bbc9a9916b
Signed-off-by: André Goddard Rosa <andre.goddard@gmail.com> Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
753 lines
24 KiB
C
753 lines
24 KiB
C
/*
|
|
* Copyright (c) 1996, 2003 VIA Networking Technologies, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* File: ioctl.c
|
|
*
|
|
* Purpose: private ioctl functions
|
|
*
|
|
* Author: Lyndon Chen
|
|
*
|
|
* Date: Auguest 20, 2003
|
|
*
|
|
* Functions:
|
|
*
|
|
* Revision History:
|
|
*
|
|
*/
|
|
|
|
#include "ioctl.h"
|
|
#include "iocmd.h"
|
|
#include "mac.h"
|
|
#include "card.h"
|
|
#include "hostap.h"
|
|
#include "wpactl.h"
|
|
#include "rf.h"
|
|
|
|
/*--------------------- Static Definitions -------------------------*/
|
|
|
|
/*--------------------- Static Classes ----------------------------*/
|
|
|
|
/*--------------------- Static Variables --------------------------*/
|
|
//static int msglevel =MSG_LEVEL_DEBUG;
|
|
static int msglevel =MSG_LEVEL_INFO;
|
|
|
|
#ifdef WPA_SM_Transtatus
|
|
SWPAResult wpa_Result;
|
|
#endif
|
|
|
|
/*--------------------- Static Functions --------------------------*/
|
|
|
|
/*--------------------- Export Variables --------------------------*/
|
|
|
|
int private_ioctl(PSDevice pDevice, struct ifreq *rq) {
|
|
|
|
PSCmdRequest pReq = (PSCmdRequest)rq;
|
|
PSMgmtObject pMgmt = pDevice->pMgmt;
|
|
int result = 0;
|
|
PWLAN_IE_SSID pItemSSID;
|
|
SCmdBSSJoin sJoinCmd;
|
|
SCmdZoneTypeSet sZoneTypeCmd;
|
|
SCmdScan sScanCmd;
|
|
SCmdStartAP sStartAPCmd;
|
|
SCmdSetWEP sWEPCmd;
|
|
SCmdValue sValue;
|
|
SBSSIDList sList;
|
|
SNodeList sNodeList;
|
|
PSBSSIDList pList;
|
|
PSNodeList pNodeList;
|
|
UINT cbListCount;
|
|
PKnownBSS pBSS;
|
|
PKnownNodeDB pNode;
|
|
UINT ii, jj;
|
|
SCmdLinkStatus sLinkStatus;
|
|
BYTE abySuppRates[] = {WLAN_EID_SUPP_RATES, 4, 0x02, 0x04, 0x0B, 0x16};
|
|
BYTE abyNullAddr[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
|
|
DWORD dwKeyIndex= 0;
|
|
BYTE abyScanSSID[WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1];
|
|
LONG ldBm;
|
|
|
|
pReq->wResult = 0;
|
|
|
|
switch(pReq->wCmdCode) {
|
|
|
|
case WLAN_CMD_BSS_SCAN:
|
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_BSS_SCAN..begin \n");
|
|
if (copy_from_user(&sScanCmd, pReq->data, sizeof(SCmdScan))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
|
|
pItemSSID = (PWLAN_IE_SSID)sScanCmd.ssid;
|
|
if (pItemSSID->len != 0) {
|
|
memset(abyScanSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
|
|
memcpy(abyScanSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
|
|
}
|
|
|
|
if (pDevice->bMACSuspend == TRUE) {
|
|
if (pDevice->bRadioOff == TRUE)
|
|
CARDbRadioPowerOn(pDevice);
|
|
vMgrTimerInit(pDevice);
|
|
MACvIntEnable(pDevice->PortOffset, IMR_MASK_VALUE);
|
|
add_timer(&pMgmt->sTimerSecondCallback);
|
|
pDevice->bMACSuspend = FALSE;
|
|
}
|
|
spin_lock_irq(&pDevice->lock);
|
|
if (memcmp(pMgmt->abyCurrBSSID, &abyNullAddr[0], 6) == 0)
|
|
BSSvClearBSSList((HANDLE)pDevice, FALSE);
|
|
else
|
|
BSSvClearBSSList((HANDLE)pDevice, pDevice->bLinkPass);
|
|
|
|
if (pItemSSID->len != 0)
|
|
bScheduleCommand((HANDLE) pDevice, WLAN_CMD_BSSID_SCAN, abyScanSSID);
|
|
else
|
|
bScheduleCommand((HANDLE) pDevice, WLAN_CMD_BSSID_SCAN, NULL);
|
|
spin_unlock_irq(&pDevice->lock);
|
|
break;
|
|
|
|
case WLAN_CMD_ZONETYPE_SET:
|
|
//mike add :cann't support.
|
|
result=-EOPNOTSUPP;
|
|
break;
|
|
|
|
if (copy_from_user(&sZoneTypeCmd, pReq->data, sizeof(SCmdZoneTypeSet))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
|
|
if(sZoneTypeCmd.bWrite==TRUE) {
|
|
//////write zonetype
|
|
if(sZoneTypeCmd.ZoneType == ZoneType_USA) {
|
|
//set to USA
|
|
printk("set_ZoneType:USA\n");
|
|
}
|
|
else if(sZoneTypeCmd.ZoneType == ZoneType_Japan) {
|
|
//set to Japan
|
|
printk("set_ZoneType:Japan\n");
|
|
}
|
|
else if(sZoneTypeCmd.ZoneType == ZoneType_Europe) {
|
|
//set to Europe
|
|
printk("set_ZoneType:Europe\n");
|
|
}
|
|
}
|
|
else {
|
|
///////read zonetype
|
|
BYTE zonetype=0;
|
|
|
|
|
|
if(zonetype == 0x00) { //USA
|
|
sZoneTypeCmd.ZoneType = ZoneType_USA;
|
|
}
|
|
else if(zonetype == 0x01) { //Japan
|
|
sZoneTypeCmd.ZoneType = ZoneType_Japan;
|
|
}
|
|
else if(zonetype == 0x02) { //Europe
|
|
sZoneTypeCmd.ZoneType = ZoneType_Europe;
|
|
}
|
|
else { //Unknown ZoneType
|
|
printk("Error:ZoneType[%x] Unknown ???\n",zonetype);
|
|
result = -EFAULT;
|
|
break;
|
|
}
|
|
if (copy_to_user(pReq->data, &sZoneTypeCmd, sizeof(SCmdZoneTypeSet))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
}
|
|
|
|
break;
|
|
|
|
case WLAN_CMD_BSS_JOIN:
|
|
|
|
if (pDevice->bMACSuspend == TRUE) {
|
|
if (pDevice->bRadioOff == TRUE)
|
|
CARDbRadioPowerOn(pDevice);
|
|
vMgrTimerInit(pDevice);
|
|
MACvIntEnable(pDevice->PortOffset, IMR_MASK_VALUE);
|
|
add_timer(&pMgmt->sTimerSecondCallback);
|
|
pDevice->bMACSuspend = FALSE;
|
|
}
|
|
|
|
if (copy_from_user(&sJoinCmd, pReq->data, sizeof(SCmdBSSJoin))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
|
|
pItemSSID = (PWLAN_IE_SSID)sJoinCmd.ssid;
|
|
memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
|
|
memcpy(pMgmt->abyDesireSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
|
|
if (sJoinCmd.wBSSType == ADHOC) {
|
|
pMgmt->eConfigMode = WMAC_CONFIG_IBSS_STA;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to adhoc mode\n");
|
|
}
|
|
else {
|
|
pMgmt->eConfigMode = WMAC_CONFIG_ESS_STA;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to STA mode\n");
|
|
}
|
|
if (sJoinCmd.bPSEnable == TRUE) {
|
|
pDevice->ePSMode = WMAC_POWER_FAST;
|
|
// pDevice->ePSMode = WMAC_POWER_MAX;
|
|
pMgmt->wListenInterval = 2;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Power Saving On\n");
|
|
}
|
|
else {
|
|
pDevice->ePSMode = WMAC_POWER_CAM;
|
|
pMgmt->wListenInterval = 1;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Power Saving Off \n");
|
|
}
|
|
|
|
if (sJoinCmd.bShareKeyAuth == TRUE){
|
|
pMgmt->bShareKeyAlgorithm = TRUE;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Share Key \n");
|
|
}
|
|
else {
|
|
pMgmt->bShareKeyAlgorithm = FALSE;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Open System \n");
|
|
}
|
|
pDevice->uChannel = sJoinCmd.uChannel;
|
|
netif_stop_queue(pDevice->dev);
|
|
spin_lock_irq(&pDevice->lock);
|
|
pMgmt->eCurrState = WMAC_STATE_IDLE;
|
|
bScheduleCommand((HANDLE) pDevice, WLAN_CMD_BSSID_SCAN, pMgmt->abyDesireSSID);
|
|
bScheduleCommand((HANDLE) pDevice, WLAN_CMD_SSID, NULL);
|
|
spin_unlock_irq(&pDevice->lock);
|
|
break;
|
|
|
|
case WLAN_CMD_SET_WEP:
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_WEP Key. \n");
|
|
memset(&sWEPCmd, 0 ,sizeof(SCmdSetWEP));
|
|
if (copy_from_user(&sWEPCmd, pReq->data, sizeof(SCmdSetWEP))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
if (sWEPCmd.bEnableWep != TRUE) {
|
|
pDevice->bEncryptionEnable = FALSE;
|
|
pDevice->eEncryptionStatus = Ndis802_11EncryptionDisabled;
|
|
MACvDisableDefaultKey(pDevice->PortOffset);
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WEP function disable. \n");
|
|
break;
|
|
}
|
|
|
|
for (ii = 0; ii < WLAN_WEP_NKEYS; ii ++) {
|
|
if (sWEPCmd.bWepKeyAvailable[ii]) {
|
|
if (ii == sWEPCmd.byKeyIndex)
|
|
//2006-1123-02,<Modify> by EinsnLiu
|
|
//Evaluate the "dwKeyIndex" error
|
|
// dwKeyIndex |= (1 << 31);
|
|
dwKeyIndex =ii|(1 << 31);
|
|
else
|
|
dwKeyIndex = ii;
|
|
|
|
KeybSetDefaultKey(&(pDevice->sKey),
|
|
dwKeyIndex,
|
|
sWEPCmd.auWepKeyLength[ii],
|
|
NULL,
|
|
(PBYTE)&sWEPCmd.abyWepKey[ii][0],
|
|
KEY_CTL_WEP,
|
|
pDevice->PortOffset,
|
|
pDevice->byLocalID);
|
|
}
|
|
}
|
|
pDevice->byKeyIndex = sWEPCmd.byKeyIndex;
|
|
pDevice->bTransmitKey = TRUE;
|
|
pDevice->bEncryptionEnable = TRUE;
|
|
pDevice->eEncryptionStatus = Ndis802_11Encryption1Enabled;
|
|
|
|
break;
|
|
|
|
case WLAN_CMD_GET_LINK:
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_GET_LINK status. \n");
|
|
|
|
memset(sLinkStatus.abySSID, 0 , WLAN_SSID_MAXLEN + 1);
|
|
|
|
if (pMgmt->eCurrMode == WMAC_MODE_IBSS_STA)
|
|
sLinkStatus.wBSSType = ADHOC;
|
|
else
|
|
sLinkStatus.wBSSType = INFRA;
|
|
|
|
if (pMgmt->eCurrState == WMAC_STATE_JOINTED)
|
|
sLinkStatus.byState = ADHOC_JOINTED;
|
|
else
|
|
sLinkStatus.byState = ADHOC_STARTED;
|
|
|
|
sLinkStatus.uChannel = pMgmt->uCurrChannel;
|
|
if (pDevice->bLinkPass == TRUE) {
|
|
sLinkStatus.bLink = TRUE;
|
|
pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID;
|
|
memcpy(sLinkStatus.abySSID, pItemSSID->abySSID, pItemSSID->len);
|
|
memcpy(sLinkStatus.abyBSSID, pMgmt->abyCurrBSSID, WLAN_BSSID_LEN);
|
|
sLinkStatus.uLinkRate = pMgmt->sNodeDBTable[0].wTxDataRate;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO" Link Success ! \n");
|
|
}
|
|
else {
|
|
sLinkStatus.bLink = FALSE;
|
|
}
|
|
if (copy_to_user(pReq->data, &sLinkStatus, sizeof(SCmdLinkStatus))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
|
|
break;
|
|
|
|
case WLAN_CMD_GET_LISTLEN:
|
|
cbListCount = 0;
|
|
pBSS = &(pMgmt->sBSSList[0]);
|
|
for (ii = 0; ii < MAX_BSS_NUM; ii++) {
|
|
pBSS = &(pMgmt->sBSSList[ii]);
|
|
if (!pBSS->bActive)
|
|
continue;
|
|
cbListCount++;
|
|
};
|
|
sList.uItem = cbListCount;
|
|
if (copy_to_user(pReq->data, &sList, sizeof(SBSSIDList))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
pReq->wResult = 0;
|
|
break;
|
|
|
|
case WLAN_CMD_GET_LIST:
|
|
if (copy_from_user(&sList, pReq->data, sizeof(SBSSIDList))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
pList = (PSBSSIDList)kmalloc(sizeof(SBSSIDList) + (sList.uItem * sizeof(SBSSIDItem)), (int)GFP_ATOMIC);
|
|
if (pList == NULL) {
|
|
result = -ENOMEM;
|
|
break;
|
|
}
|
|
pList->uItem = sList.uItem;
|
|
pBSS = &(pMgmt->sBSSList[0]);
|
|
for (ii = 0, jj = 0; jj < MAX_BSS_NUM ; jj++) {
|
|
pBSS = &(pMgmt->sBSSList[jj]);
|
|
if (pBSS->bActive) {
|
|
pList->sBSSIDList[ii].uChannel = pBSS->uChannel;
|
|
pList->sBSSIDList[ii].wBeaconInterval = pBSS->wBeaconInterval;
|
|
pList->sBSSIDList[ii].wCapInfo = pBSS->wCapInfo;
|
|
// pList->sBSSIDList[ii].uRSSI = pBSS->uRSSI;
|
|
RFvRSSITodBm(pDevice, (BYTE)(pBSS->uRSSI), &ldBm);
|
|
pList->sBSSIDList[ii].uRSSI = (UINT)ldBm;
|
|
memcpy(pList->sBSSIDList[ii].abyBSSID, pBSS->abyBSSID, WLAN_BSSID_LEN);
|
|
pItemSSID = (PWLAN_IE_SSID)pBSS->abySSID;
|
|
memset(pList->sBSSIDList[ii].abySSID, 0, WLAN_SSID_MAXLEN + 1);
|
|
memcpy(pList->sBSSIDList[ii].abySSID, pItemSSID->abySSID, pItemSSID->len);
|
|
if (WLAN_GET_CAP_INFO_ESS(pBSS->wCapInfo)) {
|
|
pList->sBSSIDList[ii].byNetType = INFRA;
|
|
}
|
|
else {
|
|
pList->sBSSIDList[ii].byNetType = ADHOC;
|
|
}
|
|
if (WLAN_GET_CAP_INFO_PRIVACY(pBSS->wCapInfo)) {
|
|
pList->sBSSIDList[ii].bWEPOn = TRUE;
|
|
}
|
|
else {
|
|
pList->sBSSIDList[ii].bWEPOn = FALSE;
|
|
}
|
|
ii ++;
|
|
if (ii >= pList->uItem)
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (copy_to_user(pReq->data, pList, sizeof(SBSSIDList) + (sList.uItem * sizeof(SBSSIDItem)))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
kfree(pList);
|
|
pReq->wResult = 0;
|
|
break;
|
|
|
|
case WLAN_CMD_GET_MIB:
|
|
if (copy_to_user(pReq->data, &(pDevice->s802_11Counter), sizeof(SDot11MIBCount))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
break;
|
|
|
|
case WLAN_CMD_GET_STAT:
|
|
if (copy_to_user(pReq->data, &(pDevice->scStatistic), sizeof(SStatCounter))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
break;
|
|
case WLAN_CMD_STOP_MAC:
|
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_STOP_MAC\n");
|
|
netif_stop_queue(pDevice->dev);
|
|
|
|
spin_lock_irq(&pDevice->lock);
|
|
if (pDevice->bRadioOff == FALSE) {
|
|
CARDbRadioPowerOff(pDevice);
|
|
}
|
|
pDevice->bLinkPass = FALSE;
|
|
memset(pMgmt->abyCurrBSSID, 0, 6);
|
|
pMgmt->eCurrState = WMAC_STATE_IDLE;
|
|
del_timer(&pDevice->sTimerCommand);
|
|
del_timer(&pMgmt->sTimerSecondCallback);
|
|
pDevice->bCmdRunning = FALSE;
|
|
pDevice->bMACSuspend = TRUE;
|
|
MACvIntDisable(pDevice->PortOffset);
|
|
spin_unlock_irq(&pDevice->lock);
|
|
|
|
break;
|
|
|
|
case WLAN_CMD_START_MAC:
|
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_START_MAC\n");
|
|
|
|
if (pDevice->bMACSuspend == TRUE) {
|
|
if (pDevice->bRadioOff == TRUE)
|
|
CARDbRadioPowerOn(pDevice);
|
|
vMgrTimerInit(pDevice);
|
|
MACvIntEnable(pDevice->PortOffset, IMR_MASK_VALUE);
|
|
add_timer(&pMgmt->sTimerSecondCallback);
|
|
pDevice->bMACSuspend = FALSE;
|
|
}
|
|
break;
|
|
|
|
case WLAN_CMD_SET_HOSTAPD:
|
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOSTAPD\n");
|
|
|
|
if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
if (sValue.dwValue == 1) {
|
|
if (hostap_set_hostapd(pDevice, 1, 1) == 0){
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable HOSTAP\n");
|
|
}
|
|
else {
|
|
result = -EFAULT;
|
|
break;
|
|
}
|
|
}
|
|
else {
|
|
hostap_set_hostapd(pDevice, 0, 1);
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable HOSTAP\n");
|
|
}
|
|
|
|
break;
|
|
|
|
case WLAN_CMD_SET_HOSTAPD_STA:
|
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOSTAPD_STA\n");
|
|
|
|
break;
|
|
case WLAN_CMD_SET_802_1X:
|
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_802_1X\n");
|
|
if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
|
|
if (sValue.dwValue == 1) {
|
|
pDevice->bEnable8021x = TRUE;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable 802.1x\n");
|
|
}
|
|
else {
|
|
pDevice->bEnable8021x = FALSE;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable 802.1x\n");
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
case WLAN_CMD_SET_HOST_WEP:
|
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOST_WEP\n");
|
|
if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
|
|
if (sValue.dwValue == 1) {
|
|
pDevice->bEnableHostWEP = TRUE;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable HostWEP\n");
|
|
}
|
|
else {
|
|
pDevice->bEnableHostWEP = FALSE;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable HostWEP\n");
|
|
}
|
|
|
|
break;
|
|
|
|
case WLAN_CMD_SET_WPA:
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_WPA\n");
|
|
|
|
if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
if (sValue.dwValue == 1) {
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "up wpadev\n");
|
|
memcpy(pDevice->wpadev->dev_addr, pDevice->dev->dev_addr, U_ETHER_ADDR_LEN);
|
|
pDevice->bWPADEVUp = TRUE;
|
|
}
|
|
else {
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "close wpadev\n");
|
|
pDevice->bWPADEVUp = FALSE;
|
|
}
|
|
|
|
break;
|
|
|
|
case WLAN_CMD_AP_START:
|
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_AP_START\n");
|
|
if (pDevice->bRadioOff == TRUE) {
|
|
CARDbRadioPowerOn(pDevice);
|
|
vMgrTimerInit(pDevice);
|
|
MACvIntEnable(pDevice->PortOffset, IMR_MASK_VALUE);
|
|
add_timer(&pMgmt->sTimerSecondCallback);
|
|
}
|
|
if (copy_from_user(&sStartAPCmd, pReq->data, sizeof(SCmdStartAP))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
|
|
if (sStartAPCmd.wBSSType == AP) {
|
|
pMgmt->eConfigMode = WMAC_CONFIG_AP;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to AP mode\n");
|
|
}
|
|
else {
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct BSS type not set to AP mode\n");
|
|
result = -EFAULT;
|
|
break;
|
|
}
|
|
|
|
|
|
if (sStartAPCmd.wBBPType == PHY80211g) {
|
|
pMgmt->byAPBBType = PHY_TYPE_11G;
|
|
}
|
|
else if (sStartAPCmd.wBBPType == PHY80211a) {
|
|
pMgmt->byAPBBType = PHY_TYPE_11A;
|
|
}
|
|
else {
|
|
pMgmt->byAPBBType = PHY_TYPE_11B;
|
|
}
|
|
|
|
pItemSSID = (PWLAN_IE_SSID)sStartAPCmd.ssid;
|
|
memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
|
|
memcpy(pMgmt->abyDesireSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
|
|
|
|
if ((sStartAPCmd.uChannel > 0)&&(sStartAPCmd.uChannel <= 14))
|
|
pDevice->uChannel = sStartAPCmd.uChannel;
|
|
|
|
if ((sStartAPCmd.uBeaconInt >= 20) && (sStartAPCmd.uBeaconInt <= 1000))
|
|
pMgmt->wIBSSBeaconPeriod = sStartAPCmd.uBeaconInt;
|
|
else
|
|
pMgmt->wIBSSBeaconPeriod = 100;
|
|
|
|
if (sStartAPCmd.bShareKeyAuth == TRUE){
|
|
pMgmt->bShareKeyAlgorithm = TRUE;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Share Key \n");
|
|
}
|
|
else {
|
|
pMgmt->bShareKeyAlgorithm = FALSE;
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Open System \n");
|
|
}
|
|
memcpy(pMgmt->abyIBSSSuppRates, abySuppRates, 6);
|
|
|
|
if (sStartAPCmd.byBasicRate & BIT3) {
|
|
pMgmt->abyIBSSSuppRates[2] |= BIT7;
|
|
pMgmt->abyIBSSSuppRates[3] |= BIT7;
|
|
pMgmt->abyIBSSSuppRates[4] |= BIT7;
|
|
pMgmt->abyIBSSSuppRates[5] |= BIT7;
|
|
}else if (sStartAPCmd.byBasicRate & BIT2) {
|
|
pMgmt->abyIBSSSuppRates[2] |= BIT7;
|
|
pMgmt->abyIBSSSuppRates[3] |= BIT7;
|
|
pMgmt->abyIBSSSuppRates[4] |= BIT7;
|
|
}else if (sStartAPCmd.byBasicRate & BIT1) {
|
|
pMgmt->abyIBSSSuppRates[2] |= BIT7;
|
|
pMgmt->abyIBSSSuppRates[3] |= BIT7;
|
|
}else if (sStartAPCmd.byBasicRate & BIT1) {
|
|
pMgmt->abyIBSSSuppRates[2] |= BIT7;
|
|
}else {
|
|
//default 1,2M
|
|
pMgmt->abyIBSSSuppRates[2] |= BIT7;
|
|
pMgmt->abyIBSSSuppRates[3] |= BIT7;
|
|
}
|
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Support Rate= %x %x %x %x\n",
|
|
pMgmt->abyIBSSSuppRates[2],
|
|
pMgmt->abyIBSSSuppRates[3],
|
|
pMgmt->abyIBSSSuppRates[4],
|
|
pMgmt->abyIBSSSuppRates[5]
|
|
);
|
|
|
|
netif_stop_queue(pDevice->dev);
|
|
spin_lock_irq(&pDevice->lock);
|
|
bScheduleCommand((HANDLE)pDevice, WLAN_CMD_RUN_AP, NULL);
|
|
spin_unlock_irq(&pDevice->lock);
|
|
break;
|
|
|
|
case WLAN_CMD_GET_NODE_CNT:
|
|
|
|
cbListCount = 0;
|
|
pNode = &(pMgmt->sNodeDBTable[0]);
|
|
for (ii = 0; ii < (MAX_NODE_NUM + 1); ii++) {
|
|
pNode = &(pMgmt->sNodeDBTable[ii]);
|
|
if (!pNode->bActive)
|
|
continue;
|
|
cbListCount++;
|
|
};
|
|
|
|
sNodeList.uItem = cbListCount;
|
|
if (copy_to_user(pReq->data, &sNodeList, sizeof(SNodeList))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
pReq->wResult = 0;
|
|
break;
|
|
|
|
case WLAN_CMD_GET_NODE_LIST:
|
|
|
|
if (copy_from_user(&sNodeList, pReq->data, sizeof(SNodeList))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
pNodeList = (PSNodeList)kmalloc(sizeof(SNodeList) + (sNodeList.uItem * sizeof(SNodeItem)), (int)GFP_ATOMIC);
|
|
if (pNodeList == NULL) {
|
|
result = -ENOMEM;
|
|
break;
|
|
}
|
|
pNodeList->uItem = sNodeList.uItem;
|
|
pNode = &(pMgmt->sNodeDBTable[0]);
|
|
for (ii = 0, jj = 0; ii < (MAX_NODE_NUM + 1); ii++) {
|
|
pNode = &(pMgmt->sNodeDBTable[ii]);
|
|
if (pNode->bActive) {
|
|
pNodeList->sNodeList[jj].wAID = pNode->wAID;
|
|
memcpy(pNodeList->sNodeList[jj].abyMACAddr, pNode->abyMACAddr, WLAN_ADDR_LEN);
|
|
pNodeList->sNodeList[jj].wTxDataRate = pNode->wTxDataRate;
|
|
pNodeList->sNodeList[jj].wInActiveCount = (WORD)pNode->uInActiveCount;
|
|
pNodeList->sNodeList[jj].wEnQueueCnt = (WORD)pNode->wEnQueueCnt;
|
|
pNodeList->sNodeList[jj].wFlags = (WORD)pNode->dwFlags;
|
|
pNodeList->sNodeList[jj].bPWBitOn = pNode->bPSEnable;
|
|
pNodeList->sNodeList[jj].byKeyIndex = pNode->byKeyIndex;
|
|
pNodeList->sNodeList[jj].wWepKeyLength = pNode->uWepKeyLength;
|
|
memcpy(&(pNodeList->sNodeList[jj].abyWepKey[0]), &(pNode->abyWepKey[0]), WEP_KEYMAXLEN);
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "key= %2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
|
|
pNodeList->sNodeList[jj].abyWepKey[0],
|
|
pNodeList->sNodeList[jj].abyWepKey[1],
|
|
pNodeList->sNodeList[jj].abyWepKey[2],
|
|
pNodeList->sNodeList[jj].abyWepKey[3],
|
|
pNodeList->sNodeList[jj].abyWepKey[4]
|
|
);
|
|
pNodeList->sNodeList[jj].bIsInFallback = pNode->bIsInFallback;
|
|
pNodeList->sNodeList[jj].uTxFailures = pNode->uTxFailures;
|
|
pNodeList->sNodeList[jj].uTxAttempts = pNode->uTxAttempts;
|
|
pNodeList->sNodeList[jj].wFailureRatio = (WORD)pNode->uFailureRatio;
|
|
jj ++;
|
|
if (jj >= pNodeList->uItem)
|
|
break;
|
|
}
|
|
};
|
|
if (copy_to_user(pReq->data, pNodeList, sizeof(SNodeList) + (sNodeList.uItem * sizeof(SNodeItem)))) {
|
|
result = -EFAULT;
|
|
break;
|
|
};
|
|
kfree(pNodeList);
|
|
pReq->wResult = 0;
|
|
break;
|
|
|
|
#ifdef WPA_SM_Transtatus
|
|
case 0xFF:
|
|
memset(wpa_Result.ifname,0,sizeof(wpa_Result.ifname));
|
|
wpa_Result.proto = 0;
|
|
wpa_Result.key_mgmt = 0;
|
|
wpa_Result.eap_type = 0;
|
|
wpa_Result.authenticated = FALSE;
|
|
pDevice->fWPA_Authened = FALSE;
|
|
if (copy_from_user(&wpa_Result, pReq->data, sizeof(wpa_Result))) {
|
|
result = -EFAULT;
|
|
break;
|
|
}
|
|
|
|
if(wpa_Result.authenticated==TRUE) {
|
|
#ifdef SndEvt_ToAPI
|
|
{
|
|
union iwreq_data wrqu;
|
|
|
|
pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID;
|
|
|
|
memset(&wrqu, 0, sizeof(wrqu));
|
|
wrqu.data.flags = RT_WPACONNECTED_EVENT_FLAG;
|
|
wrqu.data.length =pItemSSID->len;
|
|
wireless_send_event(pDevice->dev, IWEVCUSTOM, &wrqu, pItemSSID->abySSID);
|
|
}
|
|
#endif
|
|
pDevice->fWPA_Authened = TRUE; //is successful peer to wpa_Result.authenticated?
|
|
}
|
|
|
|
//printk("get private wpa_supplicant announce WPA SM\n");
|
|
//printk("wpa-->ifname=%s\n",wpa_Result.ifname);
|
|
//printk("wpa-->proto=%d\n",wpa_Result.proto);
|
|
//printk("wpa-->key-mgmt=%d\n",wpa_Result.key_mgmt);
|
|
//printk("wpa-->eap_type=%d\n",wpa_Result.eap_type);
|
|
//printk("wpa-->authenticated is %s\n",(wpa_Result.authenticated==TRUE)?"TRUE":"FALSE");
|
|
|
|
pReq->wResult = 0;
|
|
break;
|
|
#endif
|
|
|
|
default:
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Private command not support..\n");
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
/*
|
|
VOID
|
|
vConfigWEPKey (
|
|
IN PSDevice pDevice,
|
|
IN DWORD dwKeyIndex,
|
|
IN PBYTE pbyKey,
|
|
IN ULONG uKeyLength
|
|
)
|
|
{
|
|
int ii;
|
|
|
|
|
|
memset(&pDevice->abyWepKey[dwKeyIndex][0], 0, WLAN_WEPMAX_KEYLEN);
|
|
memcpy(&pDevice->abyWepKey[dwKeyIndex][0], pbyKey, uKeyLength);
|
|
|
|
pDevice->bWepKeyAvailable[dwKeyIndex] = TRUE;
|
|
pDevice->auWepKeyLength[dwKeyIndex] = uKeyLength;
|
|
|
|
MACvSetDefaultKeyEntry(pDevice->PortOffset, uKeyLength, dwKeyIndex,
|
|
(PDWORD) &(pDevice->abyWepKey[dwKeyIndex][0]), pDevice->byLocalID);
|
|
|
|
if (pDevice->eEncryptionStatus < Ndis802_11EncryptionNotSupported) {
|
|
for(ii=0; ii<MAX_GROUP_KEY; ii++) {
|
|
if ((pDevice->bWepKeyAvailable[ii] == TRUE) &&
|
|
(pDevice->auWepKeyLength[ii] == WLAN_WEP232_KEYLEN)) {
|
|
pDevice->uCurrentWEPMode = TX_WEP_SW232;
|
|
MACvDisableDefaultKey(pDevice->PortOffset);
|
|
break;
|
|
}
|
|
}
|
|
if ((ii == MAX_GROUP_KEY) &&
|
|
(pDevice->eEncryptionStatus < Ndis802_11EncryptionNotSupported)) {
|
|
MACvEnableDefaultKey(pDevice->PortOffset, pDevice->byLocalID);
|
|
}
|
|
}
|
|
}
|
|
*/
|