]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blob - drivers/staging/rtl8188eu/os_dep/ioctl_linux.c
pinctrl: sirf: move sgpio lock into state container
[mirror_ubuntu-zesty-kernel.git] / drivers / staging / rtl8188eu / os_dep / ioctl_linux.c
1 /******************************************************************************
2 *
3 * Copyright(c) 2007 - 2012 Realtek Corporation. All rights reserved.
4 *
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of version 2 of the GNU General Public License as
7 * published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
12 * more details.
13 *
14 * You should have received a copy of the GNU General Public License along with
15 * this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
17 *
18 *
19 ******************************************************************************/
20 #define _IOCTL_LINUX_C_
21
22 #include <osdep_service.h>
23 #include <drv_types.h>
24 #include <wlan_bssdef.h>
25 #include <rtw_debug.h>
26 #include <wifi.h>
27 #include <rtw_mlme.h>
28 #include <rtw_mlme_ext.h>
29 #include <rtw_ioctl.h>
30 #include <rtw_ioctl_set.h>
31 #include <rtl8188e_hal.h>
32
33 #include <rtw_iol.h>
34 #include <linux/vmalloc.h>
35 #include "osdep_intf.h"
36
37 #define RTL_IOCTL_WPA_SUPPLICANT (SIOCIWFIRSTPRIV + 30)
38
39 #define SCAN_ITEM_SIZE 768
40 #define MAX_CUSTOM_LEN 64
41 #define RATE_COUNT 4
42
43 /* combo scan */
44 #define WEXT_CSCAN_AMOUNT 9
45 #define WEXT_CSCAN_BUF_LEN 360
46 #define WEXT_CSCAN_HEADER "CSCAN S\x01\x00\x00S\x00"
47 #define WEXT_CSCAN_HEADER_SIZE 12
48 #define WEXT_CSCAN_SSID_SECTION 'S'
49 #define WEXT_CSCAN_CHANNEL_SECTION 'C'
50 #define WEXT_CSCAN_NPROBE_SECTION 'N'
51 #define WEXT_CSCAN_ACTV_DWELL_SECTION 'A'
52 #define WEXT_CSCAN_PASV_DWELL_SECTION 'P'
53 #define WEXT_CSCAN_HOME_DWELL_SECTION 'H'
54 #define WEXT_CSCAN_TYPE_SECTION 'T'
55
56 static u32 rtw_rates[] = {1000000, 2000000, 5500000, 11000000,
57 6000000, 9000000, 12000000, 18000000, 24000000, 36000000,
58 48000000, 54000000};
59
60 static const char * const iw_operation_mode[] = {
61 "Auto", "Ad-Hoc", "Managed", "Master", "Repeater",
62 "Secondary", "Monitor"
63 };
64
65 void indicate_wx_scan_complete_event(struct adapter *padapter)
66 {
67 union iwreq_data wrqu;
68
69 memset(&wrqu, 0, sizeof(union iwreq_data));
70 wireless_send_event(padapter->pnetdev, SIOCGIWSCAN, &wrqu, NULL);
71 }
72
73 void rtw_indicate_wx_assoc_event(struct adapter *padapter)
74 {
75 union iwreq_data wrqu;
76 struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
77
78 memset(&wrqu, 0, sizeof(union iwreq_data));
79
80 wrqu.ap_addr.sa_family = ARPHRD_ETHER;
81
82 memcpy(wrqu.ap_addr.sa_data, pmlmepriv->cur_network.network.MacAddress, ETH_ALEN);
83
84 DBG_88E_LEVEL(_drv_always_, "assoc success\n");
85 wireless_send_event(padapter->pnetdev, SIOCGIWAP, &wrqu, NULL);
86 }
87
88 void rtw_indicate_wx_disassoc_event(struct adapter *padapter)
89 {
90 union iwreq_data wrqu;
91
92 memset(&wrqu, 0, sizeof(union iwreq_data));
93
94 wrqu.ap_addr.sa_family = ARPHRD_ETHER;
95 memset(wrqu.ap_addr.sa_data, 0, ETH_ALEN);
96
97 DBG_88E_LEVEL(_drv_always_, "indicate disassoc\n");
98 wireless_send_event(padapter->pnetdev, SIOCGIWAP, &wrqu, NULL);
99 }
100
101 static char *translate_scan(struct adapter *padapter,
102 struct iw_request_info *info,
103 struct wlan_network *pnetwork,
104 char *start, char *stop)
105 {
106 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
107 struct iw_event iwe;
108 u16 cap;
109 __le16 le_tmp;
110 u32 ht_ielen = 0;
111 char custom[MAX_CUSTOM_LEN];
112 char *p;
113 u16 max_rate = 0, rate, ht_cap = false;
114 u32 i = 0;
115 u8 bw_40MHz = 0, short_GI = 0;
116 u16 mcs_rate = 0;
117 u8 ss, sq;
118
119 /* AP MAC address */
120 iwe.cmd = SIOCGIWAP;
121 iwe.u.ap_addr.sa_family = ARPHRD_ETHER;
122
123 memcpy(iwe.u.ap_addr.sa_data, pnetwork->network.MacAddress, ETH_ALEN);
124 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_ADDR_LEN);
125
126 /* Add the ESSID */
127 iwe.cmd = SIOCGIWESSID;
128 iwe.u.data.flags = 1;
129 iwe.u.data.length = min_t(u16, pnetwork->network.Ssid.SsidLength, 32);
130 start = iwe_stream_add_point(info, start, stop, &iwe, pnetwork->network.Ssid.Ssid);
131
132 /* parsing HT_CAP_IE */
133 p = rtw_get_ie(&pnetwork->network.IEs[12], _HT_CAPABILITY_IE_, &ht_ielen, pnetwork->network.IELength-12);
134
135 if (p && ht_ielen > 0) {
136 struct rtw_ieee80211_ht_cap *pht_capie;
137 ht_cap = true;
138 pht_capie = (struct rtw_ieee80211_ht_cap *)(p+2);
139 memcpy(&mcs_rate, pht_capie->supp_mcs_set, 2);
140 bw_40MHz = (pht_capie->cap_info&IEEE80211_HT_CAP_SUP_WIDTH) ? 1 : 0;
141 short_GI = (pht_capie->cap_info&(IEEE80211_HT_CAP_SGI_20|IEEE80211_HT_CAP_SGI_40)) ? 1 : 0;
142 }
143
144 /* Add the protocol name */
145 iwe.cmd = SIOCGIWNAME;
146 if ((rtw_is_cckratesonly_included((u8 *)&pnetwork->network.SupportedRates))) {
147 if (ht_cap)
148 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bn");
149 else
150 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11b");
151 } else if ((rtw_is_cckrates_included((u8 *)&pnetwork->network.SupportedRates))) {
152 if (ht_cap)
153 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bgn");
154 else
155 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bg");
156 } else {
157 if (pnetwork->network.Configuration.DSConfig > 14) {
158 if (ht_cap)
159 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11an");
160 else
161 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11a");
162 } else {
163 if (ht_cap)
164 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11gn");
165 else
166 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11g");
167 }
168 }
169
170 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_CHAR_LEN);
171
172 /* Add mode */
173 iwe.cmd = SIOCGIWMODE;
174 memcpy(&le_tmp, rtw_get_capability_from_ie(pnetwork->network.IEs), 2);
175
176 cap = le16_to_cpu(le_tmp);
177
178 if (cap & (WLAN_CAPABILITY_IBSS | WLAN_CAPABILITY_BSS)) {
179 if (cap & WLAN_CAPABILITY_BSS)
180 iwe.u.mode = IW_MODE_MASTER;
181 else
182 iwe.u.mode = IW_MODE_ADHOC;
183
184 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_UINT_LEN);
185 }
186
187 if (pnetwork->network.Configuration.DSConfig < 1)
188 pnetwork->network.Configuration.DSConfig = 1;
189
190 /* Add frequency/channel */
191 iwe.cmd = SIOCGIWFREQ;
192 iwe.u.freq.m = rtw_ch2freq(pnetwork->network.Configuration.DSConfig) * 100000;
193 iwe.u.freq.e = 1;
194 iwe.u.freq.i = pnetwork->network.Configuration.DSConfig;
195 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_FREQ_LEN);
196
197 /* Add encryption capability */
198 iwe.cmd = SIOCGIWENCODE;
199 if (cap & WLAN_CAPABILITY_PRIVACY)
200 iwe.u.data.flags = IW_ENCODE_ENABLED | IW_ENCODE_NOKEY;
201 else
202 iwe.u.data.flags = IW_ENCODE_DISABLED;
203 iwe.u.data.length = 0;
204 start = iwe_stream_add_point(info, start, stop, &iwe, pnetwork->network.Ssid.Ssid);
205
206 /*Add basic and extended rates */
207 max_rate = 0;
208 p = custom;
209 p += snprintf(p, MAX_CUSTOM_LEN - (p - custom), " Rates (Mb/s): ");
210 while (pnetwork->network.SupportedRates[i] != 0) {
211 rate = pnetwork->network.SupportedRates[i]&0x7F;
212 if (rate > max_rate)
213 max_rate = rate;
214 p += snprintf(p, MAX_CUSTOM_LEN - (p - custom),
215 "%d%s ", rate >> 1, (rate & 1) ? ".5" : "");
216 i++;
217 }
218
219 if (ht_cap) {
220 if (mcs_rate&0x8000)/* MCS15 */
221 max_rate = (bw_40MHz) ? ((short_GI) ? 300 : 270) : ((short_GI) ? 144 : 130);
222 else if (mcs_rate&0x0080)/* MCS7 */
223 ;
224 else/* default MCS7 */
225 max_rate = (bw_40MHz) ? ((short_GI) ? 150 : 135) : ((short_GI) ? 72 : 65);
226
227 max_rate = max_rate*2;/* Mbps/2; */
228 }
229
230 iwe.cmd = SIOCGIWRATE;
231 iwe.u.bitrate.fixed = 0;
232 iwe.u.bitrate.disabled = 0;
233 iwe.u.bitrate.value = max_rate * 500000;
234 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_PARAM_LEN);
235
236 /* parsing WPA/WPA2 IE */
237 {
238 u8 buf[MAX_WPA_IE_LEN];
239 u8 wpa_ie[255], rsn_ie[255];
240 u16 wpa_len = 0, rsn_len = 0;
241 u8 *p;
242
243 rtw_get_sec_ie(pnetwork->network.IEs, pnetwork->network.IELength, rsn_ie, &rsn_len, wpa_ie, &wpa_len);
244 RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_scan: ssid =%s\n", pnetwork->network.Ssid.Ssid));
245 RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_scan: wpa_len =%d rsn_len =%d\n", wpa_len, rsn_len));
246
247 if (wpa_len > 0) {
248 p = buf;
249 memset(buf, 0, MAX_WPA_IE_LEN);
250 p += sprintf(p, "wpa_ie=");
251 for (i = 0; i < wpa_len; i++)
252 p += sprintf(p, "%02x", wpa_ie[i]);
253
254 memset(&iwe, 0, sizeof(iwe));
255 iwe.cmd = IWEVCUSTOM;
256 iwe.u.data.length = strlen(buf);
257 start = iwe_stream_add_point(info, start, stop, &iwe, buf);
258
259 memset(&iwe, 0, sizeof(iwe));
260 iwe.cmd = IWEVGENIE;
261 iwe.u.data.length = wpa_len;
262 start = iwe_stream_add_point(info, start, stop, &iwe, wpa_ie);
263 }
264 if (rsn_len > 0) {
265 p = buf;
266 memset(buf, 0, MAX_WPA_IE_LEN);
267 p += sprintf(p, "rsn_ie=");
268 for (i = 0; i < rsn_len; i++)
269 p += sprintf(p, "%02x", rsn_ie[i]);
270 memset(&iwe, 0, sizeof(iwe));
271 iwe.cmd = IWEVCUSTOM;
272 iwe.u.data.length = strlen(buf);
273 start = iwe_stream_add_point(info, start, stop, &iwe, buf);
274
275 memset(&iwe, 0, sizeof(iwe));
276 iwe.cmd = IWEVGENIE;
277 iwe.u.data.length = rsn_len;
278 start = iwe_stream_add_point(info, start, stop, &iwe, rsn_ie);
279 }
280 }
281
282 {/* parsing WPS IE */
283 uint cnt = 0, total_ielen;
284 u8 *wpsie_ptr = NULL;
285 uint wps_ielen = 0;
286
287 u8 *ie_ptr = pnetwork->network.IEs + _FIXED_IE_LENGTH_;
288 total_ielen = pnetwork->network.IELength - _FIXED_IE_LENGTH_;
289
290 while (cnt < total_ielen) {
291 if (rtw_is_wps_ie(&ie_ptr[cnt], &wps_ielen) && (wps_ielen > 2)) {
292 wpsie_ptr = &ie_ptr[cnt];
293 iwe.cmd = IWEVGENIE;
294 iwe.u.data.length = (u16)wps_ielen;
295 start = iwe_stream_add_point(info, start, stop, &iwe, wpsie_ptr);
296 }
297 cnt += ie_ptr[cnt+1]+2; /* goto next */
298 }
299 }
300
301 /* Add quality statistics */
302 iwe.cmd = IWEVQUAL;
303 iwe.u.qual.updated = IW_QUAL_QUAL_UPDATED | IW_QUAL_LEVEL_UPDATED | IW_QUAL_NOISE_INVALID;
304
305 if (check_fwstate(pmlmepriv, _FW_LINKED) == true &&
306 is_same_network(&pmlmepriv->cur_network.network, &pnetwork->network)) {
307 ss = padapter->recvpriv.signal_strength;
308 sq = padapter->recvpriv.signal_qual;
309 } else {
310 ss = pnetwork->network.PhyInfo.SignalStrength;
311 sq = pnetwork->network.PhyInfo.SignalQuality;
312 }
313
314 iwe.u.qual.level = (u8)ss;
315 iwe.u.qual.qual = (u8)sq; /* signal quality */
316 iwe.u.qual.noise = 0; /* noise level */
317 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_QUAL_LEN);
318 return start;
319 }
320
321 static int wpa_set_auth_algs(struct net_device *dev, u32 value)
322 {
323 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
324 int ret = 0;
325
326 if ((value & AUTH_ALG_SHARED_KEY) && (value & AUTH_ALG_OPEN_SYSTEM)) {
327 DBG_88E("wpa_set_auth_algs, AUTH_ALG_SHARED_KEY and AUTH_ALG_OPEN_SYSTEM [value:0x%x]\n", value);
328 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
329 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeAutoSwitch;
330 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Auto;
331 } else if (value & AUTH_ALG_SHARED_KEY) {
332 DBG_88E("wpa_set_auth_algs, AUTH_ALG_SHARED_KEY [value:0x%x]\n", value);
333 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
334
335 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeShared;
336 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Shared;
337 } else if (value & AUTH_ALG_OPEN_SYSTEM) {
338 DBG_88E("wpa_set_auth_algs, AUTH_ALG_OPEN_SYSTEM\n");
339 if (padapter->securitypriv.ndisauthtype < Ndis802_11AuthModeWPAPSK) {
340 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeOpen;
341 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open;
342 }
343 } else if (value & AUTH_ALG_LEAP) {
344 DBG_88E("wpa_set_auth_algs, AUTH_ALG_LEAP\n");
345 } else {
346 DBG_88E("wpa_set_auth_algs, error!\n");
347 ret = -EINVAL;
348 }
349 return ret;
350 }
351
352 static int wpa_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len)
353 {
354 int ret = 0;
355 u32 wep_key_idx, wep_key_len, wep_total_len;
356 struct ndis_802_11_wep *pwep = NULL;
357 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
358 struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
359 struct security_priv *psecuritypriv = &padapter->securitypriv;
360
361 param->u.crypt.err = 0;
362 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
363
364 if (param_len < (u32)((u8 *)param->u.crypt.key - (u8 *)param) + param->u.crypt.key_len) {
365 ret = -EINVAL;
366 goto exit;
367 }
368
369 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
370 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
371 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
372 if (param->u.crypt.idx >= WEP_KEYS) {
373 ret = -EINVAL;
374 goto exit;
375 }
376 } else {
377 ret = -EINVAL;
378 goto exit;
379 }
380
381 if (strcmp(param->u.crypt.alg, "WEP") == 0) {
382 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("wpa_set_encryption, crypt.alg = WEP\n"));
383 DBG_88E("wpa_set_encryption, crypt.alg = WEP\n");
384
385 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
386 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
387 padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_;
388
389 wep_key_idx = param->u.crypt.idx;
390 wep_key_len = param->u.crypt.key_len;
391
392 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, ("(1)wep_key_idx =%d\n", wep_key_idx));
393 DBG_88E("(1)wep_key_idx =%d\n", wep_key_idx);
394
395 if (wep_key_idx > WEP_KEYS)
396 return -EINVAL;
397
398 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, ("(2)wep_key_idx =%d\n", wep_key_idx));
399
400 if (wep_key_len > 0) {
401 wep_key_len = wep_key_len <= 5 ? 5 : 13;
402 wep_total_len = wep_key_len + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial);
403 pwep = (struct ndis_802_11_wep *)rtw_malloc(wep_total_len);
404 if (pwep == NULL) {
405 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, (" wpa_set_encryption: pwep allocate fail !!!\n"));
406 goto exit;
407 }
408 memset(pwep, 0, wep_total_len);
409 pwep->KeyLength = wep_key_len;
410 pwep->Length = wep_total_len;
411 if (wep_key_len == 13) {
412 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_;
413 padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_;
414 }
415 } else {
416 ret = -EINVAL;
417 goto exit;
418 }
419 pwep->KeyIndex = wep_key_idx;
420 pwep->KeyIndex |= 0x80000000;
421 memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength);
422 if (param->u.crypt.set_tx) {
423 DBG_88E("wep, set_tx = 1\n");
424 if (rtw_set_802_11_add_wep(padapter, pwep) == (u8)_FAIL)
425 ret = -EOPNOTSUPP;
426 } else {
427 DBG_88E("wep, set_tx = 0\n");
428 if (wep_key_idx >= WEP_KEYS) {
429 ret = -EOPNOTSUPP;
430 goto exit;
431 }
432 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
433 psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
434 rtw_set_key(padapter, psecuritypriv, wep_key_idx, 0);
435 }
436 goto exit;
437 }
438
439 if (padapter->securitypriv.dot11AuthAlgrthm == dot11AuthAlgrthm_8021X) { /* 802_1x */
440 struct sta_info *psta, *pbcmc_sta;
441 struct sta_priv *pstapriv = &padapter->stapriv;
442
443 if (check_fwstate(pmlmepriv, WIFI_STATION_STATE | WIFI_MP_STATE)) { /* sta mode */
444 psta = rtw_get_stainfo(pstapriv, get_bssid(pmlmepriv));
445 if (psta == NULL) {
446 ;
447 } else {
448 if (strcmp(param->u.crypt.alg, "none") != 0)
449 psta->ieee8021x_blocked = false;
450
451 if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled) ||
452 (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption3Enabled))
453 psta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm;
454
455 if (param->u.crypt.set_tx == 1) { /* pairwise key */
456 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
457
458 if (strcmp(param->u.crypt.alg, "TKIP") == 0) { /* set mic key */
459 memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
460 memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
461 padapter->securitypriv.busetkipkey = false;
462 }
463
464 DBG_88E(" ~~~~set sta key:unicastkey\n");
465
466 rtw_setstakey_cmd(padapter, (unsigned char *)psta, true);
467 } else { /* group key */
468 memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
469 memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
470 memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
471 padapter->securitypriv.binstallGrpkey = true;
472 DBG_88E(" ~~~~set sta key:groupkey\n");
473
474 padapter->securitypriv.dot118021XGrpKeyid = param->u.crypt.idx;
475
476 rtw_set_key(padapter, &padapter->securitypriv, param->u.crypt.idx, 1);
477 }
478 }
479 pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
480 if (pbcmc_sta == NULL) {
481 ;
482 } else {
483 /* Jeff: don't disable ieee8021x_blocked while clearing key */
484 if (strcmp(param->u.crypt.alg, "none") != 0)
485 pbcmc_sta->ieee8021x_blocked = false;
486
487 if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled) ||
488 (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption3Enabled))
489 pbcmc_sta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm;
490 }
491 }
492 }
493
494 exit:
495
496 kfree(pwep);
497 return ret;
498 }
499
500 static int rtw_set_wpa_ie(struct adapter *padapter, char *pie, unsigned short ielen)
501 {
502 u8 *buf = NULL;
503 int group_cipher = 0, pairwise_cipher = 0;
504 int ret = 0;
505
506 if ((ielen > MAX_WPA_IE_LEN) || (pie == NULL)) {
507 _clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS);
508 if (pie == NULL)
509 return ret;
510 else
511 return -EINVAL;
512 }
513
514 if (ielen) {
515 buf = kmemdup(pie, ielen, GFP_KERNEL);
516 if (buf == NULL) {
517 ret = -ENOMEM;
518 goto exit;
519 }
520
521 /* dump */
522 {
523 int i;
524 DBG_88E("\n wpa_ie(length:%d):\n", ielen);
525 for (i = 0; i < ielen; i += 8)
526 DBG_88E("0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x 0x%.2x\n", buf[i], buf[i+1], buf[i+2], buf[i+3], buf[i+4], buf[i+5], buf[i+6], buf[i+7]);
527 }
528
529 if (ielen < RSN_HEADER_LEN) {
530 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("Ie len too short %d\n", ielen));
531 ret = -1;
532 goto exit;
533 }
534
535 if (rtw_parse_wpa_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
536 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
537 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK;
538 memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
539 }
540
541 if (rtw_parse_wpa2_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
542 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
543 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK;
544 memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
545 }
546
547 switch (group_cipher) {
548 case WPA_CIPHER_NONE:
549 padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
550 padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
551 break;
552 case WPA_CIPHER_WEP40:
553 padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_;
554 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
555 break;
556 case WPA_CIPHER_TKIP:
557 padapter->securitypriv.dot118021XGrpPrivacy = _TKIP_;
558 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
559 break;
560 case WPA_CIPHER_CCMP:
561 padapter->securitypriv.dot118021XGrpPrivacy = _AES_;
562 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
563 break;
564 case WPA_CIPHER_WEP104:
565 padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_;
566 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
567 break;
568 }
569
570 switch (pairwise_cipher) {
571 case WPA_CIPHER_NONE:
572 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
573 padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
574 break;
575 case WPA_CIPHER_WEP40:
576 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
577 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
578 break;
579 case WPA_CIPHER_TKIP:
580 padapter->securitypriv.dot11PrivacyAlgrthm = _TKIP_;
581 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
582 break;
583 case WPA_CIPHER_CCMP:
584 padapter->securitypriv.dot11PrivacyAlgrthm = _AES_;
585 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
586 break;
587 case WPA_CIPHER_WEP104:
588 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_;
589 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
590 break;
591 }
592
593 _clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS);
594 {/* set wps_ie */
595 u16 cnt = 0;
596 u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
597
598 while (cnt < ielen) {
599 eid = buf[cnt];
600 if ((eid == _VENDOR_SPECIFIC_IE_) && (!memcmp(&buf[cnt+2], wps_oui, 4))) {
601 DBG_88E("SET WPS_IE\n");
602
603 padapter->securitypriv.wps_ie_len = ((buf[cnt+1]+2) < (MAX_WPA_IE_LEN<<2)) ? (buf[cnt+1]+2) : (MAX_WPA_IE_LEN<<2);
604
605 memcpy(padapter->securitypriv.wps_ie, &buf[cnt], padapter->securitypriv.wps_ie_len);
606
607 set_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS);
608 cnt += buf[cnt+1]+2;
609 break;
610 } else {
611 cnt += buf[cnt+1]+2; /* goto next */
612 }
613 }
614 }
615 }
616
617 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
618 ("rtw_set_wpa_ie: pairwise_cipher = 0x%08x padapter->securitypriv.ndisencryptstatus =%d padapter->securitypriv.ndisauthtype =%d\n",
619 pairwise_cipher, padapter->securitypriv.ndisencryptstatus, padapter->securitypriv.ndisauthtype));
620 exit:
621 kfree(buf);
622 return ret;
623 }
624
625 typedef unsigned char NDIS_802_11_RATES_EX[NDIS_802_11_LENGTH_RATES_EX];
626
627 static int rtw_wx_get_name(struct net_device *dev,
628 struct iw_request_info *info,
629 union iwreq_data *wrqu, char *extra)
630 {
631 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
632 u32 ht_ielen = 0;
633 char *p;
634 u8 ht_cap = false;
635 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
636 struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network;
637 NDIS_802_11_RATES_EX *prates = NULL;
638
639 RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("cmd_code =%x\n", info->cmd));
640
641 if (check_fwstate(pmlmepriv, _FW_LINKED|WIFI_ADHOC_MASTER_STATE) == true) {
642 /* parsing HT_CAP_IE */
643 p = rtw_get_ie(&pcur_bss->IEs[12], _HT_CAPABILITY_IE_, &ht_ielen, pcur_bss->IELength-12);
644 if (p && ht_ielen > 0)
645 ht_cap = true;
646
647 prates = &pcur_bss->SupportedRates;
648
649 if (rtw_is_cckratesonly_included((u8 *)prates) == true) {
650 if (ht_cap)
651 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bn");
652 else
653 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11b");
654 } else if ((rtw_is_cckrates_included((u8 *)prates)) == true) {
655 if (ht_cap)
656 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bgn");
657 else
658 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bg");
659 } else {
660 if (pcur_bss->Configuration.DSConfig > 14) {
661 if (ht_cap)
662 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11an");
663 else
664 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11a");
665 } else {
666 if (ht_cap)
667 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11gn");
668 else
669 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11g");
670 }
671 }
672 } else {
673 snprintf(wrqu->name, IFNAMSIZ, "unassociated");
674 }
675 return 0;
676 }
677
678 static int rtw_wx_set_freq(struct net_device *dev,
679 struct iw_request_info *info,
680 union iwreq_data *wrqu, char *extra)
681 {
682 RT_TRACE(_module_rtl871x_mlme_c_, _drv_notice_, ("+rtw_wx_set_freq\n"));
683 return 0;
684 }
685
686 static int rtw_wx_get_freq(struct net_device *dev,
687 struct iw_request_info *info,
688 union iwreq_data *wrqu, char *extra)
689 {
690 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
691 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
692 struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network;
693
694 if (check_fwstate(pmlmepriv, _FW_LINKED)) {
695 /* wrqu->freq.m = ieee80211_wlan_frequencies[pcur_bss->Configuration.DSConfig-1] * 100000; */
696 wrqu->freq.m = rtw_ch2freq(pcur_bss->Configuration.DSConfig) * 100000;
697 wrqu->freq.e = 1;
698 wrqu->freq.i = pcur_bss->Configuration.DSConfig;
699 } else {
700 wrqu->freq.m = rtw_ch2freq(padapter->mlmeextpriv.cur_channel) * 100000;
701 wrqu->freq.e = 1;
702 wrqu->freq.i = padapter->mlmeextpriv.cur_channel;
703 }
704
705 return 0;
706 }
707
708 static int rtw_wx_set_mode(struct net_device *dev, struct iw_request_info *a,
709 union iwreq_data *wrqu, char *b)
710 {
711 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
712 enum ndis_802_11_network_infra networkType;
713 int ret = 0;
714
715 if (_FAIL == rtw_pwr_wakeup(padapter)) {
716 ret = -EPERM;
717 goto exit;
718 }
719
720 if (!padapter->hw_init_completed) {
721 ret = -EPERM;
722 goto exit;
723 }
724
725 switch (wrqu->mode) {
726 case IW_MODE_AUTO:
727 networkType = Ndis802_11AutoUnknown;
728 DBG_88E("set_mode = IW_MODE_AUTO\n");
729 break;
730 case IW_MODE_ADHOC:
731 networkType = Ndis802_11IBSS;
732 DBG_88E("set_mode = IW_MODE_ADHOC\n");
733 break;
734 case IW_MODE_MASTER:
735 networkType = Ndis802_11APMode;
736 DBG_88E("set_mode = IW_MODE_MASTER\n");
737 break;
738 case IW_MODE_INFRA:
739 networkType = Ndis802_11Infrastructure;
740 DBG_88E("set_mode = IW_MODE_INFRA\n");
741 break;
742 default:
743 ret = -EINVAL;
744 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("\n Mode: %s is not supported\n", iw_operation_mode[wrqu->mode]));
745 goto exit;
746 }
747 if (rtw_set_802_11_infrastructure_mode(padapter, networkType) == false) {
748 ret = -EPERM;
749 goto exit;
750 }
751 rtw_setopmode_cmd(padapter, networkType);
752 exit:
753 return ret;
754 }
755
756 static int rtw_wx_get_mode(struct net_device *dev, struct iw_request_info *a,
757 union iwreq_data *wrqu, char *b)
758 {
759 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
760 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
761
762 RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, (" rtw_wx_get_mode\n"));
763
764 if (check_fwstate(pmlmepriv, WIFI_STATION_STATE))
765 wrqu->mode = IW_MODE_INFRA;
766 else if ((check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE)) ||
767 (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE)))
768 wrqu->mode = IW_MODE_ADHOC;
769 else if (check_fwstate(pmlmepriv, WIFI_AP_STATE))
770 wrqu->mode = IW_MODE_MASTER;
771 else
772 wrqu->mode = IW_MODE_AUTO;
773
774 return 0;
775 }
776
777 static int rtw_wx_set_pmkid(struct net_device *dev,
778 struct iw_request_info *a,
779 union iwreq_data *wrqu, char *extra)
780 {
781 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
782 u8 j, blInserted = false;
783 int ret = false;
784 struct security_priv *psecuritypriv = &padapter->securitypriv;
785 struct iw_pmksa *pPMK = (struct iw_pmksa *)extra;
786 u8 strZeroMacAddress[ETH_ALEN] = {0x00};
787 u8 strIssueBssid[ETH_ALEN] = {0x00};
788
789 memcpy(strIssueBssid, pPMK->bssid.sa_data, ETH_ALEN);
790 if (pPMK->cmd == IW_PMKSA_ADD) {
791 DBG_88E("[rtw_wx_set_pmkid] IW_PMKSA_ADD!\n");
792 if (!memcmp(strIssueBssid, strZeroMacAddress, ETH_ALEN))
793 return ret;
794 else
795 ret = true;
796 blInserted = false;
797
798 /* overwrite PMKID */
799 for (j = 0; j < NUM_PMKID_CACHE; j++) {
800 if (!memcmp(psecuritypriv->PMKIDList[j].Bssid, strIssueBssid, ETH_ALEN)) {
801 /* BSSID is matched, the same AP => rewrite with new PMKID. */
802 DBG_88E("[rtw_wx_set_pmkid] BSSID exists in the PMKList.\n");
803 memcpy(psecuritypriv->PMKIDList[j].PMKID, pPMK->pmkid, IW_PMKID_LEN);
804 psecuritypriv->PMKIDList[j].bUsed = true;
805 psecuritypriv->PMKIDIndex = j+1;
806 blInserted = true;
807 break;
808 }
809 }
810
811 if (!blInserted) {
812 /* Find a new entry */
813 DBG_88E("[rtw_wx_set_pmkid] Use the new entry index = %d for this PMKID.\n",
814 psecuritypriv->PMKIDIndex);
815
816 memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, strIssueBssid, ETH_ALEN);
817 memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, pPMK->pmkid, IW_PMKID_LEN);
818
819 psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].bUsed = true;
820 psecuritypriv->PMKIDIndex++;
821 if (psecuritypriv->PMKIDIndex == 16)
822 psecuritypriv->PMKIDIndex = 0;
823 }
824 } else if (pPMK->cmd == IW_PMKSA_REMOVE) {
825 DBG_88E("[rtw_wx_set_pmkid] IW_PMKSA_REMOVE!\n");
826 ret = true;
827 for (j = 0; j < NUM_PMKID_CACHE; j++) {
828 if (!memcmp(psecuritypriv->PMKIDList[j].Bssid, strIssueBssid, ETH_ALEN)) {
829 /* BSSID is matched, the same AP => Remove this PMKID information and reset it. */
830 memset(psecuritypriv->PMKIDList[j].Bssid, 0x00, ETH_ALEN);
831 psecuritypriv->PMKIDList[j].bUsed = false;
832 break;
833 }
834 }
835 } else if (pPMK->cmd == IW_PMKSA_FLUSH) {
836 DBG_88E("[rtw_wx_set_pmkid] IW_PMKSA_FLUSH!\n");
837 memset(&psecuritypriv->PMKIDList[0], 0x00, sizeof(struct rt_pmkid_list) * NUM_PMKID_CACHE);
838 psecuritypriv->PMKIDIndex = 0;
839 ret = true;
840 }
841 return ret;
842 }
843
844 static int rtw_wx_get_sens(struct net_device *dev,
845 struct iw_request_info *info,
846 union iwreq_data *wrqu, char *extra)
847 {
848 wrqu->sens.value = 0;
849 wrqu->sens.fixed = 0; /* no auto select */
850 wrqu->sens.disabled = 1;
851 return 0;
852 }
853
854 static int rtw_wx_get_range(struct net_device *dev,
855 struct iw_request_info *info,
856 union iwreq_data *wrqu, char *extra)
857 {
858 struct iw_range *range = (struct iw_range *)extra;
859 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
860 struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv;
861
862 u16 val;
863 int i;
864
865 RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_range. cmd_code =%x\n", info->cmd));
866
867 wrqu->data.length = sizeof(*range);
868 memset(range, 0, sizeof(*range));
869
870 /* Let's try to keep this struct in the same order as in
871 * linux/include/wireless.h
872 */
873
874 /* TODO: See what values we can set, and remove the ones we can't
875 * set, or fill them with some default data.
876 */
877
878 /* ~5 Mb/s real (802.11b) */
879 range->throughput = 5 * 1000 * 1000;
880
881 /* signal level threshold range */
882
883 /* percent values between 0 and 100. */
884 range->max_qual.qual = 100;
885 range->max_qual.level = 100;
886 range->max_qual.noise = 100;
887 range->max_qual.updated = 7; /* Updated all three */
888
889 range->avg_qual.qual = 92; /* > 8% missed beacons is 'bad' */
890 /* TODO: Find real 'good' to 'bad' threshol value for RSSI */
891 range->avg_qual.level = 178; /* -78 dBm */
892 range->avg_qual.noise = 0;
893 range->avg_qual.updated = 7; /* Updated all three */
894
895 range->num_bitrates = RATE_COUNT;
896
897 for (i = 0; i < RATE_COUNT && i < IW_MAX_BITRATES; i++)
898 range->bitrate[i] = rtw_rates[i];
899
900 range->min_frag = MIN_FRAG_THRESHOLD;
901 range->max_frag = MAX_FRAG_THRESHOLD;
902
903 range->pm_capa = 0;
904
905 range->we_version_compiled = WIRELESS_EXT;
906 range->we_version_source = 16;
907
908 for (i = 0, val = 0; i < MAX_CHANNEL_NUM; i++) {
909 /* Include only legal frequencies for some countries */
910 if (pmlmeext->channel_set[i].ChannelNum != 0) {
911 range->freq[val].i = pmlmeext->channel_set[i].ChannelNum;
912 range->freq[val].m = rtw_ch2freq(pmlmeext->channel_set[i].ChannelNum) * 100000;
913 range->freq[val].e = 1;
914 val++;
915 }
916
917 if (val == IW_MAX_FREQUENCIES)
918 break;
919 }
920
921 range->num_channels = val;
922 range->num_frequency = val;
923
924 /* The following code will proivde the security capability to network manager. */
925 /* If the driver doesn't provide this capability to network manager, */
926 /* the WPA/WPA2 routers can't be chosen in the network manager. */
927
928 /*
929 #define IW_SCAN_CAPA_NONE 0x00
930 #define IW_SCAN_CAPA_ESSID 0x01
931 #define IW_SCAN_CAPA_BSSID 0x02
932 #define IW_SCAN_CAPA_CHANNEL 0x04
933 #define IW_SCAN_CAPA_MODE 0x08
934 #define IW_SCAN_CAPA_RATE 0x10
935 #define IW_SCAN_CAPA_TYPE 0x20
936 #define IW_SCAN_CAPA_TIME 0x40
937 */
938
939 range->enc_capa = IW_ENC_CAPA_WPA | IW_ENC_CAPA_WPA2 |
940 IW_ENC_CAPA_CIPHER_TKIP | IW_ENC_CAPA_CIPHER_CCMP;
941
942 range->scan_capa = IW_SCAN_CAPA_ESSID | IW_SCAN_CAPA_TYPE |
943 IW_SCAN_CAPA_BSSID | IW_SCAN_CAPA_CHANNEL |
944 IW_SCAN_CAPA_MODE | IW_SCAN_CAPA_RATE;
945 return 0;
946 }
947
948 /* set bssid flow */
949 /* s1. rtw_set_802_11_infrastructure_mode() */
950 /* s2. rtw_set_802_11_authentication_mode() */
951 /* s3. set_802_11_encryption_mode() */
952 /* s4. rtw_set_802_11_bssid() */
953 static int rtw_wx_set_wap(struct net_device *dev,
954 struct iw_request_info *info,
955 union iwreq_data *awrq,
956 char *extra)
957 {
958 uint ret = 0;
959 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
960 struct sockaddr *temp = (struct sockaddr *)awrq;
961 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
962 struct list_head *phead;
963 u8 *dst_bssid, *src_bssid;
964 struct __queue *queue = &(pmlmepriv->scanned_queue);
965 struct wlan_network *pnetwork = NULL;
966 enum ndis_802_11_auth_mode authmode;
967
968 if (_FAIL == rtw_pwr_wakeup(padapter)) {
969 ret = -1;
970 goto exit;
971 }
972
973 if (!padapter->bup) {
974 ret = -1;
975 goto exit;
976 }
977
978 if (temp->sa_family != ARPHRD_ETHER) {
979 ret = -EINVAL;
980 goto exit;
981 }
982
983 authmode = padapter->securitypriv.ndisauthtype;
984 spin_lock_bh(&queue->lock);
985 phead = get_list_head(queue);
986 pmlmepriv->pscanned = phead->next;
987
988 while (phead != pmlmepriv->pscanned) {
989 pnetwork = container_of(pmlmepriv->pscanned, struct wlan_network, list);
990
991 pmlmepriv->pscanned = pmlmepriv->pscanned->next;
992
993 dst_bssid = pnetwork->network.MacAddress;
994
995 src_bssid = temp->sa_data;
996
997 if ((!memcmp(dst_bssid, src_bssid, ETH_ALEN))) {
998 if (!rtw_set_802_11_infrastructure_mode(padapter, pnetwork->network.InfrastructureMode)) {
999 ret = -1;
1000 spin_unlock_bh(&queue->lock);
1001 goto exit;
1002 }
1003
1004 break;
1005 }
1006 }
1007 spin_unlock_bh(&queue->lock);
1008
1009 rtw_set_802_11_authentication_mode(padapter, authmode);
1010 /* set_802_11_encryption_mode(padapter, padapter->securitypriv.ndisencryptstatus); */
1011 if (rtw_set_802_11_bssid(padapter, temp->sa_data) == false) {
1012 ret = -1;
1013 goto exit;
1014 }
1015
1016 exit:
1017
1018 return ret;
1019 }
1020
1021 static int rtw_wx_get_wap(struct net_device *dev,
1022 struct iw_request_info *info,
1023 union iwreq_data *wrqu, char *extra)
1024 {
1025 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1026 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1027 struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network;
1028
1029 wrqu->ap_addr.sa_family = ARPHRD_ETHER;
1030
1031 memset(wrqu->ap_addr.sa_data, 0, ETH_ALEN);
1032
1033 RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_wap\n"));
1034
1035 if (((check_fwstate(pmlmepriv, _FW_LINKED)) == true) ||
1036 ((check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE)) == true) ||
1037 ((check_fwstate(pmlmepriv, WIFI_AP_STATE)) == true))
1038 memcpy(wrqu->ap_addr.sa_data, pcur_bss->MacAddress, ETH_ALEN);
1039 else
1040 memset(wrqu->ap_addr.sa_data, 0, ETH_ALEN);
1041 return 0;
1042 }
1043
1044 static int rtw_wx_set_mlme(struct net_device *dev,
1045 struct iw_request_info *info,
1046 union iwreq_data *wrqu, char *extra)
1047 {
1048 int ret = 0;
1049 u16 reason;
1050 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1051 struct iw_mlme *mlme = (struct iw_mlme *)extra;
1052
1053 if (mlme == NULL)
1054 return -1;
1055
1056 DBG_88E("%s\n", __func__);
1057
1058 reason = mlme->reason_code;
1059
1060 DBG_88E("%s, cmd =%d, reason =%d\n", __func__, mlme->cmd, reason);
1061
1062 switch (mlme->cmd) {
1063 case IW_MLME_DEAUTH:
1064 if (!rtw_set_802_11_disassociate(padapter))
1065 ret = -1;
1066 break;
1067 case IW_MLME_DISASSOC:
1068 if (!rtw_set_802_11_disassociate(padapter))
1069 ret = -1;
1070 break;
1071 default:
1072 return -EOPNOTSUPP;
1073 }
1074 return ret;
1075 }
1076
1077 static int rtw_wx_set_scan(struct net_device *dev, struct iw_request_info *a,
1078 union iwreq_data *wrqu, char *extra)
1079 {
1080 u8 _status = false;
1081 int ret = 0;
1082 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1083 struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
1084 struct ndis_802_11_ssid ssid[RTW_SSID_SCAN_AMOUNT];
1085 RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_set_scan\n"));
1086
1087 if (padapter->registrypriv.mp_mode == 1) {
1088 if (check_fwstate(pmlmepriv, WIFI_MP_STATE)) {
1089 ret = -1;
1090 goto exit;
1091 }
1092 }
1093 if (_FAIL == rtw_pwr_wakeup(padapter)) {
1094 ret = -1;
1095 goto exit;
1096 }
1097
1098 if (padapter->bDriverStopped) {
1099 DBG_88E("bDriverStopped =%d\n", padapter->bDriverStopped);
1100 ret = -1;
1101 goto exit;
1102 }
1103
1104 if (!padapter->bup) {
1105 ret = -1;
1106 goto exit;
1107 }
1108
1109 if (!padapter->hw_init_completed) {
1110 ret = -1;
1111 goto exit;
1112 }
1113
1114 /* When Busy Traffic, driver do not site survey. So driver return success. */
1115 /* wpa_supplicant will not issue SIOCSIWSCAN cmd again after scan timeout. */
1116 /* modify by thomas 2011-02-22. */
1117 if (pmlmepriv->LinkDetectInfo.bBusyTraffic) {
1118 indicate_wx_scan_complete_event(padapter);
1119 goto exit;
1120 }
1121
1122 if (check_fwstate(pmlmepriv, _FW_UNDER_SURVEY|_FW_UNDER_LINKING)) {
1123 indicate_wx_scan_complete_event(padapter);
1124 goto exit;
1125 }
1126
1127 /* For the DMP WiFi Display project, the driver won't to scan because */
1128 /* the pmlmepriv->scan_interval is always equal to 3. */
1129 /* So, the wpa_supplicant won't find out the WPS SoftAP. */
1130
1131 memset(ssid, 0, sizeof(struct ndis_802_11_ssid)*RTW_SSID_SCAN_AMOUNT);
1132
1133 if (wrqu->data.length == sizeof(struct iw_scan_req)) {
1134 struct iw_scan_req *req = (struct iw_scan_req *)extra;
1135
1136 if (wrqu->data.flags & IW_SCAN_THIS_ESSID) {
1137 int len = min_t(int, req->essid_len,
1138 IW_ESSID_MAX_SIZE);
1139
1140 memcpy(ssid[0].Ssid, req->essid, len);
1141 ssid[0].SsidLength = len;
1142
1143 DBG_88E("IW_SCAN_THIS_ESSID, ssid =%s, len =%d\n", req->essid, req->essid_len);
1144
1145 spin_lock_bh(&pmlmepriv->lock);
1146
1147 _status = rtw_sitesurvey_cmd(padapter, ssid, 1, NULL, 0);
1148
1149 spin_unlock_bh(&pmlmepriv->lock);
1150 } else if (req->scan_type == IW_SCAN_TYPE_PASSIVE) {
1151 DBG_88E("rtw_wx_set_scan, req->scan_type == IW_SCAN_TYPE_PASSIVE\n");
1152 }
1153 } else {
1154 if (wrqu->data.length >= WEXT_CSCAN_HEADER_SIZE &&
1155 !memcmp(extra, WEXT_CSCAN_HEADER, WEXT_CSCAN_HEADER_SIZE)) {
1156 int len = wrqu->data.length - WEXT_CSCAN_HEADER_SIZE;
1157 char *pos = extra+WEXT_CSCAN_HEADER_SIZE;
1158 char section;
1159 char sec_len;
1160 int ssid_index = 0;
1161
1162 while (len >= 1) {
1163 section = *(pos++);
1164 len -= 1;
1165
1166 switch (section) {
1167 case WEXT_CSCAN_SSID_SECTION:
1168 if (len < 1) {
1169 len = 0;
1170 break;
1171 }
1172 sec_len = *(pos++); len -= 1;
1173 if (sec_len > 0 && sec_len <= len) {
1174 ssid[ssid_index].SsidLength = sec_len;
1175 memcpy(ssid[ssid_index].Ssid, pos, ssid[ssid_index].SsidLength);
1176 ssid_index++;
1177 }
1178 pos += sec_len;
1179 len -= sec_len;
1180 break;
1181 case WEXT_CSCAN_TYPE_SECTION:
1182 case WEXT_CSCAN_CHANNEL_SECTION:
1183 pos += 1;
1184 len -= 1;
1185 break;
1186 case WEXT_CSCAN_PASV_DWELL_SECTION:
1187 case WEXT_CSCAN_HOME_DWELL_SECTION:
1188 case WEXT_CSCAN_ACTV_DWELL_SECTION:
1189 pos += 2;
1190 len -= 2;
1191 break;
1192 default:
1193 len = 0; /* stop parsing */
1194 }
1195 }
1196
1197 /* it has still some scan parameter to parse, we only do this now... */
1198 _status = rtw_set_802_11_bssid_list_scan(padapter, ssid, RTW_SSID_SCAN_AMOUNT);
1199 } else {
1200 _status = rtw_set_802_11_bssid_list_scan(padapter, NULL, 0);
1201 }
1202 }
1203
1204 if (!_status)
1205 ret = -1;
1206
1207 exit:
1208
1209 return ret;
1210 }
1211
1212 static int rtw_wx_get_scan(struct net_device *dev, struct iw_request_info *a,
1213 union iwreq_data *wrqu, char *extra)
1214 {
1215 struct list_head *plist, *phead;
1216 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1217 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1218 struct __queue *queue = &(pmlmepriv->scanned_queue);
1219 struct wlan_network *pnetwork = NULL;
1220 char *ev = extra;
1221 char *stop = ev + wrqu->data.length;
1222 u32 ret = 0;
1223 u32 cnt = 0;
1224 u32 wait_for_surveydone;
1225 int wait_status;
1226 RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_scan\n"));
1227 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, (" Start of Query SIOCGIWSCAN .\n"));
1228
1229 if (padapter->pwrctrlpriv.brfoffbyhw && padapter->bDriverStopped) {
1230 ret = -EINVAL;
1231 goto exit;
1232 }
1233
1234 wait_for_surveydone = 100;
1235
1236 wait_status = _FW_UNDER_SURVEY | _FW_UNDER_LINKING;
1237
1238 while (check_fwstate(pmlmepriv, wait_status)) {
1239 msleep(30);
1240 cnt++;
1241 if (cnt > wait_for_surveydone)
1242 break;
1243 }
1244
1245 spin_lock_bh(&(pmlmepriv->scanned_queue.lock));
1246
1247 phead = get_list_head(queue);
1248 plist = phead->next;
1249
1250 while (phead != plist) {
1251 if ((stop - ev) < SCAN_ITEM_SIZE) {
1252 ret = -E2BIG;
1253 break;
1254 }
1255
1256 pnetwork = container_of(plist, struct wlan_network, list);
1257
1258 /* report network only if the current channel set contains the channel to which this network belongs */
1259 if (rtw_ch_set_search_ch(padapter->mlmeextpriv.channel_set, pnetwork->network.Configuration.DSConfig) >= 0)
1260 ev = translate_scan(padapter, a, pnetwork, ev, stop);
1261
1262 plist = plist->next;
1263 }
1264
1265 spin_unlock_bh(&pmlmepriv->scanned_queue.lock);
1266
1267 wrqu->data.length = ev-extra;
1268 wrqu->data.flags = 0;
1269
1270 exit:
1271 return ret;
1272 }
1273
1274 /* set ssid flow */
1275 /* s1. rtw_set_802_11_infrastructure_mode() */
1276 /* s2. set_802_11_authenticaion_mode() */
1277 /* s3. set_802_11_encryption_mode() */
1278 /* s4. rtw_set_802_11_ssid() */
1279 static int rtw_wx_set_essid(struct net_device *dev,
1280 struct iw_request_info *a,
1281 union iwreq_data *wrqu, char *extra)
1282 {
1283 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1284 struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
1285 struct __queue *queue = &pmlmepriv->scanned_queue;
1286 struct list_head *phead;
1287 struct wlan_network *pnetwork = NULL;
1288 enum ndis_802_11_auth_mode authmode;
1289 struct ndis_802_11_ssid ndis_ssid;
1290 u8 *dst_ssid, *src_ssid;
1291
1292 uint ret = 0, len;
1293
1294
1295 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
1296 ("+rtw_wx_set_essid: fw_state = 0x%08x\n", get_fwstate(pmlmepriv)));
1297 if (_FAIL == rtw_pwr_wakeup(padapter)) {
1298 ret = -1;
1299 goto exit;
1300 }
1301
1302 if (!padapter->bup) {
1303 ret = -1;
1304 goto exit;
1305 }
1306
1307 if (wrqu->essid.length > IW_ESSID_MAX_SIZE) {
1308 ret = -E2BIG;
1309 goto exit;
1310 }
1311
1312 if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) {
1313 ret = -1;
1314 goto exit;
1315 }
1316
1317 authmode = padapter->securitypriv.ndisauthtype;
1318 DBG_88E("=>%s\n", __func__);
1319 if (wrqu->essid.flags && wrqu->essid.length) {
1320 len = (wrqu->essid.length < IW_ESSID_MAX_SIZE) ? wrqu->essid.length : IW_ESSID_MAX_SIZE;
1321
1322 if (wrqu->essid.length != 33)
1323 DBG_88E("ssid =%s, len =%d\n", extra, wrqu->essid.length);
1324
1325 memset(&ndis_ssid, 0, sizeof(struct ndis_802_11_ssid));
1326 ndis_ssid.SsidLength = len;
1327 memcpy(ndis_ssid.Ssid, extra, len);
1328 src_ssid = ndis_ssid.Ssid;
1329
1330 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, ("rtw_wx_set_essid: ssid =[%s]\n", src_ssid));
1331 spin_lock_bh(&queue->lock);
1332 phead = get_list_head(queue);
1333 pmlmepriv->pscanned = phead->next;
1334
1335 while (phead != pmlmepriv->pscanned) {
1336 pnetwork = container_of(pmlmepriv->pscanned, struct wlan_network, list);
1337
1338 pmlmepriv->pscanned = pmlmepriv->pscanned->next;
1339
1340 dst_ssid = pnetwork->network.Ssid.Ssid;
1341
1342 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
1343 ("rtw_wx_set_essid: dst_ssid =%s\n",
1344 pnetwork->network.Ssid.Ssid));
1345
1346 if ((!memcmp(dst_ssid, src_ssid, ndis_ssid.SsidLength)) &&
1347 (pnetwork->network.Ssid.SsidLength == ndis_ssid.SsidLength)) {
1348 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
1349 ("rtw_wx_set_essid: find match, set infra mode\n"));
1350
1351 if (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE) == true) {
1352 if (pnetwork->network.InfrastructureMode != pmlmepriv->cur_network.network.InfrastructureMode)
1353 continue;
1354 }
1355
1356 if (!rtw_set_802_11_infrastructure_mode(padapter, pnetwork->network.InfrastructureMode)) {
1357 ret = -1;
1358 spin_unlock_bh(&queue->lock);
1359 goto exit;
1360 }
1361
1362 break;
1363 }
1364 }
1365 spin_unlock_bh(&queue->lock);
1366 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
1367 ("set ssid: set_802_11_auth. mode =%d\n", authmode));
1368 rtw_set_802_11_authentication_mode(padapter, authmode);
1369 if (rtw_set_802_11_ssid(padapter, &ndis_ssid) == false) {
1370 ret = -1;
1371 goto exit;
1372 }
1373 }
1374
1375 exit:
1376
1377 DBG_88E("<=%s, ret %d\n", __func__, ret);
1378
1379
1380 return ret;
1381 }
1382
1383 static int rtw_wx_get_essid(struct net_device *dev,
1384 struct iw_request_info *a,
1385 union iwreq_data *wrqu, char *extra)
1386 {
1387 u32 len, ret = 0;
1388 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1389 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1390 struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network;
1391
1392 RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, ("rtw_wx_get_essid\n"));
1393
1394
1395 if ((check_fwstate(pmlmepriv, _FW_LINKED)) ||
1396 (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE))) {
1397 len = pcur_bss->Ssid.SsidLength;
1398
1399 wrqu->essid.length = len;
1400
1401 memcpy(extra, pcur_bss->Ssid.Ssid, len);
1402
1403 wrqu->essid.flags = 1;
1404 } else {
1405 ret = -1;
1406 goto exit;
1407 }
1408
1409 exit:
1410
1411
1412 return ret;
1413 }
1414
1415 static int rtw_wx_set_rate(struct net_device *dev,
1416 struct iw_request_info *a,
1417 union iwreq_data *wrqu, char *extra)
1418 {
1419 int i;
1420 u8 datarates[NumRates];
1421 u32 target_rate = wrqu->bitrate.value;
1422 u32 fixed = wrqu->bitrate.fixed;
1423 u32 ratevalue = 0;
1424 u8 mpdatarate[NumRates] = {11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0, 0xff};
1425
1426
1427 RT_TRACE(_module_rtl871x_mlme_c_, _drv_info_, (" rtw_wx_set_rate\n"));
1428 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, ("target_rate = %d, fixed = %d\n", target_rate, fixed));
1429
1430 if (target_rate == -1) {
1431 ratevalue = 11;
1432 goto set_rate;
1433 }
1434 target_rate = target_rate/100000;
1435
1436 switch (target_rate) {
1437 case 10:
1438 ratevalue = 0;
1439 break;
1440 case 20:
1441 ratevalue = 1;
1442 break;
1443 case 55:
1444 ratevalue = 2;
1445 break;
1446 case 60:
1447 ratevalue = 3;
1448 break;
1449 case 90:
1450 ratevalue = 4;
1451 break;
1452 case 110:
1453 ratevalue = 5;
1454 break;
1455 case 120:
1456 ratevalue = 6;
1457 break;
1458 case 180:
1459 ratevalue = 7;
1460 break;
1461 case 240:
1462 ratevalue = 8;
1463 break;
1464 case 360:
1465 ratevalue = 9;
1466 break;
1467 case 480:
1468 ratevalue = 10;
1469 break;
1470 case 540:
1471 ratevalue = 11;
1472 break;
1473 default:
1474 ratevalue = 11;
1475 break;
1476 }
1477
1478 set_rate:
1479
1480 for (i = 0; i < NumRates; i++) {
1481 if (ratevalue == mpdatarate[i]) {
1482 datarates[i] = mpdatarate[i];
1483 if (fixed == 0)
1484 break;
1485 } else {
1486 datarates[i] = 0xff;
1487 }
1488
1489 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, ("datarate_inx =%d\n", datarates[i]));
1490 }
1491
1492 return 0;
1493 }
1494
1495 static int rtw_wx_get_rate(struct net_device *dev,
1496 struct iw_request_info *info,
1497 union iwreq_data *wrqu, char *extra)
1498 {
1499 u16 max_rate = 0;
1500
1501 max_rate = rtw_get_cur_max_rate((struct adapter *)rtw_netdev_priv(dev));
1502
1503 if (max_rate == 0)
1504 return -EPERM;
1505
1506 wrqu->bitrate.fixed = 0; /* no auto select */
1507 wrqu->bitrate.value = max_rate * 100000;
1508
1509 return 0;
1510 }
1511
1512 static int rtw_wx_set_rts(struct net_device *dev,
1513 struct iw_request_info *info,
1514 union iwreq_data *wrqu, char *extra)
1515 {
1516 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1517
1518
1519 if (wrqu->rts.disabled) {
1520 padapter->registrypriv.rts_thresh = 2347;
1521 } else {
1522 if (wrqu->rts.value < 0 ||
1523 wrqu->rts.value > 2347)
1524 return -EINVAL;
1525
1526 padapter->registrypriv.rts_thresh = wrqu->rts.value;
1527 }
1528
1529 DBG_88E("%s, rts_thresh =%d\n", __func__, padapter->registrypriv.rts_thresh);
1530
1531
1532 return 0;
1533 }
1534
1535 static int rtw_wx_get_rts(struct net_device *dev,
1536 struct iw_request_info *info,
1537 union iwreq_data *wrqu, char *extra)
1538 {
1539 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1540
1541
1542 DBG_88E("%s, rts_thresh =%d\n", __func__, padapter->registrypriv.rts_thresh);
1543
1544 wrqu->rts.value = padapter->registrypriv.rts_thresh;
1545 wrqu->rts.fixed = 0; /* no auto select */
1546 /* wrqu->rts.disabled = (wrqu->rts.value == DEFAULT_RTS_THRESHOLD); */
1547
1548
1549 return 0;
1550 }
1551
1552 static int rtw_wx_set_frag(struct net_device *dev,
1553 struct iw_request_info *info,
1554 union iwreq_data *wrqu, char *extra)
1555 {
1556 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1557
1558
1559 if (wrqu->frag.disabled) {
1560 padapter->xmitpriv.frag_len = MAX_FRAG_THRESHOLD;
1561 } else {
1562 if (wrqu->frag.value < MIN_FRAG_THRESHOLD ||
1563 wrqu->frag.value > MAX_FRAG_THRESHOLD)
1564 return -EINVAL;
1565
1566 padapter->xmitpriv.frag_len = wrqu->frag.value & ~0x1;
1567 }
1568
1569 DBG_88E("%s, frag_len =%d\n", __func__, padapter->xmitpriv.frag_len);
1570
1571
1572 return 0;
1573 }
1574
1575 static int rtw_wx_get_frag(struct net_device *dev,
1576 struct iw_request_info *info,
1577 union iwreq_data *wrqu, char *extra)
1578 {
1579 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1580
1581
1582 DBG_88E("%s, frag_len =%d\n", __func__, padapter->xmitpriv.frag_len);
1583
1584 wrqu->frag.value = padapter->xmitpriv.frag_len;
1585 wrqu->frag.fixed = 0; /* no auto select */
1586
1587
1588 return 0;
1589 }
1590
1591 static int rtw_wx_get_retry(struct net_device *dev,
1592 struct iw_request_info *info,
1593 union iwreq_data *wrqu, char *extra)
1594 {
1595 wrqu->retry.value = 7;
1596 wrqu->retry.fixed = 0; /* no auto select */
1597 wrqu->retry.disabled = 1;
1598
1599 return 0;
1600 }
1601
1602 static int rtw_wx_set_enc(struct net_device *dev,
1603 struct iw_request_info *info,
1604 union iwreq_data *wrqu, char *keybuf)
1605 {
1606 u32 key, ret = 0;
1607 u32 keyindex_provided;
1608 struct ndis_802_11_wep wep;
1609 enum ndis_802_11_auth_mode authmode;
1610
1611 struct iw_point *erq = &(wrqu->encoding);
1612 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1613 struct pwrctrl_priv *pwrpriv = &padapter->pwrctrlpriv;
1614 DBG_88E("+rtw_wx_set_enc, flags = 0x%x\n", erq->flags);
1615
1616 memset(&wep, 0, sizeof(struct ndis_802_11_wep));
1617
1618 key = erq->flags & IW_ENCODE_INDEX;
1619
1620
1621 if (erq->flags & IW_ENCODE_DISABLED) {
1622 DBG_88E("EncryptionDisabled\n");
1623 padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
1624 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
1625 padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
1626 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */
1627 authmode = Ndis802_11AuthModeOpen;
1628 padapter->securitypriv.ndisauthtype = authmode;
1629
1630 goto exit;
1631 }
1632
1633 if (key) {
1634 if (key > WEP_KEYS)
1635 return -EINVAL;
1636 key--;
1637 keyindex_provided = 1;
1638 } else {
1639 keyindex_provided = 0;
1640 key = padapter->securitypriv.dot11PrivacyKeyIndex;
1641 DBG_88E("rtw_wx_set_enc, key =%d\n", key);
1642 }
1643
1644 /* set authentication mode */
1645 if (erq->flags & IW_ENCODE_OPEN) {
1646 DBG_88E("rtw_wx_set_enc():IW_ENCODE_OPEN\n");
1647 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;/* Ndis802_11EncryptionDisabled; */
1648 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open;
1649 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
1650 padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
1651 authmode = Ndis802_11AuthModeOpen;
1652 padapter->securitypriv.ndisauthtype = authmode;
1653 } else if (erq->flags & IW_ENCODE_RESTRICTED) {
1654 DBG_88E("rtw_wx_set_enc():IW_ENCODE_RESTRICTED\n");
1655 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
1656 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Shared;
1657 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
1658 padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_;
1659 authmode = Ndis802_11AuthModeShared;
1660 padapter->securitypriv.ndisauthtype = authmode;
1661 } else {
1662 DBG_88E("rtw_wx_set_enc():erq->flags = 0x%x\n", erq->flags);
1663
1664 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;/* Ndis802_11EncryptionDisabled; */
1665 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */
1666 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
1667 padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
1668 authmode = Ndis802_11AuthModeOpen;
1669 padapter->securitypriv.ndisauthtype = authmode;
1670 }
1671
1672 wep.KeyIndex = key;
1673 if (erq->length > 0) {
1674 wep.KeyLength = erq->length <= 5 ? 5 : 13;
1675
1676 wep.Length = wep.KeyLength + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial);
1677 } else {
1678 wep.KeyLength = 0;
1679
1680 if (keyindex_provided == 1) {
1681 /* set key_id only, no given KeyMaterial(erq->length == 0). */
1682 padapter->securitypriv.dot11PrivacyKeyIndex = key;
1683
1684 DBG_88E("(keyindex_provided == 1), keyid =%d, key_len =%d\n", key, padapter->securitypriv.dot11DefKeylen[key]);
1685
1686 switch (padapter->securitypriv.dot11DefKeylen[key]) {
1687 case 5:
1688 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
1689 break;
1690 case 13:
1691 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_;
1692 break;
1693 default:
1694 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
1695 break;
1696 }
1697
1698 goto exit;
1699 }
1700 }
1701
1702 wep.KeyIndex |= 0x80000000;
1703
1704 memcpy(wep.KeyMaterial, keybuf, wep.KeyLength);
1705
1706 if (rtw_set_802_11_add_wep(padapter, &wep) == false) {
1707 if (rf_on == pwrpriv->rf_pwrstate)
1708 ret = -EOPNOTSUPP;
1709 goto exit;
1710 }
1711
1712 exit:
1713
1714
1715 return ret;
1716 }
1717
1718 static int rtw_wx_get_enc(struct net_device *dev,
1719 struct iw_request_info *info,
1720 union iwreq_data *wrqu, char *keybuf)
1721 {
1722 uint key, ret = 0;
1723 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1724 struct iw_point *erq = &(wrqu->encoding);
1725 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1726
1727
1728 if (check_fwstate(pmlmepriv, _FW_LINKED) != true) {
1729 if (!check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE)) {
1730 erq->length = 0;
1731 erq->flags |= IW_ENCODE_DISABLED;
1732 return 0;
1733 }
1734 }
1735
1736 key = erq->flags & IW_ENCODE_INDEX;
1737
1738 if (key) {
1739 if (key > WEP_KEYS)
1740 return -EINVAL;
1741 key--;
1742 } else {
1743 key = padapter->securitypriv.dot11PrivacyKeyIndex;
1744 }
1745
1746 erq->flags = key + 1;
1747
1748 switch (padapter->securitypriv.ndisencryptstatus) {
1749 case Ndis802_11EncryptionNotSupported:
1750 case Ndis802_11EncryptionDisabled:
1751 erq->length = 0;
1752 erq->flags |= IW_ENCODE_DISABLED;
1753 break;
1754 case Ndis802_11Encryption1Enabled:
1755 erq->length = padapter->securitypriv.dot11DefKeylen[key];
1756 if (erq->length) {
1757 memcpy(keybuf, padapter->securitypriv.dot11DefKey[key].skey, padapter->securitypriv.dot11DefKeylen[key]);
1758
1759 erq->flags |= IW_ENCODE_ENABLED;
1760
1761 if (padapter->securitypriv.ndisauthtype == Ndis802_11AuthModeOpen)
1762 erq->flags |= IW_ENCODE_OPEN;
1763 else if (padapter->securitypriv.ndisauthtype == Ndis802_11AuthModeShared)
1764 erq->flags |= IW_ENCODE_RESTRICTED;
1765 } else {
1766 erq->length = 0;
1767 erq->flags |= IW_ENCODE_DISABLED;
1768 }
1769 break;
1770 case Ndis802_11Encryption2Enabled:
1771 case Ndis802_11Encryption3Enabled:
1772 erq->length = 16;
1773 erq->flags |= (IW_ENCODE_ENABLED | IW_ENCODE_OPEN | IW_ENCODE_NOKEY);
1774 break;
1775 default:
1776 erq->length = 0;
1777 erq->flags |= IW_ENCODE_DISABLED;
1778 break;
1779 }
1780
1781 return ret;
1782 }
1783
1784 static int rtw_wx_get_power(struct net_device *dev,
1785 struct iw_request_info *info,
1786 union iwreq_data *wrqu, char *extra)
1787 {
1788 wrqu->power.value = 0;
1789 wrqu->power.fixed = 0; /* no auto select */
1790 wrqu->power.disabled = 1;
1791
1792 return 0;
1793 }
1794
1795 static int rtw_wx_set_gen_ie(struct net_device *dev,
1796 struct iw_request_info *info,
1797 union iwreq_data *wrqu, char *extra)
1798 {
1799 int ret;
1800 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1801
1802 ret = rtw_set_wpa_ie(padapter, extra, wrqu->data.length);
1803 return ret;
1804 }
1805
1806 static int rtw_wx_set_auth(struct net_device *dev,
1807 struct iw_request_info *info,
1808 union iwreq_data *wrqu, char *extra)
1809 {
1810 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1811 struct iw_param *param = (struct iw_param *)&(wrqu->param);
1812 int ret = 0;
1813
1814 switch (param->flags & IW_AUTH_INDEX) {
1815 case IW_AUTH_WPA_VERSION:
1816 break;
1817 case IW_AUTH_CIPHER_PAIRWISE:
1818
1819 break;
1820 case IW_AUTH_CIPHER_GROUP:
1821
1822 break;
1823 case IW_AUTH_KEY_MGMT:
1824 /*
1825 * ??? does not use these parameters
1826 */
1827 break;
1828 case IW_AUTH_TKIP_COUNTERMEASURES:
1829 if (param->value) {
1830 /* wpa_supplicant is enabling the tkip countermeasure. */
1831 padapter->securitypriv.btkip_countermeasure = true;
1832 } else {
1833 /* wpa_supplicant is disabling the tkip countermeasure. */
1834 padapter->securitypriv.btkip_countermeasure = false;
1835 }
1836 break;
1837 case IW_AUTH_DROP_UNENCRYPTED:
1838 /* HACK:
1839 *
1840 * wpa_supplicant calls set_wpa_enabled when the driver
1841 * is loaded and unloaded, regardless of if WPA is being
1842 * used. No other calls are made which can be used to
1843 * determine if encryption will be used or not prior to
1844 * association being expected. If encryption is not being
1845 * used, drop_unencrypted is set to false, else true -- we
1846 * can use this to determine if the CAP_PRIVACY_ON bit should
1847 * be set.
1848 */
1849
1850 if (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption1Enabled)
1851 break;/* it means init value, or using wep, ndisencryptstatus = Ndis802_11Encryption1Enabled, */
1852 /* then it needn't reset it; */
1853
1854 if (param->value) {
1855 padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
1856 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
1857 padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
1858 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */
1859 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeOpen;
1860 }
1861
1862 break;
1863 case IW_AUTH_80211_AUTH_ALG:
1864 /*
1865 * It's the starting point of a link layer connection using wpa_supplicant
1866 */
1867 if (check_fwstate(&padapter->mlmepriv, _FW_LINKED)) {
1868 LeaveAllPowerSaveMode(padapter);
1869 rtw_disassoc_cmd(padapter, 500, false);
1870 DBG_88E("%s...call rtw_indicate_disconnect\n ", __func__);
1871 rtw_indicate_disconnect(padapter);
1872 rtw_free_assoc_resources(padapter, 1);
1873 }
1874 ret = wpa_set_auth_algs(dev, (u32)param->value);
1875 break;
1876 case IW_AUTH_WPA_ENABLED:
1877 break;
1878 case IW_AUTH_RX_UNENCRYPTED_EAPOL:
1879 break;
1880 case IW_AUTH_PRIVACY_INVOKED:
1881 break;
1882 default:
1883 return -EOPNOTSUPP;
1884 }
1885
1886 return ret;
1887 }
1888
1889 static int rtw_wx_set_enc_ext(struct net_device *dev,
1890 struct iw_request_info *info,
1891 union iwreq_data *wrqu, char *extra)
1892 {
1893 char *alg_name;
1894 u32 param_len;
1895 struct ieee_param *param = NULL;
1896 struct iw_point *pencoding = &wrqu->encoding;
1897 struct iw_encode_ext *pext = (struct iw_encode_ext *)extra;
1898 int ret = 0;
1899
1900 param_len = sizeof(struct ieee_param) + pext->key_len;
1901 param = (struct ieee_param *)rtw_malloc(param_len);
1902 if (param == NULL)
1903 return -1;
1904
1905 memset(param, 0, param_len);
1906
1907 param->cmd = IEEE_CMD_SET_ENCRYPTION;
1908 memset(param->sta_addr, 0xff, ETH_ALEN);
1909
1910 switch (pext->alg) {
1911 case IW_ENCODE_ALG_NONE:
1912 /* todo: remove key */
1913 /* remove = 1; */
1914 alg_name = "none";
1915 break;
1916 case IW_ENCODE_ALG_WEP:
1917 alg_name = "WEP";
1918 break;
1919 case IW_ENCODE_ALG_TKIP:
1920 alg_name = "TKIP";
1921 break;
1922 case IW_ENCODE_ALG_CCMP:
1923 alg_name = "CCMP";
1924 break;
1925 default:
1926 ret = -1;
1927 goto exit;
1928 }
1929
1930 strncpy((char *)param->u.crypt.alg, alg_name, IEEE_CRYPT_ALG_NAME_LEN);
1931
1932 if (pext->ext_flags & IW_ENCODE_EXT_SET_TX_KEY)
1933 param->u.crypt.set_tx = 1;
1934
1935 /* cliW: WEP does not have group key
1936 * just not checking GROUP key setting
1937 */
1938 if ((pext->alg != IW_ENCODE_ALG_WEP) &&
1939 (pext->ext_flags & IW_ENCODE_EXT_GROUP_KEY))
1940 param->u.crypt.set_tx = 0;
1941
1942 param->u.crypt.idx = (pencoding->flags&0x00FF) - 1;
1943
1944 if (pext->ext_flags & IW_ENCODE_EXT_RX_SEQ_VALID)
1945 memcpy(param->u.crypt.seq, pext->rx_seq, 8);
1946
1947 if (pext->key_len) {
1948 param->u.crypt.key_len = pext->key_len;
1949 memcpy(param->u.crypt.key, pext + 1, pext->key_len);
1950 }
1951
1952 ret = wpa_set_encryption(dev, param, param_len);
1953
1954 exit:
1955 kfree(param);
1956 return ret;
1957 }
1958
1959 static int rtw_wx_get_nick(struct net_device *dev,
1960 struct iw_request_info *info,
1961 union iwreq_data *wrqu, char *extra)
1962 {
1963 if (extra) {
1964 wrqu->data.length = 14;
1965 wrqu->data.flags = 1;
1966 memcpy(extra, "<WIFI@REALTEK>", 14);
1967 }
1968
1969 /* dump debug info here */
1970 return 0;
1971 }
1972
1973 static int dummy(struct net_device *dev, struct iw_request_info *a,
1974 union iwreq_data *wrqu, char *b)
1975 {
1976 return -1;
1977 }
1978
1979 static int wpa_set_param(struct net_device *dev, u8 name, u32 value)
1980 {
1981 uint ret = 0;
1982 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
1983
1984 switch (name) {
1985 case IEEE_PARAM_WPA_ENABLED:
1986 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; /* 802.1x */
1987 switch ((value)&0xff) {
1988 case 1: /* WPA */
1989 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK; /* WPA_PSK */
1990 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
1991 break;
1992 case 2: /* WPA2 */
1993 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK; /* WPA2_PSK */
1994 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
1995 break;
1996 }
1997 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_,
1998 ("wpa_set_param:padapter->securitypriv.ndisauthtype =%d\n", padapter->securitypriv.ndisauthtype));
1999 break;
2000 case IEEE_PARAM_TKIP_COUNTERMEASURES:
2001 break;
2002 case IEEE_PARAM_DROP_UNENCRYPTED: {
2003 /* HACK:
2004 *
2005 * wpa_supplicant calls set_wpa_enabled when the driver
2006 * is loaded and unloaded, regardless of if WPA is being
2007 * used. No other calls are made which can be used to
2008 * determine if encryption will be used or not prior to
2009 * association being expected. If encryption is not being
2010 * used, drop_unencrypted is set to false, else true -- we
2011 * can use this to determine if the CAP_PRIVACY_ON bit should
2012 * be set.
2013 */
2014
2015 break;
2016 }
2017 case IEEE_PARAM_PRIVACY_INVOKED:
2018 break;
2019
2020 case IEEE_PARAM_AUTH_ALGS:
2021 ret = wpa_set_auth_algs(dev, value);
2022 break;
2023 case IEEE_PARAM_IEEE_802_1X:
2024 break;
2025 case IEEE_PARAM_WPAX_SELECT:
2026 break;
2027 default:
2028 ret = -EOPNOTSUPP;
2029 break;
2030 }
2031 return ret;
2032 }
2033
2034 static int wpa_mlme(struct net_device *dev, u32 command, u32 reason)
2035 {
2036 int ret = 0;
2037 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2038
2039 switch (command) {
2040 case IEEE_MLME_STA_DEAUTH:
2041 if (!rtw_set_802_11_disassociate(padapter))
2042 ret = -1;
2043 break;
2044 case IEEE_MLME_STA_DISASSOC:
2045 if (!rtw_set_802_11_disassociate(padapter))
2046 ret = -1;
2047 break;
2048 default:
2049 ret = -EOPNOTSUPP;
2050 break;
2051 }
2052
2053 return ret;
2054 }
2055
2056 static int wpa_supplicant_ioctl(struct net_device *dev, struct iw_point *p)
2057 {
2058 struct ieee_param *param;
2059 uint ret = 0;
2060
2061 if (p->length < sizeof(struct ieee_param) || !p->pointer) {
2062 ret = -EINVAL;
2063 goto out;
2064 }
2065
2066 param = (struct ieee_param *)rtw_malloc(p->length);
2067 if (param == NULL) {
2068 ret = -ENOMEM;
2069 goto out;
2070 }
2071
2072 if (copy_from_user(param, p->pointer, p->length)) {
2073 kfree(param);
2074 ret = -EFAULT;
2075 goto out;
2076 }
2077
2078 switch (param->cmd) {
2079 case IEEE_CMD_SET_WPA_PARAM:
2080 ret = wpa_set_param(dev, param->u.wpa_param.name, param->u.wpa_param.value);
2081 break;
2082
2083 case IEEE_CMD_SET_WPA_IE:
2084 ret = rtw_set_wpa_ie((struct adapter *)rtw_netdev_priv(dev),
2085 (char *)param->u.wpa_ie.data, (u16)param->u.wpa_ie.len);
2086 break;
2087
2088 case IEEE_CMD_SET_ENCRYPTION:
2089 ret = wpa_set_encryption(dev, param, p->length);
2090 break;
2091
2092 case IEEE_CMD_MLME:
2093 ret = wpa_mlme(dev, param->u.mlme.command, param->u.mlme.reason_code);
2094 break;
2095
2096 default:
2097 DBG_88E("Unknown WPA supplicant request: %d\n", param->cmd);
2098 ret = -EOPNOTSUPP;
2099 break;
2100 }
2101
2102 if (ret == 0 && copy_to_user(p->pointer, param, p->length))
2103 ret = -EFAULT;
2104
2105 kfree(param);
2106
2107 out:
2108
2109 return ret;
2110 }
2111
2112 #ifdef CONFIG_88EU_AP_MODE
2113 static u8 set_pairwise_key(struct adapter *padapter, struct sta_info *psta)
2114 {
2115 struct cmd_obj *ph2c;
2116 struct set_stakey_parm *psetstakey_para;
2117 struct cmd_priv *pcmdpriv = &padapter->cmdpriv;
2118 u8 res = _SUCCESS;
2119
2120 ph2c = kzalloc(sizeof(struct cmd_obj), GFP_KERNEL);
2121 if (ph2c == NULL) {
2122 res = _FAIL;
2123 goto exit;
2124 }
2125
2126 psetstakey_para = kzalloc(sizeof(struct set_stakey_parm), GFP_KERNEL);
2127 if (psetstakey_para == NULL) {
2128 kfree(ph2c);
2129 res = _FAIL;
2130 goto exit;
2131 }
2132
2133 init_h2fwcmd_w_parm_no_rsp(ph2c, psetstakey_para, _SetStaKey_CMD_);
2134
2135 psetstakey_para->algorithm = (u8)psta->dot118021XPrivacy;
2136
2137 memcpy(psetstakey_para->addr, psta->hwaddr, ETH_ALEN);
2138
2139 memcpy(psetstakey_para->key, &psta->dot118021x_UncstKey, 16);
2140
2141 res = rtw_enqueue_cmd(pcmdpriv, ph2c);
2142
2143 exit:
2144
2145 return res;
2146 }
2147
2148 static int set_group_key(struct adapter *padapter, u8 *key, u8 alg, int keyid)
2149 {
2150 u8 keylen;
2151 struct cmd_obj *pcmd;
2152 struct setkey_parm *psetkeyparm;
2153 struct cmd_priv *pcmdpriv = &(padapter->cmdpriv);
2154 int res = _SUCCESS;
2155
2156 DBG_88E("%s\n", __func__);
2157
2158 pcmd = kzalloc(sizeof(struct cmd_obj), GFP_KERNEL);
2159 if (pcmd == NULL) {
2160 res = _FAIL;
2161 goto exit;
2162 }
2163 psetkeyparm = kzalloc(sizeof(struct setkey_parm), GFP_KERNEL);
2164 if (psetkeyparm == NULL) {
2165 kfree(pcmd);
2166 res = _FAIL;
2167 goto exit;
2168 }
2169
2170 memset(psetkeyparm, 0, sizeof(struct setkey_parm));
2171
2172 psetkeyparm->keyid = (u8)keyid;
2173
2174 psetkeyparm->algorithm = alg;
2175
2176 psetkeyparm->set_tx = 1;
2177
2178 switch (alg) {
2179 case _WEP40_:
2180 keylen = 5;
2181 break;
2182 case _WEP104_:
2183 keylen = 13;
2184 break;
2185 case _TKIP_:
2186 case _TKIP_WTMIC_:
2187 case _AES_:
2188 default:
2189 keylen = 16;
2190 }
2191
2192 memcpy(&(psetkeyparm->key[0]), key, keylen);
2193
2194 pcmd->cmdcode = _SetKey_CMD_;
2195 pcmd->parmbuf = (u8 *)psetkeyparm;
2196 pcmd->cmdsz = (sizeof(struct setkey_parm));
2197 pcmd->rsp = NULL;
2198 pcmd->rspsz = 0;
2199
2200 INIT_LIST_HEAD(&pcmd->list);
2201
2202 res = rtw_enqueue_cmd(pcmdpriv, pcmd);
2203
2204 exit:
2205
2206 return res;
2207 }
2208
2209 static int set_wep_key(struct adapter *padapter, u8 *key, u8 keylen, int keyid)
2210 {
2211 u8 alg;
2212
2213 switch (keylen) {
2214 case 5:
2215 alg = _WEP40_;
2216 break;
2217 case 13:
2218 alg = _WEP104_;
2219 break;
2220 default:
2221 alg = _NO_PRIVACY_;
2222 }
2223
2224 return set_group_key(padapter, key, alg, keyid);
2225 }
2226
2227 static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len)
2228 {
2229 int ret = 0;
2230 u32 wep_key_idx, wep_key_len, wep_total_len;
2231 struct ndis_802_11_wep *pwep = NULL;
2232 struct sta_info *psta = NULL, *pbcmc_sta = NULL;
2233 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2234 struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
2235 struct security_priv *psecuritypriv = &(padapter->securitypriv);
2236 struct sta_priv *pstapriv = &padapter->stapriv;
2237
2238 DBG_88E("%s\n", __func__);
2239 param->u.crypt.err = 0;
2240 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
2241 if (param_len != sizeof(struct ieee_param) + param->u.crypt.key_len) {
2242 ret = -EINVAL;
2243 goto exit;
2244 }
2245 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
2246 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
2247 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
2248 if (param->u.crypt.idx >= WEP_KEYS) {
2249 ret = -EINVAL;
2250 goto exit;
2251 }
2252 } else {
2253 psta = rtw_get_stainfo(pstapriv, param->sta_addr);
2254 if (!psta) {
2255 DBG_88E("rtw_set_encryption(), sta has already been removed or never been added\n");
2256 goto exit;
2257 }
2258 }
2259
2260 if (strcmp(param->u.crypt.alg, "none") == 0 && (psta == NULL)) {
2261 /* todo:clear default encryption keys */
2262
2263 DBG_88E("clear default encryption keys, keyid =%d\n", param->u.crypt.idx);
2264 goto exit;
2265 }
2266 if (strcmp(param->u.crypt.alg, "WEP") == 0 && (psta == NULL)) {
2267 DBG_88E("r871x_set_encryption, crypt.alg = WEP\n");
2268 wep_key_idx = param->u.crypt.idx;
2269 wep_key_len = param->u.crypt.key_len;
2270 DBG_88E("r871x_set_encryption, wep_key_idx=%d, len=%d\n", wep_key_idx, wep_key_len);
2271 if ((wep_key_idx >= WEP_KEYS) || (wep_key_len <= 0)) {
2272 ret = -EINVAL;
2273 goto exit;
2274 }
2275
2276 if (wep_key_len > 0) {
2277 wep_key_len = wep_key_len <= 5 ? 5 : 13;
2278 wep_total_len = wep_key_len + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial);
2279 pwep = (struct ndis_802_11_wep *)rtw_malloc(wep_total_len);
2280 if (pwep == NULL) {
2281 DBG_88E(" r871x_set_encryption: pwep allocate fail !!!\n");
2282 goto exit;
2283 }
2284
2285 memset(pwep, 0, wep_total_len);
2286
2287 pwep->KeyLength = wep_key_len;
2288 pwep->Length = wep_total_len;
2289 }
2290
2291 pwep->KeyIndex = wep_key_idx;
2292
2293 memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength);
2294
2295 if (param->u.crypt.set_tx) {
2296 DBG_88E("wep, set_tx = 1\n");
2297
2298 psecuritypriv->ndisencryptstatus = Ndis802_11Encryption1Enabled;
2299 psecuritypriv->dot11PrivacyAlgrthm = _WEP40_;
2300 psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
2301
2302 if (pwep->KeyLength == 13) {
2303 psecuritypriv->dot11PrivacyAlgrthm = _WEP104_;
2304 psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
2305 }
2306
2307 psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx;
2308
2309 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
2310
2311 psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
2312
2313 set_wep_key(padapter, pwep->KeyMaterial, pwep->KeyLength, wep_key_idx);
2314 } else {
2315 DBG_88E("wep, set_tx = 0\n");
2316
2317 /* don't update "psecuritypriv->dot11PrivacyAlgrthm" and */
2318 /* psecuritypriv->dot11PrivacyKeyIndex = keyid", but can rtw_set_key to cam */
2319
2320 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
2321
2322 psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
2323
2324 set_wep_key(padapter, pwep->KeyMaterial, pwep->KeyLength, wep_key_idx);
2325 }
2326
2327 goto exit;
2328 }
2329
2330 if (!psta && check_fwstate(pmlmepriv, WIFI_AP_STATE)) { /* group key */
2331 if (param->u.crypt.set_tx == 1) {
2332 if (strcmp(param->u.crypt.alg, "WEP") == 0) {
2333 DBG_88E("%s, set group_key, WEP\n", __func__);
2334
2335 memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
2336 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
2337
2338 psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
2339 if (param->u.crypt.key_len == 13)
2340 psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
2341 } else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
2342 DBG_88E("%s, set group_key, TKIP\n", __func__);
2343 psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
2344 memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
2345 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
2346 /* set mic key */
2347 memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
2348 memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
2349
2350 psecuritypriv->busetkipkey = true;
2351 } else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
2352 DBG_88E("%s, set group_key, CCMP\n", __func__);
2353 psecuritypriv->dot118021XGrpPrivacy = _AES_;
2354 memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
2355 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
2356 } else {
2357 DBG_88E("%s, set group_key, none\n", __func__);
2358 psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
2359 }
2360 psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx;
2361 psecuritypriv->binstallGrpkey = true;
2362 psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/* */
2363 set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx);
2364 pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
2365 if (pbcmc_sta) {
2366 pbcmc_sta->ieee8021x_blocked = false;
2367 pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */
2368 }
2369 }
2370 goto exit;
2371 }
2372
2373 if (psecuritypriv->dot11AuthAlgrthm == dot11AuthAlgrthm_8021X && psta) { /* psk/802_1x */
2374 if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) {
2375 if (param->u.crypt.set_tx == 1) {
2376 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
2377
2378 if (strcmp(param->u.crypt.alg, "WEP") == 0) {
2379 DBG_88E("%s, set pairwise key, WEP\n", __func__);
2380
2381 psta->dot118021XPrivacy = _WEP40_;
2382 if (param->u.crypt.key_len == 13)
2383 psta->dot118021XPrivacy = _WEP104_;
2384 } else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
2385 DBG_88E("%s, set pairwise key, TKIP\n", __func__);
2386
2387 psta->dot118021XPrivacy = _TKIP_;
2388
2389 /* set mic key */
2390 memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
2391 memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
2392
2393 psecuritypriv->busetkipkey = true;
2394 } else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
2395 DBG_88E("%s, set pairwise key, CCMP\n", __func__);
2396
2397 psta->dot118021XPrivacy = _AES_;
2398 } else {
2399 DBG_88E("%s, set pairwise key, none\n", __func__);
2400
2401 psta->dot118021XPrivacy = _NO_PRIVACY_;
2402 }
2403
2404 set_pairwise_key(padapter, psta);
2405
2406 psta->ieee8021x_blocked = false;
2407 } else { /* group key??? */
2408 if (strcmp(param->u.crypt.alg, "WEP") == 0) {
2409 memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
2410 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
2411 psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
2412 if (param->u.crypt.key_len == 13)
2413 psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
2414 } else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
2415 psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
2416
2417 memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
2418 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
2419
2420 /* set mic key */
2421 memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
2422 memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
2423
2424 psecuritypriv->busetkipkey = true;
2425 } else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
2426 psecuritypriv->dot118021XGrpPrivacy = _AES_;
2427
2428 memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey,
2429 param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
2430 } else {
2431 psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
2432 }
2433
2434 psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx;
2435
2436 psecuritypriv->binstallGrpkey = true;
2437
2438 psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/* */
2439
2440 set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx);
2441
2442 pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
2443 if (pbcmc_sta) {
2444 pbcmc_sta->ieee8021x_blocked = false;
2445 pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */
2446 }
2447 }
2448 }
2449 }
2450
2451 exit:
2452
2453 kfree(pwep);
2454
2455 return ret;
2456 }
2457
2458 static int rtw_set_beacon(struct net_device *dev, struct ieee_param *param, int len)
2459 {
2460 int ret = 0;
2461 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2462 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2463 struct sta_priv *pstapriv = &padapter->stapriv;
2464 unsigned char *pbuf = param->u.bcn_ie.buf;
2465
2466 DBG_88E("%s, len =%d\n", __func__, len);
2467
2468 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
2469 return -EINVAL;
2470
2471 memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2);
2472
2473 if ((pstapriv->max_num_sta > NUM_STA) || (pstapriv->max_num_sta <= 0))
2474 pstapriv->max_num_sta = NUM_STA;
2475
2476 if (rtw_check_beacon_data(padapter, pbuf, (len-12-2)) == _SUCCESS)/* 12 = param header, 2:no packed */
2477 ret = 0;
2478 else
2479 ret = -EINVAL;
2480
2481 return ret;
2482 }
2483
2484 static int rtw_hostapd_sta_flush(struct net_device *dev)
2485 {
2486 int ret = 0;
2487 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2488
2489 DBG_88E("%s\n", __func__);
2490
2491 flush_all_cam_entry(padapter); /* clear CAM */
2492
2493 ret = rtw_sta_flush(padapter);
2494
2495 return ret;
2496 }
2497
2498 static int rtw_add_sta(struct net_device *dev, struct ieee_param *param)
2499 {
2500 int ret = 0;
2501 struct sta_info *psta = NULL;
2502 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2503 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2504 struct sta_priv *pstapriv = &padapter->stapriv;
2505
2506 DBG_88E("rtw_add_sta(aid =%d) =%pM\n", param->u.add_sta.aid, (param->sta_addr));
2507
2508 if (!check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)))
2509 return -EINVAL;
2510
2511 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
2512 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
2513 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff)
2514 return -EINVAL;
2515
2516 psta = rtw_get_stainfo(pstapriv, param->sta_addr);
2517 if (psta) {
2518 int flags = param->u.add_sta.flags;
2519
2520 psta->aid = param->u.add_sta.aid;/* aid = 1~2007 */
2521
2522 memcpy(psta->bssrateset, param->u.add_sta.tx_supp_rates, 16);
2523
2524 /* check wmm cap. */
2525 if (WLAN_STA_WME&flags)
2526 psta->qos_option = 1;
2527 else
2528 psta->qos_option = 0;
2529
2530 if (pmlmepriv->qospriv.qos_option == 0)
2531 psta->qos_option = 0;
2532
2533 /* chec 802.11n ht cap. */
2534 if (WLAN_STA_HT&flags) {
2535 psta->htpriv.ht_option = true;
2536 psta->qos_option = 1;
2537 memcpy((void *)&psta->htpriv.ht_cap, (void *)&param->u.add_sta.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
2538 } else {
2539 psta->htpriv.ht_option = false;
2540 }
2541
2542 if (pmlmepriv->htpriv.ht_option == false)
2543 psta->htpriv.ht_option = false;
2544
2545 update_sta_info_apmode(padapter, psta);
2546 } else {
2547 ret = -ENOMEM;
2548 }
2549
2550 return ret;
2551 }
2552
2553 static int rtw_del_sta(struct net_device *dev, struct ieee_param *param)
2554 {
2555 int ret = 0;
2556 struct sta_info *psta = NULL;
2557 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2558 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2559 struct sta_priv *pstapriv = &padapter->stapriv;
2560 int updated = 0;
2561
2562 DBG_88E("rtw_del_sta =%pM\n", (param->sta_addr));
2563
2564 if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
2565 return -EINVAL;
2566
2567 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
2568 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
2569 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff)
2570 return -EINVAL;
2571
2572 psta = rtw_get_stainfo(pstapriv, param->sta_addr);
2573 if (psta) {
2574 spin_lock_bh(&pstapriv->asoc_list_lock);
2575 if (!list_empty(&psta->asoc_list)) {
2576 list_del_init(&psta->asoc_list);
2577 pstapriv->asoc_list_cnt--;
2578 updated = ap_free_sta(padapter, psta, true, WLAN_REASON_DEAUTH_LEAVING);
2579 }
2580 spin_unlock_bh(&pstapriv->asoc_list_lock);
2581 associated_clients_update(padapter, updated);
2582 psta = NULL;
2583 } else {
2584 DBG_88E("rtw_del_sta(), sta has already been removed or never been added\n");
2585 }
2586
2587 return ret;
2588 }
2589
2590 static int rtw_ioctl_get_sta_data(struct net_device *dev, struct ieee_param *param, int len)
2591 {
2592 int ret = 0;
2593 struct sta_info *psta = NULL;
2594 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2595 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2596 struct sta_priv *pstapriv = &padapter->stapriv;
2597 struct ieee_param_ex *param_ex = (struct ieee_param_ex *)param;
2598 struct sta_data *psta_data = (struct sta_data *)param_ex->data;
2599
2600 DBG_88E("rtw_ioctl_get_sta_info, sta_addr: %pM\n", (param_ex->sta_addr));
2601
2602 if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
2603 return -EINVAL;
2604
2605 if (param_ex->sta_addr[0] == 0xff && param_ex->sta_addr[1] == 0xff &&
2606 param_ex->sta_addr[2] == 0xff && param_ex->sta_addr[3] == 0xff &&
2607 param_ex->sta_addr[4] == 0xff && param_ex->sta_addr[5] == 0xff)
2608 return -EINVAL;
2609
2610 psta = rtw_get_stainfo(pstapriv, param_ex->sta_addr);
2611 if (psta) {
2612 psta_data->aid = (u16)psta->aid;
2613 psta_data->capability = psta->capability;
2614 psta_data->flags = psta->flags;
2615
2616 /*
2617 nonerp_set : BIT(0)
2618 no_short_slot_time_set : BIT(1)
2619 no_short_preamble_set : BIT(2)
2620 no_ht_gf_set : BIT(3)
2621 no_ht_set : BIT(4)
2622 ht_20mhz_set : BIT(5)
2623 */
2624
2625 psta_data->sta_set = ((psta->nonerp_set) |
2626 (psta->no_short_slot_time_set << 1) |
2627 (psta->no_short_preamble_set << 2) |
2628 (psta->no_ht_gf_set << 3) |
2629 (psta->no_ht_set << 4) |
2630 (psta->ht_20mhz_set << 5));
2631 psta_data->tx_supp_rates_len = psta->bssratelen;
2632 memcpy(psta_data->tx_supp_rates, psta->bssrateset, psta->bssratelen);
2633 memcpy(&psta_data->ht_cap, &psta->htpriv.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
2634 psta_data->rx_pkts = psta->sta_stats.rx_data_pkts;
2635 psta_data->rx_bytes = psta->sta_stats.rx_bytes;
2636 psta_data->rx_drops = psta->sta_stats.rx_drops;
2637 psta_data->tx_pkts = psta->sta_stats.tx_pkts;
2638 psta_data->tx_bytes = psta->sta_stats.tx_bytes;
2639 psta_data->tx_drops = psta->sta_stats.tx_drops;
2640 } else {
2641 ret = -1;
2642 }
2643
2644 return ret;
2645 }
2646
2647 static int rtw_get_sta_wpaie(struct net_device *dev, struct ieee_param *param)
2648 {
2649 int ret = 0;
2650 struct sta_info *psta = NULL;
2651 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2652 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2653 struct sta_priv *pstapriv = &padapter->stapriv;
2654
2655 DBG_88E("rtw_get_sta_wpaie, sta_addr: %pM\n", (param->sta_addr));
2656
2657 if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
2658 return -EINVAL;
2659
2660 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
2661 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
2662 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff)
2663 return -EINVAL;
2664
2665 psta = rtw_get_stainfo(pstapriv, param->sta_addr);
2666 if (psta) {
2667 if ((psta->wpa_ie[0] == WLAN_EID_RSN) || (psta->wpa_ie[0] == WLAN_EID_GENERIC)) {
2668 int wpa_ie_len;
2669 int copy_len;
2670
2671 wpa_ie_len = psta->wpa_ie[1];
2672 copy_len = ((wpa_ie_len+2) > sizeof(psta->wpa_ie)) ? (sizeof(psta->wpa_ie)) : (wpa_ie_len+2);
2673 param->u.wpa_ie.len = copy_len;
2674 memcpy(param->u.wpa_ie.reserved, psta->wpa_ie, copy_len);
2675 } else {
2676 DBG_88E("sta's wpa_ie is NONE\n");
2677 }
2678 } else {
2679 ret = -1;
2680 }
2681
2682 return ret;
2683 }
2684
2685 static int rtw_set_wps_beacon(struct net_device *dev, struct ieee_param *param, int len)
2686 {
2687 int ret = 0;
2688 unsigned char wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
2689 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2690 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2691 struct mlme_ext_priv *pmlmeext = &(padapter->mlmeextpriv);
2692 int ie_len;
2693
2694 DBG_88E("%s, len =%d\n", __func__, len);
2695
2696 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
2697 return -EINVAL;
2698
2699 ie_len = len-12-2;/* 12 = param header, 2:no packed */
2700
2701 kfree(pmlmepriv->wps_beacon_ie);
2702 pmlmepriv->wps_beacon_ie = NULL;
2703
2704 if (ie_len > 0) {
2705 pmlmepriv->wps_beacon_ie = rtw_malloc(ie_len);
2706 pmlmepriv->wps_beacon_ie_len = ie_len;
2707 if (pmlmepriv->wps_beacon_ie == NULL) {
2708 DBG_88E("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
2709 return -EINVAL;
2710 }
2711
2712 memcpy(pmlmepriv->wps_beacon_ie, param->u.bcn_ie.buf, ie_len);
2713
2714 update_beacon(padapter, _VENDOR_SPECIFIC_IE_, wps_oui, true);
2715
2716 pmlmeext->bstart_bss = true;
2717 }
2718
2719 return ret;
2720 }
2721
2722 static int rtw_set_wps_probe_resp(struct net_device *dev, struct ieee_param *param, int len)
2723 {
2724 int ret = 0;
2725 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2726 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2727 int ie_len;
2728
2729 DBG_88E("%s, len =%d\n", __func__, len);
2730
2731 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
2732 return -EINVAL;
2733
2734 ie_len = len-12-2;/* 12 = param header, 2:no packed */
2735
2736 kfree(pmlmepriv->wps_probe_resp_ie);
2737 pmlmepriv->wps_probe_resp_ie = NULL;
2738
2739 if (ie_len > 0) {
2740 pmlmepriv->wps_probe_resp_ie = rtw_malloc(ie_len);
2741 pmlmepriv->wps_probe_resp_ie_len = ie_len;
2742 if (pmlmepriv->wps_probe_resp_ie == NULL) {
2743 DBG_88E("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
2744 return -EINVAL;
2745 }
2746 memcpy(pmlmepriv->wps_probe_resp_ie, param->u.bcn_ie.buf, ie_len);
2747 }
2748
2749 return ret;
2750 }
2751
2752 static int rtw_set_wps_assoc_resp(struct net_device *dev, struct ieee_param *param, int len)
2753 {
2754 int ret = 0;
2755 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2756 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2757 int ie_len;
2758
2759 DBG_88E("%s, len =%d\n", __func__, len);
2760
2761 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
2762 return -EINVAL;
2763
2764 ie_len = len-12-2;/* 12 = param header, 2:no packed */
2765
2766 kfree(pmlmepriv->wps_assoc_resp_ie);
2767 pmlmepriv->wps_assoc_resp_ie = NULL;
2768
2769 if (ie_len > 0) {
2770 pmlmepriv->wps_assoc_resp_ie = rtw_malloc(ie_len);
2771 pmlmepriv->wps_assoc_resp_ie_len = ie_len;
2772 if (pmlmepriv->wps_assoc_resp_ie == NULL) {
2773 DBG_88E("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
2774 return -EINVAL;
2775 }
2776
2777 memcpy(pmlmepriv->wps_assoc_resp_ie, param->u.bcn_ie.buf, ie_len);
2778 }
2779
2780 return ret;
2781 }
2782
2783 static int rtw_set_hidden_ssid(struct net_device *dev, struct ieee_param *param, int len)
2784 {
2785 int ret = 0;
2786 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2787 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2788 struct mlme_ext_priv *pmlmeext = &(padapter->mlmeextpriv);
2789 struct mlme_ext_info *pmlmeinfo = &(pmlmeext->mlmext_info);
2790
2791 u8 value;
2792
2793 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
2794 return -EINVAL;
2795
2796 if (param->u.wpa_param.name != 0) /* dummy test... */
2797 DBG_88E("%s name(%u) != 0\n", __func__, param->u.wpa_param.name);
2798 value = param->u.wpa_param.value;
2799
2800 /* use the same definition of hostapd's ignore_broadcast_ssid */
2801 if (value != 1 && value != 2)
2802 value = 0;
2803 DBG_88E("%s value(%u)\n", __func__, value);
2804 pmlmeinfo->hidden_ssid_mode = value;
2805 return ret;
2806 }
2807
2808 static int rtw_ioctl_acl_remove_sta(struct net_device *dev, struct ieee_param *param, int len)
2809 {
2810 int ret = 0;
2811 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2812 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2813
2814 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
2815 return -EINVAL;
2816
2817 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
2818 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
2819 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff)
2820 return -EINVAL;
2821 ret = rtw_acl_remove_sta(padapter, param->sta_addr);
2822 return ret;
2823 }
2824
2825 static int rtw_ioctl_acl_add_sta(struct net_device *dev, struct ieee_param *param, int len)
2826 {
2827 int ret = 0;
2828 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2829 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2830
2831 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
2832 return -EINVAL;
2833
2834 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
2835 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
2836 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff)
2837 return -EINVAL;
2838 ret = rtw_acl_add_sta(padapter, param->sta_addr);
2839 return ret;
2840 }
2841
2842 static int rtw_ioctl_set_macaddr_acl(struct net_device *dev, struct ieee_param *param, int len)
2843 {
2844 int ret = 0;
2845 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2846 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2847
2848 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
2849 return -EINVAL;
2850
2851 rtw_set_macaddr_acl(padapter, param->u.mlme.command);
2852
2853 return ret;
2854 }
2855
2856 static int rtw_hostapd_ioctl(struct net_device *dev, struct iw_point *p)
2857 {
2858 struct ieee_param *param;
2859 int ret = 0;
2860 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2861
2862 /*
2863 * this function is expect to call in master mode, which allows no power saving
2864 * so, we just check hw_init_completed
2865 */
2866
2867 if (!padapter->hw_init_completed) {
2868 ret = -EPERM;
2869 goto out;
2870 }
2871
2872 if (!p->pointer) {
2873 ret = -EINVAL;
2874 goto out;
2875 }
2876
2877 param = (struct ieee_param *)rtw_malloc(p->length);
2878 if (param == NULL) {
2879 ret = -ENOMEM;
2880 goto out;
2881 }
2882
2883 if (copy_from_user(param, p->pointer, p->length)) {
2884 kfree(param);
2885 ret = -EFAULT;
2886 goto out;
2887 }
2888
2889 switch (param->cmd) {
2890 case RTL871X_HOSTAPD_FLUSH:
2891 ret = rtw_hostapd_sta_flush(dev);
2892 break;
2893 case RTL871X_HOSTAPD_ADD_STA:
2894 ret = rtw_add_sta(dev, param);
2895 break;
2896 case RTL871X_HOSTAPD_REMOVE_STA:
2897 ret = rtw_del_sta(dev, param);
2898 break;
2899 case RTL871X_HOSTAPD_SET_BEACON:
2900 ret = rtw_set_beacon(dev, param, p->length);
2901 break;
2902 case RTL871X_SET_ENCRYPTION:
2903 ret = rtw_set_encryption(dev, param, p->length);
2904 break;
2905 case RTL871X_HOSTAPD_GET_WPAIE_STA:
2906 ret = rtw_get_sta_wpaie(dev, param);
2907 break;
2908 case RTL871X_HOSTAPD_SET_WPS_BEACON:
2909 ret = rtw_set_wps_beacon(dev, param, p->length);
2910 break;
2911 case RTL871X_HOSTAPD_SET_WPS_PROBE_RESP:
2912 ret = rtw_set_wps_probe_resp(dev, param, p->length);
2913 break;
2914 case RTL871X_HOSTAPD_SET_WPS_ASSOC_RESP:
2915 ret = rtw_set_wps_assoc_resp(dev, param, p->length);
2916 break;
2917 case RTL871X_HOSTAPD_SET_HIDDEN_SSID:
2918 ret = rtw_set_hidden_ssid(dev, param, p->length);
2919 break;
2920 case RTL871X_HOSTAPD_GET_INFO_STA:
2921 ret = rtw_ioctl_get_sta_data(dev, param, p->length);
2922 break;
2923 case RTL871X_HOSTAPD_SET_MACADDR_ACL:
2924 ret = rtw_ioctl_set_macaddr_acl(dev, param, p->length);
2925 break;
2926 case RTL871X_HOSTAPD_ACL_ADD_STA:
2927 ret = rtw_ioctl_acl_add_sta(dev, param, p->length);
2928 break;
2929 case RTL871X_HOSTAPD_ACL_REMOVE_STA:
2930 ret = rtw_ioctl_acl_remove_sta(dev, param, p->length);
2931 break;
2932 default:
2933 DBG_88E("Unknown hostapd request: %d\n", param->cmd);
2934 ret = -EOPNOTSUPP;
2935 break;
2936 }
2937
2938 if (ret == 0 && copy_to_user(p->pointer, param, p->length))
2939 ret = -EFAULT;
2940 kfree(param);
2941 out:
2942 return ret;
2943 }
2944 #endif
2945
2946 #include <rtw_android.h>
2947 static int rtw_wx_set_priv(struct net_device *dev,
2948 struct iw_request_info *info,
2949 union iwreq_data *awrq,
2950 char *extra)
2951 {
2952 int ret = 0;
2953 int len = 0;
2954 char *ext;
2955 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
2956 struct iw_point *dwrq = (struct iw_point *)awrq;
2957
2958 if (dwrq->length == 0)
2959 return -EFAULT;
2960
2961 len = dwrq->length;
2962 ext = vmalloc(len);
2963 if (!ext)
2964 return -ENOMEM;
2965
2966 if (copy_from_user(ext, dwrq->pointer, len)) {
2967 vfree(ext);
2968 return -EFAULT;
2969 }
2970
2971 /* added for wps2.0 @20110524 */
2972 if (dwrq->flags == 0x8766 && len > 8) {
2973 u32 cp_sz;
2974 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2975 u8 *probereq_wpsie = ext;
2976 int probereq_wpsie_len = len;
2977 u8 wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
2978
2979 if ((_VENDOR_SPECIFIC_IE_ == probereq_wpsie[0]) &&
2980 (!memcmp(&probereq_wpsie[2], wps_oui, 4))) {
2981 cp_sz = probereq_wpsie_len > MAX_WPS_IE_LEN ? MAX_WPS_IE_LEN : probereq_wpsie_len;
2982
2983 pmlmepriv->wps_probe_req_ie_len = 0;
2984 kfree(pmlmepriv->wps_probe_req_ie);
2985 pmlmepriv->wps_probe_req_ie = NULL;
2986
2987 pmlmepriv->wps_probe_req_ie = rtw_malloc(cp_sz);
2988 if (pmlmepriv->wps_probe_req_ie == NULL) {
2989 pr_info("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
2990 ret = -EINVAL;
2991 goto FREE_EXT;
2992 }
2993 memcpy(pmlmepriv->wps_probe_req_ie, probereq_wpsie, cp_sz);
2994 pmlmepriv->wps_probe_req_ie_len = cp_sz;
2995 }
2996 goto FREE_EXT;
2997 }
2998
2999 if (len >= WEXT_CSCAN_HEADER_SIZE &&
3000 !memcmp(ext, WEXT_CSCAN_HEADER, WEXT_CSCAN_HEADER_SIZE)) {
3001 ret = rtw_wx_set_scan(dev, info, awrq, ext);
3002 goto FREE_EXT;
3003 }
3004
3005 FREE_EXT:
3006
3007 vfree(ext);
3008
3009 return ret;
3010 }
3011
3012 static iw_handler rtw_handlers[] = {
3013 NULL, /* SIOCSIWCOMMIT */
3014 rtw_wx_get_name, /* SIOCGIWNAME */
3015 dummy, /* SIOCSIWNWID */
3016 dummy, /* SIOCGIWNWID */
3017 rtw_wx_set_freq, /* SIOCSIWFREQ */
3018 rtw_wx_get_freq, /* SIOCGIWFREQ */
3019 rtw_wx_set_mode, /* SIOCSIWMODE */
3020 rtw_wx_get_mode, /* SIOCGIWMODE */
3021 dummy, /* SIOCSIWSENS */
3022 rtw_wx_get_sens, /* SIOCGIWSENS */
3023 NULL, /* SIOCSIWRANGE */
3024 rtw_wx_get_range, /* SIOCGIWRANGE */
3025 rtw_wx_set_priv, /* SIOCSIWPRIV */
3026 NULL, /* SIOCGIWPRIV */
3027 NULL, /* SIOCSIWSTATS */
3028 NULL, /* SIOCGIWSTATS */
3029 dummy, /* SIOCSIWSPY */
3030 dummy, /* SIOCGIWSPY */
3031 NULL, /* SIOCGIWTHRSPY */
3032 NULL, /* SIOCWIWTHRSPY */
3033 rtw_wx_set_wap, /* SIOCSIWAP */
3034 rtw_wx_get_wap, /* SIOCGIWAP */
3035 rtw_wx_set_mlme, /* request MLME operation; uses struct iw_mlme */
3036 dummy, /* SIOCGIWAPLIST -- depricated */
3037 rtw_wx_set_scan, /* SIOCSIWSCAN */
3038 rtw_wx_get_scan, /* SIOCGIWSCAN */
3039 rtw_wx_set_essid, /* SIOCSIWESSID */
3040 rtw_wx_get_essid, /* SIOCGIWESSID */
3041 dummy, /* SIOCSIWNICKN */
3042 rtw_wx_get_nick, /* SIOCGIWNICKN */
3043 NULL, /* -- hole -- */
3044 NULL, /* -- hole -- */
3045 rtw_wx_set_rate, /* SIOCSIWRATE */
3046 rtw_wx_get_rate, /* SIOCGIWRATE */
3047 rtw_wx_set_rts, /* SIOCSIWRTS */
3048 rtw_wx_get_rts, /* SIOCGIWRTS */
3049 rtw_wx_set_frag, /* SIOCSIWFRAG */
3050 rtw_wx_get_frag, /* SIOCGIWFRAG */
3051 dummy, /* SIOCSIWTXPOW */
3052 dummy, /* SIOCGIWTXPOW */
3053 dummy, /* SIOCSIWRETRY */
3054 rtw_wx_get_retry, /* SIOCGIWRETRY */
3055 rtw_wx_set_enc, /* SIOCSIWENCODE */
3056 rtw_wx_get_enc, /* SIOCGIWENCODE */
3057 dummy, /* SIOCSIWPOWER */
3058 rtw_wx_get_power, /* SIOCGIWPOWER */
3059 NULL, /*---hole---*/
3060 NULL, /*---hole---*/
3061 rtw_wx_set_gen_ie, /* SIOCSIWGENIE */
3062 NULL, /* SIOCGWGENIE */
3063 rtw_wx_set_auth, /* SIOCSIWAUTH */
3064 NULL, /* SIOCGIWAUTH */
3065 rtw_wx_set_enc_ext, /* SIOCSIWENCODEEXT */
3066 NULL, /* SIOCGIWENCODEEXT */
3067 rtw_wx_set_pmkid, /* SIOCSIWPMKSA */
3068 NULL, /*---hole---*/
3069 };
3070
3071 static struct iw_statistics *rtw_get_wireless_stats(struct net_device *dev)
3072 {
3073 struct adapter *padapter = (struct adapter *)rtw_netdev_priv(dev);
3074 struct iw_statistics *piwstats = &padapter->iwstats;
3075 int tmp_level = 0;
3076 int tmp_qual = 0;
3077 int tmp_noise = 0;
3078
3079 if (!check_fwstate(&padapter->mlmepriv, _FW_LINKED)) {
3080 piwstats->qual.qual = 0;
3081 piwstats->qual.level = 0;
3082 piwstats->qual.noise = 0;
3083 } else {
3084 tmp_level = padapter->recvpriv.signal_strength;
3085 tmp_qual = padapter->recvpriv.signal_qual;
3086 tmp_noise = padapter->recvpriv.noise;
3087
3088 piwstats->qual.level = tmp_level;
3089 piwstats->qual.qual = tmp_qual;
3090 piwstats->qual.noise = tmp_noise;
3091 }
3092 piwstats->qual.updated = IW_QUAL_ALL_UPDATED;/* IW_QUAL_DBM; */
3093 return &padapter->iwstats;
3094 }
3095
3096 struct iw_handler_def rtw_handlers_def = {
3097 .standard = rtw_handlers,
3098 .num_standard = sizeof(rtw_handlers) / sizeof(iw_handler),
3099 .get_wireless_stats = rtw_get_wireless_stats,
3100 };
3101
3102 #include <rtw_android.h>
3103 int rtw_ioctl(struct net_device *dev, struct ifreq *rq, int cmd)
3104 {
3105 struct iwreq *wrq = (struct iwreq *)rq;
3106 int ret = 0;
3107
3108 switch (cmd) {
3109 case RTL_IOCTL_WPA_SUPPLICANT:
3110 ret = wpa_supplicant_ioctl(dev, &wrq->u.data);
3111 break;
3112 #ifdef CONFIG_88EU_AP_MODE
3113 case RTL_IOCTL_HOSTAPD:
3114 ret = rtw_hostapd_ioctl(dev, &wrq->u.data);
3115 break;
3116 #endif /* CONFIG_88EU_AP_MODE */
3117 case (SIOCDEVPRIVATE+1):
3118 ret = rtw_android_priv_cmd(dev, rq, cmd);
3119 break;
3120 default:
3121 ret = -EOPNOTSUPP;
3122 break;
3123 }
3124 return ret;
3125 }