• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/vt6655/

Lines Matching refs:param

209  *      param     -
216 struct viawget_hostapd_param *param)
221 if (BSSDBbIsSTAInNodeDB(pDevice->pMgmt, param->sta_addr, &uNodeIndex)) {
237 * param -
244 struct viawget_hostapd_param *param)
250 if (!BSSDBbIsSTAInNodeDB(pMgmt, param->sta_addr, &uNodeIndex)) {
253 memcpy(pMgmt->sNodeDBTable[uNodeIndex].abyMACAddr, param->sta_addr, WLAN_ADDR_LEN);
255 pMgmt->sNodeDBTable[uNodeIndex].wCapInfo = param->u.add_sta.capability;
259 pMgmt->sNodeDBTable[uNodeIndex].bySuppRate = param->u.add_sta.tx_supp_rates;
270 pMgmt->sNodeDBTable[uNodeIndex].wAID = (unsigned short)param->u.add_sta.aid;
276 param->sta_addr[0],
277 param->sta_addr[1],
278 param->sta_addr[2],
279 param->sta_addr[3],
280 param->sta_addr[4],
281 param->sta_addr[5]
296 * param -
304 struct viawget_hostapd_param *param)
309 if (BSSDBbIsSTAInNodeDB(pMgmt, param->sta_addr, &uNodeIndex)) {
310 param->u.get_info_sta.inactive_sec =
313 //param->u.get_info_sta.txexc = pMgmt->sNodeDBTable[uNodeIndex].uTxAttempts;
329 * param -
338 struct viawget_hostapd_param *param)
343 if (BSSDBbIsSTAInNodeDB(pMgmt, param->sta_addr, &uNodeIndex)) {
361 * param -
368 struct viawget_hostapd_param *param)
373 if (BSSDBbIsSTAInNodeDB(pMgmt, param->sta_addr, &uNodeIndex)) {
374 pMgmt->sNodeDBTable[uNodeIndex].dwFlags |= param->u.set_flags_sta.flags_or;
375 pMgmt->sNodeDBTable[uNodeIndex].dwFlags &= param->u.set_flags_sta.flags_and;
395 * param -
402 struct viawget_hostapd_param *param)
409 param->u.generic_elem.data,
410 param->u.generic_elem.len
413 pMgmt->wWPAIELen = param->u.generic_elem.len;
463 * param -
470 struct viawget_hostapd_param *param,
486 param->u.crypt.err = 0;
489 (int) ((char *) param->u.crypt.key - (char *) param) +
490 param->u.crypt.key_len)
494 if (param->u.crypt.alg > WPA_ALG_CCMP)
498 if ((param->u.crypt.idx > 3) || (param->u.crypt.key_len > MAX_KEY_LEN)) {
499 param->u.crypt.err = HOSTAP_CRYPT_ERR_KEY_SET_FAILED;
504 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
505 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
506 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
507 if (param->u.crypt.idx >= MAX_GROUP_KEY)
512 if (BSSDBbIsSTAInNodeDB(pMgmt, param->sta_addr, &iNodeIndex) == false) {
513 param->u.crypt.err = HOSTAP_CRYPT_ERR_UNKNOWN_ADDR;
519 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO " hostap_set_encryption: alg %d \n", param->u.crypt.alg);
521 if (param->u.crypt.alg == WPA_ALG_NONE) {
525 param->sta_addr,
547 memcpy(abyKey, param->u.crypt.key, param->u.crypt.key_len);
549 pMgmt->sNodeDBTable[iNodeIndex].byKeyIndex = param->u.crypt.idx;
550 pMgmt->sNodeDBTable[iNodeIndex].uWepKeyLength = param->u.crypt.key_len;
552 param->u.crypt.key,
553 param->u.crypt.key_len
556 dwKeyIndex = (unsigned long)(param->u.crypt.idx);
557 if (param->u.crypt.flags & HOSTAP_CRYPT_FLAG_SET_TX_KEY) {
563 if (param->u.crypt.alg == WPA_ALG_WEP) {
568 param->u.crypt.key_len,
579 &param->sta_addr[0],
581 param->u.crypt.key_len,
605 if (param->u.crypt.seq) {
606 memcpy(&abySeq, param->u.crypt.seq, 8);
614 if (param->u.crypt.alg == WPA_ALG_TKIP) {
615 if (param->u.crypt.key_len != MAX_KEY_LEN)
623 if (param->u.crypt.alg == WPA_ALG_CCMP) {
624 if ((param->u.crypt.key_len != AES_KEY_LEN) ||
637 param->u.crypt.key_len,
648 &param->sta_addr[0],
650 param->u.crypt.key_len,
678 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO " tx_index=%d len=%d \n", param->u.crypt.idx,
679 param->u.crypt.key_len );
707 * param -
714 struct viawget_hostapd_param *param,
723 param->u.crypt.err = 0;
725 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
726 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
727 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
730 if (BSSDBbIsSTAInNodeDB(pMgmt, param->sta_addr, &iNodeIndex) == false) {
731 param->u.crypt.err = HOSTAP_CRYPT_ERR_UNKNOWN_ADDR;
737 memset(param->u.crypt.seq, 0, 8);
739 param->u.crypt.seq[ii] = (unsigned char)pMgmt->sNodeDBTable[iNodeIndex].KeyRSC >> (ii * 8);
762 struct viawget_hostapd_param *param;
770 param = kmalloc((int)p->length, (int)GFP_KERNEL);
771 if (param == NULL)
774 if (copy_from_user(param, p->pointer, p->length)) {
779 switch (param->cmd) {
783 ret = hostap_set_encryption(pDevice, param, p->length);
789 ret = hostap_get_encryption(pDevice, param, p->length);
805 ret = hostap_add_sta(pDevice, param);
811 ret = hostap_remove_sta(pDevice, param);
816 ret = hostap_get_info_sta(pDevice, param);
822 ret = hostap_reset_txexc_sta(pDevice, param);
827 ret = hostap_set_flags_sta(pDevice, param);
836 ret = hostap_set_generic_element(pDevice, param);
849 (int)param->cmd);
856 if (copy_to_user(p->pointer, param, p->length)) {
863 if (param != NULL)
864 kfree(param);