1 // SPDX-License-Identifier: GPL-2.0 2 /****************************************************************************** 3 * 4 * Copyright(c) 2007 - 2012 Realtek Corporation. All rights reserved. 5 * 6 ******************************************************************************/ 7 #define _IOCTL_LINUX_C_ 8 9 #include <linux/etherdevice.h> 10 #include <drv_types.h> 11 #include <rtw_debug.h> 12 #include <rtw_mp.h> 13 #include <hal_btcoex.h> 14 #include <linux/jiffies.h> 15 #include <linux/kernel.h> 16 17 #define RTL_IOCTL_WPA_SUPPLICANT (SIOCIWFIRSTPRIV+30) 18 19 #define SCAN_ITEM_SIZE 768 20 #define MAX_CUSTOM_LEN 64 21 #define RATE_COUNT 4 22 23 /* combo scan */ 24 #define WEXT_CSCAN_HEADER "CSCAN S\x01\x00\x00S\x00" 25 #define WEXT_CSCAN_HEADER_SIZE 12 26 #define WEXT_CSCAN_SSID_SECTION 'S' 27 #define WEXT_CSCAN_CHANNEL_SECTION 'C' 28 #define WEXT_CSCAN_ACTV_DWELL_SECTION 'A' 29 #define WEXT_CSCAN_PASV_DWELL_SECTION 'P' 30 #define WEXT_CSCAN_HOME_DWELL_SECTION 'H' 31 #define WEXT_CSCAN_TYPE_SECTION 'T' 32 33 static u32 rtw_rates[] = {1000000, 2000000, 5500000, 11000000, 34 6000000, 9000000, 12000000, 18000000, 24000000, 36000000, 48000000, 54000000}; 35 36 void indicate_wx_scan_complete_event(struct adapter *padapter) 37 { 38 union iwreq_data wrqu; 39 40 memset(&wrqu, 0, sizeof(union iwreq_data)); 41 } 42 43 44 void rtw_indicate_wx_assoc_event(struct adapter *padapter) 45 { 46 union iwreq_data wrqu; 47 struct mlme_priv *pmlmepriv = &padapter->mlmepriv; 48 struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv; 49 struct mlme_ext_info *pmlmeinfo = &(pmlmeext->mlmext_info); 50 struct wlan_bssid_ex *pnetwork = (struct wlan_bssid_ex *)(&(pmlmeinfo->network)); 51 52 memset(&wrqu, 0, sizeof(union iwreq_data)); 53 54 wrqu.ap_addr.sa_family = ARPHRD_ETHER; 55 56 if (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) == true) 57 memcpy(wrqu.ap_addr.sa_data, pnetwork->MacAddress, ETH_ALEN); 58 else 59 memcpy(wrqu.ap_addr.sa_data, pmlmepriv->cur_network.network.MacAddress, ETH_ALEN); 60 61 netdev_dbg(padapter->pnetdev, "assoc success\n"); 62 } 63 64 void rtw_indicate_wx_disassoc_event(struct adapter *padapter) 65 { 66 union iwreq_data wrqu; 67 68 memset(&wrqu, 0, sizeof(union iwreq_data)); 69 70 wrqu.ap_addr.sa_family = ARPHRD_ETHER; 71 eth_zero_addr(wrqu.ap_addr.sa_data); 72 } 73 74 static char *translate_scan(struct adapter *padapter, 75 struct iw_request_info *info, struct wlan_network *pnetwork, 76 char *start, char *stop) 77 { 78 struct iw_event iwe; 79 u16 cap; 80 u32 ht_ielen = 0; 81 char *custom = NULL; 82 char *p; 83 u16 max_rate = 0, rate, ht_cap = false, vht_cap = false; 84 u32 i = 0; 85 u8 bw_40MHz = 0, short_GI = 0; 86 u16 mcs_rate = 0, vht_data_rate = 0; 87 u8 ie_offset = (pnetwork->network.Reserved[0] == 2 ? 0 : 12); 88 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 89 u8 ss, sq; 90 91 /* AP MAC address */ 92 iwe.cmd = SIOCGIWAP; 93 iwe.u.ap_addr.sa_family = ARPHRD_ETHER; 94 95 memcpy(iwe.u.ap_addr.sa_data, pnetwork->network.MacAddress, ETH_ALEN); 96 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_ADDR_LEN); 97 98 /* Add the ESSID */ 99 iwe.cmd = SIOCGIWESSID; 100 iwe.u.data.flags = 1; 101 iwe.u.data.length = min((u16)pnetwork->network.Ssid.SsidLength, (u16)32); 102 start = iwe_stream_add_point(info, start, stop, &iwe, pnetwork->network.Ssid.Ssid); 103 104 /* parsing HT_CAP_IE */ 105 if (pnetwork->network.Reserved[0] == 2) { /* Probe Request */ 106 p = rtw_get_ie(&pnetwork->network.IEs[0], WLAN_EID_HT_CAPABILITY, &ht_ielen, pnetwork->network.IELength); 107 } else { 108 p = rtw_get_ie(&pnetwork->network.IEs[12], WLAN_EID_HT_CAPABILITY, &ht_ielen, pnetwork->network.IELength-12); 109 } 110 if (p && ht_ielen > 0) { 111 struct ieee80211_ht_cap *pht_capie; 112 ht_cap = true; 113 pht_capie = (struct ieee80211_ht_cap *)(p+2); 114 memcpy(&mcs_rate, pht_capie->mcs.rx_mask, 2); 115 bw_40MHz = (le16_to_cpu(pht_capie->cap_info) & IEEE80211_HT_CAP_SUP_WIDTH) ? 1 : 0; 116 short_GI = (le16_to_cpu(pht_capie->cap_info) & (IEEE80211_HT_CAP_SGI_20 | IEEE80211_HT_CAP_SGI_40)) ? 1 : 0; 117 } 118 119 /* Add the protocol name */ 120 iwe.cmd = SIOCGIWNAME; 121 if (rtw_is_cckratesonly_included((u8 *)&pnetwork->network.SupportedRates)) { 122 if (ht_cap) 123 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bn"); 124 else 125 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11b"); 126 } else if (rtw_is_cckrates_included((u8 *)&pnetwork->network.SupportedRates)) { 127 if (ht_cap) 128 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bgn"); 129 else 130 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11bg"); 131 } else { 132 if (pnetwork->network.Configuration.DSConfig > 14) { 133 if (vht_cap) 134 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11AC"); 135 else if (ht_cap) 136 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11an"); 137 else 138 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11a"); 139 } else { 140 if (ht_cap) 141 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11gn"); 142 else 143 snprintf(iwe.u.name, IFNAMSIZ, "IEEE 802.11g"); 144 } 145 } 146 147 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_CHAR_LEN); 148 149 /* Add mode */ 150 if (pnetwork->network.Reserved[0] == 2) { /* Probe Request */ 151 cap = 0; 152 } else { 153 __le16 le_tmp; 154 155 iwe.cmd = SIOCGIWMODE; 156 memcpy((u8 *)&le_tmp, rtw_get_capability_from_ie(pnetwork->network.IEs), 2); 157 cap = le16_to_cpu(le_tmp); 158 } 159 160 if (cap & (WLAN_CAPABILITY_IBSS | WLAN_CAPABILITY_ESS)) { 161 if (cap & WLAN_CAPABILITY_ESS) 162 iwe.u.mode = IW_MODE_MASTER; 163 else 164 iwe.u.mode = IW_MODE_ADHOC; 165 166 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_UINT_LEN); 167 } 168 169 if (pnetwork->network.Configuration.DSConfig < 1 /*|| pnetwork->network.Configuration.DSConfig > 14*/) 170 pnetwork->network.Configuration.DSConfig = 1; 171 172 /* Add frequency/channel */ 173 iwe.cmd = SIOCGIWFREQ; 174 iwe.u.freq.m = rtw_ch2freq(pnetwork->network.Configuration.DSConfig) * 100000; 175 iwe.u.freq.e = 1; 176 iwe.u.freq.i = pnetwork->network.Configuration.DSConfig; 177 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_FREQ_LEN); 178 179 /* Add encryption capability */ 180 iwe.cmd = SIOCGIWENCODE; 181 if (cap & WLAN_CAPABILITY_PRIVACY) 182 iwe.u.data.flags = IW_ENCODE_ENABLED | IW_ENCODE_NOKEY; 183 else 184 iwe.u.data.flags = IW_ENCODE_DISABLED; 185 iwe.u.data.length = 0; 186 start = iwe_stream_add_point(info, start, stop, &iwe, pnetwork->network.Ssid.Ssid); 187 188 /*Add basic and extended rates */ 189 max_rate = 0; 190 custom = kzalloc(MAX_CUSTOM_LEN, GFP_ATOMIC); 191 if (!custom) 192 return start; 193 p = custom; 194 p += scnprintf(p, MAX_CUSTOM_LEN - (p - custom), " Rates (Mb/s): "); 195 while (pnetwork->network.SupportedRates[i] != 0) { 196 rate = pnetwork->network.SupportedRates[i]&0x7F; 197 if (rate > max_rate) 198 max_rate = rate; 199 p += scnprintf(p, MAX_CUSTOM_LEN - (p - custom), 200 "%d%s ", rate >> 1, (rate & 1) ? ".5" : ""); 201 i++; 202 } 203 204 if (vht_cap) { 205 max_rate = vht_data_rate; 206 } else if (ht_cap) { 207 if (mcs_rate & 0x8000) /* MCS15 */ 208 max_rate = (bw_40MHz) ? ((short_GI)?300:270):((short_GI)?144:130); 209 else /* default MCS7 */ 210 max_rate = (bw_40MHz) ? ((short_GI)?150:135):((short_GI)?72:65); 211 212 max_rate = max_rate*2;/* Mbps/2; */ 213 } 214 215 iwe.cmd = SIOCGIWRATE; 216 iwe.u.bitrate.fixed = iwe.u.bitrate.disabled = 0; 217 iwe.u.bitrate.value = max_rate * 500000; 218 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_PARAM_LEN); 219 220 /* parsing WPA/WPA2 IE */ 221 if (pnetwork->network.Reserved[0] != 2) { /* Probe Request */ 222 u8 *buf; 223 u8 wpa_ie[255], rsn_ie[255]; 224 u16 wpa_len = 0, rsn_len = 0; 225 u8 *p; 226 rtw_get_sec_ie(pnetwork->network.IEs, pnetwork->network.IELength, rsn_ie, &rsn_len, wpa_ie, &wpa_len); 227 228 buf = kzalloc(MAX_WPA_IE_LEN*2, GFP_ATOMIC); 229 if (!buf) 230 return start; 231 if (wpa_len > 0) { 232 p = buf; 233 p += scnprintf(p, (MAX_WPA_IE_LEN * 2) - (p - buf), "wpa_ie ="); 234 for (i = 0; i < wpa_len; i++) 235 p += scnprintf(p, (MAX_WPA_IE_LEN * 2) - (p - buf), 236 "%02x", wpa_ie[i]); 237 238 if (wpa_len > 100) { 239 printk("-----------------Len %d----------------\n", wpa_len); 240 for (i = 0; i < wpa_len; i++) 241 printk("%02x ", wpa_ie[i]); 242 printk("\n"); 243 printk("-----------------Len %d----------------\n", wpa_len); 244 } 245 246 memset(&iwe, 0, sizeof(iwe)); 247 iwe.cmd = IWEVCUSTOM; 248 iwe.u.data.length = strlen(buf); 249 start = iwe_stream_add_point(info, start, stop, &iwe, buf); 250 251 memset(&iwe, 0, sizeof(iwe)); 252 iwe.cmd = IWEVGENIE; 253 iwe.u.data.length = wpa_len; 254 start = iwe_stream_add_point(info, start, stop, &iwe, wpa_ie); 255 } 256 if (rsn_len > 0) { 257 p = buf; 258 memset(buf, 0, MAX_WPA_IE_LEN*2); 259 p += scnprintf(p, (MAX_WPA_IE_LEN * 2) - (p - buf), "rsn_ie ="); 260 for (i = 0; i < rsn_len; i++) 261 p += scnprintf(p, (MAX_WPA_IE_LEN * 2) - (p - buf), 262 "%02x", rsn_ie[i]); 263 memset(&iwe, 0, sizeof(iwe)); 264 iwe.cmd = IWEVCUSTOM; 265 iwe.u.data.length = strlen(buf); 266 start = iwe_stream_add_point(info, start, stop, &iwe, buf); 267 268 memset(&iwe, 0, sizeof(iwe)); 269 iwe.cmd = IWEVGENIE; 270 iwe.u.data.length = rsn_len; 271 start = iwe_stream_add_point(info, start, stop, &iwe, rsn_ie); 272 } 273 kfree(buf); 274 } 275 276 { /* parsing WPS IE */ 277 uint cnt = 0, total_ielen; 278 u8 *wpsie_ptr = NULL; 279 uint wps_ielen = 0; 280 281 u8 *ie_ptr; 282 total_ielen = pnetwork->network.IELength - ie_offset; 283 284 if (pnetwork->network.Reserved[0] == 2) { /* Probe Request */ 285 ie_ptr = pnetwork->network.IEs; 286 total_ielen = pnetwork->network.IELength; 287 } else { /* Beacon or Probe Respones */ 288 ie_ptr = pnetwork->network.IEs + _FIXED_IE_LENGTH_; 289 total_ielen = pnetwork->network.IELength - _FIXED_IE_LENGTH_; 290 } 291 292 while (cnt < total_ielen) { 293 if (rtw_is_wps_ie(&ie_ptr[cnt], &wps_ielen) && (wps_ielen > 2)) { 294 wpsie_ptr = &ie_ptr[cnt]; 295 iwe.cmd = IWEVGENIE; 296 iwe.u.data.length = (u16)wps_ielen; 297 start = iwe_stream_add_point(info, start, stop, &iwe, wpsie_ptr); 298 } 299 cnt += ie_ptr[cnt + 1] + 2; /* goto next */ 300 } 301 } 302 303 /* Add quality statistics */ 304 iwe.cmd = IWEVQUAL; 305 iwe.u.qual.updated = IW_QUAL_QUAL_UPDATED | IW_QUAL_LEVEL_UPDATED 306 | IW_QUAL_NOISE_INVALID; 307 308 if (check_fwstate(pmlmepriv, _FW_LINKED) == true && 309 is_same_network(&pmlmepriv->cur_network.network, &pnetwork->network, 0)) { 310 ss = padapter->recvpriv.signal_strength; 311 sq = padapter->recvpriv.signal_qual; 312 } else { 313 ss = pnetwork->network.PhyInfo.SignalStrength; 314 sq = pnetwork->network.PhyInfo.SignalQuality; 315 } 316 317 318 iwe.u.qual.level = (u8)ss;/* */ 319 320 iwe.u.qual.qual = (u8)sq; /* signal quality */ 321 322 iwe.u.qual.noise = 0; /* noise level */ 323 324 start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_QUAL_LEN); 325 326 { 327 u8 *buf; 328 u8 *pos; 329 330 buf = kzalloc(MAX_WPA_IE_LEN, GFP_ATOMIC); 331 if (!buf) 332 goto exit; 333 334 pos = pnetwork->network.Reserved; 335 memset(&iwe, 0, sizeof(iwe)); 336 iwe.cmd = IWEVCUSTOM; 337 iwe.u.data.length = scnprintf(buf, MAX_WPA_IE_LEN, "fm =%02X%02X", pos[1], pos[0]); 338 start = iwe_stream_add_point(info, start, stop, &iwe, buf); 339 kfree(buf); 340 } 341 exit: 342 kfree(custom); 343 344 return start; 345 } 346 347 static int wpa_set_auth_algs(struct net_device *dev, u32 value) 348 { 349 struct adapter *padapter = rtw_netdev_priv(dev); 350 int ret = 0; 351 352 if ((value & WLAN_AUTH_SHARED_KEY) && (value & WLAN_AUTH_OPEN)) { 353 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; 354 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeAutoSwitch; 355 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Auto; 356 } else if (value & WLAN_AUTH_SHARED_KEY) { 357 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; 358 359 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeShared; 360 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Shared; 361 } else if (value & WLAN_AUTH_OPEN) { 362 /* padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled; */ 363 if (padapter->securitypriv.ndisauthtype < Ndis802_11AuthModeWPAPSK) { 364 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeOpen; 365 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; 366 } 367 } else { 368 ret = -EINVAL; 369 } 370 371 return ret; 372 373 } 374 375 static int wpa_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len) 376 { 377 int ret = 0; 378 u32 wep_key_idx, wep_key_len, wep_total_len; 379 struct ndis_802_11_wep *pwep = NULL; 380 struct adapter *padapter = rtw_netdev_priv(dev); 381 struct mlme_priv *pmlmepriv = &padapter->mlmepriv; 382 struct security_priv *psecuritypriv = &padapter->securitypriv; 383 384 param->u.crypt.err = 0; 385 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; 386 387 if (param_len < (u32)((u8 *)param->u.crypt.key - (u8 *)param) + param->u.crypt.key_len) { 388 ret = -EINVAL; 389 goto exit; 390 } 391 392 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff && 393 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff && 394 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) { 395 if (param->u.crypt.idx >= WEP_KEYS || 396 param->u.crypt.idx >= BIP_MAX_KEYID) { 397 ret = -EINVAL; 398 goto exit; 399 } 400 } else { 401 { 402 ret = -EINVAL; 403 goto exit; 404 } 405 } 406 407 if (strcmp(param->u.crypt.alg, "WEP") == 0) { 408 409 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; 410 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_; 411 padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_; 412 413 wep_key_idx = param->u.crypt.idx; 414 wep_key_len = param->u.crypt.key_len; 415 416 if (wep_key_idx > WEP_KEYS) 417 return -EINVAL; 418 419 if (wep_key_len > 0) { 420 wep_key_len = wep_key_len <= 5 ? 5 : 13; 421 wep_total_len = wep_key_len + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial); 422 pwep = kzalloc(wep_total_len, GFP_KERNEL); 423 if (!pwep) 424 goto exit; 425 426 pwep->KeyLength = wep_key_len; 427 pwep->Length = wep_total_len; 428 429 if (wep_key_len == 13) { 430 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_; 431 padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_; 432 } 433 } else { 434 ret = -EINVAL; 435 goto exit; 436 } 437 438 pwep->KeyIndex = wep_key_idx; 439 pwep->KeyIndex |= 0x80000000; 440 441 memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength); 442 443 if (param->u.crypt.set_tx) { 444 if (rtw_set_802_11_add_wep(padapter, pwep) == (u8)_FAIL) 445 ret = -EOPNOTSUPP; 446 } else { 447 /* don't update "psecuritypriv->dot11PrivacyAlgrthm" and */ 448 /* psecuritypriv->dot11PrivacyKeyIndex =keyid", but can rtw_set_key to fw/cam */ 449 450 if (wep_key_idx >= WEP_KEYS) { 451 ret = -EOPNOTSUPP; 452 goto exit; 453 } 454 455 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength); 456 psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength; 457 rtw_set_key(padapter, psecuritypriv, wep_key_idx, 0, true); 458 } 459 460 goto exit; 461 } 462 463 if (padapter->securitypriv.dot11AuthAlgrthm == dot11AuthAlgrthm_8021X) { /* 802_1x */ 464 struct sta_info *psta, *pbcmc_sta; 465 struct sta_priv *pstapriv = &padapter->stapriv; 466 467 if (check_fwstate(pmlmepriv, WIFI_STATION_STATE | WIFI_MP_STATE) == true) { /* sta mode */ 468 psta = rtw_get_stainfo(pstapriv, get_bssid(pmlmepriv)); 469 if (psta == NULL) { 470 /* DEBUG_ERR(("Set wpa_set_encryption: Obtain Sta_info fail\n")); */ 471 } else { 472 /* Jeff: don't disable ieee8021x_blocked while clearing key */ 473 if (strcmp(param->u.crypt.alg, "none") != 0) 474 psta->ieee8021x_blocked = false; 475 476 if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled) || 477 (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption3Enabled)) { 478 psta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm; 479 } 480 481 if (param->u.crypt.set_tx == 1) { /* pairwise key */ 482 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 483 484 if (strcmp(param->u.crypt.alg, "TKIP") == 0) { /* set mic key */ 485 /* DEBUG_ERR(("\nset key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len)); */ 486 memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8); 487 memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8); 488 489 padapter->securitypriv.busetkipkey = false; 490 /* _set_timer(&padapter->securitypriv.tkip_timer, 50); */ 491 } 492 493 rtw_setstakey_cmd(padapter, psta, true, true); 494 } else { /* group key */ 495 if (strcmp(param->u.crypt.alg, "TKIP") == 0 || strcmp(param->u.crypt.alg, "CCMP") == 0) { 496 memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 497 /* only TKIP group key need to install this */ 498 if (param->u.crypt.key_len > 16) { 499 memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8); 500 memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8); 501 } 502 padapter->securitypriv.binstallGrpkey = true; 503 504 padapter->securitypriv.dot118021XGrpKeyid = param->u.crypt.idx; 505 506 rtw_set_key(padapter, &padapter->securitypriv, param->u.crypt.idx, 1, true); 507 } else if (strcmp(param->u.crypt.alg, "BIP") == 0) { 508 /* printk("BIP key_len =%d , index =%d @@@@@@@@@@@@@@@@@@\n", param->u.crypt.key_len, param->u.crypt.idx); */ 509 /* save the IGTK key, length 16 bytes */ 510 memcpy(padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 511 /*printk("IGTK key below:\n"); 512 for (no = 0;no<16;no++) 513 printk(" %02x ", padapter->securitypriv.dot11wBIPKey[param->u.crypt.idx].skey[no]); 514 printk("\n");*/ 515 padapter->securitypriv.dot11wBIPKeyid = param->u.crypt.idx; 516 padapter->securitypriv.binstallBIPkey = true; 517 } 518 } 519 } 520 521 pbcmc_sta = rtw_get_bcmc_stainfo(padapter); 522 if (pbcmc_sta == NULL) { 523 /* DEBUG_ERR(("Set OID_802_11_ADD_KEY: bcmc stainfo is null\n")); */ 524 } else { 525 /* Jeff: don't disable ieee8021x_blocked while clearing key */ 526 if (strcmp(param->u.crypt.alg, "none") != 0) 527 pbcmc_sta->ieee8021x_blocked = false; 528 529 if ((padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption2Enabled) || 530 (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption3Enabled)) { 531 pbcmc_sta->dot118021XPrivacy = padapter->securitypriv.dot11PrivacyAlgrthm; 532 } 533 } 534 } else if (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE)) { 535 /* adhoc mode */ 536 } 537 } 538 539 exit: 540 541 kfree(pwep); 542 return ret; 543 } 544 545 static int rtw_set_wpa_ie(struct adapter *padapter, char *pie, unsigned short ielen) 546 { 547 u8 *buf = NULL; 548 int group_cipher = 0, pairwise_cipher = 0; 549 int ret = 0; 550 u8 null_addr[] = {0, 0, 0, 0, 0, 0}; 551 552 if ((ielen > MAX_WPA_IE_LEN) || (pie == NULL)) { 553 _clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS); 554 if (pie == NULL) 555 return ret; 556 else 557 return -EINVAL; 558 } 559 560 if (ielen) { 561 buf = rtw_zmalloc(ielen); 562 if (buf == NULL) { 563 ret = -ENOMEM; 564 goto exit; 565 } 566 567 memcpy(buf, pie, ielen); 568 569 if (ielen < RSN_HEADER_LEN) { 570 ret = -1; 571 goto exit; 572 } 573 574 if (rtw_parse_wpa_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) { 575 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; 576 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK; 577 memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen); 578 } 579 580 if (rtw_parse_wpa2_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS) { 581 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; 582 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK; 583 memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen); 584 } 585 586 if (group_cipher == 0) 587 group_cipher = WPA_CIPHER_NONE; 588 if (pairwise_cipher == 0) 589 pairwise_cipher = WPA_CIPHER_NONE; 590 591 switch (group_cipher) { 592 case WPA_CIPHER_NONE: 593 padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_; 594 padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled; 595 break; 596 case WPA_CIPHER_WEP40: 597 padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_; 598 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; 599 break; 600 case WPA_CIPHER_TKIP: 601 padapter->securitypriv.dot118021XGrpPrivacy = _TKIP_; 602 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled; 603 break; 604 case WPA_CIPHER_CCMP: 605 padapter->securitypriv.dot118021XGrpPrivacy = _AES_; 606 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled; 607 break; 608 case WPA_CIPHER_WEP104: 609 padapter->securitypriv.dot118021XGrpPrivacy = _WEP104_; 610 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; 611 break; 612 } 613 614 switch (pairwise_cipher) { 615 case WPA_CIPHER_NONE: 616 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_; 617 padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled; 618 break; 619 case WPA_CIPHER_WEP40: 620 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_; 621 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; 622 break; 623 case WPA_CIPHER_TKIP: 624 padapter->securitypriv.dot11PrivacyAlgrthm = _TKIP_; 625 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled; 626 break; 627 case WPA_CIPHER_CCMP: 628 padapter->securitypriv.dot11PrivacyAlgrthm = _AES_; 629 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled; 630 break; 631 case WPA_CIPHER_WEP104: 632 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_; 633 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; 634 break; 635 } 636 637 _clr_fwstate_(&padapter->mlmepriv, WIFI_UNDER_WPS); 638 {/* set wps_ie */ 639 u16 cnt = 0; 640 u8 eid, wps_oui[4] = {0x0, 0x50, 0xf2, 0x04}; 641 642 while (cnt < ielen) { 643 eid = buf[cnt]; 644 645 if ((eid == WLAN_EID_VENDOR_SPECIFIC) && (!memcmp(&buf[cnt+2], wps_oui, 4))) { 646 padapter->securitypriv.wps_ie_len = ((buf[cnt+1]+2) < MAX_WPS_IE_LEN) ? (buf[cnt+1]+2):MAX_WPS_IE_LEN; 647 648 memcpy(padapter->securitypriv.wps_ie, &buf[cnt], padapter->securitypriv.wps_ie_len); 649 650 set_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS); 651 652 cnt += buf[cnt+1]+2; 653 654 break; 655 } else { 656 cnt += buf[cnt+1]+2; /* goto next */ 657 } 658 } 659 } 660 } 661 662 /* TKIP and AES disallow multicast packets until installing group key */ 663 if (padapter->securitypriv.dot11PrivacyAlgrthm == _TKIP_ 664 || padapter->securitypriv.dot11PrivacyAlgrthm == _TKIP_WTMIC_ 665 || padapter->securitypriv.dot11PrivacyAlgrthm == _AES_) 666 /* WPS open need to enable multicast */ 667 /* check_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS) == true) */ 668 rtw_hal_set_hwreg(padapter, HW_VAR_OFF_RCR_AM, null_addr); 669 670 exit: 671 672 kfree(buf); 673 674 return ret; 675 } 676 677 static int rtw_wx_get_name(struct net_device *dev, 678 struct iw_request_info *info, 679 union iwreq_data *wrqu, char *extra) 680 { 681 struct adapter *padapter = rtw_netdev_priv(dev); 682 u32 ht_ielen = 0; 683 char *p; 684 u8 ht_cap = false, vht_cap = false; 685 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 686 struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network; 687 NDIS_802_11_RATES_EX *prates = NULL; 688 689 if (check_fwstate(pmlmepriv, _FW_LINKED|WIFI_ADHOC_MASTER_STATE) == true) { 690 /* parsing HT_CAP_IE */ 691 p = rtw_get_ie(&pcur_bss->IEs[12], WLAN_EID_HT_CAPABILITY, &ht_ielen, pcur_bss->IELength-12); 692 if (p && ht_ielen > 0) 693 ht_cap = true; 694 695 prates = &pcur_bss->SupportedRates; 696 697 if (rtw_is_cckratesonly_included((u8 *)prates)) { 698 if (ht_cap) 699 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bn"); 700 else 701 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11b"); 702 } else if (rtw_is_cckrates_included((u8 *)prates)) { 703 if (ht_cap) 704 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bgn"); 705 else 706 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11bg"); 707 } else { 708 if (pcur_bss->Configuration.DSConfig > 14) { 709 if (vht_cap) 710 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11AC"); 711 else if (ht_cap) 712 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11an"); 713 else 714 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11a"); 715 } else { 716 if (ht_cap) 717 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11gn"); 718 else 719 snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11g"); 720 } 721 } 722 } else { 723 /* prates = &padapter->registrypriv.dev_network.SupportedRates; */ 724 /* snprintf(wrqu->name, IFNAMSIZ, "IEEE 802.11g"); */ 725 snprintf(wrqu->name, IFNAMSIZ, "unassociated"); 726 } 727 return 0; 728 } 729 730 static int rtw_wx_set_freq(struct net_device *dev, 731 struct iw_request_info *info, 732 union iwreq_data *wrqu, char *extra) 733 { 734 return 0; 735 } 736 737 static int rtw_wx_get_freq(struct net_device *dev, 738 struct iw_request_info *info, 739 union iwreq_data *wrqu, char *extra) 740 { 741 struct adapter *padapter = rtw_netdev_priv(dev); 742 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 743 struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network; 744 745 if (check_fwstate(pmlmepriv, _FW_LINKED) == true) { 746 /* wrqu->freq.m = ieee80211_wlan_frequencies[pcur_bss->Configuration.DSConfig-1] * 100000; */ 747 wrqu->freq.m = rtw_ch2freq(pcur_bss->Configuration.DSConfig) * 100000; 748 wrqu->freq.e = 1; 749 wrqu->freq.i = pcur_bss->Configuration.DSConfig; 750 751 } else { 752 wrqu->freq.m = rtw_ch2freq(padapter->mlmeextpriv.cur_channel) * 100000; 753 wrqu->freq.e = 1; 754 wrqu->freq.i = padapter->mlmeextpriv.cur_channel; 755 } 756 757 return 0; 758 } 759 760 static int rtw_wx_set_mode(struct net_device *dev, struct iw_request_info *a, 761 union iwreq_data *wrqu, char *b) 762 { 763 struct adapter *padapter = rtw_netdev_priv(dev); 764 enum ndis_802_11_network_infrastructure networkType; 765 int ret = 0; 766 767 if (_FAIL == rtw_pwr_wakeup(padapter)) { 768 ret = -EPERM; 769 goto exit; 770 } 771 772 if (!padapter->hw_init_completed) { 773 ret = -EPERM; 774 goto exit; 775 } 776 777 switch (wrqu->mode) { 778 case IW_MODE_AUTO: 779 networkType = Ndis802_11AutoUnknown; 780 break; 781 case IW_MODE_ADHOC: 782 networkType = Ndis802_11IBSS; 783 break; 784 case IW_MODE_MASTER: 785 networkType = Ndis802_11APMode; 786 /* rtw_setopmode_cmd(padapter, networkType, true); */ 787 break; 788 case IW_MODE_INFRA: 789 networkType = Ndis802_11Infrastructure; 790 break; 791 default: 792 ret = -EINVAL; 793 goto exit; 794 } 795 796 /* 797 if (Ndis802_11APMode == networkType) 798 { 799 rtw_setopmode_cmd(padapter, networkType, true); 800 } 801 else 802 { 803 rtw_setopmode_cmd(padapter, Ndis802_11AutoUnknown, true); 804 } 805 */ 806 807 if (rtw_set_802_11_infrastructure_mode(padapter, networkType) == false) { 808 809 ret = -EPERM; 810 goto exit; 811 812 } 813 814 rtw_setopmode_cmd(padapter, networkType, true); 815 816 exit: 817 return ret; 818 } 819 820 static int rtw_wx_get_mode(struct net_device *dev, struct iw_request_info *a, 821 union iwreq_data *wrqu, char *b) 822 { 823 struct adapter *padapter = rtw_netdev_priv(dev); 824 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 825 826 if (check_fwstate(pmlmepriv, WIFI_STATION_STATE) == true) { 827 wrqu->mode = IW_MODE_INFRA; 828 } else if ((check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) == true) || 829 (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE) == true)) { 830 wrqu->mode = IW_MODE_ADHOC; 831 } else if (check_fwstate(pmlmepriv, WIFI_AP_STATE) == true) { 832 wrqu->mode = IW_MODE_MASTER; 833 } else { 834 wrqu->mode = IW_MODE_AUTO; 835 } 836 return 0; 837 } 838 839 840 static int rtw_wx_set_pmkid(struct net_device *dev, 841 struct iw_request_info *a, 842 union iwreq_data *wrqu, char *extra) 843 { 844 struct adapter *padapter = rtw_netdev_priv(dev); 845 u8 j, blInserted = false; 846 int intReturn = false; 847 struct security_priv *psecuritypriv = &padapter->securitypriv; 848 struct iw_pmksa *pPMK = (struct iw_pmksa *)extra; 849 u8 strZeroMacAddress[ETH_ALEN] = { 0x00 }; 850 u8 strIssueBssid[ETH_ALEN] = { 0x00 }; 851 852 /* 853 There are the BSSID information in the bssid.sa_data array. 854 If cmd is IW_PMKSA_FLUSH, it means the wpa_suppplicant wants to clear all the PMKID information. 855 If cmd is IW_PMKSA_ADD, it means the wpa_supplicant wants to add a PMKID/BSSID to driver. 856 If cmd is IW_PMKSA_REMOVE, it means the wpa_supplicant wants to remove a PMKID/BSSID from driver. 857 */ 858 859 memcpy(strIssueBssid, pPMK->bssid.sa_data, ETH_ALEN); 860 if (pPMK->cmd == IW_PMKSA_ADD) { 861 if (!memcmp(strIssueBssid, strZeroMacAddress, ETH_ALEN)) 862 return intReturn; 863 else 864 intReturn = true; 865 866 blInserted = false; 867 868 /* overwrite PMKID */ 869 for (j = 0; j < NUM_PMKID_CACHE; j++) { 870 if (!memcmp(psecuritypriv->PMKIDList[j].Bssid, strIssueBssid, ETH_ALEN)) { 871 872 memcpy(psecuritypriv->PMKIDList[j].PMKID, pPMK->pmkid, IW_PMKID_LEN); 873 psecuritypriv->PMKIDList[j].bUsed = true; 874 psecuritypriv->PMKIDIndex = j+1; 875 blInserted = true; 876 break; 877 } 878 } 879 880 if (!blInserted) { 881 882 memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, strIssueBssid, ETH_ALEN); 883 memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, pPMK->pmkid, IW_PMKID_LEN); 884 885 psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].bUsed = true; 886 psecuritypriv->PMKIDIndex++; 887 if (psecuritypriv->PMKIDIndex == 16) 888 psecuritypriv->PMKIDIndex = 0; 889 } 890 } else if (pPMK->cmd == IW_PMKSA_REMOVE) { 891 intReturn = true; 892 for (j = 0; j < NUM_PMKID_CACHE; j++) { 893 if (!memcmp(psecuritypriv->PMKIDList[j].Bssid, strIssueBssid, ETH_ALEN)) { 894 /* BSSID is matched, the same AP => Remove this PMKID information and reset it. */ 895 eth_zero_addr(psecuritypriv->PMKIDList[j].Bssid); 896 psecuritypriv->PMKIDList[j].bUsed = false; 897 break; 898 } 899 } 900 } else if (pPMK->cmd == IW_PMKSA_FLUSH) { 901 memset(&psecuritypriv->PMKIDList[0], 0x00, sizeof(struct rt_pmkid_list) * NUM_PMKID_CACHE); 902 psecuritypriv->PMKIDIndex = 0; 903 intReturn = true; 904 } 905 return intReturn; 906 } 907 908 static int rtw_wx_get_sens(struct net_device *dev, 909 struct iw_request_info *info, 910 union iwreq_data *wrqu, char *extra) 911 { 912 { 913 wrqu->sens.value = 0; 914 wrqu->sens.fixed = 0; /* no auto select */ 915 wrqu->sens.disabled = 1; 916 } 917 return 0; 918 } 919 920 static int rtw_wx_get_range(struct net_device *dev, 921 struct iw_request_info *info, 922 union iwreq_data *wrqu, char *extra) 923 { 924 struct iw_range *range = (struct iw_range *)extra; 925 struct adapter *padapter = rtw_netdev_priv(dev); 926 struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv; 927 928 u16 val; 929 int i; 930 931 wrqu->data.length = sizeof(*range); 932 memset(range, 0, sizeof(*range)); 933 934 /* Let's try to keep this struct in the same order as in 935 * linux/include/wireless.h 936 */ 937 938 /* TODO: See what values we can set, and remove the ones we can't 939 * set, or fill them with some default data. 940 */ 941 942 /* ~5 Mb/s real (802.11b) */ 943 range->throughput = 5 * 1000 * 1000; 944 945 /* signal level threshold range */ 946 947 /* percent values between 0 and 100. */ 948 range->max_qual.qual = 100; 949 range->max_qual.level = 100; 950 range->max_qual.noise = 100; 951 range->max_qual.updated = 7; /* Updated all three */ 952 953 954 range->avg_qual.qual = 92; /* > 8% missed beacons is 'bad' */ 955 /* TODO: Find real 'good' to 'bad' threshol value for RSSI */ 956 range->avg_qual.level = 256 - 78; 957 range->avg_qual.noise = 0; 958 range->avg_qual.updated = 7; /* Updated all three */ 959 960 range->num_bitrates = RATE_COUNT; 961 962 for (i = 0; i < RATE_COUNT && i < IW_MAX_BITRATES; i++) 963 range->bitrate[i] = rtw_rates[i]; 964 965 range->min_frag = MIN_FRAG_THRESHOLD; 966 range->max_frag = MAX_FRAG_THRESHOLD; 967 968 range->pm_capa = 0; 969 970 range->we_version_compiled = WIRELESS_EXT; 971 range->we_version_source = 16; 972 973 for (i = 0, val = 0; i < MAX_CHANNEL_NUM; i++) { 974 975 /* Include only legal frequencies for some countries */ 976 if (pmlmeext->channel_set[i].ChannelNum != 0) { 977 range->freq[val].i = pmlmeext->channel_set[i].ChannelNum; 978 range->freq[val].m = rtw_ch2freq(pmlmeext->channel_set[i].ChannelNum) * 100000; 979 range->freq[val].e = 1; 980 val++; 981 } 982 983 if (val == IW_MAX_FREQUENCIES) 984 break; 985 } 986 987 range->num_channels = val; 988 range->num_frequency = val; 989 990 /* Commented by Albert 2009/10/13 */ 991 /* The following code will proivde the security capability to network manager. */ 992 /* If the driver doesn't provide this capability to network manager, */ 993 /* the WPA/WPA2 routers can't be chosen in the network manager. */ 994 995 /* 996 #define IW_SCAN_CAPA_NONE 0x00 997 #define IW_SCAN_CAPA_ESSID 0x01 998 #define IW_SCAN_CAPA_BSSID 0x02 999 #define IW_SCAN_CAPA_CHANNEL 0x04 1000 #define IW_SCAN_CAPA_MODE 0x08 1001 #define IW_SCAN_CAPA_RATE 0x10 1002 #define IW_SCAN_CAPA_TYPE 0x20 1003 #define IW_SCAN_CAPA_TIME 0x40 1004 */ 1005 1006 range->enc_capa = IW_ENC_CAPA_WPA | IW_ENC_CAPA_WPA2 | 1007 IW_ENC_CAPA_CIPHER_TKIP | IW_ENC_CAPA_CIPHER_CCMP; 1008 1009 range->scan_capa = IW_SCAN_CAPA_ESSID | IW_SCAN_CAPA_TYPE | IW_SCAN_CAPA_BSSID | 1010 IW_SCAN_CAPA_CHANNEL | IW_SCAN_CAPA_MODE | IW_SCAN_CAPA_RATE; 1011 1012 return 0; 1013 } 1014 1015 /* set bssid flow */ 1016 /* s1. rtw_set_802_11_infrastructure_mode() */ 1017 /* s2. rtw_set_802_11_authentication_mode() */ 1018 /* s3. set_802_11_encryption_mode() */ 1019 /* s4. rtw_set_802_11_bssid() */ 1020 static int rtw_wx_set_wap(struct net_device *dev, 1021 struct iw_request_info *info, 1022 union iwreq_data *awrq, 1023 char *extra) 1024 { 1025 uint ret = 0; 1026 struct adapter *padapter = rtw_netdev_priv(dev); 1027 struct sockaddr *temp = (struct sockaddr *)awrq; 1028 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 1029 struct list_head *phead; 1030 u8 *dst_bssid, *src_bssid; 1031 struct __queue *queue = &(pmlmepriv->scanned_queue); 1032 struct wlan_network *pnetwork = NULL; 1033 enum ndis_802_11_authentication_mode authmode; 1034 1035 rtw_ps_deny(padapter, PS_DENY_JOIN); 1036 if (_FAIL == rtw_pwr_wakeup(padapter)) { 1037 ret = -1; 1038 goto exit; 1039 } 1040 1041 if (!padapter->bup) { 1042 ret = -1; 1043 goto exit; 1044 } 1045 1046 1047 if (temp->sa_family != ARPHRD_ETHER) { 1048 ret = -EINVAL; 1049 goto exit; 1050 } 1051 1052 authmode = padapter->securitypriv.ndisauthtype; 1053 spin_lock_bh(&queue->lock); 1054 phead = get_list_head(queue); 1055 pmlmepriv->pscanned = get_next(phead); 1056 1057 while (1) { 1058 if (phead == pmlmepriv->pscanned) 1059 break; 1060 1061 pnetwork = container_of(pmlmepriv->pscanned, struct wlan_network, list); 1062 1063 pmlmepriv->pscanned = get_next(pmlmepriv->pscanned); 1064 1065 dst_bssid = pnetwork->network.MacAddress; 1066 1067 src_bssid = temp->sa_data; 1068 1069 if ((!memcmp(dst_bssid, src_bssid, ETH_ALEN))) { 1070 if (!rtw_set_802_11_infrastructure_mode(padapter, pnetwork->network.InfrastructureMode)) { 1071 ret = -1; 1072 spin_unlock_bh(&queue->lock); 1073 goto exit; 1074 } 1075 break; 1076 } 1077 1078 } 1079 spin_unlock_bh(&queue->lock); 1080 1081 rtw_set_802_11_authentication_mode(padapter, authmode); 1082 /* set_802_11_encryption_mode(padapter, padapter->securitypriv.ndisencryptstatus); */ 1083 if (rtw_set_802_11_bssid(padapter, temp->sa_data) == false) { 1084 ret = -1; 1085 goto exit; 1086 } 1087 1088 exit: 1089 1090 rtw_ps_deny_cancel(padapter, PS_DENY_JOIN); 1091 1092 return ret; 1093 } 1094 1095 static int rtw_wx_get_wap(struct net_device *dev, 1096 struct iw_request_info *info, 1097 union iwreq_data *wrqu, char *extra) 1098 { 1099 1100 struct adapter *padapter = rtw_netdev_priv(dev); 1101 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 1102 struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network; 1103 1104 wrqu->ap_addr.sa_family = ARPHRD_ETHER; 1105 1106 eth_zero_addr(wrqu->ap_addr.sa_data); 1107 1108 if (((check_fwstate(pmlmepriv, _FW_LINKED)) == true) || 1109 ((check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE)) == true) || 1110 ((check_fwstate(pmlmepriv, WIFI_AP_STATE)) == true)) { 1111 memcpy(wrqu->ap_addr.sa_data, pcur_bss->MacAddress, ETH_ALEN); 1112 } else { 1113 eth_zero_addr(wrqu->ap_addr.sa_data); 1114 } 1115 1116 return 0; 1117 } 1118 1119 static int rtw_wx_set_mlme(struct net_device *dev, 1120 struct iw_request_info *info, 1121 union iwreq_data *wrqu, char *extra) 1122 { 1123 int ret = 0; 1124 struct adapter *padapter = rtw_netdev_priv(dev); 1125 struct iw_mlme *mlme = (struct iw_mlme *)extra; 1126 1127 1128 if (mlme == NULL) 1129 return -1; 1130 1131 switch (mlme->cmd) { 1132 case IW_MLME_DEAUTH: 1133 if (!rtw_set_802_11_disassociate(padapter)) 1134 ret = -1; 1135 break; 1136 case IW_MLME_DISASSOC: 1137 if (!rtw_set_802_11_disassociate(padapter)) 1138 ret = -1; 1139 break; 1140 default: 1141 return -EOPNOTSUPP; 1142 } 1143 1144 return ret; 1145 } 1146 1147 static int rtw_wx_set_scan(struct net_device *dev, struct iw_request_info *a, 1148 union iwreq_data *wrqu, char *extra) 1149 { 1150 u8 _status = false; 1151 int ret = 0; 1152 struct adapter *padapter = rtw_netdev_priv(dev); 1153 struct mlme_priv *pmlmepriv = &padapter->mlmepriv; 1154 struct ndis_802_11_ssid ssid[RTW_SSID_SCAN_AMOUNT]; 1155 1156 rtw_ps_deny(padapter, PS_DENY_SCAN); 1157 if (_FAIL == rtw_pwr_wakeup(padapter)) { 1158 ret = -1; 1159 goto exit; 1160 } 1161 1162 if (padapter->bDriverStopped) { 1163 ret = -1; 1164 goto exit; 1165 } 1166 1167 if (!padapter->bup) { 1168 ret = -1; 1169 goto exit; 1170 } 1171 1172 if (!padapter->hw_init_completed) { 1173 ret = -1; 1174 goto exit; 1175 } 1176 1177 /* When Busy Traffic, driver do not site survey. So driver return success. */ 1178 /* wpa_supplicant will not issue SIOCSIWSCAN cmd again after scan timeout. */ 1179 /* modify by thomas 2011-02-22. */ 1180 if (pmlmepriv->LinkDetectInfo.bBusyTraffic) { 1181 indicate_wx_scan_complete_event(padapter); 1182 goto exit; 1183 } 1184 1185 if (check_fwstate(pmlmepriv, _FW_UNDER_SURVEY|_FW_UNDER_LINKING) == true) { 1186 indicate_wx_scan_complete_event(padapter); 1187 goto exit; 1188 } 1189 1190 memset(ssid, 0, sizeof(struct ndis_802_11_ssid)*RTW_SSID_SCAN_AMOUNT); 1191 1192 if (wrqu->data.length == sizeof(struct iw_scan_req)) { 1193 struct iw_scan_req *req = (struct iw_scan_req *)extra; 1194 1195 if (wrqu->data.flags & IW_SCAN_THIS_ESSID) { 1196 int len = min((int)req->essid_len, IW_ESSID_MAX_SIZE); 1197 1198 memcpy(ssid[0].Ssid, req->essid, len); 1199 ssid[0].SsidLength = len; 1200 1201 spin_lock_bh(&pmlmepriv->lock); 1202 1203 _status = rtw_sitesurvey_cmd(padapter, ssid, 1, NULL, 0); 1204 1205 spin_unlock_bh(&pmlmepriv->lock); 1206 1207 } 1208 1209 } else if (wrqu->data.length >= WEXT_CSCAN_HEADER_SIZE 1210 && !memcmp(extra, WEXT_CSCAN_HEADER, WEXT_CSCAN_HEADER_SIZE)) { 1211 int len = wrqu->data.length - WEXT_CSCAN_HEADER_SIZE; 1212 char *pos = extra+WEXT_CSCAN_HEADER_SIZE; 1213 char section; 1214 char sec_len; 1215 int ssid_index = 0; 1216 1217 while (len >= 1) { 1218 section = *(pos++); len -= 1; 1219 1220 switch (section) { 1221 case WEXT_CSCAN_SSID_SECTION: 1222 if (len < 1) { 1223 len = 0; 1224 break; 1225 } 1226 1227 sec_len = *(pos++); len -= 1; 1228 1229 if (sec_len > 0 && sec_len <= len) { 1230 ssid[ssid_index].SsidLength = sec_len; 1231 memcpy(ssid[ssid_index].Ssid, pos, ssid[ssid_index].SsidLength); 1232 ssid_index++; 1233 } 1234 1235 pos += sec_len; len -= sec_len; 1236 break; 1237 1238 1239 case WEXT_CSCAN_CHANNEL_SECTION: 1240 pos += 1; len -= 1; 1241 break; 1242 case WEXT_CSCAN_ACTV_DWELL_SECTION: 1243 pos += 2; len -= 2; 1244 break; 1245 case WEXT_CSCAN_PASV_DWELL_SECTION: 1246 pos += 2; len -= 2; 1247 break; 1248 case WEXT_CSCAN_HOME_DWELL_SECTION: 1249 pos += 2; len -= 2; 1250 break; 1251 case WEXT_CSCAN_TYPE_SECTION: 1252 pos += 1; len -= 1; 1253 break; 1254 default: 1255 len = 0; /* stop parsing */ 1256 } 1257 } 1258 1259 /* jeff: it has still some scan parameter to parse, we only do this now... */ 1260 _status = rtw_set_802_11_bssid_list_scan(padapter, ssid, RTW_SSID_SCAN_AMOUNT); 1261 1262 } else { 1263 _status = rtw_set_802_11_bssid_list_scan(padapter, NULL, 0); 1264 } 1265 1266 if (_status == false) 1267 ret = -1; 1268 1269 exit: 1270 1271 rtw_ps_deny_cancel(padapter, PS_DENY_SCAN); 1272 1273 return ret; 1274 } 1275 1276 static int rtw_wx_get_scan(struct net_device *dev, struct iw_request_info *a, 1277 union iwreq_data *wrqu, char *extra) 1278 { 1279 struct list_head *plist, *phead; 1280 struct adapter *padapter = rtw_netdev_priv(dev); 1281 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 1282 struct __queue *queue = &(pmlmepriv->scanned_queue); 1283 struct wlan_network *pnetwork = NULL; 1284 char *ev = extra; 1285 char *stop = ev + wrqu->data.length; 1286 u32 ret = 0; 1287 signed int wait_status; 1288 1289 if (adapter_to_pwrctl(padapter)->brfoffbyhw && padapter->bDriverStopped) { 1290 ret = -EINVAL; 1291 goto exit; 1292 } 1293 1294 wait_status = _FW_UNDER_SURVEY | _FW_UNDER_LINKING; 1295 1296 if (check_fwstate(pmlmepriv, wait_status)) 1297 return -EAGAIN; 1298 1299 spin_lock_bh(&(pmlmepriv->scanned_queue.lock)); 1300 1301 phead = get_list_head(queue); 1302 plist = get_next(phead); 1303 1304 while (1) { 1305 if (phead == plist) 1306 break; 1307 1308 if ((stop - ev) < SCAN_ITEM_SIZE) { 1309 ret = -E2BIG; 1310 break; 1311 } 1312 1313 pnetwork = container_of(plist, struct wlan_network, list); 1314 1315 /* report network only if the current channel set contains the channel to which this network belongs */ 1316 if (rtw_ch_set_search_ch(padapter->mlmeextpriv.channel_set, pnetwork->network.Configuration.DSConfig) >= 0 1317 && rtw_mlme_band_check(padapter, pnetwork->network.Configuration.DSConfig) == true 1318 && true == rtw_validate_ssid(&(pnetwork->network.Ssid))) { 1319 1320 ev = translate_scan(padapter, a, pnetwork, ev, stop); 1321 } 1322 1323 plist = get_next(plist); 1324 1325 } 1326 1327 spin_unlock_bh(&(pmlmepriv->scanned_queue.lock)); 1328 1329 wrqu->data.length = ev-extra; 1330 wrqu->data.flags = 0; 1331 1332 exit: 1333 1334 return ret; 1335 1336 } 1337 1338 /* set ssid flow */ 1339 /* s1. rtw_set_802_11_infrastructure_mode() */ 1340 /* s2. set_802_11_authenticaion_mode() */ 1341 /* s3. set_802_11_encryption_mode() */ 1342 /* s4. rtw_set_802_11_ssid() */ 1343 static int rtw_wx_set_essid(struct net_device *dev, 1344 struct iw_request_info *a, 1345 union iwreq_data *wrqu, char *extra) 1346 { 1347 struct adapter *padapter = rtw_netdev_priv(dev); 1348 struct mlme_priv *pmlmepriv = &padapter->mlmepriv; 1349 struct __queue *queue = &pmlmepriv->scanned_queue; 1350 struct list_head *phead; 1351 struct wlan_network *pnetwork = NULL; 1352 enum ndis_802_11_authentication_mode authmode; 1353 struct ndis_802_11_ssid ndis_ssid; 1354 u8 *dst_ssid, *src_ssid; 1355 1356 uint ret = 0, len; 1357 1358 rtw_ps_deny(padapter, PS_DENY_JOIN); 1359 if (_FAIL == rtw_pwr_wakeup(padapter)) { 1360 ret = -1; 1361 goto exit; 1362 } 1363 1364 if (!padapter->bup) { 1365 ret = -1; 1366 goto exit; 1367 } 1368 1369 if (wrqu->essid.length > IW_ESSID_MAX_SIZE) { 1370 ret = -E2BIG; 1371 goto exit; 1372 } 1373 1374 if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) { 1375 ret = -1; 1376 goto exit; 1377 } 1378 1379 authmode = padapter->securitypriv.ndisauthtype; 1380 if (wrqu->essid.flags && wrqu->essid.length) { 1381 len = (wrqu->essid.length < IW_ESSID_MAX_SIZE) ? wrqu->essid.length : IW_ESSID_MAX_SIZE; 1382 1383 memset(&ndis_ssid, 0, sizeof(struct ndis_802_11_ssid)); 1384 ndis_ssid.SsidLength = len; 1385 memcpy(ndis_ssid.Ssid, extra, len); 1386 src_ssid = ndis_ssid.Ssid; 1387 1388 spin_lock_bh(&queue->lock); 1389 phead = get_list_head(queue); 1390 pmlmepriv->pscanned = get_next(phead); 1391 1392 while (1) { 1393 if (phead == pmlmepriv->pscanned) 1394 break; 1395 1396 pnetwork = container_of(pmlmepriv->pscanned, struct wlan_network, list); 1397 1398 pmlmepriv->pscanned = get_next(pmlmepriv->pscanned); 1399 1400 dst_ssid = pnetwork->network.Ssid.Ssid; 1401 1402 if ((!memcmp(dst_ssid, src_ssid, ndis_ssid.SsidLength)) && 1403 (pnetwork->network.Ssid.SsidLength == ndis_ssid.SsidLength)) { 1404 if (check_fwstate(pmlmepriv, WIFI_ADHOC_STATE) == true) { 1405 if (pnetwork->network.InfrastructureMode != pmlmepriv->cur_network.network.InfrastructureMode) 1406 continue; 1407 } 1408 1409 if (rtw_set_802_11_infrastructure_mode(padapter, pnetwork->network.InfrastructureMode) == false) { 1410 ret = -1; 1411 spin_unlock_bh(&queue->lock); 1412 goto exit; 1413 } 1414 1415 break; 1416 } 1417 } 1418 spin_unlock_bh(&queue->lock); 1419 rtw_set_802_11_authentication_mode(padapter, authmode); 1420 /* set_802_11_encryption_mode(padapter, padapter->securitypriv.ndisencryptstatus); */ 1421 if (rtw_set_802_11_ssid(padapter, &ndis_ssid) == false) { 1422 ret = -1; 1423 goto exit; 1424 } 1425 } 1426 1427 exit: 1428 1429 rtw_ps_deny_cancel(padapter, PS_DENY_JOIN); 1430 1431 return ret; 1432 } 1433 1434 static int rtw_wx_get_essid(struct net_device *dev, 1435 struct iw_request_info *a, 1436 union iwreq_data *wrqu, char *extra) 1437 { 1438 u32 len, ret = 0; 1439 struct adapter *padapter = rtw_netdev_priv(dev); 1440 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 1441 struct wlan_bssid_ex *pcur_bss = &pmlmepriv->cur_network.network; 1442 1443 if ((check_fwstate(pmlmepriv, _FW_LINKED) == true) || 1444 (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) == true)) { 1445 len = pcur_bss->Ssid.SsidLength; 1446 1447 wrqu->essid.length = len; 1448 1449 memcpy(extra, pcur_bss->Ssid.Ssid, len); 1450 1451 wrqu->essid.flags = 1; 1452 } else { 1453 ret = -1; 1454 goto exit; 1455 } 1456 1457 exit: 1458 return ret; 1459 } 1460 1461 static int rtw_wx_set_rate(struct net_device *dev, 1462 struct iw_request_info *a, 1463 union iwreq_data *wrqu, char *extra) 1464 { 1465 int i, ret = 0; 1466 struct adapter *padapter = rtw_netdev_priv(dev); 1467 u8 datarates[NumRates]; 1468 u32 target_rate = wrqu->bitrate.value; 1469 u32 fixed = wrqu->bitrate.fixed; 1470 u32 ratevalue = 0; 1471 u8 mpdatarate[NumRates] = {11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0, 0xff}; 1472 1473 if (target_rate == -1) { 1474 ratevalue = 11; 1475 goto set_rate; 1476 } 1477 target_rate = target_rate/100000; 1478 1479 switch (target_rate) { 1480 case 10: 1481 ratevalue = 0; 1482 break; 1483 case 20: 1484 ratevalue = 1; 1485 break; 1486 case 55: 1487 ratevalue = 2; 1488 break; 1489 case 60: 1490 ratevalue = 3; 1491 break; 1492 case 90: 1493 ratevalue = 4; 1494 break; 1495 case 110: 1496 ratevalue = 5; 1497 break; 1498 case 120: 1499 ratevalue = 6; 1500 break; 1501 case 180: 1502 ratevalue = 7; 1503 break; 1504 case 240: 1505 ratevalue = 8; 1506 break; 1507 case 360: 1508 ratevalue = 9; 1509 break; 1510 case 480: 1511 ratevalue = 10; 1512 break; 1513 case 540: 1514 ratevalue = 11; 1515 break; 1516 default: 1517 ratevalue = 11; 1518 break; 1519 } 1520 1521 set_rate: 1522 1523 for (i = 0; i < NumRates; i++) { 1524 if (ratevalue == mpdatarate[i]) { 1525 datarates[i] = mpdatarate[i]; 1526 if (fixed == 0) 1527 break; 1528 } else { 1529 datarates[i] = 0xff; 1530 } 1531 } 1532 1533 if (rtw_setdatarate_cmd(padapter, datarates) != _SUCCESS) 1534 ret = -1; 1535 1536 return ret; 1537 } 1538 1539 static int rtw_wx_get_rate(struct net_device *dev, 1540 struct iw_request_info *info, 1541 union iwreq_data *wrqu, char *extra) 1542 { 1543 u16 max_rate = 0; 1544 1545 max_rate = rtw_get_cur_max_rate(rtw_netdev_priv(dev)); 1546 1547 if (max_rate == 0) 1548 return -EPERM; 1549 1550 wrqu->bitrate.fixed = 0; /* no auto select */ 1551 wrqu->bitrate.value = max_rate * 100000; 1552 1553 return 0; 1554 } 1555 1556 static int rtw_wx_set_rts(struct net_device *dev, 1557 struct iw_request_info *info, 1558 union iwreq_data *wrqu, char *extra) 1559 { 1560 struct adapter *padapter = rtw_netdev_priv(dev); 1561 1562 if (wrqu->rts.disabled) 1563 padapter->registrypriv.rts_thresh = 2347; 1564 else { 1565 if (wrqu->rts.value < 0 || 1566 wrqu->rts.value > 2347) 1567 return -EINVAL; 1568 1569 padapter->registrypriv.rts_thresh = wrqu->rts.value; 1570 } 1571 1572 return 0; 1573 } 1574 1575 static int rtw_wx_get_rts(struct net_device *dev, 1576 struct iw_request_info *info, 1577 union iwreq_data *wrqu, char *extra) 1578 { 1579 struct adapter *padapter = rtw_netdev_priv(dev); 1580 1581 wrqu->rts.value = padapter->registrypriv.rts_thresh; 1582 wrqu->rts.fixed = 0; /* no auto select */ 1583 /* wrqu->rts.disabled = (wrqu->rts.value == DEFAULT_RTS_THRESHOLD); */ 1584 1585 return 0; 1586 } 1587 1588 static int rtw_wx_set_frag(struct net_device *dev, 1589 struct iw_request_info *info, 1590 union iwreq_data *wrqu, char *extra) 1591 { 1592 struct adapter *padapter = rtw_netdev_priv(dev); 1593 1594 if (wrqu->frag.disabled) 1595 padapter->xmitpriv.frag_len = MAX_FRAG_THRESHOLD; 1596 else { 1597 if (wrqu->frag.value < MIN_FRAG_THRESHOLD || 1598 wrqu->frag.value > MAX_FRAG_THRESHOLD) 1599 return -EINVAL; 1600 1601 padapter->xmitpriv.frag_len = wrqu->frag.value & ~0x1; 1602 } 1603 1604 return 0; 1605 1606 } 1607 1608 static int rtw_wx_get_frag(struct net_device *dev, 1609 struct iw_request_info *info, 1610 union iwreq_data *wrqu, char *extra) 1611 { 1612 struct adapter *padapter = rtw_netdev_priv(dev); 1613 1614 wrqu->frag.value = padapter->xmitpriv.frag_len; 1615 wrqu->frag.fixed = 0; /* no auto select */ 1616 /* wrqu->frag.disabled = (wrqu->frag.value == DEFAULT_FRAG_THRESHOLD); */ 1617 1618 return 0; 1619 } 1620 1621 static int rtw_wx_get_retry(struct net_device *dev, 1622 struct iw_request_info *info, 1623 union iwreq_data *wrqu, char *extra) 1624 { 1625 /* struct adapter *padapter = rtw_netdev_priv(dev); */ 1626 1627 1628 wrqu->retry.value = 7; 1629 wrqu->retry.fixed = 0; /* no auto select */ 1630 wrqu->retry.disabled = 1; 1631 1632 return 0; 1633 1634 } 1635 1636 static int rtw_wx_set_enc(struct net_device *dev, 1637 struct iw_request_info *info, 1638 union iwreq_data *wrqu, char *keybuf) 1639 { 1640 u32 key, ret = 0; 1641 u32 keyindex_provided; 1642 struct ndis_802_11_wep wep; 1643 enum ndis_802_11_authentication_mode authmode; 1644 1645 struct iw_point *erq = &(wrqu->encoding); 1646 struct adapter *padapter = rtw_netdev_priv(dev); 1647 struct pwrctrl_priv *pwrpriv = adapter_to_pwrctl(padapter); 1648 1649 memset(&wep, 0, sizeof(struct ndis_802_11_wep)); 1650 1651 key = erq->flags & IW_ENCODE_INDEX; 1652 1653 if (erq->flags & IW_ENCODE_DISABLED) { 1654 padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled; 1655 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_; 1656 padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_; 1657 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */ 1658 authmode = Ndis802_11AuthModeOpen; 1659 padapter->securitypriv.ndisauthtype = authmode; 1660 1661 goto exit; 1662 } 1663 1664 if (key) { 1665 if (key > WEP_KEYS) 1666 return -EINVAL; 1667 key--; 1668 keyindex_provided = 1; 1669 } else { 1670 keyindex_provided = 0; 1671 key = padapter->securitypriv.dot11PrivacyKeyIndex; 1672 } 1673 1674 /* set authentication mode */ 1675 if (erq->flags & IW_ENCODE_OPEN) { 1676 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;/* Ndis802_11EncryptionDisabled; */ 1677 1678 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; 1679 1680 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_; 1681 padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_; 1682 authmode = Ndis802_11AuthModeOpen; 1683 padapter->securitypriv.ndisauthtype = authmode; 1684 } else if (erq->flags & IW_ENCODE_RESTRICTED) { 1685 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled; 1686 1687 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Shared; 1688 1689 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_; 1690 padapter->securitypriv.dot118021XGrpPrivacy = _WEP40_; 1691 authmode = Ndis802_11AuthModeShared; 1692 padapter->securitypriv.ndisauthtype = authmode; 1693 } else { 1694 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption1Enabled;/* Ndis802_11EncryptionDisabled; */ 1695 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */ 1696 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_; 1697 padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_; 1698 authmode = Ndis802_11AuthModeOpen; 1699 padapter->securitypriv.ndisauthtype = authmode; 1700 } 1701 1702 wep.KeyIndex = key; 1703 if (erq->length > 0) { 1704 wep.KeyLength = erq->length <= 5 ? 5 : 13; 1705 1706 wep.Length = wep.KeyLength + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial); 1707 } else { 1708 wep.KeyLength = 0; 1709 1710 if (keyindex_provided == 1) { /* set key_id only, no given KeyMaterial(erq->length == 0). */ 1711 padapter->securitypriv.dot11PrivacyKeyIndex = key; 1712 1713 switch (padapter->securitypriv.dot11DefKeylen[key]) { 1714 case 5: 1715 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP40_; 1716 break; 1717 case 13: 1718 padapter->securitypriv.dot11PrivacyAlgrthm = _WEP104_; 1719 break; 1720 default: 1721 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_; 1722 break; 1723 } 1724 1725 goto exit; 1726 1727 } 1728 1729 } 1730 1731 wep.KeyIndex |= 0x80000000; 1732 1733 memcpy(wep.KeyMaterial, keybuf, wep.KeyLength); 1734 1735 if (rtw_set_802_11_add_wep(padapter, &wep) == false) { 1736 if (rf_on == pwrpriv->rf_pwrstate) 1737 ret = -EOPNOTSUPP; 1738 goto exit; 1739 } 1740 1741 exit: 1742 return ret; 1743 } 1744 1745 static int rtw_wx_get_enc(struct net_device *dev, 1746 struct iw_request_info *info, 1747 union iwreq_data *wrqu, char *keybuf) 1748 { 1749 uint key, ret = 0; 1750 struct adapter *padapter = rtw_netdev_priv(dev); 1751 struct iw_point *erq = &(wrqu->encoding); 1752 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 1753 1754 if (check_fwstate(pmlmepriv, _FW_LINKED) != true) { 1755 if (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) != true) { 1756 erq->length = 0; 1757 erq->flags |= IW_ENCODE_DISABLED; 1758 return 0; 1759 } 1760 } 1761 1762 1763 key = erq->flags & IW_ENCODE_INDEX; 1764 1765 if (key) { 1766 if (key > WEP_KEYS) 1767 return -EINVAL; 1768 key--; 1769 } else { 1770 key = padapter->securitypriv.dot11PrivacyKeyIndex; 1771 } 1772 1773 erq->flags = key + 1; 1774 1775 /* if (padapter->securitypriv.ndisauthtype == Ndis802_11AuthModeOpen) */ 1776 /* */ 1777 /* erq->flags |= IW_ENCODE_OPEN; */ 1778 /* */ 1779 1780 switch (padapter->securitypriv.ndisencryptstatus) { 1781 case Ndis802_11EncryptionNotSupported: 1782 case Ndis802_11EncryptionDisabled: 1783 erq->length = 0; 1784 erq->flags |= IW_ENCODE_DISABLED; 1785 break; 1786 case Ndis802_11Encryption1Enabled: 1787 erq->length = padapter->securitypriv.dot11DefKeylen[key]; 1788 1789 if (erq->length) { 1790 memcpy(keybuf, padapter->securitypriv.dot11DefKey[key].skey, padapter->securitypriv.dot11DefKeylen[key]); 1791 1792 erq->flags |= IW_ENCODE_ENABLED; 1793 1794 if (padapter->securitypriv.ndisauthtype == Ndis802_11AuthModeOpen) 1795 erq->flags |= IW_ENCODE_OPEN; 1796 else if (padapter->securitypriv.ndisauthtype == Ndis802_11AuthModeShared) 1797 erq->flags |= IW_ENCODE_RESTRICTED; 1798 } else { 1799 erq->length = 0; 1800 erq->flags |= IW_ENCODE_DISABLED; 1801 } 1802 break; 1803 case Ndis802_11Encryption2Enabled: 1804 case Ndis802_11Encryption3Enabled: 1805 erq->length = 16; 1806 erq->flags |= (IW_ENCODE_ENABLED | IW_ENCODE_OPEN | IW_ENCODE_NOKEY); 1807 break; 1808 default: 1809 erq->length = 0; 1810 erq->flags |= IW_ENCODE_DISABLED; 1811 break; 1812 } 1813 return ret; 1814 } 1815 1816 static int rtw_wx_get_power(struct net_device *dev, 1817 struct iw_request_info *info, 1818 union iwreq_data *wrqu, char *extra) 1819 { 1820 /* struct adapter *padapter = rtw_netdev_priv(dev); */ 1821 1822 wrqu->power.value = 0; 1823 wrqu->power.fixed = 0; /* no auto select */ 1824 wrqu->power.disabled = 1; 1825 1826 return 0; 1827 } 1828 1829 static int rtw_wx_set_gen_ie(struct net_device *dev, 1830 struct iw_request_info *info, 1831 union iwreq_data *wrqu, char *extra) 1832 { 1833 struct adapter *padapter = rtw_netdev_priv(dev); 1834 1835 return rtw_set_wpa_ie(padapter, extra, wrqu->data.length); 1836 } 1837 1838 static int rtw_wx_set_auth(struct net_device *dev, 1839 struct iw_request_info *info, 1840 union iwreq_data *wrqu, char *extra) 1841 { 1842 struct adapter *padapter = rtw_netdev_priv(dev); 1843 struct iw_param *param = (struct iw_param *)&(wrqu->param); 1844 int ret = 0; 1845 1846 switch (param->flags & IW_AUTH_INDEX) { 1847 case IW_AUTH_WPA_VERSION: 1848 break; 1849 case IW_AUTH_CIPHER_PAIRWISE: 1850 break; 1851 case IW_AUTH_CIPHER_GROUP: 1852 break; 1853 case IW_AUTH_KEY_MGMT: 1854 /* 1855 * ??? does not use these parameters 1856 */ 1857 break; 1858 case IW_AUTH_TKIP_COUNTERMEASURES: 1859 /* wpa_supplicant is setting the tkip countermeasure. */ 1860 if (param->value) /* enabling */ 1861 padapter->securitypriv.btkip_countermeasure = true; 1862 else /* disabling */ 1863 padapter->securitypriv.btkip_countermeasure = false; 1864 break; 1865 case IW_AUTH_DROP_UNENCRYPTED: 1866 /* HACK: 1867 * 1868 * wpa_supplicant calls set_wpa_enabled when the driver 1869 * is loaded and unloaded, regardless of if WPA is being 1870 * used. No other calls are made which can be used to 1871 * determine if encryption will be used or not prior to 1872 * association being expected. If encryption is not being 1873 * used, drop_unencrypted is set to false, else true -- we 1874 * can use this to determine if the CAP_PRIVACY_ON bit should 1875 * be set. 1876 */ 1877 1878 /* 1879 * This means init value, or using wep, ndisencryptstatus = 1880 * Ndis802_11Encryption1Enabled, then it needn't reset it; 1881 */ 1882 if (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption1Enabled) 1883 break; 1884 1885 if (param->value) { 1886 padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled; 1887 padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_; 1888 padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_; 1889 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */ 1890 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeOpen; 1891 } 1892 1893 break; 1894 case IW_AUTH_80211_AUTH_ALG: 1895 /* 1896 * It's the starting point of a link layer connection using wpa_supplicant 1897 */ 1898 if (check_fwstate(&padapter->mlmepriv, _FW_LINKED)) { 1899 LeaveAllPowerSaveMode(padapter); 1900 rtw_disassoc_cmd(padapter, 500, false); 1901 rtw_indicate_disconnect(padapter); 1902 rtw_free_assoc_resources(padapter, 1); 1903 } 1904 1905 ret = wpa_set_auth_algs(dev, (u32)param->value); 1906 break; 1907 case IW_AUTH_WPA_ENABLED: 1908 break; 1909 case IW_AUTH_RX_UNENCRYPTED_EAPOL: 1910 break; 1911 case IW_AUTH_PRIVACY_INVOKED: 1912 break; 1913 default: 1914 return -EOPNOTSUPP; 1915 } 1916 1917 return ret; 1918 } 1919 1920 static int rtw_wx_set_enc_ext(struct net_device *dev, 1921 struct iw_request_info *info, 1922 union iwreq_data *wrqu, char *extra) 1923 { 1924 char *alg_name; 1925 u32 param_len; 1926 struct ieee_param *param = NULL; 1927 struct iw_point *pencoding = &wrqu->encoding; 1928 struct iw_encode_ext *pext = (struct iw_encode_ext *)extra; 1929 int ret = 0; 1930 1931 param_len = sizeof(struct ieee_param) + pext->key_len; 1932 param = kzalloc(param_len, GFP_KERNEL); 1933 if (param == NULL) 1934 return -1; 1935 1936 param->cmd = IEEE_CMD_SET_ENCRYPTION; 1937 memset(param->sta_addr, 0xff, ETH_ALEN); 1938 1939 1940 switch (pext->alg) { 1941 case IW_ENCODE_ALG_NONE: 1942 /* todo: remove key */ 1943 /* remove = 1; */ 1944 alg_name = "none"; 1945 break; 1946 case IW_ENCODE_ALG_WEP: 1947 alg_name = "WEP"; 1948 break; 1949 case IW_ENCODE_ALG_TKIP: 1950 alg_name = "TKIP"; 1951 break; 1952 case IW_ENCODE_ALG_CCMP: 1953 alg_name = "CCMP"; 1954 break; 1955 case IW_ENCODE_ALG_AES_CMAC: 1956 alg_name = "BIP"; 1957 break; 1958 default: 1959 ret = -1; 1960 goto exit; 1961 } 1962 1963 strncpy((char *)param->u.crypt.alg, alg_name, IEEE_CRYPT_ALG_NAME_LEN); 1964 1965 if (pext->ext_flags & IW_ENCODE_EXT_SET_TX_KEY) 1966 param->u.crypt.set_tx = 1; 1967 1968 /* cliW: WEP does not have group key 1969 * just not checking GROUP key setting 1970 */ 1971 if ((pext->alg != IW_ENCODE_ALG_WEP) && 1972 ((pext->ext_flags & IW_ENCODE_EXT_GROUP_KEY) 1973 || (pext->ext_flags & IW_ENCODE_ALG_AES_CMAC))) { 1974 param->u.crypt.set_tx = 0; 1975 } 1976 1977 param->u.crypt.idx = (pencoding->flags & 0x00FF) - 1; 1978 1979 if (pext->ext_flags & IW_ENCODE_EXT_RX_SEQ_VALID) 1980 memcpy(param->u.crypt.seq, pext->rx_seq, 8); 1981 1982 if (pext->key_len) { 1983 param->u.crypt.key_len = pext->key_len; 1984 /* memcpy(param + 1, pext + 1, pext->key_len); */ 1985 memcpy(param->u.crypt.key, pext + 1, pext->key_len); 1986 } 1987 1988 if (pencoding->flags & IW_ENCODE_DISABLED) { 1989 /* todo: remove key */ 1990 /* remove = 1; */ 1991 } 1992 1993 ret = wpa_set_encryption(dev, param, param_len); 1994 1995 exit: 1996 kfree(param); 1997 1998 return ret; 1999 } 2000 2001 2002 static int rtw_wx_get_nick(struct net_device *dev, 2003 struct iw_request_info *info, 2004 union iwreq_data *wrqu, char *extra) 2005 { 2006 /* struct adapter *padapter = rtw_netdev_priv(dev); */ 2007 /* struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); */ 2008 /* struct security_priv *psecuritypriv = &padapter->securitypriv; */ 2009 2010 if (extra) { 2011 wrqu->data.length = 14; 2012 wrqu->data.flags = 1; 2013 memcpy(extra, "<WIFI@REALTEK>", 14); 2014 } 2015 return 0; 2016 } 2017 2018 static int rtw_wx_read32(struct net_device *dev, 2019 struct iw_request_info *info, 2020 union iwreq_data *wrqu, char *extra) 2021 { 2022 struct adapter *padapter; 2023 struct iw_point *p; 2024 u16 len; 2025 u32 addr; 2026 u32 data32; 2027 u32 bytes; 2028 u8 *ptmp; 2029 int ret; 2030 2031 2032 ret = 0; 2033 padapter = rtw_netdev_priv(dev); 2034 p = &wrqu->data; 2035 len = p->length; 2036 if (0 == len) 2037 return -EINVAL; 2038 2039 ptmp = rtw_malloc(len); 2040 if (NULL == ptmp) 2041 return -ENOMEM; 2042 2043 if (copy_from_user(ptmp, p->pointer, len)) { 2044 ret = -EFAULT; 2045 goto exit; 2046 } 2047 2048 bytes = 0; 2049 addr = 0; 2050 sscanf(ptmp, "%d,%x", &bytes, &addr); 2051 2052 switch (bytes) { 2053 case 1: 2054 data32 = rtw_read8(padapter, addr); 2055 sprintf(extra, "0x%02X", data32); 2056 break; 2057 case 2: 2058 data32 = rtw_read16(padapter, addr); 2059 sprintf(extra, "0x%04X", data32); 2060 break; 2061 case 4: 2062 data32 = rtw_read32(padapter, addr); 2063 sprintf(extra, "0x%08X", data32); 2064 break; 2065 default: 2066 ret = -EINVAL; 2067 goto exit; 2068 } 2069 2070 exit: 2071 kfree(ptmp); 2072 2073 return ret; 2074 } 2075 2076 static int rtw_wx_write32(struct net_device *dev, 2077 struct iw_request_info *info, 2078 union iwreq_data *wrqu, char *extra) 2079 { 2080 struct adapter *padapter = rtw_netdev_priv(dev); 2081 2082 u32 addr; 2083 u32 data32; 2084 u32 bytes; 2085 2086 2087 bytes = 0; 2088 addr = 0; 2089 data32 = 0; 2090 sscanf(extra, "%d,%x,%x", &bytes, &addr, &data32); 2091 2092 switch (bytes) { 2093 case 1: 2094 rtw_write8(padapter, addr, (u8)data32); 2095 break; 2096 case 2: 2097 rtw_write16(padapter, addr, (u16)data32); 2098 break; 2099 case 4: 2100 rtw_write32(padapter, addr, data32); 2101 break; 2102 default: 2103 return -EINVAL; 2104 } 2105 2106 return 0; 2107 } 2108 2109 static int rtw_wx_read_rf(struct net_device *dev, 2110 struct iw_request_info *info, 2111 union iwreq_data *wrqu, char *extra) 2112 { 2113 struct adapter *padapter = rtw_netdev_priv(dev); 2114 u32 path, addr, data32; 2115 2116 2117 path = *(u32 *)extra; 2118 addr = *((u32 *)extra + 1); 2119 data32 = rtw_hal_read_rfreg(padapter, path, addr, 0xFFFFF); 2120 /* 2121 * IMPORTANT!! 2122 * Only when wireless private ioctl is at odd order, 2123 * "extra" would be copied to user space. 2124 */ 2125 sprintf(extra, "0x%05x", data32); 2126 2127 return 0; 2128 } 2129 2130 static int rtw_wx_write_rf(struct net_device *dev, 2131 struct iw_request_info *info, 2132 union iwreq_data *wrqu, char *extra) 2133 { 2134 struct adapter *padapter = rtw_netdev_priv(dev); 2135 u32 path, addr, data32; 2136 2137 2138 path = *(u32 *)extra; 2139 addr = *((u32 *)extra + 1); 2140 data32 = *((u32 *)extra + 2); 2141 rtw_hal_write_rfreg(padapter, path, addr, 0xFFFFF, data32); 2142 2143 return 0; 2144 } 2145 2146 static int rtw_wx_priv_null(struct net_device *dev, struct iw_request_info *a, 2147 union iwreq_data *wrqu, char *b) 2148 { 2149 return -1; 2150 } 2151 2152 static int dummy(struct net_device *dev, struct iw_request_info *a, 2153 union iwreq_data *wrqu, char *b) 2154 { 2155 /* struct adapter *padapter = rtw_netdev_priv(dev); */ 2156 /* struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); */ 2157 2158 return -1; 2159 2160 } 2161 2162 static int rtw_wx_set_channel_plan(struct net_device *dev, 2163 struct iw_request_info *info, 2164 union iwreq_data *wrqu, char *extra) 2165 { 2166 struct adapter *padapter = rtw_netdev_priv(dev); 2167 u8 channel_plan_req = (u8)(*((int *)wrqu)); 2168 2169 if (rtw_set_chplan_cmd(padapter, channel_plan_req, 1, 1) != _SUCCESS) 2170 return -EPERM; 2171 2172 return 0; 2173 } 2174 2175 static int rtw_wx_set_mtk_wps_probe_ie(struct net_device *dev, 2176 struct iw_request_info *a, 2177 union iwreq_data *wrqu, char *b) 2178 { 2179 return 0; 2180 } 2181 2182 static int rtw_wx_get_sensitivity(struct net_device *dev, 2183 struct iw_request_info *info, 2184 union iwreq_data *wrqu, char *buf) 2185 { 2186 return 0; 2187 } 2188 2189 static int rtw_wx_set_mtk_wps_ie(struct net_device *dev, 2190 struct iw_request_info *info, 2191 union iwreq_data *wrqu, char *extra) 2192 { 2193 return 0; 2194 } 2195 2196 /* 2197 typedef int (*iw_handler)(struct net_device *dev, struct iw_request_info *info, 2198 union iwreq_data *wrqu, char *extra); 2199 */ 2200 /* 2201 *For all data larger than 16 octets, we need to use a 2202 *pointer to memory allocated in user space. 2203 */ 2204 static int rtw_drvext_hdl(struct net_device *dev, struct iw_request_info *info, 2205 union iwreq_data *wrqu, char *extra) 2206 { 2207 return 0; 2208 } 2209 2210 static int rtw_get_ap_info(struct net_device *dev, 2211 struct iw_request_info *info, 2212 union iwreq_data *wrqu, char *extra) 2213 { 2214 int ret = 0; 2215 int wpa_ielen; 2216 u32 cnt = 0; 2217 struct list_head *plist, *phead; 2218 unsigned char *pbuf; 2219 u8 bssid[ETH_ALEN]; 2220 char data[32]; 2221 struct wlan_network *pnetwork = NULL; 2222 struct adapter *padapter = rtw_netdev_priv(dev); 2223 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 2224 struct __queue *queue = &(pmlmepriv->scanned_queue); 2225 struct iw_point *pdata = &wrqu->data; 2226 2227 if ((padapter->bDriverStopped) || (pdata == NULL)) { 2228 ret = -EINVAL; 2229 goto exit; 2230 } 2231 2232 while ((check_fwstate(pmlmepriv, (_FW_UNDER_SURVEY|_FW_UNDER_LINKING))) == true) { 2233 msleep(30); 2234 cnt++; 2235 if (cnt > 100) 2236 break; 2237 } 2238 2239 2240 /* pdata->length = 0;? */ 2241 pdata->flags = 0; 2242 if (pdata->length >= 32) { 2243 if (copy_from_user(data, pdata->pointer, 32)) { 2244 ret = -EINVAL; 2245 goto exit; 2246 } 2247 } else { 2248 ret = -EINVAL; 2249 goto exit; 2250 } 2251 2252 spin_lock_bh(&(pmlmepriv->scanned_queue.lock)); 2253 2254 phead = get_list_head(queue); 2255 plist = get_next(phead); 2256 2257 while (1) { 2258 if (phead == plist) 2259 break; 2260 2261 2262 pnetwork = container_of(plist, struct wlan_network, list); 2263 2264 if (!mac_pton(data, bssid)) { 2265 spin_unlock_bh(&(pmlmepriv->scanned_queue.lock)); 2266 return -EINVAL; 2267 } 2268 2269 2270 if (!memcmp(bssid, pnetwork->network.MacAddress, ETH_ALEN)) { /* BSSID match, then check if supporting wpa/wpa2 */ 2271 2272 pbuf = rtw_get_wpa_ie(&pnetwork->network.IEs[12], &wpa_ielen, pnetwork->network.IELength-12); 2273 if (pbuf && (wpa_ielen > 0)) { 2274 pdata->flags = 1; 2275 break; 2276 } 2277 2278 pbuf = rtw_get_wpa2_ie(&pnetwork->network.IEs[12], &wpa_ielen, pnetwork->network.IELength-12); 2279 if (pbuf && (wpa_ielen > 0)) { 2280 pdata->flags = 2; 2281 break; 2282 } 2283 } 2284 2285 plist = get_next(plist); 2286 2287 } 2288 2289 spin_unlock_bh(&(pmlmepriv->scanned_queue.lock)); 2290 2291 if (pdata->length >= 34) { 2292 if (copy_to_user((u8 __force __user *)pdata->pointer+32, (u8 *)&pdata->flags, 1)) { 2293 ret = -EINVAL; 2294 goto exit; 2295 } 2296 } 2297 2298 exit: 2299 2300 return ret; 2301 2302 } 2303 2304 static int rtw_set_pid(struct net_device *dev, 2305 struct iw_request_info *info, 2306 union iwreq_data *wrqu, char *extra) 2307 { 2308 2309 int ret = 0; 2310 struct adapter *padapter = rtw_netdev_priv(dev); 2311 int *pdata = (int *)wrqu; 2312 int selector; 2313 2314 if ((padapter->bDriverStopped) || (pdata == NULL)) { 2315 ret = -EINVAL; 2316 goto exit; 2317 } 2318 2319 selector = *pdata; 2320 if (selector < 3 && selector >= 0) 2321 padapter->pid[selector] = *(pdata+1); 2322 2323 exit: 2324 2325 return ret; 2326 2327 } 2328 2329 static int rtw_wps_start(struct net_device *dev, 2330 struct iw_request_info *info, 2331 union iwreq_data *wrqu, char *extra) 2332 { 2333 2334 int ret = 0; 2335 struct adapter *padapter = rtw_netdev_priv(dev); 2336 struct iw_point *pdata = &wrqu->data; 2337 u32 u32wps_start = 0; 2338 2339 if ((true == padapter->bDriverStopped) || (true == padapter->bSurpriseRemoved) || (NULL == pdata)) { 2340 ret = -EINVAL; 2341 goto exit; 2342 } 2343 2344 if (copy_from_user((void *)&u32wps_start, pdata->pointer, 4)) { 2345 ret = -EFAULT; 2346 goto exit; 2347 } 2348 if (u32wps_start == 0) 2349 u32wps_start = *extra; 2350 2351 exit: 2352 2353 return ret; 2354 2355 } 2356 2357 static int rtw_p2p_set(struct net_device *dev, 2358 struct iw_request_info *info, 2359 union iwreq_data *wrqu, char *extra) 2360 { 2361 2362 return 0; 2363 2364 } 2365 2366 static int rtw_p2p_get(struct net_device *dev, 2367 struct iw_request_info *info, 2368 union iwreq_data *wrqu, char *extra) 2369 { 2370 2371 return 0; 2372 2373 } 2374 2375 static int rtw_p2p_get2(struct net_device *dev, 2376 struct iw_request_info *info, 2377 union iwreq_data *wrqu, char *extra) 2378 { 2379 2380 return 0; 2381 2382 } 2383 2384 static int rtw_rereg_nd_name(struct net_device *dev, 2385 struct iw_request_info *info, 2386 union iwreq_data *wrqu, char *extra) 2387 { 2388 int ret = 0; 2389 struct adapter *padapter = rtw_netdev_priv(dev); 2390 struct rereg_nd_name_data *rereg_priv = &padapter->rereg_nd_name_priv; 2391 char new_ifname[IFNAMSIZ]; 2392 2393 if (rereg_priv->old_ifname[0] == 0) { 2394 char *reg_ifname; 2395 reg_ifname = padapter->registrypriv.ifname; 2396 2397 strncpy(rereg_priv->old_ifname, reg_ifname, IFNAMSIZ); 2398 rereg_priv->old_ifname[IFNAMSIZ-1] = 0; 2399 } 2400 2401 if (wrqu->data.length > IFNAMSIZ) 2402 return -EFAULT; 2403 2404 if (copy_from_user(new_ifname, wrqu->data.pointer, IFNAMSIZ)) 2405 return -EFAULT; 2406 2407 if (0 == strcmp(rereg_priv->old_ifname, new_ifname)) 2408 return ret; 2409 2410 ret = rtw_change_ifname(padapter, new_ifname); 2411 if (ret != 0) 2412 goto exit; 2413 2414 strncpy(rereg_priv->old_ifname, new_ifname, IFNAMSIZ); 2415 rereg_priv->old_ifname[IFNAMSIZ-1] = 0; 2416 2417 if (!memcmp(new_ifname, "disable%d", 9)) { 2418 /* free network queue for Android's timming issue */ 2419 rtw_free_network_queue(padapter, true); 2420 2421 /* the interface is being "disabled", we can do deeper IPS */ 2422 /* rtw_ips_mode_req(&padapter->pwrctrlpriv, IPS_NORMAL); */ 2423 } 2424 exit: 2425 return ret; 2426 2427 } 2428 2429 static int rtw_dbg_port(struct net_device *dev, 2430 struct iw_request_info *info, 2431 union iwreq_data *wrqu, char *extra) 2432 { 2433 u8 major_cmd, minor_cmd; 2434 u16 arg; 2435 u32 extra_arg, *pdata, val32; 2436 struct adapter *padapter = rtw_netdev_priv(dev); 2437 struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv; 2438 struct mlme_ext_info *pmlmeinfo = &(pmlmeext->mlmext_info); 2439 2440 pdata = (u32 *)&wrqu->data; 2441 2442 val32 = *pdata; 2443 arg = (u16)(val32&0x0000ffff); 2444 major_cmd = (u8)(val32>>24); 2445 minor_cmd = (u8)((val32>>16)&0x00ff); 2446 2447 extra_arg = *(pdata+1); 2448 2449 switch (major_cmd) { 2450 case 0x70:/* read_reg */ 2451 switch (minor_cmd) { 2452 case 1: 2453 break; 2454 case 2: 2455 break; 2456 case 4: 2457 break; 2458 } 2459 break; 2460 case 0x71:/* write_reg */ 2461 switch (minor_cmd) { 2462 case 1: 2463 rtw_write8(padapter, arg, extra_arg); 2464 break; 2465 case 2: 2466 rtw_write16(padapter, arg, extra_arg); 2467 break; 2468 case 4: 2469 rtw_write32(padapter, arg, extra_arg); 2470 break; 2471 } 2472 break; 2473 case 0x72:/* read_bb */ 2474 break; 2475 case 0x73:/* write_bb */ 2476 rtw_hal_write_bbreg(padapter, arg, 0xffffffff, extra_arg); 2477 break; 2478 case 0x74:/* read_rf */ 2479 break; 2480 case 0x75:/* write_rf */ 2481 rtw_hal_write_rfreg(padapter, minor_cmd, arg, 0xffffffff, extra_arg); 2482 break; 2483 2484 case 0x76: 2485 switch (minor_cmd) { 2486 case 0x00: /* normal mode, */ 2487 padapter->recvpriv.is_signal_dbg = 0; 2488 break; 2489 case 0x01: /* dbg mode */ 2490 padapter->recvpriv.is_signal_dbg = 1; 2491 extra_arg = extra_arg > 100 ? 100 : extra_arg; 2492 padapter->recvpriv.signal_strength_dbg = extra_arg; 2493 break; 2494 } 2495 break; 2496 case 0x78: /* IOL test */ 2497 break; 2498 case 0x79: 2499 { 2500 /* 2501 * dbg 0x79000000 [value], set RESP_TXAGC to + value, value:0~15 2502 * dbg 0x79010000 [value], set RESP_TXAGC to - value, value:0~15 2503 */ 2504 u8 value = extra_arg & 0x0f; 2505 u8 sign = minor_cmd; 2506 u16 write_value = 0; 2507 2508 if (sign) 2509 value = value | 0x10; 2510 2511 write_value = value | (value << 5); 2512 rtw_write16(padapter, 0x6d9, write_value); 2513 } 2514 break; 2515 case 0x7a: 2516 receive_disconnect(padapter, pmlmeinfo->network.MacAddress 2517 , WLAN_REASON_EXPIRATION_CHK); 2518 break; 2519 case 0x7F: 2520 switch (minor_cmd) { 2521 case 0x0: 2522 break; 2523 case 0x01: 2524 break; 2525 case 0x02: 2526 break; 2527 case 0x03: 2528 break; 2529 case 0x04: 2530 2531 break; 2532 case 0x05: 2533 break; 2534 case 0x06: 2535 { 2536 u32 ODMFlag; 2537 rtw_hal_get_hwreg(padapter, HW_VAR_DM_FLAG, (u8 *)(&ODMFlag)); 2538 ODMFlag = (u32)(0x0f&arg); 2539 rtw_hal_set_hwreg(padapter, HW_VAR_DM_FLAG, (u8 *)(&ODMFlag)); 2540 } 2541 break; 2542 case 0x07: 2543 break; 2544 case 0x08: 2545 { 2546 } 2547 break; 2548 case 0x09: 2549 break; 2550 case 0x0a: 2551 { 2552 int max_mac_id = 0; 2553 max_mac_id = rtw_search_max_mac_id(padapter); 2554 printk("%s ==> max_mac_id = %d\n", __func__, max_mac_id); 2555 } 2556 break; 2557 case 0x0b: /* Enable = 1, Disable = 0 driver control vrtl_carrier_sense. */ 2558 if (arg == 0) { 2559 padapter->driver_vcs_en = 0; 2560 } else if (arg == 1) { 2561 padapter->driver_vcs_en = 1; 2562 2563 if (extra_arg > 2) 2564 padapter->driver_vcs_type = 1; 2565 else 2566 padapter->driver_vcs_type = extra_arg; 2567 } 2568 break; 2569 case 0x0c:/* dump rx/tx packet */ 2570 { 2571 if (arg == 0) 2572 /* pHalData->bDumpRxPkt =extra_arg; */ 2573 rtw_hal_set_def_var(padapter, HAL_DEF_DBG_DUMP_RXPKT, &(extra_arg)); 2574 else if (arg == 1) 2575 rtw_hal_set_def_var(padapter, HAL_DEF_DBG_DUMP_TXPKT, &(extra_arg)); 2576 } 2577 break; 2578 case 0x0e: 2579 { 2580 if (arg == 0) { 2581 padapter->driver_rx_ampdu_factor = 0xFF; 2582 } else if (arg == 1) { 2583 2584 if ((extra_arg & 0x03) > 0x03) 2585 padapter->driver_rx_ampdu_factor = 0xFF; 2586 else 2587 padapter->driver_rx_ampdu_factor = extra_arg; 2588 } 2589 } 2590 break; 2591 2592 case 0x10:/* driver version display */ 2593 netdev_dbg(dev, "%s %s\n", "rtl8723bs", DRIVERVERSION); 2594 break; 2595 case 0x11:/* dump linked status */ 2596 { 2597 linked_info_dump(padapter, extra_arg); 2598 } 2599 break; 2600 case 0x12: /* set rx_stbc */ 2601 { 2602 struct registry_priv *pregpriv = &padapter->registrypriv; 2603 /* 0: disable, bit(0):enable 2.4g, bit(1):enable 5g, 0x3: enable both 2.4g and 5g */ 2604 /* default is set to enable 2.4GHZ for IOT issue with bufflao's AP at 5GHZ */ 2605 if (extra_arg == 0 || extra_arg == 1 || 2606 extra_arg == 2 || extra_arg == 3) 2607 pregpriv->rx_stbc = extra_arg; 2608 } 2609 break; 2610 case 0x13: /* set ampdu_enable */ 2611 { 2612 struct registry_priv *pregpriv = &padapter->registrypriv; 2613 /* 0: disable, 0x1:enable (but wifi_spec should be 0), 0x2: force enable (don't care wifi_spec) */ 2614 if (extra_arg < 3) 2615 pregpriv->ampdu_enable = extra_arg; 2616 } 2617 break; 2618 case 0x14: 2619 { 2620 } 2621 break; 2622 case 0x16: 2623 { 2624 if (arg == 0xff) { 2625 rtw_odm_dbg_comp_msg(padapter); 2626 } else { 2627 u64 dbg_comp = (u64)extra_arg; 2628 rtw_odm_dbg_comp_set(padapter, dbg_comp); 2629 } 2630 } 2631 break; 2632 #ifdef DBG_FIXED_CHAN 2633 case 0x17: 2634 { 2635 struct mlme_ext_priv *pmlmeext = &(padapter->mlmeextpriv); 2636 printk("===> Fixed channel to %d\n", extra_arg); 2637 pmlmeext->fixed_chan = extra_arg; 2638 2639 } 2640 break; 2641 #endif 2642 case 0x18: 2643 { 2644 printk("===> Switch USB Mode %d\n", extra_arg); 2645 rtw_hal_set_hwreg(padapter, HW_VAR_USB_MODE, (u8 *)&extra_arg); 2646 } 2647 break; 2648 case 0x19: 2649 { 2650 struct registry_priv *pregistrypriv = &padapter->registrypriv; 2651 /* extra_arg : */ 2652 /* BIT0: Enable VHT LDPC Rx, BIT1: Enable VHT LDPC Tx, */ 2653 /* BIT4: Enable HT LDPC Rx, BIT5: Enable HT LDPC Tx */ 2654 if (arg == 0) 2655 pregistrypriv->ldpc_cap = 0x00; 2656 else if (arg == 1) 2657 pregistrypriv->ldpc_cap = (u8)(extra_arg&0x33); 2658 } 2659 break; 2660 case 0x1a: 2661 { 2662 struct registry_priv *pregistrypriv = &padapter->registrypriv; 2663 /* extra_arg : */ 2664 /* BIT0: Enable VHT STBC Rx, BIT1: Enable VHT STBC Tx, */ 2665 /* BIT4: Enable HT STBC Rx, BIT5: Enable HT STBC Tx */ 2666 if (arg == 0) 2667 pregistrypriv->stbc_cap = 0x00; 2668 else if (arg == 1) 2669 pregistrypriv->stbc_cap = (u8)(extra_arg&0x33); 2670 } 2671 break; 2672 case 0x1b: 2673 { 2674 struct registry_priv *pregistrypriv = &padapter->registrypriv; 2675 2676 if (arg == 0) { 2677 init_mlme_default_rate_set(padapter); 2678 pregistrypriv->ht_enable = (u8)rtw_ht_enable; 2679 } else if (arg == 1) { 2680 2681 int i; 2682 u8 max_rx_rate; 2683 2684 max_rx_rate = (u8)extra_arg; 2685 2686 if (max_rx_rate < 0xc) { /* max_rx_rate < MSC0 -> B or G -> disable HT */ 2687 pregistrypriv->ht_enable = 0; 2688 for (i = 0; i < NumRates; i++) { 2689 if (pmlmeext->datarate[i] > max_rx_rate) 2690 pmlmeext->datarate[i] = 0xff; 2691 } 2692 2693 } 2694 else if (max_rx_rate < 0x1c) { /* mcs0~mcs15 */ 2695 u32 mcs_bitmap = 0x0; 2696 2697 for (i = 0; i < ((max_rx_rate + 1) - 0xc); i++) 2698 mcs_bitmap |= BIT(i); 2699 2700 set_mcs_rate_by_mask(pmlmeext->default_supported_mcs_set, mcs_bitmap); 2701 } 2702 } 2703 } 2704 break; 2705 case 0x1c: /* enable/disable driver control AMPDU Density for peer sta's rx */ 2706 { 2707 if (arg == 0) { 2708 padapter->driver_ampdu_spacing = 0xFF; 2709 } else if (arg == 1) { 2710 2711 if (extra_arg > 0x07) 2712 padapter->driver_ampdu_spacing = 0xFF; 2713 else 2714 padapter->driver_ampdu_spacing = extra_arg; 2715 } 2716 } 2717 break; 2718 case 0x23: 2719 { 2720 padapter->bNotifyChannelChange = extra_arg; 2721 break; 2722 } 2723 case 0x24: 2724 { 2725 break; 2726 } 2727 case 0xaa: 2728 { 2729 if ((extra_arg & 0x7F) > 0x3F) 2730 extra_arg = 0xFF; 2731 padapter->fix_rate = extra_arg; 2732 } 2733 break; 2734 case 0xdd:/* registers dump , 0 for mac reg, 1 for bb reg, 2 for rf reg */ 2735 { 2736 if (extra_arg == 0) 2737 mac_reg_dump(RTW_DBGDUMP, padapter); 2738 else if (extra_arg == 1) 2739 bb_reg_dump(RTW_DBGDUMP, padapter); 2740 else if (extra_arg == 2) 2741 rf_reg_dump(RTW_DBGDUMP, padapter); 2742 } 2743 break; 2744 2745 case 0xee:/* turn on/off dynamic funcs */ 2746 { 2747 u32 odm_flag; 2748 2749 if (0xf == extra_arg) { 2750 rtw_hal_get_def_var(padapter, HAL_DEF_DBG_DM_FUNC, &odm_flag); 2751 } else { 2752 /*extra_arg = 0 - disable all dynamic func 2753 extra_arg = 1 - disable DIG 2754 extra_arg = 2 - disable tx power tracking 2755 extra_arg = 3 - turn on all dynamic func 2756 */ 2757 rtw_hal_set_def_var(padapter, HAL_DEF_DBG_DM_FUNC, &(extra_arg)); 2758 rtw_hal_get_def_var(padapter, HAL_DEF_DBG_DM_FUNC, &odm_flag); 2759 } 2760 } 2761 break; 2762 2763 case 0xfd: 2764 rtw_write8(padapter, 0xc50, arg); 2765 rtw_write8(padapter, 0xc58, arg); 2766 break; 2767 case 0xfe: 2768 break; 2769 case 0xff: 2770 { 2771 } 2772 break; 2773 } 2774 break; 2775 default: 2776 break; 2777 } 2778 2779 2780 return 0; 2781 2782 } 2783 2784 static int wpa_set_param(struct net_device *dev, u8 name, u32 value) 2785 { 2786 uint ret = 0; 2787 struct adapter *padapter = rtw_netdev_priv(dev); 2788 2789 switch (name) { 2790 case IEEE_PARAM_WPA_ENABLED: 2791 2792 padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_8021X; /* 802.1x */ 2793 2794 /* ret = ieee80211_wpa_enable(ieee, value); */ 2795 2796 switch ((value)&0xff) { 2797 case 1: /* WPA */ 2798 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPAPSK; /* WPA_PSK */ 2799 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption2Enabled; 2800 break; 2801 case 2: /* WPA2 */ 2802 padapter->securitypriv.ndisauthtype = Ndis802_11AuthModeWPA2PSK; /* WPA2_PSK */ 2803 padapter->securitypriv.ndisencryptstatus = Ndis802_11Encryption3Enabled; 2804 break; 2805 } 2806 2807 break; 2808 2809 case IEEE_PARAM_TKIP_COUNTERMEASURES: 2810 /* ieee->tkip_countermeasures =value; */ 2811 break; 2812 2813 case IEEE_PARAM_DROP_UNENCRYPTED: 2814 { 2815 /* HACK: 2816 * 2817 * wpa_supplicant calls set_wpa_enabled when the driver 2818 * is loaded and unloaded, regardless of if WPA is being 2819 * used. No other calls are made which can be used to 2820 * determine if encryption will be used or not prior to 2821 * association being expected. If encryption is not being 2822 * used, drop_unencrypted is set to false, else true -- we 2823 * can use this to determine if the CAP_PRIVACY_ON bit should 2824 * be set. 2825 */ 2826 break; 2827 2828 } 2829 case IEEE_PARAM_PRIVACY_INVOKED: 2830 2831 /* ieee->privacy_invoked =value; */ 2832 2833 break; 2834 2835 case IEEE_PARAM_AUTH_ALGS: 2836 2837 ret = wpa_set_auth_algs(dev, value); 2838 2839 break; 2840 2841 case IEEE_PARAM_IEEE_802_1X: 2842 2843 /* ieee->ieee802_1x =value; */ 2844 2845 break; 2846 2847 case IEEE_PARAM_WPAX_SELECT: 2848 2849 /* added for WPA2 mixed mode */ 2850 /* 2851 spin_lock_irqsave(&ieee->wpax_suitlist_lock, flags); 2852 ieee->wpax_type_set = 1; 2853 ieee->wpax_type_notify = value; 2854 spin_unlock_irqrestore(&ieee->wpax_suitlist_lock, flags); 2855 */ 2856 2857 break; 2858 2859 default: 2860 2861 2862 2863 ret = -EOPNOTSUPP; 2864 2865 2866 break; 2867 2868 } 2869 2870 return ret; 2871 2872 } 2873 2874 static int wpa_mlme(struct net_device *dev, u32 command, u32 reason) 2875 { 2876 int ret = 0; 2877 struct adapter *padapter = rtw_netdev_priv(dev); 2878 2879 switch (command) { 2880 case IEEE_MLME_STA_DEAUTH: 2881 2882 if (!rtw_set_802_11_disassociate(padapter)) 2883 ret = -1; 2884 2885 break; 2886 2887 case IEEE_MLME_STA_DISASSOC: 2888 2889 if (!rtw_set_802_11_disassociate(padapter)) 2890 ret = -1; 2891 2892 break; 2893 2894 default: 2895 ret = -EOPNOTSUPP; 2896 break; 2897 } 2898 2899 return ret; 2900 2901 } 2902 2903 static int wpa_supplicant_ioctl(struct net_device *dev, struct iw_point *p) 2904 { 2905 struct ieee_param *param; 2906 uint ret = 0; 2907 2908 /* down(&ieee->wx_sem); */ 2909 2910 if (!p->pointer || p->length != sizeof(struct ieee_param)) 2911 return -EINVAL; 2912 2913 param = rtw_malloc(p->length); 2914 if (param == NULL) 2915 return -ENOMEM; 2916 2917 if (copy_from_user(param, p->pointer, p->length)) { 2918 kfree(param); 2919 return -EFAULT; 2920 } 2921 2922 switch (param->cmd) { 2923 2924 case IEEE_CMD_SET_WPA_PARAM: 2925 ret = wpa_set_param(dev, param->u.wpa_param.name, param->u.wpa_param.value); 2926 break; 2927 2928 case IEEE_CMD_SET_WPA_IE: 2929 /* ret = wpa_set_wpa_ie(dev, param, p->length); */ 2930 ret = rtw_set_wpa_ie(rtw_netdev_priv(dev), (char *)param->u.wpa_ie.data, (u16)param->u.wpa_ie.len); 2931 break; 2932 2933 case IEEE_CMD_SET_ENCRYPTION: 2934 ret = wpa_set_encryption(dev, param, p->length); 2935 break; 2936 2937 case IEEE_CMD_MLME: 2938 ret = wpa_mlme(dev, param->u.mlme.command, param->u.mlme.reason_code); 2939 break; 2940 2941 default: 2942 ret = -EOPNOTSUPP; 2943 break; 2944 2945 } 2946 2947 if (ret == 0 && copy_to_user(p->pointer, param, p->length)) 2948 ret = -EFAULT; 2949 2950 kfree(param); 2951 2952 /* up(&ieee->wx_sem); */ 2953 return ret; 2954 } 2955 2956 static int rtw_set_encryption(struct net_device *dev, struct ieee_param *param, u32 param_len) 2957 { 2958 int ret = 0; 2959 u32 wep_key_idx, wep_key_len, wep_total_len; 2960 struct ndis_802_11_wep *pwep = NULL; 2961 struct sta_info *psta = NULL, *pbcmc_sta = NULL; 2962 struct adapter *padapter = rtw_netdev_priv(dev); 2963 struct mlme_priv *pmlmepriv = &padapter->mlmepriv; 2964 struct security_priv *psecuritypriv = &(padapter->securitypriv); 2965 struct sta_priv *pstapriv = &padapter->stapriv; 2966 char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey; 2967 char *rxkey = padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey; 2968 char *grpkey = psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey; 2969 2970 param->u.crypt.err = 0; 2971 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; 2972 2973 /* sizeof(struct ieee_param) = 64 bytes; */ 2974 /* if (param_len != (u32) ((u8 *) param->u.crypt.key - (u8 *) param) + param->u.crypt.key_len) */ 2975 if (param_len != sizeof(struct ieee_param) + param->u.crypt.key_len) { 2976 ret = -EINVAL; 2977 goto exit; 2978 } 2979 2980 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff && 2981 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff && 2982 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) { 2983 if (param->u.crypt.idx >= WEP_KEYS) { 2984 ret = -EINVAL; 2985 goto exit; 2986 } 2987 } else { 2988 psta = rtw_get_stainfo(pstapriv, param->sta_addr); 2989 if (!psta) 2990 /* ret = -EINVAL; */ 2991 goto exit; 2992 } 2993 2994 if (strcmp(param->u.crypt.alg, "none") == 0 && (psta == NULL)) { 2995 /* todo:clear default encryption keys */ 2996 2997 psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Open; 2998 psecuritypriv->ndisencryptstatus = Ndis802_11EncryptionDisabled; 2999 psecuritypriv->dot11PrivacyAlgrthm = _NO_PRIVACY_; 3000 psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_; 3001 3002 goto exit; 3003 } 3004 3005 3006 if (strcmp(param->u.crypt.alg, "WEP") == 0 && (psta == NULL)) { 3007 wep_key_idx = param->u.crypt.idx; 3008 wep_key_len = param->u.crypt.key_len; 3009 3010 if ((wep_key_idx >= WEP_KEYS) || (wep_key_len <= 0)) { 3011 ret = -EINVAL; 3012 goto exit; 3013 } 3014 3015 3016 if (wep_key_len > 0) { 3017 wep_key_len = wep_key_len <= 5 ? 5 : 13; 3018 wep_total_len = wep_key_len + FIELD_OFFSET(struct ndis_802_11_wep, KeyMaterial); 3019 pwep = kzalloc(wep_total_len, GFP_KERNEL); 3020 if (!pwep) 3021 goto exit; 3022 3023 pwep->KeyLength = wep_key_len; 3024 pwep->Length = wep_total_len; 3025 3026 } 3027 3028 pwep->KeyIndex = wep_key_idx; 3029 3030 memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength); 3031 3032 if (param->u.crypt.set_tx) { 3033 psecuritypriv->dot11AuthAlgrthm = dot11AuthAlgrthm_Auto; 3034 psecuritypriv->ndisencryptstatus = Ndis802_11Encryption1Enabled; 3035 psecuritypriv->dot11PrivacyAlgrthm = _WEP40_; 3036 psecuritypriv->dot118021XGrpPrivacy = _WEP40_; 3037 3038 if (pwep->KeyLength == 13) { 3039 psecuritypriv->dot11PrivacyAlgrthm = _WEP104_; 3040 psecuritypriv->dot118021XGrpPrivacy = _WEP104_; 3041 } 3042 3043 3044 psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx; 3045 3046 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength); 3047 3048 psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength; 3049 3050 rtw_ap_set_wep_key(padapter, pwep->KeyMaterial, pwep->KeyLength, wep_key_idx, 1); 3051 } else { 3052 /* don't update "psecuritypriv->dot11PrivacyAlgrthm" and */ 3053 /* psecuritypriv->dot11PrivacyKeyIndex =keyid", but can rtw_set_key to cam */ 3054 3055 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength); 3056 3057 psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength; 3058 3059 rtw_ap_set_wep_key(padapter, pwep->KeyMaterial, pwep->KeyLength, wep_key_idx, 0); 3060 } 3061 3062 goto exit; 3063 3064 } 3065 3066 3067 if (!psta && check_fwstate(pmlmepriv, WIFI_AP_STATE)) { /* group key */ 3068 if (param->u.crypt.set_tx == 1) { 3069 if (strcmp(param->u.crypt.alg, "WEP") == 0) { 3070 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 3071 3072 psecuritypriv->dot118021XGrpPrivacy = _WEP40_; 3073 if (param->u.crypt.key_len == 13) 3074 psecuritypriv->dot118021XGrpPrivacy = _WEP104_; 3075 3076 } else if (strcmp(param->u.crypt.alg, "TKIP") == 0) { 3077 psecuritypriv->dot118021XGrpPrivacy = _TKIP_; 3078 3079 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 3080 3081 /* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */ 3082 /* set mic key */ 3083 memcpy(txkey, &(param->u.crypt.key[16]), 8); 3084 memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8); 3085 3086 psecuritypriv->busetkipkey = true; 3087 3088 } 3089 else if (strcmp(param->u.crypt.alg, "CCMP") == 0) { 3090 psecuritypriv->dot118021XGrpPrivacy = _AES_; 3091 3092 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 3093 } else { 3094 psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_; 3095 } 3096 3097 psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx; 3098 3099 psecuritypriv->binstallGrpkey = true; 3100 3101 psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/* */ 3102 3103 rtw_ap_set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx); 3104 3105 pbcmc_sta = rtw_get_bcmc_stainfo(padapter); 3106 if (pbcmc_sta) { 3107 pbcmc_sta->ieee8021x_blocked = false; 3108 pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */ 3109 } 3110 } 3111 3112 goto exit; 3113 3114 } 3115 3116 if (psecuritypriv->dot11AuthAlgrthm == dot11AuthAlgrthm_8021X && psta) { /* psk/802_1x */ 3117 if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) { 3118 if (param->u.crypt.set_tx == 1) { 3119 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 3120 3121 if (strcmp(param->u.crypt.alg, "WEP") == 0) { 3122 psta->dot118021XPrivacy = _WEP40_; 3123 if (param->u.crypt.key_len == 13) 3124 psta->dot118021XPrivacy = _WEP104_; 3125 } else if (strcmp(param->u.crypt.alg, "TKIP") == 0) { 3126 psta->dot118021XPrivacy = _TKIP_; 3127 3128 /* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */ 3129 /* set mic key */ 3130 memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8); 3131 memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8); 3132 3133 psecuritypriv->busetkipkey = true; 3134 3135 } else if (strcmp(param->u.crypt.alg, "CCMP") == 0) { 3136 3137 psta->dot118021XPrivacy = _AES_; 3138 } else { 3139 psta->dot118021XPrivacy = _NO_PRIVACY_; 3140 } 3141 3142 rtw_ap_set_pairwise_key(padapter, psta); 3143 3144 psta->ieee8021x_blocked = false; 3145 3146 } else { /* group key??? */ 3147 if (strcmp(param->u.crypt.alg, "WEP") == 0) { 3148 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 3149 3150 psecuritypriv->dot118021XGrpPrivacy = _WEP40_; 3151 if (param->u.crypt.key_len == 13) 3152 psecuritypriv->dot118021XGrpPrivacy = _WEP104_; 3153 } else if (strcmp(param->u.crypt.alg, "TKIP") == 0) { 3154 psecuritypriv->dot118021XGrpPrivacy = _TKIP_; 3155 3156 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 3157 3158 /* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */ 3159 /* set mic key */ 3160 memcpy(txkey, &(param->u.crypt.key[16]), 8); 3161 memcpy(rxkey, &(param->u.crypt.key[24]), 8); 3162 3163 psecuritypriv->busetkipkey = true; 3164 3165 } else if (strcmp(param->u.crypt.alg, "CCMP") == 0) { 3166 psecuritypriv->dot118021XGrpPrivacy = _AES_; 3167 3168 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 3169 } else { 3170 psecuritypriv->dot118021XGrpPrivacy = _NO_PRIVACY_; 3171 } 3172 3173 psecuritypriv->dot118021XGrpKeyid = param->u.crypt.idx; 3174 3175 psecuritypriv->binstallGrpkey = true; 3176 3177 psecuritypriv->dot11PrivacyAlgrthm = psecuritypriv->dot118021XGrpPrivacy;/* */ 3178 3179 rtw_ap_set_group_key(padapter, param->u.crypt.key, psecuritypriv->dot118021XGrpPrivacy, param->u.crypt.idx); 3180 3181 pbcmc_sta = rtw_get_bcmc_stainfo(padapter); 3182 if (pbcmc_sta) { 3183 pbcmc_sta->ieee8021x_blocked = false; 3184 pbcmc_sta->dot118021XPrivacy = psecuritypriv->dot118021XGrpPrivacy;/* rx will use bmc_sta's dot118021XPrivacy */ 3185 } 3186 } 3187 } 3188 } 3189 3190 exit: 3191 kfree(pwep); 3192 3193 return ret; 3194 3195 } 3196 3197 static int rtw_set_beacon(struct net_device *dev, struct ieee_param *param, int len) 3198 { 3199 int ret = 0; 3200 struct adapter *padapter = rtw_netdev_priv(dev); 3201 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3202 struct sta_priv *pstapriv = &padapter->stapriv; 3203 unsigned char *pbuf = param->u.bcn_ie.buf; 3204 3205 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true) 3206 return -EINVAL; 3207 3208 memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2); 3209 3210 if ((pstapriv->max_num_sta > NUM_STA) || (pstapriv->max_num_sta <= 0)) 3211 pstapriv->max_num_sta = NUM_STA; 3212 3213 3214 if (rtw_check_beacon_data(padapter, pbuf, (len-12-2)) == _SUCCESS)/* 12 = param header, 2:no packed */ 3215 ret = 0; 3216 else 3217 ret = -EINVAL; 3218 3219 3220 return ret; 3221 3222 } 3223 3224 static void rtw_hostapd_sta_flush(struct net_device *dev) 3225 { 3226 /* _irqL irqL; */ 3227 /* struct list_head *phead, *plist; */ 3228 /* struct sta_info *psta = NULL; */ 3229 struct adapter *padapter = rtw_netdev_priv(dev); 3230 /* struct sta_priv *pstapriv = &padapter->stapriv; */ 3231 3232 flush_all_cam_entry(padapter); /* clear CAM */ 3233 3234 rtw_sta_flush(padapter); 3235 } 3236 3237 static int rtw_add_sta(struct net_device *dev, struct ieee_param *param) 3238 { 3239 int ret = 0; 3240 struct sta_info *psta = NULL; 3241 struct adapter *padapter = rtw_netdev_priv(dev); 3242 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3243 struct sta_priv *pstapriv = &padapter->stapriv; 3244 3245 if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true) 3246 return -EINVAL; 3247 3248 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff && 3249 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff && 3250 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) { 3251 return -EINVAL; 3252 } 3253 3254 /* 3255 psta = rtw_get_stainfo(pstapriv, param->sta_addr); 3256 if (psta) 3257 { 3258 spin_lock_bh(&(pstapriv->sta_hash_lock)); 3259 rtw_free_stainfo(padapter, psta); 3260 spin_unlock_bh(&(pstapriv->sta_hash_lock)); 3261 3262 psta = NULL; 3263 } 3264 */ 3265 /* psta = rtw_alloc_stainfo(pstapriv, param->sta_addr); */ 3266 psta = rtw_get_stainfo(pstapriv, param->sta_addr); 3267 if (psta) { 3268 int flags = param->u.add_sta.flags; 3269 3270 psta->aid = param->u.add_sta.aid;/* aid = 1~2007 */ 3271 3272 memcpy(psta->bssrateset, param->u.add_sta.tx_supp_rates, 16); 3273 3274 3275 /* check wmm cap. */ 3276 if (WLAN_STA_WME&flags) 3277 psta->qos_option = 1; 3278 else 3279 psta->qos_option = 0; 3280 3281 if (pmlmepriv->qospriv.qos_option == 0) 3282 psta->qos_option = 0; 3283 3284 /* chec 802.11n ht cap. */ 3285 if (WLAN_STA_HT&flags) { 3286 psta->htpriv.ht_option = true; 3287 psta->qos_option = 1; 3288 memcpy((void *)&psta->htpriv.ht_cap, (void *)¶m->u.add_sta.ht_cap, sizeof(struct ieee80211_ht_cap)); 3289 } else { 3290 psta->htpriv.ht_option = false; 3291 } 3292 3293 if (pmlmepriv->htpriv.ht_option == false) 3294 psta->htpriv.ht_option = false; 3295 3296 update_sta_info_apmode(padapter, psta); 3297 3298 3299 } else { 3300 ret = -ENOMEM; 3301 } 3302 3303 return ret; 3304 3305 } 3306 3307 static int rtw_del_sta(struct net_device *dev, struct ieee_param *param) 3308 { 3309 int ret = 0; 3310 struct sta_info *psta = NULL; 3311 struct adapter *padapter = rtw_netdev_priv(dev); 3312 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3313 struct sta_priv *pstapriv = &padapter->stapriv; 3314 3315 if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true) 3316 return -EINVAL; 3317 3318 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff && 3319 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff && 3320 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) { 3321 return -EINVAL; 3322 } 3323 3324 psta = rtw_get_stainfo(pstapriv, param->sta_addr); 3325 if (psta) { 3326 u8 updated = false; 3327 3328 spin_lock_bh(&pstapriv->asoc_list_lock); 3329 if (list_empty(&psta->asoc_list) == false) { 3330 list_del_init(&psta->asoc_list); 3331 pstapriv->asoc_list_cnt--; 3332 updated = ap_free_sta(padapter, psta, true, WLAN_REASON_DEAUTH_LEAVING); 3333 3334 } 3335 spin_unlock_bh(&pstapriv->asoc_list_lock); 3336 3337 associated_clients_update(padapter, updated); 3338 3339 psta = NULL; 3340 3341 } 3342 3343 return ret; 3344 3345 } 3346 3347 static int rtw_ioctl_get_sta_data(struct net_device *dev, struct ieee_param *param, int len) 3348 { 3349 int ret = 0; 3350 struct sta_info *psta = NULL; 3351 struct adapter *padapter = rtw_netdev_priv(dev); 3352 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3353 struct sta_priv *pstapriv = &padapter->stapriv; 3354 struct ieee_param_ex *param_ex = (struct ieee_param_ex *)param; 3355 struct sta_data *psta_data = (struct sta_data *)param_ex->data; 3356 3357 if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true) 3358 return -EINVAL; 3359 3360 if (param_ex->sta_addr[0] == 0xff && param_ex->sta_addr[1] == 0xff && 3361 param_ex->sta_addr[2] == 0xff && param_ex->sta_addr[3] == 0xff && 3362 param_ex->sta_addr[4] == 0xff && param_ex->sta_addr[5] == 0xff) { 3363 return -EINVAL; 3364 } 3365 3366 psta = rtw_get_stainfo(pstapriv, param_ex->sta_addr); 3367 if (psta) { 3368 psta_data->aid = (u16)psta->aid; 3369 psta_data->capability = psta->capability; 3370 psta_data->flags = psta->flags; 3371 3372 /* 3373 nonerp_set : BIT(0) 3374 no_short_slot_time_set : BIT(1) 3375 no_short_preamble_set : BIT(2) 3376 no_ht_gf_set : BIT(3) 3377 no_ht_set : BIT(4) 3378 ht_20mhz_set : BIT(5) 3379 */ 3380 3381 psta_data->sta_set = ((psta->nonerp_set) | 3382 (psta->no_short_slot_time_set << 1) | 3383 (psta->no_short_preamble_set << 2) | 3384 (psta->no_ht_gf_set << 3) | 3385 (psta->no_ht_set << 4) | 3386 (psta->ht_20mhz_set << 5)); 3387 3388 psta_data->tx_supp_rates_len = psta->bssratelen; 3389 memcpy(psta_data->tx_supp_rates, psta->bssrateset, psta->bssratelen); 3390 memcpy(&psta_data->ht_cap, &psta->htpriv.ht_cap, sizeof(struct ieee80211_ht_cap)); 3391 psta_data->rx_pkts = psta->sta_stats.rx_data_pkts; 3392 psta_data->rx_bytes = psta->sta_stats.rx_bytes; 3393 psta_data->rx_drops = psta->sta_stats.rx_drops; 3394 3395 psta_data->tx_pkts = psta->sta_stats.tx_pkts; 3396 psta_data->tx_bytes = psta->sta_stats.tx_bytes; 3397 psta_data->tx_drops = psta->sta_stats.tx_drops; 3398 3399 3400 } else { 3401 ret = -1; 3402 } 3403 3404 return ret; 3405 3406 } 3407 3408 static int rtw_get_sta_wpaie(struct net_device *dev, struct ieee_param *param) 3409 { 3410 int ret = 0; 3411 struct sta_info *psta = NULL; 3412 struct adapter *padapter = rtw_netdev_priv(dev); 3413 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3414 struct sta_priv *pstapriv = &padapter->stapriv; 3415 3416 if (check_fwstate(pmlmepriv, (_FW_LINKED|WIFI_AP_STATE)) != true) 3417 return -EINVAL; 3418 3419 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff && 3420 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff && 3421 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) { 3422 return -EINVAL; 3423 } 3424 3425 psta = rtw_get_stainfo(pstapriv, param->sta_addr); 3426 if (psta) { 3427 if ((psta->wpa_ie[0] == WLAN_EID_RSN) || (psta->wpa_ie[0] == WLAN_EID_VENDOR_SPECIFIC)) { 3428 int wpa_ie_len; 3429 int copy_len; 3430 3431 wpa_ie_len = psta->wpa_ie[1]; 3432 3433 copy_len = ((wpa_ie_len+2) > sizeof(psta->wpa_ie)) ? (sizeof(psta->wpa_ie)):(wpa_ie_len+2); 3434 3435 param->u.wpa_ie.len = copy_len; 3436 3437 memcpy(param->u.wpa_ie.reserved, psta->wpa_ie, copy_len); 3438 } 3439 } else { 3440 ret = -1; 3441 } 3442 3443 return ret; 3444 3445 } 3446 3447 static int rtw_set_wps_beacon(struct net_device *dev, struct ieee_param *param, int len) 3448 { 3449 int ret = 0; 3450 unsigned char wps_oui[4] = {0x0, 0x50, 0xf2, 0x04}; 3451 struct adapter *padapter = rtw_netdev_priv(dev); 3452 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3453 struct mlme_ext_priv *pmlmeext = &(padapter->mlmeextpriv); 3454 int ie_len; 3455 3456 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true) 3457 return -EINVAL; 3458 3459 ie_len = len-12-2;/* 12 = param header, 2:no packed */ 3460 3461 3462 kfree(pmlmepriv->wps_beacon_ie); 3463 pmlmepriv->wps_beacon_ie = NULL; 3464 3465 if (ie_len > 0) { 3466 pmlmepriv->wps_beacon_ie = rtw_malloc(ie_len); 3467 pmlmepriv->wps_beacon_ie_len = ie_len; 3468 if (!pmlmepriv->wps_beacon_ie) 3469 return -EINVAL; 3470 3471 memcpy(pmlmepriv->wps_beacon_ie, param->u.bcn_ie.buf, ie_len); 3472 3473 update_beacon(padapter, WLAN_EID_VENDOR_SPECIFIC, wps_oui, true); 3474 3475 pmlmeext->bstart_bss = true; 3476 } 3477 3478 3479 return ret; 3480 3481 } 3482 3483 static int rtw_set_wps_probe_resp(struct net_device *dev, struct ieee_param *param, int len) 3484 { 3485 int ret = 0; 3486 struct adapter *padapter = rtw_netdev_priv(dev); 3487 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3488 int ie_len; 3489 3490 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true) 3491 return -EINVAL; 3492 3493 ie_len = len-12-2;/* 12 = param header, 2:no packed */ 3494 3495 3496 kfree(pmlmepriv->wps_probe_resp_ie); 3497 pmlmepriv->wps_probe_resp_ie = NULL; 3498 3499 if (ie_len > 0) { 3500 pmlmepriv->wps_probe_resp_ie = rtw_malloc(ie_len); 3501 pmlmepriv->wps_probe_resp_ie_len = ie_len; 3502 if (!pmlmepriv->wps_probe_resp_ie) 3503 return -EINVAL; 3504 3505 memcpy(pmlmepriv->wps_probe_resp_ie, param->u.bcn_ie.buf, ie_len); 3506 } 3507 3508 3509 return ret; 3510 3511 } 3512 3513 static int rtw_set_wps_assoc_resp(struct net_device *dev, struct ieee_param *param, int len) 3514 { 3515 int ret = 0; 3516 struct adapter *padapter = rtw_netdev_priv(dev); 3517 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3518 int ie_len; 3519 3520 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true) 3521 return -EINVAL; 3522 3523 ie_len = len-12-2;/* 12 = param header, 2:no packed */ 3524 3525 3526 kfree(pmlmepriv->wps_assoc_resp_ie); 3527 pmlmepriv->wps_assoc_resp_ie = NULL; 3528 3529 if (ie_len > 0) { 3530 pmlmepriv->wps_assoc_resp_ie = rtw_malloc(ie_len); 3531 pmlmepriv->wps_assoc_resp_ie_len = ie_len; 3532 if (!pmlmepriv->wps_assoc_resp_ie) 3533 return -EINVAL; 3534 3535 memcpy(pmlmepriv->wps_assoc_resp_ie, param->u.bcn_ie.buf, ie_len); 3536 } 3537 3538 3539 return ret; 3540 3541 } 3542 3543 static int rtw_set_hidden_ssid(struct net_device *dev, struct ieee_param *param, int len) 3544 { 3545 int ret = 0; 3546 struct adapter *adapter = rtw_netdev_priv(dev); 3547 struct mlme_priv *mlmepriv = &(adapter->mlmepriv); 3548 struct mlme_ext_priv *mlmeext = &(adapter->mlmeextpriv); 3549 struct mlme_ext_info *mlmeinfo = &(mlmeext->mlmext_info); 3550 int ie_len; 3551 u8 *ssid_ie; 3552 char ssid[NDIS_802_11_LENGTH_SSID + 1]; 3553 signed int ssid_len; 3554 u8 ignore_broadcast_ssid; 3555 3556 if (check_fwstate(mlmepriv, WIFI_AP_STATE) != true) 3557 return -EPERM; 3558 3559 if (param->u.bcn_ie.reserved[0] != 0xea) 3560 return -EINVAL; 3561 3562 mlmeinfo->hidden_ssid_mode = ignore_broadcast_ssid = param->u.bcn_ie.reserved[1]; 3563 3564 ie_len = len-12-2;/* 12 = param header, 2:no packed */ 3565 ssid_ie = rtw_get_ie(param->u.bcn_ie.buf, WLAN_EID_SSID, &ssid_len, ie_len); 3566 3567 if (ssid_ie && ssid_len > 0 && ssid_len <= NDIS_802_11_LENGTH_SSID) { 3568 struct wlan_bssid_ex *pbss_network = &mlmepriv->cur_network.network; 3569 struct wlan_bssid_ex *pbss_network_ext = &mlmeinfo->network; 3570 3571 memcpy(ssid, ssid_ie+2, ssid_len); 3572 ssid[ssid_len] = 0x0; 3573 3574 memcpy(pbss_network->Ssid.Ssid, (void *)ssid, ssid_len); 3575 pbss_network->Ssid.SsidLength = ssid_len; 3576 memcpy(pbss_network_ext->Ssid.Ssid, (void *)ssid, ssid_len); 3577 pbss_network_ext->Ssid.SsidLength = ssid_len; 3578 } 3579 3580 return ret; 3581 } 3582 3583 static int rtw_ioctl_acl_remove_sta(struct net_device *dev, struct ieee_param *param, int len) 3584 { 3585 struct adapter *padapter = rtw_netdev_priv(dev); 3586 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3587 3588 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true) 3589 return -EINVAL; 3590 3591 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff && 3592 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff && 3593 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) { 3594 return -EINVAL; 3595 } 3596 3597 rtw_acl_remove_sta(padapter, param->sta_addr); 3598 return 0; 3599 3600 } 3601 3602 static int rtw_ioctl_acl_add_sta(struct net_device *dev, struct ieee_param *param, int len) 3603 { 3604 struct adapter *padapter = rtw_netdev_priv(dev); 3605 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3606 3607 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true) 3608 return -EINVAL; 3609 3610 if (param->sta_addr[0] == 0xff && param->sta_addr[1] == 0xff && 3611 param->sta_addr[2] == 0xff && param->sta_addr[3] == 0xff && 3612 param->sta_addr[4] == 0xff && param->sta_addr[5] == 0xff) { 3613 return -EINVAL; 3614 } 3615 3616 return rtw_acl_add_sta(padapter, param->sta_addr); 3617 3618 } 3619 3620 static int rtw_ioctl_set_macaddr_acl(struct net_device *dev, struct ieee_param *param, int len) 3621 { 3622 int ret = 0; 3623 struct adapter *padapter = rtw_netdev_priv(dev); 3624 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3625 3626 if (check_fwstate(pmlmepriv, WIFI_AP_STATE) != true) 3627 return -EINVAL; 3628 3629 rtw_set_macaddr_acl(padapter, param->u.mlme.command); 3630 3631 return ret; 3632 } 3633 3634 static int rtw_hostapd_ioctl(struct net_device *dev, struct iw_point *p) 3635 { 3636 struct ieee_param *param; 3637 int ret = 0; 3638 struct adapter *padapter = rtw_netdev_priv(dev); 3639 3640 /* 3641 * this function is expect to call in master mode, which allows no power saving 3642 * so, we just check hw_init_completed 3643 */ 3644 3645 if (!padapter->hw_init_completed) 3646 return -EPERM; 3647 3648 if (!p->pointer || p->length != sizeof(*param)) 3649 return -EINVAL; 3650 3651 param = rtw_malloc(p->length); 3652 if (param == NULL) 3653 return -ENOMEM; 3654 3655 if (copy_from_user(param, p->pointer, p->length)) { 3656 kfree(param); 3657 return -EFAULT; 3658 } 3659 3660 switch (param->cmd) { 3661 case RTL871X_HOSTAPD_FLUSH: 3662 3663 rtw_hostapd_sta_flush(dev); 3664 3665 break; 3666 3667 case RTL871X_HOSTAPD_ADD_STA: 3668 3669 ret = rtw_add_sta(dev, param); 3670 3671 break; 3672 3673 case RTL871X_HOSTAPD_REMOVE_STA: 3674 3675 ret = rtw_del_sta(dev, param); 3676 3677 break; 3678 3679 case RTL871X_HOSTAPD_SET_BEACON: 3680 3681 ret = rtw_set_beacon(dev, param, p->length); 3682 3683 break; 3684 3685 case RTL871X_SET_ENCRYPTION: 3686 3687 ret = rtw_set_encryption(dev, param, p->length); 3688 3689 break; 3690 3691 case RTL871X_HOSTAPD_GET_WPAIE_STA: 3692 3693 ret = rtw_get_sta_wpaie(dev, param); 3694 3695 break; 3696 3697 case RTL871X_HOSTAPD_SET_WPS_BEACON: 3698 3699 ret = rtw_set_wps_beacon(dev, param, p->length); 3700 3701 break; 3702 3703 case RTL871X_HOSTAPD_SET_WPS_PROBE_RESP: 3704 3705 ret = rtw_set_wps_probe_resp(dev, param, p->length); 3706 3707 break; 3708 3709 case RTL871X_HOSTAPD_SET_WPS_ASSOC_RESP: 3710 3711 ret = rtw_set_wps_assoc_resp(dev, param, p->length); 3712 3713 break; 3714 3715 case RTL871X_HOSTAPD_SET_HIDDEN_SSID: 3716 3717 ret = rtw_set_hidden_ssid(dev, param, p->length); 3718 3719 break; 3720 3721 case RTL871X_HOSTAPD_GET_INFO_STA: 3722 3723 ret = rtw_ioctl_get_sta_data(dev, param, p->length); 3724 3725 break; 3726 3727 case RTL871X_HOSTAPD_SET_MACADDR_ACL: 3728 3729 ret = rtw_ioctl_set_macaddr_acl(dev, param, p->length); 3730 3731 break; 3732 3733 case RTL871X_HOSTAPD_ACL_ADD_STA: 3734 3735 ret = rtw_ioctl_acl_add_sta(dev, param, p->length); 3736 3737 break; 3738 3739 case RTL871X_HOSTAPD_ACL_REMOVE_STA: 3740 3741 ret = rtw_ioctl_acl_remove_sta(dev, param, p->length); 3742 3743 break; 3744 3745 default: 3746 ret = -EOPNOTSUPP; 3747 break; 3748 3749 } 3750 3751 if (ret == 0 && copy_to_user(p->pointer, param, p->length)) 3752 ret = -EFAULT; 3753 3754 kfree(param); 3755 return ret; 3756 } 3757 3758 static int rtw_wx_set_priv(struct net_device *dev, 3759 struct iw_request_info *info, 3760 union iwreq_data *awrq, 3761 char *extra) 3762 { 3763 3764 #ifdef DEBUG_RTW_WX_SET_PRIV 3765 char *ext_dbg; 3766 #endif 3767 3768 int ret = 0; 3769 int len = 0; 3770 char *ext; 3771 3772 struct adapter *padapter = rtw_netdev_priv(dev); 3773 struct iw_point *dwrq = (struct iw_point *)awrq; 3774 3775 if (dwrq->length == 0) 3776 return -EFAULT; 3777 3778 len = dwrq->length; 3779 ext = vmalloc(len); 3780 if (!ext) 3781 return -ENOMEM; 3782 3783 if (copy_from_user(ext, dwrq->pointer, len)) { 3784 vfree(ext); 3785 return -EFAULT; 3786 } 3787 3788 #ifdef DEBUG_RTW_WX_SET_PRIV 3789 ext_dbg = vmalloc(len); 3790 if (!ext_dbg) { 3791 vfree(ext, len); 3792 return -ENOMEM; 3793 } 3794 3795 memcpy(ext_dbg, ext, len); 3796 #endif 3797 3798 /* added for wps2.0 @20110524 */ 3799 if (dwrq->flags == 0x8766 && len > 8) { 3800 u32 cp_sz; 3801 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv); 3802 u8 *probereq_wpsie = ext; 3803 int probereq_wpsie_len = len; 3804 u8 wps_oui[4] = {0x0, 0x50, 0xf2, 0x04}; 3805 3806 if ((WLAN_EID_VENDOR_SPECIFIC == probereq_wpsie[0]) && 3807 (!memcmp(&probereq_wpsie[2], wps_oui, 4))) { 3808 cp_sz = probereq_wpsie_len > MAX_WPS_IE_LEN ? MAX_WPS_IE_LEN : probereq_wpsie_len; 3809 3810 if (pmlmepriv->wps_probe_req_ie) { 3811 pmlmepriv->wps_probe_req_ie_len = 0; 3812 kfree(pmlmepriv->wps_probe_req_ie); 3813 pmlmepriv->wps_probe_req_ie = NULL; 3814 } 3815 3816 pmlmepriv->wps_probe_req_ie = rtw_malloc(cp_sz); 3817 if (pmlmepriv->wps_probe_req_ie == NULL) { 3818 printk("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__); 3819 ret = -EINVAL; 3820 goto FREE_EXT; 3821 3822 } 3823 3824 memcpy(pmlmepriv->wps_probe_req_ie, probereq_wpsie, cp_sz); 3825 pmlmepriv->wps_probe_req_ie_len = cp_sz; 3826 3827 } 3828 3829 goto FREE_EXT; 3830 3831 } 3832 3833 if (len >= WEXT_CSCAN_HEADER_SIZE 3834 && !memcmp(ext, WEXT_CSCAN_HEADER, WEXT_CSCAN_HEADER_SIZE)) { 3835 ret = rtw_wx_set_scan(dev, info, awrq, ext); 3836 goto FREE_EXT; 3837 } 3838 3839 FREE_EXT: 3840 3841 vfree(ext); 3842 #ifdef DEBUG_RTW_WX_SET_PRIV 3843 vfree(ext_dbg); 3844 #endif 3845 3846 return ret; 3847 3848 } 3849 3850 static int rtw_pm_set(struct net_device *dev, 3851 struct iw_request_info *info, 3852 union iwreq_data *wrqu, char *extra) 3853 { 3854 int ret = 0; 3855 unsigned mode = 0; 3856 struct adapter *padapter = rtw_netdev_priv(dev); 3857 3858 if (!memcmp(extra, "lps =", 4)) { 3859 sscanf(extra+4, "%u", &mode); 3860 ret = rtw_pm_set_lps(padapter, mode); 3861 } else if (!memcmp(extra, "ips =", 4)) { 3862 sscanf(extra+4, "%u", &mode); 3863 ret = rtw_pm_set_ips(padapter, mode); 3864 } else { 3865 ret = -EINVAL; 3866 } 3867 3868 return ret; 3869 } 3870 3871 static int rtw_test( 3872 struct net_device *dev, 3873 struct iw_request_info *info, 3874 union iwreq_data *wrqu, char *extra) 3875 { 3876 u32 len; 3877 u8 *pbuf, *pch; 3878 char *ptmp; 3879 u8 *delim = ","; 3880 struct adapter *padapter = rtw_netdev_priv(dev); 3881 3882 3883 len = wrqu->data.length; 3884 3885 pbuf = rtw_zmalloc(len); 3886 if (!pbuf) 3887 return -ENOMEM; 3888 3889 if (copy_from_user(pbuf, wrqu->data.pointer, len)) { 3890 kfree(pbuf); 3891 return -EFAULT; 3892 } 3893 3894 ptmp = (char *)pbuf; 3895 pch = strsep(&ptmp, delim); 3896 if ((pch == NULL) || (strlen(pch) == 0)) { 3897 kfree(pbuf); 3898 return -EFAULT; 3899 } 3900 3901 if (strcmp(pch, "bton") == 0) 3902 hal_btcoex_SetManualControl(padapter, false); 3903 3904 if (strcmp(pch, "btoff") == 0) 3905 hal_btcoex_SetManualControl(padapter, true); 3906 3907 if (strcmp(pch, "h2c") == 0) { 3908 u8 param[8]; 3909 u8 count = 0; 3910 u32 tmp; 3911 u8 i; 3912 u32 pos; 3913 s32 ret; 3914 3915 3916 do { 3917 pch = strsep(&ptmp, delim); 3918 if ((pch == NULL) || (strlen(pch) == 0)) 3919 break; 3920 3921 sscanf(pch, "%x", &tmp); 3922 param[count++] = (u8)tmp; 3923 } while (count < 8); 3924 3925 if (count == 0) { 3926 kfree(pbuf); 3927 return -EFAULT; 3928 } 3929 3930 ret = rtw_hal_fill_h2c_cmd(padapter, param[0], count-1, ¶m[1]); 3931 3932 pos = sprintf(extra, "H2C ID = 0x%02x content =", param[0]); 3933 for (i = 1; i < count; i++) 3934 pos += sprintf(extra+pos, "%02x,", param[i]); 3935 extra[pos] = 0; 3936 pos--; 3937 pos += sprintf(extra+pos, " %s", ret == _FAIL?"FAIL":"OK"); 3938 3939 wrqu->data.length = strlen(extra) + 1; 3940 } 3941 3942 kfree(pbuf); 3943 return 0; 3944 } 3945 3946 static iw_handler rtw_handlers[] = { 3947 NULL, /* SIOCSIWCOMMIT */ 3948 rtw_wx_get_name, /* SIOCGIWNAME */ 3949 dummy, /* SIOCSIWNWID */ 3950 dummy, /* SIOCGIWNWID */ 3951 rtw_wx_set_freq, /* SIOCSIWFREQ */ 3952 rtw_wx_get_freq, /* SIOCGIWFREQ */ 3953 rtw_wx_set_mode, /* SIOCSIWMODE */ 3954 rtw_wx_get_mode, /* SIOCGIWMODE */ 3955 dummy, /* SIOCSIWSENS */ 3956 rtw_wx_get_sens, /* SIOCGIWSENS */ 3957 NULL, /* SIOCSIWRANGE */ 3958 rtw_wx_get_range, /* SIOCGIWRANGE */ 3959 rtw_wx_set_priv, /* SIOCSIWPRIV */ 3960 NULL, /* SIOCGIWPRIV */ 3961 NULL, /* SIOCSIWSTATS */ 3962 NULL, /* SIOCGIWSTATS */ 3963 dummy, /* SIOCSIWSPY */ 3964 dummy, /* SIOCGIWSPY */ 3965 NULL, /* SIOCGIWTHRSPY */ 3966 NULL, /* SIOCWIWTHRSPY */ 3967 rtw_wx_set_wap, /* SIOCSIWAP */ 3968 rtw_wx_get_wap, /* SIOCGIWAP */ 3969 rtw_wx_set_mlme, /* request MLME operation; uses struct iw_mlme */ 3970 dummy, /* SIOCGIWAPLIST -- depricated */ 3971 rtw_wx_set_scan, /* SIOCSIWSCAN */ 3972 rtw_wx_get_scan, /* SIOCGIWSCAN */ 3973 rtw_wx_set_essid, /* SIOCSIWESSID */ 3974 rtw_wx_get_essid, /* SIOCGIWESSID */ 3975 dummy, /* SIOCSIWNICKN */ 3976 rtw_wx_get_nick, /* SIOCGIWNICKN */ 3977 NULL, /* -- hole -- */ 3978 NULL, /* -- hole -- */ 3979 rtw_wx_set_rate, /* SIOCSIWRATE */ 3980 rtw_wx_get_rate, /* SIOCGIWRATE */ 3981 rtw_wx_set_rts, /* SIOCSIWRTS */ 3982 rtw_wx_get_rts, /* SIOCGIWRTS */ 3983 rtw_wx_set_frag, /* SIOCSIWFRAG */ 3984 rtw_wx_get_frag, /* SIOCGIWFRAG */ 3985 dummy, /* SIOCSIWTXPOW */ 3986 dummy, /* SIOCGIWTXPOW */ 3987 dummy, /* SIOCSIWRETRY */ 3988 rtw_wx_get_retry, /* SIOCGIWRETRY */ 3989 rtw_wx_set_enc, /* SIOCSIWENCODE */ 3990 rtw_wx_get_enc, /* SIOCGIWENCODE */ 3991 dummy, /* SIOCSIWPOWER */ 3992 rtw_wx_get_power, /* SIOCGIWPOWER */ 3993 NULL, /*---hole---*/ 3994 NULL, /*---hole---*/ 3995 rtw_wx_set_gen_ie, /* SIOCSIWGENIE */ 3996 NULL, /* SIOCGWGENIE */ 3997 rtw_wx_set_auth, /* SIOCSIWAUTH */ 3998 NULL, /* SIOCGIWAUTH */ 3999 rtw_wx_set_enc_ext, /* SIOCSIWENCODEEXT */ 4000 NULL, /* SIOCGIWENCODEEXT */ 4001 rtw_wx_set_pmkid, /* SIOCSIWPMKSA */ 4002 NULL, /*---hole---*/ 4003 }; 4004 4005 static const struct iw_priv_args rtw_private_args[] = { 4006 { 4007 SIOCIWFIRSTPRIV + 0x0, 4008 IW_PRIV_TYPE_CHAR | 0x7FF, 0, "write" 4009 }, 4010 { 4011 SIOCIWFIRSTPRIV + 0x1, 4012 IW_PRIV_TYPE_CHAR | 0x7FF, 4013 IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | IFNAMSIZ, "read" 4014 }, 4015 { 4016 SIOCIWFIRSTPRIV + 0x2, 0, 0, "driver_ext" 4017 }, 4018 { 4019 SIOCIWFIRSTPRIV + 0x3, 0, 0, "mp_ioctl" 4020 }, 4021 { 4022 SIOCIWFIRSTPRIV + 0x4, 4023 IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "apinfo" 4024 }, 4025 { 4026 SIOCIWFIRSTPRIV + 0x5, 4027 IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 2, 0, "setpid" 4028 }, 4029 { 4030 SIOCIWFIRSTPRIV + 0x6, 4031 IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "wps_start" 4032 }, 4033 /* for PLATFORM_MT53XX */ 4034 { 4035 SIOCIWFIRSTPRIV + 0x7, 4036 IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "get_sensitivity" 4037 }, 4038 { 4039 SIOCIWFIRSTPRIV + 0x8, 4040 IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "wps_prob_req_ie" 4041 }, 4042 { 4043 SIOCIWFIRSTPRIV + 0x9, 4044 IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "wps_assoc_req_ie" 4045 }, 4046 4047 /* for RTK_DMP_PLATFORM */ 4048 { 4049 SIOCIWFIRSTPRIV + 0xA, 4050 IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 1, 0, "channel_plan" 4051 }, 4052 4053 { 4054 SIOCIWFIRSTPRIV + 0xB, 4055 IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 2, 0, "dbg" 4056 }, 4057 { 4058 SIOCIWFIRSTPRIV + 0xC, 4059 IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 3, 0, "rfw" 4060 }, 4061 { 4062 SIOCIWFIRSTPRIV + 0xD, 4063 IW_PRIV_TYPE_INT | IW_PRIV_SIZE_FIXED | 2, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_FIXED | IFNAMSIZ, "rfr" 4064 }, 4065 { 4066 SIOCIWFIRSTPRIV + 0x10, 4067 IW_PRIV_TYPE_CHAR | 1024, 0, "p2p_set" 4068 }, 4069 { 4070 SIOCIWFIRSTPRIV + 0x11, 4071 IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "p2p_get" 4072 }, 4073 { 4074 SIOCIWFIRSTPRIV + 0x12, 0, 0, "NULL" 4075 }, 4076 { 4077 SIOCIWFIRSTPRIV + 0x13, 4078 IW_PRIV_TYPE_CHAR | 64, IW_PRIV_TYPE_CHAR | 64, "p2p_get2" 4079 }, 4080 { 4081 SIOCIWFIRSTPRIV + 0x14, 4082 IW_PRIV_TYPE_CHAR | 64, 0, "tdls" 4083 }, 4084 { 4085 SIOCIWFIRSTPRIV + 0x15, 4086 IW_PRIV_TYPE_CHAR | 1024, IW_PRIV_TYPE_CHAR | 1024, "tdls_get" 4087 }, 4088 { 4089 SIOCIWFIRSTPRIV + 0x16, 4090 IW_PRIV_TYPE_CHAR | 64, 0, "pm_set" 4091 }, 4092 4093 {SIOCIWFIRSTPRIV + 0x18, IW_PRIV_TYPE_CHAR | IFNAMSIZ, 0, "rereg_nd_name"}, 4094 {SIOCIWFIRSTPRIV + 0x1A, IW_PRIV_TYPE_CHAR | 1024, 0, "efuse_set"}, 4095 {SIOCIWFIRSTPRIV + 0x1B, IW_PRIV_TYPE_CHAR | 128, IW_PRIV_TYPE_CHAR | IW_PRIV_SIZE_MASK, "efuse_get"}, 4096 { 4097 SIOCIWFIRSTPRIV + 0x1D, 4098 IW_PRIV_TYPE_CHAR | 40, IW_PRIV_TYPE_CHAR | 0x7FF, "test" 4099 }, 4100 }; 4101 4102 static iw_handler rtw_private_handler[] = { 4103 rtw_wx_write32, /* 0x00 */ 4104 rtw_wx_read32, /* 0x01 */ 4105 rtw_drvext_hdl, /* 0x02 */ 4106 NULL, /* 0x03 */ 4107 4108 /* for MM DTV platform */ 4109 rtw_get_ap_info, /* 0x04 */ 4110 4111 rtw_set_pid, /* 0x05 */ 4112 rtw_wps_start, /* 0x06 */ 4113 4114 /* for PLATFORM_MT53XX */ 4115 rtw_wx_get_sensitivity, /* 0x07 */ 4116 rtw_wx_set_mtk_wps_probe_ie, /* 0x08 */ 4117 rtw_wx_set_mtk_wps_ie, /* 0x09 */ 4118 4119 /* for RTK_DMP_PLATFORM */ 4120 /* Set Channel depend on the country code */ 4121 rtw_wx_set_channel_plan, /* 0x0A */ 4122 4123 rtw_dbg_port, /* 0x0B */ 4124 rtw_wx_write_rf, /* 0x0C */ 4125 rtw_wx_read_rf, /* 0x0D */ 4126 rtw_wx_priv_null, /* 0x0E */ 4127 rtw_wx_priv_null, /* 0x0F */ 4128 rtw_p2p_set, /* 0x10 */ 4129 rtw_p2p_get, /* 0x11 */ 4130 NULL, /* 0x12 */ 4131 rtw_p2p_get2, /* 0x13 */ 4132 4133 NULL, /* 0x14 */ 4134 NULL, /* 0x15 */ 4135 4136 rtw_pm_set, /* 0x16 */ 4137 rtw_wx_priv_null, /* 0x17 */ 4138 rtw_rereg_nd_name, /* 0x18 */ 4139 rtw_wx_priv_null, /* 0x19 */ 4140 NULL, /* 0x1A */ 4141 NULL, /* 0x1B */ 4142 NULL, /* 0x1C is reserved for hostapd */ 4143 rtw_test, /* 0x1D */ 4144 }; 4145 4146 static struct iw_statistics *rtw_get_wireless_stats(struct net_device *dev) 4147 { 4148 struct adapter *padapter = rtw_netdev_priv(dev); 4149 struct iw_statistics *piwstats = &padapter->iwstats; 4150 int tmp_level = 0; 4151 int tmp_qual = 0; 4152 int tmp_noise = 0; 4153 4154 if (check_fwstate(&padapter->mlmepriv, _FW_LINKED) != true) { 4155 piwstats->qual.qual = 0; 4156 piwstats->qual.level = 0; 4157 piwstats->qual.noise = 0; 4158 } else { 4159 tmp_level = padapter->recvpriv.signal_strength; 4160 tmp_qual = padapter->recvpriv.signal_qual; 4161 tmp_noise = padapter->recvpriv.noise; 4162 4163 piwstats->qual.level = tmp_level; 4164 piwstats->qual.qual = tmp_qual; 4165 piwstats->qual.noise = tmp_noise; 4166 } 4167 piwstats->qual.updated = IW_QUAL_ALL_UPDATED ;/* IW_QUAL_DBM; */ 4168 4169 return &padapter->iwstats; 4170 } 4171 4172 struct iw_handler_def rtw_handlers_def = { 4173 .standard = rtw_handlers, 4174 .num_standard = ARRAY_SIZE(rtw_handlers), 4175 #if defined(CONFIG_WEXT_PRIV) 4176 .private = rtw_private_handler, 4177 .private_args = (struct iw_priv_args *)rtw_private_args, 4178 .num_private = ARRAY_SIZE(rtw_private_handler), 4179 .num_private_args = ARRAY_SIZE(rtw_private_args), 4180 #endif 4181 .get_wireless_stats = rtw_get_wireless_stats, 4182 }; 4183 4184 /* copy from net/wireless/wext.c start */ 4185 /* ---------------------------------------------------------------- */ 4186 /* 4187 * Calculate size of private arguments 4188 */ 4189 static const char iw_priv_type_size[] = { 4190 0, /* IW_PRIV_TYPE_NONE */ 4191 1, /* IW_PRIV_TYPE_BYTE */ 4192 1, /* IW_PRIV_TYPE_CHAR */ 4193 0, /* Not defined */ 4194 sizeof(__u32), /* IW_PRIV_TYPE_INT */ 4195 sizeof(struct iw_freq), /* IW_PRIV_TYPE_FLOAT */ 4196 sizeof(struct sockaddr), /* IW_PRIV_TYPE_ADDR */ 4197 0, /* Not defined */ 4198 }; 4199 4200 static int get_priv_size(__u16 args) 4201 { 4202 int num = args & IW_PRIV_SIZE_MASK; 4203 int type = (args & IW_PRIV_TYPE_MASK) >> 12; 4204 4205 return num * iw_priv_type_size[type]; 4206 } 4207 /* copy from net/wireless/wext.c end */ 4208 4209 static int rtw_ioctl_wext_private(struct net_device *dev, union iwreq_data *wrq_data) 4210 { 4211 int err = 0; 4212 u8 *input = NULL; 4213 u32 input_len = 0; 4214 const char delim[] = " "; 4215 u8 *output = NULL; 4216 u32 output_len = 0; 4217 u32 count = 0; 4218 u8 *buffer = NULL; 4219 u32 buffer_len = 0; 4220 char *ptr = NULL; 4221 u8 cmdname[17] = {0}; /* IFNAMSIZ+1 */ 4222 u32 cmdlen; 4223 s32 len; 4224 u8 *extra = NULL; 4225 u32 extra_size = 0; 4226 4227 s32 k; 4228 const iw_handler *priv; /* Private ioctl */ 4229 const struct iw_priv_args *priv_args; /* Private ioctl description */ 4230 u32 num_priv_args; /* Number of descriptions */ 4231 iw_handler handler; 4232 int temp; 4233 int subcmd = 0; /* sub-ioctl index */ 4234 int offset = 0; /* Space for sub-ioctl index */ 4235 4236 union iwreq_data wdata; 4237 4238 4239 memcpy(&wdata, wrq_data, sizeof(wdata)); 4240 4241 input_len = 2048; 4242 input = rtw_zmalloc(input_len); 4243 if (NULL == input) 4244 return -ENOMEM; 4245 if (copy_from_user(input, wdata.data.pointer, input_len)) { 4246 err = -EFAULT; 4247 goto exit; 4248 } 4249 ptr = input; 4250 len = strlen(input); 4251 4252 sscanf(ptr, "%16s", cmdname); 4253 cmdlen = strlen(cmdname); 4254 4255 /* skip command string */ 4256 if (cmdlen > 0) 4257 cmdlen += 1; /* skip one space */ 4258 ptr += cmdlen; 4259 len -= cmdlen; 4260 4261 priv = rtw_private_handler; 4262 priv_args = rtw_private_args; 4263 num_priv_args = ARRAY_SIZE(rtw_private_args); 4264 4265 if (num_priv_args == 0) { 4266 err = -EOPNOTSUPP; 4267 goto exit; 4268 } 4269 4270 /* Search the correct ioctl */ 4271 k = -1; 4272 while ((++k < num_priv_args) && strcmp(priv_args[k].name, cmdname)); 4273 4274 /* If not found... */ 4275 if (k == num_priv_args) { 4276 err = -EOPNOTSUPP; 4277 goto exit; 4278 } 4279 4280 /* Watch out for sub-ioctls ! */ 4281 if (priv_args[k].cmd < SIOCDEVPRIVATE) { 4282 int j = -1; 4283 4284 /* Find the matching *real* ioctl */ 4285 while ((++j < num_priv_args) && ((priv_args[j].name[0] != '\0') || 4286 (priv_args[j].set_args != priv_args[k].set_args) || 4287 (priv_args[j].get_args != priv_args[k].get_args))); 4288 4289 /* If not found... */ 4290 if (j == num_priv_args) { 4291 err = -EINVAL; 4292 goto exit; 4293 } 4294 4295 /* Save sub-ioctl number */ 4296 subcmd = priv_args[k].cmd; 4297 /* Reserve one int (simplify alignment issues) */ 4298 offset = sizeof(__u32); 4299 /* Use real ioctl definition from now on */ 4300 k = j; 4301 } 4302 4303 buffer = rtw_zmalloc(4096); 4304 if (NULL == buffer) { 4305 err = -ENOMEM; 4306 goto exit; 4307 } 4308 4309 /* If we have to set some data */ 4310 if ((priv_args[k].set_args & IW_PRIV_TYPE_MASK) && 4311 (priv_args[k].set_args & IW_PRIV_SIZE_MASK)) { 4312 u8 *str; 4313 4314 switch (priv_args[k].set_args & IW_PRIV_TYPE_MASK) { 4315 case IW_PRIV_TYPE_BYTE: 4316 /* Fetch args */ 4317 count = 0; 4318 do { 4319 str = strsep(&ptr, delim); 4320 if (NULL == str) 4321 break; 4322 sscanf(str, "%i", &temp); 4323 buffer[count++] = (u8)temp; 4324 } while (1); 4325 buffer_len = count; 4326 4327 /* Number of args to fetch */ 4328 wdata.data.length = count; 4329 if (wdata.data.length > (priv_args[k].set_args & IW_PRIV_SIZE_MASK)) 4330 wdata.data.length = priv_args[k].set_args & IW_PRIV_SIZE_MASK; 4331 4332 break; 4333 4334 case IW_PRIV_TYPE_INT: 4335 /* Fetch args */ 4336 count = 0; 4337 do { 4338 str = strsep(&ptr, delim); 4339 if (NULL == str) 4340 break; 4341 sscanf(str, "%i", &temp); 4342 ((s32 *)buffer)[count++] = (s32)temp; 4343 } while (1); 4344 buffer_len = count * sizeof(s32); 4345 4346 /* Number of args to fetch */ 4347 wdata.data.length = count; 4348 if (wdata.data.length > (priv_args[k].set_args & IW_PRIV_SIZE_MASK)) 4349 wdata.data.length = priv_args[k].set_args & IW_PRIV_SIZE_MASK; 4350 4351 break; 4352 4353 case IW_PRIV_TYPE_CHAR: 4354 if (len > 0) { 4355 /* Size of the string to fetch */ 4356 wdata.data.length = len; 4357 if (wdata.data.length > (priv_args[k].set_args & IW_PRIV_SIZE_MASK)) 4358 wdata.data.length = priv_args[k].set_args & IW_PRIV_SIZE_MASK; 4359 4360 /* Fetch string */ 4361 memcpy(buffer, ptr, wdata.data.length); 4362 } else { 4363 wdata.data.length = 1; 4364 buffer[0] = '\0'; 4365 } 4366 buffer_len = wdata.data.length; 4367 break; 4368 4369 default: 4370 err = -1; 4371 goto exit; 4372 } 4373 4374 if ((priv_args[k].set_args & IW_PRIV_SIZE_FIXED) && 4375 (wdata.data.length != (priv_args[k].set_args & IW_PRIV_SIZE_MASK))) { 4376 err = -EINVAL; 4377 goto exit; 4378 } 4379 } else { /* if args to set */ 4380 wdata.data.length = 0L; 4381 } 4382 4383 /* Those two tests are important. They define how the driver 4384 * will have to handle the data */ 4385 if ((priv_args[k].set_args & IW_PRIV_SIZE_FIXED) && 4386 ((get_priv_size(priv_args[k].set_args) + offset) <= IFNAMSIZ)) { 4387 /* First case : all SET args fit within wrq */ 4388 if (offset) 4389 wdata.mode = subcmd; 4390 memcpy(wdata.name + offset, buffer, IFNAMSIZ - offset); 4391 } else { 4392 if ((priv_args[k].set_args == 0) && 4393 (priv_args[k].get_args & IW_PRIV_SIZE_FIXED) && 4394 (get_priv_size(priv_args[k].get_args) <= IFNAMSIZ)) { 4395 /* Second case : no SET args, GET args fit within wrq */ 4396 if (offset) 4397 wdata.mode = subcmd; 4398 } else { 4399 /* Third case : args won't fit in wrq, or variable number of args */ 4400 if (copy_to_user(wdata.data.pointer, buffer, buffer_len)) { 4401 err = -EFAULT; 4402 goto exit; 4403 } 4404 wdata.data.flags = subcmd; 4405 } 4406 } 4407 4408 kfree(input); 4409 input = NULL; 4410 4411 extra_size = 0; 4412 if (IW_IS_SET(priv_args[k].cmd)) { 4413 /* Size of set arguments */ 4414 extra_size = get_priv_size(priv_args[k].set_args); 4415 4416 /* Does it fits in iwr ? */ 4417 if ((priv_args[k].set_args & IW_PRIV_SIZE_FIXED) && 4418 ((extra_size + offset) <= IFNAMSIZ)) 4419 extra_size = 0; 4420 } else { 4421 /* Size of get arguments */ 4422 extra_size = get_priv_size(priv_args[k].get_args); 4423 4424 /* Does it fits in iwr ? */ 4425 if ((priv_args[k].get_args & IW_PRIV_SIZE_FIXED) && 4426 (extra_size <= IFNAMSIZ)) 4427 extra_size = 0; 4428 } 4429 4430 if (extra_size == 0) { 4431 extra = (u8 *)&wdata; 4432 kfree(buffer); 4433 buffer = NULL; 4434 } else 4435 extra = buffer; 4436 4437 handler = priv[priv_args[k].cmd - SIOCIWFIRSTPRIV]; 4438 err = handler(dev, NULL, &wdata, extra); 4439 4440 /* If we have to get some data */ 4441 if ((priv_args[k].get_args & IW_PRIV_TYPE_MASK) && 4442 (priv_args[k].get_args & IW_PRIV_SIZE_MASK)) { 4443 int j; 4444 int n = 0; /* number of args */ 4445 u8 str[20] = {0}; 4446 4447 /* Check where is the returned data */ 4448 if ((priv_args[k].get_args & IW_PRIV_SIZE_FIXED) && 4449 (get_priv_size(priv_args[k].get_args) <= IFNAMSIZ)) 4450 n = priv_args[k].get_args & IW_PRIV_SIZE_MASK; 4451 else 4452 n = wdata.data.length; 4453 4454 output = rtw_zmalloc(4096); 4455 if (NULL == output) { 4456 err = -ENOMEM; 4457 goto exit; 4458 } 4459 4460 switch (priv_args[k].get_args & IW_PRIV_TYPE_MASK) { 4461 case IW_PRIV_TYPE_BYTE: 4462 /* Display args */ 4463 for (j = 0; j < n; j++) { 4464 len = scnprintf(str, sizeof(str), "%d ", extra[j]); 4465 output_len = strlen(output); 4466 if ((output_len + len + 1) > 4096) { 4467 err = -E2BIG; 4468 goto exit; 4469 } 4470 memcpy(output+output_len, str, len); 4471 } 4472 break; 4473 4474 case IW_PRIV_TYPE_INT: 4475 /* Display args */ 4476 for (j = 0; j < n; j++) { 4477 len = scnprintf(str, sizeof(str), "%d ", ((__s32 *)extra)[j]); 4478 output_len = strlen(output); 4479 if ((output_len + len + 1) > 4096) { 4480 err = -E2BIG; 4481 goto exit; 4482 } 4483 memcpy(output+output_len, str, len); 4484 } 4485 break; 4486 4487 case IW_PRIV_TYPE_CHAR: 4488 /* Display args */ 4489 memcpy(output, extra, n); 4490 break; 4491 4492 default: 4493 err = -1; 4494 goto exit; 4495 } 4496 4497 output_len = strlen(output) + 1; 4498 wrq_data->data.length = output_len; 4499 if (copy_to_user(wrq_data->data.pointer, output, output_len)) { 4500 err = -EFAULT; 4501 goto exit; 4502 } 4503 } else { /* if args to set */ 4504 wrq_data->data.length = 0; 4505 } 4506 4507 exit: 4508 kfree(input); 4509 kfree(buffer); 4510 kfree(output); 4511 4512 return err; 4513 } 4514 4515 int rtw_ioctl(struct net_device *dev, struct ifreq *rq, int cmd) 4516 { 4517 struct iwreq *wrq = (struct iwreq *)rq; 4518 int ret = 0; 4519 4520 switch (cmd) { 4521 case RTL_IOCTL_WPA_SUPPLICANT: 4522 ret = wpa_supplicant_ioctl(dev, &wrq->u.data); 4523 break; 4524 case RTL_IOCTL_HOSTAPD: 4525 ret = rtw_hostapd_ioctl(dev, &wrq->u.data); 4526 break; 4527 case SIOCDEVPRIVATE: 4528 ret = rtw_ioctl_wext_private(dev, &wrq->u); 4529 break; 4530 default: 4531 ret = -EOPNOTSUPP; 4532 break; 4533 } 4534 4535 return ret; 4536 } 4537