2 * Copyright (c) 1996, 2003 VIA Networking Technologies, Inc.
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
21 * Purpose: private ioctl functions
25 * Date: Auguest 20, 2003
43 /*--------------------- Static Definitions -------------------------*/
45 /*--------------------- Static Classes ----------------------------*/
47 /*--------------------- Static Variables --------------------------*/
48 //static int msglevel =MSG_LEVEL_DEBUG;
49 static int msglevel
=MSG_LEVEL_INFO
;
51 #ifdef WPA_SM_Transtatus
52 SWPAResult wpa_Result
;
55 /*--------------------- Static Functions --------------------------*/
57 /*--------------------- Export Variables --------------------------*/
59 int private_ioctl(PSDevice pDevice
, struct ifreq
*rq
) {
61 PSCmdRequest pReq
= (PSCmdRequest
)rq
;
62 PSMgmtObject pMgmt
= &(pDevice
->sMgmtObj
);
64 PWLAN_IE_SSID pItemSSID
;
66 SCmdZoneTypeSet sZoneTypeCmd
;
68 SCmdStartAP sStartAPCmd
;
79 SCmdLinkStatus sLinkStatus
;
80 BYTE abySuppRates
[] = {WLAN_EID_SUPP_RATES
, 4, 0x02, 0x04, 0x0B, 0x16};
81 BYTE abyNullAddr
[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
83 BYTE abyScanSSID
[WLAN_IEHDR_LEN
+ WLAN_SSID_MAXLEN
+ 1];
88 switch(pReq
->wCmdCode
) {
90 case WLAN_CMD_BSS_SCAN
:
92 if (copy_from_user(&sScanCmd
, pReq
->data
, sizeof(SCmdScan
))) {
97 pItemSSID
= (PWLAN_IE_SSID
)sScanCmd
.ssid
;
98 if (pItemSSID
->len
!= 0) {
99 memset(abyScanSSID
, 0, WLAN_IEHDR_LEN
+ WLAN_SSID_MAXLEN
+ 1);
100 memcpy(abyScanSSID
, pItemSSID
, pItemSSID
->len
+ WLAN_IEHDR_LEN
);
102 spin_lock_irq(&pDevice
->lock
);
104 if (memcmp(pMgmt
->abyCurrBSSID
, &abyNullAddr
[0], 6) == 0)
105 BSSvClearBSSList((void *) pDevice
, FALSE
);
107 BSSvClearBSSList((void *) pDevice
, pDevice
->bLinkPass
);
109 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_BSS_SCAN..begin\n");
111 if (pItemSSID
->len
!= 0)
112 bScheduleCommand((void *) pDevice
,
116 bScheduleCommand((void *) pDevice
, WLAN_CMD_BSSID_SCAN
, NULL
);
118 spin_unlock_irq(&pDevice
->lock
);
121 case WLAN_CMD_ZONETYPE_SET
:
122 //mike add :cann't support.
126 if (copy_from_user(&sZoneTypeCmd
, pReq
->data
, sizeof(SCmdZoneTypeSet
))) {
131 if(sZoneTypeCmd
.bWrite
==TRUE
) {
133 if(sZoneTypeCmd
.ZoneType
== ZoneType_USA
) {
135 printk("set_ZoneType:USA\n");
137 else if(sZoneTypeCmd
.ZoneType
== ZoneType_Japan
) {
139 printk("set_ZoneType:Japan\n");
141 else if(sZoneTypeCmd
.ZoneType
== ZoneType_Europe
) {
143 printk("set_ZoneType:Europe\n");
151 if(zonetype
== 0x00) { //USA
152 sZoneTypeCmd
.ZoneType
= ZoneType_USA
;
154 else if(zonetype
== 0x01) { //Japan
155 sZoneTypeCmd
.ZoneType
= ZoneType_Japan
;
157 else if(zonetype
== 0x02) { //Europe
158 sZoneTypeCmd
.ZoneType
= ZoneType_Europe
;
160 else { //Unknown ZoneType
161 printk("Error:ZoneType[%x] Unknown ???\n",zonetype
);
165 if (copy_to_user(pReq
->data
, &sZoneTypeCmd
, sizeof(SCmdZoneTypeSet
))) {
173 case WLAN_CMD_BSS_JOIN
:
175 if (copy_from_user(&sJoinCmd
, pReq
->data
, sizeof(SCmdBSSJoin
))) {
180 pItemSSID
= (PWLAN_IE_SSID
)sJoinCmd
.ssid
;
181 memset(pMgmt
->abyDesireSSID
, 0, WLAN_IEHDR_LEN
+ WLAN_SSID_MAXLEN
+ 1);
182 memcpy(pMgmt
->abyDesireSSID
, pItemSSID
, pItemSSID
->len
+ WLAN_IEHDR_LEN
);
183 if (sJoinCmd
.wBSSType
== ADHOC
) {
184 pMgmt
->eConfigMode
= WMAC_CONFIG_IBSS_STA
;
185 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"ioct set to adhoc mode\n");
188 pMgmt
->eConfigMode
= WMAC_CONFIG_ESS_STA
;
189 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"ioct set to STA mode\n");
191 if (sJoinCmd
.bPSEnable
== TRUE
) {
192 pDevice
->ePSMode
= WMAC_POWER_FAST
;
193 // pDevice->ePSMode = WMAC_POWER_MAX;
194 pMgmt
->wListenInterval
= 2;
195 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Power Saving On\n");
198 pDevice
->ePSMode
= WMAC_POWER_CAM
;
199 pMgmt
->wListenInterval
= 1;
200 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Power Saving Off \n");
203 if (sJoinCmd
.bShareKeyAuth
== TRUE
){
204 pMgmt
->bShareKeyAlgorithm
= TRUE
;
205 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Share Key \n");
208 pMgmt
->bShareKeyAlgorithm
= FALSE
;
209 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Open System \n");
211 pDevice
->uChannel
= sJoinCmd
.uChannel
;
212 netif_stop_queue(pDevice
->dev
);
213 spin_lock_irq(&pDevice
->lock
);
214 pMgmt
->eCurrState
= WMAC_STATE_IDLE
;
215 bScheduleCommand((void *) pDevice
,
217 pMgmt
->abyDesireSSID
);
218 bScheduleCommand((void *) pDevice
, WLAN_CMD_SSID
, NULL
);
219 spin_unlock_irq(&pDevice
->lock
);
222 case WLAN_CMD_SET_WEP
:
223 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_WEP Key. \n");
224 memset(&sWEPCmd
, 0 ,sizeof(SCmdSetWEP
));
225 if (copy_from_user(&sWEPCmd
, pReq
->data
, sizeof(SCmdSetWEP
))) {
229 if (sWEPCmd
.bEnableWep
!= TRUE
) {
232 pDevice
->bEncryptionEnable
= FALSE
;
233 pDevice
->eEncryptionStatus
= Ndis802_11EncryptionDisabled
;
234 spin_lock_irq(&pDevice
->lock
);
235 for(uu
=0;uu
<MAX_KEY_TABLE
;uu
++)
236 MACvDisableKeyEntry(pDevice
,uu
);
237 spin_unlock_irq(&pDevice
->lock
);
238 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WEP function disable. \n");
242 for (ii
= 0; ii
< WLAN_WEP_NKEYS
; ii
++) {
243 if (sWEPCmd
.bWepKeyAvailable
[ii
]) {
244 if (ii
== sWEPCmd
.byKeyIndex
)
245 //2006-1207-01<Modify>by Einsn Liu
246 // dwKeyIndex|= (1 << 31);
247 dwKeyIndex
=ii
|(1 << 31);
250 spin_lock_irq(&pDevice
->lock
);
251 KeybSetDefaultKey( pDevice
,
254 sWEPCmd
.auWepKeyLength
[ii
],
256 (PBYTE
)&sWEPCmd
.abyWepKey
[ii
][0],
259 spin_unlock_irq(&pDevice
->lock
);
263 pDevice
->byKeyIndex
= sWEPCmd
.byKeyIndex
;
264 pDevice
->bTransmitKey
= TRUE
;
265 pDevice
->bEncryptionEnable
= TRUE
;
266 pDevice
->eEncryptionStatus
= Ndis802_11Encryption1Enabled
;
270 case WLAN_CMD_GET_LINK
:
271 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_GET_LINK status. \n");
273 memset(sLinkStatus
.abySSID
, 0 , WLAN_SSID_MAXLEN
+ 1);
275 if (pMgmt
->eCurrMode
== WMAC_MODE_IBSS_STA
)
276 sLinkStatus
.wBSSType
= ADHOC
;
278 sLinkStatus
.wBSSType
= INFRA
;
280 if (pMgmt
->eCurrState
== WMAC_STATE_JOINTED
)
281 sLinkStatus
.byState
= ADHOC_JOINTED
;
283 sLinkStatus
.byState
= ADHOC_STARTED
;
285 sLinkStatus
.uChannel
= pMgmt
->uCurrChannel
;
286 if (pDevice
->bLinkPass
== TRUE
) {
287 sLinkStatus
.bLink
= TRUE
;
288 pItemSSID
= (PWLAN_IE_SSID
)pMgmt
->abyCurrSSID
;
289 memcpy(sLinkStatus
.abySSID
, pItemSSID
->abySSID
, pItemSSID
->len
);
290 memcpy(sLinkStatus
.abyBSSID
, pMgmt
->abyCurrBSSID
, WLAN_BSSID_LEN
);
291 sLinkStatus
.uLinkRate
= pMgmt
->sNodeDBTable
[0].wTxDataRate
;
292 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
" Link Success ! \n");
295 sLinkStatus
.bLink
= FALSE
;
297 if (copy_to_user(pReq
->data
, &sLinkStatus
, sizeof(SCmdLinkStatus
))) {
304 case WLAN_CMD_GET_LISTLEN
:
306 pBSS
= &(pMgmt
->sBSSList
[0]);
307 for (ii
= 0; ii
< MAX_BSS_NUM
; ii
++) {
308 pBSS
= &(pMgmt
->sBSSList
[ii
]);
313 sList
.uItem
= cbListCount
;
314 if (copy_to_user(pReq
->data
, &sList
, sizeof(SBSSIDList
))) {
321 case WLAN_CMD_GET_LIST
:
322 if (copy_from_user(&sList
, pReq
->data
, sizeof(SBSSIDList
))) {
326 pList
= (PSBSSIDList
)kmalloc(sizeof(SBSSIDList
) + (sList
.uItem
* sizeof(SBSSIDItem
)), (int)GFP_ATOMIC
);
331 pList
->uItem
= sList
.uItem
;
332 pBSS
= &(pMgmt
->sBSSList
[0]);
333 for (ii
= 0, jj
= 0; jj
< MAX_BSS_NUM
; jj
++) {
334 pBSS
= &(pMgmt
->sBSSList
[jj
]);
336 pList
->sBSSIDList
[ii
].uChannel
= pBSS
->uChannel
;
337 pList
->sBSSIDList
[ii
].wBeaconInterval
= pBSS
->wBeaconInterval
;
338 pList
->sBSSIDList
[ii
].wCapInfo
= pBSS
->wCapInfo
;
339 RFvRSSITodBm(pDevice
, (BYTE
)(pBSS
->uRSSI
), &ldBm
);
340 pList
->sBSSIDList
[ii
].uRSSI
= (UINT
)ldBm
;
341 // pList->sBSSIDList[ii].uRSSI = pBSS->uRSSI;
342 memcpy(pList
->sBSSIDList
[ii
].abyBSSID
, pBSS
->abyBSSID
, WLAN_BSSID_LEN
);
343 pItemSSID
= (PWLAN_IE_SSID
)pBSS
->abySSID
;
344 memset(pList
->sBSSIDList
[ii
].abySSID
, 0, WLAN_SSID_MAXLEN
+ 1);
345 memcpy(pList
->sBSSIDList
[ii
].abySSID
, pItemSSID
->abySSID
, pItemSSID
->len
);
346 if (WLAN_GET_CAP_INFO_ESS(pBSS
->wCapInfo
)) {
347 pList
->sBSSIDList
[ii
].byNetType
= INFRA
;
350 pList
->sBSSIDList
[ii
].byNetType
= ADHOC
;
352 if (WLAN_GET_CAP_INFO_PRIVACY(pBSS
->wCapInfo
)) {
353 pList
->sBSSIDList
[ii
].bWEPOn
= TRUE
;
356 pList
->sBSSIDList
[ii
].bWEPOn
= FALSE
;
359 if (ii
>= pList
->uItem
)
364 if (copy_to_user(pReq
->data
, pList
, sizeof(SBSSIDList
) + (sList
.uItem
* sizeof(SBSSIDItem
)))) {
372 case WLAN_CMD_GET_MIB
:
373 if (copy_to_user(pReq
->data
, &(pDevice
->s802_11Counter
), sizeof(SDot11MIBCount
))) {
379 case WLAN_CMD_GET_STAT
:
380 if (copy_to_user(pReq
->data
, &(pDevice
->scStatistic
), sizeof(SStatCounter
))) {
385 case WLAN_CMD_STOP_MAC
:
387 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_STOP_MAC\n");
389 netif_stop_queue(pDevice
->dev
);
390 spin_lock_irq(&pDevice
->lock
);
391 if (pDevice
->bRadioOff
== FALSE
) {
392 CARDbRadioPowerOff(pDevice
);
394 pDevice
->bLinkPass
= FALSE
;
395 ControlvMaskByte(pDevice
,MESSAGE_REQUEST_MACREG
,MAC_REG_PAPEDELAY
,LEDSTS_STS
,LEDSTS_SLOW
);
396 memset(pMgmt
->abyCurrBSSID
, 0, 6);
397 pMgmt
->eCurrState
= WMAC_STATE_IDLE
;
398 // del_timer(&pDevice->sTimerCommand);
399 // del_timer(&pMgmt->sTimerSecondCallback);
400 pDevice
->bCmdRunning
= FALSE
;
401 spin_unlock_irq(&pDevice
->lock
);
405 case WLAN_CMD_START_MAC
:
407 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_START_MAC\n");
409 if (pDevice
->bRadioOff
== TRUE
)
410 CARDbRadioPowerOn(pDevice
);
413 case WLAN_CMD_SET_HOSTAPD
:
415 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_HOSTAPD\n");
417 if (copy_from_user(&sValue
, pReq
->data
, sizeof(SCmdValue
))) {
421 if (sValue
.dwValue
== 1) {
422 if (vt6656_hostap_set_hostapd(pDevice
, 1, 1) == 0){
423 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Enable HOSTAP\n");
431 vt6656_hostap_set_hostapd(pDevice
, 0, 1);
432 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Disable HOSTAP\n");
437 case WLAN_CMD_SET_HOSTAPD_STA
:
439 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_HOSTAPD_STA\n");
442 case WLAN_CMD_SET_802_1X
:
444 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_802_1X\n");
445 if (copy_from_user(&sValue
, pReq
->data
, sizeof(SCmdValue
))) {
450 if (sValue
.dwValue
== 1) {
451 pDevice
->bEnable8021x
= TRUE
;
452 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Enable 802.1x\n");
455 pDevice
->bEnable8021x
= FALSE
;
456 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Disable 802.1x\n");
462 case WLAN_CMD_SET_HOST_WEP
:
464 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_HOST_WEP\n");
465 if (copy_from_user(&sValue
, pReq
->data
, sizeof(SCmdValue
))) {
470 if (sValue
.dwValue
== 1) {
471 pDevice
->bEnableHostWEP
= TRUE
;
472 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Enable HostWEP\n");
475 pDevice
->bEnableHostWEP
= FALSE
;
476 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Disable HostWEP\n");
481 case WLAN_CMD_SET_WPA
:
482 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_WPA\n");
484 if (copy_from_user(&sValue
, pReq
->data
, sizeof(SCmdValue
))) {
488 if (sValue
.dwValue
== 1) {
489 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"up wpadev\n");
490 memcpy(pDevice
->wpadev
->dev_addr
,
491 pDevice
->dev
->dev_addr
,
493 pDevice
->bWPADEVUp
= TRUE
;
496 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"close wpadev\n");
497 pDevice
->bWPADEVUp
= FALSE
;
502 case WLAN_CMD_AP_START
:
504 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_AP_START\n");
505 if (pDevice
->bRadioOff
== TRUE
) {
506 CARDbRadioPowerOn(pDevice
);
507 add_timer(&pMgmt
->sTimerSecondCallback
);
509 if (copy_from_user(&sStartAPCmd
, pReq
->data
, sizeof(SCmdStartAP
))) {
514 if (sStartAPCmd
.wBSSType
== AP
) {
515 pMgmt
->eConfigMode
= WMAC_CONFIG_AP
;
516 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"ioct set to AP mode\n");
519 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"ioct BSS type not set to AP mode\n");
525 if (sStartAPCmd
.wBBPType
== PHY80211g
) {
526 pMgmt
->byAPBBType
= PHY_TYPE_11G
;
528 else if (sStartAPCmd
.wBBPType
== PHY80211a
) {
529 pMgmt
->byAPBBType
= PHY_TYPE_11A
;
532 pMgmt
->byAPBBType
= PHY_TYPE_11B
;
535 pItemSSID
= (PWLAN_IE_SSID
)sStartAPCmd
.ssid
;
536 memset(pMgmt
->abyDesireSSID
, 0, WLAN_IEHDR_LEN
+ WLAN_SSID_MAXLEN
+ 1);
537 memcpy(pMgmt
->abyDesireSSID
, pItemSSID
, pItemSSID
->len
+ WLAN_IEHDR_LEN
);
539 if ((sStartAPCmd
.uChannel
> 0)&&(sStartAPCmd
.uChannel
<= 14))
540 pDevice
->uChannel
= sStartAPCmd
.uChannel
;
542 if ((sStartAPCmd
.uBeaconInt
>= 20) && (sStartAPCmd
.uBeaconInt
<= 1000))
543 pMgmt
->wIBSSBeaconPeriod
= sStartAPCmd
.uBeaconInt
;
545 pMgmt
->wIBSSBeaconPeriod
= 100;
547 if (sStartAPCmd
.bShareKeyAuth
== TRUE
){
548 pMgmt
->bShareKeyAlgorithm
= TRUE
;
549 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Share Key \n");
552 pMgmt
->bShareKeyAlgorithm
= FALSE
;
553 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Open System \n");
555 memcpy(pMgmt
->abyIBSSSuppRates
, abySuppRates
, 6);
557 if (sStartAPCmd
.byBasicRate
& BIT3
) {
558 pMgmt
->abyIBSSSuppRates
[2] |= BIT7
;
559 pMgmt
->abyIBSSSuppRates
[3] |= BIT7
;
560 pMgmt
->abyIBSSSuppRates
[4] |= BIT7
;
561 pMgmt
->abyIBSSSuppRates
[5] |= BIT7
;
562 }else if (sStartAPCmd
.byBasicRate
& BIT2
) {
563 pMgmt
->abyIBSSSuppRates
[2] |= BIT7
;
564 pMgmt
->abyIBSSSuppRates
[3] |= BIT7
;
565 pMgmt
->abyIBSSSuppRates
[4] |= BIT7
;
566 }else if (sStartAPCmd
.byBasicRate
& BIT1
) {
567 pMgmt
->abyIBSSSuppRates
[2] |= BIT7
;
568 pMgmt
->abyIBSSSuppRates
[3] |= BIT7
;
569 }else if (sStartAPCmd
.byBasicRate
& BIT1
) {
570 pMgmt
->abyIBSSSuppRates
[2] |= BIT7
;
573 pMgmt
->abyIBSSSuppRates
[2] |= BIT7
;
574 pMgmt
->abyIBSSSuppRates
[3] |= BIT7
;
577 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Support Rate= %x %x %x %x\n",
578 pMgmt
->abyIBSSSuppRates
[2],
579 pMgmt
->abyIBSSSuppRates
[3],
580 pMgmt
->abyIBSSSuppRates
[4],
581 pMgmt
->abyIBSSSuppRates
[5]
584 netif_stop_queue(pDevice
->dev
);
585 spin_lock_irq(&pDevice
->lock
);
586 bScheduleCommand((void *) pDevice
, WLAN_CMD_RUN_AP
, NULL
);
587 spin_unlock_irq(&pDevice
->lock
);
590 case WLAN_CMD_GET_NODE_CNT
:
593 pNode
= &(pMgmt
->sNodeDBTable
[0]);
594 for (ii
= 0; ii
< (MAX_NODE_NUM
+ 1); ii
++) {
595 pNode
= &(pMgmt
->sNodeDBTable
[ii
]);
601 sNodeList
.uItem
= cbListCount
;
602 if (copy_to_user(pReq
->data
, &sNodeList
, sizeof(SNodeList
))) {
609 case WLAN_CMD_GET_NODE_LIST
:
611 if (copy_from_user(&sNodeList
, pReq
->data
, sizeof(SNodeList
))) {
615 pNodeList
= (PSNodeList
)kmalloc(sizeof(SNodeList
) + (sNodeList
.uItem
* sizeof(SNodeItem
)), (int)GFP_ATOMIC
);
616 if (pNodeList
== NULL
) {
620 pNodeList
->uItem
= sNodeList
.uItem
;
621 pNode
= &(pMgmt
->sNodeDBTable
[0]);
622 for (ii
= 0, jj
= 0; ii
< (MAX_NODE_NUM
+ 1); ii
++) {
623 pNode
= &(pMgmt
->sNodeDBTable
[ii
]);
624 if (pNode
->bActive
) {
625 pNodeList
->sNodeList
[jj
].wAID
= pNode
->wAID
;
626 memcpy(pNodeList
->sNodeList
[jj
].abyMACAddr
, pNode
->abyMACAddr
, WLAN_ADDR_LEN
);
627 pNodeList
->sNodeList
[jj
].wTxDataRate
= pNode
->wTxDataRate
;
628 pNodeList
->sNodeList
[jj
].wInActiveCount
= (WORD
)pNode
->uInActiveCount
;
629 pNodeList
->sNodeList
[jj
].wEnQueueCnt
= (WORD
)pNode
->wEnQueueCnt
;
630 pNodeList
->sNodeList
[jj
].wFlags
= (WORD
)pNode
->dwFlags
;
631 pNodeList
->sNodeList
[jj
].bPWBitOn
= pNode
->bPSEnable
;
632 pNodeList
->sNodeList
[jj
].byKeyIndex
= pNode
->byKeyIndex
;
633 pNodeList
->sNodeList
[jj
].wWepKeyLength
= pNode
->uWepKeyLength
;
634 memcpy(&(pNodeList
->sNodeList
[jj
].abyWepKey
[0]), &(pNode
->abyWepKey
[0]), WEP_KEYMAXLEN
);
635 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"key= %2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
636 pNodeList
->sNodeList
[jj
].abyWepKey
[0],
637 pNodeList
->sNodeList
[jj
].abyWepKey
[1],
638 pNodeList
->sNodeList
[jj
].abyWepKey
[2],
639 pNodeList
->sNodeList
[jj
].abyWepKey
[3],
640 pNodeList
->sNodeList
[jj
].abyWepKey
[4]
642 pNodeList
->sNodeList
[jj
].bIsInFallback
= pNode
->bIsInFallback
;
643 pNodeList
->sNodeList
[jj
].uTxFailures
= pNode
->uTxFailures
;
644 pNodeList
->sNodeList
[jj
].uTxAttempts
= pNode
->uTxAttempts
;
645 pNodeList
->sNodeList
[jj
].wFailureRatio
= (WORD
)pNode
->uFailureRatio
;
647 if (jj
>= pNodeList
->uItem
)
651 if (copy_to_user(pReq
->data
, pNodeList
, sizeof(SNodeList
) + (sNodeList
.uItem
* sizeof(SNodeItem
)))) {
659 #ifdef WPA_SM_Transtatus
661 memset(wpa_Result
.ifname
,0,sizeof(wpa_Result
.ifname
));
662 wpa_Result
.proto
= 0;
663 wpa_Result
.key_mgmt
= 0;
664 wpa_Result
.eap_type
= 0;
665 wpa_Result
.authenticated
= FALSE
;
666 pDevice
->fWPA_Authened
= FALSE
;
667 if (copy_from_user(&wpa_Result
, pReq
->data
, sizeof(wpa_Result
))) {
671 //DavidWang for some AP maybe good authenticate
672 if(wpa_Result
.key_mgmt
==0x20)
673 pMgmt
->Cisco_cckm
=1;
675 pMgmt
->Cisco_cckm
=0;
678 if(wpa_Result
.authenticated
==TRUE
) {
681 union iwreq_data wrqu
;
683 pItemSSID
= (PWLAN_IE_SSID
)pMgmt
->abyCurrSSID
;
685 memset(&wrqu
, 0, sizeof(wrqu
));
686 wrqu
.data
.flags
= RT_WPACONNECTED_EVENT_FLAG
;
687 wrqu
.data
.length
=pItemSSID
->len
;
688 wireless_send_event(pDevice
->dev
, IWEVCUSTOM
, &wrqu
, pItemSSID
->abySSID
);
691 pDevice
->fWPA_Authened
= TRUE
; //is successful peer to wpa_Result.authenticated?
694 //printk("get private wpa_supplicant announce WPA SM\n");
695 //printk("wpa-->ifname=%s\n",wpa_Result.ifname);
696 //printk("wpa-->proto=%d\n",wpa_Result.proto);
697 //printk("wpa-->key-mgmt=%d\n",wpa_Result.key_mgmt);
698 //printk("wpa-->eap_type=%d\n",wpa_Result.eap_type);
699 //printk("wpa-->authenticated is %s\n",(wpa_Result.authenticated==TRUE)?"TRUE":"FALSE");
706 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Private command not support..\n");