mirror of
https://github.com/lwfinger/rtl8188eu.git
synced 2024-11-25 14:03:40 +00:00
19db43ecbd
This driver was added to the kernel with version 3.12. The changes in that version are now brought back to the GitHub repo. Essentually all of the code is updated. Signed-off-by: Larry Finger <Larry.Finger@lwfinger.net>
8222 lines
234 KiB
C
8222 lines
234 KiB
C
/******************************************************************************
|
|
*
|
|
* Copyright(c) 2007 - 2012 Realtek Corporation. All rights reserved.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of version 2 of the GNU General Public License as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
* more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along with
|
|
* this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
|
|
*
|
|
*
|
|
******************************************************************************/
|
|
#define _IOCTL_LINUX_C_
|
|
|
|
#include <osdep_service.h>
|
|
#include <drv_types.h>
|
|
#include <wlan_bssdef.h>
|
|
#include <rtw_debug.h>
|
|
#include <wifi.h>
|
|
#include <rtw_mlme.h>
|
|
#include <rtw_mlme_ext.h>
|
|
#include <rtw_ioctl.h>
|
|
#include <rtw_ioctl_set.h>
|
|
#include <rtw_mp_ioctl.h>
|
|
#include <usb_ops.h>
|
|
#include <rtw_version.h>
|
|
#include <rtl8188e_hal.h>
|
|
|
|
#include <rtw_mp.h>
|
|
#include <rtw_iol.h>
|
|
|
|
#define RTL_IOCTL_WPA_SUPPLICANT (SIOCIWFIRSTPRIV + 30)
|
|
|
|
#define SCAN_ITEM_SIZE 768
|
|
#define MAX_CUSTOM_LEN 64
|
|
#define RATE_COUNT 4
|
|
|
|
/* combo scan */
|
|
#define WEXT_CSCAN_AMOUNT 9
|
|
#define WEXT_CSCAN_BUF_LEN 360
|
|
#define WEXT_CSCAN_HEADER "CSCAN S\x01\x00\x00S\x00"
|
|
#define WEXT_CSCAN_HEADER_SIZE 12
|
|
#define WEXT_CSCAN_SSID_SECTION 'S'
|
|
#define WEXT_CSCAN_CHANNEL_SECTION 'C'
|
|
#define WEXT_CSCAN_NPROBE_SECTION 'N'
|
|
#define WEXT_CSCAN_ACTV_DWELL_SECTION 'A'
|
|
#define WEXT_CSCAN_PASV_DWELL_SECTION 'P'
|
|
#define WEXT_CSCAN_HOME_DWELL_SECTION 'H'
|
|
#define WEXT_CSCAN_TYPE_SECTION 'T'
|
|
|
|
static struct mp_ioctl_handler mp_ioctl_hdl[] = {
|
|
/*0*/ GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_pro_start_test_hdl, OID_RT_PRO_START_TEST)
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_pro_stop_test_hdl, OID_RT_PRO_STOP_TEST)
|
|
|
|
GEN_HANDLER(sizeof(struct rwreg_param), rtl8188eu_oid_rt_pro_read_register_hdl, OID_RT_PRO_READ_REGISTER)
|
|
GEN_HANDLER(sizeof(struct rwreg_param), rtl8188eu_oid_rt_pro_write_register_hdl, OID_RT_PRO_WRITE_REGISTER)
|
|
GEN_HANDLER(sizeof(struct bb_reg_param), rtl8188eu_oid_rt_pro_read_bb_reg_hdl, OID_RT_PRO_READ_BB_REG)
|
|
/*5*/ GEN_HANDLER(sizeof(struct bb_reg_param), rtl8188eu_oid_rt_pro_write_bb_reg_hdl, OID_RT_PRO_WRITE_BB_REG)
|
|
GEN_HANDLER(sizeof(struct rf_reg_param), rtl8188eu_oid_rt_pro_read_rf_reg_hdl, OID_RT_PRO_RF_READ_REGISTRY)
|
|
GEN_HANDLER(sizeof(struct rf_reg_param), rtl8188eu_oid_rt_pro_write_rf_reg_hdl, OID_RT_PRO_RF_WRITE_REGISTRY)
|
|
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_pro_set_channel_direct_call_hdl, OID_RT_PRO_SET_CHANNEL_DIRECT_CALL)
|
|
GEN_HANDLER(sizeof(struct txpower_param), rtl8188eu_oid_rt_pro_set_tx_power_control_hdl, OID_RT_PRO_SET_TX_POWER_CONTROL)
|
|
/*10*/ GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_pro_set_data_rate_hdl, OID_RT_PRO_SET_DATA_RATE)
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_set_bandwidth_hdl, OID_RT_SET_BANDWIDTH)
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_pro_set_antenna_bb_hdl, OID_RT_PRO_SET_ANTENNA_BB)
|
|
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_pro_set_continuous_tx_hdl, OID_RT_PRO_SET_CONTINUOUS_TX)
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_pro_set_single_carrier_tx_hdl, OID_RT_PRO_SET_SINGLE_CARRIER_TX)
|
|
/*15*/ GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_pro_set_carrier_suppression_tx_hdl, OID_RT_PRO_SET_CARRIER_SUPPRESSION_TX)
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_pro_set_single_tone_tx_hdl, OID_RT_PRO_SET_SINGLE_TONE_TX)
|
|
|
|
EXT_MP_IOCTL_HANDLER(0, xmit_packet, 0)
|
|
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_set_rx_packet_type_hdl, OID_RT_SET_RX_PACKET_TYPE)
|
|
GEN_HANDLER(0, rtl8188eu_oid_rt_reset_phy_rx_packet_count_hdl, OID_RT_RESET_PHY_RX_PACKET_COUNT)
|
|
/*20*/ GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_get_phy_rx_packet_received_hdl, OID_RT_GET_PHY_RX_PACKET_RECEIVED)
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_get_phy_rx_packet_crc32_error_hdl, OID_RT_GET_PHY_RX_PACKET_CRC32_ERROR)
|
|
|
|
GEN_HANDLER(sizeof(struct eeprom_rw_param), NULL, 0)
|
|
GEN_HANDLER(sizeof(struct eeprom_rw_param), NULL, 0)
|
|
GEN_HANDLER(sizeof(struct efuse_access_struct), rtl8188eu_oid_rt_pro_efuse_hdl, OID_RT_PRO_EFUSE)
|
|
/*25*/ GEN_HANDLER(0, rtl8188eu_oid_rt_pro_efuse_map_hdl, OID_RT_PRO_EFUSE_MAP)
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_get_efuse_max_size_hdl, OID_RT_GET_EFUSE_MAX_SIZE)
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_get_efuse_current_size_hdl, OID_RT_GET_EFUSE_CURRENT_SIZE)
|
|
|
|
GEN_HANDLER(sizeof(u32), rtl8188eu_oid_rt_get_thermal_meter_hdl, OID_RT_PRO_GET_THERMAL_METER)
|
|
GEN_HANDLER(sizeof(u8), rtl8188eu_oid_rt_pro_set_power_tracking_hdl, OID_RT_PRO_SET_POWER_TRACKING)
|
|
/*30*/ GEN_HANDLER(sizeof(u8), rtl8188eu_oid_rt_set_power_down_hdl, OID_RT_SET_POWER_DOWN)
|
|
/*31*/ GEN_HANDLER(0, rtl8188eu_oid_rt_pro_trigger_gpio_hdl, 0)
|
|
};
|
|
|
|
static u32 rtw_rates[] = {1000000, 2000000, 5500000, 11000000,
|
|
6000000, 9000000, 12000000, 18000000, 24000000, 36000000,
|
|
48000000, 54000000};
|
|
|
|
static const char * const iw_operation_mode[] = {
|
|
"Auto", "Ad-Hoc", "Managed", "Master", "Repeater",
|
|
"Secondary", "Monitor"
|
|
};
|
|
|
|
static int hex2num_i(char c)
|
|
{
|
|
if (c >= '0' && c <= '9')
|
|
return c - '0';
|
|
if (c >= 'a' && c <= 'f')
|
|
return c - 'a' + 10;
|
|
if (c >= 'A' && c <= 'F')
|
|
return c - 'A' + 10;
|
|
return -1;
|
|
}
|
|
|
|
/**
|
|
* hwaddr_aton - Convert ASCII string to MAC address
|
|
* @txt: MAC address as a string (e.g., "00:11:22:33:44:55")
|
|
* @addr: Buffer for the MAC address (ETH_ALEN = 6 bytes)
|
|
* Returns: 0 on success, -1 on failure (e.g., string not a MAC address)
|
|
*/
|
|
static int hwaddr_aton_i(const char *txt, u8 *addr)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < 6; i++) {
|
|
int a, b;
|
|
|
|
a = hex2num_i(*txt++);
|
|
if (a < 0)
|
|
return -1;
|
|
b = hex2num_i(*txt++);
|
|
if (b < 0)
|
|
return -1;
|
|
*addr++ = (a << 4) | b;
|
|
if (i < 5 && *txt++ != ':')
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
void indicate_wx_scan_complete_event(struct adapter *padapter)
|
|
{
|
|
union iwreq_data wrqu;
|
|
|
|
_rtw_memset(&wrqu, 0, sizeof(union iwreq_data));
|
|
wireless_send_event(padapter->pnetdev, SIOCGIWSCAN, &wrqu, NULL);
|
|
}
|
|
|
|
void rtw_indicate_wx_assoc_event(struct adapter *padapter)
|
|
{
|
|
union iwreq_data wrqu;
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
|
|
_rtw_memset(&wrqu, 0, sizeof(union iwreq_data));
|
|
|
|
wrqu.ap_addr.sa_family = ARPHRD_ETHER;
|
|
|
|
memcpy(wrqu.ap_addr.sa_data, pmlmepriv->cur_network.network.MacAddress, ETH_ALEN);
|
|
|
|
DBG_88E_LEVEL(_drv_always_, "assoc success\n");
|
|
wireless_send_event(padapter->pnetdev, SIOCGIWAP, &wrqu, NULL);
|
|
}
|
|
|
|
void rtw_indicate_wx_disassoc_event(struct adapter *padapter)
|
|
{
|
|
union iwreq_data wrqu;
|
|
|
|
_rtw_memset(&wrqu, 0, sizeof(union iwreq_data));
|
|
|
|
wrqu.ap_addr.sa_family = ARPHRD_ETHER;
|
|
_rtw_memset(wrqu.ap_addr.sa_data, 0, ETH_ALEN);
|
|
|
|
DBG_88E_LEVEL(_drv_always_, "indicate disassoc\n");
|
|
wireless_send_event(padapter->pnetdev, SIOCGIWAP, &wrqu, NULL);
|
|
}
|
|
|
|
static char *translate_scan(struct adapter *padapter,
|
|
struct iw_request_info *info,
|
|
struct wlan_network *pnetwork,
|
|
char *start, char *stop)
|
|
{
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct iw_event iwe;
|
|
u16 cap;
|
|
__le16 le_tmp;
|
|
u32 ht_ielen = 0;
|
|
char custom[MAX_CUSTOM_LEN];
|
|
char *p;
|
|
u16 max_rate = 0, rate, ht_cap = false;
|
|
u32 i = 0;
|
|
u8 bw_40MHz = 0, short_GI = 0;
|
|
u16 mcs_rate = 0;
|
|
u8 ss, sq;
|
|
#ifdef CONFIG_88EU_P2P
|
|
struct wifidirect_info *pwdinfo = &padapter->wdinfo;
|
|
|
|
if (!rtw_p2p_chk_state(pwdinfo, P2P_STATE_NONE)) {
|
|
u32 blnGotP2PIE = false;
|
|
|
|
/* User is doing the P2P device discovery */
|
|
/* The prefix of SSID should be "DIRECT-" and the IE should contains the P2P IE. */
|
|
/* If not, the driver should ignore this AP and go to the next AP. */
|
|
|
|
/* Verifying the SSID */
|
|
if (!memcmp(pnetwork->network.Ssid.Ssid, pwdinfo->p2p_wildcard_ssid, P2P_WILDCARD_SSID_LEN)) {
|
|
u32 p2pielen = 0;
|
|
|
|
if (pnetwork->network.Reserved[0] == 2) {/* Probe Request */
|
|
/* Verifying the P2P IE */
|
|
if (rtw_get_p2p_ie(pnetwork->network.IEs, pnetwork->network.IELength, NULL, &p2pielen))
|
|
blnGotP2PIE = true;
|
|
} else {/* Beacon or Probe Respones */
|
|
/* Verifying the P2P IE */
|
|
if (rtw_get_p2p_ie(&pnetwork->network.IEs[12], pnetwork->network.IELength - 12, NULL, &p2pielen))
|
|
blnGotP2PIE = true;
|
|
}
|
|
}
|
|
|
|
if (!blnGotP2PIE)
|
|
return start;
|
|
}
|
|
#endif /* CONFIG_88EU_P2P */
|
|
|
|
/* AP MAC address */
|
|
iwe.cmd = SIOCGIWAP;
|
|
iwe.u.ap_addr.sa_family = ARPHRD_ETHER;
|
|
|
|
memcpy(iwe.u.ap_addr.sa_data, pnetwork->network.MacAddress, ETH_ALEN);
|
|
start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_ADDR_LEN);
|
|
|
|
/* Add the ESSID */
|
|
iwe.cmd = SIOCGIWESSID;
|
|
iwe.u.data.flags = 1;
|
|
iwe.u.data.length = min_t(u16, pnetwork->network.Ssid.SsidLength, 32);
|
|
start = iwe_stream_add_point(info, start, stop, &iwe, pnetwork->network.Ssid.Ssid);
|
|
|
|
/* parsing HT_CAP_IE */
|
|
p = rtw_get_ie(&pnetwork->network.IEs[12], _HT_CAPABILITY_IE_, &ht_ielen, pnetwork->network.IELength-12);
|
|
|
|
if (p && ht_ielen > 0) {
|
|
struct rtw_ieee80211_ht_cap *pht_capie;
|
|
ht_cap = true;
|
|
pht_capie = (struct rtw_ieee80211_ht_cap *)(p+2);
|
|
memcpy(&mcs_rate, pht_capie->supp_mcs_set, 2);
|
|
bw_40MHz = (pht_capie->cap_info&IEEE80211_HT_CAP_SUP_WIDTH) ? 1 : 0;
|
|
short_GI = (pht_capie->cap_info&(IEEE80211_HT_CAP_SGI_20|IEEE80211_HT_CAP_SGI_40)) ? 1 : 0;
|
|
}
|
|
|
|
/* Add the protocol name */
|
|
iwe.cmd = SIOCGIWNAME;
|
|
if ((rtw_is_cckratesonly_included((u8 *)&pnetwork->network.SupportedRates))) {
|
|
if (ht_cap)
|
|
snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bn");
|
|
else
|
|
snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11b");
|
|
} else if ((rtw_is_cckrates_included((u8 *)&pnetwork->network.SupportedRates))) {
|
|
if (ht_cap)
|
|
snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bgn");
|
|
else
|
|
snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bg");
|
|
} else {
|
|
if (pnetwork->network.Configuration.DSConfig > 14) {
|
|
if (ht_cap)
|
|
snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11an");
|
|
else
|
|
snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11a");
|
|
} else {
|
|
if (ht_cap)
|
|
snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11gn");
|
|
else
|
|
snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11g");
|
|
}
|
|
}
|
|
|
|
start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_CHAR_LEN);
|
|
|
|
/* Add mode */
|
|
iwe.cmd = SIOCGIWMODE;
|
|
memcpy(&le_tmp, rtw_get_capability_from_ie(pnetwork->network.IEs), 2);
|
|
|
|
cap = le16_to_cpu(le_tmp);
|
|
|
|
if (cap & (WLAN_CAPABILITY_IBSS | WLAN_CAPABILITY_BSS)) {
|
|
if (cap & WLAN_CAPABILITY_BSS)
|
|
iwe.u.mode = IW_MODE_MASTER;
|
|
else
|
|
iwe.u.mode = IW_MODE_ADHOC;
|
|
|
|
start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_UINT_LEN);
|
|
}
|
|
|
|
if (pnetwork->network.Configuration.DSConfig < 1)
|
|
pnetwork->network.Configuration.DSConfig = 1;
|
|
|
|
/* Add frequency/channel */
|
|
iwe.cmd = SIOCGIWFREQ;
|
|
iwe.u.freq.m = rtw_ch2freq(pnetwork->network.Configuration.DSConfig) * 100000;
|
|
iwe.u.freq.e = 1;
|
|
iwe.u.freq.i = pnetwork->network.Configuration.DSConfig;
|
|
start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_FREQ_LEN);
|
|
|
|
/* Add encryption capability */
|
|
iwe.cmd = SIOCGIWENCODE;
|
|
if (cap & WLAN_CAPABILITY_PRIVACY)
|
|
iwe.u.data.flags = IW_ENCODE_ENABLED | IW_ENCODE_NOKEY;
|
|
else
|
|
iwe.u.data.flags = IW_ENCODE_DISABLED;
|
|
iwe.u.data.length = 0;
|
|
start = iwe_stream_add_point(info, start, stop, &iwe, pnetwork->network.Ssid.Ssid);
|
|
|
|
/*Add basic and extended rates */
|
|
max_rate = 0;
|
|
p = custom;
|
|
p += snprintf(p, MAX_CUSTOM_LEN - (p - custom), " Rates (Mb/s): ");
|
|
while (pnetwork->network.SupportedRates[i] != 0) {
|
|
rate = pnetwork->network.SupportedRates[i]&0x7F;
|
|
if (rate > max_rate)
|
|
max_rate = rate;
|
|
p += snprintf(p, MAX_CUSTOM_LEN - (p - custom),
|
|
"%d%s ", rate >> 1, (rate & 1) ? ".5" : "");
|
|
i++;
|
|
}
|
|
|
|
if (ht_cap) {
|
|
if (mcs_rate&0x8000)/* MCS15 */
|
|
max_rate = (bw_40MHz) ? ((short_GI) ? 300 : 270) : ((short_GI) ? 144 : 130);
|
|
else if (mcs_rate&0x0080)/* MCS7 */
|
|
;
|
|
else/* default MCS7 */
|
|
max_rate = (bw_40MHz) ? ((short_GI) ? 150 : 135) : ((short_GI) ? 72 : 65);
|
|
|
|
max_rate = max_rate*2;/* Mbps/2; */
|
|
}
|
|
|
|
iwe.cmd = SIOCGIWRATE;
|
|
iwe.u.bitrate.fixed = 0;
|
|
iwe.u.bitrate.disabled = 0;
|
|
iwe.u.bitrate.value = max_rate * 500000;
|
|
start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_PARAM_LEN);
|
|
|
|
/* parsing WPA/WPA2 IE */
|
|
{
|
|
u8 buf[MAX_WPA_IE_LEN];
|
|
u8 wpa_ie[255], rsn_ie[255];
|
|
u16 wpa_len = 0, rsn_len = 0;
|
|
u8 *p;
|
|
|
|
rtw_get_sec_ie(pnetwork->network.IEs, pnetwork->network.IELength, rsn_ie, &rsn_len, wpa_ie, &wpa_len);
|
|
RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_scan: ssid =%s\n", pnetwork->network.Ssid.Ssid));
|
|
RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_scan: wpa_len =%d rsn_len =%d\n", wpa_len, rsn_len));
|
|
|
|
if (wpa_len > 0) {
|
|
p = buf;
|
|
_rtw_memset(buf, 0, MAX_WPA_IE_LEN);
|
|
p += sprintf(p, "wpa_ie =");
|
|
for (i = 0; i < wpa_len; i++)
|
|
p += sprintf(p, "%02x", wpa_ie[i]);
|
|
|
|
_rtw_memset(&iwe, 0, sizeof(iwe));
|
|
iwe.cmd = IWEVCUSTOM;
|
|
iwe.u.data.length = strlen(buf);
|
|
start = iwe_stream_add_point(info, start, stop, &iwe, buf);
|
|
|
|
_rtw_memset(&iwe, 0, sizeof(iwe));
|
|
iwe.cmd = IWEVGENIE;
|
|
iwe.u.data.length = wpa_len;
|
|
start = iwe_stream_add_point(info, start, stop, &iwe, wpa_ie);
|
|
}
|
|
if (rsn_len > 0) {
|
|
p = buf;
|
|
_rtw_memset(buf, 0, MAX_WPA_IE_LEN);
|
|
p += sprintf(p, "rsn_ie =");
|
|
for (i = 0; i < rsn_len; i++)
|
|
p += sprintf(p, "%02x", rsn_ie[i]);
|
|
_rtw_memset(&iwe, 0, sizeof(iwe));
|
|
iwe.cmd = IWEVCUSTOM;
|
|
iwe.u.data.length = strlen(buf);
|
|
start = iwe_stream_add_point(info, start, stop, &iwe, buf);
|
|
|
|
_rtw_memset(&iwe, 0, sizeof(iwe));
|
|
iwe.cmd = IWEVGENIE;
|
|
iwe.u.data.length = rsn_len;
|
|
start = iwe_stream_add_point(info, start, stop, &iwe, rsn_ie);
|
|
}
|
|
}
|
|
|
|
{/* parsing WPS IE */
|
|
uint cnt = 0, total_ielen;
|
|
u8 *wpsie_ptr = NULL;
|
|
uint wps_ielen = 0;
|
|
|
|
u8 *ie_ptr = pnetwork->network.IEs + _FIXED_IE_LENGTH_;
|
|
total_ielen = pnetwork->network.IELength - _FIXED_IE_LENGTH_;
|
|
|
|
while (cnt < total_ielen) {
|
|
if (rtw_is_wps_ie(&ie_ptr[cnt], &wps_ielen) && (wps_ielen > 2)) {
|
|
wpsie_ptr = &ie_ptr[cnt];
|
|
iwe.cmd = IWEVGENIE;
|
|
iwe.u.data.length = (u16)wps_ielen;
|
|
start = iwe_stream_add_point(info, start, stop, &iwe, wpsie_ptr);
|
|
}
|
|
cnt += ie_ptr[cnt+1]+2; /* goto next */
|
|
}
|
|
}
|
|
|
|
/* Add quality statistics */
|
|
iwe.cmd = IWEVQUAL;
|
|
iwe.u.qual.updated = IW_QUAL_QUAL_UPDATED | IW_QUAL_LEVEL_UPDATED | IW_QUAL_NOISE_INVALID;
|
|
|
|
if (check_fwstate(pmlmepriv, _FW_LINKED) == true &&
|
|
is_same_network(&pmlmepriv->cur_network.network, &pnetwork->network)) {
|
|
ss = padapter->recvpriv.signal_strength;
|
|
sq = padapter->recvpriv.signal_qual;
|
|
} else {
|
|
ss = pnetwork->network.PhyInfo.SignalStrength;
|
|
sq = pnetwork->network.PhyInfo.SignalQuality;
|
|
}
|
|
|
|
iwe.u.qual.level = (u8)ss;
|
|
iwe.u.qual.qual = (u8)sq; /* signal quality */
|
|
iwe.u.qual.noise = 0; /* noise level */
|
|
start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_QUAL_LEN);
|
|
return start;
|
|
}
|
|
|
|
static int wpa_set_auth_algs(struct net_device *dev, u32 value)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
int ret = 0;
|
|
|
|
if ((value & AUTH_ALG_SHARED_KEY) && (value & AUTH_ALG_OPEN_SYSTEM)) {
|
|
DBG_88E("wpa_set_auth_algs, AUTH_ALG_SHARED_KEY and AUTH_ALG_OPEN_SYSTEM [value:0x%x]\n", value);
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
|
|
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeAutoSwitch;
|
|
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Auto;
|
|
} else if (value & AUTH_ALG_SHARED_KEY) {
|
|
DBG_88E("wpa_set_auth_algs, AUTH_ALG_SHARED_KEY [value:0x%x]\n", value);
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
|
|
|
|
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeShared;
|
|
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Shared;
|
|
} else if (value & AUTH_ALG_OPEN_SYSTEM) {
|
|
DBG_88E("wpa_set_auth_algs, AUTH_ALG_OPEN_SYSTEM\n");
|
|
if (padapter->securitypriv.ndisauthtype < Ndis802_11AuthModeWPAPSK) {
|
|
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeOpen;
|
|
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open;
|
|
}
|
|
} else if (value & AUTH_ALG_LEAP) {
|
|
DBG_88E("wpa_set_auth_algs, AUTH_ALG_LEAP\n");
|
|
} else {
|
|
DBG_88E("wpa_set_auth_algs, error!\n");
|
|
ret = -EINVAL;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int wpa_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len)
|
|
{
|
|
int ret = 0;
|
|
u32 wep_key_idx, wep_key_len, wep_total_len;
|
|
struct ndis_802_11_wep *pwep = NULL;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
struct security_priv *psecuritypriv = &padapter->securitypriv;
|
|
#ifdef CONFIG_88EU_P2P
|
|
struct wifidirect_info *pwdinfo = &padapter->wdinfo;
|
|
#endif /* CONFIG_88EU_P2P */
|
|
|
|
_func_enter_;
|
|
|
|
param->u.crypt.err = 0;
|
|
param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
|
|
|
|
if (param_len < (u32) ((u8 *)param->u.crypt.key - (u8 *)param) + param->u.crypt.key_len) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
|
|
param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
|
|
param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
|
|
if (param->u.crypt.idx >= WEP_KEYS) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
} else {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
if (strcmp(param->u.crypt.alg, "WEP") == 0) {
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("wpa_set_encryption, crypt.alg = WEP\n"));
|
|
DBG_88E("wpa_set_encryption, crypt.alg = WEP\n");
|
|
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_;
|
|
|
|
wep_key_idx = param->u.crypt.idx;
|
|
wep_key_len = param->u.crypt.key_len;
|
|
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, ("(1)wep_key_idx =%d\n", wep_key_idx));
|
|
DBG_88E("(1)wep_key_idx =%d\n", wep_key_idx);
|
|
|
|
if (wep_key_idx > WEP_KEYS)
|
|
return -EINVAL;
|
|
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, ("(2)wep_key_idx =%d\n", wep_key_idx));
|
|
|
|
if (wep_key_len > 0) {
|
|
wep_key_len = wep_key_len <= 5 ? 5 : 13;
|
|
wep_total_len = wep_key_len + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial);
|
|
pwep = (struct ndis_802_11_wep *)rtw_malloc(wep_total_len);
|
|
if (pwep == NULL) {
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, (" wpa_set_encryption: pwep allocate fail !!!\n"));
|
|
goto exit;
|
|
}
|
|
_rtw_memset(pwep, 0, wep_total_len);
|
|
pwep->KeyLength = wep_key_len;
|
|
pwep->Length = wep_total_len;
|
|
if (wep_key_len == 13) {
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_;
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_;
|
|
}
|
|
} else {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
pwep->KeyIndex = wep_key_idx;
|
|
pwep->KeyIndex |= 0x80000000;
|
|
memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength);
|
|
if (param->u.crypt.set_tx) {
|
|
DBG_88E("wep, set_tx = 1\n");
|
|
if (rtw_set_802_11_add_wep(padapter, pwep) == (u8)_FAIL)
|
|
ret = -EOPNOTSUPP;
|
|
} else {
|
|
DBG_88E("wep, set_tx = 0\n");
|
|
if (wep_key_idx >= WEP_KEYS) {
|
|
ret = -EOPNOTSUPP;
|
|
goto exit;
|
|
}
|
|
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
|
|
psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
|
|
rtw_set_key(padapter, psecuritypriv, wep_key_idx, 0);
|
|
}
|
|
goto exit;
|
|
}
|
|
|
|
if (padapter->securitypriv.dot11AuthAlgrthm == dot11AuthAlgrthm_8021X) { /* 802_1x */
|
|
struct sta_info *psta, *pbcmc_sta;
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_STATION_STATE | WIFI_MP_STATE)) { /* sta mode */
|
|
psta = rtw_get_stainfo(pstapriv, get_bssid(pmlmepriv));
|
|
if (psta == NULL) {
|
|
;
|
|
} else {
|
|
if (strcmp(param->u.crypt.alg, "none") != 0)
|
|
psta->ieee8021x_blocked = false;
|
|
|
|
if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled) ||
|
|
(padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption3Enabled))
|
|
psta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm;
|
|
|
|
if (param->u.crypt.set_tx == 1) { /* pairwise key */
|
|
memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
|
|
|
if (strcmp(param->u.crypt.alg, "TKIP") == 0) { /* set mic key */
|
|
memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
|
memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
|
padapter->securitypriv.busetkipkey = false;
|
|
}
|
|
|
|
DBG_88E(" ~~~~set sta key:unicastkey\n");
|
|
|
|
rtw_setstakey_cmd(padapter, (unsigned char *)psta, true);
|
|
} else { /* group key */
|
|
memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
|
memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
|
memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
|
padapter->securitypriv.binstallGrpkey = true;
|
|
DBG_88E(" ~~~~set sta key:groupkey\n");
|
|
|
|
padapter->securitypriv.dot118021XGrpKeyid = param->u.crypt.idx;
|
|
|
|
rtw_set_key(padapter, &padapter->securitypriv, param->u.crypt.idx, 1);
|
|
#ifdef CONFIG_88EU_P2P
|
|
if (rtw_p2p_chk_state(pwdinfo, P2P_STATE_PROVISIONING_ING))
|
|
rtw_p2p_set_state(pwdinfo, P2P_STATE_PROVISIONING_DONE);
|
|
#endif /* CONFIG_88EU_P2P */
|
|
}
|
|
}
|
|
pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
|
|
if (pbcmc_sta == NULL) {
|
|
;
|
|
} else {
|
|
/* Jeff: don't disable ieee8021x_blocked while clearing key */
|
|
if (strcmp(param->u.crypt.alg, "none") != 0)
|
|
pbcmc_sta->ieee8021x_blocked = false;
|
|
|
|
if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled) ||
|
|
(padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption3Enabled))
|
|
pbcmc_sta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm;
|
|
}
|
|
}
|
|
}
|
|
|
|
exit:
|
|
|
|
kfree(pwep);
|
|
|
|
_func_exit_;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_set_wpa_ie(struct adapter *padapter, char *pie, unsigned short ielen)
|
|
{
|
|
u8 *buf = NULL;
|
|
int group_cipher = 0, pairwise_cipher = 0;
|
|
int ret = 0;
|
|
#ifdef CONFIG_88EU_P2P
|
|
struct wifidirect_info *pwdinfo = &padapter->wdinfo;
|
|
#endif /* CONFIG_88EU_P2P */
|
|
|
|
if ((ielen > MAX_WPA_IE_LEN) || (pie == NULL)) {
|
|
_clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS);
|
|
if (pie == NULL)
|
|
return ret;
|
|
else
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (ielen) {
|
|
buf = rtw_zmalloc(ielen);
|
|
if (buf == NULL) {
|
|
ret = -ENOMEM;
|
|
goto exit;
|
|
}
|
|
|
|
memcpy(buf, pie, ielen);
|
|
|
|
/* dump */
|
|
{
|
|
int i;
|
|
DBG_88E("\n wpa_ie(length:%d):\n", ielen);
|
|
for (i = 0; i < ielen; i += 8)
|
|
DBG_88E("0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x\n", buf[i], buf[i+1], buf[i+2], buf[i+3], buf[i+4], buf[i+5], buf[i+6], buf[i+7]);
|
|
}
|
|
|
|
if (ielen < RSN_HEADER_LEN) {
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("Ie len too short %d\n", ielen));
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
if (rtw_parse_wpa_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
|
|
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
|
|
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK;
|
|
memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
|
|
}
|
|
|
|
if (rtw_parse_wpa2_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
|
|
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
|
|
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK;
|
|
memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
|
|
}
|
|
|
|
switch (group_cipher) {
|
|
case WPA_CIPHER_NONE:
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
|
|
break;
|
|
case WPA_CIPHER_WEP40:
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_;
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
|
|
break;
|
|
case WPA_CIPHER_TKIP:
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _TKIP_;
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
|
|
break;
|
|
case WPA_CIPHER_CCMP:
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _AES_;
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
|
|
break;
|
|
case WPA_CIPHER_WEP104:
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_;
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
|
|
break;
|
|
}
|
|
|
|
switch (pairwise_cipher) {
|
|
case WPA_CIPHER_NONE:
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
|
|
break;
|
|
case WPA_CIPHER_WEP40:
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
|
|
break;
|
|
case WPA_CIPHER_TKIP:
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _TKIP_;
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
|
|
break;
|
|
case WPA_CIPHER_CCMP:
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _AES_;
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
|
|
break;
|
|
case WPA_CIPHER_WEP104:
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_;
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
|
|
break;
|
|
}
|
|
|
|
_clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS);
|
|
{/* set wps_ie */
|
|
u16 cnt = 0;
|
|
u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
|
|
|
|
while (cnt < ielen) {
|
|
eid = buf[cnt];
|
|
if ((eid == _VENDOR_SPECIFIC_IE_) && (!memcmp(&buf[cnt+2], wps_oui, 4))) {
|
|
DBG_88E("SET WPS_IE\n");
|
|
|
|
padapter->securitypriv.wps_ie_len = ((buf[cnt+1]+2) < (MAX_WPA_IE_LEN<<2)) ? (buf[cnt+1]+2) : (MAX_WPA_IE_LEN<<2);
|
|
|
|
memcpy(padapter->securitypriv.wps_ie, &buf[cnt], padapter->securitypriv.wps_ie_len);
|
|
|
|
set_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS);
|
|
#ifdef CONFIG_88EU_P2P
|
|
if (rtw_p2p_chk_state(pwdinfo, P2P_STATE_GONEGO_OK))
|
|
rtw_p2p_set_state(pwdinfo, P2P_STATE_PROVISIONING_ING);
|
|
#endif /* CONFIG_88EU_P2P */
|
|
cnt += buf[cnt+1]+2;
|
|
break;
|
|
} else {
|
|
cnt += buf[cnt+1]+2; /* goto next */
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
|
|
("rtw_set_wpa_ie: pairwise_cipher = 0x%08x padapter->securitypriv.ndisencryptstatus =%d padapter->securitypriv.ndisauthtype =%d\n",
|
|
pairwise_cipher, padapter->securitypriv.ndisencryptstatus, padapter->securitypriv.ndisauthtype));
|
|
exit:
|
|
kfree(buf);
|
|
return ret;
|
|
}
|
|
|
|
typedef unsigned char NDIS_802_11_RATES_EX[NDIS_802_11_LENGTH_RATES_EX];
|
|
|
|
static int rtw_wx_get_name(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
u32 ht_ielen = 0;
|
|
char *p;
|
|
u8 ht_cap = false;
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network;
|
|
NDIS_802_11_RATES_EX *prates = NULL;
|
|
|
|
RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("cmd_code =%x\n", info->cmd));
|
|
|
|
_func_enter_;
|
|
|
|
if (check_fwstate(pmlmepriv, _FW_LINKED|WIFI_ADHOC_MASTER_STATE) == true) {
|
|
/* parsing HT_CAP_IE */
|
|
p = rtw_get_ie(&pcur_bss->IEs[12], _HT_CAPABILITY_IE_, &ht_ielen, pcur_bss->IELength-12);
|
|
if (p && ht_ielen > 0)
|
|
ht_cap = true;
|
|
|
|
prates = &pcur_bss->SupportedRates;
|
|
|
|
if (rtw_is_cckratesonly_included((u8 *)prates) == true) {
|
|
if (ht_cap)
|
|
snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bn");
|
|
else
|
|
snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11b");
|
|
} else if ((rtw_is_cckrates_included((u8 *)prates)) == true) {
|
|
if (ht_cap)
|
|
snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bgn");
|
|
else
|
|
snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bg");
|
|
} else {
|
|
if (pcur_bss->Configuration.DSConfig > 14) {
|
|
if (ht_cap)
|
|
snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11an");
|
|
else
|
|
snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11a");
|
|
} else {
|
|
if (ht_cap)
|
|
snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11gn");
|
|
else
|
|
snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11g");
|
|
}
|
|
}
|
|
} else {
|
|
snprintf(wrqu->name, IFNAMSIZ, "unassociated");
|
|
}
|
|
|
|
_func_exit_;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_set_freq(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
_func_enter_;
|
|
|
|
RT_TRACE(_module_rtl871x_mlme_c_, _drv_notice_, ("+rtw_wx_set_freq\n"));
|
|
|
|
_func_exit_;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_get_freq(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network;
|
|
|
|
if (check_fwstate(pmlmepriv, _FW_LINKED)) {
|
|
/* wrqu->freq.m = ieee80211_wlan_frequencies[pcur_bss->Configuration.DSConfig-1] * 100000; */
|
|
wrqu->freq.m = rtw_ch2freq(pcur_bss->Configuration.DSConfig) * 100000;
|
|
wrqu->freq.e = 1;
|
|
wrqu->freq.i = pcur_bss->Configuration.DSConfig;
|
|
} else {
|
|
wrqu->freq.m = rtw_ch2freq(padapter->mlmeextpriv.cur_channel) * 100000;
|
|
wrqu->freq.e = 1;
|
|
wrqu->freq.i = padapter->mlmeextpriv.cur_channel;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_set_mode(struct net_device *dev, struct iw_request_info *a,
|
|
union iwreq_data *wrqu, char *b)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
enum ndis_802_11_network_infra networkType;
|
|
int ret = 0;
|
|
|
|
_func_enter_;
|
|
|
|
if (_FAIL == rtw_pwr_wakeup(padapter)) {
|
|
ret = -EPERM;
|
|
goto exit;
|
|
}
|
|
|
|
if (!padapter->hw_init_completed) {
|
|
ret = -EPERM;
|
|
goto exit;
|
|
}
|
|
|
|
switch (wrqu->mode) {
|
|
case IW_MODE_AUTO:
|
|
networkType = Ndis802_11AutoUnknown;
|
|
DBG_88E("set_mode = IW_MODE_AUTO\n");
|
|
break;
|
|
case IW_MODE_ADHOC:
|
|
networkType = Ndis802_11IBSS;
|
|
DBG_88E("set_mode = IW_MODE_ADHOC\n");
|
|
break;
|
|
case IW_MODE_MASTER:
|
|
networkType = Ndis802_11APMode;
|
|
DBG_88E("set_mode = IW_MODE_MASTER\n");
|
|
break;
|
|
case IW_MODE_INFRA:
|
|
networkType = Ndis802_11Infrastructure;
|
|
DBG_88E("set_mode = IW_MODE_INFRA\n");
|
|
break;
|
|
default:
|
|
ret = -EINVAL;
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("\n Mode: %s is not supported\n", iw_operation_mode[wrqu->mode]));
|
|
goto exit;
|
|
}
|
|
if (rtw_set_802_11_infrastructure_mode(padapter, networkType) == false) {
|
|
ret = -EPERM;
|
|
goto exit;
|
|
}
|
|
rtw_setopmode_cmd(padapter, networkType);
|
|
exit:
|
|
_func_exit_;
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_get_mode(struct net_device *dev, struct iw_request_info *a,
|
|
union iwreq_data *wrqu, char *b)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
|
|
RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, (" rtw_wx_get_mode\n"));
|
|
|
|
_func_enter_;
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_STATION_STATE))
|
|
wrqu->mode = IW_MODE_INFRA;
|
|
else if ((check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE)) ||
|
|
(check_fwstate(pmlmepriv, WIFI_ADHOC_STATE)))
|
|
wrqu->mode = IW_MODE_ADHOC;
|
|
else if (check_fwstate(pmlmepriv, WIFI_AP_STATE))
|
|
wrqu->mode = IW_MODE_MASTER;
|
|
else
|
|
wrqu->mode = IW_MODE_AUTO;
|
|
|
|
_func_exit_;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_set_pmkid(struct net_device *dev,
|
|
struct iw_request_info *a,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
u8 j, blInserted = false;
|
|
int ret = false;
|
|
struct security_priv *psecuritypriv = &padapter->securitypriv;
|
|
struct iw_pmksa *pPMK = (struct iw_pmksa *)extra;
|
|
u8 strZeroMacAddress[ETH_ALEN] = {0x00};
|
|
u8 strIssueBssid[ETH_ALEN] = {0x00};
|
|
|
|
memcpy(strIssueBssid, pPMK->bssid.sa_data, ETH_ALEN);
|
|
if (pPMK->cmd == IW_PMKSA_ADD) {
|
|
DBG_88E("[rtw_wx_set_pmkid] IW_PMKSA_ADD!\n");
|
|
if (!memcmp(strIssueBssid, strZeroMacAddress, ETH_ALEN) == true)
|
|
return ret;
|
|
else
|
|
ret = true;
|
|
blInserted = false;
|
|
|
|
/* overwrite PMKID */
|
|
for (j = 0; j < NUM_PMKID_CACHE; j++) {
|
|
if (!memcmp(psecuritypriv->PMKIDList[j].Bssid, strIssueBssid, ETH_ALEN)) {
|
|
/* BSSID is matched, the same AP => rewrite with new PMKID. */
|
|
DBG_88E("[rtw_wx_set_pmkid] BSSID exists in the PMKList.\n");
|
|
memcpy(psecuritypriv->PMKIDList[j].PMKID, pPMK->pmkid, IW_PMKID_LEN);
|
|
psecuritypriv->PMKIDList[j].bUsed = true;
|
|
psecuritypriv->PMKIDIndex = j+1;
|
|
blInserted = true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!blInserted) {
|
|
/* Find a new entry */
|
|
DBG_88E("[rtw_wx_set_pmkid] Use the new entry index = %d for this PMKID.\n",
|
|
psecuritypriv->PMKIDIndex);
|
|
|
|
memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, strIssueBssid, ETH_ALEN);
|
|
memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, pPMK->pmkid, IW_PMKID_LEN);
|
|
|
|
psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].bUsed = true;
|
|
psecuritypriv->PMKIDIndex++;
|
|
if (psecuritypriv->PMKIDIndex == 16)
|
|
psecuritypriv->PMKIDIndex = 0;
|
|
}
|
|
} else if (pPMK->cmd == IW_PMKSA_REMOVE) {
|
|
DBG_88E("[rtw_wx_set_pmkid] IW_PMKSA_REMOVE!\n");
|
|
ret = true;
|
|
for (j = 0; j < NUM_PMKID_CACHE; j++) {
|
|
if (!memcmp(psecuritypriv->PMKIDList[j].Bssid, strIssueBssid, ETH_ALEN)) {
|
|
/* BSSID is matched, the same AP => Remove this PMKID information and reset it. */
|
|
_rtw_memset(psecuritypriv->PMKIDList[j].Bssid, 0x00, ETH_ALEN);
|
|
psecuritypriv->PMKIDList[j].bUsed = false;
|
|
break;
|
|
}
|
|
}
|
|
} else if (pPMK->cmd == IW_PMKSA_FLUSH) {
|
|
DBG_88E("[rtw_wx_set_pmkid] IW_PMKSA_FLUSH!\n");
|
|
_rtw_memset(&psecuritypriv->PMKIDList[0], 0x00, sizeof(struct rt_pmkid_list) * NUM_PMKID_CACHE);
|
|
psecuritypriv->PMKIDIndex = 0;
|
|
ret = true;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_get_sens(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
wrqu->sens.value = 0;
|
|
wrqu->sens.fixed = 0; /* no auto select */
|
|
wrqu->sens.disabled = 1;
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_get_range(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct iw_range *range = (struct iw_range *)extra;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv;
|
|
|
|
u16 val;
|
|
int i;
|
|
|
|
_func_enter_;
|
|
|
|
RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_range. cmd_code =%x\n", info->cmd));
|
|
|
|
wrqu->data.length = sizeof(*range);
|
|
_rtw_memset(range, 0, sizeof(*range));
|
|
|
|
/* Let's try to keep this struct in the same order as in
|
|
* linux/include/wireless.h
|
|
*/
|
|
|
|
/* TODO: See what values we can set, and remove the ones we can't
|
|
* set, or fill them with some default data.
|
|
*/
|
|
|
|
/* ~5 Mb/s real (802.11b) */
|
|
range->throughput = 5 * 1000 * 1000;
|
|
|
|
/* signal level threshold range */
|
|
|
|
/* percent values between 0 and 100. */
|
|
range->max_qual.qual = 100;
|
|
range->max_qual.level = 100;
|
|
range->max_qual.noise = 100;
|
|
range->max_qual.updated = 7; /* Updated all three */
|
|
|
|
range->avg_qual.qual = 92; /* > 8% missed beacons is 'bad' */
|
|
/* TODO: Find real 'good' to 'bad' threshol value for RSSI */
|
|
range->avg_qual.level = 20 + -98;
|
|
range->avg_qual.noise = 0;
|
|
range->avg_qual.updated = 7; /* Updated all three */
|
|
|
|
range->num_bitrates = RATE_COUNT;
|
|
|
|
for (i = 0; i < RATE_COUNT && i < IW_MAX_BITRATES; i++)
|
|
range->bitrate[i] = rtw_rates[i];
|
|
|
|
range->min_frag = MIN_FRAG_THRESHOLD;
|
|
range->max_frag = MAX_FRAG_THRESHOLD;
|
|
|
|
range->pm_capa = 0;
|
|
|
|
range->we_version_compiled = WIRELESS_EXT;
|
|
range->we_version_source = 16;
|
|
|
|
for (i = 0, val = 0; i < MAX_CHANNEL_NUM; i++) {
|
|
/* Include only legal frequencies for some countries */
|
|
if (pmlmeext->channel_set[i].ChannelNum != 0) {
|
|
range->freq[val].i = pmlmeext->channel_set[i].ChannelNum;
|
|
range->freq[val].m = rtw_ch2freq(pmlmeext->channel_set[i].ChannelNum) * 100000;
|
|
range->freq[val].e = 1;
|
|
val++;
|
|
}
|
|
|
|
if (val == IW_MAX_FREQUENCIES)
|
|
break;
|
|
}
|
|
|
|
range->num_channels = val;
|
|
range->num_frequency = val;
|
|
|
|
/* The following code will proivde the security capability to network manager. */
|
|
/* If the driver doesn't provide this capability to network manager, */
|
|
/* the WPA/WPA2 routers can't be choosen in the network manager. */
|
|
|
|
/*
|
|
#define IW_SCAN_CAPA_NONE 0x00
|
|
#define IW_SCAN_CAPA_ESSID 0x01
|
|
#define IW_SCAN_CAPA_BSSID 0x02
|
|
#define IW_SCAN_CAPA_CHANNEL 0x04
|
|
#define IW_SCAN_CAPA_MODE 0x08
|
|
#define IW_SCAN_CAPA_RATE 0x10
|
|
#define IW_SCAN_CAPA_TYPE 0x20
|
|
#define IW_SCAN_CAPA_TIME 0x40
|
|
*/
|
|
|
|
range->enc_capa = IW_ENC_CAPA_WPA | IW_ENC_CAPA_WPA2 |
|
|
IW_ENC_CAPA_CIPHER_TKIP | IW_ENC_CAPA_CIPHER_CCMP;
|
|
|
|
range->scan_capa = IW_SCAN_CAPA_ESSID | IW_SCAN_CAPA_TYPE |
|
|
IW_SCAN_CAPA_BSSID | IW_SCAN_CAPA_CHANNEL |
|
|
IW_SCAN_CAPA_MODE | IW_SCAN_CAPA_RATE;
|
|
_func_exit_;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* set bssid flow */
|
|
/* s1. rtw_set_802_11_infrastructure_mode() */
|
|
/* s2. rtw_set_802_11_authentication_mode() */
|
|
/* s3. set_802_11_encryption_mode() */
|
|
/* s4. rtw_set_802_11_bssid() */
|
|
static int rtw_wx_set_wap(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *awrq,
|
|
char *extra)
|
|
{
|
|
unsigned long irqL;
|
|
uint ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct sockaddr *temp = (struct sockaddr *)awrq;
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct list_head *phead;
|
|
u8 *dst_bssid, *src_bssid;
|
|
struct __queue *queue = &(pmlmepriv->scanned_queue);
|
|
struct wlan_network *pnetwork = NULL;
|
|
enum ndis_802_11_auth_mode authmode;
|
|
|
|
_func_enter_;
|
|
|
|
if (_FAIL == rtw_pwr_wakeup(padapter)) {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
if (!padapter->bup) {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
if (temp->sa_family != ARPHRD_ETHER) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
authmode = padapter->securitypriv.ndisauthtype;
|
|
_enter_critical_bh(&queue->lock, &irqL);
|
|
phead = get_list_head(queue);
|
|
pmlmepriv->pscanned = get_next(phead);
|
|
|
|
while (1) {
|
|
if ((rtw_end_of_queue_search(phead, pmlmepriv->pscanned)) == true)
|
|
break;
|
|
|
|
pnetwork = LIST_CONTAINOR(pmlmepriv->pscanned, struct wlan_network, list);
|
|
|
|
pmlmepriv->pscanned = get_next(pmlmepriv->pscanned);
|
|
|
|
dst_bssid = pnetwork->network.MacAddress;
|
|
|
|
src_bssid = temp->sa_data;
|
|
|
|
if ((!memcmp(dst_bssid, src_bssid, ETH_ALEN))) {
|
|
if (!rtw_set_802_11_infrastructure_mode(padapter, pnetwork->network.InfrastructureMode)) {
|
|
ret = -1;
|
|
_exit_critical_bh(&queue->lock, &irqL);
|
|
goto exit;
|
|
}
|
|
|
|
break;
|
|
}
|
|
}
|
|
_exit_critical_bh(&queue->lock, &irqL);
|
|
|
|
rtw_set_802_11_authentication_mode(padapter, authmode);
|
|
/* set_802_11_encryption_mode(padapter, padapter->securitypriv.ndisencryptstatus); */
|
|
if (rtw_set_802_11_bssid(padapter, temp->sa_data) == false) {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
exit:
|
|
|
|
_func_exit_;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_get_wap(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network;
|
|
|
|
wrqu->ap_addr.sa_family = ARPHRD_ETHER;
|
|
|
|
_rtw_memset(wrqu->ap_addr.sa_data, 0, ETH_ALEN);
|
|
|
|
RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_wap\n"));
|
|
|
|
_func_enter_;
|
|
|
|
if (((check_fwstate(pmlmepriv, _FW_LINKED)) == true) ||
|
|
((check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE)) == true) ||
|
|
((check_fwstate(pmlmepriv, WIFI_AP_STATE)) == true))
|
|
memcpy(wrqu->ap_addr.sa_data, pcur_bss->MacAddress, ETH_ALEN);
|
|
else
|
|
_rtw_memset(wrqu->ap_addr.sa_data, 0, ETH_ALEN);
|
|
|
|
_func_exit_;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_set_mlme(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
u16 reason;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct iw_mlme *mlme = (struct iw_mlme *)extra;
|
|
|
|
if (mlme == NULL)
|
|
return -1;
|
|
|
|
DBG_88E("%s\n", __func__);
|
|
|
|
reason = mlme->reason_code;
|
|
|
|
DBG_88E("%s, cmd =%d, reason =%d\n", __func__, mlme->cmd, reason);
|
|
|
|
switch (mlme->cmd) {
|
|
case IW_MLME_DEAUTH:
|
|
if (!rtw_set_802_11_disassociate(padapter))
|
|
ret = -1;
|
|
break;
|
|
case IW_MLME_DISASSOC:
|
|
if (!rtw_set_802_11_disassociate(padapter))
|
|
ret = -1;
|
|
break;
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_set_scan(struct net_device *dev, struct iw_request_info *a,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
u8 _status = false;
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
struct ndis_802_11_ssid ssid[RTW_SSID_SCAN_AMOUNT];
|
|
unsigned long irqL;
|
|
#ifdef CONFIG_88EU_P2P
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
#endif /* CONFIG_88EU_P2P */
|
|
RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_set_scan\n"));
|
|
|
|
_func_enter_;
|
|
if (padapter->registrypriv.mp_mode == 1) {
|
|
if (check_fwstate(pmlmepriv, WIFI_MP_STATE)) {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
}
|
|
if (_FAIL == rtw_pwr_wakeup(padapter)) {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
if (padapter->bDriverStopped) {
|
|
DBG_88E("bDriverStopped =%d\n", padapter->bDriverStopped);
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
if (!padapter->bup) {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
if (!padapter->hw_init_completed) {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
/* When Busy Traffic, driver do not site survey. So driver return success. */
|
|
/* wpa_supplicant will not issue SIOCSIWSCAN cmd again after scan timeout. */
|
|
/* modify by thomas 2011-02-22. */
|
|
if (pmlmepriv->LinkDetectInfo.bBusyTraffic) {
|
|
indicate_wx_scan_complete_event(padapter);
|
|
goto exit;
|
|
}
|
|
|
|
if (check_fwstate(pmlmepriv, _FW_UNDER_SURVEY|_FW_UNDER_LINKING)) {
|
|
indicate_wx_scan_complete_event(padapter);
|
|
goto exit;
|
|
}
|
|
|
|
/* For the DMP WiFi Display project, the driver won't to scan because */
|
|
/* the pmlmepriv->scan_interval is always equal to 3. */
|
|
/* So, the wpa_supplicant won't find out the WPS SoftAP. */
|
|
|
|
#ifdef CONFIG_88EU_P2P
|
|
if (pwdinfo->p2p_state != P2P_STATE_NONE) {
|
|
rtw_p2p_set_pre_state(pwdinfo, rtw_p2p_state(pwdinfo));
|
|
rtw_p2p_set_state(pwdinfo, P2P_STATE_FIND_PHASE_SEARCH);
|
|
rtw_p2p_findphase_ex_set(pwdinfo, P2P_FINDPHASE_EX_FULL);
|
|
rtw_free_network_queue(padapter, true);
|
|
}
|
|
#endif /* CONFIG_88EU_P2P */
|
|
|
|
_rtw_memset(ssid, 0, sizeof(struct ndis_802_11_ssid)*RTW_SSID_SCAN_AMOUNT);
|
|
|
|
if (wrqu->data.length == sizeof(struct iw_scan_req)) {
|
|
struct iw_scan_req *req = (struct iw_scan_req *)extra;
|
|
|
|
if (wrqu->data.flags & IW_SCAN_THIS_ESSID) {
|
|
int len = min((int)req->essid_len, IW_ESSID_MAX_SIZE);
|
|
|
|
memcpy(ssid[0].Ssid, req->essid, len);
|
|
ssid[0].SsidLength = len;
|
|
|
|
DBG_88E("IW_SCAN_THIS_ESSID, ssid =%s, len =%d\n", req->essid, req->essid_len);
|
|
|
|
_enter_critical_bh(&pmlmepriv->lock, &irqL);
|
|
|
|
_status = rtw_sitesurvey_cmd(padapter, ssid, 1, NULL, 0);
|
|
|
|
_exit_critical_bh(&pmlmepriv->lock, &irqL);
|
|
} else if (req->scan_type == IW_SCAN_TYPE_PASSIVE) {
|
|
DBG_88E("rtw_wx_set_scan, req->scan_type == IW_SCAN_TYPE_PASSIVE\n");
|
|
}
|
|
} else {
|
|
if (wrqu->data.length >= WEXT_CSCAN_HEADER_SIZE &&
|
|
!memcmp(extra, WEXT_CSCAN_HEADER, WEXT_CSCAN_HEADER_SIZE)) {
|
|
int len = wrqu->data.length - WEXT_CSCAN_HEADER_SIZE;
|
|
char *pos = extra+WEXT_CSCAN_HEADER_SIZE;
|
|
char section;
|
|
char sec_len;
|
|
int ssid_index = 0;
|
|
|
|
while (len >= 1) {
|
|
section = *(pos++);
|
|
len -= 1;
|
|
|
|
switch (section) {
|
|
case WEXT_CSCAN_SSID_SECTION:
|
|
if (len < 1) {
|
|
len = 0;
|
|
break;
|
|
}
|
|
sec_len = *(pos++); len -= 1;
|
|
if (sec_len > 0 && sec_len <= len) {
|
|
ssid[ssid_index].SsidLength = sec_len;
|
|
memcpy(ssid[ssid_index].Ssid, pos, ssid[ssid_index].SsidLength);
|
|
ssid_index++;
|
|
}
|
|
pos += sec_len;
|
|
len -= sec_len;
|
|
break;
|
|
case WEXT_CSCAN_TYPE_SECTION:
|
|
case WEXT_CSCAN_CHANNEL_SECTION:
|
|
pos += 1;
|
|
len -= 1;
|
|
break;
|
|
case WEXT_CSCAN_PASV_DWELL_SECTION:
|
|
case WEXT_CSCAN_HOME_DWELL_SECTION:
|
|
case WEXT_CSCAN_ACTV_DWELL_SECTION:
|
|
pos += 2;
|
|
len -= 2;
|
|
break;
|
|
default:
|
|
len = 0; /* stop parsing */
|
|
}
|
|
}
|
|
|
|
/* it has still some scan paramater to parse, we only do this now... */
|
|
_status = rtw_set_802_11_bssid_list_scan(padapter, ssid, RTW_SSID_SCAN_AMOUNT);
|
|
} else {
|
|
_status = rtw_set_802_11_bssid_list_scan(padapter, NULL, 0);
|
|
}
|
|
}
|
|
|
|
if (!_status)
|
|
ret = -1;
|
|
|
|
exit:
|
|
|
|
_func_exit_;
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_get_scan(struct net_device *dev, struct iw_request_info *a,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
unsigned long irqL;
|
|
struct list_head *plist, *phead;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct __queue *queue = &(pmlmepriv->scanned_queue);
|
|
struct wlan_network *pnetwork = NULL;
|
|
char *ev = extra;
|
|
char *stop = ev + wrqu->data.length;
|
|
u32 ret = 0;
|
|
u32 cnt = 0;
|
|
u32 wait_for_surveydone;
|
|
int wait_status;
|
|
#ifdef CONFIG_88EU_P2P
|
|
struct wifidirect_info *pwdinfo = &padapter->wdinfo;
|
|
#endif /* CONFIG_88EU_P2P */
|
|
RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_scan\n"));
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, (" Start of Query SIOCGIWSCAN .\n"));
|
|
|
|
_func_enter_;
|
|
|
|
if (padapter->pwrctrlpriv.brfoffbyhw && padapter->bDriverStopped) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
#ifdef CONFIG_88EU_P2P
|
|
if (!rtw_p2p_chk_state(pwdinfo, P2P_STATE_NONE)) {
|
|
/* P2P is enabled */
|
|
wait_for_surveydone = 200;
|
|
} else {
|
|
/* P2P is disabled */
|
|
wait_for_surveydone = 100;
|
|
}
|
|
#else
|
|
{
|
|
wait_for_surveydone = 100;
|
|
}
|
|
#endif /* CONFIG_88EU_P2P */
|
|
|
|
wait_status = _FW_UNDER_SURVEY | _FW_UNDER_LINKING;
|
|
|
|
while (check_fwstate(pmlmepriv, wait_status)) {
|
|
rtw_msleep_os(30);
|
|
cnt++;
|
|
if (cnt > wait_for_surveydone)
|
|
break;
|
|
}
|
|
|
|
_enter_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
phead = get_list_head(queue);
|
|
plist = get_next(phead);
|
|
|
|
while (1) {
|
|
if (rtw_end_of_queue_search(phead, plist))
|
|
break;
|
|
|
|
if ((stop - ev) < SCAN_ITEM_SIZE) {
|
|
ret = -E2BIG;
|
|
break;
|
|
}
|
|
|
|
pnetwork = LIST_CONTAINOR(plist, struct wlan_network, list);
|
|
|
|
/* report network only if the current channel set contains the channel to which this network belongs */
|
|
if (rtw_ch_set_search_ch(padapter->mlmeextpriv.channel_set, pnetwork->network.Configuration.DSConfig) >= 0)
|
|
ev = translate_scan(padapter, a, pnetwork, ev, stop);
|
|
|
|
plist = get_next(plist);
|
|
}
|
|
|
|
_exit_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
wrqu->data.length = ev-extra;
|
|
wrqu->data.flags = 0;
|
|
|
|
exit:
|
|
_func_exit_;
|
|
return ret;
|
|
}
|
|
|
|
/* set ssid flow */
|
|
/* s1. rtw_set_802_11_infrastructure_mode() */
|
|
/* s2. set_802_11_authenticaion_mode() */
|
|
/* s3. set_802_11_encryption_mode() */
|
|
/* s4. rtw_set_802_11_ssid() */
|
|
static int rtw_wx_set_essid(struct net_device *dev,
|
|
struct iw_request_info *a,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
unsigned long irqL;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
struct __queue *queue = &pmlmepriv->scanned_queue;
|
|
struct list_head *phead;
|
|
struct wlan_network *pnetwork = NULL;
|
|
enum ndis_802_11_auth_mode authmode;
|
|
struct ndis_802_11_ssid ndis_ssid;
|
|
u8 *dst_ssid, *src_ssid;
|
|
|
|
uint ret = 0, len;
|
|
|
|
_func_enter_;
|
|
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
|
|
("+rtw_wx_set_essid: fw_state = 0x%08x\n", get_fwstate(pmlmepriv)));
|
|
if (_FAIL == rtw_pwr_wakeup(padapter)) {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
if (!padapter->bup) {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
if (wrqu->essid.length > IW_ESSID_MAX_SIZE) {
|
|
ret = -E2BIG;
|
|
goto exit;
|
|
}
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
authmode = padapter->securitypriv.ndisauthtype;
|
|
DBG_88E("=>%s\n", __func__);
|
|
if (wrqu->essid.flags && wrqu->essid.length) {
|
|
len = (wrqu->essid.length < IW_ESSID_MAX_SIZE) ? wrqu->essid.length : IW_ESSID_MAX_SIZE;
|
|
|
|
if (wrqu->essid.length != 33)
|
|
DBG_88E("ssid =%s, len =%d\n", extra, wrqu->essid.length);
|
|
|
|
_rtw_memset(&ndis_ssid, 0, sizeof(struct ndis_802_11_ssid));
|
|
ndis_ssid.SsidLength = len;
|
|
memcpy(ndis_ssid.Ssid, extra, len);
|
|
src_ssid = ndis_ssid.Ssid;
|
|
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, ("rtw_wx_set_essid: ssid =[%s]\n", src_ssid));
|
|
_enter_critical_bh(&queue->lock, &irqL);
|
|
phead = get_list_head(queue);
|
|
pmlmepriv->pscanned = get_next(phead);
|
|
|
|
while (1) {
|
|
if (rtw_end_of_queue_search(phead, pmlmepriv->pscanned) == true) {
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_warning_,
|
|
("rtw_wx_set_essid: scan_q is empty, set ssid to check if scanning again!\n"));
|
|
|
|
break;
|
|
}
|
|
|
|
pnetwork = LIST_CONTAINOR(pmlmepriv->pscanned, struct wlan_network, list);
|
|
|
|
pmlmepriv->pscanned = get_next(pmlmepriv->pscanned);
|
|
|
|
dst_ssid = pnetwork->network.Ssid.Ssid;
|
|
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
|
|
("rtw_wx_set_essid: dst_ssid =%s\n",
|
|
pnetwork->network.Ssid.Ssid));
|
|
|
|
if ((!memcmp(dst_ssid, src_ssid, ndis_ssid.SsidLength)) &&
|
|
(pnetwork->network.Ssid.SsidLength == ndis_ssid.SsidLength)) {
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
|
|
("rtw_wx_set_essid: find match, set infra mode\n"));
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE) == true) {
|
|
if (pnetwork->network.InfrastructureMode != pmlmepriv->cur_network.network.InfrastructureMode)
|
|
continue;
|
|
}
|
|
|
|
if (!rtw_set_802_11_infrastructure_mode(padapter, pnetwork->network.InfrastructureMode)) {
|
|
ret = -1;
|
|
_exit_critical_bh(&queue->lock, &irqL);
|
|
goto exit;
|
|
}
|
|
|
|
break;
|
|
}
|
|
}
|
|
_exit_critical_bh(&queue->lock, &irqL);
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
|
|
("set ssid: set_802_11_auth. mode =%d\n", authmode));
|
|
rtw_set_802_11_authentication_mode(padapter, authmode);
|
|
if (rtw_set_802_11_ssid(padapter, &ndis_ssid) == false) {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
}
|
|
|
|
exit:
|
|
|
|
DBG_88E("<=%s, ret %d\n", __func__, ret);
|
|
|
|
_func_exit_;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_get_essid(struct net_device *dev,
|
|
struct iw_request_info *a,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
u32 len, ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network;
|
|
|
|
RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_essid\n"));
|
|
|
|
_func_enter_;
|
|
|
|
if ((check_fwstate(pmlmepriv, _FW_LINKED)) ||
|
|
(check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE))) {
|
|
len = pcur_bss->Ssid.SsidLength;
|
|
|
|
wrqu->essid.length = len;
|
|
|
|
memcpy(extra, pcur_bss->Ssid.Ssid, len);
|
|
|
|
wrqu->essid.flags = 1;
|
|
} else {
|
|
ret = -1;
|
|
goto exit;
|
|
}
|
|
|
|
exit:
|
|
|
|
_func_exit_;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_set_rate(struct net_device *dev,
|
|
struct iw_request_info *a,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int i, ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
u8 datarates[NumRates];
|
|
u32 target_rate = wrqu->bitrate.value;
|
|
u32 fixed = wrqu->bitrate.fixed;
|
|
u32 ratevalue = 0;
|
|
u8 mpdatarate[NumRates] = {11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0, 0xff};
|
|
|
|
_func_enter_;
|
|
|
|
RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, (" rtw_wx_set_rate\n"));
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, ("target_rate = %d, fixed = %d\n", target_rate, fixed));
|
|
|
|
if (target_rate == -1) {
|
|
ratevalue = 11;
|
|
goto set_rate;
|
|
}
|
|
target_rate = target_rate/100000;
|
|
|
|
switch (target_rate) {
|
|
case 10:
|
|
ratevalue = 0;
|
|
break;
|
|
case 20:
|
|
ratevalue = 1;
|
|
break;
|
|
case 55:
|
|
ratevalue = 2;
|
|
break;
|
|
case 60:
|
|
ratevalue = 3;
|
|
break;
|
|
case 90:
|
|
ratevalue = 4;
|
|
break;
|
|
case 110:
|
|
ratevalue = 5;
|
|
break;
|
|
case 120:
|
|
ratevalue = 6;
|
|
break;
|
|
case 180:
|
|
ratevalue = 7;
|
|
break;
|
|
case 240:
|
|
ratevalue = 8;
|
|
break;
|
|
case 360:
|
|
ratevalue = 9;
|
|
break;
|
|
case 480:
|
|
ratevalue = 10;
|
|
break;
|
|
case 540:
|
|
ratevalue = 11;
|
|
break;
|
|
default:
|
|
ratevalue = 11;
|
|
break;
|
|
}
|
|
|
|
set_rate:
|
|
|
|
for (i = 0; i < NumRates; i++) {
|
|
if (ratevalue == mpdatarate[i]) {
|
|
datarates[i] = mpdatarate[i];
|
|
if (fixed == 0)
|
|
break;
|
|
} else {
|
|
datarates[i] = 0xff;
|
|
}
|
|
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, ("datarate_inx =%d\n", datarates[i]));
|
|
}
|
|
|
|
if (rtw_setdatarate_cmd(padapter, datarates) != _SUCCESS) {
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("rtw_wx_set_rate Fail!!!\n"));
|
|
ret = -1;
|
|
}
|
|
|
|
_func_exit_;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_get_rate(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
u16 max_rate = 0;
|
|
|
|
max_rate = rtw_get_cur_max_rate((struct adapter *)rtw_netdev_priv(dev));
|
|
|
|
if (max_rate == 0)
|
|
return -EPERM;
|
|
|
|
wrqu->bitrate.fixed = 0; /* no auto select */
|
|
wrqu->bitrate.value = max_rate * 100000;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_set_rts(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
_func_enter_;
|
|
|
|
if (wrqu->rts.disabled) {
|
|
padapter->registrypriv.rts_thresh = 2347;
|
|
} else {
|
|
if (wrqu->rts.value < 0 ||
|
|
wrqu->rts.value > 2347)
|
|
return -EINVAL;
|
|
|
|
padapter->registrypriv.rts_thresh = wrqu->rts.value;
|
|
}
|
|
|
|
DBG_88E("%s, rts_thresh =%d\n", __func__, padapter->registrypriv.rts_thresh);
|
|
|
|
_func_exit_;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_get_rts(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
_func_enter_;
|
|
|
|
DBG_88E("%s, rts_thresh =%d\n", __func__, padapter->registrypriv.rts_thresh);
|
|
|
|
wrqu->rts.value = padapter->registrypriv.rts_thresh;
|
|
wrqu->rts.fixed = 0; /* no auto select */
|
|
/* wrqu->rts.disabled = (wrqu->rts.value == DEFAULT_RTS_THRESHOLD); */
|
|
|
|
_func_exit_;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_set_frag(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
_func_enter_;
|
|
|
|
if (wrqu->frag.disabled) {
|
|
padapter->xmitpriv.frag_len = MAX_FRAG_THRESHOLD;
|
|
} else {
|
|
if (wrqu->frag.value < MIN_FRAG_THRESHOLD ||
|
|
wrqu->frag.value > MAX_FRAG_THRESHOLD)
|
|
return -EINVAL;
|
|
|
|
padapter->xmitpriv.frag_len = wrqu->frag.value & ~0x1;
|
|
}
|
|
|
|
DBG_88E("%s, frag_len =%d\n", __func__, padapter->xmitpriv.frag_len);
|
|
|
|
_func_exit_;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_get_frag(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
_func_enter_;
|
|
|
|
DBG_88E("%s, frag_len =%d\n", __func__, padapter->xmitpriv.frag_len);
|
|
|
|
wrqu->frag.value = padapter->xmitpriv.frag_len;
|
|
wrqu->frag.fixed = 0; /* no auto select */
|
|
|
|
_func_exit_;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_get_retry(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
wrqu->retry.value = 7;
|
|
wrqu->retry.fixed = 0; /* no auto select */
|
|
wrqu->retry.disabled = 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_set_enc(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *keybuf)
|
|
{
|
|
u32 key, ret = 0;
|
|
u32 keyindex_provided;
|
|
struct ndis_802_11_wep wep;
|
|
enum ndis_802_11_auth_mode authmode;
|
|
|
|
struct iw_point *erq = &(wrqu->encoding);
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct pwrctrl_priv *pwrpriv = &padapter->pwrctrlpriv;
|
|
DBG_88E("+rtw_wx_set_enc, flags = 0x%x\n", erq->flags);
|
|
|
|
_rtw_memset(&wep, 0, sizeof(struct ndis_802_11_wep));
|
|
|
|
key = erq->flags & IW_ENCODE_INDEX;
|
|
|
|
_func_enter_;
|
|
|
|
if (erq->flags & IW_ENCODE_DISABLED) {
|
|
DBG_88E("EncryptionDisabled\n");
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
|
|
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */
|
|
authmode = Ndis802_11AuthModeOpen;
|
|
padapter->securitypriv.ndisauthtype = authmode;
|
|
|
|
goto exit;
|
|
}
|
|
|
|
if (key) {
|
|
if (key > WEP_KEYS)
|
|
return -EINVAL;
|
|
key--;
|
|
keyindex_provided = 1;
|
|
} else {
|
|
keyindex_provided = 0;
|
|
key = padapter->securitypriv.dot11PrivacyKeyIndex;
|
|
DBG_88E("rtw_wx_set_enc, key =%d\n", key);
|
|
}
|
|
|
|
/* set authentication mode */
|
|
if (erq->flags & IW_ENCODE_OPEN) {
|
|
DBG_88E("rtw_wx_set_enc():IW_ENCODE_OPEN\n");
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;/* Ndis802_11EncryptionDisabled; */
|
|
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open;
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
|
|
authmode = Ndis802_11AuthModeOpen;
|
|
padapter->securitypriv.ndisauthtype = authmode;
|
|
} else if (erq->flags & IW_ENCODE_RESTRICTED) {
|
|
DBG_88E("rtw_wx_set_enc():IW_ENCODE_RESTRICTED\n");
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
|
|
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Shared;
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_;
|
|
authmode = Ndis802_11AuthModeShared;
|
|
padapter->securitypriv.ndisauthtype = authmode;
|
|
} else {
|
|
DBG_88E("rtw_wx_set_enc():erq->flags = 0x%x\n", erq->flags);
|
|
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;/* Ndis802_11EncryptionDisabled; */
|
|
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
|
|
authmode = Ndis802_11AuthModeOpen;
|
|
padapter->securitypriv.ndisauthtype = authmode;
|
|
}
|
|
|
|
wep.KeyIndex = key;
|
|
if (erq->length > 0) {
|
|
wep.KeyLength = erq->length <= 5 ? 5 : 13;
|
|
|
|
wep.Length = wep.KeyLength + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial);
|
|
} else {
|
|
wep.KeyLength = 0;
|
|
|
|
if (keyindex_provided == 1) {
|
|
/* set key_id only, no given KeyMaterial(erq->length == 0). */
|
|
padapter->securitypriv.dot11PrivacyKeyIndex = key;
|
|
|
|
DBG_88E("(keyindex_provided == 1), keyid =%d, key_len =%d\n", key, padapter->securitypriv.dot11DefKeylen[key]);
|
|
|
|
switch (padapter->securitypriv.dot11DefKeylen[key]) {
|
|
case 5:
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
|
|
break;
|
|
case 13:
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_;
|
|
break;
|
|
default:
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
|
|
break;
|
|
}
|
|
|
|
goto exit;
|
|
}
|
|
}
|
|
|
|
wep.KeyIndex |= 0x80000000;
|
|
|
|
memcpy(wep.KeyMaterial, keybuf, wep.KeyLength);
|
|
|
|
if (rtw_set_802_11_add_wep(padapter, &wep) == false) {
|
|
if (rf_on == pwrpriv->rf_pwrstate)
|
|
ret = -EOPNOTSUPP;
|
|
goto exit;
|
|
}
|
|
|
|
exit:
|
|
|
|
_func_exit_;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_get_enc(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *keybuf)
|
|
{
|
|
uint key, ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct iw_point *erq = &(wrqu->encoding);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
|
|
_func_enter_;
|
|
|
|
if (check_fwstate(pmlmepriv, _FW_LINKED) != true) {
|
|
if (!check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE)) {
|
|
erq->length = 0;
|
|
erq->flags |= IW_ENCODE_DISABLED;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
key = erq->flags & IW_ENCODE_INDEX;
|
|
|
|
if (key) {
|
|
if (key > WEP_KEYS)
|
|
return -EINVAL;
|
|
key--;
|
|
} else {
|
|
key = padapter->securitypriv.dot11PrivacyKeyIndex;
|
|
}
|
|
|
|
erq->flags = key + 1;
|
|
|
|
switch (padapter->securitypriv.ndisencryptstatus) {
|
|
case Ndis802_11EncryptionNotSupported:
|
|
case Ndis802_11EncryptionDisabled:
|
|
erq->length = 0;
|
|
erq->flags |= IW_ENCODE_DISABLED;
|
|
break;
|
|
case Ndis802_11Encryption1Enabled:
|
|
erq->length = padapter->securitypriv.dot11DefKeylen[key];
|
|
if (erq->length) {
|
|
memcpy(keybuf, padapter->securitypriv.dot11DefKey[key].skey, padapter->securitypriv.dot11DefKeylen[key]);
|
|
|
|
erq->flags |= IW_ENCODE_ENABLED;
|
|
|
|
if (padapter->securitypriv.ndisauthtype == Ndis802_11AuthModeOpen)
|
|
erq->flags |= IW_ENCODE_OPEN;
|
|
else if (padapter->securitypriv.ndisauthtype == Ndis802_11AuthModeShared)
|
|
erq->flags |= IW_ENCODE_RESTRICTED;
|
|
} else {
|
|
erq->length = 0;
|
|
erq->flags |= IW_ENCODE_DISABLED;
|
|
}
|
|
break;
|
|
case Ndis802_11Encryption2Enabled:
|
|
case Ndis802_11Encryption3Enabled:
|
|
erq->length = 16;
|
|
erq->flags |= (IW_ENCODE_ENABLED | IW_ENCODE_OPEN | IW_ENCODE_NOKEY);
|
|
break;
|
|
default:
|
|
erq->length = 0;
|
|
erq->flags |= IW_ENCODE_DISABLED;
|
|
break;
|
|
}
|
|
_func_exit_;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_get_power(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
wrqu->power.value = 0;
|
|
wrqu->power.fixed = 0; /* no auto select */
|
|
wrqu->power.disabled = 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_set_gen_ie(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
ret = rtw_set_wpa_ie(padapter, extra, wrqu->data.length);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_set_auth(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct iw_param *param = (struct iw_param *)&(wrqu->param);
|
|
int ret = 0;
|
|
|
|
switch (param->flags & IW_AUTH_INDEX) {
|
|
case IW_AUTH_WPA_VERSION:
|
|
break;
|
|
case IW_AUTH_CIPHER_PAIRWISE:
|
|
|
|
break;
|
|
case IW_AUTH_CIPHER_GROUP:
|
|
|
|
break;
|
|
case IW_AUTH_KEY_MGMT:
|
|
/*
|
|
* ??? does not use these parameters
|
|
*/
|
|
break;
|
|
case IW_AUTH_TKIP_COUNTERMEASURES:
|
|
if (param->value) {
|
|
/* wpa_supplicant is enabling the tkip countermeasure. */
|
|
padapter->securitypriv.btkip_countermeasure = true;
|
|
} else {
|
|
/* wpa_supplicant is disabling the tkip countermeasure. */
|
|
padapter->securitypriv.btkip_countermeasure = false;
|
|
}
|
|
break;
|
|
case IW_AUTH_DROP_UNENCRYPTED:
|
|
/* HACK:
|
|
*
|
|
* wpa_supplicant calls set_wpa_enabled when the driver
|
|
* is loaded and unloaded, regardless of if WPA is being
|
|
* used. No other calls are made which can be used to
|
|
* determine if encryption will be used or not prior to
|
|
* association being expected. If encryption is not being
|
|
* used, drop_unencrypted is set to false, else true -- we
|
|
* can use this to determine if the CAP_PRIVACY_ON bit should
|
|
* be set.
|
|
*/
|
|
|
|
if (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption1Enabled)
|
|
break;/* it means init value, or using wep, ndisencryptstatus = Ndis802_11Encryption1Enabled, */
|
|
/* then it needn't reset it; */
|
|
|
|
if (param->value) {
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
|
|
padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
|
|
padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
|
|
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */
|
|
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeOpen;
|
|
}
|
|
|
|
break;
|
|
case IW_AUTH_80211_AUTH_ALG:
|
|
/*
|
|
* It's the starting point of a link layer connection using wpa_supplicant
|
|
*/
|
|
if (check_fwstate(&padapter->mlmepriv, _FW_LINKED)) {
|
|
LeaveAllPowerSaveMode(padapter);
|
|
rtw_disassoc_cmd(padapter, 500, false);
|
|
DBG_88E("%s...call rtw_indicate_disconnect\n ", __func__);
|
|
rtw_indicate_disconnect(padapter);
|
|
rtw_free_assoc_resources(padapter, 1);
|
|
}
|
|
ret = wpa_set_auth_algs(dev, (u32)param->value);
|
|
break;
|
|
case IW_AUTH_WPA_ENABLED:
|
|
break;
|
|
case IW_AUTH_RX_UNENCRYPTED_EAPOL:
|
|
break;
|
|
case IW_AUTH_PRIVACY_INVOKED:
|
|
break;
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_set_enc_ext(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
char *alg_name;
|
|
u32 param_len;
|
|
struct ieee_param *param = NULL;
|
|
struct iw_point *pencoding = &wrqu->encoding;
|
|
struct iw_encode_ext *pext = (struct iw_encode_ext *)extra;
|
|
int ret = 0;
|
|
|
|
param_len = sizeof(struct ieee_param) + pext->key_len;
|
|
param = (struct ieee_param *)rtw_malloc(param_len);
|
|
if (param == NULL)
|
|
return -1;
|
|
|
|
_rtw_memset(param, 0, param_len);
|
|
|
|
param->cmd = IEEE_CMD_SET_ENCRYPTION;
|
|
_rtw_memset(param->sta_addr, 0xff, ETH_ALEN);
|
|
|
|
switch (pext->alg) {
|
|
case IW_ENCODE_ALG_NONE:
|
|
/* todo: remove key */
|
|
/* remove = 1; */
|
|
alg_name = "none";
|
|
break;
|
|
case IW_ENCODE_ALG_WEP:
|
|
alg_name = "WEP";
|
|
break;
|
|
case IW_ENCODE_ALG_TKIP:
|
|
alg_name = "TKIP";
|
|
break;
|
|
case IW_ENCODE_ALG_CCMP:
|
|
alg_name = "CCMP";
|
|
break;
|
|
default:
|
|
return -1;
|
|
}
|
|
|
|
strncpy((char *)param->u.crypt.alg, alg_name, IEEE_CRYPT_ALG_NAME_LEN);
|
|
|
|
if (pext->ext_flags & IW_ENCODE_EXT_SET_TX_KEY)
|
|
param->u.crypt.set_tx = 1;
|
|
|
|
/* cliW: WEP does not have group key
|
|
* just not checking GROUP key setting
|
|
*/
|
|
if ((pext->alg != IW_ENCODE_ALG_WEP) &&
|
|
(pext->ext_flags & IW_ENCODE_EXT_GROUP_KEY))
|
|
param->u.crypt.set_tx = 0;
|
|
|
|
param->u.crypt.idx = (pencoding->flags&0x00FF) - 1;
|
|
|
|
if (pext->ext_flags & IW_ENCODE_EXT_RX_SEQ_VALID)
|
|
memcpy(param->u.crypt.seq, pext->rx_seq, 8);
|
|
|
|
if (pext->key_len) {
|
|
param->u.crypt.key_len = pext->key_len;
|
|
memcpy(param->u.crypt.key, pext + 1, pext->key_len);
|
|
}
|
|
|
|
ret = wpa_set_encryption(dev, param, param_len);
|
|
|
|
kfree(param);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wx_get_nick(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
if (extra) {
|
|
wrqu->data.length = 14;
|
|
wrqu->data.flags = 1;
|
|
memcpy(extra, "<WIFI@REALTEK>", 14);
|
|
}
|
|
|
|
/* dump debug info here */
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_read32(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter;
|
|
struct iw_point *p;
|
|
u16 len;
|
|
u32 addr;
|
|
u32 data32;
|
|
u32 bytes;
|
|
u8 *ptmp;
|
|
|
|
padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
p = &wrqu->data;
|
|
len = p->length;
|
|
ptmp = (u8 *)rtw_malloc(len);
|
|
if (NULL == ptmp)
|
|
return -ENOMEM;
|
|
|
|
if (copy_from_user(ptmp, p->pointer, len)) {
|
|
kfree(ptmp);
|
|
return -EFAULT;
|
|
}
|
|
|
|
bytes = 0;
|
|
addr = 0;
|
|
sscanf(ptmp, "%d,%x", &bytes, &addr);
|
|
|
|
switch (bytes) {
|
|
case 1:
|
|
data32 = rtw_read8(padapter, addr);
|
|
sprintf(extra, "0x%02X", data32);
|
|
break;
|
|
case 2:
|
|
data32 = rtw_read16(padapter, addr);
|
|
sprintf(extra, "0x%04X", data32);
|
|
break;
|
|
case 4:
|
|
data32 = rtw_read32(padapter, addr);
|
|
sprintf(extra, "0x%08X", data32);
|
|
break;
|
|
default:
|
|
DBG_88E(KERN_INFO "%s: usage> read [bytes],[address(hex)]\n", __func__);
|
|
return -EINVAL;
|
|
}
|
|
DBG_88E(KERN_INFO "%s: addr = 0x%08X data =%s\n", __func__, addr, extra);
|
|
|
|
kfree(ptmp);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_write32(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
u32 addr;
|
|
u32 data32;
|
|
u32 bytes;
|
|
|
|
bytes = 0;
|
|
addr = 0;
|
|
data32 = 0;
|
|
sscanf(extra, "%d,%x,%x", &bytes, &addr, &data32);
|
|
|
|
switch (bytes) {
|
|
case 1:
|
|
rtw_write8(padapter, addr, (u8)data32);
|
|
DBG_88E(KERN_INFO "%s: addr = 0x%08X data = 0x%02X\n", __func__, addr, (u8)data32);
|
|
break;
|
|
case 2:
|
|
rtw_write16(padapter, addr, (u16)data32);
|
|
DBG_88E(KERN_INFO "%s: addr = 0x%08X data = 0x%04X\n", __func__, addr, (u16)data32);
|
|
break;
|
|
case 4:
|
|
rtw_write32(padapter, addr, data32);
|
|
DBG_88E(KERN_INFO "%s: addr = 0x%08X data = 0x%08X\n", __func__, addr, data32);
|
|
break;
|
|
default:
|
|
DBG_88E(KERN_INFO "%s: usage> write [bytes],[address(hex)],[data(hex)]\n", __func__);
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_read_rf(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
u32 path, addr, data32;
|
|
|
|
path = *(u32 *)extra;
|
|
addr = *((u32 *)extra + 1);
|
|
data32 = rtw_hal_read_rfreg(padapter, path, addr, 0xFFFFF);
|
|
/*
|
|
* IMPORTANT!!
|
|
* Only when wireless private ioctl is at odd order,
|
|
* "extra" would be copied to user space.
|
|
*/
|
|
sprintf(extra, "0x%05x", data32);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_write_rf(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
u32 path, addr, data32;
|
|
|
|
path = *(u32 *)extra;
|
|
addr = *((u32 *)extra + 1);
|
|
data32 = *((u32 *)extra + 2);
|
|
rtw_hal_write_rfreg(padapter, path, addr, 0xFFFFF, data32);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_priv_null(struct net_device *dev, struct iw_request_info *a,
|
|
union iwreq_data *wrqu, char *b)
|
|
{
|
|
return -1;
|
|
}
|
|
|
|
static int dummy(struct net_device *dev, struct iw_request_info *a,
|
|
union iwreq_data *wrqu, char *b)
|
|
{
|
|
return -1;
|
|
}
|
|
|
|
static int rtw_wx_set_channel_plan(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
u8 channel_plan_req = (u8) (*((int *)wrqu));
|
|
|
|
if (_SUCCESS == rtw_set_chplan_cmd(padapter, channel_plan_req, 1))
|
|
DBG_88E("%s set channel_plan = 0x%02X\n", __func__, pmlmepriv->ChannelPlan);
|
|
else
|
|
return -EPERM;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_set_mtk_wps_probe_ie(struct net_device *dev,
|
|
struct iw_request_info *a,
|
|
union iwreq_data *wrqu, char *b)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_get_sensitivity(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *buf)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_wx_set_mtk_wps_ie(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* For all data larger than 16 octets, we need to use a
|
|
* pointer to memory allocated in user space.
|
|
*/
|
|
static int rtw_drvext_hdl(struct net_device *dev, struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static void rtw_dbg_mode_hdl(struct adapter *padapter, u32 id, u8 *pdata, u32 len)
|
|
{
|
|
struct mp_rw_reg *RegRWStruct;
|
|
struct rf_reg_param *prfreg;
|
|
u8 path;
|
|
u8 offset;
|
|
u32 value;
|
|
|
|
DBG_88E("%s\n", __func__);
|
|
|
|
switch (id) {
|
|
case GEN_MP_IOCTL_SUBCODE(MP_START):
|
|
DBG_88E("871x_driver is only for normal mode, can't enter mp mode\n");
|
|
break;
|
|
case GEN_MP_IOCTL_SUBCODE(READ_REG):
|
|
RegRWStruct = (struct mp_rw_reg *)pdata;
|
|
switch (RegRWStruct->width) {
|
|
case 1:
|
|
RegRWStruct->value = rtw_read8(padapter, RegRWStruct->offset);
|
|
break;
|
|
case 2:
|
|
RegRWStruct->value = rtw_read16(padapter, RegRWStruct->offset);
|
|
break;
|
|
case 4:
|
|
RegRWStruct->value = rtw_read32(padapter, RegRWStruct->offset);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
break;
|
|
case GEN_MP_IOCTL_SUBCODE(WRITE_REG):
|
|
RegRWStruct = (struct mp_rw_reg *)pdata;
|
|
switch (RegRWStruct->width) {
|
|
case 1:
|
|
rtw_write8(padapter, RegRWStruct->offset, (u8)RegRWStruct->value);
|
|
break;
|
|
case 2:
|
|
rtw_write16(padapter, RegRWStruct->offset, (u16)RegRWStruct->value);
|
|
break;
|
|
case 4:
|
|
rtw_write32(padapter, RegRWStruct->offset, (u32)RegRWStruct->value);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
break;
|
|
case GEN_MP_IOCTL_SUBCODE(READ_RF_REG):
|
|
|
|
prfreg = (struct rf_reg_param *)pdata;
|
|
|
|
path = (u8)prfreg->path;
|
|
offset = (u8)prfreg->offset;
|
|
|
|
value = rtw_hal_read_rfreg(padapter, path, offset, 0xffffffff);
|
|
|
|
prfreg->value = value;
|
|
|
|
break;
|
|
case GEN_MP_IOCTL_SUBCODE(WRITE_RF_REG):
|
|
|
|
prfreg = (struct rf_reg_param *)pdata;
|
|
|
|
path = (u8)prfreg->path;
|
|
offset = (u8)prfreg->offset;
|
|
value = prfreg->value;
|
|
|
|
rtw_hal_write_rfreg(padapter, path, offset, 0xffffffff, value);
|
|
|
|
break;
|
|
case GEN_MP_IOCTL_SUBCODE(TRIGGER_GPIO):
|
|
DBG_88E("==> trigger gpio 0\n");
|
|
rtw_hal_set_hwreg(padapter, HW_VAR_TRIGGER_GPIO_0, NULL);
|
|
break;
|
|
case GEN_MP_IOCTL_SUBCODE(GET_WIFI_STATUS):
|
|
*pdata = rtw_hal_sreset_get_wifi_status(padapter);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
static int rtw_mp_ioctl_hdl(struct net_device *dev, struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
u32 BytesRead, BytesWritten, BytesNeeded;
|
|
struct oid_par_priv oid_par;
|
|
struct mp_ioctl_handler *phandler;
|
|
struct mp_ioctl_param *poidparam;
|
|
uint status = 0;
|
|
u16 len;
|
|
u8 *pparmbuf = NULL, bset;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct iw_point *p = &wrqu->data;
|
|
|
|
if ((!p->length) || (!p->pointer)) {
|
|
ret = -EINVAL;
|
|
goto _rtw_mp_ioctl_hdl_exit;
|
|
}
|
|
pparmbuf = NULL;
|
|
bset = (u8)(p->flags & 0xFFFF);
|
|
len = p->length;
|
|
pparmbuf = (u8 *)rtw_malloc(len);
|
|
if (pparmbuf == NULL) {
|
|
ret = -ENOMEM;
|
|
goto _rtw_mp_ioctl_hdl_exit;
|
|
}
|
|
|
|
if (copy_from_user(pparmbuf, p->pointer, len)) {
|
|
ret = -EFAULT;
|
|
goto _rtw_mp_ioctl_hdl_exit;
|
|
}
|
|
|
|
poidparam = (struct mp_ioctl_param *)pparmbuf;
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
|
|
("rtw_mp_ioctl_hdl: subcode [%d], len[%d], buffer_len[%d]\r\n",
|
|
poidparam->subcode, poidparam->len, len));
|
|
|
|
if (poidparam->subcode >= MAX_MP_IOCTL_SUBCODE) {
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("no matching drvext subcodes\r\n"));
|
|
ret = -EINVAL;
|
|
goto _rtw_mp_ioctl_hdl_exit;
|
|
}
|
|
|
|
if (padapter->registrypriv.mp_mode == 1) {
|
|
phandler = mp_ioctl_hdl + poidparam->subcode;
|
|
|
|
if ((phandler->paramsize != 0) && (poidparam->len < phandler->paramsize)) {
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_,
|
|
("no matching drvext param size %d vs %d\r\n",
|
|
poidparam->len, phandler->paramsize));
|
|
ret = -EINVAL;
|
|
goto _rtw_mp_ioctl_hdl_exit;
|
|
}
|
|
|
|
if (phandler->handler) {
|
|
oid_par.adapter_context = padapter;
|
|
oid_par.oid = phandler->oid;
|
|
oid_par.information_buf = poidparam->data;
|
|
oid_par.information_buf_len = poidparam->len;
|
|
oid_par.dbg = 0;
|
|
|
|
BytesWritten = 0;
|
|
BytesNeeded = 0;
|
|
|
|
if (bset) {
|
|
oid_par.bytes_rw = &BytesRead;
|
|
oid_par.bytes_needed = &BytesNeeded;
|
|
oid_par.type_of_oid = SET_OID;
|
|
} else {
|
|
oid_par.bytes_rw = &BytesWritten;
|
|
oid_par.bytes_needed = &BytesNeeded;
|
|
oid_par.type_of_oid = QUERY_OID;
|
|
}
|
|
|
|
status = phandler->handler(&oid_par);
|
|
} else {
|
|
DBG_88E("rtw_mp_ioctl_hdl(): err!, subcode =%d, oid =%d, handler =%p\n",
|
|
poidparam->subcode, phandler->oid, phandler->handler);
|
|
ret = -EFAULT;
|
|
goto _rtw_mp_ioctl_hdl_exit;
|
|
}
|
|
} else {
|
|
rtw_dbg_mode_hdl(padapter, poidparam->subcode, poidparam->data, poidparam->len);
|
|
}
|
|
|
|
if (bset == 0x00) {/* query info */
|
|
if (copy_to_user(p->pointer, pparmbuf, len))
|
|
ret = -EFAULT;
|
|
}
|
|
|
|
if (status) {
|
|
ret = -EFAULT;
|
|
goto _rtw_mp_ioctl_hdl_exit;
|
|
}
|
|
|
|
_rtw_mp_ioctl_hdl_exit:
|
|
|
|
kfree(pparmbuf);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_get_ap_info(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
u32 cnt = 0, wpa_ielen;
|
|
unsigned long irqL;
|
|
struct list_head *plist, *phead;
|
|
unsigned char *pbuf;
|
|
u8 bssid[ETH_ALEN];
|
|
char data[32];
|
|
struct wlan_network *pnetwork = NULL;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct __queue *queue = &(pmlmepriv->scanned_queue);
|
|
struct iw_point *pdata = &wrqu->data;
|
|
|
|
DBG_88E("+rtw_get_aplist_info\n");
|
|
|
|
if ((padapter->bDriverStopped) || (pdata == NULL)) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
while ((check_fwstate(pmlmepriv, (_FW_UNDER_SURVEY|_FW_UNDER_LINKING)))) {
|
|
rtw_msleep_os(30);
|
|
cnt++;
|
|
if (cnt > 100)
|
|
break;
|
|
}
|
|
pdata->flags = 0;
|
|
if (pdata->length >= 32) {
|
|
if (copy_from_user(data, pdata->pointer, 32)) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
} else {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
_enter_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
phead = get_list_head(queue);
|
|
plist = get_next(phead);
|
|
|
|
while (1) {
|
|
if (rtw_end_of_queue_search(phead, plist) == true)
|
|
break;
|
|
|
|
pnetwork = LIST_CONTAINOR(plist, struct wlan_network, list);
|
|
|
|
if (hwaddr_aton_i(data, bssid)) {
|
|
DBG_88E("Invalid BSSID '%s'.\n", (u8 *)data);
|
|
_exit_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (!memcmp(bssid, pnetwork->network.MacAddress, ETH_ALEN) == true) {
|
|
/* BSSID match, then check if supporting wpa/wpa2 */
|
|
DBG_88E("BSSID:%pM\n", (bssid));
|
|
|
|
pbuf = rtw_get_wpa_ie(&pnetwork->network.IEs[12], &wpa_ielen, pnetwork->network.IELength-12);
|
|
if (pbuf && (wpa_ielen > 0)) {
|
|
pdata->flags = 1;
|
|
break;
|
|
}
|
|
|
|
pbuf = rtw_get_wpa2_ie(&pnetwork->network.IEs[12], &wpa_ielen, pnetwork->network.IELength-12);
|
|
if (pbuf && (wpa_ielen > 0)) {
|
|
pdata->flags = 2;
|
|
break;
|
|
}
|
|
}
|
|
|
|
plist = get_next(plist);
|
|
}
|
|
|
|
_exit_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
if (pdata->length >= 34) {
|
|
if (copy_to_user(pdata->pointer+32, (u8 *)&pdata->flags, 1)) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
}
|
|
|
|
exit:
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_set_pid(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
int *pdata = (int *)wrqu;
|
|
int selector;
|
|
|
|
if ((padapter->bDriverStopped) || (pdata == NULL)) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
selector = *pdata;
|
|
if (selector < 3 && selector >= 0) {
|
|
padapter->pid[selector] = *(pdata+1);
|
|
ui_pid[selector] = *(pdata+1);
|
|
DBG_88E("%s set pid[%d] =%d\n", __func__, selector, padapter->pid[selector]);
|
|
} else {
|
|
DBG_88E("%s selector %d error\n", __func__, selector);
|
|
}
|
|
exit:
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_wps_start(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct iw_point *pdata = &wrqu->data;
|
|
u32 u32wps_start = 0;
|
|
|
|
ret = copy_from_user((void *)&u32wps_start, pdata->pointer, 4);
|
|
if (ret) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
if ((padapter->bDriverStopped) || (pdata == NULL)) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
if (u32wps_start == 0)
|
|
u32wps_start = *extra;
|
|
|
|
DBG_88E("[%s] wps_start = %d\n", __func__, u32wps_start);
|
|
|
|
if (u32wps_start == 1) /* WPS Start */
|
|
rtw_led_control(padapter, LED_CTL_START_WPS);
|
|
else if (u32wps_start == 2) /* WPS Stop because of wps success */
|
|
rtw_led_control(padapter, LED_CTL_STOP_WPS);
|
|
else if (u32wps_start == 3) /* WPS Stop because of wps fail */
|
|
rtw_led_control(padapter, LED_CTL_STOP_WPS_FAIL);
|
|
|
|
exit:
|
|
return ret;
|
|
}
|
|
|
|
#ifdef CONFIG_88EU_P2P
|
|
static int rtw_wext_p2p_enable(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv;
|
|
enum P2P_ROLE init_role = P2P_ROLE_DISABLE;
|
|
|
|
if (*extra == '0')
|
|
init_role = P2P_ROLE_DISABLE;
|
|
else if (*extra == '1')
|
|
init_role = P2P_ROLE_DEVICE;
|
|
else if (*extra == '2')
|
|
init_role = P2P_ROLE_CLIENT;
|
|
else if (*extra == '3')
|
|
init_role = P2P_ROLE_GO;
|
|
|
|
if (_FAIL == rtw_p2p_enable(padapter, init_role)) {
|
|
ret = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
/* set channel/bandwidth */
|
|
if (init_role != P2P_ROLE_DISABLE) {
|
|
u8 channel, ch_offset;
|
|
u16 bwmode;
|
|
|
|
if (rtw_p2p_chk_state(pwdinfo, P2P_STATE_LISTEN)) {
|
|
/* Stay at the listen state and wait for discovery. */
|
|
channel = pwdinfo->listen_channel;
|
|
pwdinfo->operating_channel = pwdinfo->listen_channel;
|
|
ch_offset = HAL_PRIME_CHNL_OFFSET_DONT_CARE;
|
|
bwmode = HT_CHANNEL_WIDTH_20;
|
|
} else {
|
|
pwdinfo->operating_channel = pmlmeext->cur_channel;
|
|
|
|
channel = pwdinfo->operating_channel;
|
|
ch_offset = pmlmeext->cur_ch_offset;
|
|
bwmode = pmlmeext->cur_bwmode;
|
|
}
|
|
|
|
set_channel_bwmode(padapter, channel, ch_offset, bwmode);
|
|
}
|
|
|
|
exit:
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_set_go_nego_ssid(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
DBG_88E("[%s] ssid = %s, len = %zu\n", __func__, extra, strlen(extra));
|
|
memcpy(pwdinfo->nego_ssid, extra, strlen(extra));
|
|
pwdinfo->nego_ssidlen = strlen(extra);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_set_intent(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
u8 intent = pwdinfo->intent;
|
|
|
|
switch (wrqu->data.length) {
|
|
case 1:
|
|
intent = extra[0] - '0';
|
|
break;
|
|
case 2:
|
|
intent = str_2char2num(extra[0], extra[1]);
|
|
break;
|
|
}
|
|
if (intent <= 15)
|
|
pwdinfo->intent = intent;
|
|
else
|
|
ret = -1;
|
|
DBG_88E("[%s] intent = %d\n", __func__, intent);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_set_listen_ch(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
u8 listen_ch = pwdinfo->listen_channel; /* Listen channel number */
|
|
|
|
switch (wrqu->data.length) {
|
|
case 1:
|
|
listen_ch = extra[0] - '0';
|
|
break;
|
|
case 2:
|
|
listen_ch = str_2char2num(extra[0], extra[1]);
|
|
break;
|
|
}
|
|
|
|
if ((listen_ch == 1) || (listen_ch == 6) || (listen_ch == 11)) {
|
|
pwdinfo->listen_channel = listen_ch;
|
|
set_channel_bwmode(padapter, pwdinfo->listen_channel, HAL_PRIME_CHNL_OFFSET_DONT_CARE, HT_CHANNEL_WIDTH_20);
|
|
} else {
|
|
ret = -1;
|
|
}
|
|
|
|
DBG_88E("[%s] listen_ch = %d\n", __func__, pwdinfo->listen_channel);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_set_op_ch(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
/* Commented by Albert 20110524 */
|
|
/* This function is used to set the operating channel if the driver will become the group owner */
|
|
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
u8 op_ch = pwdinfo->operating_channel; /* Operating channel number */
|
|
|
|
switch (wrqu->data.length) {
|
|
case 1:
|
|
op_ch = extra[0] - '0';
|
|
break;
|
|
case 2:
|
|
op_ch = str_2char2num(extra[0], extra[1]);
|
|
break;
|
|
}
|
|
|
|
if (op_ch > 0)
|
|
pwdinfo->operating_channel = op_ch;
|
|
else
|
|
ret = -1;
|
|
|
|
DBG_88E("[%s] op_ch = %d\n", __func__, pwdinfo->operating_channel);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_profilefound(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
/* Comment by Albert 2010/10/13 */
|
|
/* Input data format: */
|
|
/* Ex: 0 */
|
|
/* Ex: 1XX:XX:XX:XX:XX:XXYYSSID */
|
|
/* 0 => Reflush the profile record list. */
|
|
/* 1 => Add the profile list */
|
|
/* XX:XX:XX:XX:XX:XX => peer's MAC Address (ex: 00:E0:4C:00:00:01) */
|
|
/* YY => SSID Length */
|
|
/* SSID => SSID for persistence group */
|
|
|
|
DBG_88E("[%s] In value = %s, len = %d\n", __func__, extra, wrqu->data.length - 1);
|
|
|
|
/* The upper application should pass the SSID to driver by using this rtw_p2p_profilefound function. */
|
|
if (!rtw_p2p_chk_state(pwdinfo, P2P_STATE_NONE)) {
|
|
if (extra[0] == '0') {
|
|
/* Remove all the profile information of wifidirect_info structure. */
|
|
_rtw_memset(&pwdinfo->profileinfo[0], 0x00, sizeof(struct profile_info) * P2P_MAX_PERSISTENT_GROUP_NUM);
|
|
pwdinfo->profileindex = 0;
|
|
} else {
|
|
if (pwdinfo->profileindex >= P2P_MAX_PERSISTENT_GROUP_NUM) {
|
|
ret = -1;
|
|
} else {
|
|
int jj, kk;
|
|
|
|
/* Add this profile information into pwdinfo->profileinfo */
|
|
/* Ex: 1XX:XX:XX:XX:XX:XXYYSSID */
|
|
for (jj = 0, kk = 1; jj < ETH_ALEN; jj++, kk += 3)
|
|
pwdinfo->profileinfo[pwdinfo->profileindex].peermac[jj] = key_2char2num(extra[kk], extra[kk + 1]);
|
|
|
|
pwdinfo->profileinfo[pwdinfo->profileindex].ssidlen = (extra[18] - '0') * 10 + (extra[19] - '0');
|
|
memcpy(pwdinfo->profileinfo[pwdinfo->profileindex].ssid, &extra[20], pwdinfo->profileinfo[pwdinfo->profileindex].ssidlen);
|
|
pwdinfo->profileindex++;
|
|
}
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_setDN(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
DBG_88E("[%s] %s %d\n", __func__, extra, wrqu->data.length - 1);
|
|
_rtw_memset(pwdinfo->device_name, 0x00, WPS_MAX_DEVICE_NAME_LEN);
|
|
memcpy(pwdinfo->device_name, extra, wrqu->data.length - 1);
|
|
pwdinfo->device_name_len = wrqu->data.length - 1;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_status(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
if (padapter->bShowGetP2PState)
|
|
DBG_88E("[%s] Role = %d, Status = %d, peer addr = %.2X:%.2X:%.2X:%.2X:%.2X:%.2X\n", __func__, rtw_p2p_role(pwdinfo), rtw_p2p_state(pwdinfo),
|
|
pwdinfo->p2p_peer_interface_addr[0], pwdinfo->p2p_peer_interface_addr[1], pwdinfo->p2p_peer_interface_addr[2],
|
|
pwdinfo->p2p_peer_interface_addr[3], pwdinfo->p2p_peer_interface_addr[4], pwdinfo->p2p_peer_interface_addr[5]);
|
|
|
|
/* Commented by Albert 2010/10/12 */
|
|
/* Because of the output size limitation, I had removed the "Role" information. */
|
|
/* About the "Role" information, we will use the new private IOCTL to get the "Role" information. */
|
|
sprintf(extra, "\n\nStatus =%.2d\n", rtw_p2p_state(pwdinfo));
|
|
wrqu->data.length = strlen(extra);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Commented by Albert 20110520 */
|
|
/* This function will return the config method description */
|
|
/* This config method description will show us which config method the remote P2P device is intented to use */
|
|
/* by sending the provisioning discovery request frame. */
|
|
|
|
static int rtw_p2p_get_req_cm(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
sprintf(extra, "\n\nCM =%s\n", pwdinfo->rx_prov_disc_info.strconfig_method_desc_of_prov_disc_req);
|
|
wrqu->data.length = strlen(extra);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_role(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
DBG_88E("[%s] Role = %d, Status = %d, peer addr = %.2X:%.2X:%.2X:%.2X:%.2X:%.2X\n", __func__, rtw_p2p_role(pwdinfo), rtw_p2p_state(pwdinfo),
|
|
pwdinfo->p2p_peer_interface_addr[0], pwdinfo->p2p_peer_interface_addr[1], pwdinfo->p2p_peer_interface_addr[2],
|
|
pwdinfo->p2p_peer_interface_addr[3], pwdinfo->p2p_peer_interface_addr[4], pwdinfo->p2p_peer_interface_addr[5]);
|
|
|
|
sprintf(extra, "\n\nRole =%.2d\n", rtw_p2p_role(pwdinfo));
|
|
wrqu->data.length = strlen(extra);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_peer_ifaddr(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
DBG_88E("[%s] Role = %d, Status = %d, peer addr = %pM\n", __func__,
|
|
rtw_p2p_role(pwdinfo), rtw_p2p_state(pwdinfo),
|
|
pwdinfo->p2p_peer_interface_addr);
|
|
sprintf(extra, "\nMAC %pM",
|
|
pwdinfo->p2p_peer_interface_addr);
|
|
wrqu->data.length = strlen(extra);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_peer_devaddr(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
DBG_88E("[%s] Role = %d, Status = %d, peer addr = %pM\n", __func__,
|
|
rtw_p2p_role(pwdinfo), rtw_p2p_state(pwdinfo),
|
|
pwdinfo->rx_prov_disc_info.peerDevAddr);
|
|
sprintf(extra, "\n%pM",
|
|
pwdinfo->rx_prov_disc_info.peerDevAddr);
|
|
wrqu->data.length = strlen(extra);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_peer_devaddr_by_invitation(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
DBG_88E("[%s] Role = %d, Status = %d, peer addr = %pM\n",
|
|
__func__, rtw_p2p_role(pwdinfo), rtw_p2p_state(pwdinfo),
|
|
pwdinfo->p2p_peer_device_addr);
|
|
sprintf(extra, "\nMAC %pM",
|
|
pwdinfo->p2p_peer_device_addr);
|
|
wrqu->data.length = strlen(extra);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_groupid(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
sprintf(extra, "\n%.2X:%.2X:%.2X:%.2X:%.2X:%.2X %s",
|
|
pwdinfo->groupid_info.go_device_addr[0], pwdinfo->groupid_info.go_device_addr[1],
|
|
pwdinfo->groupid_info.go_device_addr[2], pwdinfo->groupid_info.go_device_addr[3],
|
|
pwdinfo->groupid_info.go_device_addr[4], pwdinfo->groupid_info.go_device_addr[5],
|
|
pwdinfo->groupid_info.ssid);
|
|
wrqu->data.length = strlen(extra);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_op_ch(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
DBG_88E("[%s] Op_ch = %02x\n", __func__, pwdinfo->operating_channel);
|
|
|
|
sprintf(extra, "\n\nOp_ch =%.2d\n", pwdinfo->operating_channel);
|
|
wrqu->data.length = strlen(extra);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_wps_configmethod(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
u8 peerMAC[ETH_ALEN] = {0x00};
|
|
int jj, kk;
|
|
u8 peerMACStr[17] = {0x00};
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
unsigned long irqL;
|
|
struct list_head *plist, *phead;
|
|
struct __queue *queue = &(pmlmepriv->scanned_queue);
|
|
struct wlan_network *pnetwork = NULL;
|
|
u8 blnMatch = 0;
|
|
u16 attr_content = 0;
|
|
uint attr_contentlen = 0;
|
|
/* 6 is the string "wpsCM =", 17 is the MAC addr, we have to clear it at wrqu->data.pointer */
|
|
u8 attr_content_str[6 + 17] = {0x00};
|
|
|
|
/* Commented by Albert 20110727 */
|
|
/* The input data is the MAC address which the application wants to know its WPS config method. */
|
|
/* After knowing its WPS config method, the application can decide the config method for provisioning discovery. */
|
|
/* Format: iwpriv wlanx p2p_get_wpsCM 00:E0:4C:00:00:05 */
|
|
|
|
DBG_88E("[%s] data = %s\n", __func__, (char *)extra);
|
|
if (copy_from_user(peerMACStr, wrqu->data.pointer + 6, 17))
|
|
return -EFAULT;
|
|
|
|
for (jj = 0, kk = 0; jj < ETH_ALEN; jj++, kk += 3)
|
|
peerMAC[jj] = key_2char2num(peerMACStr[kk], peerMACStr[kk + 1]);
|
|
|
|
_enter_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
phead = get_list_head(queue);
|
|
plist = get_next(phead);
|
|
|
|
while (1) {
|
|
if (rtw_end_of_queue_search(phead, plist) == true)
|
|
break;
|
|
|
|
pnetwork = LIST_CONTAINOR(plist, struct wlan_network, list);
|
|
if (!memcmp(pnetwork->network.MacAddress, peerMAC, ETH_ALEN)) {
|
|
u8 *wpsie;
|
|
uint wpsie_len = 0;
|
|
__be16 be_tmp;
|
|
|
|
/* The mac address is matched. */
|
|
wpsie = rtw_get_wps_ie(&pnetwork->network.IEs[12], pnetwork->network.IELength - 12, NULL, &wpsie_len);
|
|
if (wpsie) {
|
|
rtw_get_wps_attr_content(wpsie, wpsie_len, WPS_ATTR_CONF_METHOD, (u8 *) &be_tmp, &attr_contentlen);
|
|
if (attr_contentlen) {
|
|
attr_content = be16_to_cpu(be_tmp);
|
|
sprintf(attr_content_str, "\n\nM =%.4d", attr_content);
|
|
blnMatch = 1;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
plist = get_next(plist);
|
|
}
|
|
|
|
_exit_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
if (!blnMatch)
|
|
sprintf(attr_content_str, "\n\nM = 0000");
|
|
|
|
if (copy_to_user(wrqu->data.pointer, attr_content_str, 6 + 17))
|
|
return -EFAULT;
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_go_device_address(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
u8 peerMAC[ETH_ALEN] = {0x00};
|
|
int jj, kk;
|
|
u8 peerMACStr[17] = {0x00};
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
unsigned long irqL;
|
|
struct list_head *plist, *phead;
|
|
struct __queue *queue = &(pmlmepriv->scanned_queue);
|
|
struct wlan_network *pnetwork = NULL;
|
|
u8 blnMatch = 0;
|
|
u8 *p2pie;
|
|
uint p2pielen = 0, attr_contentlen = 0;
|
|
u8 attr_content[100] = {0x00};
|
|
|
|
u8 go_devadd_str[17 + 10] = {0x00};
|
|
/* +10 is for the str "go_devadd =", we have to clear it at wrqu->data.pointer */
|
|
|
|
/* Commented by Albert 20121209 */
|
|
/* The input data is the GO's interface address which the application wants to know its device address. */
|
|
/* Format: iwpriv wlanx p2p_get2 go_devadd = 00:E0:4C:00:00:05 */
|
|
|
|
DBG_88E("[%s] data = %s\n", __func__, (char *)extra);
|
|
if (copy_from_user(peerMACStr, wrqu->data.pointer + 10, 17))
|
|
return -EFAULT;
|
|
|
|
for (jj = 0, kk = 0; jj < ETH_ALEN; jj++, kk += 3)
|
|
peerMAC[jj] = key_2char2num(peerMACStr[kk], peerMACStr[kk + 1]);
|
|
|
|
_enter_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
phead = get_list_head(queue);
|
|
plist = get_next(phead);
|
|
|
|
while (1) {
|
|
if (rtw_end_of_queue_search(phead, plist) == true)
|
|
break;
|
|
|
|
pnetwork = LIST_CONTAINOR(plist, struct wlan_network, list);
|
|
if (!memcmp(pnetwork->network.MacAddress, peerMAC, ETH_ALEN)) {
|
|
/* Commented by Albert 2011/05/18 */
|
|
/* Match the device address located in the P2P IE */
|
|
/* This is for the case that the P2P device address is not the same as the P2P interface address. */
|
|
|
|
p2pie = rtw_get_p2p_ie(&pnetwork->network.IEs[12], pnetwork->network.IELength - 12, NULL, &p2pielen);
|
|
if (p2pie) {
|
|
while (p2pie) {
|
|
/* The P2P Device ID attribute is included in the Beacon frame. */
|
|
/* The P2P Device Info attribute is included in the probe response frame. */
|
|
|
|
_rtw_memset(attr_content, 0x00, 100);
|
|
if (rtw_get_p2p_attr_content(p2pie, p2pielen, P2P_ATTR_DEVICE_ID, attr_content, &attr_contentlen)) {
|
|
/* Handle the P2P Device ID attribute of Beacon first */
|
|
blnMatch = 1;
|
|
break;
|
|
} else if (rtw_get_p2p_attr_content(p2pie, p2pielen, P2P_ATTR_DEVICE_INFO, attr_content, &attr_contentlen)) {
|
|
/* Handle the P2P Device Info attribute of probe response */
|
|
blnMatch = 1;
|
|
break;
|
|
}
|
|
|
|
/* Get the next P2P IE */
|
|
p2pie = rtw_get_p2p_ie(p2pie+p2pielen, pnetwork->network.IELength - 12 - (p2pie - &pnetwork->network.IEs[12] + p2pielen), NULL, &p2pielen);
|
|
}
|
|
}
|
|
}
|
|
|
|
plist = get_next(plist);
|
|
}
|
|
|
|
_exit_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
if (!blnMatch)
|
|
sprintf(go_devadd_str, "\n\ndev_add = NULL");
|
|
else
|
|
sprintf(go_devadd_str, "\n\ndev_add =%.2X:%.2X:%.2X:%.2X:%.2X:%.2X",
|
|
attr_content[0], attr_content[1], attr_content[2], attr_content[3], attr_content[4], attr_content[5]);
|
|
|
|
if (copy_to_user(wrqu->data.pointer, go_devadd_str, 10 + 17))
|
|
return -EFAULT;
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_device_type(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
u8 peerMAC[ETH_ALEN] = {0x00};
|
|
int jj, kk;
|
|
u8 peerMACStr[17] = {0x00};
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
unsigned long irqL;
|
|
struct list_head *plist, *phead;
|
|
struct __queue *queue = &(pmlmepriv->scanned_queue);
|
|
struct wlan_network *pnetwork = NULL;
|
|
u8 blnMatch = 0;
|
|
u8 dev_type[8] = {0x00};
|
|
uint dev_type_len = 0;
|
|
u8 dev_type_str[17 + 9] = {0x00}; /* +9 is for the str "dev_type =", we have to clear it at wrqu->data.pointer */
|
|
|
|
/* Commented by Albert 20121209 */
|
|
/* The input data is the MAC address which the application wants to know its device type. */
|
|
/* Such user interface could know the device type. */
|
|
/* Format: iwpriv wlanx p2p_get2 dev_type = 00:E0:4C:00:00:05 */
|
|
|
|
DBG_88E("[%s] data = %s\n", __func__, (char *)extra);
|
|
if (copy_from_user(peerMACStr, wrqu->data.pointer + 9, 17))
|
|
return -EFAULT;
|
|
|
|
for (jj = 0, kk = 0; jj < ETH_ALEN; jj++, kk += 3)
|
|
peerMAC[jj] = key_2char2num(peerMACStr[kk], peerMACStr[kk + 1]);
|
|
|
|
_enter_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
phead = get_list_head(queue);
|
|
plist = get_next(phead);
|
|
|
|
while (1) {
|
|
if (rtw_end_of_queue_search(phead, plist) == true)
|
|
break;
|
|
|
|
pnetwork = LIST_CONTAINOR(plist, struct wlan_network, list);
|
|
if (!memcmp(pnetwork->network.MacAddress, peerMAC, ETH_ALEN)) {
|
|
u8 *wpsie;
|
|
uint wpsie_len = 0;
|
|
|
|
/* The mac address is matched. */
|
|
|
|
wpsie = rtw_get_wps_ie(&pnetwork->network.IEs[12],
|
|
pnetwork->network.IELength - 12,
|
|
NULL, &wpsie_len);
|
|
if (wpsie) {
|
|
rtw_get_wps_attr_content(wpsie, wpsie_len, WPS_ATTR_PRIMARY_DEV_TYPE, dev_type, &dev_type_len);
|
|
if (dev_type_len) {
|
|
u16 type = 0;
|
|
__be16 be_tmp;
|
|
|
|
memcpy(&be_tmp, dev_type, 2);
|
|
type = be16_to_cpu(be_tmp);
|
|
sprintf(dev_type_str, "\n\nN =%.2d", type);
|
|
blnMatch = 1;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
plist = get_next(plist);
|
|
}
|
|
|
|
_exit_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
if (!blnMatch)
|
|
sprintf(dev_type_str, "\n\nN = 00");
|
|
|
|
if (copy_to_user(wrqu->data.pointer, dev_type_str, 9 + 17)) {
|
|
return -EFAULT;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_device_name(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
u8 peerMAC[ETH_ALEN] = {0x00};
|
|
int jj, kk;
|
|
u8 peerMACStr[17] = {0x00};
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
unsigned long irqL;
|
|
struct list_head *plist, *phead;
|
|
struct __queue *queue = &(pmlmepriv->scanned_queue);
|
|
struct wlan_network *pnetwork = NULL;
|
|
u8 blnMatch = 0;
|
|
u8 dev_name[WPS_MAX_DEVICE_NAME_LEN] = {0x00};
|
|
uint dev_len = 0;
|
|
u8 dev_name_str[WPS_MAX_DEVICE_NAME_LEN + 5] = {0x00}; /* +5 is for the str "devN =", we have to clear it at wrqu->data.pointer */
|
|
|
|
/* Commented by Albert 20121225 */
|
|
/* The input data is the MAC address which the application wants to know its device name. */
|
|
/* Such user interface could show peer device's device name instead of ssid. */
|
|
/* Format: iwpriv wlanx p2p_get2 devN = 00:E0:4C:00:00:05 */
|
|
|
|
DBG_88E("[%s] data = %s\n", __func__, (char *)extra);
|
|
if (copy_from_user(peerMACStr, wrqu->data.pointer + 5, 17))
|
|
return -EFAULT;
|
|
|
|
for (jj = 0, kk = 0; jj < ETH_ALEN; jj++, kk += 3)
|
|
peerMAC[jj] = key_2char2num(peerMACStr[kk], peerMACStr[kk + 1]);
|
|
|
|
_enter_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
phead = get_list_head(queue);
|
|
plist = get_next(phead);
|
|
|
|
while (1) {
|
|
if (rtw_end_of_queue_search(phead, plist) == true)
|
|
break;
|
|
|
|
pnetwork = LIST_CONTAINOR(plist, struct wlan_network, list);
|
|
if (!memcmp(pnetwork->network.MacAddress, peerMAC, ETH_ALEN)) {
|
|
u8 *wpsie;
|
|
uint wpsie_len = 0;
|
|
|
|
/* The mac address is matched. */
|
|
wpsie = rtw_get_wps_ie(&pnetwork->network.IEs[12], pnetwork->network.IELength - 12, NULL, &wpsie_len);
|
|
if (wpsie) {
|
|
rtw_get_wps_attr_content(wpsie, wpsie_len, WPS_ATTR_DEVICE_NAME, dev_name, &dev_len);
|
|
if (dev_len) {
|
|
sprintf(dev_name_str, "\n\nN =%s", dev_name);
|
|
blnMatch = 1;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
plist = get_next(plist);
|
|
}
|
|
|
|
_exit_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
if (!blnMatch)
|
|
sprintf(dev_name_str, "\n\nN = 0000");
|
|
|
|
if (copy_to_user(wrqu->data.pointer, dev_name_str, 5 + ((dev_len > 17) ? dev_len : 17)))
|
|
return -EFAULT;
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get_invitation_procedure(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
u8 peerMAC[ETH_ALEN] = {0x00};
|
|
int jj, kk;
|
|
u8 peerMACStr[17] = {0x00};
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
unsigned long irqL;
|
|
struct list_head *plist, *phead;
|
|
struct __queue *queue = &(pmlmepriv->scanned_queue);
|
|
struct wlan_network *pnetwork = NULL;
|
|
u8 blnMatch = 0;
|
|
u8 *p2pie;
|
|
uint p2pielen = 0, attr_contentlen = 0;
|
|
u8 attr_content[2] = {0x00};
|
|
|
|
u8 inv_proc_str[17 + 8] = {0x00};
|
|
/* +8 is for the str "InvProc =", we have to clear it at wrqu->data.pointer */
|
|
|
|
/* Commented by Ouden 20121226 */
|
|
/* The application wants to know P2P initation procedure is support or not. */
|
|
/* Format: iwpriv wlanx p2p_get2 InvProc = 00:E0:4C:00:00:05 */
|
|
|
|
DBG_88E("[%s] data = %s\n", __func__, (char *)extra);
|
|
if (copy_from_user(peerMACStr, wrqu->data.pointer + 8, 17))
|
|
return -EFAULT;
|
|
|
|
for (jj = 0, kk = 0; jj < ETH_ALEN; jj++, kk += 3)
|
|
peerMAC[jj] = key_2char2num(peerMACStr[kk], peerMACStr[kk + 1]);
|
|
|
|
_enter_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
phead = get_list_head(queue);
|
|
plist = get_next(phead);
|
|
|
|
while (1) {
|
|
if (rtw_end_of_queue_search(phead, plist) == true)
|
|
break;
|
|
|
|
pnetwork = LIST_CONTAINOR(plist, struct wlan_network, list);
|
|
if (!memcmp(pnetwork->network.MacAddress, peerMAC, ETH_ALEN)) {
|
|
/* Commented by Albert 20121226 */
|
|
/* Match the device address located in the P2P IE */
|
|
/* This is for the case that the P2P device address is not the same as the P2P interface address. */
|
|
|
|
p2pie = rtw_get_p2p_ie(&pnetwork->network.IEs[12], pnetwork->network.IELength - 12, NULL, &p2pielen);
|
|
if (p2pie) {
|
|
while (p2pie) {
|
|
if (rtw_get_p2p_attr_content(p2pie, p2pielen, P2P_ATTR_CAPABILITY, attr_content, &attr_contentlen)) {
|
|
/* Handle the P2P capability attribute */
|
|
blnMatch = 1;
|
|
break;
|
|
}
|
|
|
|
/* Get the next P2P IE */
|
|
p2pie = rtw_get_p2p_ie(p2pie+p2pielen, pnetwork->network.IELength - 12 - (p2pie - &pnetwork->network.IEs[12] + p2pielen), NULL, &p2pielen);
|
|
}
|
|
}
|
|
}
|
|
plist = get_next(plist);
|
|
}
|
|
|
|
_exit_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
if (!blnMatch) {
|
|
sprintf(inv_proc_str, "\nIP =-1");
|
|
} else {
|
|
if (attr_content[0] & 0x20)
|
|
sprintf(inv_proc_str, "\nIP = 1");
|
|
else
|
|
sprintf(inv_proc_str, "\nIP = 0");
|
|
}
|
|
if (copy_to_user(wrqu->data.pointer, inv_proc_str, 8 + 17))
|
|
return -EFAULT;
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_connect(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
u8 peerMAC[ETH_ALEN] = {0x00};
|
|
int jj, kk;
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
unsigned long irqL;
|
|
struct list_head *plist, *phead;
|
|
struct __queue *queue = &(pmlmepriv->scanned_queue);
|
|
struct wlan_network *pnetwork = NULL;
|
|
uint uintPeerChannel = 0;
|
|
|
|
/* Commented by Albert 20110304 */
|
|
/* The input data contains two informations. */
|
|
/* 1. First information is the MAC address which wants to formate with */
|
|
/* 2. Second information is the WPS PINCode or "pbc" string for push button method */
|
|
/* Format: 00:E0:4C:00:00:05 */
|
|
/* Format: 00:E0:4C:00:00:05 */
|
|
|
|
DBG_88E("[%s] data = %s\n", __func__, extra);
|
|
|
|
if (pwdinfo->p2p_state == P2P_STATE_NONE) {
|
|
DBG_88E("[%s] WiFi Direct is disable!\n", __func__);
|
|
return ret;
|
|
}
|
|
|
|
if (pwdinfo->ui_got_wps_info == P2P_NO_WPSINFO)
|
|
return -1;
|
|
|
|
for (jj = 0, kk = 0; jj < ETH_ALEN; jj++, kk += 3)
|
|
peerMAC[jj] = key_2char2num(extra[kk], extra[kk + 1]);
|
|
|
|
_enter_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
phead = get_list_head(queue);
|
|
plist = get_next(phead);
|
|
|
|
while (1) {
|
|
if (rtw_end_of_queue_search(phead, plist) == true)
|
|
break;
|
|
|
|
pnetwork = LIST_CONTAINOR(plist, struct wlan_network, list);
|
|
if (!memcmp(pnetwork->network.MacAddress, peerMAC, ETH_ALEN)) {
|
|
uintPeerChannel = pnetwork->network.Configuration.DSConfig;
|
|
break;
|
|
}
|
|
|
|
plist = get_next(plist);
|
|
}
|
|
|
|
_exit_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
if (uintPeerChannel) {
|
|
_rtw_memset(&pwdinfo->nego_req_info, 0x00, sizeof(struct tx_nego_req_info));
|
|
_rtw_memset(&pwdinfo->groupid_info, 0x00, sizeof(struct group_id_info));
|
|
|
|
pwdinfo->nego_req_info.peer_channel_num[0] = uintPeerChannel;
|
|
memcpy(pwdinfo->nego_req_info.peerDevAddr, pnetwork->network.MacAddress, ETH_ALEN);
|
|
pwdinfo->nego_req_info.benable = true;
|
|
|
|
_cancel_timer_ex(&pwdinfo->restore_p2p_state_timer);
|
|
if (rtw_p2p_state(pwdinfo) != P2P_STATE_GONEGO_OK) {
|
|
/* Restore to the listen state if the current p2p state is not nego OK */
|
|
rtw_p2p_set_state(pwdinfo, P2P_STATE_LISTEN);
|
|
}
|
|
|
|
rtw_p2p_set_pre_state(pwdinfo, rtw_p2p_state(pwdinfo));
|
|
rtw_p2p_set_state(pwdinfo, P2P_STATE_GONEGO_ING);
|
|
|
|
DBG_88E("[%s] Start PreTx Procedure!\n", __func__);
|
|
_set_timer(&pwdinfo->pre_tx_scan_timer, P2P_TX_PRESCAN_TIMEOUT);
|
|
_set_timer(&pwdinfo->restore_p2p_state_timer, P2P_GO_NEGO_TIMEOUT);
|
|
} else {
|
|
DBG_88E("[%s] Not Found in Scanning Queue~\n", __func__);
|
|
ret = -1;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_invite_req(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
int jj, kk;
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
struct list_head *plist, *phead;
|
|
struct __queue *queue = &(pmlmepriv->scanned_queue);
|
|
struct wlan_network *pnetwork = NULL;
|
|
uint uintPeerChannel = 0;
|
|
u8 attr_content[50] = {0x00};
|
|
u8 *p2pie;
|
|
uint p2pielen = 0, attr_contentlen = 0;
|
|
unsigned long irqL;
|
|
struct tx_invite_req_info *pinvite_req_info = &pwdinfo->invitereq_info;
|
|
|
|
/* The input data contains two informations. */
|
|
/* 1. First information is the P2P device address which you want to send to. */
|
|
/* 2. Second information is the group id which combines with GO's mac address, space and GO's ssid. */
|
|
/* Command line sample: iwpriv wlan0 p2p_set invite ="00:11:22:33:44:55 00:E0:4C:00:00:05 DIRECT-xy" */
|
|
/* Format: 00:11:22:33:44:55 00:E0:4C:00:00:05 DIRECT-xy */
|
|
|
|
DBG_88E("[%s] data = %s\n", __func__, extra);
|
|
|
|
if (wrqu->data.length <= 37) {
|
|
DBG_88E("[%s] Wrong format!\n", __func__);
|
|
return ret;
|
|
}
|
|
|
|
if (rtw_p2p_chk_state(pwdinfo, P2P_STATE_NONE)) {
|
|
DBG_88E("[%s] WiFi Direct is disable!\n", __func__);
|
|
return ret;
|
|
} else {
|
|
/* Reset the content of struct tx_invite_req_info */
|
|
pinvite_req_info->benable = false;
|
|
_rtw_memset(pinvite_req_info->go_bssid, 0x00, ETH_ALEN);
|
|
_rtw_memset(pinvite_req_info->go_ssid, 0x00, WLAN_SSID_MAXLEN);
|
|
pinvite_req_info->ssidlen = 0x00;
|
|
pinvite_req_info->operating_ch = pwdinfo->operating_channel;
|
|
_rtw_memset(pinvite_req_info->peer_macaddr, 0x00, ETH_ALEN);
|
|
pinvite_req_info->token = 3;
|
|
}
|
|
|
|
for (jj = 0, kk = 0; jj < ETH_ALEN; jj++, kk += 3)
|
|
pinvite_req_info->peer_macaddr[jj] = key_2char2num(extra[kk], extra[kk + 1]);
|
|
|
|
_enter_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
phead = get_list_head(queue);
|
|
plist = get_next(phead);
|
|
|
|
while (1) {
|
|
if (rtw_end_of_queue_search(phead, plist) == true)
|
|
break;
|
|
|
|
pnetwork = LIST_CONTAINOR(plist, struct wlan_network, list);
|
|
|
|
/* Commented by Albert 2011/05/18 */
|
|
/* Match the device address located in the P2P IE */
|
|
/* This is for the case that the P2P device address is not the same as the P2P interface address. */
|
|
|
|
p2pie = rtw_get_p2p_ie(&pnetwork->network.IEs[12], pnetwork->network.IELength - 12, NULL, &p2pielen);
|
|
if (p2pie) {
|
|
/* The P2P Device ID attribute is included in the Beacon frame. */
|
|
/* The P2P Device Info attribute is included in the probe response frame. */
|
|
|
|
if (rtw_get_p2p_attr_content(p2pie, p2pielen, P2P_ATTR_DEVICE_ID, attr_content, &attr_contentlen)) {
|
|
/* Handle the P2P Device ID attribute of Beacon first */
|
|
if (!memcmp(attr_content, pinvite_req_info->peer_macaddr, ETH_ALEN)) {
|
|
uintPeerChannel = pnetwork->network.Configuration.DSConfig;
|
|
break;
|
|
}
|
|
} else if (rtw_get_p2p_attr_content(p2pie, p2pielen, P2P_ATTR_DEVICE_INFO, attr_content, &attr_contentlen)) {
|
|
/* Handle the P2P Device Info attribute of probe response */
|
|
if (!memcmp(attr_content, pinvite_req_info->peer_macaddr, ETH_ALEN)) {
|
|
uintPeerChannel = pnetwork->network.Configuration.DSConfig;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
plist = get_next(plist);
|
|
}
|
|
|
|
_exit_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
if (uintPeerChannel) {
|
|
/* Store the GO's bssid */
|
|
for (jj = 0, kk = 18; jj < ETH_ALEN; jj++, kk += 3)
|
|
pinvite_req_info->go_bssid[jj] = key_2char2num(extra[kk], extra[kk + 1]);
|
|
|
|
/* Store the GO's ssid */
|
|
pinvite_req_info->ssidlen = wrqu->data.length - 36;
|
|
memcpy(pinvite_req_info->go_ssid, &extra[36], (u32) pinvite_req_info->ssidlen);
|
|
pinvite_req_info->benable = true;
|
|
pinvite_req_info->peer_ch = uintPeerChannel;
|
|
|
|
rtw_p2p_set_pre_state(pwdinfo, rtw_p2p_state(pwdinfo));
|
|
rtw_p2p_set_state(pwdinfo, P2P_STATE_TX_INVITE_REQ);
|
|
|
|
set_channel_bwmode(padapter, uintPeerChannel, HAL_PRIME_CHNL_OFFSET_DONT_CARE, HT_CHANNEL_WIDTH_20);
|
|
|
|
_set_timer(&pwdinfo->pre_tx_scan_timer, P2P_TX_PRESCAN_TIMEOUT);
|
|
|
|
_set_timer(&pwdinfo->restore_p2p_state_timer, P2P_INVITE_TIMEOUT);
|
|
} else {
|
|
DBG_88E("[%s] NOT Found in the Scanning Queue!\n", __func__);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_set_persistent(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
/* The input data is 0 or 1 */
|
|
/* 0: disable persistent group functionality */
|
|
/* 1: enable persistent group founctionality */
|
|
|
|
DBG_88E("[%s] data = %s\n", __func__, extra);
|
|
|
|
if (rtw_p2p_chk_state(pwdinfo, P2P_STATE_NONE)) {
|
|
DBG_88E("[%s] WiFi Direct is disable!\n", __func__);
|
|
return ret;
|
|
} else {
|
|
if (extra[0] == '0') /* Disable the persistent group function. */
|
|
pwdinfo->persistent_supported = false;
|
|
else if (extra[0] == '1') /* Enable the persistent group function. */
|
|
pwdinfo->persistent_supported = true;
|
|
else
|
|
pwdinfo->persistent_supported = false;
|
|
}
|
|
pr_info("[%s] persistent_supported = %d\n", __func__, pwdinfo->persistent_supported);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_prov_disc(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
u8 peerMAC[ETH_ALEN] = {0x00};
|
|
int jj, kk;
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
struct list_head *plist, *phead;
|
|
struct __queue *queue = &(pmlmepriv->scanned_queue);
|
|
struct wlan_network *pnetwork = NULL;
|
|
uint uintPeerChannel = 0;
|
|
u8 attr_content[100] = {0x00};
|
|
u8 *p2pie;
|
|
uint p2pielen = 0, attr_contentlen = 0;
|
|
unsigned long irqL;
|
|
|
|
/* The input data contains two informations. */
|
|
/* 1. First information is the MAC address which wants to issue the provisioning discovery request frame. */
|
|
/* 2. Second information is the WPS configuration method which wants to discovery */
|
|
/* Format: 00:E0:4C:00:00:05_display */
|
|
/* Format: 00:E0:4C:00:00:05_keypad */
|
|
/* Format: 00:E0:4C:00:00:05_pbc */
|
|
/* Format: 00:E0:4C:00:00:05_label */
|
|
|
|
DBG_88E("[%s] data = %s\n", __func__, extra);
|
|
|
|
if (pwdinfo->p2p_state == P2P_STATE_NONE) {
|
|
DBG_88E("[%s] WiFi Direct is disable!\n", __func__);
|
|
return ret;
|
|
} else {
|
|
/* Reset the content of struct tx_provdisc_req_info excluded the wps_config_method_request. */
|
|
_rtw_memset(pwdinfo->tx_prov_disc_info.peerDevAddr, 0x00, ETH_ALEN);
|
|
_rtw_memset(pwdinfo->tx_prov_disc_info.peerIFAddr, 0x00, ETH_ALEN);
|
|
_rtw_memset(&pwdinfo->tx_prov_disc_info.ssid, 0x00, sizeof(struct ndis_802_11_ssid));
|
|
pwdinfo->tx_prov_disc_info.peer_channel_num[0] = 0;
|
|
pwdinfo->tx_prov_disc_info.peer_channel_num[1] = 0;
|
|
pwdinfo->tx_prov_disc_info.benable = false;
|
|
}
|
|
|
|
for (jj = 0, kk = 0; jj < ETH_ALEN; jj++, kk += 3)
|
|
peerMAC[jj] = key_2char2num(extra[kk], extra[kk + 1]);
|
|
|
|
if (!memcmp(&extra[18], "display", 7)) {
|
|
pwdinfo->tx_prov_disc_info.wps_config_method_request = WPS_CM_DISPLYA;
|
|
} else if (!memcmp(&extra[18], "keypad", 7)) {
|
|
pwdinfo->tx_prov_disc_info.wps_config_method_request = WPS_CM_KEYPAD;
|
|
} else if (!memcmp(&extra[18], "pbc", 3)) {
|
|
pwdinfo->tx_prov_disc_info.wps_config_method_request = WPS_CM_PUSH_BUTTON;
|
|
} else if (!memcmp(&extra[18], "label", 5)) {
|
|
pwdinfo->tx_prov_disc_info.wps_config_method_request = WPS_CM_LABEL;
|
|
} else {
|
|
DBG_88E("[%s] Unknown WPS config methodn", __func__);
|
|
return ret;
|
|
}
|
|
|
|
_enter_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
phead = get_list_head(queue);
|
|
plist = get_next(phead);
|
|
|
|
while (1) {
|
|
if (rtw_end_of_queue_search(phead, plist) == true)
|
|
break;
|
|
|
|
if (uintPeerChannel != 0)
|
|
break;
|
|
|
|
pnetwork = LIST_CONTAINOR(plist, struct wlan_network, list);
|
|
|
|
/* Commented by Albert 2011/05/18 */
|
|
/* Match the device address located in the P2P IE */
|
|
/* This is for the case that the P2P device address is not the same as the P2P interface address. */
|
|
|
|
p2pie = rtw_get_p2p_ie(&pnetwork->network.IEs[12], pnetwork->network.IELength - 12, NULL, &p2pielen);
|
|
if (p2pie) {
|
|
while (p2pie) {
|
|
/* The P2P Device ID attribute is included in the Beacon frame. */
|
|
/* The P2P Device Info attribute is included in the probe response frame. */
|
|
|
|
if (rtw_get_p2p_attr_content(p2pie, p2pielen, P2P_ATTR_DEVICE_ID, attr_content, &attr_contentlen)) {
|
|
/* Handle the P2P Device ID attribute of Beacon first */
|
|
if (!memcmp(attr_content, peerMAC, ETH_ALEN)) {
|
|
uintPeerChannel = pnetwork->network.Configuration.DSConfig;
|
|
break;
|
|
}
|
|
} else if (rtw_get_p2p_attr_content(p2pie, p2pielen, P2P_ATTR_DEVICE_INFO, attr_content, &attr_contentlen)) {
|
|
/* Handle the P2P Device Info attribute of probe response */
|
|
if (!memcmp(attr_content, peerMAC, ETH_ALEN)) {
|
|
uintPeerChannel = pnetwork->network.Configuration.DSConfig;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Get the next P2P IE */
|
|
p2pie = rtw_get_p2p_ie(p2pie+p2pielen, pnetwork->network.IELength - 12 - (p2pie - &pnetwork->network.IEs[12] + p2pielen), NULL, &p2pielen);
|
|
}
|
|
}
|
|
|
|
plist = get_next(plist);
|
|
}
|
|
|
|
_exit_critical_bh(&(pmlmepriv->scanned_queue.lock), &irqL);
|
|
|
|
if (uintPeerChannel) {
|
|
DBG_88E("[%s] peer channel: %d!\n", __func__, uintPeerChannel);
|
|
memcpy(pwdinfo->tx_prov_disc_info.peerIFAddr, pnetwork->network.MacAddress, ETH_ALEN);
|
|
memcpy(pwdinfo->tx_prov_disc_info.peerDevAddr, peerMAC, ETH_ALEN);
|
|
pwdinfo->tx_prov_disc_info.peer_channel_num[0] = (u16) uintPeerChannel;
|
|
pwdinfo->tx_prov_disc_info.benable = true;
|
|
rtw_p2p_set_pre_state(pwdinfo, rtw_p2p_state(pwdinfo));
|
|
rtw_p2p_set_state(pwdinfo, P2P_STATE_TX_PROVISION_DIS_REQ);
|
|
|
|
if (rtw_p2p_chk_role(pwdinfo, P2P_ROLE_CLIENT)) {
|
|
memcpy(&pwdinfo->tx_prov_disc_info.ssid, &pnetwork->network.Ssid, sizeof(struct ndis_802_11_ssid));
|
|
} else if (rtw_p2p_chk_role(pwdinfo, P2P_ROLE_DEVICE) || rtw_p2p_chk_role(pwdinfo, P2P_ROLE_GO)) {
|
|
memcpy(pwdinfo->tx_prov_disc_info.ssid.Ssid, pwdinfo->p2p_wildcard_ssid, P2P_WILDCARD_SSID_LEN);
|
|
pwdinfo->tx_prov_disc_info.ssid.SsidLength = P2P_WILDCARD_SSID_LEN;
|
|
}
|
|
|
|
set_channel_bwmode(padapter, uintPeerChannel, HAL_PRIME_CHNL_OFFSET_DONT_CARE, HT_CHANNEL_WIDTH_20);
|
|
|
|
_set_timer(&pwdinfo->pre_tx_scan_timer, P2P_TX_PRESCAN_TIMEOUT);
|
|
|
|
_set_timer(&pwdinfo->restore_p2p_state_timer, P2P_PROVISION_TIMEOUT);
|
|
} else {
|
|
DBG_88E("[%s] NOT Found in the Scanning Queue!\n", __func__);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* This function is used to inform the driver the user had specified the pin code value or pbc */
|
|
/* to application. */
|
|
|
|
static int rtw_p2p_got_wpsinfo(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct wifidirect_info *pwdinfo = &(padapter->wdinfo);
|
|
|
|
DBG_88E("[%s] data = %s\n", __func__, extra);
|
|
/* Added by Albert 20110328 */
|
|
/* if the input data is P2P_NO_WPSINFO -> reset the wpsinfo */
|
|
/* if the input data is P2P_GOT_WPSINFO_PEER_DISPLAY_PIN -> the utility just input the PIN code got from the peer P2P device. */
|
|
/* if the input data is P2P_GOT_WPSINFO_SELF_DISPLAY_PIN -> the utility just got the PIN code from itself. */
|
|
/* if the input data is P2P_GOT_WPSINFO_PBC -> the utility just determine to use the PBC */
|
|
|
|
if (*extra == '0')
|
|
pwdinfo->ui_got_wps_info = P2P_NO_WPSINFO;
|
|
else if (*extra == '1')
|
|
pwdinfo->ui_got_wps_info = P2P_GOT_WPSINFO_PEER_DISPLAY_PIN;
|
|
else if (*extra == '2')
|
|
pwdinfo->ui_got_wps_info = P2P_GOT_WPSINFO_SELF_DISPLAY_PIN;
|
|
else if (*extra == '3')
|
|
pwdinfo->ui_got_wps_info = P2P_GOT_WPSINFO_PBC;
|
|
else
|
|
pwdinfo->ui_got_wps_info = P2P_NO_WPSINFO;
|
|
return ret;
|
|
}
|
|
|
|
#endif /* CONFIG_88EU_P2P */
|
|
|
|
static int rtw_p2p_set(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
|
|
#ifdef CONFIG_88EU_P2P
|
|
DBG_88E("[%s] extra = %s\n", __func__, extra);
|
|
if (!memcmp(extra, "enable =", 7)) {
|
|
rtw_wext_p2p_enable(dev, info, wrqu, &extra[7]);
|
|
} else if (!memcmp(extra, "setDN =", 6)) {
|
|
wrqu->data.length -= 6;
|
|
rtw_p2p_setDN(dev, info, wrqu, &extra[6]);
|
|
} else if (!memcmp(extra, "profilefound =", 13)) {
|
|
wrqu->data.length -= 13;
|
|
rtw_p2p_profilefound(dev, info, wrqu, &extra[13]);
|
|
} else if (!memcmp(extra, "prov_disc =", 10)) {
|
|
wrqu->data.length -= 10;
|
|
rtw_p2p_prov_disc(dev, info, wrqu, &extra[10]);
|
|
} else if (!memcmp(extra, "nego =", 5)) {
|
|
wrqu->data.length -= 5;
|
|
rtw_p2p_connect(dev, info, wrqu, &extra[5]);
|
|
} else if (!memcmp(extra, "intent =", 7)) {
|
|
/* Commented by Albert 2011/03/23 */
|
|
/* The wrqu->data.length will include the null character */
|
|
/* So, we will decrease 7 + 1 */
|
|
wrqu->data.length -= 8;
|
|
rtw_p2p_set_intent(dev, info, wrqu, &extra[7]);
|
|
} else if (!memcmp(extra, "ssid =", 5)) {
|
|
wrqu->data.length -= 5;
|
|
rtw_p2p_set_go_nego_ssid(dev, info, wrqu, &extra[5]);
|
|
} else if (!memcmp(extra, "got_wpsinfo =", 12)) {
|
|
wrqu->data.length -= 12;
|
|
rtw_p2p_got_wpsinfo(dev, info, wrqu, &extra[12]);
|
|
} else if (!memcmp(extra, "listen_ch =", 10)) {
|
|
/* Commented by Albert 2011/05/24 */
|
|
/* The wrqu->data.length will include the null character */
|
|
/* So, we will decrease (10 + 1) */
|
|
wrqu->data.length -= 11;
|
|
rtw_p2p_set_listen_ch(dev, info, wrqu, &extra[10]);
|
|
} else if (!memcmp(extra, "op_ch =", 6)) {
|
|
/* Commented by Albert 2011/05/24 */
|
|
/* The wrqu->data.length will include the null character */
|
|
/* So, we will decrease (6 + 1) */
|
|
wrqu->data.length -= 7;
|
|
rtw_p2p_set_op_ch(dev, info, wrqu, &extra[6]);
|
|
} else if (!memcmp(extra, "invite =", 7)) {
|
|
wrqu->data.length -= 8;
|
|
rtw_p2p_invite_req(dev, info, wrqu, &extra[7]);
|
|
} else if (!memcmp(extra, "persistent =", 11)) {
|
|
wrqu->data.length -= 11;
|
|
rtw_p2p_set_persistent(dev, info, wrqu, &extra[11]);
|
|
}
|
|
#endif /* CONFIG_88EU_P2P */
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
|
|
#ifdef CONFIG_88EU_P2P
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
if (padapter->bShowGetP2PState)
|
|
DBG_88E("[%s] extra = %s\n", __func__, (char *)wrqu->data.pointer);
|
|
if (!memcmp(wrqu->data.pointer, "status", 6)) {
|
|
rtw_p2p_get_status(dev, info, wrqu, extra);
|
|
} else if (!memcmp(wrqu->data.pointer, "role", 4)) {
|
|
rtw_p2p_get_role(dev, info, wrqu, extra);
|
|
} else if (!memcmp(wrqu->data.pointer, "peer_ifa", 8)) {
|
|
rtw_p2p_get_peer_ifaddr(dev, info, wrqu, extra);
|
|
} else if (!memcmp(wrqu->data.pointer, "req_cm", 6)) {
|
|
rtw_p2p_get_req_cm(dev, info, wrqu, extra);
|
|
} else if (!memcmp(wrqu->data.pointer, "peer_deva", 9)) {
|
|
/* Get the P2P device address when receiving the provision discovery request frame. */
|
|
rtw_p2p_get_peer_devaddr(dev, info, wrqu, extra);
|
|
} else if (!memcmp(wrqu->data.pointer, "group_id", 8)) {
|
|
rtw_p2p_get_groupid(dev, info, wrqu, extra);
|
|
} else if (!memcmp(wrqu->data.pointer, "peer_deva_inv", 9)) {
|
|
/* Get the P2P device address when receiving the P2P Invitation request frame. */
|
|
rtw_p2p_get_peer_devaddr_by_invitation(dev, info, wrqu, extra);
|
|
} else if (!memcmp(wrqu->data.pointer, "op_ch", 5)) {
|
|
rtw_p2p_get_op_ch(dev, info, wrqu, extra);
|
|
}
|
|
#endif /* CONFIG_88EU_P2P */
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_p2p_get2(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
|
|
#ifdef CONFIG_88EU_P2P
|
|
DBG_88E("[%s] extra = %s\n", __func__, (char *)wrqu->data.pointer);
|
|
if (!memcmp(extra, "wpsCM =", 6)) {
|
|
wrqu->data.length -= 6;
|
|
rtw_p2p_get_wps_configmethod(dev, info, wrqu, &extra[6]);
|
|
} else if (!memcmp(extra, "devN =", 5)) {
|
|
wrqu->data.length -= 5;
|
|
rtw_p2p_get_device_name(dev, info, wrqu, &extra[5]);
|
|
} else if (!memcmp(extra, "dev_type =", 9)) {
|
|
wrqu->data.length -= 9;
|
|
rtw_p2p_get_device_type(dev, info, wrqu, &extra[9]);
|
|
} else if (!memcmp(extra, "go_devadd =", 10)) {
|
|
wrqu->data.length -= 10;
|
|
rtw_p2p_get_go_device_address(dev, info, wrqu, &extra[10]);
|
|
} else if (!memcmp(extra, "InvProc =", 8)) {
|
|
wrqu->data.length -= 8;
|
|
rtw_p2p_get_invitation_procedure(dev, info, wrqu, &extra[8]);
|
|
}
|
|
|
|
#endif /* CONFIG_88EU_P2P */
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_cta_test_start(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
DBG_88E("%s %s\n", __func__, extra);
|
|
if (!strcmp(extra, "1"))
|
|
padapter->in_cta_test = 1;
|
|
else
|
|
padapter->in_cta_test = 0;
|
|
|
|
if (padapter->in_cta_test) {
|
|
u32 v = rtw_read32(padapter, REG_RCR);
|
|
v &= ~(RCR_CBSSID_DATA | RCR_CBSSID_BCN);/* RCR_ADF */
|
|
rtw_write32(padapter, REG_RCR, v);
|
|
DBG_88E("enable RCR_ADF\n");
|
|
} else {
|
|
u32 v = rtw_read32(padapter, REG_RCR);
|
|
v |= RCR_CBSSID_DATA | RCR_CBSSID_BCN;/* RCR_ADF */
|
|
rtw_write32(padapter, REG_RCR, v);
|
|
DBG_88E("disable RCR_ADF\n");
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_rereg_nd_name(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
struct rereg_nd_name_data *rereg_priv = &padapter->rereg_nd_name_priv;
|
|
char new_ifname[IFNAMSIZ];
|
|
|
|
if (rereg_priv->old_ifname[0] == 0) {
|
|
char *reg_ifname;
|
|
reg_ifname = padapter->registrypriv.if2name;
|
|
|
|
strncpy(rereg_priv->old_ifname, reg_ifname, IFNAMSIZ);
|
|
rereg_priv->old_ifname[IFNAMSIZ-1] = 0;
|
|
}
|
|
|
|
if (wrqu->data.length > IFNAMSIZ)
|
|
return -EFAULT;
|
|
|
|
if (copy_from_user(new_ifname, wrqu->data.pointer, IFNAMSIZ))
|
|
return -EFAULT;
|
|
|
|
if (0 == strcmp(rereg_priv->old_ifname, new_ifname))
|
|
return ret;
|
|
|
|
DBG_88E("%s new_ifname:%s\n", __func__, new_ifname);
|
|
ret = rtw_change_ifname(padapter, new_ifname);
|
|
if (0 != ret)
|
|
goto exit;
|
|
|
|
if (!memcmp(rereg_priv->old_ifname, "disable%d", 9) == true) {
|
|
padapter->ledpriv.bRegUseLed = rereg_priv->old_bRegUseLed;
|
|
rtw_hal_sw_led_init(padapter);
|
|
rtw_ips_mode_req(&padapter->pwrctrlpriv, rereg_priv->old_ips_mode);
|
|
}
|
|
|
|
strncpy(rereg_priv->old_ifname, new_ifname, IFNAMSIZ);
|
|
rereg_priv->old_ifname[IFNAMSIZ-1] = 0;
|
|
|
|
if (!memcmp(new_ifname, "disable%d", 9) == true) {
|
|
DBG_88E("%s disable\n", __func__);
|
|
/* free network queue for Android's timming issue */
|
|
rtw_free_network_queue(padapter, true);
|
|
|
|
/* close led */
|
|
rtw_led_control(padapter, LED_CTL_POWER_OFF);
|
|
rereg_priv->old_bRegUseLed = padapter->ledpriv.bRegUseLed;
|
|
padapter->ledpriv.bRegUseLed = false;
|
|
rtw_hal_sw_led_deinit(padapter);
|
|
|
|
/* the interface is being "disabled", we can do deeper IPS */
|
|
rereg_priv->old_ips_mode = rtw_get_ips_mode_req(&padapter->pwrctrlpriv);
|
|
rtw_ips_mode_req(&padapter->pwrctrlpriv, IPS_NORMAL);
|
|
}
|
|
exit:
|
|
return ret;
|
|
}
|
|
|
|
static void mac_reg_dump(struct adapter *padapter)
|
|
{
|
|
int i, j = 1;
|
|
pr_info("\n ======= MAC REG =======\n");
|
|
for (i = 0x0; i < 0x300; i += 4) {
|
|
if (j%4 == 1)
|
|
pr_info("0x%02x", i);
|
|
pr_info(" 0x%08x ", rtw_read32(padapter, i));
|
|
if ((j++)%4 == 0)
|
|
pr_info("\n");
|
|
}
|
|
for (i = 0x400; i < 0x800; i += 4) {
|
|
if (j%4 == 1)
|
|
pr_info("0x%02x", i);
|
|
pr_info(" 0x%08x ", rtw_read32(padapter, i));
|
|
if ((j++)%4 == 0)
|
|
pr_info("\n");
|
|
}
|
|
}
|
|
|
|
static void bb_reg_dump(struct adapter *padapter)
|
|
{
|
|
int i, j = 1;
|
|
pr_info("\n ======= BB REG =======\n");
|
|
for (i = 0x800; i < 0x1000; i += 4) {
|
|
if (j%4 == 1)
|
|
pr_info("0x%02x", i);
|
|
|
|
pr_info(" 0x%08x ", rtw_read32(padapter, i));
|
|
if ((j++)%4 == 0)
|
|
pr_info("\n");
|
|
}
|
|
}
|
|
|
|
static void rf_reg_dump(struct adapter *padapter)
|
|
{
|
|
int i, j = 1, path;
|
|
u32 value;
|
|
u8 rf_type, path_nums = 0;
|
|
rtw_hal_get_hwreg(padapter, HW_VAR_RF_TYPE, (u8 *)(&rf_type));
|
|
|
|
pr_info("\n ======= RF REG =======\n");
|
|
if ((RF_1T2R == rf_type) || (RF_1T1R == rf_type))
|
|
path_nums = 1;
|
|
else
|
|
path_nums = 2;
|
|
|
|
for (path = 0; path < path_nums; path++) {
|
|
pr_info("\nRF_Path(%x)\n", path);
|
|
for (i = 0; i < 0x100; i++) {
|
|
value = rtw_hal_read_rfreg(padapter, path, i, 0xffffffff);
|
|
if (j%4 == 1)
|
|
pr_info("0x%02x ", i);
|
|
pr_info(" 0x%08x ", value);
|
|
if ((j++)%4 == 0)
|
|
pr_info("\n");
|
|
}
|
|
}
|
|
}
|
|
|
|
static int rtw_dbg_port(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
unsigned long irqL;
|
|
int ret = 0;
|
|
u8 major_cmd, minor_cmd;
|
|
u16 arg;
|
|
s32 extra_arg;
|
|
u32 *pdata, val32;
|
|
struct sta_info *psta;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv;
|
|
struct mlme_ext_info *pmlmeinfo = &(pmlmeext->mlmext_info);
|
|
struct security_priv *psecuritypriv = &padapter->securitypriv;
|
|
struct wlan_network *cur_network = &(pmlmepriv->cur_network);
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
|
|
|
pdata = (u32 *)&wrqu->data;
|
|
|
|
val32 = *pdata;
|
|
arg = (u16)(val32 & 0x0000ffff);
|
|
major_cmd = (u8)(val32 >> 24);
|
|
minor_cmd = (u8)((val32 >> 16) & 0x00ff);
|
|
|
|
extra_arg = *(pdata+1);
|
|
|
|
switch (major_cmd) {
|
|
case 0x70:/* read_reg */
|
|
switch (minor_cmd) {
|
|
case 1:
|
|
DBG_88E("rtw_read8(0x%x) = 0x%02x\n", arg, rtw_read8(padapter, arg));
|
|
break;
|
|
case 2:
|
|
DBG_88E("rtw_read16(0x%x) = 0x%04x\n", arg, rtw_read16(padapter, arg));
|
|
break;
|
|
case 4:
|
|
DBG_88E("rtw_read32(0x%x) = 0x%08x\n", arg, rtw_read32(padapter, arg));
|
|
break;
|
|
}
|
|
break;
|
|
case 0x71:/* write_reg */
|
|
switch (minor_cmd) {
|
|
case 1:
|
|
rtw_write8(padapter, arg, extra_arg);
|
|
DBG_88E("rtw_write8(0x%x) = 0x%02x\n", arg, rtw_read8(padapter, arg));
|
|
break;
|
|
case 2:
|
|
rtw_write16(padapter, arg, extra_arg);
|
|
DBG_88E("rtw_write16(0x%x) = 0x%04x\n", arg, rtw_read16(padapter, arg));
|
|
break;
|
|
case 4:
|
|
rtw_write32(padapter, arg, extra_arg);
|
|
DBG_88E("rtw_write32(0x%x) = 0x%08x\n", arg, rtw_read32(padapter, arg));
|
|
break;
|
|
}
|
|
break;
|
|
case 0x72:/* read_bb */
|
|
DBG_88E("read_bbreg(0x%x) = 0x%x\n", arg, rtw_hal_read_bbreg(padapter, arg, 0xffffffff));
|
|
break;
|
|
case 0x73:/* write_bb */
|
|
rtw_hal_write_bbreg(padapter, arg, 0xffffffff, extra_arg);
|
|
DBG_88E("write_bbreg(0x%x) = 0x%x\n", arg, rtw_hal_read_bbreg(padapter, arg, 0xffffffff));
|
|
break;
|
|
case 0x74:/* read_rf */
|
|
DBG_88E("read RF_reg path(0x%02x), offset(0x%x), value(0x%08x)\n", minor_cmd, arg, rtw_hal_read_rfreg(padapter, minor_cmd, arg, 0xffffffff));
|
|
break;
|
|
case 0x75:/* write_rf */
|
|
rtw_hal_write_rfreg(padapter, minor_cmd, arg, 0xffffffff, extra_arg);
|
|
DBG_88E("write RF_reg path(0x%02x), offset(0x%x), value(0x%08x)\n", minor_cmd, arg, rtw_hal_read_rfreg(padapter, minor_cmd, arg, 0xffffffff));
|
|
break;
|
|
|
|
case 0x76:
|
|
switch (minor_cmd) {
|
|
case 0x00: /* normal mode, */
|
|
padapter->recvpriv.is_signal_dbg = 0;
|
|
break;
|
|
case 0x01: /* dbg mode */
|
|
padapter->recvpriv.is_signal_dbg = 1;
|
|
extra_arg = extra_arg > 100 ? 100 : extra_arg;
|
|
extra_arg = extra_arg < 0 ? 0 : extra_arg;
|
|
padapter->recvpriv.signal_strength_dbg = extra_arg;
|
|
break;
|
|
}
|
|
break;
|
|
case 0x78: /* IOL test */
|
|
switch (minor_cmd) {
|
|
case 0x04: /* LLT table initialization test */
|
|
{
|
|
u8 page_boundary = 0xf9;
|
|
struct xmit_frame *xmit_frame;
|
|
|
|
xmit_frame = rtw_IOL_accquire_xmit_frame(padapter);
|
|
if (xmit_frame == NULL) {
|
|
ret = -ENOMEM;
|
|
break;
|
|
}
|
|
|
|
rtw_IOL_append_LLT_cmd(xmit_frame, page_boundary);
|
|
|
|
if (_SUCCESS != rtw_IOL_exec_cmds_sync(padapter, xmit_frame, 500, 0))
|
|
ret = -EPERM;
|
|
}
|
|
break;
|
|
case 0x05: /* blink LED test */
|
|
{
|
|
u16 reg = 0x4c;
|
|
u32 blink_num = 50;
|
|
u32 blink_delay_ms = 200;
|
|
int i;
|
|
struct xmit_frame *xmit_frame;
|
|
|
|
xmit_frame = rtw_IOL_accquire_xmit_frame(padapter);
|
|
if (xmit_frame == NULL) {
|
|
ret = -ENOMEM;
|
|
break;
|
|
}
|
|
|
|
for (i = 0; i < blink_num; i++) {
|
|
rtw_IOL_append_WB_cmd(xmit_frame, reg, 0x00, 0xff);
|
|
rtw_IOL_append_DELAY_MS_cmd(xmit_frame, blink_delay_ms);
|
|
rtw_IOL_append_WB_cmd(xmit_frame, reg, 0x08, 0xff);
|
|
rtw_IOL_append_DELAY_MS_cmd(xmit_frame, blink_delay_ms);
|
|
}
|
|
if (_SUCCESS != rtw_IOL_exec_cmds_sync(padapter, xmit_frame, (blink_delay_ms*blink_num*2)+200, 0))
|
|
ret = -EPERM;
|
|
}
|
|
break;
|
|
|
|
case 0x06: /* continuous write byte test */
|
|
{
|
|
u16 reg = arg;
|
|
u16 start_value = 0;
|
|
u32 write_num = extra_arg;
|
|
int i;
|
|
u8 final;
|
|
struct xmit_frame *xmit_frame;
|
|
|
|
xmit_frame = rtw_IOL_accquire_xmit_frame(padapter);
|
|
if (xmit_frame == NULL) {
|
|
ret = -ENOMEM;
|
|
break;
|
|
}
|
|
|
|
for (i = 0; i < write_num; i++)
|
|
rtw_IOL_append_WB_cmd(xmit_frame, reg, i+start_value, 0xFF);
|
|
if (_SUCCESS != rtw_IOL_exec_cmds_sync(padapter, xmit_frame, 5000, 0))
|
|
ret = -EPERM;
|
|
|
|
final = rtw_read8(padapter, reg);
|
|
if (start_value+write_num-1 == final)
|
|
DBG_88E("continuous IOL_CMD_WB_REG to 0x%x %u times Success, start:%u, final:%u\n", reg, write_num, start_value, final);
|
|
else
|
|
DBG_88E("continuous IOL_CMD_WB_REG to 0x%x %u times Fail, start:%u, final:%u\n", reg, write_num, start_value, final);
|
|
}
|
|
break;
|
|
|
|
case 0x07: /* continuous write word test */
|
|
{
|
|
u16 reg = arg;
|
|
u16 start_value = 200;
|
|
u32 write_num = extra_arg;
|
|
|
|
int i;
|
|
u16 final;
|
|
struct xmit_frame *xmit_frame;
|
|
|
|
xmit_frame = rtw_IOL_accquire_xmit_frame(padapter);
|
|
if (xmit_frame == NULL) {
|
|
ret = -ENOMEM;
|
|
break;
|
|
}
|
|
|
|
for (i = 0; i < write_num; i++)
|
|
rtw_IOL_append_WW_cmd(xmit_frame, reg, i+start_value, 0xFFFF);
|
|
if (_SUCCESS != rtw_IOL_exec_cmds_sync(padapter, xmit_frame, 5000, 0))
|
|
ret = -EPERM;
|
|
|
|
final = rtw_read16(padapter, reg);
|
|
if (start_value+write_num-1 == final)
|
|
DBG_88E("continuous IOL_CMD_WW_REG to 0x%x %u times Success, start:%u, final:%u\n", reg, write_num, start_value, final);
|
|
else
|
|
DBG_88E("continuous IOL_CMD_WW_REG to 0x%x %u times Fail, start:%u, final:%u\n", reg, write_num, start_value, final);
|
|
}
|
|
break;
|
|
case 0x08: /* continuous write dword test */
|
|
{
|
|
u16 reg = arg;
|
|
u32 start_value = 0x110000c7;
|
|
u32 write_num = extra_arg;
|
|
|
|
int i;
|
|
u32 final;
|
|
struct xmit_frame *xmit_frame;
|
|
|
|
xmit_frame = rtw_IOL_accquire_xmit_frame(padapter);
|
|
if (xmit_frame == NULL) {
|
|
ret = -ENOMEM;
|
|
break;
|
|
}
|
|
|
|
for (i = 0; i < write_num; i++)
|
|
rtw_IOL_append_WD_cmd(xmit_frame, reg, i+start_value, 0xFFFFFFFF);
|
|
if (_SUCCESS != rtw_IOL_exec_cmds_sync(padapter, xmit_frame, 5000, 0))
|
|
ret = -EPERM;
|
|
|
|
final = rtw_read32(padapter, reg);
|
|
if (start_value+write_num-1 == final)
|
|
DBG_88E("continuous IOL_CMD_WD_REG to 0x%x %u times Success, start:%u, final:%u\n",
|
|
reg, write_num, start_value, final);
|
|
else
|
|
DBG_88E("continuous IOL_CMD_WD_REG to 0x%x %u times Fail, start:%u, final:%u\n",
|
|
reg, write_num, start_value, final);
|
|
}
|
|
break;
|
|
}
|
|
break;
|
|
case 0x79:
|
|
{
|
|
/*
|
|
* dbg 0x79000000 [value], set RESP_TXAGC to + value, value:0~15
|
|
* dbg 0x79010000 [value], set RESP_TXAGC to - value, value:0~15
|
|
*/
|
|
u8 value = extra_arg & 0x0f;
|
|
u8 sign = minor_cmd;
|
|
u16 write_value = 0;
|
|
|
|
DBG_88E("%s set RESP_TXAGC to %s %u\n", __func__, sign ? "minus" : "plus", value);
|
|
|
|
if (sign)
|
|
value = value | 0x10;
|
|
|
|
write_value = value | (value << 5);
|
|
rtw_write16(padapter, 0x6d9, write_value);
|
|
}
|
|
break;
|
|
case 0x7a:
|
|
receive_disconnect(padapter, pmlmeinfo->network.MacAddress
|
|
, WLAN_REASON_EXPIRATION_CHK);
|
|
break;
|
|
case 0x7F:
|
|
switch (minor_cmd) {
|
|
case 0x0:
|
|
DBG_88E("fwstate = 0x%x\n", get_fwstate(pmlmepriv));
|
|
break;
|
|
case 0x01:
|
|
DBG_88E("auth_alg = 0x%x, enc_alg = 0x%x, auth_type = 0x%x, enc_type = 0x%x\n",
|
|
psecuritypriv->dot11AuthAlgrthm, psecuritypriv->dot11PrivacyAlgrthm,
|
|
psecuritypriv->ndisauthtype, psecuritypriv->ndisencryptstatus);
|
|
break;
|
|
case 0x02:
|
|
DBG_88E("pmlmeinfo->state = 0x%x\n", pmlmeinfo->state);
|
|
break;
|
|
case 0x03:
|
|
DBG_88E("qos_option =%d\n", pmlmepriv->qospriv.qos_option);
|
|
DBG_88E("ht_option =%d\n", pmlmepriv->htpriv.ht_option);
|
|
break;
|
|
case 0x04:
|
|
DBG_88E("cur_ch =%d\n", pmlmeext->cur_channel);
|
|
DBG_88E("cur_bw =%d\n", pmlmeext->cur_bwmode);
|
|
DBG_88E("cur_ch_off =%d\n", pmlmeext->cur_ch_offset);
|
|
break;
|
|
case 0x05:
|
|
psta = rtw_get_stainfo(pstapriv, cur_network->network.MacAddress);
|
|
if (psta) {
|
|
int i;
|
|
struct recv_reorder_ctrl *preorder_ctrl;
|
|
|
|
DBG_88E("SSID =%s\n", cur_network->network.Ssid.Ssid);
|
|
DBG_88E("sta's macaddr: %pM\n", psta->hwaddr);
|
|
DBG_88E("cur_channel =%d, cur_bwmode =%d, cur_ch_offset =%d\n", pmlmeext->cur_channel, pmlmeext->cur_bwmode, pmlmeext->cur_ch_offset);
|
|
DBG_88E("rtsen =%d, cts2slef =%d\n", psta->rtsen, psta->cts2self);
|
|
DBG_88E("state = 0x%x, aid =%d, macid =%d, raid =%d\n", psta->state, psta->aid, psta->mac_id, psta->raid);
|
|
DBG_88E("qos_en =%d, ht_en =%d, init_rate =%d\n", psta->qos_option, psta->htpriv.ht_option, psta->init_rate);
|
|
DBG_88E("bwmode =%d, ch_offset =%d, sgi =%d\n", psta->htpriv.bwmode, psta->htpriv.ch_offset, psta->htpriv.sgi);
|
|
DBG_88E("ampdu_enable = %d\n", psta->htpriv.ampdu_enable);
|
|
DBG_88E("agg_enable_bitmap =%x, candidate_tid_bitmap =%x\n", psta->htpriv.agg_enable_bitmap, psta->htpriv.candidate_tid_bitmap);
|
|
for (i = 0; i < 16; i++) {
|
|
preorder_ctrl = &psta->recvreorder_ctrl[i];
|
|
if (preorder_ctrl->enable)
|
|
DBG_88E("tid =%d, indicate_seq =%d\n", i, preorder_ctrl->indicate_seq);
|
|
}
|
|
} else {
|
|
DBG_88E("can't get sta's macaddr, cur_network's macaddr:%pM\n", (cur_network->network.MacAddress));
|
|
}
|
|
break;
|
|
case 0x06:
|
|
{
|
|
u32 ODMFlag;
|
|
rtw_hal_get_hwreg(padapter, HW_VAR_DM_FLAG, (u8 *)(&ODMFlag));
|
|
DBG_88E("(B)DMFlag = 0x%x, arg = 0x%x\n", ODMFlag, arg);
|
|
ODMFlag = (u32)(0x0f&arg);
|
|
DBG_88E("(A)DMFlag = 0x%x\n", ODMFlag);
|
|
rtw_hal_set_hwreg(padapter, HW_VAR_DM_FLAG, (u8 *)(&ODMFlag));
|
|
}
|
|
break;
|
|
case 0x07:
|
|
DBG_88E("bSurpriseRemoved =%d, bDriverStopped =%d\n",
|
|
padapter->bSurpriseRemoved, padapter->bDriverStopped);
|
|
break;
|
|
case 0x08:
|
|
{
|
|
struct xmit_priv *pxmitpriv = &padapter->xmitpriv;
|
|
struct recv_priv *precvpriv = &padapter->recvpriv;
|
|
|
|
DBG_88E("free_xmitbuf_cnt =%d, free_xmitframe_cnt =%d, free_xmit_extbuf_cnt =%d\n",
|
|
pxmitpriv->free_xmitbuf_cnt, pxmitpriv->free_xmitframe_cnt, pxmitpriv->free_xmit_extbuf_cnt);
|
|
DBG_88E("rx_urb_pending_cn =%d\n", precvpriv->rx_pending_cnt);
|
|
}
|
|
break;
|
|
case 0x09:
|
|
{
|
|
int i, j;
|
|
struct list_head *plist, *phead;
|
|
struct recv_reorder_ctrl *preorder_ctrl;
|
|
|
|
#ifdef CONFIG_88EU_AP_MODE
|
|
DBG_88E("sta_dz_bitmap = 0x%x, tim_bitmap = 0x%x\n", pstapriv->sta_dz_bitmap, pstapriv->tim_bitmap);
|
|
#endif
|
|
_enter_critical_bh(&pstapriv->sta_hash_lock, &irqL);
|
|
|
|
for (i = 0; i < NUM_STA; i++) {
|
|
phead = &(pstapriv->sta_hash[i]);
|
|
plist = get_next(phead);
|
|
|
|
while ((rtw_end_of_queue_search(phead, plist)) == false) {
|
|
psta = LIST_CONTAINOR(plist, struct sta_info, hash_list);
|
|
|
|
plist = get_next(plist);
|
|
|
|
if (extra_arg == psta->aid) {
|
|
DBG_88E("sta's macaddr:%pM\n", (psta->hwaddr));
|
|
DBG_88E("rtsen =%d, cts2slef =%d\n", psta->rtsen, psta->cts2self);
|
|
DBG_88E("state = 0x%x, aid =%d, macid =%d, raid =%d\n", psta->state, psta->aid, psta->mac_id, psta->raid);
|
|
DBG_88E("qos_en =%d, ht_en =%d, init_rate =%d\n", psta->qos_option, psta->htpriv.ht_option, psta->init_rate);
|
|
DBG_88E("bwmode =%d, ch_offset =%d, sgi =%d\n", psta->htpriv.bwmode, psta->htpriv.ch_offset, psta->htpriv.sgi);
|
|
DBG_88E("ampdu_enable = %d\n", psta->htpriv.ampdu_enable);
|
|
DBG_88E("agg_enable_bitmap =%x, candidate_tid_bitmap =%x\n", psta->htpriv.agg_enable_bitmap, psta->htpriv.candidate_tid_bitmap);
|
|
|
|
#ifdef CONFIG_88EU_AP_MODE
|
|
DBG_88E("capability = 0x%x\n", psta->capability);
|
|
DBG_88E("flags = 0x%x\n", psta->flags);
|
|
DBG_88E("wpa_psk = 0x%x\n", psta->wpa_psk);
|
|
DBG_88E("wpa2_group_cipher = 0x%x\n", psta->wpa2_group_cipher);
|
|
DBG_88E("wpa2_pairwise_cipher = 0x%x\n", psta->wpa2_pairwise_cipher);
|
|
DBG_88E("qos_info = 0x%x\n", psta->qos_info);
|
|
#endif
|
|
DBG_88E("dot118021XPrivacy = 0x%x\n", psta->dot118021XPrivacy);
|
|
|
|
for (j = 0; j < 16; j++) {
|
|
preorder_ctrl = &psta->recvreorder_ctrl[j];
|
|
if (preorder_ctrl->enable)
|
|
DBG_88E("tid =%d, indicate_seq =%d\n", j, preorder_ctrl->indicate_seq);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
_exit_critical_bh(&pstapriv->sta_hash_lock, &irqL);
|
|
}
|
|
break;
|
|
case 0x0c:/* dump rx/tx packet */
|
|
if (arg == 0) {
|
|
DBG_88E("dump rx packet (%d)\n", extra_arg);
|
|
rtw_hal_set_def_var(padapter, HAL_DEF_DBG_DUMP_RXPKT, &(extra_arg));
|
|
} else if (arg == 1) {
|
|
DBG_88E("dump tx packet (%d)\n", extra_arg);
|
|
rtw_hal_set_def_var(padapter, HAL_DEF_DBG_DUMP_TXPKT, &(extra_arg));
|
|
}
|
|
break;
|
|
case 0x0f:
|
|
if (extra_arg == 0) {
|
|
DBG_88E("###### silent reset test.......#####\n");
|
|
rtw_hal_sreset_reset(padapter);
|
|
}
|
|
break;
|
|
case 0x15:
|
|
{
|
|
struct pwrctrl_priv *pwrpriv = &padapter->pwrctrlpriv;
|
|
DBG_88E("==>silent resete cnts:%d\n", pwrpriv->ips_enter_cnts);
|
|
}
|
|
break;
|
|
case 0x10:/* driver version display */
|
|
DBG_88E("rtw driver version =%s\n", DRIVERVERSION);
|
|
break;
|
|
case 0x11:
|
|
DBG_88E("turn %s Rx RSSI display function\n", (extra_arg == 1) ? "on" : "off");
|
|
padapter->bRxRSSIDisplay = extra_arg;
|
|
rtw_hal_set_def_var(padapter, HW_DEF_FA_CNT_DUMP, &extra_arg);
|
|
break;
|
|
case 0x12: /* set rx_stbc */
|
|
{
|
|
struct registry_priv *pregpriv = &padapter->registrypriv;
|
|
/* 0: disable, bit(0):enable 2.4g, bit(1):enable 5g, 0x3: enable both 2.4g and 5g */
|
|
/* default is set to enable 2.4GHZ for IOT issue with bufflao's AP at 5GHZ */
|
|
if (pregpriv &&
|
|
(extra_arg == 0 ||
|
|
extra_arg == 1 ||
|
|
extra_arg == 2 ||
|
|
extra_arg == 3)) {
|
|
pregpriv->rx_stbc = extra_arg;
|
|
DBG_88E("set rx_stbc =%d\n", pregpriv->rx_stbc);
|
|
} else {
|
|
DBG_88E("get rx_stbc =%d\n", pregpriv->rx_stbc);
|
|
}
|
|
}
|
|
break;
|
|
case 0x13: /* set ampdu_enable */
|
|
{
|
|
struct registry_priv *pregpriv = &padapter->registrypriv;
|
|
/* 0: disable, 0x1:enable (but wifi_spec should be 0), 0x2: force enable (don't care wifi_spec) */
|
|
if (pregpriv && extra_arg >= 0 && extra_arg < 3) {
|
|
pregpriv->ampdu_enable = extra_arg;
|
|
DBG_88E("set ampdu_enable =%d\n", pregpriv->ampdu_enable);
|
|
} else {
|
|
DBG_88E("get ampdu_enable =%d\n", pregpriv->ampdu_enable);
|
|
}
|
|
}
|
|
break;
|
|
case 0x14: /* get wifi_spec */
|
|
{
|
|
struct registry_priv *pregpriv = &padapter->registrypriv;
|
|
DBG_88E("get wifi_spec =%d\n", pregpriv->wifi_spec);
|
|
}
|
|
break;
|
|
case 0x16:
|
|
if (arg == 0xff) {
|
|
pr_info("ODM_COMP_DIG\t\tBIT0\n");
|
|
pr_info("ODM_COMP_RA_MASK\t\tBIT1\n");
|
|
pr_info("ODM_COMP_DYNAMIC_TXPWR\tBIT2\n");
|
|
pr_info("ODM_COMP_FA_CNT\t\tBIT3\n");
|
|
pr_info("ODM_COMP_RSSI_MONITOR\tBIT4\n");
|
|
pr_info("ODM_COMP_CCK_PD\t\tBIT5\n");
|
|
pr_info("ODM_COMP_ANT_DIV\t\tBIT6\n");
|
|
pr_info("ODM_COMP_PWR_SAVE\t\tBIT7\n");
|
|
pr_info("ODM_COMP_PWR_TRAIN\tBIT8\n");
|
|
pr_info("ODM_COMP_RATE_ADAPTIVE\tBIT9\n");
|
|
pr_info("ODM_COMP_PATH_DIV\t\tBIT10\n");
|
|
pr_info("ODM_COMP_PSD \tBIT11\n");
|
|
pr_info("ODM_COMP_DYNAMIC_PRICCA\tBIT12\n");
|
|
pr_info("ODM_COMP_RXHP\t\tBIT13\n");
|
|
pr_info("ODM_COMP_EDCA_TURBO\tBIT16\n");
|
|
pr_info("ODM_COMP_EARLY_MODE\tBIT17\n");
|
|
pr_info("ODM_COMP_TX_PWR_TRACK\tBIT24\n");
|
|
pr_info("ODM_COMP_RX_GAIN_TRACK\tBIT25\n");
|
|
pr_info("ODM_COMP_CALIBRATION\tBIT26\n");
|
|
rtw_hal_get_def_var(padapter, HW_DEF_ODM_DBG_FLAG, &extra_arg);
|
|
} else {
|
|
rtw_hal_set_def_var(padapter, HW_DEF_ODM_DBG_FLAG, &extra_arg);
|
|
}
|
|
break;
|
|
case 0x23:
|
|
DBG_88E("turn %s the bNotifyChannelChange Variable\n", (extra_arg == 1) ? "on" : "off");
|
|
padapter->bNotifyChannelChange = extra_arg;
|
|
break;
|
|
case 0x24:
|
|
#ifdef CONFIG_88EU_P2P
|
|
DBG_88E("turn %s the bShowGetP2PState Variable\n", (extra_arg == 1) ? "on" : "off");
|
|
padapter->bShowGetP2PState = extra_arg;
|
|
#endif /* CONFIG_88EU_P2P */
|
|
break;
|
|
case 0xaa:
|
|
if (extra_arg > 0x13)
|
|
extra_arg = 0xFF;
|
|
DBG_88E("chang data rate to :0x%02x\n", extra_arg);
|
|
padapter->fix_rate = extra_arg;
|
|
break;
|
|
case 0xdd:/* registers dump, 0 for mac reg, 1 for bb reg, 2 for rf reg */
|
|
if (extra_arg == 0)
|
|
mac_reg_dump(padapter);
|
|
else if (extra_arg == 1)
|
|
bb_reg_dump(padapter);
|
|
else if (extra_arg == 2)
|
|
rf_reg_dump(padapter);
|
|
break;
|
|
case 0xee:/* turn on/off dynamic funcs */
|
|
{
|
|
u32 odm_flag;
|
|
|
|
if (0xf == extra_arg) {
|
|
rtw_hal_get_def_var(padapter, HAL_DEF_DBG_DM_FUNC, &odm_flag);
|
|
DBG_88E(" === DMFlag(0x%08x) ===\n", odm_flag);
|
|
DBG_88E("extra_arg = 0 - disable all dynamic func\n");
|
|
DBG_88E("extra_arg = 1 - disable DIG- BIT(0)\n");
|
|
DBG_88E("extra_arg = 2 - disable High power - BIT(1)\n");
|
|
DBG_88E("extra_arg = 3 - disable tx power tracking - BIT(2)\n");
|
|
DBG_88E("extra_arg = 4 - disable BT coexistence - BIT(3)\n");
|
|
DBG_88E("extra_arg = 5 - disable antenna diversity - BIT(4)\n");
|
|
DBG_88E("extra_arg = 6 - enable all dynamic func\n");
|
|
} else {
|
|
/* extra_arg = 0 - disable all dynamic func
|
|
extra_arg = 1 - disable DIG
|
|
extra_arg = 2 - disable tx power tracking
|
|
extra_arg = 3 - turn on all dynamic func
|
|
*/
|
|
rtw_hal_set_def_var(padapter, HAL_DEF_DBG_DM_FUNC, &(extra_arg));
|
|
rtw_hal_get_def_var(padapter, HAL_DEF_DBG_DM_FUNC, &odm_flag);
|
|
DBG_88E(" === DMFlag(0x%08x) ===\n", odm_flag);
|
|
}
|
|
}
|
|
break;
|
|
|
|
case 0xfd:
|
|
rtw_write8(padapter, 0xc50, arg);
|
|
DBG_88E("wr(0xc50) = 0x%x\n", rtw_read8(padapter, 0xc50));
|
|
rtw_write8(padapter, 0xc58, arg);
|
|
DBG_88E("wr(0xc58) = 0x%x\n", rtw_read8(padapter, 0xc58));
|
|
break;
|
|
case 0xfe:
|
|
DBG_88E("rd(0xc50) = 0x%x\n", rtw_read8(padapter, 0xc50));
|
|
DBG_88E("rd(0xc58) = 0x%x\n", rtw_read8(padapter, 0xc58));
|
|
break;
|
|
case 0xff:
|
|
DBG_88E("dbg(0x210) = 0x%x\n", rtw_read32(padapter, 0x210));
|
|
DBG_88E("dbg(0x608) = 0x%x\n", rtw_read32(padapter, 0x608));
|
|
DBG_88E("dbg(0x280) = 0x%x\n", rtw_read32(padapter, 0x280));
|
|
DBG_88E("dbg(0x284) = 0x%x\n", rtw_read32(padapter, 0x284));
|
|
DBG_88E("dbg(0x288) = 0x%x\n", rtw_read32(padapter, 0x288));
|
|
|
|
DBG_88E("dbg(0x664) = 0x%x\n", rtw_read32(padapter, 0x664));
|
|
|
|
DBG_88E("\n");
|
|
|
|
DBG_88E("dbg(0x430) = 0x%x\n", rtw_read32(padapter, 0x430));
|
|
DBG_88E("dbg(0x438) = 0x%x\n", rtw_read32(padapter, 0x438));
|
|
|
|
DBG_88E("dbg(0x440) = 0x%x\n", rtw_read32(padapter, 0x440));
|
|
|
|
DBG_88E("dbg(0x458) = 0x%x\n", rtw_read32(padapter, 0x458));
|
|
|
|
DBG_88E("dbg(0x484) = 0x%x\n", rtw_read32(padapter, 0x484));
|
|
DBG_88E("dbg(0x488) = 0x%x\n", rtw_read32(padapter, 0x488));
|
|
|
|
DBG_88E("dbg(0x444) = 0x%x\n", rtw_read32(padapter, 0x444));
|
|
DBG_88E("dbg(0x448) = 0x%x\n", rtw_read32(padapter, 0x448));
|
|
DBG_88E("dbg(0x44c) = 0x%x\n", rtw_read32(padapter, 0x44c));
|
|
DBG_88E("dbg(0x450) = 0x%x\n", rtw_read32(padapter, 0x450));
|
|
break;
|
|
}
|
|
break;
|
|
default:
|
|
DBG_88E("error dbg cmd!\n");
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int wpa_set_param(struct net_device *dev, u8 name, u32 value)
|
|
{
|
|
uint ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
switch (name) {
|
|
case IEEE_PARAM_WPA_ENABLED:
|
|
padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; /* 802.1x */
|
|
switch ((value)&0xff) {
|
|
case 1: /* WPA */
|
|
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK; /* WPA_PSK */
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
|
|
break;
|
|
case 2: /* WPA2 */
|
|
padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK; /* WPA2_PSK */
|
|
padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
|
|
break;
|
|
}
|
|
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
|
|
("wpa_set_param:padapter->securitypriv.ndisauthtype =%d\n", padapter->securitypriv.ndisauthtype));
|
|
break;
|
|
case IEEE_PARAM_TKIP_COUNTERMEASURES:
|
|
break;
|
|
case IEEE_PARAM_DROP_UNENCRYPTED: {
|
|
/* HACK:
|
|
*
|
|
* wpa_supplicant calls set_wpa_enabled when the driver
|
|
* is loaded and unloaded, regardless of if WPA is being
|
|
* used. No other calls are made which can be used to
|
|
* determine if encryption will be used or not prior to
|
|
* association being expected. If encryption is not being
|
|
* used, drop_unencrypted is set to false, else true -- we
|
|
* can use this to determine if the CAP_PRIVACY_ON bit should
|
|
* be set.
|
|
*/
|
|
|
|
break;
|
|
}
|
|
case IEEE_PARAM_PRIVACY_INVOKED:
|
|
break;
|
|
|
|
case IEEE_PARAM_AUTH_ALGS:
|
|
ret = wpa_set_auth_algs(dev, value);
|
|
break;
|
|
case IEEE_PARAM_IEEE_802_1X:
|
|
break;
|
|
case IEEE_PARAM_WPAX_SELECT:
|
|
break;
|
|
default:
|
|
ret = -EOPNOTSUPP;
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int wpa_mlme(struct net_device *dev, u32 command, u32 reason)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
switch (command) {
|
|
case IEEE_MLME_STA_DEAUTH:
|
|
if (!rtw_set_802_11_disassociate(padapter))
|
|
ret = -1;
|
|
break;
|
|
case IEEE_MLME_STA_DISASSOC:
|
|
if (!rtw_set_802_11_disassociate(padapter))
|
|
ret = -1;
|
|
break;
|
|
default:
|
|
ret = -EOPNOTSUPP;
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int wpa_supplicant_ioctl(struct net_device *dev, struct iw_point *p)
|
|
{
|
|
struct ieee_param *param;
|
|
uint ret = 0;
|
|
|
|
if (p->length < sizeof(struct ieee_param) || !p->pointer) {
|
|
ret = -EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
param = (struct ieee_param *)rtw_malloc(p->length);
|
|
if (param == NULL) {
|
|
ret = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
if (copy_from_user(param, p->pointer, p->length)) {
|
|
kfree(param);
|
|
ret = -EFAULT;
|
|
goto out;
|
|
}
|
|
|
|
switch (param->cmd) {
|
|
case IEEE_CMD_SET_WPA_PARAM:
|
|
ret = wpa_set_param(dev, param->u.wpa_param.name, param->u.wpa_param.value);
|
|
break;
|
|
|
|
case IEEE_CMD_SET_WPA_IE:
|
|
ret = rtw_set_wpa_ie((struct adapter *)rtw_netdev_priv(dev),
|
|
(char *)param->u.wpa_ie.data, (u16)param->u.wpa_ie.len);
|
|
break;
|
|
|
|
case IEEE_CMD_SET_ENCRYPTION:
|
|
ret = wpa_set_encryption(dev, param, p->length);
|
|
break;
|
|
|
|
case IEEE_CMD_MLME:
|
|
ret = wpa_mlme(dev, param->u.mlme.command, param->u.mlme.reason_code);
|
|
break;
|
|
|
|
default:
|
|
DBG_88E("Unknown WPA supplicant request: %d\n", param->cmd);
|
|
ret = -EOPNOTSUPP;
|
|
break;
|
|
}
|
|
|
|
if (ret == 0 && copy_to_user(p->pointer, param, p->length))
|
|
ret = -EFAULT;
|
|
|
|
kfree(param);
|
|
|
|
out:
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifdef CONFIG_88EU_AP_MODE
|
|
static u8 set_pairwise_key(struct adapter *padapter, struct sta_info *psta)
|
|
{
|
|
struct cmd_obj *ph2c;
|
|
struct set_stakey_parm *psetstakey_para;
|
|
struct cmd_priv *pcmdpriv = &padapter->cmdpriv;
|
|
u8 res = _SUCCESS;
|
|
|
|
ph2c = (struct cmd_obj *)rtw_zmalloc(sizeof(struct cmd_obj));
|
|
if (ph2c == NULL) {
|
|
res = _FAIL;
|
|
goto exit;
|
|
}
|
|
|
|
psetstakey_para = (struct set_stakey_parm *)rtw_zmalloc(sizeof(struct set_stakey_parm));
|
|
if (psetstakey_para == NULL) {
|
|
kfree(ph2c);
|
|
res = _FAIL;
|
|
goto exit;
|
|
}
|
|
|
|
init_h2fwcmd_w_parm_no_rsp(ph2c, psetstakey_para, _SetStaKey_CMD_);
|
|
|
|
psetstakey_para->algorithm = (u8)psta->dot118021XPrivacy;
|
|
|
|
memcpy(psetstakey_para->addr, psta->hwaddr, ETH_ALEN);
|
|
|
|
memcpy(psetstakey_para->key, &psta->dot118021x_UncstKey, 16);
|
|
|
|
res = rtw_enqueue_cmd(pcmdpriv, ph2c);
|
|
|
|
exit:
|
|
|
|
return res;
|
|
}
|
|
|
|
static int set_group_key(struct adapter *padapter, u8 *key, u8 alg, int keyid)
|
|
{
|
|
u8 keylen;
|
|
struct cmd_obj *pcmd;
|
|
struct setkey_parm *psetkeyparm;
|
|
struct cmd_priv *pcmdpriv = &(padapter->cmdpriv);
|
|
int res = _SUCCESS;
|
|
|
|
DBG_88E("%s\n", __func__);
|
|
|
|
pcmd = (struct cmd_obj *)rtw_zmalloc(sizeof(struct cmd_obj));
|
|
if (pcmd == NULL) {
|
|
res = _FAIL;
|
|
goto exit;
|
|
}
|
|
psetkeyparm = (struct setkey_parm *)rtw_zmalloc(sizeof(struct setkey_parm));
|
|
if (psetkeyparm == NULL) {
|
|
kfree(pcmd);
|
|
res = _FAIL;
|
|
goto exit;
|
|
}
|
|
|
|
_rtw_memset(psetkeyparm, 0, sizeof(struct setkey_parm));
|
|
|
|
psetkeyparm->keyid = (u8)keyid;
|
|
|
|
psetkeyparm->algorithm = alg;
|
|
|
|
psetkeyparm->set_tx = 1;
|
|
|
|
switch (alg) {
|
|
case _WEP40_:
|
|
keylen = 5;
|
|
break;
|
|
case _WEP104_:
|
|
keylen = 13;
|
|
break;
|
|
case _TKIP_:
|
|
case _TKIP_WTMIC_:
|
|
case _AES_:
|
|
keylen = 16;
|
|
default:
|
|
keylen = 16;
|
|
}
|
|
|
|
memcpy(&(psetkeyparm->key[0]), key, keylen);
|
|
|
|
pcmd->cmdcode = _SetKey_CMD_;
|
|
pcmd->parmbuf = (u8 *)psetkeyparm;
|
|
pcmd->cmdsz = (sizeof(struct setkey_parm));
|
|
pcmd->rsp = NULL;
|
|
pcmd->rspsz = 0;
|
|
|
|
_rtw_init_listhead(&pcmd->list);
|
|
|
|
res = rtw_enqueue_cmd(pcmdpriv, pcmd);
|
|
|
|
exit:
|
|
|
|
return res;
|
|
}
|
|
|
|
static int set_wep_key(struct adapter *padapter, u8 *key, u8 keylen, int keyid)
|
|
{
|
|
u8 alg;
|
|
|
|
switch (keylen) {
|
|
case 5:
|
|
alg = _WEP40_;
|
|
break;
|
|
case 13:
|
|
alg = _WEP104_;
|
|
break;
|
|
default:
|
|
alg = _NO_PRIVACY_;
|
|
}
|
|
|
|
return set_group_key(padapter, key, alg, keyid);
|
|
}
|
|
|
|
static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len)
|
|
{
|
|
int ret = 0;
|
|
u32 wep_key_idx, wep_key_len, wep_total_len;
|
|
struct ndis_802_11_wep *pwep = NULL;
|
|
struct sta_info *psta = NULL, *pbcmc_sta = NULL;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
|
|
struct security_priv *psecuritypriv = &(padapter->securitypriv);
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
|
|
|
DBG_88E("%s\n", __func__);
|
|
param->u.crypt.err = 0;
|
|
param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
|
|
if (param_len != sizeof(struct ieee_param) + param->u.crypt.key_len) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
|
|
param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
|
|
param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
|
|
if (param->u.crypt.idx >= WEP_KEYS) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
} else {
|
|
psta = rtw_get_stainfo(pstapriv, param->sta_addr);
|
|
if (!psta) {
|
|
DBG_88E("rtw_set_encryption(), sta has already been removed or never been added\n");
|
|
goto exit;
|
|
}
|
|
}
|
|
|
|
if (strcmp(param->u.crypt.alg, "none") == 0 && (psta == NULL)) {
|
|
/* todo:clear default encryption keys */
|
|
|
|
DBG_88E("clear default encryption keys, keyid =%d\n", param->u.crypt.idx);
|
|
goto exit;
|
|
}
|
|
if (strcmp(param->u.crypt.alg, "WEP") == 0 && (psta == NULL)) {
|
|
DBG_88E("r871x_set_encryption, crypt.alg = WEP\n");
|
|
wep_key_idx = param->u.crypt.idx;
|
|
wep_key_len = param->u.crypt.key_len;
|
|
DBG_88E("r871x_set_encryption, wep_key_idx=%d, len=%d\n", wep_key_idx, wep_key_len);
|
|
if ((wep_key_idx >= WEP_KEYS) || (wep_key_len <= 0)) {
|
|
ret = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
if (wep_key_len > 0) {
|
|
wep_key_len = wep_key_len <= 5 ? 5 : 13;
|
|
wep_total_len = wep_key_len + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial);
|
|
pwep = (struct ndis_802_11_wep *)rtw_malloc(wep_total_len);
|
|
if (pwep == NULL) {
|
|
DBG_88E(" r871x_set_encryption: pwep allocate fail !!!\n");
|
|
goto exit;
|
|
}
|
|
|
|
_rtw_memset(pwep, 0, wep_total_len);
|
|
|
|
pwep->KeyLength = wep_key_len;
|
|
pwep->Length = wep_total_len;
|
|
}
|
|
|
|
pwep->KeyIndex = wep_key_idx;
|
|
|
|
memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength);
|
|
|
|
if (param->u.crypt.set_tx) {
|
|
DBG_88E("wep, set_tx = 1\n");
|
|
|
|
psecuritypriv->ndisencryptstatus = Ndis802_11Encryption1Enabled;
|
|
psecuritypriv->dot11PrivacyAlgrthm = _WEP40_;
|
|
psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
|
|
|
|
if (pwep->KeyLength == 13) {
|
|
psecuritypriv->dot11PrivacyAlgrthm = _WEP104_;
|
|
psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
|
|
}
|
|
|
|
psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx;
|
|
|
|
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
|
|
|
|
psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
|
|
|
|
set_wep_key(padapter, pwep->KeyMaterial, pwep->KeyLength, wep_key_idx);
|
|
} else {
|
|
DBG_88E("wep, set_tx = 0\n");
|
|
|
|
/* don't update "psecuritypriv->dot11PrivacyAlgrthm" and */
|
|
/* psecuritypriv->dot11PrivacyKeyIndex = keyid", but can rtw_set_key to cam */
|
|
|
|
memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
|
|
|
|
psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
|
|
|
|
set_wep_key(padapter, pwep->KeyMaterial, pwep->KeyLength, wep_key_idx);
|
|
}
|
|
|
|
goto exit;
|
|
}
|
|
|
|
if (!psta && check_fwstate(pmlmepriv, WIFI_AP_STATE)) { /* group key */
|
|
if (param->u.crypt.set_tx == 1) {
|
|
if (strcmp(param->u.crypt.alg, "WEP") == 0) {
|
|
DBG_88E("%s, set group_key, WEP\n", __func__);
|
|
|
|
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
|
|
param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
|
|
|
psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
|
|
if (param->u.crypt.key_len == 13)
|
|
psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
|
|
} else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
|
|
DBG_88E("%s, set group_key, TKIP\n", __func__);
|
|
psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
|
|
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
|
|
param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
|
/* set mic key */
|
|
memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
|
memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
|
|
|
psecuritypriv->busetkipkey = true;
|
|
} else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
|
|
DBG_88E("%s, set group_key, CCMP\n", __func__);
|
|
psecuritypriv->dot118021XGrpPrivacy = _AES_;
|
|
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
|
|
param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
|
} else {
|
|
DBG_88E("%s, set group_key, none\n", __func__);
|
|
psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
|
|
}
|
|
psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx;
|
|
psecuritypriv->binstallGrpkey = true;
|
|
psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/* */
|
|
set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx);
|
|
pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
|
|
if (pbcmc_sta) {
|
|
pbcmc_sta->ieee8021x_blocked = false;
|
|
pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */
|
|
}
|
|
}
|
|
goto exit;
|
|
}
|
|
|
|
if (psecuritypriv->dot11AuthAlgrthm == dot11AuthAlgrthm_8021X && psta) { /* psk/802_1x */
|
|
if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) {
|
|
if (param->u.crypt.set_tx == 1) {
|
|
memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
|
|
|
if (strcmp(param->u.crypt.alg, "WEP") == 0) {
|
|
DBG_88E("%s, set pairwise key, WEP\n", __func__);
|
|
|
|
psta->dot118021XPrivacy = _WEP40_;
|
|
if (param->u.crypt.key_len == 13)
|
|
psta->dot118021XPrivacy = _WEP104_;
|
|
} else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
|
|
DBG_88E("%s, set pairwise key, TKIP\n", __func__);
|
|
|
|
psta->dot118021XPrivacy = _TKIP_;
|
|
|
|
/* set mic key */
|
|
memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
|
|
memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
|
|
|
|
psecuritypriv->busetkipkey = true;
|
|
} else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
|
|
DBG_88E("%s, set pairwise key, CCMP\n", __func__);
|
|
|
|
psta->dot118021XPrivacy = _AES_;
|
|
} else {
|
|
DBG_88E("%s, set pairwise key, none\n", __func__);
|
|
|
|
psta->dot118021XPrivacy = _NO_PRIVACY_;
|
|
}
|
|
|
|
set_pairwise_key(padapter, psta);
|
|
|
|
psta->ieee8021x_blocked = false;
|
|
} else { /* group key??? */
|
|
if (strcmp(param->u.crypt.alg, "WEP") == 0) {
|
|
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
|
|
param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
|
psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
|
|
if (param->u.crypt.key_len == 13)
|
|
psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
|
|
} else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
|
|
psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
|
|
|
|
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
|
|
param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
|
|
|
/* set mic key */
|
|
memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
|
|
memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
|
|
|
|
psecuritypriv->busetkipkey = true;
|
|
} else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
|
|
psecuritypriv->dot118021XGrpPrivacy = _AES_;
|
|
|
|
memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
|
|
param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
|
|
} else {
|
|
psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
|
|
}
|
|
|
|
psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx;
|
|
|
|
psecuritypriv->binstallGrpkey = true;
|
|
|
|
psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/* */
|
|
|
|
set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx);
|
|
|
|
pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
|
|
if (pbcmc_sta) {
|
|
pbcmc_sta->ieee8021x_blocked = false;
|
|
pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
exit:
|
|
|
|
kfree(pwep);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_set_beacon(struct net_device *dev, struct ieee_param *param, int len)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
|
unsigned char *pbuf = param->u.bcn_ie.buf;
|
|
|
|
DBG_88E("%s, len =%d\n", __func__, len);
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
|
|
return -EINVAL;
|
|
|
|
memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2);
|
|
|
|
if ((pstapriv->max_num_sta > NUM_STA) || (pstapriv->max_num_sta <= 0))
|
|
pstapriv->max_num_sta = NUM_STA;
|
|
|
|
if (rtw_check_beacon_data(padapter, pbuf, (len-12-2)) == _SUCCESS)/* 12 = param header, 2:no packed */
|
|
ret = 0;
|
|
else
|
|
ret = -EINVAL;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_hostapd_sta_flush(struct net_device *dev)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
DBG_88E("%s\n", __func__);
|
|
|
|
flush_all_cam_entry(padapter); /* clear CAM */
|
|
|
|
ret = rtw_sta_flush(padapter);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_add_sta(struct net_device *dev, struct ieee_param *param)
|
|
{
|
|
int ret = 0;
|
|
struct sta_info *psta = NULL;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
|
|
|
DBG_88E("rtw_add_sta(aid =%d) =%pM\n", param->u.add_sta.aid, (param->sta_addr));
|
|
|
|
if (!check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)))
|
|
return -EINVAL;
|
|
|
|
if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
|
|
param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
|
|
param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff)
|
|
return -EINVAL;
|
|
|
|
psta = rtw_get_stainfo(pstapriv, param->sta_addr);
|
|
if (psta) {
|
|
int flags = param->u.add_sta.flags;
|
|
|
|
psta->aid = param->u.add_sta.aid;/* aid = 1~2007 */
|
|
|
|
memcpy(psta->bssrateset, param->u.add_sta.tx_supp_rates, 16);
|
|
|
|
/* check wmm cap. */
|
|
if (WLAN_STA_WME&flags)
|
|
psta->qos_option = 1;
|
|
else
|
|
psta->qos_option = 0;
|
|
|
|
if (pmlmepriv->qospriv.qos_option == 0)
|
|
psta->qos_option = 0;
|
|
|
|
/* chec 802.11n ht cap. */
|
|
if (WLAN_STA_HT&flags) {
|
|
psta->htpriv.ht_option = true;
|
|
psta->qos_option = 1;
|
|
memcpy((void *)&psta->htpriv.ht_cap, (void *)¶m->u.add_sta.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
|
|
} else {
|
|
psta->htpriv.ht_option = false;
|
|
}
|
|
|
|
if (pmlmepriv->htpriv.ht_option == false)
|
|
psta->htpriv.ht_option = false;
|
|
|
|
update_sta_info_apmode(padapter, psta);
|
|
} else {
|
|
ret = -ENOMEM;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_del_sta(struct net_device *dev, struct ieee_param *param)
|
|
{
|
|
unsigned long irqL;
|
|
int ret = 0;
|
|
struct sta_info *psta = NULL;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
|
int updated = 0;
|
|
|
|
DBG_88E("rtw_del_sta =%pM\n", (param->sta_addr));
|
|
|
|
if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
|
|
return -EINVAL;
|
|
|
|
if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
|
|
param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
|
|
param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff)
|
|
return -EINVAL;
|
|
|
|
psta = rtw_get_stainfo(pstapriv, param->sta_addr);
|
|
if (psta) {
|
|
_enter_critical_bh(&pstapriv->asoc_list_lock, &irqL);
|
|
if (!rtw_is_list_empty(&psta->asoc_list)) {
|
|
rtw_list_delete(&psta->asoc_list);
|
|
pstapriv->asoc_list_cnt--;
|
|
updated = ap_free_sta(padapter, psta, true, WLAN_REASON_DEAUTH_LEAVING);
|
|
}
|
|
_exit_critical_bh(&pstapriv->asoc_list_lock, &irqL);
|
|
associated_clients_update(padapter, updated);
|
|
psta = NULL;
|
|
} else {
|
|
DBG_88E("rtw_del_sta(), sta has already been removed or never been added\n");
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_ioctl_get_sta_data(struct net_device *dev, struct ieee_param *param, int len)
|
|
{
|
|
int ret = 0;
|
|
struct sta_info *psta = NULL;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
|
struct ieee_param_ex *param_ex = (struct ieee_param_ex *)param;
|
|
struct sta_data *psta_data = (struct sta_data *)param_ex->data;
|
|
|
|
DBG_88E("rtw_ioctl_get_sta_info, sta_addr: %pM\n", (param_ex->sta_addr));
|
|
|
|
if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
|
|
return -EINVAL;
|
|
|
|
if (param_ex->sta_addr[0] == 0xff && param_ex->sta_addr[1] == 0xff &&
|
|
param_ex->sta_addr[2] == 0xff && param_ex->sta_addr[3] == 0xff &&
|
|
param_ex->sta_addr[4] == 0xff && param_ex->sta_addr[5] == 0xff)
|
|
return -EINVAL;
|
|
|
|
psta = rtw_get_stainfo(pstapriv, param_ex->sta_addr);
|
|
if (psta) {
|
|
psta_data->aid = (u16)psta->aid;
|
|
psta_data->capability = psta->capability;
|
|
psta_data->flags = psta->flags;
|
|
|
|
/*
|
|
nonerp_set : BIT(0)
|
|
no_short_slot_time_set : BIT(1)
|
|
no_short_preamble_set : BIT(2)
|
|
no_ht_gf_set : BIT(3)
|
|
no_ht_set : BIT(4)
|
|
ht_20mhz_set : BIT(5)
|
|
*/
|
|
|
|
psta_data->sta_set = ((psta->nonerp_set) |
|
|
(psta->no_short_slot_time_set << 1) |
|
|
(psta->no_short_preamble_set << 2) |
|
|
(psta->no_ht_gf_set << 3) |
|
|
(psta->no_ht_set << 4) |
|
|
(psta->ht_20mhz_set << 5));
|
|
psta_data->tx_supp_rates_len = psta->bssratelen;
|
|
memcpy(psta_data->tx_supp_rates, psta->bssrateset, psta->bssratelen);
|
|
memcpy(&psta_data->ht_cap, &psta->htpriv.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
|
|
psta_data->rx_pkts = psta->sta_stats.rx_data_pkts;
|
|
psta_data->rx_bytes = psta->sta_stats.rx_bytes;
|
|
psta_data->rx_drops = psta->sta_stats.rx_drops;
|
|
psta_data->tx_pkts = psta->sta_stats.tx_pkts;
|
|
psta_data->tx_bytes = psta->sta_stats.tx_bytes;
|
|
psta_data->tx_drops = psta->sta_stats.tx_drops;
|
|
} else {
|
|
ret = -1;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_get_sta_wpaie(struct net_device *dev, struct ieee_param *param)
|
|
{
|
|
int ret = 0;
|
|
struct sta_info *psta = NULL;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
|
|
|
DBG_88E("rtw_get_sta_wpaie, sta_addr: %pM\n", (param->sta_addr));
|
|
|
|
if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
|
|
return -EINVAL;
|
|
|
|
if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
|
|
param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
|
|
param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff)
|
|
return -EINVAL;
|
|
|
|
psta = rtw_get_stainfo(pstapriv, param->sta_addr);
|
|
if (psta) {
|
|
if ((psta->wpa_ie[0] == WLAN_EID_RSN) || (psta->wpa_ie[0] == WLAN_EID_GENERIC)) {
|
|
int wpa_ie_len;
|
|
int copy_len;
|
|
|
|
wpa_ie_len = psta->wpa_ie[1];
|
|
copy_len = ((wpa_ie_len+2) > sizeof(psta->wpa_ie)) ? (sizeof(psta->wpa_ie)) : (wpa_ie_len+2);
|
|
param->u.wpa_ie.len = copy_len;
|
|
memcpy(param->u.wpa_ie.reserved, psta->wpa_ie, copy_len);
|
|
} else {
|
|
DBG_88E("sta's wpa_ie is NONE\n");
|
|
}
|
|
} else {
|
|
ret = -1;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_set_wps_beacon(struct net_device *dev, struct ieee_param *param, int len)
|
|
{
|
|
int ret = 0;
|
|
unsigned char wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct mlme_ext_priv *pmlmeext = &(padapter->mlmeextpriv);
|
|
int ie_len;
|
|
|
|
DBG_88E("%s, len =%d\n", __func__, len);
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
|
|
return -EINVAL;
|
|
|
|
ie_len = len-12-2;/* 12 = param header, 2:no packed */
|
|
|
|
if (pmlmepriv->wps_beacon_ie) {
|
|
kfree(pmlmepriv->wps_beacon_ie);
|
|
pmlmepriv->wps_beacon_ie = NULL;
|
|
}
|
|
|
|
if (ie_len > 0) {
|
|
pmlmepriv->wps_beacon_ie = rtw_malloc(ie_len);
|
|
pmlmepriv->wps_beacon_ie_len = ie_len;
|
|
if (pmlmepriv->wps_beacon_ie == NULL) {
|
|
DBG_88E("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
|
|
return -EINVAL;
|
|
}
|
|
|
|
memcpy(pmlmepriv->wps_beacon_ie, param->u.bcn_ie.buf, ie_len);
|
|
|
|
update_beacon(padapter, _VENDOR_SPECIFIC_IE_, wps_oui, true);
|
|
|
|
pmlmeext->bstart_bss = true;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_set_wps_probe_resp(struct net_device *dev, struct ieee_param *param, int len)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
int ie_len;
|
|
|
|
DBG_88E("%s, len =%d\n", __func__, len);
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
|
|
return -EINVAL;
|
|
|
|
ie_len = len-12-2;/* 12 = param header, 2:no packed */
|
|
|
|
if (pmlmepriv->wps_probe_resp_ie) {
|
|
kfree(pmlmepriv->wps_probe_resp_ie);
|
|
pmlmepriv->wps_probe_resp_ie = NULL;
|
|
}
|
|
|
|
if (ie_len > 0) {
|
|
pmlmepriv->wps_probe_resp_ie = rtw_malloc(ie_len);
|
|
pmlmepriv->wps_probe_resp_ie_len = ie_len;
|
|
if (pmlmepriv->wps_probe_resp_ie == NULL) {
|
|
DBG_88E("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
|
|
return -EINVAL;
|
|
}
|
|
memcpy(pmlmepriv->wps_probe_resp_ie, param->u.bcn_ie.buf, ie_len);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_set_wps_assoc_resp(struct net_device *dev, struct ieee_param *param, int len)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
int ie_len;
|
|
|
|
DBG_88E("%s, len =%d\n", __func__, len);
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
|
|
return -EINVAL;
|
|
|
|
ie_len = len-12-2;/* 12 = param header, 2:no packed */
|
|
|
|
if (pmlmepriv->wps_assoc_resp_ie) {
|
|
kfree(pmlmepriv->wps_assoc_resp_ie);
|
|
pmlmepriv->wps_assoc_resp_ie = NULL;
|
|
}
|
|
|
|
if (ie_len > 0) {
|
|
pmlmepriv->wps_assoc_resp_ie = rtw_malloc(ie_len);
|
|
pmlmepriv->wps_assoc_resp_ie_len = ie_len;
|
|
if (pmlmepriv->wps_assoc_resp_ie == NULL) {
|
|
DBG_88E("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
|
|
return -EINVAL;
|
|
}
|
|
|
|
memcpy(pmlmepriv->wps_assoc_resp_ie, param->u.bcn_ie.buf, ie_len);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_set_hidden_ssid(struct net_device *dev, struct ieee_param *param, int len)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
struct mlme_ext_priv *pmlmeext = &(padapter->mlmeextpriv);
|
|
struct mlme_ext_info *pmlmeinfo = &(pmlmeext->mlmext_info);
|
|
|
|
u8 value;
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
|
|
return -EINVAL;
|
|
|
|
if (param->u.wpa_param.name != 0) /* dummy test... */
|
|
DBG_88E("%s name(%u) != 0\n", __func__, param->u.wpa_param.name);
|
|
value = param->u.wpa_param.value;
|
|
|
|
/* use the same definition of hostapd's ignore_broadcast_ssid */
|
|
if (value != 1 && value != 2)
|
|
value = 0;
|
|
DBG_88E("%s value(%u)\n", __func__, value);
|
|
pmlmeinfo->hidden_ssid_mode = value;
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_ioctl_acl_remove_sta(struct net_device *dev, struct ieee_param *param, int len)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
|
|
return -EINVAL;
|
|
|
|
if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
|
|
param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
|
|
param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff)
|
|
return -EINVAL;
|
|
ret = rtw_acl_remove_sta(padapter, param->sta_addr);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_ioctl_acl_add_sta(struct net_device *dev, struct ieee_param *param, int len)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
|
|
return -EINVAL;
|
|
|
|
if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
|
|
param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
|
|
param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff)
|
|
return -EINVAL;
|
|
ret = rtw_acl_add_sta(padapter, param->sta_addr);
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_ioctl_set_macaddr_acl(struct net_device *dev, struct ieee_param *param, int len)
|
|
{
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
|
|
if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
|
|
return -EINVAL;
|
|
|
|
rtw_set_macaddr_acl(padapter, param->u.mlme.command);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_hostapd_ioctl(struct net_device *dev, struct iw_point *p)
|
|
{
|
|
struct ieee_param *param;
|
|
int ret = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
/*
|
|
* this function is expect to call in master mode, which allows no power saving
|
|
* so, we just check hw_init_completed
|
|
*/
|
|
|
|
if (!padapter->hw_init_completed) {
|
|
ret = -EPERM;
|
|
goto out;
|
|
}
|
|
|
|
if (!p->pointer) {
|
|
ret = -EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
param = (struct ieee_param *)rtw_malloc(p->length);
|
|
if (param == NULL) {
|
|
ret = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
if (copy_from_user(param, p->pointer, p->length)) {
|
|
kfree(param);
|
|
ret = -EFAULT;
|
|
goto out;
|
|
}
|
|
|
|
switch (param->cmd) {
|
|
case RTL871X_HOSTAPD_FLUSH:
|
|
ret = rtw_hostapd_sta_flush(dev);
|
|
break;
|
|
case RTL871X_HOSTAPD_ADD_STA:
|
|
ret = rtw_add_sta(dev, param);
|
|
break;
|
|
case RTL871X_HOSTAPD_REMOVE_STA:
|
|
ret = rtw_del_sta(dev, param);
|
|
break;
|
|
case RTL871X_HOSTAPD_SET_BEACON:
|
|
ret = rtw_set_beacon(dev, param, p->length);
|
|
break;
|
|
case RTL871X_SET_ENCRYPTION:
|
|
ret = rtw_set_encryption(dev, param, p->length);
|
|
break;
|
|
case RTL871X_HOSTAPD_GET_WPAIE_STA:
|
|
ret = rtw_get_sta_wpaie(dev, param);
|
|
break;
|
|
case RTL871X_HOSTAPD_SET_WPS_BEACON:
|
|
ret = rtw_set_wps_beacon(dev, param, p->length);
|
|
break;
|
|
case RTL871X_HOSTAPD_SET_WPS_PROBE_RESP:
|
|
ret = rtw_set_wps_probe_resp(dev, param, p->length);
|
|
break;
|
|
case RTL871X_HOSTAPD_SET_WPS_ASSOC_RESP:
|
|
ret = rtw_set_wps_assoc_resp(dev, param, p->length);
|
|
break;
|
|
case RTL871X_HOSTAPD_SET_HIDDEN_SSID:
|
|
ret = rtw_set_hidden_ssid(dev, param, p->length);
|
|
break;
|
|
case RTL871X_HOSTAPD_GET_INFO_STA:
|
|
ret = rtw_ioctl_get_sta_data(dev, param, p->length);
|
|
break;
|
|
case RTL871X_HOSTAPD_SET_MACADDR_ACL:
|
|
ret = rtw_ioctl_set_macaddr_acl(dev, param, p->length);
|
|
break;
|
|
case RTL871X_HOSTAPD_ACL_ADD_STA:
|
|
ret = rtw_ioctl_acl_add_sta(dev, param, p->length);
|
|
break;
|
|
case RTL871X_HOSTAPD_ACL_REMOVE_STA:
|
|
ret = rtw_ioctl_acl_remove_sta(dev, param, p->length);
|
|
break;
|
|
default:
|
|
DBG_88E("Unknown hostapd request: %d\n", param->cmd);
|
|
ret = -EOPNOTSUPP;
|
|
break;
|
|
}
|
|
|
|
if (ret == 0 && copy_to_user(p->pointer, param, p->length))
|
|
ret = -EFAULT;
|
|
kfree(param);
|
|
out:
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
#include <rtw_android.h>
|
|
static int rtw_wx_set_priv(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *awrq,
|
|
char *extra)
|
|
{
|
|
int ret = 0;
|
|
int len = 0;
|
|
char *ext;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct iw_point *dwrq = (struct iw_point *)awrq;
|
|
|
|
if (dwrq->length == 0)
|
|
return -EFAULT;
|
|
|
|
len = dwrq->length;
|
|
ext = rtw_vmalloc(len);
|
|
if (!ext)
|
|
return -ENOMEM;
|
|
|
|
if (copy_from_user(ext, dwrq->pointer, len)) {
|
|
rtw_vmfree(ext, len);
|
|
return -EFAULT;
|
|
}
|
|
|
|
/* added for wps2.0 @20110524 */
|
|
if (dwrq->flags == 0x8766 && len > 8) {
|
|
u32 cp_sz;
|
|
struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
|
|
u8 *probereq_wpsie = ext;
|
|
int probereq_wpsie_len = len;
|
|
u8 wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
|
|
|
|
if ((_VENDOR_SPECIFIC_IE_ == probereq_wpsie[0]) &&
|
|
(!memcmp(&probereq_wpsie[2], wps_oui, 4))) {
|
|
cp_sz = probereq_wpsie_len > MAX_WPS_IE_LEN ? MAX_WPS_IE_LEN : probereq_wpsie_len;
|
|
|
|
pmlmepriv->wps_probe_req_ie_len = 0;
|
|
kfree(pmlmepriv->wps_probe_req_ie);
|
|
pmlmepriv->wps_probe_req_ie = NULL;
|
|
|
|
pmlmepriv->wps_probe_req_ie = rtw_malloc(cp_sz);
|
|
if (pmlmepriv->wps_probe_req_ie == NULL) {
|
|
pr_info("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
|
|
ret = -EINVAL;
|
|
goto FREE_EXT;
|
|
}
|
|
memcpy(pmlmepriv->wps_probe_req_ie, probereq_wpsie, cp_sz);
|
|
pmlmepriv->wps_probe_req_ie_len = cp_sz;
|
|
}
|
|
goto FREE_EXT;
|
|
}
|
|
|
|
if (len >= WEXT_CSCAN_HEADER_SIZE &&
|
|
!memcmp(ext, WEXT_CSCAN_HEADER, WEXT_CSCAN_HEADER_SIZE)) {
|
|
ret = rtw_wx_set_scan(dev, info, awrq, ext);
|
|
goto FREE_EXT;
|
|
}
|
|
|
|
FREE_EXT:
|
|
|
|
rtw_vmfree(ext, len);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_pm_set(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
int ret = 0;
|
|
unsigned mode = 0;
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
|
|
DBG_88E("[%s] extra = %s\n", __func__, extra);
|
|
|
|
if (!memcmp(extra, "lps =", 4)) {
|
|
sscanf(extra+4, "%u", &mode);
|
|
ret = rtw_pm_set_lps(padapter, mode);
|
|
} else if (!memcmp(extra, "ips =", 4)) {
|
|
sscanf(extra+4, "%u", &mode);
|
|
ret = rtw_pm_set_ips(padapter, mode);
|
|
} else {
|
|
ret = -EINVAL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int rtw_mp_efuse_get(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wdata, char *extra)
|
|
{
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
struct eeprom_priv *pEEPROM = GET_EEPROM_EFUSE_PRIV(padapter);
|
|
struct hal_data_8188e *haldata = GET_HAL_DATA(padapter);
|
|
struct efuse_hal *pEfuseHal;
|
|
struct iw_point *wrqu;
|
|
|
|
u8 *PROMContent = pEEPROM->efuse_eeprom_data;
|
|
u8 ips_mode = 0, lps_mode = 0;
|
|
struct pwrctrl_priv *pwrctrlpriv;
|
|
u8 *data = NULL;
|
|
u8 *rawdata = NULL;
|
|
char *pch, *ptmp, *token, *tmp[3] = {NULL, NULL, NULL};
|
|
u16 i = 0, j = 0, mapLen = 0, addr = 0, cnts = 0;
|
|
u16 max_available_size = 0, raw_cursize = 0, raw_maxsize = 0;
|
|
int err;
|
|
u8 org_fw_iol = padapter->registrypriv.fw_iol;/* 0:Disable, 1:enable, 2:by usb speed */
|
|
|
|
wrqu = (struct iw_point *)wdata;
|
|
pwrctrlpriv = &padapter->pwrctrlpriv;
|
|
pEfuseHal = &haldata->EfuseHal;
|
|
|
|
err = 0;
|
|
data = _rtw_zmalloc(EFUSE_BT_MAX_MAP_LEN);
|
|
if (data == NULL) {
|
|
err = -ENOMEM;
|
|
goto exit;
|
|
}
|
|
rawdata = _rtw_zmalloc(EFUSE_BT_MAX_MAP_LEN);
|
|
if (rawdata == NULL) {
|
|
err = -ENOMEM;
|
|
goto exit;
|
|
}
|
|
|
|
if (copy_from_user(extra, wrqu->pointer, wrqu->length)) {
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
lps_mode = pwrctrlpriv->power_mgnt;/* keep org value */
|
|
rtw_pm_set_lps(padapter, PS_MODE_ACTIVE);
|
|
|
|
ips_mode = pwrctrlpriv->ips_mode;/* keep org value */
|
|
rtw_pm_set_ips(padapter, IPS_NONE);
|
|
|
|
pch = extra;
|
|
DBG_88E("%s: in =%s\n", __func__, extra);
|
|
|
|
i = 0;
|
|
/* mac 16 "00e04c871200" rmap, 00, 2 */
|
|
while ((token = strsep(&pch, ",")) != NULL) {
|
|
if (i > 2)
|
|
break;
|
|
tmp[i] = token;
|
|
i++;
|
|
}
|
|
padapter->registrypriv.fw_iol = 0;/* 0:Disable, 1:enable, 2:by usb speed */
|
|
|
|
if (strcmp(tmp[0], "status") == 0) {
|
|
sprintf(extra, "Load File efuse =%s, Load File MAC =%s", (pEEPROM->bloadfile_fail_flag ? "FAIL" : "OK"), (pEEPROM->bloadmac_fail_flag ? "FAIL" : "OK"));
|
|
|
|
goto exit;
|
|
} else if (strcmp(tmp[0], "filemap") == 0) {
|
|
mapLen = EFUSE_MAP_SIZE;
|
|
|
|
sprintf(extra, "\n");
|
|
for (i = 0; i < EFUSE_MAP_SIZE; i += 16) {
|
|
sprintf(extra, "%s0x%02x\t", extra, i);
|
|
for (j = 0; j < 8; j++)
|
|
sprintf(extra, "%s%02X ", extra, PROMContent[i+j]);
|
|
sprintf(extra, "%s\t", extra);
|
|
for (; j < 16; j++)
|
|
sprintf(extra, "%s%02X ", extra, PROMContent[i+j]);
|
|
sprintf(extra, "%s\n", extra);
|
|
}
|
|
} else if (strcmp(tmp[0], "realmap") == 0) {
|
|
mapLen = EFUSE_MAP_SIZE;
|
|
if (rtw_efuse_map_read(padapter, 0, mapLen, pEfuseHal->fakeEfuseInitMap) == _FAIL) {
|
|
DBG_88E("%s: read realmap Fail!!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
sprintf(extra, "\n");
|
|
for (i = 0; i < EFUSE_MAP_SIZE; i += 16) {
|
|
sprintf(extra, "%s0x%02x\t", extra, i);
|
|
for (j = 0; j < 8; j++)
|
|
sprintf(extra, "%s%02X ", extra, pEfuseHal->fakeEfuseInitMap[i+j]);
|
|
sprintf(extra, "%s\t", extra);
|
|
for (; j < 16; j++)
|
|
sprintf(extra, "%s%02X ", extra, pEfuseHal->fakeEfuseInitMap[i+j]);
|
|
sprintf(extra, "%s\n", extra);
|
|
}
|
|
} else if (strcmp(tmp[0], "rmap") == 0) {
|
|
if ((tmp[1] == NULL) || (tmp[2] == NULL)) {
|
|
DBG_88E("%s: rmap Fail!! Parameters error!\n", __func__);
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
/* rmap addr cnts */
|
|
addr = simple_strtoul(tmp[1], &ptmp, 16);
|
|
DBG_88E("%s: addr =%x\n", __func__, addr);
|
|
|
|
cnts = simple_strtoul(tmp[2], &ptmp, 10);
|
|
if (cnts == 0) {
|
|
DBG_88E("%s: rmap Fail!! cnts error!\n", __func__);
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
DBG_88E("%s: cnts =%d\n", __func__, cnts);
|
|
|
|
EFUSE_GetEfuseDefinition(padapter, EFUSE_WIFI, TYPE_AVAILABLE_EFUSE_BYTES_TOTAL, (void *)&max_available_size, false);
|
|
if ((addr + cnts) > max_available_size) {
|
|
DBG_88E("%s: addr(0x%X)+cnts(%d) parameter error!\n", __func__, addr, cnts);
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
if (rtw_efuse_map_read(padapter, addr, cnts, data) == _FAIL) {
|
|
DBG_88E("%s: rtw_efuse_map_read error!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
*extra = 0;
|
|
for (i = 0; i < cnts; i++)
|
|
sprintf(extra, "%s0x%02X ", extra, data[i]);
|
|
} else if (strcmp(tmp[0], "realraw") == 0) {
|
|
addr = 0;
|
|
mapLen = EFUSE_MAX_SIZE;
|
|
if (rtw_efuse_access(padapter, false, addr, mapLen, rawdata) == _FAIL) {
|
|
DBG_88E("%s: rtw_efuse_access Fail!!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
sprintf(extra, "\n");
|
|
for (i = 0; i < mapLen; i++) {
|
|
sprintf(extra, "%s%02X", extra, rawdata[i]);
|
|
|
|
if ((i & 0xF) == 0xF)
|
|
sprintf(extra, "%s\n", extra);
|
|
else if ((i & 0x7) == 0x7)
|
|
sprintf(extra, "%s\t", extra);
|
|
else
|
|
sprintf(extra, "%s ", extra);
|
|
}
|
|
} else if (strcmp(tmp[0], "mac") == 0) {
|
|
cnts = 6;
|
|
|
|
EFUSE_GetEfuseDefinition(padapter, EFUSE_WIFI, TYPE_AVAILABLE_EFUSE_BYTES_TOTAL, (void *)&max_available_size, false);
|
|
if ((addr + cnts) > max_available_size) {
|
|
DBG_88E("%s: addr(0x%02x)+cnts(%d) parameter error!\n", __func__, addr, cnts);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
if (rtw_efuse_map_read(padapter, addr, cnts, data) == _FAIL) {
|
|
DBG_88E("%s: rtw_efuse_map_read error!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
*extra = 0;
|
|
for (i = 0; i < cnts; i++) {
|
|
sprintf(extra, "%s%02X", extra, data[i]);
|
|
if (i != (cnts-1))
|
|
sprintf(extra, "%s:", extra);
|
|
}
|
|
} else if (strcmp(tmp[0], "vidpid") == 0) {
|
|
cnts = 4;
|
|
|
|
EFUSE_GetEfuseDefinition(padapter, EFUSE_WIFI, TYPE_AVAILABLE_EFUSE_BYTES_TOTAL, (void *)&max_available_size, false);
|
|
if ((addr + cnts) > max_available_size) {
|
|
DBG_88E("%s: addr(0x%02x)+cnts(%d) parameter error!\n", __func__, addr, cnts);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
if (rtw_efuse_map_read(padapter, addr, cnts, data) == _FAIL) {
|
|
DBG_88E("%s: rtw_efuse_access error!!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
*extra = 0;
|
|
for (i = 0; i < cnts; i++) {
|
|
sprintf(extra, "%s0x%02X", extra, data[i]);
|
|
if (i != (cnts-1))
|
|
sprintf(extra, "%s,", extra);
|
|
}
|
|
} else if (strcmp(tmp[0], "ableraw") == 0) {
|
|
efuse_GetCurrentSize(padapter, &raw_cursize);
|
|
raw_maxsize = efuse_GetMaxSize(padapter);
|
|
sprintf(extra, "[available raw size] = %d bytes", raw_maxsize-raw_cursize);
|
|
} else if (strcmp(tmp[0], "btfmap") == 0) {
|
|
mapLen = EFUSE_BT_MAX_MAP_LEN;
|
|
if (rtw_BT_efuse_map_read(padapter, 0, mapLen, pEfuseHal->BTEfuseInitMap) == _FAIL) {
|
|
DBG_88E("%s: rtw_BT_efuse_map_read Fail!!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
sprintf(extra, "\n");
|
|
for (i = 0; i < 512; i += 16) {
|
|
/* set 512 because the iwpriv's extra size have limit 0x7FF */
|
|
sprintf(extra, "%s0x%03x\t", extra, i);
|
|
for (j = 0; j < 8; j++)
|
|
sprintf(extra, "%s%02X ", extra, pEfuseHal->BTEfuseInitMap[i+j]);
|
|
sprintf(extra, "%s\t", extra);
|
|
for (; j < 16; j++)
|
|
sprintf(extra, "%s%02X ", extra, pEfuseHal->BTEfuseInitMap[i+j]);
|
|
sprintf(extra, "%s\n", extra);
|
|
}
|
|
} else if (strcmp(tmp[0], "btbmap") == 0) {
|
|
mapLen = EFUSE_BT_MAX_MAP_LEN;
|
|
if (rtw_BT_efuse_map_read(padapter, 0, mapLen, pEfuseHal->BTEfuseInitMap) == _FAIL) {
|
|
DBG_88E("%s: rtw_BT_efuse_map_read Fail!!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
sprintf(extra, "\n");
|
|
for (i = 512; i < 1024; i += 16) {
|
|
sprintf(extra, "%s0x%03x\t", extra, i);
|
|
for (j = 0; j < 8; j++)
|
|
sprintf(extra, "%s%02X ", extra, pEfuseHal->BTEfuseInitMap[i+j]);
|
|
sprintf(extra, "%s\t", extra);
|
|
for (; j < 16; j++)
|
|
sprintf(extra, "%s%02X ", extra, pEfuseHal->BTEfuseInitMap[i+j]);
|
|
sprintf(extra, "%s\n", extra);
|
|
}
|
|
} else if (strcmp(tmp[0], "btrmap") == 0) {
|
|
if ((tmp[1] == NULL) || (tmp[2] == NULL)) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
/* rmap addr cnts */
|
|
addr = simple_strtoul(tmp[1], &ptmp, 16);
|
|
DBG_88E("%s: addr = 0x%X\n", __func__, addr);
|
|
|
|
cnts = simple_strtoul(tmp[2], &ptmp, 10);
|
|
if (cnts == 0) {
|
|
DBG_88E("%s: btrmap Fail!! cnts error!\n", __func__);
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
DBG_88E("%s: cnts =%d\n", __func__, cnts);
|
|
|
|
EFUSE_GetEfuseDefinition(padapter, EFUSE_BT, TYPE_AVAILABLE_EFUSE_BYTES_TOTAL, (void *)&max_available_size, false);
|
|
if ((addr + cnts) > max_available_size) {
|
|
DBG_88E("%s: addr(0x%X)+cnts(%d) parameter error!\n", __func__, addr, cnts);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
if (rtw_BT_efuse_map_read(padapter, addr, cnts, data) == _FAIL) {
|
|
DBG_88E("%s: rtw_BT_efuse_map_read error!!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
*extra = 0;
|
|
for (i = 0; i < cnts; i++)
|
|
sprintf(extra, "%s 0x%02X ", extra, data[i]);
|
|
} else if (strcmp(tmp[0], "btffake") == 0) {
|
|
sprintf(extra, "\n");
|
|
for (i = 0; i < 512; i += 16) {
|
|
sprintf(extra, "%s0x%03x\t", extra, i);
|
|
for (j = 0; j < 8; j++)
|
|
sprintf(extra, "%s%02X ", extra, pEfuseHal->fakeBTEfuseModifiedMap[i+j]);
|
|
sprintf(extra, "%s\t", extra);
|
|
for (; j < 16; j++)
|
|
sprintf(extra, "%s%02X ", extra, pEfuseHal->fakeBTEfuseModifiedMap[i+j]);
|
|
sprintf(extra, "%s\n", extra);
|
|
}
|
|
} else if (strcmp(tmp[0], "btbfake") == 0) {
|
|
sprintf(extra, "\n");
|
|
for (i = 512; i < 1024; i += 16) {
|
|
sprintf(extra, "%s0x%03x\t", extra, i);
|
|
for (j = 0; j < 8; j++)
|
|
sprintf(extra, "%s%02X ", extra, pEfuseHal->fakeBTEfuseModifiedMap[i+j]);
|
|
sprintf(extra, "%s\t", extra);
|
|
for (; j < 16; j++)
|
|
sprintf(extra, "%s%02X ", extra, pEfuseHal->fakeBTEfuseModifiedMap[i+j]);
|
|
sprintf(extra, "%s\n", extra);
|
|
}
|
|
} else if (strcmp(tmp[0], "wlrfkmap") == 0) {
|
|
sprintf(extra, "\n");
|
|
for (i = 0; i < EFUSE_MAP_SIZE; i += 16) {
|
|
sprintf(extra, "%s0x%02x\t", extra, i);
|
|
for (j = 0; j < 8; j++)
|
|
sprintf(extra, "%s%02X ", extra, pEfuseHal->fakeEfuseModifiedMap[i+j]);
|
|
sprintf(extra, "%s\t", extra);
|
|
for (; j < 16; j++)
|
|
sprintf(extra, "%s %02X", extra, pEfuseHal->fakeEfuseModifiedMap[i+j]);
|
|
sprintf(extra, "%s\n", extra);
|
|
}
|
|
} else {
|
|
sprintf(extra, "Command not found!");
|
|
}
|
|
|
|
exit:
|
|
kfree(data);
|
|
kfree(rawdata);
|
|
if (!err)
|
|
wrqu->length = strlen(extra);
|
|
|
|
rtw_pm_set_ips(padapter, ips_mode);
|
|
rtw_pm_set_lps(padapter, lps_mode);
|
|
padapter->registrypriv.fw_iol = org_fw_iol;/* 0:Disable, 1:enable, 2:by usb speed */
|
|
return err;
|
|
}
|
|
|
|
static int rtw_mp_efuse_set(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wdata, char *extra)
|
|
{
|
|
struct adapter *padapter;
|
|
struct pwrctrl_priv *pwrctrlpriv;
|
|
struct hal_data_8188e *haldata;
|
|
struct efuse_hal *pEfuseHal;
|
|
|
|
u8 ips_mode = 0, lps_mode = 0;
|
|
u32 i, jj, kk;
|
|
u8 *setdata = NULL;
|
|
u8 *ShadowMapBT = NULL;
|
|
u8 *ShadowMapWiFi = NULL;
|
|
u8 *setrawdata = NULL;
|
|
char *pch, *ptmp, *token, *tmp[3] = {NULL, NULL, NULL};
|
|
u16 addr = 0, cnts = 0, max_available_size = 0;
|
|
int err;
|
|
|
|
padapter = rtw_netdev_priv(dev);
|
|
pwrctrlpriv = &padapter->pwrctrlpriv;
|
|
haldata = GET_HAL_DATA(padapter);
|
|
pEfuseHal = &haldata->EfuseHal;
|
|
err = 0;
|
|
setdata = _rtw_zmalloc(1024);
|
|
if (setdata == NULL) {
|
|
err = -ENOMEM;
|
|
goto exit;
|
|
}
|
|
ShadowMapBT = _rtw_malloc(EFUSE_BT_MAX_MAP_LEN);
|
|
if (ShadowMapBT == NULL) {
|
|
err = -ENOMEM;
|
|
goto exit;
|
|
}
|
|
ShadowMapWiFi = _rtw_malloc(EFUSE_MAP_SIZE);
|
|
if (ShadowMapWiFi == NULL) {
|
|
err = -ENOMEM;
|
|
goto exit;
|
|
}
|
|
setrawdata = _rtw_malloc(EFUSE_MAX_SIZE);
|
|
if (setrawdata == NULL) {
|
|
err = -ENOMEM;
|
|
goto exit;
|
|
}
|
|
|
|
lps_mode = pwrctrlpriv->power_mgnt;/* keep org value */
|
|
rtw_pm_set_lps(padapter, PS_MODE_ACTIVE);
|
|
|
|
ips_mode = pwrctrlpriv->ips_mode;/* keep org value */
|
|
rtw_pm_set_ips(padapter, IPS_NONE);
|
|
|
|
pch = extra;
|
|
DBG_88E("%s: in =%s\n", __func__, extra);
|
|
|
|
i = 0;
|
|
while ((token = strsep(&pch, ",")) != NULL) {
|
|
if (i > 2)
|
|
break;
|
|
tmp[i] = token;
|
|
i++;
|
|
}
|
|
|
|
/* tmp[0],[1],[2] */
|
|
/* wmap, addr, 00e04c871200 */
|
|
if (strcmp(tmp[0], "wmap") == 0) {
|
|
if ((tmp[1] == NULL) || (tmp[2] == NULL)) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
addr = simple_strtoul(tmp[1], &ptmp, 16);
|
|
addr &= 0xFFF;
|
|
|
|
cnts = strlen(tmp[2]);
|
|
if (cnts%2) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
cnts /= 2;
|
|
if (cnts == 0) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
DBG_88E("%s: addr = 0x%X\n", __func__, addr);
|
|
DBG_88E("%s: cnts =%d\n", __func__, cnts);
|
|
DBG_88E("%s: map data =%s\n", __func__, tmp[2]);
|
|
|
|
for (jj = 0, kk = 0; jj < cnts; jj++, kk += 2)
|
|
setdata[jj] = key_2char2num(tmp[2][kk], tmp[2][kk + 1]);
|
|
/* Change to check TYPE_EFUSE_MAP_LEN, beacuse 8188E raw 256, logic map over 256. */
|
|
EFUSE_GetEfuseDefinition(padapter, EFUSE_WIFI, TYPE_EFUSE_MAP_LEN, (void *)&max_available_size, false);
|
|
if ((addr+cnts) > max_available_size) {
|
|
DBG_88E("%s: addr(0x%X)+cnts(%d) parameter error!\n", __func__, addr, cnts);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
if (rtw_efuse_map_write(padapter, addr, cnts, setdata) == _FAIL) {
|
|
DBG_88E("%s: rtw_efuse_map_write error!!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
} else if (strcmp(tmp[0], "wraw") == 0) {
|
|
if ((tmp[1] == NULL) || (tmp[2] == NULL)) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
addr = simple_strtoul(tmp[1], &ptmp, 16);
|
|
addr &= 0xFFF;
|
|
|
|
cnts = strlen(tmp[2]);
|
|
if (cnts%2) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
cnts /= 2;
|
|
if (cnts == 0) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
DBG_88E("%s: addr = 0x%X\n", __func__, addr);
|
|
DBG_88E("%s: cnts =%d\n", __func__, cnts);
|
|
DBG_88E("%s: raw data =%s\n", __func__, tmp[2]);
|
|
|
|
for (jj = 0, kk = 0; jj < cnts; jj++, kk += 2)
|
|
setrawdata[jj] = key_2char2num(tmp[2][kk], tmp[2][kk + 1]);
|
|
|
|
if (rtw_efuse_access(padapter, true, addr, cnts, setrawdata) == _FAIL) {
|
|
DBG_88E("%s: rtw_efuse_access error!!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
} else if (strcmp(tmp[0], "mac") == 0) {
|
|
if (tmp[1] == NULL) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
/* mac, 00e04c871200 */
|
|
addr = EEPROM_MAC_ADDR_88EU;
|
|
cnts = strlen(tmp[1]);
|
|
if (cnts%2) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
cnts /= 2;
|
|
if (cnts == 0) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
if (cnts > 6) {
|
|
DBG_88E("%s: error data for mac addr =\"%s\"\n", __func__, tmp[1]);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
DBG_88E("%s: addr = 0x%X\n", __func__, addr);
|
|
DBG_88E("%s: cnts =%d\n", __func__, cnts);
|
|
DBG_88E("%s: MAC address =%s\n", __func__, tmp[1]);
|
|
|
|
for (jj = 0, kk = 0; jj < cnts; jj++, kk += 2)
|
|
setdata[jj] = key_2char2num(tmp[1][kk], tmp[1][kk + 1]);
|
|
/* Change to check TYPE_EFUSE_MAP_LEN, beacuse 8188E raw 256, logic map over 256. */
|
|
EFUSE_GetEfuseDefinition(padapter, EFUSE_WIFI, TYPE_EFUSE_MAP_LEN, (void *)&max_available_size, false);
|
|
if ((addr+cnts) > max_available_size) {
|
|
DBG_88E("%s: addr(0x%X)+cnts(%d) parameter error!\n", __func__, addr, cnts);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
if (rtw_efuse_map_write(padapter, addr, cnts, setdata) == _FAIL) {
|
|
DBG_88E("%s: rtw_efuse_map_write error!!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
} else if (strcmp(tmp[0], "vidpid") == 0) {
|
|
if (tmp[1] == NULL) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
/* pidvid, da0b7881 */
|
|
addr = EEPROM_VID_88EE;
|
|
cnts = strlen(tmp[1]);
|
|
if (cnts%2) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
cnts /= 2;
|
|
if (cnts == 0) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
DBG_88E("%s: addr = 0x%X\n", __func__, addr);
|
|
DBG_88E("%s: cnts =%d\n", __func__, cnts);
|
|
DBG_88E("%s: VID/PID =%s\n", __func__, tmp[1]);
|
|
|
|
for (jj = 0, kk = 0; jj < cnts; jj++, kk += 2)
|
|
setdata[jj] = key_2char2num(tmp[1][kk], tmp[1][kk + 1]);
|
|
|
|
EFUSE_GetEfuseDefinition(padapter, EFUSE_WIFI, TYPE_AVAILABLE_EFUSE_BYTES_TOTAL, (void *)&max_available_size, false);
|
|
if ((addr+cnts) > max_available_size) {
|
|
DBG_88E("%s: addr(0x%X)+cnts(%d) parameter error!\n", __func__, addr, cnts);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
if (rtw_efuse_map_write(padapter, addr, cnts, setdata) == _FAIL) {
|
|
DBG_88E("%s: rtw_efuse_map_write error!!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
} else if (strcmp(tmp[0], "btwmap") == 0) {
|
|
if ((tmp[1] == NULL) || (tmp[2] == NULL)) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
addr = simple_strtoul(tmp[1], &ptmp, 16);
|
|
addr &= 0xFFF;
|
|
|
|
cnts = strlen(tmp[2]);
|
|
if (cnts%2) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
cnts /= 2;
|
|
if (cnts == 0) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
DBG_88E("%s: addr = 0x%X\n", __func__, addr);
|
|
DBG_88E("%s: cnts =%d\n", __func__, cnts);
|
|
DBG_88E("%s: BT data =%s\n", __func__, tmp[2]);
|
|
|
|
for (jj = 0, kk = 0; jj < cnts; jj++, kk += 2)
|
|
setdata[jj] = key_2char2num(tmp[2][kk], tmp[2][kk + 1]);
|
|
|
|
EFUSE_GetEfuseDefinition(padapter, EFUSE_BT, TYPE_AVAILABLE_EFUSE_BYTES_TOTAL, (void *)&max_available_size, false);
|
|
if ((addr+cnts) > max_available_size) {
|
|
DBG_88E("%s: addr(0x%X)+cnts(%d) parameter error!\n", __func__, addr, cnts);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
if (rtw_BT_efuse_map_write(padapter, addr, cnts, setdata) == _FAIL) {
|
|
DBG_88E("%s: rtw_BT_efuse_map_write error!!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
} else if (strcmp(tmp[0], "btwfake") == 0) {
|
|
if ((tmp[1] == NULL) || (tmp[2] == NULL)) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
addr = simple_strtoul(tmp[1], &ptmp, 16);
|
|
addr &= 0xFFF;
|
|
|
|
cnts = strlen(tmp[2]);
|
|
if (cnts%2) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
cnts /= 2;
|
|
if (cnts == 0) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
DBG_88E("%s: addr = 0x%X\n", __func__, addr);
|
|
DBG_88E("%s: cnts =%d\n", __func__, cnts);
|
|
DBG_88E("%s: BT tmp data =%s\n", __func__, tmp[2]);
|
|
|
|
for (jj = 0, kk = 0; jj < cnts; jj++, kk += 2)
|
|
pEfuseHal->fakeBTEfuseModifiedMap[addr+jj] = key_2char2num(tmp[2][kk], tmp[2][kk + 1]);
|
|
} else if (strcmp(tmp[0], "btdumpfake") == 0) {
|
|
if (rtw_BT_efuse_map_read(padapter, 0, EFUSE_BT_MAX_MAP_LEN, pEfuseHal->fakeBTEfuseModifiedMap) == _SUCCESS) {
|
|
DBG_88E("%s: BT read all map success\n", __func__);
|
|
} else {
|
|
DBG_88E("%s: BT read all map Fail!\n", __func__);
|
|
err = -EFAULT;
|
|
}
|
|
} else if (strcmp(tmp[0], "wldumpfake") == 0) {
|
|
if (rtw_efuse_map_read(padapter, 0, EFUSE_BT_MAX_MAP_LEN, pEfuseHal->fakeEfuseModifiedMap) == _SUCCESS) {
|
|
DBG_88E("%s: BT read all map success\n", __func__);
|
|
} else {
|
|
DBG_88E("%s: BT read all map Fail\n", __func__);
|
|
err = -EFAULT;
|
|
}
|
|
} else if (strcmp(tmp[0], "btfk2map") == 0) {
|
|
memcpy(pEfuseHal->BTEfuseModifiedMap, pEfuseHal->fakeBTEfuseModifiedMap, EFUSE_BT_MAX_MAP_LEN);
|
|
|
|
EFUSE_GetEfuseDefinition(padapter, EFUSE_BT, TYPE_AVAILABLE_EFUSE_BYTES_TOTAL, (void *)&max_available_size, false);
|
|
if (max_available_size < 1) {
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
if (rtw_BT_efuse_map_write(padapter, 0x00, EFUSE_BT_MAX_MAP_LEN, pEfuseHal->fakeBTEfuseModifiedMap) == _FAIL) {
|
|
DBG_88E("%s: rtw_BT_efuse_map_write error!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
} else if (strcmp(tmp[0], "wlfk2map") == 0) {
|
|
EFUSE_GetEfuseDefinition(padapter, EFUSE_WIFI, TYPE_AVAILABLE_EFUSE_BYTES_TOTAL, (void *)&max_available_size, false);
|
|
if (max_available_size < 1) {
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
|
|
if (rtw_efuse_map_write(padapter, 0x00, EFUSE_MAX_MAP_LEN, pEfuseHal->fakeEfuseModifiedMap) == _FAIL) {
|
|
DBG_88E("%s: rtw_efuse_map_write error!\n", __func__);
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
} else if (strcmp(tmp[0], "wlwfake") == 0) {
|
|
if ((tmp[1] == NULL) || (tmp[2] == NULL)) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
addr = simple_strtoul(tmp[1], &ptmp, 16);
|
|
addr &= 0xFFF;
|
|
|
|
cnts = strlen(tmp[2]);
|
|
if (cnts%2) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
cnts /= 2;
|
|
if (cnts == 0) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
DBG_88E("%s: addr = 0x%X\n", __func__, addr);
|
|
DBG_88E("%s: cnts =%d\n", __func__, cnts);
|
|
DBG_88E("%s: map tmp data =%s\n", __func__, tmp[2]);
|
|
|
|
for (jj = 0, kk = 0; jj < cnts; jj++, kk += 2)
|
|
pEfuseHal->fakeEfuseModifiedMap[addr+jj] = key_2char2num(tmp[2][kk], tmp[2][kk + 1]);
|
|
}
|
|
|
|
exit:
|
|
kfree(setdata);
|
|
kfree(ShadowMapBT);
|
|
kfree(ShadowMapWiFi);
|
|
kfree(setrawdata);
|
|
|
|
rtw_pm_set_ips(padapter, ips_mode);
|
|
rtw_pm_set_lps(padapter, lps_mode);
|
|
|
|
return err;
|
|
}
|
|
|
|
/*
|
|
* Input Format: %s,%d,%d
|
|
* %s is width, could be
|
|
* "b" for 1 byte
|
|
* "w" for WORD (2 bytes)
|
|
* "dw" for DWORD (4 bytes)
|
|
* 1st %d is address(offset)
|
|
* 2st %d is data to write
|
|
*/
|
|
static int rtw_mp_write_reg(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
char *pch, *pnext, *ptmp;
|
|
char *width_str;
|
|
char width;
|
|
u32 addr, data;
|
|
int ret;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
pch = extra;
|
|
pnext = strpbrk(pch, ",.-");
|
|
if (pnext == NULL)
|
|
return -EINVAL;
|
|
*pnext = 0;
|
|
width_str = pch;
|
|
|
|
pch = pnext + 1;
|
|
pnext = strpbrk(pch, ",.-");
|
|
if (pnext == NULL)
|
|
return -EINVAL;
|
|
*pnext = 0;
|
|
addr = simple_strtoul(pch, &ptmp, 16);
|
|
if (addr > 0x3FFF)
|
|
return -EINVAL;
|
|
|
|
pch = pnext + 1;
|
|
if ((pch - extra) >= wrqu->length)
|
|
return -EINVAL;
|
|
data = simple_strtoul(pch, &ptmp, 16);
|
|
|
|
ret = 0;
|
|
width = width_str[0];
|
|
switch (width) {
|
|
case 'b':
|
|
/* 1 byte */
|
|
if (data > 0xFF) {
|
|
ret = -EINVAL;
|
|
break;
|
|
}
|
|
rtw_write8(padapter, addr, data);
|
|
break;
|
|
case 'w':
|
|
/* 2 bytes */
|
|
if (data > 0xFFFF) {
|
|
ret = -EINVAL;
|
|
break;
|
|
}
|
|
rtw_write16(padapter, addr, data);
|
|
break;
|
|
case 'd':
|
|
/* 4 bytes */
|
|
rtw_write32(padapter, addr, data);
|
|
break;
|
|
default:
|
|
ret = -EINVAL;
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Input Format: %s,%d
|
|
* %s is width, could be
|
|
* "b" for 1 byte
|
|
* "w" for WORD (2 bytes)
|
|
* "dw" for DWORD (4 bytes)
|
|
* %d is address(offset)
|
|
*
|
|
* Return:
|
|
* %d for data readed
|
|
*/
|
|
static int rtw_mp_read_reg(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
char *input = kmalloc(wrqu->length, GFP_KERNEL);
|
|
char *pch, *pnext, *ptmp;
|
|
char *width_str;
|
|
char width;
|
|
char data[20], tmp[20];
|
|
u32 addr;
|
|
u32 ret, i = 0, j = 0, strtout = 0;
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wrqu->pointer, wrqu->length)) {
|
|
kfree(input);
|
|
return -EFAULT;
|
|
}
|
|
_rtw_memset(data, 0, 20);
|
|
_rtw_memset(tmp, 0, 20);
|
|
_rtw_memset(extra, 0, wrqu->length);
|
|
|
|
pch = input;
|
|
pnext = strpbrk(pch, ",.-");
|
|
if (pnext == NULL) {
|
|
kfree(input);
|
|
return -EINVAL;
|
|
}
|
|
*pnext = 0;
|
|
width_str = pch;
|
|
|
|
pch = pnext + 1;
|
|
if ((pch - input) >= wrqu->length) {
|
|
kfree(input);
|
|
return -EINVAL;
|
|
}
|
|
kfree(input);
|
|
addr = simple_strtoul(pch, &ptmp, 16);
|
|
if (addr > 0x3FFF)
|
|
return -EINVAL;
|
|
|
|
ret = 0;
|
|
width = width_str[0];
|
|
switch (width) {
|
|
case 'b':
|
|
/* 1 byte */
|
|
sprintf(extra, "%d\n", rtw_read8(padapter, addr));
|
|
wrqu->length = strlen(extra);
|
|
break;
|
|
case 'w':
|
|
/* 2 bytes */
|
|
sprintf(data, "%04x\n", rtw_read16(padapter, addr));
|
|
for (i = 0; i <= strlen(data); i++) {
|
|
if (i%2 == 0) {
|
|
tmp[j] = ' ';
|
|
j++;
|
|
}
|
|
if (data[i] != '\0')
|
|
tmp[j] = data[i];
|
|
j++;
|
|
}
|
|
pch = tmp;
|
|
DBG_88E("pch =%s", pch);
|
|
|
|
while (*pch != '\0') {
|
|
pnext = strpbrk(pch, " ");
|
|
if (!pnext)
|
|
break;
|
|
|
|
pnext++;
|
|
if (*pnext != '\0') {
|
|
strtout = simple_strtoul(pnext, &ptmp, 16);
|
|
sprintf(extra, "%s %d", extra, strtout);
|
|
} else {
|
|
break;
|
|
}
|
|
pch = pnext;
|
|
}
|
|
wrqu->length = 6;
|
|
break;
|
|
case 'd':
|
|
/* 4 bytes */
|
|
sprintf(data, "%08x", rtw_read32(padapter, addr));
|
|
/* add read data format blank */
|
|
for (i = 0; i <= strlen(data); i++) {
|
|
if (i%2 == 0) {
|
|
tmp[j] = ' ';
|
|
j++;
|
|
}
|
|
if (data[i] != '\0')
|
|
tmp[j] = data[i];
|
|
|
|
j++;
|
|
}
|
|
pch = tmp;
|
|
DBG_88E("pch =%s", pch);
|
|
|
|
while (*pch != '\0') {
|
|
pnext = strpbrk(pch, " ");
|
|
if (!pnext)
|
|
break;
|
|
pnext++;
|
|
if (*pnext != '\0') {
|
|
strtout = simple_strtoul(pnext, &ptmp, 16);
|
|
sprintf(extra, "%s %d", extra, strtout);
|
|
} else {
|
|
break;
|
|
}
|
|
pch = pnext;
|
|
}
|
|
wrqu->length = strlen(extra);
|
|
break;
|
|
default:
|
|
wrqu->length = 0;
|
|
ret = -EINVAL;
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Input Format: %d,%x,%x
|
|
* %d is RF path, should be smaller than MAX_RF_PATH_NUMS
|
|
* 1st %x is address(offset)
|
|
* 2st %x is data to write
|
|
*/
|
|
static int rtw_mp_write_rf(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u32 path, addr, data;
|
|
int ret;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
ret = sscanf(extra, "%d,%x,%x", &path, &addr, &data);
|
|
if (ret < 3)
|
|
return -EINVAL;
|
|
|
|
if (path >= MAX_RF_PATH_NUMS)
|
|
return -EINVAL;
|
|
if (addr > 0xFF)
|
|
return -EINVAL;
|
|
if (data > 0xFFFFF)
|
|
return -EINVAL;
|
|
|
|
_rtw_memset(extra, 0, wrqu->length);
|
|
|
|
write_rfreg(padapter, path, addr, data);
|
|
|
|
sprintf(extra, "write_rf completed\n");
|
|
wrqu->length = strlen(extra);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Input Format: %d,%x
|
|
* %d is RF path, should be smaller than MAX_RF_PATH_NUMS
|
|
* %x is address(offset)
|
|
*
|
|
* Return:
|
|
* %d for data readed
|
|
*/
|
|
static int rtw_mp_read_rf(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
char *input = kmalloc(wrqu->length, GFP_KERNEL);
|
|
char *pch, *pnext, *ptmp;
|
|
char data[20], tmp[20];
|
|
u32 path, addr;
|
|
u32 ret, i = 0, j = 0, strtou = 0;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wrqu->pointer, wrqu->length)) {
|
|
kfree(input);
|
|
return -EFAULT;
|
|
}
|
|
ret = sscanf(input, "%d,%x", &path, &addr);
|
|
kfree(input);
|
|
if (ret < 2)
|
|
return -EINVAL;
|
|
|
|
if (path >= MAX_RF_PATH_NUMS)
|
|
return -EINVAL;
|
|
if (addr > 0xFF)
|
|
return -EINVAL;
|
|
|
|
_rtw_memset(extra, 0, wrqu->length);
|
|
|
|
sprintf(data, "%08x", read_rfreg(padapter, path, addr));
|
|
/* add read data format blank */
|
|
for (i = 0; i <= strlen(data); i++) {
|
|
if (i%2 == 0) {
|
|
tmp[j] = ' ';
|
|
j++;
|
|
}
|
|
tmp[j] = data[i];
|
|
j++;
|
|
}
|
|
pch = tmp;
|
|
DBG_88E("pch =%s", pch);
|
|
|
|
while (*pch != '\0') {
|
|
pnext = strpbrk(pch, " ");
|
|
pnext++;
|
|
if (*pnext != '\0') {
|
|
strtou = simple_strtoul(pnext, &ptmp, 16);
|
|
sprintf(extra, "%s %d", extra, strtou);
|
|
} else {
|
|
break;
|
|
}
|
|
pch = pnext;
|
|
}
|
|
wrqu->length = strlen(extra);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_start(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (padapter->registrypriv.mp_mode == 0) {
|
|
padapter->registrypriv.mp_mode = 1;
|
|
|
|
rtw_pm_set_ips(padapter, IPS_NONE);
|
|
LeaveAllPowerSaveMode(padapter);
|
|
|
|
MPT_InitializeAdapter(padapter, 1);
|
|
}
|
|
if (padapter->registrypriv.mp_mode == 0)
|
|
return -EPERM;
|
|
if (padapter->mppriv.mode == MP_OFF) {
|
|
if (mp_start_test(padapter) == _FAIL)
|
|
return -EPERM;
|
|
padapter->mppriv.mode = MP_ON;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_stop(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (padapter->registrypriv.mp_mode == 1) {
|
|
MPT_DeInitAdapter(padapter);
|
|
padapter->registrypriv.mp_mode = 0;
|
|
}
|
|
|
|
if (padapter->mppriv.mode != MP_OFF) {
|
|
mp_stop_test(padapter);
|
|
padapter->mppriv.mode = MP_OFF;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
extern int wifirate2_ratetbl_inx(unsigned char rate);
|
|
|
|
static int rtw_mp_rate(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u32 rate = MPT_RATE_1M;
|
|
char *input = kmalloc(wrqu->length, GFP_KERNEL);
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wrqu->pointer, wrqu->length)) {
|
|
kfree(input);
|
|
return -EFAULT;
|
|
}
|
|
rate = rtw_atoi(input);
|
|
sprintf(extra, "Set data rate to %d", rate);
|
|
kfree(input);
|
|
if (rate <= 0x7f)
|
|
rate = wifirate2_ratetbl_inx((u8)rate);
|
|
else
|
|
rate = (rate-0x80+MPT_RATE_MCS0);
|
|
|
|
if (rate >= MPT_RATE_LAST)
|
|
return -EINVAL;
|
|
|
|
padapter->mppriv.rateidx = rate;
|
|
Hal_SetDataRate(padapter);
|
|
|
|
wrqu->length = strlen(extra) + 1;
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_channel(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
char *input = kmalloc(wrqu->length, GFP_KERNEL);
|
|
u32 channel = 1;
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wrqu->pointer, wrqu->length)) {
|
|
kfree(input);
|
|
return -EFAULT;
|
|
}
|
|
channel = rtw_atoi(input);
|
|
sprintf(extra, "Change channel %d to channel %d", padapter->mppriv.channel, channel);
|
|
|
|
padapter->mppriv.channel = channel;
|
|
Hal_SetChannel(padapter);
|
|
|
|
wrqu->length = strlen(extra) + 1;
|
|
kfree(input);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_bandwidth(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u32 bandwidth = 0, sg = 0;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
sscanf(extra, "40M =%d, shortGI =%d", &bandwidth, &sg);
|
|
|
|
if (bandwidth != HT_CHANNEL_WIDTH_40)
|
|
bandwidth = HT_CHANNEL_WIDTH_20;
|
|
|
|
padapter->mppriv.bandwidth = (u8)bandwidth;
|
|
padapter->mppriv.preamble = sg;
|
|
|
|
SetBandwidth(padapter);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_txpower(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u32 idx_a = 0, idx_b = 0;
|
|
char *input = kmalloc(wrqu->length, GFP_KERNEL);
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wrqu->pointer, wrqu->length)) {
|
|
kfree(input);
|
|
return -EFAULT;
|
|
}
|
|
sscanf(input, "patha =%d, pathb =%d", &idx_a, &idx_b);
|
|
|
|
sprintf(extra, "Set power level path_A:%d path_B:%d", idx_a, idx_b);
|
|
padapter->mppriv.txpoweridx = (u8)idx_a;
|
|
padapter->mppriv.txpoweridx_b = (u8)idx_b;
|
|
padapter->mppriv.bSetTxPower = 1;
|
|
Hal_SetAntennaPathPower(padapter);
|
|
|
|
wrqu->length = strlen(extra) + 1;
|
|
kfree(input);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_ant_tx(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u8 i;
|
|
char *input = kmalloc(wrqu->length, GFP_KERNEL);
|
|
u16 antenna = 0;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wrqu->pointer, wrqu->length)) {
|
|
kfree(input);
|
|
return -EFAULT;
|
|
}
|
|
|
|
sprintf(extra, "switch Tx antenna to %s", input);
|
|
|
|
for (i = 0; i < strlen(input); i++) {
|
|
switch (input[i]) {
|
|
case 'a':
|
|
antenna |= ANTENNA_A;
|
|
break;
|
|
case 'b':
|
|
antenna |= ANTENNA_B;
|
|
break;
|
|
}
|
|
}
|
|
padapter->mppriv.antenna_tx = antenna;
|
|
|
|
Hal_SetAntenna(padapter);
|
|
|
|
wrqu->length = strlen(extra) + 1;
|
|
kfree(input);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_ant_rx(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u8 i;
|
|
u16 antenna = 0;
|
|
char *input = kmalloc(wrqu->length, GFP_KERNEL);
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wrqu->pointer, wrqu->length)) {
|
|
kfree(input);
|
|
return -EFAULT;
|
|
}
|
|
_rtw_memset(extra, 0, wrqu->length);
|
|
|
|
sprintf(extra, "switch Rx antenna to %s", input);
|
|
|
|
for (i = 0; i < strlen(input); i++) {
|
|
switch (input[i]) {
|
|
case 'a':
|
|
antenna |= ANTENNA_A;
|
|
break;
|
|
case 'b':
|
|
antenna |= ANTENNA_B;
|
|
break;
|
|
}
|
|
}
|
|
|
|
padapter->mppriv.antenna_rx = antenna;
|
|
Hal_SetAntenna(padapter);
|
|
wrqu->length = strlen(extra);
|
|
kfree(input);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_ctx(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u32 pkTx = 1, countPkTx = 1, cotuTx = 1, CarrSprTx = 1, scTx = 1, sgleTx = 1, stop = 1;
|
|
u32 bStartTest = 1;
|
|
u32 count = 0;
|
|
struct mp_priv *pmp_priv;
|
|
struct pkt_attrib *pattrib;
|
|
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
pmp_priv = &padapter->mppriv;
|
|
|
|
if (copy_from_user(extra, wrqu->pointer, wrqu->length))
|
|
return -EFAULT;
|
|
|
|
DBG_88E("%s: in =%s\n", __func__, extra);
|
|
|
|
countPkTx = strncmp(extra, "count =", 5); /* strncmp true is 0 */
|
|
cotuTx = strncmp(extra, "background", 20);
|
|
CarrSprTx = strncmp(extra, "background, cs", 20);
|
|
scTx = strncmp(extra, "background, sc", 20);
|
|
sgleTx = strncmp(extra, "background, stone", 20);
|
|
pkTx = strncmp(extra, "background, pkt", 20);
|
|
stop = strncmp(extra, "stop", 4);
|
|
sscanf(extra, "count =%d, pkt", &count);
|
|
|
|
_rtw_memset(extra, '\0', sizeof(*extra));
|
|
|
|
if (stop == 0) {
|
|
bStartTest = 0; /* To set Stop */
|
|
pmp_priv->tx.stop = 1;
|
|
sprintf(extra, "Stop continuous Tx");
|
|
} else {
|
|
bStartTest = 1;
|
|
if (pmp_priv->mode != MP_ON) {
|
|
if (pmp_priv->tx.stop != 1) {
|
|
DBG_88E("%s: MP_MODE != ON %d\n", __func__, pmp_priv->mode);
|
|
return -EFAULT;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (pkTx == 0 || countPkTx == 0)
|
|
pmp_priv->mode = MP_PACKET_TX;
|
|
if (sgleTx == 0)
|
|
pmp_priv->mode = MP_SINGLE_TONE_TX;
|
|
if (cotuTx == 0)
|
|
pmp_priv->mode = MP_CONTINUOUS_TX;
|
|
if (CarrSprTx == 0)
|
|
pmp_priv->mode = MP_CARRIER_SUPPRISSION_TX;
|
|
if (scTx == 0)
|
|
pmp_priv->mode = MP_SINGLE_CARRIER_TX;
|
|
|
|
switch (pmp_priv->mode) {
|
|
case MP_PACKET_TX:
|
|
if (bStartTest == 0) {
|
|
pmp_priv->tx.stop = 1;
|
|
pmp_priv->mode = MP_ON;
|
|
sprintf(extra, "Stop continuous Tx");
|
|
} else if (pmp_priv->tx.stop == 1) {
|
|
sprintf(extra, "Start continuous DA = ffffffffffff len = 1500 count =%u,\n", count);
|
|
pmp_priv->tx.stop = 0;
|
|
pmp_priv->tx.count = count;
|
|
pmp_priv->tx.payload = 2;
|
|
pattrib = &pmp_priv->tx.attrib;
|
|
pattrib->pktlen = 1500;
|
|
_rtw_memset(pattrib->dst, 0xFF, ETH_ALEN);
|
|
SetPacketTx(padapter);
|
|
} else {
|
|
return -EFAULT;
|
|
}
|
|
wrqu->length = strlen(extra);
|
|
return 0;
|
|
case MP_SINGLE_TONE_TX:
|
|
if (bStartTest != 0)
|
|
sprintf(extra, "Start continuous DA = ffffffffffff len = 1500\n infinite = yes.");
|
|
Hal_SetSingleToneTx(padapter, (u8)bStartTest);
|
|
break;
|
|
case MP_CONTINUOUS_TX:
|
|
if (bStartTest != 0)
|
|
sprintf(extra, "Start continuous DA = ffffffffffff len = 1500\n infinite = yes.");
|
|
Hal_SetContinuousTx(padapter, (u8)bStartTest);
|
|
break;
|
|
case MP_CARRIER_SUPPRISSION_TX:
|
|
if (bStartTest != 0) {
|
|
if (pmp_priv->rateidx <= MPT_RATE_11M) {
|
|
sprintf(extra, "Start continuous DA = ffffffffffff len = 1500\n infinite = yes.");
|
|
Hal_SetCarrierSuppressionTx(padapter, (u8)bStartTest);
|
|
} else {
|
|
sprintf(extra, "Specify carrier suppression but not CCK rate");
|
|
}
|
|
}
|
|
break;
|
|
case MP_SINGLE_CARRIER_TX:
|
|
if (bStartTest != 0)
|
|
sprintf(extra, "Start continuous DA = ffffffffffff len = 1500\n infinite = yes.");
|
|
Hal_SetSingleCarrierTx(padapter, (u8)bStartTest);
|
|
break;
|
|
default:
|
|
sprintf(extra, "Error! Continuous-Tx is not on-going.");
|
|
return -EFAULT;
|
|
}
|
|
|
|
if (bStartTest == 1 && pmp_priv->mode != MP_ON) {
|
|
struct mp_priv *pmp_priv = &padapter->mppriv;
|
|
if (pmp_priv->tx.stop == 0) {
|
|
pmp_priv->tx.stop = 1;
|
|
rtw_msleep_os(5);
|
|
}
|
|
pmp_priv->tx.stop = 0;
|
|
pmp_priv->tx.count = 1;
|
|
SetPacketTx(padapter);
|
|
} else {
|
|
pmp_priv->mode = MP_ON;
|
|
}
|
|
|
|
wrqu->length = strlen(extra);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_arx(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u8 bStartRx = 0, bStopRx = 0, bQueryPhy;
|
|
u32 cckok = 0, cckcrc = 0, ofdmok = 0, ofdmcrc = 0, htok = 0, htcrc = 0, OFDM_FA = 0, CCK_FA = 0;
|
|
char *input = kmalloc(wrqu->length, GFP_KERNEL);
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
|
|
if (copy_from_user(input, wrqu->pointer, wrqu->length)) {
|
|
kfree(input);
|
|
return -EFAULT;
|
|
}
|
|
DBG_88E("%s: %s\n", __func__, input);
|
|
|
|
bStartRx = (strncmp(input, "start", 5) == 0) ? 1 : 0; /* strncmp true is 0 */
|
|
bStopRx = (strncmp(input, "stop", 5) == 0) ? 1 : 0; /* strncmp true is 0 */
|
|
bQueryPhy = (strncmp(input, "phy", 3) == 0) ? 1 : 0; /* strncmp true is 0 */
|
|
|
|
if (bStartRx) {
|
|
sprintf(extra, "start");
|
|
SetPacketRx(padapter, bStartRx);
|
|
} else if (bStopRx) {
|
|
SetPacketRx(padapter, 0);
|
|
sprintf(extra, "Received packet OK:%d CRC error:%d", padapter->mppriv.rx_pktcount, padapter->mppriv.rx_crcerrpktcount);
|
|
} else if (bQueryPhy) {
|
|
/*
|
|
OFDM FA
|
|
RegCF0[15:0]
|
|
RegCF2[31:16]
|
|
RegDA0[31:16]
|
|
RegDA4[15:0]
|
|
RegDA4[31:16]
|
|
RegDA8[15:0]
|
|
CCK FA
|
|
(RegA5B<<8) | RegA5C
|
|
*/
|
|
cckok = read_bbreg(padapter, 0xf88, 0xffffffff);
|
|
cckcrc = read_bbreg(padapter, 0xf84, 0xffffffff);
|
|
ofdmok = read_bbreg(padapter, 0xf94, 0x0000FFFF);
|
|
ofdmcrc = read_bbreg(padapter, 0xf94, 0xFFFF0000);
|
|
htok = read_bbreg(padapter, 0xf90, 0x0000FFFF);
|
|
htcrc = read_bbreg(padapter, 0xf90, 0xFFFF0000);
|
|
|
|
OFDM_FA = read_bbreg(padapter, 0xcf0, 0x0000FFFF);
|
|
OFDM_FA = read_bbreg(padapter, 0xcf2, 0xFFFF0000);
|
|
OFDM_FA = read_bbreg(padapter, 0xda0, 0xFFFF0000);
|
|
OFDM_FA = read_bbreg(padapter, 0xda4, 0x0000FFFF);
|
|
OFDM_FA = read_bbreg(padapter, 0xda4, 0xFFFF0000);
|
|
OFDM_FA = read_bbreg(padapter, 0xda8, 0x0000FFFF);
|
|
CCK_FA = (rtw_read8(padapter, 0xa5b)<<8) | (rtw_read8(padapter, 0xa5c));
|
|
|
|
sprintf(extra, "Phy Received packet OK:%d CRC error:%d FA Counter: %d", cckok+ofdmok+htok, cckcrc+ofdmcrc+htcrc, OFDM_FA+CCK_FA);
|
|
}
|
|
wrqu->length = strlen(extra) + 1;
|
|
kfree(input);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_trx_query(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u32 txok, txfail, rxok, rxfail;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
txok = padapter->mppriv.tx.sended;
|
|
txfail = 0;
|
|
rxok = padapter->mppriv.rx_pktcount;
|
|
rxfail = padapter->mppriv.rx_crcerrpktcount;
|
|
|
|
_rtw_memset(extra, '\0', 128);
|
|
|
|
sprintf(extra, "Tx OK:%d, Tx Fail:%d, Rx OK:%d, CRC error:%d ", txok, txfail, rxok, rxfail);
|
|
|
|
wrqu->length = strlen(extra)+1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_pwrtrk(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u8 enable;
|
|
u32 thermal;
|
|
s32 ret;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
char *input = kmalloc(wrqu->length, GFP_KERNEL);
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wrqu->pointer, wrqu->length)) {
|
|
kfree(input);
|
|
return -EFAULT;
|
|
}
|
|
_rtw_memset(extra, 0, wrqu->length);
|
|
|
|
enable = 1;
|
|
if (wrqu->length > 1) {/* not empty string */
|
|
if (strncmp(input, "stop", 4) == 0) {
|
|
enable = 0;
|
|
sprintf(extra, "mp tx power tracking stop");
|
|
} else if (sscanf(input, "ther =%d", &thermal)) {
|
|
ret = Hal_SetThermalMeter(padapter, (u8)thermal);
|
|
if (ret == _FAIL)
|
|
return -EPERM;
|
|
sprintf(extra, "mp tx power tracking start, target value =%d ok ", thermal);
|
|
} else {
|
|
kfree(input);
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
|
|
kfree(input);
|
|
ret = Hal_SetPowerTracking(padapter, enable);
|
|
if (ret == _FAIL)
|
|
return -EPERM;
|
|
|
|
wrqu->length = strlen(extra);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_psd(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
char *input = kmalloc(wrqu->length, GFP_KERNEL);
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wrqu->pointer, wrqu->length)) {
|
|
kfree(input);
|
|
return -EFAULT;
|
|
}
|
|
|
|
strcpy(extra, input);
|
|
|
|
wrqu->length = mp_query_psd(padapter, extra);
|
|
kfree(input);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_thermal(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u8 val;
|
|
u16 bwrite = 1;
|
|
u16 addr = EEPROM_THERMAL_METER_88E;
|
|
|
|
u16 cnt = 1;
|
|
u16 max_available_size = 0;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (copy_from_user(extra, wrqu->pointer, wrqu->length))
|
|
return -EFAULT;
|
|
|
|
bwrite = strncmp(extra, "write", 6); /* strncmp true is 0 */
|
|
|
|
Hal_GetThermalMeter(padapter, &val);
|
|
|
|
if (bwrite == 0) {
|
|
EFUSE_GetEfuseDefinition(padapter, EFUSE_WIFI, TYPE_AVAILABLE_EFUSE_BYTES_TOTAL, (void *)&max_available_size, false);
|
|
if (2 > max_available_size) {
|
|
DBG_88E("no available efuse!\n");
|
|
return -EFAULT;
|
|
}
|
|
if (rtw_efuse_map_write(padapter, addr, cnt, &val) == _FAIL) {
|
|
DBG_88E("rtw_efuse_map_write error\n");
|
|
return -EFAULT;
|
|
} else {
|
|
sprintf(extra, " efuse write ok :%d", val);
|
|
}
|
|
} else {
|
|
sprintf(extra, "%d", val);
|
|
}
|
|
wrqu->length = strlen(extra);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_reset_stats(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
struct mp_priv *pmp_priv;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
pmp_priv = &padapter->mppriv;
|
|
|
|
pmp_priv->tx.sended = 0;
|
|
pmp_priv->tx_pktcount = 0;
|
|
pmp_priv->rx_pktcount = 0;
|
|
pmp_priv->rx_crcerrpktcount = 0;
|
|
|
|
/* reset phy counter */
|
|
write_bbreg(padapter, 0xf14, BIT16, 0x1);
|
|
rtw_msleep_os(10);
|
|
write_bbreg(padapter, 0xf14, BIT16, 0x0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_dump(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
u32 value;
|
|
u8 rf_type, path_nums = 0;
|
|
u32 i, j = 1, path;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (strncmp(extra, "all", 4) == 0) {
|
|
DBG_88E("\n ======= MAC REG =======\n");
|
|
for (i = 0x0; i < 0x300; i += 4) {
|
|
if (j%4 == 1)
|
|
DBG_88E("0x%02x", i);
|
|
DBG_88E(" 0x%08x ", rtw_read32(padapter, i));
|
|
if ((j++)%4 == 0)
|
|
DBG_88E("\n");
|
|
}
|
|
for (i = 0x400; i < 0x1000; i += 4) {
|
|
if (j%4 == 1)
|
|
DBG_88E("0x%02x", i);
|
|
DBG_88E(" 0x%08x ", rtw_read32(padapter, i));
|
|
if ((j++)%4 == 0)
|
|
DBG_88E("\n");
|
|
}
|
|
|
|
j = 1;
|
|
rtw_hal_get_hwreg(padapter, HW_VAR_RF_TYPE, (u8 *)(&rf_type));
|
|
|
|
DBG_88E("\n ======= RF REG =======\n");
|
|
if ((RF_1T2R == rf_type) || (RF_1T1R == rf_type))
|
|
path_nums = 1;
|
|
else
|
|
path_nums = 2;
|
|
|
|
for (path = 0; path < path_nums; path++) {
|
|
for (i = 0; i < 0x34; i++) {
|
|
value = rtw_hal_read_rfreg(padapter, path, i, 0xffffffff);
|
|
if (j%4 == 1)
|
|
DBG_88E("0x%02x ", i);
|
|
DBG_88E(" 0x%08x ", value);
|
|
if ((j++)%4 == 0)
|
|
DBG_88E("\n");
|
|
}
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_phypara(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
struct iw_point *wrqu, char *extra)
|
|
{
|
|
char *input = kmalloc(wrqu->length, GFP_KERNEL);
|
|
u32 valxcap;
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wrqu->pointer, wrqu->length)) {
|
|
kfree(input);
|
|
return -EFAULT;
|
|
}
|
|
|
|
DBG_88E("%s:iwpriv in =%s\n", __func__, input);
|
|
|
|
sscanf(input, "xcap =%d", &valxcap);
|
|
|
|
kfree(input);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_SetRFPath(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
char *input = kmalloc(wrqu->data.length, GFP_KERNEL);
|
|
u8 bMain = 1, bTurnoff = 1;
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wrqu->data.pointer, wrqu->data.length))
|
|
return -EFAULT;
|
|
DBG_88E("%s:iwpriv in =%s\n", __func__, input);
|
|
|
|
bMain = strncmp(input, "1", 2); /* strncmp true is 0 */
|
|
bTurnoff = strncmp(input, "0", 3); /* strncmp true is 0 */
|
|
|
|
if (bMain == 0) {
|
|
MP_PHY_SetRFPathSwitch(padapter, true);
|
|
DBG_88E("%s:PHY_SetRFPathSwitch = true\n", __func__);
|
|
} else if (bTurnoff == 0) {
|
|
MP_PHY_SetRFPathSwitch(padapter, false);
|
|
DBG_88E("%s:PHY_SetRFPathSwitch = false\n", __func__);
|
|
}
|
|
kfree(input);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_QueryDrv(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
char *input = kmalloc(wrqu->data.length, GFP_KERNEL);
|
|
u8 qAutoLoad = 1;
|
|
struct eeprom_priv *pEEPROM = GET_EEPROM_EFUSE_PRIV(padapter);
|
|
|
|
if (!input)
|
|
return -ENOMEM;
|
|
|
|
if (copy_from_user(input, wrqu->data.pointer, wrqu->data.length))
|
|
return -EFAULT;
|
|
DBG_88E("%s:iwpriv in =%s\n", __func__, input);
|
|
|
|
qAutoLoad = strncmp(input, "autoload", 8); /* strncmp true is 0 */
|
|
|
|
if (qAutoLoad == 0) {
|
|
DBG_88E("%s:qAutoLoad\n", __func__);
|
|
|
|
if (pEEPROM->bautoload_fail_flag)
|
|
sprintf(extra, "fail");
|
|
else
|
|
sprintf(extra, "ok");
|
|
}
|
|
wrqu->data.length = strlen(extra) + 1;
|
|
kfree(input);
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_set(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wdata, char *extra)
|
|
{
|
|
struct iw_point *wrqu = (struct iw_point *)wdata;
|
|
u32 subcmd = wrqu->flags;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (padapter == NULL)
|
|
return -ENETDOWN;
|
|
|
|
if (extra == NULL) {
|
|
wrqu->length = 0;
|
|
return -EIO;
|
|
}
|
|
|
|
switch (subcmd) {
|
|
case MP_START:
|
|
DBG_88E("set case mp_start\n");
|
|
rtw_mp_start(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_STOP:
|
|
DBG_88E("set case mp_stop\n");
|
|
rtw_mp_stop(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_BANDWIDTH:
|
|
DBG_88E("set case mp_bandwidth\n");
|
|
rtw_mp_bandwidth(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_RESET_STATS:
|
|
DBG_88E("set case MP_RESET_STATS\n");
|
|
rtw_mp_reset_stats(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_SetRFPathSwh:
|
|
DBG_88E("set MP_SetRFPathSwitch\n");
|
|
rtw_mp_SetRFPath(dev, info, wdata, extra);
|
|
break;
|
|
case CTA_TEST:
|
|
DBG_88E("set CTA_TEST\n");
|
|
rtw_cta_test_start(dev, info, wdata, extra);
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_mp_get(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wdata, char *extra)
|
|
{
|
|
struct iw_point *wrqu = (struct iw_point *)wdata;
|
|
u32 subcmd = wrqu->flags;
|
|
struct adapter *padapter = rtw_netdev_priv(dev);
|
|
|
|
if (padapter == NULL)
|
|
return -ENETDOWN;
|
|
if (extra == NULL) {
|
|
wrqu->length = 0;
|
|
return -EIO;
|
|
}
|
|
|
|
switch (subcmd) {
|
|
case WRITE_REG:
|
|
rtw_mp_write_reg(dev, info, wrqu, extra);
|
|
break;
|
|
case WRITE_RF:
|
|
rtw_mp_write_rf(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_PHYPARA:
|
|
DBG_88E("mp_get MP_PHYPARA\n");
|
|
rtw_mp_phypara(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_CHANNEL:
|
|
DBG_88E("set case mp_channel\n");
|
|
rtw_mp_channel(dev, info, wrqu, extra);
|
|
break;
|
|
case READ_REG:
|
|
DBG_88E("mp_get READ_REG\n");
|
|
rtw_mp_read_reg(dev, info, wrqu, extra);
|
|
break;
|
|
case READ_RF:
|
|
DBG_88E("mp_get READ_RF\n");
|
|
rtw_mp_read_rf(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_RATE:
|
|
DBG_88E("set case mp_rate\n");
|
|
rtw_mp_rate(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_TXPOWER:
|
|
DBG_88E("set case MP_TXPOWER\n");
|
|
rtw_mp_txpower(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_ANT_TX:
|
|
DBG_88E("set case MP_ANT_TX\n");
|
|
rtw_mp_ant_tx(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_ANT_RX:
|
|
DBG_88E("set case MP_ANT_RX\n");
|
|
rtw_mp_ant_rx(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_QUERY:
|
|
rtw_mp_trx_query(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_CTX:
|
|
DBG_88E("set case MP_CTX\n");
|
|
rtw_mp_ctx(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_ARX:
|
|
DBG_88E("set case MP_ARX\n");
|
|
rtw_mp_arx(dev, info, wrqu, extra);
|
|
break;
|
|
case EFUSE_GET:
|
|
DBG_88E("efuse get EFUSE_GET\n");
|
|
rtw_mp_efuse_get(dev, info, wdata, extra);
|
|
break;
|
|
case MP_DUMP:
|
|
DBG_88E("set case MP_DUMP\n");
|
|
rtw_mp_dump(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_PSD:
|
|
DBG_88E("set case MP_PSD\n");
|
|
rtw_mp_psd(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_THER:
|
|
DBG_88E("set case MP_THER\n");
|
|
rtw_mp_thermal(dev, info, wrqu, extra);
|
|
break;
|
|
case MP_QueryDrvStats:
|
|
DBG_88E("mp_get MP_QueryDrvStats\n");
|
|
rtw_mp_QueryDrv (dev, info, wdata, extra);
|
|
break;
|
|
case MP_PWRTRK:
|
|
DBG_88E("set case MP_PWRTRK\n");
|
|
rtw_mp_pwrtrk(dev, info, wrqu, extra);
|
|
break;
|
|
case EFUSE_SET:
|
|
DBG_88E("set case efuse set\n");
|
|
rtw_mp_efuse_set(dev, info, wdata, extra);
|
|
break;
|
|
}
|
|
|
|
rtw_msleep_os(10); /* delay 5ms for sending pkt before exit adb shell operation */
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_tdls(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_tdls_get(struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static int rtw_test(
|
|
struct net_device *dev,
|
|
struct iw_request_info *info,
|
|
union iwreq_data *wrqu, char *extra)
|
|
{
|
|
u32 len;
|
|
u8 *pbuf, *pch;
|
|
char *ptmp;
|
|
u8 *delim = ",";
|
|
|
|
DBG_88E("+%s\n", __func__);
|
|
len = wrqu->data.length;
|
|
|
|
pbuf = (u8 *)rtw_zmalloc(len);
|
|
if (pbuf == NULL) {
|
|
DBG_88E("%s: no memory!\n", __func__);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
if (copy_from_user(pbuf, wrqu->data.pointer, len)) {
|
|
kfree(pbuf);
|
|
DBG_88E("%s: copy from user fail!\n", __func__);
|
|
return -EFAULT;
|
|
}
|
|
DBG_88E("%s: string =\"%s\"\n", __func__, pbuf);
|
|
|
|
ptmp = (char *)pbuf;
|
|
pch = strsep(&ptmp, delim);
|
|
if ((pch == NULL) || (strlen(pch) == 0)) {
|
|
kfree(pbuf);
|
|
DBG_88E("%s: parameter error(level 1)!\n", __func__);
|
|
return -EFAULT;
|
|
}
|
|
kfree(pbuf);
|
|
return 0;
|
|
}
|
|
|
|
static iw_handler rtw_handlers[] = {
|
|
NULL, /* SIOCSIWCOMMIT */
|
|
rtw_wx_get_name, /* SIOCGIWNAME */
|
|
dummy, /* SIOCSIWNWID */
|
|
dummy, /* SIOCGIWNWID */
|
|
rtw_wx_set_freq, /* SIOCSIWFREQ */
|
|
rtw_wx_get_freq, /* SIOCGIWFREQ */
|
|
rtw_wx_set_mode, /* SIOCSIWMODE */
|
|
rtw_wx_get_mode, /* SIOCGIWMODE */
|
|
dummy, /* SIOCSIWSENS */
|
|
rtw_wx_get_sens, /* SIOCGIWSENS */
|
|
NULL, /* SIOCSIWRANGE */
|
|
rtw_wx_get_range, /* SIOCGIWRANGE */
|
|
rtw_wx_set_priv, /* SIOCSIWPRIV */
|
|
NULL, /* SIOCGIWPRIV */
|
|
NULL, /* SIOCSIWSTATS */
|
|
NULL, /* SIOCGIWSTATS */
|
|
dummy, /* SIOCSIWSPY */
|
|
dummy, /* SIOCGIWSPY */
|
|
NULL, /* SIOCGIWTHRSPY */
|
|
NULL, /* SIOCWIWTHRSPY */
|
|
rtw_wx_set_wap, /* SIOCSIWAP */
|
|
rtw_wx_get_wap, /* SIOCGIWAP */
|
|
rtw_wx_set_mlme, /* request MLME operation; uses struct iw_mlme */
|
|
dummy, /* SIOCGIWAPLIST -- depricated */
|
|
rtw_wx_set_scan, /* SIOCSIWSCAN */
|
|
rtw_wx_get_scan, /* SIOCGIWSCAN */
|
|
rtw_wx_set_essid, /* SIOCSIWESSID */
|
|
rtw_wx_get_essid, /* SIOCGIWESSID */
|
|
dummy, /* SIOCSIWNICKN */
|
|
rtw_wx_get_nick, /* SIOCGIWNICKN */
|
|
NULL, /* -- hole -- */
|
|
NULL, /* -- hole -- */
|
|
rtw_wx_set_rate, /* SIOCSIWRATE */
|
|
rtw_wx_get_rate, /* SIOCGIWRATE */
|
|
rtw_wx_set_rts, /* SIOCSIWRTS */
|
|
rtw_wx_get_rts, /* SIOCGIWRTS */
|
|
rtw_wx_set_frag, /* SIOCSIWFRAG */
|
|
rtw_wx_get_frag, /* SIOCGIWFRAG */
|
|
dummy, /* SIOCSIWTXPOW */
|
|
dummy, /* SIOCGIWTXPOW */
|
|
dummy, /* SIOCSIWRETRY */
|
|
rtw_wx_get_retry, /* SIOCGIWRETRY */
|
|
rtw_wx_set_enc, /* SIOCSIWENCODE */
|
|
rtw_wx_get_enc, /* SIOCGIWENCODE */
|
|
dummy, /* SIOCSIWPOWER */
|
|
rtw_wx_get_power, /* SIOCGIWPOWER */
|
|
NULL, /*---hole---*/
|
|
NULL, /*---hole---*/
|
|
rtw_wx_set_gen_ie, /* SIOCSIWGENIE */
|
|
NULL, /* SIOCGWGENIE */
|
|
rtw_wx_set_auth, /* SIOCSIWAUTH */
|
|
NULL, /* SIOCGIWAUTH */
|
|
rtw_wx_set_enc_ext, /* SIOCSIWENCODEEXT */
|
|
NULL, /* SIOCGIWENCODEEXT */
|
|
rtw_wx_set_pmkid, /* SIOCSIWPMKSA */
|
|
NULL, /*---hole---*/
|
|
};
|
|
|
|
static const struct iw_priv_args rtw_private_args[] = {
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x0,
|
|
IW_PRIV_TYPE_CHAR | 0x7FF, 0, "write"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x1,
|
|
IW_PRIV_TYPE_CHAR | 0x7FF,
|
|
IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | IFNAMSIZ, "read"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x2, 0, 0, "driver_ext"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x3, 0, 0, "mp_ioctl"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x4,
|
|
IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "apinfo"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x5,
|
|
IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 2, 0, "setpid"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x6,
|
|
IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "wps_start"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x7,
|
|
IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "get_sensitivity"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x8,
|
|
IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "wps_prob_req_ie"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x9,
|
|
IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "wps_assoc_req_ie"
|
|
},
|
|
|
|
{
|
|
SIOCIWFIRSTPRIV + 0xA,
|
|
IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "channel_plan"
|
|
},
|
|
|
|
{
|
|
SIOCIWFIRSTPRIV + 0xB,
|
|
IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 2, 0, "dbg"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0xC,
|
|
IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 3, 0, "rfw"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0xD,
|
|
IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 2, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | IFNAMSIZ, "rfr"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x10,
|
|
IW_PRIV_TYPE_CHAR | P2P_PRIVATE_IOCTL_SET_LEN, 0, "p2p_set"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x11,
|
|
IW_PRIV_TYPE_CHAR | P2P_PRIVATE_IOCTL_SET_LEN, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | P2P_PRIVATE_IOCTL_SET_LEN, "p2p_get"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x12,
|
|
IW_PRIV_TYPE_CHAR | P2P_PRIVATE_IOCTL_SET_LEN, IW_PRIV_TYPE_CHAR | IFNAMSIZ, "p2p_get2"
|
|
},
|
|
{SIOCIWFIRSTPRIV + 0x13, IW_PRIV_TYPE_CHAR | 128, 0, "NULL"},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x14,
|
|
IW_PRIV_TYPE_CHAR | 64, 0, "tdls"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x15,
|
|
IW_PRIV_TYPE_CHAR | P2P_PRIVATE_IOCTL_SET_LEN, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | P2P_PRIVATE_IOCTL_SET_LEN, "tdls_get"
|
|
},
|
|
{
|
|
SIOCIWFIRSTPRIV + 0x16,
|
|
IW_PRIV_TYPE_CHAR | 64, 0, "pm_set"
|
|
},
|
|
|
|
{SIOCIWFIRSTPRIV + 0x18, IW_PRIV_TYPE_CHAR | IFNAMSIZ, 0, "rereg_nd_name"},
|
|
|
|
{SIOCIWFIRSTPRIV + 0x1A, IW_PRIV_TYPE_CHAR | 1024, 0, "efuse_set"},
|
|
{SIOCIWFIRSTPRIV + 0x1B, IW_PRIV_TYPE_CHAR | 128, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "efuse_get"},
|
|
{SIOCIWFIRSTPRIV + 0x1D, IW_PRIV_TYPE_CHAR | 40, IW_PRIV_TYPE_CHAR | 0x7FF, "test"
|
|
},
|
|
|
|
{SIOCIWFIRSTPRIV + 0x0E, IW_PRIV_TYPE_CHAR | 1024, 0, ""}, /* set */
|
|
{SIOCIWFIRSTPRIV + 0x0F, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, ""},/* get */
|
|
/* --- sub-ioctls definitions --- */
|
|
|
|
{MP_START, IW_PRIV_TYPE_CHAR | 1024, 0, "mp_start"}, /* set */
|
|
{MP_PHYPARA, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_phypara"},/* get */
|
|
{MP_STOP, IW_PRIV_TYPE_CHAR | 1024, 0, "mp_stop"}, /* set */
|
|
{MP_CHANNEL, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_channel"},/* get */
|
|
{MP_BANDWIDTH, IW_PRIV_TYPE_CHAR | 1024, 0, "mp_bandwidth"}, /* set */
|
|
{MP_RATE, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_rate"},/* get */
|
|
{MP_RESET_STATS, IW_PRIV_TYPE_CHAR | 1024, 0, "mp_reset_stats"},
|
|
{MP_QUERY, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_query"}, /* get */
|
|
{READ_REG, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "read_reg"},
|
|
{MP_RATE, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_rate"},
|
|
{READ_RF, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "read_rf"},
|
|
{MP_PSD, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_psd"},
|
|
{MP_DUMP, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_dump"},
|
|
{MP_TXPOWER, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_txpower"},
|
|
{MP_ANT_TX, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_ant_tx"},
|
|
{MP_ANT_RX, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_ant_rx"},
|
|
{WRITE_REG, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "write_reg"},
|
|
{WRITE_RF, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "write_rf"},
|
|
{MP_CTX, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_ctx"},
|
|
{MP_ARX, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_arx"},
|
|
{MP_THER, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_ther"},
|
|
{EFUSE_SET, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "efuse_set"},
|
|
{EFUSE_GET, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "efuse_get"},
|
|
{MP_PWRTRK, IW_PRIV_TYPE_CHAR | 1024, 0, "mp_pwrtrk"},
|
|
{MP_QueryDrvStats, IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "mp_drvquery"},
|
|
{MP_IOCTL, IW_PRIV_TYPE_CHAR | 1024, 0, "mp_ioctl"}, /* mp_ioctl */
|
|
{MP_SetRFPathSwh, IW_PRIV_TYPE_CHAR | 1024, 0, "mp_setrfpath"},
|
|
{CTA_TEST, IW_PRIV_TYPE_CHAR | 1024, 0, "cta_test"},
|
|
};
|
|
|
|
static iw_handler rtw_private_handler[] = {
|
|
rtw_wx_write32, /* 0x00 */
|
|
rtw_wx_read32, /* 0x01 */
|
|
rtw_drvext_hdl, /* 0x02 */
|
|
rtw_mp_ioctl_hdl, /* 0x03 */
|
|
|
|
/* for MM DTV platform */
|
|
rtw_get_ap_info, /* 0x04 */
|
|
|
|
rtw_set_pid, /* 0x05 */
|
|
rtw_wps_start, /* 0x06 */
|
|
|
|
rtw_wx_get_sensitivity, /* 0x07 */
|
|
rtw_wx_set_mtk_wps_probe_ie, /* 0x08 */
|
|
rtw_wx_set_mtk_wps_ie, /* 0x09 */
|
|
|
|
/* Set Channel depend on the country code */
|
|
rtw_wx_set_channel_plan, /* 0x0A */
|
|
|
|
rtw_dbg_port, /* 0x0B */
|
|
rtw_wx_write_rf, /* 0x0C */
|
|
rtw_wx_read_rf, /* 0x0D */
|
|
|
|
rtw_mp_set, /* 0x0E */
|
|
rtw_mp_get, /* 0x0F */
|
|
rtw_p2p_set, /* 0x10 */
|
|
rtw_p2p_get, /* 0x11 */
|
|
rtw_p2p_get2, /* 0x12 */
|
|
|
|
NULL, /* 0x13 */
|
|
rtw_tdls, /* 0x14 */
|
|
rtw_tdls_get, /* 0x15 */
|
|
|
|
rtw_pm_set, /* 0x16 */
|
|
rtw_wx_priv_null, /* 0x17 */
|
|
rtw_rereg_nd_name, /* 0x18 */
|
|
rtw_wx_priv_null, /* 0x19 */
|
|
|
|
rtw_mp_efuse_set, /* 0x1A */
|
|
rtw_mp_efuse_get, /* 0x1B */
|
|
NULL, /* 0x1C is reserved for hostapd */
|
|
rtw_test, /* 0x1D */
|
|
};
|
|
|
|
static struct iw_statistics *rtw_get_wireless_stats(struct net_device *dev)
|
|
{
|
|
struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
|
|
struct iw_statistics *piwstats = &padapter->iwstats;
|
|
int tmp_level = 0;
|
|
int tmp_qual = 0;
|
|
int tmp_noise = 0;
|
|
|
|
if (!check_fwstate(&padapter->mlmepriv, _FW_LINKED)) {
|
|
piwstats->qual.qual = 0;
|
|
piwstats->qual.level = 0;
|
|
piwstats->qual.noise = 0;
|
|
} else {
|
|
tmp_level = padapter->recvpriv.signal_strength;
|
|
tmp_qual = padapter->recvpriv.signal_qual;
|
|
tmp_noise = padapter->recvpriv.noise;
|
|
|
|
piwstats->qual.level = tmp_level;
|
|
piwstats->qual.qual = tmp_qual;
|
|
piwstats->qual.noise = tmp_noise;
|
|
}
|
|
piwstats->qual.updated = IW_QUAL_ALL_UPDATED;/* IW_QUAL_DBM; */
|
|
return &padapter->iwstats;
|
|
}
|
|
|
|
struct iw_handler_def rtw_handlers_def = {
|
|
.standard = rtw_handlers,
|
|
.num_standard = sizeof(rtw_handlers) / sizeof(iw_handler),
|
|
.private = rtw_private_handler,
|
|
.private_args = (struct iw_priv_args *)rtw_private_args,
|
|
.num_private = sizeof(rtw_private_handler) / sizeof(iw_handler),
|
|
.num_private_args = sizeof(rtw_private_args) / sizeof(struct iw_priv_args),
|
|
.get_wireless_stats = rtw_get_wireless_stats,
|
|
};
|
|
|
|
/* copy from net/wireless/wext.c start */
|
|
/* ---------------------------------------------------------------- */
|
|
/*
|
|
* Calculate size of private arguments
|
|
*/
|
|
static const char iw_priv_type_size[] = {
|
|
0, /* IW_PRIV_TYPE_NONE */
|
|
1, /* IW_PRIV_TYPE_BYTE */
|
|
1, /* IW_PRIV_TYPE_CHAR */
|
|
0, /* Not defined */
|
|
sizeof(__u32), /* IW_PRIV_TYPE_INT */
|
|
sizeof(struct iw_freq), /* IW_PRIV_TYPE_FLOAT */
|
|
sizeof(struct sockaddr), /* IW_PRIV_TYPE_ADDR */
|
|
0, /* Not defined */
|
|
};
|
|
|
|
static int get_priv_size(__u16 args)
|
|
{
|
|
int num = args & IW_PRIV_SIZE_MASK;
|
|
int type = (args & IW_PRIV_TYPE_MASK) >> 12;
|
|
|
|
return num * iw_priv_type_size[type];
|
|
}
|
|
/* copy from net/wireless/wext.c end */
|
|
|
|
static int rtw_ioctl_wext_private(struct net_device *dev, union iwreq_data *wrq_data)
|
|
{
|
|
int err = 0;
|
|
u8 *input = NULL;
|
|
u32 input_len = 0;
|
|
const char delim[] = " ";
|
|
u8 *output = NULL;
|
|
u32 output_len = 0;
|
|
u32 count = 0;
|
|
u8 *buffer = NULL;
|
|
u32 buffer_len = 0;
|
|
char *ptr = NULL;
|
|
u8 cmdname[17] = {0}; /* IFNAMSIZ+1 */
|
|
u32 cmdlen;
|
|
s32 len;
|
|
u8 *extra = NULL;
|
|
u32 extra_size = 0;
|
|
|
|
s32 k;
|
|
const iw_handler *priv; /* Private ioctl */
|
|
const struct iw_priv_args *priv_args; /* Private ioctl description */
|
|
u32 num_priv_args; /* Number of descriptions */
|
|
iw_handler handler;
|
|
int temp;
|
|
int subcmd = 0; /* sub-ioctl index */
|
|
int offset = 0; /* Space for sub-ioctl index */
|
|
|
|
union iwreq_data wdata;
|
|
|
|
memcpy(&wdata, wrq_data, sizeof(wdata));
|
|
|
|
input_len = wdata.data.length;
|
|
input = rtw_zmalloc(input_len);
|
|
if (NULL == input)
|
|
return -ENOMEM;
|
|
if (copy_from_user(input, wdata.data.pointer, input_len)) {
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
ptr = input;
|
|
len = input_len;
|
|
|
|
sscanf(ptr, "%16s", cmdname);
|
|
cmdlen = strlen(cmdname);
|
|
DBG_88E("%s: cmd =%s\n", __func__, cmdname);
|
|
|
|
/* skip command string */
|
|
if (cmdlen > 0)
|
|
cmdlen += 1; /* skip one space */
|
|
ptr += cmdlen;
|
|
len -= cmdlen;
|
|
DBG_88E("%s: parameters =%s\n", __func__, ptr);
|
|
|
|
priv = rtw_private_handler;
|
|
priv_args = rtw_private_args;
|
|
num_priv_args = sizeof(rtw_private_args) / sizeof(struct iw_priv_args);
|
|
|
|
if (num_priv_args == 0) {
|
|
err = -EOPNOTSUPP;
|
|
goto exit;
|
|
}
|
|
|
|
/* Search the correct ioctl */
|
|
k = -1;
|
|
while ((++k < num_priv_args) && strcmp(priv_args[k].name, cmdname));
|
|
|
|
/* If not found... */
|
|
if (k == num_priv_args) {
|
|
err = -EOPNOTSUPP;
|
|
goto exit;
|
|
}
|
|
|
|
/* Watch out for sub-ioctls ! */
|
|
if (priv_args[k].cmd < SIOCDEVPRIVATE) {
|
|
int j = -1;
|
|
|
|
/* Find the matching *real* ioctl */
|
|
while ((++j < num_priv_args) && ((priv_args[j].name[0] != '\0') ||
|
|
(priv_args[j].set_args != priv_args[k].set_args) ||
|
|
(priv_args[j].get_args != priv_args[k].get_args)));
|
|
|
|
/* If not found... */
|
|
if (j == num_priv_args) {
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
|
|
/* Save sub-ioctl number */
|
|
subcmd = priv_args[k].cmd;
|
|
/* Reserve one int (simplify alignment issues) */
|
|
offset = sizeof(__u32);
|
|
/* Use real ioctl definition from now on */
|
|
k = j;
|
|
}
|
|
|
|
buffer = rtw_zmalloc(4096);
|
|
if (NULL == buffer) {
|
|
err = -ENOMEM;
|
|
goto exit;
|
|
}
|
|
|
|
/* If we have to set some data */
|
|
if ((priv_args[k].set_args & IW_PRIV_TYPE_MASK) &&
|
|
(priv_args[k].set_args & IW_PRIV_SIZE_MASK)) {
|
|
u8 *str;
|
|
|
|
switch (priv_args[k].set_args & IW_PRIV_TYPE_MASK) {
|
|
case IW_PRIV_TYPE_BYTE:
|
|
/* Fetch args */
|
|
count = 0;
|
|
do {
|
|
str = strsep(&ptr, delim);
|
|
if (NULL == str)
|
|
break;
|
|
sscanf(str, "%i", &temp);
|
|
buffer[count++] = (u8)temp;
|
|
} while (1);
|
|
buffer_len = count;
|
|
/* Number of args to fetch */
|
|
wdata.data.length = count;
|
|
if (wdata.data.length > (priv_args[k].set_args & IW_PRIV_SIZE_MASK))
|
|
wdata.data.length = priv_args[k].set_args & IW_PRIV_SIZE_MASK;
|
|
break;
|
|
case IW_PRIV_TYPE_INT:
|
|
/* Fetch args */
|
|
count = 0;
|
|
do {
|
|
str = strsep(&ptr, delim);
|
|
if (NULL == str)
|
|
break;
|
|
sscanf(str, "%i", &temp);
|
|
((s32 *)buffer)[count++] = (s32)temp;
|
|
} while (1);
|
|
buffer_len = count * sizeof(s32);
|
|
/* Number of args to fetch */
|
|
wdata.data.length = count;
|
|
if (wdata.data.length > (priv_args[k].set_args & IW_PRIV_SIZE_MASK))
|
|
wdata.data.length = priv_args[k].set_args & IW_PRIV_SIZE_MASK;
|
|
break;
|
|
case IW_PRIV_TYPE_CHAR:
|
|
if (len > 0) {
|
|
/* Size of the string to fetch */
|
|
wdata.data.length = len;
|
|
if (wdata.data.length > (priv_args[k].set_args & IW_PRIV_SIZE_MASK))
|
|
wdata.data.length = priv_args[k].set_args & IW_PRIV_SIZE_MASK;
|
|
|
|
/* Fetch string */
|
|
memcpy(buffer, ptr, wdata.data.length);
|
|
} else {
|
|
wdata.data.length = 1;
|
|
buffer[0] = '\0';
|
|
}
|
|
buffer_len = wdata.data.length;
|
|
break;
|
|
default:
|
|
DBG_88E("%s: Not yet implemented...\n", __func__);
|
|
err = -1;
|
|
goto exit;
|
|
}
|
|
|
|
if ((priv_args[k].set_args & IW_PRIV_SIZE_FIXED) &&
|
|
(wdata.data.length != (priv_args[k].set_args & IW_PRIV_SIZE_MASK))) {
|
|
DBG_88E("%s: The command %s needs exactly %d argument(s)...\n",
|
|
__func__, cmdname, priv_args[k].set_args & IW_PRIV_SIZE_MASK);
|
|
err = -EINVAL;
|
|
goto exit;
|
|
}
|
|
} else {
|
|
/* if args to set */
|
|
wdata.data.length = 0L;
|
|
}
|
|
|
|
/* Those two tests are important. They define how the driver
|
|
* will have to handle the data */
|
|
if ((priv_args[k].set_args & IW_PRIV_SIZE_FIXED) &&
|
|
((get_priv_size(priv_args[k].set_args) + offset) <= IFNAMSIZ)) {
|
|
/* First case : all SET args fit within wrq */
|
|
if (offset)
|
|
wdata.mode = subcmd;
|
|
memcpy(wdata.name + offset, buffer, IFNAMSIZ - offset);
|
|
} else {
|
|
if ((priv_args[k].set_args == 0) &&
|
|
(priv_args[k].get_args & IW_PRIV_SIZE_FIXED) &&
|
|
(get_priv_size(priv_args[k].get_args) <= IFNAMSIZ)) {
|
|
/* Second case : no SET args, GET args fit within wrq */
|
|
if (offset)
|
|
wdata.mode = subcmd;
|
|
} else {
|
|
/* Third case : args won't fit in wrq, or variable number of args */
|
|
if (copy_to_user(wdata.data.pointer, buffer, buffer_len)) {
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
wdata.data.flags = subcmd;
|
|
}
|
|
}
|
|
|
|
kfree(input);
|
|
input = NULL;
|
|
|
|
extra_size = 0;
|
|
if (IW_IS_SET(priv_args[k].cmd)) {
|
|
/* Size of set arguments */
|
|
extra_size = get_priv_size(priv_args[k].set_args);
|
|
|
|
/* Does it fits in iwr ? */
|
|
if ((priv_args[k].set_args & IW_PRIV_SIZE_FIXED) &&
|
|
((extra_size + offset) <= IFNAMSIZ))
|
|
extra_size = 0;
|
|
} else {
|
|
/* Size of get arguments */
|
|
extra_size = get_priv_size(priv_args[k].get_args);
|
|
|
|
/* Does it fits in iwr ? */
|
|
if ((priv_args[k].get_args & IW_PRIV_SIZE_FIXED) &&
|
|
(extra_size <= IFNAMSIZ))
|
|
extra_size = 0;
|
|
}
|
|
|
|
if (extra_size == 0) {
|
|
extra = (u8 *)&wdata;
|
|
kfree(buffer);
|
|
buffer = NULL;
|
|
} else {
|
|
extra = buffer;
|
|
}
|
|
|
|
handler = priv[priv_args[k].cmd - SIOCIWFIRSTPRIV];
|
|
err = handler(dev, NULL, &wdata, extra);
|
|
|
|
/* If we have to get some data */
|
|
if ((priv_args[k].get_args & IW_PRIV_TYPE_MASK) &&
|
|
(priv_args[k].get_args & IW_PRIV_SIZE_MASK)) {
|
|
int j;
|
|
int n = 0; /* number of args */
|
|
u8 str[20] = {0};
|
|
|
|
/* Check where is the returned data */
|
|
if ((priv_args[k].get_args & IW_PRIV_SIZE_FIXED) &&
|
|
(get_priv_size(priv_args[k].get_args) <= IFNAMSIZ))
|
|
n = priv_args[k].get_args & IW_PRIV_SIZE_MASK;
|
|
else
|
|
n = wdata.data.length;
|
|
|
|
output = rtw_zmalloc(4096);
|
|
if (NULL == output) {
|
|
err = -ENOMEM;
|
|
goto exit;
|
|
}
|
|
switch (priv_args[k].get_args & IW_PRIV_TYPE_MASK) {
|
|
case IW_PRIV_TYPE_BYTE:
|
|
/* Display args */
|
|
for (j = 0; j < n; j++) {
|
|
sprintf(str, "%d ", extra[j]);
|
|
len = strlen(str);
|
|
output_len = strlen(output);
|
|
if ((output_len + len + 1) > 4096) {
|
|
err = -E2BIG;
|
|
goto exit;
|
|
}
|
|
memcpy(output+output_len, str, len);
|
|
}
|
|
break;
|
|
case IW_PRIV_TYPE_INT:
|
|
/* Display args */
|
|
for (j = 0; j < n; j++) {
|
|
sprintf(str, "%d ", ((__s32 *)extra)[j]);
|
|
len = strlen(str);
|
|
output_len = strlen(output);
|
|
if ((output_len + len + 1) > 4096) {
|
|
err = -E2BIG;
|
|
goto exit;
|
|
}
|
|
memcpy(output+output_len, str, len);
|
|
}
|
|
break;
|
|
case IW_PRIV_TYPE_CHAR:
|
|
/* Display args */
|
|
memcpy(output, extra, n);
|
|
break;
|
|
default:
|
|
DBG_88E("%s: Not yet implemented...\n", __func__);
|
|
err = -1;
|
|
goto exit;
|
|
}
|
|
|
|
output_len = strlen(output) + 1;
|
|
wrq_data->data.length = output_len;
|
|
if (copy_to_user(wrq_data->data.pointer, output, output_len)) {
|
|
err = -EFAULT;
|
|
goto exit;
|
|
}
|
|
} else {
|
|
/* if args to set */
|
|
wrq_data->data.length = 0;
|
|
}
|
|
|
|
exit:
|
|
kfree(input);
|
|
kfree(buffer);
|
|
kfree(output);
|
|
return err;
|
|
}
|
|
|
|
#include <rtw_android.h>
|
|
int rtw_ioctl(struct net_device *dev, struct ifreq *rq, int cmd)
|
|
{
|
|
struct iwreq *wrq = (struct iwreq *)rq;
|
|
int ret = 0;
|
|
|
|
switch (cmd) {
|
|
case RTL_IOCTL_WPA_SUPPLICANT:
|
|
ret = wpa_supplicant_ioctl(dev, &wrq->u.data);
|
|
break;
|
|
#ifdef CONFIG_88EU_AP_MODE
|
|
case RTL_IOCTL_HOSTAPD:
|
|
ret = rtw_hostapd_ioctl(dev, &wrq->u.data);
|
|
break;
|
|
#endif /* CONFIG_88EU_AP_MODE */
|
|
case SIOCDEVPRIVATE:
|
|
ret = rtw_ioctl_wext_private(dev, &wrq->u);
|
|
break;
|
|
case (SIOCDEVPRIVATE+1):
|
|
ret = rtw_android_priv_cmd(dev, rq, cmd);
|
|
break;
|
|
default:
|
|
ret = -EOPNOTSUPP;
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|