• Home
  • History
  • Annotate
  • Line#
  • Navigate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/vt6656/
1/*
2 * Copyright (c) 1996, 2003 VIA Networking Technologies, Inc.
3 * All rights reserved.
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13 * GNU General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
18 *
19 * File: ioctl.c
20 *
21 * Purpose:  private ioctl functions
22 *
23 * Author: Lyndon Chen
24 *
25 * Date: Auguest 20, 2003
26 *
27 * Functions:
28 *
29 * Revision History:
30 *
31 */
32
33#include "ioctl.h"
34#include "iocmd.h"
35#include "mac.h"
36#include "card.h"
37#include "hostap.h"
38#include "wpactl.h"
39#include "control.h"
40#include "rndis.h"
41#include "rf.h"
42
43/*---------------------  Static Definitions -------------------------*/
44
45/*---------------------  Static Classes  ----------------------------*/
46
47/*---------------------  Static Variables  --------------------------*/
48//static int          msglevel                =MSG_LEVEL_DEBUG;
49static int          msglevel                =MSG_LEVEL_INFO;
50
51    SWPAResult wpa_Result;
52
53/*---------------------  Static Functions  --------------------------*/
54
55/*---------------------  Export Variables  --------------------------*/
56
57int private_ioctl(PSDevice pDevice, struct ifreq *rq) {
58
59	PSCmdRequest        pReq = (PSCmdRequest)rq;
60    PSMgmtObject        pMgmt = &(pDevice->sMgmtObj);
61	int 		        result = 0;
62    PWLAN_IE_SSID       pItemSSID;
63    SCmdBSSJoin         sJoinCmd;
64    SCmdZoneTypeSet sZoneTypeCmd;
65    SCmdScan            sScanCmd;
66    SCmdStartAP         sStartAPCmd;
67    SCmdSetWEP          sWEPCmd;
68    SCmdValue           sValue;
69    SBSSIDList          sList;
70    SNodeList           sNodeList;
71    PSBSSIDList         pList;
72    PSNodeList          pNodeList;
73    unsigned int                cbListCount;
74    PKnownBSS           pBSS;
75    PKnownNodeDB        pNode;
76    unsigned int                ii, jj;
77    SCmdLinkStatus      sLinkStatus;
78    BYTE                abySuppRates[] = {WLAN_EID_SUPP_RATES, 4, 0x02, 0x04, 0x0B, 0x16};
79    BYTE                abyNullAddr[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
80    DWORD               dwKeyIndex= 0;
81    BYTE                abyScanSSID[WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1];
82    signed long                ldBm;
83
84    pReq->wResult = 0;
85
86    switch(pReq->wCmdCode) {
87
88    case WLAN_CMD_BSS_SCAN:
89
90        if (copy_from_user(&sScanCmd, pReq->data, sizeof(SCmdScan))) {
91			result = -EFAULT;
92			break;
93		};
94
95        pItemSSID = (PWLAN_IE_SSID)sScanCmd.ssid;
96        if (pItemSSID->len != 0) {
97            memset(abyScanSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
98            memcpy(abyScanSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
99        }
100        spin_lock_irq(&pDevice->lock);
101
102	if (memcmp(pMgmt->abyCurrBSSID, &abyNullAddr[0], 6) == 0)
103		BSSvClearBSSList((void *) pDevice, FALSE);
104	else
105		BSSvClearBSSList((void *) pDevice, pDevice->bLinkPass);
106
107	DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_BSS_SCAN..begin\n");
108
109	if (pItemSSID->len != 0)
110		bScheduleCommand((void *) pDevice,
111				 WLAN_CMD_BSSID_SCAN,
112				 abyScanSSID);
113	else
114		bScheduleCommand((void *) pDevice, WLAN_CMD_BSSID_SCAN, NULL);
115
116        spin_unlock_irq(&pDevice->lock);
117        break;
118
119    case WLAN_CMD_ZONETYPE_SET:
120	//mike add :cann't support.
121           result=-EOPNOTSUPP;
122	  break;
123
124        if (copy_from_user(&sZoneTypeCmd, pReq->data, sizeof(SCmdZoneTypeSet))) {
125			result = -EFAULT;
126			break;
127		};
128
129          if(sZoneTypeCmd.bWrite==TRUE) {
130	  //////write zonetype
131                if(sZoneTypeCmd.ZoneType == ZoneType_USA) {
132                  //set to USA
133                   printk("set_ZoneType:USA\n");
134		}
135                else if(sZoneTypeCmd.ZoneType == ZoneType_Japan) {
136                  //set to Japan
137                  printk("set_ZoneType:Japan\n");
138		}
139	       else if(sZoneTypeCmd.ZoneType == ZoneType_Europe) {
140                  //set to Europe
141                  printk("set_ZoneType:Europe\n");
142		}
143            }
144	else {
145          ///////read zonetype
146	  BYTE                       zonetype=0;
147
148
149           if(zonetype == 0x00)  { //USA
150             sZoneTypeCmd.ZoneType = ZoneType_USA;
151           }
152	 else if(zonetype == 0x01) { //Japan
153             sZoneTypeCmd.ZoneType = ZoneType_Japan;
154	  }
155	 else if(zonetype == 0x02) { //Europe
156             sZoneTypeCmd.ZoneType = ZoneType_Europe;
157	 }
158	 else { //Unknown ZoneType
159	        printk("Error:ZoneType[%x] Unknown ???\n",zonetype);
160	         result = -EFAULT;
161		break;
162	 }
163	   if (copy_to_user(pReq->data, &sZoneTypeCmd, sizeof(SCmdZoneTypeSet))) {
164			result = -EFAULT;
165			break;
166		};
167	}
168
169	     break;
170
171    case WLAN_CMD_BSS_JOIN:
172
173        if (copy_from_user(&sJoinCmd, pReq->data, sizeof(SCmdBSSJoin))) {
174			result = -EFAULT;
175			break;
176		};
177
178        pItemSSID = (PWLAN_IE_SSID)sJoinCmd.ssid;
179        memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
180		memcpy(pMgmt->abyDesireSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
181	    if (sJoinCmd.wBSSType == ADHOC) {
182	        pMgmt->eConfigMode = WMAC_CONFIG_IBSS_STA;
183	        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to adhoc mode\n");
184	    }
185	    else {
186	        pMgmt->eConfigMode = WMAC_CONFIG_ESS_STA;
187	        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to STA mode\n");
188	    }
189	    if (sJoinCmd.bPSEnable == TRUE) {
190            pDevice->ePSMode = WMAC_POWER_FAST;
191//            pDevice->ePSMode = WMAC_POWER_MAX;
192            pMgmt->wListenInterval = 2;
193            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Power Saving On\n");
194        }
195        else {
196            pDevice->ePSMode = WMAC_POWER_CAM;
197            pMgmt->wListenInterval = 1;
198            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Power Saving Off \n");
199        }
200
201        if (sJoinCmd.bShareKeyAuth == TRUE){
202            pMgmt->bShareKeyAlgorithm = TRUE;
203            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Share Key \n");
204        }
205        else {
206            pMgmt->bShareKeyAlgorithm = FALSE;
207            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Open System \n");
208        }
209	    pDevice->uChannel = sJoinCmd.uChannel;
210        netif_stop_queue(pDevice->dev);
211        spin_lock_irq(&pDevice->lock);
212        pMgmt->eCurrState = WMAC_STATE_IDLE;
213	bScheduleCommand((void *) pDevice,
214			 WLAN_CMD_BSSID_SCAN,
215			 pMgmt->abyDesireSSID);
216	bScheduleCommand((void *) pDevice, WLAN_CMD_SSID, NULL);
217        spin_unlock_irq(&pDevice->lock);
218        break;
219
220    case WLAN_CMD_SET_WEP:
221        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_WEP Key. \n");
222        memset(&sWEPCmd, 0 ,sizeof(SCmdSetWEP));
223        if (copy_from_user(&sWEPCmd, pReq->data, sizeof(SCmdSetWEP))) {
224			result = -EFAULT;
225			break;
226		};
227	    if (sWEPCmd.bEnableWep != TRUE) {
228	        int uu;
229
230            pDevice->bEncryptionEnable = FALSE;
231            pDevice->eEncryptionStatus = Ndis802_11EncryptionDisabled;
232            spin_lock_irq(&pDevice->lock);
233	    for (uu = 0; uu < MAX_KEY_TABLE; uu++)
234		MACvDisableKeyEntry(pDevice, uu);
235            spin_unlock_irq(&pDevice->lock);
236	    DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WEP function disable.\n");
237            break;
238        }
239
240        for (ii = 0; ii < WLAN_WEP_NKEYS; ii ++) {
241            if (sWEPCmd.bWepKeyAvailable[ii]) {
242                if (ii == sWEPCmd.byKeyIndex)
243//2006-1207-01<Modify>by Einsn Liu
244//		    dwKeyIndex|= (1 << 31);
245                    dwKeyIndex=ii|(1 << 31);
246                else
247                    dwKeyIndex = ii;
248                spin_lock_irq(&pDevice->lock);
249                KeybSetDefaultKey(  pDevice,
250                                    &(pDevice->sKey),
251                                    dwKeyIndex,
252                                    sWEPCmd.auWepKeyLength[ii],
253                                    NULL,
254                                    (PBYTE)&sWEPCmd.abyWepKey[ii][0],
255                                    KEY_CTL_WEP
256                                  );
257               spin_unlock_irq(&pDevice->lock);
258
259            }
260        }
261        pDevice->byKeyIndex = sWEPCmd.byKeyIndex;
262        pDevice->bTransmitKey = TRUE;
263        pDevice->bEncryptionEnable = TRUE;
264        pDevice->eEncryptionStatus = Ndis802_11Encryption1Enabled;
265
266        break;
267
268    case WLAN_CMD_GET_LINK:
269        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_GET_LINK status. \n");
270
271        memset(sLinkStatus.abySSID, 0 , WLAN_SSID_MAXLEN + 1);
272
273        if (pMgmt->eCurrMode == WMAC_MODE_IBSS_STA)
274            sLinkStatus.wBSSType = ADHOC;
275        else
276            sLinkStatus.wBSSType = INFRA;
277
278        if (pMgmt->eCurrState == WMAC_STATE_JOINTED)
279            sLinkStatus.byState = ADHOC_JOINTED;
280        else
281            sLinkStatus.byState = ADHOC_STARTED;
282
283        sLinkStatus.uChannel = pMgmt->uCurrChannel;
284        if (pDevice->bLinkPass == TRUE) {
285            sLinkStatus.bLink = TRUE;
286 		    pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID;
287		    memcpy(sLinkStatus.abySSID, pItemSSID->abySSID, pItemSSID->len);
288		    memcpy(sLinkStatus.abyBSSID, pMgmt->abyCurrBSSID, WLAN_BSSID_LEN);
289		    sLinkStatus.uLinkRate = pMgmt->sNodeDBTable[0].wTxDataRate;
290            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO" Link Success ! \n");
291        }
292        else {
293            sLinkStatus.bLink = FALSE;
294        }
295        if (copy_to_user(pReq->data, &sLinkStatus, sizeof(SCmdLinkStatus))) {
296			result = -EFAULT;
297			break;
298		};
299
300        break;
301
302    case WLAN_CMD_GET_LISTLEN:
303		cbListCount = 0;
304		pBSS = &(pMgmt->sBSSList[0]);
305        for (ii = 0; ii < MAX_BSS_NUM; ii++) {
306            pBSS = &(pMgmt->sBSSList[ii]);
307            if (!pBSS->bActive)
308                continue;
309            cbListCount++;
310        };
311        sList.uItem = cbListCount;
312        if (copy_to_user(pReq->data, &sList, sizeof(SBSSIDList))) {
313			result = -EFAULT;
314			break;
315		};
316        pReq->wResult = 0;
317        break;
318
319    case WLAN_CMD_GET_LIST:
320        if (copy_from_user(&sList, pReq->data, sizeof(SBSSIDList))) {
321			result = -EFAULT;
322			break;
323		};
324        pList = (PSBSSIDList)kmalloc(sizeof(SBSSIDList) + (sList.uItem * sizeof(SBSSIDItem)), (int)GFP_ATOMIC);
325        if (pList == NULL) {
326            result = -ENOMEM;
327            break;
328        }
329		pList->uItem = sList.uItem;
330		pBSS = &(pMgmt->sBSSList[0]);
331        for (ii = 0, jj = 0; jj < MAX_BSS_NUM ; jj++) {
332            pBSS = &(pMgmt->sBSSList[jj]);
333            if (pBSS->bActive) {
334    		    pList->sBSSIDList[ii].uChannel = pBSS->uChannel;
335    		    pList->sBSSIDList[ii].wBeaconInterval = pBSS->wBeaconInterval;
336    		    pList->sBSSIDList[ii].wCapInfo = pBSS->wCapInfo;
337    		    RFvRSSITodBm(pDevice, (BYTE)(pBSS->uRSSI), &ldBm);
338		    pList->sBSSIDList[ii].uRSSI = (unsigned int) ldBm;
339//    		    pList->sBSSIDList[ii].uRSSI = pBSS->uRSSI;
340    		    memcpy(pList->sBSSIDList[ii].abyBSSID, pBSS->abyBSSID, WLAN_BSSID_LEN);
341    		    pItemSSID = (PWLAN_IE_SSID)pBSS->abySSID;
342    		    memset(pList->sBSSIDList[ii].abySSID, 0, WLAN_SSID_MAXLEN + 1);
343    		    memcpy(pList->sBSSIDList[ii].abySSID, pItemSSID->abySSID, pItemSSID->len);
344                if (WLAN_GET_CAP_INFO_ESS(pBSS->wCapInfo)) {
345    		        pList->sBSSIDList[ii].byNetType = INFRA;
346                }
347                else {
348    		        pList->sBSSIDList[ii].byNetType = ADHOC;
349    		    }
350    		    if (WLAN_GET_CAP_INFO_PRIVACY(pBSS->wCapInfo)) {
351    		        pList->sBSSIDList[ii].bWEPOn = TRUE;
352                }
353                else {
354    		        pList->sBSSIDList[ii].bWEPOn = FALSE;
355    		    }
356    		    ii ++;
357    		    if (ii >= pList->uItem)
358    		        break;
359            }
360        }
361
362        if (copy_to_user(pReq->data, pList, sizeof(SBSSIDList) + (sList.uItem * sizeof(SBSSIDItem)))) {
363			result = -EFAULT;
364			break;
365		};
366        kfree(pList);
367        pReq->wResult = 0;
368        break;
369
370    case WLAN_CMD_GET_MIB:
371        if (copy_to_user(pReq->data, &(pDevice->s802_11Counter), sizeof(SDot11MIBCount))) {
372			result = -EFAULT;
373			break;
374		};
375        break;
376
377    case WLAN_CMD_GET_STAT:
378        if (copy_to_user(pReq->data, &(pDevice->scStatistic), sizeof(SStatCounter))) {
379			result = -EFAULT;
380			break;
381		};
382        break;
383    case WLAN_CMD_STOP_MAC:
384
385        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_STOP_MAC\n");
386        // Todo xxxxxx
387        netif_stop_queue(pDevice->dev);
388        spin_lock_irq(&pDevice->lock);
389        if (pDevice->bRadioOff == FALSE) {
390            CARDbRadioPowerOff(pDevice);
391        }
392        pDevice->bLinkPass = FALSE;
393        ControlvMaskByte(pDevice,MESSAGE_REQUEST_MACREG,MAC_REG_PAPEDELAY,LEDSTS_STS,LEDSTS_SLOW);
394        memset(pMgmt->abyCurrBSSID, 0, 6);
395        pMgmt->eCurrState = WMAC_STATE_IDLE;
396//        del_timer(&pDevice->sTimerCommand);
397//        del_timer(&pMgmt->sTimerSecondCallback);
398        pDevice->bCmdRunning = FALSE;
399        spin_unlock_irq(&pDevice->lock);
400
401        break;
402
403    case WLAN_CMD_START_MAC:
404
405        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_START_MAC\n");
406        // Todo xxxxxxx
407        if (pDevice->bRadioOff == TRUE)
408            CARDbRadioPowerOn(pDevice);
409        break;
410
411    case WLAN_CMD_SET_HOSTAPD:
412
413        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOSTAPD\n");
414
415        if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
416			result = -EFAULT;
417			break;
418		};
419		if (sValue.dwValue == 1) {
420            if (vt6656_hostap_set_hostapd(pDevice, 1, 1) == 0){
421                DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable HOSTAP\n");
422            }
423            else {
424			    result = -EFAULT;
425			    break;
426			}
427        }
428        else {
429            vt6656_hostap_set_hostapd(pDevice, 0, 1);
430            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable HOSTAP\n");
431        }
432
433        break;
434
435    case WLAN_CMD_SET_HOSTAPD_STA:
436
437        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOSTAPD_STA\n");
438
439        break;
440    case WLAN_CMD_SET_802_1X:
441
442        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_802_1X\n");
443        if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
444			result = -EFAULT;
445			break;
446		};
447
448		if (sValue.dwValue == 1) {
449            pDevice->bEnable8021x = TRUE;
450            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable 802.1x\n");
451        }
452        else {
453            pDevice->bEnable8021x = FALSE;
454            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable 802.1x\n");
455        }
456
457        break;
458
459
460    case WLAN_CMD_SET_HOST_WEP:
461
462        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOST_WEP\n");
463        if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
464			result = -EFAULT;
465			break;
466		};
467
468		if (sValue.dwValue == 1) {
469            pDevice->bEnableHostWEP = TRUE;
470            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable HostWEP\n");
471        }
472        else {
473            pDevice->bEnableHostWEP = FALSE;
474            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable HostWEP\n");
475        }
476
477        break;
478
479    case WLAN_CMD_SET_WPA:
480         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_WPA\n");
481
482        if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
483			result = -EFAULT;
484			break;
485		};
486		if (sValue.dwValue == 1) {
487                     DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "up wpadev\n");
488		   memcpy(pDevice->wpadev->dev_addr,
489			  pDevice->dev->dev_addr,
490			  ETH_ALEN);
491		   pDevice->bWPADEVUp = TRUE;
492        }
493        else {
494            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "close wpadev\n");
495	   pDevice->bWPADEVUp = FALSE;
496        }
497
498        break;
499
500    case WLAN_CMD_AP_START:
501
502        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_AP_START\n");
503        if (pDevice->bRadioOff == TRUE) {
504            CARDbRadioPowerOn(pDevice);
505            add_timer(&pMgmt->sTimerSecondCallback);
506        }
507        if (copy_from_user(&sStartAPCmd, pReq->data, sizeof(SCmdStartAP))) {
508			result = -EFAULT;
509			break;
510		};
511
512	    if (sStartAPCmd.wBSSType == AP) {
513	        pMgmt->eConfigMode = WMAC_CONFIG_AP;
514	        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to AP mode\n");
515	    }
516	    else {
517	        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct BSS type not set to AP mode\n");
518			result = -EFAULT;
519			break;
520	    }
521
522
523	    if (sStartAPCmd.wBBPType == PHY80211g) {
524            pMgmt->byAPBBType = PHY_TYPE_11G;
525        }
526        else if (sStartAPCmd.wBBPType == PHY80211a) {
527                 pMgmt->byAPBBType = PHY_TYPE_11A;
528        }
529        else {
530            pMgmt->byAPBBType = PHY_TYPE_11B;
531        }
532
533        pItemSSID = (PWLAN_IE_SSID)sStartAPCmd.ssid;
534        memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
535		memcpy(pMgmt->abyDesireSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
536
537	    if ((sStartAPCmd.uChannel > 0)&&(sStartAPCmd.uChannel <= 14))
538	        pDevice->uChannel = sStartAPCmd.uChannel;
539
540	    if ((sStartAPCmd.uBeaconInt >= 20) && (sStartAPCmd.uBeaconInt <= 1000))
541            pMgmt->wIBSSBeaconPeriod = sStartAPCmd.uBeaconInt;
542        else
543            pMgmt->wIBSSBeaconPeriod = 100;
544
545        if (sStartAPCmd.bShareKeyAuth == TRUE){
546            pMgmt->bShareKeyAlgorithm = TRUE;
547            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Share Key \n");
548        }
549        else {
550            pMgmt->bShareKeyAlgorithm = FALSE;
551            DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Open System \n");
552        }
553        memcpy(pMgmt->abyIBSSSuppRates, abySuppRates, 6);
554
555        if (sStartAPCmd.byBasicRate & BIT3) {
556            pMgmt->abyIBSSSuppRates[2] |= BIT7;
557            pMgmt->abyIBSSSuppRates[3] |= BIT7;
558            pMgmt->abyIBSSSuppRates[4] |= BIT7;
559            pMgmt->abyIBSSSuppRates[5] |= BIT7;
560        }else if (sStartAPCmd.byBasicRate & BIT2) {
561             pMgmt->abyIBSSSuppRates[2] |= BIT7;
562             pMgmt->abyIBSSSuppRates[3] |= BIT7;
563             pMgmt->abyIBSSSuppRates[4] |= BIT7;
564        }else if (sStartAPCmd.byBasicRate & BIT1) {
565             pMgmt->abyIBSSSuppRates[2] |= BIT7;
566             pMgmt->abyIBSSSuppRates[3] |= BIT7;
567        }else if (sStartAPCmd.byBasicRate & BIT1) {
568             pMgmt->abyIBSSSuppRates[2] |= BIT7;
569        }else {
570            //default 1,2M
571             pMgmt->abyIBSSSuppRates[2] |= BIT7;
572             pMgmt->abyIBSSSuppRates[3] |= BIT7;
573        }
574
575        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Support Rate= %x %x %x %x\n",
576                pMgmt->abyIBSSSuppRates[2],
577                pMgmt->abyIBSSSuppRates[3],
578                pMgmt->abyIBSSSuppRates[4],
579                pMgmt->abyIBSSSuppRates[5]
580                );
581
582        netif_stop_queue(pDevice->dev);
583        spin_lock_irq(&pDevice->lock);
584	bScheduleCommand((void *) pDevice, WLAN_CMD_RUN_AP, NULL);
585        spin_unlock_irq(&pDevice->lock);
586        break;
587
588    case WLAN_CMD_GET_NODE_CNT:
589
590		cbListCount = 0;
591		pNode = &(pMgmt->sNodeDBTable[0]);
592        for (ii = 0; ii < (MAX_NODE_NUM + 1); ii++) {
593            pNode = &(pMgmt->sNodeDBTable[ii]);
594            if (!pNode->bActive)
595                continue;
596            cbListCount++;
597        };
598
599        sNodeList.uItem = cbListCount;
600        if (copy_to_user(pReq->data, &sNodeList, sizeof(SNodeList))) {
601			result = -EFAULT;
602			break;
603		};
604        pReq->wResult = 0;
605        break;
606
607    case WLAN_CMD_GET_NODE_LIST:
608
609        if (copy_from_user(&sNodeList, pReq->data, sizeof(SNodeList))) {
610			result = -EFAULT;
611			break;
612		};
613        pNodeList = (PSNodeList)kmalloc(sizeof(SNodeList) + (sNodeList.uItem * sizeof(SNodeItem)), (int)GFP_ATOMIC);
614        if (pNodeList == NULL) {
615            result = -ENOMEM;
616            break;
617        }
618		pNodeList->uItem = sNodeList.uItem;
619		pNode = &(pMgmt->sNodeDBTable[0]);
620        for (ii = 0, jj = 0; ii < (MAX_NODE_NUM + 1); ii++) {
621            pNode = &(pMgmt->sNodeDBTable[ii]);
622            if (pNode->bActive) {
623    		    pNodeList->sNodeList[jj].wAID = pNode->wAID;
624    		    memcpy(pNodeList->sNodeList[jj].abyMACAddr, pNode->abyMACAddr, WLAN_ADDR_LEN);
625    		    pNodeList->sNodeList[jj].wTxDataRate = pNode->wTxDataRate;
626    		    pNodeList->sNodeList[jj].wInActiveCount = (WORD)pNode->uInActiveCount;
627    		    pNodeList->sNodeList[jj].wEnQueueCnt = (WORD)pNode->wEnQueueCnt;
628    		    pNodeList->sNodeList[jj].wFlags = (WORD)pNode->dwFlags;
629    		    pNodeList->sNodeList[jj].bPWBitOn = pNode->bPSEnable;
630    		    pNodeList->sNodeList[jj].byKeyIndex = pNode->byKeyIndex;
631    		    pNodeList->sNodeList[jj].wWepKeyLength = pNode->uWepKeyLength;
632    		    memcpy(&(pNodeList->sNodeList[jj].abyWepKey[0]), &(pNode->abyWepKey[0]), WEP_KEYMAXLEN);
633                DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "key= %2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
634                            pNodeList->sNodeList[jj].abyWepKey[0],
635                            pNodeList->sNodeList[jj].abyWepKey[1],
636                            pNodeList->sNodeList[jj].abyWepKey[2],
637                            pNodeList->sNodeList[jj].abyWepKey[3],
638                            pNodeList->sNodeList[jj].abyWepKey[4]
639                           );
640    		    pNodeList->sNodeList[jj].bIsInFallback = pNode->bIsInFallback;
641    		    pNodeList->sNodeList[jj].uTxFailures = pNode->uTxFailures;
642    		    pNodeList->sNodeList[jj].uTxAttempts = pNode->uTxAttempts;
643    		    pNodeList->sNodeList[jj].wFailureRatio = (WORD)pNode->uFailureRatio;
644    		    jj ++;
645    		    if (jj >= pNodeList->uItem)
646    		        break;
647    		}
648		};
649        if (copy_to_user(pReq->data, pNodeList, sizeof(SNodeList) + (sNodeList.uItem * sizeof(SNodeItem)))) {
650			result = -EFAULT;
651			break;
652		};
653        kfree(pNodeList);
654        pReq->wResult = 0;
655        break;
656
657    case 0xFF:
658        memset(wpa_Result.ifname,0,sizeof(wpa_Result.ifname));
659	    wpa_Result.proto = 0;
660	    wpa_Result.key_mgmt = 0;
661	    wpa_Result.eap_type = 0;
662	    wpa_Result.authenticated = FALSE;
663	      pDevice->fWPA_Authened = FALSE;
664        if (copy_from_user(&wpa_Result, pReq->data, sizeof(wpa_Result))) {
665            result = -EFAULT;
666			break;
667		}
668//DavidWang  for some AP maybe good authenticate
669   if(wpa_Result.key_mgmt==0x20)
670      pMgmt->Cisco_cckm =1;
671    else
672    pMgmt->Cisco_cckm =0;
673//DavidWang
674
675if(wpa_Result.authenticated==TRUE) {
676   {
677     union iwreq_data      wrqu;
678
679     pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID;
680
681     memset(&wrqu, 0, sizeof(wrqu));
682     wrqu.data.flags = RT_WPACONNECTED_EVENT_FLAG;
683     wrqu.data.length =pItemSSID->len;
684     wireless_send_event(pDevice->dev, IWEVCUSTOM, &wrqu, pItemSSID->abySSID);
685   }
686         pDevice->fWPA_Authened = TRUE;           //is successful peer to wpa_Result.authenticated?
687}
688
689        //printk("get private wpa_supplicant announce WPA SM\n");
690	//printk("wpa-->ifname=%s\n",wpa_Result.ifname);
691	//printk("wpa-->proto=%d\n",wpa_Result.proto);
692	//printk("wpa-->key-mgmt=%d\n",wpa_Result.key_mgmt);
693	//printk("wpa-->eap_type=%d\n",wpa_Result.eap_type);
694	//printk("wpa-->authenticated is %s\n",(wpa_Result.authenticated==TRUE)?"TRUE":"FALSE");
695
696	pReq->wResult = 0;
697        break;
698
699    default:
700        DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Private command not support..\n");
701    }
702
703    return result;
704}
705