Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vapier...
[pandora-kernel.git] / drivers / staging / vt6656 / ioctl.c
1 /*
2  * Copyright (c) 1996, 2003 VIA Networking Technologies, Inc.
3  * All rights reserved.
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License as published by
7  * the Free Software Foundation; either version 2 of the License, or
8  * (at your option) any later version.
9  *
10  * This program is distributed in the hope that it will be useful,
11  * but WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13  * GNU General Public License for more details.
14  *
15  * You should have received a copy of the GNU General Public License along
16  * with this program; if not, write to the Free Software Foundation, Inc.,
17  * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
18  *
19  * File: ioctl.c
20  *
21  * Purpose:  private ioctl functions
22  *
23  * Author: Lyndon Chen
24  *
25  * Date: Auguest 20, 2003
26  *
27  * Functions:
28  *
29  * Revision History:
30  *
31  */
32
33 #include "ioctl.h"
34 #include "iocmd.h"
35 #include "mac.h"
36 #include "card.h"
37 #include "hostap.h"
38 #include "wpactl.h"
39 #include "control.h"
40 #include "rndis.h"
41 #include "rf.h"
42
43 /*---------------------  Static Definitions -------------------------*/
44
45 /*---------------------  Static Classes  ----------------------------*/
46
47 /*---------------------  Static Variables  --------------------------*/
48 //static int          msglevel                =MSG_LEVEL_DEBUG;
49 static int          msglevel                =MSG_LEVEL_INFO;
50
51     SWPAResult wpa_Result;
52
53 /*---------------------  Static Functions  --------------------------*/
54
55 /*---------------------  Export Variables  --------------------------*/
56
57 int private_ioctl(PSDevice pDevice, struct ifreq *rq) {
58
59         PSCmdRequest        pReq = (PSCmdRequest)rq;
60     PSMgmtObject        pMgmt = &(pDevice->sMgmtObj);
61         int                     result = 0;
62     PWLAN_IE_SSID       pItemSSID;
63     SCmdBSSJoin         sJoinCmd;
64     SCmdZoneTypeSet sZoneTypeCmd;
65     SCmdScan            sScanCmd;
66     SCmdStartAP         sStartAPCmd;
67     SCmdSetWEP          sWEPCmd;
68     SCmdValue           sValue;
69     SBSSIDList          sList;
70     SNodeList           sNodeList;
71     PSBSSIDList         pList;
72     PSNodeList          pNodeList;
73     unsigned int                cbListCount;
74     PKnownBSS           pBSS;
75     PKnownNodeDB        pNode;
76     unsigned int                ii, jj;
77     SCmdLinkStatus      sLinkStatus;
78     BYTE                abySuppRates[] = {WLAN_EID_SUPP_RATES, 4, 0x02, 0x04, 0x0B, 0x16};
79     BYTE                abyNullAddr[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
80     DWORD               dwKeyIndex= 0;
81     BYTE                abyScanSSID[WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1];
82     signed long                ldBm;
83
84     pReq->wResult = 0;
85
86     switch(pReq->wCmdCode) {
87
88     case WLAN_CMD_BSS_SCAN:
89
90         if (copy_from_user(&sScanCmd, pReq->data, sizeof(SCmdScan))) {
91                         result = -EFAULT;
92                         break;
93                 };
94
95         pItemSSID = (PWLAN_IE_SSID)sScanCmd.ssid;
96         if (pItemSSID->len != 0) {
97             memset(abyScanSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
98             memcpy(abyScanSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
99         }
100         spin_lock_irq(&pDevice->lock);
101
102         if (memcmp(pMgmt->abyCurrBSSID, &abyNullAddr[0], 6) == 0)
103                 BSSvClearBSSList((void *) pDevice, FALSE);
104         else
105                 BSSvClearBSSList((void *) pDevice, pDevice->bLinkPass);
106
107         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_BSS_SCAN..begin\n");
108
109         if (pItemSSID->len != 0)
110                 bScheduleCommand((void *) pDevice,
111                                  WLAN_CMD_BSSID_SCAN,
112                                  abyScanSSID);
113         else
114                 bScheduleCommand((void *) pDevice, WLAN_CMD_BSSID_SCAN, NULL);
115
116         spin_unlock_irq(&pDevice->lock);
117         break;
118
119     case WLAN_CMD_ZONETYPE_SET:
120         //mike add :cann't support.
121            result=-EOPNOTSUPP;
122           break;
123
124         if (copy_from_user(&sZoneTypeCmd, pReq->data, sizeof(SCmdZoneTypeSet))) {
125                         result = -EFAULT;
126                         break;
127                 };
128
129           if(sZoneTypeCmd.bWrite==TRUE) {
130           //////write zonetype
131                 if(sZoneTypeCmd.ZoneType == ZoneType_USA) {
132                   //set to USA
133                    printk("set_ZoneType:USA\n");
134                 }
135                 else if(sZoneTypeCmd.ZoneType == ZoneType_Japan) {
136                   //set to Japan
137                   printk("set_ZoneType:Japan\n");
138                 }
139                else if(sZoneTypeCmd.ZoneType == ZoneType_Europe) {
140                   //set to Europe
141                   printk("set_ZoneType:Europe\n");
142                 }
143             }
144         else {
145           ///////read zonetype
146           BYTE                       zonetype=0;
147
148
149            if(zonetype == 0x00)  { //USA
150              sZoneTypeCmd.ZoneType = ZoneType_USA;
151            }
152          else if(zonetype == 0x01) { //Japan
153              sZoneTypeCmd.ZoneType = ZoneType_Japan;
154           }
155          else if(zonetype == 0x02) { //Europe
156              sZoneTypeCmd.ZoneType = ZoneType_Europe;
157          }
158          else { //Unknown ZoneType
159                 printk("Error:ZoneType[%x] Unknown ???\n",zonetype);
160                  result = -EFAULT;
161                 break;
162          }
163            if (copy_to_user(pReq->data, &sZoneTypeCmd, sizeof(SCmdZoneTypeSet))) {
164                         result = -EFAULT;
165                         break;
166                 };
167         }
168
169              break;
170
171     case WLAN_CMD_BSS_JOIN:
172
173         if (copy_from_user(&sJoinCmd, pReq->data, sizeof(SCmdBSSJoin))) {
174                         result = -EFAULT;
175                         break;
176                 };
177
178         pItemSSID = (PWLAN_IE_SSID)sJoinCmd.ssid;
179         memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
180                 memcpy(pMgmt->abyDesireSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
181             if (sJoinCmd.wBSSType == ADHOC) {
182                 pMgmt->eConfigMode = WMAC_CONFIG_IBSS_STA;
183                 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to adhoc mode\n");
184             }
185             else {
186                 pMgmt->eConfigMode = WMAC_CONFIG_ESS_STA;
187                 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to STA mode\n");
188             }
189             if (sJoinCmd.bPSEnable == TRUE) {
190             pDevice->ePSMode = WMAC_POWER_FAST;
191 //            pDevice->ePSMode = WMAC_POWER_MAX;
192             pMgmt->wListenInterval = 2;
193             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Power Saving On\n");
194         }
195         else {
196             pDevice->ePSMode = WMAC_POWER_CAM;
197             pMgmt->wListenInterval = 1;
198             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Power Saving Off \n");
199         }
200
201         if (sJoinCmd.bShareKeyAuth == TRUE){
202             pMgmt->bShareKeyAlgorithm = TRUE;
203             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Share Key \n");
204         }
205         else {
206             pMgmt->bShareKeyAlgorithm = FALSE;
207             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Open System \n");
208         }
209             pDevice->uChannel = sJoinCmd.uChannel;
210         netif_stop_queue(pDevice->dev);
211         spin_lock_irq(&pDevice->lock);
212         pMgmt->eCurrState = WMAC_STATE_IDLE;
213         bScheduleCommand((void *) pDevice,
214                          WLAN_CMD_BSSID_SCAN,
215                          pMgmt->abyDesireSSID);
216         bScheduleCommand((void *) pDevice, WLAN_CMD_SSID, NULL);
217         spin_unlock_irq(&pDevice->lock);
218         break;
219
220     case WLAN_CMD_SET_WEP:
221         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_WEP Key. \n");
222         memset(&sWEPCmd, 0 ,sizeof(SCmdSetWEP));
223         if (copy_from_user(&sWEPCmd, pReq->data, sizeof(SCmdSetWEP))) {
224                         result = -EFAULT;
225                         break;
226                 };
227             if (sWEPCmd.bEnableWep != TRUE) {
228                 int uu;
229
230             pDevice->bEncryptionEnable = FALSE;
231             pDevice->eEncryptionStatus = Ndis802_11EncryptionDisabled;
232             spin_lock_irq(&pDevice->lock);
233             for (uu = 0; uu < MAX_KEY_TABLE; uu++)
234                 MACvDisableKeyEntry(pDevice, uu);
235             spin_unlock_irq(&pDevice->lock);
236             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WEP function disable.\n");
237             break;
238         }
239
240         for (ii = 0; ii < WLAN_WEP_NKEYS; ii ++) {
241             if (sWEPCmd.bWepKeyAvailable[ii]) {
242                 if (ii == sWEPCmd.byKeyIndex)
243 //2006-1207-01<Modify>by Einsn Liu
244 //                  dwKeyIndex|= (1 << 31);
245                     dwKeyIndex=ii|(1 << 31);
246                 else
247                     dwKeyIndex = ii;
248                 spin_lock_irq(&pDevice->lock);
249                 KeybSetDefaultKey(  pDevice,
250                                     &(pDevice->sKey),
251                                     dwKeyIndex,
252                                     sWEPCmd.auWepKeyLength[ii],
253                                     NULL,
254                                     (PBYTE)&sWEPCmd.abyWepKey[ii][0],
255                                     KEY_CTL_WEP
256                                   );
257                spin_unlock_irq(&pDevice->lock);
258
259             }
260         }
261         pDevice->byKeyIndex = sWEPCmd.byKeyIndex;
262         pDevice->bTransmitKey = TRUE;
263         pDevice->bEncryptionEnable = TRUE;
264         pDevice->eEncryptionStatus = Ndis802_11Encryption1Enabled;
265
266         break;
267
268     case WLAN_CMD_GET_LINK:
269         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_GET_LINK status. \n");
270
271         memset(sLinkStatus.abySSID, 0 , WLAN_SSID_MAXLEN + 1);
272
273         if (pMgmt->eCurrMode == WMAC_MODE_IBSS_STA)
274             sLinkStatus.wBSSType = ADHOC;
275         else
276             sLinkStatus.wBSSType = INFRA;
277
278         if (pMgmt->eCurrState == WMAC_STATE_JOINTED)
279             sLinkStatus.byState = ADHOC_JOINTED;
280         else
281             sLinkStatus.byState = ADHOC_STARTED;
282
283         sLinkStatus.uChannel = pMgmt->uCurrChannel;
284         if (pDevice->bLinkPass == TRUE) {
285             sLinkStatus.bLink = TRUE;
286                     pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID;
287                     memcpy(sLinkStatus.abySSID, pItemSSID->abySSID, pItemSSID->len);
288                     memcpy(sLinkStatus.abyBSSID, pMgmt->abyCurrBSSID, WLAN_BSSID_LEN);
289                     sLinkStatus.uLinkRate = pMgmt->sNodeDBTable[0].wTxDataRate;
290             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO" Link Success ! \n");
291         }
292         else {
293             sLinkStatus.bLink = FALSE;
294         }
295         if (copy_to_user(pReq->data, &sLinkStatus, sizeof(SCmdLinkStatus))) {
296                         result = -EFAULT;
297                         break;
298                 };
299
300         break;
301
302     case WLAN_CMD_GET_LISTLEN:
303                 cbListCount = 0;
304                 pBSS = &(pMgmt->sBSSList[0]);
305         for (ii = 0; ii < MAX_BSS_NUM; ii++) {
306             pBSS = &(pMgmt->sBSSList[ii]);
307             if (!pBSS->bActive)
308                 continue;
309             cbListCount++;
310         };
311         sList.uItem = cbListCount;
312         if (copy_to_user(pReq->data, &sList, sizeof(SBSSIDList))) {
313                         result = -EFAULT;
314                         break;
315                 };
316         pReq->wResult = 0;
317         break;
318
319     case WLAN_CMD_GET_LIST:
320         if (copy_from_user(&sList, pReq->data, sizeof(SBSSIDList))) {
321                         result = -EFAULT;
322                         break;
323                 };
324         pList = (PSBSSIDList)kmalloc(sizeof(SBSSIDList) + (sList.uItem * sizeof(SBSSIDItem)), (int)GFP_ATOMIC);
325         if (pList == NULL) {
326             result = -ENOMEM;
327             break;
328         }
329                 pList->uItem = sList.uItem;
330                 pBSS = &(pMgmt->sBSSList[0]);
331         for (ii = 0, jj = 0; jj < MAX_BSS_NUM ; jj++) {
332             pBSS = &(pMgmt->sBSSList[jj]);
333             if (pBSS->bActive) {
334                     pList->sBSSIDList[ii].uChannel = pBSS->uChannel;
335                     pList->sBSSIDList[ii].wBeaconInterval = pBSS->wBeaconInterval;
336                     pList->sBSSIDList[ii].wCapInfo = pBSS->wCapInfo;
337                     RFvRSSITodBm(pDevice, (BYTE)(pBSS->uRSSI), &ldBm);
338                     pList->sBSSIDList[ii].uRSSI = (unsigned int) ldBm;
339 //                  pList->sBSSIDList[ii].uRSSI = pBSS->uRSSI;
340                     memcpy(pList->sBSSIDList[ii].abyBSSID, pBSS->abyBSSID, WLAN_BSSID_LEN);
341                     pItemSSID = (PWLAN_IE_SSID)pBSS->abySSID;
342                     memset(pList->sBSSIDList[ii].abySSID, 0, WLAN_SSID_MAXLEN + 1);
343                     memcpy(pList->sBSSIDList[ii].abySSID, pItemSSID->abySSID, pItemSSID->len);
344                 if (WLAN_GET_CAP_INFO_ESS(pBSS->wCapInfo)) {
345                         pList->sBSSIDList[ii].byNetType = INFRA;
346                 }
347                 else {
348                         pList->sBSSIDList[ii].byNetType = ADHOC;
349                     }
350                     if (WLAN_GET_CAP_INFO_PRIVACY(pBSS->wCapInfo)) {
351                         pList->sBSSIDList[ii].bWEPOn = TRUE;
352                 }
353                 else {
354                         pList->sBSSIDList[ii].bWEPOn = FALSE;
355                     }
356                     ii ++;
357                     if (ii >= pList->uItem)
358                         break;
359             }
360         }
361
362         if (copy_to_user(pReq->data, pList, sizeof(SBSSIDList) + (sList.uItem * sizeof(SBSSIDItem)))) {
363                         result = -EFAULT;
364                         break;
365                 };
366         kfree(pList);
367         pReq->wResult = 0;
368         break;
369
370     case WLAN_CMD_GET_MIB:
371         if (copy_to_user(pReq->data, &(pDevice->s802_11Counter), sizeof(SDot11MIBCount))) {
372                         result = -EFAULT;
373                         break;
374                 };
375         break;
376
377     case WLAN_CMD_GET_STAT:
378         if (copy_to_user(pReq->data, &(pDevice->scStatistic), sizeof(SStatCounter))) {
379                         result = -EFAULT;
380                         break;
381                 };
382         break;
383     case WLAN_CMD_STOP_MAC:
384
385         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_STOP_MAC\n");
386         // Todo xxxxxx
387         netif_stop_queue(pDevice->dev);
388         spin_lock_irq(&pDevice->lock);
389         if (pDevice->bRadioOff == FALSE) {
390             CARDbRadioPowerOff(pDevice);
391         }
392         pDevice->bLinkPass = FALSE;
393         ControlvMaskByte(pDevice,MESSAGE_REQUEST_MACREG,MAC_REG_PAPEDELAY,LEDSTS_STS,LEDSTS_SLOW);
394         memset(pMgmt->abyCurrBSSID, 0, 6);
395         pMgmt->eCurrState = WMAC_STATE_IDLE;
396 //        del_timer(&pDevice->sTimerCommand);
397 //        del_timer(&pMgmt->sTimerSecondCallback);
398         pDevice->bCmdRunning = FALSE;
399         spin_unlock_irq(&pDevice->lock);
400
401         break;
402
403     case WLAN_CMD_START_MAC:
404
405         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_START_MAC\n");
406         // Todo xxxxxxx
407         if (pDevice->bRadioOff == TRUE)
408             CARDbRadioPowerOn(pDevice);
409         break;
410
411     case WLAN_CMD_SET_HOSTAPD:
412
413         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOSTAPD\n");
414
415         if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
416                         result = -EFAULT;
417                         break;
418                 };
419                 if (sValue.dwValue == 1) {
420             if (vt6656_hostap_set_hostapd(pDevice, 1, 1) == 0){
421                 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable HOSTAP\n");
422             }
423             else {
424                             result = -EFAULT;
425                             break;
426                         }
427         }
428         else {
429             vt6656_hostap_set_hostapd(pDevice, 0, 1);
430             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable HOSTAP\n");
431         }
432
433         break;
434
435     case WLAN_CMD_SET_HOSTAPD_STA:
436
437         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOSTAPD_STA\n");
438
439         break;
440     case WLAN_CMD_SET_802_1X:
441
442         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_802_1X\n");
443         if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
444                         result = -EFAULT;
445                         break;
446                 };
447
448                 if (sValue.dwValue == 1) {
449             pDevice->bEnable8021x = TRUE;
450             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable 802.1x\n");
451         }
452         else {
453             pDevice->bEnable8021x = FALSE;
454             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable 802.1x\n");
455         }
456
457         break;
458
459
460     case WLAN_CMD_SET_HOST_WEP:
461
462         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_HOST_WEP\n");
463         if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
464                         result = -EFAULT;
465                         break;
466                 };
467
468                 if (sValue.dwValue == 1) {
469             pDevice->bEnableHostWEP = TRUE;
470             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Enable HostWEP\n");
471         }
472         else {
473             pDevice->bEnableHostWEP = FALSE;
474             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Disable HostWEP\n");
475         }
476
477         break;
478
479     case WLAN_CMD_SET_WPA:
480          DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_SET_WPA\n");
481
482         if (copy_from_user(&sValue, pReq->data, sizeof(SCmdValue))) {
483                         result = -EFAULT;
484                         break;
485                 };
486                 if (sValue.dwValue == 1) {
487                      DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "up wpadev\n");
488                    memcpy(pDevice->wpadev->dev_addr,
489                           pDevice->dev->dev_addr,
490                           ETH_ALEN);
491                    pDevice->bWPADEVUp = TRUE;
492         }
493         else {
494             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "close wpadev\n");
495            pDevice->bWPADEVUp = FALSE;
496         }
497
498         break;
499
500     case WLAN_CMD_AP_START:
501
502         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "WLAN_CMD_AP_START\n");
503         if (pDevice->bRadioOff == TRUE) {
504             CARDbRadioPowerOn(pDevice);
505             add_timer(&pMgmt->sTimerSecondCallback);
506         }
507         if (copy_from_user(&sStartAPCmd, pReq->data, sizeof(SCmdStartAP))) {
508                         result = -EFAULT;
509                         break;
510                 };
511
512             if (sStartAPCmd.wBSSType == AP) {
513                 pMgmt->eConfigMode = WMAC_CONFIG_AP;
514                 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct set to AP mode\n");
515             }
516             else {
517                 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "ioct BSS type not set to AP mode\n");
518                         result = -EFAULT;
519                         break;
520             }
521
522
523             if (sStartAPCmd.wBBPType == PHY80211g) {
524             pMgmt->byAPBBType = PHY_TYPE_11G;
525         }
526         else if (sStartAPCmd.wBBPType == PHY80211a) {
527                  pMgmt->byAPBBType = PHY_TYPE_11A;
528         }
529         else {
530             pMgmt->byAPBBType = PHY_TYPE_11B;
531         }
532
533         pItemSSID = (PWLAN_IE_SSID)sStartAPCmd.ssid;
534         memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1);
535                 memcpy(pMgmt->abyDesireSSID, pItemSSID, pItemSSID->len + WLAN_IEHDR_LEN);
536
537             if ((sStartAPCmd.uChannel > 0)&&(sStartAPCmd.uChannel <= 14))
538                 pDevice->uChannel = sStartAPCmd.uChannel;
539
540             if ((sStartAPCmd.uBeaconInt >= 20) && (sStartAPCmd.uBeaconInt <= 1000))
541             pMgmt->wIBSSBeaconPeriod = sStartAPCmd.uBeaconInt;
542         else
543             pMgmt->wIBSSBeaconPeriod = 100;
544
545         if (sStartAPCmd.bShareKeyAuth == TRUE){
546             pMgmt->bShareKeyAlgorithm = TRUE;
547             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Share Key \n");
548         }
549         else {
550             pMgmt->bShareKeyAlgorithm = FALSE;
551             DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Open System \n");
552         }
553         memcpy(pMgmt->abyIBSSSuppRates, abySuppRates, 6);
554
555         if (sStartAPCmd.byBasicRate & BIT3) {
556             pMgmt->abyIBSSSuppRates[2] |= BIT7;
557             pMgmt->abyIBSSSuppRates[3] |= BIT7;
558             pMgmt->abyIBSSSuppRates[4] |= BIT7;
559             pMgmt->abyIBSSSuppRates[5] |= BIT7;
560         }else if (sStartAPCmd.byBasicRate & BIT2) {
561              pMgmt->abyIBSSSuppRates[2] |= BIT7;
562              pMgmt->abyIBSSSuppRates[3] |= BIT7;
563              pMgmt->abyIBSSSuppRates[4] |= BIT7;
564         }else if (sStartAPCmd.byBasicRate & BIT1) {
565              pMgmt->abyIBSSSuppRates[2] |= BIT7;
566              pMgmt->abyIBSSSuppRates[3] |= BIT7;
567         }else if (sStartAPCmd.byBasicRate & BIT1) {
568              pMgmt->abyIBSSSuppRates[2] |= BIT7;
569         }else {
570             //default 1,2M
571              pMgmt->abyIBSSSuppRates[2] |= BIT7;
572              pMgmt->abyIBSSSuppRates[3] |= BIT7;
573         }
574
575         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Support Rate= %x %x %x %x\n",
576                 pMgmt->abyIBSSSuppRates[2],
577                 pMgmt->abyIBSSSuppRates[3],
578                 pMgmt->abyIBSSSuppRates[4],
579                 pMgmt->abyIBSSSuppRates[5]
580                 );
581
582         netif_stop_queue(pDevice->dev);
583         spin_lock_irq(&pDevice->lock);
584         bScheduleCommand((void *) pDevice, WLAN_CMD_RUN_AP, NULL);
585         spin_unlock_irq(&pDevice->lock);
586         break;
587
588     case WLAN_CMD_GET_NODE_CNT:
589
590                 cbListCount = 0;
591                 pNode = &(pMgmt->sNodeDBTable[0]);
592         for (ii = 0; ii < (MAX_NODE_NUM + 1); ii++) {
593             pNode = &(pMgmt->sNodeDBTable[ii]);
594             if (!pNode->bActive)
595                 continue;
596             cbListCount++;
597         };
598
599         sNodeList.uItem = cbListCount;
600         if (copy_to_user(pReq->data, &sNodeList, sizeof(SNodeList))) {
601                         result = -EFAULT;
602                         break;
603                 };
604         pReq->wResult = 0;
605         break;
606
607     case WLAN_CMD_GET_NODE_LIST:
608
609         if (copy_from_user(&sNodeList, pReq->data, sizeof(SNodeList))) {
610                         result = -EFAULT;
611                         break;
612                 };
613         pNodeList = (PSNodeList)kmalloc(sizeof(SNodeList) + (sNodeList.uItem * sizeof(SNodeItem)), (int)GFP_ATOMIC);
614         if (pNodeList == NULL) {
615             result = -ENOMEM;
616             break;
617         }
618                 pNodeList->uItem = sNodeList.uItem;
619                 pNode = &(pMgmt->sNodeDBTable[0]);
620         for (ii = 0, jj = 0; ii < (MAX_NODE_NUM + 1); ii++) {
621             pNode = &(pMgmt->sNodeDBTable[ii]);
622             if (pNode->bActive) {
623                     pNodeList->sNodeList[jj].wAID = pNode->wAID;
624                     memcpy(pNodeList->sNodeList[jj].abyMACAddr, pNode->abyMACAddr, WLAN_ADDR_LEN);
625                     pNodeList->sNodeList[jj].wTxDataRate = pNode->wTxDataRate;
626                     pNodeList->sNodeList[jj].wInActiveCount = (WORD)pNode->uInActiveCount;
627                     pNodeList->sNodeList[jj].wEnQueueCnt = (WORD)pNode->wEnQueueCnt;
628                     pNodeList->sNodeList[jj].wFlags = (WORD)pNode->dwFlags;
629                     pNodeList->sNodeList[jj].bPWBitOn = pNode->bPSEnable;
630                     pNodeList->sNodeList[jj].byKeyIndex = pNode->byKeyIndex;
631                     pNodeList->sNodeList[jj].wWepKeyLength = pNode->uWepKeyLength;
632                     memcpy(&(pNodeList->sNodeList[jj].abyWepKey[0]), &(pNode->abyWepKey[0]), WEP_KEYMAXLEN);
633                 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "key= %2.2X:%2.2X:%2.2X:%2.2X:%2.2X\n",
634                             pNodeList->sNodeList[jj].abyWepKey[0],
635                             pNodeList->sNodeList[jj].abyWepKey[1],
636                             pNodeList->sNodeList[jj].abyWepKey[2],
637                             pNodeList->sNodeList[jj].abyWepKey[3],
638                             pNodeList->sNodeList[jj].abyWepKey[4]
639                            );
640                     pNodeList->sNodeList[jj].bIsInFallback = pNode->bIsInFallback;
641                     pNodeList->sNodeList[jj].uTxFailures = pNode->uTxFailures;
642                     pNodeList->sNodeList[jj].uTxAttempts = pNode->uTxAttempts;
643                     pNodeList->sNodeList[jj].wFailureRatio = (WORD)pNode->uFailureRatio;
644                     jj ++;
645                     if (jj >= pNodeList->uItem)
646                         break;
647                 }
648                 };
649         if (copy_to_user(pReq->data, pNodeList, sizeof(SNodeList) + (sNodeList.uItem * sizeof(SNodeItem)))) {
650                         result = -EFAULT;
651                         break;
652                 };
653         kfree(pNodeList);
654         pReq->wResult = 0;
655         break;
656
657     case 0xFF:
658         memset(wpa_Result.ifname,0,sizeof(wpa_Result.ifname));
659             wpa_Result.proto = 0;
660             wpa_Result.key_mgmt = 0;
661             wpa_Result.eap_type = 0;
662             wpa_Result.authenticated = FALSE;
663               pDevice->fWPA_Authened = FALSE;
664         if (copy_from_user(&wpa_Result, pReq->data, sizeof(wpa_Result))) {
665             result = -EFAULT;
666                         break;
667                 }
668 //DavidWang  for some AP maybe good authenticate
669    if(wpa_Result.key_mgmt==0x20)
670       pMgmt->Cisco_cckm =1;
671     else
672     pMgmt->Cisco_cckm =0;
673 //DavidWang
674
675 if(wpa_Result.authenticated==TRUE) {
676    {
677      union iwreq_data      wrqu;
678
679      pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID;
680
681      memset(&wrqu, 0, sizeof(wrqu));
682      wrqu.data.flags = RT_WPACONNECTED_EVENT_FLAG;
683      wrqu.data.length =pItemSSID->len;
684      wireless_send_event(pDevice->dev, IWEVCUSTOM, &wrqu, pItemSSID->abySSID);
685    }
686          pDevice->fWPA_Authened = TRUE;           //is successful peer to wpa_Result.authenticated?
687 }
688
689         //printk("get private wpa_supplicant announce WPA SM\n");
690         //printk("wpa-->ifname=%s\n",wpa_Result.ifname);
691         //printk("wpa-->proto=%d\n",wpa_Result.proto);
692         //printk("wpa-->key-mgmt=%d\n",wpa_Result.key_mgmt);
693         //printk("wpa-->eap_type=%d\n",wpa_Result.eap_type);
694         //printk("wpa-->authenticated is %s\n",(wpa_Result.authenticated==TRUE)?"TRUE":"FALSE");
695
696         pReq->wResult = 0;
697         break;
698
699     default:
700         DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Private command not support..\n");
701     }
702
703     return result;
704 }