2 * Copyright (c) 1996, 2003 VIA Networking Technologies, Inc.
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
21 * Purpose: private ioctl functions
25 * Date: Auguest 20, 2003
43 SWPAResult wpa_Result
;
44 static int msglevel
= MSG_LEVEL_INFO
;
46 int private_ioctl(PSDevice pDevice
, struct ifreq
*rq
)
49 PSCmdRequest pReq
= (PSCmdRequest
)rq
;
50 PSMgmtObject pMgmt
= &(pDevice
->sMgmtObj
);
52 PWLAN_IE_SSID pItemSSID
;
54 SCmdZoneTypeSet sZoneTypeCmd
;
56 SCmdStartAP sStartAPCmd
;
63 unsigned int cbListCount
;
67 SCmdLinkStatus sLinkStatus
;
68 BYTE abySuppRates
[] = {WLAN_EID_SUPP_RATES
, 4, 0x02, 0x04, 0x0B, 0x16};
69 BYTE abyNullAddr
[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
71 BYTE abyScanSSID
[WLAN_IEHDR_LEN
+ WLAN_SSID_MAXLEN
+ 1];
76 switch (pReq
->wCmdCode
) {
77 case WLAN_CMD_BSS_SCAN
:
78 if (copy_from_user(&sScanCmd
, pReq
->data
, sizeof(SCmdScan
))) {
83 pItemSSID
= (PWLAN_IE_SSID
)sScanCmd
.ssid
;
84 if (pItemSSID
->len
> WLAN_SSID_MAXLEN
+ 1)
86 if (pItemSSID
->len
!= 0) {
87 memset(abyScanSSID
, 0, WLAN_IEHDR_LEN
+ WLAN_SSID_MAXLEN
+ 1);
88 memcpy(abyScanSSID
, pItemSSID
, pItemSSID
->len
+ WLAN_IEHDR_LEN
);
90 spin_lock_irq(&pDevice
->lock
);
92 if (memcmp(pMgmt
->abyCurrBSSID
, &abyNullAddr
[0], 6) == 0)
93 BSSvClearBSSList(pDevice
, FALSE
);
95 BSSvClearBSSList(pDevice
, pDevice
->bLinkPass
);
97 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_BSS_SCAN..begin\n");
99 if (pItemSSID
->len
!= 0)
100 bScheduleCommand(pDevice
, WLAN_CMD_BSSID_SCAN
,
103 bScheduleCommand(pDevice
, WLAN_CMD_BSSID_SCAN
, NULL
);
105 spin_unlock_irq(&pDevice
->lock
);
108 case WLAN_CMD_ZONETYPE_SET
:
109 result
= -EOPNOTSUPP
;
112 if (copy_from_user(&sZoneTypeCmd
, pReq
->data
, sizeof(SCmdZoneTypeSet
))) {
117 if (sZoneTypeCmd
.bWrite
== TRUE
) {
119 if (sZoneTypeCmd
.ZoneType
== ZoneType_USA
) {
121 printk("set_ZoneType:USA\n");
122 } else if (sZoneTypeCmd
.ZoneType
== ZoneType_Japan
) {
124 printk("set_ZoneType:Japan\n");
125 } else if (sZoneTypeCmd
.ZoneType
== ZoneType_Europe
) {
127 printk("set_ZoneType:Europe\n");
133 if (zonetype
== 0x00) { /* USA */
134 sZoneTypeCmd
.ZoneType
= ZoneType_USA
;
135 } else if (zonetype
== 0x01) { /* Japan */
136 sZoneTypeCmd
.ZoneType
= ZoneType_Japan
;
137 } else if (zonetype
== 0x02) { /* Europe */
138 sZoneTypeCmd
.ZoneType
= ZoneType_Europe
;
139 } else { /* Unknown ZoneType */
140 printk("Error:ZoneType[%x] Unknown ???\n", zonetype
);
145 if (copy_to_user(pReq
->data
, &sZoneTypeCmd
,
146 sizeof(SCmdZoneTypeSet
))) {
152 case WLAN_CMD_BSS_JOIN
:
153 if (copy_from_user(&sJoinCmd
, pReq
->data
, sizeof(SCmdBSSJoin
))) {
158 pItemSSID
= (PWLAN_IE_SSID
)sJoinCmd
.ssid
;
159 if (pItemSSID
->len
> WLAN_SSID_MAXLEN
+ 1)
161 memset(pMgmt
->abyDesireSSID
, 0, WLAN_IEHDR_LEN
+ WLAN_SSID_MAXLEN
+ 1);
162 memcpy(pMgmt
->abyDesireSSID
, pItemSSID
, pItemSSID
->len
+ WLAN_IEHDR_LEN
);
163 if (sJoinCmd
.wBSSType
== ADHOC
) {
164 pMgmt
->eConfigMode
= WMAC_CONFIG_IBSS_STA
;
165 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"ioct set to adhoc mode\n");
167 pMgmt
->eConfigMode
= WMAC_CONFIG_ESS_STA
;
168 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"ioct set to STA mode\n");
170 if (sJoinCmd
.bPSEnable
== TRUE
) {
171 pDevice
->ePSMode
= WMAC_POWER_FAST
;
172 pMgmt
->wListenInterval
= 2;
173 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Power Saving On\n");
175 pDevice
->ePSMode
= WMAC_POWER_CAM
;
176 pMgmt
->wListenInterval
= 1;
177 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Power Saving Off\n");
180 if (sJoinCmd
.bShareKeyAuth
== TRUE
) {
181 pMgmt
->bShareKeyAlgorithm
= TRUE
;
182 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Share Key\n");
184 pMgmt
->bShareKeyAlgorithm
= FALSE
;
185 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Open System\n");
188 pDevice
->uChannel
= sJoinCmd
.uChannel
;
189 netif_stop_queue(pDevice
->dev
);
190 spin_lock_irq(&pDevice
->lock
);
191 pMgmt
->eCurrState
= WMAC_STATE_IDLE
;
192 bScheduleCommand(pDevice
, WLAN_CMD_BSSID_SCAN
,
193 pMgmt
->abyDesireSSID
);
194 bScheduleCommand(pDevice
, WLAN_CMD_SSID
, NULL
);
195 spin_unlock_irq(&pDevice
->lock
);
198 case WLAN_CMD_SET_WEP
:
199 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_WEP Key.\n");
200 memset(&sWEPCmd
, 0, sizeof(SCmdSetWEP
));
201 if (copy_from_user(&sWEPCmd
, pReq
->data
, sizeof(SCmdSetWEP
))) {
205 if (sWEPCmd
.bEnableWep
!= TRUE
) {
208 pDevice
->bEncryptionEnable
= FALSE
;
209 pDevice
->eEncryptionStatus
= Ndis802_11EncryptionDisabled
;
210 spin_lock_irq(&pDevice
->lock
);
211 for (uu
= 0; uu
< MAX_KEY_TABLE
; uu
++)
212 MACvDisableKeyEntry(pDevice
, uu
);
213 spin_unlock_irq(&pDevice
->lock
);
214 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WEP function disable.\n");
218 for (ii
= 0; ii
< WLAN_WEP_NKEYS
; ii
++) {
219 if (sWEPCmd
.bWepKeyAvailable
[ii
]) {
220 if (ii
== sWEPCmd
.byKeyIndex
)
221 dwKeyIndex
= ii
| (1 << 31);
224 spin_lock_irq(&pDevice
->lock
);
225 KeybSetDefaultKey(pDevice
, &(pDevice
->sKey
),
227 sWEPCmd
.auWepKeyLength
[ii
],
229 (PBYTE
)&sWEPCmd
.abyWepKey
[ii
][0],
231 spin_unlock_irq(&pDevice
->lock
);
234 pDevice
->byKeyIndex
= sWEPCmd
.byKeyIndex
;
235 pDevice
->bTransmitKey
= TRUE
;
236 pDevice
->bEncryptionEnable
= TRUE
;
237 pDevice
->eEncryptionStatus
= Ndis802_11Encryption1Enabled
;
240 case WLAN_CMD_GET_LINK
:
241 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_GET_LINK status.\n");
243 memset(sLinkStatus
.abySSID
, 0, WLAN_SSID_MAXLEN
+ 1);
245 if (pMgmt
->eCurrMode
== WMAC_MODE_IBSS_STA
)
246 sLinkStatus
.wBSSType
= ADHOC
;
248 sLinkStatus
.wBSSType
= INFRA
;
250 if (pMgmt
->eCurrState
== WMAC_STATE_JOINTED
)
251 sLinkStatus
.byState
= ADHOC_JOINTED
;
253 sLinkStatus
.byState
= ADHOC_STARTED
;
255 sLinkStatus
.uChannel
= pMgmt
->uCurrChannel
;
256 if (pDevice
->bLinkPass
== TRUE
) {
257 sLinkStatus
.bLink
= TRUE
;
258 pItemSSID
= (PWLAN_IE_SSID
)pMgmt
->abyCurrSSID
;
259 memcpy(sLinkStatus
.abySSID
, pItemSSID
->abySSID
, pItemSSID
->len
);
260 memcpy(sLinkStatus
.abyBSSID
, pMgmt
->abyCurrBSSID
, WLAN_BSSID_LEN
);
261 sLinkStatus
.uLinkRate
= pMgmt
->sNodeDBTable
[0].wTxDataRate
;
262 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Link Success!\n");
264 sLinkStatus
.bLink
= FALSE
;
265 sLinkStatus
.uLinkRate
= 0;
267 if (copy_to_user(pReq
->data
, &sLinkStatus
,
268 sizeof(SCmdLinkStatus
))) {
274 case WLAN_CMD_GET_LISTLEN
:
276 pBSS
= &(pMgmt
->sBSSList
[0]);
277 for (ii
= 0; ii
< MAX_BSS_NUM
; ii
++) {
278 pBSS
= &(pMgmt
->sBSSList
[ii
]);
283 sList
.uItem
= cbListCount
;
284 if (copy_to_user(pReq
->data
, &sList
, sizeof(SBSSIDList
))) {
291 case WLAN_CMD_GET_LIST
:
292 if (copy_from_user(&sList
, pReq
->data
, sizeof(SBSSIDList
))) {
296 if (sList
.uItem
> (ULONG_MAX
- sizeof(SBSSIDList
)) / sizeof(SBSSIDItem
)) {
300 pList
= kmalloc(sizeof(SBSSIDList
) + (sList
.uItem
* sizeof(SBSSIDItem
)), GFP_ATOMIC
);
305 pList
->uItem
= sList
.uItem
;
306 pBSS
= &(pMgmt
->sBSSList
[0]);
307 for (ii
= 0, jj
= 0; jj
< MAX_BSS_NUM
; jj
++) {
308 pBSS
= &(pMgmt
->sBSSList
[jj
]);
310 pList
->sBSSIDList
[ii
].uChannel
= pBSS
->uChannel
;
311 pList
->sBSSIDList
[ii
].wBeaconInterval
= pBSS
->wBeaconInterval
;
312 pList
->sBSSIDList
[ii
].wCapInfo
= pBSS
->wCapInfo
;
313 RFvRSSITodBm(pDevice
, (BYTE
)(pBSS
->uRSSI
), &ldBm
);
314 pList
->sBSSIDList
[ii
].uRSSI
= (unsigned int) ldBm
;
315 /* pList->sBSSIDList[ii].uRSSI = pBSS->uRSSI; */
316 memcpy(pList
->sBSSIDList
[ii
].abyBSSID
, pBSS
->abyBSSID
, WLAN_BSSID_LEN
);
317 pItemSSID
= (PWLAN_IE_SSID
)pBSS
->abySSID
;
318 memset(pList
->sBSSIDList
[ii
].abySSID
, 0, WLAN_SSID_MAXLEN
+ 1);
319 memcpy(pList
->sBSSIDList
[ii
].abySSID
, pItemSSID
->abySSID
, pItemSSID
->len
);
320 if (WLAN_GET_CAP_INFO_ESS(pBSS
->wCapInfo
)) {
321 pList
->sBSSIDList
[ii
].byNetType
= INFRA
;
323 pList
->sBSSIDList
[ii
].byNetType
= ADHOC
;
325 if (WLAN_GET_CAP_INFO_PRIVACY(pBSS
->wCapInfo
)) {
326 pList
->sBSSIDList
[ii
].bWEPOn
= TRUE
;
328 pList
->sBSSIDList
[ii
].bWEPOn
= FALSE
;
331 if (ii
>= pList
->uItem
)
336 if (copy_to_user(pReq
->data
, pList
, sizeof(SBSSIDList
) + (sList
.uItem
* sizeof(SBSSIDItem
)))) {
344 case WLAN_CMD_GET_MIB
:
345 if (copy_to_user(pReq
->data
, &(pDevice
->s802_11Counter
), sizeof(SDot11MIBCount
))) {
351 case WLAN_CMD_GET_STAT
:
352 if (copy_to_user(pReq
->data
, &(pDevice
->scStatistic
), sizeof(SStatCounter
))) {
357 case WLAN_CMD_STOP_MAC
:
358 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_STOP_MAC\n");
360 netif_stop_queue(pDevice
->dev
);
361 spin_lock_irq(&pDevice
->lock
);
362 if (pDevice
->bRadioOff
== FALSE
) {
363 CARDbRadioPowerOff(pDevice
);
365 pDevice
->bLinkPass
= FALSE
;
366 ControlvMaskByte(pDevice
, MESSAGE_REQUEST_MACREG
, MAC_REG_PAPEDELAY
, LEDSTS_STS
, LEDSTS_SLOW
);
367 memset(pMgmt
->abyCurrBSSID
, 0, 6);
368 pMgmt
->eCurrState
= WMAC_STATE_IDLE
;
369 /* del_timer(&pDevice->sTimerCommand); */
370 /* del_timer(&pMgmt->sTimerSecondCallback); */
371 pDevice
->bCmdRunning
= FALSE
;
372 spin_unlock_irq(&pDevice
->lock
);
375 case WLAN_CMD_START_MAC
:
376 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_START_MAC\n");
378 if (pDevice
->bRadioOff
== TRUE
)
379 CARDbRadioPowerOn(pDevice
);
382 case WLAN_CMD_SET_HOSTAPD
:
383 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_HOSTAPD\n");
385 if (copy_from_user(&sValue
, pReq
->data
, sizeof(SCmdValue
))) {
389 if (sValue
.dwValue
== 1) {
390 if (vt6656_hostap_set_hostapd(pDevice
, 1, 1) == 0) {
391 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Enable HOSTAP\n");
397 vt6656_hostap_set_hostapd(pDevice
, 0, 1);
398 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Disable HOSTAP\n");
402 case WLAN_CMD_SET_HOSTAPD_STA
:
403 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_HOSTAPD_STA\n");
406 case WLAN_CMD_SET_802_1X
:
407 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_802_1X\n");
408 if (copy_from_user(&sValue
, pReq
->data
, sizeof(SCmdValue
))) {
413 if (sValue
.dwValue
== 1) {
414 pDevice
->bEnable8021x
= TRUE
;
415 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Enable 802.1x\n");
417 pDevice
->bEnable8021x
= FALSE
;
418 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Disable 802.1x\n");
422 case WLAN_CMD_SET_HOST_WEP
:
423 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_HOST_WEP\n");
424 if (copy_from_user(&sValue
, pReq
->data
, sizeof(SCmdValue
))) {
429 if (sValue
.dwValue
== 1) {
430 pDevice
->bEnableHostWEP
= TRUE
;
431 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Enable HostWEP\n");
433 pDevice
->bEnableHostWEP
= FALSE
;
434 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Disable HostWEP\n");
438 case WLAN_CMD_SET_WPA
:
439 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_SET_WPA\n");
441 if (copy_from_user(&sValue
, pReq
->data
, sizeof(SCmdValue
))) {
445 if (sValue
.dwValue
== 1) {
446 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"up wpadev\n");
447 memcpy(pDevice
->wpadev
->dev_addr
, pDevice
->dev
->dev_addr
,
449 pDevice
->bWPADEVUp
= TRUE
;
451 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"close wpadev\n");
452 pDevice
->bWPADEVUp
= FALSE
;
456 case WLAN_CMD_AP_START
:
457 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"WLAN_CMD_AP_START\n");
458 if (pDevice
->bRadioOff
== TRUE
) {
459 CARDbRadioPowerOn(pDevice
);
460 add_timer(&pMgmt
->sTimerSecondCallback
);
462 if (copy_from_user(&sStartAPCmd
, pReq
->data
, sizeof(SCmdStartAP
))) {
467 if (sStartAPCmd
.wBSSType
== AP
) {
468 pMgmt
->eConfigMode
= WMAC_CONFIG_AP
;
469 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"ioct set to AP mode\n");
471 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"ioct BSS type not set to AP mode\n");
476 if (sStartAPCmd
.wBBPType
== PHY80211g
) {
477 pMgmt
->byAPBBType
= PHY_TYPE_11G
;
478 } else if (sStartAPCmd
.wBBPType
== PHY80211a
) {
479 pMgmt
->byAPBBType
= PHY_TYPE_11A
;
481 pMgmt
->byAPBBType
= PHY_TYPE_11B
;
484 pItemSSID
= (PWLAN_IE_SSID
)sStartAPCmd
.ssid
;
485 if (pItemSSID
->len
> WLAN_SSID_MAXLEN
+ 1)
487 memset(pMgmt
->abyDesireSSID
, 0, WLAN_IEHDR_LEN
+ WLAN_SSID_MAXLEN
+ 1);
488 memcpy(pMgmt
->abyDesireSSID
, pItemSSID
, pItemSSID
->len
+ WLAN_IEHDR_LEN
);
490 if ((sStartAPCmd
.uChannel
> 0) && (sStartAPCmd
.uChannel
<= 14))
491 pDevice
->uChannel
= sStartAPCmd
.uChannel
;
493 if ((sStartAPCmd
.uBeaconInt
>= 20) && (sStartAPCmd
.uBeaconInt
<= 1000))
494 pMgmt
->wIBSSBeaconPeriod
= sStartAPCmd
.uBeaconInt
;
496 pMgmt
->wIBSSBeaconPeriod
= 100;
498 if (sStartAPCmd
.bShareKeyAuth
== TRUE
) {
499 pMgmt
->bShareKeyAlgorithm
= TRUE
;
500 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Share Key\n");
502 pMgmt
->bShareKeyAlgorithm
= FALSE
;
503 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Open System\n");
505 memcpy(pMgmt
->abyIBSSSuppRates
, abySuppRates
, 6);
507 if (sStartAPCmd
.byBasicRate
& BIT3
) {
508 pMgmt
->abyIBSSSuppRates
[2] |= BIT7
;
509 pMgmt
->abyIBSSSuppRates
[3] |= BIT7
;
510 pMgmt
->abyIBSSSuppRates
[4] |= BIT7
;
511 pMgmt
->abyIBSSSuppRates
[5] |= BIT7
;
512 } else if (sStartAPCmd
.byBasicRate
& BIT2
) {
513 pMgmt
->abyIBSSSuppRates
[2] |= BIT7
;
514 pMgmt
->abyIBSSSuppRates
[3] |= BIT7
;
515 pMgmt
->abyIBSSSuppRates
[4] |= BIT7
;
516 } else if (sStartAPCmd
.byBasicRate
& BIT1
) {
517 pMgmt
->abyIBSSSuppRates
[2] |= BIT7
;
518 pMgmt
->abyIBSSSuppRates
[3] |= BIT7
;
519 } else if (sStartAPCmd
.byBasicRate
& BIT1
) {
520 pMgmt
->abyIBSSSuppRates
[2] |= BIT7
;
523 pMgmt
->abyIBSSSuppRates
[2] |= BIT7
;
524 pMgmt
->abyIBSSSuppRates
[3] |= BIT7
;
527 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Support Rate= %x %x %x %x\n",
528 pMgmt
->abyIBSSSuppRates
[2],
529 pMgmt
->abyIBSSSuppRates
[3],
530 pMgmt
->abyIBSSSuppRates
[4],
531 pMgmt
->abyIBSSSuppRates
[5]);
533 netif_stop_queue(pDevice
->dev
);
534 spin_lock_irq(&pDevice
->lock
);
535 bScheduleCommand(pDevice
, WLAN_CMD_RUN_AP
, NULL
);
536 spin_unlock_irq(&pDevice
->lock
);
539 case WLAN_CMD_GET_NODE_CNT
:
541 pNode
= &(pMgmt
->sNodeDBTable
[0]);
542 for (ii
= 0; ii
< (MAX_NODE_NUM
+ 1); ii
++) {
543 pNode
= &(pMgmt
->sNodeDBTable
[ii
]);
549 sNodeList
.uItem
= cbListCount
;
550 if (copy_to_user(pReq
->data
, &sNodeList
, sizeof(SNodeList
))) {
557 case WLAN_CMD_GET_NODE_LIST
:
558 if (copy_from_user(&sNodeList
, pReq
->data
, sizeof(SNodeList
))) {
562 if (sNodeList
.uItem
> (ULONG_MAX
- sizeof(SNodeList
)) / sizeof(SNodeItem
)) {
566 pNodeList
= (PSNodeList
)kmalloc(sizeof(SNodeList
) + (sNodeList
.uItem
* sizeof(SNodeItem
)), GFP_ATOMIC
);
567 if (pNodeList
== NULL
) {
571 pNodeList
->uItem
= sNodeList
.uItem
;
572 pNode
= &(pMgmt
->sNodeDBTable
[0]);
573 for (ii
= 0, jj
= 0; ii
< (MAX_NODE_NUM
+ 1); ii
++) {
574 pNode
= &(pMgmt
->sNodeDBTable
[ii
]);
575 if (pNode
->bActive
) {
576 pNodeList
->sNodeList
[jj
].wAID
= pNode
->wAID
;
577 memcpy(pNodeList
->sNodeList
[jj
].abyMACAddr
, pNode
->abyMACAddr
, WLAN_ADDR_LEN
);
578 pNodeList
->sNodeList
[jj
].wTxDataRate
= pNode
->wTxDataRate
;
579 pNodeList
->sNodeList
[jj
].wInActiveCount
= (WORD
)pNode
->uInActiveCount
;
580 pNodeList
->sNodeList
[jj
].wEnQueueCnt
= (WORD
)pNode
->wEnQueueCnt
;
581 pNodeList
->sNodeList
[jj
].wFlags
= (WORD
)pNode
->dwFlags
;
582 pNodeList
->sNodeList
[jj
].bPWBitOn
= pNode
->bPSEnable
;
583 pNodeList
->sNodeList
[jj
].byKeyIndex
= pNode
->byKeyIndex
;
584 pNodeList
->sNodeList
[jj
].wWepKeyLength
= pNode
->uWepKeyLength
;
585 memcpy(&(pNodeList
->sNodeList
[jj
].abyWepKey
[0]), &(pNode
->abyWepKey
[0]), WEP_KEYMAXLEN
);
586 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"key= %2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
587 pNodeList
->sNodeList
[jj
].abyWepKey
[0],
588 pNodeList
->sNodeList
[jj
].abyWepKey
[1],
589 pNodeList
->sNodeList
[jj
].abyWepKey
[2],
590 pNodeList
->sNodeList
[jj
].abyWepKey
[3],
591 pNodeList
->sNodeList
[jj
].abyWepKey
[4]);
592 pNodeList
->sNodeList
[jj
].bIsInFallback
= pNode
->bIsInFallback
;
593 pNodeList
->sNodeList
[jj
].uTxFailures
= pNode
->uTxFailures
;
594 pNodeList
->sNodeList
[jj
].uTxAttempts
= pNode
->uTxAttempts
;
595 pNodeList
->sNodeList
[jj
].wFailureRatio
= (WORD
)pNode
->uFailureRatio
;
597 if (jj
>= pNodeList
->uItem
)
601 if (copy_to_user(pReq
->data
, pNodeList
, sizeof(SNodeList
) + (sNodeList
.uItem
* sizeof(SNodeItem
)))) {
610 memset(wpa_Result
.ifname
, 0, sizeof(wpa_Result
.ifname
));
611 wpa_Result
.proto
= 0;
612 wpa_Result
.key_mgmt
= 0;
613 wpa_Result
.eap_type
= 0;
614 wpa_Result
.authenticated
= FALSE
;
615 pDevice
->fWPA_Authened
= FALSE
;
616 if (copy_from_user(&wpa_Result
, pReq
->data
, sizeof(wpa_Result
))) {
620 /* for some AP maybe good authenticate */
621 if (wpa_Result
.key_mgmt
== 0x20)
622 pMgmt
->Cisco_cckm
= 1;
624 pMgmt
->Cisco_cckm
= 0;
626 if (wpa_Result
.authenticated
== TRUE
) {
628 union iwreq_data wrqu
;
630 pItemSSID
= (PWLAN_IE_SSID
)pMgmt
->abyCurrSSID
;
631 memset(&wrqu
, 0, sizeof(wrqu
));
632 wrqu
.data
.flags
= RT_WPACONNECTED_EVENT_FLAG
;
633 wrqu
.data
.length
= pItemSSID
->len
;
634 wireless_send_event(pDevice
->dev
, IWEVCUSTOM
, &wrqu
, pItemSSID
->abySSID
);
637 pDevice
->fWPA_Authened
= TRUE
; /* is successful peer to wpa_Result.authenticated? */
644 DBG_PRT(MSG_LEVEL_DEBUG
, KERN_INFO
"Private command not support..\n");