2 * Copyright (c) 1996, 2003 VIA Networking Technologies, Inc.
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
21 * Purpose: private ioctl functions
25 * Date: Auguest 20, 2003
42 /*--------------------- Static Definitions -------------------------*/
44 /*--------------------- Static Classes ----------------------------*/
46 /*--------------------- Static Variables --------------------------*/
47 //static int msglevel =MSG_LEVEL_DEBUG;
48 static int msglevel =MSG_LEVEL_INFO;
50 #ifdef WPA_SM_Transtatus
51 SWPAResult wpa_Result;
54 /*--------------------- Static Functions --------------------------*/
56 /*--------------------- Export Variables --------------------------*/
58 int private_ioctl(PSDevice pDevice, struct ifreq *rq) {
60 PSCmdRequest pReq = (PSCmdRequest)rq;
61 PSMgmtObject pMgmt = pDevice->pMgmt;
63 PWLAN_IE_SSID pItemSSID;
65 SCmdZoneTypeSet sZoneTypeCmd;
67 SCmdStartAP sStartAPCmd;
78 SCmdLinkStatus sLinkStatus;
79 BYTE abySuppRates[] = {WLAN_EID_SUPP_RATES, 4, 0x02, 0x04, 0x0B, 0x16};
80 BYTE abyNullAddr[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
82 BYTE abyScanSSID[WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1];
87 switch(pReq->wCmdCode) {
89 case WLAN_CMD_BSS_SCAN:
91 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_BSS_SCAN..begin \n");
92 if (copy_from_user(&sScanCmd, pReq->data, sizeof(SCmdScan))) {
97 pItemSSID = (PWLAN_IE_SSID)sScanCmd.ssid;
98 if (pItemSSID->len != 0) {
99 memset(abyScanSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
100 memcpy(abyScanSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
103 if (pDevice->bMACSuspend == TRUE) {
104 if (pDevice->bRadioOff == TRUE)
105 CARDbRadioPowerOn(pDevice);
106 vMgrTimerInit(pDevice);
107 MACvIntEnable(pDevice->PortOffset, IMR_MASK_VALUE);
108 add_timer(&pMgmt->sTimerSecondCallback);
109 pDevice->bMACSuspend = FALSE;
111 spin_lock_irq(&pDevice->lock);
112 if (memcmp(pMgmt->abyCurrBSSID, &abyNullAddr[0], 6) == 0)
113 BSSvClearBSSList((HANDLE)pDevice, FALSE);
115 BSSvClearBSSList((HANDLE)pDevice, pDevice->bLinkPass);
117 if (pItemSSID->len != 0)
118 bScheduleCommand((HANDLE) pDevice, WLAN_CMD_BSSID_SCAN, abyScanSSID);
120 bScheduleCommand((HANDLE) pDevice, WLAN_CMD_BSSID_SCAN, NULL);
121 spin_unlock_irq(&pDevice->lock);
124 case WLAN_CMD_ZONETYPE_SET:
125 //mike add :cann't support.
129 if (copy_from_user(&sZoneTypeCmd, pReq->data, sizeof(SCmdZoneTypeSet))) {
134 if(sZoneTypeCmd.bWrite==TRUE) {
136 if(sZoneTypeCmd.ZoneType == ZoneType_USA) {
138 printk("set_ZoneType:USA\n");
140 else if(sZoneTypeCmd.ZoneType == ZoneType_Japan) {
142 printk("set_ZoneType:Japan\n");
144 else if(sZoneTypeCmd.ZoneType == ZoneType_Europe) {
146 printk("set_ZoneType:Europe\n");
154 if(zonetype == 0x00) { //USA
155 sZoneTypeCmd.ZoneType = ZoneType_USA;
157 else if(zonetype == 0x01) { //Japan
158 sZoneTypeCmd.ZoneType = ZoneType_Japan;
160 else if(zonetype == 0x02) { //Europe
161 sZoneTypeCmd.ZoneType = ZoneType_Europe;
163 else { //Unknow ZoneType
164 printk("Error:ZoneType[%x] Unknown ???\n",zonetype);
168 if (copy_to_user(pReq->data, &sZoneTypeCmd, sizeof(SCmdZoneTypeSet))) {
176 case WLAN_CMD_BSS_JOIN:
178 if (pDevice->bMACSuspend == TRUE) {
179 if (pDevice->bRadioOff == TRUE)
180 CARDbRadioPowerOn(pDevice);
181 vMgrTimerInit(pDevice);
182 MACvIntEnable(pDevice->PortOffset, IMR_MASK_VALUE);
183 add_timer(&pMgmt->sTimerSecondCallback);
184 pDevice->bMACSuspend = FALSE;
187 if (copy_from_user(&sJoinCmd, pReq->data, sizeof(SCmdBSSJoin))) {
192 pItemSSID = (PWLAN_IE_SSID)sJoinCmd.ssid;
193 memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
194 memcpy(pMgmt->abyDesireSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
195 if (sJoinCmd.wBSSType == ADHOC) {
196 pMgmt->eConfigMode = WMAC_CONFIG_IBSS_STA;
197 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to adhoc mode\n");
200 pMgmt->eConfigMode = WMAC_CONFIG_ESS_STA;
201 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to STA mode\n");
203 if (sJoinCmd.bPSEnable == TRUE) {
204 pDevice->ePSMode = WMAC_POWER_FAST;
205 // pDevice->ePSMode = WMAC_POWER_MAX;
206 pMgmt->wListenInterval = 2;
207 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Power Saving On\n");
210 pDevice->ePSMode = WMAC_POWER_CAM;
211 pMgmt->wListenInterval = 1;
212 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Power Saving Off \n");
215 if (sJoinCmd.bShareKeyAuth == TRUE){
216 pMgmt->bShareKeyAlgorithm = TRUE;
217 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Share Key \n");
220 pMgmt->bShareKeyAlgorithm = FALSE;
221 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Open System \n");
223 pDevice->uChannel = sJoinCmd.uChannel;
224 netif_stop_queue(pDevice->dev);
225 spin_lock_irq(&pDevice->lock);
226 pMgmt->eCurrState = WMAC_STATE_IDLE;
227 bScheduleCommand((HANDLE) pDevice, WLAN_CMD_BSSID_SCAN, pMgmt->abyDesireSSID);
228 bScheduleCommand((HANDLE) pDevice, WLAN_CMD_SSID, NULL);
229 spin_unlock_irq(&pDevice->lock);
232 case WLAN_CMD_SET_WEP:
233 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_WEP Key. \n");
234 memset(&sWEPCmd, 0 ,sizeof(SCmdSetWEP));
235 if (copy_from_user(&sWEPCmd, pReq->data, sizeof(SCmdSetWEP))) {
239 if (sWEPCmd.bEnableWep != TRUE) {
240 pDevice->bEncryptionEnable = FALSE;
241 pDevice->eEncryptionStatus = Ndis802_11EncryptionDisabled;
242 MACvDisableDefaultKey(pDevice->PortOffset);
243 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WEP function disable. \n");
247 for (ii = 0; ii < WLAN_WEP_NKEYS; ii ++) {
248 if (sWEPCmd.bWepKeyAvailable[ii]) {
249 if (ii == sWEPCmd.byKeyIndex)
250 //2006-1123-02,<Modify> by EinsnLiu
251 //Evaluate the "dwKeyIndex" error
252 // dwKeyIndex |= (1 << 31);
253 dwKeyIndex =ii|(1 << 31);
257 KeybSetDefaultKey(&(pDevice->sKey),
259 sWEPCmd.auWepKeyLength[ii],
261 (PBYTE)&sWEPCmd.abyWepKey[ii][0],
267 pDevice->byKeyIndex = sWEPCmd.byKeyIndex;
268 pDevice->bTransmitKey = TRUE;
269 pDevice->bEncryptionEnable = TRUE;
270 pDevice->eEncryptionStatus = Ndis802_11Encryption1Enabled;
274 case WLAN_CMD_GET_LINK:
275 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_GET_LINK status. \n");
277 memset(sLinkStatus.abySSID, 0 , WLAN_SSID_MAXLEN + 1);
279 if (pMgmt->eCurrMode == WMAC_MODE_IBSS_STA)
280 sLinkStatus.wBSSType = ADHOC;
282 sLinkStatus.wBSSType = INFRA;
284 if (pMgmt->eCurrState == WMAC_STATE_JOINTED)
285 sLinkStatus.byState = ADHOC_JOINTED;
287 sLinkStatus.byState = ADHOC_STARTED;
289 sLinkStatus.uChannel = pMgmt->uCurrChannel;
290 if (pDevice->bLinkPass == TRUE) {
291 sLinkStatus.bLink = TRUE;
292 pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID;
293 memcpy(sLinkStatus.abySSID, pItemSSID->abySSID, pItemSSID->len);
294 memcpy(sLinkStatus.abyBSSID, pMgmt->abyCurrBSSID, WLAN_BSSID_LEN);
295 sLinkStatus.uLinkRate = pMgmt->sNodeDBTable[0].wTxDataRate;
296 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO" Link Success ! \n");
299 sLinkStatus.bLink = FALSE;
301 if (copy_to_user(pReq->data, &sLinkStatus, sizeof(SCmdLinkStatus))) {
308 case WLAN_CMD_GET_LISTLEN:
310 pBSS = &(pMgmt->sBSSList[0]);
311 for (ii = 0; ii < MAX_BSS_NUM; ii++) {
312 pBSS = &(pMgmt->sBSSList[ii]);
317 sList.uItem = cbListCount;
318 if (copy_to_user(pReq->data, &sList, sizeof(SBSSIDList))) {
325 case WLAN_CMD_GET_LIST:
326 if (copy_from_user(&sList, pReq->data, sizeof(SBSSIDList))) {
330 pList = (PSBSSIDList)kmalloc(sizeof(SBSSIDList) + (sList.uItem * sizeof(SBSSIDItem)), (int)GFP_ATOMIC);
335 pList->uItem = sList.uItem;
336 pBSS = &(pMgmt->sBSSList[0]);
337 for (ii = 0, jj = 0; jj < MAX_BSS_NUM ; jj++) {
338 pBSS = &(pMgmt->sBSSList[jj]);
340 pList->sBSSIDList[ii].uChannel = pBSS->uChannel;
341 pList->sBSSIDList[ii].wBeaconInterval = pBSS->wBeaconInterval;
342 pList->sBSSIDList[ii].wCapInfo = pBSS->wCapInfo;
343 // pList->sBSSIDList[ii].uRSSI = pBSS->uRSSI;
344 RFvRSSITodBm(pDevice, (BYTE)(pBSS->uRSSI), &ldBm);
345 pList->sBSSIDList[ii].uRSSI = (UINT)ldBm;
346 memcpy(pList->sBSSIDList[ii].abyBSSID, pBSS->abyBSSID, WLAN_BSSID_LEN);
347 pItemSSID = (PWLAN_IE_SSID)pBSS->abySSID;
348 memset(pList->sBSSIDList[ii].abySSID, 0, WLAN_SSID_MAXLEN + 1);
349 memcpy(pList->sBSSIDList[ii].abySSID, pItemSSID->abySSID, pItemSSID->len);
350 if (WLAN_GET_CAP_INFO_ESS(pBSS->wCapInfo)) {
351 pList->sBSSIDList[ii].byNetType = INFRA;
354 pList->sBSSIDList[ii].byNetType = ADHOC;
356 if (WLAN_GET_CAP_INFO_PRIVACY(pBSS->wCapInfo)) {
357 pList->sBSSIDList[ii].bWEPOn = TRUE;
360 pList->sBSSIDList[ii].bWEPOn = FALSE;
363 if (ii >= pList->uItem)
368 if (copy_to_user(pReq->data, pList, sizeof(SBSSIDList) + (sList.uItem * sizeof(SBSSIDItem)))) {
376 case WLAN_CMD_GET_MIB:
377 if (copy_to_user(pReq->data, &(pDevice->s802_11Counter), sizeof(SDot11MIBCount))) {
383 case WLAN_CMD_GET_STAT:
384 if (copy_to_user(pReq->data, &(pDevice->scStatistic), sizeof(SStatCounter))) {
389 case WLAN_CMD_STOP_MAC:
391 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_STOP_MAC\n");
392 netif_stop_queue(pDevice->dev);
394 spin_lock_irq(&pDevice->lock);
395 if (pDevice->bRadioOff == FALSE) {
396 CARDbRadioPowerOff(pDevice);
398 pDevice->bLinkPass = FALSE;
399 memset(pMgmt->abyCurrBSSID, 0, 6);
400 pMgmt->eCurrState = WMAC_STATE_IDLE;
401 del_timer(&pDevice->sTimerCommand);
402 del_timer(&pMgmt->sTimerSecondCallback);
403 pDevice->bCmdRunning = FALSE;
404 pDevice->bMACSuspend = TRUE;
405 MACvIntDisable(pDevice->PortOffset);
406 spin_unlock_irq(&pDevice->lock);
410 case WLAN_CMD_START_MAC:
412 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_START_MAC\n");
414 if (pDevice->bMACSuspend == TRUE) {
415 if (pDevice->bRadioOff == TRUE)
416 CARDbRadioPowerOn(pDevice);
417 vMgrTimerInit(pDevice);
418 MACvIntEnable(pDevice->PortOffset, IMR_MASK_VALUE);
419 add_timer(&pMgmt->sTimerSecondCallback);
420 pDevice->bMACSuspend = FALSE;
424 case WLAN_CMD_SET_HOSTAPD:
426 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOSTAPD\n");
428 if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
432 if (sValue.dwValue == 1) {
433 if (hostap_set_hostapd(pDevice, 1, 1) == 0){
434 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable HOSTAP\n");
442 hostap_set_hostapd(pDevice, 0, 1);
443 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable HOSTAP\n");
448 case WLAN_CMD_SET_HOSTAPD_STA:
450 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOSTAPD_STA\n");
453 case WLAN_CMD_SET_802_1X:
455 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_802_1X\n");
456 if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
461 if (sValue.dwValue == 1) {
462 pDevice->bEnable8021x = TRUE;
463 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable 802.1x\n");
466 pDevice->bEnable8021x = FALSE;
467 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable 802.1x\n");
473 case WLAN_CMD_SET_HOST_WEP:
475 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOST_WEP\n");
476 if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
481 if (sValue.dwValue == 1) {
482 pDevice->bEnableHostWEP = TRUE;
483 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable HostWEP\n");
486 pDevice->bEnableHostWEP = FALSE;
487 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable HostWEP\n");
492 case WLAN_CMD_SET_WPA:
493 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_WPA\n");
495 if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
499 if (sValue.dwValue == 1) {
500 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "up wpadev\n");
501 memcpy(pDevice->wpadev->dev_addr, pDevice->dev->dev_addr, U_ETHER_ADDR_LEN);
502 pDevice->bWPADEVUp = TRUE;
505 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "close wpadev\n");
506 pDevice->bWPADEVUp = FALSE;
511 case WLAN_CMD_AP_START:
513 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_AP_START\n");
514 if (pDevice->bRadioOff == TRUE) {
515 CARDbRadioPowerOn(pDevice);
516 vMgrTimerInit(pDevice);
517 MACvIntEnable(pDevice->PortOffset, IMR_MASK_VALUE);
518 add_timer(&pMgmt->sTimerSecondCallback);
520 if (copy_from_user(&sStartAPCmd, pReq->data, sizeof(SCmdStartAP))) {
525 if (sStartAPCmd.wBSSType == AP) {
526 pMgmt->eConfigMode = WMAC_CONFIG_AP;
527 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to AP mode\n");
530 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct BSS type not set to AP mode\n");
536 if (sStartAPCmd.wBBPType == PHY80211g) {
537 pMgmt->byAPBBType = PHY_TYPE_11G;
539 else if (sStartAPCmd.wBBPType == PHY80211a) {
540 pMgmt->byAPBBType = PHY_TYPE_11A;
543 pMgmt->byAPBBType = PHY_TYPE_11B;
546 pItemSSID = (PWLAN_IE_SSID)sStartAPCmd.ssid;
547 memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
548 memcpy(pMgmt->abyDesireSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
550 if ((sStartAPCmd.uChannel > 0)&&(sStartAPCmd.uChannel <= 14))
551 pDevice->uChannel = sStartAPCmd.uChannel;
553 if ((sStartAPCmd.uBeaconInt >= 20) && (sStartAPCmd.uBeaconInt <= 1000))
554 pMgmt->wIBSSBeaconPeriod = sStartAPCmd.uBeaconInt;
556 pMgmt->wIBSSBeaconPeriod = 100;
558 if (sStartAPCmd.bShareKeyAuth == TRUE){
559 pMgmt->bShareKeyAlgorithm = TRUE;
560 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Share Key \n");
563 pMgmt->bShareKeyAlgorithm = FALSE;
564 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Open System \n");
566 memcpy(pMgmt->abyIBSSSuppRates, abySuppRates, 6);
568 if (sStartAPCmd.byBasicRate & BIT3) {
569 pMgmt->abyIBSSSuppRates[2] |= BIT7;
570 pMgmt->abyIBSSSuppRates[3] |= BIT7;
571 pMgmt->abyIBSSSuppRates[4] |= BIT7;
572 pMgmt->abyIBSSSuppRates[5] |= BIT7;
573 }else if (sStartAPCmd.byBasicRate & BIT2) {
574 pMgmt->abyIBSSSuppRates[2] |= BIT7;
575 pMgmt->abyIBSSSuppRates[3] |= BIT7;
576 pMgmt->abyIBSSSuppRates[4] |= BIT7;
577 }else if (sStartAPCmd.byBasicRate & BIT1) {
578 pMgmt->abyIBSSSuppRates[2] |= BIT7;
579 pMgmt->abyIBSSSuppRates[3] |= BIT7;
580 }else if (sStartAPCmd.byBasicRate & BIT1) {
581 pMgmt->abyIBSSSuppRates[2] |= BIT7;
584 pMgmt->abyIBSSSuppRates[2] |= BIT7;
585 pMgmt->abyIBSSSuppRates[3] |= BIT7;
588 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Support Rate= %x %x %x %x\n",
589 pMgmt->abyIBSSSuppRates[2],
590 pMgmt->abyIBSSSuppRates[3],
591 pMgmt->abyIBSSSuppRates[4],
592 pMgmt->abyIBSSSuppRates[5]
595 netif_stop_queue(pDevice->dev);
596 spin_lock_irq(&pDevice->lock);
597 bScheduleCommand((HANDLE)pDevice, WLAN_CMD_RUN_AP, NULL);
598 spin_unlock_irq(&pDevice->lock);
601 case WLAN_CMD_GET_NODE_CNT:
604 pNode = &(pMgmt->sNodeDBTable[0]);
605 for (ii = 0; ii < (MAX_NODE_NUM + 1); ii++) {
606 pNode = &(pMgmt->sNodeDBTable[ii]);
612 sNodeList.uItem = cbListCount;
613 if (copy_to_user(pReq->data, &sNodeList, sizeof(SNodeList))) {
620 case WLAN_CMD_GET_NODE_LIST:
622 if (copy_from_user(&sNodeList, pReq->data, sizeof(SNodeList))) {
626 pNodeList = (PSNodeList)kmalloc(sizeof(SNodeList) + (sNodeList.uItem * sizeof(SNodeItem)), (int)GFP_ATOMIC);
627 if (pNodeList == NULL) {
631 pNodeList->uItem = sNodeList.uItem;
632 pNode = &(pMgmt->sNodeDBTable[0]);
633 for (ii = 0, jj = 0; ii < (MAX_NODE_NUM + 1); ii++) {
634 pNode = &(pMgmt->sNodeDBTable[ii]);
635 if (pNode->bActive) {
636 pNodeList->sNodeList[jj].wAID = pNode->wAID;
637 memcpy(pNodeList->sNodeList[jj].abyMACAddr, pNode->abyMACAddr, WLAN_ADDR_LEN);
638 pNodeList->sNodeList[jj].wTxDataRate = pNode->wTxDataRate;
639 pNodeList->sNodeList[jj].wInActiveCount = (WORD)pNode->uInActiveCount;
640 pNodeList->sNodeList[jj].wEnQueueCnt = (WORD)pNode->wEnQueueCnt;
641 pNodeList->sNodeList[jj].wFlags = (WORD)pNode->dwFlags;
642 pNodeList->sNodeList[jj].bPWBitOn = pNode->bPSEnable;
643 pNodeList->sNodeList[jj].byKeyIndex = pNode->byKeyIndex;
644 pNodeList->sNodeList[jj].wWepKeyLength = pNode->uWepKeyLength;
645 memcpy(&(pNodeList->sNodeList[jj].abyWepKey[0]), &(pNode->abyWepKey[0]), WEP_KEYMAXLEN);
646 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "key= %2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
647 pNodeList->sNodeList[jj].abyWepKey[0],
648 pNodeList->sNodeList[jj].abyWepKey[1],
649 pNodeList->sNodeList[jj].abyWepKey[2],
650 pNodeList->sNodeList[jj].abyWepKey[3],
651 pNodeList->sNodeList[jj].abyWepKey[4]
653 pNodeList->sNodeList[jj].bIsInFallback = pNode->bIsInFallback;
654 pNodeList->sNodeList[jj].uTxFailures = pNode->uTxFailures;
655 pNodeList->sNodeList[jj].uTxAttempts = pNode->uTxAttempts;
656 pNodeList->sNodeList[jj].wFailureRatio = (WORD)pNode->uFailureRatio;
658 if (jj >= pNodeList->uItem)
662 if (copy_to_user(pReq->data, pNodeList, sizeof(SNodeList) + (sNodeList.uItem * sizeof(SNodeItem)))) {
670 #ifdef WPA_SM_Transtatus
672 memset(wpa_Result.ifname,0,sizeof(wpa_Result.ifname));
673 wpa_Result.proto = 0;
674 wpa_Result.key_mgmt = 0;
675 wpa_Result.eap_type = 0;
676 wpa_Result.authenticated = FALSE;
677 pDevice->fWPA_Authened = FALSE;
678 if (copy_from_user(&wpa_Result, pReq->data, sizeof(wpa_Result))) {
683 if(wpa_Result.authenticated==TRUE) {
686 union iwreq_data wrqu;
688 pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID;
690 memset(&wrqu, 0, sizeof(wrqu));
691 wrqu.data.flags = RT_WPACONNECTED_EVENT_FLAG;
692 wrqu.data.length =pItemSSID->len;
693 wireless_send_event(pDevice->dev, IWEVCUSTOM, &wrqu, pItemSSID->abySSID);
696 pDevice->fWPA_Authened = TRUE; //is sucessful peer to wpa_Result.authenticated?
699 //printk("get private wpa_supplicant announce WPA SM\n");
700 //printk("wpa-->ifname=%s\n",wpa_Result.ifname);
701 //printk("wpa-->proto=%d\n",wpa_Result.proto);
702 //printk("wpa-->key-mgmt=%d\n",wpa_Result.key_mgmt);
703 //printk("wpa-->eap_type=%d\n",wpa_Result.eap_type);
704 //printk("wpa-->authenticated is %s\n",(wpa_Result.authenticated==TRUE)?"TRUE":"FALSE");
711 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Private command not support..\n");
729 ZERO_MEMORY(&pDevice->abyWepKey[dwKeyIndex][0], WLAN_WEPMAX_KEYLEN);
730 MEMvCopy(&pDevice->abyWepKey[dwKeyIndex][0], pbyKey, uKeyLength);
732 pDevice->bWepKeyAvailable[dwKeyIndex] = TRUE;
733 pDevice->auWepKeyLength[dwKeyIndex] = uKeyLength;
735 MACvSetDefaultKeyEntry(pDevice->PortOffset, uKeyLength, dwKeyIndex,
736 (PDWORD) &(pDevice->abyWepKey[dwKeyIndex][0]), pDevice->byLocalID);
738 if (pDevice->eEncryptionStatus < Ndis802_11EncryptionNotSupported) {
739 for(ii=0; ii<MAX_GROUP_KEY; ii++) {
740 if ((pDevice->bWepKeyAvailable[ii] == TRUE) &&
741 (pDevice->auWepKeyLength[ii] == WLAN_WEP232_KEYLEN)) {
742 pDevice->uCurrentWEPMode = TX_WEP_SW232;
743 MACvDisableDefaultKey(pDevice->PortOffset);
747 if ((ii == MAX_GROUP_KEY) &&
748 (pDevice->eEncryptionStatus < Ndis802_11EncryptionNotSupported)) {
749 MACvEnableDefaultKey(pDevice->PortOffset, pDevice->byLocalID);