrib->dst, ETH_ALEN);
|
||||
|
||||
/* pattrib->dhcp_pkt = 0;
|
||||
* pattrib->pktlen = 0; */
|
||||
|
@ -11205,9 +11205,9 @@ static struct xmit_frame *createloopbackpkt(PADAPTER padapter, u32 size)
|
|||
/* 3 5.1. make wlan header, make_wlanhdr() */
|
||||
hdr = (struct rtw_ieee80211_hdr *)pkt_start;
|
||||
set_frame_sub_type(&hdr->frame_ctl, pattrib->subtype);
|
||||
_rtw_memcpy(hdr->addr1, pattrib->dst, ETH_ALEN); /* DA */
|
||||
_rtw_memcpy(hdr->addr2, pattrib->src, ETH_ALEN); /* SA */
|
||||
_rtw_memcpy(hdr->addr3, get_bssid(&padapter->mlmepriv), ETH_ALEN); /* RA, BSSID */
|
||||
memcpy(hdr->addr1, pattrib->dst, ETH_ALEN); /* DA */
|
||||
memcpy(hdr->addr2, pattrib->src, ETH_ALEN); /* SA */
|
||||
memcpy(hdr->addr3, get_bssid(&padapter->mlmepriv), ETH_ALEN); /* RA, BSSID */
|
||||
|
||||
/* 3 5.2. make payload */
|
||||
ptr = pkt_start + pattrib->hdrlen;
|
||||
|
@ -11254,7 +11254,7 @@ static void printdata(u8 *pbuf, u32 len)
|
|||
u8 n;
|
||||
val = 0;
|
||||
n = len - i;
|
||||
_rtw_memcpy(&val, pbuf + i, n);
|
||||
memcpy(&val, pbuf + i, n);
|
||||
sprintf(str, "%08X", val);
|
||||
n = (4 - n) * 2;
|
||||
printk("%8s", str + n);
|
||||
|
@ -11366,7 +11366,7 @@ thread_return lbk_thread(thread_context context)
|
|||
}
|
||||
|
||||
ploopback->txsize = TXDESC_SIZE + pxmitframe->attrib.last_txcmdsz;
|
||||
_rtw_memcpy(ploopback->txbuf, pxmitframe->buf_addr, ploopback->txsize);
|
||||
memcpy(ploopback->txbuf, pxmitframe->buf_addr, ploopback->txsize);
|
||||
ff_hwaddr = rtw_get_ff_hwaddr(pxmitframe);
|
||||
cnt++;
|
||||
RTW_INFO("%s: wirte port cnt=%d size=%d\n", __func__, cnt, ploopback->txsize);
|
||||
|
@ -11432,7 +11432,7 @@ static void loopbackTest(PADAPTER padapter, u32 cnt, u32 size, u8 *pmsg)
|
|||
break;
|
||||
rtw_msleep_os(1);
|
||||
} while (1);
|
||||
_rtw_memcpy(pmsg, ploopback->msg, len + 1);
|
||||
memcpy(pmsg, ploopback->msg, len + 1);
|
||||
freeLoopback(padapter);
|
||||
|
||||
return;
|
||||
|
@ -12035,7 +12035,7 @@ static int _rtw_ioctl_wext_private(struct net_device *dev, union iwreq_data *wrq
|
|||
|
||||
union iwreq_data wdata;
|
||||
|
||||
_rtw_memcpy(&wdata, wrq_data, sizeof(wdata));
|
||||
memcpy(&wdata, wrq_data, sizeof(wdata));
|
||||
|
||||
input_len = wdata.data.length;
|
||||
if (!input_len)
|
||||
|
@ -12184,7 +12184,7 @@ static int _rtw_ioctl_wext_private(struct net_device *dev, union iwreq_data *wrq
|
|||
wdata.data.length = priv_args[k].set_args & IW_PRIV_SIZE_MASK;
|
||||
|
||||
/* Fetch string */
|
||||
_rtw_memcpy(buffer, ptr, wdata.data.length);
|
||||
memcpy(buffer, ptr, wdata.data.length);
|
||||
} else {
|
||||
wdata.data.length = 1;
|
||||
buffer[0] = '\0';
|
||||
|
@ -12216,7 +12216,7 @@ static int _rtw_ioctl_wext_private(struct net_device *dev, union iwreq_data *wrq
|
|||
/* First case : all SET args fit within wrq */
|
||||
if (offset)
|
||||
wdata.mode = subcmd;
|
||||
_rtw_memcpy(wdata.name + offset, buffer, IFNAMSIZ - offset);
|
||||
memcpy(wdata.name + offset, buffer, IFNAMSIZ - offset);
|
||||
} else {
|
||||
if ((priv_args[k].set_args == 0) &&
|
||||
(priv_args[k].get_args & IW_PRIV_SIZE_FIXED) &&
|
||||
|
@ -12297,7 +12297,7 @@ static int _rtw_ioctl_wext_private(struct net_device *dev, union iwreq_data *wrq
|
|||
err = -E2BIG;
|
||||
goto exit;
|
||||
}
|
||||
_rtw_memcpy(output + output_len, str, len);
|
||||
memcpy(output + output_len, str, len);
|
||||
}
|
||||
break;
|
||||
|
||||
|
@ -12311,13 +12311,13 @@ static int _rtw_ioctl_wext_private(struct net_device *dev, union iwreq_data *wrq
|
|||
err = -E2BIG;
|
||||
goto exit;
|
||||
}
|
||||
_rtw_memcpy(output + output_len, str, len);
|
||||
memcpy(output + output_len, str, len);
|
||||
}
|
||||
break;
|
||||
|
||||
case IW_PRIV_TYPE_CHAR:
|
||||
/* Display args */
|
||||
_rtw_memcpy(output, extra, n);
|
||||
memcpy(output, extra, n);
|
||||
break;
|
||||
|
||||
default:
|
||||
|
|
|
@ -67,7 +67,7 @@ int rtw_mp_write_reg(struct net_device *dev,
|
|||
*pnext = 0;
|
||||
/*addr = simple_strtoul(pch, &ptmp, 16);
|
||||
memset(buf, '\0', sizeof(buf));
|
||||
_rtw_memcpy(buf, pch, pnext-pch);
|
||||
memcpy(buf, pch, pnext-pch);
|
||||
ret = kstrtoul(buf, 16, &addr);*/
|
||||
ret = sscanf(pch, "%x", &addr);
|
||||
if (addr > 0x3FFF)
|
||||
|
|
|
@ -242,7 +242,7 @@ void rtw_reset_securitypriv(_adapter *adapter)
|
|||
|
||||
memset(&backupPMKIDList[0], 0x00, sizeof(RT_PMKID_LIST) * NUM_PMKID_CACHE);
|
||||
|
||||
_rtw_memcpy(&backupPMKIDList[0], &adapter->securitypriv.PMKIDList[0], sizeof(RT_PMKID_LIST) * NUM_PMKID_CACHE);
|
||||
memcpy(&backupPMKIDList[0], &adapter->securitypriv.PMKIDList[0], sizeof(RT_PMKID_LIST) * NUM_PMKID_CACHE);
|
||||
backupPMKIDIndex = adapter->securitypriv.PMKIDIndex;
|
||||
backupTKIPCountermeasure = adapter->securitypriv.btkip_countermeasure;
|
||||
backupTKIPcountermeasure_time = adapter->securitypriv.btkip_countermeasure_time;
|
||||
|
@ -255,7 +255,7 @@ void rtw_reset_securitypriv(_adapter *adapter)
|
|||
|
||||
/* Added by Albert 2009/02/18 */
|
||||
/* Restore the PMK information to securitypriv structure for the following connection. */
|
||||
_rtw_memcpy(&adapter->securitypriv.PMKIDList[0], &backupPMKIDList[0], sizeof(RT_PMKID_LIST) * NUM_PMKID_CACHE);
|
||||
memcpy(&adapter->securitypriv.PMKIDList[0], &backupPMKIDList[0], sizeof(RT_PMKID_LIST) * NUM_PMKID_CACHE);
|
||||
adapter->securitypriv.PMKIDIndex = backupPMKIDIndex;
|
||||
adapter->securitypriv.btkip_countermeasure = backupTKIPCountermeasure;
|
||||
adapter->securitypriv.btkip_countermeasure_time = backupTKIPcountermeasure_time;
|
||||
|
@ -550,7 +550,7 @@ void rtw_indicate_sta_assoc_event(_adapter *padapter, struct sta_info *psta)
|
|||
|
||||
wrqu.addr.sa_family = ARPHRD_ETHER;
|
||||
|
||||
_rtw_memcpy(wrqu.addr.sa_data, psta->hwaddr, ETH_ALEN);
|
||||
memcpy(wrqu.addr.sa_data, psta->hwaddr, ETH_ALEN);
|
||||
|
||||
RTW_INFO("+rtw_indicate_sta_assoc_event\n");
|
||||
|
||||
|
@ -577,7 +577,7 @@ void rtw_indicate_sta_disassoc_event(_adapter *padapter, struct sta_info *psta)
|
|||
|
||||
wrqu.addr.sa_family = ARPHRD_ETHER;
|
||||
|
||||
_rtw_memcpy(wrqu.addr.sa_data, psta->hwaddr, ETH_ALEN);
|
||||
memcpy(wrqu.addr.sa_data, psta->hwaddr, ETH_ALEN);
|
||||
|
||||
RTW_INFO("+rtw_indicate_sta_disassoc_event\n");
|
||||
|
||||
|
@ -710,7 +710,7 @@ int hostapd_mode_init(_adapter *padapter)
|
|||
mac[4] = 0x11;
|
||||
mac[5] = 0x12;
|
||||
|
||||
_rtw_memcpy(pnetdev->dev_addr, mac, ETH_ALEN);
|
||||
memcpy(pnetdev->dev_addr, mac, ETH_ALEN);
|
||||
|
||||
|
||||
netif_carrier_off(pnetdev);
|
||||
|
|
|
@ -672,7 +672,7 @@ uint loadparam(_adapter *padapter)
|
|||
/* registry_par->hci = (u8)hci; */
|
||||
registry_par->network_mode = (u8)rtw_network_mode;
|
||||
|
||||
_rtw_memcpy(registry_par->ssid.Ssid, "ANY", 3);
|
||||
memcpy(registry_par->ssid.Ssid, "ANY", 3);
|
||||
registry_par->ssid.SsidLength = 3;
|
||||
|
||||
registry_par->channel = (u8)rtw_channel;
|
||||
|
@ -757,7 +757,7 @@ uint loadparam(_adapter *padapter)
|
|||
RTW_ERR("%s discard rtw_country_code not in alpha2\n", __func__);
|
||||
memset(registry_par->alpha2, 0xFF, 2);
|
||||
} else
|
||||
_rtw_memcpy(registry_par->alpha2, rtw_country_code, 2);
|
||||
memcpy(registry_par->alpha2, rtw_country_code, 2);
|
||||
|
||||
registry_par->channel_plan = (u8)rtw_channel_plan;
|
||||
rtw_regsty_load_excl_chs(registry_par);
|
||||
|
@ -962,8 +962,8 @@ static int rtw_net_set_mac_address(struct net_device *pnetdev, void *addr)
|
|||
return ret;
|
||||
}
|
||||
|
||||
_rtw_memcpy(adapter_mac_addr(padapter), sa->sa_data, ETH_ALEN); /* set mac addr to adapter */
|
||||
_rtw_memcpy(pnetdev->dev_addr, sa->sa_data, ETH_ALEN); /* set mac addr to net_device */
|
||||
memcpy(adapter_mac_addr(padapter), sa->sa_data, ETH_ALEN); /* set mac addr to adapter */
|
||||
memcpy(pnetdev->dev_addr, sa->sa_data, ETH_ALEN); /* set mac addr to net_device */
|
||||
|
||||
rtw_ps_deny(padapter, PS_DENY_IOCTL);
|
||||
LeaveAllPowerSaveModeDirect(padapter); /* leave PS mode for guaranteeing to access hw register successfully */
|
||||
|
@ -1063,7 +1063,7 @@ u16 rtw_recv_select_queue(struct sk_buff *skb)
|
|||
u32 priority;
|
||||
u8 *pdata = skb->data;
|
||||
|
||||
_rtw_memcpy(ð_type, pdata + (ETH_ALEN << 1), 2);
|
||||
memcpy(ð_type, pdata + (ETH_ALEN << 1), 2);
|
||||
|
||||
switch (eth_type) {
|
||||
case htons(ETH_P_IP):
|
||||
|
@ -1344,7 +1344,7 @@ static int rtw_os_ndev_register(_adapter *adapter, const char *name)
|
|||
/* alloc netdev name */
|
||||
rtw_init_netdev_name(ndev, name);
|
||||
|
||||
_rtw_memcpy(ndev->dev_addr, adapter_mac_addr(adapter), ETH_ALEN);
|
||||
memcpy(ndev->dev_addr, adapter_mac_addr(adapter), ETH_ALEN);
|
||||
|
||||
/* Tell the network stack we exist */
|
||||
|
||||
|
@ -2212,7 +2212,7 @@ int _netdev_vir_if_open(struct net_device *pnetdev)
|
|||
if (primary_padapter->bup == false)
|
||||
rtw_macaddr_cfg(adapter_mac_addr(primary_padapter), get_hal_mac_addr(primary_padapter));
|
||||
|
||||
_rtw_memcpy(mac, adapter_mac_addr(primary_padapter), ETH_ALEN);
|
||||
memcpy(mac, adapter_mac_addr(primary_padapter), ETH_ALEN);
|
||||
|
||||
/*
|
||||
* If the BIT1 is 0, the address is universally administered.
|
||||
|
@ -2220,13 +2220,13 @@ int _netdev_vir_if_open(struct net_device *pnetdev)
|
|||
*/
|
||||
mac[0] |= BIT(1);
|
||||
|
||||
_rtw_memcpy(adapter_mac_addr(padapter), mac, ETH_ALEN);
|
||||
memcpy(adapter_mac_addr(padapter), mac, ETH_ALEN);
|
||||
|
||||
#ifdef CONFIG_MI_WITH_MBSSID_CAM
|
||||
rtw_mbid_camid_alloc(padapter, adapter_mac_addr(padapter));
|
||||
#endif
|
||||
rtw_init_wifidirect_addrs(padapter, adapter_mac_addr(padapter), adapter_mac_addr(padapter));
|
||||
_rtw_memcpy(pnetdev->dev_addr, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
memcpy(pnetdev->dev_addr, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
}
|
||||
#endif /*CONFIG_PLATFORM_INTEL_BYT*/
|
||||
|
||||
|
@ -2370,7 +2370,7 @@ _adapter *rtw_drv_add_vir_if(_adapter *primary_padapter,
|
|||
if (loadparam(padapter) != _SUCCESS)
|
||||
goto free_adapter;
|
||||
|
||||
_rtw_memcpy(padapter, primary_padapter, sizeof(_adapter));
|
||||
memcpy(padapter, primary_padapter, sizeof(_adapter));
|
||||
|
||||
/* */
|
||||
padapter->bup = false;
|
||||
|
@ -2408,7 +2408,7 @@ _adapter *rtw_drv_add_vir_if(_adapter *primary_padapter,
|
|||
|
||||
|
||||
/*get mac address from primary_padapter*/
|
||||
_rtw_memcpy(mac, adapter_mac_addr(primary_padapter), ETH_ALEN);
|
||||
memcpy(mac, adapter_mac_addr(primary_padapter), ETH_ALEN);
|
||||
|
||||
/*
|
||||
* If the BIT1 is 0, the address is universally administered.
|
||||
|
@ -2418,7 +2418,7 @@ _adapter *rtw_drv_add_vir_if(_adapter *primary_padapter,
|
|||
if (padapter->iface_id > IFACE_ID1)
|
||||
mac[4] ^= BIT(padapter->iface_id);
|
||||
|
||||
_rtw_memcpy(adapter_mac_addr(padapter), mac, ETH_ALEN);
|
||||
memcpy(adapter_mac_addr(padapter), mac, ETH_ALEN);
|
||||
/* update mac-address to mbsid-cam cache*/
|
||||
#ifdef CONFIG_MI_WITH_MBSSID_CAM
|
||||
rtw_mbid_camid_alloc(padapter, adapter_mac_addr(padapter));
|
||||
|
@ -2725,7 +2725,7 @@ int _netdev_open(struct net_device *pnetdev)
|
|||
rtw_mbid_camid_alloc(padapter, adapter_mac_addr(padapter));
|
||||
#endif
|
||||
rtw_init_wifidirect_addrs(padapter, adapter_mac_addr(padapter), adapter_mac_addr(padapter));
|
||||
_rtw_memcpy(pnetdev->dev_addr, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
memcpy(pnetdev->dev_addr, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
#endif /* CONFIG_PLATFORM_INTEL_BYT */
|
||||
|
||||
rtw_clr_surprise_removed(padapter);
|
||||
|
@ -3330,7 +3330,7 @@ static int arp_query(unsigned char *haddr, u32 paddr,
|
|||
if (neighbor_entry != NULL) {
|
||||
neighbor_entry->used = jiffies;
|
||||
if (neighbor_entry->nud_state & NUD_VALID) {
|
||||
_rtw_memcpy(haddr, neighbor_entry->ha, dev->addr_len);
|
||||
memcpy(haddr, neighbor_entry->ha, dev->addr_len);
|
||||
ret = 1;
|
||||
}
|
||||
neigh_release(neighbor_entry);
|
||||
|
@ -3383,7 +3383,7 @@ int rtw_gw_addr_query(_adapter *padapter)
|
|||
pmlmepriv->gw_ip[1] = (gw_addr & 0xff00) >> 8;
|
||||
pmlmepriv->gw_ip[2] = (gw_addr & 0xff0000) >> 16;
|
||||
pmlmepriv->gw_ip[3] = (gw_addr & 0xff000000) >> 24;
|
||||
_rtw_memcpy(pmlmepriv->gw_mac_addr, gw_mac, 6);
|
||||
memcpy(pmlmepriv->gw_mac_addr, gw_mac, 6);
|
||||
RTW_INFO("%s Gateway Mac:\t" MAC_FMT "\n", __func__, MAC_ARG(pmlmepriv->gw_mac_addr));
|
||||
RTW_INFO("%s Gateway IP:\t" IP_FMT "\n", __func__, IP_ARG(pmlmepriv->gw_ip));
|
||||
} else
|
||||
|
|
|
@ -693,16 +693,6 @@ void rtw_mfree2d(void *pbuf, int h, int w, int size)
|
|||
rtw_mfree((u8 *)pbuf, h * sizeof(void *) + w * h * size);
|
||||
}
|
||||
|
||||
void _rtw_memcpy(void *dst, const void *src, u32 sz)
|
||||
{
|
||||
memcpy(dst, src, sz);
|
||||
}
|
||||
|
||||
inline void _rtw_memmove(void *dst, const void *src, u32 sz)
|
||||
{
|
||||
memmove(dst, src, sz);
|
||||
}
|
||||
|
||||
void _rtw_init_listhead(_list *list)
|
||||
{
|
||||
INIT_LIST_HEAD(list);
|
||||
|
@ -1494,7 +1484,7 @@ int rtw_change_ifname(_adapter *padapter, const char *ifname)
|
|||
|
||||
rtw_init_netdev_name(pnetdev, ifname);
|
||||
|
||||
_rtw_memcpy(pnetdev->dev_addr, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
memcpy(pnetdev->dev_addr, adapter_mac_addr(padapter), ETH_ALEN);
|
||||
|
||||
if (rtnl_lock_needed)
|
||||
ret = register_netdev(pnetdev);
|
||||
|
@ -1577,7 +1567,7 @@ void rtw_buf_update(u8 **buf, u32 *buf_len, u8 *src, u32 src_len)
|
|||
dup = rtw_malloc(src_len);
|
||||
if (dup) {
|
||||
dup_len = src_len;
|
||||
_rtw_memcpy(dup, src, dup_len);
|
||||
memcpy(dup, src, dup_len);
|
||||
}
|
||||
|
||||
keep_ori:
|
||||
|
@ -1739,7 +1729,7 @@ int map_readN(const struct map_t *map, u16 offset, u16 len, u8 *buf)
|
|||
c_len = seg->sa + seg->len - offset;
|
||||
}
|
||||
|
||||
_rtw_memcpy(c_dst, c_src, c_len);
|
||||
memcpy(c_dst, c_src, c_len);
|
||||
}
|
||||
|
||||
exit:
|
||||
|
|
|
@ -94,7 +94,7 @@ int rtw_os_alloc_recvframe(_adapter *padapter, union recv_frame *precvframe, u8
|
|||
precvframe->u.hdr.rx_end = pkt_copy->data + alloc_sz;
|
||||
skb_reserve(pkt_copy, 8 - ((SIZE_PTR)(pkt_copy->data) & 7)); /* force pkt_copy->data at 8-byte alignment address */
|
||||
skb_reserve(pkt_copy, shift_sz);/* force ip_hdr at 8-byte alignment address according to shift_sz. */
|
||||
_rtw_memcpy(pkt_copy->data, pdata, skb_len);
|
||||
memcpy(pkt_copy->data, pdata, skb_len);
|
||||
precvframe->u.hdr.rx_data = precvframe->u.hdr.rx_tail = pkt_copy->data;
|
||||
} else {
|
||||
#ifdef CONFIG_USE_USB_BUFFER_ALLOC_RX
|
||||
|
@ -271,7 +271,7 @@ _pkt *rtw_os_alloc_msdu_pkt(union recv_frame *prframe, u16 nSubframe_Length, u8
|
|||
if (sub_skb) {
|
||||
skb_reserve(sub_skb, 12);
|
||||
data_ptr = (u8 *)skb_put(sub_skb, nSubframe_Length);
|
||||
_rtw_memcpy(data_ptr, (pdata + ETH_HLEN), nSubframe_Length);
|
||||
memcpy(data_ptr, (pdata + ETH_HLEN), nSubframe_Length);
|
||||
} else
|
||||
#endif /* CONFIG_SKB_COPY */
|
||||
{
|
||||
|
@ -294,15 +294,15 @@ _pkt *rtw_os_alloc_msdu_pkt(union recv_frame *prframe, u16 nSubframe_Length, u8
|
|||
!memcmp(sub_skb->data, rtw_bridge_tunnel_header, SNAP_SIZE))) {
|
||||
/* remove RFC1042 or Bridge-Tunnel encapsulation and replace EtherType */
|
||||
skb_pull(sub_skb, SNAP_SIZE);
|
||||
_rtw_memcpy(skb_push(sub_skb, ETH_ALEN), pattrib->src, ETH_ALEN);
|
||||
_rtw_memcpy(skb_push(sub_skb, ETH_ALEN), pattrib->dst, ETH_ALEN);
|
||||
memcpy(skb_push(sub_skb, ETH_ALEN), pattrib->src, ETH_ALEN);
|
||||
memcpy(skb_push(sub_skb, ETH_ALEN), pattrib->dst, ETH_ALEN);
|
||||
} else {
|
||||
__be16 len;
|
||||
/* Leave Ethernet header part of hdr and full payload */
|
||||
len = htons(sub_skb->len);
|
||||
_rtw_memcpy(skb_push(sub_skb, 2), &len, 2);
|
||||
_rtw_memcpy(skb_push(sub_skb, ETH_ALEN), pattrib->src, ETH_ALEN);
|
||||
_rtw_memcpy(skb_push(sub_skb, ETH_ALEN), pattrib->dst, ETH_ALEN);
|
||||
memcpy(skb_push(sub_skb, 2), &len, 2);
|
||||
memcpy(skb_push(sub_skb, ETH_ALEN), pattrib->src, ETH_ALEN);
|
||||
memcpy(skb_push(sub_skb, ETH_ALEN), pattrib->dst, ETH_ALEN);
|
||||
}
|
||||
|
||||
return sub_skb;
|
||||
|
@ -535,7 +535,7 @@ void rtw_handle_tkip_mic_err(_adapter *padapter, struct sta_info *sta, u8 bgroup
|
|||
ev.flags |= IW_MICFAILURE_PAIRWISE;
|
||||
|
||||
ev.src_addr.sa_family = ARPHRD_ETHER;
|
||||
_rtw_memcpy(ev.src_addr.sa_data, sta->hwaddr, ETH_ALEN);
|
||||
memcpy(ev.src_addr.sa_data, sta->hwaddr, ETH_ALEN);
|
||||
|
||||
memset(&wrqu, 0x00, sizeof(wrqu));
|
||||
wrqu.data.length = sizeof(ev);
|
||||
|
|
|
@ -417,7 +417,7 @@ static int rtw_android_get_p2p_dev_addr(struct net_device *net, char *command, i
|
|||
int bytes_written = 0;
|
||||
|
||||
/* We use the same address as our HW MAC address */
|
||||
_rtw_memcpy(command, net->dev_addr, ETH_ALEN);
|
||||
memcpy(command, net->dev_addr, ETH_ALEN);
|
||||
|
||||
bytes_written = ETH_ALEN;
|
||||
return bytes_written;
|
||||
|
@ -540,7 +540,7 @@ int rtw_gtk_offload(struct net_device *net, u8 *cmd_ptr)
|
|||
/* string command length of "GTK_REKEY_OFFLOAD" */
|
||||
cmd_ptr += 18;
|
||||
|
||||
_rtw_memcpy(psta->kek, cmd_ptr, RTW_KEK_LEN);
|
||||
memcpy(psta->kek, cmd_ptr, RTW_KEK_LEN);
|
||||
cmd_ptr += RTW_KEK_LEN;
|
||||
/*
|
||||
printk("supplicant KEK: ");
|
||||
|
@ -548,13 +548,13 @@ int rtw_gtk_offload(struct net_device *net, u8 *cmd_ptr)
|
|||
printk(" %02x ", psta->kek[i]);
|
||||
printk("\n supplicant KCK: ");
|
||||
*/
|
||||
_rtw_memcpy(psta->kck, cmd_ptr, RTW_KCK_LEN);
|
||||
memcpy(psta->kck, cmd_ptr, RTW_KCK_LEN);
|
||||
cmd_ptr += RTW_KCK_LEN;
|
||||
/*
|
||||
for(i=0;i<RTW_KEK_LEN; i++)
|
||||
printk(" %02x ", psta->kck[i]);
|
||||
*/
|
||||
_rtw_memcpy(psta->replay_ctr, cmd_ptr, RTW_REPLAY_CTR_LEN);
|
||||
memcpy(psta->replay_ctr, cmd_ptr, RTW_REPLAY_CTR_LEN);
|
||||
psecuritypriv->binstallKCK_KEK = true;
|
||||
|
||||
/* printk("\nREPLAY_CTR: "); */
|
||||
|
|
|
@ -97,7 +97,7 @@ int usbctrl_vendorreq(struct intf_hdl *pintfhdl, u8 request, u16 value, u16 inde
|
|||
} else {
|
||||
pipe = usb_sndctrlpipe(udev, 0);/* write_out */
|
||||
reqtype = REALTEK_USB_VENQT_WRITE;
|
||||
_rtw_memcpy(pIo_buf, pdata, len);
|
||||
memcpy(pIo_buf, pdata, len);
|
||||
}
|
||||
|
||||
status = rtw_usb_control_msg(udev, pipe, request, reqtype, value, index, pIo_buf, len, RTW_USB_CONTROL_MSG_TIMEOUT);
|
||||
|
@ -106,7 +106,7 @@ int usbctrl_vendorreq(struct intf_hdl *pintfhdl, u8 request, u16 value, u16 inde
|
|||
rtw_reset_continual_io_error(pdvobjpriv);
|
||||
if (requesttype == 0x01) {
|
||||
/* For Control read transfer, we have to copy the read data from pIo_buf to pdata. */
|
||||
_rtw_memcpy(pdata, pIo_buf, len);
|
||||
memcpy(pdata, pIo_buf, len);
|
||||
}
|
||||
} else { /* error cases */
|
||||
RTW_INFO("reg 0x%x, usb %s %u fail, status:%d value=0x%x, vendorreq_times:%d\n"
|
||||
|
@ -127,7 +127,7 @@ int usbctrl_vendorreq(struct intf_hdl *pintfhdl, u8 request, u16 value, u16 inde
|
|||
if (status > 0) {
|
||||
if (requesttype == 0x01) {
|
||||
/* For Control read transfer, we have to copy the read data from pIo_buf to pdata. */
|
||||
_rtw_memcpy(pdata, pIo_buf, len);
|
||||
memcpy(pdata, pIo_buf, len);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -209,7 +209,7 @@ int _usbctrl_vendorreq_async_write(struct usb_device *udev, u8 request,
|
|||
dr->wIndex = cpu_to_le16(index);
|
||||
dr->wLength = cpu_to_le16(len);
|
||||
|
||||
_rtw_memcpy(buf, pdata, len);
|
||||
memcpy(buf, pdata, len);
|
||||
|
||||
usb_fill_control_urb(urb, udev, pipe, (unsigned char *)dr, buf, len,
|
||||
_usbctrl_vendorreq_async_callback, buf);
|
||||
|
|
|
@ -387,7 +387,7 @@ int rtw_mlcst2unicst(_adapter *padapter, struct sk_buff *skb)
|
|||
newskb = rtw_skb_copy(skb);
|
||||
|
||||
if (newskb) {
|
||||
_rtw_memcpy(newskb->data, psta->hwaddr, 6);
|
||||
memcpy(newskb->data, psta->hwaddr, 6);
|
||||
res = rtw_xmit(padapter, &newskb);
|
||||
if (res < 0) {
|
||||
DBG_COUNTER(padapter->tx_logs.os_tx_m2u_entry_err_xmit);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue