2 * Copyright (c) 1996, 2003 VIA Networking Technologies, Inc.
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
21 * Purpose: private ioctl functions
25 * Date: Auguest 20, 2003
44 /*--------------------- Static Definitions -------------------------*/
46 /*--------------------- Static Classes ----------------------------*/
48 /*--------------------- Static Variables --------------------------*/
49 //static int msglevel =MSG_LEVEL_DEBUG;
50 static int msglevel =MSG_LEVEL_INFO;
52 #ifdef WPA_SM_Transtatus
53 SWPAResult wpa_Result;
56 /*--------------------- Static Functions --------------------------*/
58 /*--------------------- Export Variables --------------------------*/
60 int private_ioctl(PSDevice pDevice, struct ifreq *rq) {
62 PSCmdRequest pReq = (PSCmdRequest)rq;
63 PSMgmtObject pMgmt = &(pDevice->sMgmtObj);
65 PWLAN_IE_SSID pItemSSID;
67 SCmdZoneTypeSet sZoneTypeCmd;
69 SCmdStartAP sStartAPCmd;
80 SCmdLinkStatus sLinkStatus;
81 BYTE abySuppRates[] = {WLAN_EID_SUPP_RATES, 4, 0x02, 0x04, 0x0B, 0x16};
82 BYTE abyNullAddr[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
84 BYTE abyScanSSID[WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1];
89 switch(pReq->wCmdCode) {
91 case WLAN_CMD_BSS_SCAN:
93 if (copy_from_user(&sScanCmd, pReq->data, sizeof(SCmdScan))) {
98 pItemSSID = (PWLAN_IE_SSID)sScanCmd.ssid;
99 if (pItemSSID->len != 0) {
100 memset(abyScanSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
101 memcpy(abyScanSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
103 spin_lock_irq(&pDevice->lock);
104 if (memcmp(pMgmt->abyCurrBSSID, &abyNullAddr[0], 6) == 0)
105 BSSvClearBSSList((HANDLE)pDevice, FALSE);
107 BSSvClearBSSList((HANDLE)pDevice, pDevice->bLinkPass);
108 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_BSS_SCAN..begin \n");
110 if (pItemSSID->len != 0)
111 bScheduleCommand((HANDLE) pDevice, WLAN_CMD_BSSID_SCAN, abyScanSSID);
113 bScheduleCommand((HANDLE) pDevice, WLAN_CMD_BSSID_SCAN, NULL);
114 spin_unlock_irq(&pDevice->lock);
117 case WLAN_CMD_ZONETYPE_SET:
118 //mike add :cann't support.
122 if (copy_from_user(&sZoneTypeCmd, pReq->data, sizeof(SCmdZoneTypeSet))) {
127 if(sZoneTypeCmd.bWrite==TRUE) {
129 if(sZoneTypeCmd.ZoneType == ZoneType_USA) {
131 printk("set_ZoneType:USA\n");
133 else if(sZoneTypeCmd.ZoneType == ZoneType_Japan) {
135 printk("set_ZoneType:Japan\n");
137 else if(sZoneTypeCmd.ZoneType == ZoneType_Europe) {
139 printk("set_ZoneType:Europe\n");
147 if(zonetype == 0x00) { //USA
148 sZoneTypeCmd.ZoneType = ZoneType_USA;
150 else if(zonetype == 0x01) { //Japan
151 sZoneTypeCmd.ZoneType = ZoneType_Japan;
153 else if(zonetype == 0x02) { //Europe
154 sZoneTypeCmd.ZoneType = ZoneType_Europe;
156 else { //Unknow ZoneType
157 printk("Error:ZoneType[%x] Unknown ???\n",zonetype);
161 if (copy_to_user(pReq->data, &sZoneTypeCmd, sizeof(SCmdZoneTypeSet))) {
169 case WLAN_CMD_BSS_JOIN:
171 if (copy_from_user(&sJoinCmd, pReq->data, sizeof(SCmdBSSJoin))) {
176 pItemSSID = (PWLAN_IE_SSID)sJoinCmd.ssid;
177 memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
178 memcpy(pMgmt->abyDesireSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
179 if (sJoinCmd.wBSSType == ADHOC) {
180 pMgmt->eConfigMode = WMAC_CONFIG_IBSS_STA;
181 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to adhoc mode\n");
184 pMgmt->eConfigMode = WMAC_CONFIG_ESS_STA;
185 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to STA mode\n");
187 if (sJoinCmd.bPSEnable == TRUE) {
188 pDevice->ePSMode = WMAC_POWER_FAST;
189 // pDevice->ePSMode = WMAC_POWER_MAX;
190 pMgmt->wListenInterval = 2;
191 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Power Saving On\n");
194 pDevice->ePSMode = WMAC_POWER_CAM;
195 pMgmt->wListenInterval = 1;
196 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Power Saving Off \n");
199 if (sJoinCmd.bShareKeyAuth == TRUE){
200 pMgmt->bShareKeyAlgorithm = TRUE;
201 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Share Key \n");
204 pMgmt->bShareKeyAlgorithm = FALSE;
205 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Open System \n");
207 pDevice->uChannel = sJoinCmd.uChannel;
208 netif_stop_queue(pDevice->dev);
209 spin_lock_irq(&pDevice->lock);
210 pMgmt->eCurrState = WMAC_STATE_IDLE;
211 bScheduleCommand((HANDLE) pDevice, WLAN_CMD_BSSID_SCAN, pMgmt->abyDesireSSID);
212 bScheduleCommand((HANDLE) pDevice, WLAN_CMD_SSID, NULL);
213 spin_unlock_irq(&pDevice->lock);
216 case WLAN_CMD_SET_WEP:
217 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_WEP Key. \n");
218 memset(&sWEPCmd, 0 ,sizeof(SCmdSetWEP));
219 if (copy_from_user(&sWEPCmd, pReq->data, sizeof(SCmdSetWEP))) {
223 if (sWEPCmd.bEnableWep != TRUE) {
226 pDevice->bEncryptionEnable = FALSE;
227 pDevice->eEncryptionStatus = Ndis802_11EncryptionDisabled;
228 spin_lock_irq(&pDevice->lock);
229 for(uu=0;uu<MAX_KEY_TABLE;uu++)
230 MACvDisableKeyEntry(pDevice,uu);
231 spin_unlock_irq(&pDevice->lock);
232 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WEP function disable. \n");
236 for (ii = 0; ii < WLAN_WEP_NKEYS; ii ++) {
237 if (sWEPCmd.bWepKeyAvailable[ii]) {
238 if (ii == sWEPCmd.byKeyIndex)
239 //2006-1207-01<Modify>by Einsn Liu
240 // dwKeyIndex|= (1 << 31);
241 dwKeyIndex=ii|(1 << 31);
244 spin_lock_irq(&pDevice->lock);
245 KeybSetDefaultKey( pDevice,
248 sWEPCmd.auWepKeyLength[ii],
250 (PBYTE)&sWEPCmd.abyWepKey[ii][0],
253 spin_unlock_irq(&pDevice->lock);
257 pDevice->byKeyIndex = sWEPCmd.byKeyIndex;
258 pDevice->bTransmitKey = TRUE;
259 pDevice->bEncryptionEnable = TRUE;
260 pDevice->eEncryptionStatus = Ndis802_11Encryption1Enabled;
264 case WLAN_CMD_GET_LINK:
265 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_GET_LINK status. \n");
267 memset(sLinkStatus.abySSID, 0 , WLAN_SSID_MAXLEN + 1);
269 if (pMgmt->eCurrMode == WMAC_MODE_IBSS_STA)
270 sLinkStatus.wBSSType = ADHOC;
272 sLinkStatus.wBSSType = INFRA;
274 if (pMgmt->eCurrState == WMAC_STATE_JOINTED)
275 sLinkStatus.byState = ADHOC_JOINTED;
277 sLinkStatus.byState = ADHOC_STARTED;
279 sLinkStatus.uChannel = pMgmt->uCurrChannel;
280 if (pDevice->bLinkPass == TRUE) {
281 sLinkStatus.bLink = TRUE;
282 pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID;
283 memcpy(sLinkStatus.abySSID, pItemSSID->abySSID, pItemSSID->len);
284 memcpy(sLinkStatus.abyBSSID, pMgmt->abyCurrBSSID, WLAN_BSSID_LEN);
285 sLinkStatus.uLinkRate = pMgmt->sNodeDBTable[0].wTxDataRate;
286 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO" Link Success ! \n");
289 sLinkStatus.bLink = FALSE;
291 if (copy_to_user(pReq->data, &sLinkStatus, sizeof(SCmdLinkStatus))) {
298 case WLAN_CMD_GET_LISTLEN:
300 pBSS = &(pMgmt->sBSSList[0]);
301 for (ii = 0; ii < MAX_BSS_NUM; ii++) {
302 pBSS = &(pMgmt->sBSSList[ii]);
307 sList.uItem = cbListCount;
308 if (copy_to_user(pReq->data, &sList, sizeof(SBSSIDList))) {
315 case WLAN_CMD_GET_LIST:
316 if (copy_from_user(&sList, pReq->data, sizeof(SBSSIDList))) {
320 pList = (PSBSSIDList)kmalloc(sizeof(SBSSIDList) + (sList.uItem * sizeof(SBSSIDItem)), (int)GFP_ATOMIC);
325 pList->uItem = sList.uItem;
326 pBSS = &(pMgmt->sBSSList[0]);
327 for (ii = 0, jj = 0; jj < MAX_BSS_NUM ; jj++) {
328 pBSS = &(pMgmt->sBSSList[jj]);
330 pList->sBSSIDList[ii].uChannel = pBSS->uChannel;
331 pList->sBSSIDList[ii].wBeaconInterval = pBSS->wBeaconInterval;
332 pList->sBSSIDList[ii].wCapInfo = pBSS->wCapInfo;
333 RFvRSSITodBm(pDevice, (BYTE)(pBSS->uRSSI), &ldBm);
334 pList->sBSSIDList[ii].uRSSI = (UINT)ldBm;
335 // pList->sBSSIDList[ii].uRSSI = pBSS->uRSSI;
336 memcpy(pList->sBSSIDList[ii].abyBSSID, pBSS->abyBSSID, WLAN_BSSID_LEN);
337 pItemSSID = (PWLAN_IE_SSID)pBSS->abySSID;
338 memset(pList->sBSSIDList[ii].abySSID, 0, WLAN_SSID_MAXLEN + 1);
339 memcpy(pList->sBSSIDList[ii].abySSID, pItemSSID->abySSID, pItemSSID->len);
340 if (WLAN_GET_CAP_INFO_ESS(pBSS->wCapInfo)) {
341 pList->sBSSIDList[ii].byNetType = INFRA;
344 pList->sBSSIDList[ii].byNetType = ADHOC;
346 if (WLAN_GET_CAP_INFO_PRIVACY(pBSS->wCapInfo)) {
347 pList->sBSSIDList[ii].bWEPOn = TRUE;
350 pList->sBSSIDList[ii].bWEPOn = FALSE;
353 if (ii >= pList->uItem)
358 if (copy_to_user(pReq->data, pList, sizeof(SBSSIDList) + (sList.uItem * sizeof(SBSSIDItem)))) {
366 case WLAN_CMD_GET_MIB:
367 if (copy_to_user(pReq->data, &(pDevice->s802_11Counter), sizeof(SDot11MIBCount))) {
373 case WLAN_CMD_GET_STAT:
374 if (copy_to_user(pReq->data, &(pDevice->scStatistic), sizeof(SStatCounter))) {
379 case WLAN_CMD_STOP_MAC:
381 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_STOP_MAC\n");
383 netif_stop_queue(pDevice->dev);
384 spin_lock_irq(&pDevice->lock);
385 if (pDevice->bRadioOff == FALSE) {
386 CARDbRadioPowerOff(pDevice);
388 pDevice->bLinkPass = FALSE;
389 ControlvMaskByte(pDevice,MESSAGE_REQUEST_MACREG,MAC_REG_PAPEDELAY,LEDSTS_STS,LEDSTS_SLOW);
390 memset(pMgmt->abyCurrBSSID, 0, 6);
391 pMgmt->eCurrState = WMAC_STATE_IDLE;
392 // del_timer(&pDevice->sTimerCommand);
393 // del_timer(&pMgmt->sTimerSecondCallback);
394 pDevice->bCmdRunning = FALSE;
395 spin_unlock_irq(&pDevice->lock);
399 case WLAN_CMD_START_MAC:
401 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_START_MAC\n");
403 if (pDevice->bRadioOff == TRUE)
404 CARDbRadioPowerOn(pDevice);
407 case WLAN_CMD_SET_HOSTAPD:
409 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOSTAPD\n");
411 if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
415 if (sValue.dwValue == 1) {
416 if (hostap_set_hostapd(pDevice, 1, 1) == 0){
417 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable HOSTAP\n");
425 hostap_set_hostapd(pDevice, 0, 1);
426 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable HOSTAP\n");
431 case WLAN_CMD_SET_HOSTAPD_STA:
433 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOSTAPD_STA\n");
436 case WLAN_CMD_SET_802_1X:
438 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_802_1X\n");
439 if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
444 if (sValue.dwValue == 1) {
445 pDevice->bEnable8021x = TRUE;
446 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable 802.1x\n");
449 pDevice->bEnable8021x = FALSE;
450 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable 802.1x\n");
456 case WLAN_CMD_SET_HOST_WEP:
458 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOST_WEP\n");
459 if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
464 if (sValue.dwValue == 1) {
465 pDevice->bEnableHostWEP = TRUE;
466 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable HostWEP\n");
469 pDevice->bEnableHostWEP = FALSE;
470 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable HostWEP\n");
475 case WLAN_CMD_SET_WPA:
476 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_WPA\n");
478 if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
482 if (sValue.dwValue == 1) {
483 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "up wpadev\n");
484 memcpy(pDevice->wpadev->dev_addr, pDevice->dev->dev_addr, U_ETHER_ADDR_LEN);
485 pDevice->bWPADEVUp = TRUE;
488 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "close wpadev\n");
489 pDevice->bWPADEVUp = FALSE;
494 case WLAN_CMD_AP_START:
496 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_AP_START\n");
497 if (pDevice->bRadioOff == TRUE) {
498 CARDbRadioPowerOn(pDevice);
499 add_timer(&pMgmt->sTimerSecondCallback);
501 if (copy_from_user(&sStartAPCmd, pReq->data, sizeof(SCmdStartAP))) {
506 if (sStartAPCmd.wBSSType == AP) {
507 pMgmt->eConfigMode = WMAC_CONFIG_AP;
508 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to AP mode\n");
511 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct BSS type not set to AP mode\n");
517 if (sStartAPCmd.wBBPType == PHY80211g) {
518 pMgmt->byAPBBType = PHY_TYPE_11G;
520 else if (sStartAPCmd.wBBPType == PHY80211a) {
521 pMgmt->byAPBBType = PHY_TYPE_11A;
524 pMgmt->byAPBBType = PHY_TYPE_11B;
527 pItemSSID = (PWLAN_IE_SSID)sStartAPCmd.ssid;
528 memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
529 memcpy(pMgmt->abyDesireSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
531 if ((sStartAPCmd.uChannel > 0)&&(sStartAPCmd.uChannel <= 14))
532 pDevice->uChannel = sStartAPCmd.uChannel;
534 if ((sStartAPCmd.uBeaconInt >= 20) && (sStartAPCmd.uBeaconInt <= 1000))
535 pMgmt->wIBSSBeaconPeriod = sStartAPCmd.uBeaconInt;
537 pMgmt->wIBSSBeaconPeriod = 100;
539 if (sStartAPCmd.bShareKeyAuth == TRUE){
540 pMgmt->bShareKeyAlgorithm = TRUE;
541 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Share Key \n");
544 pMgmt->bShareKeyAlgorithm = FALSE;
545 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Open System \n");
547 memcpy(pMgmt->abyIBSSSuppRates, abySuppRates, 6);
549 if (sStartAPCmd.byBasicRate & BIT3) {
550 pMgmt->abyIBSSSuppRates[2] |= BIT7;
551 pMgmt->abyIBSSSuppRates[3] |= BIT7;
552 pMgmt->abyIBSSSuppRates[4] |= BIT7;
553 pMgmt->abyIBSSSuppRates[5] |= BIT7;
554 }else if (sStartAPCmd.byBasicRate & BIT2) {
555 pMgmt->abyIBSSSuppRates[2] |= BIT7;
556 pMgmt->abyIBSSSuppRates[3] |= BIT7;
557 pMgmt->abyIBSSSuppRates[4] |= BIT7;
558 }else if (sStartAPCmd.byBasicRate & BIT1) {
559 pMgmt->abyIBSSSuppRates[2] |= BIT7;
560 pMgmt->abyIBSSSuppRates[3] |= BIT7;
561 }else if (sStartAPCmd.byBasicRate & BIT1) {
562 pMgmt->abyIBSSSuppRates[2] |= BIT7;
565 pMgmt->abyIBSSSuppRates[2] |= BIT7;
566 pMgmt->abyIBSSSuppRates[3] |= BIT7;
569 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Support Rate= %x %x %x %x\n",
570 pMgmt->abyIBSSSuppRates[2],
571 pMgmt->abyIBSSSuppRates[3],
572 pMgmt->abyIBSSSuppRates[4],
573 pMgmt->abyIBSSSuppRates[5]
576 netif_stop_queue(pDevice->dev);
577 spin_lock_irq(&pDevice->lock);
578 bScheduleCommand((HANDLE)pDevice, WLAN_CMD_RUN_AP, NULL);
579 spin_unlock_irq(&pDevice->lock);
582 case WLAN_CMD_GET_NODE_CNT:
585 pNode = &(pMgmt->sNodeDBTable[0]);
586 for (ii = 0; ii < (MAX_NODE_NUM + 1); ii++) {
587 pNode = &(pMgmt->sNodeDBTable[ii]);
593 sNodeList.uItem = cbListCount;
594 if (copy_to_user(pReq->data, &sNodeList, sizeof(SNodeList))) {
601 case WLAN_CMD_GET_NODE_LIST:
603 if (copy_from_user(&sNodeList, pReq->data, sizeof(SNodeList))) {
607 pNodeList = (PSNodeList)kmalloc(sizeof(SNodeList) + (sNodeList.uItem * sizeof(SNodeItem)), (int)GFP_ATOMIC);
608 if (pNodeList == NULL) {
612 pNodeList->uItem = sNodeList.uItem;
613 pNode = &(pMgmt->sNodeDBTable[0]);
614 for (ii = 0, jj = 0; ii < (MAX_NODE_NUM + 1); ii++) {
615 pNode = &(pMgmt->sNodeDBTable[ii]);
616 if (pNode->bActive) {
617 pNodeList->sNodeList[jj].wAID = pNode->wAID;
618 memcpy(pNodeList->sNodeList[jj].abyMACAddr, pNode->abyMACAddr, WLAN_ADDR_LEN);
619 pNodeList->sNodeList[jj].wTxDataRate = pNode->wTxDataRate;
620 pNodeList->sNodeList[jj].wInActiveCount = (WORD)pNode->uInActiveCount;
621 pNodeList->sNodeList[jj].wEnQueueCnt = (WORD)pNode->wEnQueueCnt;
622 pNodeList->sNodeList[jj].wFlags = (WORD)pNode->dwFlags;
623 pNodeList->sNodeList[jj].bPWBitOn = pNode->bPSEnable;
624 pNodeList->sNodeList[jj].byKeyIndex = pNode->byKeyIndex;
625 pNodeList->sNodeList[jj].wWepKeyLength = pNode->uWepKeyLength;
626 memcpy(&(pNodeList->sNodeList[jj].abyWepKey[0]), &(pNode->abyWepKey[0]), WEP_KEYMAXLEN);
627 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "key= %2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
628 pNodeList->sNodeList[jj].abyWepKey[0],
629 pNodeList->sNodeList[jj].abyWepKey[1],
630 pNodeList->sNodeList[jj].abyWepKey[2],
631 pNodeList->sNodeList[jj].abyWepKey[3],
632 pNodeList->sNodeList[jj].abyWepKey[4]
634 pNodeList->sNodeList[jj].bIsInFallback = pNode->bIsInFallback;
635 pNodeList->sNodeList[jj].uTxFailures = pNode->uTxFailures;
636 pNodeList->sNodeList[jj].uTxAttempts = pNode->uTxAttempts;
637 pNodeList->sNodeList[jj].wFailureRatio = (WORD)pNode->uFailureRatio;
639 if (jj >= pNodeList->uItem)
643 if (copy_to_user(pReq->data, pNodeList, sizeof(SNodeList) + (sNodeList.uItem * sizeof(SNodeItem)))) {
651 #ifdef WPA_SM_Transtatus
653 memset(wpa_Result.ifname,0,sizeof(wpa_Result.ifname));
654 wpa_Result.proto = 0;
655 wpa_Result.key_mgmt = 0;
656 wpa_Result.eap_type = 0;
657 wpa_Result.authenticated = FALSE;
658 pDevice->fWPA_Authened = FALSE;
659 if (copy_from_user(&wpa_Result, pReq->data, sizeof(wpa_Result))) {
663 //DavidWang for some AP maybe good authenticate
664 if(wpa_Result.key_mgmt==0x20)
665 pMgmt->Cisco_cckm =1;
667 pMgmt->Cisco_cckm =0;
670 if(wpa_Result.authenticated==TRUE) {
673 union iwreq_data wrqu;
675 pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID;
677 memset(&wrqu, 0, sizeof(wrqu));
678 wrqu.data.flags = RT_WPACONNECTED_EVENT_FLAG;
679 wrqu.data.length =pItemSSID->len;
680 wireless_send_event(pDevice->dev, IWEVCUSTOM, &wrqu, pItemSSID->abySSID);
683 pDevice->fWPA_Authened = TRUE; //is sucessful peer to wpa_Result.authenticated?
686 //printk("get private wpa_supplicant announce WPA SM\n");
687 //printk("wpa-->ifname=%s\n",wpa_Result.ifname);
688 //printk("wpa-->proto=%d\n",wpa_Result.proto);
689 //printk("wpa-->key-mgmt=%d\n",wpa_Result.key_mgmt);
690 //printk("wpa-->eap_type=%d\n",wpa_Result.eap_type);
691 //printk("wpa-->authenticated is %s\n",(wpa_Result.authenticated==TRUE)?"TRUE":"FALSE");
698 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Private command not support..\n");