1 // SPDX-License-Identifier: GPL-2.0
2 /******************************************************************************
3  *
4  * Copyright(c) 2007 - 2012 Realtek Corporation. All rights reserved.
5  *
6  ******************************************************************************/
7 #define _IOCTL_LINUX_C_
8 
9 #include <linux/etherdevice.h>
10 #include <drv_types.h>
11 #include <rtw_debug.h>
12 #include <rtw_mp.h>
13 #include <hal_btcoex.h>
14 #include <linux/jiffies.h>
15 #include <linux/kernel.h>
16 
17 #define RTL_IOCTL_WPA_SUPPLICANT	(SIOCIWFIRSTPRIV+30)
18 
19 #define SCAN_ITEM_SIZE 768
20 #define MAX_CUSTOM_LEN 64
21 #define RATE_COUNT 4
22 
23 /*  combo scan */
24 #define WEXT_CSCAN_HEADER		"CSCAN S\x01\x00\x00S\x00"
25 #define WEXT_CSCAN_HEADER_SIZE		12
26 #define WEXT_CSCAN_SSID_SECTION		'S'
27 #define WEXT_CSCAN_CHANNEL_SECTION	'C'
28 #define WEXT_CSCAN_ACTV_DWELL_SECTION	'A'
29 #define WEXT_CSCAN_PASV_DWELL_SECTION	'P'
30 #define WEXT_CSCAN_HOME_DWELL_SECTION	'H'
31 #define WEXT_CSCAN_TYPE_SECTION		'T'
32 
33 static u32 rtw_rates[] = {1000000, 2000000, 5500000, 11000000,
34 	6000000, 9000000, 12000000, 18000000, 24000000, 36000000, 48000000, 54000000};
35 
36 void indicate_wx_scan_complete_event(struct adapter *padapter)
37 {
38 	union iwreq_data wrqu;
39 
40 	memset(&wrqu, 0, sizeof(union iwreq_data));
41 }
42 
43 
44 void rtw_indicate_wx_assoc_event(struct adapter *padapter)
45 {
46 	union iwreq_data wrqu;
47 	struct	mlme_priv *pmlmepriv = &padapter->mlmepriv;
48 	struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv;
49 	struct mlme_ext_info *pmlmeinfo = &(pmlmeext->mlmext_info);
50 	struct wlan_bssid_ex		*pnetwork = (struct wlan_bssid_ex *)(&(pmlmeinfo->network));
51 
52 	memset(&wrqu, 0, sizeof(union iwreq_data));
53 
54 	wrqu.ap_addr.sa_family = ARPHRD_ETHER;
55 
56 	if (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) == true)
57 		memcpy(wrqu.ap_addr.sa_data, pnetwork->MacAddress, ETH_ALEN);
58 	else
59 		memcpy(wrqu.ap_addr.sa_data, pmlmepriv->cur_network.network.MacAddress, ETH_ALEN);
60 
61 	netdev_dbg(padapter->pnetdev, "assoc success\n");
62 }
63 
64 void rtw_indicate_wx_disassoc_event(struct adapter *padapter)
65 {
66 	union iwreq_data wrqu;
67 
68 	memset(&wrqu, 0, sizeof(union iwreq_data));
69 
70 	wrqu.ap_addr.sa_family = ARPHRD_ETHER;
71 	eth_zero_addr(wrqu.ap_addr.sa_data);
72 }
73 
74 static char *translate_scan(struct adapter *padapter,
75 				struct iw_request_info *info, struct wlan_network *pnetwork,
76 				char *start, char *stop)
77 {
78 	struct iw_event iwe;
79 	u16 cap;
80 	u32 ht_ielen = 0;
81 	char *custom = NULL;
82 	char *p;
83 	u16 max_rate = 0, rate, ht_cap = false, vht_cap = false;
84 	u32 i = 0;
85 	u8 bw_40MHz = 0, short_GI = 0;
86 	u16 mcs_rate = 0, vht_data_rate = 0;
87 	u8 ie_offset = (pnetwork->network.Reserved[0] == 2 ? 0 : 12);
88 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
89 	u8 ss, sq;
90 
91 	/*  AP MAC address  */
92 	iwe.cmd = SIOCGIWAP;
93 	iwe.u.ap_addr.sa_family = ARPHRD_ETHER;
94 
95 	memcpy(iwe.u.ap_addr.sa_data, pnetwork->network.MacAddress, ETH_ALEN);
96 	start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_ADDR_LEN);
97 
98 	/* Add the ESSID */
99 	iwe.cmd = SIOCGIWESSID;
100 	iwe.u.data.flags = 1;
101 	iwe.u.data.length = min((u16)pnetwork->network.Ssid.SsidLength, (u16)32);
102 	start = iwe_stream_add_point(info, start, stop, &iwe, pnetwork->network.Ssid.Ssid);
103 
104 	/* parsing HT_CAP_IE */
105 	if (pnetwork->network.Reserved[0] == 2) { /*  Probe Request */
106 		p = rtw_get_ie(&pnetwork->network.IEs[0], WLAN_EID_HT_CAPABILITY, &ht_ielen, pnetwork->network.IELength);
107 	} else {
108 		p = rtw_get_ie(&pnetwork->network.IEs[12], WLAN_EID_HT_CAPABILITY, &ht_ielen, pnetwork->network.IELength-12);
109 	}
110 	if (p && ht_ielen > 0) {
111 		struct ieee80211_ht_cap *pht_capie;
112 		ht_cap = true;
113 		pht_capie = (struct ieee80211_ht_cap *)(p+2);
114 		memcpy(&mcs_rate, pht_capie->mcs.rx_mask, 2);
115 		bw_40MHz = (le16_to_cpu(pht_capie->cap_info) & IEEE80211_HT_CAP_SUP_WIDTH) ? 1 : 0;
116 		short_GI = (le16_to_cpu(pht_capie->cap_info) & (IEEE80211_HT_CAP_SGI_20 | IEEE80211_HT_CAP_SGI_40)) ? 1 : 0;
117 	}
118 
119 	/* Add the protocol name */
120 	iwe.cmd = SIOCGIWNAME;
121 	if (rtw_is_cckratesonly_included((u8 *)&pnetwork->network.SupportedRates)) {
122 		if (ht_cap)
123 			snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bn");
124 		else
125 		snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11b");
126 	} else if (rtw_is_cckrates_included((u8 *)&pnetwork->network.SupportedRates)) {
127 		if (ht_cap)
128 			snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bgn");
129 		else
130 			snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bg");
131 	} else {
132 		if (pnetwork->network.Configuration.DSConfig > 14) {
133 			if (vht_cap)
134 				snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11AC");
135 			else if (ht_cap)
136 				snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11an");
137 			else
138 				snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11a");
139 		} else {
140 			if (ht_cap)
141 				snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11gn");
142 			else
143 				snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11g");
144 		}
145 	}
146 
147 	start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_CHAR_LEN);
148 
149 	  /* Add mode */
150 	if (pnetwork->network.Reserved[0] == 2) { /*  Probe Request */
151 		cap = 0;
152 	} else {
153 		__le16 le_tmp;
154 
155 	        iwe.cmd = SIOCGIWMODE;
156 		memcpy((u8 *)&le_tmp, rtw_get_capability_from_ie(pnetwork->network.IEs), 2);
157 		cap = le16_to_cpu(le_tmp);
158 	}
159 
160 	if (cap & (WLAN_CAPABILITY_IBSS | WLAN_CAPABILITY_ESS)) {
161 		if (cap & WLAN_CAPABILITY_ESS)
162 			iwe.u.mode = IW_MODE_MASTER;
163 		else
164 			iwe.u.mode = IW_MODE_ADHOC;
165 
166 		start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_UINT_LEN);
167 	}
168 
169 	if (pnetwork->network.Configuration.DSConfig < 1 /*|| pnetwork->network.Configuration.DSConfig > 14*/)
170 		pnetwork->network.Configuration.DSConfig = 1;
171 
172 	 /* Add frequency/channel */
173 	iwe.cmd = SIOCGIWFREQ;
174 	iwe.u.freq.m = rtw_ch2freq(pnetwork->network.Configuration.DSConfig) * 100000;
175 	iwe.u.freq.e = 1;
176 	iwe.u.freq.i = pnetwork->network.Configuration.DSConfig;
177 	start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_FREQ_LEN);
178 
179 	/* Add encryption capability */
180 	iwe.cmd = SIOCGIWENCODE;
181 	if (cap & WLAN_CAPABILITY_PRIVACY)
182 		iwe.u.data.flags = IW_ENCODE_ENABLED | IW_ENCODE_NOKEY;
183 	else
184 		iwe.u.data.flags = IW_ENCODE_DISABLED;
185 	iwe.u.data.length = 0;
186 	start = iwe_stream_add_point(info, start, stop, &iwe, pnetwork->network.Ssid.Ssid);
187 
188 	/*Add basic and extended rates */
189 	max_rate = 0;
190 	custom = kzalloc(MAX_CUSTOM_LEN, GFP_ATOMIC);
191 	if (!custom)
192 		return start;
193 	p = custom;
194 	p += scnprintf(p, MAX_CUSTOM_LEN - (p - custom), " Rates (Mb/s): ");
195 	while (pnetwork->network.SupportedRates[i] != 0) {
196 		rate = pnetwork->network.SupportedRates[i]&0x7F;
197 		if (rate > max_rate)
198 			max_rate = rate;
199 		p += scnprintf(p, MAX_CUSTOM_LEN - (p - custom),
200 			      "%d%s ", rate >> 1, (rate & 1) ? ".5" : "");
201 		i++;
202 	}
203 
204 	if (vht_cap) {
205 		max_rate = vht_data_rate;
206 	} else if (ht_cap) {
207 		if (mcs_rate & 0x8000) /* MCS15 */
208 			max_rate = (bw_40MHz) ? ((short_GI)?300:270):((short_GI)?144:130);
209 		else /* default MCS7 */
210 			max_rate = (bw_40MHz) ? ((short_GI)?150:135):((short_GI)?72:65);
211 
212 		max_rate = max_rate*2;/* Mbps/2; */
213 	}
214 
215 	iwe.cmd = SIOCGIWRATE;
216 	iwe.u.bitrate.fixed = iwe.u.bitrate.disabled = 0;
217 	iwe.u.bitrate.value = max_rate * 500000;
218 	start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_PARAM_LEN);
219 
220 	/* parsing WPA/WPA2 IE */
221 	if (pnetwork->network.Reserved[0] != 2) { /*  Probe Request */
222 		u8 *buf;
223 		u8 wpa_ie[255], rsn_ie[255];
224 		u16 wpa_len = 0, rsn_len = 0;
225 		u8 *p;
226 		rtw_get_sec_ie(pnetwork->network.IEs, pnetwork->network.IELength, rsn_ie, &rsn_len, wpa_ie, &wpa_len);
227 
228 		buf = kzalloc(MAX_WPA_IE_LEN*2, GFP_ATOMIC);
229 		if (!buf)
230 			return start;
231 		if (wpa_len > 0) {
232 			p = buf;
233 			p += scnprintf(p, (MAX_WPA_IE_LEN * 2) - (p - buf), "wpa_ie =");
234 			for (i = 0; i < wpa_len; i++)
235 				p += scnprintf(p, (MAX_WPA_IE_LEN * 2) - (p - buf),
236 						"%02x", wpa_ie[i]);
237 
238 			if (wpa_len > 100) {
239 				printk("-----------------Len %d----------------\n", wpa_len);
240 				for (i = 0; i < wpa_len; i++)
241 					printk("%02x ", wpa_ie[i]);
242 				printk("\n");
243 				printk("-----------------Len %d----------------\n", wpa_len);
244 			}
245 
246 			memset(&iwe, 0, sizeof(iwe));
247 			iwe.cmd = IWEVCUSTOM;
248 			iwe.u.data.length = strlen(buf);
249 			start = iwe_stream_add_point(info, start, stop, &iwe, buf);
250 
251 			memset(&iwe, 0, sizeof(iwe));
252 			iwe.cmd = IWEVGENIE;
253 			iwe.u.data.length = wpa_len;
254 			start = iwe_stream_add_point(info, start, stop, &iwe, wpa_ie);
255 		}
256 		if (rsn_len > 0) {
257 			p = buf;
258 			memset(buf, 0, MAX_WPA_IE_LEN*2);
259 			p += scnprintf(p, (MAX_WPA_IE_LEN * 2) - (p - buf), "rsn_ie =");
260 			for (i = 0; i < rsn_len; i++)
261 				p += scnprintf(p, (MAX_WPA_IE_LEN * 2) - (p - buf),
262 						"%02x", rsn_ie[i]);
263 			memset(&iwe, 0, sizeof(iwe));
264 			iwe.cmd = IWEVCUSTOM;
265 			iwe.u.data.length = strlen(buf);
266 			start = iwe_stream_add_point(info, start, stop, &iwe, buf);
267 
268 			memset(&iwe, 0, sizeof(iwe));
269 			iwe.cmd = IWEVGENIE;
270 			iwe.u.data.length = rsn_len;
271 			start = iwe_stream_add_point(info, start, stop, &iwe, rsn_ie);
272 		}
273 		kfree(buf);
274 	}
275 
276 	{ /* parsing WPS IE */
277 		uint cnt = 0, total_ielen;
278 		u8 *wpsie_ptr = NULL;
279 		uint wps_ielen = 0;
280 
281 		u8 *ie_ptr;
282 		total_ielen = pnetwork->network.IELength - ie_offset;
283 
284 		if (pnetwork->network.Reserved[0] == 2) { /*  Probe Request */
285 			ie_ptr = pnetwork->network.IEs;
286 			total_ielen = pnetwork->network.IELength;
287 		} else {    /*  Beacon or Probe Respones */
288 			ie_ptr = pnetwork->network.IEs + _FIXED_IE_LENGTH_;
289 			total_ielen = pnetwork->network.IELength - _FIXED_IE_LENGTH_;
290 		}
291 
292 		while (cnt < total_ielen) {
293 			if (rtw_is_wps_ie(&ie_ptr[cnt], &wps_ielen) && (wps_ielen > 2)) {
294 				wpsie_ptr = &ie_ptr[cnt];
295 				iwe.cmd = IWEVGENIE;
296 				iwe.u.data.length = (u16)wps_ielen;
297 				start = iwe_stream_add_point(info, start, stop, &iwe, wpsie_ptr);
298 			}
299 			cnt += ie_ptr[cnt + 1] + 2; /* goto next */
300 		}
301 	}
302 
303 	/* Add quality statistics */
304 	iwe.cmd = IWEVQUAL;
305 	iwe.u.qual.updated = IW_QUAL_QUAL_UPDATED | IW_QUAL_LEVEL_UPDATED
306 		| IW_QUAL_NOISE_INVALID;
307 
308 	if (check_fwstate(pmlmepriv, _FW_LINKED) == true &&
309 		is_same_network(&pmlmepriv->cur_network.network, &pnetwork->network, 0)) {
310 		ss = padapter->recvpriv.signal_strength;
311 		sq = padapter->recvpriv.signal_qual;
312 	} else {
313 		ss = pnetwork->network.PhyInfo.SignalStrength;
314 		sq = pnetwork->network.PhyInfo.SignalQuality;
315 	}
316 
317 
318 	iwe.u.qual.level = (u8)ss;/*  */
319 
320 	iwe.u.qual.qual = (u8)sq;   /*  signal quality */
321 
322 	iwe.u.qual.noise = 0; /*  noise level */
323 
324 	start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_QUAL_LEN);
325 
326 	{
327 		u8 *buf;
328 		u8 *pos;
329 
330 		buf = kzalloc(MAX_WPA_IE_LEN, GFP_ATOMIC);
331 		if (!buf)
332 			goto exit;
333 
334 		pos = pnetwork->network.Reserved;
335 		memset(&iwe, 0, sizeof(iwe));
336 		iwe.cmd = IWEVCUSTOM;
337 		iwe.u.data.length = scnprintf(buf, MAX_WPA_IE_LEN, "fm =%02X%02X", pos[1], pos[0]);
338 		start = iwe_stream_add_point(info, start, stop, &iwe, buf);
339 		kfree(buf);
340 	}
341 exit:
342 	kfree(custom);
343 
344 	return start;
345 }
346 
347 static int wpa_set_auth_algs(struct net_device *dev, u32 value)
348 {
349 	struct adapter *padapter = rtw_netdev_priv(dev);
350 	int ret = 0;
351 
352 	if ((value & WLAN_AUTH_SHARED_KEY) && (value & WLAN_AUTH_OPEN)) {
353 		padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
354 		padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeAutoSwitch;
355 		padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Auto;
356 	} else if (value & WLAN_AUTH_SHARED_KEY)	{
357 		padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
358 
359 		padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeShared;
360 		padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Shared;
361 	} else if (value & WLAN_AUTH_OPEN) {
362 		/* padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled; */
363 		if (padapter->securitypriv.ndisauthtype < Ndis802_11AuthModeWPAPSK) {
364 			padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeOpen;
365 			padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open;
366 		}
367 	} else {
368 		ret = -EINVAL;
369 	}
370 
371 	return ret;
372 
373 }
374 
375 static int wpa_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len)
376 {
377 	int ret = 0;
378 	u32 wep_key_idx, wep_key_len, wep_total_len;
379 	struct ndis_802_11_wep	 *pwep = NULL;
380 	struct adapter *padapter = rtw_netdev_priv(dev);
381 	struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
382 	struct security_priv *psecuritypriv = &padapter->securitypriv;
383 
384 	param->u.crypt.err = 0;
385 	param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
386 
387 	if (param_len < (u32)((u8 *)param->u.crypt.key - (u8 *)param) + param->u.crypt.key_len) {
388 		ret =  -EINVAL;
389 		goto exit;
390 	}
391 
392 	if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
393 	    param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
394 	    param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
395 		if (param->u.crypt.idx >= WEP_KEYS ||
396 		    param->u.crypt.idx >= BIP_MAX_KEYID) {
397 			ret = -EINVAL;
398 			goto exit;
399 		}
400 	} else {
401 		{
402 			ret = -EINVAL;
403 			goto exit;
404 		}
405 	}
406 
407 	if (strcmp(param->u.crypt.alg, "WEP") == 0) {
408 
409 		padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
410 		padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
411 		padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_;
412 
413 		wep_key_idx = param->u.crypt.idx;
414 		wep_key_len = param->u.crypt.key_len;
415 
416 		if (wep_key_idx > WEP_KEYS)
417 			return -EINVAL;
418 
419 		if (wep_key_len > 0) {
420 			wep_key_len = wep_key_len <= 5 ? 5 : 13;
421 			wep_total_len = wep_key_len + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial);
422 			pwep = kzalloc(wep_total_len, GFP_KERNEL);
423 			if (!pwep)
424 				goto exit;
425 
426 			pwep->KeyLength = wep_key_len;
427 			pwep->Length = wep_total_len;
428 
429 			if (wep_key_len == 13) {
430 				padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_;
431 				padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_;
432 			}
433 		} else {
434 			ret = -EINVAL;
435 			goto exit;
436 		}
437 
438 		pwep->KeyIndex = wep_key_idx;
439 		pwep->KeyIndex |= 0x80000000;
440 
441 		memcpy(pwep->KeyMaterial,  param->u.crypt.key, pwep->KeyLength);
442 
443 		if (param->u.crypt.set_tx) {
444 			if (rtw_set_802_11_add_wep(padapter, pwep) == (u8)_FAIL)
445 				ret = -EOPNOTSUPP;
446 		} else {
447 			/* don't update "psecuritypriv->dot11PrivacyAlgrthm" and */
448 			/* psecuritypriv->dot11PrivacyKeyIndex =keyid", but can rtw_set_key to fw/cam */
449 
450 			if (wep_key_idx >= WEP_KEYS) {
451 				ret = -EOPNOTSUPP;
452 				goto exit;
453 			}
454 
455 			memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
456 			psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
457 			rtw_set_key(padapter, psecuritypriv, wep_key_idx, 0, true);
458 		}
459 
460 		goto exit;
461 	}
462 
463 	if (padapter->securitypriv.dot11AuthAlgrthm == dot11AuthAlgrthm_8021X) { /*  802_1x */
464 		struct sta_info *psta, *pbcmc_sta;
465 		struct sta_priv *pstapriv = &padapter->stapriv;
466 
467 		if (check_fwstate(pmlmepriv, WIFI_STATION_STATE | WIFI_MP_STATE) == true) { /* sta mode */
468 			psta = rtw_get_stainfo(pstapriv, get_bssid(pmlmepriv));
469 			if (psta == NULL) {
470 				/* DEBUG_ERR(("Set wpa_set_encryption: Obtain Sta_info fail\n")); */
471 			} else {
472 				/* Jeff: don't disable ieee8021x_blocked while clearing key */
473 				if (strcmp(param->u.crypt.alg, "none") != 0)
474 					psta->ieee8021x_blocked = false;
475 
476 				if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled) ||
477 						(padapter->securitypriv.ndisencryptstatus ==  Ndis802_11Encryption3Enabled)) {
478 					psta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm;
479 				}
480 
481 				if (param->u.crypt.set_tx == 1) { /* pairwise key */
482 					memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
483 
484 					if (strcmp(param->u.crypt.alg, "TKIP") == 0) { /* set mic key */
485 						/* DEBUG_ERR(("\nset key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len)); */
486 						memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
487 						memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
488 
489 						padapter->securitypriv.busetkipkey = false;
490 						/* _set_timer(&padapter->securitypriv.tkip_timer, 50); */
491 					}
492 
493 					rtw_setstakey_cmd(padapter, psta, true, true);
494 				} else { /* group key */
495 					if (strcmp(param->u.crypt.alg, "TKIP") == 0 || strcmp(param->u.crypt.alg, "CCMP") == 0) {
496 						memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
497 						/* only TKIP group key need to install this */
498 						if (param->u.crypt.key_len > 16) {
499 							memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
500 							memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
501 						}
502 						padapter->securitypriv.binstallGrpkey = true;
503 
504 						padapter->securitypriv.dot118021XGrpKeyid = param->u.crypt.idx;
505 
506 						rtw_set_key(padapter, &padapter->securitypriv, param->u.crypt.idx, 1, true);
507 					} else if (strcmp(param->u.crypt.alg, "BIP") == 0) {
508 						/* printk("BIP key_len =%d , index =%d @@@@@@@@@@@@@@@@@@\n", param->u.crypt.key_len, param->u.crypt.idx); */
509 						/* save the IGTK key, length 16 bytes */
510 						memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
511 						/*printk("IGTK key below:\n");
512 						for (no = 0;no<16;no++)
513 							printk(" %02x ", padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey[no]);
514 						printk("\n");*/
515 						padapter->securitypriv.dot11wBIPKeyid = param->u.crypt.idx;
516 						padapter->securitypriv.binstallBIPkey = true;
517 					}
518 				}
519 			}
520 
521 			pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
522 			if (pbcmc_sta == NULL) {
523 				/* DEBUG_ERR(("Set OID_802_11_ADD_KEY: bcmc stainfo is null\n")); */
524 			} else {
525 				/* Jeff: don't disable ieee8021x_blocked while clearing key */
526 				if (strcmp(param->u.crypt.alg, "none") != 0)
527 					pbcmc_sta->ieee8021x_blocked = false;
528 
529 				if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled) ||
530 						(padapter->securitypriv.ndisencryptstatus ==  Ndis802_11Encryption3Enabled)) {
531 					pbcmc_sta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm;
532 				}
533 			}
534 		} else if (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE)) {
535 			/* adhoc mode */
536 		}
537 	}
538 
539 exit:
540 
541 	kfree(pwep);
542 	return ret;
543 }
544 
545 static int rtw_set_wpa_ie(struct adapter *padapter, char *pie, unsigned short ielen)
546 {
547 	u8 *buf = NULL;
548 	int group_cipher = 0, pairwise_cipher = 0;
549 	int ret = 0;
550 	u8 null_addr[] = {0, 0, 0, 0, 0, 0};
551 
552 	if ((ielen > MAX_WPA_IE_LEN) || (pie == NULL)) {
553 		_clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS);
554 		if (pie == NULL)
555 			return ret;
556 		else
557 			return -EINVAL;
558 	}
559 
560 	if (ielen) {
561 		buf = rtw_zmalloc(ielen);
562 		if (buf == NULL) {
563 			ret =  -ENOMEM;
564 			goto exit;
565 		}
566 
567 		memcpy(buf, pie, ielen);
568 
569 		if (ielen < RSN_HEADER_LEN) {
570 			ret  = -1;
571 			goto exit;
572 		}
573 
574 		if (rtw_parse_wpa_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
575 			padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
576 			padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK;
577 			memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
578 		}
579 
580 		if (rtw_parse_wpa2_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) {
581 			padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X;
582 			padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK;
583 			memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
584 		}
585 
586 		if (group_cipher == 0)
587 			group_cipher = WPA_CIPHER_NONE;
588 		if (pairwise_cipher == 0)
589 			pairwise_cipher = WPA_CIPHER_NONE;
590 
591 		switch (group_cipher) {
592 		case WPA_CIPHER_NONE:
593 			padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
594 			padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
595 			break;
596 		case WPA_CIPHER_WEP40:
597 			padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_;
598 			padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
599 			break;
600 		case WPA_CIPHER_TKIP:
601 			padapter->securitypriv.dot118021XGrpPrivacy = _TKIP_;
602 			padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
603 			break;
604 		case WPA_CIPHER_CCMP:
605 			padapter->securitypriv.dot118021XGrpPrivacy = _AES_;
606 			padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
607 			break;
608 		case WPA_CIPHER_WEP104:
609 			padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_;
610 			padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
611 			break;
612 		}
613 
614 		switch (pairwise_cipher) {
615 		case WPA_CIPHER_NONE:
616 			padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
617 			padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
618 			break;
619 		case WPA_CIPHER_WEP40:
620 			padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
621 			padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
622 			break;
623 		case WPA_CIPHER_TKIP:
624 			padapter->securitypriv.dot11PrivacyAlgrthm = _TKIP_;
625 			padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
626 			break;
627 		case WPA_CIPHER_CCMP:
628 			padapter->securitypriv.dot11PrivacyAlgrthm = _AES_;
629 			padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
630 			break;
631 		case WPA_CIPHER_WEP104:
632 			padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_;
633 			padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
634 			break;
635 		}
636 
637 		_clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS);
638 		{/* set wps_ie */
639 			u16 cnt = 0;
640 			u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
641 
642 			while (cnt < ielen) {
643 				eid = buf[cnt];
644 
645 				if ((eid == WLAN_EID_VENDOR_SPECIFIC) && (!memcmp(&buf[cnt+2], wps_oui, 4))) {
646 					padapter->securitypriv.wps_ie_len = ((buf[cnt+1]+2) < MAX_WPS_IE_LEN) ? (buf[cnt+1]+2):MAX_WPS_IE_LEN;
647 
648 					memcpy(padapter->securitypriv.wps_ie, &buf[cnt], padapter->securitypriv.wps_ie_len);
649 
650 					set_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS);
651 
652 					cnt += buf[cnt+1]+2;
653 
654 					break;
655 				} else {
656 					cnt += buf[cnt+1]+2; /* goto next */
657 				}
658 			}
659 		}
660 	}
661 
662 	/* TKIP and AES disallow multicast packets until installing group key */
663         if (padapter->securitypriv.dot11PrivacyAlgrthm == _TKIP_
664                 || padapter->securitypriv.dot11PrivacyAlgrthm == _TKIP_WTMIC_
665                 || padapter->securitypriv.dot11PrivacyAlgrthm == _AES_)
666                 /* WPS open need to enable multicast */
667                 /*  check_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS) == true) */
668                 rtw_hal_set_hwreg(padapter, HW_VAR_OFF_RCR_AM, null_addr);
669 
670 exit:
671 
672 	kfree(buf);
673 
674 	return ret;
675 }
676 
677 static int rtw_wx_get_name(struct net_device *dev,
678 			     struct iw_request_info *info,
679 			     union iwreq_data *wrqu, char *extra)
680 {
681 	struct adapter *padapter = rtw_netdev_priv(dev);
682 	u32 ht_ielen = 0;
683 	char *p;
684 	u8 ht_cap = false, vht_cap = false;
685 	struct	mlme_priv *pmlmepriv = &(padapter->mlmepriv);
686 	struct wlan_bssid_ex  *pcur_bss = &pmlmepriv->cur_network.network;
687 	NDIS_802_11_RATES_EX *prates = NULL;
688 
689 	if (check_fwstate(pmlmepriv, _FW_LINKED|WIFI_ADHOC_MASTER_STATE) == true) {
690 		/* parsing HT_CAP_IE */
691 		p = rtw_get_ie(&pcur_bss->IEs[12], WLAN_EID_HT_CAPABILITY, &ht_ielen, pcur_bss->IELength-12);
692 		if (p && ht_ielen > 0)
693 			ht_cap = true;
694 
695 		prates = &pcur_bss->SupportedRates;
696 
697 		if (rtw_is_cckratesonly_included((u8 *)prates)) {
698 			if (ht_cap)
699 				snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bn");
700 			else
701 				snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11b");
702 		} else if (rtw_is_cckrates_included((u8 *)prates)) {
703 			if (ht_cap)
704 				snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bgn");
705 			else
706 				snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bg");
707 		} else {
708 			if (pcur_bss->Configuration.DSConfig > 14) {
709 				if (vht_cap)
710 					snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11AC");
711 				else if (ht_cap)
712 					snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11an");
713 				else
714 					snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11a");
715 			} else {
716 				if (ht_cap)
717 					snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11gn");
718 				else
719 					snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11g");
720 			}
721 		}
722 	} else {
723 		/* prates = &padapter->registrypriv.dev_network.SupportedRates; */
724 		/* snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11g"); */
725 		snprintf(wrqu->name, IFNAMSIZ, "unassociated");
726 	}
727 	return 0;
728 }
729 
730 static int rtw_wx_set_freq(struct net_device *dev,
731 			     struct iw_request_info *info,
732 			     union iwreq_data *wrqu, char *extra)
733 {
734 	return 0;
735 }
736 
737 static int rtw_wx_get_freq(struct net_device *dev,
738 			     struct iw_request_info *info,
739 			     union iwreq_data *wrqu, char *extra)
740 {
741 	struct adapter *padapter = rtw_netdev_priv(dev);
742 	struct	mlme_priv *pmlmepriv = &(padapter->mlmepriv);
743 	struct wlan_bssid_ex  *pcur_bss = &pmlmepriv->cur_network.network;
744 
745 	if (check_fwstate(pmlmepriv, _FW_LINKED) == true) {
746 		/* wrqu->freq.m = ieee80211_wlan_frequencies[pcur_bss->Configuration.DSConfig-1] * 100000; */
747 		wrqu->freq.m = rtw_ch2freq(pcur_bss->Configuration.DSConfig) * 100000;
748 		wrqu->freq.e = 1;
749 		wrqu->freq.i = pcur_bss->Configuration.DSConfig;
750 
751 	} else {
752 		wrqu->freq.m = rtw_ch2freq(padapter->mlmeextpriv.cur_channel) * 100000;
753 		wrqu->freq.e = 1;
754 		wrqu->freq.i = padapter->mlmeextpriv.cur_channel;
755 	}
756 
757 	return 0;
758 }
759 
760 static int rtw_wx_set_mode(struct net_device *dev, struct iw_request_info *a,
761 			     union iwreq_data *wrqu, char *b)
762 {
763 	struct adapter *padapter = rtw_netdev_priv(dev);
764 	enum ndis_802_11_network_infrastructure networkType;
765 	int ret = 0;
766 
767 	if (_FAIL == rtw_pwr_wakeup(padapter)) {
768 		ret = -EPERM;
769 		goto exit;
770 	}
771 
772 	if (!padapter->hw_init_completed) {
773 		ret = -EPERM;
774 		goto exit;
775 	}
776 
777 	switch (wrqu->mode) {
778 	case IW_MODE_AUTO:
779 		networkType = Ndis802_11AutoUnknown;
780 		break;
781 	case IW_MODE_ADHOC:
782 		networkType = Ndis802_11IBSS;
783 		break;
784 	case IW_MODE_MASTER:
785 		networkType = Ndis802_11APMode;
786 		/* rtw_setopmode_cmd(padapter, networkType, true); */
787 		break;
788 	case IW_MODE_INFRA:
789 		networkType = Ndis802_11Infrastructure;
790 		break;
791 	default:
792 		ret = -EINVAL;
793 		goto exit;
794 	}
795 
796 /*
797 	if (Ndis802_11APMode == networkType)
798 	{
799 		rtw_setopmode_cmd(padapter, networkType, true);
800 	}
801 	else
802 	{
803 		rtw_setopmode_cmd(padapter, Ndis802_11AutoUnknown, true);
804 	}
805 */
806 
807 	if (rtw_set_802_11_infrastructure_mode(padapter, networkType) == false) {
808 
809 		ret = -EPERM;
810 		goto exit;
811 
812 	}
813 
814 	rtw_setopmode_cmd(padapter, networkType, true);
815 
816 exit:
817 	return ret;
818 }
819 
820 static int rtw_wx_get_mode(struct net_device *dev, struct iw_request_info *a,
821 			     union iwreq_data *wrqu, char *b)
822 {
823 	struct adapter *padapter = rtw_netdev_priv(dev);
824 	struct	mlme_priv *pmlmepriv = &(padapter->mlmepriv);
825 
826 	if (check_fwstate(pmlmepriv, WIFI_STATION_STATE) == true) {
827 		wrqu->mode = IW_MODE_INFRA;
828 	} else if  ((check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) == true) ||
829 		       (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE) == true)) {
830 		wrqu->mode = IW_MODE_ADHOC;
831 	} else if (check_fwstate(pmlmepriv, WIFI_AP_STATE) == true) {
832 		wrqu->mode = IW_MODE_MASTER;
833 	} else {
834 		wrqu->mode = IW_MODE_AUTO;
835 	}
836 	return 0;
837 }
838 
839 
840 static int rtw_wx_set_pmkid(struct net_device *dev,
841 	                     struct iw_request_info *a,
842 			     union iwreq_data *wrqu, char *extra)
843 {
844 	struct adapter *padapter = rtw_netdev_priv(dev);
845 	u8          j, blInserted = false;
846 	int         intReturn = false;
847 	struct security_priv *psecuritypriv = &padapter->securitypriv;
848         struct iw_pmksa *pPMK = (struct iw_pmksa *)extra;
849         u8     strZeroMacAddress[ETH_ALEN] = { 0x00 };
850         u8     strIssueBssid[ETH_ALEN] = { 0x00 };
851 
852 	/*
853         There are the BSSID information in the bssid.sa_data array.
854         If cmd is IW_PMKSA_FLUSH, it means the wpa_suppplicant wants to clear all the PMKID information.
855         If cmd is IW_PMKSA_ADD, it means the wpa_supplicant wants to add a PMKID/BSSID to driver.
856         If cmd is IW_PMKSA_REMOVE, it means the wpa_supplicant wants to remove a PMKID/BSSID from driver.
857         */
858 
859 	memcpy(strIssueBssid, pPMK->bssid.sa_data, ETH_ALEN);
860         if (pPMK->cmd == IW_PMKSA_ADD) {
861                 if (!memcmp(strIssueBssid, strZeroMacAddress, ETH_ALEN))
862 			return intReturn;
863                 else
864                     intReturn = true;
865 
866 		blInserted = false;
867 
868 		/* overwrite PMKID */
869 		for (j = 0; j < NUM_PMKID_CACHE; j++) {
870 			if (!memcmp(psecuritypriv->PMKIDList[j].Bssid, strIssueBssid, ETH_ALEN)) {
871 
872 				memcpy(psecuritypriv->PMKIDList[j].PMKID, pPMK->pmkid, IW_PMKID_LEN);
873                                 psecuritypriv->PMKIDList[j].bUsed = true;
874 				psecuritypriv->PMKIDIndex = j+1;
875 				blInserted = true;
876 				break;
877 			}
878 	        }
879 
880 	        if (!blInserted) {
881 
882 	            memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, strIssueBssid, ETH_ALEN);
883 		    memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, pPMK->pmkid, IW_PMKID_LEN);
884 
885                     psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].bUsed = true;
886 		    psecuritypriv->PMKIDIndex++;
887 		    if (psecuritypriv->PMKIDIndex == 16)
888 		        psecuritypriv->PMKIDIndex = 0;
889 		}
890 	} else if (pPMK->cmd == IW_PMKSA_REMOVE) {
891 		intReturn = true;
892 		for (j = 0; j < NUM_PMKID_CACHE; j++) {
893 			if (!memcmp(psecuritypriv->PMKIDList[j].Bssid, strIssueBssid, ETH_ALEN)) {
894 				/*  BSSID is matched, the same AP => Remove this PMKID information and reset it. */
895 				eth_zero_addr(psecuritypriv->PMKIDList[j].Bssid);
896 				psecuritypriv->PMKIDList[j].bUsed = false;
897 				break;
898 			}
899 	        }
900 	} else if (pPMK->cmd == IW_PMKSA_FLUSH) {
901 		memset(&psecuritypriv->PMKIDList[0], 0x00, sizeof(struct rt_pmkid_list) * NUM_PMKID_CACHE);
902 		psecuritypriv->PMKIDIndex = 0;
903 		intReturn = true;
904 	}
905 	return intReturn;
906 }
907 
908 static int rtw_wx_get_sens(struct net_device *dev,
909 			     struct iw_request_info *info,
910 			     union iwreq_data *wrqu, char *extra)
911 {
912 	{
913 		wrqu->sens.value = 0;
914 		wrqu->sens.fixed = 0;	/* no auto select */
915 		wrqu->sens.disabled = 1;
916 	}
917 	return 0;
918 }
919 
920 static int rtw_wx_get_range(struct net_device *dev,
921 				struct iw_request_info *info,
922 				union iwreq_data *wrqu, char *extra)
923 {
924 	struct iw_range *range = (struct iw_range *)extra;
925 	struct adapter *padapter = rtw_netdev_priv(dev);
926 	struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv;
927 
928 	u16 val;
929 	int i;
930 
931 	wrqu->data.length = sizeof(*range);
932 	memset(range, 0, sizeof(*range));
933 
934 	/* Let's try to keep this struct in the same order as in
935 	 * linux/include/wireless.h
936 	 */
937 
938 	/* TODO: See what values we can set, and remove the ones we can't
939 	 * set, or fill them with some default data.
940 	 */
941 
942 	/* ~5 Mb/s real (802.11b) */
943 	range->throughput = 5 * 1000 * 1000;
944 
945 	/* signal level threshold range */
946 
947 	/* percent values between 0 and 100. */
948 	range->max_qual.qual = 100;
949 	range->max_qual.level = 100;
950 	range->max_qual.noise = 100;
951 	range->max_qual.updated = 7; /* Updated all three */
952 
953 
954 	range->avg_qual.qual = 92; /* > 8% missed beacons is 'bad' */
955 	/* TODO: Find real 'good' to 'bad' threshol value for RSSI */
956 	range->avg_qual.level = 256 - 78;
957 	range->avg_qual.noise = 0;
958 	range->avg_qual.updated = 7; /* Updated all three */
959 
960 	range->num_bitrates = RATE_COUNT;
961 
962 	for (i = 0; i < RATE_COUNT && i < IW_MAX_BITRATES; i++)
963 		range->bitrate[i] = rtw_rates[i];
964 
965 	range->min_frag = MIN_FRAG_THRESHOLD;
966 	range->max_frag = MAX_FRAG_THRESHOLD;
967 
968 	range->pm_capa = 0;
969 
970 	range->we_version_compiled = WIRELESS_EXT;
971 	range->we_version_source = 16;
972 
973 	for (i = 0, val = 0; i < MAX_CHANNEL_NUM; i++) {
974 
975 		/*  Include only legal frequencies for some countries */
976 		if (pmlmeext->channel_set[i].ChannelNum != 0) {
977 			range->freq[val].i = pmlmeext->channel_set[i].ChannelNum;
978 			range->freq[val].m = rtw_ch2freq(pmlmeext->channel_set[i].ChannelNum) * 100000;
979 			range->freq[val].e = 1;
980 			val++;
981 		}
982 
983 		if (val == IW_MAX_FREQUENCIES)
984 			break;
985 	}
986 
987 	range->num_channels = val;
988 	range->num_frequency = val;
989 
990 /*  Commented by Albert 2009/10/13 */
991 /*  The following code will proivde the security capability to network manager. */
992 /*  If the driver doesn't provide this capability to network manager, */
993 /*  the WPA/WPA2 routers can't be chosen in the network manager. */
994 
995 /*
996 #define IW_SCAN_CAPA_NONE		0x00
997 #define IW_SCAN_CAPA_ESSID		0x01
998 #define IW_SCAN_CAPA_BSSID		0x02
999 #define IW_SCAN_CAPA_CHANNEL	0x04
1000 #define IW_SCAN_CAPA_MODE		0x08
1001 #define IW_SCAN_CAPA_RATE		0x10
1002 #define IW_SCAN_CAPA_TYPE		0x20
1003 #define IW_SCAN_CAPA_TIME		0x40
1004 */
1005 
1006 	range->enc_capa = IW_ENC_CAPA_WPA | IW_ENC_CAPA_WPA2 |
1007 			  IW_ENC_CAPA_CIPHER_TKIP | IW_ENC_CAPA_CIPHER_CCMP;
1008 
1009 	range->scan_capa = IW_SCAN_CAPA_ESSID | IW_SCAN_CAPA_TYPE | IW_SCAN_CAPA_BSSID |
1010 					IW_SCAN_CAPA_CHANNEL | IW_SCAN_CAPA_MODE | IW_SCAN_CAPA_RATE;
1011 
1012 	return 0;
1013 }
1014 
1015 /* set bssid flow */
1016 /* s1. rtw_set_802_11_infrastructure_mode() */
1017 /* s2. rtw_set_802_11_authentication_mode() */
1018 /* s3. set_802_11_encryption_mode() */
1019 /* s4. rtw_set_802_11_bssid() */
1020 static int rtw_wx_set_wap(struct net_device *dev,
1021 			 struct iw_request_info *info,
1022 			 union iwreq_data *awrq,
1023 			 char *extra)
1024 {
1025 	uint ret = 0;
1026 	struct adapter *padapter = rtw_netdev_priv(dev);
1027 	struct sockaddr *temp = (struct sockaddr *)awrq;
1028 	struct	mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1029 	struct list_head	*phead;
1030 	u8 *dst_bssid, *src_bssid;
1031 	struct __queue	*queue	= &(pmlmepriv->scanned_queue);
1032 	struct	wlan_network	*pnetwork = NULL;
1033 	enum ndis_802_11_authentication_mode	authmode;
1034 
1035 	rtw_ps_deny(padapter, PS_DENY_JOIN);
1036 	if (_FAIL == rtw_pwr_wakeup(padapter)) {
1037 		ret = -1;
1038 		goto exit;
1039 	}
1040 
1041 	if (!padapter->bup) {
1042 		ret = -1;
1043 		goto exit;
1044 	}
1045 
1046 
1047 	if (temp->sa_family != ARPHRD_ETHER) {
1048 		ret = -EINVAL;
1049 		goto exit;
1050 	}
1051 
1052 	authmode = padapter->securitypriv.ndisauthtype;
1053 	spin_lock_bh(&queue->lock);
1054 	phead = get_list_head(queue);
1055 	pmlmepriv->pscanned = get_next(phead);
1056 
1057 	while (1) {
1058 		if (phead == pmlmepriv->pscanned)
1059 			break;
1060 
1061 		pnetwork = container_of(pmlmepriv->pscanned, struct wlan_network, list);
1062 
1063 		pmlmepriv->pscanned = get_next(pmlmepriv->pscanned);
1064 
1065 		dst_bssid = pnetwork->network.MacAddress;
1066 
1067 		src_bssid = temp->sa_data;
1068 
1069 		if ((!memcmp(dst_bssid, src_bssid, ETH_ALEN))) {
1070 			if (!rtw_set_802_11_infrastructure_mode(padapter, pnetwork->network.InfrastructureMode)) {
1071 				ret = -1;
1072 				spin_unlock_bh(&queue->lock);
1073 				goto exit;
1074 			}
1075 			break;
1076 		}
1077 
1078 	}
1079 	spin_unlock_bh(&queue->lock);
1080 
1081 	rtw_set_802_11_authentication_mode(padapter, authmode);
1082 	/* set_802_11_encryption_mode(padapter, padapter->securitypriv.ndisencryptstatus); */
1083 	if (rtw_set_802_11_bssid(padapter, temp->sa_data) == false) {
1084 		ret = -1;
1085 		goto exit;
1086 	}
1087 
1088 exit:
1089 
1090 	rtw_ps_deny_cancel(padapter, PS_DENY_JOIN);
1091 
1092 	return ret;
1093 }
1094 
1095 static int rtw_wx_get_wap(struct net_device *dev,
1096 			    struct iw_request_info *info,
1097 			    union iwreq_data *wrqu, char *extra)
1098 {
1099 
1100 	struct adapter *padapter = rtw_netdev_priv(dev);
1101 	struct	mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1102 	struct wlan_bssid_ex  *pcur_bss = &pmlmepriv->cur_network.network;
1103 
1104 	wrqu->ap_addr.sa_family = ARPHRD_ETHER;
1105 
1106 	eth_zero_addr(wrqu->ap_addr.sa_data);
1107 
1108 	if  (((check_fwstate(pmlmepriv, _FW_LINKED)) == true) ||
1109 			((check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE)) == true) ||
1110 			((check_fwstate(pmlmepriv, WIFI_AP_STATE)) == true)) {
1111 		memcpy(wrqu->ap_addr.sa_data, pcur_bss->MacAddress, ETH_ALEN);
1112 	} else {
1113 		eth_zero_addr(wrqu->ap_addr.sa_data);
1114 	}
1115 
1116 	return 0;
1117 }
1118 
1119 static int rtw_wx_set_mlme(struct net_device *dev,
1120 			     struct iw_request_info *info,
1121 			     union iwreq_data *wrqu, char *extra)
1122 {
1123 	int ret = 0;
1124 	struct adapter *padapter = rtw_netdev_priv(dev);
1125 	struct iw_mlme *mlme = (struct iw_mlme *)extra;
1126 
1127 
1128 	if (mlme == NULL)
1129 		return -1;
1130 
1131 	switch (mlme->cmd) {
1132 	case IW_MLME_DEAUTH:
1133 		if (!rtw_set_802_11_disassociate(padapter))
1134 			ret = -1;
1135 		break;
1136 	case IW_MLME_DISASSOC:
1137 		if (!rtw_set_802_11_disassociate(padapter))
1138 			ret = -1;
1139 		break;
1140 	default:
1141 		return -EOPNOTSUPP;
1142 	}
1143 
1144 	return ret;
1145 }
1146 
1147 static int rtw_wx_set_scan(struct net_device *dev, struct iw_request_info *a,
1148 			     union iwreq_data *wrqu, char *extra)
1149 {
1150 	u8 _status = false;
1151 	int ret = 0;
1152 	struct adapter *padapter = rtw_netdev_priv(dev);
1153 	struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
1154 	struct ndis_802_11_ssid ssid[RTW_SSID_SCAN_AMOUNT];
1155 
1156 	rtw_ps_deny(padapter, PS_DENY_SCAN);
1157 	if (_FAIL == rtw_pwr_wakeup(padapter)) {
1158 		ret = -1;
1159 		goto exit;
1160 	}
1161 
1162 	if (padapter->bDriverStopped) {
1163 		ret = -1;
1164 		goto exit;
1165 	}
1166 
1167 	if (!padapter->bup) {
1168 		ret = -1;
1169 		goto exit;
1170 	}
1171 
1172 	if (!padapter->hw_init_completed) {
1173 		ret = -1;
1174 		goto exit;
1175 	}
1176 
1177 	/*  When Busy Traffic, driver do not site survey. So driver return success. */
1178 	/*  wpa_supplicant will not issue SIOCSIWSCAN cmd again after scan timeout. */
1179 	/*  modify by thomas 2011-02-22. */
1180 	if (pmlmepriv->LinkDetectInfo.bBusyTraffic) {
1181 		indicate_wx_scan_complete_event(padapter);
1182 		goto exit;
1183 	}
1184 
1185 	if (check_fwstate(pmlmepriv, _FW_UNDER_SURVEY|_FW_UNDER_LINKING) == true) {
1186 		indicate_wx_scan_complete_event(padapter);
1187 		goto exit;
1188 	}
1189 
1190 	memset(ssid, 0, sizeof(struct ndis_802_11_ssid)*RTW_SSID_SCAN_AMOUNT);
1191 
1192 	if (wrqu->data.length == sizeof(struct iw_scan_req)) {
1193 		struct iw_scan_req *req = (struct iw_scan_req *)extra;
1194 
1195 		if (wrqu->data.flags & IW_SCAN_THIS_ESSID) {
1196 			int len = min((int)req->essid_len, IW_ESSID_MAX_SIZE);
1197 
1198 			memcpy(ssid[0].Ssid, req->essid, len);
1199 			ssid[0].SsidLength = len;
1200 
1201 			spin_lock_bh(&pmlmepriv->lock);
1202 
1203 			_status = rtw_sitesurvey_cmd(padapter, ssid, 1, NULL, 0);
1204 
1205 			spin_unlock_bh(&pmlmepriv->lock);
1206 
1207 		}
1208 
1209 	} else if (wrqu->data.length >= WEXT_CSCAN_HEADER_SIZE
1210 		&& !memcmp(extra, WEXT_CSCAN_HEADER, WEXT_CSCAN_HEADER_SIZE)) {
1211 		int len = wrqu->data.length - WEXT_CSCAN_HEADER_SIZE;
1212 		char *pos = extra+WEXT_CSCAN_HEADER_SIZE;
1213 		char section;
1214 		char sec_len;
1215 		int ssid_index = 0;
1216 
1217 		while (len >= 1) {
1218 			section = *(pos++); len -= 1;
1219 
1220 			switch (section) {
1221 			case WEXT_CSCAN_SSID_SECTION:
1222 				if (len < 1) {
1223 					len = 0;
1224 					break;
1225 				}
1226 
1227 				sec_len = *(pos++); len -= 1;
1228 
1229 				if (sec_len > 0 && sec_len <= len) {
1230 					ssid[ssid_index].SsidLength = sec_len;
1231 					memcpy(ssid[ssid_index].Ssid, pos, ssid[ssid_index].SsidLength);
1232 					ssid_index++;
1233 				}
1234 
1235 				pos += sec_len; len -= sec_len;
1236 				break;
1237 
1238 
1239 			case WEXT_CSCAN_CHANNEL_SECTION:
1240 				pos += 1; len -= 1;
1241 				break;
1242 			case WEXT_CSCAN_ACTV_DWELL_SECTION:
1243 				pos += 2; len -= 2;
1244 				break;
1245 			case WEXT_CSCAN_PASV_DWELL_SECTION:
1246 				pos += 2; len -= 2;
1247 				break;
1248 			case WEXT_CSCAN_HOME_DWELL_SECTION:
1249 				pos += 2; len -= 2;
1250 				break;
1251 			case WEXT_CSCAN_TYPE_SECTION:
1252 				pos += 1; len -= 1;
1253 				break;
1254 			default:
1255 				len = 0; /*  stop parsing */
1256 			}
1257 		}
1258 
1259 		/* jeff: it has still some scan parameter to parse, we only do this now... */
1260 		_status = rtw_set_802_11_bssid_list_scan(padapter, ssid, RTW_SSID_SCAN_AMOUNT);
1261 
1262 	} else {
1263 		_status = rtw_set_802_11_bssid_list_scan(padapter, NULL, 0);
1264 	}
1265 
1266 	if (_status == false)
1267 		ret = -1;
1268 
1269 exit:
1270 
1271 	rtw_ps_deny_cancel(padapter, PS_DENY_SCAN);
1272 
1273 	return ret;
1274 }
1275 
1276 static int rtw_wx_get_scan(struct net_device *dev, struct iw_request_info *a,
1277 			     union iwreq_data *wrqu, char *extra)
1278 {
1279 	struct list_head					*plist, *phead;
1280 	struct adapter *padapter = rtw_netdev_priv(dev);
1281 	struct	mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1282 	struct __queue				*queue	= &(pmlmepriv->scanned_queue);
1283 	struct	wlan_network	*pnetwork = NULL;
1284 	char *ev = extra;
1285 	char *stop = ev + wrqu->data.length;
1286 	u32 ret = 0;
1287 	signed int wait_status;
1288 
1289 	if (adapter_to_pwrctl(padapter)->brfoffbyhw && padapter->bDriverStopped) {
1290 		ret = -EINVAL;
1291 		goto exit;
1292 	}
1293 
1294 	wait_status = _FW_UNDER_SURVEY | _FW_UNDER_LINKING;
1295 
1296 	if (check_fwstate(pmlmepriv, wait_status))
1297 		return -EAGAIN;
1298 
1299 	spin_lock_bh(&(pmlmepriv->scanned_queue.lock));
1300 
1301 	phead = get_list_head(queue);
1302 	plist = get_next(phead);
1303 
1304 	while (1) {
1305 		if (phead == plist)
1306 			break;
1307 
1308 		if ((stop - ev) < SCAN_ITEM_SIZE) {
1309 			ret = -E2BIG;
1310 			break;
1311 		}
1312 
1313 		pnetwork = container_of(plist, struct wlan_network, list);
1314 
1315 		/* report network only if the current channel set contains the channel to which this network belongs */
1316 		if (rtw_ch_set_search_ch(padapter->mlmeextpriv.channel_set, pnetwork->network.Configuration.DSConfig) >= 0
1317 			&& rtw_mlme_band_check(padapter, pnetwork->network.Configuration.DSConfig) == true
1318 			&& true == rtw_validate_ssid(&(pnetwork->network.Ssid))) {
1319 
1320 			ev = translate_scan(padapter, a, pnetwork, ev, stop);
1321 		}
1322 
1323 		plist = get_next(plist);
1324 
1325 	}
1326 
1327 	spin_unlock_bh(&(pmlmepriv->scanned_queue.lock));
1328 
1329 	wrqu->data.length = ev-extra;
1330 	wrqu->data.flags = 0;
1331 
1332 exit:
1333 
1334 	return ret;
1335 
1336 }
1337 
1338 /* set ssid flow */
1339 /* s1. rtw_set_802_11_infrastructure_mode() */
1340 /* s2. set_802_11_authenticaion_mode() */
1341 /* s3. set_802_11_encryption_mode() */
1342 /* s4. rtw_set_802_11_ssid() */
1343 static int rtw_wx_set_essid(struct net_device *dev,
1344 			      struct iw_request_info *a,
1345 			      union iwreq_data *wrqu, char *extra)
1346 {
1347 	struct adapter *padapter = rtw_netdev_priv(dev);
1348 	struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
1349 	struct __queue *queue = &pmlmepriv->scanned_queue;
1350 	struct list_head *phead;
1351 	struct wlan_network *pnetwork = NULL;
1352 	enum ndis_802_11_authentication_mode authmode;
1353 	struct ndis_802_11_ssid ndis_ssid;
1354 	u8 *dst_ssid, *src_ssid;
1355 
1356 	uint ret = 0, len;
1357 
1358 	rtw_ps_deny(padapter, PS_DENY_JOIN);
1359 	if (_FAIL == rtw_pwr_wakeup(padapter)) {
1360 		ret = -1;
1361 		goto exit;
1362 	}
1363 
1364 	if (!padapter->bup) {
1365 		ret = -1;
1366 		goto exit;
1367 	}
1368 
1369 	if (wrqu->essid.length > IW_ESSID_MAX_SIZE) {
1370 		ret = -E2BIG;
1371 		goto exit;
1372 	}
1373 
1374 	if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) {
1375 		ret = -1;
1376 		goto exit;
1377 	}
1378 
1379 	authmode = padapter->securitypriv.ndisauthtype;
1380 	if (wrqu->essid.flags && wrqu->essid.length) {
1381 		len = (wrqu->essid.length < IW_ESSID_MAX_SIZE) ? wrqu->essid.length : IW_ESSID_MAX_SIZE;
1382 
1383 		memset(&ndis_ssid, 0, sizeof(struct ndis_802_11_ssid));
1384 		ndis_ssid.SsidLength = len;
1385 		memcpy(ndis_ssid.Ssid, extra, len);
1386 		src_ssid = ndis_ssid.Ssid;
1387 
1388 		spin_lock_bh(&queue->lock);
1389 		phead = get_list_head(queue);
1390 		pmlmepriv->pscanned = get_next(phead);
1391 
1392 		while (1) {
1393 			if (phead == pmlmepriv->pscanned)
1394 				break;
1395 
1396 			pnetwork = container_of(pmlmepriv->pscanned, struct wlan_network, list);
1397 
1398 			pmlmepriv->pscanned = get_next(pmlmepriv->pscanned);
1399 
1400 			dst_ssid = pnetwork->network.Ssid.Ssid;
1401 
1402 			if ((!memcmp(dst_ssid, src_ssid, ndis_ssid.SsidLength)) &&
1403 				(pnetwork->network.Ssid.SsidLength == ndis_ssid.SsidLength)) {
1404 				if (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE) == true) {
1405 					if (pnetwork->network.InfrastructureMode != pmlmepriv->cur_network.network.InfrastructureMode)
1406 						continue;
1407 				}
1408 
1409 				if (rtw_set_802_11_infrastructure_mode(padapter, pnetwork->network.InfrastructureMode) == false) {
1410 					ret = -1;
1411 					spin_unlock_bh(&queue->lock);
1412 					goto exit;
1413 				}
1414 
1415 				break;
1416 			}
1417 		}
1418 		spin_unlock_bh(&queue->lock);
1419 		rtw_set_802_11_authentication_mode(padapter, authmode);
1420 		/* set_802_11_encryption_mode(padapter, padapter->securitypriv.ndisencryptstatus); */
1421 		if (rtw_set_802_11_ssid(padapter, &ndis_ssid) == false) {
1422 			ret = -1;
1423 			goto exit;
1424 		}
1425 	}
1426 
1427 exit:
1428 
1429 	rtw_ps_deny_cancel(padapter, PS_DENY_JOIN);
1430 
1431 	return ret;
1432 }
1433 
1434 static int rtw_wx_get_essid(struct net_device *dev,
1435 			      struct iw_request_info *a,
1436 			      union iwreq_data *wrqu, char *extra)
1437 {
1438 	u32 len, ret = 0;
1439 	struct adapter *padapter = rtw_netdev_priv(dev);
1440 	struct	mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1441 	struct wlan_bssid_ex  *pcur_bss = &pmlmepriv->cur_network.network;
1442 
1443 	if ((check_fwstate(pmlmepriv, _FW_LINKED) == true) ||
1444 	      (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) == true)) {
1445 		len = pcur_bss->Ssid.SsidLength;
1446 
1447 		wrqu->essid.length = len;
1448 
1449 		memcpy(extra, pcur_bss->Ssid.Ssid, len);
1450 
1451 		wrqu->essid.flags = 1;
1452 	} else {
1453 		ret = -1;
1454 		goto exit;
1455 	}
1456 
1457 exit:
1458 	return ret;
1459 }
1460 
1461 static int rtw_wx_set_rate(struct net_device *dev,
1462 			      struct iw_request_info *a,
1463 			      union iwreq_data *wrqu, char *extra)
1464 {
1465 	int	i, ret = 0;
1466 	struct adapter *padapter = rtw_netdev_priv(dev);
1467 	u8 datarates[NumRates];
1468 	u32 target_rate = wrqu->bitrate.value;
1469 	u32 fixed = wrqu->bitrate.fixed;
1470 	u32 ratevalue = 0;
1471 	u8 mpdatarate[NumRates] = {11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0, 0xff};
1472 
1473 	if (target_rate == -1) {
1474 		ratevalue = 11;
1475 		goto set_rate;
1476 	}
1477 	target_rate = target_rate/100000;
1478 
1479 	switch (target_rate) {
1480 	case 10:
1481 		ratevalue = 0;
1482 		break;
1483 	case 20:
1484 		ratevalue = 1;
1485 		break;
1486 	case 55:
1487 		ratevalue = 2;
1488 		break;
1489 	case 60:
1490 		ratevalue = 3;
1491 		break;
1492 	case 90:
1493 		ratevalue = 4;
1494 		break;
1495 	case 110:
1496 		ratevalue = 5;
1497 		break;
1498 	case 120:
1499 		ratevalue = 6;
1500 		break;
1501 	case 180:
1502 		ratevalue = 7;
1503 		break;
1504 	case 240:
1505 		ratevalue = 8;
1506 		break;
1507 	case 360:
1508 		ratevalue = 9;
1509 		break;
1510 	case 480:
1511 		ratevalue = 10;
1512 		break;
1513 	case 540:
1514 		ratevalue = 11;
1515 		break;
1516 	default:
1517 		ratevalue = 11;
1518 		break;
1519 	}
1520 
1521 set_rate:
1522 
1523 	for (i = 0; i < NumRates; i++) {
1524 		if (ratevalue == mpdatarate[i]) {
1525 			datarates[i] = mpdatarate[i];
1526 			if (fixed == 0)
1527 				break;
1528 		} else {
1529 			datarates[i] = 0xff;
1530 		}
1531 	}
1532 
1533 	if (rtw_setdatarate_cmd(padapter, datarates) != _SUCCESS)
1534 		ret = -1;
1535 
1536 	return ret;
1537 }
1538 
1539 static int rtw_wx_get_rate(struct net_device *dev,
1540 			     struct iw_request_info *info,
1541 			     union iwreq_data *wrqu, char *extra)
1542 {
1543 	u16 max_rate = 0;
1544 
1545 	max_rate = rtw_get_cur_max_rate(rtw_netdev_priv(dev));
1546 
1547 	if (max_rate == 0)
1548 		return -EPERM;
1549 
1550 	wrqu->bitrate.fixed = 0;	/* no auto select */
1551 	wrqu->bitrate.value = max_rate * 100000;
1552 
1553 	return 0;
1554 }
1555 
1556 static int rtw_wx_set_rts(struct net_device *dev,
1557 			     struct iw_request_info *info,
1558 			     union iwreq_data *wrqu, char *extra)
1559 {
1560 	struct adapter *padapter = rtw_netdev_priv(dev);
1561 
1562 	if (wrqu->rts.disabled)
1563 		padapter->registrypriv.rts_thresh = 2347;
1564 	else {
1565 		if (wrqu->rts.value < 0 ||
1566 		    wrqu->rts.value > 2347)
1567 			return -EINVAL;
1568 
1569 		padapter->registrypriv.rts_thresh = wrqu->rts.value;
1570 	}
1571 
1572 	return 0;
1573 }
1574 
1575 static int rtw_wx_get_rts(struct net_device *dev,
1576 			     struct iw_request_info *info,
1577 			     union iwreq_data *wrqu, char *extra)
1578 {
1579 	struct adapter *padapter = rtw_netdev_priv(dev);
1580 
1581 	wrqu->rts.value = padapter->registrypriv.rts_thresh;
1582 	wrqu->rts.fixed = 0;	/* no auto select */
1583 	/* wrqu->rts.disabled = (wrqu->rts.value == DEFAULT_RTS_THRESHOLD); */
1584 
1585 	return 0;
1586 }
1587 
1588 static int rtw_wx_set_frag(struct net_device *dev,
1589 			     struct iw_request_info *info,
1590 			     union iwreq_data *wrqu, char *extra)
1591 {
1592 	struct adapter *padapter = rtw_netdev_priv(dev);
1593 
1594 	if (wrqu->frag.disabled)
1595 		padapter->xmitpriv.frag_len = MAX_FRAG_THRESHOLD;
1596 	else {
1597 		if (wrqu->frag.value < MIN_FRAG_THRESHOLD ||
1598 		    wrqu->frag.value > MAX_FRAG_THRESHOLD)
1599 			return -EINVAL;
1600 
1601 		padapter->xmitpriv.frag_len = wrqu->frag.value & ~0x1;
1602 	}
1603 
1604 	return 0;
1605 
1606 }
1607 
1608 static int rtw_wx_get_frag(struct net_device *dev,
1609 			     struct iw_request_info *info,
1610 			     union iwreq_data *wrqu, char *extra)
1611 {
1612 	struct adapter *padapter = rtw_netdev_priv(dev);
1613 
1614 	wrqu->frag.value = padapter->xmitpriv.frag_len;
1615 	wrqu->frag.fixed = 0;	/* no auto select */
1616 	/* wrqu->frag.disabled = (wrqu->frag.value == DEFAULT_FRAG_THRESHOLD); */
1617 
1618 	return 0;
1619 }
1620 
1621 static int rtw_wx_get_retry(struct net_device *dev,
1622 			     struct iw_request_info *info,
1623 			     union iwreq_data *wrqu, char *extra)
1624 {
1625 	/* struct adapter *padapter = rtw_netdev_priv(dev); */
1626 
1627 
1628 	wrqu->retry.value = 7;
1629 	wrqu->retry.fixed = 0;	/* no auto select */
1630 	wrqu->retry.disabled = 1;
1631 
1632 	return 0;
1633 
1634 }
1635 
1636 static int rtw_wx_set_enc(struct net_device *dev,
1637 			    struct iw_request_info *info,
1638 			    union iwreq_data *wrqu, char *keybuf)
1639 {
1640 	u32 key, ret = 0;
1641 	u32 keyindex_provided;
1642 	struct ndis_802_11_wep	 wep;
1643 	enum ndis_802_11_authentication_mode authmode;
1644 
1645 	struct iw_point *erq = &(wrqu->encoding);
1646 	struct adapter *padapter = rtw_netdev_priv(dev);
1647 	struct pwrctrl_priv *pwrpriv = adapter_to_pwrctl(padapter);
1648 
1649 	memset(&wep, 0, sizeof(struct ndis_802_11_wep));
1650 
1651 	key = erq->flags & IW_ENCODE_INDEX;
1652 
1653 	if (erq->flags & IW_ENCODE_DISABLED) {
1654 		padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
1655 		padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
1656 		padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
1657 		padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */
1658 		authmode = Ndis802_11AuthModeOpen;
1659 		padapter->securitypriv.ndisauthtype = authmode;
1660 
1661 		goto exit;
1662 	}
1663 
1664 	if (key) {
1665 		if (key > WEP_KEYS)
1666 			return -EINVAL;
1667 		key--;
1668 		keyindex_provided = 1;
1669 	} else {
1670 		keyindex_provided = 0;
1671 		key = padapter->securitypriv.dot11PrivacyKeyIndex;
1672 	}
1673 
1674 	/* set authentication mode */
1675 	if (erq->flags & IW_ENCODE_OPEN) {
1676 		padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;/* Ndis802_11EncryptionDisabled; */
1677 
1678 		padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open;
1679 
1680 		padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
1681 		padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
1682 		authmode = Ndis802_11AuthModeOpen;
1683 		padapter->securitypriv.ndisauthtype = authmode;
1684 	} else if (erq->flags & IW_ENCODE_RESTRICTED) {
1685 		padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;
1686 
1687 		padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Shared;
1688 
1689 		padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
1690 		padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_;
1691 		authmode = Ndis802_11AuthModeShared;
1692 		padapter->securitypriv.ndisauthtype = authmode;
1693 	} else {
1694 		padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;/* Ndis802_11EncryptionDisabled; */
1695 		padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */
1696 		padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
1697 		padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
1698 		authmode = Ndis802_11AuthModeOpen;
1699 		padapter->securitypriv.ndisauthtype = authmode;
1700 	}
1701 
1702 	wep.KeyIndex = key;
1703 	if (erq->length > 0) {
1704 		wep.KeyLength = erq->length <= 5 ? 5 : 13;
1705 
1706 		wep.Length = wep.KeyLength + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial);
1707 	} else {
1708 		wep.KeyLength = 0;
1709 
1710 		if (keyindex_provided == 1) { /*  set key_id only, no given KeyMaterial(erq->length == 0). */
1711 			padapter->securitypriv.dot11PrivacyKeyIndex = key;
1712 
1713 			switch (padapter->securitypriv.dot11DefKeylen[key]) {
1714 			case 5:
1715 				padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_;
1716 				break;
1717 			case 13:
1718 				padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_;
1719 				break;
1720 			default:
1721 				padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
1722 				break;
1723 			}
1724 
1725 			goto exit;
1726 
1727 		}
1728 
1729 	}
1730 
1731 	wep.KeyIndex |= 0x80000000;
1732 
1733 	memcpy(wep.KeyMaterial, keybuf, wep.KeyLength);
1734 
1735 	if (rtw_set_802_11_add_wep(padapter, &wep) == false) {
1736 		if (rf_on == pwrpriv->rf_pwrstate)
1737 			ret = -EOPNOTSUPP;
1738 		goto exit;
1739 	}
1740 
1741 exit:
1742 	return ret;
1743 }
1744 
1745 static int rtw_wx_get_enc(struct net_device *dev,
1746 			    struct iw_request_info *info,
1747 			    union iwreq_data *wrqu, char *keybuf)
1748 {
1749 	uint key, ret = 0;
1750 	struct adapter *padapter = rtw_netdev_priv(dev);
1751 	struct iw_point *erq = &(wrqu->encoding);
1752 	struct	mlme_priv *pmlmepriv = &(padapter->mlmepriv);
1753 
1754 	if (check_fwstate(pmlmepriv, _FW_LINKED) != true) {
1755 		 if (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) != true) {
1756 			 erq->length = 0;
1757 			 erq->flags |= IW_ENCODE_DISABLED;
1758 			 return 0;
1759 		 }
1760 	}
1761 
1762 
1763 	key = erq->flags & IW_ENCODE_INDEX;
1764 
1765 	if (key) {
1766 		if (key > WEP_KEYS)
1767 			return -EINVAL;
1768 		key--;
1769 	} else {
1770 		key = padapter->securitypriv.dot11PrivacyKeyIndex;
1771 	}
1772 
1773 	erq->flags = key + 1;
1774 
1775 	/* if (padapter->securitypriv.ndisauthtype == Ndis802_11AuthModeOpen) */
1776 	/*  */
1777 	/*       erq->flags |= IW_ENCODE_OPEN; */
1778 	/*  */
1779 
1780 	switch (padapter->securitypriv.ndisencryptstatus) {
1781 	case Ndis802_11EncryptionNotSupported:
1782 	case Ndis802_11EncryptionDisabled:
1783 		erq->length = 0;
1784 		erq->flags |= IW_ENCODE_DISABLED;
1785 		break;
1786 	case Ndis802_11Encryption1Enabled:
1787 		erq->length = padapter->securitypriv.dot11DefKeylen[key];
1788 
1789 		if (erq->length) {
1790 			memcpy(keybuf, padapter->securitypriv.dot11DefKey[key].skey, padapter->securitypriv.dot11DefKeylen[key]);
1791 
1792 			erq->flags |= IW_ENCODE_ENABLED;
1793 
1794 			if (padapter->securitypriv.ndisauthtype == Ndis802_11AuthModeOpen)
1795 				erq->flags |= IW_ENCODE_OPEN;
1796 			else if (padapter->securitypriv.ndisauthtype == Ndis802_11AuthModeShared)
1797 				erq->flags |= IW_ENCODE_RESTRICTED;
1798 		} else {
1799 			erq->length = 0;
1800 			erq->flags |= IW_ENCODE_DISABLED;
1801 		}
1802 		break;
1803 	case Ndis802_11Encryption2Enabled:
1804 	case Ndis802_11Encryption3Enabled:
1805 		erq->length = 16;
1806 		erq->flags |= (IW_ENCODE_ENABLED | IW_ENCODE_OPEN | IW_ENCODE_NOKEY);
1807 		break;
1808 	default:
1809 		erq->length = 0;
1810 		erq->flags |= IW_ENCODE_DISABLED;
1811 		break;
1812 	}
1813 	return ret;
1814 }
1815 
1816 static int rtw_wx_get_power(struct net_device *dev,
1817 			     struct iw_request_info *info,
1818 			     union iwreq_data *wrqu, char *extra)
1819 {
1820 	/* struct adapter *padapter = rtw_netdev_priv(dev); */
1821 
1822 	wrqu->power.value = 0;
1823 	wrqu->power.fixed = 0;	/* no auto select */
1824 	wrqu->power.disabled = 1;
1825 
1826 	return 0;
1827 }
1828 
1829 static int rtw_wx_set_gen_ie(struct net_device *dev,
1830 			     struct iw_request_info *info,
1831 			     union iwreq_data *wrqu, char *extra)
1832 {
1833 	struct adapter *padapter = rtw_netdev_priv(dev);
1834 
1835 	return rtw_set_wpa_ie(padapter, extra, wrqu->data.length);
1836 }
1837 
1838 static int rtw_wx_set_auth(struct net_device *dev,
1839 			   struct iw_request_info *info,
1840 			   union iwreq_data *wrqu, char *extra)
1841 {
1842 	struct adapter *padapter = rtw_netdev_priv(dev);
1843 	struct iw_param *param = (struct iw_param *)&(wrqu->param);
1844 	int ret = 0;
1845 
1846 	switch (param->flags & IW_AUTH_INDEX) {
1847 	case IW_AUTH_WPA_VERSION:
1848 		break;
1849 	case IW_AUTH_CIPHER_PAIRWISE:
1850 		break;
1851 	case IW_AUTH_CIPHER_GROUP:
1852 		break;
1853 	case IW_AUTH_KEY_MGMT:
1854 		/*
1855 		 *  ??? does not use these parameters
1856 		 */
1857 		break;
1858 	case IW_AUTH_TKIP_COUNTERMEASURES:
1859 		/* wpa_supplicant is setting the tkip countermeasure. */
1860 		if (param->value) /* enabling */
1861 			padapter->securitypriv.btkip_countermeasure = true;
1862 		else /* disabling */
1863 			padapter->securitypriv.btkip_countermeasure = false;
1864 		break;
1865 	case IW_AUTH_DROP_UNENCRYPTED:
1866 		/* HACK:
1867 		 *
1868 		 * wpa_supplicant calls set_wpa_enabled when the driver
1869 		 * is loaded and unloaded, regardless of if WPA is being
1870 		 * used.  No other calls are made which can be used to
1871 		 * determine if encryption will be used or not prior to
1872 		 * association being expected.  If encryption is not being
1873 		 * used, drop_unencrypted is set to false, else true -- we
1874 		 * can use this to determine if the CAP_PRIVACY_ON bit should
1875 		 * be set.
1876 		 */
1877 
1878 		/*
1879 		 * This means init value, or using wep, ndisencryptstatus =
1880 		 * Ndis802_11Encryption1Enabled, then it needn't reset it;
1881 		 */
1882 		if (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption1Enabled)
1883 			break;
1884 
1885 		if (param->value) {
1886 			padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled;
1887 			padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_;
1888 			padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_;
1889 			padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */
1890 			padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeOpen;
1891 		}
1892 
1893 		break;
1894 	case IW_AUTH_80211_AUTH_ALG:
1895 		/*
1896 		 *  It's the starting point of a link layer connection using wpa_supplicant
1897 		 */
1898 		if (check_fwstate(&padapter->mlmepriv, _FW_LINKED)) {
1899 			LeaveAllPowerSaveMode(padapter);
1900 			rtw_disassoc_cmd(padapter, 500, false);
1901 			rtw_indicate_disconnect(padapter);
1902 			rtw_free_assoc_resources(padapter, 1);
1903 		}
1904 
1905 		ret = wpa_set_auth_algs(dev, (u32)param->value);
1906 		break;
1907 	case IW_AUTH_WPA_ENABLED:
1908 		break;
1909 	case IW_AUTH_RX_UNENCRYPTED_EAPOL:
1910 		break;
1911 	case IW_AUTH_PRIVACY_INVOKED:
1912 		break;
1913 	default:
1914 		return -EOPNOTSUPP;
1915 	}
1916 
1917 	return ret;
1918 }
1919 
1920 static int rtw_wx_set_enc_ext(struct net_device *dev,
1921 			     struct iw_request_info *info,
1922 			     union iwreq_data *wrqu, char *extra)
1923 {
1924 	char *alg_name;
1925 	u32 param_len;
1926 	struct ieee_param *param = NULL;
1927 	struct iw_point *pencoding = &wrqu->encoding;
1928 	struct iw_encode_ext *pext = (struct iw_encode_ext *)extra;
1929 	int ret = 0;
1930 
1931 	param_len = sizeof(struct ieee_param) + pext->key_len;
1932 	param = kzalloc(param_len, GFP_KERNEL);
1933 	if (param == NULL)
1934 		return -1;
1935 
1936 	param->cmd = IEEE_CMD_SET_ENCRYPTION;
1937 	memset(param->sta_addr, 0xff, ETH_ALEN);
1938 
1939 
1940 	switch (pext->alg) {
1941 	case IW_ENCODE_ALG_NONE:
1942 		/* todo: remove key */
1943 		/* remove = 1; */
1944 		alg_name = "none";
1945 		break;
1946 	case IW_ENCODE_ALG_WEP:
1947 		alg_name = "WEP";
1948 		break;
1949 	case IW_ENCODE_ALG_TKIP:
1950 		alg_name = "TKIP";
1951 		break;
1952 	case IW_ENCODE_ALG_CCMP:
1953 		alg_name = "CCMP";
1954 		break;
1955 	case IW_ENCODE_ALG_AES_CMAC:
1956 		alg_name = "BIP";
1957 		break;
1958 	default:
1959 		ret = -1;
1960 		goto exit;
1961 	}
1962 
1963 	strncpy((char *)param->u.crypt.alg, alg_name, IEEE_CRYPT_ALG_NAME_LEN);
1964 
1965 	if (pext->ext_flags & IW_ENCODE_EXT_SET_TX_KEY)
1966 		param->u.crypt.set_tx = 1;
1967 
1968 	/* cliW: WEP does not have group key
1969 	 * just not checking GROUP key setting
1970 	 */
1971 	if ((pext->alg != IW_ENCODE_ALG_WEP) &&
1972 		((pext->ext_flags & IW_ENCODE_EXT_GROUP_KEY)
1973 		|| (pext->ext_flags & IW_ENCODE_ALG_AES_CMAC)))	{
1974 		param->u.crypt.set_tx = 0;
1975 	}
1976 
1977 	param->u.crypt.idx = (pencoding->flags & 0x00FF) - 1;
1978 
1979 	if (pext->ext_flags & IW_ENCODE_EXT_RX_SEQ_VALID)
1980 		memcpy(param->u.crypt.seq, pext->rx_seq, 8);
1981 
1982 	if (pext->key_len) {
1983 		param->u.crypt.key_len = pext->key_len;
1984 		/* memcpy(param + 1, pext + 1, pext->key_len); */
1985 		memcpy(param->u.crypt.key, pext + 1, pext->key_len);
1986 	}
1987 
1988 	if (pencoding->flags & IW_ENCODE_DISABLED) {
1989 		/* todo: remove key */
1990 		/* remove = 1; */
1991 	}
1992 
1993 	ret =  wpa_set_encryption(dev, param, param_len);
1994 
1995 exit:
1996 	kfree(param);
1997 
1998 	return ret;
1999 }
2000 
2001 
2002 static int rtw_wx_get_nick(struct net_device *dev,
2003 			     struct iw_request_info *info,
2004 			     union iwreq_data *wrqu, char *extra)
2005 {
2006 	/* struct adapter *padapter = rtw_netdev_priv(dev); */
2007 	 /* struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); */
2008 	 /* struct security_priv *psecuritypriv = &padapter->securitypriv; */
2009 
2010 	if (extra) {
2011 		wrqu->data.length = 14;
2012 		wrqu->data.flags = 1;
2013 		memcpy(extra, "<WIFI@REALTEK>", 14);
2014 	}
2015 	return 0;
2016 }
2017 
2018 static int rtw_wx_read32(struct net_device *dev,
2019 			 struct iw_request_info *info,
2020 			 union iwreq_data *wrqu, char *extra)
2021 {
2022 	struct adapter *padapter;
2023 	struct iw_point *p;
2024 	u16 len;
2025 	u32 addr;
2026 	u32 data32;
2027 	u32 bytes;
2028 	u8 *ptmp;
2029 	int ret;
2030 
2031 
2032 	ret = 0;
2033 	padapter = rtw_netdev_priv(dev);
2034 	p = &wrqu->data;
2035 	len = p->length;
2036 	if (0 == len)
2037 		return -EINVAL;
2038 
2039 	ptmp = rtw_malloc(len);
2040 	if (NULL == ptmp)
2041 		return -ENOMEM;
2042 
2043 	if (copy_from_user(ptmp, p->pointer, len)) {
2044 		ret = -EFAULT;
2045 		goto exit;
2046 	}
2047 
2048 	bytes = 0;
2049 	addr = 0;
2050 	sscanf(ptmp, "%d,%x", &bytes, &addr);
2051 
2052 	switch (bytes) {
2053 	case 1:
2054 		data32 = rtw_read8(padapter, addr);
2055 		sprintf(extra, "0x%02X", data32);
2056 		break;
2057 	case 2:
2058 		data32 = rtw_read16(padapter, addr);
2059 		sprintf(extra, "0x%04X", data32);
2060 		break;
2061 	case 4:
2062 		data32 = rtw_read32(padapter, addr);
2063 		sprintf(extra, "0x%08X", data32);
2064 		break;
2065 	default:
2066 		ret = -EINVAL;
2067 		goto exit;
2068 	}
2069 
2070 exit:
2071 	kfree(ptmp);
2072 
2073 	return ret;
2074 }
2075 
2076 static int rtw_wx_write32(struct net_device *dev,
2077 			  struct iw_request_info *info,
2078 			  union iwreq_data *wrqu, char *extra)
2079 {
2080 	struct adapter *padapter = rtw_netdev_priv(dev);
2081 
2082 	u32 addr;
2083 	u32 data32;
2084 	u32 bytes;
2085 
2086 
2087 	bytes = 0;
2088 	addr = 0;
2089 	data32 = 0;
2090 	sscanf(extra, "%d,%x,%x", &bytes, &addr, &data32);
2091 
2092 	switch (bytes) {
2093 	case 1:
2094 		rtw_write8(padapter, addr, (u8)data32);
2095 		break;
2096 	case 2:
2097 		rtw_write16(padapter, addr, (u16)data32);
2098 		break;
2099 	case 4:
2100 		rtw_write32(padapter, addr, data32);
2101 		break;
2102 	default:
2103 		return -EINVAL;
2104 	}
2105 
2106 	return 0;
2107 }
2108 
2109 static int rtw_wx_read_rf(struct net_device *dev,
2110 			  struct iw_request_info *info,
2111 			  union iwreq_data *wrqu, char *extra)
2112 {
2113 	struct adapter *padapter = rtw_netdev_priv(dev);
2114 	u32 path, addr, data32;
2115 
2116 
2117 	path = *(u32 *)extra;
2118 	addr = *((u32 *)extra + 1);
2119 	data32 = rtw_hal_read_rfreg(padapter, path, addr, 0xFFFFF);
2120 	/*
2121 	 * IMPORTANT!!
2122 	 * Only when wireless private ioctl is at odd order,
2123 	 * "extra" would be copied to user space.
2124 	 */
2125 	sprintf(extra, "0x%05x", data32);
2126 
2127 	return 0;
2128 }
2129 
2130 static int rtw_wx_write_rf(struct net_device *dev,
2131 			   struct iw_request_info *info,
2132 			   union iwreq_data *wrqu, char *extra)
2133 {
2134 	struct adapter *padapter = rtw_netdev_priv(dev);
2135 	u32 path, addr, data32;
2136 
2137 
2138 	path = *(u32 *)extra;
2139 	addr = *((u32 *)extra + 1);
2140 	data32 = *((u32 *)extra + 2);
2141 	rtw_hal_write_rfreg(padapter, path, addr, 0xFFFFF, data32);
2142 
2143 	return 0;
2144 }
2145 
2146 static int rtw_wx_priv_null(struct net_device *dev, struct iw_request_info *a,
2147 		 union iwreq_data *wrqu, char *b)
2148 {
2149 	return -1;
2150 }
2151 
2152 static int dummy(struct net_device *dev, struct iw_request_info *a,
2153 		 union iwreq_data *wrqu, char *b)
2154 {
2155 	/* struct adapter *padapter = rtw_netdev_priv(dev); */
2156 	/* struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); */
2157 
2158 	return -1;
2159 
2160 }
2161 
2162 static int rtw_wx_set_channel_plan(struct net_device *dev,
2163 				   struct iw_request_info *info,
2164 				   union iwreq_data *wrqu, char *extra)
2165 {
2166 	struct adapter *padapter = rtw_netdev_priv(dev);
2167 	u8 channel_plan_req = (u8)(*((int *)wrqu));
2168 
2169 	if (rtw_set_chplan_cmd(padapter, channel_plan_req, 1, 1) != _SUCCESS)
2170 		return -EPERM;
2171 
2172 	return 0;
2173 }
2174 
2175 static int rtw_wx_set_mtk_wps_probe_ie(struct net_device *dev,
2176 		struct iw_request_info *a,
2177 		union iwreq_data *wrqu, char *b)
2178 {
2179 	return 0;
2180 }
2181 
2182 static int rtw_wx_get_sensitivity(struct net_device *dev,
2183 				struct iw_request_info *info,
2184 				union iwreq_data *wrqu, char *buf)
2185 {
2186 	return 0;
2187 }
2188 
2189 static int rtw_wx_set_mtk_wps_ie(struct net_device *dev,
2190 				struct iw_request_info *info,
2191 				union iwreq_data *wrqu, char *extra)
2192 {
2193 	return 0;
2194 }
2195 
2196 /*
2197 typedef int (*iw_handler)(struct net_device *dev, struct iw_request_info *info,
2198 			  union iwreq_data *wrqu, char *extra);
2199 */
2200 /*
2201  *For all data larger than 16 octets, we need to use a
2202  *pointer to memory allocated in user space.
2203  */
2204 static  int rtw_drvext_hdl(struct net_device *dev, struct iw_request_info *info,
2205 						union iwreq_data *wrqu, char *extra)
2206 {
2207 	return 0;
2208 }
2209 
2210 static int rtw_get_ap_info(struct net_device *dev,
2211 			   struct iw_request_info *info,
2212 			   union iwreq_data *wrqu, char *extra)
2213 {
2214 	int ret = 0;
2215 	int wpa_ielen;
2216 	u32 cnt = 0;
2217 	struct list_head	*plist, *phead;
2218 	unsigned char *pbuf;
2219 	u8 bssid[ETH_ALEN];
2220 	char data[32];
2221 	struct wlan_network *pnetwork = NULL;
2222 	struct adapter *padapter = rtw_netdev_priv(dev);
2223 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
2224 	struct __queue *queue = &(pmlmepriv->scanned_queue);
2225 	struct iw_point *pdata = &wrqu->data;
2226 
2227 	if ((padapter->bDriverStopped) || (pdata == NULL)) {
2228 		ret = -EINVAL;
2229 		goto exit;
2230 	}
2231 
2232 	while ((check_fwstate(pmlmepriv, (_FW_UNDER_SURVEY|_FW_UNDER_LINKING))) == true) {
2233 		msleep(30);
2234 		cnt++;
2235 		if (cnt > 100)
2236 			break;
2237 	}
2238 
2239 
2240 	/* pdata->length = 0;? */
2241 	pdata->flags = 0;
2242 	if (pdata->length >= 32) {
2243 		if (copy_from_user(data, pdata->pointer, 32)) {
2244 			ret = -EINVAL;
2245 			goto exit;
2246 		}
2247 	} else {
2248 		ret = -EINVAL;
2249 		goto exit;
2250 	}
2251 
2252 	spin_lock_bh(&(pmlmepriv->scanned_queue.lock));
2253 
2254 	phead = get_list_head(queue);
2255 	plist = get_next(phead);
2256 
2257 	while (1) {
2258 		if (phead == plist)
2259 			break;
2260 
2261 
2262 		pnetwork = container_of(plist, struct wlan_network, list);
2263 
2264 		if (!mac_pton(data, bssid)) {
2265 			spin_unlock_bh(&(pmlmepriv->scanned_queue.lock));
2266 			return -EINVAL;
2267 		}
2268 
2269 
2270 		if (!memcmp(bssid, pnetwork->network.MacAddress, ETH_ALEN)) { /* BSSID match, then check if supporting wpa/wpa2 */
2271 
2272 			pbuf = rtw_get_wpa_ie(&pnetwork->network.IEs[12], &wpa_ielen, pnetwork->network.IELength-12);
2273 			if (pbuf && (wpa_ielen > 0)) {
2274 				pdata->flags = 1;
2275 				break;
2276 			}
2277 
2278 			pbuf = rtw_get_wpa2_ie(&pnetwork->network.IEs[12], &wpa_ielen, pnetwork->network.IELength-12);
2279 			if (pbuf && (wpa_ielen > 0)) {
2280 				pdata->flags = 2;
2281 				break;
2282 			}
2283 		}
2284 
2285 		plist = get_next(plist);
2286 
2287 	}
2288 
2289 	spin_unlock_bh(&(pmlmepriv->scanned_queue.lock));
2290 
2291 	if (pdata->length >= 34) {
2292 		if (copy_to_user((u8 __force __user *)pdata->pointer+32, (u8 *)&pdata->flags, 1)) {
2293 			ret = -EINVAL;
2294 			goto exit;
2295 		}
2296 	}
2297 
2298 exit:
2299 
2300 	return ret;
2301 
2302 }
2303 
2304 static int rtw_set_pid(struct net_device *dev,
2305 		       struct iw_request_info *info,
2306 		       union iwreq_data *wrqu, char *extra)
2307 {
2308 
2309 	int ret = 0;
2310 	struct adapter *padapter = rtw_netdev_priv(dev);
2311 	int *pdata = (int *)wrqu;
2312 	int selector;
2313 
2314 	if ((padapter->bDriverStopped) || (pdata == NULL)) {
2315 		ret = -EINVAL;
2316 		goto exit;
2317 	}
2318 
2319 	selector = *pdata;
2320 	if (selector < 3 && selector >= 0)
2321 		padapter->pid[selector] = *(pdata+1);
2322 
2323 exit:
2324 
2325 	return ret;
2326 
2327 }
2328 
2329 static int rtw_wps_start(struct net_device *dev,
2330 			 struct iw_request_info *info,
2331 			 union iwreq_data *wrqu, char *extra)
2332 {
2333 
2334 	int ret = 0;
2335 	struct adapter *padapter = rtw_netdev_priv(dev);
2336 	struct iw_point *pdata = &wrqu->data;
2337 	u32   u32wps_start = 0;
2338 
2339 	if ((true == padapter->bDriverStopped) || (true == padapter->bSurpriseRemoved) || (NULL == pdata)) {
2340 		ret = -EINVAL;
2341 		goto exit;
2342 	}
2343 
2344 	if (copy_from_user((void *)&u32wps_start, pdata->pointer, 4)) {
2345 		ret = -EFAULT;
2346 		goto exit;
2347 	}
2348 	if (u32wps_start == 0)
2349 		u32wps_start = *extra;
2350 
2351 exit:
2352 
2353 	return ret;
2354 
2355 }
2356 
2357 static int rtw_p2p_set(struct net_device *dev,
2358 		       struct iw_request_info *info,
2359 		       union iwreq_data *wrqu, char *extra)
2360 {
2361 
2362 	return 0;
2363 
2364 }
2365 
2366 static int rtw_p2p_get(struct net_device *dev,
2367 		       struct iw_request_info *info,
2368 		       union iwreq_data *wrqu, char *extra)
2369 {
2370 
2371 	return 0;
2372 
2373 }
2374 
2375 static int rtw_p2p_get2(struct net_device *dev,
2376 						struct iw_request_info *info,
2377 						union iwreq_data *wrqu, char *extra)
2378 {
2379 
2380 	return 0;
2381 
2382 }
2383 
2384 static int rtw_rereg_nd_name(struct net_device *dev,
2385 			     struct iw_request_info *info,
2386 			     union iwreq_data *wrqu, char *extra)
2387 {
2388 	int ret = 0;
2389 	struct adapter *padapter = rtw_netdev_priv(dev);
2390 	struct rereg_nd_name_data *rereg_priv = &padapter->rereg_nd_name_priv;
2391 	char new_ifname[IFNAMSIZ];
2392 
2393 	if (rereg_priv->old_ifname[0] == 0) {
2394 		char *reg_ifname;
2395 		reg_ifname = padapter->registrypriv.ifname;
2396 
2397 		strncpy(rereg_priv->old_ifname, reg_ifname, IFNAMSIZ);
2398 		rereg_priv->old_ifname[IFNAMSIZ-1] = 0;
2399 	}
2400 
2401 	if (wrqu->data.length > IFNAMSIZ)
2402 		return -EFAULT;
2403 
2404 	if (copy_from_user(new_ifname, wrqu->data.pointer, IFNAMSIZ))
2405 		return -EFAULT;
2406 
2407 	if (0 == strcmp(rereg_priv->old_ifname, new_ifname))
2408 		return ret;
2409 
2410 	ret = rtw_change_ifname(padapter, new_ifname);
2411 	if (ret != 0)
2412 		goto exit;
2413 
2414 	strncpy(rereg_priv->old_ifname, new_ifname, IFNAMSIZ);
2415 	rereg_priv->old_ifname[IFNAMSIZ-1] = 0;
2416 
2417 	if (!memcmp(new_ifname, "disable%d", 9)) {
2418 		/*  free network queue for Android's timming issue */
2419 		rtw_free_network_queue(padapter, true);
2420 
2421 		/*  the interface is being "disabled", we can do deeper IPS */
2422 		/* rtw_ips_mode_req(&padapter->pwrctrlpriv, IPS_NORMAL); */
2423 	}
2424 exit:
2425 	return ret;
2426 
2427 }
2428 
2429 static int rtw_dbg_port(struct net_device *dev,
2430 			struct iw_request_info *info,
2431 			union iwreq_data *wrqu, char *extra)
2432 {
2433 	u8 major_cmd, minor_cmd;
2434 	u16 arg;
2435 	u32 extra_arg, *pdata, val32;
2436 	struct adapter *padapter = rtw_netdev_priv(dev);
2437 	struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv;
2438 	struct mlme_ext_info *pmlmeinfo = &(pmlmeext->mlmext_info);
2439 
2440 	pdata = (u32 *)&wrqu->data;
2441 
2442 	val32 = *pdata;
2443 	arg = (u16)(val32&0x0000ffff);
2444 	major_cmd = (u8)(val32>>24);
2445 	minor_cmd = (u8)((val32>>16)&0x00ff);
2446 
2447 	extra_arg = *(pdata+1);
2448 
2449 	switch (major_cmd) {
2450 		case 0x70:/* read_reg */
2451 			switch (minor_cmd) {
2452 				case 1:
2453 					break;
2454 				case 2:
2455 					break;
2456 				case 4:
2457 					break;
2458 			}
2459 			break;
2460 		case 0x71:/* write_reg */
2461 			switch (minor_cmd) {
2462 				case 1:
2463 					rtw_write8(padapter, arg, extra_arg);
2464 					break;
2465 				case 2:
2466 					rtw_write16(padapter, arg, extra_arg);
2467 					break;
2468 				case 4:
2469 					rtw_write32(padapter, arg, extra_arg);
2470 					break;
2471 			}
2472 			break;
2473 		case 0x72:/* read_bb */
2474 			break;
2475 		case 0x73:/* write_bb */
2476 			rtw_hal_write_bbreg(padapter, arg, 0xffffffff, extra_arg);
2477 			break;
2478 		case 0x74:/* read_rf */
2479 			break;
2480 		case 0x75:/* write_rf */
2481 			rtw_hal_write_rfreg(padapter, minor_cmd, arg, 0xffffffff, extra_arg);
2482 			break;
2483 
2484 		case 0x76:
2485 			switch (minor_cmd) {
2486 				case 0x00: /* normal mode, */
2487 					padapter->recvpriv.is_signal_dbg = 0;
2488 					break;
2489 				case 0x01: /* dbg mode */
2490 					padapter->recvpriv.is_signal_dbg = 1;
2491 					extra_arg = extra_arg > 100 ? 100 : extra_arg;
2492 					padapter->recvpriv.signal_strength_dbg = extra_arg;
2493 					break;
2494 			}
2495 			break;
2496 		case 0x78: /* IOL test */
2497 			break;
2498 		case 0x79:
2499 			{
2500 				/*
2501 				* dbg 0x79000000 [value], set RESP_TXAGC to + value, value:0~15
2502 				* dbg 0x79010000 [value], set RESP_TXAGC to - value, value:0~15
2503 				*/
2504 				u8 value =  extra_arg & 0x0f;
2505 				u8 sign = minor_cmd;
2506 				u16 write_value = 0;
2507 
2508 				if (sign)
2509 					value = value | 0x10;
2510 
2511 				write_value = value | (value << 5);
2512 				rtw_write16(padapter, 0x6d9, write_value);
2513 			}
2514 			break;
2515 		case 0x7a:
2516 			receive_disconnect(padapter, pmlmeinfo->network.MacAddress
2517 				, WLAN_REASON_EXPIRATION_CHK);
2518 			break;
2519 		case 0x7F:
2520 			switch (minor_cmd) {
2521 				case 0x0:
2522 					break;
2523 				case 0x01:
2524 					break;
2525 				case 0x02:
2526 					break;
2527 				case 0x03:
2528 					break;
2529 				case 0x04:
2530 
2531 					break;
2532 				case 0x05:
2533 					break;
2534 				case 0x06:
2535 					{
2536 						u32 ODMFlag;
2537 						rtw_hal_get_hwreg(padapter, HW_VAR_DM_FLAG, (u8 *)(&ODMFlag));
2538 						ODMFlag = (u32)(0x0f&arg);
2539 						rtw_hal_set_hwreg(padapter, HW_VAR_DM_FLAG, (u8 *)(&ODMFlag));
2540 					}
2541 					break;
2542 				case 0x07:
2543 					break;
2544 				case 0x08:
2545 					{
2546 					}
2547 					break;
2548 				case 0x09:
2549 					break;
2550 				case 0x0a:
2551 					{
2552 						int max_mac_id = 0;
2553 						max_mac_id = rtw_search_max_mac_id(padapter);
2554 						printk("%s ==> max_mac_id = %d\n", __func__, max_mac_id);
2555 					}
2556 					break;
2557 				case 0x0b: /* Enable = 1, Disable = 0 driver control vrtl_carrier_sense. */
2558 					if (arg == 0) {
2559 						padapter->driver_vcs_en = 0;
2560 					} else if (arg == 1) {
2561 						padapter->driver_vcs_en = 1;
2562 
2563 						if (extra_arg > 2)
2564 							padapter->driver_vcs_type = 1;
2565 						else
2566 							padapter->driver_vcs_type = extra_arg;
2567 					}
2568 					break;
2569 				case 0x0c:/* dump rx/tx packet */
2570 					{
2571 						if (arg == 0)
2572 							/* pHalData->bDumpRxPkt =extra_arg; */
2573 							rtw_hal_set_def_var(padapter, HAL_DEF_DBG_DUMP_RXPKT, &(extra_arg));
2574 						else if (arg == 1)
2575 							rtw_hal_set_def_var(padapter, HAL_DEF_DBG_DUMP_TXPKT, &(extra_arg));
2576 					}
2577 					break;
2578 				case 0x0e:
2579 					{
2580 						if (arg == 0) {
2581 							padapter->driver_rx_ampdu_factor = 0xFF;
2582 						} else if (arg == 1) {
2583 
2584 							if ((extra_arg & 0x03) > 0x03)
2585 								padapter->driver_rx_ampdu_factor = 0xFF;
2586 							else
2587 								padapter->driver_rx_ampdu_factor = extra_arg;
2588 						}
2589 					}
2590 					break;
2591 
2592 				case 0x10:/*  driver version display */
2593 					netdev_dbg(dev, "%s %s\n", "rtl8723bs", DRIVERVERSION);
2594 					break;
2595 				case 0x11:/* dump linked status */
2596 					{
2597 						 linked_info_dump(padapter, extra_arg);
2598 					}
2599 					break;
2600 				case 0x12: /* set rx_stbc */
2601 				{
2602 					struct registry_priv *pregpriv = &padapter->registrypriv;
2603 					/*  0: disable, bit(0):enable 2.4g, bit(1):enable 5g, 0x3: enable both 2.4g and 5g */
2604 					/* default is set to enable 2.4GHZ for IOT issue with bufflao's AP at 5GHZ */
2605 					if (extra_arg == 0 || extra_arg == 1 ||
2606 					    extra_arg == 2 || extra_arg == 3)
2607 						pregpriv->rx_stbc = extra_arg;
2608 				}
2609 				break;
2610 				case 0x13: /* set ampdu_enable */
2611 				{
2612 					struct registry_priv *pregpriv = &padapter->registrypriv;
2613 					/*  0: disable, 0x1:enable (but wifi_spec should be 0), 0x2: force enable (don't care wifi_spec) */
2614 					if (extra_arg < 3)
2615 						pregpriv->ampdu_enable = extra_arg;
2616 				}
2617 				break;
2618 				case 0x14:
2619 				{
2620 				}
2621 				break;
2622 				case 0x16:
2623 				{
2624 					if (arg == 0xff) {
2625 						rtw_odm_dbg_comp_msg(padapter);
2626 					} else {
2627 						u64 dbg_comp = (u64)extra_arg;
2628 						rtw_odm_dbg_comp_set(padapter, dbg_comp);
2629 					}
2630 				}
2631 					break;
2632 #ifdef DBG_FIXED_CHAN
2633 				case 0x17:
2634 					{
2635 						struct mlme_ext_priv *pmlmeext = &(padapter->mlmeextpriv);
2636 						printk("===>  Fixed channel to %d\n", extra_arg);
2637 						pmlmeext->fixed_chan = extra_arg;
2638 
2639 					}
2640 					break;
2641 #endif
2642 				case 0x18:
2643 					{
2644 						printk("===>  Switch USB Mode %d\n", extra_arg);
2645 						rtw_hal_set_hwreg(padapter, HW_VAR_USB_MODE, (u8 *)&extra_arg);
2646 					}
2647 					break;
2648 				case 0x19:
2649 					{
2650 						struct registry_priv *pregistrypriv = &padapter->registrypriv;
2651 						/*  extra_arg : */
2652 						/*  BIT0: Enable VHT LDPC Rx, BIT1: Enable VHT LDPC Tx, */
2653 						/*  BIT4: Enable HT LDPC Rx, BIT5: Enable HT LDPC Tx */
2654 						if (arg == 0)
2655 							pregistrypriv->ldpc_cap = 0x00;
2656 						else if (arg == 1)
2657 							pregistrypriv->ldpc_cap = (u8)(extra_arg&0x33);
2658 					}
2659 					break;
2660 				case 0x1a:
2661 					{
2662 						struct registry_priv *pregistrypriv = &padapter->registrypriv;
2663 						/*  extra_arg : */
2664 						/*  BIT0: Enable VHT STBC Rx, BIT1: Enable VHT STBC Tx, */
2665 						/*  BIT4: Enable HT STBC Rx, BIT5: Enable HT STBC Tx */
2666 						if (arg == 0)
2667 							pregistrypriv->stbc_cap = 0x00;
2668 						else if (arg == 1)
2669 							pregistrypriv->stbc_cap = (u8)(extra_arg&0x33);
2670 					}
2671 					break;
2672 				case 0x1b:
2673 					{
2674 						struct registry_priv *pregistrypriv = &padapter->registrypriv;
2675 
2676 						if (arg == 0) {
2677 							init_mlme_default_rate_set(padapter);
2678 							pregistrypriv->ht_enable = (u8)rtw_ht_enable;
2679 						} else if (arg == 1) {
2680 
2681 							int i;
2682 							u8 max_rx_rate;
2683 
2684 							max_rx_rate = (u8)extra_arg;
2685 
2686 							if (max_rx_rate < 0xc) { /*  max_rx_rate < MSC0 -> B or G -> disable HT */
2687 								pregistrypriv->ht_enable = 0;
2688 								for (i = 0; i < NumRates; i++) {
2689 									if (pmlmeext->datarate[i] > max_rx_rate)
2690 										pmlmeext->datarate[i] = 0xff;
2691 								}
2692 
2693 							}
2694 							else if (max_rx_rate < 0x1c) { /*  mcs0~mcs15 */
2695 								u32 mcs_bitmap = 0x0;
2696 
2697 								for (i = 0; i < ((max_rx_rate + 1) - 0xc); i++)
2698 									mcs_bitmap |= BIT(i);
2699 
2700 								set_mcs_rate_by_mask(pmlmeext->default_supported_mcs_set, mcs_bitmap);
2701 							}
2702 						}
2703 					}
2704 					break;
2705 				case 0x1c: /* enable/disable driver control AMPDU Density for peer sta's rx */
2706 					{
2707 						if (arg == 0) {
2708 							padapter->driver_ampdu_spacing = 0xFF;
2709 						} else if (arg == 1) {
2710 
2711 							if (extra_arg > 0x07)
2712 								padapter->driver_ampdu_spacing = 0xFF;
2713 							else
2714 								padapter->driver_ampdu_spacing = extra_arg;
2715 						}
2716 					}
2717 					break;
2718 				case 0x23:
2719 					{
2720 						padapter->bNotifyChannelChange = extra_arg;
2721 						break;
2722 					}
2723 				case 0x24:
2724 					{
2725 						break;
2726 					}
2727 				case 0xaa:
2728 					{
2729 						if ((extra_arg & 0x7F) > 0x3F)
2730 							extra_arg = 0xFF;
2731 						padapter->fix_rate = extra_arg;
2732 					}
2733 					break;
2734 				case 0xdd:/* registers dump , 0 for mac reg, 1 for bb reg, 2 for rf reg */
2735 					{
2736 						if (extra_arg == 0)
2737 							mac_reg_dump(RTW_DBGDUMP, padapter);
2738 						else if (extra_arg == 1)
2739 							bb_reg_dump(RTW_DBGDUMP, padapter);
2740 						else if (extra_arg == 2)
2741 							rf_reg_dump(RTW_DBGDUMP, padapter);
2742 					}
2743 					break;
2744 
2745 				case 0xee:/* turn on/off dynamic funcs */
2746 					{
2747 						u32 odm_flag;
2748 
2749 						if (0xf == extra_arg) {
2750 							rtw_hal_get_def_var(padapter, HAL_DEF_DBG_DM_FUNC, &odm_flag);
2751 						} else {
2752 							/*extra_arg = 0  - disable all dynamic func
2753 								extra_arg = 1  - disable DIG
2754 								extra_arg = 2  - disable tx power tracking
2755 								extra_arg = 3  - turn on all dynamic func
2756 							*/
2757 							rtw_hal_set_def_var(padapter, HAL_DEF_DBG_DM_FUNC, &(extra_arg));
2758 							rtw_hal_get_def_var(padapter, HAL_DEF_DBG_DM_FUNC, &odm_flag);
2759 						}
2760 					}
2761 					break;
2762 
2763 				case 0xfd:
2764 					rtw_write8(padapter, 0xc50, arg);
2765 					rtw_write8(padapter, 0xc58, arg);
2766 					break;
2767 				case 0xfe:
2768 					break;
2769 				case 0xff:
2770 					{
2771 					}
2772 					break;
2773 			}
2774 			break;
2775 		default:
2776 			break;
2777 	}
2778 
2779 
2780 	return 0;
2781 
2782 }
2783 
2784 static int wpa_set_param(struct net_device *dev, u8 name, u32 value)
2785 {
2786 	uint ret = 0;
2787 	struct adapter *padapter = rtw_netdev_priv(dev);
2788 
2789 	switch (name) {
2790 	case IEEE_PARAM_WPA_ENABLED:
2791 
2792 		padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; /* 802.1x */
2793 
2794 		/* ret = ieee80211_wpa_enable(ieee, value); */
2795 
2796 		switch ((value)&0xff) {
2797 		case 1: /* WPA */
2798 			padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK; /* WPA_PSK */
2799 			padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled;
2800 			break;
2801 		case 2: /* WPA2 */
2802 			padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK; /* WPA2_PSK */
2803 			padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled;
2804 			break;
2805 		}
2806 
2807 		break;
2808 
2809 	case IEEE_PARAM_TKIP_COUNTERMEASURES:
2810 		/* ieee->tkip_countermeasures =value; */
2811 		break;
2812 
2813 	case IEEE_PARAM_DROP_UNENCRYPTED:
2814 	{
2815 		/* HACK:
2816 		 *
2817 		 * wpa_supplicant calls set_wpa_enabled when the driver
2818 		 * is loaded and unloaded, regardless of if WPA is being
2819 		 * used.  No other calls are made which can be used to
2820 		 * determine if encryption will be used or not prior to
2821 		 * association being expected.  If encryption is not being
2822 		 * used, drop_unencrypted is set to false, else true -- we
2823 		 * can use this to determine if the CAP_PRIVACY_ON bit should
2824 		 * be set.
2825 		 */
2826 		break;
2827 
2828 	}
2829 	case IEEE_PARAM_PRIVACY_INVOKED:
2830 
2831 		/* ieee->privacy_invoked =value; */
2832 
2833 		break;
2834 
2835 	case IEEE_PARAM_AUTH_ALGS:
2836 
2837 		ret = wpa_set_auth_algs(dev, value);
2838 
2839 		break;
2840 
2841 	case IEEE_PARAM_IEEE_802_1X:
2842 
2843 		/* ieee->ieee802_1x =value; */
2844 
2845 		break;
2846 
2847 	case IEEE_PARAM_WPAX_SELECT:
2848 
2849 		/*  added for WPA2 mixed mode */
2850 		/*
2851 		spin_lock_irqsave(&ieee->wpax_suitlist_lock, flags);
2852 		ieee->wpax_type_set = 1;
2853 		ieee->wpax_type_notify = value;
2854 		spin_unlock_irqrestore(&ieee->wpax_suitlist_lock, flags);
2855 		*/
2856 
2857 		break;
2858 
2859 	default:
2860 
2861 
2862 
2863 		ret = -EOPNOTSUPP;
2864 
2865 
2866 		break;
2867 
2868 	}
2869 
2870 	return ret;
2871 
2872 }
2873 
2874 static int wpa_mlme(struct net_device *dev, u32 command, u32 reason)
2875 {
2876 	int ret = 0;
2877 	struct adapter *padapter = rtw_netdev_priv(dev);
2878 
2879 	switch (command) {
2880 	case IEEE_MLME_STA_DEAUTH:
2881 
2882 		if (!rtw_set_802_11_disassociate(padapter))
2883 			ret = -1;
2884 
2885 		break;
2886 
2887 	case IEEE_MLME_STA_DISASSOC:
2888 
2889 		if (!rtw_set_802_11_disassociate(padapter))
2890 			ret = -1;
2891 
2892 		break;
2893 
2894 	default:
2895 		ret = -EOPNOTSUPP;
2896 		break;
2897 	}
2898 
2899 	return ret;
2900 
2901 }
2902 
2903 static int wpa_supplicant_ioctl(struct net_device *dev, struct iw_point *p)
2904 {
2905 	struct ieee_param *param;
2906 	uint ret = 0;
2907 
2908 	/* down(&ieee->wx_sem); */
2909 
2910 	if (!p->pointer || p->length != sizeof(struct ieee_param))
2911 		return -EINVAL;
2912 
2913 	param = rtw_malloc(p->length);
2914 	if (param == NULL)
2915 		return -ENOMEM;
2916 
2917 	if (copy_from_user(param, p->pointer, p->length)) {
2918 		kfree(param);
2919 		return -EFAULT;
2920 	}
2921 
2922 	switch (param->cmd) {
2923 
2924 	case IEEE_CMD_SET_WPA_PARAM:
2925 		ret = wpa_set_param(dev, param->u.wpa_param.name, param->u.wpa_param.value);
2926 		break;
2927 
2928 	case IEEE_CMD_SET_WPA_IE:
2929 		/* ret = wpa_set_wpa_ie(dev, param, p->length); */
2930 		ret =  rtw_set_wpa_ie(rtw_netdev_priv(dev), (char *)param->u.wpa_ie.data, (u16)param->u.wpa_ie.len);
2931 		break;
2932 
2933 	case IEEE_CMD_SET_ENCRYPTION:
2934 		ret = wpa_set_encryption(dev, param, p->length);
2935 		break;
2936 
2937 	case IEEE_CMD_MLME:
2938 		ret = wpa_mlme(dev, param->u.mlme.command, param->u.mlme.reason_code);
2939 		break;
2940 
2941 	default:
2942 		ret = -EOPNOTSUPP;
2943 		break;
2944 
2945 	}
2946 
2947 	if (ret == 0 && copy_to_user(p->pointer, param, p->length))
2948 		ret = -EFAULT;
2949 
2950 	kfree(param);
2951 
2952 	/* up(&ieee->wx_sem); */
2953 	return ret;
2954 }
2955 
2956 static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len)
2957 {
2958 	int ret = 0;
2959 	u32 wep_key_idx, wep_key_len, wep_total_len;
2960 	struct ndis_802_11_wep	 *pwep = NULL;
2961 	struct sta_info *psta = NULL, *pbcmc_sta = NULL;
2962 	struct adapter *padapter = rtw_netdev_priv(dev);
2963 	struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
2964 	struct security_priv *psecuritypriv = &(padapter->securitypriv);
2965 	struct sta_priv *pstapriv = &padapter->stapriv;
2966 	char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey;
2967 	char *rxkey = padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey;
2968 	char *grpkey = psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey;
2969 
2970 	param->u.crypt.err = 0;
2971 	param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
2972 
2973 	/* sizeof(struct ieee_param) = 64 bytes; */
2974 	/* if (param_len !=  (u32) ((u8 *) param->u.crypt.key - (u8 *) param) + param->u.crypt.key_len) */
2975 	if (param_len !=  sizeof(struct ieee_param) + param->u.crypt.key_len) {
2976 		ret =  -EINVAL;
2977 		goto exit;
2978 	}
2979 
2980 	if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
2981 	    param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
2982 	    param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
2983 		if (param->u.crypt.idx >= WEP_KEYS) {
2984 			ret = -EINVAL;
2985 			goto exit;
2986 		}
2987 	} else {
2988 		psta = rtw_get_stainfo(pstapriv, param->sta_addr);
2989 		if (!psta)
2990 			/* ret = -EINVAL; */
2991 			goto exit;
2992 	}
2993 
2994 	if (strcmp(param->u.crypt.alg, "none") == 0 && (psta == NULL)) {
2995 		/* todo:clear default encryption keys */
2996 
2997 		psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Open;
2998 		psecuritypriv->ndisencryptstatus = Ndis802_11EncryptionDisabled;
2999 		psecuritypriv->dot11PrivacyAlgrthm = _NO_PRIVACY_;
3000 		psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
3001 
3002 		goto exit;
3003 	}
3004 
3005 
3006 	if (strcmp(param->u.crypt.alg, "WEP") == 0 && (psta == NULL)) {
3007 		wep_key_idx = param->u.crypt.idx;
3008 		wep_key_len = param->u.crypt.key_len;
3009 
3010 		if ((wep_key_idx >= WEP_KEYS) || (wep_key_len <= 0)) {
3011 			ret = -EINVAL;
3012 			goto exit;
3013 		}
3014 
3015 
3016 		if (wep_key_len > 0) {
3017 			wep_key_len = wep_key_len <= 5 ? 5 : 13;
3018 			wep_total_len = wep_key_len + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial);
3019 			pwep = kzalloc(wep_total_len, GFP_KERNEL);
3020 			if (!pwep)
3021 				goto exit;
3022 
3023 			pwep->KeyLength = wep_key_len;
3024 			pwep->Length = wep_total_len;
3025 
3026 		}
3027 
3028 		pwep->KeyIndex = wep_key_idx;
3029 
3030 		memcpy(pwep->KeyMaterial,  param->u.crypt.key, pwep->KeyLength);
3031 
3032 		if (param->u.crypt.set_tx) {
3033 			psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Auto;
3034 			psecuritypriv->ndisencryptstatus = Ndis802_11Encryption1Enabled;
3035 			psecuritypriv->dot11PrivacyAlgrthm = _WEP40_;
3036 			psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
3037 
3038 			if (pwep->KeyLength == 13) {
3039 				psecuritypriv->dot11PrivacyAlgrthm = _WEP104_;
3040 				psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
3041 			}
3042 
3043 
3044 			psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx;
3045 
3046 			memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
3047 
3048 			psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
3049 
3050 			rtw_ap_set_wep_key(padapter, pwep->KeyMaterial, pwep->KeyLength, wep_key_idx, 1);
3051 		} else {
3052 			/* don't update "psecuritypriv->dot11PrivacyAlgrthm" and */
3053 			/* psecuritypriv->dot11PrivacyKeyIndex =keyid", but can rtw_set_key to cam */
3054 
3055 			memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
3056 
3057 			psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
3058 
3059 			rtw_ap_set_wep_key(padapter, pwep->KeyMaterial, pwep->KeyLength, wep_key_idx, 0);
3060 		}
3061 
3062 		goto exit;
3063 
3064 	}
3065 
3066 
3067 	if (!psta && check_fwstate(pmlmepriv, WIFI_AP_STATE)) { /*  group key */
3068 		if (param->u.crypt.set_tx == 1) {
3069 			if (strcmp(param->u.crypt.alg, "WEP") == 0) {
3070 				memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
3071 
3072 				psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
3073 				if (param->u.crypt.key_len == 13)
3074 						psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
3075 
3076 			} else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
3077 				psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
3078 
3079 				memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
3080 
3081 				/* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */
3082 				/* set mic key */
3083 				memcpy(txkey, &(param->u.crypt.key[16]), 8);
3084 				memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
3085 
3086 				psecuritypriv->busetkipkey = true;
3087 
3088 			}
3089 			else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
3090 				psecuritypriv->dot118021XGrpPrivacy = _AES_;
3091 
3092 				memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
3093 			} else {
3094 				psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
3095 			}
3096 
3097 			psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx;
3098 
3099 			psecuritypriv->binstallGrpkey = true;
3100 
3101 			psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/*  */
3102 
3103 			rtw_ap_set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx);
3104 
3105 			pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
3106 			if (pbcmc_sta) {
3107 				pbcmc_sta->ieee8021x_blocked = false;
3108 				pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */
3109 			}
3110 		}
3111 
3112 		goto exit;
3113 
3114 	}
3115 
3116 	if (psecuritypriv->dot11AuthAlgrthm == dot11AuthAlgrthm_8021X && psta) { /*  psk/802_1x */
3117 		if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) {
3118 			if (param->u.crypt.set_tx == 1)	{
3119 				memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
3120 
3121 				if (strcmp(param->u.crypt.alg, "WEP") == 0) {
3122 					psta->dot118021XPrivacy = _WEP40_;
3123 					if (param->u.crypt.key_len == 13)
3124 						psta->dot118021XPrivacy = _WEP104_;
3125 				} else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
3126 					psta->dot118021XPrivacy = _TKIP_;
3127 
3128 					/* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */
3129 					/* set mic key */
3130 					memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
3131 					memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
3132 
3133 					psecuritypriv->busetkipkey = true;
3134 
3135 				} else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
3136 
3137 					psta->dot118021XPrivacy = _AES_;
3138 				} else {
3139 					psta->dot118021XPrivacy = _NO_PRIVACY_;
3140 				}
3141 
3142 				rtw_ap_set_pairwise_key(padapter, psta);
3143 
3144 				psta->ieee8021x_blocked = false;
3145 
3146 			} else { /* group key??? */
3147 				if (strcmp(param->u.crypt.alg, "WEP") == 0) {
3148 					memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
3149 
3150 					psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
3151 					if (param->u.crypt.key_len == 13)
3152 						psecuritypriv->dot118021XGrpPrivacy = _WEP104_;
3153 				} else if (strcmp(param->u.crypt.alg, "TKIP") == 0) {
3154 					psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
3155 
3156 					memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
3157 
3158 					/* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */
3159 					/* set mic key */
3160 					memcpy(txkey, &(param->u.crypt.key[16]), 8);
3161 					memcpy(rxkey, &(param->u.crypt.key[24]), 8);
3162 
3163 					psecuritypriv->busetkipkey = true;
3164 
3165 				} else if (strcmp(param->u.crypt.alg, "CCMP") == 0) {
3166 					psecuritypriv->dot118021XGrpPrivacy = _AES_;
3167 
3168 					memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len));
3169 				} else {
3170 					psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_;
3171 				}
3172 
3173 				psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx;
3174 
3175 				psecuritypriv->binstallGrpkey = true;
3176 
3177 				psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/*  */
3178 
3179 				rtw_ap_set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx);
3180 
3181 				pbcmc_sta = rtw_get_bcmc_stainfo(padapter);
3182 				if (pbcmc_sta) {
3183 					pbcmc_sta->ieee8021x_blocked = false;
3184 					pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */
3185 				}
3186 			}
3187 		}
3188 	}
3189 
3190 exit:
3191 	kfree(pwep);
3192 
3193 	return ret;
3194 
3195 }
3196 
3197 static int rtw_set_beacon(struct net_device *dev, struct ieee_param *param, int len)
3198 {
3199 	int ret = 0;
3200 	struct adapter *padapter = rtw_netdev_priv(dev);
3201 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3202 	struct sta_priv *pstapriv = &padapter->stapriv;
3203 	unsigned char *pbuf = param->u.bcn_ie.buf;
3204 
3205 	if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
3206 		return -EINVAL;
3207 
3208 	memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2);
3209 
3210 	if ((pstapriv->max_num_sta > NUM_STA) || (pstapriv->max_num_sta <= 0))
3211 		pstapriv->max_num_sta = NUM_STA;
3212 
3213 
3214 	if (rtw_check_beacon_data(padapter, pbuf,  (len-12-2)) == _SUCCESS)/*  12 = param header, 2:no packed */
3215 		ret = 0;
3216 	else
3217 		ret = -EINVAL;
3218 
3219 
3220 	return ret;
3221 
3222 }
3223 
3224 static void rtw_hostapd_sta_flush(struct net_device *dev)
3225 {
3226 	/* _irqL irqL; */
3227 	/* struct list_head	*phead, *plist; */
3228 	/* struct sta_info *psta = NULL; */
3229 	struct adapter *padapter = rtw_netdev_priv(dev);
3230 	/* struct sta_priv *pstapriv = &padapter->stapriv; */
3231 
3232 	flush_all_cam_entry(padapter);	/* clear CAM */
3233 
3234 	rtw_sta_flush(padapter);
3235 }
3236 
3237 static int rtw_add_sta(struct net_device *dev, struct ieee_param *param)
3238 {
3239 	int ret = 0;
3240 	struct sta_info *psta = NULL;
3241 	struct adapter *padapter = rtw_netdev_priv(dev);
3242 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3243 	struct sta_priv *pstapriv = &padapter->stapriv;
3244 
3245 	if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
3246 		return -EINVAL;
3247 
3248 	if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
3249 	    param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
3250 	    param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
3251 		return -EINVAL;
3252 	}
3253 
3254 /*
3255 	psta = rtw_get_stainfo(pstapriv, param->sta_addr);
3256 	if (psta)
3257 	{
3258 		spin_lock_bh(&(pstapriv->sta_hash_lock));
3259 		rtw_free_stainfo(padapter,  psta);
3260 		spin_unlock_bh(&(pstapriv->sta_hash_lock));
3261 
3262 		psta = NULL;
3263 	}
3264 */
3265 	/* psta = rtw_alloc_stainfo(pstapriv, param->sta_addr); */
3266 	psta = rtw_get_stainfo(pstapriv, param->sta_addr);
3267 	if (psta) {
3268 		int flags = param->u.add_sta.flags;
3269 
3270 		psta->aid = param->u.add_sta.aid;/* aid = 1~2007 */
3271 
3272 		memcpy(psta->bssrateset, param->u.add_sta.tx_supp_rates, 16);
3273 
3274 
3275 		/* check wmm cap. */
3276 		if (WLAN_STA_WME&flags)
3277 			psta->qos_option = 1;
3278 		else
3279 			psta->qos_option = 0;
3280 
3281 		if (pmlmepriv->qospriv.qos_option == 0)
3282 			psta->qos_option = 0;
3283 
3284 		/* chec 802.11n ht cap. */
3285 		if (WLAN_STA_HT&flags) {
3286 			psta->htpriv.ht_option = true;
3287 			psta->qos_option = 1;
3288 			memcpy((void *)&psta->htpriv.ht_cap, (void *)&param->u.add_sta.ht_cap, sizeof(struct ieee80211_ht_cap));
3289 		} else {
3290 			psta->htpriv.ht_option = false;
3291 		}
3292 
3293 		if (pmlmepriv->htpriv.ht_option == false)
3294 			psta->htpriv.ht_option = false;
3295 
3296 		update_sta_info_apmode(padapter, psta);
3297 
3298 
3299 	} else {
3300 		ret = -ENOMEM;
3301 	}
3302 
3303 	return ret;
3304 
3305 }
3306 
3307 static int rtw_del_sta(struct net_device *dev, struct ieee_param *param)
3308 {
3309 	int ret = 0;
3310 	struct sta_info *psta = NULL;
3311 	struct adapter *padapter = rtw_netdev_priv(dev);
3312 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3313 	struct sta_priv *pstapriv = &padapter->stapriv;
3314 
3315 	if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
3316 		return -EINVAL;
3317 
3318 	if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
3319 	    param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
3320 	    param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
3321 		return -EINVAL;
3322 	}
3323 
3324 	psta = rtw_get_stainfo(pstapriv, param->sta_addr);
3325 	if (psta) {
3326 		u8 updated = false;
3327 
3328 		spin_lock_bh(&pstapriv->asoc_list_lock);
3329 		if (list_empty(&psta->asoc_list) == false) {
3330 			list_del_init(&psta->asoc_list);
3331 			pstapriv->asoc_list_cnt--;
3332 			updated = ap_free_sta(padapter, psta, true, WLAN_REASON_DEAUTH_LEAVING);
3333 
3334 		}
3335 		spin_unlock_bh(&pstapriv->asoc_list_lock);
3336 
3337 		associated_clients_update(padapter, updated);
3338 
3339 		psta = NULL;
3340 
3341 	}
3342 
3343 	return ret;
3344 
3345 }
3346 
3347 static int rtw_ioctl_get_sta_data(struct net_device *dev, struct ieee_param *param, int len)
3348 {
3349 	int ret = 0;
3350 	struct sta_info *psta = NULL;
3351 	struct adapter *padapter = rtw_netdev_priv(dev);
3352 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3353 	struct sta_priv *pstapriv = &padapter->stapriv;
3354 	struct ieee_param_ex *param_ex = (struct ieee_param_ex *)param;
3355 	struct sta_data *psta_data = (struct sta_data *)param_ex->data;
3356 
3357 	if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
3358 		return -EINVAL;
3359 
3360 	if (param_ex->sta_addr[0] == 0xff && param_ex->sta_addr[1] == 0xff &&
3361 	    param_ex->sta_addr[2] == 0xff && param_ex->sta_addr[3] == 0xff &&
3362 	    param_ex->sta_addr[4] == 0xff && param_ex->sta_addr[5] == 0xff) {
3363 		return -EINVAL;
3364 	}
3365 
3366 	psta = rtw_get_stainfo(pstapriv, param_ex->sta_addr);
3367 	if (psta) {
3368 		psta_data->aid = (u16)psta->aid;
3369 		psta_data->capability = psta->capability;
3370 		psta_data->flags = psta->flags;
3371 
3372 /*
3373 		nonerp_set : BIT(0)
3374 		no_short_slot_time_set : BIT(1)
3375 		no_short_preamble_set : BIT(2)
3376 		no_ht_gf_set : BIT(3)
3377 		no_ht_set : BIT(4)
3378 		ht_20mhz_set : BIT(5)
3379 */
3380 
3381 		psta_data->sta_set = ((psta->nonerp_set) |
3382 							 (psta->no_short_slot_time_set << 1) |
3383 							 (psta->no_short_preamble_set << 2) |
3384 							 (psta->no_ht_gf_set << 3) |
3385 							 (psta->no_ht_set << 4) |
3386 							 (psta->ht_20mhz_set << 5));
3387 
3388 		psta_data->tx_supp_rates_len =  psta->bssratelen;
3389 		memcpy(psta_data->tx_supp_rates, psta->bssrateset, psta->bssratelen);
3390 		memcpy(&psta_data->ht_cap, &psta->htpriv.ht_cap, sizeof(struct ieee80211_ht_cap));
3391 		psta_data->rx_pkts = psta->sta_stats.rx_data_pkts;
3392 		psta_data->rx_bytes = psta->sta_stats.rx_bytes;
3393 		psta_data->rx_drops = psta->sta_stats.rx_drops;
3394 
3395 		psta_data->tx_pkts = psta->sta_stats.tx_pkts;
3396 		psta_data->tx_bytes = psta->sta_stats.tx_bytes;
3397 		psta_data->tx_drops = psta->sta_stats.tx_drops;
3398 
3399 
3400 	} else {
3401 		ret = -1;
3402 	}
3403 
3404 	return ret;
3405 
3406 }
3407 
3408 static int rtw_get_sta_wpaie(struct net_device *dev, struct ieee_param *param)
3409 {
3410 	int ret = 0;
3411 	struct sta_info *psta = NULL;
3412 	struct adapter *padapter = rtw_netdev_priv(dev);
3413 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3414 	struct sta_priv *pstapriv = &padapter->stapriv;
3415 
3416 	if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true)
3417 		return -EINVAL;
3418 
3419 	if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
3420 	    param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
3421 	    param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
3422 		return -EINVAL;
3423 	}
3424 
3425 	psta = rtw_get_stainfo(pstapriv, param->sta_addr);
3426 	if (psta) {
3427 		if ((psta->wpa_ie[0] == WLAN_EID_RSN) || (psta->wpa_ie[0] == WLAN_EID_VENDOR_SPECIFIC)) {
3428 			int wpa_ie_len;
3429 			int copy_len;
3430 
3431 			wpa_ie_len = psta->wpa_ie[1];
3432 
3433 			copy_len = ((wpa_ie_len+2) > sizeof(psta->wpa_ie)) ? (sizeof(psta->wpa_ie)):(wpa_ie_len+2);
3434 
3435 			param->u.wpa_ie.len = copy_len;
3436 
3437 			memcpy(param->u.wpa_ie.reserved, psta->wpa_ie, copy_len);
3438 		}
3439 	} else {
3440 		ret = -1;
3441 	}
3442 
3443 	return ret;
3444 
3445 }
3446 
3447 static int rtw_set_wps_beacon(struct net_device *dev, struct ieee_param *param, int len)
3448 {
3449 	int ret = 0;
3450 	unsigned char wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
3451 	struct adapter *padapter = rtw_netdev_priv(dev);
3452 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3453 	struct mlme_ext_priv *pmlmeext = &(padapter->mlmeextpriv);
3454 	int ie_len;
3455 
3456 	if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
3457 		return -EINVAL;
3458 
3459 	ie_len = len-12-2;/*  12 = param header, 2:no packed */
3460 
3461 
3462 	kfree(pmlmepriv->wps_beacon_ie);
3463 	pmlmepriv->wps_beacon_ie = NULL;
3464 
3465 	if (ie_len > 0) {
3466 		pmlmepriv->wps_beacon_ie = rtw_malloc(ie_len);
3467 		pmlmepriv->wps_beacon_ie_len = ie_len;
3468 		if (!pmlmepriv->wps_beacon_ie)
3469 			return -EINVAL;
3470 
3471 		memcpy(pmlmepriv->wps_beacon_ie, param->u.bcn_ie.buf, ie_len);
3472 
3473 		update_beacon(padapter, WLAN_EID_VENDOR_SPECIFIC, wps_oui, true);
3474 
3475 		pmlmeext->bstart_bss = true;
3476 	}
3477 
3478 
3479 	return ret;
3480 
3481 }
3482 
3483 static int rtw_set_wps_probe_resp(struct net_device *dev, struct ieee_param *param, int len)
3484 {
3485 	int ret = 0;
3486 	struct adapter *padapter = rtw_netdev_priv(dev);
3487 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3488 	int ie_len;
3489 
3490 	if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
3491 		return -EINVAL;
3492 
3493 	ie_len = len-12-2;/*  12 = param header, 2:no packed */
3494 
3495 
3496 	kfree(pmlmepriv->wps_probe_resp_ie);
3497 	pmlmepriv->wps_probe_resp_ie = NULL;
3498 
3499 	if (ie_len > 0) {
3500 		pmlmepriv->wps_probe_resp_ie = rtw_malloc(ie_len);
3501 		pmlmepriv->wps_probe_resp_ie_len = ie_len;
3502 		if (!pmlmepriv->wps_probe_resp_ie)
3503 			return -EINVAL;
3504 
3505 		memcpy(pmlmepriv->wps_probe_resp_ie, param->u.bcn_ie.buf, ie_len);
3506 	}
3507 
3508 
3509 	return ret;
3510 
3511 }
3512 
3513 static int rtw_set_wps_assoc_resp(struct net_device *dev, struct ieee_param *param, int len)
3514 {
3515 	int ret = 0;
3516 	struct adapter *padapter = rtw_netdev_priv(dev);
3517 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3518 	int ie_len;
3519 
3520 	if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
3521 		return -EINVAL;
3522 
3523 	ie_len = len-12-2;/*  12 = param header, 2:no packed */
3524 
3525 
3526 	kfree(pmlmepriv->wps_assoc_resp_ie);
3527 	pmlmepriv->wps_assoc_resp_ie = NULL;
3528 
3529 	if (ie_len > 0) {
3530 		pmlmepriv->wps_assoc_resp_ie = rtw_malloc(ie_len);
3531 		pmlmepriv->wps_assoc_resp_ie_len = ie_len;
3532 		if (!pmlmepriv->wps_assoc_resp_ie)
3533 			return -EINVAL;
3534 
3535 		memcpy(pmlmepriv->wps_assoc_resp_ie, param->u.bcn_ie.buf, ie_len);
3536 	}
3537 
3538 
3539 	return ret;
3540 
3541 }
3542 
3543 static int rtw_set_hidden_ssid(struct net_device *dev, struct ieee_param *param, int len)
3544 {
3545 	int ret = 0;
3546 	struct adapter *adapter = rtw_netdev_priv(dev);
3547 	struct mlme_priv *mlmepriv = &(adapter->mlmepriv);
3548 	struct mlme_ext_priv *mlmeext = &(adapter->mlmeextpriv);
3549 	struct mlme_ext_info *mlmeinfo = &(mlmeext->mlmext_info);
3550 	int ie_len;
3551 	u8 *ssid_ie;
3552 	char ssid[NDIS_802_11_LENGTH_SSID + 1];
3553 	signed int ssid_len;
3554 	u8 ignore_broadcast_ssid;
3555 
3556 	if (check_fwstate(mlmepriv, WIFI_AP_STATE) != true)
3557 		return -EPERM;
3558 
3559 	if (param->u.bcn_ie.reserved[0] != 0xea)
3560 		return -EINVAL;
3561 
3562 	mlmeinfo->hidden_ssid_mode = ignore_broadcast_ssid = param->u.bcn_ie.reserved[1];
3563 
3564 	ie_len = len-12-2;/*  12 = param header, 2:no packed */
3565 	ssid_ie = rtw_get_ie(param->u.bcn_ie.buf,  WLAN_EID_SSID, &ssid_len, ie_len);
3566 
3567 	if (ssid_ie && ssid_len > 0 && ssid_len <= NDIS_802_11_LENGTH_SSID) {
3568 		struct wlan_bssid_ex *pbss_network = &mlmepriv->cur_network.network;
3569 		struct wlan_bssid_ex *pbss_network_ext = &mlmeinfo->network;
3570 
3571 		memcpy(ssid, ssid_ie+2, ssid_len);
3572 		ssid[ssid_len] = 0x0;
3573 
3574 		memcpy(pbss_network->Ssid.Ssid, (void *)ssid, ssid_len);
3575 		pbss_network->Ssid.SsidLength = ssid_len;
3576 		memcpy(pbss_network_ext->Ssid.Ssid, (void *)ssid, ssid_len);
3577 		pbss_network_ext->Ssid.SsidLength = ssid_len;
3578 	}
3579 
3580 	return ret;
3581 }
3582 
3583 static int rtw_ioctl_acl_remove_sta(struct net_device *dev, struct ieee_param *param, int len)
3584 {
3585 	struct adapter *padapter = rtw_netdev_priv(dev);
3586 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3587 
3588 	if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
3589 		return -EINVAL;
3590 
3591 	if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
3592 	    param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
3593 	    param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
3594 		return -EINVAL;
3595 	}
3596 
3597 	rtw_acl_remove_sta(padapter, param->sta_addr);
3598 	return 0;
3599 
3600 }
3601 
3602 static int rtw_ioctl_acl_add_sta(struct net_device *dev, struct ieee_param *param, int len)
3603 {
3604 	struct adapter *padapter = rtw_netdev_priv(dev);
3605 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3606 
3607 	if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
3608 		return -EINVAL;
3609 
3610 	if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff &&
3611 	    param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff &&
3612 	    param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) {
3613 		return -EINVAL;
3614 	}
3615 
3616 	return rtw_acl_add_sta(padapter, param->sta_addr);
3617 
3618 }
3619 
3620 static int rtw_ioctl_set_macaddr_acl(struct net_device *dev, struct ieee_param *param, int len)
3621 {
3622 	int ret = 0;
3623 	struct adapter *padapter = rtw_netdev_priv(dev);
3624 	struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3625 
3626 	if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true)
3627 		return -EINVAL;
3628 
3629 	rtw_set_macaddr_acl(padapter, param->u.mlme.command);
3630 
3631 	return ret;
3632 }
3633 
3634 static int rtw_hostapd_ioctl(struct net_device *dev, struct iw_point *p)
3635 {
3636 	struct ieee_param *param;
3637 	int ret = 0;
3638 	struct adapter *padapter = rtw_netdev_priv(dev);
3639 
3640 	/*
3641 	* this function is expect to call in master mode, which allows no power saving
3642 	* so, we just check hw_init_completed
3643 	*/
3644 
3645 	if (!padapter->hw_init_completed)
3646 		return -EPERM;
3647 
3648 	if (!p->pointer || p->length != sizeof(*param))
3649 		return -EINVAL;
3650 
3651 	param = rtw_malloc(p->length);
3652 	if (param == NULL)
3653 		return -ENOMEM;
3654 
3655 	if (copy_from_user(param, p->pointer, p->length)) {
3656 		kfree(param);
3657 		return -EFAULT;
3658 	}
3659 
3660 	switch (param->cmd) {
3661 	case RTL871X_HOSTAPD_FLUSH:
3662 
3663 		rtw_hostapd_sta_flush(dev);
3664 
3665 		break;
3666 
3667 	case RTL871X_HOSTAPD_ADD_STA:
3668 
3669 		ret = rtw_add_sta(dev, param);
3670 
3671 		break;
3672 
3673 	case RTL871X_HOSTAPD_REMOVE_STA:
3674 
3675 		ret = rtw_del_sta(dev, param);
3676 
3677 		break;
3678 
3679 	case RTL871X_HOSTAPD_SET_BEACON:
3680 
3681 		ret = rtw_set_beacon(dev, param, p->length);
3682 
3683 		break;
3684 
3685 	case RTL871X_SET_ENCRYPTION:
3686 
3687 		ret = rtw_set_encryption(dev, param, p->length);
3688 
3689 		break;
3690 
3691 	case RTL871X_HOSTAPD_GET_WPAIE_STA:
3692 
3693 		ret = rtw_get_sta_wpaie(dev, param);
3694 
3695 		break;
3696 
3697 	case RTL871X_HOSTAPD_SET_WPS_BEACON:
3698 
3699 		ret = rtw_set_wps_beacon(dev, param, p->length);
3700 
3701 		break;
3702 
3703 	case RTL871X_HOSTAPD_SET_WPS_PROBE_RESP:
3704 
3705 		ret = rtw_set_wps_probe_resp(dev, param, p->length);
3706 
3707 		break;
3708 
3709 	case RTL871X_HOSTAPD_SET_WPS_ASSOC_RESP:
3710 
3711 		ret = rtw_set_wps_assoc_resp(dev, param, p->length);
3712 
3713 		break;
3714 
3715 	case RTL871X_HOSTAPD_SET_HIDDEN_SSID:
3716 
3717 		ret = rtw_set_hidden_ssid(dev, param, p->length);
3718 
3719 		break;
3720 
3721 	case RTL871X_HOSTAPD_GET_INFO_STA:
3722 
3723 		ret = rtw_ioctl_get_sta_data(dev, param, p->length);
3724 
3725 		break;
3726 
3727 	case RTL871X_HOSTAPD_SET_MACADDR_ACL:
3728 
3729 		ret = rtw_ioctl_set_macaddr_acl(dev, param, p->length);
3730 
3731 		break;
3732 
3733 	case RTL871X_HOSTAPD_ACL_ADD_STA:
3734 
3735 		ret = rtw_ioctl_acl_add_sta(dev, param, p->length);
3736 
3737 		break;
3738 
3739 	case RTL871X_HOSTAPD_ACL_REMOVE_STA:
3740 
3741 		ret = rtw_ioctl_acl_remove_sta(dev, param, p->length);
3742 
3743 		break;
3744 
3745 	default:
3746 		ret = -EOPNOTSUPP;
3747 		break;
3748 
3749 	}
3750 
3751 	if (ret == 0 && copy_to_user(p->pointer, param, p->length))
3752 		ret = -EFAULT;
3753 
3754 	kfree(param);
3755 	return ret;
3756 }
3757 
3758 static int rtw_wx_set_priv(struct net_device *dev,
3759 				struct iw_request_info *info,
3760 				union iwreq_data *awrq,
3761 				char *extra)
3762 {
3763 
3764 #ifdef DEBUG_RTW_WX_SET_PRIV
3765 	char *ext_dbg;
3766 #endif
3767 
3768 	int ret = 0;
3769 	int len = 0;
3770 	char *ext;
3771 
3772 	struct adapter *padapter = rtw_netdev_priv(dev);
3773 	struct iw_point *dwrq = (struct iw_point *)awrq;
3774 
3775 	if (dwrq->length == 0)
3776 		return -EFAULT;
3777 
3778 	len = dwrq->length;
3779 	ext = vmalloc(len);
3780 	if (!ext)
3781 		return -ENOMEM;
3782 
3783 	if (copy_from_user(ext, dwrq->pointer, len)) {
3784 		vfree(ext);
3785 		return -EFAULT;
3786 	}
3787 
3788 	#ifdef DEBUG_RTW_WX_SET_PRIV
3789 	ext_dbg = vmalloc(len);
3790 	if (!ext_dbg) {
3791 		vfree(ext, len);
3792 		return -ENOMEM;
3793 	}
3794 
3795 	memcpy(ext_dbg, ext, len);
3796 	#endif
3797 
3798 	/* added for wps2.0 @20110524 */
3799 	if (dwrq->flags == 0x8766 && len > 8) {
3800 		u32 cp_sz;
3801 		struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
3802 		u8 *probereq_wpsie = ext;
3803 		int probereq_wpsie_len = len;
3804 		u8 wps_oui[4] = {0x0, 0x50, 0xf2, 0x04};
3805 
3806 		if ((WLAN_EID_VENDOR_SPECIFIC == probereq_wpsie[0]) &&
3807 			(!memcmp(&probereq_wpsie[2], wps_oui, 4))) {
3808 			cp_sz = probereq_wpsie_len > MAX_WPS_IE_LEN ? MAX_WPS_IE_LEN : probereq_wpsie_len;
3809 
3810 			if (pmlmepriv->wps_probe_req_ie) {
3811 				pmlmepriv->wps_probe_req_ie_len = 0;
3812 				kfree(pmlmepriv->wps_probe_req_ie);
3813 				pmlmepriv->wps_probe_req_ie = NULL;
3814 			}
3815 
3816 			pmlmepriv->wps_probe_req_ie = rtw_malloc(cp_sz);
3817 			if (pmlmepriv->wps_probe_req_ie == NULL) {
3818 				printk("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
3819 				ret =  -EINVAL;
3820 				goto FREE_EXT;
3821 
3822 			}
3823 
3824 			memcpy(pmlmepriv->wps_probe_req_ie, probereq_wpsie, cp_sz);
3825 			pmlmepriv->wps_probe_req_ie_len = cp_sz;
3826 
3827 		}
3828 
3829 		goto FREE_EXT;
3830 
3831 	}
3832 
3833 	if (len >= WEXT_CSCAN_HEADER_SIZE
3834 		&& !memcmp(ext, WEXT_CSCAN_HEADER, WEXT_CSCAN_HEADER_SIZE)) {
3835 		ret = rtw_wx_set_scan(dev, info, awrq, ext);
3836 		goto FREE_EXT;
3837 	}
3838 
3839 FREE_EXT:
3840 
3841 	vfree(ext);
3842 	#ifdef DEBUG_RTW_WX_SET_PRIV
3843 	vfree(ext_dbg);
3844 	#endif
3845 
3846 	return ret;
3847 
3848 }
3849 
3850 static int rtw_pm_set(struct net_device *dev,
3851 		      struct iw_request_info *info,
3852 		      union iwreq_data *wrqu, char *extra)
3853 {
3854 	int ret = 0;
3855 	unsigned	mode = 0;
3856 	struct adapter *padapter = rtw_netdev_priv(dev);
3857 
3858 	if (!memcmp(extra, "lps =", 4)) {
3859 		sscanf(extra+4, "%u", &mode);
3860 		ret = rtw_pm_set_lps(padapter, mode);
3861 	} else if (!memcmp(extra, "ips =", 4)) {
3862 		sscanf(extra+4, "%u", &mode);
3863 		ret = rtw_pm_set_ips(padapter, mode);
3864 	} else {
3865 		ret = -EINVAL;
3866 	}
3867 
3868 	return ret;
3869 }
3870 
3871 static int rtw_test(
3872 	struct net_device *dev,
3873 	struct iw_request_info *info,
3874 	union iwreq_data *wrqu, char *extra)
3875 {
3876 	u32 len;
3877 	u8 *pbuf, *pch;
3878 	char *ptmp;
3879 	u8 *delim = ",";
3880 	struct adapter *padapter = rtw_netdev_priv(dev);
3881 
3882 
3883 	len = wrqu->data.length;
3884 
3885 	pbuf = rtw_zmalloc(len);
3886 	if (!pbuf)
3887 		return -ENOMEM;
3888 
3889 	if (copy_from_user(pbuf, wrqu->data.pointer, len)) {
3890 		kfree(pbuf);
3891 		return -EFAULT;
3892 	}
3893 
3894 	ptmp = (char *)pbuf;
3895 	pch = strsep(&ptmp, delim);
3896 	if ((pch == NULL) || (strlen(pch) == 0)) {
3897 		kfree(pbuf);
3898 		return -EFAULT;
3899 	}
3900 
3901 	if (strcmp(pch, "bton") == 0)
3902 		hal_btcoex_SetManualControl(padapter, false);
3903 
3904 	if (strcmp(pch, "btoff") == 0)
3905 		hal_btcoex_SetManualControl(padapter, true);
3906 
3907 	if (strcmp(pch, "h2c") == 0) {
3908 		u8 param[8];
3909 		u8 count = 0;
3910 		u32 tmp;
3911 		u8 i;
3912 		u32 pos;
3913 		s32 ret;
3914 
3915 
3916 		do {
3917 			pch = strsep(&ptmp, delim);
3918 			if ((pch == NULL) || (strlen(pch) == 0))
3919 				break;
3920 
3921 			sscanf(pch, "%x", &tmp);
3922 			param[count++] = (u8)tmp;
3923 		} while (count < 8);
3924 
3925 		if (count == 0) {
3926 			kfree(pbuf);
3927 			return -EFAULT;
3928 		}
3929 
3930 		ret = rtw_hal_fill_h2c_cmd(padapter, param[0], count-1, &param[1]);
3931 
3932 		pos = sprintf(extra, "H2C ID = 0x%02x content =", param[0]);
3933 		for (i = 1; i < count; i++)
3934 			pos += sprintf(extra+pos, "%02x,", param[i]);
3935 		extra[pos] = 0;
3936 		pos--;
3937 		pos += sprintf(extra+pos, " %s", ret == _FAIL?"FAIL":"OK");
3938 
3939 		wrqu->data.length = strlen(extra) + 1;
3940 	}
3941 
3942 	kfree(pbuf);
3943 	return 0;
3944 }
3945 
3946 static iw_handler rtw_handlers[] = {
3947 	NULL,					/* SIOCSIWCOMMIT */
3948 	rtw_wx_get_name,		/* SIOCGIWNAME */
3949 	dummy,					/* SIOCSIWNWID */
3950 	dummy,					/* SIOCGIWNWID */
3951 	rtw_wx_set_freq,		/* SIOCSIWFREQ */
3952 	rtw_wx_get_freq,		/* SIOCGIWFREQ */
3953 	rtw_wx_set_mode,		/* SIOCSIWMODE */
3954 	rtw_wx_get_mode,		/* SIOCGIWMODE */
3955 	dummy,					/* SIOCSIWSENS */
3956 	rtw_wx_get_sens,		/* SIOCGIWSENS */
3957 	NULL,					/* SIOCSIWRANGE */
3958 	rtw_wx_get_range,		/* SIOCGIWRANGE */
3959 	rtw_wx_set_priv,		/* SIOCSIWPRIV */
3960 	NULL,					/* SIOCGIWPRIV */
3961 	NULL,					/* SIOCSIWSTATS */
3962 	NULL,					/* SIOCGIWSTATS */
3963 	dummy,					/* SIOCSIWSPY */
3964 	dummy,					/* SIOCGIWSPY */
3965 	NULL,					/* SIOCGIWTHRSPY */
3966 	NULL,					/* SIOCWIWTHRSPY */
3967 	rtw_wx_set_wap,		/* SIOCSIWAP */
3968 	rtw_wx_get_wap,		/* SIOCGIWAP */
3969 	rtw_wx_set_mlme,		/* request MLME operation; uses struct iw_mlme */
3970 	dummy,					/* SIOCGIWAPLIST -- depricated */
3971 	rtw_wx_set_scan,		/* SIOCSIWSCAN */
3972 	rtw_wx_get_scan,		/* SIOCGIWSCAN */
3973 	rtw_wx_set_essid,		/* SIOCSIWESSID */
3974 	rtw_wx_get_essid,		/* SIOCGIWESSID */
3975 	dummy,					/* SIOCSIWNICKN */
3976 	rtw_wx_get_nick,		/* SIOCGIWNICKN */
3977 	NULL,					/* -- hole -- */
3978 	NULL,					/* -- hole -- */
3979 	rtw_wx_set_rate,		/* SIOCSIWRATE */
3980 	rtw_wx_get_rate,		/* SIOCGIWRATE */
3981 	rtw_wx_set_rts,			/* SIOCSIWRTS */
3982 	rtw_wx_get_rts,			/* SIOCGIWRTS */
3983 	rtw_wx_set_frag,		/* SIOCSIWFRAG */
3984 	rtw_wx_get_frag,		/* SIOCGIWFRAG */
3985 	dummy,					/* SIOCSIWTXPOW */
3986 	dummy,					/* SIOCGIWTXPOW */
3987 	dummy,					/* SIOCSIWRETRY */
3988 	rtw_wx_get_retry,		/* SIOCGIWRETRY */
3989 	rtw_wx_set_enc,			/* SIOCSIWENCODE */
3990 	rtw_wx_get_enc,			/* SIOCGIWENCODE */
3991 	dummy,					/* SIOCSIWPOWER */
3992 	rtw_wx_get_power,		/* SIOCGIWPOWER */
3993 	NULL,					/*---hole---*/
3994 	NULL,					/*---hole---*/
3995 	rtw_wx_set_gen_ie,		/* SIOCSIWGENIE */
3996 	NULL,					/* SIOCGWGENIE */
3997 	rtw_wx_set_auth,		/* SIOCSIWAUTH */
3998 	NULL,					/* SIOCGIWAUTH */
3999 	rtw_wx_set_enc_ext,		/* SIOCSIWENCODEEXT */
4000 	NULL,					/* SIOCGIWENCODEEXT */
4001 	rtw_wx_set_pmkid,		/* SIOCSIWPMKSA */
4002 	NULL,					/*---hole---*/
4003 };
4004 
4005 static const struct iw_priv_args rtw_private_args[] = {
4006 	{
4007 		SIOCIWFIRSTPRIV + 0x0,
4008 		IW_PRIV_TYPE_CHAR | 0x7FF, 0, "write"
4009 	},
4010 	{
4011 		SIOCIWFIRSTPRIV + 0x1,
4012 		IW_PRIV_TYPE_CHAR | 0x7FF,
4013 		IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | IFNAMSIZ, "read"
4014 	},
4015 	{
4016 		SIOCIWFIRSTPRIV + 0x2, 0, 0, "driver_ext"
4017 	},
4018 	{
4019 		SIOCIWFIRSTPRIV + 0x3, 0, 0, "mp_ioctl"
4020 	},
4021 	{
4022 		SIOCIWFIRSTPRIV + 0x4,
4023 		IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "apinfo"
4024 	},
4025 	{
4026 		SIOCIWFIRSTPRIV + 0x5,
4027 		IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 2, 0, "setpid"
4028 	},
4029 	{
4030 		SIOCIWFIRSTPRIV + 0x6,
4031 		IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "wps_start"
4032 	},
4033 /* for PLATFORM_MT53XX */
4034 	{
4035 		SIOCIWFIRSTPRIV + 0x7,
4036 		IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "get_sensitivity"
4037 	},
4038 	{
4039 		SIOCIWFIRSTPRIV + 0x8,
4040 		IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "wps_prob_req_ie"
4041 	},
4042 	{
4043 		SIOCIWFIRSTPRIV + 0x9,
4044 		IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "wps_assoc_req_ie"
4045 	},
4046 
4047 /* for RTK_DMP_PLATFORM */
4048 	{
4049 		SIOCIWFIRSTPRIV + 0xA,
4050 		IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "channel_plan"
4051 	},
4052 
4053 	{
4054 		SIOCIWFIRSTPRIV + 0xB,
4055 		IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 2, 0, "dbg"
4056 	},
4057 	{
4058 		SIOCIWFIRSTPRIV + 0xC,
4059 		IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 3, 0, "rfw"
4060 	},
4061 	{
4062 		SIOCIWFIRSTPRIV + 0xD,
4063 		IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 2, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | IFNAMSIZ, "rfr"
4064 	},
4065 	{
4066 		SIOCIWFIRSTPRIV + 0x10,
4067 		IW_PRIV_TYPE_CHAR | 1024, 0, "p2p_set"
4068 	},
4069 	{
4070 		SIOCIWFIRSTPRIV + 0x11,
4071 		IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "p2p_get"
4072 	},
4073 	{
4074 		SIOCIWFIRSTPRIV + 0x12, 0, 0, "NULL"
4075 	},
4076 	{
4077 		SIOCIWFIRSTPRIV + 0x13,
4078 		IW_PRIV_TYPE_CHAR | 64, IW_PRIV_TYPE_CHAR | 64, "p2p_get2"
4079 	},
4080 	{
4081 		SIOCIWFIRSTPRIV + 0x14,
4082 		IW_PRIV_TYPE_CHAR  | 64, 0, "tdls"
4083 	},
4084 	{
4085 		SIOCIWFIRSTPRIV + 0x15,
4086 		IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | 1024, "tdls_get"
4087 	},
4088 	{
4089 		SIOCIWFIRSTPRIV + 0x16,
4090 		IW_PRIV_TYPE_CHAR | 64, 0, "pm_set"
4091 	},
4092 
4093 	{SIOCIWFIRSTPRIV + 0x18, IW_PRIV_TYPE_CHAR | IFNAMSIZ, 0, "rereg_nd_name"},
4094 	{SIOCIWFIRSTPRIV + 0x1A, IW_PRIV_TYPE_CHAR | 1024, 0, "efuse_set"},
4095 	{SIOCIWFIRSTPRIV + 0x1B, IW_PRIV_TYPE_CHAR | 128, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "efuse_get"},
4096 	{
4097 		SIOCIWFIRSTPRIV + 0x1D,
4098 		IW_PRIV_TYPE_CHAR | 40, IW_PRIV_TYPE_CHAR | 0x7FF, "test"
4099 	},
4100 };
4101 
4102 static iw_handler rtw_private_handler[] = {
4103 	rtw_wx_write32,					/* 0x00 */
4104 	rtw_wx_read32,					/* 0x01 */
4105 	rtw_drvext_hdl,					/* 0x02 */
4106 	NULL,						/* 0x03 */
4107 
4108 /*  for MM DTV platform */
4109 	rtw_get_ap_info,					/* 0x04 */
4110 
4111 	rtw_set_pid,						/* 0x05 */
4112 	rtw_wps_start,					/* 0x06 */
4113 
4114 /*  for PLATFORM_MT53XX */
4115 	rtw_wx_get_sensitivity,			/* 0x07 */
4116 	rtw_wx_set_mtk_wps_probe_ie,	/* 0x08 */
4117 	rtw_wx_set_mtk_wps_ie,			/* 0x09 */
4118 
4119 /*  for RTK_DMP_PLATFORM */
4120 /*  Set Channel depend on the country code */
4121 	rtw_wx_set_channel_plan,		/* 0x0A */
4122 
4123 	rtw_dbg_port,					/* 0x0B */
4124 	rtw_wx_write_rf,					/* 0x0C */
4125 	rtw_wx_read_rf,					/* 0x0D */
4126 	rtw_wx_priv_null,				/* 0x0E */
4127 	rtw_wx_priv_null,				/* 0x0F */
4128 	rtw_p2p_set,					/* 0x10 */
4129 	rtw_p2p_get,					/* 0x11 */
4130 	NULL,							/* 0x12 */
4131 	rtw_p2p_get2,					/* 0x13 */
4132 
4133 	NULL,						/* 0x14 */
4134 	NULL,						/* 0x15 */
4135 
4136 	rtw_pm_set,						/* 0x16 */
4137 	rtw_wx_priv_null,				/* 0x17 */
4138 	rtw_rereg_nd_name,				/* 0x18 */
4139 	rtw_wx_priv_null,				/* 0x19 */
4140 	NULL,						/* 0x1A */
4141 	NULL,						/* 0x1B */
4142 	NULL,							/*  0x1C is reserved for hostapd */
4143 	rtw_test,						/*  0x1D */
4144 };
4145 
4146 static struct iw_statistics *rtw_get_wireless_stats(struct net_device *dev)
4147 {
4148 	struct adapter *padapter = rtw_netdev_priv(dev);
4149 	struct iw_statistics *piwstats = &padapter->iwstats;
4150 	int tmp_level = 0;
4151 	int tmp_qual = 0;
4152 	int tmp_noise = 0;
4153 
4154 	if (check_fwstate(&padapter->mlmepriv, _FW_LINKED) != true) {
4155 		piwstats->qual.qual = 0;
4156 		piwstats->qual.level = 0;
4157 		piwstats->qual.noise = 0;
4158 	} else {
4159 		tmp_level = padapter->recvpriv.signal_strength;
4160 		tmp_qual = padapter->recvpriv.signal_qual;
4161 		tmp_noise = padapter->recvpriv.noise;
4162 
4163 		piwstats->qual.level = tmp_level;
4164 		piwstats->qual.qual = tmp_qual;
4165 		piwstats->qual.noise = tmp_noise;
4166 	}
4167 	piwstats->qual.updated = IW_QUAL_ALL_UPDATED ;/* IW_QUAL_DBM; */
4168 
4169 	return &padapter->iwstats;
4170 }
4171 
4172 struct iw_handler_def rtw_handlers_def = {
4173 	.standard = rtw_handlers,
4174 	.num_standard = ARRAY_SIZE(rtw_handlers),
4175 #if defined(CONFIG_WEXT_PRIV)
4176 	.private = rtw_private_handler,
4177 	.private_args = (struct iw_priv_args *)rtw_private_args,
4178 	.num_private = ARRAY_SIZE(rtw_private_handler),
4179 	.num_private_args = ARRAY_SIZE(rtw_private_args),
4180 #endif
4181 	.get_wireless_stats = rtw_get_wireless_stats,
4182 };
4183 
4184 /*  copy from net/wireless/wext.c start */
4185 /* ---------------------------------------------------------------- */
4186 /*
4187  * Calculate size of private arguments
4188  */
4189 static const char iw_priv_type_size[] = {
4190 	0,                              /* IW_PRIV_TYPE_NONE */
4191 	1,                              /* IW_PRIV_TYPE_BYTE */
4192 	1,                              /* IW_PRIV_TYPE_CHAR */
4193 	0,                              /* Not defined */
4194 	sizeof(__u32),                  /* IW_PRIV_TYPE_INT */
4195 	sizeof(struct iw_freq),         /* IW_PRIV_TYPE_FLOAT */
4196 	sizeof(struct sockaddr),        /* IW_PRIV_TYPE_ADDR */
4197 	0,                              /* Not defined */
4198 };
4199 
4200 static int get_priv_size(__u16 args)
4201 {
4202 	int num = args & IW_PRIV_SIZE_MASK;
4203 	int type = (args & IW_PRIV_TYPE_MASK) >> 12;
4204 
4205 	return num * iw_priv_type_size[type];
4206 }
4207 /*  copy from net/wireless/wext.c end */
4208 
4209 static int rtw_ioctl_wext_private(struct net_device *dev, union iwreq_data *wrq_data)
4210 {
4211 	int err = 0;
4212 	u8 *input = NULL;
4213 	u32 input_len = 0;
4214 	const char delim[] = " ";
4215 	u8 *output = NULL;
4216 	u32 output_len = 0;
4217 	u32 count = 0;
4218 	u8 *buffer = NULL;
4219 	u32 buffer_len = 0;
4220 	char *ptr = NULL;
4221 	u8 cmdname[17] = {0}; /*  IFNAMSIZ+1 */
4222 	u32 cmdlen;
4223 	s32 len;
4224 	u8 *extra = NULL;
4225 	u32 extra_size = 0;
4226 
4227 	s32 k;
4228 	const iw_handler *priv;		/* Private ioctl */
4229 	const struct iw_priv_args *priv_args;	/* Private ioctl description */
4230 	u32 num_priv_args;			/* Number of descriptions */
4231 	iw_handler handler;
4232 	int temp;
4233 	int subcmd = 0;				/* sub-ioctl index */
4234 	int offset = 0;				/* Space for sub-ioctl index */
4235 
4236 	union iwreq_data wdata;
4237 
4238 
4239 	memcpy(&wdata, wrq_data, sizeof(wdata));
4240 
4241 	input_len = 2048;
4242 	input = rtw_zmalloc(input_len);
4243 	if (NULL == input)
4244 		return -ENOMEM;
4245 	if (copy_from_user(input, wdata.data.pointer, input_len)) {
4246 		err = -EFAULT;
4247 		goto exit;
4248 	}
4249 	ptr = input;
4250 	len = strlen(input);
4251 
4252 	sscanf(ptr, "%16s", cmdname);
4253 	cmdlen = strlen(cmdname);
4254 
4255 	/*  skip command string */
4256 	if (cmdlen > 0)
4257 		cmdlen += 1; /*  skip one space */
4258 	ptr += cmdlen;
4259 	len -= cmdlen;
4260 
4261 	priv = rtw_private_handler;
4262 	priv_args = rtw_private_args;
4263 	num_priv_args = ARRAY_SIZE(rtw_private_args);
4264 
4265 	if (num_priv_args == 0) {
4266 		err = -EOPNOTSUPP;
4267 		goto exit;
4268 	}
4269 
4270 	/* Search the correct ioctl */
4271 	k = -1;
4272 	while ((++k < num_priv_args) && strcmp(priv_args[k].name, cmdname));
4273 
4274 	/* If not found... */
4275 	if (k == num_priv_args) {
4276 		err = -EOPNOTSUPP;
4277 		goto exit;
4278 	}
4279 
4280 	/* Watch out for sub-ioctls ! */
4281 	if (priv_args[k].cmd < SIOCDEVPRIVATE) {
4282 		int j = -1;
4283 
4284 		/* Find the matching *real* ioctl */
4285 		while ((++j < num_priv_args) && ((priv_args[j].name[0] != '\0') ||
4286 			(priv_args[j].set_args != priv_args[k].set_args) ||
4287 			(priv_args[j].get_args != priv_args[k].get_args)));
4288 
4289 		/* If not found... */
4290 		if (j == num_priv_args) {
4291 			err = -EINVAL;
4292 			goto exit;
4293 		}
4294 
4295 		/* Save sub-ioctl number */
4296 		subcmd = priv_args[k].cmd;
4297 		/* Reserve one int (simplify alignment issues) */
4298 		offset = sizeof(__u32);
4299 		/* Use real ioctl definition from now on */
4300 		k = j;
4301 	}
4302 
4303 	buffer = rtw_zmalloc(4096);
4304 	if (NULL == buffer) {
4305 		err = -ENOMEM;
4306 		goto exit;
4307 	}
4308 
4309 	/* If we have to set some data */
4310 	if ((priv_args[k].set_args & IW_PRIV_TYPE_MASK) &&
4311 		(priv_args[k].set_args & IW_PRIV_SIZE_MASK)) {
4312 		u8 *str;
4313 
4314 		switch (priv_args[k].set_args & IW_PRIV_TYPE_MASK) {
4315 		case IW_PRIV_TYPE_BYTE:
4316 			/* Fetch args */
4317 			count = 0;
4318 			do {
4319 				str = strsep(&ptr, delim);
4320 				if (NULL == str)
4321 					break;
4322 				sscanf(str, "%i", &temp);
4323 				buffer[count++] = (u8)temp;
4324 			} while (1);
4325 			buffer_len = count;
4326 
4327 			/* Number of args to fetch */
4328 			wdata.data.length = count;
4329 			if (wdata.data.length > (priv_args[k].set_args & IW_PRIV_SIZE_MASK))
4330 				wdata.data.length = priv_args[k].set_args & IW_PRIV_SIZE_MASK;
4331 
4332 			break;
4333 
4334 		case IW_PRIV_TYPE_INT:
4335 			/* Fetch args */
4336 			count = 0;
4337 			do {
4338 				str = strsep(&ptr, delim);
4339 				if (NULL == str)
4340 					break;
4341 				sscanf(str, "%i", &temp);
4342 				((s32 *)buffer)[count++] = (s32)temp;
4343 			} while (1);
4344 			buffer_len = count * sizeof(s32);
4345 
4346 			/* Number of args to fetch */
4347 			wdata.data.length = count;
4348 			if (wdata.data.length > (priv_args[k].set_args & IW_PRIV_SIZE_MASK))
4349 				wdata.data.length = priv_args[k].set_args & IW_PRIV_SIZE_MASK;
4350 
4351 			break;
4352 
4353 		case IW_PRIV_TYPE_CHAR:
4354 			if (len > 0) {
4355 				/* Size of the string to fetch */
4356 				wdata.data.length = len;
4357 				if (wdata.data.length > (priv_args[k].set_args & IW_PRIV_SIZE_MASK))
4358 					wdata.data.length = priv_args[k].set_args & IW_PRIV_SIZE_MASK;
4359 
4360 				/* Fetch string */
4361 				memcpy(buffer, ptr, wdata.data.length);
4362 			} else {
4363 				wdata.data.length = 1;
4364 				buffer[0] = '\0';
4365 			}
4366 			buffer_len = wdata.data.length;
4367 			break;
4368 
4369 		default:
4370 			err = -1;
4371 			goto exit;
4372 		}
4373 
4374 		if ((priv_args[k].set_args & IW_PRIV_SIZE_FIXED) &&
4375 			(wdata.data.length != (priv_args[k].set_args & IW_PRIV_SIZE_MASK))) {
4376 			err = -EINVAL;
4377 			goto exit;
4378 		}
4379 	} else { /* if args to set */
4380 		wdata.data.length = 0L;
4381 	}
4382 
4383 	/* Those two tests are important. They define how the driver
4384 	* will have to handle the data */
4385 	if ((priv_args[k].set_args & IW_PRIV_SIZE_FIXED) &&
4386 		((get_priv_size(priv_args[k].set_args) + offset) <= IFNAMSIZ)) {
4387 		/* First case : all SET args fit within wrq */
4388 		if (offset)
4389 			wdata.mode = subcmd;
4390 		memcpy(wdata.name + offset, buffer, IFNAMSIZ - offset);
4391 	} else {
4392 		if ((priv_args[k].set_args == 0) &&
4393 			(priv_args[k].get_args & IW_PRIV_SIZE_FIXED) &&
4394 			(get_priv_size(priv_args[k].get_args) <= IFNAMSIZ)) {
4395 			/* Second case : no SET args, GET args fit within wrq */
4396 			if (offset)
4397 				wdata.mode = subcmd;
4398 		} else {
4399 			/* Third case : args won't fit in wrq, or variable number of args */
4400 			if (copy_to_user(wdata.data.pointer, buffer, buffer_len)) {
4401 				err = -EFAULT;
4402 				goto exit;
4403 			}
4404 			wdata.data.flags = subcmd;
4405 		}
4406 	}
4407 
4408 	kfree(input);
4409 	input = NULL;
4410 
4411 	extra_size = 0;
4412 	if (IW_IS_SET(priv_args[k].cmd)) {
4413 		/* Size of set arguments */
4414 		extra_size = get_priv_size(priv_args[k].set_args);
4415 
4416 		/* Does it fits in iwr ? */
4417 		if ((priv_args[k].set_args & IW_PRIV_SIZE_FIXED) &&
4418 			((extra_size + offset) <= IFNAMSIZ))
4419 			extra_size = 0;
4420 	} else {
4421 		/* Size of get arguments */
4422 		extra_size = get_priv_size(priv_args[k].get_args);
4423 
4424 		/* Does it fits in iwr ? */
4425 		if ((priv_args[k].get_args & IW_PRIV_SIZE_FIXED) &&
4426 			(extra_size <= IFNAMSIZ))
4427 			extra_size = 0;
4428 	}
4429 
4430 	if (extra_size == 0) {
4431 		extra = (u8 *)&wdata;
4432 		kfree(buffer);
4433 		buffer = NULL;
4434 	} else
4435 		extra = buffer;
4436 
4437 	handler = priv[priv_args[k].cmd - SIOCIWFIRSTPRIV];
4438 	err = handler(dev, NULL, &wdata, extra);
4439 
4440 	/* If we have to get some data */
4441 	if ((priv_args[k].get_args & IW_PRIV_TYPE_MASK) &&
4442 		(priv_args[k].get_args & IW_PRIV_SIZE_MASK)) {
4443 		int j;
4444 		int n = 0;	/* number of args */
4445 		u8 str[20] = {0};
4446 
4447 		/* Check where is the returned data */
4448 		if ((priv_args[k].get_args & IW_PRIV_SIZE_FIXED) &&
4449 			(get_priv_size(priv_args[k].get_args) <= IFNAMSIZ))
4450 			n = priv_args[k].get_args & IW_PRIV_SIZE_MASK;
4451 		else
4452 			n = wdata.data.length;
4453 
4454 		output = rtw_zmalloc(4096);
4455 		if (NULL == output) {
4456 			err =  -ENOMEM;
4457 			goto exit;
4458 		}
4459 
4460 		switch (priv_args[k].get_args & IW_PRIV_TYPE_MASK) {
4461 		case IW_PRIV_TYPE_BYTE:
4462 			/* Display args */
4463 			for (j = 0; j < n; j++) {
4464 				len = scnprintf(str, sizeof(str), "%d  ", extra[j]);
4465 				output_len = strlen(output);
4466 				if ((output_len + len + 1) > 4096) {
4467 					err = -E2BIG;
4468 					goto exit;
4469 				}
4470 				memcpy(output+output_len, str, len);
4471 			}
4472 			break;
4473 
4474 		case IW_PRIV_TYPE_INT:
4475 			/* Display args */
4476 			for (j = 0; j < n; j++) {
4477 				len = scnprintf(str, sizeof(str), "%d  ", ((__s32 *)extra)[j]);
4478 				output_len = strlen(output);
4479 				if ((output_len + len + 1) > 4096) {
4480 					err = -E2BIG;
4481 					goto exit;
4482 				}
4483 				memcpy(output+output_len, str, len);
4484 			}
4485 			break;
4486 
4487 		case IW_PRIV_TYPE_CHAR:
4488 			/* Display args */
4489 			memcpy(output, extra, n);
4490 			break;
4491 
4492 		default:
4493 			err = -1;
4494 			goto exit;
4495 		}
4496 
4497 		output_len = strlen(output) + 1;
4498 		wrq_data->data.length = output_len;
4499 		if (copy_to_user(wrq_data->data.pointer, output, output_len)) {
4500 			err = -EFAULT;
4501 			goto exit;
4502 		}
4503 	} else { /* if args to set */
4504 		wrq_data->data.length = 0;
4505 	}
4506 
4507 exit:
4508 	kfree(input);
4509 	kfree(buffer);
4510 	kfree(output);
4511 
4512 	return err;
4513 }
4514 
4515 int rtw_ioctl(struct net_device *dev, struct ifreq *rq, int cmd)
4516 {
4517 	struct iwreq *wrq = (struct iwreq *)rq;
4518 	int ret = 0;
4519 
4520 	switch (cmd) {
4521 	case RTL_IOCTL_WPA_SUPPLICANT:
4522 		ret = wpa_supplicant_ioctl(dev, &wrq->u.data);
4523 		break;
4524 	case RTL_IOCTL_HOSTAPD:
4525 		ret = rtw_hostapd_ioctl(dev, &wrq->u.data);
4526 		break;
4527 	case SIOCDEVPRIVATE:
4528 		ret = rtw_ioctl_wext_private(dev, &wrq->u);
4529 		break;
4530 	default:
4531 		ret = -EOPNOTSUPP;
4532 		break;
4533 	}
4534 
4535 	return ret;
4536 }
4537